


default search action
IEEE Transactions on Network and Service Management, Volume 22
Volume 22, Number 1, February 2025
- Malte Tashiro

, Emile Aben
, Romain Fontugne
:
Metis: Selecting Diverse Atlas Vantage Points. 3-14 - Cong Zhou

, Baokang Zhao
, Fengxiao Tang
, Biao Han
, Baosheng Wang:
Dynamic Multi-Objective Service Function Chain Placement Based on Deep Reinforcement Learning. 15-29 - Katalin Hajdú-Szücs

, Péter Vaderna, Zsófia Kallus
, Péter Kersch, János Márk Szalai-Gindl, Sándor Laki
:
Ensemble Graph Attention Networks for Cellular Network Analytics: From Model Creation to Explainability. 30-44 - Yong Xiao

, Jianxun Liu
, Guosheng Kang
, Buqing Cao
:
Group Feature Aggregation for Web Service Recommendations. 45-57 - Yacine Anser

, Chrystel Gaber
, Jean-Philippe Wary, Samia Bouzefrane
, Méziane Yacoub, Onur Kalinagac, Gürkan Gür:
Liability and Trust Analysis Framework for Multi-Actor Dynamic Microservices. 58-71 - Tailai Song

, Gianluca Perna
, Paolo Garza
, Michela Meo
, Maurizio Matteo Munafò:
Packet Loss in Real-Time Communications: Can ML Tame Its Unpredictable Nature? 72-91 - Linghao Wang

, Lu Lu
, Miao Wang
, Zhiqiang Li, Hongwei Yang, Shuyong Zhu, Yujun Zhang
:
SNS: Smart Node Selection for Scalable Traffic Engineering in Segment Routing Networks. 92-106 - Roberto Gonçalves Pacheco

, Divya J. Bajpai
, Mark Shifrin
, Rodrigo S. Couto
, Daniel Sadoc Menasché
, Manjesh K. Hanawal
, Miguel Elias M. Campista
:
UCBEE: A Multi Armed Bandit Approach for Early-Exit in Neural Networks. 107-120 - Behshid Shayesteh

, Chunyan Fu
, Amin Ebrahimzadeh
, Roch H. Glitho
:
Adaptive Feature Selection for Predicting Application Performance Degradation in Edge Cloud Environments. 121-138 - Yibo Zhang

, Xiangwang Hou
, Guoyu Du
, Qi Li
, Mian Ahmad Jan
, Alireza Jolfaei
, Muhammad Usman
:
Machine Learning-Based Reliable Transmission for UAV Networks With Hybrid Multiple Access. 139-150 - Yu-Zhen Janice Chen

, Daniel S. Menasché
, Don Towsley
:
On Collaboration in Distributed Parameter Estimation With Resource Constraints. 151-167 - Yuyang Zhou

, Guang Cheng
, Zhi Ouyang, Zongyao Chen
:
Resource-Efficient Low-Rate DDoS Mitigation With Moving Target Defense in Edge Clouds. 168-186 - Xu Yu

, Yan Lu, Feng Jiang
, Qiang Hu
, Junwei Du, Dunwei Gong
:
A Cross-Domain Intrusion Detection Method Based on Nonlinear Augmented Explicit Features. 187-197 - Jianhua Wang

, Xiaolin Chang
, Jelena V. Misic
, Vojislav B. Misic
, Lin Li
, Yingying Yao:
CRS-FL: Conditional Random Sampling for Communication-Efficient and Privacy-Preserving Federated Learning. 198-208 - Renato Souza Silva

, Luís Felipe M. de Moraes
:
GonoGo - Assessing the Confidence Level of Distribute Intrusion Detection Systems Alarms Based on BGP. 209-219 - Yonghan Wu

, Jin Li
, Min Zhang, Bing Ye
, Xiongyan Tang:
A Comprehensive and Efficient Topology Representation in Routing Computation for Large-Scale Transmission Networks. 220-241 - Jatinder Kumar, Deepika Saxena, Jitendra Kumar, Ashutosh Kumar Singh, Athanasios V. Vasilakos:

An Adaptive Evolutionary Neural Network Model for Load Management in Smart Grid Environment. 242-254 - Yujie Zhao

, Tao Peng
, Yichen Guo
, Yijing Niu
, Wenbo Wang
:
An Intelligent Scheme for Energy-Efficient Uplink Resource Allocation With QoS Constraints in 6G Networks. 255-269 - Yang Gao

, Jun Tao
, Zuyan Wang
, Yifan Xu
:
Analytical Scheduling for Selfishness Detection in OppNets Based on Differential Game. 270-283 - Qiyuan Fan

, Xue Li
, Puming Wang
, Xin Jin, Shaowen Yao
, Shengfa Miao, Sizhang Li
, Min An
, Jing Xu:
BDIP: An Efficient Big Data-Driven Information Processing Framework and Its Application in DDoS Attack Detection. 284-298 - Xiangshuo Zheng

, Wenting Shen
, Ye Su
, Yuan Gao:
DIADD: Secure Deduplication and Efficient Data Integrity Auditing With Data Dynamics for Cloud Storage. 299-316 - Ting Yu

, Zijian Gao
, Kele Xu
, Xu Wang
, Peichang Shi
, Bo Ding
, Dawei Feng
:
Dual Temporal Masked Modeling for KPI Anomaly Detection via Similarity Aggregation. 317-330 - Van Tong

, Cuong Dao
, Hai Anh Tran
, Duc Tran
, Huynh Thi Thanh Binh
, Nam-Thang Hoang
, Truong X. Tran
:
Encrypted Traffic Classification Through Deep Domain Adaptation Network With Smooth Characteristic Function. 331-343 - Yingjun Ye

, Ke Ruan, Weihao Yu
:
Evaluation and Optimization of Backbone Network Reliability Problems Using Decision Diagram Methods. 344-360 - Daniel Ayepah-Mensah

, Guolin Sun
, Gordon Owusu Boateng
, Guisong Liu
:
Federated Policy Distillation for Digital Twin-Enabled Intelligent Resource Trading in 5G Network Slicing. 361-379 - Jia Xu

, Xiao Liu
, Jiong Jin
, Wuzhen Pan, Xuejun Li
, Yun Yang
:
Holistic Service Provisioning in a UAV-UGV Integrated Network for Last-Mile Delivery. 380-393 - Qianwei Meng

, Qingjun Yuan
, Weina Niu
, Yongjuan Wang
, Siqi Lu
, Guangsong Li, Xiangbin Wang, Wenqi He:
IIT: Accurate Decentralized Application Identification Through Mining Intra- and Inter-Flow Relationships. 394-408 - Endri Goshi

, Fidan Mehmeti
, Thomas F. La Porta
, Wolfgang Kellerer
:
Modeling and Analysis of mMTC Traffic in 5G Core Networks. 409-425 - Hua Wang, Yanxian Bi, Fulong Yan

, Long Wang
, Jie Zhang
, Lena Wosinska
:
Multi-Beam Satellite Optical Networks: A Joint Time-Slot Resource Scheduling for End-to-End Services From a Networking Perspective. 426-438 - Redha A. Alliche

, Ramon Aparicio-Pardo
, Lucile Sassatelli
:
O-DQR: A Multi-Agent Deep Reinforcement Learning for Multihop Routing in Overlay Networks. 439-455 - Lifan Mei

, Jinrui Gou, Jingrui Yang, Yujin Cai, Yong Liu
:
On Routing Optimization in Networks With Embedded Computational Services. 456-469 - Lihui Zhang, Gang Sun

, Rulin Liu, Wei Quan
, Hongfang Yu
, Dusit Niyato
:
Priority-Dominated Traffic Scheduling Enabled ATS in Time-Sensitive Networking. 470-484 - Tamás Lévai

, Balázs Vass
, Gábor Rétvári:
Programmable Real-Time Scheduling of Disaggregated Network Functions: A Theoretical Model. 485-498 - Ailing Xiao

, Sheng Wu
, Yongkang Ou, Ning Chen
, Chunxiao Jiang
, Wei Zhang
:
QoE-Fairness-Aware Bandwidth Allocation Design for MEC-Assisted ABR Video Transmission. 499-515 - Xuwei Fan

, Zhipeng Cheng
, Ning Chen
, Lianfen Huang
, Xianbin Wang
:
QoE-Oriented Dependent Task Scheduling Under Multi-Dimensional QoS Constraints Over Distributed Networks. 516-531 - He Bai

, Hui Li
, Jianming Que, Abla Smahi, Minglong Zhang
, Peter Han Joo Chong
, Shuo-Yen Robert Li, Xiyu Wang, Ping Lu:
QSCCP: A QoS-Aware Congestion Control Protocol for Information-Centric Networking. 532-556 - Theodoros Giannakas

, Dimitrios Tsilimantos
, Apostolos Destounis
, Thrasyvoulos Spyropoulos:
Fast Edge Resource Scaling With Distributed DNN. 557-571 - Chang-Lin Chen

, Hanhan Zhou, Jiayu Chen
, Mohammad Pedramfar, Tian Lan, Zheqing Zhu, Chi Zhou, Pol Mauri Ruiz, Neeraj Kumar, Hongbo Dong, Vaneet Aggarwal
:
Learning-Based Two-Tiered Online Optimization of Region-Wide Datacenter Resource Allocation. 572-581 - Saksham Katwal

, Nidhi Sharma
, Krishan Kumar
:
A Deep Learning Approach for Throughput Enhanced Clustering and Spectrally Efficient Resource Allocation in Ultra-Dense Networks. 582-591 - Krishna Pal Thakur, Basabdatta Palit

:
A QoS-Aware Uplink Spectrum and Power Allocation With Link Adaptation for Vehicular Communications in 5G Networks. 592-604 - Na Lin

, Xiao Han, Ammar Hawbani
, Yunhe Sun, Yunchong Guan
, Liang Zhao
:
Deep Reinforcement Learning-Based Dual-Timescale Service Caching and Computation Offloading for Multi-UAV Assisted MEC Systems. 605-617 - Renchao Xie

, Wen Wen
, Wenzheng Wang
, Qinqin Tang
, Xiaodong Duan, Lu Lu
, Tao Sun
, Tao Huang
, Fei Richard Yu
:
Incentive Mechanism Design for Trust-Driven Resources Trading in Computing Force Networks: Contract Theory Approach. 618-634 - Merim Dzaferagic

, Bruno Missi Xavier, Diarmuid Collins, Vince D'Onofrio, Magnos Martinello, Marco Ruffini
:
ML-Based Handover Prediction Over a Real O-RAN Deployment Using RAN Intelligent Controller. 635-647 - Patrick Luiz de Araújo

, Murillo Guimarães Carneiro
, Luis M. Contreras
, Rafael Pasquini
:
MTP-NT: A Mobile Traffic Predictor Enhanced by Neighboring and Transportation Data. 648-659 - Hiba Hojeij

, Mahdi Sharara
, Sahar Hoteit
, Véronique Vèque
:
On Flexible Placement of O-CU and O-DU Functionalities in Open-RAN Architecture. 660-674 - Xiao He

, Shanchen Pang
, Haiyuan Gui, Kuijie Zhang, Nuanlai Wang
, Shihang Yu
:
Online Offloading and Mobility Awareness of DAG Tasks for Vehicle Edge Computing. 675-690 - Shachi Sharma

, Prakash Datt Bhatt
:
Performance Modeling of IoT-Cloud Gateway Under Diverse Traffic Characteristics. 691-701 - Zhaowei Zhang, Chunfeng Liu, Wenyu Qu, Zhao Zhao, Weisi Guo:

PRobust: A Percolation-Based Robustness Optimization Model for Underwater Acoustic Sensor Networks. 702-717 - Bing Tang

, Zhikang Wu, Wei Xu, Buqing Cao
, Mingdong Tang, Qing Yang:
TP-MDU: A Two-Phase Microservice Deployment Based on Minimal Deployment Unit in Edge Computing Environment. 718-731 - Subhrajit Barick

, Chetna Singhal
:
UAV-Assisted MEC Architecture for Collaborative Task Offloading in Urban IoT Environment. 732-743 - Reo Uneyama

, Takehiro Sato
, Eiji Oki
:
Flow Update Model Based on Probability Distribution of Migration Time in Software-Defined Networks. 744-759 - Yanfei Wu

, Liang Liang
, Yunjian Jia
, Wanli Wen
:
HFL-TranWGAN: Knowledge-Driven Cross-Domain Collaborative Anomaly Detection for End-to-End Network Slicing. 760-776 - Niloy Saha

, Nashid Shahriar
, Muhammad Sulaiman
, Noura Limam
, Raouf Boutaba
, Aladdin Saleh:
Monarch: Monitoring Architecture for 5G and Beyond Network Slices. 777-790 - Shimin Sun

, Xiangyun Liu
, Meiyu Wang, Ze Wang
, Li Han
:
Predictive Control Plane Balancing in SD-IoT Networks Based on Elitism Genetic Algorithm and Non-Cooperative Game Theory. 791-806 - Yahuza Bello

, Ahmed Refaey Hussein
:
Dynamic Policy Decision/Enforcement Security Zoning Through Stochastic Games and Meta Learning. 807-821 - Ehsan Nowroozi

, Imran Haider, Rahim Taheri
, Mauro Conti
:
Federated Learning Under Attack: Exposing Vulnerabilities Through Data Poisoning Attacks in Computer Networks. 822-831 - Bo Yang

, Liquan Chen
, Jiaorui Shen
, Huaqun Wang
, Yang Ma:
FHE-Based Publicly Verifiable Sealed-Bid Auction Protocol Atop Cross-Blockchain. 832-845 - Yin Wang

, Na Xia
, Bin Chen
, Yutao Yin
, Lei Chen
, Zijian Wang
, Sizhou Wei
, Ke Zhang
:
Flow Adjustment and Scale-Free Reliable Topology Control for Underwater Acoustic Sensor Networks. 846-859 - Xin Tang

, Luchao Jin
, Jing Bai
, Linjie Shi, Yudan Zhu
, Ting Cui:
Key Transferring-Based Secure Deduplication for Cloud Storage With Resistance Against Brute-Force Attacks. 860-876 - Zhengran Tian, Hao Wang

, Zhi Li
, Ziyu Niu, Xiaochao Wei
, Ye Su
:
MDTL: Maliciously Secure Distributed Transfer Learning Based on Replicated Secret Sharing. 877-891 - Muhammad Asghar Khan

, Neeraj Kumar
, Saeed Hamood Alsamhi
, Gordana Barb
, Justyna Zywiolek
, Insaf Ullah
, Fazal Noor
, Jawad Ali Shah, Abdullah Mohammed Almuhaideb
:
Security and Privacy Issues and Solutions for UAVs in B5G Networks: A Review. 892-912 - Ashutosh Dutta

, Ehab Al-Shaer
, Ehsan Aghaei, Qi Duan
, Hasan Yasar:
Security Control Grid for Optimized Cyber Defense Planning. 913-929 - Kai Zhao

, Xiaowei Chuo, Fangchao Yu, Bo Zeng
, Zhi Pang, Lina Wang
:
SplitAUM: Auxiliary Model-Based Label Inference Attack Against Split Learning. 930-940 - Hongping Gan

, Hejie Zheng
, Zhangfa Wu
, Chunyan Ma
, Jie Liu
:
TFD-Net: Transformer Deviation Network for Weakly Supervised Anomaly Detection. 941-954
Volume 22, Number 2, April 2025
- Kengo Tajiri

, Ryoichi Kawahara:
Optimization of Data and Model Transfer for Federated Learning to Manage Large-Scale Network. 958-973 - Zhenyu Fu, Juan Liu

, Yuyi Mao
, Long Qu
, Ling Fu Xie
, Xijun Wang
:
Energy-Efficient UAV-Assisted Federated Learning: Trajectory Optimization, Device Scheduling, and Resource Management. 974-988 - Lo-Yao Yeh

, Sheng-Po Tseng, Chia-Hsun Lu, Chih-Ya Shen
:
Auditable Homomorphic-Based Decentralized Collaborative AI With Attribute-Based Differential Privacy. 989-1004 - Xinlei Yu

, Yijing Lin
, Zhipeng Gao
, Hongyang Du
, Dusit Niyato
:
Dynamic and Fast Convergence for Federated Learning via Optimized Hyperparameters. 1005-1018 - Yingying Wu

, Bomin Mao
, Nei Kato
:
MSFL: Model-Safeguarded Federated Learning With Intelligent Reflecting Surface for Industrial Networks. 1019-1028 - Wathsara Daluwatta

, Ibrahim Khalil
, Shehan Edirimannage
, Mohammed Atiquzzaman
:
UaaS-SFL: Unlearning as a Service for Safeguarding Federated Learning. 1029-1045 - Abhijit Biswas, Subhrajyoti Deb

, Nirmalya Kar
, Joy Lal Sarkar
, Ayan Mondal
:
Event-Triggered Sliding Mode Controller for Cognitive Internet of Things. 1046-1054 - Aroosa Hameed

, John Violos
, Nina Santi
, Aris Leivadeas
, Nathalie Mitton
:
FeD-TST: Federated Temporal Sparse Transformers for QoS Prediction in Dynamic IoT Networks. 1055-1069 - Yanli Xu

, Zhou Kong
:
Joint Frame Preemption and Credit-Based Shaping Scheduling for Real-Time Transmission. 1070-1082 - Canghai Wu

, Lingdan Chen
, Huanliang Xiong, Jianwen Hu:
USMN-SCA: A Blockchain Sharding Consensus Algorithm With Tolerance for an Unlimited Scale of Malicious Nodes. 1083-1098 - Chengjie Li

, Lidong Zhu
, Zhen Zhang
:
Toward 6G Networks: Architecture and Strategy for Information Security Transmission Based on Multi-Source Heterogeneous Data. 1099-1107 - Sotirios T. Spantideas

, Anastasios E. Giannopoulos, Panagiotis Trakadas:
Smart Mission Critical Service Management: Architecture, Deployment Options, and Experimental Results. 1108-1128 - Curtis Rookard

, Anahita Khojandi
:
Unsupervised Machine Learning for Cybersecurity Anomaly Detection in Traditional and Software-Defined Networking Environments. 1129-1144 - Giannis Savva

, Konstantinos Manousakis
, Georgios Ellinas
:
A Network Coding Optimization Approach for Physical Layer Security in Elastic Optical Networks. 1145-1159 - Xingyu He

, Xiankai Li
, Guisong Yang
, Shi Chang, Jiehan Zhou
:
A Network Connectivity-Aware Reinforcement Learning Method for Task Exploration and Allocation. 1160-1173 - Yogita Pimpalkar

, Sharvari Ravindran
, Jyotsna Bapat
, Debabrata Das
:
A Novel E2E Path Selection Algorithm for Superior QoS and QoE for 6G Services. 1174-1187 - Yukti Kaura

, Brejesh Lall
, Ranjan K. Mallik
, Amit Singhal
:
Adaptive Scheduling of Shared Grant-Free Resources for Heterogeneous Massive Machine Type Communication in 5G and Beyond Networks. 1188-1204 - Jun Dai

, Xinbin Li
, Song Han
, Junzhi Yu
, Zhixin Liu
, Tongwei Zhang
:
An Extended Bandit-Based Game Scheme for Distributed Joint Resource Allocation in Underwater Acoustic Communication Networks. 1205-1218 - Navya Vuppalapati

, T. G. Venkatesh
:
Candidate Selection Algorithms for Hybrid IP/SDN Networks With Multi-Link Failures. 1219-1231 - Meng Sun

, Tao Zhang
, Liang Liu
:
Constellation Configuration Optimization Method for User Distribution Characteristics of LEO Satellite Networks. 1232-1246 - Qiang Tang

, Bao Li
, Halvin Yang
, Yan Li, Shiming He, Kun Yang
:
Delay and Load Fairness Optimization With Queuing Model in Multi-AAV Assisted MEC: A Deep Reinforcement Learning Approach. 1247-1258 - Xinyu Yuan

, Yan Qiao
, Zhenchun Wei
, Zeyu Zhang, Minyue Li, Pei Zhao, Rongyao Hu, Wenjing Li
:
Diffusion Models Meet Network Management: Improving Traffic Matrix Analysis With Diffusion-Based Approach. 1259-1275 - Omar Nassef

, Toktam Mahmoodi
, Federico Chiariotti
, Stephen H. Johnson:
DRel: Dynamically Assigning Per-Packet Reliability at the Transport Layer. 1276-1294 - Abdul Basit

, Muddasir Rahim
, Tri Nhu Do
, Nadir H. Adam
, Georges Kaddoum
:
DRL-Based Maximization of the Sum Cross-Layer Achievable Rate for Networks Under Jamming. 1295-1313 - Peiran Zhong

, Fanqin Zhou
, Lei Feng
, Wenjing Li
:
FINT: Freshness-Based In-Band Network-Wide Telemetry in Resource-Constrained Environments. 1314-1329 - Sharvari N. P

, Dibakar Das, Jyotsna Bapat
, Debabrata Das
:
Improved Q-Learning-Based Multi-Hop Routing for UAV-Assisted Communication. 1330-1344 - Jiangang Liu

, Hanjiang Luo
, Hang Tao
, Jiahong Liu
, Jiehan Zhou
:
JLOS: A Cooperative UAV-Based Optical Wireless Communication With Multi-Agent Reinforcement Learning. 1345-1356 - Parisa Fard Moshiri, Murat Simsek

, Burak Kantarci
:
Joint Optimization of Completion Ratio and Latency of Offloaded Tasks With Multiple Priority Levels in 5G Edge. 1357-1371 - Nguyen Xuan Tung

, Trinh Van Chien
, Dinh Thai Hoang
, Won-Joo Hwang
:
Jointly Optimizing Power Allocation and Device Association for Robust IoT Networks Under Infeasible Circumstances. 1372-1390 - Xindi Hou

, Shuai Gao
, Ningchun Liu
, Fangtao Yao
, Bo Lei, Hongke Zhang
, Sajal K. Das
:
L3DML: Facilitating Geo-Distributed Machine Learning in Network Layer. 1391-1408 - Amit Dilip Patil

, Abdorasoul Ghasemi
, Hermann de Meer:
Optimal Redundant Sensor Placement for Protection Blinding in Active Distribution Grids. 1409-1419 - Ren-Hung Hwang

, Tsai-Ying Chou, Jia-You Lin
, Didik Sudyana
, Yuan-Cheng Lai
, Ying-Dar Lin
:
Optimal Resource Allocation for AIoT as a Service Under Various Service Scenarios and Architectures. 1420-1436 - Ruowen Yan

, Qiao Li
, Huagang Xiong
:
Optimizing Traffic Management in Airborne Power Line Communication Networks: A Credit-Based Shaping Approach Using Network Calculus. 1437-1449 - Madhu Donipati

, Ankur Jaiswal
, Abhishek Hazra
, Nabajyoti Mazumdar
, Jagpreet Singh:
Optimizing UAV-Based Data Collection in IoT Networks With Dynamic Service Time and Buffer-Aware Trajectory Planning. 1450-1460 - Xiaobo Fan

:
Path Selection via Mutual Coherence Optimization in Network Monitoring. 1461-1472 - Xiaonan Wang

, Yajing Song
:
Personalized Preference and Social Attribute-Based Data Sharing for Information-Centric IoT. 1473-1483 - Luis Velasco

, Gianluca Graziadei
, Sima Barzegar
, Marc Ruiz
:
Provisioning of Time-Sensitive and Non-Time-Sensitive Flows With Assured Performance. 1484-1499 - Abdulsamet Dagasan

, Ezhan Karasan
:
Resilient Multi-Hop Autonomous UAV Networks With Extended Lifetime for Multi-Target Surveillance. 1500-1513 - Tianhao Ouyang

, Haipeng Yao
, Wenji He
, Tianle Mai
, Fu Wang
, F. Richard Yu
:
Self-Adaptive Dynamic In-Band Network Telemetry Orchestration for Balancing Accuracy and Stability. 1514-1530 - Ahsan Raza Khan

, Habib Ullah Manzoor
, Rao Naveed Bin Rais
, Sajjad Hussain
, Lina S. Mohjazi
, Muhammad Ali Imran
, Ahmed Zoha
:
Semantic-Aware Federated Blockage Prediction (SFBP) in Vision-Aided Next-Generation Wireless Network. 1531-1543 - Vikash Kumar Bhardwaj, Gagan Mundada

, Omm Prakash Sahoo
, Mahendra Kumar Shukla
, Om Jee Pandey
:
SINR-Delay Constrained Node Localization in RIS-Assisted Time-Varying IoT Networks Using ML Frameworks. 1544-1557 - Guosheng Kang

, Hongshuai Ren
, Wanjun Chen, Jianxun Liu
, Buqing Cao
, Yu Xu
:
Web API Recommendation via Exploring Textual and Structural Semantics With Contrastive Learning and Joint Training. 1558-1568 - Saifullah Khalid

, Ishfaq Ahmad, Hansheng Lei:
A Consortium Blockchain-Based Approach for Energy Sharing in Distribution Systems. 1569-1582 - Zhiwei Wang

:
A Decentralized Oracle Network Constructed From Weighted Schnorr Multisignature. 1583-1593 - C. Venkatesan

, S. Jeevanantham
, Rebekka B.
:
A Lightweight Physical Layer Authentication-Based Blockchain Consensus Mechanism for Edge Networks. 1594-1607 - Longxia Huang

, Chengzhi Ge
, Xue Mao
, Shui Yu
:
DARB: Decentralized, Accountable and Redactable Blockchain for Data Management. 1608-1617 - Chaofeng Lin, Jinchuan Tang

, Shuping Dang
, Gaojie Chen
:
Priority-Based Blockchain Packing for Dependent Industrial IoT Transactions. 1618-1628 - Min An

, Xuan Zhang
, Jishu Wang
, Qiyuan Fan, Chen Gao, LinYu Li
, Cuizhen Lu, Nan Li, Yingchen Liu:
RLChain: A DRL Approach for Blockchain Performance Optimization Toward IIoT. 1629-1645 - Madhura Adeppady

, Alberto Conte
, Paolo Giaccone
, Holger Karl
, Carla-Fabiana Chiasserini
:
Dynamic Management of Constrained Computing Resources for Serverless Services. 1646-1663 - Haijie Wu

, Wangbo Shen
, Weiwei Lin
, Wei Li
, Keqin Li
:
End-Edge-Cloud Heterogeneous Resources Scheduling Method Based on RNN and Particle Swarm Optimization. 1664-1676 - Soyi Jung

, Jae-Hyun Kim
, Joongheon Kim
:
Intelligent Extra Resource Allocation for Cooperative Awareness Message Broadcasting in Cellular-V2X Networks. 1677-1689 - Xiang Xie

, Jianxun Liu
, Buqing Cao
, Qian Peng
, Shanpeng Liu
, Guosheng Kang
:
Service Recommendation Based on Multi-Level View Contrastive Learning. 1690-1702 - Hangfan Li

, Li Li, Shuaishuai Tan
, Xiaoxiong Zhong
, Sheng Zhang
:
A Multi-User Effective Computation Offloading Mechanism for MEC System: Batched Multi-Armed Bandits Approach. 1703-1715 - Bing Shi

, Zihao Chen:
A Stackelberg Game-Based Trajectory Planning Strategy for Multi-AAVs-Assisted MEC System. 1716-1726 - Yifei Zhu

, Lei Feng
, Fanqin Zhou
, Wenjing Li
:
An Adaptive Ensemble Learning Paradigm With Spatial-Temporal Feature Extraction for Wireless Traffic Prediction. 1727-1743 - Lei Feng

, Chaorui Liao, Yingji Shi
, Fanqin Zhou
:
Explainable and Energy-Efficient Selective Ensemble Learning in Mobile Edge Computing Systems. 1744-1759 - Shuqin Cao

, Libing Wu
, Rui Zhang
, Jianfeng Lu
, Dan Wu
, Zhuangzhuang Zhang
:
Hypergraph Attention Recurrent Network for Cellular Traffic Prediction. 1760-1774 - Maryam Bandali

, Jaume Rius i Riu, Andreas Lewitzki, Dibbendu Roy, James Gross
:
ML-Based Fault Management Automation in Large-Scale Fixed and Mobile Telecommunication Networks. 1775-1787 - Jiaxin Zeng

, Xiaobo Zhou
, Keqiu Li:
Resource-Efficient Joint Service Caching and Workload Scheduling in Ultra-Dense MEC Networks: An Online Approach. 1788-1800 - Cheng Ren

, Jinsong Gao
, Yu Wang
, Yaxin Li
:
A Fastformer Assisted DRL Method on Energy Efficient and Interference Aware Service Provisioning. 1801-1811 - Erison Ballasheni, Dritan Nace, Artur Tomaszewski, Alban Zyle

:
A Probabilistic Optimization Approach to the Equitable Controller Location Problem. 1812-1824 - Mohamed Abderrahmane Madani

, Fen Zhou
, Ahmed Meddahi
:
Deploying Disaster-Resilient Service Function Chains Using Adaptive Multi-Path Routing. 1825-1840 - Amina Hentati

, Amin Ebrahimzadeh
, Roch H. Glitho, Fatna Belqasmi
, Rabeb Mizouni
:
Deterministic and Dynamic Joint Placement and Scheduling of VNF-FGs for Remote Robotic Surgery. 1841-1858 - Hnin Pann Phyu

, Diala Naboulsi
, Razvan Stanica
:
ICE-CREAM: Multi-Agent Fully Cooperative Decentralized Framework for Energy Efficiency in RAN Slicing. 1859-1873 - Nemanja Ðeric

, Amir Varasteh
, Andreas Blenk
, Wolfgang Kellerer
:
NAGA: A Deterministic Programmable Network With Update Timing Guarantees. 1874-1888 - Tien Van Do

, Nam H. Do, Csaba Rotter
, T. V. Lakshman, Csaba Biró, Tamás Bérczes:
Properties of Horizontal Pod Autoscaling Algorithms and Application for Scaling Cloud-Native Network Functions. 1889-1898 - Dongliang Zhang

, Lei Wang
, Amin Rezaeipanah
:
Toward Deploying Parallelized Service Function Chains Under Dynamic Resource Request in Multi-Access Edge Computing. 1899-1910 - Ammar Kamal Abasi, Moayad Aloqaily

, Mohsen Guizani
:
6G mmWave Security Advancements Through Federated Learning and Differential Privacy. 1911-1928 - Adam Kadi

, Lyes Khoukhi
, Jouni Viinikka
, Pierre-Edouard Fabre:
Adapting to the Evolution: Enhancing Intrusion Detection Through Machine Learning in the QUIC Protocol Era. 1929-1944 - Taeyun Kim

, Joonwoo Kim
, Hochan Lee
, Seoyul Oh, Sangheon Pack
:
An Efficient Winner and Payment Determination Algorithm in Reverse Auction for Edge Federation. 1945-1954 - Yali Yuan

, Yangyang Du
, Guang Cheng
:
Class Incremental Website Fingerprinting Attack Based on Dynamic Expansion Architecture. 1955-1971 - Luyao Zou

, Quang Hieu Vo
, Kitae Kim
, Huy Q. Le
, Chu Myaet Thwal
, Chaoning Zhang
, Choong Seon Hong
:
Cyber Attacks Prevention Toward Prosumer-Based EV Charging Stations: An Edge-Assisted Federated Prototype Knowledge Distillation Approach. 1972-1999 - Ke Gu

, Yiming Zuo, Jingjing Tan
, Bo Yin
, Zheng Yang, Xiong Li
:
Dual-Layered Model Protection Scheme Against Backdoor Attacks in Fog Computing-Based Federated Learning. 2000-2016 - Xiaojun Zhang

, Qing Liu, Bingyun Liu, Yuan Zhang
, Jingting Xue
:
Dynamic Certificateless Outsourced Data Auditing Mechanism Supporting Multi-Ownership Transfer via Blockchain Systems. 2017-2030 - Gerald Budigiri

, Christoph Baumann
, Eddy Truyen
, Wouter Joosen
:
Elastic Cross-Layer Orchestration of Network Policies in the Kubernetes Stack. 2031-2058 - Saihua Cai

, Han Tang, Jinfu Chen
, Tianxiang Lv, Wenjun Zhao, Chunlei Huang:
GSA-DT: A Malicious Traffic Detection Model Based on Graph Self-Attention Network and Decision Tree. 2059-2073 - Junming Zhang

, Jingru Wang, Shigong Long, Yanen Li, Lun Wang:
Interval Mean Estimation Under (ε,δ)-Local Differential Privacy. 2074-2086 - Jiajie Shen

, Bochun Wu
, Wang Xiang, Sai Zou, Wenyong Wang
, Laizhong Cui
, Wei Ni:
Novel Bandwidth-Aware Network Coding for Fast Cloud-of-Clouds Disaster Backup. 2087-2105 - Qian Zhang

, Yi He
, Yue Xiao, Xiaoli Zhang
, Chunhua Song
:
OTA-Key: Over-the-Air Key Management for Flexible and Reliable IoT Device Provision. 2106-2119 - Liam Daly Manocchio, Yaying Chen

, Siamak Layeghy
, David Gwynne, Marius Portmann
:
P4-Secure: In-Band DDoS Detection in Software Defined Networks. 2120-2137 - Xun Liu

, Jian Yang
, Shuangwu Chen
, Huasen He
, Xiaofeng Jiang
:
PRFL: Achieving Efficient Robust Aggregation in Privacy-Preserving Federated Learning. 2138-2155 - Chenlu Zhang

, Takehiro Sato
, Eiji Oki
:
Robust Deployment Model for Parallelized Service Function Chains Against Uncertain Traffic Arrival Rates. 2156-2180 - Enio Marku, Colin Boyd, Gergely Biczók

:
SafeLib: A Comprehensive Framework for Secure Outsourcing of Network Functions. 2181-2198 - Qiang Fu

, Jiajia Liu
, Jiadai Wang
, Jiapeng Li
:
SecHARQ: A Secure Scheme for HARQ-Assisted NR V2X Communications. 2199-2213 - Meet Udeshi

, Prashanth Krishnamurthy
, Ramesh Karri
, Farshad Khorrami
:
Tamper-Proof Network Traffic Measurements on a NIC for Intrusion Detection. 2214-2224 - Jaidip Kotak

, Idan Yankelev
, Idan Bibi, Yuval Elovici
, Asaf Shabtai
:
VPN-Encrypted Network Traffic Classification Using a Time-Series Approach. 2225-2242 - Xingyu Yang

, Jipeng Hou
, Lei Xu
, Liehuang Zhu
:
zkFabLedger: Enabling Privacy Preserving and Regulatory Compliance in Hyperledger Fabric. 2243-2263
Volume 22, Number 3, June 2025
- Jie Zhang, Degan Zhang, Meng Qiao, E. Hong-Lin, Ting Zhang, Ping Zhang:

New Offloading Method of Computing Task Based on Gray Wolf Hunting Optimization Mechanism for the IOV. 2264-2277 - Eiji Oki

, Ryotaro Taniguchi, Kazuya Anazawa, Takeru Inoue
:
Design of Multiple-Plane Twisted and Folded Clos Network Guaranteeing Admissible Blocking Probability. 2278-2294 - Yu-Fang Chen, Frank Yeong-Sung Lin, Sheng-Yung Hsu, Tzu-Lung Sun, Yennun Huang

, Chiu-Han Hsiao
:
Adaptive Traffic Control: OpenFlow-Based Prioritization Strategies for Achieving High Quality of Service in Software-Defined Networking. 2295-2310 - Liang Feng

, Cunqing Hua
, Jianan Hong
:
Zero-Determinant Incentive Strategy for Transaction Trading in Blockchain System. 2311-2322 - Abderrafi Abdeddine

, Youssef Iraqi
, Loubna Mekouar
:
An Efficient Task Allocation in Mobile Crowdsensing Environments. 2323-2342 - Neha Sharma

, Mayank Swarnkar
, Divyanshu
:
DLAZE: Detecting DNS Tunnels Using Lightweight and Accurate Method for Zero-Day Exploits. 2343-2353 - Jialin Zhang

, Wei Liang
, Bo Yang
, Huaguang Shi
, Ying-Chang Liang
:
Minimizing Data Collection Latency for Coexisting Time-Critical Wireless Networks With Tree Topologies. 2354-2369 - Sayed M. Taheri, Achintha Ihalage

, Prateek Mishra
, Sean Coaker, Faris Muhammad, Hamed S. Al-Raweshidy
:
Domain Tailored Large Language Models for Log Mask Prediction in Cellular Network Diagnostics. 2370-2381 - Junwei Zhou

, Yuyang Gao, Ying Zhu
, Xiangtian Yu
, Yanchao Yang, Cheng Tan
, Jianwen Xiang
:
DRLLog: Deep Reinforcement Learning for Online Log Anomaly Detection. 2382-2395 - Xin Yang

, Yimin Guo
:
IAR-AKA: An Efficient Authentication Scheme for Healthcare Tactile Internet Beyond Conventional Security. 2396-2411 - Na Xia

, Lei Chen
, Meng Li
, Yutao Yin
, Ke Zhang
:
Joint Double Auction-Based Channel Selection in Wireless Monitoring Networks. 2412-2426 - Arad Kotzer, Bence Ladóczki, János Tapolcai

, Ori Rottenstreich
:
Addressing Scalability Issues of Blockchains With Hypergraph Payment Networks. 2427-2440 - Giampaolo Bovenzi

, Francesco Cerasuolo
, Domenico Ciuonzo
, Davide Di Monda
, Idio Guarino
, Antonio Montieri
, Valerio Persico
, Antonio Pescapè
:
Mapping the Landscape of Generative AI in Network Monitoring and Management. 2441-2472 - Xinrui Dong

, Yingxu Lai
, Xiao Zhang
, Xinyu Xu
:
Counteracting New Attacks in CPS: A Few-Shot Class-Incremental Adaptation Strategy for Intrusion Detection System. 2473-2488 - Jun Jiang

, Bin Wang
, Quan Tang
, Guoxiang Zhong
, Xuhao Tang
, Joel J. P. C. Rodrigues
:
Incremental Semi-Supervised Learning for Data Streams Classification in Internet of Things. 2489-2501 - Jing Mei

, Cuibin Zeng
, Zhao Tong
, Zhibang Yang
, Keqin Li
:
Stackelberg Game-Based Pricing and Offloading for the DVFS-Enabled MEC Systems. 2502-2515 - Gerald Tietaa Maale

, Noble Arden Elorm Kuadey
, Yeasin Arafat, Thomas Kwantwi
, Guolin Sun
, Guisong Liu
:
Multi-Task Learning for UAV Trajectory and Caching With Federated Cloud-Assisted Knowledge Distillation. 2516-2533 - Slawomir Hanczewski

, Maciej Stasiak
, Joanna Weissenberg
, Michal Weissenberg
:
Modeling of Heterogeneous 5G Network Slice for Smart Real-Time Railway Communications. 2534-2545 - Mengjie Guo

, Guochu Shou
, Yaqiong Liu
, Yihong Hu
:
An Enhanced Reconfiguration for Deterministic Transmission in Time-Sensitive Networks. 2546-2563 - Giulio Sidoretti

, Lorenzo Bracciale
, Stefano Salsano
, Hesham Elbakoury
, Pierpaolo Loreti
:
DIDA: Distributed In-Network Intelligent Data Plane for Machine Learning Applications. 2564-2579 - Giuseppe Ruggeri

, Marica Amadeo
, Claudia Campolo
, Antonella Molinaro
:
Optimal Placement of the Virtualized Federated Learning Aggregation Function at the Edge. 2580-2594 - Dev Gurung

, Shiva Raj Pokhrel
, Gang Li
:
Quantum Federated Learning for Metaverse: Analysis, Design, and Implementation. 2595-2606 - Abdullah Aljumah, Tariq Ahamed Ahanger

, Imdad Ullah:
Challenges in Securing UAV IoT Framework: Future Research Perspective. 2607-2629 - Ximin Li

, Xiaodong Xu
, Guo Wei, Xiaowei Qin
:
Unveiling Real-Time Stalling Detection for Video Streaming Traffic. 2630-2646 - Xuan Zheng

, Xiuli Ma
, Lifu Xu
, Yanliang Jin
, Chun Ke
:
Augmentation and Fusion: Multi-Feature Fusion-Based Self-Supervised Learning Approach for Traffic Tables. 2647-2662 - Jinghui Chen, Qingqing Cai, Gang Sun

, Hongfang Yu
, Dusit Niyato
:
CRP: A Cluster-Based Routing Protocol for Lightweight Nodes in Payment Channel Networks. 2663-2678 - Shoya Imanaka, Akio Kawabata

, Bijoy Chand Chatterjee
, Eiji Oki
:
Distributed Server Allocation for Internet-of-Things Monitoring Services With Preventive Start-Time Optimization Against Server Failure. 2679-2701 - Xiaochang Guo

, Gang Liu
, Haoyan Ling
, Lei Meng
, Tao Wang:
BECHAIN: A Sharding Blockchain With Higher Security. 2702-2714 - Rui Tang

, Ruizhi Zhang
, Yongjun Xu, Chuan Liu, Chongwen Huang
, Chau Yuen
:
Resource Allocation for Underwater Acoustic Sensor Networks With Partial Spectrum Sharing: When Optimization Meets Deep Reinforcement Learning. 2715-2730 - Panagiotis I. Nikolaidis

, John S. Baras
:
Robust Resource Sharing in Network Slicing via Hypothesis Testing. 2731-2746 - André V. S. Xavier

, Raul C. Almeida
, Leonardo Didier Coelho
, Joaquim F. Martins-Filho
:
Classification-Model Applied to Routing Problem in Flexible-Grid Optical Networks. 2747-2763 - Ruiwei Hou

, Fucai Zhou
, Qiang Wang, Zi Jiao, Jintong Sun, Zongye Zhang
:
Revokable Blockchain-Enabled Ranked Multi-Keyword Attribute-Based Searchable Encryption Scheme With Mobile Edge Computing for Vehicular. 2764-2779 - Kun Wu, Jiayuan Chen

, Lucheng Chen, Zili Liu, Changyan Yi
, Shuai Xu
, Junyi Wang
, Jiawen Kang
:
QoE-Aware Joint Visual and Haptic Signal Transmission With Adaptive Data Compression for Immersive Interactions in Human Digital Twin. 2780-2794 - Itamar Cohen

:
Bandwidth Efficient Cache Selection and Cache-Content Advertisement. 2795-2806 - Yiannis Papageorgiou

, Merkouris Karaliopoulos
, Kostas Choumas, Iordanis Koutsopoulos
:
Joint Controller Placement and TDMA Scheduling in Software Defined Wireless Multihop Networks. 2807-2821 - Tianbo Wang

, Mengyao Liu
, Huacheng Li
, Lei Zhao
, Changnan Jiang, Chunhe Xia
, Baojiang Cui
:
ArchSentry: Enhanced Android Malware Detection via Hierarchical Semantic Extraction. 2822-2837 - Qifeng Liu, Qilin Fan

, Xu Zhang
, Xiuhua Li
, Kai Wang
, Qingyu Xiong:
DRL-Based Time-Varying Workload Scheduling With Priority and Resource Awareness. 2838-2852 - Huili Liu

, Yinglong Ma
, Chenqi Guo
, Xiaofeng Liu
, Tingdong Wang
:
MOHFL: Multi-Level One-Shot Hierarchical Federated Learning With Enhanced Model Aggregation Over Non-IID Data. 2853-2865 - Min Jia

, Liang Zhang
, Jian Wu
, Qing Guo
, Xuemai Gu
:
Asynchronous Federated Caching Strategy for Multi-Satellite Collaboration Based on Deep Reinforcement Learning. 2866-2881 - Lijun He

, Ziye Jia
, Juncheng Wang
, Erick Lansard, Zhu Han
, Chau Yuen
:
Joint Power Allocation and Task Scheduling for Data Offloading in Non-Geostationary Orbit Satellite Networks. 2882-2896 - Vikash Kumar Bhardwaj, Aagat Shukla, Om Jee Pandey

:
Energy-Efficient Node Localization in Time-Varying UAV-RIS-Assisted and Cluster-Based IoT Networks. 2897-2913 - Mengyuan Zhang

, Juan Fang
, Ziyi Teng
, Yaqi Liu
, Shen Wu
:
Joint DNN Partitioning and Task Offloading Based on Attention Mechanism-Aided Reinforcement Learning. 2914-2927
Volume 22, Number 4, August 2025
- Shashank Motepalli

, Hans-Arno Jacobsen
:
Decentralization in PoS Blockchain Consensus: Quantification and Advancement. 2930-2943 - Pavlos S. Bouzinis

, Panagiotis I. Radoglou-Grammatikis
, Ioannis Makris
, Thomas Lagkas
, Vasileios Argyriou
, Georgios Th. Papadopoulos
, Panagiotis G. Sarigiannidis
, George K. Karagiannidis
:
StatAvg: Mitigating Data Heterogeneity in Federated Learning for Intrusion Detection Systems. 2944-2955 - Yi-Han Xu

, Rong-Xing Ding, Xiao-Ren Xu, Zhou Ding
, Wen Zhou
:
A DDPG Hybrid With Graph Scheme for Resource Management in Digital Twin-Assisted Biomedical Cyber-Physical Systems. 2956-2970 - Kai Peng

, Jialu Guo, Hao Wang
, Jintao He
, Zhiqing Zou, Tianping Deng, Menglan Hu
:
Delay-Aware Joint Microservice Deployment and Request Routing in Multi-Edge Environments Based on Reinforcement Learning. 2971-2986 - Pedro Martinez-Julia

, Ved P. Kafle
, Hitoshi Asaeda
:
Intelligent Network Service Automation: Improving Accuracy and Efficiency in Network Management. 2987-3002 - Qiaolun Zhang

, Omran Ayoub
, Ruikun Wang, Emanuele Viadana, Francesco Musumeci
, Massimo Tornatore
:
Capacity Sharing for Survivable Virtual Network Mapping Against Double-Link Failures. 3003-3015 - Alessandro Tundo

, Federica Filippini
, Francesco Regonesi, Michele Ciavotta
, Marco Savi
:
Decentralized Edge Workload Forecasting With Gossip Learning. 3016-3031 - Jaime Galán-Jiménez

, Marco Polverini
, Juan Luis Herrera
, Francesco Giacinto Lavacca
, Javier Berrocal
:
ELTO: Energy Efficiency-Load Balancing Trade-Off Solution to Handle With Conflicting Metrics in Hybrid IP/SDN Scenarios. 3032-3045 - Milan Groshev

, Lanfranco Zanzi
, Carmen Delgado
, Xi Li
, Antonio de la Oliva
, Xavier Costa-Pérez
:
Energy-Aware Joint Orchestration of 5G and Robots: Experimental Testbed and Field Validation. 3046-3059 - Qingwei Tang

, Wei Sun
, Zhi Liu
, Yang Xiao
, Qiyue Li
, Xiaohui Yuan
, Qian Zhang:
Multi-Agent Reinforcement Learning-Based Delay and Power Optimization for UAV-WMN Substation Inspection. 3060-3076 - Wei-Che Chien, Gwanggil Jeon

, Hsin-Hung Cho
:
Multi-Objective Optimization of 3-D Cell Deployment in Sustainable B5G/6G Networks: Balancing Performance and Sustainability. 3077-3091 - Luqi Wang

, Shanchen Pang
, Haiyuan Gui
, Xiao He
, Nuanlai Wang
, Sibo Qiao
, Zhiyuan Zhao
:
Sustainable Energy-Efficient Multi-Objective Task Processing Based on Edge Computing. 3092-3105 - Awaneesh Kumar Yadav

, Shalitha Wijethilaka
, Madhusanka Liyanage
:
Blockchain-Based Cross-Operator Network Slice Authentication Protocol for 5G Communication. 3106-3119 - Dahina Koulougli

, Kim Khoa Nguyen
, Mohamed Cheriet
:
Cost Optimization of FlexEthernet Over Elastic Optical Network Fronthaul Design. 3120-3137 - Takanori Hara

, Masahiro Sasabe
:
eBPF-Based Ordered Proof of Transit for Trustworthy Service Function Chaining. 3138-3149 - Tao Huang

, Jingyuan Liu
, Zheng Chang
, Yao Wei, Xu Zhao, Ying-Chang Liang
:
Energy Efficient Spectrum Sharing and Resource Allocation for 6G Air-Ground Integrated Networks. 3150-3161 - Mahdi Nouri

, Sima Sobhi-Givi
, Hamid Behroozi
, Mahrokh G. Shayesteh
, Md. Jalil Piran
, Zhiguo Ding:
Joint Slice Resource Allocation and Hybrid Beamforming With Deep Reinforcement Learning for NOMA-Based Vehicular 6G Communications. 3162-3178 - Feng Zhou

, Kefeng Guo
, Gaojian Huang
, Xingwang Li
, Evangelos K. Markakis
, Ilias Politis
, Muhammad Asif
:
Performance Evaluations for RIS-Aided Satellite Aerial Terrestrial Integrated Networks With Link Selection Scheme and Practical Limitations. 3179-3190 - Tingnan Bao

, Aisha Syed
, William Sean Kennedy
, Melike Erol-Kantarci
:
Sustainable Task Offloading in Secure UAV-Assisted Smart Farm Networks: A Multi-Agent DRL With Action Mask Approach. 3191-3200 - Hai Zhu, Xingsi Xue

, Mengmeng Xu, Byung-Gyu Kim
, Xiaohong Lyu
, Shalli Rani
:
Zero-Trust Blockchain-Enabled Secure Next-Generation Healthcare Communication Network. 3201-3212 - Jiajun Chen

, Chunqiang Hu
, Weihong Sheng
, Ruinian Li
, Ruifeng Zhao
, Jiguo Yu
:
A Trust-Based Personalized Differential Privacy Guarantees for Online Social Networks. 3213-3227 - Mohamed Elloumi

, Md. Zoheb Hassan
, Georges Kaddoum
:
Spectrum Sharing in Internet-of-Vehicles Networks: Digital Twin-Empowered Proactive Interference Management Approach. 3228-3248 - Mani Shekhar Gupta

, Akanksha Srivastava
, Krishan Kumar
:
PORA: A Proactive Optimal Resource Allocation Framework for Spectrum Management in Cognitive Radio Networks. 3249-3261 - Cyril Shih-Huan Hsu

, Jorge Martín-Pérez
, Danny De Vleeschauwer
, Luca Valcarenghi
, Xi Li
, Chrysa Papagianni
:
A Deep RL Approach on Task Placement and Scaling of Edge Resources for Cellular Vehicle-to-Network Service Provisioning. 3262-3280 - Shiming He

, Ying Zhang
, Diqing Liang
, Pradip Kumar Sharma
:
An Unsupervised Malicious Web Request Detection Based on Transformer and Contrastive Learning. 3281-3294 - Jing Zhu

, Dan Wang, Jiao Xing, Shuxin Qin, Gaofeng Tao
, Pingping Chen, Zuqing Zhu
:
Bilevel Optimization for Provisioning Heterogeneous Traffic in Deterministic Networks. 3295-3308 - Latif U. Khan

, Waseem Ullah
, Sami Muhaidat
, Mohsen Guizani
, Bechir Hamdaoui:
Block Successive Upper-Bound Minimization for Resource Scheduling in Wireless Metaverse. 3309-3324 - Xiaojie Zhang

, Saptarshi Debroy
, Peng Wang
, Keqin Li
:
DeepRB: Deep Resource Broker Based on Clustered Federated Learning for Edge Video Analytics. 3325-3340 - Wenjing Gao

, Jia Yu
:
Enabling Privacy-Preserving Top-k Hamming Distance Query on the Cloud. 3341-3354 - Shuaibing Lu

, Xin Jin
, Jie Wu
, Shuyang Zhou, Jackson Yang, Ran Yan, Haiming Liu
, Zhi Cai
:
Enhanced Multi-Stage Optimization of Dynamic QoS-Aware Service Caching and Updating in Mobile Edge Computing. 3355-3369 - Jinshui Wang

, Yao Xin
, Chongwu Dong
, Lingfeng Qu, Yiming Ding
:
ERPC: Efficient Rule Partitioning Through Community Detection for Packet Classification. 3370-3387 - Shengxiang Hu

, Guobing Zou
, Bofeng Zhang
, Shaogang Wu, Shiyi Lin
, Yanglan Gan
, Yixin Chen
:
GACL: Graph Attention Collaborative Learning for Temporal QoS Prediction. 3388-3402 - Antonino Angi

, Alessio Sacco
, Guido Marchetto
:
LLNet: An Intent-Driven Approach to Instructing Softwarized Network Devices Using a Small Language Model. 3403-3418 - Haiyuan Li

, Peizheng Li
, Karcius Day Rosario Assis
, Juan Marcelo Parra Ullauri
, Adnan Aijaz
, Shuangyi Yan
, Dimitra Simeonidou
:
NetMind+: Adaptive Baseband Function Placement With GCN Encoding and Incremental Maze-Solving DRL for Dynamic and Heterogeneous RANs. 3419-3432 - Ying-Dar Lin, Yin-Tao Ling

, Yuan-Cheng Lai
, Didik Sudyana
:
Reinforcement Learning for AI as a Service: CPU-GPU Task Scheduling for Preprocessing, Training, and Inference Tasks. 3433-3448 - Lingling Wang

, Zhengyin Zhang
, Mei Huang
, Keke Gai
, Jingjing Wang
, Yulong Shen
:
RoPA: Robust Privacy-Preserving Forward Aggregation for Split Vertical Federated Learning. 3449-3462 - Xueqi Peng

, Wenting Shen
, Yang Yang
, Xi Zhang
:
Secure Deduplication and Cloud Storage Auditing With Efficient Dynamic Ownership Management and Data Dynamics. 3463-3479 - Dana Haj Hussein

, Mohamed Ibnkahla
:
Toward Intelligent Intent-Based Network Slicing for IoT Systems: Enabling Technologies, Challenges, and Vision. 3480-3495 - Wenxian Li

, Pingang Cheng, Yong Feng
, Nianbo Liu
, Ming Liu
, Yingna Li
:
A Blockchain-Assisted Hierarchical Data Aggregation Framework for IIoT With Computing First Networks. 3496-3512 - Fuhao Yang, Hua Wu

, Xiangyu Zheng
, Jinfeng Chen, Xiaoyan Hu
, Jing Ren
:
A Detection Scheme for Multiplexed Asymmetric Workload DDoS Attacks in High-Speed Networks. 3513-3527 - Yi-Huai Hsu

, Chen-Fan Chang
, Chao-Hung Lee:
A DRL-Based Spectrum Sharing Scheme for Multi-MNO in 5G and Beyond. 3528-3541 - Hao Yang

, Liangmin Guo
, Taochun Wang
, Chengmei Lv:
A Novel Lightweight Dynamic Trust Evaluation Model for Edge Computing. 3542-3554 - Junfeng Tian

, Yiting Wang
, Yue Shen
:
A Security-Enhanced Certificateless Anonymous Authentication Scheme With High Computational Efficiency for Mobile Edge Computing. 3555-3572 - Karcius D. R. Assis

, Raul C. Almeida
, Hojjat Baghban
, Alex Ferreira dos Santos
, Raouf Boutaba
:
A Two-Stage Reconfiguration in Network Function Virtualization: Toward Service Function Chain Optimization. 3573-3585 - Kaijie Wang

, Zhicheng Bao
, Kaijun Liu
, Haotai Liang
, Chen Dong
, Xiaodong Xu
, Lin Li
:
Adaptive Bitrate Video Semantic Increment Transmission System Based on Buffer and Semantic Importance. 3586-3600 - Genxin Chen

, Jin Qi
, Jialin Hua, Ying Sun
, Zhenjiang Dong
, Yanfei Sun
:
AFAS: Arbitrary-Freedom Adaptive Scheduling for Multiworkflow Cloud Computing via Deep Reinforcement Learning. 3601-3616 - Cristian Zilli

, Alessio Sacco
, Flavio Esposito
, Guido Marchetto
:
ClearNET: Enhancing Transparency in Opaque Network Models Using Explainable AI (XAI) for Efficient Traffic Engineering. 3617-3631 - Akio Kawabata

, Sanetora Hiragi, Bijoy Chand Chatterjee
, Eiji Oki
:
Distributed Processing Network Design Scheme for Virtual Application Processing Platform. 3632-3645 - Chao Zha

, Zhiyu Wang
, Yifei Fan, Bing Bai
, Yinjie Zhang
, Sainan Shi
, Ruyun Zhang
:
DM-IDS - A Network Intrusion Detection Method Based on Dual-Modal Fusion. 3646-3661 - Yating Li

, Le Wang
, Liang Xue
, Jingwei Liu
, Xiaodong Lin
:
Efficient and Privacy-Enhancing Non-Interactive Periocular Authentication for Access Control Services. 3662-3675 - Vaishnavi Kasuluru

, Luis Blanco, Engin Zeydan:
Enhancing Open RAN Operations: The Role of Probabilistic Forecasting in Network Analysis. 3676-3691 - Jin-Xian Liu

, Jenq-Shiou Leu
:
ETCN-NNC-LB: Ensemble TCNs With L-BFGS-B Optimized No Negative Constraint-Based Forecasting for Network Traffic. 3692-3704 - Fangyu Zhang

, Yuang Chen
, Hancheng Lu
, Yongsheng Huang:
Network-Aware Reliability Modeling and Optimization for Microservice Placement. 3705-3720 - Zhenxing Chen

, Pan Gao, Teng-Fei Ding
, Zhi-Wei Liu
, Ming-Feng Ge
:
Practical Prescribed-Time Resource Allocation of NELAs With Event-Triggered Communication and Input Saturation. 3721-3731 - Soosan Naderi Mighan

, Jelena V. Misic
, Vojislav B. Misic
:
Probabilistic Analysis of Validator Lifecycle and Fork Resolution in Ethereum 2.0-Like PoS System. 3732-3742 - Retraction Notice A Hybrid Multistage DNN-Based Collaborative IDPS for High-Risk Smart Factory Networks. 3743

- (Withdrawn) Retraction Notice Communication-Efficient Personalized Federated Meta-Learning in Edge Networks. 3744


manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














