{"@context":{"@vocab":"https://cir.nii.ac.jp/schema/1.0/","rdfs":"http://www.w3.org/2000/01/rdf-schema#","dc":"http://purl.org/dc/elements/1.1/","dcterms":"http://purl.org/dc/terms/","foaf":"http://xmlns.com/foaf/0.1/","prism":"http://prismstandard.org/namespaces/basic/2.0/","cinii":"http://ci.nii.ac.jp/ns/1.0/","datacite":"https://schema.datacite.org/meta/kernel-4/","ndl":"http://ndl.go.jp/dcndl/terms/","jpcoar":"https://github.com/JPCOAR/schema/blob/master/2.0/"},"@id":"https://cir.nii.ac.jp/crid/1363670320243403264.json","@type":"Article","productIdentifier":[{"identifier":{"@type":"DOI","@value":"10.1109/comst.2019.2904897"}},{"identifier":{"@type":"URI","@value":"http://xplorestaging.ieee.org/ielx7/9739/8809933/08666641.pdf?arnumber=8666641"}}],"dc:title":[{"@value":"Deep Learning in Mobile and Wireless Networking: A Survey"}],"creator":[{"@id":"https://cir.nii.ac.jp/crid/1383670320243403266","@type":"Researcher","foaf:name":[{"@value":"Chaoyun Zhang"}]},{"@id":"https://cir.nii.ac.jp/crid/1383670320243403265","@type":"Researcher","foaf:name":[{"@value":"Paul Patras"}]},{"@id":"https://cir.nii.ac.jp/crid/1383670320243403264","@type":"Researcher","foaf:name":[{"@value":"Hamed Haddadi"}]}],"publication":{"publicationIdentifier":[{"@type":"EISSN","@value":"1553877X"},{"@type":"EISSN","@value":"2373745X"}],"prism:publicationName":[{"@value":"IEEE Communications Surveys & Tutorials"}],"dc:publisher":[{"@value":"Institute of Electrical and Electronics Engineers (IEEE)"}],"prism:publicationDate":"2019","prism:volume":"21","prism:number":"3","prism:startingPage":"2224","prism:endingPage":"2287"},"reviewed":"false","dc:rights":["https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html","https://doi.org/10.15223/policy-029","https://doi.org/10.15223/policy-037"],"url":[{"@id":"http://xplorestaging.ieee.org/ielx7/9739/8809933/08666641.pdf?arnumber=8666641"}],"createdAt":"2019-03-13","modifiedAt":"2022-09-13","relatedProduct":[{"@id":"https://cir.nii.ac.jp/crid/1050850634929483520","@type":"Article","resourceType":"学術雑誌論文(journal article)","relationType":["isReferencedBy"],"jpcoar:relatedTitle":[{"@language":"en","@value":"DeSVig: Decentralized Swift Vigilance Against Adversarial Attacks in Industrial Artificial Intelligence Systems"}]},{"@id":"https://cir.nii.ac.jp/crid/1360298336571313920","@type":"Article","resourceType":"学術雑誌論文(journal article)","relationType":["isReferencedBy"],"jpcoar:relatedTitle":[{"@value":"A Comprehensive Evaluation of Generating a Mobile Traffic Data Scheme without a Coarse-Grained Process Using CSR-GAN"}]},{"@id":"https://cir.nii.ac.jp/crid/1360298754812230528","@type":"Article","resourceType":"学術雑誌論文(journal article)","relationType":["isReferencedBy"],"jpcoar:relatedTitle":[{"@value":"Efficient Dynamic Distributed Resource Slicing in 6G Multi-Access Edge Computing Networks With Online ADMM and Message Passing Graph Neural Networks"}]},{"@id":"https://cir.nii.ac.jp/crid/1360568841124232960","@type":"Article","resourceType":"学術雑誌論文(journal article)","relationType":["isReferencedBy"],"jpcoar:relatedTitle":[{"@value":"Convolutional Neural Networks on Time Series for Smartphone Application Activations Using Wavelet Transform"}]},{"@id":"https://cir.nii.ac.jp/crid/1360580229799398528","@type":"Article","resourceType":"学術雑誌論文(journal article)","relationType":["isReferencedBy"],"jpcoar:relatedTitle":[{"@value":"Extraction and Prediction of User Communication Behaviors From DNS Query Logs Based on Nonnegative Tensor Factorization"}]},{"@id":"https://cir.nii.ac.jp/crid/1360580237009440512","@type":"Article","resourceType":"学術雑誌論文(journal article)","relationType":["isReferencedBy"],"jpcoar:relatedTitle":[{"@value":"Leveraging Machine Learning for Millimeter Wave Beamforming in Beyond 5G Networks"}]},{"@id":"https://cir.nii.ac.jp/crid/1360588381055183360","@type":"Article","resourceType":"学術雑誌論文(journal article)","relationType":["isReferencedBy"],"jpcoar:relatedTitle":[{"@value":"Multi-Agent Reinforcement Learning for Efficient Resource Allocation in Internet of Vehicles"}]},{"@id":"https://cir.nii.ac.jp/crid/1360857593702402432","@type":"Article","resourceType":"学術雑誌論文(journal article)","relationType":["isReferencedBy"],"jpcoar:relatedTitle":[{"@value":"Feature-Based Deep Neural Networks for Short-Term Prediction of WiFi Channel Occupancy Rate"}]},{"@id":"https://cir.nii.ac.jp/crid/1360857593744288768","@type":"Article","resourceType":"学術雑誌論文(journal article)","relationType":["isReferencedBy"],"jpcoar:relatedTitle":[{"@value":"Using back-and-forth translation to create artificial augmented textual data for sentiment analysis models"}]},{"@id":"https://cir.nii.ac.jp/crid/1360861704771826304","@type":"Article","resourceType":"学術雑誌論文(journal article)","relationType":["isReferencedBy"],"jpcoar:relatedTitle":[{"@value":"Inter-User Distance Estimation Based on a New Type of Fingerprint in Massive MIMO System for COVID-19 Contact Detection"}]},{"@id":"https://cir.nii.ac.jp/crid/1360861707393201920","@type":"Article","resourceType":"学術雑誌論文(journal article)","relationType":["isReferencedBy"],"jpcoar:relatedTitle":[{"@value":"AI-Enabled UAV Communications: Challenges and Future Directions"}]},{"@id":"https://cir.nii.ac.jp/crid/1360869855140492672","@type":"Article","resourceType":"学術雑誌論文(journal article)","relationType":["isReferencedBy"],"jpcoar:relatedTitle":[{"@value":"Deep Learning Methods for Secure IoT SWIPT Networks"}]},{"@id":"https://cir.nii.ac.jp/crid/1360869855565421312","@type":"Article","resourceType":"学術雑誌論文(journal article)","relationType":["isReferencedBy"],"jpcoar:relatedTitle":[{"@value":"Recent Advances in Deep Learning for Channel Coding: A Survey"}]},{"@id":"https://cir.nii.ac.jp/crid/1390571039719209856","@type":"Article","relationType":["isReferencedBy"],"jpcoar:relatedTitle":[{"@language":"en","@value":"DeepSIP: A System for Predicting Service Impact of Network Failure by Temporal Multimodal CNN"}]},{"@id":"https://cir.nii.ac.jp/crid/1391130851443771904","@type":"Article","relationType":["isReferencedBy"],"jpcoar:relatedTitle":[{"@language":"en","@value":"Experimental Validation of Link Quality Prediction Using Exact Self-Status of Mobility Robots in Wireless LAN Systems"}]}],"dataSourceIdentifier":[{"@type":"CROSSREF","@value":"10.1109/comst.2019.2904897"},{"@type":"CROSSREF","@value":"10.1587/transcom.2020ebp3177_references_DOI_XCXoDM7CU9wqOi9cCIVY0uzJS7I"},{"@type":"CROSSREF","@value":"10.1109/access.2021.3088423_references_DOI_XCXoDM7CU9wqOi9cCIVY0uzJS7I"},{"@type":"CROSSREF","@value":"10.1109/tmc.2023.3262514_references_DOI_XCXoDM7CU9wqOi9cCIVY0uzJS7I"},{"@type":"CROSSREF","@value":"10.1109/jsyst.2021.3089536_references_DOI_XCXoDM7CU9wqOi9cCIVY0uzJS7I"},{"@type":"CROSSREF","@value":"10.1109/tii.2019.2951766_references_DOI_XCXoDM7CU9wqOi9cCIVY0uzJS7I"},{"@type":"CROSSREF","@value":"10.3390/s22051930_references_DOI_XCXoDM7CU9wqOi9cCIVY0uzJS7I"},{"@type":"CROSSREF","@value":"10.1109/tnsm.2023.3238858_references_DOI_XCXoDM7CU9wqOi9cCIVY0uzJS7I"},{"@type":"CROSSREF","@value":"10.3390/electronics14010192_references_DOI_XCXoDM7CU9wqOi9cCIVY0uzJS7I"},{"@type":"CROSSREF","@value":"10.1016/j.eswa.2021.115033_references_DOI_XCXoDM7CU9wqOi9cCIVY0uzJS7I"},{"@type":"CROSSREF","@value":"10.1109/iiai-aai.2019.00112_references_DOI_XCXoDM7CU9wqOi9cCIVY0uzJS7I"},{"@type":"CROSSREF","@value":"10.3390/s22166211_references_DOI_XCXoDM7CU9wqOi9cCIVY0uzJS7I"},{"@type":"CROSSREF","@value":"10.1109/access.2022.3202956_references_DOI_XCXoDM7CU9wqOi9cCIVY0uzJS7I"},{"@type":"CROSSREF","@value":"10.1109/jiot.2024.3368692_references_DOI_XCXoDM7CU9wqOi9cCIVY0uzJS7I"},{"@type":"CROSSREF","@value":"10.1109/ojcoms.2024.3472094_references_DOI_XCXoDM7CU9wqOi9cCIVY0uzJS7I"},{"@type":"CROSSREF","@value":"10.1587/transcom.2020sep0005_references_DOI_XCXoDM7CU9wqOi9cCIVY0uzJS7I"}]}