Issue 2/2024
Content (10 Articles)
A new construction of public key authenticated encryption with keyword search based on LWE
Ziqing Wang, Jin Li, Xiaoguang Liu, Xinyan Wu, Fagen Li
6G for intelligent transportation systems: standards, technologies, and challenges
Amitkumar V. Jha, Bhargav Appasani, Mohammad S. Khan, Sherali Zeadally, Iyad Katib
Joint block sparse signal recovery-based active user detection in 5G cloud radio access networks
Mehdi Torabnezhad, Mohammadreza Zahabi
Transmission scheduling of P2P real-time communication based on restless multi-armed bandit
Ting Wu, Shikun Tian, Shengda Tang
Generative adversarial networks-based security and applications in cloud computing: a survey
Shiyu Wang, Ming Yin, Yiwen Liu, Guofeng He
Revenue maximization based joint optimization in mmWave cell-free network: an equivalent decomposition and alternative iteration combined approach
Zhongyu Ma, Liang Ran, Jianbing Pu, Qun Guo, Xianghong Lin
Tripartite evolutionary game in the process of network attack and defense
Zigang Chen, Chaochao Fan, Tao Leng, Long Chen, Yuhong Liu, Xiaoyong Li, Dongfeng Yuan
Optimized precoding for massive MU-MIMO systems with KLDA dimension reduction and RNN-crossover GBO algorithm
Srividhya Ramanathan, M. Anto Bennet