Resource Type

Journal Article 916

Conference Videos 27

Conference Information 1

Year

2024 2

2023 93

2022 87

2021 88

2020 97

2019 74

2018 58

2017 75

2016 45

2015 49

2014 24

2013 29

2012 23

2011 13

2010 14

2009 19

2008 25

2007 21

2006 15

2005 21

open ︾

Keywords

neural network 32

artificial neural network 21

optimization 13

Neural network 11

network 10

convolutional neural network 7

genetic algorithm 7

Deep learning 6

artificial neural network (ANN) 6

Artificial intelligence 5

Internet of Things 4

Machine learning 4

6G 3

ANN 3

BP neural network 3

Cyber-physical system 3

Network security 3

finite element method 3

3D printing 2

open ︾

Search scope:

排序: Display mode:

Beamforming and fronthaul compression design for intelligent reflecting surface aided cloud radio access Research Article

Yu ZHANG, Xuelu WU, Hong PENG, Caijun ZHONG, Xiaoming CHEN,yzhang@zjut.edu.cn,ph@zjut.edu.cn,caijunzhong@zju.edu.cn,chen_xiaoming@zju.edu.cn

Frontiers of Information Technology & Electronic Engineering 2022, Volume 23, Issue 1,   Pages 31-46 doi: 10.1631/FITEE.2100307

Abstract: to the inherent central information processing and resource management ability, the is a promising networkstructure for an intelligent and simplified sixth-generation (6G) wireless network.Nevertheless, to further enhance the capacity and coverage, more radio remote heads (RRHs) as well asTo address this issue, we propose to exploit the as an alternative way to enhance the C-RAN, which isNumerical results verify the performance gain brought about by deploying IRS in C-RAN and the superiority

Keywords: Cloud radio access network (C-RAN)     Intelligent reflecting surface (IRS)     Transmit beamforming     Fronthaul    

Joint uplink and downlink resource allocation for low-latency mobile virtual reality delivery in fog radioaccess networks Research Article

Tian DANG, Chenxi LIU, Xiqing LIU, Shi YAN,tiandang@bupt.edu.cn,chenxi.liu@bupt.edu.cn,liuxiqing@bupt.edu.cn,yanshi01@bupt.edu.cn

Frontiers of Information Technology & Electronic Engineering 2022, Volume 23, Issue 1,   Pages 73-85 doi: 10.1631/FITEE.2100308

Abstract: Fog radio access networks (F-RANs), in which the fog access points are equipped with communication, cachingIn this work, we investigate a mobile VR F-RAN delivery framework, where both the uplink and downlink

Keywords: Virtual reality delivery     Fog radio access network (F-RAN)     Round-trip latency     Resource allocation    

Polarizationmultiplexing based duplex radio-over-fiber link for millimeterwave signal transmission toa ring of multiple radio access units None

Tayyab MEHMOOD, Hina QAYYUM, Salman GHAFOOR

Frontiers of Information Technology & Electronic Engineering 2019, Volume 20, Issue 2,   Pages 300-306 doi: 10.1631/FITEE.1700056

Abstract:

A radio-over-fiber (RoF) distributed antenna system (DAS) architecture is proposed, where millimeterwave (mm-wave) signals are transmitted to four different radio access units (RAUs) arranged in a ringThe radio frequency (RF) signals are transmitted by polarization multiplexing a multi-wavelength source

Keywords: Radio over fiber     Millimeter wave     Radio access units    

Resource allocation for network profit maximization in NOMA-based F-RANs: a game-theoretic approach Research Article

Xueyan CAO, Shi YAN, Hongming ZHANG

Frontiers of Information Technology & Electronic Engineering 2022, Volume 23, Issue 10,   Pages 1546-1561 doi: 10.1631/FITEE.2100341

Abstract: , and this is made possible by edge computing and communication functions of the fog access points (F-APsprevailing situation in industry is that in NOMA-based F-RANs, energy-efficient , which consists of (CP) and radio(RRA), is crucial for network performance enhancement.To this end, in this paper, we first characterize an NOMA-based F-RAN in which F-APs of caching capabilitiesunderlaid with the radio remote heads serve user equipments via the NOMA protocol.

Keywords: Fog radio access network     Non-orthogonal multiple access     Game theory     Cache placement     Resource allocation    

Intelligent radio access networks: architectures, key techniques, and experimental platforms Review Article

Zeyu WANG, Yaohua SUN, Shuo YUAN,sunyaohua@bupt.edu.cn

Frontiers of Information Technology & Electronic Engineering 2022, Volume 23, Issue 1,   Pages 5-18 doi: 10.1631/FITEE.2100305

Abstract: Intelligent radio access networks (RANs) have been seen as a promising paradigm aiming to better satisfyFirst, the efforts made by standard organizations and vendors are summarized, and several intelligent RANarchitectures proposed by the academic community are presented, such as intent-driven RAN and networkThen, several enabling techniques are introduced which include AI-driven network slicing, intent perception, intelligent operation and maintenance, AI-based cloud-edge collaborative networking, and intelligent

Keywords: Intelligent network architecture     Artificial intelligence     Experimental platforms    

Generic user revocation systems for attribute-based encryption in cloud storage None

Genlang CHEN, Zhiqian XU, Hai JIANG, Kuan-ching LI

Frontiers of Information Technology & Electronic Engineering 2018, Volume 19, Issue 11,   Pages 1362-1384 doi: 10.1631/FITEE.1800405

Abstract:

Cloud-based storage is a service model for businesses and individual users that involves paid or freeBecause most cloud storage is provided by third-party service providers, the trust required for the cloudproviders and the shared multi-tenant environment present special challenges for data protection and accessonly protects data secrecy, but also has ciphertexts or decryption keys associated with fine-grained accessThis enforcement puts data access under control at each data item level.

Keywords: Attribute-based encryption     Generic user revocation     User privacy     Cloud storage     Access control    

On optimization of cooperative MIMO for underlaid secrecy Industrial Internet of Things Research Article

Xinyao WANG, Xuyan BAO, Yuzhen HUANG, Zhong ZHENG, Zesong FEI

Frontiers of Information Technology & Electronic Engineering 2023, Volume 24, Issue 2,   Pages 259-274 doi: 10.1631/FITEE.2200188

Abstract: In this paper, techniques are investigated for , which operates as an underlaid cognitive radio systemThe underlaid secrecy paradigm is enabled by improving the secrecy rate towards the C-MIMO receiver andIn addition, a simplified EAP method is proposed for large-dimensional C-MIMO transmission, exploitingresults show that by transmitting signal and artificial noise in the properly selected eigenspace, C-MIMOMoreover, the proposed simplified EAP method for the large-dimensional C-MIMO can significantly improve

Keywords: Cognitive radio network     Physical layer security     Cooperative multi-input multi-output (C-MIMO)     Eigenspace-adaptive    

Generic attribute revocation systems for attribute-based encryption in cloud storage Research Papers

Genlang CHEN, Zhiqian XU, Jia-jian ZHANG, Guo-jun WANG, Hai JIANG, Miao-qing HUANG

Frontiers of Information Technology & Electronic Engineering 2019, Volume 20, Issue 6,   Pages 773-786 doi: 10.1631/FITEE.1800512

Abstract: encryption (ABE) has been a preferred encryption technology to solve the problems of data protection and accesscontrol, especially when the cloud storage is provided by third-party service providers.ABE can put data access under control at each data item level.

Keywords: Attribute-based encryption     Generic attribute revocation     User privacy     Cloud storage     Access control    

MULKASE: a novel approach for key-aggregate searchable encryption formulti-owner data Regular Papers

Mukti PADHYA, Devesh C. JINWALA

Frontiers of Information Technology & Electronic Engineering 2019, Volume 20, Issue 12,   Pages 1717-1748 doi: 10.1631/FITEE.1800192

Abstract: A user, in turn, is required to submit only one single aggregate trapdoor to the cloud to perform a keyword

Keywords: Searchable encryption     Cloud storage     Key-aggregate encryption     Data sharing    

Design and Developing of the Network Device Driver on Embedded Access Point

Wang Zhili,Hu Aiqun,Song Yubo

Strategic Study of CAE 2005, Volume 7, Issue 10,   Pages 91-94

Abstract:

This paper systematically introduces the main structure of network device driver based on embeddedWith the PCMCIA API, the software modules of embedded AP (access point) and the developing course areThe testing results of the network device driver are given at the end of the paper.

Keywords: embedded linux     network device driver     PCMCIA    

The Design and Analysis of Embedded Internet Control System

Zong Qun,Li Ran,Wang Bo

Strategic Study of CAE 2005, Volume 7, Issue 5,   Pages 53-56

Abstract:

An embedded Internet control system with embedded Internet nodes, of which the requirements and architecture is analyzed and studied, has been built up successfully and put into practice in REMS. Then the whole system is fully tested to prove that it can meet with the practical requirements well.

Keywords: embedded Internet control system     REMS     DS80C400     JAVA     TINI    

Multi-user rate and power analysis in a cognitive radio network with massive multi-input multi-output None

Shang LIU, Ishtiaq AHMAD, Ping ZHANG, Zhi ZHANG

Frontiers of Information Technology & Electronic Engineering 2018, Volume 19, Issue 5,   Pages 674-684 doi: 10.1631/FITEE.1700081

Abstract: This paper discusses transmission performance and power allocation strategies in an underlay cognitive radio(CR) network that contains relay and massive multi-input multi-output (MIMO).The downlink transmission performance of a relay-aided massive MIMO network without CR is derived.The interference between the primary network and secondary network can be canceled asymptotically.the primary network.

Keywords: Massive multi-input multi-output     Cognitive radio     Relay network     Transmission rate     Power analysis    

The Research and Implementation of EAP - FAST Protocol in Public Wireless Local Area Network

Cao Ping,Pei Wenjiang

Strategic Study of CAE 2005, Volume 7, Issue 12,   Pages 78-82

Abstract: This friendly and easily deployable network access solution will be widely used in WLAN.The authors research and design this protocol in public wireless local area network, and implement the

Keywords: public wireless local area network     port based network access control (802.1x)     flexible authentication    

Research Progress and Key Technologies of Quantum Network Systems

Li Jing, Gao Fei, Qin Sujuan, Wen Qiaoyan, Zhang Ping

Strategic Study of CAE 2023, Volume 25, Issue 6,   Pages 80-95 doi: 10.15302/J-SSCAE-2023.06.010

Abstract: nbsp;networks, this study categorizes quantum networks into three types: quantum cryptography, quantum cloudimplementation of quantum networks, the key technologies that need to be overcome in the development of quantum networkTherefore, to promote the development of quantum network systems in China, suggestions are proposed

Keywords: quantum information     quantum network     quantum cryptography network     quantum cloud computing network     quantum teleportation network    

On detecting primary user emulation attack using channel impulse response in the cognitive radio network Article

Qiao-mu JIANG, Hui-fang CHEN, Lei XIE, Kuang WANG

Frontiers of Information Technology & Electronic Engineering 2017, Volume 18, Issue 10,   Pages 1665-1676 doi: 10.1631/FITEE.1700203

Abstract: Cognitive radio is an effective technology to alleviate the spectrum resource scarcity problem by opportunisticallyserious denial-of-service (DoS) attack, named the ‘primary user emulation attack (PUEA)’, exists in the networkIn this paper, we propose a PUEA detection method that exploits the radio channel information to detectthe PUEA in the cognitive radio network.

Keywords: Cognitive radio network     Primary user emulation attack     Subspace-based blind channel estimation     Channel    

Title Author Date Type Operation

Beamforming and fronthaul compression design for intelligent reflecting surface aided cloud radio access

Yu ZHANG, Xuelu WU, Hong PENG, Caijun ZHONG, Xiaoming CHEN,yzhang@zjut.edu.cn,ph@zjut.edu.cn,caijunzhong@zju.edu.cn,chen_xiaoming@zju.edu.cn

Journal Article

Joint uplink and downlink resource allocation for low-latency mobile virtual reality delivery in fog radioaccess networks

Tian DANG, Chenxi LIU, Xiqing LIU, Shi YAN,tiandang@bupt.edu.cn,chenxi.liu@bupt.edu.cn,liuxiqing@bupt.edu.cn,yanshi01@bupt.edu.cn

Journal Article

Polarizationmultiplexing based duplex radio-over-fiber link for millimeterwave signal transmission toa ring of multiple radio access units

Tayyab MEHMOOD, Hina QAYYUM, Salman GHAFOOR

Journal Article

Resource allocation for network profit maximization in NOMA-based F-RANs: a game-theoretic approach

Xueyan CAO, Shi YAN, Hongming ZHANG

Journal Article

Intelligent radio access networks: architectures, key techniques, and experimental platforms

Zeyu WANG, Yaohua SUN, Shuo YUAN,sunyaohua@bupt.edu.cn

Journal Article

Generic user revocation systems for attribute-based encryption in cloud storage

Genlang CHEN, Zhiqian XU, Hai JIANG, Kuan-ching LI

Journal Article

On optimization of cooperative MIMO for underlaid secrecy Industrial Internet of Things

Xinyao WANG, Xuyan BAO, Yuzhen HUANG, Zhong ZHENG, Zesong FEI

Journal Article

Generic attribute revocation systems for attribute-based encryption in cloud storage

Genlang CHEN, Zhiqian XU, Jia-jian ZHANG, Guo-jun WANG, Hai JIANG, Miao-qing HUANG

Journal Article

MULKASE: a novel approach for key-aggregate searchable encryption formulti-owner data

Mukti PADHYA, Devesh C. JINWALA

Journal Article

Design and Developing of the Network Device Driver on Embedded Access Point

Wang Zhili,Hu Aiqun,Song Yubo

Journal Article

The Design and Analysis of Embedded Internet Control System

Zong Qun,Li Ran,Wang Bo

Journal Article

Multi-user rate and power analysis in a cognitive radio network with massive multi-input multi-output

Shang LIU, Ishtiaq AHMAD, Ping ZHANG, Zhi ZHANG

Journal Article

The Research and Implementation of EAP - FAST Protocol in Public Wireless Local Area Network

Cao Ping,Pei Wenjiang

Journal Article

Research Progress and Key Technologies of Quantum Network Systems

Li Jing, Gao Fei, Qin Sujuan, Wen Qiaoyan, Zhang Ping

Journal Article

On detecting primary user emulation attack using channel impulse response in the cognitive radio network

Qiao-mu JIANG, Hui-fang CHEN, Lei XIE, Kuang WANG

Journal Article