


Остановите войну!
for scientists:


default search action
IEEE Transactions on Network Science and Engineering, Volume 9
Volume 9, Number 1, January - February 2022
- Jianwei Huang:
Message From the Editor-in-Chief. 1-3 - Priyanthi M. Dassanayake
, Ashiq Anjum, Ali Kashif Bashir
, Joseph Bacon, Rabia Saleem, Warren Manning:
A Deep Learning Based Explainable Control System for Reconfigurable Networks of Edge Devices. 7-19 - Shudip Datta, Sanjay Kumar Madria
:
Prioritized Content Determination and Dissemination Using Reinforcement Learning in DTNs. 20-32 - Jianbo Du
, Wenjie Cheng, Guangyue Lu
, Haotong Cao
, Xiaoli Chu
, Zhicai Zhang
, Junxuan Wang
:
Resource Pricing and Allocation in MEC Enabled Blockchain Systems: An A3C Deep Reinforcement Learning Approach. 33-44 - Shahram Mollahasani, Melike Erol-Kantarci
, Mahdi Hirab, Hoda Dehghan, Rodney Wilson:
Actor-Critic Learning Based QoS-Aware Scheduler for Reconfigurable Wireless Networks. 45-54 - Naram Mhaisen, Alaa Awad Abdellatif, Amr Mohamed
, Aiman Erbad
, Mohsen Guizani
:
Optimal User-Edge Assignment in Hierarchical Federated Learning Based on Statistical Properties and Network Topology Constraints. 55-66 - Muhammad Ibrar
, Aamir Akbar
, Syed Rooh Ullah Jan
, Mian Ahmad Jan
, Lei Wang
, Houbing Song
, Nadir Shah
:
ARTNet: Ai-Based Resource Allocation and Task Offloading in a Reconfigurable Internet of Vehicular Networks. 67-77 - Dingde Jiang, Zhihao Wang
, Wenjuan Wang, Zhihan Lv
, Kim-Kwang Raymond Choo:
AI-Assisted Energy-Efficient and Intelligent Routing for Reconfigurable Wireless Networks. 78-88 - Anshu Thakur, Ashok Kumar, Nitin Gupta
, Puspita Chatterjee:
Secrecy Analysis of Reconfigurable Underlay Cognitive Radio Networks With SWIPT and Imperfect CSI. 89-97 - Xumin Huang
, Sahil Garg
, Jiangtian Nie
, Wei Yang Bryan Lim
, Yuanhang Qi, Yang Zhang
, M. Shamim Hossain
:
Toward Efficient Data Trading in AI Enabled Reconfigurable Wireless Sensor Network Using Contract and Game Theories. 98-108 - Shiping Wen
, Tingwen Huang
, Björn W. Schuller
, Ahmad Taher Azar
:
Guest Editorial: Introduction to the Special Section on Efficient Network Design for Convergence of Deep Learning and Edge Computing. 109-110 - Guanghui Wen, Jian Qin, Xingquan Fu, Wenwu Yu:
DLSTM: Distributed Long Short-Term Memory Neural Networks for the Internet of Things. 111-120 - Xiaojun Zhou
, Yuan Gao, Chaojie Li
, Zhaoke Huang
:
A Multiple Gradient Descent Design for Multi-Task Learning on Edge Computing: Multi-Objective Machine Learning Approach. 121-133 - Anis Koubaa
, Adel Ammar
, Anas Kanhouch
, Yasser AlHabashi
:
Cloud Versus Edge Deployment Strategies of Real-Time Face Recognition Inference. 143-160 - Lin Xu
, Xiangyong Cao
, Jing Yao
, Zheng Yan
:
Orthogonal Super Greedy Learning for Sparse Feedforward Neural Networks. 161-170 - Bin Xiao
, Fan Wu
, Francesco Chiti, Mohammad Hossein Manshaei, Giuseppe Ateniese:
Guest Editorial: Introduction to the Special Section on Security and Privacy for AI Models and Applications. 171-172 - Zhe Peng
, Jianliang Xu
, Xiaowen Chu
, Shang Gao
, Yuan Yao
, Rong Gu
, Yuzhe Tang
:
VFChain: Enabling Verifiable and Auditable Federated Learning via Blockchain Systems. 173-186 - Qiao Zhang
, Chunsheng Xin
, Hongyi Wu:
SecureTrain: An Approximation-Free and Computationally Efficient Framework for Privacy-Preserved Neural Network Training. 187-202 - Jialin Guo, Anfeng Liu
, Kaoru Ota
, Mianxiong Dong
, Xiaoheng Deng
, Neal N. Xiong
:
ITCN: An Intelligent Trust Collaboration Network System in IoT. 203-218 - Xianyi Chen
, Zhentian Zhang, Anqi Qiu, Zhihua Xia
, Neal N. Xiong
:
Novel Coverless Steganography Method Based on Image Selection and StarGAN. 219-230 - Shigeng Zhang
, Shuxin Chen, Xuan Liu, Chengyao Hua, Weiping Wang
, Kai Chen
, Jian Zhang, Jianxin Wang:
Detecting Adversarial Samples for Deep Learning Models: A Comparative Study. 231-244 - Yin Zhang
, Ala I. Al-Fuqaha
, Giancarlo Fortino
, Limei Peng, Iztok Humar
, Hua Wang
:
Guest Editorial: Introduction to the Special Section on Advanced Networking Technologies in the Battle Against the Outbreak of Epidemic Diseases. 245-246 - Miao Li
, Yixue Hao
, Yaxiong Ma
, Jincai Chen
, Long Hu
, Min Chen
, Kai Hwang, Zhongchun Liu:
Adjuvant Therapy System of COVID-19 Patient: Integrating Warning, Therapy, Post-Therapy Psychological Intervention. 247-257 - Zina Chkirbene
, Alaa Awad Abdellatif
, Amr Mohamed
, Aiman Erbad
, Mohsen Guizani
:
Deep Reinforcement Learning for Network Selection Over Heterogeneous Health Systems. 258-270 - Liang Tan
, Keping Yu
, Na Shi
, Caixia Yang
, Wei Wei
, Huimin Lu
:
Towards Secure and Privacy-Preserving Data Sharing for COVID-19 Medical Records: A Blockchain-Empowered Approach. 271-281 - Wenzhe Lv
, Sheng Wu
, Chunxiao Jiang
, Yuanhao Cui
, Xuesong Qiu
, Yan Zhang
:
Towards Large-Scale and Privacy-Preserving Contact Tracing in COVID-19 Pandemic: A Blockchain Perspective. 282-298 - Yingying Jiang
, Yujun Ma
, Jia Liu, Long Hu, Min Chen
, Iztok Humar
:
MER-WearNet: Medical-Emergency Response Wearable Networking Powered by UAV-Assisted Computing Offloading and WPT. 299-309 - Abdulsalam Yassine, M. Shamim Hossain
:
COVID-19 Networking Demand: An Auction-Based Mechanism for Automated Selection of Edge Computing Services. 308-318 - Wen Sun
, Ning Xu, Lu Wang
, Haibin Zhang
, Yan Zhang:
Dynamic Digital Twin and Federated Learning With Incentives for Air-Ground Networks. 321-333 - Zhaoquan Gu
, Le Wang
, Xiaolong Chen, Yunyi Tang, Xingang Wang, Xiaojiang Du
, Mohsen Guizani
, Zhihong Tian
:
Epidemic Risk Assessment by a Novel Communication Station Based Method. 332-344
Volume 9, Number 2, March - April 2022
- Wanjie Zhu
, Jinde Cao
, Xinli Shi, Leszek Rutkowski
:
Synchronization of Finite-Field Networks With Time Delays. 347-355 - Jinke Geng
, Yi Li
, Li Fang, Ping Chen:
VW-DBG: A Dynamically Evolving Bitcoin Transaction Network Model. 356-363 - Miaojiang Chen
, Anfeng Liu
, Wei Liu
, Kaoru Ota
, Mianxiong Dong
, Neal N. Xiong
:
RDRL: A Recurrent Deep Reinforcement Learning Scheme for Dynamic Spectrum Access in Reconfigurable Wireless Networks. 364-376 - Xinrui Ge
, Guofu Wei, Jia Yu
, Amit Kumar Singh
, Neal N. Xiong
:
An Intelligent Fuzzy Phrase Search Scheme Over Encrypted Network Data for IoT. 377-388 - Zhenyuan Guo
, Mengke Lian, Shiping Wen
, Tingwen Huang
:
An Adaptive Multi-Agent System With Duplex Control Laws for Distributed Resource Allocation. 389-400 - Naram Mhaisen, Mhd Saria Allahham
, Amr Mohamed
, Aiman Erbad
, Mohsen Guizani
:
On Designing Smart Agents for Service Provisioning in Blockchain-Powered Systems. 401-415 - Wei Ren
, Yan Sun
, Hong Luo
, Mohsen Guizani
:
A Demand-Driven Incremental Deployment Strategy for Edge Computing in IoT Network. 416-430 - Xiangli Jiang
, Guihua Xia
, Zhiguang Feng
, Zheng-Guang Wu
:
Nonfragile Formation Seeking of Unmanned Surface Vehicles: A Sliding Mode Control Approach. 431-444 - Jun Cheng
, Ju H. Park
, Zheng-Guang Wu
, Huaicheng Yan
:
Ultimate Boundedness Control for Networked Singularly Perturbed Systems With Deception Attacks: A Markovian Communication Protocol Approach. 445-456 - Yanhua Yang, Wenfeng Hu
:
Containment Control of Double-Integrator Multi-Agent Systems With Time-Varying Delays. 457-466 - Yi-Jheng Lin
, Che-Hao Yu
, Tzu-Hsuan Liu, Cheng-Shang Chang
, Wen-Tsuen Chen
:
Constructions and Comparisons of Pooling Matrices for Pooled Testing of COVID-19. 467-480 - Xiang-Gui Guo
, Dongyu Zhang
, Jian-Liang Wang
, Ju H. Park
, Lei Guo
:
Event-Triggered Observer-Based $\mathcal {H}_\infty$ Consensus Control and Fault Detection of Multiagent Systems Under Stochastic False Data Injection Attacks. 481-494 - Lei Shi
, Yuhua Cheng, Jinliang Shao
, Xiaofan Wang
, Hanmin Sheng
:
Leader-Follower Opinion Dynamics of Signed Social Networks With Asynchronous Trust/Distrust Level Evolution. 495-509 - Lan Gao
, Shaojiang Deng, Huaqing Li
, Chaojie Li
:
An Event-Triggered Approach for Gradient Tracking in Consensus-Based Distributed Optimization. 510-523 - Lavanya Marla
, Lav R. Varshney
, Devavrat Shah
, Nirmal A. Prakash
, Michael E. Gale:
Short and Wide Network Paths. 524-537 - Mingshan Jia
, Bogdan Gabrys
, Katarzyna Musial
:
Measuring Quadrangle Formation in Complex Networks. 538-551 - Igor Tomovski
, Lasko Basnarkov
, Alajdin Abazi
:
Discrete-Time Non-Markovian SEIS Model on Complex Networks. 552-563 - Xin Gong
, Yukang Cui
, Jun Shen
, Junlin Xiong
, Tingwen Huang
:
Distributed Optimization in Prescribed-Time: Theory and Experiment. 564-576 - Jinyin Chen
, Dunjie Zhang, Zhaoyan Ming
, Kejie Huang
, Wenrong Jiang, Chen Cui:
GraphAttacker: A General Multi-Task Graph Attack Framework. 577-595 - Hao Yu
, Tarik Taleb
, Jiawei Zhang, Honggang Wang
:
Deterministic Latency Bounded Network Slice Deployment in IP-Over-WDM Based Metro-Aggregation Networks. 596-607 - Xi Qin
, Cheng Zhong
, Qingshan Yang:
An Influence Maximization Algorithm Based on Community-Topic Features for Dynamic Social Networks. 608-621 - Abubakr O. Al-Abbasi, Lutfi Samara
, Ahmed Kamal Sultan-Salem, Ridha Hamila
, Naofal Al-Dhahir
:
A Unified Framework for Differentiated Services in Intelligent Healthcare Systems. 622-633 - Xinrui Ji
, Jianquan Lu
, Bangxin Jiang
, Kaibo Shi
:
Distributed Synchronization of Delayed Neural Networks: Delay-Dependent Hybrid Impulsive Control. 634-647 - Yue Zhao
, Chunjie Zhou
, Yu-Chu Tian
, Yuanqing Qin
, Xiaoya Hu
:
$L_2$ Gain Secure Control of Cyber-Physical Systems Under Fast Time-Varying Cyber Attacks. 648-659 - Jiayan Liu
, Xiongwen Zhao
, Peng Qin
, Suiyan Geng, Sachula Meng:
Joint Dynamic Task Offloading and Resource Scheduling for WPT Enabled Space-Air-Ground Power Internet of Things. 660-677 - Fan Wang
, Zidong Wang
, Jinling Liang
, Carlos Silvestre
:
A Recursive Algorithm for Secure Filtering for Two-Dimensional State-Saturated Systems Under Network-Based Deception Attacks. 678-688 - Junyou Zhu, Chunyu Wang
, Chao Gao
, Fan Zhang, Zhen Wang
, Xuelong Li:
Community Detection in Graph: An Embedding Method. 689-702 - Lijuan Xu
, Bailing Wang, Xiaoming Wu, Dawei Zhao
, Lei Zhang
, Zhen Wang
:
Detecting Semantic Attack in SCADA System: A Behavioral Model Based on Secondary Labeling of States-Duration Evolution Graph. 703-715 - Yichao Zhang
, Huangxin Zhuang
, Tiantian Liu, Bowei Chen
, Zhiwei Cao
, Yun Fu
, Zhijie Fan
, Guanrong Chen
:
A Bayesian Graph Embedding Model for Link-Based Classification Problems. 716-727 - Mayee F. Chen, Miklós Z. Rácz
:
An Adversarial Model of Network Disruption: Maximizing Disagreement and Polarization in Social Networks. 728-739 - Abhiram Singh
, Sidharth Sharma
, Ashwin Gumaste
, Jianping Wang
:
Grafnet: Using Graph Neural Networks to Create Table-Less Routers. 740-754 - Yinyan Liu
, Jing Qiu
, Junda Lu
, Wei Wang
, Jin Ma
:
A Single-to-Multi Network for Latency-Free Non-Intrusive Load Monitoring. 755-768 - Marsa Rayani
, Amin Ebrahimzadeh
, Roch H. Glitho
, Halima Elbiaze
:
Ensuring Profit and QoS When Dynamically Embedding Delay-Constrained ICN and IP Slices for Content Delivery. 769-782 - Bingyi Liu
, Dongxiao Deng, Wenbi Rao, Enshu Wang
, Shengwu Xiong
, Dongyao Jia
, Jianping Wang
, Chunming Qiao:
CPA-MAC: A Collision Prediction and Avoidance MAC for Safety Message Dissemination in MEC-Assisted VANETs. 783-794 - Guanglei Zhao
, Changchun Hua
:
Sampled-Data Leaderless and Leader-Following Consensus of Multiagent Systems Under Nonidentical Packet Losses. 795-806 - Zhengran Cao
, Chuandong Li
, Zhilong He, Xiaoyu Zhang, Le You
:
Synchronization of Coupled Stochastic Reaction-Diffusion Neural Networks With Multiple Weights and Delays via Pinning Impulsive Control. 820-833 - Chenxi Liu
, Zhu Xiao
, Dong Wang
, Lei Wang, Hongbo Jiang
, Hongyang Chen
, Jiangxia Yu:
Exploiting Spatiotemporal Correlations of Arrive-Stay-Leave Behaviors for Private Car Flow Prediction. 834-847 - Ruohan Meng
, Qi Cui
, Zhili Zhou
, Zhetao Li
, Q. M. Jonathan Wu
, Xingming Sun
:
High-Capacity Steganography Using Object Addition-Based Cover Enhancement for Secure Communication in Networks. 848-862 - Roya Aliakbarisani
, Abdorasoul Ghasemi
, M. Ángeles Serrano
:
Perturbation of the Normalized Laplacian Matrix for the Prediction of Missing Links in Real Networks. 863-874 - Xin Shen, Sarah Aliko
, Yue Han, Jeremy I. Skipper
, Chengbin Peng
:
Finding Core-Periphery Structures With Node Influences. 875-887 - Jingxuan Tan
, Xin Liao
, Jiate Liu, Yun Cao
, Hongbo Jiang:
Channel Attention Image Steganography With Generative Adversarial Networks. 888-903 - Weijian Pan, Zhaoji Deng, Xiumin Wang
, Pan Zhou
, Weiwei Wu
:
Optimizing the Age of Information for Multi-Source Information Update in Internet of Things. 904-917 - Huan Gao
, Yongqiang Wang
:
Algorithm-Level Confidentiality for Average Consensus on Time-Varying Directed Graphs. 918-931 - Kung-Jui Pai
, Jinn-Shyong Yang, Guan-Yu Chen, Jou-Ming Chang
:
Configuring Protection Routing via Completely Independent Spanning Trees in Dense Gaussian On-Chip Networks. 932-946 - Jiwei Tian
, Buhong Wang
, Jing Li, Zhen Wang
:
Adversarial Attacks and Defense for CNN Based Power Quality Recognition in Smart Grid. 807-819
Volume 9, Number 3, May - June 2022
- Ching-Hsien Hsu, Carlos Enrique Montenegro Marín
, Rubén González Crespo
, Hassan Fouad Mohamed El-sayed:
Guest Editorial Introduction to the Special Section on Social Computing and Social Internet of Things. 947-949 - Haibo Yi
:
Secure Social Internet of Things Based on Post-Quantum Blockchain. 950-957 - Hassam Mughal, Muhammad Bilal
, Uttam Ghosh
, Gautam Srivastava
, Sayed Chhattan Shah
:
Efficient Allocation of Resource-Intensive Mobile Cyber-Physical Social System Applications on a Heterogeneous Mobile Ad Hoc Cloud. 958-969 - Xiaogang Zhu
, Sheng Wen
, Alireza Jolfaei
, Mohammad Sayad Haghighi
, Seyit Camtepe
, Yang Xiang
:
Vulnerability Detection in SIoT Applications: A Fuzzing Method on their Binaries. 970-979 - Yong Cui
, Xiao Song
, Jianwei Liu
, Kai Chen
, Guoqiang Shi, Junhua Zhou, Tamizharasi GS:
AACF - Accessible Application-Centric Framework for the Internet of Things Backhauled Smart City Applications. 980-989 - Feng Xia
, Shuo Yu
, Chengfei Liu
, Jianxin Li
, Ivan Lee
:
CHIEF: Clustering With Higher-Order Motifs in Big Networks. 990-1005 - Yuanman Li
, Rongqin Liang
, Wei Wei
, Wei Wang
, Jiantao Zhou
, Xia Li
:
Temporal Pyramid Network With Spatial-Temporal Attention for Pedestrian Trajectory Prediction. 1006-1019 - Yixuan Yang
, Fei Hao
, Beibei Pang, Geyong Min
, Yulei Wu
:
Dynamic Maximal Cliques Detection and Evolution Management in Social Internet of Things: A Formal Concept Analysis Approach. 1020-1032 - Guofeng Qin
, Shuo Yang, Sichang Li:
A Vehicle Path Tracking System With Cooperative Recognition of License Plates and Traffic Network Big Data. 1033-1043 - Fangfang Luo
, Genggeng Liu
, Wenzhong Guo
, Guolong Chen, Naixue Xiong
:
ML-KELM: A Kernel Extreme Learning Machine Scheme for Multi-Label Classification of Real Time Data Stream in SIoT. 1044-1055 - Shenghao Liu
, Bang Wang
, Laurence T. Yang
, Philip S. Yu
:
HNF: Hybrid Neural Filtering Based on Centrality-Aware Random Walk for Personalized Recommendation. 1056-1066 - Zhiwei Guo
, Keping Yu
, Yu Li
, Gautam Srivastava
, Jerry Chun-Wei Lin
:
Deep Learning-Embedded Social Internet of Things for Ambiguity-Aware Social Recommendations. 1067-1081 - Gunasekaran Manogaran, Bharat S. Rawal
, Mamoun Alazab
:
Boosted Tree Classifier Algorithm Based Collaborative Computing Framework for Smart System. 1082-1090 - Kazuya Sakai
, Min-Te Sun
, Wei-Shinn Ku
, Jie Wu
:
Towards Wireless Power Transfer in Mobile Social Networks. 1091-1103 - Akhil Bhimaraju
, Avhishek Chatterjee
, Lav R. Varshney
:
Expected Extinction Times of Epidemics With State-Dependent Infectiousness. 1104-1116 - Qingnan Rong
, Jun Zhang
, Xiaoqian Sun
, Sebastian Wandelt
, Massimiliano Zanin
, Liang Tian:
Optimal Cost-Based Strengthening of Complex Networks. 1117-1127 - Nhu-Ngoc Dao
, Duc-Nghia Vu
, Anh-Tien Tran
, Trung V. Phan
, Schahram Dustdar
, Sungrae Cho
:
On System Stability in Multitier Roadside Computing Toward an Intelligent Transportation. 1128-1138 - Kazuki Nakajima
, Kazuyuki Shudo
, Naoki Masuda
:
Randomizing Hypergraphs Preserving Degree Correlation and Local Clustering. 1139-1153 - Yuwen Song
, Jinde Cao
, Leszek Rutkowski
:
A Fixed-Time Distributed Optimization Algorithm Based on Event-Triggered Strategy. 1154-1162 - Peihu Duan
, Yuezu Lv
, Zhisheng Duan
, Guanrong Chen
:
Distributed State Estimation for Uncertain Linear Systems With a Recursive Architecture. 1163-1174 - Zhongyi Zhao
, Zidong Wang
, Lei Zou
, Yun Chen
, Weiguo Sheng
:
Event-Triggered Set-Membership State Estimation for Complex Networks: A Zonotopes-Based Method. 1175-1186 - Qiufen Ni
, Jianxiong Guo
, Weili Wu
, Huan Wang
, Jigang Wu
:
Continuous Influence-Based Community Partition for Social Networks. 1187-1197 - Jin Xu
, I-Hong Hou
, Natarajan Gautam
:
Age of Information for Single Buffer Systems With Vacation Server. 1198-1214 - Li Zou
, Xiu-Xiu Zhan
, Jie Sun
, Alan Hanjalic
, Huijuan Wang
:
Temporal Network Prediction and Interpretation. 1215-1224 - Jiacheng Shang
, Jie Wu
:
Voice Liveness Detection for Voice Assistants Through Ear Canal Pressure Monitoring. 1225-1234 - Yongjie Xie, Li Pan
, Shengsong Yang, Shijun Liu
:
A Random Online Algorithm for Reselling Reserved IaaS Instances in Amazon's Cloud Marketplace. 1235-1244 - Ke Gu
, XinYing Dong
, Xiong Li
, Weijia Jia
:
Cluster-Based Malicious Node Detection for False Downstream Data in Fog Computing-Based VANETs. 1245-1263 - Karlo Griparic, Marsela Polic
, Marko Krizmancic
, Stjepan Bogdan
:
Consensus-Based Distributed Connectivity Control in Multi-Agent Systems. 1264-1281 - Yifan Zhuang
, Ziyuan Pu
, Jia Hu
, Yinhai Wang
:
Illumination and Temperature-Aware Multispectral Networks for Edge-Computing-Enabled Pedestrian Detection. 1282-1295 - Bo Liang
, Xiaofan Wang
, Lin Wang
:
Impact of Heterogeneity on Network Embedding. 1296-1307 - Junhao Peng
, Tengjie Chen, Guoai Xu
:
Optimizing the Trapping (Transport) Efficiency in Regular Branched Networks. 1308-1318 - Junkang Ni
, Yu Zhao
, Jinde Cao
, Weilin Li:
Fixed-Time Practical Consensus Tracking of Multi-Agent Systems With Communication Delay. 1319-1334 - Fei Ma
, Ping Wang
, Xudong Luo
:
Random Walks on Stochastic Generalized Vicsek Fractal Networks: Analytic Solution and Simulations. 1335-1345