{"id":"https://openalex.org/W4409156335","doi":"https://doi.org/10.1109/trustcom63139.2024.00352","title":"Trusted and Spectrum-Efficient Crowd Computing in Massive MIMO Cellular Networks","display_name":"Trusted and Spectrum-Efficient Crowd Computing in Massive MIMO Cellular Networks","publication_year":2024,"publication_date":"2024-12-17","ids":{"openalex":"https://openalex.org/W4409156335","doi":"https://doi.org/10.1109/trustcom63139.2024.00352"},"language":"en","primary_location":{"id":"doi:10.1109/trustcom63139.2024.00352","is_oa":false,"landing_page_url":"https://doi.org/10.1109/trustcom63139.2024.00352","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE 23rd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5038776033","display_name":"Peng-Feng Zhang","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Pengfeng Zhang","raw_affiliation_strings":["State Grid Shandong Electric Power Company Zibo Power Supply Company,Zibo,China"],"affiliations":[{"raw_affiliation_string":"State Grid Shandong Electric Power Company Zibo Power Supply Company,Zibo,China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100731591","display_name":"Lei Li","orcid":"https://orcid.org/0000-0003-3142-4095"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Lei Li","raw_affiliation_strings":["State Grid Shandong Electric Power Company,Jinan,China"],"affiliations":[{"raw_affiliation_string":"State Grid Shandong Electric Power Company,Jinan,China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100352249","display_name":"Xin Liu","orcid":"https://orcid.org/0000-0002-6035-6055"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Xin Liu","raw_affiliation_strings":["State Grid Shandong Electric Power Research Institute,Jinan,China"],"affiliations":[{"raw_affiliation_string":"State Grid Shandong Electric Power Research Institute,Jinan,China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100431149","display_name":"Rui Wang","orcid":"https://orcid.org/0000-0001-8007-2503"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Rui Wang","raw_affiliation_strings":["State Grid Shandong Electric Power Research Institute,Jinan,China"],"affiliations":[{"raw_affiliation_string":"State Grid Shandong Electric Power Research Institute,Jinan,China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5055552686","display_name":"Donglan Liu","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Donglan Liu","raw_affiliation_strings":["State Grid Shandong Electric Power Research Institute,Jinan,China"],"affiliations":[{"raw_affiliation_string":"State Grid Shandong Electric Power Research Institute,Jinan,China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101596793","display_name":"Bing Su","orcid":"https://orcid.org/0009-0003-2651-5619"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Bing Su","raw_affiliation_strings":["State Grid Shandong Electric Power Research Institute,Jinan,China"],"affiliations":[{"raw_affiliation_string":"State Grid Shandong Electric Power Research Institute,Jinan,China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5115590528","display_name":"Yuntao Wang","orcid":null},"institutions":[{"id":"https://openalex.org/I87445476","display_name":"Xi'an Jiaotong University","ror":"https://ror.org/017zhmm22","country_code":"CN","type":"education","lineage":["https://openalex.org/I87445476"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yuntao Wang","raw_affiliation_strings":["Xi&#x2019;an Jiaotong University,School of Cyber Science and Engineering,Xi&#x2019;an,China"],"affiliations":[{"raw_affiliation_string":"Xi&#x2019;an Jiaotong University,School of Cyber Science and Engineering,Xi&#x2019;an,China","institution_ids":["https://openalex.org/I87445476"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5023858246","display_name":"Yiliang Liu","orcid":"https://orcid.org/0000-0002-6301-6347"},"institutions":[{"id":"https://openalex.org/I87445476","display_name":"Xi'an Jiaotong University","ror":"https://ror.org/017zhmm22","country_code":"CN","type":"education","lineage":["https://openalex.org/I87445476"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yiliang Liu","raw_affiliation_strings":["Xi&#x2019;an Jiaotong University,School of Cyber Science and Engineering,Xi&#x2019;an,China"],"affiliations":[{"raw_affiliation_string":"Xi&#x2019;an Jiaotong University,School of Cyber Science and Engineering,Xi&#x2019;an,China","institution_ids":["https://openalex.org/I87445476"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101149934","display_name":"Zhou Su","orcid":"https://orcid.org/0000-0002-6518-3130"},"institutions":[{"id":"https://openalex.org/I87445476","display_name":"Xi'an Jiaotong University","ror":"https://ror.org/017zhmm22","country_code":"CN","type":"education","lineage":["https://openalex.org/I87445476"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhou Su","raw_affiliation_strings":["Xi&#x2019;an Jiaotong University,School of Cyber Science and Engineering,Xi&#x2019;an,China"],"affiliations":[{"raw_affiliation_string":"Xi&#x2019;an Jiaotong University,School of Cyber Science and Engineering,Xi&#x2019;an,China","institution_ids":["https://openalex.org/I87445476"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":9,"corresponding_author_ids":["https://openalex.org/A5038776033"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.34764745,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"2529","last_page":"2534"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9894000291824341,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9894000291824341,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9879000186920166,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9763000011444092,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7512527108192444},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5183849930763245},{"id":"https://openalex.org/keywords/mimo","display_name":"MIMO","score":0.5139402747154236},{"id":"https://openalex.org/keywords/cellular-network","display_name":"Cellular network","score":0.4550545811653137},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.39390289783477783},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.34702932834625244}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7512527108192444},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5183849930763245},{"id":"https://openalex.org/C207987634","wikidata":"https://www.wikidata.org/wiki/Q176862","display_name":"MIMO","level":3,"score":0.5139402747154236},{"id":"https://openalex.org/C153646914","wikidata":"https://www.wikidata.org/wiki/Q535695","display_name":"Cellular network","level":2,"score":0.4550545811653137},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.39390289783477783},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.34702932834625244},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/trustcom63139.2024.00352","is_oa":false,"landing_page_url":"https://doi.org/10.1109/trustcom63139.2024.00352","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE 23rd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320337504","display_name":"Research and Development","ror":"https://ror.org/027s68j25"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":29,"referenced_works":["https://openalex.org/W1997834106","https://openalex.org/W2023535408","https://openalex.org/W2072599023","https://openalex.org/W2091802082","https://openalex.org/W2343898295","https://openalex.org/W2610968021","https://openalex.org/W2890860720","https://openalex.org/W2908498346","https://openalex.org/W2949135363","https://openalex.org/W2955133642","https://openalex.org/W2970380330","https://openalex.org/W2975471211","https://openalex.org/W3009540182","https://openalex.org/W3035449691","https://openalex.org/W3046403554","https://openalex.org/W3109604561","https://openalex.org/W3216767138","https://openalex.org/W4210616537","https://openalex.org/W4221147560","https://openalex.org/W4321021695","https://openalex.org/W4321607979","https://openalex.org/W4366504184","https://openalex.org/W4386902907","https://openalex.org/W4390284791","https://openalex.org/W4392207672","https://openalex.org/W4396523439","https://openalex.org/W4403058894","https://openalex.org/W4405351316","https://openalex.org/W7033717891"],"related_works":["https://openalex.org/W2545343974","https://openalex.org/W4291895924","https://openalex.org/W1783583321","https://openalex.org/W2038397443","https://openalex.org/W2941374357","https://openalex.org/W2112785353","https://openalex.org/W2026727497","https://openalex.org/W2164866798","https://openalex.org/W1976502299","https://openalex.org/W4214657533"],"abstract_inverted_index":{"Crowd":[0],"computing":[1,36],"in":[2,38],"large-scale":[3],"cellular":[4],"networks":[5,43,48],"typically":[6],"involves":[7],"a":[8,152],"significant":[9],"number":[10],"of":[11,109],"participants,":[12],"leading":[13],"to":[14,70,103,105,147,158,178],"high":[15],"spectrum":[16,63,149],"interference,":[17],"reduced":[18],"communication":[19],"efficiency,":[20,176],"and":[21,33,73,86,89,123,137,165],"low":[22,127],"user":[23,160],"trustworthiness.":[24],"To":[25],"overcome":[26],"these":[27],"challenges,":[28],"this":[29],"paper":[30],"proposes":[31],"trustworthy":[32],"spectrum-efficient":[34],"crowd":[35],"scheme":[37,171],"massive":[39],"multiple-input":[40],"multiple-output":[41],"(MIMO)":[42],"based":[44],"on":[45],"deep":[46],"neural":[47],"(DNNs).":[49],"Existing":[50],"machine":[51],"learning-aided":[52],"multiple":[53],"antenna":[54],"technologies":[55],"usually":[56],"ignore":[57],"the":[58,68,95,100,107,114,117,121,169],"pilot":[59],"contamination,":[60],"which":[61],"reduces":[62],"efficiency.":[64,150],"Here,":[65],"we":[66],"leverage":[67],"DNN":[69],"devise":[71],"detection":[72,88,122],"precoding":[74,90,124],"algorithms":[75],"by":[76],"inputting":[77],"an":[78],"imperfect":[79],"channel":[80,140],"state":[81],"information":[82],"(CSI)":[83],"big":[84],"data":[85],"provides":[87],"matrices":[91,125],"as":[92,145],"outputs,":[93],"where":[94],"online-to-offline":[96],"learning":[97],"framework":[98],"offloads":[99],"training":[101],"task":[102],"servers":[104],"reduce":[106],"overhead":[108],"base":[110],"station":[111],"(BS).":[112],"With":[113],"well-trained":[115],"DNNs,":[116],"BS":[118],"can":[119,172],"generate":[120],"with":[126],"computation":[128],"overheads.":[129],"Especially,":[130],"minimum-mean-square-error":[131],"(MMSE)":[132],"triggers":[133],"between":[134],"received":[135],"signals":[136],"sources":[138],"considering":[139],"estimation":[141],"error":[142],"are":[143],"seen":[144],"labels":[146],"improve":[148],"Besides,":[151],"multi-factor":[153],"trust":[154],"model":[155],"is":[156],"designed":[157],"enhance":[159],"authentication":[161],"security.":[162],"The":[163],"simulations":[164],"numerical":[166],"analysis":[167],"show":[168],"proposed":[170],"provide":[173],"higher":[174],"spectral":[175],"compared":[177],"conventional":[179],"methods.":[180]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
