Browsing Electronic Engineering and Computer Science by Title
Now showing items 2758-2777 of 3475
-
Scoring Aided Federated Learning on Long-Tailed Data for Wireless IoMT Based Healthcare System.
(2024-06)In this article, we propose a novel federated learning (FL) framework for wireless Internet of Medical Things (IoMT) based healthcare systems, where multiple mobile clients and one edge server (ES) collaboratively train a ... -
Seagull optimization algorithm based multi-objective VM placement in edge-cloud data centers
(Elsevier BV, 2023-02-02)Edge-Cloud Datacenters (ECDCs) have been massively exploited by the owners of technology and industrial centers to satisfy the user demand. At the same time, the amount of energy used by these data centers is considerable. ... -
Searches for Interstellar HCCSH and H2CCS
(2019-10-01) -
Searching for configurations in clone evaluation - A replication study
(2016-01-01)© Springer International Publishing AG 2016. Clone detection is the process of finding duplicated code within a software code base in an automated manner. It is useful in several areas of software development such as code ... -
Second Workshop on Online Misinformation- And Harm-Aware Recommender Systems: Preface
(2021-10-02)This volume contains the proceedings with the research contributions presented at the Second Workshop on Online Misinformation-and Harm-Aware Recommender Systems (OHARS'2021) co-located with the 15th ACM Recommender Systems ... -
Secrecy Analysis of Control Information for UAV
(IEEE, 2023-07-14)In this correspondence, we investigate the average achievable secrecy rate (AASR) and average effective secrecy throughput (AEST) of the control link from the ground control station to the unmanned aerial vehicle (UAV), ... -
Secrecy Energy Efficiency for Distributed-IRSs Assisted Uplink Networks
(2023-10-01)In this correspondence, we aim at achieving the energy-efficient secrecy transmission for an uplink network assisted by distributed intelligent reflecting surfaces (D-IRSs). The secrecy energy efficiency (SEE) maximization ... -
Secrecy Performance Analysis in STAR-RIS-Aided NOMA Networks
(2023-01-01)An analytical framework for physical layer security in simultaneous transmitting and reflecting reconfigurable intelligent surface (STAR-RIS) assisted non-orthogonal multiple access (NOMA) transmissions is proposed, where ... -
Secrecy Rate Optimization for Intelligent Reflecting Surface Assisted MIMO System
(IEEE, 2020-11-01)This paper investigates the impact of intelligent reflecting surface (IRS) enabled wireless secure transmission. Specifically, an IRS is deployed to assist multiple-input multiple-output (MIMO) secure system to enhance the ... -
Secure key distribution exploiting error rate criticality for radio frequency links.
(The Royal Society Publishing, 2023-10)We propose a method by which two radio frequency (RF) communication terminals exchange encryption keys or other data securely. This method draws on the approach developed for quantum key distribution (QKD) for detecting ... -
Secure Mobile Edge Computing Networks in the Presence of Multiple Eavesdroppers
(Institute of Electrical and Electronics Engineers, 2021-10-08) -
Secure RIS-Aided MISO-NOMA System Design in the Presence of Active Eavesdropping
(IEEE, 2023-04-15)As for the time-division communications system, the pilot spoofing attack (PSA) technique is maliciously utilized by active eavesdroppers during the uplink training phase, for contaminating the legitimate channel estimation ...