Match!
IEEE Communications Surveys and Tutorials
IF
22.97
Papers
1238
Papers 1227
1 page of 123 pages (1,227 results)
Newest
#1Nan Chen (UW: University of Waterloo)H-Index: 2
Last. Xuemin Shen (UW: University of Waterloo)H-Index: 89
view all 4 authors...
The connected vehicle paradigm empowers vehicles with the capability to communicate with neighboring vehicles and infrastructure, shifting the role of vehicles from a transportation tool to an intelligent service platform. Meanwhile, the transportation electrification pushes forward the electric vehicle (EV) commercialization to reduce the greenhouse gas emission by petroleum combustion. The unstoppable trends of connected vehicle and EVs transform the traditional vehicular system to an electric...
Source
#1Sidrah JavedH-Index: 5
#2Osama AminH-Index: 18
Last. Mohamed-Slim Alouini (KAUST: King Abdullah University of Science and Technology)H-Index: 73
view all 4 authors...
p.p1 {margin: 0.0px 0.0px 0.0px 0.0px; font: 9.0px Helvetica} The deviation of continuous and discrete complex random variables from the traditional proper and symmetric assumption to a generalized improper and asymmetric characterization (accounting correlation between a random entity and its complex conjugate), respectively, introduces new design freedom and various potential merits. As such, the theory of impropriety has vast applications in medicine, geology, acoustics, optics, image and pat...
1 CitationsSource
Given the increasing number of space-related applications, research in the emerging space industry is becoming more and more attractive. One compelling area of current space research is the design of miniaturized satellites, known as CubeSats, which are enticing because of their numerous applications and low design-and-deployment cost. The new paradigm of connected space through CubeSats makes possible a wide range of applications, such as Earth remote sensing, space exploration, and rural conne...
3 CitationsSource
#1Keke Gai (BIT: Beijing Institute of Technology)H-Index: 27
#2Jinnan Guo (BIT: Beijing Institute of Technology)H-Index: 1
Last. Shui Yu (UTS: University of Technology, Sydney)H-Index: 37
view all 4 authors...
Blockchain technology has been deemed to be an ideal choice for strengthening existing computing systems in varied manners. As one of the network-enabled technologies, cloud computing has been broadly adopted in the industry through numerous cloud service models. Fusing blockchain technology with existing cloud systems has a great potential in both functionality/ performance enhancement and security/ privacy improvement. The question remains on how blockchain technology inserts into current depl...
Source
#1Mohammed Ali Al-Garadi (Qatar University)H-Index: 14
#2Amr Mohamed (Qatar University)H-Index: 18
Last. Mohsen Guizani (UIdaho: University of Idaho)H-Index: 54
view all 6 authors...
The Internet of Things (IoT) integrates billions of smart devices that can communicate with one another with minimal human intervention. IoT is one of the fastest developing fields in the history of computing, with an estimated 50 billion devices by the end of 2020. However, the crosscutting nature of IoT systems and the multidisciplinary components involved in the deployment of such systems have introduced new security challenges. Implementing security measures, such as encryption, authenticati...
1 CitationsSource
#1Ying-Dar Lin (NCTU: National Chiao Tung University)H-Index: 23
I welcome you to the first issue of the IEEE COMMUNICATIONS SURVEYS AND TUTORIALS in 2020. This issue includes 25 papers covering different aspects of communication networks. In particular, these articles survey and tutor various issues in “Wireless and Cellular Communications,” “5G Communications,” “Vehicular and Sensor Communications,” “IoT and M2M,” “SDN and NFV,” “Internet Technologies,” and “Network Security.” A brief account for each of these papers is given below.
Source
#1Demeke Shumeye Lakew (CAU: Chung-Ang University)H-Index: 1
#2Umar SaradH-Index: 1
Last. Sungrae Cho (CAU: Chung-Ang University)H-Index: 14
view all 5 authors...
The use of unmanned aerial vehicles (UAVs) is attracting considerable interest in academic research, commercial, and military applications. Multi-UAV systems organized in an ad hoc fashion called a flying ad hoc network (FANET) can cooperatively and collaboratively accomplish complex missions more efficiently compared to single large UAV systems. However, the unique features of FANETs such as high mobility, low node density, and high frequency of topology changes introduce challenges to the comm...
3 CitationsSource
#1Ilias Giechaskiel (University of Oxford)H-Index: 5
#2Kasper Bonne Rasmussen (University of Oxford)H-Index: 17
Research on how hardware imperfections impact security has primarily focused on side-channel leakage mechanisms produced by power consumption, electromagnetic emanations, acoustic vibrations, and optical emissions. However, with the proliferation of sensors in security-critical devices, the impact of attacks on sensor-to-microcontroller and microcontroller-to-actuator interfaces using the same channels is starting to become more than an academic curiosity. These out-of-band signal injection atta...
6 CitationsSource
#1Muhammad Saad (UCF: University of Central Florida)H-Index: 6
#2Jeffrey Spaulding (UCF: University of Central Florida)H-Index: 5
Last. David Mohaisen (UCF: University of Central Florida)H-Index: 1
view all 7 authors...
In this paper, we systematically explore the attack surface of the Blockchain technology, with an emphasis on public Blockchains. Towards this goal, we attribute attack viability in the attack surface to 1) the Blockchain cryptographic constructs, 2) the distributed architecture of the systems using Blockchain, and 3) the Blockchain application context. To each of those contributing factors, we outline several attacks, including selfish mining, the 51% attack, DNS attacks, distributed denial-of-...
1 CitationsSource
#1Adnan Qayyum (Information Technology University)H-Index: 3
#2Muhammad Usama (Information Technology University)H-Index: 4
Last. Ala Al-Fuqaha (WMU: Western Michigan University)H-Index: 19
view all 4 authors...
Connected and autonomous vehicles (CAVs) will form the backbone of future next-generation intelligent transportation systems (ITS) providing travel comfort, road safety, along with a number of value-added services. Such a transformation—which will be fuelled by concomitant advances in technologies for machine learning (ML) and wireless communications—will enable a future vehicular ecosystem that is better featured and more efficient. However, there are lurking security problems related to the us...
Source
12345678910
Top fields of study
Wireless network
Distributed computing
Computer network
Computer science
Wireless