2022
DOI: 10.1109/tits.2021.3126766
|View full text |Cite
|
Sign up to set email alerts
|

Learning-Based Resource Allocation for Backscatter-Aided Vehicular Networks

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
7
1

Relationship

1
7

Authors

Journals

citations
Cited by 40 publications
(8 citation statements)
references
References 69 publications
0
8
0
Order By: Relevance
“…Also, B = 2hw + 2hl + lw is the total antenna elements in the proposed 3-D array. The CIR of 3-D array can be achieved by inserting Equation (3) into Equation (1). When the elevation angle in 3-D space is ignored (i.e.…”
Section: Proposed 3-d Gbsm V2v System Modelmentioning
confidence: 99%
See 1 more Smart Citation
“…Also, B = 2hw + 2hl + lw is the total antenna elements in the proposed 3-D array. The CIR of 3-D array can be achieved by inserting Equation (3) into Equation (1). When the elevation angle in 3-D space is ignored (i.e.…”
Section: Proposed 3-d Gbsm V2v System Modelmentioning
confidence: 99%
“…Recently wireless mobile communications in underground confined space scenarios of mines, tunnels, and shopping plazas have become prominent. Wireless communication technologies such as multiple-input multiple-output (MIMO), cooperative communication, channel coding, internet-of-things (IoT), webof-things (WoT), and content-aware big social data have recently played an important role in the development of future fifth-generation (5G) communication networks [1][2][3][4][5][6].…”
Section: Introductionmentioning
confidence: 99%
“…Furthermore the most important elements within the model affords huge benefits over conventional rule-based methods in classifying the problem of phishing simulations is known as Collaborative Learning Algorithm. Training results actually show that anti-phishing training must be captured on the training of character users in preference on huge consumer attacks [10]. Additionally presenting a promising phishing detection system training model for predicting phishing susceptibility.…”
Section: Phishing Attack Detection Using Collaborative Learningmentioning
confidence: 98%
“…However, the researchers cannot identify optimization opportunities for this class of networks. This study [137] proposed a learning method to deal with this optimization issue. The authors presented a strategy for resource allocation and user association for vehicle networks that consider collaboration-centric spectrum sharing.…”
Section: Ai-based Bc Involving Ris Uav and Vehicular Networkmentioning
confidence: 99%