


default search action
IEEE Transactions on Network and Service Management, Volume 22
Volume 22, Number 1, February 2025
- Malte Tashiro
, Emile Aben
, Romain Fontugne
:
Metis: Selecting Diverse Atlas Vantage Points. 3-14 - Cong Zhou
, Baokang Zhao
, Fengxiao Tang
, Biao Han
, Baosheng Wang:
Dynamic Multi-Objective Service Function Chain Placement Based on Deep Reinforcement Learning. 15-29 - Katalin Hajdú-Szücs
, Péter Vaderna, Zsófia Kallus
, Péter Kersch, János Márk Szalai-Gindl, Sándor Laki
:
Ensemble Graph Attention Networks for Cellular Network Analytics: From Model Creation to Explainability. 30-44 - Yong Xiao
, Jianxun Liu
, Guosheng Kang
, Buqing Cao
:
Group Feature Aggregation for Web Service Recommendations. 45-57 - Yacine Anser
, Chrystel Gaber
, Jean-Philippe Wary, Samia Bouzefrane
, Méziane Yacoub, Onur Kalinagac, Gürkan Gür:
Liability and Trust Analysis Framework for Multi-Actor Dynamic Microservices. 58-71 - Tailai Song
, Gianluca Perna
, Paolo Garza
, Michela Meo
, Maurizio Matteo Munafò:
Packet Loss in Real-Time Communications: Can ML Tame Its Unpredictable Nature? 72-91 - Linghao Wang
, Lu Lu
, Miao Wang
, Zhiqiang Li, Hongwei Yang, Shuyong Zhu, Yujun Zhang
:
SNS: Smart Node Selection for Scalable Traffic Engineering in Segment Routing Networks. 92-106 - Roberto Gonçalves Pacheco
, Divya J. Bajpai
, Mark Shifrin
, Rodrigo S. Couto
, Daniel Sadoc Menasché
, Manjesh K. Hanawal
, Miguel Elias M. Campista
:
UCBEE: A Multi Armed Bandit Approach for Early-Exit in Neural Networks. 107-120 - Behshid Shayesteh
, Chunyan Fu
, Amin Ebrahimzadeh
, Roch H. Glitho
:
Adaptive Feature Selection for Predicting Application Performance Degradation in Edge Cloud Environments. 121-138 - Yibo Zhang
, Xiangwang Hou
, Guoyu Du
, Qi Li
, Mian Ahmad Jan
, Alireza Jolfaei
, Muhammad Usman
:
Machine Learning-Based Reliable Transmission for UAV Networks With Hybrid Multiple Access. 139-150 - Yu-Zhen Janice Chen
, Daniel S. Menasché
, Don Towsley
:
On Collaboration in Distributed Parameter Estimation With Resource Constraints. 151-167 - Yuyang Zhou
, Guang Cheng
, Zhi Ouyang, Zongyao Chen
:
Resource-Efficient Low-Rate DDoS Mitigation With Moving Target Defense in Edge Clouds. 168-186 - Xu Yu
, Yan Lu, Feng Jiang
, Qiang Hu
, Junwei Du, Dunwei Gong
:
A Cross-Domain Intrusion Detection Method Based on Nonlinear Augmented Explicit Features. 187-197 - Jianhua Wang
, Xiaolin Chang
, Jelena V. Misic
, Vojislav B. Misic
, Lin Li
, Yingying Yao:
CRS-FL: Conditional Random Sampling for Communication-Efficient and Privacy-Preserving Federated Learning. 198-208 - Renato Souza Silva
, Luís Felipe M. de Moraes
:
GonoGo - Assessing the Confidence Level of Distribute Intrusion Detection Systems Alarms Based on BGP. 209-219 - Yonghan Wu
, Jin Li
, Min Zhang, Bing Ye
, Xiongyan Tang:
A Comprehensive and Efficient Topology Representation in Routing Computation for Large-Scale Transmission Networks. 220-241 - Jatinder Kumar, Deepika Saxena, Jitendra Kumar, Ashutosh Kumar Singh, Athanasios V. Vasilakos:
An Adaptive Evolutionary Neural Network Model for Load Management in Smart Grid Environment. 242-254 - Yujie Zhao
, Tao Peng
, Yichen Guo
, Yijing Niu
, Wenbo Wang
:
An Intelligent Scheme for Energy-Efficient Uplink Resource Allocation With QoS Constraints in 6G Networks. 255-269 - Yang Gao
, Jun Tao
, Zuyan Wang
, Yifan Xu
:
Analytical Scheduling for Selfishness Detection in OppNets Based on Differential Game. 270-283 - Qiyuan Fan
, Xue Li
, Puming Wang
, Xin Jin, Shaowen Yao
, Shengfa Miao, Sizhang Li
, Min An
, Jing Xu:
BDIP: An Efficient Big Data-Driven Information Processing Framework and Its Application in DDoS Attack Detection. 284-298 - Xiangshuo Zheng
, Wenting Shen
, Ye Su
, Yuan Gao:
DIADD: Secure Deduplication and Efficient Data Integrity Auditing With Data Dynamics for Cloud Storage. 299-316 - Ting Yu
, Zijian Gao
, Kele Xu
, Xu Wang
, Peichang Shi
, Bo Ding
, Dawei Feng
:
Dual Temporal Masked Modeling for KPI Anomaly Detection via Similarity Aggregation. 317-330 - Van Tong
, Cuong Dao
, Hai Anh Tran
, Duc Tran
, Huynh Thi Thanh Binh
, Nam-Thang Hoang
, Truong X. Tran
:
Encrypted Traffic Classification Through Deep Domain Adaptation Network With Smooth Characteristic Function. 331-343 - Yingjun Ye
, Ke Ruan, Weihao Yu
:
Evaluation and Optimization of Backbone Network Reliability Problems Using Decision Diagram Methods. 344-360 - Daniel Ayepah-Mensah
, Guolin Sun
, Gordon Owusu Boateng
, Guisong Liu
:
Federated Policy Distillation for Digital Twin-Enabled Intelligent Resource Trading in 5G Network Slicing. 361-379 - Jia Xu
, Xiao Liu
, Jiong Jin
, Wuzhen Pan, Xuejun Li
, Yun Yang
:
Holistic Service Provisioning in a UAV-UGV Integrated Network for Last-Mile Delivery. 380-393 - Qianwei Meng
, Qingjun Yuan
, Weina Niu
, Yongjuan Wang
, Siqi Lu
, Guangsong Li, Xiangbin Wang, Wenqi He:
IIT: Accurate Decentralized Application Identification Through Mining Intra- and Inter-Flow Relationships. 394-408 - Endri Goshi
, Fidan Mehmeti
, Thomas F. La Porta
, Wolfgang Kellerer
:
Modeling and Analysis of mMTC Traffic in 5G Core Networks. 409-425 - Hua Wang, Yanxian Bi, Fulong Yan
, Long Wang
, Jie Zhang
, Lena Wosinska
:
Multi-Beam Satellite Optical Networks: A Joint Time-Slot Resource Scheduling for End-to-End Services From a Networking Perspective. 426-438 - Redha A. Alliche
, Ramon Aparicio-Pardo
, Lucile Sassatelli
:
O-DQR: A Multi-Agent Deep Reinforcement Learning for Multihop Routing in Overlay Networks. 439-455 - Lifan Mei
, Jinrui Gou, Jingrui Yang, Yujin Cai, Yong Liu
:
On Routing Optimization in Networks With Embedded Computational Services. 456-469 - Lihui Zhang, Gang Sun
, Rulin Liu, Wei Quan
, Hongfang Yu
, Dusit Niyato
:
Priority-Dominated Traffic Scheduling Enabled ATS in Time-Sensitive Networking. 470-484 - Tamás Lévai
, Balázs Vass
, Gábor Rétvári:
Programmable Real-Time Scheduling of Disaggregated Network Functions: A Theoretical Model. 485-498 - Ailing Xiao
, Sheng Wu
, Yongkang Ou, Ning Chen
, Chunxiao Jiang
, Wei Zhang
:
QoE-Fairness-Aware Bandwidth Allocation Design for MEC-Assisted ABR Video Transmission. 499-515 - Xuwei Fan
, Zhipeng Cheng
, Ning Chen
, Lianfen Huang
, Xianbin Wang
:
QoE-Oriented Dependent Task Scheduling Under Multi-Dimensional QoS Constraints Over Distributed Networks. 516-531 - He Bai
, Hui Li
, Jianming Que, Abla Smahi, Minglong Zhang
, Peter Han Joo Chong
, Shuo-Yen Robert Li, Xiyu Wang, Ping Lu:
QSCCP: A QoS-Aware Congestion Control Protocol for Information-Centric Networking. 532-556 - Theodoros Giannakas
, Dimitrios Tsilimantos
, Apostolos Destounis
, Thrasyvoulos Spyropoulos:
Fast Edge Resource Scaling With Distributed DNN. 557-571 - Chang-Lin Chen
, Hanhan Zhou, Jiayu Chen
, Mohammad Pedramfar, Tian Lan, Zheqing Zhu, Chi Zhou, Pol Mauri Ruiz, Neeraj Kumar, Hongbo Dong, Vaneet Aggarwal
:
Learning-Based Two-Tiered Online Optimization of Region-Wide Datacenter Resource Allocation. 572-581 - Saksham Katwal
, Nidhi Sharma
, Krishan Kumar
:
A Deep Learning Approach for Throughput Enhanced Clustering and Spectrally Efficient Resource Allocation in Ultra-Dense Networks. 582-591 - Krishna Pal Thakur, Basabdatta Palit
:
A QoS-Aware Uplink Spectrum and Power Allocation With Link Adaptation for Vehicular Communications in 5G Networks. 592-604 - Na Lin
, Xiao Han, Ammar Hawbani
, Yunhe Sun, Yunchong Guan
, Liang Zhao
:
Deep Reinforcement Learning-Based Dual-Timescale Service Caching and Computation Offloading for Multi-UAV Assisted MEC Systems. 605-617 - Renchao Xie
, Wen Wen
, Wenzheng Wang
, Qinqin Tang
, Xiaodong Duan, Lu Lu
, Tao Sun
, Tao Huang
, Fei Richard Yu
:
Incentive Mechanism Design for Trust-Driven Resources Trading in Computing Force Networks: Contract Theory Approach. 618-634 - Merim Dzaferagic
, Bruno Missi Xavier, Diarmuid Collins, Vince D'Onofrio, Magnos Martinello, Marco Ruffini
:
ML-Based Handover Prediction Over a Real O-RAN Deployment Using RAN Intelligent Controller. 635-647 - Patrick Luiz de Araújo
, Murillo Guimarães Carneiro
, Luis M. Contreras
, Rafael Pasquini
:
MTP-NT: A Mobile Traffic Predictor Enhanced by Neighboring and Transportation Data. 648-659 - Hiba Hojeij
, Mahdi Sharara
, Sahar Hoteit
, Véronique Vèque
:
On Flexible Placement of O-CU and O-DU Functionalities in Open-RAN Architecture. 660-674 - Xiao He
, Shanchen Pang
, Haiyuan Gui, Kuijie Zhang, Nuanlai Wang
, Shihang Yu
:
Online Offloading and Mobility Awareness of DAG Tasks for Vehicle Edge Computing. 675-690 - Shachi Sharma
, Prakash Datt Bhatt
:
Performance Modeling of IoT-Cloud Gateway Under Diverse Traffic Characteristics. 691-701 - Zhaowei Zhang, Chunfeng Liu, Wenyu Qu, Zhao Zhao, Weisi Guo:
PRobust: A Percolation-Based Robustness Optimization Model for Underwater Acoustic Sensor Networks. 702-717 - Bing Tang
, Zhikang Wu, Wei Xu, Buqing Cao
, Mingdong Tang, Qing Yang:
TP-MDU: A Two-Phase Microservice Deployment Based on Minimal Deployment Unit in Edge Computing Environment. 718-731 - Subhrajit Barick
, Chetna Singhal
:
UAV-Assisted MEC Architecture for Collaborative Task Offloading in Urban IoT Environment. 732-743 - Reo Uneyama
, Takehiro Sato
, Eiji Oki
:
Flow Update Model Based on Probability Distribution of Migration Time in Software-Defined Networks. 744-759 - Yanfei Wu
, Liang Liang
, Yunjian Jia
, Wanli Wen
:
HFL-TranWGAN: Knowledge-Driven Cross-Domain Collaborative Anomaly Detection for End-to-End Network Slicing. 760-776 - Niloy Saha
, Nashid Shahriar
, Muhammad Sulaiman
, Noura Limam
, Raouf Boutaba
, Aladdin Saleh:
Monarch: Monitoring Architecture for 5G and Beyond Network Slices. 777-790 - Shimin Sun
, Xiangyun Liu
, Meiyu Wang, Ze Wang
, Li Han
:
Predictive Control Plane Balancing in SD-IoT Networks Based on Elitism Genetic Algorithm and Non-Cooperative Game Theory. 791-806 - Yahuza Bello
, Ahmed Refaey Hussein
:
Dynamic Policy Decision/Enforcement Security Zoning Through Stochastic Games and Meta Learning. 807-821 - Ehsan Nowroozi
, Imran Haider, Rahim Taheri
, Mauro Conti
:
Federated Learning Under Attack: Exposing Vulnerabilities Through Data Poisoning Attacks in Computer Networks. 822-831 - Bo Yang
, Liquan Chen
, Jiaorui Shen
, Huaqun Wang
, Yang Ma:
FHE-Based Publicly Verifiable Sealed-Bid Auction Protocol Atop Cross-Blockchain. 832-845 - Yin Wang
, Na Xia
, Bin Chen
, Yutao Yin
, Lei Chen
, Zijian Wang
, Sizhou Wei
, Ke Zhang
:
Flow Adjustment and Scale-Free Reliable Topology Control for Underwater Acoustic Sensor Networks. 846-859 - Xin Tang
, Luchao Jin
, Jing Bai
, Linjie Shi, Yudan Zhu
, Ting Cui:
Key Transferring-Based Secure Deduplication for Cloud Storage With Resistance Against Brute-Force Attacks. 860-876 - Zhengran Tian, Hao Wang
, Zhi Li
, Ziyu Niu, Xiaochao Wei
, Ye Su
:
MDTL: Maliciously Secure Distributed Transfer Learning Based on Replicated Secret Sharing. 877-891 - Muhammad Asghar Khan
, Neeraj Kumar
, Saeed Hamood Alsamhi
, Gordana Barb
, Justyna Zywiolek
, Insaf Ullah
, Fazal Noor
, Jawad Ali Shah, Abdullah Mohammed Almuhaideb
:
Security and Privacy Issues and Solutions for UAVs in B5G Networks: A Review. 892-912 - Ashutosh Dutta
, Ehab Al-Shaer
, Ehsan Aghaei, Qi Duan
, Hasan Yasar:
Security Control Grid for Optimized Cyber Defense Planning. 913-929 - Kai Zhao
, Xiaowei Chuo, Fangchao Yu, Bo Zeng
, Zhi Pang, Lina Wang
:
SplitAUM: Auxiliary Model-Based Label Inference Attack Against Split Learning. 930-940 - Hongping Gan
, Hejie Zheng
, Zhangfa Wu
, Chunyan Ma
, Jie Liu
:
TFD-Net: Transformer Deviation Network for Weakly Supervised Anomaly Detection. 941-954
Volume 22, Number 2, April 2025
- Kengo Tajiri
, Ryoichi Kawahara:
Optimization of Data and Model Transfer for Federated Learning to Manage Large-Scale Network. 958-973 - Zhenyu Fu, Juan Liu
, Yuyi Mao
, Long Qu
, Ling Fu Xie
, Xijun Wang
:
Energy-Efficient UAV-Assisted Federated Learning: Trajectory Optimization, Device Scheduling, and Resource Management. 974-988 - Lo-Yao Yeh
, Sheng-Po Tseng, Chia-Hsun Lu, Chih-Ya Shen
:
Auditable Homomorphic-Based Decentralized Collaborative AI With Attribute-Based Differential Privacy. 989-1004 - Xinlei Yu
, Yijing Lin
, Zhipeng Gao
, Hongyang Du
, Dusit Niyato
:
Dynamic and Fast Convergence for Federated Learning via Optimized Hyperparameters. 1005-1018 - Yingying Wu
, Bomin Mao
, Nei Kato
:
MSFL: Model-Safeguarded Federated Learning With Intelligent Reflecting Surface for Industrial Networks. 1019-1028 - Wathsara Daluwatta
, Ibrahim Khalil
, Shehan Edirimannage
, Mohammed Atiquzzaman
:
UaaS-SFL: Unlearning as a Service for Safeguarding Federated Learning. 1029-1045 - Abhijit Biswas, Subhrajyoti Deb
, Nirmalya Kar
, Joy Lal Sarkar
, Ayan Mondal
:
Event-Triggered Sliding Mode Controller for Cognitive Internet of Things. 1046-1054 - Aroosa Hameed
, John Violos
, Nina Santi
, Aris Leivadeas
, Nathalie Mitton
:
FeD-TST: Federated Temporal Sparse Transformers for QoS Prediction in Dynamic IoT Networks. 1055-1069 - Yanli Xu
, Zhou Kong
:
Joint Frame Preemption and Credit-Based Shaping Scheduling for Real-Time Transmission. 1070-1082 - Canghai Wu, Lingdan Chen
, Huanliang Xiong, Jianwen Hu:
USMN-SCA: A Blockchain Sharding Consensus Algorithm With Tolerance for an Unlimited Scale of Malicious Nodes. 1083-1098 - Chengjie Li
, Lidong Zhu
, Zhen Zhang
:
Toward 6G Networks: Architecture and Strategy for Information Security Transmission Based on Multi-Source Heterogeneous Data. 1099-1107 - Sotirios T. Spantideas
, Anastasios E. Giannopoulos, Panagiotis Trakadas:
Smart Mission Critical Service Management: Architecture, Deployment Options, and Experimental Results. 1108-1128 - Curtis Rookard
, Anahita Khojandi
:
Unsupervised Machine Learning for Cybersecurity Anomaly Detection in Traditional and Software-Defined Networking Environments. 1129-1144 - Giannis Savva
, Konstantinos Manousakis
, Georgios Ellinas
:
A Network Coding Optimization Approach for Physical Layer Security in Elastic Optical Networks. 1145-1159 - Xingyu He
, Xiankai Li
, Guisong Yang
, Shi Chang, Jiehan Zhou
:
A Network Connectivity-Aware Reinforcement Learning Method for Task Exploration and Allocation. 1160-1173 - Yogita Pimpalkar
, Sharvari Ravindran
, Jyotsna Bapat
, Debabrata Das
:
A Novel E2E Path Selection Algorithm for Superior QoS and QoE for 6G Services. 1174-1187 - Yukti Kaura
, Brejesh Lall
, Ranjan K. Mallik
, Amit Singhal
:
Adaptive Scheduling of Shared Grant-Free Resources for Heterogeneous Massive Machine Type Communication in 5G and Beyond Networks. 1188-1204 - Jun Dai
, Xinbin Li
, Song Han
, Junzhi Yu
, Zhixin Liu
, Tongwei Zhang
:
An Extended Bandit-Based Game Scheme for Distributed Joint Resource Allocation in Underwater Acoustic Communication Networks. 1205-1218 - Navya Vuppalapati
, T. G. Venkatesh
:
Candidate Selection Algorithms for Hybrid IP/SDN Networks With Multi-Link Failures. 1219-1231 - Meng Sun
, Tao Zhang
, Liang Liu
:
Constellation Configuration Optimization Method for User Distribution Characteristics of LEO Satellite Networks. 1232-1246 - Qiang Tang
, Bao Li
, Halvin Yang
, Yan Li, Shiming He, Kun Yang
:
Delay and Load Fairness Optimization With Queuing Model in Multi-AAV Assisted MEC: A Deep Reinforcement Learning Approach. 1247-1258 - Xinyu Yuan
, Yan Qiao
, Zhenchun Wei
, Zeyu Zhang, Minyue Li, Pei Zhao, Rongyao Hu, Wenjing Li
:
Diffusion Models Meet Network Management: Improving Traffic Matrix Analysis With Diffusion-Based Approach. 1259-1275 - Omar Nassef
, Toktam Mahmoodi
, Federico Chiariotti
, Stephen H. Johnson:
DRel: Dynamically Assigning Per-Packet Reliability at the Transport Layer. 1276-1294 - Abdul Basit
, Muddasir Rahim
, Tri Nhu Do
, Nadir H. Adam
, Georges Kaddoum
:
DRL-Based Maximization of the Sum Cross-Layer Achievable Rate for Networks Under Jamming. 1295-1313 - Peiran Zhong
, Fanqin Zhou
, Lei Feng
, Wenjing Li
:
FINT: Freshness-Based In-Band Network-Wide Telemetry in Resource-Constrained Environments. 1314-1329 - Sharvari N. P
, Dibakar Das, Jyotsna Bapat
, Debabrata Das
:
Improved Q-Learning-Based Multi-Hop Routing for UAV-Assisted Communication. 1330-1344 - Jiangang Liu
, Hanjiang Luo
, Hang Tao
, Jiahong Liu
, Jiehan Zhou
:
JLOS: A Cooperative UAV-Based Optical Wireless Communication With Multi-Agent Reinforcement Learning. 1345-1356 - Parisa Fard Moshiri, Murat Simsek
, Burak Kantarci
:
Joint Optimization of Completion Ratio and Latency of Offloaded Tasks With Multiple Priority Levels in 5G Edge. 1357-1371 - Nguyen Xuan Tung
, Trinh Van Chien
, Dinh Thai Hoang
, Won-Joo Hwang
:
Jointly Optimizing Power Allocation and Device Association for Robust IoT Networks Under Infeasible Circumstances. 1372-1390 - Xindi Hou
, Shuai Gao
, Ningchun Liu
, Fangtao Yao
, Bo Lei, Hongke Zhang
, Sajal K. Das
:
L3DML: Facilitating Geo-Distributed Machine Learning in Network Layer. 1391-1408 - Amit Dilip Patil
, Abdorasoul Ghasemi
, Hermann de Meer:
Optimal Redundant Sensor Placement for Protection Blinding in Active Distribution Grids. 1409-1419 - Ren-Hung Hwang
, Tsai-Ying Chou, Jia-You Lin
, Didik Sudyana
, Yuan-Cheng Lai
, Ying-Dar Lin
:
Optimal Resource Allocation for AIoT as a Service Under Various Service Scenarios and Architectures. 1420-1436 - Ruowen Yan
, Qiao Li
, Huagang Xiong
:
Optimizing Traffic Management in Airborne Power Line Communication Networks: A Credit-Based Shaping Approach Using Network Calculus. 1437-1449 - Madhu Donipati
, Ankur Jaiswal
, Abhishek Hazra
, Nabajyoti Mazumdar
, Jagpreet Singh:
Optimizing UAV-Based Data Collection in IoT Networks With Dynamic Service Time and Buffer-Aware Trajectory Planning. 1450-1460 - Xiaobo Fan
:
Path Selection via Mutual Coherence Optimization in Network Monitoring. 1461-1472 - Xiaonan Wang
, Yajing Song
:
Personalized Preference and Social Attribute-Based Data Sharing for Information-Centric IoT. 1473-1483 - Luis Velasco
, Gianluca Graziadei
, Sima Barzegar
, Marc Ruiz
:
Provisioning of Time-Sensitive and Non-Time-Sensitive Flows With Assured Performance. 1484-1499 - Abdulsamet Dagasan
, Ezhan Karasan
:
Resilient Multi-Hop Autonomous UAV Networks With Extended Lifetime for Multi-Target Surveillance. 1500-1513 - Tianhao Ouyang
, Haipeng Yao
, Wenji He
, Tianle Mai
, Fu Wang
, F. Richard Yu
:
Self-Adaptive Dynamic In-Band Network Telemetry Orchestration for Balancing Accuracy and Stability. 1514-1530 - Ahsan Raza Khan
, Habib Ullah Manzoor
, Rao Naveed Bin Rais
, Sajjad Hussain
, Lina S. Mohjazi
, Muhammad Ali Imran
, Ahmed Zoha
:
Semantic-Aware Federated Blockage Prediction (SFBP) in Vision-Aided Next-Generation Wireless Network. 1531-1543 - Vikash Kumar Bhardwaj, Gagan Mundada, Omm Prakash Sahoo
, Mahendra Kumar Shukla
, Om Jee Pandey
:
SINR-Delay Constrained Node Localization in RIS-Assisted Time-Varying IoT Networks Using ML Frameworks. 1544-1557 - Guosheng Kang
, Hongshuai Ren
, Wanjun Chen, Jianxun Liu
, Buqing Cao
, Yu Xu
:
Web API Recommendation via Exploring Textual and Structural Semantics With Contrastive Learning and Joint Training. 1558-1568 - Saifullah Khalid
, Ishfaq Ahmad, Hansheng Lei:
A Consortium Blockchain-Based Approach for Energy Sharing in Distribution Systems. 1569-1582 - Zhiwei Wang
:
A Decentralized Oracle Network Constructed From Weighted Schnorr Multisignature. 1583-1593 - C. Venkatesan
, S. Jeevanantham
, Rebekka B.:
A Lightweight Physical Layer Authentication-Based Blockchain Consensus Mechanism for Edge Networks. 1594-1607 - Longxia Huang
, Chengzhi Ge
, Xue Mao
, Shui Yu
:
DARB: Decentralized, Accountable and Redactable Blockchain for Data Management. 1608-1617 - Chaofeng Lin, Jinchuan Tang
, Shuping Dang
, Gaojie Chen
:
Priority-Based Blockchain Packing for Dependent Industrial IoT Transactions. 1618-1628 - Min An
, Xuan Zhang
, Jishu Wang
, Qiyuan Fan, Chen Gao, LinYu Li
, Cuizhen Lu, Nan Li, Yingchen Liu:
RLChain: A DRL Approach for Blockchain Performance Optimization Toward IIoT. 1629-1645 - Madhura Adeppady
, Alberto Conte
, Paolo Giaccone
, Holger Karl
, Carla-Fabiana Chiasserini
:
Dynamic Management of Constrained Computing Resources for Serverless Services. 1646-1663 - Haijie Wu
, Wangbo Shen
, Weiwei Lin
, Wei Li
, Keqin Li
:
End-Edge-Cloud Heterogeneous Resources Scheduling Method Based on RNN and Particle Swarm Optimization. 1664-1676 - Soyi Jung
, Jae-Hyun Kim
, Joongheon Kim
:
Intelligent Extra Resource Allocation for Cooperative Awareness Message Broadcasting in Cellular-V2X Networks. 1677-1689 - Xiang Xie
, Jianxun Liu
, Buqing Cao
, Qian Peng
, Shanpeng Liu
, Guosheng Kang
:
Service Recommendation Based on Multi-Level View Contrastive Learning. 1690-1702 - Hangfan Li
, Li Li, Shuaishuai Tan
, Xiaoxiong Zhong
, Sheng Zhang
:
A Multi-User Effective Computation Offloading Mechanism for MEC System: Batched Multi-Armed Bandits Approach. 1703-1715 - Bing Shi
, Zihao Chen:
A Stackelberg Game-Based Trajectory Planning Strategy for Multi-AAVs-Assisted MEC System. 1716-1726 - Yifei Zhu
, Lei Feng
, Fanqin Zhou
, Wenjing Li
:
An Adaptive Ensemble Learning Paradigm With Spatial-Temporal Feature Extraction for Wireless Traffic Prediction. 1727-1743 - Lei Feng
, Chaorui Liao, Yingji Shi
, Fanqin Zhou
:
Explainable and Energy-Efficient Selective Ensemble Learning in Mobile Edge Computing Systems. 1744-1759 - Shuqin Cao
, Libing Wu
, Rui Zhang
, Jianfeng Lu
, Dan Wu
, Zhuangzhuang Zhang
:
Hypergraph Attention Recurrent Network for Cellular Traffic Prediction. 1760-1774 - Maryam Bandali
, Jaume Rius i Riu, Andreas Lewitzki, Dibbendu Roy, James Gross
:
ML-Based Fault Management Automation in Large-Scale Fixed and Mobile Telecommunication Networks. 1775-1787 - Jiaxin Zeng
, Xiaobo Zhou
, Keqiu Li:
Resource-Efficient Joint Service Caching and Workload Scheduling in Ultra-Dense MEC Networks: An Online Approach. 1788-1800 - Cheng Ren
, Jinsong Gao
, Yu Wang
, Yaxin Li
:
A Fastformer Assisted DRL Method on Energy Efficient and Interference Aware Service Provisioning. 1801-1811 - Erison Ballasheni, Dritan Nace, Artur Tomaszewski, Alban Zyle
:
A Probabilistic Optimization Approach to the Equitable Controller Location Problem. 1812-1824 - Mohamed Abderrahmane Madani
, Fen Zhou
, Ahmed Meddahi
:
Deploying Disaster-Resilient Service Function Chains Using Adaptive Multi-Path Routing. 1825-1840 - Amina Hentati
, Amin Ebrahimzadeh
, Roch H. Glitho, Fatna Belqasmi
, Rabeb Mizouni
:
Deterministic and Dynamic Joint Placement and Scheduling of VNF-FGs for Remote Robotic Surgery. 1841-1858 - Hnin Pann Phyu
, Diala Naboulsi
, Razvan Stanica
:
ICE-CREAM: Multi-Agent Fully Cooperative Decentralized Framework for Energy Efficiency in RAN Slicing. 1859-1873 - Nemanja Ðeric
, Amir Varasteh
, Andreas Blenk
, Wolfgang Kellerer
:
NAGA: A Deterministic Programmable Network With Update Timing Guarantees. 1874-1888 - Tien Van Do
, Nam H. Do, Csaba Rotter
, T. V. Lakshman, Csaba Biró, Tamás Bérczes:
Properties of Horizontal Pod Autoscaling Algorithms and Application for Scaling Cloud-Native Network Functions. 1889-1898 - Dongliang Zhang
, Lei Wang
, Amin Rezaeipanah
:
Toward Deploying Parallelized Service Function Chains Under Dynamic Resource Request in Multi-Access Edge Computing. 1899-1910 - Ammar Kamal Abasi, Moayad Aloqaily
, Mohsen Guizani
:
6G mmWave Security Advancements Through Federated Learning and Differential Privacy. 1911-1928 - Adam Kadi
, Lyes Khoukhi
, Jouni Viinikka
, Pierre-Edouard Fabre:
Adapting to the Evolution: Enhancing Intrusion Detection Through Machine Learning in the QUIC Protocol Era. 1929-1944 - Taeyun Kim
, Joonwoo Kim
, Hochan Lee
, Seoyul Oh, Sangheon Pack
:
An Efficient Winner and Payment Determination Algorithm in Reverse Auction for Edge Federation. 1945-1954 - Yali Yuan
, Yangyang Du
, Guang Cheng
:
Class Incremental Website Fingerprinting Attack Based on Dynamic Expansion Architecture. 1955-1971 - Luyao Zou
, Quang Hieu Vo
, Kitae Kim
, Huy Q. Le
, Chu Myaet Thwal
, Chaoning Zhang
, Choong Seon Hong
:
Cyber Attacks Prevention Toward Prosumer-Based EV Charging Stations: An Edge-Assisted Federated Prototype Knowledge Distillation Approach. 1972-1999 - Ke Gu, Yiming Zuo, Jingjing Tan, Bo Yin, Zheng Yang, Xiong Li:
Dual-Layered Model Protection Scheme Against Backdoor Attacks in Fog Computing-Based Federated Learning. 2000-2016 - Xiaojun Zhang
, Qing Liu, Bingyun Liu, Yuan Zhang
, Jingting Xue
:
Dynamic Certificateless Outsourced Data Auditing Mechanism Supporting Multi-Ownership Transfer via Blockchain Systems. 2017-2030 - Gerald Budigiri
, Christoph Baumann
, Eddy Truyen
, Wouter Joosen
:
Elastic Cross-Layer Orchestration of Network Policies in the Kubernetes Stack. 2031-2058 - Saihua Cai
, Han Tang, Jinfu Chen
, Tianxiang Lv, Wenjun Zhao, Chunlei Huang:
GSA-DT: A Malicious Traffic Detection Model Based on Graph Self-Attention Network and Decision Tree. 2059-2073 - Junming Zhang
, Jingru Wang, Shigong Long, Yanen Li, Lun Wang:
Interval Mean Estimation Under (ε,δ)-Local Differential Privacy. 2074-2086 - Jiajie Shen
, Bochun Wu
, Wang Xiang, Sai Zou, Wenyong Wang
, Laizhong Cui
, Wei Ni:
Novel Bandwidth-Aware Network Coding for Fast Cloud-of-Clouds Disaster Backup. 2087-2105 - Qian Zhang
, Yi He
, Yue Xiao, Xiaoli Zhang
, Chunhua Song
:
OTA-Key: Over-the-Air Key Management for Flexible and Reliable IoT Device Provision. 2106-2119 - Liam Daly Manocchio, Yaying Chen
, Siamak Layeghy
, David Gwynne, Marius Portmann
:
P4-Secure: In-Band DDoS Detection in Software Defined Networks. 2120-2137 - Xun Liu
, Jian Yang
, Shuangwu Chen
, Huasen He
, Xiaofeng Jiang
:
PRFL: Achieving Efficient Robust Aggregation in Privacy-Preserving Federated Learning. 2138-2155 - Chenlu Zhang
, Takehiro Sato
, Eiji Oki
:
Robust Deployment Model for Parallelized Service Function Chains Against Uncertain Traffic Arrival Rates. 2156-2180 - Enio Marku, Colin Boyd, Gergely Biczók
:
SafeLib: A Comprehensive Framework for Secure Outsourcing of Network Functions. 2181-2198 - Qiang Fu
, Jiajia Liu
, Jiadai Wang
, Jiapeng Li:
SecHARQ: A Secure Scheme for HARQ-Assisted NR V2X Communications. 2199-2213 - Meet Udeshi
, Prashanth Krishnamurthy
, Ramesh Karri
, Farshad Khorrami
:
Tamper-Proof Network Traffic Measurements on a NIC for Intrusion Detection. 2214-2224 - Jaidip Kotak
, Idan Yankelev
, Idan Bibi, Yuval Elovici
, Asaf Shabtai
:
VPN-Encrypted Network Traffic Classification Using a Time-Series Approach. 2225-2242 - Xingyu Yang
, Jipeng Hou
, Lei Xu
, Liehuang Zhu
:
zkFabLedger: Enabling Privacy Preserving and Regulatory Compliance in Hyperledger Fabric. 2243-2263

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.