• First special issue on The impact of Artificial Intelligence on communication networks and services
  • Foreword
  • Foreword
  • Editor-in-Chief Message
  • EDITORIAL BOARD
  • TABLE OF CONTENTS
  • LIST OF ABSTRACTS
    • Invited Papers
    • Selected Papers
  • RESPONSIBLE ARTIFICIAL INTELLIGENCE: DESIGNING AI FOR HUMAN VALUES
    • 1. INTRODUCTION
    • 2. EXPECTATIONS ON THE IMPACT OF AI
      • 2.1 Literature analysis
      • 2.2 The views of AI experts
    • 3. RESPONSIBILITY IN AI
      • 3.1. Responsible AI challenges
    • 4. CONCLUDING REMARKS
    • REFERENCES
    • RECONFIGURABLE PROCESSOR FOR DEEP LEARNING IN AUTONOMOUS VEHICLES
      • 1. INTRODUCTION
      • 2. TRENDS IN AUTONOMOUS VISION
        • 2.1. An overview of an ADAS system
        • 2.2. Traditional algorithms of autonomous vision
        • 2.3. The rise of convolutional neural network (CNN)
      • 3. PROCESSORS FOR REAL-TIME AUTONOMOUSVISION
        • 3.1. Heterogeneous platforms for CNN acceleration
        • 3.2. Chances and challenges for reconfigurable processors
        • 3.3. Related reconfigurable processors
      • 4. SOFTWARE-HARDWARE CO-DESIGN FOR A RECONFIGURABLEAUTONOMOUS VISION SYSTEM
        • 4.1. The overall system workflow
        • 4.2. Compression methods
        • 4.3. Hardware architecture design
        • 4.4. Performance evaluation
        • 4.5. Tingtao: an ASIC-based reconfigurable accelerator
      • 5. CONCLUSION
      • REFERENCES
    • REAL-TIME MONITORING OF THE GREAT BARRIER REEF USING INTERNET OF THINGS WITH BIG DATA ANALYTICS
      • 1. INTRODUCTION
      • 2. THE GREAT BARRIER REEF MONITORING
        • 2.1. Sensor network and sensing elements
        • 2.2. Securing buoys and casing
        • 2.3. Communication and scheduling constraints
        • 2.4. Scalable networking architecture
        • 2.5. Detecting interesting events using AI
      • 3. CLOUD-CENTRIC NETWORK ARCHITECTURE FOR REAL-TIME MONITORING
        • 3.1. Networking framework
        • 3.2. Data framework
      • 4. CASE STUDY: DETECTING CYCLONE HAMISH ON HERON ISLAND OF GBR USING AI
        • 4.1. WSN network architecture
        • 4.2. Cyclone Hamish detection using AI
        • 4.3. System of systems (SoS) view of integrated AI
        • 4.4. Open research challenges
      • CONCLUSION
      • ACKNOWLEDGEMENT
      • REFERENCES
    • INCLUSION OF ARTIFICIAL INTELLIGENCE IN COMMUNICATION NETWORKS AND SERVICES
      • 1. INTRODUCTION
      • 2. TRENDS IN COMMUNICATION NETWORKS AND SERVICES
        • 2.1. Characterized requirements
        • 2.2. Multimedia services
        • 2.3. Precision management
        • 2.4. Predictable future
        • 2.5. Intellectualization
        • 2.6. More attention to security and safety
      • 3. ADVANTAGES OF AI
        • 3.1. Abilities of learning
        • 3.2. Abilities of understanding and reasoning
        • 3.3. Ability of collaborating
      • 4. POSSIBILITY TO USE AI IN COMMUNICATIONS
        • 4.1. AI in SDN
        • 4.2. AI in NFV
        • 4.3. Network monitor and control
      • 5. AN AI-BASED NETWORK FRAMEWORK
        • 5.1. Intelligence plane
        • 5.2. Agent plane
        • 5.3. Business plane
      • 6. A FINE EXAMPLE
      • 7. CONCLUSION
      • REFERENCES
    • EXPLAINABLE ARTIFICIAL INTELLIGENCE: UNDERSTANDING, VISUALIZING AND INTERPRETING DEEP LEARNING MODELS
      • 1. INTRODUCTION
      • 2. WHY DO WE NEED EXPLAINABLE AI?
      • 3. METHODS FOR VISUALIZING, INTERPRETING AND EXPLAINING DEEP-LEARNING MODELS
        • 3.1. Sensitivity analysis
        • 3.2. Layer-wise relevance propogation
        • 3.3. Software
      • 4. EVALUATING THE QUALITY OF EXPLANATIONS
      • 5. EXPERIMENTAL EVALUATION
        • 5.1. Image classification
        • 5.2. Text document classification
        • 5.3. Human action recognition in videos
      • 6. CONCLUSION
      • REFERENCES
    • THE CONVERGENCE OFMACHINE LEARNING ANDCOMMUNICATIONS
      • 1. INTRODUCTION
      • 2. MACHINE LEARNING IN COMMUNICATIONS
        • 2.1. Communication networks
        • 2.2. Wireless communications
        • 2.3. Security, privacy and communications
        • 2.4. Smart services, smart infrastructure and IoT
        • 2.5. Image and video communications
      • 3. EXEMPLAR APPLICATIONS IN WIRELESS NETWORKING
        • 3.1. Reconstruction of radio maps
        • 3.2. Deep neural networks for sparse recovery
      • 4. FUTURE RESEARCH TOPICS
        • 4.1. Low complexity models
        • 4.2. Standardized formats for machine learning
        • 4.3. Security and privacy mechanisms
        • 4.4. Radio resource and network management
      • 5. CONCLUSION
      • REFERENCES
    • APPLICATION OF AI TO MOBILE NETWORK OPERATION
      • 1. INTRODUCTION
        • 1.1. Characteristics of artificial intelligence (AI)
        • 1.2. Trends of mobile network
      • 2. ISSUES OF MOBILE NETWORK OPERATION
        • 2.1. Issues of planning process
        • 2.2. Issues of maintenance process
      • 3. NETWORK OPERATION WITH AI
        • 3.1. Approach to applying AI to planning process
        • 3.2. Approach to applying AI to maintenance process
          • 3.2.1. Application of AI to network monitoring
          • 3.2.1.1. Necessity of service monitoring
          • 3.2.1.2. Application of AI to service monitoring
      • 4. CONCLUSION
      • REFERENCES
    • ON ADAPTIVE NEURO-FUZZY MODEL FOR PATH LOSS PREDICTION IN THE VHF BAND
      • 1. INTRODUCTION
      • 2. METHODOLOGY
        • 2.1. Measurement Campaign Procedure
        • 2.2. Prediction Model
      • 3. RESULTS AND DISCUSSION
      • 4. CONCLUSION
        • ACKNOWLEDGMENT
        • REFERENCES
    • BEYOND MAD?: THE RACE FOR ARTIFICIAL GENERAL INTELLIGENCE
      • 1. INTRODUCTION
      • 2. ARMS RACES AND AGI: BEYOND MAD?
        • 2.1. Actors in the AGI race
          • 2.1.1. State actors
          • 2.1.2. Corporate actors
          • 2.1.3. Rogue actors
      • INTELLIGENCEBEYOND MAD?: THE RACE FOR ARTIFICIAL GENERAL INTELLIGENCEBEYOND MAD?: THE RACE FOR ARTIFICIAL GENERAL INTELLIGENCEBEYOND MAD?: THE RACE FOR ARTIFICIAL GENERAL INTELLIGENCEBEYOND MAD?: THE RACE FOR ARTIFICIAL GENERAL INTELLIGENCEBEYOND MAD?: THE RACE FOR ARTIFICIAL GENERAL INTELLIGENCEBEYOND MAD?: THE RACE FOR ARTIFICIAL GENERAL INTELLIGENCEBEYOND MAD?: THE RACE FOR ARTIFICIAL GENERAL INTELLIGENCEBEYOND MAD?: THE RACE FOR ARTIFICIAL GENERAL INTELLIGENCEBEYOND MAD?: THE RACE FOR ARTIFICIAL GENERAL INTELLIGENCE
      • 3. AGI AND VALUE ALIGNMENT
      • 4. SHAPING AGI RESEARCH
      • 5. PERSPECTIVES AND SOLUTIONS
        • 5.1. Solution 1: Global collaboration on AGI development and safety
        • 5.2. Solution 2: Global Task Force on AGI to monitor, delay and enforce safety guidelines
      • 6. CONCLUSION
      • ACKNOWLEDGEMENT
      • REFERENCES
    • ARTIFICIAL INTELLIGENCE FOR PLACE-TIME CONVOLVED WIRELESS COMMUNICATION NETWORKS
      • 1. INTRODUCTION
      • 2. BACKDROP: OSTENTANEITY OF AN EVENT
        • 2.1. Unostentatious Events
        • 2.2. Place-Time Events
        • 2.3. Ostentatious Events
        • 2.4. Appropriateness of APE
      • 3. PLACE TIME COVERAGE AND CAPACITY: NSP's DUO ORDEAL
        • 3.1. Understanding the network environment
        • 3.2. The NSP's nightmare: Ostentations network behavior
        • 3.3. Place Time Coverage
        • 3.4. Place Time Capacity
        • 3.5. PTC2: Need of unorthodox approach
      • 4. DEALING WITH PTC2 ‘ARTIFICIAL INTELLIGENTLY'
        • 4.1. AI-Assisted Architecture
        • 4.2. How should AAA respond to the PTC2?
          • 4.2.1. Information aggregation
          • 4.2.2. Deep Learning
          • 4.2.3. Disseminating actions
          • 4.2.4. Integrating Alternate Solutions
      • REFERENCES
    • BAYESIAN ONLINE LEARNING-BASED SPECTRUM OCCUPANCY PREDICTION IN COGNITIVE RADIO NETWORKS
      • 1. INTRODUCTION
      • 2. SYSTEM MODEL
      • 3. ENERGY DETECTION MODEL
      • 4. TIME-SERIES GENERATION BASED ON ENERGY PRIMARY USER DETECTION SEQUENCE
      • 5. TIME-SERIES PREDICTION BASED ON BAYESIAN ONLINE LEARNING ALGORITHM
      • 6. SIMULATION RESULTS
      • 7. CONCLUSION
      • ACKNOWLEDGEMENT
      • REFERENCES
    • THE EVOLUTION OF FRAUD: ETHICAL IMPLICATIONS IN THE AGE OF LARGE-SCALE DATA BREACHES AND WIDESPREAD ARTIFICIAL INTELLIGENCE SOLUTIONS DEPLOYMENT
      • 1. INTRODUCTION
      • 2. KEY IDEAS
        • 2.1. Data brokers
        • 2.2 Mosaic effect
      • 3. RECENT DATA BREACHES
        • 3.1. Yahoo
        • 3.2. Adult Friend Finder
        • 3.3. eBay
        • 3.4. Equifax
      • 4. EVOLUTION OF FRAUD
      • 5. OTHER ETHICAL CONSEQUENCES
      • 6. AGGRAVATION BY AI ADVANCES
      • 7. CHALLENGES TO BE ADDRESSED
      • 8. CONCLUDING REMARKS
      • ACKNOWLEDGEMENT
      • REFERENCES
    • MACHINE INTELLIGENCE TECHNIQUES FOR NEXT-GENERATION CONTEXT-AWARE WIRELESS NETWORKS
      • 1. INTRODUCTION
      • 2. DATA ACQUISITION AND KNOWLEDGE DISCOVERY
        • A. Data acquisition
        • B. Knowledge discovery
      • 3. NETWORK PLANNING
        • A. Node deployment, Energy consumption and RF planning
        • B. Configuration parameter and service planning
      • 4. NETWORK OPERATION AND MANAGEMENT
        • A. Resource allocation and management
        • B. Security and privacy protection
        • C. Latency optimization for tactile applications
      • 5. DESIGN CASE STUDIES
        • A. Machine learning for CIR prediction
        • B. Context-aware data transmission using NLP techniques
      • 6. CONCLUSIONS
      • REFERENCES
    • NEW TECHNOLOGY BRINGS NEW OPPORTUNITY FOR TELECOMMUNICATION CARRIERS: ARTIFICIAL INTELLIGENT APPLICATIONS AND PRACTICES IN TELECOM OPERATORS
      • 1. INTRODUCTION
      • 2. THE UNIQUE ADVANTAGES FOR OPERATORS TO DEVELOP AI
      • 3. TELECOM OPERATORS' PRACTICES IN THE FIELD OF ARTIFICIAL INTELLIGENCE
        • 3.1. AI-based energy saving product in data centers
        • 3.2. AI-based public security management platform
        • 3.3. AI-based health management and control
      • 4. SUMMARY AND PROSPECT
      • REFERENCES
    • CORRELATION AND DEPENDENCE ANALYSIS ON CYBERTHREAT ALERTS
      • 1. INTRODUCTION
      • 2. METHODOLOGY
        • 2.1. Experiment set up: network description and data mining approach
        • 2.2. Correlation analysis
        • 2.3. Dependence analysis
        • 2.4. Results
      • 3. CONCLUSION
      • ACKNOWLEDGEMENT
      • REFERENCES
    • INDEX OF AUTHORS