default search action
IEEE Transactions on Network Science and Engineering, Volume 8
Volume 8, Number 1, January - March 2021
- Miklós Z. Rácz, Jacob Richey:
Rumor Source Detection With Multiple Observations Under Adaptive Diffusions. 2-12 - Hongwei Du, Qiang Ye, Zhipeng Sun, Chuang Liu, Wen Xu:
FAST-ODT: A Lightweight Outlier Detection Scheme for Categorical Data Sets. 13-24 - Bo Liu, Housheng Su, Licheng Wu, Xixi Shen:
Observability of Leader-Based Discrete-Time Multi-Agent Systems Over Signed Networks. 25-39 - Ding Xiang, Ermin Wei:
A General Sensitivity Analysis Approach for Demand Response Optimizations. 40-52 - Hongbo Jiang, Yu Zhang, Zhu Xiao, Ping Zhao, Arun Iyengar:
An Empirical Study of Travel Behavior Using Private Car Trajectory Data. 53-64 - Yilun Shang:
Resilient Consensus for Robust Multiplex Networks with Asymmetric Confidence Intervals. 65-74 - Fabien Geyer, Steffen Bondorf:
Graph-Based Deep Learning for Fast and Tight Network Calculus Analyses. 75-88 - Yinxin Wan, Kuai Xu, Feng Wang, Guoliang Xue:
Characterizing and Mining Traffic Patterns of IoT Devices in Edge Networks. 89-101 - Shuang Li, Weiguo Xia, Xi-Ming Sun:
Synchronization of Identical Oscillators Under Matrix-Weighted Laplacian With Sampled Data. 102-113 - Magdi Sadek Mahmoud, Bilal J. Karaki:
Output-Synchronization of Discrete-Time Multiagent Systems: A Cooperative Event-Triggered Dissipative Approach. 114-125 - Xiangli Jiang, Guihua Xia, Zhiguang Feng, Zhengyi Jiang:
Consensus Tracking of Data-Sampled Nonlinear Multi-Agent Systems With Packet Loss and Communication Delay. 126-137 - Klaus Wehmuth, Artur Ziviani, Leonardo Chinelate Costa, Ana Paula Couto da Silva, Alex Borges Vieira:
You Shall Not Pass: Avoiding Spurious Paths in Shortest-Path Based Centralities in Multidimensional Complex Networks. 138-148 - Qian Xu, Xiang Yan, Kui Wu, Jianping Wang, Kejie Lu, Weiwei Wu:
Leveraging Multiplexing Gain in Network Slice Bundles. 149-162 - Jing Wang, Tingting Ru, Hao Shen, Jinde Cao, Ju H. Park:
Finite-Time $\mathcal {L}_{2}$-$\mathcal {L}_{\infty }$ Synchronization for Semi-Markov Jump Inertial Neural Networks Using Sampled Data. 163-173 - Megan Morrison, J. Nathan Kutz:
Nonlinear Control of Networked Dynamical Systems. 174-189 - Jiajun Zhou, Jie Shen, Shanqing Yu, Guanrong Chen, Qi Xuan:
M-Evolve: Structural-Mapping-Based Data Augmentation for Graph Classification. 190-200 - Yan Ouyang, Anfeng Liu, Naixue Xiong, Tian Wang:
An Effective Early Message Ahead Join Adaptive Data Aggregation Scheme for Sustainable IoT. 201-219 - Matheus R. F. Mendonça, André Barreto, Artur Ziviani:
Approximating Network Centrality Measures Using Node Embedding and Machine Learning. 220-230 - Tong Wu, Pan Zhou, Binghui Wang, Ang Li, Xueming Tang, Zichuan Xu, Kai Chen, Xiaofeng Ding:
Joint Traffic Control and Multi-Channel Reassignment for Core Backbone Network in SDN-IoT: A Multi-Agent Deep Reinforcement Learning Approach. 231-245 - Saiwei Wang, Xin Jin, Shuai Mao, Athanasios V. Vasilakos, Yang Tang:
Model-Free Event-Triggered Optimal Consensus Control of Multiple Euler-Lagrange Systems via Reinforcement Learning. 246-258 - Yang Zhai, Zhi-Wei Liu, Ming-Feng Ge, Guanghui Wen, Xinghuo Yu, Yuzhen Qin:
Trusted-Region Subsequence Reduction for Designing Resilient Consensus Algorithms. 259-268 - Youyang Qu, Shui Yu, Wanlei Zhou, Shiping Chen, Jun Wu:
Customizable Reliable Privacy-Preserving Data Sharing in Cyber-Physical Social Networks. 269-281 - Lucia Valentina Gambuzza, Mattia Frasca, Francesco Sorrentino, Louis M. Pecora, Stefano Boccaletti:
Controlling Symmetries and Clustered Dynamics of Complex Networks. 282-293 - Yapu Zhang, Jianxiong Guo, Wenguo Yang, Weili Wu:
Targeted Activation Probability Maximization Problem in Online Social Networks. 294-304 - Zhen Li, Yang Tang, Jian-An Fang, Tingwen Huang:
Formation Control of Multi-Agent Systems With Orientation Noises. 305-317 - Zhihua Xia, Lan Wang, Jian Tang, Neal N. Xiong, Jian Weng:
A Privacy-Preserving Image Retrieval Scheme Using Secure Local Binary Pattern in Cloud Computing. 318-330 - Prasad Vilas Chanekar, Erfan Nozari, Jorge Cortés:
Energy-Transfer Edge Centrality and Its Role in Enhancing Network Controllability. 331-346 - Shaobo Huang, Zhiwen Zeng, Kaoru Ota, Mianxiong Dong, Tian Wang, Neal N. Xiong:
An Intelligent Collaboration Trust Interconnections System for Mobile Information Control in Ubiquitous 5G Networks. 347-365 - Eduardo Viegas, Altair Olivo Santin, Vilmar Abreu:
Machine Learning Intrusion Detection in Big Data Era: A Multi-Objective Approach for Longer Model Lifespans. 366-376 - Yang Chen, Jie Wu, Rajorshi Biswas:
Grouping Service Chains of Multiple Flows in NFV-Based Networks. 377-388 - Yang Chen, Jie Wu:
Flow Scheduling of Service Chain Processing in a NFV-Based Network. 389-399 - Canhui Chen, Xu Chen, Jiangshan Yu, Weigang Wu, Di Wu:
Impact of Temporary Fork on the Evolution of Mining Pools in Blockchain Networks: An Evolutionary Game Analysis. 400-418 - Pan Zhou, Yulai Xie, Ben Niu, Lingjun Pu, Zichuan Xu, Hao Jiang, Huawei Huang:
QoE-Aware 3D Video Streaming via Deep Reinforcement Learning in Software Defined Networking Enabled Mobile Edge Computing. 419-433 - Sifat Afroj Moon, Faryad Darabi Sahneh, Caterina M. Scoglio:
Group-Based General Epidemic Modeling for Spreading Processes on Networks: GroupGEM. 434-446 - Xiao Chen, Jie Ding, Zhenyu Lu, Tianming Zhan:
An Efficient Formal Modeling Framework for Hybrid Cloud-Fog Systems. 447-462 - Xin Luo, Zhigang Liu, Mingsheng Shang, Jungang Lou, MengChu Zhou:
Highly-Accurate Community Detection via Pointwise Mutual Information-Incorporated Symmetric Non-Negative Matrix Factorization. 463-476 - Xingjian Ding, Jianxiong Guo, Deying Li, Weili Wu:
An Incentive Mechanism for Building a Secure Blockchain-Based Internet of Things. 477-487 - Meirong Zhang, Ali Saberi, Anton A. Stoorvogel:
Semi-Global State Synchronization for Multi-Agent Systems Subject to Actuator Saturation and Unknown Nonuniform Input Delay. 488-497 - Ze Tang, Deli Xuan, Ju H. Park, Yan Wang, Jianwen Feng:
Impulsive Effects Based Distributed Synchronization of Heterogeneous Coupled Neural Networks. 498-510 - Liangtian Wan, Feng Xia, Xiangjie Kong, Ching-Hsien Hsu, Runhe Huang, Jianhua Ma:
Deep Matrix Factorization for Trust-Aware Recommendation in Social Networks. 511-528 - Yuxin Mao, Lujie Zhou, Naixue Xiong:
TPS: A Topological Potential Scheme to Predict Influential Network Nodes for Intelligent Communication in Social Networks. 529-540 - Yu Wang, Chengzhe Piao, Chi Harold Liu, Chijin Zhou, Jian Tang:
Modeling User Interests With Online Social Network Influence by Memory Augmented Sequence Learning. 541-554 - Pan Lai, Costas Courcoubetis, Lingjie Duan, Stefano Galelli:
Economic Controls for Smart Water Distribution Networks Undergoing Supply Failures. 555-574 - Chunyu Wu, Xudong Zhao:
Quantized Dynamic Output Feedback Control and $L_2$-Gain Analysis for Networked Control Systems: A Hybrid Approach. 575-587 - Song Li, Weibin Sun, Yanjing Sun, Yu Huo:
Energy-Efficient Task Offloading Using Dynamic Voltage Scaling in Mobile Edge Computing. 588-598 - Shuwen Yi, Hao Jiang, Ying Jiang, Pan Zhou, Qiang Wang:
A Hyperbolic Embedding Method for Weighted Networks. 599-612 - Xin Gong, Yukang Cui, Jun Shen, Zhan Shu, Tingwen Huang:
Distributed Prescribed-Time Interval Bipartite Consensus of Multi-Agent Systems on Directed Graphs: Theory and Experiment. 613-624 - Yiming Miao, Yixue Hao, Min Chen, Hamid Gharavi, Kai Hwang:
Intelligent Task Caching in Edge Cloud via Bandit Learning. 625-637 - Xiaoping Wu, Hengnian Qi, Naixue Xiong:
Rank-One Semidefinite Programming Solutions for Mobile Source Localization in Sensor Networks. 638-650 - Yang Chen, Jie Wu:
Latency-Efficient VNF Deployment and Path Routing for Reliable Service Chain. 651-661 - Reza Entezari-Maleki, Mohammed Gharib, Shahbaz Rezaei, Kishor S. Trivedi, Ali Movaghar:
Modeling and Evaluation of Multi-Hop Wireless Networks Using SRNs. 662-679 - Junxiao Wang, Heng Qi, Wenxin Li, Keqiu Li, Steve Uhlig, Yuxin Wang:
Dynamic SDN Control Plane Request Assignment in NFV Datacenters. 680-694 - Zhongying Zhao, Hui Zhou, Liang Qi, Liang Chang, MengChu Zhou:
Inductive Representation Learning via CNN for Partially-Unseen Attributed Networks. 695-706 - Thomas Magelinski, Mihovil Bartulovic, Kathleen M. Carley:
Measuring Node Contribution to Community Structure With Modularity Vitality. 707-723 - Saeideh Gholamrezazadeh Motlagh, Jelena V. Misic, Vojislav B. Misic:
The Impact of Selfish Mining on Bitcoin Network Performance. 724-735 - Deqiang Li, Qianmu Li, Yanfang Ye, Shouhuai Xu:
A Framework for Enhancing Deep Neural Networks Against Adversarial Malware. 736-750 - Abdullah Aydeger, Mohammad Hossein Manshaei, Mohammad Ashiqur Rahman, Kemal Akkaya:
Strategic Defense Against Stealthy Link Flooding Attacks: A Signaling Game Approach. 751-764 - Xu Wang, Randall A. Berry:
Market Competition Between LTE-U and WiFi. 765-779 - Ruoyu Wei, Jinde Cao, Jürgen Kurths:
Fixed-Time Output Synchronization of Coupled Reaction-Diffusion Neural Networks With Delayed Output Couplings. 780-789 - Jin-Liang Wang, Lin-Hao Zhao:
PD and PI Control for Passivity and Synchronization of Coupled Neural Networks With Multi-Weights. 790-802 - Evgenia Christoforou, Alessandro Nordio, Alberto Tarable, Emilio Leonardi:
Ranking a Set of Objects: A Graph Based Least-Square Approach. 803-813 - Cong Li, Yuan Zhang, Xiang Li:
Epidemic Threshold in Temporal Multiplex Networks With Individual Layer Preference. 814-824
Volume 8, Number 2, April - June 2021
- Jianwei Huang:
Message From the Editor-in-Chief. 825 - Yingshu Li, Mihaela Cardei, Chaokun Wang, Anton Umek:
Guest Editorial Introduction to the Special Section on Artificial Intelligence For Social Networks. 826-827 - Yinxue Yi, Zufan Zhang, Laurence T. Yang, Chenquan Gan, Xianjun Deng, Lingzhi Yi:
Reemergence Modeling of Intelligent Information Diffusion in Heterogeneous Social Networks: The Dynamics Perspective. 828-840 - Yuan Yuan, Feng Li, Dongxiao Yu, Jichao Zhao, Jiguo Yu, Xiuzhen Cheng:
Distributed Social Learning With Imperfect Information. 841-852 - Xiao Liu, Houbing Song, Anfeng Liu:
Intelligent UAVs Trajectory Optimization From Space-Time for Data Collection in Social Networks. 853-864 - Ting Li, Zhijin Qiu, Lijuan Cao, Dazhao Cheng, Weichao Wang, Xinghua Shi, Yu Wang:
Privacy-Preserving Participant Grouping for Mobile Social Sensing Over Edge Clouds. 865-880 - Jian Mao, Yitong Yang, Tianchen Zhang:
Empirical Analysis of Attribute Inference Techniques in Online Social Network. 881-893 - Xiaokang Zhou, Wei Liang, Zijia Luo, Yi Pan:
Periodic-Aware Intelligent Prediction Model for Information Diffusion in Social Networks. 894-904 - Xiaojiang Du, Willy Susilo, Mohsen Guizani, Zhihong Tian:
Introduction to the Special Section on Artificial Intelligence Security: Adversarial Attack and Defense. 905-907 - SeokHwan Choi, Jin-Myeong Shin, Peng Liu, Yoon-Ho Choi:
EEJE: Two-Step Input Transformation for Robust DNN Against Adversarial Examples. 908-920 - Zhaoquan Gu, Weixiong Hu, Chuanjing Zhang, Hui Lu, Lihua Yin, Le Wang:
Gradient Shielding: Towards Understanding Vulnerability of Deep Neural Networks. 921-932 - Jianmin Guo, Yue Zhao, Houbing Song, Yu Jiang:
Coverage Guided Differential Adversarial Testing of Deep Learning Systems. 933-942 - Xiangyu Ma, Wei Shi:
AESMOTE: Adversarial Reinforcement Learning With SMOTE for Anomaly Detection. 943-956 - Zikai Zhang, Yidong Li, Hairong Dong, Honghao Gao, Yi Jin, Wei Wang:
Spectral-Based Directed Graph Network for Malware Detection. 957-970 - Chao Pei, Yang Xiao, Wei Liang, Xiaojia Han:
Detecting False Data Injection Attacks Using Canonical Variate Analysis in Power Grid. 971-983 - Huijuan Zhu, Yang Li, Ruidong Li, Jianqiang Li, Zhuhong You, Houbing Song:
SEDMDroid: An Enhanced Stacking Ensemble Framework for Android Malware Detection. 984-994 - Zhuoqun Xia, Jingjing Tan, Ke Gu, Xiong Li, Weijia Jia:
IDS Intelligent Configuration Scheme Against Advanced Adaptive Attacks. 995-1008 - Rabeya Bosri, Mohammad Shahriar Rahman, Md. Zakirul Alam Bhuiyan, Abdullah Al Omar:
Integrating Blockchain With Artificial Intelligence for Privacy-Preserving Recommender Systems. 1009-1018 - Huilin Li, Yannan Li, Yong Yu, Baocang Wang, Kefei Chen:
A Blockchain-Based Traceable Self-Tallying E-Voting Protocol in AI Era. 1019-1032 - Ronald Doku, Danda B. Rawat, Chunmei Liu:
On the Blockchain-Based Decentralized Data Sharing for Event Based Encryption to Combat Adversarial Attacks. 1033-1043 - Shivani Bharatbhai Patel, Pronaya Bhattacharya, Sudeep Tanwar, Neeraj Kumar:
KiRTi: A Blockchain-Based Credit Recommender System for Financial Institutions. 1044-1054 - Yuntao Wang, Zhou Su, Ning Zhang, Abderrahim Benslimane:
Learning in the Air: Secure Federated Learning for UAV-Assisted Crowdsensing. 1055-1069 - Zheyi Chen, Pu Tian, Weixian Liao, Wei Yu:
Zero Knowledge Clustering Based Adversarial Mitigation in Heterogeneous Federated Learning. 1070-1083 - Hongwei Yang, Hui He, Weizhe Zhang, Xiaochun Cao:
FedSteg: A Federated Transfer Learning Framework for Secure Image Steganalysis. 1084-1094 - Peiying Zhang, Chao Wang, Chunxiao Jiang, Abderrahim Benslimane:
Security-Aware Virtual Network Embedding Algorithm Based on Reinforcement Learning. 1095-1105 - Xinyu Yin, Xiaojie Fang, Ning Zhang, Peng Yang, Xuejun Sha, Jinghui Qiu:
Online Learning Aided Adaptive Multiple Attribute-Based Physical Layer Authentication in Dynamic Environments. 1106-1116 - Yulei Wu, Zheng Yan, Ruppa K. Thulasiram, Mohammed Atiquzzaman:
Guest Editorial Introduction to the Special Section on Blockchain in Future Networks and Vertical Industries. 1117-1119 - Abbas Yazdinejad, Reza M. Parizi, Ali Dehghantanha, Kim-Kwang Raymond Choo:
Blockchain-Enabled Authentication Handover With Efficient Privacy Protection in SDN-Based 5G Networks. 1120-1132 - Wei Wang, Jingjing Song, Guangquan Xu, Yidong Li, Hao Wang, Chunhua Su:
ContractWard: Automated Vulnerability Detection Models for Ethereum Smart Contracts. 1133-1144 - Lianyong Qi, Xiaokang Wang, Xiaolong Xu, Wanchun Dou, Shancang Li:
Privacy-Aware Cross-Platform Service Recommendation Based on Enhanced Locality-Sensitive Hashing. 1145-1153 - Li-e Wang, Yan Bai, Quan Jiang, Victor C. M. Leung, Wei Cai, Xianxian Li:
Beh-Raft-Chain: A Behavior-Based Fast Blockchain Protocol for Complex Networks. 1154-1166 - Shuming Seng, Changqing Luo, Xi Li, Heli Zhang, Hong Ji:
User Matching on Blockchain for Computation Offloading in Ultra-Dense Wireless Networks. 1167-1177 - Hao Yin, Zijian Zhang, Liehuang Zhu, Meng Li, Xiaojiang Du, Mohsen Guizani, Bakh Khoussainov:
A Blockchain-Based Storage System With Financial Incentives for Load-balancing. 1178-1188 - Siming Wang, Dongdong Ye, Xumin Huang, Rong Yu, Yongjian Wang, Yan Zhang:
Consortium Blockchain for Secure Resource Sharing in Vehicular Edge Computing: A Contract-Based Approach. 1189-1201 - Yang Xu, Cheng Zhang, Quanrun Zeng, Guojun Wang, Ju Ren, Yaoxue Zhang:
Blockchain-Enabled Accountability Mechanism Against Information Leakage in Vertical Industry Services. 1202-1213 - Mohamed Baza, Noureddine Lasla, Mohamed M. E. A. Mahmoud, Gautam Srivastava, Mohamed Abdallah:
B-Ride: Ride Sharing With Privacy-Preservation, Trust and Fair Payment Atop Public Blockchain. 1214-1229 - Yan Wu, Fang Tao, Lu Liu, Jiayan Gu, John Panneerselvam, Rongbo Zhu, Mohammad Nasir Shahzad:
A Bitcoin Transaction Network Analytic Method for Future Blockchain Forensic Investigation. 1230-1241 - Pronaya Bhattacharya, Sudeep Tanwar, Umesh Bodkhe, Sudhanshu Tyagi, Neeraj Kumar:
BinDaaS: Blockchain-Based Deep-Learning as-a-Service in Healthcare 4.0 Applications. 1242-1255 - Andrea Tagarelli, Sabrina Gaito, Roberto Interdonato, Tsuyoshi Murata, Alessandra Sala, My T. Thai:
Guest Editorial Introduction to the Special Section on Reloading Feature-Rich Information Networks. 1256-1258 - Nathaniel Hudson, Hana Khamfroush:
Behavioral Information Diffusion for Opinion Maximization in Online Social Networks. 1259-1268 - Konstantinos Tsitseklis, Maria Krommyda, Vasileios Karyotis, Verena Kantere, Symeon Papavassiliou:
Scalable Community Detection for Complex Data Graphs via Hyperbolic Network Embedding and Graph Databases. 1269-1282 - Giorgia Minello, Luca Rossi, Andrea Torsello:
k-Anonymity on Graphs Using the Szemerédi Regularity Lemma. 1283-1292 - Cheng-Lung Chen, Qipeng P. Zheng, Alexander Veremyev, Eduardo L. Pasiliao, Vladimir Boginski:
Failure Mitigation and Restoration in Interdependent Networks via Mixed-Integer Optimization. 1293-1304 - Çiçek Güven, Dietmar Seipel, Martin Atzmueller:
Applying ASP for Knowledge-Based Link Prediction With Explanation Generation in Feature-Rich Networks. 1305-1315 - Su Gao, Zhigeng Fang:
Multilayer Feature-Rich Satellite Network Analysis: An Application-Oriented and Time-Evolving Approach. 1316-1327 - Ilaria Bordino, Francesco Gullo, Giacomo Legnaro:
Advancing Receivable Financing via a Network-Based Approach. 1328-1337 - Jon Crowcroft, Damiano Di Francesco Maesa, Alessandro Magrini, Andrea Marino, Laura Ricci:
Leveraging the Users Graph and Trustful Transactions for the Analysis of Bitcoin Price. 1338-1352 - Huazhong Liu, Laurence T. Yang, Tong Yao, Jihong Ding, Anyuan Deng:
Tensor-Train-Based Higher Order Dominant Z-Eigen Decomposition for Multi-Modal Prediction and Its Cloud/Edge Implementation. 1353-1366 - Jacob D. Moorman, Thomas K. Tu, Qinyi Chen, Xie He, Andrea L. Bertozzi:
Subgraph Matching on Multiplex Networks. 1367-1384 - Youqi Li, Fan Li, Song Yang, Pan Zhou, Liehuang Zhu, Yu Wang:
Three-Stage Stackelberg Long-Term Incentive Mechanism and Monetization for Mobile Crowdsensing: An Online Learning Approach. 1385-1398 - Kun Xie, Shuyu Pei, Xin Wang, Wen Shi, Gaogang Xie, Kenli Li, Yanbiao Li, Jigang Wen:
A Stateful Bloom Filter for Per-Flow State Monitoring. 1399-1413 - Yuqiang Luo, Zidong Wang, Yun Chen, Xiao-jian Yi:
$H_{\infty }$ State Estimation for Coupled Stochastic Complex Networks With Periodical Communication Protocol and Intermittent Nonlinearity Switching. 1414-1425 - Krzysztof Turowski, Jithin K. Sreedharan, Wojciech Szpankowski:
Temporal Ordered Clustering in Dynamic Networks: Unsupervised and Semi-Supervised Learning Algorithms. 1426-1442 - Huaying Wu, Luoyi Fu, Huan Long, Guie Meng, Xiaoying Gan, Yuanhao Wu, Haisong Zhang, Xinbing Wang:
Unraveling the Detectability of Stochastic Block Model With Overlapping Communities. 1443-1455 - Abdul Rehman Javed, Saif ur Rehman, Mohib Ullah Khan, Mamoun Alazab, Thippa Reddy Gadekallu:
CANintelliIDS: Detecting In-Vehicle Intrusion Attacks on a Controller Area Network Using CNN and Attention-Based GRU. 1456-1466 - Rajorshi Biswas, Jie Wu:
Traffic Engineering to Minimize the Number of Rules in SDN Datacenters. 1467-1477 - Mingcheng He, Cunqing Hua, Wenchao Xu, Pengwenlong Gu, Xuemin Sherman Shen:
Delay Optimal Concurrent Transmissions With Raptor Codes in Dual Connectivity Networks. 1478-1491 - Zhirong Shen, Changle Wu, Lin Wang, Guanglin Zhang:
Real-Time Energy Management for Microgrid With EV Station and CHP Generation. 1492-1501 - Liping Zhang, Zhen Wei, Wei Ren, Xianghan Zheng, Kim-Kwang Raymond Choo, Neal N. Xiong:
SIP: An Efficient and Secure Information Propagation Scheme in E-Health Networks. 1502-1516 - Saber Jafarizadeh, Darryl Veitch, Farzad Tofigh, Justin Lipman, Mehran Abolhasan:
Optimal Synchronizability in Networks of Coupled Systems: Topological View. 1517-1530 - Duxin Chen, Xiaolu Liu, Wenwu Yu, Lei Zhu, Qipeng Tang:
Neural-Network Based Adaptive Self-Triggered Consensus of Nonlinear Multi-Agent Systems With Sensor Saturation. 1531-1541 - Bo Yin, Jun Lu, Xuetao Wei:
Correlation-Based Task Processing Plans in Crowdsensing Platforms. 1542-1556 - Lei Zhang, Yutong Liu, Fan Cheng, Jianfeng Qiu, Xingyi Zhang:
A Local-Global Influence Indicator Based Constrained Evolutionary Algorithm for Budgeted Influence Maximization in Social Networks. 1557-1570 - Shen Yan, Zhou Gu, Ju H. Park:
Memory-Event-Triggered $H_{\infty }$ Load Frequency Control of Multi-Area Power Systems With Cyber-Attacks and Communication Delays. 1571-1583 - Xin Cong, Lingling Zi, Ding-Zhu Du:
DTNB: A Blockchain Transaction Framework With Discrete Token Negotiation for the Delay Tolerant Network. 1584-1599 - Guangmo Tong, Ruiqi Wang, Zheng Dong:
On Multi-Cascade Influence Maximization: Model, Hardness and Algorithmic Framework. 1600-1613 - Neda Zarayeneh, Ananth Kalyanaraman:
Delta-Screening: A Fast and Efficient Technique to Update Communities in Dynamic Graphs. 1614-1629 - Zhenzhen Hu, Fanzi Zeng, Zhu Xiao, Bin Fu, Hongbo Jiang, Hongyang Chen:
Computation Efficiency Maximization and QoE-Provisioning in UAV-Enabled MEC Communication Systems. 1630-1645 - Can Chen, Amit Surana, Anthony M. Bloch, Indika Rajapakse:
Controllability of Hypergraphs. 1646-1657 - Haiyang Yu, Qi Hu, Zhen Yang, Huan Liu:
Efficient Continuous Big Data Integrity Checking for Decentralized Storage. 1658-1673 - Zecheng Li, Shang Gao, Zhe Peng, Songtao Guo, Yuanyuan Yang, Bin Xiao:
B-DNS: A Secure and Efficient DNS Based on the Blockchain Technology. 1674-1686 - Ehsan Tohidi, Saeedeh Parsaeefard, Mohammad Ali Maddah-Ali, Babak Hossein Khalaj, Alberto Leon-Garcia:
Near-Optimal Robust Virtual Controller Placement in 5G Software Defined Networks. 1687-1697 - Abba Garba, Zhong Chen, Zhi Guan, Gautam Srivastava:
LightLedger: A Novel Blockchain-Based Domain Certificate Authentication and Validation Scheme. 1698-1710 - Renato Vizuete, Federica Garin, Paolo Frasca:
The Laplacian Spectrum of Large Graphs Sampled From Graphons. 1711-1721 - Aleksandar Haber:
Joint Sensor Node Selection and State Estimation for Nonlinear Networks and Systems. 1722-1732 - Yanan Zhu, Guanghui Wen, Wenwu Yu, Xinghuo Yu:
Continuous-Time Distributed Proximal Gradient Algorithms for Nonsmooth Resource Allocation Over General Digraphs. 1733-1744 - Cho-Chun Chiu, Ting He:
Stealthy DGoS Attack Against Network Tomography: The Role of Active Measurements. 1745-1758 - Walid Ahmad, Mason A. Porter, Mariano Beguerisse-Díaz:
Tie-Decay Networks in Continuous Time and Eigenvector-Based Centralities. 1759-1771 - Davide Cecchinato, Tomaso Erseghe, Michele Rossi:
Elastic and Predictive Allocation of Computing Tasks in Energy Harvesting IoT Edge Networks. 1772-1788 - Qisheng Huang, Yunjian Xu, Costas Courcoubetis:
Strategic Storage Operation in Wholesale Electricity Markets: A Networked Cournot Game Analysis. 1789-1801 - Yubin Duan, Ning Wang, Jie Wu:
Minimizing Training Time of Distributed Machine Learning by Reducing Data Communication. 1802-1814 - Benyun Shi, Jianan Zhong, Hongjun Qiu, Qing Bao, Kai Liu, Jiming Liu:
Hybrid Embedding via Cross-Layer Random Walks on Multiplex Networks. 1815-1827 - Bo Liu, Xixi Shen, Licheng Wu, Housheng Su:
Observability of Heterogeneous Multi-Agent Systems. 1828-1841 - Jinsong Gui, Xiangwen Dai, Neal N. Xiong:
Design and Analysis of Network Behaviors for Optimizing Network Energy Efficiency in 5G Mmwave Systems. 1842-1861 - Xianhao Chen, Guangyu Zhu, Lan Zhang, Yuguang Fang, Linke Guo, Xinguang Chen:
Age-Stratified COVID-19 Spread Analysis and Vaccination: A Multitype Random Network Approach. 1862-1872 - Jing Wu, Juzhen Wang, Qimei Chen, Zenghui Yuan, Pan Zhou, Xiumin Wang, Cai Fu:
Resource Allocation for Delay-Sensitive Vehicle-to-Multi-Edges (V2Es) Communications in Vehicular Networks: A Multi-Agent Deep Reinforcement Learning Approach. 1873-1886 - Jun-Yi Li, Zidong Wang, Renquan Lu, Yong Xu:
Partial-Nodes-Based State Estimation for Complex Networks With Constrained Bit Rate. 1887-1899 - Xiaoheng Deng, Peiyuan Guan, Cong Hei, Feng Li, Jianqing Liu, Naixue Xiong:
An Intelligent Resource Allocation Scheme in Energy Harvesting Cognitive Wireless Sensor Networks. 1900-1912 - Li-Ning Liu, Guang-Hong Yang:
Distributed Optimal Economic Environmental Dispatch for Microgrids Over Time-Varying Directed Communication Graph. 1913-1924 - Pan Lai, Lingjie Duan, Xiaojun Lin:
Learning Large Electrical Loads via Flexible Contracts With Commitment. 1925-1940 - Xiang-Gui Guo, Pei-Ming Liu, Jian-Liang Wang, Choon Ki Ahn:
Event-Triggered Adaptive Fault-Tolerant Pinning Control for Cluster Consensus of Heterogeneous Nonlinear Multi-Agent Systems Under Aperiodic DoS Attacks. 1941-1956 - Mohammad Esmaeili, Hussein Metwaly Saad, Aria Nosratinia:
Semidefinite Programming for Community Detection With Side Information. 1957-1973 - Jiajun Zhou, Jie Shen, Shanqing Yu, Guanrong Chen, Qi Xuan:
Corrections to "M-Evolve: Structural-Mapping-Based Data Augmentation for Graph Classification". 1974
Volume 8, Number 3, July - September 2021
- Jiming Chen, Enrico Natalizio, Hideaki Ishii, Rongxing Lu, Sangheon Pack:
Introduction to the Special Section on Security and Privacy of Smart Network Systems. 1975-1977 - Amir Amini, Amir Asif, Arash Mohammadi, Ali Azarbahram:
Sampled-Data Dynamic Event-Triggering Control for Networked Systems Subject to DoS Attacks. 1978-1990 - Mohammad Pirani, Ehsan Nekouei, Henrik Sandberg, Karl Henrik Johansson:
A Graph-Theoretic Equilibrium Analysis of Attacker-Defender Game on Consensus Dynamics Under $\mathcal {H}_2$ Performance Metric. 1991-2000 - Lu-Xing Yang, Kaifan Huang, Xiaofan Yang, Yushu Zhang, Yong Xiang, Yuan Yan Tang:
Defense Against Advanced Persistent Threat Through Data Backup and Recovery. 2001-2013 - Mingjing Sun, Chengcheng Zhao, Jianping He, Peng Cheng, Daniel E. Quevedo:
Privacy-Preserving Correlated Data Publication: Privacy Analysis and Optimal Noise Design. 2014-2024 - Qi Xia, Zeyi Tao, Qun Li:
Defenses Against Byzantine Attacks in Distributed Deep Neural Networks. 2025-2035 - Wen Yang, Weijie Luo, Xinting Zhang:
Distributed Secure State Estimation Under Stochastic Linear Attacks. 2036-2047 - Biwen Chen, Debiao He, Neeraj Kumar, Huaqun Wang, Kim-Kwang Raymond Choo:
A Blockchain-Based Proxy Re-Encryption With Equality Test for Vehicular Communication Systems. 2048-2059 - Luis Puche Rondon, Leonardo Babun, Kemal Akkaya, A. Selcuk Uluagac:
HDMI-Watch: Smart Intrusion Detection System Against HDMI Attacks. 2060-2072 - Xinghua Li, Yanbing Ren, Laurence T. Yang, Ning Zhang, Bin Luo, Jian Weng, Ximeng Liu:
Perturbation-Hidden: Enhancement of Vehicular Privacy for Location-Based Services in Internet of Vehicles. 2073-2086 - Shaobo Huang, Anfeng Liu, Shaobo Zhang, Tian Wang, Neal N. Xiong:
BD-VTE: A Novel Baseline Data Based Verifiable Trust Evaluation Scheme for Smart Network Systems. 2087-2105 - Chunming Zhang, Fengji Luo, Mingyang Sun, Gianluca Ranzi:
Modeling and Defending Advanced Metering Infrastructure Subjected to Distributed Denial-of-Service Attacks. 2106-2117 - Dongxiao Liu, Cheng Huang, Jianbing Ni, Xiaodong Lin, Xuemin Shen:
Blockchain-Based Smart Advertising Network With Privacy-Preserving Accountability. 2118-2130 - Taotao Wang, Chonghe Zhao, Qing Yang, Shengli Zhang, Soung Chang Liew:
Ethna: Analyzing the Underlying Peer-to-Peer Network of Ethereum Blockchain. 2131-2146 - PeiYun Zhang, MengChu Zhou, Qixi Zhao, Abdullah Abusorrah, Omaimah Omar Bamasag:
A Performance-Optimized Consensus Mechanism for Consortium Blockchains Consisting of Trust-Varying Nodes. 2147-2159 - Jing Zhang, Jianquan Lu, Mengping Xing, Jinling Liang:
Synchronization of Finite Field Networks With Switching Multiple Communication Channels. 2160-2169 - Yi-Jheng Lin, Che-Hao Yu, Tzu-Hsuan Liu, Cheng-Shang Chang, Wen-Tsuen Chen:
Positively Correlated Samples Save Pooled Testing Costs. 2170-2182 - Wei Jiang, Wanchun Jiang, Jianxin Wang, Jianliang Gao, Neal N. Xiong:
ORP: An Online Rule Placement Scheme to Optimize the Traffic Overhead for Data Center Networks. 2183-2197 - Habib Mostafaei, Davinder Kumar, Gabriele Lospoto, Marco Chiesa, Giuseppe Di Battista:
DeSI: A Decentralized Software-Defined Network Architecture for Internet Exchange Points. 2198-2212 - Shiqian Li, Wei Li, Shiping Wen, Kaibo Shi, Yin Yang, Pan Zhou, Tingwen Huang:
Auto-FERNet: A Facial Expression Recognition Network With Architecture Search. 2213-2222 - Arnau Rovira-Sugranes, Fatemeh Afghah, Junsuo Qu, Abolfazl Razi:
Fully-Echoed Q-Routing With Simulated Annealing Inference for Flying Adhoc Networks. 2223-2234 - Ka-Cheong Leung, Chengdi Lai, Huiyi Ding:
Leave No Cash on the Table: An Optimal Approach for Controlling Wireless TCP AIMD. 2235-2248 - Yaoming Zhou, Siping Li, Tanmoy Kundu, Xiwen Bai, Wei Qin:
The Impact of Network Topology on Air Transportation Robustness to Pandemics. 2249-2261 - Ashish R. Hota, Jaydeep Godbole, Philip E. Paré:
A Closed-Loop Framework for Inference, Prediction, and Control of SIR Epidemics on Networks. 2262-2278 - Mengsi Cai, Ge Huang, Mirjam E. Kretzschmar, Xiaohong Chen, Xin Lu:
Extremely Low Reciprocity and Strong Homophily in the World Largest MSM Social Network. 2279-2287 - Xiaoling Ling, Jie Gong, Rui Li, Shuai Yu, Qian Ma, Xu Chen:
Dynamic Age Minimization With Real-Time Information Preprocessing for Edge-Assisted IoT Devices With Energy Harvesting. 2288-2300 - Guangcheng Li, Qinglin Zhao, Yu Wang, Tie Qiu, Kan Xie, Li Feng:
A Blockchain-Based Decentralized Framework for Fair Data Processing. 2301-2315 - Minseo Kim:
Visualization of Dynamic Network Evolution With Quantification of Node Attributes. 2316-2325 - Prabhat Kumar, Randhir Kumar, Gautam Srivastava, Govind P. Gupta, Rakesh Tripathi, Thippa Reddy Gadekallu, Neal N. Xiong:
PPSF: A Privacy-Preserving and Secure Framework Using Blockchain-Based Machine-Learning for IoT-Driven Smart Cities. 2326-2341 - Junjie Fu, Yuezu Lv, Guanghui Wen, Xinghuo Yu:
Local Measurement Based Formation Navigation of Nonholonomic Robots With Globally Bounded Inputs and Collision Avoidance. 2342-2354 - Ramya Burra, Chandramani Singh, Joy Kuri:
Service Scheduling for Random Requests With Deadlines and Linear Waiting Costs. 2355-2371 - Juan Sebastian Borrero, Majid Akhgar, Pavlo A. Krokhmal:
A Scalable Markov Chain Framework for Influence Maximization in Arbitrary Networks. 2372-2387 - Hengnian Qi, Xiaoping Wu, Naixue Xiong, Xuefeng Zhu:
A Source Prediction System for Dynamic Networks Based on TDOA Measurements. 2388-2401 - Rohit Singh, Deepak Saluja, Suman Kumar:
Graph Based Training Resource Allocation Scheme for CoMP Transmission in CRAN: A Low Complexity Solution. 2402-2411 - JoonYoung Lee, Geon-Hwan Kim, Ashok Kumar Das, YoungHo Park:
Secure and Efficient Honey List-Based Authentication Protocol for Vehicular Ad Hoc Networks. 2412-2425 - Zongsheng Zheng, Yijun Xu, Lamine Mili, Zhigang Liu, Long Peng, Yuhong Wang:
Derivative-Free Observability Analysis of a Stochastic Dynamical System. 2426-2437 - Baoqian Wang, Junfei Xie, Kejie Lu, Yan Wan, Shengli Fu:
On Batch-Processing Based Coded Computing for Heterogeneous Distributed Computing Systems. 2438-2454 - Dan Liu, Zidong Wang, Yurong Liu, Fawaz E. Alsaadi, Fuad E. Alsaadi:
Recursive State Estimation for Stochastic Complex Networks Under Round-Robin Communication Protocol: Handling Packet Disorders. 2455-2468 - Haiyang Yu, Yang Yang, Haoyang Zhang, Runkun Liu, Yilong Ren:
Reputation-Based Reverse Combination Auction Incentive Method to Encourage Vehicles to Participate in the VCS System. 2469-2481 - Kshitij Bhatta, Majeed M. Hayat, Francesco Sorrentino:
Modal Decomposition of the Linear Swing Equation in Networks With Symmetries. 2482-2494 - Lamine Mili, Jaber Valinejad, Yijun Xu:
Alleviating Fractal and Ill-Conditioning Problems of the AC Power Flow Using a Polynomial Form. 2495-2505 - Xin Wang, Ju H. Park, Huilan Yang:
An Improved Protocol to Consensus of Delayed MASs With UNMS and Aperiodic DoS Cyber-Attacks. 2506-2516 - Yujuan Han, Wenlian Lu, Shouhuai Xu:
Preventive and Reactive Cyber Defense Dynamics With Ergodic Time-Dependent Parameters is Globally Attractive. 2517-2532 - Xin Jin, Zhengxin Wang, Xiaojie Chen, Yang Cao, Guo-Ping Jiang:
Stochastic Synchronization of Multiplex Networks With Continuous and Impulsive Couplings. 2533-2544 - Keke Huang, Zili Xiang, Wenfeng Deng, Chunhua Yang, Zhen Wang:
False Data Injection Attacks Detection in Smart Grid: A Structural Sparse Matrix Separation Method. 2545-2558 - Darshana Upadhyay, Jaume Manero, Marzia Zaman, Srinivas Sampalli:
Intrusion Detection in SCADA Based Power Grids: Recursive Feature Elimination Model With Majority Vote Ensemble Algorithm. 2559-2574 - Xiaofeng Ding, Shujun Sheng, Jing Liu, Pan Zhou:
Efficient Probabilistic K-NN Computation in Uncertain Sensor Networks. 2575-2587 - Tianyu Liu, Boya Di, Peng An, Lingyang Song:
Privacy-Preserving Incentive Mechanism Design for Federated Cloud-Edge Learning. 2588-2600 - Juntao Chen, Corinne Touati, Quanyan Zhu:
A Dynamic Game Approach to Designing Secure Interdependent IoT-Enabled Infrastructure Network. 2601-2612 - Chuang Liu, Shimin Yu, Ying Huang, Zi-Ke Zhang:
Effective Model Integration Algorithm for Improving Link and Sign Prediction in Complex Networks. 2613-2624 - Ying Lin, Junji Ma, Bingjing Huang, Jinbo Zhang, Yining Zhang, Zhengjia Dai:
Predicting Human Intrinsic Functional Connectivity From Structural Connectivity: An Artificial Neural Network Approach. 2625-2638 - Rui Hou, Shuo Zhou, Yong Zheng, Mianxiong Dong, Kaoru Ota, Deze Zeng, Jiangtao Luo, Maode Ma:
Cluster Routing-Based Data Packet Backhaul Prediction Method in Vehicular Named Data Networking. 2639-2650 - Bowen Wang, Yanjing Sun, Tan Do-Duy, Emiliano Garcia-Palacios, Trung Q. Duong:
Adaptive $ D$-Hop Connected Dominating Set in Highly Dynamic Flying Ad-Hoc Networks. 2651-2664 - Shanchen Pang, Xuliang Li, Neal N. Xiong, Min Wang, Sibo Qiao:
Optimal Target User Selection Policy for D2D Wireless Caching Networks. 2665-2678 - Ping Zhao, Hongbo Jiang, Jie Li, Zhu Xiao, Daibo Liu, Ju Ren, Deke Guo:
Garbage In, Garbage Out: Poisoning Attacks Disguised With Plausible Mobility in Data Aggregation. 2679-2693 - Yujie Li, Zhoujin Tang, Zhijian Lin, Yanfei Gong, Xiaojiang Du, Mohsen Guizani:
Reinforcement Learning Power Control Algorithm Based on Graph Signal Processing for Ultra-Dense Mobile Networks. 2694-2705 - Lihua Yin, Jiyuan Feng, Hao Xun, Zhe Sun, Xiaochun Cheng:
A Privacy-Preserving Federated Learning for Multiparty Data Sharing in Social IoTs. 2706-2718
Volume 8, Number 4, October - December 2021
- Liang Zhao, Neeraj Kumar, Celimuge Wu, Jia Hu, Ahmed Al-Dubai:
Guest Editorial: Introduction to the Special Section on Intelligence-Empowered Collaboration Among Space, Air, Ground, and Sea Mobile Networks Towards B5G. 2719-2721 - Pallav Kumar Deb, Anandarup Mukherjee, Sudip Misra:
XiA: Send-It-Anyway Q-Routing for 6G-Enabled UAV-LEO Communications. 2722-2731 - Long Chen, Feilong Tang, Xu Li, Laurence T. Yang, Lijun Cao, Jiadi Yu, Luoyi Fu, Zhetao Li, Linghe Kong:
Dynamical Control Domain Division for Software-Defined Satellite-Ground Integrated Vehicular Networks. 2732-2741 - Muhammad Karam Shehzad, Arsalan Ahmad, Syed Ali Hassan, Haejoon Jung:
Backhaul-Aware Intelligent Positioning of UAVs and Association of Terrestrial Base Stations for Fronthaul Connectivity. 2742-2755 - Bin Cao, Meng Li, Xin Liu, Jianwei Zhao, Wenxi Cao, Zhihan Lv:
Many-Objective Deployment Optimization for a Drone-Assisted Camera Network. 2756-2764 - Navuday Sharma, Atul Kumar, Haris Pervaiz, Maurizio Magarini, Leila Musavian, Muhammad Mahtab Alam, Anish Jindal, Muhammad Ali Imran:
Aerial Base Station Assisted Cellular Communication: Performance and Trade-Off. 2765-2779 - Shuming Seng, Guang Yang, Xi Li, Hong Ji, Changqing Luo:
Energy-Efficient Communications in Unmanned Aerial Relaying Systems. 2780-2791 - Gunasekaran Manogaran, Ching-Hsien Hsu, P. Mohamed Shakeel, Mamoun Alazab:
Non-Recurrent Classification Learning Model for Drone Assisted Vehicular Ad-Hoc Network Communication in Smart Cities. 2792-2800 - Jin Wang, Caiyan Jin, Qiang Tang, Neal N. Xiong, Gautam Srivastava:
Intelligent Ubiquitous Network Accessibility for Wireless-Powered MEC in UAV-Assisted B5G. 2801-2813 - Xin Liu, Biaojun Lai, Linfeng Gou, Chuan Lin, Mu Zhou:
Joint Resource Optimization for UAV-Enabled Multichannel Internet of Things Based on Intelligent Fog Computing. 2814-2824 - Wang Miao, Chunbo Luo, Geyong Min, Yang Mi, Haozhe Wang:
Unlocking the Potential of 5G and Beyond Networks to Support Massive Access of Ground and Air Devices. 2825-2836 - Shaohua Wan, Jinna Hu, Chen Chen, Alireza Jolfaei, Shahid Mumtaz, Qingqi Pei:
Fair-Hierarchical Scheduling for Diversified Services in Space, Air and Ground for 6G-Dense Internet of Things. 2837-2848 - Xiaoding Wang, Hui Lin, Hongyan Zhang, Dejun Miao, QinYang Miao, Wenxin Liu:
Intelligent Drone-Assisted Fault Diagnosis for B5G-Enabled Space-Air-Ground-Space Networks. 2849-2860 - Xiaoyi Tao, Kaoru Ota, Mianxiong Dong, Heng Qi, Keqiu Li:
Congestion-Aware Scheduling for Software-Defined SAG Networks. 2861-2871 - Jiahao Liu, Baokang Zhao, Qin Xin, Jinshu Su, Wei Ou:
DRL-ER: An Intelligent Energy-Aware Routing Protocol With Guaranteed Delay Bounds in Satellite Mega-Constellations. 2872-2884 - Tianxi Ji, Yifan Guo, Qianlong Wang, Xufei Wang, Pan Li:
ECONOMY: Point Clouds-Based Energy-Efficient Autonomous Navigation for UAVs. 2885-2896 - Jian Wang, Yongxin Liu, Shuteng Niu, Houbing Song:
Optimal Routing for Beamforming-Constrained Swarm UAS Networking. 2897-2908 - Jianqiang Li, Shuqing Hu, Qinjian Li, Jie Chen, Victor C. M. Leung, Houbing Song:
Global Visual and Semantic Observations for Outdoor Robot Localization. 2909-2921 - Tongwei Zhang, Guangjie Han, Lei Yan, Yan Peng:
Fast Calculation of Underwater Acoustic Horizontal Range: A Guarantee for B5G Ocean Mobile Networks. 2922-2933 - Umar Draz, Amjad Ali, Muhammad Bilal, Tariq Ali, Muhammad Aksam Iftikhar, Alireza Jolfaei, Doug Young Suh:
Energy Efficient Proactive Routing Scheme for Enabling Reliable Communication in Underwater Internet of Things. 2934-2945 - Yang Xu, Xiaodan Yan, Yulei Wu, Yupeng Hu, Wei Liang, Jixin Zhang:
Hierarchical Bidirectional RNN for Safety-Enhanced B5G Heterogeneous Networks. 2946-2957 - Rajesh Gupta, Arpit Shukla, Sudeep Tanwar:
BATS: A Blockchain and AI-Empowered Drone-Assisted Telesurgery System Towards 6G. 2958-2967 - Muna Al-Hawawreh, Nour Moustafa, Sahil Garg, M. Shamim Hossain:
Deep Learning-Enabled Threat Intelligence Scheme in the Internet of Things Networks. 2968-2981 - Jing Zhang, Jie Cui, Hong Zhong, Irina Bolodurina, Lu Liu:
Intelligent Drone-assisted Anonymous Authentication and Key Agreement for 5G/B5G Vehicular Ad-Hoc Networks. 2982-2994 - Xingwang Li, Mengyan Huang, Yuanwei Liu, Varun G. Menon, Anand Paul, Zhiguo Ding:
I/Q Imbalance Aware Nonlinear Wireless-Powered Relaying of B5G Networks: Security and Reliability Analysis. 2995-3008 - Weiqi Liu, Liang Zhang, Nirwan Ansari:
Laser Charging Enabled DBS Placement for Downlink Communications. 3009-3018 - Jesús Arroyo, Carey E. Priebe, Vince Lyzinski:
Graph Matching Between Bipartite and Unipartite Networks: To Collapse, or Not to Collapse, That Is the Question. 3019-3033 - Jueyou Li, Chaojie Li, Wenwu Yu, Xiaomei Zhu, Xinghuo Yu:
Distributed Online Bandit Learning in Dynamic Environments Over Unbalanced Digraphs. 3034-3047 - Zuyuan Zhang, Sridhar Radhakrishnan, C. R. Subramanian, Kash Barker, Andrés D. González:
Causal Node Failures and Computation of Giant and Small Components in Networks. 3048-3060 - Renjie Zhou, Chen Liu, Jian Wan, Qing Fan, Yongjian Ren, Jilin Zhang, Naixue Xiong:
A Hybrid Neural Network Architecture to Predict Online Advertising Click-Through Rate Behaviors in Social Networks. 3061-3072 - Runkai Yang, Xiaolin Chang, Jelena V. Misic, Vojislav B. Misic, Hongyue Kang:
On Selfholding Attack Impact on Imperfect PoW Blockchain Networks. 3073-3086 - Zhengyang Hu, Xiaopeng Li, Juan Wang, Chengyi Xia, Zhen Wang, Matjaz Perc:
Adaptive Reputation Promotes Trust in Social Networks. 3087-3098 - Zhen-Hua Zhu, Bin Hu, Zhi-Hong Guan, Ding-Xue Zhang, Xin-Ming Cheng:
Collective Behaviors of Discrete-Time Multi-Agent Systems Over Signed Digraphs. 3099-3112 - Rui Zhang, Shaobo Zhang, Tian Wang, Neal N. Xiong:
A Class of Differential Data Processing-Based Data Gathering Schemes in Internet of Things. 3113-3128 - Rutvij H. Jhaveri, Sagar V. Ramani, Gautam Srivastava, Thippa Reddy Gadekallu, Vaneet Aggarwal:
Fault-Resilience for Bandwidth Management in Industrial Software-Defined Networks. 3129-3139 - Hayato Shimada, Yuichi Kawamoto, Nei Kato:
Novel Computation and Communication Resources Allocation Using Relay Communications in UAV-Mounted Cloudlet Systems. 3140-3151 - Tianchong Gao, Feng Li:
Differential Private Social Network Publication and Persistent Homology Preservation. 3152-3166 - Dong Ding, Ze Tang, Yan Wang, Zhicheng Ji, Ju H. Park:
Secure Synchronization for Cyber-Physical Complex Networks Based on Self-Triggering Impulsive Control: Static and Dynamic Method. 3167-3178 - Shanchen Pang, Nuanlai Wang, Min Wang, Sibo Qiao, Xue Zhai, Neal N. Xiong:
A Smart Network Resource Management System for High Mobility Edge Computing in 5G Internet of Vehicles. 3179-3191 - Dinh C. Nguyen, Pubudu N. Pathirana, Ming Ding, Aruna Seneviratne:
Secure Computation Offloading in Blockchain Based IoT Networks With Deep Reinforcement Learning. 3192-3208 - Yang Lou, Ruizi Wu, Junli Li, Lin Wang, Guanrong Chen:
A Convolutional Neural Network Approach to Predicting Network Connectedness Robustness. 3209-3219 - Jie Gao, Fei Hao, Zheng Pei, Geyong Min:
Learning Concept Interestingness for Identifying Key Structures From Social Networks. 3220-3232 - Zhou Gu, Peng Shi, Dong Yue, Shen Yan, Xiangpeng Xie:
Fault Estimation and Fault-Tolerant Control for Networked Systems Based on an Adaptive Memory-Based Event-Triggered Mechanism. 3233-3241 - Srinjoy Chattopadhyay, Huaiyu Dai, Do Young Eun:
Controlling Metastable Infection Patterns in Multilayer Networks via Interlink Design. 3242-3256 - Shengwei Lei, Chunhe Xia, Zhong Li, Xiaojian Li, Tianbo Wang:
HNN: A Novel Model to Study the Intrusion Detection Based on Multi-Feature Correlation and Temporal-Spatial Analysis. 3257-3274 - Lun Hu, Jun Zhang, Xiangyu Pan, Xin Luo, Huaqiang Yuan:
An Effective Link-Based Clustering Algorithm for Detecting Overlapping Protein Complexes in Protein-Protein Interaction Networks. 3275-3289 - Tianming Zhao, Weisheng Si, Wei Li, Albert Y. Zomaya:
Towards Minimizing the $R$ Metric for Measuring Network Robustness. 3290-3302 - Harir Seddiqi, Shahram Babaie:
A New Protection-Based Approach for Link Failure Management of Software-Defined Networks. 3303-3312 - Xiaona Song, Jingtao Man, Choon Ki Ahn, Shuai Song:
Synchronization in Finite/Fixed Time for Markovian Complex-Valued Nonlinear Interconnected Neural Networks With Reaction-Diffusion Terms. 3313-3324 - Lei Shi, Lulu Chen, Yuhua Cheng:
High-Order Bipartite Consensus for Multiagent Systems Over Signed Networks Subject to Asynchronous Communications. 3325-3334 - Juan Xia, Shesheng Gao, Guo Li, Xiaomin Qi, Bingbing Gao, Jiahao Zhang:
Distributed H$\infty$-Constraint Robust Estimator for Multi-Sensor Networked Hybrid Uncertain Systems. 3335-3348 - Teng Long, Shan Qu, Qi Li, Huquan Kang, Luoyi Fu, Xinbing Wang, Chenghu Zhou:
Efficient Block Propagation in Wireless Blockchain Networks and Its Application in Bitcoin. 3349-3368 - Ying Zhang, Lei Ma, Guoqing Wang, Chunyu Yang, Linna Zhou, Wei Dai:
Observer-Based Control for the Two-Time-Scale Cyber-Physical Systems: The Dual-Scale DoS Attacks Case. 3369-3379 - Haifeng Dai, Wang Li, Chunyu Yang, Guanghui Wen, Yongzheng Sun:
Time and Energy Costs for Consensus of Multi-Agent Networks With Undirected and Directed Topologies. 3380-3391 - Sina Fathi Kazerooni, Roberto Rojas-Cessa:
Countering Machine-Learning Classification of Applications by Equalizing Network Traffic Statistics. 3392-3403 - Zhengcheng Dong, Meng Tian:
Modeling and Vulnerability Analysis of Spatially Embedded Heterogeneous Cyber-Physical Systems With Functional Dependency. 3404-3416 - Kaixin Tian, Zhenhong Guo, Jie Mei, Chunjing Jiang, Guangfu Ma:
Leaderless Consensus for Second-Order Inertia Uncertain Multi-Agent Systems Under Directed Graphs Without Relative Velocity Information. 3417-3429 - Litao Ma, Wei Bian:
A Simple Neural Network for Sparse Optimization With $l_1$ Regularization. 3430-3442 - Housheng Su, Liren Zhang:
Model-Independent Containment Control for Dynamic Multiple Euler-Lagrange Systems With Disturbances and Uncertainties. 3443-3452 - Humberto Hayashi Sano, Lilian Berton:
A Temporal Event Graph Approach and Robustness Analysis for Air Transport Network. 3453-3464 - Mohammadreza Doostmohammadian, Houman Zarrabi, Hamid R. Rabiee, Usman A. Khan, Themistoklis Charalambous:
Distributed Detection and Mitigation of Biasing Attacks Over Multi-Agent Networks. 3465-3477 - Jinhuan Wang, Pengtao Chen, Bin Ma, Jiajun Zhou, Zhongyuan Ruan, Guanrong Chen, Qi Xuan:
Sampling Subgraph Network With Application to Graph Classification. 3478-3490 - Yanzhi Wu, Lu Liu:
Distributed Average Tracking for Linear Heterogeneous Multi-Agent Systems With External Disturbances. 3491-3500 - Ashok Kumar, Krishan Kumar:
A Game Theory Based Hybrid NOMA for Efficient Resource Optimization in Cognitive Radio Networks. 3501-3514
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.