期刊文献+

智能无线通信技术研究概况 被引量:23

Overview on intelligent wireless communication technology
下载PDF
导出
摘要 近年来,人工智能技术已被应用于无线通信领域,以解决传统无线通信技术面对信息爆炸和万物互联等新发展趋势所遇到的瓶颈问题。首先介绍深度学习、深度强化学习和联邦学习三类具有代表性的人工智能技术;然后通过对这三类技术在无线通信中的无线传输、频谱管理、资源配置、网络接入、网络及系统优化5个方面的应用进行综述,分析和总结它们在解决无线通信问题时的原理、适用性、设计方法和优缺点;最后围绕存在的局限性指出智能无线通信技术的未来发展趋势和研究方向,期望为无线通信领域的后续研究提供帮助和参考。 In recent years,artificial intelligence(AI)has been applied to wireless communications,in order to address the challenges introduced by data explosion and Internet of everything.Firstly,three core technologies of AI were introduced,including deep learning,deep reinforcement learning,and federated learning.Then,an overview of their applications on wireless communications was provided,from the aspects of wireless transmission,spectrum management,resource allocation,network access,network and system optimization.Based on the overview,the principle,applicability,design methodology,pros and cons on applying AI technologies to solve wireless communication problems were analyzed and summarized.Regarding the existed limitations,the future development trends and research directions on intelligent wireless communication technologies were pointed out,to hopefully provide useful help and reference for the future research in this field.
作者 梁应敞 谭俊杰 Dusit Niyato LIANG Yingchang;TAN Junjie;Dusit Niyato(National Key Laboratory of Science and Technology on Communications,University of Electronic Science and Technology of China,Chengdu 611731,China;School of Computer Science and Engineering,Nanyang Technological University,Singapore 639798,Singapore)
出处 《通信学报》 EI CSCD 北大核心 2020年第7期1-17,共17页 Journal on Communications
基金 国家自然科学基金资助项目(No.61631005,No.U1801261) 国家重点研发计划基金资助项目(No.2018YFB1801105) 高等学校学科创新引智计划基金资助项目(No.B20064)。
关键词 人工智能 无线通信 深度学习 深度强化学习 联邦学习 artificial intelligence wireless communication deep learning deep reinforcement learning federated learning
  • 相关文献

参考文献1

二级参考文献33

  • 1林闯,汪洋,李泉林.网络安全的随机模型方法与评价技术[J].计算机学报,2005,28(12):1943-1956. 被引量:92
  • 2林闯,王元卓,杨扬,曲扬.基于随机Petri网的网络可信赖性分析方法研究[J].电子学报,2006,34(2):322-332. 被引量:43
  • 3Sheyner O,Haines J,Jha S,Lippmann R,Wing J.Automated generation and analysis of attack graphs//Proceedings of the 2002 IEEE Symposium on Security and Privacy.Berkeley,CA,2002:273-284.
  • 4Jha S,Sheyner O,Wing J M.Two formal analyses of attack graphs//Proceedings of the Computer Security Foundations Workshop (CSFW).Cape Breton,Nova Scotia,2002:49-63.
  • 5Ramakrishnan C R,Sekar R.Model-based analysis of configuration vulnerabilities.Journal of Computer Security (JCS),2002,10(1/2):189-209.
  • 6Besson F,Jensen J,Métayer D L,Thorn T.Model checking security properties of control flow graphs.Computer Security,2001,9(3):217-250.
  • 7Ritchey R,Ammann P.Using model checking to analyze network vulnerabilities//Proceedings of the IEEE Symposium on Security and Privacy.Oakland,California,2001:156-165.
  • 8Wang D,Madan B,Trivedi K S.Security analysis of SITAR intrusion-tolerant system//Proceedings of the ACM Workshop Survivable and Self-Regenerative Systems.Fairfax,VA,2003:23-32.
  • 9Madan B,Goeva-Popstojanova K,Vaidyanathan K,Trivedi K S.A method for modeling and quantifying the security attributes of intrusion tolerant systems.Performance Evaluation,2004,56:167-186.
  • 10McDermott J.Attack-potential-based survivability modeling for high-consequence systems//Proceedings of the 3rd IEEE International Workshop on Information Assurance (IWIA'05).Washington D.C.,2005:119-130.

共引文献59

同被引文献176

引证文献23

二级引证文献83

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部