


default search action
IEEE Transactions on Network Science and Engineering, Volume 10
Volume 10, Number 1, January - February 2023
- Jianwei Huang:

Message From the Editor-in-Chief. 1-2 - Lynnette Hui Xian Ng

, Kathleen M. Carley
:
Pro or Anti? A Social Influence Model of Online Stance Flipping. 3-19 - Kirti Jain

, Vasudha Bhatnagar
, Sadanand Prasad
, Sharanjit Kaur
:
Coupling Fear and Contagion for Modeling Epidemic Dynamics. 20-34 - Jiaren Xiao

, Quanyu Dai
, Xiaochen Xie
, Qi Dou
, Ka-Wai Kwok
, James Lam
:
Domain Adaptive Graph Infomax via Conditional Adversarial Networks. 35-52 - Kai Jin

, Kun Xie
, Xin Wang
, Jiazheng Tian
, Gaogang Xie
, Jigang Wen, Kenli Li
:
Low Cost Online Network Traffic Measurement With Subspace-Based Matrix Completion. 53-67 - Mengping Xing

, Jianquan Lu
, Yang Liu
, Xiangyong Chen
:
Event-Based Bipartite Consensus of Multi-Agent Systems Subject to DoS Attacks. 68-80 - Jianhong Zhang

, Chenghe Dong:
Secure and Lightweight Data Aggregation Scheme for Anonymous Multi-Receivers in WBAN. 81-91 - Hisham S. Galal

, Amr M. Youssef
:
Aegis: Privacy-Preserving Market for Non-Fungible Tokens. 92-102 - Zahid Ghaffar

, Salman Shamshad
, Khalid Mahmood
, Mohammad S. Obaidat
, Saru Kumari
, Muhammad Khurram Khan
:
A Lightweight and Efficient Remote Data Authentication Protocol Over Cloud Storage Environment. 103-112 - Minghui Dai

, Yuan Wu
, Liping Qian
, Zhou Su
, Bin Lin
, Nan Chen
:
UAV-Assisted Multi-Access Computation Offloading via Hybrid NOMA and FDMA in Marine Networks. 113-127 - Weihao Song

, Zidong Wang
, Zhongkui Li
, Hongli Dong
, Qing-Long Han
:
Protocol-Based Particle Filtering for Nonlinear Complex Networks: Handling Non-Gaussian Noises and Measurement Censoring. 128-139 - Zhenhua Deng

:
Game-Based Formation Control of High-Order Multi-Agent Systems. 140-151 - Jing Xu, Xue Li, Puming Wang

, Xin Jin
, Shaowen Yao
:
Multi-Modal Noise-Robust DDoS Attack Detection Architecture in Large-Scale Networks Based on Tensor SVD. 152-165 - Gabriele Gemmi

, Renato Lo Cigno
, Leonardo Maccari
:
On the Properties of Next Generation Wireless Backhaul. 166-177 - Jieheng Zheng

, Lin Zhang
, Yan Feng
, Zhiqiang Wu
:
Blockchain-Based Key Management and Authentication Scheme for IoT Networks With Chaotic Scrambling. 178-188 - Hualing Ren, Kai Liu

, Guozhi Yan, Yantao Li
, Choujun Zhan
, Songtao Guo
:
A Memetic Algorithm for Cooperative Complex Task Offloading in Heterogeneous Vehicular Networks. 189-204 - Zhen Yang

, Ming Zhou, Haiyang Yu
, Richard O. Sinnott
, Huan Liu
:
Efficient and Secure Federated Learning With Verifiable Weighted Average Aggregation. 205-222 - Yating Liu, Yuantao Gu

, Xinyue Shen, Qingmin Liao
, Quan Yu
:
MSCA: An Unsupervised Anomaly Detection System for Network Security in Backbone Network. 223-238 - Zhijun Wu

, Silin Peng
, Liang Liu
, Meng Yue
:
Detection of Improved Collusive Interest Flooding Attacks Using BO-GBM Fusion Algorithm in NDN. 239-252 - Bogang Qu, Zidong Wang

, Bo Shen
, Hongli Dong
, Hongjian Liu
:
Event-Based Joint State and Unknown Input Estimation for Energy Networks: Handling Multi-Machine Power Grids. 253-264 - Sihan Ma, Haipeng Yao

, Tianle Mai
, Jingkai Yang, Wenji He, Kaipeng Xue
, Mohsen Guizani
:
Graph Convolutional Network Aided Virtual Network Embedding for Internet of Thing. 265-274 - Yuru Zhang, Chen Chen

, Lei Liu, Dapeng Lan
, Hongbo Jiang, Shaohua Wan
:
Aerial Edge Computing on Orbit: A Task Offloading and Allocation Scheme. 275-285 - Mohammad Esmaeili

, Aria Nosratinia
:
Community Detection With Known, Unknown, or Partially Known Auxiliary Latent Variables. 286-304 - Sepehr Elahi

, Andi Nika
, Cem Tekin
:
Online Context-Aware Task Assignment in Mobile Crowdsourcing via Adaptive Discretization. 305-320 - Liqing Wang

, Zheng-Guang Wu
, James Lam
:
Necessary and Sufficient Conditions for Security of Hidden Markov Boolean Control Networks Under Shifting Attacks. 321-330 - Chengzhang Ni

, Jun Yang
, Zezhao Pang, Yeming Gong
:
Seeding Strategy Based on Weighted Gravity Centrality in Multiplex Networks. 331-345 - Christy Lin

, Daniel L. Sussman
, Prakash Ishwar
:
Ergodic Limits, Relaxations, and Geometric Properties of Random Walk Node Embeddings. 346-359 - Yanli Yuan

, De Wen Soh, Zehui Xiong
, Tony Q. S. Quek
:
Applicable and Partial Learning of Graph Topology Without Sparsity Priors. 360-371 - Kamal Berahmand

, Mehrnoush Mohammadi, Farid Saberi-Movahed
, Yuefeng Li
, Yue Xu
:
Graph Regularized Nonnegative Matrix Factorization for Community Detection in Attributed Networks. 372-385 - Mingyan Zhu

, Tianju Sui, Rui Wang
, Jun Sun
:
Sensors Scheduling for Remote State Estimation Over an Unslotted CSMA/CA Channel. 386-397 - Canhui Wang

, Xiaowen Chu
, Yang Qin:
Dissecting Mining Pools of Bitcoin Network: Measurement, Analysis and Modeling. 398-412 - Emilia A. Monakhova

, Oleg G. Monakhov
, Aleksandr Yu. Romanov
:
Routing Algorithms in Optimal Degree Four Circulant Networks Based on Relative Addressing: Comparative Analysis for Networks-on-Chip. 413-425 - Pengfei Wan

, Xiaoming Wang
, Geyong Min
, Liang Wang
, Yaguang Lin
, Wangyang Yu
, Xiaojun Wu:
Optimal Control for Positive and Negative Information Diffusion Based on Game Theory in Online Social Networks. 426-440 - Qiang He

, Xin Yan, Xingwei Wang
, Tianhang Nan, Zhixue Chen, Xuan He
, Min Huang:
Dynamic Opinion Maximization Framework With Hybrid Method in Social Networks. 441-451 - Yong Xu

, Zheng-Guang Wu
:
Observer-Based Asynchronous Communication and Adaptive Control Protocols With Intermittent Updating and Interaction. 452-462 - Lulu Pan, Haibin Shao

, Yuanlong Li, Dewei Li
, Yugeng Xi
:
Event-Triggered Consensus of Matrix-Weighted Networks Subject to Actuator Saturation. 463-476 - Yuhua Cheng

, Lei Shi
, Jinliang Shao
, Libing Bai
, Kai Chen
:
Emergent Dynamics of Asynchronous Multiagent Systems Under Signed Networks and Limited Communication Resources. 477-488 - Govind Saraswat

, Vivek Khatana
, Sourav Patel
, Murti V. Salapaka
:
Distributed Finite-Time Termination for Consensus Algorithm in Switching Topologies. 489-499 - Ziwei Dong, Shuai Mao

, Matjaz Perc
, Wei Du, Yang Tang:
A Distributed Dynamic Event-Triggered Algorithm With Linear Convergence Rate for the Economic Dispatch Problem. 500-513 - Hongbo Li

, Lingjie Duan
:
Online Pricing Incentive to Sample Fresh Information. 514-526 - Yong Xu

, Yunsong Deng
, Zenghong Huang
, Ming Lin
, Peng Shi
:
Distributed State Estimation Over Sensor Networks With Substate Decomposition Approach. 527-537 - Baris Yamansavascilar

, Ahmet Cihat Baktir
, Cagatay Sonmez
, Atay Ozgovde, Cem Ersoy
:
DeepEdge: A Deep Reinforcement Learning Based Task Orchestrator for Edge Computing. 538-552 - Xiu-Xiu Zhan

, Kaiyue Zhang, Lun Ge, Junming Huang
, ZiNan Zhang, Lu Wei
, Gui-Quan Sun
, Chuang Liu
, Zi-Ke Zhang
:
Exploring the Effect of Social Media and Spatial Characteristics During the COVID-19 Pandemic in China. 553-564 - Wenrui Li

, Daniel L. Sussman
, Eric D. Kolaczyk
:
Estimation of the Branching Factor in Noisy Networks. 565-577
Volume 10, Number 2, March - April 2023
- Jichao Bi

, Fengji Luo
, Gaoqi Liang, Xiaofan Yang
, Shibo He
, Zhao Yang Dong
:
Impact Assessment and Defense for Smart Grids With FDIA Against AMI. 578-591 - Mengjie Lv

, Jianxi Fan
, Weibei Fan
, Xiaohua Jia
:
A High-Performantal and Server-Centric Based Data Center Network. 592-605 - Weiling Li

, Renfang Wang, Xin Luo
, MengChu Zhou
:
A Second-Order Symmetric Non-Negative Latent Factor Model for Undirected Weighted Network Representation. 606-618 - Xuefei Wang

, Hongjun Ma
, Haobo Kang:
Fuzzy Adaptive Group Obstacle Avoidance Control for Second-Order Multi-Agent Systems Under Fixed and Switching Topologies. 619-630 - Ru Huang

, Zijian Chen
, Guangtao Zhai
, Jianhua He
, Xiaoli Chu
:
A Graph Entropy Measure From Urelement to Higher-Order Graphlets for Network Analysis. 631-644 - Saiqin Long

, Ying Zhang
, Qingyong Deng
, Tingrui Pei
, Jinzhi Ouyang
, Zhihua Xia
:
An Efficient Task Offloading Approach Based on Multi-Objective Evolutionary Algorithm in Cloud-Edge Collaborative Environment. 645-657 - Amit Surana

, Can Chen
, Indika Rajapakse
:
Hypergraph Similarity Measures. 658-674 - Peter Travis Jardine

, Sidney N. Givigi
:
Flocks, Mobs, and Figure Eights: Swarming as a Lemniscatic Arch. 675-686 - Chongyang Chen

, Yiyan Han
, Song Zhu
, Zhigang Zeng
:
Distributed Fixed-Time Tracking and Containment Control for Second-Order Multi-Agent Systems: A Nonsingular Sliding-Mode Control Approach. 687-697 - Govindasamy Narayanan, M. Syed Ali

, Quanxin Zhu
, Bandana Priya
, Ganesh Kumar Thakur:
Fuzzy Observer-Based Consensus Tracking Control for Fractional-Order Multi-Agent Systems Under Cyber-Attacks and Its Application to Electronic Circuits. 698-708 - Jiachen Sun

, Ning Ge
, Xu Chen
, Wei Feng
, Jianhua Lu:
Truthful Transaction Protocol for E-Commerce Networks Based on Double Auction. 709-722 - Priyanka Kamboj, Sujata Pal

, Samaresh Bera
, Sudip Misra
:
QoS-Aware Multipath Routing in Software-Defined Networks. 723-732 - Zhengping Fan

, Xiaojun Tan
, Wanquan Liu
, Guanrong Chen
:
Asymptotically Consistent Estimation of Preferential Attachments in Growing Networks. 733-741 - Wahengbam Kanan Kumar, Kshetrimayum Linthoinganbi Devi, Aheibam Dinamani Singh:

Fortifying Brain Signals for Robust Interpretation. 742-753 - Ruhui Zhang

, Duan-Shin Lee
, Cheng-Shang Chang
:
A Generalized Configuration Model With Triadic Closure. 754-765 - Xiongbo Wan

, Chi Zhan
, Chuan-Ke Zhang
, Min Wu
:
Finite-Time Fault Detection Under Deception Attacks: A Hybrid Dynamic Variables-Dependent Event-Based Scheme. 766-779 - Jiexin Wu

, Cunlai Pu
, Shuxin Ding
, Guo Cao
, Chengyi Xia
, Panos M. Pardalos
:
Multi-Objective Optimization of Transport Processes on Complex Networks. 780-794 - Hao Wu

, Jian Yan
, Linling Kuang
:
DecTE: Achieving Optimal Network Group Efficiency in Selfish Multidomain Networks. 795-808 - Jeremy D. Wendt

, Richard V. Field Jr.
, Cynthia A. Phillips, Arvind Prasadan
, Tegan Wilson
, Sucheta Soundarajan, Sanjukta Bhowmick:
Partitioning Communication Streams Into Graph Snapshots. 809-826 - Gioele Zardini

, Nicolas Lanzetti
, Andrea Censi
, Emilio Frazzoli, Marco Pavone
:
Co-Design to Enable User-Friendly Tools to Assess the Impact of Future Mobility Solutions. 827-844 - Fei Yu

, Hui Shen, Qiulin Yu, Xinxin Kong
, Pradip Kumar Sharma
, Shuo Cai
:
Privacy Protection of Medical Data Based on Multi-Scroll Memristive Hopfield Neural Network. 845-858 - Shiyuan Zheng

, Hong Xie
, John C. S. Lui
:
Pricing Social Visibility Service in Online Social Networks: Modeling and Algorithms. 859-870 - Guangyao Pang

, Xiaoming Wang
, Liang Wang
, Fei Hao
, Yaguang Lin
, Pengfei Wan
, Geyong Min
:
Efficient Deep Reinforcement Learning-Enabled Recommendation. 871-886 - Tingting Yin

, Zhou Gu
, Xiangpeng Xie
:
Observer-Based Event-Triggered Sliding Mode Control for Secure Formation Tracking of Multi-UAV Systems. 887-898 - Jie Cui

, Nan Liu, Qingyang Zhang
, Debiao He
, Chengjie Gu, Hong Zhong
:
Efficient and Anonymous Cross-Domain Authentication for IIoT Based on Blockchain. 899-910 - Hao Shen

, Yinsheng Song, Jing Wang
, Ju H. Park
:
H∞ State Estimation for PDT-Switched Coupled Neural Networks Under Round-Robin Protocol: A Cooperation-Competition-Based Mechanism. 911-921 - Mingyue Zhang

, Junlong Zhou
, Gongxuan Zhang
, Lei Cui
, Tian Gao, Shui Yu
:
APDP: Attribute-Based Personalized Differential Privacy Data Publishing Scheme for Social Networks. 922-933 - Jinhui Hu

, Guo Chen
, Huaqing Li
, Zixiang Shen, Weidong Zhang
:
Push-LSVRG-UP: Distributed Stochastic Optimization Over Unbalanced Directed Networks With Uncoordinated Triggered Probabilities. 934-950 - Yabing Huang

, Jun Zhao
:
Game-Theoretic Switching Detection of Malicious Attacks in Switched Systems. 951-965 - Yunlong Song

, Yaqiong Liu
, Yan Zhang
, Zhifu Li
, Guochu Shou
:
Latency Minimization for Mobile Edge Computing Enhanced Proximity Detection in Road Networks. 966-979 - Zhenghong Jin

, Choon Ki Ahn
, Jiawen Li:
Momentum-Based Distributed Continuous-Time Nonconvex Optimization of Nonlinear Multi-Agent Systems via Timescale Separation. 980-989 - Manying Zeng, Xiumin Wang

, Weijian Pan, Pan Zhou
:
Heterogeneous Training Intensity for Federated Learning: A Deep Reinforcement Learning Approach. 990-1002 - Xiang Li

, Tianyi Pan
, Kai Pan
:
Identification of Key Components After Unintentional Failures for Cascading Failure Protection. 1003-1014 - Ricardo José López Dawn

, Anastasios Giovanidis
:
Optimal Influencer Marketing Campaign Under Budget Constraints Using Frank-Wolfe. 1015-1031 - Chenghao Xu

, Wei Song
:
Intelligent Task Allocation for Mobile Crowdsensing With Graph Attention Network and Deep Reinforcement Learning. 1032-1048 - Xiayang Li

, Jinzhi Wang
:
Fully Distributed Fault-Tolerant Leaderless Consensus of Multi-Agent Systems Under Directed Communication Graph. 1049-1059 - Yanhang Shi

, Siguang Chen
, Haijun Zhang
:
Uncertainty Minimization for Personalized Federated Semi-Supervised Learning. 1060-1073 - Banghua Huang, Yang Liu

, Zicong Xia
, Jun Wang
:
A Bi-Event-Triggered Multi-Agent System for Distributed Optimization. 1074-1084 - Kumar Prateek

, Soumyadev Maity
, Ruhul Amin
:
An Unconditionally Secured Privacy-Preserving Authentication Scheme for Smart Metering Infrastructure in Smart Grid. 1085-1095 - Wei Wang

, Qianwen Zhu
, Hefei Gao
:
Drift Detection of Intelligent Sensor Networks Deployment Based on Graph Stream. 1096-1106 - Wencheng Zou

, Xiao Wen, Jian Guo
, Zhengrong Xiang
:
Novel Reference Trajectory-Based Finite-Time Consensus Protocols for Multiagent Systems With Non-Identical Nonlinear Dynamics. 1107-1118 - Xinping Xu

, Xiaojun Lin
, Lingjie Duan
:
Design and Performance Analysis of Partial Computation Output Schemes for Accelerating Coded Machine Learning. 1119-1130 - Dario Giuseppe Lui

, Alberto Petrillo
, Stefania Santini
:
Bipartite Tracking Consensus for High-Order Heterogeneous Uncertain Nonlinear Multi-Agent Systems With Unknown Leader Dynamics via Adaptive Fully-Distributed PID Control. 1131-1142 - Chengwei Zhang, Dina Fang, Sandip Sen

, Xiaohong Li
, Zhiyong Feng
, Wanli Xue
, Dou An
, Xintian Zhao, Rong Chen
:
Opinion Dynamics in Gossiper-Media Networks Based on Multiagent Reinforcement Learning. 1143-1156 - Xuhui Lu

, Yingmin Jia
:
Scaled Event-Triggered Resilient Consensus Control of Continuous-Time Multi-Agent Systems Under Byzantine Agents. 1157-1174 - Xiaoling Tao, Ziyi Liu

, Feng Zhao
, Rushi Lan
, Runrong Liu, Lianyou Fu, Yifu Ouyang:
An SSA-LC-DAE Method for Extracting Network Security Elements. 1175-1185
Volume 10, Number 3, May - June 2023
- Zhi Zhou

, Dusit Niyato
, Zehui Xiong
, Xiaowen Gong
, Walid Saad
, Xiaoming Fu
:
Guest Editorial The Nexus Between Edge Computing and AI for 6G Networks. 1186-1189 - Zheng Di

, Tao Luo
, Chao Qiu
, Cheng Zhang, Zhutao Liu
, Xiaofei Wang
, Jing Jiang
:
In-Network Pooling: Contribution-Aware Allocation Optimization for Computing Power Network in B5G/6G Era. 1190-1202 - Yupei Liu, Haijun Zhang

, Huan Zhou
, Keping Long
, Victor C. M. Leung
:
User Association, Subchannel and Power Allocation in Space-Air-Ground Integrated Vehicular Network With Delay Constraints. 1203-1213 - Wen Sun

, Sijia Lian
, Haibin Zhang
, Yan Zhang
:
Lightweight Digital Twin and Federated Learning With Distributed Incentive in Air-Ground 6G Networks. 1214-1227 - Pin Lv

, Wenbiao Xu, Jiangtian Nie
, Yanli Yuan
, Chao Cai
, Zhe Chen, Jia Xu
:
Edge Computing Task Offloading for Environmental Perception of Autonomous Vehicles in 6G Networks. 1228-1245 - Sahaya Beni Prathiba

, Gunasekaran Raja
, Sudha Anbalagan
, Arikumar K S
, Sugeerthi Gurumoorthy, Kapal Dev
:
A Hybrid Deep Sensor Anomaly Detection for Autonomous Vehicles in 6G-V2X Environment. 1246-1255 - Yunzhi Xia

, Xianjun Deng
, Lingzhi Yi
, Laurence T. Yang
, Xiao Tang
, Chenlu Zhu, Zhongping Tian:
AI-Driven and MEC-Empowered Confident Information Coverage Hole Recovery in 6G-Enabled IoT. 1256-1269 - Weidang Lu

, Yandan Mo, Yunqi Feng
, Yuan Gao
, Nan Zhao
, Yuan Wu
, Arumugam Nallanathan
:
Secure Transmission for Multi-UAV-Assisted Mobile Edge Computing Based on Reinforcement Learning. 1270-1282 - Yulin He

, Xuan Ye, Laizhong Cui
, Philippe Fournier-Viger
, Chengwen Luo
, Joshua Zhexue Huang
, Ponnuthurai Nagaratnam Suganthan
:
Wireless Network Slice Assignment With Incremental Random Vector Functional Link Network. 1283-1296 - Huijun Tang

, Huaming Wu
, Guanjin Qu, Ruidong Li
:
Double Deep Q-Network Based Dynamic Framing Offloading in Vehicular Edge Computing. 1297-1310 - Hui Huang, Qiang Ye

, Yitong Zhou:
6G-Empowered Offloading for Realtime Applications in Multi-Access Edge Computing. 1311-1325 - Huan Zhou

, Zhenning Wang
, Hantong Zheng, Shibo He
, Mianxiong Dong
:
Cost Minimization-Oriented Computation Offloading and Service Caching in Mobile Cloud-Edge Computing: An A3C-Based Approach. 1326-1338 - (Withdrawn) A DQN-Based Frame Aggregation and Task Offloading Approach for Edge-Enabled IoMT. 1339-1351

- Jianxin Zhao, Yanhao Feng, Xinyu Chang, Peng Xu, Shilin Li, Chi Harold Liu

, Wenke Yu, Jian Tang
, Jon Crowcroft
:
Energy-Efficient and Fair IoT Data Distribution in Decentralised Federated Learning. 1352-1363 - Jing He

, Songtao Guo
, Mingyan Li
, Yongdong Zhu
:
AceFL: Federated Learning Accelerating in 6G-Enabled Mobile Edge Computing Networks. 1364-1375 - Sizheng Fan

, Hongbo Zhang, Zehua Wang, Wei Cai
:
Mobile Devices Strategies in Blockchain-Based Federated Learning: A Dynamic Game Perspective. 1376-1388 - Ziqi He

, Lei Yang
, Wanyu Lin
, Weigang Wu
:
Improving Accuracy and Convergence in Group-Based Federated Learning on Non-IID Data. 1389-1404 - Jiaxin Li

, Fuhong Lin
, Lei Yang
, Daochao Huang:
AI Service Placement for Multi-Access Edge Intelligence Systems in 6G. 1405-1416 - Jialiang Feng

, Jie Gong
:
Joint Detection and Computation Offloading With Age of Information in Mobile Edge Networks. 1417-1430 - Wande Chen

, Dingding Li
, Yidong Zhong, Yong Tang:
A Novel Non-Volatile Memory Update Mechanism for 6G Edge Computing. 1431-1444 - Changkun Jiang

, Lin Gao
, Jingjing Luo
, Pan Zhou
, Jianqiang Li
:
A Game-Theoretic Analysis of Joint Mobile Edge Caching and Peer Content Sharing. 1445-1461 - Mianjie Li

, Yuan Liu
, Zhihong Tian
, Chun Shan
:
Privacy Protection Method Based On Multidimensional Feature Fusion Under 6G Networks. 1462-1471 - Arooj Masood

, Taeyun Ha
, Demeke Shumeye Lakew
, Nhu-Ngoc Dao
, Sungrae Cho
:
Intelligent TCP Congestion Control Scheme in Internet of Deep Space Things Communication. 1472-1486 - Jiayin Li

, Wenzhong Guo
, Lehui Xie
, Ximeng Liu
, Jianping Cai
:
Privacy-Preserving Object Detection With Poisoning Recognition for Autonomous Vehicles. 1487-1500 - Li Chen

, Fan Ang
, Yunfei Chen
, Weidong Wang
:
Robust Federated Learning With Noisy Labeled Data Through Loss Function Correction. 1501-1511 - Dongdong Yue

, Simone Baldi
, Jinde Cao
:
Distributed Aperiodic Time-Triggered and Event-Triggered Consensus: A Scalability Viewpoint. 1512-1524 - Dandan Zhang, Song Zhu, Heng Zhang

, Weisheng Si
, Wei Xing Zheng
:
Fixed-Time Consensus for Multiple Mechanical Systems With Input Dead-Zone and Quantization Under Directed Graphs. 1525-1536 - Meng Qiu

, Di Liu
, He Wang, Wenwu Yu, Simone Baldi
:
A Cooperative Implementation of Mesh Stability in Vehicular Platoons. 1537-1550 - Yuxuan Shen

, Zidong Wang
, Hongli Dong
, Guoping Lu
, Fawaz E. Alsaadi
:
Distributed Recursive State Estimation for a Class of Multi-Rate Nonlinear Systems Over Wireless Sensor Networks Under FlexRay Protocols. 1551-1563 - Xueming Liu, Yue Xu, Mengqiao Xu

, Wenhui Deng, Linqiang Pan, Adolf K. Y. Ng
:
Two-Hop Biconnected Components in the Global Liner Shipping Network Reveal International Trade Statuses. 1564-1574 - Jiasheng Song

, Xiao-Heng Chang
, Zhi-Min Li
:
Secure P2P Nonfragile Sampled-Data Controller Design for Nonlinear Networked System under Sensor Saturation and DoS Attack. 1575-1585 - Ao Wang, Zhida Qin

, Lu Zheng
, Dapeng Li
, Lin Gao
:
Distributed Robust Bandits With Efficient Communication. 1586-1598 - Guisong Yang

, Xiaotian Wu, Yanglin Zhang, Xingyu He
, Sukai Wang
, Yunhuai Liu
:
Revisiting Path Planning Problem Towards Participant Executing Time Optimization in Mobile Crowd Sensing. 1599-1611 - Zhenyu Zhang

, Hua Li
, Yuanyuan Dong
, Xiyuan Wang, Jianuo Cui, Wei Hong, Xiaoming Dai
:
Residual Transceiver Impairments Aware Expectation Propagation Algorithm Receiver for PDMA Systems. 1612-1622 - Laishui Lv

, Peng Hu, Dalal Bardou, Zijun Zheng
, Ting Zhang:
Community Detection in Multilayer Networks Via Semi-Supervised Joint Symmetric Nonnegative Matrix Factorization. 1623-1635 - Karim Shahbaz

, Madhu N. Belur
, Ajay Ganesh
:
Algebraic Connectivity: Local and Global Maximizer Graphs. 1636-1647 - Ijaz Ahmed

, Muhammad Rehan
, Naeem Iqbal, Choon Ki Ahn
:
A Novel Event-Triggered Consensus Approach for Generic Linear Multi-Agents Under Heterogeneous Sector-Restricted Input Nonlinearities. 1648-1658 - Liangkun Yu

, Xiang Sun
, Sihua Shao
, Yougan Chen
, Rana Albelaihi
:
Backhaul-Aware Drone Base Station Placement and Resource Management for FSO-Based Drone-Assisted Mobile Networks. 1659-1668 - Tao Ye, Min Luo

, Yi Yang, Kim-Kwang Raymond Choo
, Debiao He
:
A Survey on Redactable Blockchain: Challenges and Opportunities. 1669-1683 - Junzhong Ji

, Hao Jia
, Yating Ren
, Minglong Lei
:
Supervised Contrastive Learning With Structure Inference for Graph Classification. 1684-1695 - Xiaoling Wang

, Zhen Fan, Lin Wang
, Housheng Su
, James Lam
:
Fully Distributed Observer Design for Mobile Targets. 1696-1708 - Chunyu Liu, Kailin Wang

, Heli Zhang
, Xi Li
, Hong Ji
:
Rendered Tile Reuse Scheme Based on FoV Prediction for MEC-Assisted Wireless VR Service. 1709-1721 - Lei Zhang

, Huaijin Zhang, Haipeng Yang
, Zhengyi Liu
, Fan Cheng
:
An Interactive Co-Evolutionary Framework for Multi-Objective Critical Node Detection on Large-Scale Complex Networks. 1722-1735 - Jiayi Cai

, Jingyi Wang
, Jianwen Feng, Guanrong Chen
, Yi Zhao
:
Observer-Based Consensus for Multi-Agent Systems With Semi-Markovian Jumping Via Adaptive Event-Triggered SMC. 1736-1751 - Junliang Ye

, Lin Xiang
, Xiaohu Ge
:
Spatial-Temporal Modeling and Analysis of Reliability and Delay in Urban V2X Networks. 1752-1765 - Zhaoyuan Wu

, Lin Chen, Jianxiao Wang
, Ming Zhou
, Gengyin Li
, Qing Xia
:
Incentivizing the Spatiotemporal Flexibility of Data Centers Toward Power System Coordination. 1766-1778 - Ahmed ElHamamsy

, Farhad Aghili
, Amir G. Aghdam
:
Connectivity Preservation and Collision Avoidance in Multi-Agent Systems Using Model Predictive Control. 1779-1791
Volume 10, Number 4, July - August 2023
- Mengmeng Liu

, Jinyong Yu
, Juan J. Rodríguez-Andina
:
Adaptive Event-Triggered Asynchronous Fault Detection for Nonlinear Markov Jump Systems With Its Application: A Zonotopic Residual Evaluation Approach. 1792-1808 - Sadek Belamfedel Alaoui

, Badreddine El Haiek
, El Houssaine Tissir, Karina A. Barbosa
, Alejandro J. Rojas
:
Consensus Congestion Control for Ad Hoc Networks: Time-Delay and Saturation. 1809-1821 - Qing Wang

, Xiwang Dong
, Bohui Wang
, Yongzhao Hua
, Zhang Ren
:
Finite-Time Observer-Based $H_{\infty }$ Fault-Tolerant Output Formation Tracking Control for Heterogeneous Nonlinear Multi-Agent Systems. 1822-1834 - Huilan Yang

, Xin Wang
, Kaibo Shi
, Shouming Zhong
, Lan Shu:
An Adaptive Event-Triggered Consensus Approach for MASs With Network-Induced Delays. 1835-1845 - Dominic Yang

, Yurun Ge
, Thien Nguyen
, Denali Molitor
, Jacob D. Moorman
, Andrea L. Bertozzi
:
Structural Equivalence in Subgraph Matching. 1846-1862 - Da Yao

, Haibo Wang
, Hongli Xu
, Minli Zhang:
Lightweight Per-Flow Traffic Measurement Using Improved LRU List. 1863-1879 - Andreas Grammenos

, Themistoklis Charalambous
, Evangelia Kalyvianaki:
CPU Scheduling in Data Centers Using Asynchronous Finite-Time Distributed Coordination Mechanisms. 1880-1894 - Kuo Li

, Choon Ki Ahn
, Changchun Hua
:
Delays-Based Distributed Bipartite Consensus Control of Nonlinear Multiagent Systems With Switching Signed Topologies. 1895-1904 - Yuexia Zhang

, Lie Zou
, Dawei Pan:
Cloud-Edge Collaboration Dynamics Information Dissemination Model for Social Internet of Things. 1905-1918 - Abdorasoul Ghasemi

, Hermann de Meer:
Robustness of Interdependent Power Grid and Communication Networks to Cascading Failures. 1919-1930 - Sunjung Kang

, Atilla Eryilmaz
, Ness B. Shroff
:
Remote Tracking of Distributed Dynamic Sources Over a Random Access Channel With One-Bit Updates. 1931-1941 - Haofei Meng

, Lijun Zhu
, Hai-Tao Zhang
:
Output Synchronization of Linear Heterogeneous Multi-Agent Systems With Periodic Event-Triggered Output Communication. 1942-1951 - Dan Tang

, Chenjun Gao
, Xinmeng Li, Wei Liang
, Sheng Xiao
, Qiuwei Yang
:
A Detection and Mitigation Scheme of LDoS Attacks via SDN Based on the FSS-RSR Algorithm. 1952-1963 - Shuang An

, Jie Lian
, Dong Wang
:
Distributed Tracking Control of Multi-Agent Systems With Transfer Restricted Switching Topologies: A Cycle Stabilization Approach. 1964-1974 - Hongjing Liang

, Zhenyu Chang
, Choon Ki Ahn
:
Hybrid Event-Triggered Intermittent Control for Nonlinear Multi-Agent Systems. 1975-1984 - Zakaria Abou El Houda

, Abdelhakim Senhaji Hafid
, Lyes Khoukhi
:
MiTFed: A Privacy Preserving Collaborative Network Attack Mitigation Framework Based on Federated Learning Using SDN and Blockchain. 1985-2001 - Yuhan Zhang, Zidong Wang

, Lei Zou
, Hongli Dong
, Xiao-jian Yi
:
Neural-Network-Based Secure State Estimation Under Energy-Constrained Denial-of-Service Attacks: An Encoding-Decoding Scheme. 2002-2015 - Rong Chai

, Lei Liu, Fei Zou, Jinhong Li, Qianbin Chen
:
Performance Analysis of NOMA-Based Hybrid Satellite-Terrestrial Relay Networks With CCI. 2016-2029 - Minsu Choi

, Sooeun Song
, Da-Eun Ko
, Jong-Moon Chung
:
Trajectory Optimization for FSO Based U-IoT Backhaul Networks. 2030-2044 - Pau Esteve

, José J. Ramasco
, Massimiliano Zanin
:
Structure, Resilience and Evolution of the European Air Route Network From 2015 to 2018. 2045-2058 - Aoyu Gong

, Yijin Zhang
, Lei Deng
, Fang Liu
, Jun Li
, Feng Shu
:
Dynamic Optimization of Random Access in Deadline-Constrained Broadcasting. 2059-2073 - Chun-Yang Zhang

, Hai-Chun Cai
, C. L. Philip Chen
, Yue-Na Lin
, Wu-Peng Fang:
Graph Representation Learning With Adaptive Metric. 2074-2085 - Jie Lian

, Peilin Jia
, Feiyue Wu
, Xi Huang:
A Stackelberg Game Approach to the Stability of Networked Switched Systems Under DoS Attacks. 2086-2097 - Kunhao Li

, Zhenhua Huang
, Zhaohong Jia
:
RAHG: A Role-Aware Hypergraph Neural Network for Node Classification in Graphs. 2098-2108 - Jianping Zhou

, Dong Xu
, Weipeng Tai
, Choon Ki Ahn
:
Switched Event-Triggered H∞ Security Control for Networked Systems Vulnerable to Aperiodic DoS Attacks. 2109-2123 - Lei Zhang

, Bin Li
, Haipeng Yang
, Fan Cheng
, Cheng Zhang, Renzhi Cao
:
Multi-Objective Optimization of Local Overlapping Community Detection: A Formal Model and Novel Evolutionary Algorithm. 2124-2140 - Yishun Liu, Keke Huang

, Chunhua Yang
, Zhen Wang
:
Distributed Network Reconstruction Based on Binary Compressed Sensing via ADMM. 2141-2153 - Fanchao Kong

, Cheng Hu
, Leimin Wang
, Tingwen Huang
:
Fixed-Time Stabilization of Leakage-Delayed Neural Networks Modeled by Delayed Filippov Systems: Leakage-Delay-Dependent Settling-Time. 2154-2167 - Renli Zhang

, Ruiting Zhou
:
An Efficient Online Auction for Placing and Pricing Cloud Container Clusters. 2168-2179 - Ze Tang

, Chenhui Jiang, Yan Wang
, Jianwen Feng
, Ju H. Park
:
Average Impulsive Weight Based Event-Triggered Impulsive Synchronization on Coupled Neural Networks. 2180-2189 - Zhaoxia Peng

, Yingwen Zhang
, Guoguang Wen
, Jinhuan Wang, Tingwen Huang
:
Resilient Output Consensus to Cyber-Attacks in Continuous-Time Cyber-Physical Systems. 2190-2200 - Ying Liu

, Qi Zeng
, Liming Pan
, Ming Tang
:
Identify Influential Spreaders in Asymmetrically Interacting Multiplex Networks. 2201-2211 - Linhao Zhao

, Shiping Wen
, Zhenyuan Guo
, Kaibo Shi
, Jianying Xiao, Song Zhu, Tingwen Huang
:
Finite-Time Nonchattering Synchronization of Coupled Neural Networks With Multi-Weights. 2212-2225 - Kohei Watabe

, Shohei Nakazawa, Yoshiki Sato, Sho Tsugawa
, Kenji Nakagawa
:
GraphTune: A Learning-Based Graph Generative Model With Tunable Structural Features. 2226-2238 - Renjie Lin

, Shide Du
, Shiping Wang
, Wenzhong Guo
:
Multi-Channel Augmented Graph Embedding Convolutional Network for Multi-View Clustering. 2239-2249 - Wenqi Pan, Yuedong Xu

, Shaoteng Liu:
Making TCP BBR Pacing Adaptive With Domain Knowledge Assisted Reinforcement Learning. 2250-2264 - I-Cheng Lin

, Osman Yagan
, Carlee Joe-Wong
:
Dynamic Coupling Strategy for Interdependent Network Systems Against Cascading Failures. 2265-2282 - Xiaojie Huang

, Dawei Ding
, Yingying Ren, Xiangpeng Xie
:
Attack Detection of Complex Cyber-Physical Networks via Set-Membership Theory. 2283-2293 - Iman Vakilinia

, Weihong Wang
, Jiajun Xin
:
An Incentive-Compatible Mechanism for Decentralized Storage Network. 2294-2306 - Dawei Zhao

, Shudong Li
, Zhen Wang
, Haipeng Peng
:
Cooperation and Competition Coupled Diffusion of Multi-Feature on Multiplex Networks and Its Control. 2307-2318 - Jing Yan

, Zeqian Zhang, Xian Yang
, Xiaoyuan Luo
, Xinping Guan
:
Target Detection in Underwater Sensor Networks by Fusion of Active and Passive Measurements. 2319-2333 - Fei Han

, Zidong Wang
, Hongli Dong
, Xiao-jian Yi
, Fuad E. Alsaadi
:
Distributed $H_{\infty }$-Consensus Estimation for Random Parameter Systems Over Binary Sensor Networks: A Local Performance Analysis Method. 2334-2346 - Hui Cui

, Xuechao Yang
, Wencheng Yang
, Baodong Qin
, Xun Yi
:
Token-Based Biometric Enhanced Key Derivation for Authentication Over Wireless Networks. 2347-2357 - Xinglin Zhang

, Zhaojing Ou, Zheng Yang
:
FedMPT: Federated Learning for Multiple Personalized Tasks Over Mobile Computing. 2358-2371 - Tianbiao Shi

, Fanglai Zhu
:
Security Time-Varying Formation Control for Multi-Agent Systems Under Denial-of-Service Attacks via Unknown Input Observer. 2372-2385 - Qing Zhao, Xiangjuan Yao

, Xiangying Dang
, Dunwei Gong
:
The Nodes Influence Maximization in Open Source Software Community Based on Probability Propagation Model. 2386-2395
Volume 10, Number 5, September - October 2023
- Sahil Garg

, Yulei Wu
, Shahid Mumtaz
, Fabrizio Granelli, Kim-Kwang Raymond Choo
, Min Chen
:
Guest Editorial Introduction to the Special Section on AI-Driven Cybersecurity for Healthcare Cyber Physical Systems. 2396-2401 - Aitizaz Ali

, Muhammad Fermi Pasha
, Antonio Guerrieri
, Antonella Guzzo
, Xiaobing Sun
, Aamir Saeed, Amir Hussain, Giancarlo Fortino
:
A Novel Homomorphic Encryption and Consortium Blockchain-Based Hybrid Deep Learning Model for Industrial Internet of Medical Things. 2402-2418 - Ankita Sharma

, Shalli Rani
, Syed Hassan Ahmed Shah
, Rohit Sharma
, Feng Yu
, Mohammad Mehedi Hassan
:
An Efficient Hybrid Deep Learning Model for Denial of Service Detection in Cyber Physical Systems. 2419-2428 - Senthil Murugan Nagarajan

, Ganesh Gopal Devarajan
, Amin Salih Mohammed, T. V. Ramana, Uttam Ghosh
:
Intelligent Task Scheduling Approach for IoT Integrated Healthcare Cyber Physical Systems. 2429-2438 - Chao-Lung Yang

, Hendrik Tampubolon
, Aji Setyoko, Kai-Lung Hua
, Mohammad Tanveer
, Wei Wei
:
Secure and Privacy-Preserving Human Interaction Recognition of Pervasive Healthcare Monitoring. 2439-2454 - Zakaria Abou El Houda

, Abdelhakim Senhaji Hafid
, Lyes Khoukhi
, Bouziane Brik
:
When Collaborative Federated Learning Meets Blockchain to Preserve Privacy in Healthcare. 2455-2465 - Abdullah Lakhan

, Mazin Abed Mohammed
, Jan Nedoma
, Radek Martinek
, Prayag Tiwari
, Neeraj Kumar
:
Blockchain-Enabled Cybersecurity Efficient IIOHT Cyber-Physical System for Medical Applications. 2466-2479 - Wenjing Xiao

, Yuan Tang
, Jia Liu, Di Wu
, Bander A. Alzahrani
, Yixue Hao
, Ning Zhou:
Semantic-Driven Efficient Service Network Towards Smart Healthcare System in Intelligent Fabric. 2480-2489 - Wensheng Gan

, Kaixia Hu, Gengsen Huang, Wei-Che Chien, Han-Chieh Chao
, Weizhi Meng
:
Data Analytic for Healthcare Cyber Physical System. 2490-2502 - Bocheng Ren

, Laurence T. Yang
, Qingchen Zhang
, Jun Feng
, Xin Nie
:
Blockchain-Powered Tensor Meta-Learning-Driven Intelligent Healthcare System With IoT Assistance. 2503-2513 - Fei Song

, Yuyin Ma
, Ilsun You
, Hongke Zhang
:
Smart Collaborative Evolvement for Virtual Group Creation in Customized Industrial IoT. 2514-2524 - Muhammad Tanveer

, Abd Ullah Khan
, Musheer Ahmad
, Tu N. Nguyen
, Ahmed A. Abd El-Latif
:
Resource-Efficient Authenticated Data Sharing Mechanism for Smart Wearable Systems. 2525-2536 - Xiaoyu Yi, Jun Wu

, Gaolei Li
, Ali Kashif Bashir
, Jianhua Li, Ahmad Ali AlZubi
:
Recurrent Semantic Learning-Driven Fast Binary Vulnerability Detection in Healthcare Cyber Physical Systems. 2537-2550 - Zhiguo Qu

, Hanrong Sun:
A Secure Information Transmission Protocol for Healthcare Cyber Based on Quantum Image Expansion and Grover Search Algorithm. 2551-2563 - Baofeng Ji

, Yanan Wang
, Ling Xing
, Chunguo Li
, Yi Wang
, Hong Wen
:
IRS-Driven Cybersecurity of Healthcare Cyber Physical Systems. 2564-2573 - Muhammad Junaid Iqbal

, Sana Aurangzeb
, Muhammad Aleem
, Gautam Srivastava
, Jerry Chun-Wei Lin
:
RThreatDroid: A Ransomware Detection Approach to Secure IoT Based Healthcare Systems. 2574-2583 - Zhangyi Shen

, Feng Ding
, Alireza Jolfaei
, Kusum Yadav
, Sahil Vashisht
, Keping Yu
:
DeformableGAN: Generating Medical Images With Improved Integrity for Healthcare Cyber Physical Systems. 2584-2596 - Pradeep Kumar Roy

, Ashish Singh
, Jainam Vipul Desai
, Sunil Kumar Singh
:
Healthcare Data Security Using Lightweight Protocol for Cyber Physical System. 2597-2606 - Sunder Ali Khowaja

, Ik Hyun Lee
, Kapal Dev
, Muhammad Aslam Jarwar
, Nawab Muhammad Faseeh Qureshi
:
Get Your Foes Fooled: Proximal Gradient Split Learning for Defense Against Model Inversion Attacks on IoMT Data. 2607-2616 - Raju Pal

, Ashish Kumar Tripathi, Avinash Chandra Pandey, Mohammad Ayoub Khan
, Varun G. Menon
, Himanshu Mittal
:
A N2CNN-Based Anomaly Detection Method for Cardiovascular Data in Cyber-Physical System. 2617-2626 - Yu Liu, Junxin Chen

, Bo Fang
, Yongyong Chen
, Zhihan Lv
:
Ensemble Learning-Based Atrial Fibrillation Detection From Single Lead ECG Wave for Wireless Body Sensor Network. 2627-2636 - Prosanta Gope

, Yuening Wang, Zengpeng Li
, Biplab Sikdar
:
QR-PUF: Design and Implementation of a RFID-Based Secure Inpatient Management System Using XOR-Arbiter-PUF and QR-Code. 2637-2650 - Jiaming Pei

, Zhi Yu
, Jinhai Li
, Mian Ahmad Jan
, Kuruva Lakshmanna
:
TKAGFL: A Federated Communication Framework Under Data Heterogeneity. 2651-2661 - Kai Peng

, Peichen Liu, Muhammad Bilal
, Xiaolong Xu
, Edoardo Prezioso
:
Mobility and Privacy-Aware Offloading of AR Applications for Healthcare Cyber-Physical Systems in Edge Computing. 2662-2673 - Haotong Cao

, Anish Jindal
, Han Hu
, Md. Jalil Piran
, Longxiang Yang
:
Secure and Intelligent Service Function Chain for Sustainable Services in Healthcare Cyber Physical Systems. 2674-2684 - Yuan Liu

, Wangyuan Yu, Zhengpeng Ai
, Guangxia Xu
, Liang Zhao
, Zhihong Tian
:
A Blockchain-Empowered Federated Learning in Healthcare-Based Cyber Physical Systems. 2685-2696 - Mohammad Wazid

, Siddhant Thapliyal
, Devesh Pratap Singh
, Ashok Kumar Das
, Sachin Shetty
:
Design and Testbed Experiments of User Authentication and Key Establishment Mechanism for Smart Healthcare Cyber Physical Systems. 2697-2709 - Khalid Mahmood

, Mohammad S. Obaidat
, Zahid Ghaffar
, Bander A. Alzahrani
, Salman Shamshad
, Muhammad Asad Saleem
, Shafiq Hussain
:
Cloud-Assisted Secure and Cost-Effective Authenticated Solution for Remote Wearable Health Monitoring System. 2710-2718 - Muhammad Adil

, Muhammad Khurram Khan
, Muhammad Mohsin Jadoon
, Muhammad Attique
, Houbing Song
, Ahmed Farouk
:
An AI-Enabled Hybrid Lightweight Authentication Scheme for Intelligent IoMT Based Cyber-Physical Systems. 2719-2730 - Shudong Li

, Laiyuan Jiang, Qianqing Zhang, Zhen Wang
, Zhihong Tian
, Mohsen Guizani
:
A Malicious Mining Code Detection Method Based on Multi-Features Fusion. 2731-2739 - Mainak Adhikari

, Varun G. Menon
, Danda B. Rawat
, Xingwang Li
:
Guest Editorial Introduction to the Special Section on Computational Intelligence and Advanced Learning for Next-Generation Industrial IoT. 2740-2744 - Peiran Li

, Haoran Zhang
, Wenjing Li
, Keping Yu
, Ali Kashif Bashir
, Ahmad Ali AlZubi
, Jinyu Chen
, Xuan Song
, Ryosuke Shibasaki:
IIoT Based Trustworthy Demographic Dynamics Tracking With Advanced Bayesian Learning. 2745-2754 - Peng Zhang

, Hui Tian
, Pengtao Zhao, Shaoshuai Fan
:
Context-Aware Mobile Edge Resource Allocation in OFDMA Downlink System. 2755-2768 - Aishwariya Chakraborty

, Sudip Misra
:
QoS-Aware Resource Bargaining for Federated Learning Over Edge Networks in Industrial IoT. 2769-2778 - Zhili Zhou

, Yujiang Li
, Jin Li
, Keping Yu
, Guang Kou, Meimin Wang, Brij Bhooshan Gupta
:
GAN-Siamese Network for Cross-Domain Vehicle Re-Identification in Intelligent Transport Systems. 2779-2790 - Jiabao Wen

, Jiachen Yang
, Yang Li
, Jingyi He
, Zhengjian Li
, Houbing Song
:
Behavior-Based Formation Control Digital Twin for Multi-AUG in Edge Computing. 2791-2801 - (Withdrawn) Blockchain and Deep Learning for Secure Communication in Digital Twin Empowered Industrial IoT Network. 2802-2813

- Song Wang

, Hai Lan, Yuwei Peng, Zhiyong Peng
:
Consolidating Industrial Small Files Using Robust Graph Clustering. 2814-2831 - Danfeng Sun

, Jianyong Zhao
, Baiping Chen
, Huifeng Wu
, Jia Wu
:
Cross-Level Dependability Assessment With a Distributed Split Mechanism for Wireless Communication Systems. 2832-2842 - Muhammad Ibrar

, Lei Wang
, Aamir Akbar
, Mian Ahmad Jan
, Venki Balasubramanian
, Gabriel-Miro Muntean
, Nadir Shah
:
Adaptive Capacity Task Offloading in Multi-Hop D2D-Based Social Industrial IoT. 2843-2852 - Mengyao Peng, Jia Hu

, Hui Lin
, Xiaoding Wang
, Peng Liu
, Kapal Dev
, Sunder Ali Khowaja
, Nawab Muhammad Faseeh Qureshi
:
Spatiotemporal Prediction Based Intelligent Task Allocation for Secure Spatial Crowdsourcing in Industrial IoT. 2853-2863 - Li Zhang

, Jianbo Xu, Pandi Vijayakumar
, Pradip Kumar Sharma
, Uttam Ghosh
:
Homomorphic Encryption-Based Privacy-Preserving Federated Learning in IoT-Enabled Healthcare System. 2864-2880 - Shunpu Tang

, Lunyuan Chen, Ke He
, Junjuan Xia
, Lisheng Fan
, Arumugam Nallanathan
:
Computational Intelligence and Deep Learning for Next-Generation Edge-Enabled Industrial IoT. 2881-2893 - Yichi Zhang

, Chunhua Yang
, Keke Huang
, Yonggang Li:
Intrusion Detection of Industrial Internet-of-Things Based on Reconstructed Graph Neural Networks. 2894-2905 - Jing Wang, Debiao He

, Aniello Castiglione
, Brij B. Gupta
, Marimuthu Karuppiah
, Libing Wu
:
PCNNCEC: Efficient and Privacy-Preserving Convolutional Neural Network Inference Based on Cloud-Edge-Client Collaboration. 2906-2923 - Zibo Wang

, Yifei Zhu
, Dan Wang
, Zhu Han
:
Federated Analytics Informed Distributed Industrial IoT Learning With Non-IID Data. 2924-2939 - Zheng Chang

, Hengwei Deng, Li You
, Geyong Min
, Sahil Garg
, Georges Kaddoum
:
Trajectory Design and Resource Allocation for Multi-UAV Networks: Deep Reinforcement Learning Approaches. 2940-2951 - Hasan Tooba, Jahanzaib Malik

, Iram Bibi, Wali Ullah Khan
, Fahd N. Al-Wesabi
, Kapal Dev
, Gaojian Huang
:
Securing Industrial Internet of Things Against Botnet Attacks Using Hybrid Deep Learning Approach. 2952-2963 - Qianwen Ye

, Xiaochen Fan
, Hongxia Bie, Deepak Puthal
, Tao Wu
, Xudong Song
, Gengfa Fang:
SE-Loc: Security-Enhanced Indoor Localization With Semi-Supervised Deep Learning. 2964-2977 - Honghao Gao

, Binyang Qiu, Ramón J. Durán Barroso
, Walayat Hussain
, Yueshen Xu
, Xinheng Wang
:
TSMAE: A Novel Anomaly Detection Approach for Internet of Things Time Series Data Using Memory-Augmented Autoencoder. 2978-2990 - Fan Zhang

, Guangjie Han
, Li Liu
, Miguel Martínez-García
, Yan Peng
:
Deep Reinforcement Learning Based Cooperative Partial Task Offloading and Resource Allocation for IIoT Applications. 2991-3006 - Yihong Yang

, Xuan Yang
, Mohsen Heidari
, Mohammad Ayoub Khan
, Gautam Srivastava
, Mohammad Reza Khosravi
, Lianyong Qi
:
ASTREAM: Data-Stream-Driven Scalable Anomaly Detection With Accuracy Guarantee in IIoT Environment. 3007-3016 - Yuexia Zhang

, Ying Zhou
:
Resource Allocation Strategy Based On Tripartite Graph in Vehicular Social Networks. 3017-3031 - Kai Peng

, Hualong Huang, Bohai Zhao
, Alireza Jolfaei
, Xiaolong Xu
, Muhammad Bilal
:
Intelligent Computation Offloading and Resource Allocation in IIoT With End-Edge-Cloud Computing Using NSGA-III. 3032-3046 - Jingcheng Song

, Weizheng Wang
, Thippa Reddy Gadekallu
, Jianyu Cao, Yining Liu
:
EPPDA: An Efficient Privacy-Preserving Data Aggregation Federated Learning Scheme. 3047-3057 - Muhammad Tanveer

, Abd Ullah Khan
, Tu N. Nguyen
, Musheer Ahmad
, Ahmed A. Abd El-Latif
:
Towards a Secure and Computational Framework for Internet of Drones Enabled Aerial Computing. 3058-3070 - Xianduo Li

, Xiaoli Gong
, Dong Wang
, Jin Zhang
, Thar Baker
, Jin Zhou, Tingjuan Lu:
ABM-SpConv-SIMD: Accelerating Convolutional Neural Network Inference for Industrial IoT Applications on Edge Devices. 3071-3085 - Yirui Wu

, Haifeng Guo, Chinmay Chakraborty
, Mohammad Reza Khosravi
, Stefano Berretti
, Shaohua Wan
:
Edge Computing Driven Low-Light Image Dynamic Enhancement for Object Detection. 3086-3098
Volume 10, Number 6, November - December 2023
- Shuya Zheng, Zhiyuan Ren

, Wenchi Cheng
, Hailin Zhang
:
Performance Analysis for Subgraph Isomorphism Based Embedding Service Function Chains. 3099-3113 - Richeng Jin

, Yufan Huang
, Zhaoyang Zhang
, Huaiyu Dai
:
On the Privacy Guarantees of Gossip Protocols in General Networks. 3114-3130 - You Zhao, Xiaofeng Liao

, Xing He
:
Distributed Inertial Continuous and Discrete Time Algorithms for Solving Resource Allocation Problem. 3131-3143 - Jinyin Chen

, Chengyu Jia, Haibin Zheng
, Ruoxi Chen, Chenbo Fu
:
Is Multi-Modal Necessarily Better? Robustness Evaluation of Multi-Modal Fake News Detection. 3144-3158 - Haibin Shao

, Haoyu Wei, Lulu Pan
, Dewei Li
:
Distributed Stabilization of Signed Networks via Self-Loop Compensation. 3159-3171 - Qi Xia

, Zeyi Tao
, Qun Li
, Songqing Chen
:
Byzantine Tolerant Algorithms for Federated Learning. 3172-3183 - Xiangli Jiang

, Guihua Xia
, Zhiguang Feng
, Qing-Long Han
, Rong Su
:
On Estimation of Reachable Sets for Approximate Consensus of Homogeneous Multiagent Systems Subject to Bounded Exogenous Disturbances. 3184-3197 - Xiaoyuan Luo

, Yuliang Fu
, Xiaolei Li
:
Resilient Synchronization of Networked Lagrangian Systems Over Event-Based Communication With Asynchronous DoS Attacks. 3198-3208 - Quan Yuan

, Xiang Li
:
Distributed Model Predictive Formation Control for a Group of UAVs With Spatial Kinematics and Unidirectional Data Transmissions. 3209-3222 - Mingfei Chen, Dong Wang, Xiaodong Wang, Zheng-Guang Wu, Wei Wang:

Distributed Aggregative Optimization via Finite-Time Dynamic Average Consensus. 3223-3231 - Benedetta Picano

, Enrico Vicario
, Romano Fantacci
:
An Efficient Flows Dispatching Scheme for Tardiness Minimization of Data-Intensive Applications in Heterogeneous Systems. 3232-3241 - Özge Canli Usta

, Serkan Günel
:
Causation Entropy En Route to Re-Synchronization Unfolds the Structure of Chaotic Dynamical Networks. 3242-3252 - Jiankang Ren

, Zheng Wang, Chi Lin
, Mohammad S. Obaidat
, Hongrui Xie, Haihui Zhu, Chunxiao Liu, Kaiwen Wang, Guozhen Tan
:
REORDER++: Enhanced Randomized Real-Time Scheduling Strategy Against Side-Channel Attacks. 3253-3266 - Armineh Rahmanian Kooshkaki

, Sadegh Bolouki
, S. Rasoul Etesami, Abolfazl Mohebbi
:
Partisan Confidence Model for Group Polarization. 3267-3280 - Jiyang Bai

, Xianbin Wang
, Jie Mei
, Yan Xin, Osama Aboul-Magd, Edward Au
:
Hybrid Services QoS Enhancement by Joint Traffic and Access Management in Unsaturated IEEE 802.11ax Network. 3281-3294 - Jia Zhao

, Jiangchuan Liu
, Haiyang Wang, Changqiao Xu
, Hongke Zhang
:
Multipath Congestion Control: Measurement, Analysis, and Optimization From the Energy Perspective. 3295-3307 - Shashwat Kumar

, A. Antony Franklin
, Jiong Jin
, Yu-Ning Dong
:
Seer: Learning-Based 360$^{\circ }$ Video Streaming for MEC-Equipped Cellular Networks. 3308-3319 - Wei Wang

, Zhenzhen Quan, Siwen Zhao, Guoqiang Sun, Yujun Li
, Xianye Ben
, Jianli Zhao
:
User-Context Collaboration and Tensor Factorization for GNN-Based Social Recommendation. 3320-3330 - Yuanyuan Zeng

, Kai Xiang
:
Persistence Augmented Graph Convolution Network for Information Popularity Prediction. 3331-3342 - Luyao Wang

, Guanglin Zhang
:
Joint Service Caching, Resource Allocation and Computation Offloading in Three-Tier Cooperative Mobile Edge Computing System. 3343-3353 - Guanghao Lv

, Zhouhua Peng
, Yongming Li
, Lu Liu
, Dan Wang
:
Barrier-Certified Model Predictive Cooperative Path Following Control of Connected Autonomous Surface Vehicles. 3354-3367 - Ke Li

, Kexun Chen, Shouxi Luo
, Honghao Zhang, Pingzhi Fan:
UbiNN: A Communication Efficient Framework for Distributed Machine Learning in Edge Computing. 3368-3383 - Zhirui Li

, Jesús Arroyo
, Konstantinos Pantazis
, Vince Lyzinski
:
Clustered Graph Matching for Label Recovery and Graph Classification. 3384-3395 - Daniel Setó-Rey

, José Ignacio San Martín
, Carlos López Nozal
:
Vulnerability of Package Dependency Networks. 3396-3408 - Chenyang Wang

, Ruibin Li
, Xiaofei Wang
, Tarik Taleb
, Song Guo
, Yuxia Sun
, Victor C. M. Leung
:
Heterogeneous Edge Caching Based on Actor-Critic Learning With Attention Mechanism Aiding. 3409-3420 - Peng Qin

, Xue Wu, Ziyuan Cai
, Xiongwen Zhao
, Yang Fu, Miao Wang, Suiyan Geng:
Joint Trajectory Plan and Resource Allocation for UAV-Enabled C-NOMA in Air-Ground Integrated 6G Heterogeneous Network. 3421-3434 - Yuhao Jing

, Zhaohui Yang
, Pingfang Zhou
, Yueying Wang
, Huaicheng Yan
:
Cooperative Deployment Multi-Objective Optimization Approach for High-Resolution Multi-Airship Earth-Observation Coverage Network. 3435-3449 - Miklós Z. Rácz

, Daniel E. Rigobon
:
Towards Consensus: Reducing Polarization by Perturbing Social Networks. 3450-3464 - Xianlong Jiao

, Hongjun Ou
, Shiguang Chen
, Songtao Guo
, Yuben Qu
, Chaocan Xiang
, Jiaxing Shang
:
Deep Reinforcement Learning for Time-Energy Tradeoff Online Offloading in MEC-Enabled Industrial Internet of Things. 3465-3479 - Juyi Li

, Xiaoqun Wu
, Su Zhong, Ruguo Fan, Jie Hu
, Jinhu Lü
:
A Novel Game Investment Model on Uniform Hypergraphs. 3480-3490 - Sanjeev Kumar Dwivedi

, Ruhul Amin
, Satyanarayana Vollala
, Muhammad Khurram Khan
:
B-HAS: Blockchain-Assisted Efficient Handover Authentication and Secure Communication Protocol in VANETs. 3491-3504 - Haoyue Yang

, Hao Zhang
, Zhuping Wang
, Huaicheng Yan
:
Reliable Leader-Following Consensus of Discrete-Time Semi-Markovian Jump Multi-Agent Systems. 3505-3518 - Dan Chen

, Defu Cai, Housheng Su
:
Scaling Properties of Scale-Free Networks in Degree-Thresholding Renormalization Flows. 3519-3528 - Wenqian Zhang

, Zhirong Shen
, Mengjiao Qin, Guanglin Zhang
:
Two Time-Scale Energy and Spectrum Allocation for MEC Networks With Hybrid Energy Supplies. 3529-3542 - Shichang Ding

, Xiangyang Luo
, Jinwei Wang
, Xiaoming Fu
:
GNN-Geo: A Graph Neural Network-Based Fine-Grained IP Geolocation Framework. 3543-3560 - Jiao Chen

, Jianhua Tang
, Weihua Li
:
Industrial Edge Intelligence: Federated-Meta Learning Framework for Few-Shot Fault Diagnosis. 3561-3573 - Jianfeng Zhou

, Wallace K. S. Tang
:
Reconstruction of Commuting Networks: A Distance-Tiered Graph Neural Network Approach. 3574-3586 - Xia Zhao, Fanrong Qu, Chunsheng Liu, Engang Tian

:
Observer-Based Quasi-Synchronization Control for Master-Slave Neural Networks Under Sojourn-Probability-Based Stochastic Communication Protocol. 3587-3596 - Xueyang Meng

, Zidong Wang
, Fan Wang
, Yun Chen
:
Distributed Fusion Filtering for Nonlinear Time-Varying Systems Over Amplify-and-Forward Relay Networks: An $H_{\infty }$ Quantized Framework. 3597-3608 - Jing Ping, Song Zhu

, Mingxiao Shi, Siman Wu, Mouquan Shen
, Xiaoyang Liu
, Shiping Wen
:
Event-Triggered Finite-Time Synchronization Control for Quaternion-Valued Memristive Neural Networks by an Non-Decomposition Method. 3609-3619 - Ningning Lang, Quanbo Zha

, Lin Wang
:
Time-Varying Targeted Marketing in Networks Based on Competitive Opinion Dynamics. 3620-3632 - Ge Fan

, Chaoyun Zhang, Junyang Chen
, Paul Li, Yingjie Li, Victor C. M. Leung
:
Improving Rating Prediction in Multi-Criteria Recommender Systems via a Collective Factor Model. 3633-3643 - Fanchao Kong

, Honglin Ni, Quanxin Zhu
, Cheng Hu
, Tingwen Huang
:
Fixed-Time and Predefined-Time Synchronization of Discontinuous Neutral-Type Competitive Networks via Non-Chattering Adaptive Control Strategy. 3644-3657 - Weihao Li

, Mengji Shi
, Lei Shi
, Boxian Lin, Kaiyu Qin
:
Containment Tracking for Networked Agents Subject to Nonuniform Communication Delays. 3658-3669 - Xiaojia Xu

, Yongcai Wang
, Lanling Xu
, Deying Li
:
LSA: Understanding the Threat of Link-Based Scapegoating Attack in Network Tomography. 3670-3681 - Jiaqi Zhu

, Fang Deng
, Jiachen Zhao
, Daoming Liu, Jie Chen
:
UAED: Unsupervised Abnormal Emotion Detection Network Based on Wearable Mobile Device. 3682-3696 - Ivan Jokic

, Piet Van Mieghem
:
Linear Clustering Process on Networks. 3697-3706 - Jinming Li

, Bo Gu
, Zhen Qin
, Yu Han
:
Graph Tasks Offloading and Resource Allocation in Multi-Access Edge Computing: A DRL-and-Optimization-Aided Approach. 3707-3718 - Wen Zhan

, Dewei Wu
, Xinghua Sun
, Ziyang Guo
, Peng Liu
, Jingjing Liu
:
Peak Age of Information Optimization of Slotted Aloha: FCFS Versus LCFS. 3719-3731 - Kathinka Frieswijk

, Lorenzo Zino
, Ming Cao
:
A Polarized Temporal Network Model to Study the Spread of Recurrent Epidemic Diseases in a Partially Vaccinated Population. 3732-3743 - Yanhu Wang

, Gan Yu
, Wei Xie
, Weidong Zhang
, Carlos Silvestre
:
Robust Saturated Formation Tracking Control of Multiple Quadrotors With Switching Communication Topologies. 3744-3753 - Weiwei Zhan

, Zhiqiang Miao
, Yanjie Chen
, Zheng-Guang Wu
, Yaonan Wang
:
Event-Triggered Finite-Time Formation Control for Networked Nonholonomic Mobile Robots Under Denial-of-Service Attacks. 3754-3766 - Jiaxing Chen, Shiwen Sun

, Chengyi Xia
, Dinghua Shi, Guanrong Chen
:
Modeling and Analyzing Malware Propagation Over Wireless Networks Based on Hypergraphs. 3767-3778 - Xing Li

, Rui Zhou, Guibin Sun
, Jie Zhang:
Connectivity-Preserving Flocking of Multiagent Systems via Selecting Critical Neighbors. 3779-3792 - Haipeng Peng

, Jie Zhao
, Lixiang Li
, Yeqing Ren
, Shanshan Zhao
:
One-Class Adversarial Fraud Detection Nets With Class Specific Representations. 3793-3803 - Jing Xiao

, Yu-Cheng Zou, Xiao-Ke Xu
:
A Metaheuristic-Based Modularity Optimization Algorithm Driven by Edge Directionality for Directed Networks. 3804-3817 - Saber Jafarizadeh

:
Convergence Speed and Robustness Analysis of Epidemic Spreading Processes With Time-Delay. 3818-3833 - Yinyin Zhang, Yongjun Li

, Wenli Ji
:
A Trajectory-Based User Movement Pattern Similarity Measure for User Identification. 3834-3845 - Dandan Wang

, Jialing Zhou
, Guanghui Wen
, Jinhu Lü
, Guanrong Chen
:
Event-Triggered Optimal Consensus of Second-Order MASs With Disturbances and Cyber Attacks on Communications Edges. 3846-3857 - Ebin M. Manuel

, Vinod Pankajakshan
, Manil T. Mohan
:
Energy-Efficient Data Aggregation in Low-Power Wireless Networks With Sensors of Discrete Transmission Ranges: A Mathematical Framework for Network Design. 3858-3870 - Zhi Feng

, Guoqiang Hu
, Xiwang Dong
, Jinhu Lü
:
Adaptively Distributed Nash Equilibrium Seeking of Noncooperative Games for Uncertain Heterogeneous Linear Multi-Agent Systems. 3871-3882 - Zhao Liu

, Feng Chen
, Shukai Duan
:
Distributed Subspace Projection Graph Signal Estimation With Anomaly Interference. 3883-3894 - Fuyi Qu, Ahmad W. Al-Dabbagh

, Zhengen Zhao
, Hao Liu
, Yuzhe Li
:
Remote State Estimation in Networked Systems: Data Pre-Processing or Not? 3895-3907 - Guangyu Peng

, Aiqing Zhang
, Xiaodong Lin
:
Patient-Centric Fine-Grained Access Control for Electronic Medical Record Sharing With Security via Dual-Blockchain. 3908-3921 - Wei Chen

, Zidong Wang
, Jun Hu
, Hongli Dong
, Guo-Ping Liu
:
Distributed Resilient State Estimation for Cyber-Physical Systems Against Bit Errors: A Zonotopic Set-Membership Approach. 3922-3932 - Jiani Li

, Weihan Wang, Waseem Abbas
, Xenofon D. Koutsoukos
:
Distributed Clustering for Cooperative Multi-Task Learning Networks. 3933-3942 - Juan Liu

, Guofeng Mei
, Xiaoqun Wu
, Yuanqing Xia
:
A Unified Inferring Framework of Multiplex Epidemic Networks Under Multiple Interlayer Interaction Modes. 3943-3952 - Guosheng Kang

, Linghang Ding, Jianxun Liu
, Buqing Cao
, Yu Xu:
Web API Recommendation Based on Self-Attentional Neural Factorization Machines With Domain Interactions. 3953-3963 - Jun Yang

, Xinhao Zhuang:
Integrated Energy Management Strategy Based on Finite Time Double Consistency Under Non-Ideal Communication Conditions. 3964-3974 - Zaiben Sun

, Xiaojie Chen
, Attila Szolnoki:
State-Dependent Optimal Incentive Allocation Protocols for Cooperation in Public Goods Games on Regular Networks. 3975-3988 - Jianbang Dai

, Xiaolong Xu
, Honghao Gao
, Fu Xiao
:
CMFTC: Cross Modality Fusion Efficient Multitask Encrypt Traffic Classification in IIoT Environment. 3989-4009 - Lin You

, Zhuobiao Wang, Gengran Hu
, Chengtang Cao
, Liang Li:
An Improved Model on the Vague Sets-Based DPoS's Voting Phase in Blockchain. 4010-4019 - Jingjing Tan

, Fengxiao Tang
, Ming Zhao
, Yusen Zhu:
Adaptive Caching Scheme for Jointly Optimizing Delay and Energy Consumption in Heterogeneous Digital Twin IoT. 4020-4032 - Bin Li

, Zhen Qian, Lei Liu
, Yuan Wu, Dapeng Lan, Celimuge Wu
:
Computation Offloading for Edge Computing in RIS-Assisted Symbiotic Radio Systems. 4033-4045 - Juan Zhang

, Dongsheng Yang
, Huaguang Zhang
, Hanguang Su
:
Adaptive Secure Practical Fault-Tolerant Output Regulation of Multiagent Systems With DoS Attacks by Asynchronous Communications. 4046-4055 - Christos Liaskos

, Konstantinos Alexandris
, Anindya Das
, Siyu Tang
, Leandros Tassiulas:
Analysis and Evaluation of Fully TCP-Compatible Backpressure-Driven Traffic Engineering. 4056-4070 - Ali Ranjha

, Muhammad Awais Javed
, Gautam Srivastava
, Muhammad Asif
:
Quasi-Optimization of Resource Allocation and Positioning for Solar-Powered UAVs. 4071-4081 - Sheng Gao

, Hao Zhang
, Zhuping Wang
, Chao Huang
, Huaicheng Yan
:
Data-Driven Injection Attack Strategy for Linear Cyber-Physical Systems: An Input-Output Data-Based Approach. 4082-4095

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














