


Остановите войну!
for scientists:


default search action
IEEE Transactions on Network Science and Engineering, Volume 8
Volume 8, Number 1, January - March 2021
- Miklós Z. Rácz
, Jacob Richey
:
Rumor Source Detection With Multiple Observations Under Adaptive Diffusions. 2-12 - Hongwei Du
, Qiang Ye
, Zhipeng Sun, Chuang Liu
, Wen Xu:
FAST-ODT: A Lightweight Outlier Detection Scheme for Categorical Data Sets. 13-24 - Bo Liu, Housheng Su
, Licheng Wu
, Xixi Shen:
Observability of Leader-Based Discrete-Time Multi-Agent Systems Over Signed Networks. 25-39 - Ding Xiang
, Ermin Wei
:
A General Sensitivity Analysis Approach for Demand Response Optimizations. 40-52 - Hongbo Jiang
, Yu Zhang
, Zhu Xiao
, Ping Zhao
, Arun Iyengar
:
An Empirical Study of Travel Behavior Using Private Car Trajectory Data. 53-64 - Yilun Shang
:
Resilient Consensus for Robust Multiplex Networks with Asymmetric Confidence Intervals. 65-74 - Fabien Geyer
, Steffen Bondorf
:
Graph-Based Deep Learning for Fast and Tight Network Calculus Analyses. 75-88 - Yinxin Wan, Kuai Xu
, Feng Wang
, Guoliang Xue
:
Characterizing and Mining Traffic Patterns of IoT Devices in Edge Networks. 89-101 - Shuang Li
, Weiguo Xia
, Xi-Ming Sun
:
Synchronization of Identical Oscillators Under Matrix-Weighted Laplacian With Sampled Data. 102-113 - Magdi Sadek Mahmoud
, Bilal J. Karaki:
Output-Synchronization of Discrete-Time Multiagent Systems: A Cooperative Event-Triggered Dissipative Approach. 114-125 - Xiangli Jiang
, Guihua Xia
, Zhiguang Feng
, Zhengyi Jiang
:
Consensus Tracking of Data-Sampled Nonlinear Multi-Agent Systems With Packet Loss and Communication Delay. 126-137 - Klaus Wehmuth, Artur Ziviani
, Leonardo Chinelate Costa, Ana Paula Couto da Silva
, Alex Borges Vieira
:
You Shall Not Pass: Avoiding Spurious Paths in Shortest-Path Based Centralities in Multidimensional Complex Networks. 138-148 - Qian Xu
, Xiang Yan, Kui Wu
, Jianping Wang
, Kejie Lu
, Weiwei Wu
:
Leveraging Multiplexing Gain in Network Slice Bundles. 149-162 - Jing Wang
, Tingting Ru, Hao Shen
, Jinde Cao
, Ju H. Park
:
Finite-Time $\mathcal {L}_{2}$-$\mathcal {L}_{\infty }$ Synchronization for Semi-Markov Jump Inertial Neural Networks Using Sampled Data. 163-173 - Megan Morrison
, J. Nathan Kutz
:
Nonlinear Control of Networked Dynamical Systems. 174-189 - Jiajun Zhou
, Jie Shen, Shanqing Yu
, Guanrong Chen
, Qi Xuan
:
M-Evolve: Structural-Mapping-Based Data Augmentation for Graph Classification. 190-200 - Yan Ouyang
, Anfeng Liu
, Naixue Xiong
, Tian Wang
:
An Effective Early Message Ahead Join Adaptive Data Aggregation Scheme for Sustainable IoT. 201-219 - Matheus R. F. Mendonça
, André Barreto, Artur Ziviani
:
Approximating Network Centrality Measures Using Node Embedding and Machine Learning. 220-230 - Tong Wu, Pan Zhou
, Binghui Wang
, Ang Li
, Xueming Tang, Zichuan Xu
, Kai Chen
, Xiaofeng Ding
:
Joint Traffic Control and Multi-Channel Reassignment for Core Backbone Network in SDN-IoT: A Multi-Agent Deep Reinforcement Learning Approach. 231-245 - Saiwei Wang
, Xin Jin
, Shuai Mao
, Athanasios V. Vasilakos
, Yang Tang
:
Model-Free Event-Triggered Optimal Consensus Control of Multiple Euler-Lagrange Systems via Reinforcement Learning. 246-258 - Yang Zhai
, Zhi-Wei Liu
, Ming-Feng Ge
, Guanghui Wen
, Xinghuo Yu
, Yuzhen Qin
:
Trusted-Region Subsequence Reduction for Designing Resilient Consensus Algorithms. 259-268 - Youyang Qu
, Shui Yu
, Wanlei Zhou
, Shiping Chen
, Jun Wu:
Customizable Reliable Privacy-Preserving Data Sharing in Cyber-Physical Social Networks. 269-281 - Lucia Valentina Gambuzza
, Mattia Frasca
, Francesco Sorrentino
, Louis M. Pecora
, Stefano Boccaletti:
Controlling Symmetries and Clustered Dynamics of Complex Networks. 282-293 - Yapu Zhang
, Jianxiong Guo
, Wenguo Yang
, Weili Wu
:
Targeted Activation Probability Maximization Problem in Online Social Networks. 294-304 - Zhen Li
, Yang Tang
, Jian-An Fang, Tingwen Huang
:
Formation Control of Multi-Agent Systems With Orientation Noises. 305-317 - Zhihua Xia
, Lan Wang, Jian Tang, Neal N. Xiong
, Jian Weng:
A Privacy-Preserving Image Retrieval Scheme Using Secure Local Binary Pattern in Cloud Computing. 318-330 - Prasad Vilas Chanekar
, Erfan Nozari
, Jorge Cortés
:
Energy-Transfer Edge Centrality and Its Role in Enhancing Network Controllability. 331-346 - Shaobo Huang
, Zhiwen Zeng
, Kaoru Ota
, Mianxiong Dong
, Tian Wang
, Neal N. Xiong
:
An Intelligent Collaboration Trust Interconnections System for Mobile Information Control in Ubiquitous 5G Networks. 347-365 - Eduardo Viegas, Altair Olivo Santin
, Vilmar Abreu:
Machine Learning Intrusion Detection in Big Data Era: A Multi-Objective Approach for Longer Model Lifespans. 366-376 - Yang Chen
, Jie Wu
, Rajorshi Biswas:
Grouping Service Chains of Multiple Flows in NFV-Based Networks. 377-388 - Yang Chen
, Jie Wu
:
Flow Scheduling of Service Chain Processing in a NFV-Based Network. 389-399 - Canhui Chen, Xu Chen
, Jiangshan Yu
, Weigang Wu
, Di Wu
:
Impact of Temporary Fork on the Evolution of Mining Pools in Blockchain Networks: An Evolutionary Game Analysis. 400-418 - Pan Zhou
, Yulai Xie
, Ben Niu
, Lingjun Pu
, Zichuan Xu
, Hao Jiang
, Huawei Huang
:
QoE-Aware 3D Video Streaming via Deep Reinforcement Learning in Software Defined Networking Enabled Mobile Edge Computing. 419-433 - Sifat Afroj Moon
, Faryad Darabi Sahneh, Caterina M. Scoglio:
Group-Based General Epidemic Modeling for Spreading Processes on Networks: GroupGEM. 434-446 - Xiao Chen
, Jie Ding
, Zhenyu Lu
, Tianming Zhan
:
An Efficient Formal Modeling Framework for Hybrid Cloud-Fog Systems. 447-462 - Xin Luo
, Zhigang Liu
, Mingsheng Shang
, Jungang Lou
, MengChu Zhou
:
Highly-Accurate Community Detection via Pointwise Mutual Information-Incorporated Symmetric Non-Negative Matrix Factorization. 463-476 - Xingjian Ding
, Jianxiong Guo
, Deying Li
, Weili Wu
:
An Incentive Mechanism for Building a Secure Blockchain-Based Internet of Things. 477-487 - Meirong Zhang
, Ali Saberi
, Anton A. Stoorvogel
:
Semi-Global State Synchronization for Multi-Agent Systems Subject to Actuator Saturation and Unknown Nonuniform Input Delay. 488-497 - Ze Tang
, Deli Xuan, Ju H. Park
, Yan Wang
, Jianwen Feng
:
Impulsive Effects Based Distributed Synchronization of Heterogeneous Coupled Neural Networks. 498-510 - Liangtian Wan
, Feng Xia
, Xiangjie Kong
, Ching-Hsien Hsu
, Runhe Huang
, Jianhua Ma:
Deep Matrix Factorization for Trust-Aware Recommendation in Social Networks. 511-528 - Yuxin Mao
, Lujie Zhou, Naixue Xiong
:
TPS: A Topological Potential Scheme to Predict Influential Network Nodes for Intelligent Communication in Social Networks. 529-540 - Yu Wang
, Chengzhe Piao
, Chi Harold Liu
, Chijin Zhou, Jian Tang
:
Modeling User Interests With Online Social Network Influence by Memory Augmented Sequence Learning. 541-554 - Pan Lai
, Costas Courcoubetis
, Lingjie Duan
, Stefano Galelli
:
Economic Controls for Smart Water Distribution Networks Undergoing Supply Failures. 555-574 - Chunyu Wu
, Xudong Zhao
:
Quantized Dynamic Output Feedback Control and $L_2$-Gain Analysis for Networked Control Systems: A Hybrid Approach. 575-587 - Song Li
, Weibin Sun
, Yanjing Sun
, Yu Huo
:
Energy-Efficient Task Offloading Using Dynamic Voltage Scaling in Mobile Edge Computing. 588-598 - Shuwen Yi
, Hao Jiang
, Ying Jiang
, Pan Zhou
, Qiang Wang
:
A Hyperbolic Embedding Method for Weighted Networks. 599-612 - Xin Gong
, Yukang Cui
, Jun Shen
, Zhan Shu
, Tingwen Huang
:
Distributed Prescribed-Time Interval Bipartite Consensus of Multi-Agent Systems on Directed Graphs: Theory and Experiment. 613-624 - Yiming Miao
, Yixue Hao
, Min Chen
, Hamid Gharavi
, Kai Hwang:
Intelligent Task Caching in Edge Cloud via Bandit Learning. 625-637 - Xiaoping Wu
, Hengnian Qi, Naixue Xiong
:
Rank-One Semidefinite Programming Solutions for Mobile Source Localization in Sensor Networks. 638-650 - Yang Chen
, Jie Wu
:
Latency-Efficient VNF Deployment and Path Routing for Reliable Service Chain. 651-661 - Reza Entezari-Maleki
, Mohammed Gharib
, Shahbaz Rezaei
, Kishor S. Trivedi
, Ali Movaghar
:
Modeling and Evaluation of Multi-Hop Wireless Networks Using SRNs. 662-679 - Junxiao Wang
, Heng Qi
, Wenxin Li
, Keqiu Li
, Steve Uhlig
, Yuxin Wang
:
Dynamic SDN Control Plane Request Assignment in NFV Datacenters. 680-694 - Zhongying Zhao
, Hui Zhou
, Liang Qi, Liang Chang
, MengChu Zhou
:
Inductive Representation Learning via CNN for Partially-Unseen Attributed Networks. 695-706 - Thomas Magelinski
, Mihovil Bartulovic, Kathleen M. Carley
:
Measuring Node Contribution to Community Structure With Modularity Vitality. 707-723 - Saeideh Gholamrezazadeh Motlagh
, Jelena V. Misic
, Vojislav B. Misic
:
The Impact of Selfish Mining on Bitcoin Network Performance. 724-735 - Deqiang Li
, Qianmu Li
, Yanfang Ye
, Shouhuai Xu
:
A Framework for Enhancing Deep Neural Networks Against Adversarial Malware. 736-750 - Abdullah Aydeger
, Mohammad Hossein Manshaei, Mohammad Ashiqur Rahman
, Kemal Akkaya
:
Strategic Defense Against Stealthy Link Flooding Attacks: A Signaling Game Approach. 751-764 - Xu Wang
, Randall A. Berry
:
Market Competition Between LTE-U and WiFi. 765-779 - Ruoyu Wei
, Jinde Cao
, Jürgen Kurths:
Fixed-Time Output Synchronization of Coupled Reaction-Diffusion Neural Networks With Delayed Output Couplings. 780-789 - Jin-Liang Wang
, Lin-Hao Zhao:
PD and PI Control for Passivity and Synchronization of Coupled Neural Networks With Multi-Weights. 790-802 - Evgenia Christoforou
, Alessandro Nordio
, Alberto Tarable
, Emilio Leonardi
:
Ranking a Set of Objects: A Graph Based Least-Square Approach. 803-813 - Cong Li
, Yuan Zhang, Xiang Li
:
Epidemic Threshold in Temporal Multiplex Networks With Individual Layer Preference. 814-824
Volume 8, Number 2, April - June 2021
- Jianwei Huang:
Message From the Editor-in-Chief. 825 - Yingshu Li, Mihaela Cardei, Chaokun Wang, Anton Umek:
Guest Editorial Introduction to the Special Section on Artificial Intelligence For Social Networks. 826-827 - Yinxue Yi
, Zufan Zhang
, Laurence T. Yang
, Chenquan Gan, Xianjun Deng
, Lingzhi Yi
:
Reemergence Modeling of Intelligent Information Diffusion in Heterogeneous Social Networks: The Dynamics Perspective. 828-840 - Yuan Yuan, Feng Li
, Dongxiao Yu
, Jichao Zhao, Jiguo Yu
, Xiuzhen Cheng
:
Distributed Social Learning With Imperfect Information. 841-852 - Xiao Liu
, Houbing Song
, Anfeng Liu:
Intelligent UAVs Trajectory Optimization From Space-Time for Data Collection in Social Networks. 853-864 - Ting Li, Zhijin Qiu
, Lijuan Cao, Dazhao Cheng
, Weichao Wang, Xinghua Shi, Yu Wang
:
Privacy-Preserving Participant Grouping for Mobile Social Sensing Over Edge Clouds. 865-880 - Jian Mao
, Yitong Yang, Tianchen Zhang:
Empirical Analysis of Attribute Inference Techniques in Online Social Network. 881-893 - Xiaokang Zhou
, Wei Liang
, Zijia Luo, Yi Pan
:
Periodic-Aware Intelligent Prediction Model for Information Diffusion in Social Networks. 894-904 - Xiaojiang Du, Willy Susilo
, Mohsen Guizani
, Zhihong Tian:
Introduction to the Special Section on Artificial Intelligence Security: Adversarial Attack and Defense. 905-907 - SeokHwan Choi
, Jin-Myeong Shin
, Peng Liu
, Yoon-Ho Choi
:
EEJE: Two-Step Input Transformation for Robust DNN Against Adversarial Examples. 908-920 - Zhaoquan Gu
, Weixiong Hu
, Chuanjing Zhang
, Hui Lu
, Lihua Yin, Le Wang
:
Gradient Shielding: Towards Understanding Vulnerability of Deep Neural Networks. 921-932 - Jianmin Guo, Yue Zhao, Houbing Song
, Yu Jiang
:
Coverage Guided Differential Adversarial Testing of Deep Learning Systems. 933-942 - Xiangyu Ma
, Wei Shi:
AESMOTE: Adversarial Reinforcement Learning With SMOTE for Anomaly Detection. 943-956 - Zikai Zhang
, Yidong Li
, Hairong Dong
, Honghao Gao
, Yi Jin
, Wei Wang
:
Spectral-Based Directed Graph Network for Malware Detection. 957-970 - Chao Pei, Yang Xiao
, Wei Liang
, Xiaojia Han
:
Detecting False Data Injection Attacks Using Canonical Variate Analysis in Power Grid. 971-983 - Huijuan Zhu
, Yang Li, Ruidong Li
, Jianqiang Li
, Zhuhong You
, Houbing Song
:
SEDMDroid: An Enhanced Stacking Ensemble Framework for Android Malware Detection. 984-994 - Zhuoqun Xia, Jingjing Tan, Ke Gu
, Xiong Li
, Weijia Jia:
IDS Intelligent Configuration Scheme Against Advanced Adaptive Attacks. 995-1008 - Rabeya Bosri, Mohammad Shahriar Rahman
, Md. Zakirul Alam Bhuiyan
, Abdullah Al Omar
:
Integrating Blockchain With Artificial Intelligence for Privacy-Preserving Recommender Systems. 1009-1018 - Huilin Li, Yannan Li
, Yong Yu
, Baocang Wang
, Kefei Chen
:
A Blockchain-Based Traceable Self-Tallying E-Voting Protocol in AI Era. 1019-1032 - Ronald Doku, Danda B. Rawat
, Chunmei Liu:
On the Blockchain-Based Decentralized Data Sharing for Event Based Encryption to Combat Adversarial Attacks. 1033-1043 - Shivani Bharatbhai Patel, Pronaya Bhattacharya
, Sudeep Tanwar
, Neeraj Kumar
:
KiRTi: A Blockchain-Based Credit Recommender System for Financial Institutions. 1044-1054 - Yuntao Wang
, Zhou Su
, Ning Zhang
, Abderrahim Benslimane
:
Learning in the Air: Secure Federated Learning for UAV-Assisted Crowdsensing. 1055-1069 - Zheyi Chen, Pu Tian
, Weixian Liao
, Wei Yu
:
Zero Knowledge Clustering Based Adversarial Mitigation in Heterogeneous Federated Learning. 1070-1083 - Hongwei Yang
, Hui He, Weizhe Zhang
, Xiaochun Cao
:
FedSteg: A Federated Transfer Learning Framework for Secure Image Steganalysis. 1084-1094 - Peiying Zhang
, Chao Wang, Chunxiao Jiang
, Abderrahim Benslimane
:
Security-Aware Virtual Network Embedding Algorithm Based on Reinforcement Learning. 1095-1105 - Xinyu Yin, Xiaojie Fang
, Ning Zhang
, Peng Yang
, Xuejun Sha
, Jinghui Qiu:
Online Learning Aided Adaptive Multiple Attribute-Based Physical Layer Authentication in Dynamic Environments. 1106-1116 - Yulei Wu, Zheng Yan, Ruppa K. Thulasiram, Mohammed Atiquzzaman:
Guest Editorial Introduction to the Special Section on Blockchain in Future Networks and Vertical Industries. 1117-1119 - Abbas Yazdinejad, Reza M. Parizi
, Ali Dehghantanha
, Kim-Kwang Raymond Choo
:
Blockchain-Enabled Authentication Handover With Efficient Privacy Protection in SDN-Based 5G Networks. 1120-1132 - Wei Wang
, Jingjing Song
, Guangquan Xu
, Yidong Li
, Hao Wang
, Chunhua Su
:
ContractWard: Automated Vulnerability Detection Models for Ethereum Smart Contracts. 1133-1144 - Lianyong Qi
, Xiaokang Wang
, Xiaolong Xu
, Wanchun Dou
, Shancang Li
:
Privacy-Aware Cross-Platform Service Recommendation Based on Enhanced Locality-Sensitive Hashing. 1145-1153 - Li-e Wang
, Yan Bai
, Quan Jiang, Victor C. M. Leung
, Wei Cai
, Xianxian Li
:
Beh-Raft-Chain: A Behavior-Based Fast Blockchain Protocol for Complex Networks. 1154-1166 - Shuming Seng
, Changqing Luo
, Xi Li
, Heli Zhang
, Hong Ji
:
User Matching on Blockchain for Computation Offloading in Ultra-Dense Wireless Networks. 1167-1177 - Hao Yin
, Zijian Zhang
, Liehuang Zhu
, Meng Li
, Xiaojiang Du
, Mohsen Guizani
, Bakh Khoussainov:
A Blockchain-Based Storage System With Financial Incentives for Load-balancing. 1178-1188 - Siming Wang
, Dongdong Ye
, Xumin Huang
, Rong Yu
, Yongjian Wang, Yan Zhang
:
Consortium Blockchain for Secure Resource Sharing in Vehicular Edge Computing: A Contract-Based Approach. 1189-1201 - Yang Xu
, Cheng Zhang
, Quanrun Zeng, Guojun Wang
, Ju Ren
, Yaoxue Zhang
:
Blockchain-Enabled Accountability Mechanism Against Information Leakage in Vertical Industry Services. 1202-1213 - Mohamed Baza, Noureddine Lasla, Mohamed M. E. A. Mahmoud, Gautam Srivastava, Mohamed Abdallah:
B-Ride: Ride Sharing With Privacy-Preservation, Trust and Fair Payment Atop Public Blockchain. 1214-1229 - Yan Wu, Fang Tao, Lu Liu
, Jiayan Gu, John Panneerselvam
, Rongbo Zhu
, Mohammad Nasir Shahzad
:
A Bitcoin Transaction Network Analytic Method for Future Blockchain Forensic Investigation. 1230-1241 - Pronaya Bhattacharya
, Sudeep Tanwar
, Umesh Bodkhe, Sudhanshu Tyagi, Neeraj Kumar
:
BinDaaS: Blockchain-Based Deep-Learning as-a-Service in Healthcare 4.0 Applications. 1242-1255 - Andrea Tagarelli, Sabrina Gaito, Roberto Interdonato, Tsuyoshi Murata, Alessandra Sala, My T. Thai:
Guest Editorial Introduction to the Special Section on Reloading Feature-Rich Information Networks. 1256-1258 - Nathaniel Hudson
, Hana Khamfroush
:
Behavioral Information Diffusion for Opinion Maximization in Online Social Networks. 1259-1268 - Konstantinos Tsitseklis
, Maria Krommyda
, Vasileios Karyotis
, Verena Kantere, Symeon Papavassiliou
:
Scalable Community Detection for Complex Data Graphs via Hyperbolic Network Embedding and Graph Databases. 1269-1282 - Giorgia Minello
, Luca Rossi
, Andrea Torsello:
k-Anonymity on Graphs Using the Szemerédi Regularity Lemma. 1283-1292 - Cheng-Lung Chen
, Qipeng P. Zheng
, Alexander Veremyev
, Eduardo L. Pasiliao
, Vladimir Boginski
:
Failure Mitigation and Restoration in Interdependent Networks via Mixed-Integer Optimization. 1293-1304 - Çiçek Güven, Dietmar Seipel, Martin Atzmueller
:
Applying ASP for Knowledge-Based Link Prediction With Explanation Generation in Feature-Rich Networks. 1305-1315 - Su Gao
, Zhigeng Fang:
Multilayer Feature-Rich Satellite Network Analysis: An Application-Oriented and Time-Evolving Approach. 1316-1327 - Ilaria Bordino, Francesco Gullo
, Giacomo Legnaro:
Advancing Receivable Financing via a Network-Based Approach. 1328-1337 - Jon Crowcroft
, Damiano Di Francesco Maesa
, Alessandro Magrini
, Andrea Marino, Laura Ricci
:
Leveraging the Users Graph and Trustful Transactions for the Analysis of Bitcoin Price. 1338-1352 - Huazhong Liu
, Laurence T. Yang
, Tong Yao, Jihong Ding, Anyuan Deng
:
Tensor-Train-Based Higher Order Dominant Z-Eigen Decomposition for Multi-Modal Prediction and Its Cloud/Edge Implementation. 1353-1366 - Jacob D. Moorman
, Thomas K. Tu
, Qinyi Chen
, Xie He
, Andrea L. Bertozzi
:
Subgraph Matching on Multiplex Networks. 1367-1384 - Youqi Li
, Fan Li
, Song Yang
, Pan Zhou
, Liehuang Zhu
, Yu Wang
:
Three-Stage Stackelberg Long-Term Incentive Mechanism and Monetization for Mobile Crowdsensing: An Online Learning Approach. 1385-1398