


default search action
Peer-to-Peer Networking and Applications, Volume 15
Volume 15, Number 1, January 2022
- K. Mohaideen Pitchai:

Determination of energy efficient optimal sojourn location of mobile sinks in clustered corona-based wireless sensor networks. 1-12 - S. Shiny, J. Jasper

:
Decentralized access control technique with multi-tier authentication of user for cloud storage. 13-27 - Hua-Rui Wu, Huaji Zhu

, Xiao Han:
An improved k-angle coverage algorithm for multimedia wireless sensor networks based on two-layer tabu search. 28-44 - Elham Moridi, Majid Haghparast

, Mehdi Hosseinzadeh
, Somayyeh Jafarali Jassbi:
A novel hierarchical fault management framework for wireless sensor networks: HFMF. 45-55 - Jianlong Liu, Jiaye Wen, Lixia Lin, Wen'an Zhou:

Double agents-DQL based D2D computing-offloading for SHVC. 56-76 - Abdul Saboor

, Ahmad Kamil Mahmood, Abdullah Hisam Omar, Mohd Fadzil Hassan
, Syed Nasir Mehmood Shah, Ali Ahmadian
:
Enabling rank-based distribution of microservices among containers for green cloud computing environment. 77-91 - Tanakorn Karode

, Warodom Werapun
:
Robustness against fraudulent activities of a blockchain-based online review system. 92-106 - C. Suganthi Evangeline

, Vinoth Babu Kumaravelu
:
A two-phase fuzzy based access network selection scheme for vehicular ad hoc networks. 107-133 - Yaoguang Lu

, Xingwei Wang, Bo Yi, Min Huang:
The reliable routing for software-defined vehicular networks towards beyond 5G. 134-148 - Jiefan Qiu

, Zonghan Hua, Lei Liu, Mingsheng Cao, Dajiang Chen:
Machine-learning-based cache partition method in cloud environment. 149-162 - Duc V. Nguyen, Giang L. Nguyen

, Thang T. Nguyen, Anh H. Ngo, Giang T. Pham:
MINAD: Multi-inputs Neural Network based on Application Structure for Android Malware Detection. 163-177 - Mohammed B. Alshawki

, Péter Ligeti, Adam Nagy, Christoph Reich
:
Distributed Address Table (DAT): A Decentralized Model for End-to-End Communication in IoT. 178-193 - Zheyi Chen

, Hongqiang Zheng, Jianshan Zhang
, Xianghan Zheng, Chunming Rong
:
Joint computation offloading and deployment optimization in multi-UAV-enabled MEC systems. 194-205 - Vidyotma Thakur

, Gaurav Indra, Nitin Gupta
, Pushpita Chatterjee, Omar Said
, Amr Tolba
:
Cryptographically secure privacy-preserving authenticated key agreement protocol for an IoT network: A step towards critical infrastructure protection. 206-220 - Wai Kheong Chong

, Micheal Drieberg, Varun Jeoti, Rizwan Ahmad
:
Analytical modelling of false blocking problem in wireless ad hoc networks. 221-245 - Maryam Ataei Kachooei

, Faramarz Hendessi, Behrouz Shahgholi Ghahfarokhi
, Mostafa Nozari
:
An OLSR-based Geocast Routing Protocol for Vehicular Ad Hoc Networks. 246-266 - Varun Deshpande

, Hakim Badis, Laurent George:
Efficient topology control of blockchain peer to peer network based on SDN paradigm. 267-289 - Federico Franzoni

, Vanesa Daza:
Clover: An anonymous transaction relay protocol for the bitcoin P2P network. 290-303 - Guanglai Guo, Yan Zhu

, E. Chen, Guizhen Zhu, Di Ma
, William Cheng-Chung Chu:
Continuous improvement of script-driven verifiable random functions for reducing computing power in blockchain consensus protocols. 304-323 - Deyu Zhang, Heguo Zhang, Sijing Duan, Yunzhen Luo, Fucheng Jia, Feng Liu

:
Deep action: A mobile action recognition framework using edge offloading. 324-339 - Xuejiao Liu, Chuanhua Wang, Wei Chen, Yingjie Xia

, Gaoxiang Zhu:
SCMP-V: A secure multiple relays cooperative downloading scheme with privacy preservation in VANETs. 340-354 - Shuai Zhou, Ge Zhang, Xianfu Meng

:
LocTrust: A local and global consensus-combined trust model in MANETs. 355-368 - Haina Song

, Xinyu Han, Jie Lv, Tao Luo
, Jianfeng Li:
MPLDS: An integration of CP-ABE and local differential privacy for achieving multiple privacy levels data sharing. 369-385 - Khaled S. El Gayyar

, Ahmed I. Saleh, Labib M. Labib:
A new fog-based routing strategy (FBRS) for vehicular ad-hoc networks. 386-407 - Federico Franzoni

, Xavier Salleras, Vanesa Daza:
AToM: Active topology monitoring for the bitcoin peer-to-peer network. 408-425 - Mrinai Maneetkumar Dhanvijay, Shailaja C. Patil:

Energy aware MAC protocol with mobility management in wireless body area network. 426-443 - Qiaohong Hu, Hongju Cheng

, Xiaoqi Zhang, Chengkuan Lin:
Trusted resource allocation based on proof-of-reputation consensus mechanism for edge computing. 444-460 - Leila Benarous

, Benamar Kadri:
Obfuscation-based location privacy-preserving scheme in cloud-enabled internet of vehicles. 461-472 - Bharati Sinha

, Awadhesh Kumar Singh, Poonam Saini:
A hybrid approach towards reduced checkpointing overhead in cloud-based applications. 473-483 - Mohammad Shirafkan, Ali Shahidinejad

, Mostafa Ghobaei-Arani
:
An autonomous intrusion detection system for the RPL protocol. 484-502 - Guang Yang, Junling Guo, Lidong Han

, Xuejiao Liu, Chengliang Tian:
An improved secure certificateless public-key searchable encryption scheme with multi-trapdoor privacy. 503-515 - Yulei Chen, Jianhua Chen:

An efficient and privacy-preserving mutual authentication with key agreement scheme for telecare medicine information system. 516-528 - Weichang Zheng

, Mingcong Yang, Chenxiao Zhang, Yu Zheng, Yunyi Wu, Yongbing Zhang
, Jie Li:
Application-aware QoS routing in SDNs using machine learning techniques. 529-548 - Weinan Liu

:
Privacy-preserving comparison based data aggregation protocols for mobile sensing. 549-558 - Jianhua Huang, Tianqi Li

, Zhigang Shi
:
An uneven annulus sector grid-based energy-efficient multi-hop routing protocol for wireless sensor networks. 559-575 - Shafi Shaik

, Devanaboyina Venkata Ratnam
:
A trust based energy and mobility aware routing protocol to improve infotainment services in VANETs. 576-591 - Radhakrishnan Maivizhi

, Palanichamy Yogesh:
Fuzzy routing for in-network aggregation in wireless sensor networks. 592-611 - Xuefei Peng, Xiaoming Yuan, Kuan Zhang:

Clustered NOMA-based downlink adaptive relay coordinated transmission scheme for future 6G cell-free edge network. 612-625 - Douglas Henrique Silva, Erick Galani Maziero, Muhammad Saadi

, Renata Lopes Rosa, Juan E. Casavílca Silva, Demóstenes Z. Rodríguez
, Kostromitin Konstantin Igorevich
:
Big data analytics for critical information classification in online social networks using classifier chains. 626-641 - Ankur O. Bang

, Udai Pratap Rao
:
EMBOF-RPL: Improved RPL for early detection and isolation of rank attack in RPL-based internet of things. 642-665 - Dharmendra Kumar

, Mayank Pandey
:
An optimal load balancing strategy for P2P network using chicken swarm optimization. 666-688 - Jie Jia

, Yao Xu, Zhenjun Du, Jian Chen, Qinghu Wang, Xingwei Wang:
Joint resource allocation for QoE optimization in large-scale NOMA-enabled multi-cell networks. 689-702 - J. Thresa Jeniffer, A. Chandrasekar:

Optimal hybrid heat transfer search and grey wolf optimization-based homomorphic encryption model to assure security in cloud-based IoT environment. 703-723 - Chuxin Zhuang, Qingyun Dai, Yue Zhang:

BCPPT: A blockchain-based privacy-preserving and traceability identity management scheme for intellectual property. 724-738 - Xu Zhao, Chaowei Lin, Jianshan Zhang

:
Cloudlet deployment for workflow applications in a mobile edge computing-wireless metropolitan area network. 739-750 - K. Tamil Selvi

, R. Thamilselvan
:
An intelligent traffic prediction framework for 5G network using SDN and fusion learning. 751-767 - Vojislav B. Misic

, Jelena V. Misic, Xiaolin Chang:
Reducing the number of transaction messages in bitcoin. 768-782 - Wenbin Chen, Wei Wang

, Zuguang Li, Qiang Ye, Qihui Wu:
Joint pricing and task allocation for blockchain empowered crowd spectrum sensing. 783-792 - Rahul N. Vaza

, Ramesh Prajapati
, Dushyantsinh Rathod, Dineshkumar Vaghela:
Developing a novel methodology for virtual machine introspection to classify unknown malware functions. 793-810 - Xiaoli Li, Huamei Qi, Jia Wu:

Efficient path-sense transmission based on IoT system in opportunistic social networks. 811-826 - Muhammad Ali, Rizwan Asghar, Ihsan Ullah, Atiq Ahmed, Waheed Noor

, Junaid Baber
:
Towards intelligent P2P IPTV overlay management through classification of peers. 827-838
Volume 15, Number 2, March 2022
- Luca Serena

, Stefano Ferretti
, Gabriele D'Angelo:
Cryptocurrencies activity as a complex network: Analysis of transactions graphs. 839-853 - Chaogang Tang

, Huaming Wu
:
Joint optimization of task caching and computation offloading in vehicular edge computing. 854-869 - Xingchen Wang, Chengwu Liao

, Chao Chen
, Jie Ma, Huayan Pu:
O2D: An uncooperative taxi-passenger's destination predication system via deep neural networks. 870-883 - Moayad Aloqaily

, Ouns Bouachir
, Öznur Özkasap
, Faizan Safdar Ali:
SynergyGrids: blockchain-supported distributed microgrid energy trading. 884-900 - H. S. Jennath

, S. Asharaf:
Reputation management in vehicular network using blockchain. 901-920 - Qingyang Li

, Bin Guo, Zhu Wang
:
A privacy-preserving multi-agent updating framework for self-adaptive tree model. 921-933 - Bing Tang

, Linyao Kang:
EICache: A learning-based intelligent caching strategy in mobile edge computing. 934-949 - Xiao Ke, Wenyao Chen

, Wenzhong Guo:
100+ FPS detector of personal protective equipment for worker safety: A deep learning approach for green edge computing. 950-972 - Longxin Zhang

, Lan Wang, Mansheng Xiao, Zhicheng Wen, Cheng Peng:
EM_WOA: A budget-constrained energy consumption optimization approach for workflow scheduling in clouds. 973-987 - Chris Pollett, Thomas H. Austin, Katerina Potika

, Justin Rietz, Prashant Pardeshi:
TontineCoin: Survivor-based Proof-of-Stake. 988-1007 - Xuelian Cao

, Jianhui Zhang, Xuechen Wu, Bo Liu
:
A survey on security in consensus and smart contracts. 1008-1028 - Zhengzhe Xiang

, Yuhang Zheng, Mengzhu He, Longxiang Shi, Dongjing Wang, Shuiguang Deng, Zengwei Zheng:
Energy-effective artificial internet-of-things application deployment in edge-cloud systems. 1029-1044 - Xinning Chen, Xuan Liu, Canhui Luo, Jiangjin Yin:

Robust multi-agent reinforcement learning for noisy environments. 1045-1056 - Devarapalli Prasannababu

, Tarachand Amgoth
:
Adaptive SSO based node selection for partial charging in wireless sensor network. 1057-1075 - Songyang Wu, Wenju Xu

, Zhiyong Hong, Pu Duan, Benyu Zhang, Yupu Hu, Baocang Wang:
Updatable privacy-preserving itK-nearest neighbor query in location-based s-ervice. 1076-1089 - Lili Jiang, Xiaolin Chang

, Jelena V. Misic, Vojislav B. Misic, Jing Bai:
Understanding MEC empowered vehicle task offloading performance in 6G networks. 1090-1104 - Kalaivanan Karunanithy

, Bhanumathi Velusamy
:
An efficient data collection using wireless sensor networks and internet of things to monitor the wild animals in the reserved area. 1105-1125 - Qinglin Zhao, Xianqing Tai, Jianwen Yuan, Jie Xu, Li Feng, Zhijie Ma

:
Performance analysis of PoUW consensus mechanism: Fork probability and throughput. 1126-1138 - Jianxin Zhao

, Yanhao Feng, Xinyu Chang, Chi Harold Liu
:
Energy-efficient client selection in federated learning with heterogeneous data on edge. 1139-1151 - Kai Fan, Zeyu Shi, Ruidan Su

, Yuhan Bai, Pei Huang, Kuan Zhang, Hui Li, Yintang Yang:
Blockchain-based trust management for verifiable time synchronization service in IoT. 1152-1162 - Sriramulu Bojjagani

, P. V. Venkateswara Rao, Dinesh Reddy Vemula
, B. Ramachandra Reddy
, T. Jaya Lakshmi
:
A secure IoT-based micro-payment protocol for wearable devices. 1163-1188 - Vesal Hakami

, Hadi Barghi, Seyedakbar Mostafavi, Ziba Arefinezhad:
A resource allocation scheme for D2D communications with unknown channel state information. 1189-1213 - Yongheng Deng, Shuang Gu, Chengbo Jiao, Xing Bao, Feng Lyu

:
Making resource adaptive to federated learning with COTS mobile devices. 1214-1231 - Zainab Hassan Ali

, Hesham A. Ali:
EEOMA: End-to-end oriented management architecture for 6G-enabled drone communications. 1232-1254 - Anika Mansura

, Micheal Drieberg, Azrina Abd Aziz, Vandana Bassoo, Sohail Sarang:
An energy balanced and nodes aware routing protocol for energy harvesting wireless sensor networks. 1255-1280 - Nairy Moghadas-Gholian

, Vahid Solouk, Hashem Kalbkhani
:
Relay selection and power allocation for energy-load efficient network-coded cooperative unicast D2D communications. 1281-1293 - Himanshuram Ranjan, Atul Kumar Dwivedi

, Prakasam Periasamy
:
An optimized architecture and algorithm for resource allocation in D2D aided fog computing. 1294-1310
Volume 15, Number 3, May 2022
- Gen Huang, Yi-bo Zou

, Shi Chen, Yun Xu:
Bitrans: A bidirectional and trusted data transaction protocol based on the blockchain system. 1311-1327 - Mohammad Jalilvand Aghdam Bonab, Ramin Shaghaghi Kandovan:

QoS-aware resource allocation in mobile edge computing networks: Using intelligent offloading and caching strategy. 1328-1344 - Sheau-Ru Tong

, Cheng-Han Yang:
Efficient broadcast scheduling at mobile cloud edges for supporting news-broadcast-on-demand over P2P streaming. 1345-1356 - Kai Chen

, Fuwei Wang, Miaoyu Li, Baoying Liu
, Hao Chen, Feng Chen:
HeadSee: Device-free head gesture recognition with commodity RFID. 1357-1369 - Pothuri Surendra Varma

, Veena Anand:
Fault-Tolerant indoor localization based on speed conscious recurrent neural network using Kullback-Leibler divergence. 1370-1384 - Jin Ren

, Yuyang Cheng, Shiyuan Xu
:
EDPPA: An efficient distance-based privacy preserving authentication protocol in VANET. 1385-1397 - Jia Wu, Jiahao Xia, Fangfang Gou

:
Information transmission mode and IoT community reconstruction based on user influence in opportunistic s ocial networks. 1398-1416 - Piyush Rawat, Siddhartha Chauhan

:
Particle swarm optimization based sleep scheduling and clustering protocol in wireless sensor network. 1417-1436 - Jin Sun

, Fu Wang:
An effective LS-SVM/AKF aided SINS/DVL integrated navigation system for underwater vehicles. 1437-1451 - Mahsa MalekiTabar

, Amir Masoud Rahmani
:
A delay-constrained node-disjoint multipath routing in software-defined vehicular networks. 1452-1472 - Soumya J. Bhat

, Santhosh Krishnan Venkata
:
A localization and deployment model for wireless sensor networks using arithmetic optimization algorithm. 1473-1485 - Ping Zhong

, Aikun Xu, Yilin Kang, Shigeng Zhang
, Yiming Zhang:
An optimal deployment scheme for extremely fast charging stations. 1486-1504 - Rahul Das, Mona Dwivedi

:
Multi agent dynamic weight based cluster trust estimation for hierarchical wireless sensor networks. 1505-1520 - Dan Liao, Ruijin Zhou, Hui Li

, Ming Zhang, Xue Chen:
GE-IDS: an intrusion detection system based on grayscale and entropy. 1521-1534 - Recep Özdag

:
Multi-metric optimization with a new metaheuristic approach developed for 3D deployment of multiple drone-BSs. 1535-1561 - Chengzhe Lai

, Zhe Ma, Rui Guo, Dong Zheng:
Secure medical data sharing scheme based on traceable ring signature and blockchain. 1562-1576 - Alper Bereketli

:
Interference-Free Source Deployment for Coverage in Underwater Acoustic Backscatter Networks. 1577-1594 - Masoumeh Safkhani, Saru Kumari

, Mohammad Shojafar, Sachin Kumar
:
An authentication and key agreement scheme for smart grid. 1595-1616 - Alapaka Nagur Babu, Jakkala Vishnu, S. Nandakumar

, T. Velmurugan:
Resource allocation and optimization in D2D communication with PDRAPC framework. 1617-1637 - Tao Ding, Guangrong Yan

, Zhenggan Zhou, Yi Lei:
A novel manufacturing service model transformation method based on product lifecycle. 1638-1652 - Kai Zhang

, Jinhu Yu, Chao Lin
, Jianting Ning
:
Blockchain-based access control for dynamic device management in microgrid. 1653-1668 - Xiaohua Wu

, Hongji Ling
, Huan Liu, Fangjian Yu:
A privacy-preserving and efficient byzantine consensus through multi-signature with ring. 1669-1684 - Keerthika A, V. Berlin Hency

:
Reinforcement-Learning based energy efficient optimized routing protocol for WSN. 1685-1704 - Ankur Choudhary, Santosh Kumar

, Krishna Pal Sharma:
RFDCS: A reactive fault detection and classification scheme for clustered wsns. 1705-1732 - Ashish Tomar

, Sachin Tripathi:
BCAV: Blockchain-based certificateless authentication system for vehicular network. 1733-1756
Volume 15, Number 4, July 2022
- Aditi Mishra, Azad Azadmanesh, Lotfollah Najjar:

Consensus in sensor networks in presence of hybrid faults. 1757-1774 - Danfeng Wu, Jiancheng Zhang

, Jinlai Zhang
, Heng Shi:
A Novel Deep Link Prediction Model for Peer-to-Peer Dynamic Task Collaboration Networks. 1775-1791 - Mohammad Ali

, Ximeng Liu:
Lightweight verifiable data management system for cloud-assisted wireless body area networks. 1792-1816 - Junfeng Tian, Ziwei Wang

:
Cloud data assured deletion scheme based on dynamic sliding window. 1817-1833 - Dan Liao

, Wentao Wang, Kairen Xiao, Hui Li, Ming Zhang:
Towards an architecture and algorithm for the satellite IoT based on a CCN. 1834-1848 - Yuetong Chen, Fengming Liu

:
Research on improvement of DPoS consensus mechanism in collaborative governance of network public opinion. 1849-1861 - Radhika Kavra

, Anjana Gupta, Sangita Kansal:
Systematic study of topology control methods and routing techniques in wireless sensor networks. 1862-1922 - Jing Bai, Xiaolin Chang

, Fumio Machida, Zhen Han, Yang Xu, Kishor S. Trivedi:
Quantitative understanding serial-parallel hybrid sfc services: a dependability perspective. 1923-1938 - Pankaj Kumar

, Hari Om:
A secure and efficient authentication protocol for wireless applications in multi-server environment. 1939-1952 - Peiyan Yuan

, Saike Shao, Xiaoyan Huang:
RAPAR: Routing algorithm based on node relationship mining in opportunistic network. 1953-1963 - Pengge Chen, Fenhua Bai, Tao Shen, Bei Gong, Lei Zhang, Lin Huang, Zhengyuan An, Talha Mir, Shanshan Tu, Muhammad Waqas

:
SCCA: A slicing-and coding-based consensus algorithm for optimizing storage in blockchain-based IoT data sharing. 1964-1978 - Xiaoyu Du

, Yinyin Li, Sufang Zhou, Yi Zhou:
ATS-LIA: A lightweight mutual authentication based on adaptive trust strategy in flying ad-hoc networks. 1979-1993 - Yukun Zhang

, Wenxue Wei
:
Lightweight anonymous authentication and key agreement protocols for mobile edge computing. 1994-2006 - K. Anand, A. Vijayaraj

, M. Vijay Anand:
An enhanced bacterial foraging optimization algorithm for secure data storage and privacy-preserving in cloud. 2007-2020 - Jinyong Chang

, Maozhi Xu, Rui Xue:
Public auditing protocol with dynamic update and privacy-preserving properties in fog-to-cloud-based IoT applications. 2021-2036 - Kaiyu Wang, Zhiying Tu, Zhenzhou Ji

:
PoTA: A hybrid consensus protocol to avoid miners' collusion for BaaS platform. 2037-2056 - Dong Liang, Qinrang Liu, Binghao Yan, Ting Chen, Xingyu Liu:

Efficient loop detection and congestion-free network update for SDN. 2057-2078 - Vikramjit Singh, Krishna Pal Sharma, Harsh Kumar Verma:

ABNT: Adaptive beaconing and neighbor timeout for geographical routing in UAV networks. 2079-2100 - Kunchang Li

, Yifan Yang, Shuhao Wang:
Privacy-preserving aggregate signcryption scheme with allowing dynamic updating of pseudonyms for fog-based smart grids. 2101-2115 - Arnab Mukherjee

, Swagatika Sahoo, Raju Halder
:
A blockchain-based integrated and interconnected hybrid platform for Smart City ecosystem. 2116-2141 - Ehsan Kiamansouri, Hamid Barati

, Ali Barati
:
A two-level clustering based on fuzzy logic and content-based routing method in the internet of things. 2142-2159
Volume 15, Number 5, September 2022
- Taixin Li

, Xu Zhou, Shen Yan, Xiaobo Zhang:
Service function path selection methods for multi-layer satellite networks. 2161-2178 - Bahaa Hussein Taher Algubili

, Neeraj Kumar
, Hongwei Lu, Ali A. Yassin, Rihab Boussada, Alzahraa J. Mohammed, Huiyu Liu:
EPSAPI: An efficient and provably secure authentication protocol for an IoT application environment. 2179-2198 - B. Gopalakrishnan, P. Purusothaman:

A new design of intrusion detection in IoT sector using optimal feature selection and high ranking-based ensemble learning model. 2199-2226 - Anqi Yu

, Nuo Wang
:
Scale-free networks: evolutionary acceleration of the network survivability and its quantification. 2227-2239 - Gordhan Jethava

, Udai Pratap Rao
:
A novel defense mechanism to protect users from profile cloning attack on Online Social Networks (OSNs). 2253-2269 - Xiaodong Yang

, Tian Tian, Jiaqi Wang, Caifen Wang:
Blockchain-based multi-user certificateless encryption with keyword search for electronic health record sharing. 2270-2288 - Roshani V. Bhaskarwar

, Dnyandeo J. Pete:
Energy efficient clustering with compressive sensing for underwater wireless sensor networks. 2289-2306 - Noureddine Moussa

, Sondès Khemiri-Kallel, Abdelbaki El Belrhiti El Alaoui
:
Fog-assisted hierarchical data routing strategy for IoT-enabled WSN: Forest fire detection. 2307-2325 - Parisa Goudarzi, Amir Masoud Rahmani

, Mohammad Mosleh:
A Mixed-integer programming model using particle swarm optimization algorithm for resource discovery in the cloudiot. 2326-2346 - Venkatasamy Sureshkumar, S. Mugunthan, Ruhul Amin

:
An enhanced mutually authenticated security protocol with key establishment for cloud enabled smart vehicle to grid network. 2347-2363 - Hua Hou, Shengke Zeng

, Hongwei Li:
Privacy-preserving "Check-in Award" Service in Location-based Social Networks. 2364-2375 - Junchao Fan, Xiaolin Chang

, Jelena V. Misic, Vojislav B. Misic, Hongyue Kang:
DHL: Deep reinforcement learning-based approach for emergency supply distribution in humanitarian logistics. 2376-2389 - Medikonda Asha Kiran

, Syam Kumar Pasupuleti, Eswari Rajagopal:
A lightweight pairing-free ciphertext-policy attribute-based signcryption for cloud-assisted IoT. 2390-2403 - Barbara Guidi, Andrea Michienzi

, Laura Ricci:
Managing communities in decentralised social environments. 2404-2429 - Haoran Zhu

, Xiaolin Chang
, Jelena V. Misic, Vojislav B. Misic, Runkai Yang:
Revisiting FAW attack in an imperfect PoW blockchain system. 2430-2443 - Haytham Qushtom, Jelena V. Misic, Vojislav B. Misic

, Xiaolin Chang:
A high performance two-layer consensus architecture for blockchain-based IoT systems. 2444-2456
Volume 15, Number 6, November 2022
- Congcong Chen

, Lifei Wei
, Lei Zhang, Ya Peng, Jianting Ning:
MP-BADNet+: Secure and effective backdoor attack detection and mitigation protocols among multi-participants in private DNNs. 2457-2473 - Zhiguo Liu, Weijie Li

, Jianxin Feng, Chengsheng Pan, Li Yunqi:
A regional interest-aware caching placement scheme for reducing latency in the LEO satellite networks. 2474-2487 - Yasmine Harbi, Allaoua Refoufi, Zibouda Aliouat

, Saad Harous
:
Improved bio-inspired security scheme for privacy-preserving in the internet of things. 2488-2502 - Weimin Gao

, Jiawei Huang
, Ning Jiang, Zhaoyi Li
, Shaojun Zou, Zhidong He, Jian-Xin Wang:
HPLB: High precision load balancing based on in-band network telemetry in data center networks. 2503-2515 - Fan-Qi Ma

, Quan-Lin Li, Yi-Han Liu, Yan-Xia Chang
:
Stochastic performance modeling for practical byzantine fault tolerance consensus in the blockchain. 2516-2528 - Chang Xu

, Guoxie Jin, Liehuang Zhu, Chuan Zhang, Yu Jia:
EPDL: An efficient and privacy-preserving deep learning for crowdsensing. 2529-2541 - Junying Zhang

, Xindi Ma, Qi Jiang:
A geometric approach to analysing the effects of time delays on stability of vehicular platoons with ring interconnections. 2542-2556 - Sakshi Garg

, Deepti Mehrotra
, Hari Mohan Pandey
, Sujata Pandey
:
Enhancing RPL using E-MOF: a fuzzy-based mobility model for IoV. 2557-2571 - Nour El Houda Bourebia

, Chunlin Li:
A greedy energy efficient clustering scheme based reinforcement learning for WSNs. 2572-2588 - Yanlin Wang, Liang Liu

, Mengqi Li, Wenbin Zhai
, Weihua Ma, Hang Gao:
Power level aware charging schedule in wireless rechargeable sensor network. 2589-2602 - Nabanita Das, Souvik Basu, Sipra Das Bit:

ReliefChain: A blockchain leveraged post disaster relief allocation system over smartphone-based DTN. 2603-2618 - Haitao Xu, Yuejun Sun

, Jingnan Gao, Jianbo Guo:
Intelligent edge content caching: A deep recurrent reinforcement learning method. 2619-2632 - Xiaohua Wu

, Jinpeng Chang, Hongji Ling, Xueqi Feng:
Scaling proof-of-authority protocol to improve performance and security. 2633-2649 - Priyanka Gaba

, Ram Shringar Raw
:
B-VANET: A blockchain-based vehicular ad-hoc network for data validation. 2650-2669 - Ankita Srivastava

, Pramod Kumar Mishra:
Multi-attributes based energy efficient clustering for enhancing network lifetime in WSN's. 2670-2693 - Satinder Singh Mohar

, Sonia Goyal
, Ranjit Kaur:
Optimum deployment of sensor nodes in wireless sensor network using hybrid fruit fly optimization algorithm and bat optimization algorithm for 3D Environment. 2694-2718 - Jia Wu, Liao Yu, Fangfang Gou

:
Data transmission scheme based on node model training and time division multiple access with IoT in opportunistic social networks. 2719-2743 - Chengxiao Yu, Wei Quan

, Kang Liu, Mingyuan Liu, Ziheng Xu
, Hongke Zhang:
Deep reinforcement learning-based fountain coding for concurrent multipath transfer in high-speed railway networks. 2744-2756

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














