Research Article

Deep Learning-Based Solutions for 5G Network and 5G-Enabled Internet of Vehicles: Advances, Meta-Data Analysis, and Future Direction

Table 2

Summary of different deep algorithms in different aspects of 5G wireless network.

DomainCNNDRLDDNNGANAutoencoderLSTM/DRNNHybrid algorithm

Resource managementBega et al. [26]; Huang et al. [28]; Godala et al. [31]Dai et al. [40]; Li et al. [44]; Pradhan and Das [48]; Zhao et al. [49]; Ho et al. [50]; Tang et al. [47]; Abiko et al. [56]Kim et al. [92]; Chergui and Verikoukis [99]; El Boudani et al. [97]; Ali et al. [100]Abbas et al. [90]Abidi et al. [70]
Energy/power transmissionDong et al. [41]; Xia et al. [45]; Saeidian et al. [55]; Yu et al. [104]; Giannopoulos et al. [57]Saetan et al. [93]Liu et al. [82]; Memon et al. [84]Luo et al. [69]
NetworkGante et al. [27]; Klus et al. [32]; Alhazmi et al. [33]; Guan et al. [37]Klautau et al. [15]; Ning et al. [42]; Sadeghi et al. [43]; Shahriari et al. [39]; Yu et al. [9]; Xie et al. [51]; Li and Zhang [52]; Mismar et al. [54]; Cheng et al. [36]; Gu et al. [58]Butt et al. [95]; Sim et al. [96]Razaak et al. [89]Kim et al. [62]; Lei et al. [61]Ozturk et al. [81]; Pang et al. [12]; Yu et al. [9]; Chen et al. [83]; Gumaei et al. [85]Huang et al. [68]; Luo et al. [67]; Sundqvist et al. [79]; Clement et al. [71]; Kaya and Viswanathan [73]; Khan et al. [72]; Dinh et al. [59]; Zhang et al. [74]
Cyber security systemHussain et al. [30]; Doan and Zhang [34]; Xu et al. [38]Thantharate et al. [98]; Rathore et al. [101]Ullah et al. [86]Maimó et al. [76]; Maimó et al. [78]; Liu et al. [116]; Sedik et al. [75]
SignalHe et al. [29]