{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,5]],"date-time":"2026-03-05T15:31:29Z","timestamp":1772724689907,"version":"3.50.1"},"reference-count":216,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"am","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"CSIRO Data61, Australia"},{"DOI":"10.13039\/100000001","name":"U.S. National Science Foundation","doi-asserted-by":"publisher","award":["CCF-1908308"],"award-info":[{"award-number":["CCF-1908308"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100000923","name":"ARC","doi-asserted-by":"publisher","award":["DE190100162"],"award-info":[{"award-number":["DE190100162"]}],"id":[{"id":"10.13039\/501100000923","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["2018YFB1004800"],"award-info":[{"award-number":["2018YFB1004800"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61727802"],"award-info":[{"award-number":["61727802"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61872184"],"award-info":[{"award-number":["61872184"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Commun. Surv. Tutorials"],"published-print":{"date-parts":[[2021]]},"DOI":"10.1109\/comst.2020.3024783","type":"journal-article","created":{"date-parts":[[2020,9,18]],"date-time":"2020-09-18T20:17:26Z","timestamp":1600460246000},"page":"553-595","source":"Crossref","is-referenced-by-count":147,"title":["Enabling AI in Future Wireless Networks: A Data Life Cycle Perspective"],"prefix":"10.1109","volume":"23","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8092-6756","authenticated-orcid":false,"given":"Dinh C.","family":"Nguyen","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1091-7894","authenticated-orcid":false,"given":"Peng","family":"Cheng","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3690-0321","authenticated-orcid":false,"given":"Ming","family":"Ding","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0083-7313","authenticated-orcid":false,"given":"David","family":"Lopez-Perez","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8014-7798","authenticated-orcid":false,"given":"Pubudu N.","family":"Pathirana","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1042-6297","authenticated-orcid":false,"given":"Jun","family":"Li","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6894-7987","authenticated-orcid":false,"given":"Aruna","family":"Seneviratne","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7702-1123","authenticated-orcid":false,"given":"Yonghui","family":"Li","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2062-131X","authenticated-orcid":false,"given":"H. Vincent","family":"Poor","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref170","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2919736"},{"key":"ref172","first-page":"756","article-title":"D&#x00CF;oT: A federated self-learning anomaly detection system for IoT","author":"nguyen","year":"2019","journal-title":"Proc 39th Int Conf Distrib Comput Syst (ICDCS)"},{"key":"ref171","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2929409"},{"key":"ref174","doi-asserted-by":"publisher","DOI":"10.1109\/VTCFall.2019.8891310"},{"key":"ref173","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2019.2946245"},{"key":"ref176","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2957400"},{"key":"ref175","doi-asserted-by":"publisher","DOI":"10.1109\/SAMI.2019.8782758"},{"key":"ref178","doi-asserted-by":"publisher","DOI":"10.1109\/JSTARS.2019.2920234"},{"key":"ref177","doi-asserted-by":"publisher","DOI":"10.1109\/ICSENS.2017.8234179"},{"key":"ref168","author":"deepa","year":"2020","journal-title":"A survey on blockchain for big data Approaches opportunities and future directions"},{"key":"ref169","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2018.8647927"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2020.2965856"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2924243"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2844341"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2015.2467174"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2019.2941458"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2019.2918951"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2019.101913"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2916583"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2019.2924010"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2707140"},{"key":"ref181","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2019.8682829"},{"key":"ref180","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2817523"},{"key":"ref185","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2014.2335537"},{"key":"ref184","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2016.2604383"},{"key":"ref183","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2015.281"},{"key":"ref182","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2019.2904349"},{"key":"ref189","doi-asserted-by":"publisher","DOI":"10.1109\/IECON.2018.8591820"},{"key":"ref188","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2017.2718540"},{"key":"ref187","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2855563"},{"key":"ref186","doi-asserted-by":"publisher","DOI":"10.1109\/PAC.2018.00015"},{"key":"ref28","first-page":"752","article-title":"A machine learning approach for detecting spoofing attacks in wireless sensor networks","author":"de lima pinto","year":"2018","journal-title":"Proc 32nd Int Conf Adv Inf Netw Appl (AINA)"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2895334"},{"key":"ref179","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2803129"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2016.2524258"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/VTCFall.2017.8288203"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/APWiMob.2016.7811445"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/SPAWC.2019.8815557"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/VTCSpring.2017.8108628"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ASET.2018.8379860"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ICDIPC.2016.7470808"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2018.8422401"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2002.1017616"},{"key":"ref51","author":"sutton","year":"2011","journal-title":"Reinforcement Learning An Introduction"},{"key":"ref154","doi-asserted-by":"crossref","first-page":"6792","DOI":"10.1109\/ACCESS.2020.2964697","article-title":"5G vehicular network resource management for improving radio access through machine learning","volume":"8","author":"tayyaba","year":"2020","journal-title":"IEEE Access"},{"key":"ref153","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2015.7321981"},{"key":"ref156","author":"dhar","year":"2019","journal-title":"On-device machine learning An algorithms and learning theory perspective"},{"key":"ref155","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2018.1800101"},{"key":"ref150","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2019.2923314"},{"key":"ref152","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2018.1800104"},{"key":"ref151","doi-asserted-by":"publisher","DOI":"10.1109\/VTCFall.2018.8690554"},{"key":"ref146","first-page":"689","article-title":"Collaborative computation offloading for multi-access edge computing","author":"yu","year":"2019","journal-title":"Proc IFIP\/IEEE Symp Integr Netw Service Manag (IM)"},{"key":"ref147","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2918585"},{"key":"ref148","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2019.2928811"},{"key":"ref149","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2019.2894437"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/ISWCS.2019.8877272"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/TIM.2007.913803"},{"key":"ref57","first-page":"1017","article-title":"Generating text with recurrent neural networks","author":"sutskever","year":"2011","journal-title":"Proc 28th Int Conf Mach Learn (ICML)"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/WOCC.2017.7929000"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/LWC.2018.2881978"},{"key":"ref54","first-page":"1237","article-title":"Flexible, high performance convolutional neural networks for image classification","author":"ciresan","year":"2011","journal-title":"Proc 22nd Int Joint Conf Artif Intell"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2912200"},{"key":"ref52","author":"nguyen","year":"2019","journal-title":"Secure computation offloading in blockchain based IoT networks with deep reinforcement learning"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2880039"},{"key":"ref167","author":"zhao","year":"2019","journal-title":"Mobile edge computing blockchain and reputation-based crowdsourcing IoT federated learning A secure decentralized and privacy-preserving system"},{"key":"ref166","author":"lim","year":"2019","journal-title":"Federated learning in mobile edge networks A comprehensive survey"},{"key":"ref165","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2019.2935812"},{"key":"ref164","author":"ji","year":"2019","journal-title":"HG-Caffe Mobile and embedded neural network GPU (OpenCL) inference engine with FP16 supporting"},{"key":"ref163","author":"wang","year":"2019","journal-title":"High-throughput cnn inference on embedded arm big little multi-core processors"},{"key":"ref162","author":"gulmezoglu","year":"2018","journal-title":"Undermining user privacy on mobile devices using AI"},{"key":"ref161","doi-asserted-by":"publisher","DOI":"10.23919\/MVA.2019.8758059"},{"key":"ref160","first-page":"294","article-title":"Malware detection on android smartphones using API class and machine learning","author":"rosmansyah","year":"2015","journal-title":"Proc Int Conf Elect Eng Informat (ICEEI)"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TETCI.2019.2907718"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2016.2532458"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2018.1700298"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.001.1900200"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.001.1900279"},{"key":"ref159","doi-asserted-by":"publisher","DOI":"10.1109\/ICTAI.2013.53"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.062613.00014"},{"key":"ref49","first-page":"629","article-title":"Intrusion detection system using decision tree algorithm","author":"hanumanthappa","year":"2012","journal-title":"Proc Int Conf Communication Technology (ICCT)"},{"key":"ref157","author":"ham","year":"2019","journal-title":"Nnstreamer Stream processing paradigm for neural networks toward efficient development and execution of on-device AI applications"},{"key":"ref9","year":"2020","journal-title":"iPhoneX face ID advanced technology"},{"key":"ref158","author":"chen","year":"2019","journal-title":"Phonebit Efficient GPU-accelerated binary neural network inference engine for mobile phones"},{"key":"ref46","first-page":"249","article-title":"Supervised machine learning: A review of classification techniques","volume":"31","author":"kotsiantis","year":"2007","journal-title":"Emerg Artif Intell Appl Comput Eng"},{"key":"ref45","author":"goodfellow","year":"2016","journal-title":"Deep Learning"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/FSKD.2007.552"},{"key":"ref47","first-page":"93","article-title":"Support vector machines","author":"shawe-taylor","year":"2000","journal-title":"An Introduction to Support Vector Machines and Other Kernel-Based Learning Methods"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/MVT.2017.2752758"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2975004"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/3003816"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2020.2983930"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/DICTA.2017.8227421"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/THMS.2015.2401391"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2011.2172800"},{"key":"ref70","first-page":"2661","article-title":"Estimating the number of people using existing WiFi access point based on support vector regression","volume":"19","author":"yoshida","year":"2016","journal-title":"Int Inf (Tokyo) Inst Inf"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2914030"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/PerCom.2013.6526714"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/ISPA\/IUCC.2017.00148"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298684"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2014.6917408"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2019.2904353"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/PlatCon.2016.7456805"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2825538"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/VTCFall.2019.8891309"},{"key":"ref63","author":"nguyen","year":"2019","journal-title":"Privacy-preserved task offloading in mobile blockchain with deep reinforcement learning"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2019.2933962"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/JSTSP.2018.2794062"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/LSENS.2017.2673551"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2762418"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2018.8487420"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1145\/2733373.2806337"},{"key":"ref197","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2909559"},{"key":"ref198","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2942390"},{"key":"ref199","first-page":"1","article-title":"Deeprebirth: Accelerating deep neural network execution on mobile devices","author":"li","year":"2018","journal-title":"Proc 32nd AAAI Conf Artif Intell"},{"key":"ref193","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134057"},{"key":"ref194","author":"goodfellow","year":"2014","journal-title":"Explaining and Harnessing Adversarial Examples"},{"key":"ref195","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.2988575"},{"key":"ref196","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.001.1900506"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1109\/ISECon.2019.8882085"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1016\/j.bspc.2019.101759"},{"key":"ref190","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2938533"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2008.4587735"},{"key":"ref191","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2018.00035"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2018.2861906"},{"key":"ref192","doi-asserted-by":"publisher","DOI":"10.1109\/ASPDAC.2018.8297407"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2957778"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1109\/LSENS.2017.2787651"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2820021"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1109\/WCSP.2017.8170936"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2017.2737553"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOMW.2018.8644435"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00403"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2018.2846598"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2005.43"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.698"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2018.2876865"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2016.2635161"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2014.2320099"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2721538"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2017.2717919"},{"key":"ref88","first-page":"1071","article-title":"A hybrid indoor localization system running ensemble machine learning","author":"phuong","year":"2018","journal-title":"Proc Int Conf Parallel Distrib Process Appl Ubiquitous Comput Commun Big Data Cloud Comput Social Comput Netw Sustain Comput Commun (ISPA\/IUCC\/BDCloud\/SocialCom\/SustainCom)"},{"key":"ref200","author":"alkhateeb","year":"2019","journal-title":"DeepMIMO A generic deep learning dataset for millimeter wave and massive MIMO applications"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1109\/CISS.2018.8362276"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2019.8761121"},{"key":"ref209","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2019.00048"},{"key":"ref203","doi-asserted-by":"publisher","DOI":"10.1109\/MVT.2019.2919236"},{"key":"ref204","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2712672"},{"key":"ref201","author":"kotak","year":"2020","journal-title":"IoT device identification using deep learning"},{"key":"ref202","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2682640"},{"key":"ref207","author":"farsad","year":"2017","journal-title":"Detection algorithms for communication systems using deep learning"},{"key":"ref208","doi-asserted-by":"publisher","DOI":"10.1109\/IEDM.2018.8614482"},{"key":"ref205","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2818794"},{"key":"ref206","doi-asserted-by":"publisher","DOI":"10.1109\/IIPHDW.2018.8388338"},{"key":"ref211","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2017.1600304WC"},{"key":"ref210","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2887099"},{"key":"ref212","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.001.1900298"},{"key":"ref213","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.2985628"},{"key":"ref214","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2019.1900027"},{"key":"ref215","doi-asserted-by":"publisher","DOI":"10.1109\/MVT.2018.2848498"},{"key":"ref216","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2019.1900271"},{"key":"ref127","doi-asserted-by":"publisher","DOI":"10.1109\/ICAIIC.2019.8669028"},{"key":"ref126","doi-asserted-by":"publisher","DOI":"10.23919\/ECC.2019.8796177"},{"key":"ref125","author":"nachmani","year":"2017","journal-title":"RNN decoding of linear block codes"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.1109\/ALLERTON.2016.7852251"},{"key":"ref129","doi-asserted-by":"publisher","DOI":"10.1109\/VTCFall.2019.8891178"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.1109\/APCC.2018.8633453"},{"key":"ref130","doi-asserted-by":"publisher","DOI":"10.1561\/1300000009"},{"key":"ref133","doi-asserted-by":"publisher","DOI":"10.1109\/LWC.2019.2923410"},{"key":"ref134","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2019.2933973"},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2018.2890056"},{"key":"ref132","doi-asserted-by":"publisher","DOI":"10.1109\/TCCN.2019.2945774"},{"key":"ref136","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2014.2300448"},{"key":"ref135","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2935545"},{"key":"ref138","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2018.2866382"},{"key":"ref137","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCC.2010.2099654"},{"key":"ref139","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2018.2882635"},{"key":"ref140","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2019.2897134"},{"key":"ref141","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2932016"},{"key":"ref142","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2007.9"},{"key":"ref143","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2016.2614952"},{"key":"ref2","year":"2020","journal-title":"Cisco Annual Internet Report (2018&#x2013;2023) White Paper"},{"key":"ref144","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.001.1800510"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2444095"},{"key":"ref145","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2903191"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1109\/TCCN.2017.2758370"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2951593"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2020.3020092"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2019.00097"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2019.1800386"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1109\/ISWCS.2018.8491089"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2954503"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2878435"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1109\/LWC.2018.2818160"},{"key":"ref112","author":"guo","year":"2019","journal-title":"Convolutional neural network based multiple-rate compressive sensing for massive MIMO CSI feedback Design simulation and analysis"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2018.8647328"},{"key":"ref10","year":"0","journal-title":"Phones With the Google Assistant"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2020.2970550"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2904897"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2015.2418191"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2018.1700442"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2018.1700083"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2018.8422895"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1109\/ISWCS.2018.8491209"},{"key":"ref17","first-page":"288","article-title":"AI benchmark: Running deep neural networks on android smartphones","author":"ignatov","year":"2018","journal-title":"Proc Eur Conf Comput Vis (ECCV)"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2944061"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2941836"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/NCA.2018.8548069"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2019.2951501"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2003.821099"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1109\/MLSP.2019.8918798"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOMW.2018.8644321"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2937209"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1109\/ICCNC.2019.8685641"},{"key":"ref121","author":"wang","year":"2019","journal-title":"PrecoderNet Hybrid Beamforming for Millimeter Wave Systems Using Deep Reinforcement Learning"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.1109\/18.910577"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2017.8254811"}],"container-title":["IEEE Communications Surveys &amp; Tutorials"],"original-title":[],"link":[{"URL":"https:\/\/ieeexplore.ieee.org\/ielam\/9739\/9361471\/9200330-aam.pdf","content-type":"application\/pdf","content-version":"am","intended-application":"syndication"},{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9739\/9361471\/09200330.pdf?arnumber=9200330","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T14:52:26Z","timestamp":1652194346000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9200330\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"references-count":216,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/comst.2020.3024783","relation":{},"ISSN":["1553-877X","2373-745X"],"issn-type":[{"value":"1553-877X","type":"electronic"},{"value":"2373-745X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021]]}}}