


default search action
Transactions on Emerging Telecommunications Technologies, Volume 35
Volume 35, Number 1, January 2024
RESEARCH ARTICLES
- Adlin Sheeba
, R. Rajalakshmi
, B. Uma Maheswari
, A. Shamila Ebenezer
:
Secure smart city application using webservice model and mayfly optimization-based lightweight CNN. - Yuzi Yi, Nafei Zhu, Jingsha He, Anca Delia Jurcut
, Xiangjun Ma, Yehong Luo:
A privacy-sensitive data identification model in online social networks. - Arwa S. Aqel, Mamoun F. Al-Mistarihi
:
Performance analysis of dual-hop dual-branch amplify-and-forward relaying cooperative diversity system using best-path selection technique over Nakagami-m fading channels. - Fershteh Salimian Rizi, Abolfazl Falahati:
A novel statistics for the NWDP: An appropriate fading model for 5G/6G mmWave communications. - Shuang Xu
, Hao Wang, Yang Fang, Zhengpeng Zhao, Xingwei Wang, Min Huang:
Distributed and multi-layer hierarchical controller placement in software-defined satellite-terrestrial network. - Nitin Kali Raman, Himanshi Saini:
CSAT-FRMET: An energy-efficient hybrid FiWi network-based 5G model. - Mandeep Kaur
, Pankaj Deep Kaur, Sandeep Kumar Sood:
Cloud-fog assisted human tracing and disaster evacuation framework. - Deepika Gautam, Aryan Rana, Mohammad S. Obaidat, Pankaj Kumar
, Sunil Prajapat
:
A probably secure biometric-based authentication and key agreement scheme for Internet of Drones. - Amal Megahed, Mahmoud M. Elmesalawy
, Ibrahim I. Ibrahim, Ahmed M. Abd El-Haleem
:
Deep learning-assisted reconfigurable intelligent surface for enhancing 6G mobile networks. - Mandeep Kumar
, Amritpal Singh:
Anomalous vehicle recognition in smart cities using persistent bloom filter: Memory efficient and intelligent monitoring. - Arun Raj
, Durbadal Mandal:
Design and experimental analysis of fractal antennae with ground-defected structure for expected 6G and 5G mm-wave communication and wireless applications. - Luyu Zhang, Chao Zhai
, Lina Zheng
, Wen Si:
Dual intelligent reflecting surfaces aided decode-and-forward relaying with wireless power transfer. - R. Nithiavathy, Sengathir Janakiraman, Deva Priya M.
:
Adaptive Guided Differential Evolution-based Slime Mould Algorithm-based efficient Multi-objective Task Scheduling for Cloud Computing Environments. - Shikhar Bhardwaj
, Sandeep Harit, Anil Yadav:
Towards a software-defined networking model for consumer-centric content delivery network for IoT. - Sonam Bhardwaj
, Mayank Dave
:
RAKSHAM: Responsive approach to Knock-off scavenging hackers and attack mitigation. - ChengJun Guo, Amin Rezaeipanah:
Dynamic service function chains placement based on parallelized requests in edge computing environment. - Lejun Zhang, Chendong Zhu
, Zhihong Tian, Yuan Liu, Jing Qiu, Shen Su, Guangxia Xu, Ran Guo:
ICRB: An improved consensus-based redactable blockchain considering contextual consistency. - Hao Wang, Bo Li:
Double-deep Q-learning-based handover management in mmWave heterogeneous networks with dual connectivity. - Muyan Yao
, Zuodong Jin, Ruipeng Gao, Peng Qi, Dan Tao:
Pattern unlocking guided multi-modal continuous authentication for smartphone with multi-branch context-aware representation learning and auto encoder. - Zhenglei Huang
, Yupeng Du, Shujie Yang, Han Xiao, Dan Wang, Tao Sun:
Joint optimization of task scheduling and computing resource allocation for VR video services in 5G-advanced networks. - Tharindu D. Ponnimbaduge Perera
, Dushantha Nalin K. Jayakody
:
AoI-driven SWIPT-enabled UAV trajectory optimization for two-way relaying. - Amit Choksi, Mehul Shah:
Machine learning based centralized dynamic clustering algorithm for energy efficient routing in vehicular ad hoc networks. - Yangyang Sun, Xiangdong Jia
, Xianghua Han, Mangang Xie, Liang Zhang:
Physical layer security-oriented energy-efficient resource allocation and trajectory design for UAV jammer over 5G millimeter wave cognitive relay system. - Rahman Md Azadur, Chaitali J. Pawase, KyungHi Chang
:
Multi-UAV path planning utilizing the PGA algorithm for terrestrial IoT sensor network under ISAC framework. - Aashima Sharma
, Sanmeet Kaur, Maninder Singh:
A secure blockchain framework for the internet of medical things. - Tarek Bouzid
, Noureddine Chaib
, Mohamed Lahcen Bensaad
:
Crowd-sourced and incentive driven UAV system to assist with network slices. - Krati Dubey
, Sudhakar Pandey, Sanjay Kumar
:
Secrecy-enabled resource allocation in cloud-assisted IoT networks. - Mohamed Rahmani
, Ghoutia Naima Sabri, Abdelhamid Cherifi
, Abdullah S. Karar, Hichem Mrabet:
Massive capacity of novel three-dimensional OCDMA-FSO system for next generation of high-data wireless networks. - Sanjeev Shukla
, Manoj Misra, Gaurav Varshney:
HTTP header based phishing attack detection using machine learning. - Ahmed Bashir Abbasi, Muhammad Usman Hadi
:
Optimizing UAV computation offloading via MEC with deep deterministic policy gradient. - Meet Kumari
, Vivek Arya:
Flat ball topology basics multi-transceivers 100 km/2.5 Tbps gigabit-ethernet PON architecture for energy efficiency in data centers. - Amit Agarwal
, Keshav Singh:
Energy-efficient UOWC-RF systems with SLIPT. - Ashwini H. Raghavendra
, Sanjeev Gurugopinath
:
Beamforming and data detection in intelligent reflecting surfaces-assisted communication using deep learning. - Alisson Yury, Everaldo Andrade, Aldri Santos, Fernando Matos
:
Vehicular social aspects in data dissemination of urban critical events with QoS and QoE for supporting emergency response. - Ahamed Ali Samsu Aliar
, V. Gowri, A. Arockia Abins
:
Detection of distributed denial of service attack using enhanced adaptive deep dilated ensemble with hybrid meta-heuristic approach. - Jianhong Zhang, Jie Wei
, Jianan Zhang, Cao Bo:
CKAA: Certificateless key-agreement authentication scheme in digital twin telemedicine environment. - Yasir Ali
, Yuanqing Xia:
Reliability weight-based extended puncturing mechanism for polar codes using translation shift. - Qing Pan, Qimiao Zeng, Yirong Zhuang, Zhifan Yin, Jinxia Hai, Ge Chen, Jie Liang, Han Xiao, Shujie Yang:
OJUMP: Optimization for joint unicast-multicast panoramic VR live streaming system. - C. Silpa, A. Vani, K. Rama Naidu:
Optimized deep learning based hypernet convolution neural network and long short term memory for joint pilot design and channel estimation in MIMO-OFDM model. - Sajjad Shahabodini, Mobina Mansoori, Jamshid Abouei
, Konstantinos N. Plataniotis:
Recurrent neural network and federated learning based channel estimation approach in mmWave massive MIMO systems. - Haoyu Liang, Jun Wu
, Cong Wang, Mingkun Su, Jianrong Bao, Jipeng Gan, Weiwei Cao:
Energy efficiency analysis of cooperative spectrum sensing: A malicious user's perspective on Byzantine attack. - Chenyang Yin
, Yuyang Zhang, Ping Dong, Hongke Zhang:
Deep reinforcement learning-based joint task offloading and resource allocation in multipath transmission vehicular networks. - Zhuoyang Li
, Yuan He, Di Yi, Jingyang Lv:
Spatiotemporal correlation and joint coverage probability in ultra-dense mobile networks. - Praveen Kumar Kollu
, Tejaswini Sambrajyam Janjanam, Kavya Sharmila Siram:
Comparative analysis of cloud resources forecasting using deep learning techniques based on VM workload traces.
SURVEY ARTICLES
- Gaurav Kumar Soni
, Dinesh Yadav
, Ashok Kumar
:
Design consideration and recent developments in flexible, transparent and wearable antenna technology: A review. - Hatem Ibn-Khedher
, Mohammed Laroui
, Mohammed Alfaqawi, Ahlam Magnouche, Hassine Moungla, Hossam Afifi:
6G-edge support of Internet of Autonomous Vehicles: A survey. - Wai-Ming To
, Billy T. W. Yu, Andy W. L. Chung, David W. K. Chung:
Metaverse: Trend, emerging themes, and future directions. - Mohsen Khani, Shahram Jamali, Mohammad Karim Sohrabi, Mohammad Mohsen Sadr
, Ali Ghaffari:
Resource allocation in 5G cloud-RAN using deep reinforcement learning algorithms: A review. - Renie Mathews, Deepa V. Jose:
Hybrid homomorphic-asymmetric lightweight cryptosystem for securing smart devices: A review. - M. Sri Lakshmi, K. Seshadri Ramana, Gandikota Ramu, K. Shyam Sunder Reddy, C. Sasikala
, Gajula Ramesh:
Computational intelligence techniques for energy efficient routing protocols in wireless sensor networks: A critique. - Rucha Shinde, Shruti Patil, Ketan Kotecha, Vidyasagar M. Potdar, Ganeshsree Selvachandran
, Ajith Abraham:
Securing AI-based healthcare systems using blockchain technology: A state-of-the-art systematic literature review and future research directions.
Volume 35, Number 2, February 2024
RESEARCH ARTICLES
- M. Kandan, K. Jayasakthi Velmurugan
, P. Gururama Senthilvel
, N. Sathish Kumar:
Air quality forecasting-driven cloud resource allocation for sustainable energy consumption: An ensemble classifier approach. - Hemalatha Sekar
, Appranchi Sumathi
:
AFHO-based link reliable routing and power-assisted channel allocation protocol in cognitive radio networks for healthcare applications. - G. Vishnupriya, S. Anusha
, Safak Kayikci:
An efficient and secure wearable sensor based remote healthcare monitoring system using adaptive dilated transformer Bi-LSTM with gated recurrent unit. - Yousef Mostafa Shishter
, Falah H. Ali, Rupert C. D. Young:
Performance analysis of FSO communications over a generalized turbulence fading channel with pointing error. - Kausthav Pratim Kalita
, Debojit Boro
, Dhruba Kumar Bhattacharyya:
SSE_CIB: Secure storage and exchange of copyrighted images using blockchain. - K. B. Aruna, C. Arunachalaperumal:
Development of hybrid heuristic-assisted dynamic data auditing strategy in cloud sector. - M. S. Gowtham
, M. Vigenesh, M. Ramkumar
:
An artificial immune system-based algorithm for selfish node detection in Mobile Ad Hoc Networks (MANETs). - Yicong Ma, S. B. Goyal
, Anand Singh Rajawat
, Pradeep Bedi
, Safia Yasmeen:
Blockchain-based Human Intelligent Systems for Smart City Safety. - Mamta, Shivani Sharma
, Sachin Kumar
:
An efficient fine-grained searchable encryption for secure communication in IoT-based vehicular social networks. - Carlos Daniel de Sousa Bezerra
, Flávio Henrique Teles Vieira
, Anderson da Silva Soares
:
Deep-Q-Network hybridization with extended Kalman filter for accelerate learning in autonomous navigation with auxiliary security module. - Karim Kamoun, Fatma Hmissi, Sofiane Ouni, Sonia Ouni:
Improvement of MQTT semantic to minimize data flow in IoT platforms based on distributed brokers.
Volume 35, Number 3, March 2024
RESEARCH ARTICLES
- Balamurali Pydi
, A. V. Prabu, Amrit Mukherjee
, Deepak Kumar Jain, S. Ravi Chand, Noel Anurag Prashanth
:
An improved low-carbon intelligent agriculture system with energy optimization principles using wireless IoT environment. - Gefei Zhu, Jun Wu
, Mingkun Su, Xiaorong Xu, Mingyuan Dai, Lei Qiao, Jipeng Gan, Jiangtao He, Weiwei Cao:
Dynamic sliding window-cooperative spectrum sensing against massive SSDF attack in interweave cognitive internet of things. - Riccardo Rusca
, Alex Carluccio, Claudio Casetti
, Paolo Giaccone
:
Privacy-preserving WiFi-based crowd monitoring.
Volume 35, Number 4, April 2024
RESEARCH ARTICLES
- Sisi Zhu, Alireza Souri
:
Blockchain technology for energy-aware mobile crowd sensing approaches in Internet of Things. - Fei Wang
, Nan Yang, Pethuraj Mohamed Shakeel, Vijayalakshmi Saravanan:
Machine learning for mobile network payment security evaluation system.
SPECIAL ISSUE PAPERS
- Vikram Puri, Aman Kataria
, Vishal Sharma
:
Artificial intelligence-powered decentralized framework for Internet of Things in Healthcare 4.0.
RESEARCH ARTICLES
- Alireza Esfahani
, Jérémie Decouchant
, Marcus Völp
, Shahid Mumtaz
, Kostromitin Konstantin Igorevich
:
SI-AKAV: Secure integrated authentication and key agreement for cellular-connected IoT devices in vehicular social networks. - Vankamamidi Srinivasa Naresh
, Sivaranjani Reddi, V. V. L. Divakar Allavarpu
:
Provable secure dynamic lightweight group communication in VANETs. - Nirav Patel, Arpit Shukla, Sudeep Tanwar
, Dhananjay Singh
:
KRanTi: Blockchain-based farmer's credit scheme for agriculture-food supply chain. - Jianghui Liu
, Hongtao Zhang
:
UcnPowerNet: Residual learning based clustering and interference coordination in 5G user-centric networks.
SPECIAL ISSUE ARTICLE
- Sathish Kumar, Velliangiri Sarveshwaran
, Periyasami Karthikeyan, Saru Kumari
, Sachin Kumar
, Muhammad Khurram Khan
:
A survey on the blockchain techniques for the Internet of Vehicles security.
RESEARCH ARTICLES
- Ashutosh Dhar Dwivedi
, Rajani Singh, Keshav Kaushik
, Raghava Rao Mukkamala, Waleed S. Alnumay
:
Blockchain and artificial intelligence for 5G-enabled Internet of Things: Challenges, opportunities, and solutions.
SPECIAL ISSUE ARTICLES
- Ritu Nigam, Deepak Kumar Sharma
, Satbir Jain, Kartik Krishna Bhardwaj, Siddhant Banyal:
AI-enabled trust-based routing protocol for social opportunistic IoT networks. - Youcef Djenouri
, Gautam Srivastava
, Asma Belhadi, Jerry Chun-Wei Lin
:
Intelligent blockchain management for distributed knowledge graphs in IoT 5G environments. - Abdullah Lakhan
, Mazin Abed Mohammed
, Sergei A. Kozlov, Joel J. P. C. Rodrigues
:
Mobile-fog-cloud assisted deep reinforcement learning and blockchain-enable IoMT system for healthcare workflows.
SURVEY ARTICLES
- Pronaya Bhattacharya
, Umesh Bodkhe, Mohd. Zuhair
, Mamoon Rashid
, Xuan Liu
, Ashwin Verma
, Ram Kishan Dewangan:
Amalgamation of blockchain and sixth-generation-envisioned responsive edge orchestration in future cellular vehicle-to-anything ecosystems: Opportunities and challenges.
RESEARCH ARTICLES
- Waqas Buksh, Ying Guo, Saleem Iqbal, Kashif Naseer Qureshi
, Jaime Lloret
:
Trust-oriented peered customized mechanism for malicious nodes isolation for flying ad hoc networks. - Jiahui Huang
, Teng Huang
, Huanchun Wei, Jiehua Zhang, Hongyang Yan, Duncan S. Wong, Haibo Hu
:
zkChain: A privacy-preserving model based on zk-SNARKs and hash chain for efficient transfer of assets. - Guiyun Qin, Limin Li, Pengtao Liu, Chengyu Hu, Shanqing Guo:
Blockchain-based secure deduplication of encrypted data supporting client-side semantically secure encryption without trusted third party. - Tong Zhang, Yujue Wang, Yong Ding
, Xuhang Jiang, Hai Liang, Huiyong Wang:
Privacy-preserving blockchain-based contract signing with multi-party supervision. - Mu Han, Shuai Wu:
A search optimized blockchain-based verifiable searchable symmetric encryption framework. - Yudai Xue, Jinsong Wang, Kai Shi, Hongwei Zhang:
A privacy-preserving model for blockchain-based data sharing in the industrial internet. - Muhammad Jamshaid Iqbal
, Muhammad Farhan
, Farhan Ullah
, Gautam Srivastava
, Sohail Jabbar:
Intelligent multimedia content delivery in 5G/6G networks: A reinforcement learning approach. - Vu Khanh Quy
, Dang Van Anh
, Nguyen Tien Ban
, Nguyen Minh Quy
, Gwanggil Jeon
:
A cross-layer routing approach for MANET-assisted IoT applications. - Mohammad Kamrul Hasan
, Md. Sarwar Hosain
, Md. Kawsar Ahmed
, Shayla Islam
, Arwa N. Aledaily, Safia Yasmeen
, Khairul Akram Zainol Ariffin
:
Encrypted images in a V-BLAST assisted SC-FDMA wireless communication system.
SURVEY ARTICLES
- Anindya Nag, Md. Mehedi Hassan
, Ayontika Das, Anurag Sinha
, Nisarga Chand, Anwesha Kar, Vandana Sharma
, Ahmed Alkhayyat:
Exploring the applications and security threats of Internet of Thing in the cloud computing paradigm: A comprehensive study on the cloud of things.
RESEARCH ARTICLES
- Thavavel Vaiyapuri, K. Shankar
, Surendran Rajendran, Sachin Kumar
, Vimal Gaur
, Deepak Gupta
, Meshal Alharbi:
Automated cyberattack detection using optimal ensemble deep learning model. - Sourav Mahapatra
, Ditipriya Sinha:
Smart h-Chain: A blockchain based healthcare framework with insurance fraud detection. - Ashok Kumar, Saurabh Singh, Mahadev, Rahul Kumar
:
An intelligent human-centric systems to diagnose breast cancer using machine learning and optimized feature selection techniques. - Yali Tai, Anand Singh Rajawat
, S. B. Goyal
, Pradeep Bedi
, Constance Amannah:
Internet of things-enabled intelligent systems for remote chronic disease monitoring.
SURVEY ARTICLES
- Priyanka Verma, Nitesh Bharot, John G. Breslin, Mukta Sharma, Nisha Chaurasia, Ankit Vidyarthi
:
Uncovering collateral damages and advanced defense strategies in cloud environments against DDoS attacks: A comprehensive review.
RESEARCH ARTICLES
- Mohammed Sayeeduddin Habeeb
, Tummala Ranga Babu:
Coarse and fine feature selection for Network Intrusion Detection Systems (IDS) in IoT networks. - Yue Hu, Ning Cao, Hao Lu, Yunzhe Jiang, Yinqiu Liu, Xiaoming He:
Multi-dimensional resource management with deep deterministic policy gradient for digital twin-enabled Industrial Internet of Things in 6 generation. - Yi-Hua Zhou
, Bin Tang
, Yu-Guang Yang
:
A lattice-based searchable encryption scheme with multi-user authorization for the certificateless cloud computing environment. - Mengge Li
, Liang Wang, Xiaoming Wang, Yaguang Lin, Jiarong Du, Miao Ma:
Fairness-aware eMBB/URLLC spectrum resource multiplexing to ensure reliability in vehicular networks. - Sahar Barzegari Banadkoki, Mahmoud Ferdosizade Naeiny
:
Multitarget direction of arrival trajectory estimation using BiLSTM and sequential allocation. - Ritu Dewan, Sharik Ahmad
, Arun Kumar Rana
, Tapsi Nagpal, Vinish Kumar
, Ngangbam Herojit Singh
, Visvam Devadoss Ambeth Kumar
, Awnish Kumar:
IoT-based energy efficient and longer lifetime compression approach for healthcare applications. - Manal Abdullah Alohali, Naif Alasmari, Nabil Sharaf Almalki, Majdi Khalid
, Mrim M. Alnfiai
, Mohammed Assiri
, Sitelbanat Abdelbagi:
Textual emotion analysis using improved metaheuristics with deep learning model for intelligent systems.
SURVEY ARTICLES
- Ali Alferaidi, Kusum Yadav
, Yasser Alharbi, Jalawi Sulaiman Alshudukhi
, Abdulrahman Alreshidi, Eissa Jaber Alreshidi, Mnaouer Kachout, Md. Haidar Sharif:
Challenges in human centric intelligent systems for wireless sensor networks: A state of art.
RESEARCH ARTICLES
- Fahad Razaque Mughal
, Jingsha He, Nafei Zhu, Mutiq Almutiq
, Fayaz Ali Dharejo, Deepak Kumar Jain, Saqib Hussain, Zulfiqar Ali Zardari:
An intelligent Hybrid-Q Learning clustering approach and resource management within heterogeneous cluster networks based on reinforcement learning. - Dharminder Chaudhary
, M. S. P. Durgarao, Dheerendra Mishra
, Saru Kumari
:
A module lattice based construction of post quantum secure blockchain architecture. - Karan Belsare, Manwinder Singh
, Anudeep Gandam
, Praveen Kumar Malik, Ritu Agarwal
, Anita Gehlot:
An integrated approach of IoT and WSN using wavelet transform and machine learning for the solid waste image classification in smart cities. - Mubeen Aslam
, Lukman bin A. B. Rahim, Junzo Watada, Saddaf Rubab
, Muhammad Attique Khan, Salman A. AlQahtani
, Thippa Reddy Gadekallu
:
Cloud migration framework clustering method for social decision support in modernizing the legacy system. - Binita Kumari, Ajay Kumar Yadav, Korhan Cengiz, Bashir Salah
:
Integrating CLDs and machine learning through hybridization for human-centric wireless networks. - Tippireddy Srinivasa Reddy, Rajeev Arya
:
Vortex-induced vibration effects in underwater acoustic wireless sensor networks. - Timothy Malche, Priti Maheshwary, Pradeep Kumar Tiwari, Ahmed Hussein Alkhayyat, Abhinav Bansal, Raghvendra Kumar:
Efficient solid waste inspection through drone-based aerial imagery and TinyML vision model. - Vishal Sharma
, Rohit Beniwal
, Vinod Kumar
:
Towards secure IoT system from a smart city perspective: An optimized algorithm and implementation. - Anichur Rahman
, Md. Saikat Islam Khan, Antonio Montieri
, Md. Jahidul Islam
, Md. Razaul Karim
, Mahedi Hasan, Dipanjali Kundu, Mostofa Kamal Nasir
, Antonio Pescapè
:
BlockSD-5GNet: Enhancing security of 5G network through blockchain-SDN with ML-based bandwidth prediction.
Volume 35, Number 5, May 2024
RESEARCH ARTICLES
- Saravanan Selvaraj
, Manikandan Nanjappan, Mythili Nagalingam, Uma Maheswari Balasubramanian:
Crossover Boosted Grey Wolf Optimizer-based framework for leader election and resource allocation in Intrusion Detection Systems for MANETs.
ERRATUM
- Correction to "Multi-objective metaheuristic optimization-based clustering with network slicing technique for internet of things-enabled wireless sensor networks in 5G systems".