Stop the war!
Остановите войну!
for scientists:
default search action
IEEE Systems Journal, Volume 18
Volume 18, Number 1, March 2024
- Amir G. Aghdam:
Editorial. 4 - Daya Sagar Gupta:
PiLike: Post-Quantum Identity-Based Lightweight Authenticated Key Exchange Protocol for IIoT Environments. 15-23 - Qianqian Li, Giuliano Punzo, Craig Robson, Hadi Arbabi, Martin Mayfield:
A Systematic Approach to Climate Resilience Assessment of Infrastructure Networks. 24-35 - Xiaoyu Ou, Xianzhong Xie, Huabing Lu, Helin Yang:
Channel Blocklength Minimization in MU-MISO Nonorthogonal Multiple Access for URLLC Services. 36-39 - Vivek Singh, Kailash Chandra Ray, Somanath Tripathy:
An Efficient Method and Hardware System for Monitoring of Illegal Logging Events in Forest. 40-50 - Ioannis Zenginis, John S. Vardakas, Nikolaos E. Koltsaklis, Christos V. Verikoukis:
Real-Time Energy Scheduling Applying the Twin Delayed Deep Deterministic Policy Gradient and Data Clustering. 51-60 - Jiale Wu, Chenguang Shi, Weiwei Zhang, Jianjiang Zhou:
Power Control Game Between a Distributed Radar Network and a Smart Jammer. 61-72 - Junqiu Wang, Yunfei Chen:
Novel Detectors for Passive Radar Sensing With I/Q Imbalance and Additive Distortion. 73-84 - Sumana Maiti, Sudip Misra, Ayan Mondal:
ABP: Attribute-Based Broadcast Proxy Re-Encryption With Coalitional Game Theory. 85-95 - Mohammad Shahraeini:
Modified Erdős-Rényi Random Graph Model for Generating Synthetic Power Grids. 96-107 - Ruohan Yang, Xiaowan Su, Yue Li, Shuang-xi Zhang, Deyun Zhou:
Distributed Event-Triggered Simultaneous Fault Detection and Consensus Control for Multiple Lur'e Systems. 108-119 - Bilal Babayigit, Mohammed B. Abubaker:
Industrial Internet of Things: A Review of Improvements Over Traditional SCADA Systems for Industrial Automation. 120-133 - Mohammad Hossein Yaghmaee:
Incentive-Based Demand Response Program for Blockchain Network. 134-145 - Luca Faramondi, Simone Guarino, Gabriele Oliva, Roberto Setola:
A Recovery Model for Faulty Networked System. 146-149 - Junchao Xiao, Hongbo Chen, Fuli Zhong:
A Novel Feature Extraction Framework Using Graph Node Attention Network for In-Vehicle Networks Intrusion Detection. 150-161 - Bin Qiu, Shuxia Mao, Hailin Xiao, Zhongshan Zhang:
Power-Aware User Association and Renewable Energy Configuration for the Optimized On-Grid Energy in Hybrid-Energy Heterogeneous Cellular Networks. 162-173 - Wei Liu, Zhenhuan Ding, Huaying Zhang, Mingxing Zhu:
Multiobjective Optimal Power Flow for Distribution Networks Utilizing a Novel Heuristic Algorithm - Grey Wolf Equilibrium Optimizer. 174-185 - Pranay Kumar Saha, Nilotpal Chakraborty, Arijit Mondal, Samrat Mondal:
Intelligent Real-Time Utilization of Hybrid Energy Resources for Cost Optimization in Smart Microgrids. 186-197 - Meisam Mahdavi, Konrad Erich Kork Schmitt, Manohar Chamana, Stephen Bayne:
Evaluation of Voltage Fluctuations Effect on Reconfiguration of Distribution Systems. 198-209 - Changbing Tang, Zheng Bao, Xusheng Cai, Feilong Lin, Zhao Zhang, Guanrong Chen:
A Game-Enabled Blockchain Consensus and Incentive Mechanism for Secure and Efficient Mobile Crowdsensing. 210-221 - Bailing Chen, Ding Xu:
Outage Performance of Overlay Cognitive Satellite-Terrestrial Networks With Cooperative NOMA. 222-233 - Chetna Sagar, Ajit Kumar:
Investigations of Large-Scale Voltage-Dependent Loads for Damping Low-Frequency Oscillations: Decentralized Control. 234-243 - Zhaobin Wei, Jichun Liu, Zhiyuan Tang, Yi Liu, Shafqat Jawad, Junyong Liu, Zhifang Yang, Tianjiao Pu:
A Comprehensive Competitiveness Decision Method for Electricity Retailers Considering the Integration of Device Operation, Investment Planning, and Marketing Strategy. 244-255 - Miao Ye, Qinghao Zhang, Xingsi Xue, Yong Wang, Qiuxiang Jiang, Hongbing Qiu:
A Novel Self-Supervised Learning-Based Anomalous Node Detection Method Based on an Autoencoder for Wireless Sensor Networks. 256-267 - Hua Fu, Xueyang Meng, Yun Chen:
Finite-Time Distributed Filtering of Time-Varying Switched Stochastic Systems With DoS Attacks Based on Encoding-Decoding Scheme. 268-277 - Justin Jose, Anirudh Agarwal, Parvez Shaik, Vinat Goyal, Kwonhue Choi, Vimal Bhatia:
Performance Analysis and Learning-Assisted Power Control for NOMA Enabled D2D-Cellular Network. 278-281 - Baoyi Wang, Xue Guo, Shaomin Zhang:
A Secure and Efficient Pairing-Free Certificateless Aggregate Signcryption Scheme for V2G Networks. 282-293 - Shayan Soltani, Moein Abedini, Majid Sanaye-Pasand:
Power Swing Detection Using Concentric Characteristics Method: Challenges and Solutions. 294-305 - Akshita Sharma, Bijaya Ketan Panigrahi:
Revisiting Small-Signal Dynamic Stability Assessment of Multi-Inverter Interfaced Grids. 306-314 - Mingxing Zhang, Zhengchun Zhou, Xiong Deng, Xihua Zou:
Design of Alignment Marker Sequences in Ethernet to Suppress Baseline Wander and Clock Wander. 315-326 - Alex Minetto, Benoit Rat, Marco Pini, Brendan David Polidori, Ivan De Francesca, Luis Miguel Contreras Murillo, Fabio Dovis:
Nanosecond-Level Resilient GNSS-Based Time Synchronization in Telecommunication Networks Through WR-PTP HA. 327-338 - Huanyu Ren, Jianbang Du, Chao Wang, Zhenglong Li, Xiongping Yue:
Multiplex Characteristics and Vulnerability Assessment of the Global Electric Vehicle Lithium-Ion Battery Supply Chain Network: A Focal Firm-Specific Analysis. 339-350 - Taegyeom Lee, Ohyun Jo:
Learning Backoff: Deep Reinforcement Learning-Based Wireless Channel Access. 351-354 - Fang Wang, Shan He, Chao Zhou, Yali Gao, Qun Zong:
Distributed Practical Finite-Time Formation Control of Quadrotor UAVs Based on Finite-Time Event-Triggered Disturbance Observer. 355-366 - Zifan Zhang, Xiangyu Yang, Shiwei Zhao, Danlan Wu, Mengzhen Gao, Zhidong Wang:
Parameter Design of DCMG System Under Large Signal Stability and Static Voltage Constraints. 367-378 - Ateeq Ur Rehman, Peng Shi, Xiaotai Wu, Tingwen Huang, Wenbing Zhang:
Robust Leaderless Consensus Control of Multiagent Systems With Lipschitz Nonlinearity via LPV Scheme Under Fixed and Switching Topologies. 379-390 - Zhengjun Cao:
A Note on "A Lightweight Cloud-Assisted Identity-Based Anonymous Authentication and Key Agreement Protocol for Secure Wireless Body Area Network". 391-393 - Guan-Rong Shih, Pei-Hsuan Tsai, Rong-Guei Tsai:
A Self-Evacuation Approach for Robots in Fire Disasters. 394-402 - Bo Chen, Panling Jiang, Zhengtao Xiang, Xiue Gao, Yufeng Chen:
Novel Approach to Edge Importance Ranking: Balancing Network Structure and Transmission Performance. 403-414 - Wardah Sarmad, Syed Maaz Shahid, Ezhan Karasan, Sungoh Kwon:
Performance Analysis of an In-Band Full-Duplex MAC Protocol for Future Wireless Networks. 415-425 - Zhen Fan, Wei Zhang, Wenxin Liu:
Data-Efficient Deep Reinforcement Learning-Based Optimal Generation Control in DC Microgrids. 426-437 - Ze Yang, Jianying Zheng, Wenjie Yu, Yang Xiao, Jiacheng Li, Tieshan Li:
Car-Following Behavior Based on LiDAR Trajectory Data at Urban Intersections. 438-449 - Mohammed Elfiky, Zdenek Becvar, Pavel Mach:
Allocation of Resources for HARQ Retransmission in Mobile Networks Based on C-RAN. 450-461 - Mohaddeseh Amerian, Hossein Gholizade-Narm, Amin Hajizadeh, Suzan Eren:
Robust Distributed Control of DC Microgrids Considering Heterogeneous Communication Delays. 462-473 - Antony Hilliard, Richard Brath, Greg A. Jamieson:
Work Domain Analysis of Electric Transmission Networks and Operation. 474-484 - Weifeng Cao, Yulong Zou, Zhen Yang, Jia Zhu, Bin Li:
Security-Reliability TradeOff Analysis of Hybrid Satellite-Terrestrial Uplink Communications With Relay Selection. 485-496 - Xiaofan Liu, Xianxiang Wu, Yongfang Xie, Baolong Guo:
Time-Varying Formation Control With Transient Performance for Multiagent Systems Under Jointly Connected Topologies. 497-500 - Yu Zhang, Weichen Ma, Fanghui Huang, Xinyang Deng, Wen Jiang:
A Novel Air Target Intention Recognition Method Based on Sample Reweighting and Attention-Bi-GRU. 501-504 - Chuanyi Ning, Zhiyu Xi:
Improved Stealthy False Data Injection Attacks in Networked Control Systems. 505-515 - Zahra Mohammadi, Mohadeseh Soleimanpour-Moghadam, Siamak Talebi, Hamed Ahmadi:
Joint Network Lifetime Maximization and Relay Selection Design in Underwater Acoustic Sensor Networks. 516-526 - Mengge Li, Miao Ma, Liang Wang, Zhao Pei, Jie Ren, Bo Yang:
Multiagent Deep Reinforcement Learning Based Incentive Mechanism for Mobile Crowdsensing in Intelligent Transportation Systems. 527-538 - Rui Liang, Hui Li, Guodong Xue:
Design of Massive MU-MIMO Symbol-Level Precoding With Low-Resolution DACs via ADMM. 539-550 - Lina Yuan, Suzhi Bi, Xiaohui Lin, Hui Wang:
Throughput Fairness Optimization for Cluster-Based Collaboration. 551-559 - Fulai Liu, Xiaoyu Li, Xianghuan Yang, Huiyang Shi, Baozhu Shi, Ruiyan Du:
Deep Learning Based Joint Hybrid Precoding and Combining Design for mmWave MIMO Systems. 560-567 - Zhibo Zhao, Yuan Yuan, Yu Xiao, Biao Luo, Xiaodong Xu, Weihua Gui, Chunhua Yang, Tingwen Huang:
Adaptive Distributed Boundary Vibration Control of Multiagent Euler-Bernoulli Beams via Cooperative Disturbance Observer Network. 568-579 - Huamin Li, Tian Tang:
Comprehensive Evaluation About Functional Elements of Intelligent Vehicle Cyber Physical System Based on the Normal Cloud Model. 580-589 - Chao Shang, Jin Cao, Tong Zhu, Yinghui Zhang, Ben Niu, Hui Li:
CADFA: A Clock Skew-Based Active Device Fingerprint Authentication Scheme for Class-1 IoT Devices. 590-599 - Gustav Nilsson, Alejandro D. Owen Aquino, Samuel Coogan, Daniel K. Molzahn:
GreenEVT: Greensboro Electric Vehicle Testbed. 600-611 - Intikhab Hussain, Louis-Philippe Carignan, Ke Wu:
Balanced Detection in Multiport Direct-Conversion Interferometric Receiver for IoT Systems. 612-619 - Deguang Wang, Xi Wang, Jing Yang, Zhiwu Li:
Fault Diagnosis of Hierarchical Discrete-Event Systems Based on State-Tree Structures. 620-631 - Mehdi Rostamzadeh, Mohammad Heidari Kapourchali, Long Zhao, Visvakumar Aravinthan:
Optimal Reconfiguration of Power Distribution Grids to Maintain Line Thermal Efficiency During Progressive Wildfires. 632-643 - Xiasheng Shi, Yanxu Su, Chaoxu Mu, Changyin Sun:
Nonsmooth Distributed Resource Allocation Over Second-Order Nonlinear Multiagent Systems. 644-655 - Xinchao Wang, Wei Wang, Cheng Huang, Ping Cao, Youwen Zhu, Qihui Wu:
Blockchain-Based Certificateless Conditional Anonymous Authentication for IIoT. 656-667 - Shih-Yu Chang, Hsiao-Chun Wu, Yi-Chih Kao:
Tensor MIMO Perfect-Equalizer Design Using New Projection-Based Method and Approximation-Error Analysis. 668-679 - Xin Rong, Jingxuan Yu, Jiamin Li, Pengcheng Zhu, Dongming Wang, Xiaohu You:
Outage Probability Analysis and Bit Allocation for Uplink Cell-Free Massive MIMO Systems With Low-Precision ADCs. 680-691 - Yunxiang Li, Wen Tian, Xiaopeng Ji, Guangjie Liu, Yuewei Dai:
Optimal Position Design for Unmanned Aerial Vehicle Relay-Assisted Covert Communication Based on Active Countermeasures. 692-701 - Qinzhao Zhang, Jue Wang, Ruifeng Gao, Yanmin Wang, Wei Feng:
Network Deployment for ATG Communications: A Cell-Free Approach Under the Hybrid Satellite-Terrestrial Network Architecture. 702-712 - Robert Klar, Niklas Arvidsson, Vangelis Angelakis:
Digital Twins' Maturity: The Need for Interoperability. 713-724 - Lijuan Zha, Jinzhao Miao, Jinliang Liu, Xiangpeng Xie, Engang Tian:
Resilient Recursive Filter Design for Complex Networks With Event-Triggering Random Access Scheme and Random Coupling Strengths. 725-736 - Zhiyu Duan, Airong Wei, Xianfu Zhang:
Sampled-Data Secure Group Consensus for Nonlinear Multi-Agent Systems in Fixed/Switching Topologies. 737-745 - Jinrui Guo, Chunxia Dou, Dong Yue, Victor Kuzin, Zhijun Zhang, Zhanqiang Zhang:
A Cyber-Physical Collaboration Based Control Method for Frequency Regulation With VPP. 746-757 - Shihui Liu, Ben Niu, Ning Xu, Xudong Zhao:
Zero-Sum Game-Based Decentralized Optimal Control for Saturated Nonlinear Interconnected Systems via a Data and Event Driven Approach. 758-769 - He Li, Cheng-Lin Liu, Yang-Yang Chen, Ya Zhang:
Event-Based Fixed-Time Consensus Tracking for Constrained Networked Euler-Lagrange Systems. 770-781
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.