IEEE Communications Surveys and Tutorials最新文献

筛选
英文 中文
Editorial Second Bi-Monthly 2025 IEEE Communications Surveys & Tutorials 编辑第二双月刊2025年IEEE通信调查和教程
IF 34.4 1区 计算机科学
IEEE Communications Surveys and Tutorials Pub Date : 2025-03-01 DOI: 10.1109/COMST.2025.3560017
Trung Q. Duong
{"title":"Editorial Second Bi-Monthly 2025 IEEE Communications Surveys & Tutorials","authors":"Trung Q. Duong","doi":"10.1109/COMST.2025.3560017","DOIUrl":"https://doi.org/10.1109/COMST.2025.3560017","url":null,"abstract":"","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"27 2","pages":"i-v"},"PeriodicalIF":34.4,"publicationDate":"2025-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10981838","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143896335","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Editorial First Bi-Monthly 2025 IEEE Communications Surveys and Tutorials 编辑第一双月刊2025年IEEE通信调查和教程
IF 34.4 1区 计算机科学
IEEE Communications Surveys and Tutorials Pub Date : 2025-02-14 DOI: 10.1109/COMST.2025.3534456
Trung Q. Duong
{"title":"Editorial First Bi-Monthly 2025 IEEE Communications Surveys and Tutorials","authors":"Trung Q. Duong","doi":"10.1109/COMST.2025.3534456","DOIUrl":"10.1109/COMST.2025.3534456","url":null,"abstract":"","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"27 1","pages":"i-vii"},"PeriodicalIF":34.4,"publicationDate":"2025-02-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10887386","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143417528","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Editorial: Fourth Quarter 2024 IEEE Communications Surveys and Tutorials 编辑:2024 年第 4 季度《IEEE 通信概览与教程
IF 34.4 1区 计算机科学
IEEE Communications Surveys and Tutorials Pub Date : 2024-11-21 DOI: 10.1109/COMST.2024.3464708
Dusit Niyato
{"title":"Editorial: Fourth Quarter 2024 IEEE Communications Surveys and Tutorials","authors":"Dusit Niyato","doi":"10.1109/COMST.2024.3464708","DOIUrl":"https://doi.org/10.1109/COMST.2024.3464708","url":null,"abstract":"I welcome you to the fourth issue of the IEEE Communications Surveys and Tutorials in 2024. This issue includes 19 papers covering different aspects of communication networks. In particular, these articles survey and tutor various issues in “Wireless Communications”, “Cyber Security”, “IoT and M2M”, “Vehicular and Sensor Communications”, “Internet Technologies”, “Network and Service Management and Green Communications”, “Network Virtualization”, “Optical Communications”, and “Multimedia Communications”. A brief account of each of these papers is given below.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"26 4","pages":"i-vi"},"PeriodicalIF":34.4,"publicationDate":"2024-11-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10762798","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142679407","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Blind Carrier Frequency Offset Estimation Techniques for Next-Generation Multicarrier Communication Systems: Challenges, Comparative Analysis, and Future Prospects 下一代多载波通信系统的盲载波频率偏移估计技术:挑战、比较分析和未来展望
IF 34.4 1区 计算机科学
IEEE Communications Surveys and Tutorials Pub Date : 2024-10-01 DOI: 10.1109/COMST.2024.3472109
Shivani Singh;Sushant Kumar;Sudhan Majhi;Udit Satija;Chau Yuen
{"title":"Blind Carrier Frequency Offset Estimation Techniques for Next-Generation Multicarrier Communication Systems: Challenges, Comparative Analysis, and Future Prospects","authors":"Shivani Singh;Sushant Kumar;Sudhan Majhi;Udit Satija;Chau Yuen","doi":"10.1109/COMST.2024.3472109","DOIUrl":"10.1109/COMST.2024.3472109","url":null,"abstract":"Frequency synchronization is essential to achieving the intended performance for single and multicarrier wireless systems. Blind techniques, which don’t require prior channel knowledge or pilot symbols, are crucial for dynamic environments where self-adaptive synchronization is needed. A key objective of this paper is to provide the readers as well as the industry’s professionals with a comprehensive understanding of the carrier frequency offset (CFO) problem in multicarrier communication systems like orthogonal frequency division multiplexing (OFDM), single carrier-frequency division multiple access (SC-FDMA), multiple input multiple output (MIMO)-OFDM, and MIMO-SC-FDMA. These waveforms are used in today’s and future wireless communication systems such as wireless-fidelity (Wi-Fi), fifth-generation, and sixth-generation. Moreover, this paper also develops a taxonomy of the available solutions to address the CFO issue. We study blind techniques for CFO estimation presented in the recent literature and give potential future directions. We summarize various statistical methods and deep learning algorithms for CFO estimation and emphasize their advantages and limitations. We also incorporate the CFO impact on next-generation wireless systems such as orthogonal time frequency space and reconfigurable intelligent surface-assisted communication systems and provide a broader and deeper knowledge of the area. We provide simulation results of some existing estimators and their performance comparison in terms of mean square error for better understanding. Therefore, this paper is perfectly adapted to provide a comprehensive information source on blind CFO estimation techniques.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"27 1","pages":"1-36"},"PeriodicalIF":34.4,"publicationDate":"2024-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142362839","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Editorial: Third Quarter 2024 IEEE Communications Surveys and Tutorials 编辑:2024 年第三季度《IEEE 通信概览与教程
IF 34.4 1区 计算机科学
IEEE Communications Surveys and Tutorials Pub Date : 2024-08-22 DOI: 10.1109/COMST.2024.3430588
Dusit Niyato
{"title":"Editorial: Third Quarter 2024 IEEE Communications Surveys and Tutorials","authors":"Dusit Niyato","doi":"10.1109/COMST.2024.3430588","DOIUrl":"https://doi.org/10.1109/COMST.2024.3430588","url":null,"abstract":"I welcome you to the third issue of the IEEE Communications Surveys and Tutorials in 2024. This issue includes 19 papers covering different aspects of communication networks. In particular, these articles survey and tutor various issues in “Wireless Communications”, “Cyber Security”, “Network Virtualization”, “Vehicular and Sensor Communications”, “Multimedia Communications”, “Network and Service Management and Green Communications”, and “Internet Technologies”. A brief account of each of these papers is given below.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"26 3","pages":"i-vii"},"PeriodicalIF":34.4,"publicationDate":"2024-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10643728","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142041438","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Survey on Artificial Intelligence Techniques for Improved Rich Media Content Delivery in a 5G and Beyond Network Slicing Context 在 5G 及更高网络切片背景下改进富媒体内容传输的人工智能技术概览
IF 34.4 1区 计算机科学
IEEE Communications Surveys and Tutorials Pub Date : 2024-08-14 DOI: 10.1109/COMST.2024.3442149
Fazal E. Subhan;Abid Yaqoob;Cristina Hava Muntean;Gabriel-Miro Muntean
{"title":"A Survey on Artificial Intelligence Techniques for Improved Rich Media Content Delivery in a 5G and Beyond Network Slicing Context","authors":"Fazal E. Subhan;Abid Yaqoob;Cristina Hava Muntean;Gabriel-Miro Muntean","doi":"10.1109/COMST.2024.3442149","DOIUrl":"10.1109/COMST.2024.3442149","url":null,"abstract":"Network slicing is an emerging paradigm driven by an objective to provide support for personalized services in the highly evolving and dynamic 5G and beyond network environment. The management of network functions and resources under network slicing architecture for rich media content delivery is a challenging task that requires an efficient decision at all network levels to maintain the required Quality of Service (QoS) and Quality of Experience (QoE). Integrating Artificial Intelligence (AI) in the network slice architecture for taking efficient network decision is one of the potential solutions to the problem. In this paper, we summarize the network slicing enabling technologies such as Software Defined Network (SDN), Network Function Virtualization (NFV), Multi-access Edge Computing (MEC) in the context of AI for improving the rich media content delivery. In addition, we present a comprehensive survey on content-centric networking and delivery solutions based on network slicing technologies i.e., MPEG-DASH-enabled Information Centric Networking (ICN) and Content Delivery Network (CDN) for intelligent rich media content caching and prefetching, predictive analysis, content preference optimization, secure resource allocation, and dynamic traffic steering. Several standardization and orchestration mechanisms of 5G network slicing proposed by 3GPP are then presented. Finally, the challenges of AI-enabled 5G network slicing for immersive content delivery are outlined with potential solutions and future research opportunities.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"27 2","pages":"1427-1487"},"PeriodicalIF":34.4,"publicationDate":"2024-08-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10636754","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141986578","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Modeling, Estimation, and Applications of Phase Noise in Wireless Communications: A Survey 无线通信中相位噪声的建模、估计和应用:调查
IF 34.4 1区 计算机科学
IEEE Communications Surveys and Tutorials Pub Date : 2024-08-13 DOI: 10.1109/COMST.2024.3443158
Zikai Chang;Yuntao Xu;Junjie Chen;Ning Xie;Yejun He;Hongbin Li
{"title":"Modeling, Estimation, and Applications of Phase Noise in Wireless Communications: A Survey","authors":"Zikai Chang;Yuntao Xu;Junjie Chen;Ning Xie;Yejun He;Hongbin Li","doi":"10.1109/COMST.2024.3443158","DOIUrl":"10.1109/COMST.2024.3443158","url":null,"abstract":"Phase noise is inevitably present in wireless communications, arising from both hardware impairments and imperfect channel estimation, and has substantial implications on the integrity and efficiency of communication systems. However, phase noise brings more to wireless systems than just negative effects. For instance, phase noise can be used as a physical layer feature to authenticate received signals and as a source for random number generation. There is a surprising lack of a comprehensive overview of the state-of-the-art estimation methods and applications of phase noise in wireless communications. In this paper, we conduct the first comprehensive survey on the modeling, estimation, and applications of phase noise in wireless communications. We review the state-of-the-art phase-noise models, phase-noise estimation, and mitigation techniques via joint transmit-receive design, as well as applications of phase noise in wireless communications, while highlighting contributions and critical issues of each reviewed work. Finally, we provide an expansive set of research directions, accompanying challenges, and potential solutions related to phase noise that could shape the future of phase noise research in wireless communications.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"27 2","pages":"912-940"},"PeriodicalIF":34.4,"publicationDate":"2024-08-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141980812","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Phishing Webpage Detection: Unveiling the Threat Landscape and Investigating Detection Techniques 网络钓鱼网页检测:揭开威胁面纱,探究检测技术
IF 34.4 1区 计算机科学
IEEE Communications Surveys and Tutorials Pub Date : 2024-08-12 DOI: 10.1109/COMST.2024.3441752
Aditya Kulkarni;Vivek Balachandran;Tamal Das
{"title":"Phishing Webpage Detection: Unveiling the Threat Landscape and Investigating Detection Techniques","authors":"Aditya Kulkarni;Vivek Balachandran;Tamal Das","doi":"10.1109/COMST.2024.3441752","DOIUrl":"10.1109/COMST.2024.3441752","url":null,"abstract":"In the realm of cybersecurity, phishing stands as a prevalent cyber attack, where attackers employ various tactics to deceive users into gathering their sensitive information, potentially leading to identity theft or financial gain. Researchers have been actively working on advancing phishing webpage detection approaches to detect new phishing URLs, bolstering user protection. Nonetheless, the ever-evolving strategies employed by attackers, aimed at circumventing existing detection approaches and tools, present an ongoing challenge to the research community. This survey presents a systematic categorization of diverse phishing webpage detection approaches, encompassing URL-based, webpage content-based, third-party-based and visual techniques. Through a comprehensive review of these approaches and an in-depth analysis of existing literature, our study underscores current research gaps in phishing webpage detection. Furthermore, we suggest potential solutions to address some of these gaps, contributing valuable insights to the ongoing efforts to combat phishing attacks.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"27 2","pages":"974-1007"},"PeriodicalIF":34.4,"publicationDate":"2024-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141974018","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Artificial Intelligence-Based Cybersecurity for the Metaverse: Research Challenges and Opportunities 基于人工智能的元宇宙网络安全:研究挑战与机遇
IF 34.4 1区 计算机科学
IEEE Communications Surveys and Tutorials Pub Date : 2024-08-12 DOI: 10.1109/COMST.2024.3442475
Abeer Awadallah;Khouloud Eledlebi;Mohamed Jamal Zemerly;Deepak Puthal;Ernesto Damiani;Kamal Taha;Tae-Yeon Kim;Paul D. Yoo;Kim-Kwang Raymond Choo;Man-Sung Yim;Chan Yeob Yeun
{"title":"Artificial Intelligence-Based Cybersecurity for the Metaverse: Research Challenges and Opportunities","authors":"Abeer Awadallah;Khouloud Eledlebi;Mohamed Jamal Zemerly;Deepak Puthal;Ernesto Damiani;Kamal Taha;Tae-Yeon Kim;Paul D. Yoo;Kim-Kwang Raymond Choo;Man-Sung Yim;Chan Yeob Yeun","doi":"10.1109/COMST.2024.3442475","DOIUrl":"10.1109/COMST.2024.3442475","url":null,"abstract":"The metaverse, known as the next-generation 3D Internet, represents virtual environments that mirror the physical world. It is supported by innovative technologies such as digital twins and extended reality (XR), which elevate user experiences across various fields. However, the metaverse also introduces significant cybersecurity and privacy challenges that remain underexplored. Due to its complex multi-tech infrastructure, the metaverse requires sophisticated, automated, and intelligent cybersecurity measures to mitigate emerging threats effectively. Therefore, this paper is the first to explore Artificial Intelligence (AI)-driven cybersecurity techniques for the metaverse, examining academic and industrial perspectives. First, we provide an overview of the metaverse, presenting a detailed system model, diverse use cases, and insights into its current industrial status. We then present attack models and cybersecurity threats derived from the unique characteristics and technologies of the metaverse. Next, we review AI-driven cybersecurity solutions based on three critical aspects: User authentication, intrusion detection systems (IDS), and the security of digital assets, specifically for Blockchain and Non-fungible Tokens (NFTs). Finally, we highlight challenges and suggest future research opportunities to enhance metaverse security, privacy, and digital asset transactions.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"27 2","pages":"1008-1052"},"PeriodicalIF":34.4,"publicationDate":"2024-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10634174","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141974056","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Navigating the Road Ahead: A Comprehensive Survey of Radio Resource Allocation for Vehicle Platooning in C-V2X Communications 领航前路:C-V2X 通信中车辆编队无线电资源分配综合调查
IF 34.4 1区 计算机科学
IEEE Communications Surveys and Tutorials Pub Date : 2024-08-07 DOI: 10.1109/COMST.2024.3440033
Chenyu Yang;Chiew Foong Kwong;David Chieng;Pushpendu Kar;Kok-Lim Alvin Yau;Yusen Chen
{"title":"Navigating the Road Ahead: A Comprehensive Survey of Radio Resource Allocation for Vehicle Platooning in C-V2X Communications","authors":"Chenyu Yang;Chiew Foong Kwong;David Chieng;Pushpendu Kar;Kok-Lim Alvin Yau;Yusen Chen","doi":"10.1109/COMST.2024.3440033","DOIUrl":"10.1109/COMST.2024.3440033","url":null,"abstract":"Vehicle-to-everything (V2X) communications have emerged as an indispensable component of the Intelligent Transportation Systems (ITS), fostering innovations that enhance road safety and traffic efficiency. Within this transformative landscape, vehicle platooning has been identified by the Cellular-V2X (C-V2X) standards as an advanced V2X use case with the potential to reshape the future of ITS. However, the stringent requirements of such applications necessitate an optimized spectrum efficiency. Consequently, Radio Resource Allocation (RRA) has emerged as a critical and central component in addressing this challenge. This paper provides a comprehensive examination of RRA tailored specifically to the context of vehicle platooning. It presents an overview of fundamental concepts, including V2X communications, vehicle platooning, and RRA standards, which is followed by an in-depth review of the state-of-the-art, categorized based on the underlying communication technologies, RRA modes, and coverage conditions. By analyzing the existing literature, this paper identifies several key research challenges and potential opportunities, offering insightful guidance for shaping future research in this field.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"27 2","pages":"1326-1362"},"PeriodicalIF":34.4,"publicationDate":"2024-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141904441","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信