


default search action
IEEE Transactions on Network Science and Engineering, Volume 8
Volume 8, Number 1, January - March 2021
- Miklós Z. Rácz

, Jacob Richey
:
Rumor Source Detection With Multiple Observations Under Adaptive Diffusions. 2-12 - Hongwei Du

, Qiang Ye
, Zhipeng Sun, Chuang Liu
, Wen Xu:
FAST-ODT: A Lightweight Outlier Detection Scheme for Categorical Data Sets. 13-24 - Bo Liu, Housheng Su

, Licheng Wu
, Xixi Shen:
Observability of Leader-Based Discrete-Time Multi-Agent Systems Over Signed Networks. 25-39 - Ding Xiang

, Ermin Wei
:
A General Sensitivity Analysis Approach for Demand Response Optimizations. 40-52 - Hongbo Jiang

, Yu Zhang
, Zhu Xiao
, Ping Zhao
, Arun Iyengar
:
An Empirical Study of Travel Behavior Using Private Car Trajectory Data. 53-64 - Yilun Shang

:
Resilient Consensus for Robust Multiplex Networks with Asymmetric Confidence Intervals. 65-74 - Fabien Geyer

, Steffen Bondorf
:
Graph-Based Deep Learning for Fast and Tight Network Calculus Analyses. 75-88 - Yinxin Wan, Kuai Xu

, Feng Wang
, Guoliang Xue
:
Characterizing and Mining Traffic Patterns of IoT Devices in Edge Networks. 89-101 - Shuang Li

, Weiguo Xia
, Xi-Ming Sun
:
Synchronization of Identical Oscillators Under Matrix-Weighted Laplacian With Sampled Data. 102-113 - Magdi Sadek Mahmoud

, Bilal J. Karaki:
Output-Synchronization of Discrete-Time Multiagent Systems: A Cooperative Event-Triggered Dissipative Approach. 114-125 - Xiangli Jiang

, Guihua Xia
, Zhiguang Feng
, Zhengyi Jiang
:
Consensus Tracking of Data-Sampled Nonlinear Multi-Agent Systems With Packet Loss and Communication Delay. 126-137 - Klaus Wehmuth, Artur Ziviani

, Leonardo Chinelate Costa, Ana Paula Couto da Silva
, Alex Borges Vieira
:
You Shall Not Pass: Avoiding Spurious Paths in Shortest-Path Based Centralities in Multidimensional Complex Networks. 138-148 - Qian Xu

, Xiang Yan, Kui Wu
, Jianping Wang
, Kejie Lu
, Weiwei Wu
:
Leveraging Multiplexing Gain in Network Slice Bundles. 149-162 - Jing Wang

, Tingting Ru, Hao Shen
, Jinde Cao
, Ju H. Park
:
Finite-Time $\mathcal {L}_{2}$-$\mathcal {L}_{\infty }$ Synchronization for Semi-Markov Jump Inertial Neural Networks Using Sampled Data. 163-173 - Megan Morrison

, J. Nathan Kutz
:
Nonlinear Control of Networked Dynamical Systems. 174-189 - Jiajun Zhou

, Jie Shen, Shanqing Yu
, Guanrong Chen
, Qi Xuan
:
M-Evolve: Structural-Mapping-Based Data Augmentation for Graph Classification. 190-200 - Yan Ouyang

, Anfeng Liu
, Naixue Xiong
, Tian Wang
:
An Effective Early Message Ahead Join Adaptive Data Aggregation Scheme for Sustainable IoT. 201-219 - Matheus R. F. Mendonça

, André Barreto, Artur Ziviani
:
Approximating Network Centrality Measures Using Node Embedding and Machine Learning. 220-230 - Tong Wu, Pan Zhou

, Binghui Wang
, Ang Li
, Xueming Tang, Zichuan Xu
, Kai Chen
, Xiaofeng Ding
:
Joint Traffic Control and Multi-Channel Reassignment for Core Backbone Network in SDN-IoT: A Multi-Agent Deep Reinforcement Learning Approach. 231-245 - Saiwei Wang

, Xin Jin
, Shuai Mao
, Athanasios V. Vasilakos
, Yang Tang
:
Model-Free Event-Triggered Optimal Consensus Control of Multiple Euler-Lagrange Systems via Reinforcement Learning. 246-258 - Yang Zhai

, Zhi-Wei Liu
, Ming-Feng Ge
, Guanghui Wen
, Xinghuo Yu
, Yuzhen Qin
:
Trusted-Region Subsequence Reduction for Designing Resilient Consensus Algorithms. 259-268 - Youyang Qu

, Shui Yu
, Wanlei Zhou
, Shiping Chen
, Jun Wu:
Customizable Reliable Privacy-Preserving Data Sharing in Cyber-Physical Social Networks. 269-281 - Lucia Valentina Gambuzza

, Mattia Frasca
, Francesco Sorrentino
, Louis M. Pecora
, Stefano Boccaletti:
Controlling Symmetries and Clustered Dynamics of Complex Networks. 282-293 - Yapu Zhang

, Jianxiong Guo
, Wenguo Yang
, Weili Wu
:
Targeted Activation Probability Maximization Problem in Online Social Networks. 294-304 - Zhen Li

, Yang Tang
, Jian-An Fang, Tingwen Huang
:
Formation Control of Multi-Agent Systems With Orientation Noises. 305-317 - Zhihua Xia

, Lan Wang, Jian Tang, Neal N. Xiong
, Jian Weng
:
A Privacy-Preserving Image Retrieval Scheme Using Secure Local Binary Pattern in Cloud Computing. 318-330 - Prasad Vilas Chanekar

, Erfan Nozari
, Jorge Cortés
:
Energy-Transfer Edge Centrality and Its Role in Enhancing Network Controllability. 331-346 - Shaobo Huang

, Zhiwen Zeng
, Kaoru Ota
, Mianxiong Dong
, Tian Wang
, Neal N. Xiong
:
An Intelligent Collaboration Trust Interconnections System for Mobile Information Control in Ubiquitous 5G Networks. 347-365 - Eduardo Viegas

, Altair Olivo Santin
, Vilmar Abreu:
Machine Learning Intrusion Detection in Big Data Era: A Multi-Objective Approach for Longer Model Lifespans. 366-376 - Yang Chen

, Jie Wu
, Rajorshi Biswas:
Grouping Service Chains of Multiple Flows in NFV-Based Networks. 377-388 - Yang Chen

, Jie Wu
:
Flow Scheduling of Service Chain Processing in a NFV-Based Network. 389-399 - Canhui Chen, Xu Chen

, Jiangshan Yu
, Weigang Wu
, Di Wu
:
Impact of Temporary Fork on the Evolution of Mining Pools in Blockchain Networks: An Evolutionary Game Analysis. 400-418 - Pan Zhou

, Yulai Xie
, Ben Niu
, Lingjun Pu
, Zichuan Xu
, Hao Jiang
, Huawei Huang
:
QoE-Aware 3D Video Streaming via Deep Reinforcement Learning in Software Defined Networking Enabled Mobile Edge Computing. 419-433 - Sifat Afroj Moon

, Faryad Darabi Sahneh, Caterina M. Scoglio:
Group-Based General Epidemic Modeling for Spreading Processes on Networks: GroupGEM. 434-446 - Xiao Chen

, Jie Ding
, Zhenyu Lu
, Tianming Zhan
:
An Efficient Formal Modeling Framework for Hybrid Cloud-Fog Systems. 447-462 - Xin Luo

, Zhigang Liu
, Mingsheng Shang
, Jungang Lou
, MengChu Zhou
:
Highly-Accurate Community Detection via Pointwise Mutual Information-Incorporated Symmetric Non-Negative Matrix Factorization. 463-476 - Xingjian Ding

, Jianxiong Guo
, Deying Li
, Weili Wu
:
An Incentive Mechanism for Building a Secure Blockchain-Based Internet of Things. 477-487 - Meirong Zhang

, Ali Saberi
, Anton A. Stoorvogel
:
Semi-Global State Synchronization for Multi-Agent Systems Subject to Actuator Saturation and Unknown Nonuniform Input Delay. 488-497 - Ze Tang

, Deli Xuan, Ju H. Park
, Yan Wang
, Jianwen Feng
:
Impulsive Effects Based Distributed Synchronization of Heterogeneous Coupled Neural Networks. 498-510 - Liangtian Wan

, Feng Xia
, Xiangjie Kong
, Ching-Hsien Hsu
, Runhe Huang
, Jianhua Ma:
Deep Matrix Factorization for Trust-Aware Recommendation in Social Networks. 511-528 - Yuxin Mao

, Lujie Zhou, Naixue Xiong
:
TPS: A Topological Potential Scheme to Predict Influential Network Nodes for Intelligent Communication in Social Networks. 529-540 - Yu Wang

, Chengzhe Piao
, Chi Harold Liu
, Chijin Zhou
, Jian Tang
:
Modeling User Interests With Online Social Network Influence by Memory Augmented Sequence Learning. 541-554 - Pan Lai

, Costas Courcoubetis
, Lingjie Duan
, Stefano Galelli
:
Economic Controls for Smart Water Distribution Networks Undergoing Supply Failures. 555-574 - Chunyu Wu

, Xudong Zhao
:
Quantized Dynamic Output Feedback Control and $L_2$-Gain Analysis for Networked Control Systems: A Hybrid Approach. 575-587 - Song Li

, Weibin Sun
, Yanjing Sun
, Yu Huo
:
Energy-Efficient Task Offloading Using Dynamic Voltage Scaling in Mobile Edge Computing. 588-598 - Shuwen Yi

, Hao Jiang
, Ying Jiang
, Pan Zhou
, Qiang Wang
:
A Hyperbolic Embedding Method for Weighted Networks. 599-612 - Xin Gong

, Yukang Cui
, Jun Shen
, Zhan Shu
, Tingwen Huang
:
Distributed Prescribed-Time Interval Bipartite Consensus of Multi-Agent Systems on Directed Graphs: Theory and Experiment. 613-624 - Yiming Miao

, Yixue Hao
, Min Chen
, Hamid Gharavi
, Kai Hwang:
Intelligent Task Caching in Edge Cloud via Bandit Learning. 625-637 - Xiaoping Wu

, Hengnian Qi, Naixue Xiong
:
Rank-One Semidefinite Programming Solutions for Mobile Source Localization in Sensor Networks. 638-650 - Yang Chen

, Jie Wu
:
Latency-Efficient VNF Deployment and Path Routing for Reliable Service Chain. 651-661 - Reza Entezari-Maleki

, Mohammed Gharib
, Shahbaz Rezaei
, Kishor S. Trivedi
, Ali Movaghar
:
Modeling and Evaluation of Multi-Hop Wireless Networks Using SRNs. 662-679 - Junxiao Wang

, Heng Qi
, Wenxin Li
, Keqiu Li, Steve Uhlig
, Yuxin Wang
:
Dynamic SDN Control Plane Request Assignment in NFV Datacenters. 680-694 - Zhongying Zhao

, Hui Zhou
, Liang Qi, Liang Chang
, MengChu Zhou
:
Inductive Representation Learning via CNN for Partially-Unseen Attributed Networks. 695-706 - Thomas Magelinski

, Mihovil Bartulovic, Kathleen M. Carley
:
Measuring Node Contribution to Community Structure With Modularity Vitality. 707-723 - Saeideh Gholamrezazadeh Motlagh

, Jelena V. Misic
, Vojislav B. Misic
:
The Impact of Selfish Mining on Bitcoin Network Performance. 724-735 - Deqiang Li

, Qianmu Li
, Yanfang Ye
, Shouhuai Xu
:
A Framework for Enhancing Deep Neural Networks Against Adversarial Malware. 736-750 - Abdullah Aydeger

, Mohammad Hossein Manshaei, Mohammad Ashiqur Rahman
, Kemal Akkaya
:
Strategic Defense Against Stealthy Link Flooding Attacks: A Signaling Game Approach. 751-764 - Xu Wang

, Randall A. Berry
:
Market Competition Between LTE-U and WiFi. 765-779 - Ruoyu Wei

, Jinde Cao
, Jürgen Kurths:
Fixed-Time Output Synchronization of Coupled Reaction-Diffusion Neural Networks With Delayed Output Couplings. 780-789 - Jin-Liang Wang

, Lin-Hao Zhao
:
PD and PI Control for Passivity and Synchronization of Coupled Neural Networks With Multi-Weights. 790-802 - Evgenia Christoforou

, Alessandro Nordio
, Alberto Tarable
, Emilio Leonardi
:
Ranking a Set of Objects: A Graph Based Least-Square Approach. 803-813 - Cong Li

, Yuan Zhang, Xiang Li
:
Epidemic Threshold in Temporal Multiplex Networks With Individual Layer Preference. 814-824
Volume 8, Number 2, April - June 2021
- Jianwei Huang:

Message From the Editor-in-Chief. 825 - Yingshu Li

, Mihaela Cardei, Chaokun Wang, Anton Umek:
Guest Editorial Introduction to the Special Section on Artificial Intelligence For Social Networks. 826-827 - Yinxue Yi

, Zufan Zhang
, Laurence T. Yang
, Chenquan Gan, Xianjun Deng
, Lingzhi Yi
:
Reemergence Modeling of Intelligent Information Diffusion in Heterogeneous Social Networks: The Dynamics Perspective. 828-840 - Yuan Yuan, Feng Li

, Dongxiao Yu
, Jichao Zhao, Jiguo Yu
, Xiuzhen Cheng
:
Distributed Social Learning With Imperfect Information. 841-852 - Xiao Liu

, Houbing Song
, Anfeng Liu:
Intelligent UAVs Trajectory Optimization From Space-Time for Data Collection in Social Networks. 853-864 - Ting Li, Zhijin Qiu

, Lijuan Cao, Dazhao Cheng
, Weichao Wang, Xinghua Shi, Yu Wang
:
Privacy-Preserving Participant Grouping for Mobile Social Sensing Over Edge Clouds. 865-880 - Jian Mao

, Yitong Yang, Tianchen Zhang:
Empirical Analysis of Attribute Inference Techniques in Online Social Network. 881-893 - Xiaokang Zhou

, Wei Liang
, Zijia Luo, Yi Pan
:
Periodic-Aware Intelligent Prediction Model for Information Diffusion in Social Networks. 894-904 - Xiaojiang Du, Willy Susilo

, Mohsen Guizani
, Zhihong Tian:
Introduction to the Special Section on Artificial Intelligence Security: Adversarial Attack and Defense. 905-907 - SeokHwan Choi

, Jin-Myeong Shin
, Peng Liu
, Yoon-Ho Choi
:
EEJE: Two-Step Input Transformation for Robust DNN Against Adversarial Examples. 908-920 - Zhaoquan Gu

, Weixiong Hu
, Chuanjing Zhang
, Hui Lu
, Lihua Yin
, Le Wang
:
Gradient Shielding: Towards Understanding Vulnerability of Deep Neural Networks. 921-932 - Jianmin Guo, Yue Zhao, Houbing Song

, Yu Jiang
:
Coverage Guided Differential Adversarial Testing of Deep Learning Systems. 933-942 - Xiangyu Ma

, Wei Shi
:
AESMOTE: Adversarial Reinforcement Learning With SMOTE for Anomaly Detection. 943-956 - Zikai Zhang

, Yidong Li
, Hairong Dong
, Honghao Gao
, Yi Jin
, Wei Wang
:
Spectral-Based Directed Graph Network for Malware Detection. 957-970 - Chao Pei, Yang Xiao

, Wei Liang
, Xiaojia Han
:
Detecting False Data Injection Attacks Using Canonical Variate Analysis in Power Grid. 971-983 - Huijuan Zhu

, Yang Li, Ruidong Li
, Jianqiang Li
, Zhuhong You
, Houbing Song
:
SEDMDroid: An Enhanced Stacking Ensemble Framework for Android Malware Detection. 984-994 - Zhuoqun Xia, Jingjing Tan

, Ke Gu
, Xiong Li
, Weijia Jia:
IDS Intelligent Configuration Scheme Against Advanced Adaptive Attacks. 995-1008 - Rabeya Bosri, Mohammad Shahriar Rahman

, Md. Zakirul Alam Bhuiyan
, Abdullah Al Omar
:
Integrating Blockchain With Artificial Intelligence for Privacy-Preserving Recommender Systems. 1009-1018 - Huilin Li, Yannan Li

, Yong Yu
, Baocang Wang
, Kefei Chen
:
A Blockchain-Based Traceable Self-Tallying E-Voting Protocol in AI Era. 1019-1032 - Ronald Doku

, Danda B. Rawat
, Chunmei Liu:
On the Blockchain-Based Decentralized Data Sharing for Event Based Encryption to Combat Adversarial Attacks. 1033-1043 - Shivani Bharatbhai Patel, Pronaya Bhattacharya

, Sudeep Tanwar
, Neeraj Kumar
:
KiRTi: A Blockchain-Based Credit Recommender System for Financial Institutions. 1044-1054 - Yuntao Wang

, Zhou Su
, Ning Zhang
, Abderrahim Benslimane
:
Learning in the Air: Secure Federated Learning for UAV-Assisted Crowdsensing. 1055-1069 - Zheyi Chen, Pu Tian

, Weixian Liao
, Wei Yu
:
Zero Knowledge Clustering Based Adversarial Mitigation in Heterogeneous Federated Learning. 1070-1083 - Hongwei Yang

, Hui He, Weizhe Zhang
, Xiaochun Cao
:
FedSteg: A Federated Transfer Learning Framework for Secure Image Steganalysis. 1084-1094 - Peiying Zhang

, Chao Wang, Chunxiao Jiang
, Abderrahim Benslimane
:
Security-Aware Virtual Network Embedding Algorithm Based on Reinforcement Learning. 1095-1105 - Xinyu Yin, Xiaojie Fang

, Ning Zhang
, Peng Yang
, Xuejun Sha
, Jinghui Qiu:
Online Learning Aided Adaptive Multiple Attribute-Based Physical Layer Authentication in Dynamic Environments. 1106-1116 - Yulei Wu, Zheng Yan, Ruppa K. Thulasiram, Mohammed Atiquzzaman

:
Guest Editorial Introduction to the Special Section on Blockchain in Future Networks and Vertical Industries. 1117-1119 - Abbas Yazdinejad, Reza M. Parizi

, Ali Dehghantanha
, Kim-Kwang Raymond Choo
:
Blockchain-Enabled Authentication Handover With Efficient Privacy Protection in SDN-Based 5G Networks. 1120-1132 - Wei Wang

, Jingjing Song
, Guangquan Xu
, Yidong Li
, Hao Wang
, Chunhua Su
:
ContractWard: Automated Vulnerability Detection Models for Ethereum Smart Contracts. 1133-1144 - Lianyong Qi

, Xiaokang Wang
, Xiaolong Xu
, Wanchun Dou
, Shancang Li
:
Privacy-Aware Cross-Platform Service Recommendation Based on Enhanced Locality-Sensitive Hashing. 1145-1153 - Li-e Wang

, Yan Bai
, Quan Jiang, Victor C. M. Leung
, Wei Cai
, Xianxian Li
:
Beh-Raft-Chain: A Behavior-Based Fast Blockchain Protocol for Complex Networks. 1154-1166 - Shuming Seng

, Changqing Luo
, Xi Li
, Heli Zhang
, Hong Ji
:
User Matching on Blockchain for Computation Offloading in Ultra-Dense Wireless Networks. 1167-1177 - Hao Yin

, Zijian Zhang
, Liehuang Zhu
, Meng Li
, Xiaojiang Du
, Mohsen Guizani
, Bakh Khoussainov:
A Blockchain-Based Storage System With Financial Incentives for Load-balancing. 1178-1188 - Siming Wang

, Dongdong Ye
, Xumin Huang
, Rong Yu
, Yongjian Wang, Yan Zhang
:
Consortium Blockchain for Secure Resource Sharing in Vehicular Edge Computing: A Contract-Based Approach. 1189-1201 - Yang Xu

, Cheng Zhang
, Quanrun Zeng, Guojun Wang
, Ju Ren
, Yaoxue Zhang
:
Blockchain-Enabled Accountability Mechanism Against Information Leakage in Vertical Industry Services. 1202-1213 - Mohamed Baza, Noureddine Lasla, Mohamed M. E. A. Mahmoud, Gautam Srivastava, Mohamed Abdallah:

B-Ride: Ride Sharing With Privacy-Preservation, Trust and Fair Payment Atop Public Blockchain. 1214-1229 - Yan Wu, Fang Tao, Lu Liu

, Jiayan Gu, John Panneerselvam
, Rongbo Zhu
, Mohammad Nasir Shahzad
:
A Bitcoin Transaction Network Analytic Method for Future Blockchain Forensic Investigation. 1230-1241 - Pronaya Bhattacharya

, Sudeep Tanwar
, Umesh Bodkhe, Sudhanshu Tyagi, Neeraj Kumar
:
BinDaaS: Blockchain-Based Deep-Learning as-a-Service in Healthcare 4.0 Applications. 1242-1255 - Andrea Tagarelli, Sabrina Gaito, Roberto Interdonato, Tsuyoshi Murata, Alessandra Sala, My T. Thai:

Guest Editorial Introduction to the Special Section on Reloading Feature-Rich Information Networks. 1256-1258 - Nathaniel Hudson

, Hana Khamfroush
:
Behavioral Information Diffusion for Opinion Maximization in Online Social Networks. 1259-1268 - Konstantinos Tsitseklis

, Maria Krommyda
, Vasileios Karyotis
, Verena Kantere, Symeon Papavassiliou
:
Scalable Community Detection for Complex Data Graphs via Hyperbolic Network Embedding and Graph Databases. 1269-1282 - Giorgia Minello

, Luca Rossi
, Andrea Torsello:
k-Anonymity on Graphs Using the Szemerédi Regularity Lemma. 1283-1292 - Cheng-Lung Chen

, Qipeng P. Zheng
, Alexander Veremyev
, Eduardo L. Pasiliao
, Vladimir Boginski
:
Failure Mitigation and Restoration in Interdependent Networks via Mixed-Integer Optimization. 1293-1304 - Çiçek Güven, Dietmar Seipel, Martin Atzmueller

:
Applying ASP for Knowledge-Based Link Prediction With Explanation Generation in Feature-Rich Networks. 1305-1315 - Su Gao

, Zhigeng Fang:
Multilayer Feature-Rich Satellite Network Analysis: An Application-Oriented and Time-Evolving Approach. 1316-1327 - Ilaria Bordino, Francesco Gullo

, Giacomo Legnaro:
Advancing Receivable Financing via a Network-Based Approach. 1328-1337 - Jon Crowcroft

, Damiano Di Francesco Maesa
, Alessandro Magrini
, Andrea Marino, Laura Ricci
:
Leveraging the Users Graph and Trustful Transactions for the Analysis of Bitcoin Price. 1338-1352 - Huazhong Liu

, Laurence T. Yang
, Tong Yao, Jihong Ding
, Anyuan Deng
:
Tensor-Train-Based Higher Order Dominant Z-Eigen Decomposition for Multi-Modal Prediction and Its Cloud/Edge Implementation. 1353-1366 - Jacob D. Moorman

, Thomas K. Tu
, Qinyi Chen
, Xie He
, Andrea L. Bertozzi
:
Subgraph Matching on Multiplex Networks. 1367-1384 - Youqi Li

, Fan Li
, Song Yang
, Pan Zhou
, Liehuang Zhu
, Yu Wang
:
Three-Stage Stackelberg Long-Term Incentive Mechanism and Monetization for Mobile Crowdsensing: An Online Learning Approach. 1385-1398 - Kun Xie

, Shuyu Pei, Xin Wang
, Wen Shi, Gaogang Xie
, Kenli Li
, Yanbiao Li, Jigang Wen:
A Stateful Bloom Filter for Per-Flow State Monitoring. 1399-1413 - Yuqiang Luo

, Zidong Wang
, Yun Chen
, Xiao-jian Yi
:
$H_{\infty }$ State Estimation for Coupled Stochastic Complex Networks With Periodical Communication Protocol and Intermittent Nonlinearity Switching. 1414-1425 - Krzysztof Turowski, Jithin K. Sreedharan

, Wojciech Szpankowski:
Temporal Ordered Clustering in Dynamic Networks: Unsupervised and Semi-Supervised Learning Algorithms. 1426-1442 - Huaying Wu, Luoyi Fu

, Huan Long, Guie Meng, Xiaoying Gan
, Yuanhao Wu, Haisong Zhang, Xinbing Wang
:
Unraveling the Detectability of Stochastic Block Model With Overlapping Communities. 1443-1455 - Abdul Rehman Javed

, Saif ur Rehman
, Mohib Ullah Khan
, Mamoun Alazab
, Thippa Reddy Gadekallu
:
CANintelliIDS: Detecting In-Vehicle Intrusion Attacks on a Controller Area Network Using CNN and Attention-Based GRU. 1456-1466 - Rajorshi Biswas

, Jie Wu
:
Traffic Engineering to Minimize the Number of Rules in SDN Datacenters. 1467-1477 - Mingcheng He, Cunqing Hua

, Wenchao Xu
, Pengwenlong Gu
, Xuemin Sherman Shen
:
Delay Optimal Concurrent Transmissions With Raptor Codes in Dual Connectivity Networks. 1478-1491 - Zhirong Shen

, Changle Wu, Lin Wang
, Guanglin Zhang
:
Real-Time Energy Management for Microgrid With EV Station and CHP Generation. 1492-1501 - Liping Zhang

, Zhen Wei, Wei Ren
, Xianghan Zheng, Kim-Kwang Raymond Choo
, Neal N. Xiong
:
SIP: An Efficient and Secure Information Propagation Scheme in E-Health Networks. 1502-1516 - Saber Jafarizadeh

, Darryl Veitch
, Farzad Tofigh, Justin Lipman
, Mehran Abolhasan
:
Optimal Synchronizability in Networks of Coupled Systems: Topological View. 1517-1530 - Duxin Chen

, Xiaolu Liu
, Wenwu Yu, Lei Zhu
, Qipeng Tang
:
Neural-Network Based Adaptive Self-Triggered Consensus of Nonlinear Multi-Agent Systems With Sensor Saturation. 1531-1541 - Bo Yin

, Jun Lu, Xuetao Wei
:
Correlation-Based Task Processing Plans in Crowdsensing Platforms. 1542-1556 - Lei Zhang

, Yutong Liu, Fan Cheng, Jianfeng Qiu, Xingyi Zhang
:
A Local-Global Influence Indicator Based Constrained Evolutionary Algorithm for Budgeted Influence Maximization in Social Networks. 1557-1570 - Shen Yan

, Zhou Gu
, Ju H. Park
:
Memory-Event-Triggered $H_{\infty }$ Load Frequency Control of Multi-Area Power Systems With Cyber-Attacks and Communication Delays. 1571-1583 - Xin Cong, Lingling Zi

, Ding-Zhu Du:
DTNB: A Blockchain Transaction Framework With Discrete Token Negotiation for the Delay Tolerant Network. 1584-1599 - Guangmo Tong

, Ruiqi Wang, Zheng Dong
:
On Multi-Cascade Influence Maximization: Model, Hardness and Algorithmic Framework. 1600-1613 - Neda Zarayeneh

, Ananth Kalyanaraman
:
Delta-Screening: A Fast and Efficient Technique to Update Communities in Dynamic Graphs. 1614-1629 - Zhenzhen Hu, Fanzi Zeng, Zhu Xiao

, Bin Fu, Hongbo Jiang
, Hongyang Chen
:
Computation Efficiency Maximization and QoE-Provisioning in UAV-Enabled MEC Communication Systems. 1630-1645 - Can Chen

, Amit Surana, Anthony M. Bloch
, Indika Rajapakse
:
Controllability of Hypergraphs. 1646-1657 - Haiyang Yu

, Qi Hu, Zhen Yang
, Huan Liu
:
Efficient Continuous Big Data Integrity Checking for Decentralized Storage. 1658-1673 - Zecheng Li, Shang Gao

, Zhe Peng
, Songtao Guo
, Yuanyuan Yang
, Bin Xiao
:
B-DNS: A Secure and Efficient DNS Based on the Blockchain Technology. 1674-1686 - Ehsan Tohidi

, Saeedeh Parsaeefard
, Mohammad Ali Maddah-Ali, Babak Hossein Khalaj
, Alberto Leon-Garcia
:
Near-Optimal Robust Virtual Controller Placement in 5G Software Defined Networks. 1687-1697 - Abba Garba, Zhong Chen, Zhi Guan, Gautam Srivastava

:
LightLedger: A Novel Blockchain-Based Domain Certificate Authentication and Validation Scheme. 1698-1710 - Renato Vizuete

, Federica Garin
, Paolo Frasca
:
The Laplacian Spectrum of Large Graphs Sampled From Graphons. 1711-1721 - Aleksandar Haber

:
Joint Sensor Node Selection and State Estimation for Nonlinear Networks and Systems. 1722-1732 - Yanan Zhu

, Guanghui Wen
, Wenwu Yu
, Xinghuo Yu
:
Continuous-Time Distributed Proximal Gradient Algorithms for Nonsmooth Resource Allocation Over General Digraphs. 1733-1744 - Cho-Chun Chiu

, Ting He
:
Stealthy DGoS Attack Against Network Tomography: The Role of Active Measurements. 1745-1758 - Walid Ahmad

, Mason A. Porter
, Mariano Beguerisse-Díaz
:
Tie-Decay Networks in Continuous Time and Eigenvector-Based Centralities. 1759-1771 - Davide Cecchinato

, Tomaso Erseghe
, Michele Rossi
:
Elastic and Predictive Allocation of Computing Tasks in Energy Harvesting IoT Edge Networks. 1772-1788 - Qisheng Huang

, Yunjian Xu
, Costas Courcoubetis
:
Strategic Storage Operation in Wholesale Electricity Markets: A Networked Cournot Game Analysis. 1789-1801 - Yubin Duan

, Ning Wang
, Jie Wu
:
Minimizing Training Time of Distributed Machine Learning by Reducing Data Communication. 1802-1814 - Benyun Shi

, Jianan Zhong
, Hongjun Qiu
, Qing Bao
, Kai Liu, Jiming Liu
:
Hybrid Embedding via Cross-Layer Random Walks on Multiplex Networks. 1815-1827 - Bo Liu, Xixi Shen, Licheng Wu

, Housheng Su
:
Observability of Heterogeneous Multi-Agent Systems. 1828-1841 - Jinsong Gui

, Xiangwen Dai, Neal N. Xiong
:
Design and Analysis of Network Behaviors for Optimizing Network Energy Efficiency in 5G Mmwave Systems. 1842-1861 - Xianhao Chen

, Guangyu Zhu, Lan Zhang
, Yuguang Fang
, Linke Guo
, Xinguang Chen:
Age-Stratified COVID-19 Spread Analysis and Vaccination: A Multitype Random Network Approach. 1862-1872 - Jing Wu

, Juzhen Wang
, Qimei Chen
, Zenghui Yuan, Pan Zhou
, Xiumin Wang
, Cai Fu:
Resource Allocation for Delay-Sensitive Vehicle-to-Multi-Edges (V2Es) Communications in Vehicular Networks: A Multi-Agent Deep Reinforcement Learning Approach. 1873-1886 - Jun-Yi Li

, Zidong Wang
, Renquan Lu
, Yong Xu
:
Partial-Nodes-Based State Estimation for Complex Networks With Constrained Bit Rate. 1887-1899 - Xiaoheng Deng

, Peiyuan Guan
, Cong Hei, Feng Li, Jianqing Liu
, Naixue Xiong
:
An Intelligent Resource Allocation Scheme in Energy Harvesting Cognitive Wireless Sensor Networks. 1900-1912 - Li-Ning Liu, Guang-Hong Yang

:
Distributed Optimal Economic Environmental Dispatch for Microgrids Over Time-Varying Directed Communication Graph. 1913-1924 - Pan Lai

, Lingjie Duan
, Xiaojun Lin
:
Learning Large Electrical Loads via Flexible Contracts With Commitment. 1925-1940 - Xiang-Gui Guo

, Pei-Ming Liu
, Jian-Liang Wang
, Choon Ki Ahn
:
Event-Triggered Adaptive Fault-Tolerant Pinning Control for Cluster Consensus of Heterogeneous Nonlinear Multi-Agent Systems Under Aperiodic DoS Attacks. 1941-1956 - Mohammad Esmaeili

, Hussein Metwaly Saad
, Aria Nosratinia
:
Semidefinite Programming for Community Detection With Side Information. 1957-1973 - Jiajun Zhou

, Jie Shen, Shanqing Yu
, Guanrong Chen
, Qi Xuan
:
Corrections to "M-Evolve: Structural-Mapping-Based Data Augmentation for Graph Classification". 1974
Volume 8, Number 3, July - September 2021
- Jiming Chen, Enrico Natalizio

, Hideaki Ishii, Rongxing Lu, Sangheon Pack:
Introduction to the Special Section on Security and Privacy of Smart Network Systems. 1975-1977 - Amir Amini

, Amir Asif
, Arash Mohammadi
, Ali Azarbahram
:
Sampled-Data Dynamic Event-Triggering Control for Networked Systems Subject to DoS Attacks. 1978-1990 - Mohammad Pirani

, Ehsan Nekouei
, Henrik Sandberg
, Karl Henrik Johansson
:
A Graph-Theoretic Equilibrium Analysis of Attacker-Defender Game on Consensus Dynamics Under $\mathcal {H}_2$ Performance Metric. 1991-2000 - Lu-Xing Yang

, Kaifan Huang
, Xiaofan Yang
, Yushu Zhang
, Yong Xiang
, Yuan Yan Tang:
Defense Against Advanced Persistent Threat Through Data Backup and Recovery. 2001-2013 - Mingjing Sun

, Chengcheng Zhao
, Jianping He
, Peng Cheng
, Daniel E. Quevedo
:
Privacy-Preserving Correlated Data Publication: Privacy Analysis and Optimal Noise Design. 2014-2024 - Qi Xia

, Zeyi Tao
, Qun Li
:
Defenses Against Byzantine Attacks in Distributed Deep Neural Networks. 2025-2035 - Wen Yang

, Weijie Luo, Xinting Zhang:
Distributed Secure State Estimation Under Stochastic Linear Attacks. 2036-2047 - Biwen Chen, Debiao He

, Neeraj Kumar
, Huaqun Wang
, Kim-Kwang Raymond Choo
:
A Blockchain-Based Proxy Re-Encryption With Equality Test for Vehicular Communication Systems. 2048-2059 - Luis Puche Rondon

, Leonardo Babun
, Kemal Akkaya, A. Selcuk Uluagac
:
HDMI-Watch: Smart Intrusion Detection System Against HDMI Attacks. 2060-2072 - Xinghua Li

, Yanbing Ren
, Laurence T. Yang
, Ning Zhang
, Bin Luo
, Jian Weng
, Ximeng Liu
:
Perturbation-Hidden: Enhancement of Vehicular Privacy for Location-Based Services in Internet of Vehicles. 2073-2086 - Shaobo Huang, Anfeng Liu, Shaobo Zhang, Tian Wang, Neal N. Xiong:

BD-VTE: A Novel Baseline Data Based Verifiable Trust Evaluation Scheme for Smart Network Systems. 2087-2105 - Chunming Zhang

, Fengji Luo
, Mingyang Sun, Gianluca Ranzi
:
Modeling and Defending Advanced Metering Infrastructure Subjected to Distributed Denial-of-Service Attacks. 2106-2117 - Dongxiao Liu

, Cheng Huang, Jianbing Ni
, Xiaodong Lin
, Xuemin Shen
:
Blockchain-Based Smart Advertising Network With Privacy-Preserving Accountability. 2118-2130 - Taotao Wang

, Chonghe Zhao, Qing Yang, Shengli Zhang
, Soung Chang Liew
:
Ethna: Analyzing the Underlying Peer-to-Peer Network of Ethereum Blockchain. 2131-2146 - PeiYun Zhang, MengChu Zhou

, Qixi Zhao, Abdullah Abusorrah
, Omaimah Omar Bamasag
:
A Performance-Optimized Consensus Mechanism for Consortium Blockchains Consisting of Trust-Varying Nodes. 2147-2159 - Jing Zhang

, Jianquan Lu
, Mengping Xing
, Jinling Liang
:
Synchronization of Finite Field Networks With Switching Multiple Communication Channels. 2160-2169 - Yi-Jheng Lin

, Che-Hao Yu
, Tzu-Hsuan Liu, Cheng-Shang Chang
, Wen-Tsuen Chen
:
Positively Correlated Samples Save Pooled Testing Costs. 2170-2182 - Wei Jiang, Wanchun Jiang

, Jianxin Wang, Jianliang Gao
, Neal N. Xiong
:
ORP: An Online Rule Placement Scheme to Optimize the Traffic Overhead for Data Center Networks. 2183-2197 - Habib Mostafaei

, Davinder Kumar, Gabriele Lospoto, Marco Chiesa
, Giuseppe Di Battista:
DeSI: A Decentralized Software-Defined Network Architecture for Internet Exchange Points. 2198-2212 - Shiqian Li, Wei Li

, Shiping Wen
, Kaibo Shi
, Yin Yang
, Pan Zhou
, Tingwen Huang
:
Auto-FERNet: A Facial Expression Recognition Network With Architecture Search. 2213-2222 - Arnau Rovira-Sugranes

, Fatemeh Afghah
, Junsuo Qu
, Abolfazl Razi
:
Fully-Echoed Q-Routing With Simulated Annealing Inference for Flying Adhoc Networks. 2223-2234 - Ka-Cheong Leung

, Chengdi Lai, Huiyi Ding:
Leave No Cash on the Table: An Optimal Approach for Controlling Wireless TCP AIMD. 2235-2248 - Yaoming Zhou

, Siping Li
, Tanmoy Kundu, Xiwen Bai, Wei Qin:
The Impact of Network Topology on Air Transportation Robustness to Pandemics. 2249-2261 - Ashish R. Hota

, Jaydeep Godbole, Philip E. Paré
:
A Closed-Loop Framework for Inference, Prediction, and Control of SIR Epidemics on Networks. 2262-2278 - Mengsi Cai

, Ge Huang, Mirjam E. Kretzschmar
, Xiaohong Chen, Xin Lu
:
Extremely Low Reciprocity and Strong Homophily in the World Largest MSM Social Network. 2279-2287 - Xiaoling Ling

, Jie Gong
, Rui Li
, Shuai Yu
, Qian Ma
, Xu Chen
:
Dynamic Age Minimization With Real-Time Information Preprocessing for Edge-Assisted IoT Devices With Energy Harvesting. 2288-2300 - Guangcheng Li

, Qinglin Zhao
, Yu Wang
, Tie Qiu
, Kan Xie
, Li Feng
:
A Blockchain-Based Decentralized Framework for Fair Data Processing. 2301-2315 - Minseo Kim

:
Visualization of Dynamic Network Evolution With Quantification of Node Attributes. 2316-2325 - Prabhat Kumar

, Randhir Kumar
, Gautam Srivastava
, Govind P. Gupta, Rakesh Tripathi
, Thippa Reddy Gadekallu
, Neal N. Xiong
:
PPSF: A Privacy-Preserving and Secure Framework Using Blockchain-Based Machine-Learning for IoT-Driven Smart Cities. 2326-2341 - Junjie Fu

, Yuezu Lv
, Guanghui Wen
, Xinghuo Yu
:
Local Measurement Based Formation Navigation of Nonholonomic Robots With Globally Bounded Inputs and Collision Avoidance. 2342-2354 - Ramya Burra

, Chandramani Singh, Joy Kuri
:
Service Scheduling for Random Requests With Deadlines and Linear Waiting Costs. 2355-2371 - Juan Sebastian Borrero

, Majid Akhgar
, Pavlo A. Krokhmal:
A Scalable Markov Chain Framework for Influence Maximization in Arbitrary Networks. 2372-2387 - Hengnian Qi

, Xiaoping Wu
, Naixue Xiong
, Xuefeng Zhu:
A Source Prediction System for Dynamic Networks Based on TDOA Measurements. 2388-2401 - Rohit Singh

, Deepak Saluja
, Suman Kumar
:
Graph Based Training Resource Allocation Scheme for CoMP Transmission in CRAN: A Low Complexity Solution. 2402-2411 - JoonYoung Lee

, Geon-Hwan Kim
, Ashok Kumar Das
, YoungHo Park
:
Secure and Efficient Honey List-Based Authentication Protocol for Vehicular Ad Hoc Networks. 2412-2425 - Zongsheng Zheng

, Yijun Xu
, Lamine Mili
, Zhigang Liu
, Long Peng
, Yuhong Wang:
Derivative-Free Observability Analysis of a Stochastic Dynamical System. 2426-2437 - Baoqian Wang, Junfei Xie

, Kejie Lu
, Yan Wan
, Shengli Fu:
On Batch-Processing Based Coded Computing for Heterogeneous Distributed Computing Systems. 2438-2454 - Dan Liu, Zidong Wang

, Yurong Liu
, Fawaz E. Alsaadi
, Fuad E. Alsaadi
:
Recursive State Estimation for Stochastic Complex Networks Under Round-Robin Communication Protocol: Handling Packet Disorders. 2455-2468 - Haiyang Yu

, Yang Yang
, Haoyang Zhang
, Runkun Liu
, Yilong Ren
:
Reputation-Based Reverse Combination Auction Incentive Method to Encourage Vehicles to Participate in the VCS System. 2469-2481 - Kshitij Bhatta

, Majeed M. Hayat
, Francesco Sorrentino
:
Modal Decomposition of the Linear Swing Equation in Networks With Symmetries. 2482-2494 - Lamine Mili

, Jaber Valinejad
, Yijun Xu
:
Alleviating Fractal and Ill-Conditioning Problems of the AC Power Flow Using a Polynomial Form. 2495-2505 - Xin Wang

, Ju H. Park
, Huilan Yang:
An Improved Protocol to Consensus of Delayed MASs With UNMS and Aperiodic DoS Cyber-Attacks. 2506-2516 - Yujuan Han

, Wenlian Lu
, Shouhuai Xu
:
Preventive and Reactive Cyber Defense Dynamics With Ergodic Time-Dependent Parameters is Globally Attractive. 2517-2532 - Xin Jin, Zhengxin Wang

, Xiaojie Chen
, Yang Cao, Guo-Ping Jiang
:
Stochastic Synchronization of Multiplex Networks With Continuous and Impulsive Couplings. 2533-2544 - Keke Huang

, Zili Xiang, Wenfeng Deng
, Chunhua Yang
, Zhen Wang
:
False Data Injection Attacks Detection in Smart Grid: A Structural Sparse Matrix Separation Method. 2545-2558 - Darshana Upadhyay

, Jaume Manero
, Marzia Zaman
, Srinivas Sampalli
:
Intrusion Detection in SCADA Based Power Grids: Recursive Feature Elimination Model With Majority Vote Ensemble Algorithm. 2559-2574 - Xiaofeng Ding, Shujun Sheng, Jing Liu, Pan Zhou:

Efficient Probabilistic K-NN Computation in Uncertain Sensor Networks. 2575-2587 - Tianyu Liu

, Boya Di
, Peng An, Lingyang Song
:
Privacy-Preserving Incentive Mechanism Design for Federated Cloud-Edge Learning. 2588-2600 - Juntao Chen

, Corinne Touati
, Quanyan Zhu
:
A Dynamic Game Approach to Designing Secure Interdependent IoT-Enabled Infrastructure Network. 2601-2612 - Chuang Liu

, Shimin Yu, Ying Huang
, Zi-Ke Zhang
:
Effective Model Integration Algorithm for Improving Link and Sign Prediction in Complex Networks. 2613-2624 - Ying Lin

, Junji Ma, Bingjing Huang, Jinbo Zhang
, Yining Zhang, Zhengjia Dai:
Predicting Human Intrinsic Functional Connectivity From Structural Connectivity: An Artificial Neural Network Approach. 2625-2638 - Rui Hou

, Shuo Zhou, Yong Zheng, Mianxiong Dong
, Kaoru Ota
, Deze Zeng
, Jiangtao Luo
, Maode Ma
:
Cluster Routing-Based Data Packet Backhaul Prediction Method in Vehicular Named Data Networking. 2639-2650 - Bowen Wang

, Yanjing Sun
, Tan Do-Duy
, Emiliano Garcia-Palacios
, Trung Q. Duong
:
Adaptive $ D$-Hop Connected Dominating Set in Highly Dynamic Flying Ad-Hoc Networks. 2651-2664 - Shanchen Pang

, Xuliang Li
, Neal N. Xiong
, Min Wang
, Sibo Qiao
:
Optimal Target User Selection Policy for D2D Wireless Caching Networks. 2665-2678 - Ping Zhao

, Hongbo Jiang
, Jie Li
, Zhu Xiao
, Daibo Liu
, Ju Ren
, Deke Guo
:
Garbage In, Garbage Out: Poisoning Attacks Disguised With Plausible Mobility in Data Aggregation. 2679-2693 - Yujie Li

, Zhoujin Tang, Zhijian Lin, Yanfei Gong
, Xiaojiang Du
, Mohsen Guizani
:
Reinforcement Learning Power Control Algorithm Based on Graph Signal Processing for Ultra-Dense Mobile Networks. 2694-2705 - Lihua Yin

, Jiyuan Feng, Hao Xun, Zhe Sun
, Xiaochun Cheng
:
A Privacy-Preserving Federated Learning for Multiparty Data Sharing in Social IoTs. 2706-2718
Volume 8, Number 4, October - December 2021
- Liang Zhao

, Neeraj Kumar
, Celimuge Wu
, Jia Hu
, Ahmed Al-Dubai
:
Guest Editorial: Introduction to the Special Section on Intelligence-Empowered Collaboration Among Space, Air, Ground, and Sea Mobile Networks Towards B5G. 2719-2721 - Pallav Kumar Deb

, Anandarup Mukherjee
, Sudip Misra
:
XiA: Send-It-Anyway Q-Routing for 6G-Enabled UAV-LEO Communications. 2722-2731 - Long Chen

, Feilong Tang
, Xu Li, Laurence T. Yang
, Lijun Cao, Jiadi Yu
, Luoyi Fu, Zhetao Li
, Linghe Kong
:
Dynamical Control Domain Division for Software-Defined Satellite-Ground Integrated Vehicular Networks. 2732-2741 - Muhammad Karam Shehzad

, Arsalan Ahmad
, Syed Ali Hassan
, Haejoon Jung
:
Backhaul-Aware Intelligent Positioning of UAVs and Association of Terrestrial Base Stations for Fronthaul Connectivity. 2742-2755 - Bin Cao

, Meng Li, Xin Liu, Jianwei Zhao
, Wenxi Cao, Zhihan Lv
:
Many-Objective Deployment Optimization for a Drone-Assisted Camera Network. 2756-2764 - Navuday Sharma

, Atul Kumar
, Haris Pervaiz
, Maurizio Magarini
, Leila Musavian
, Muhammad Mahtab Alam
, Anish Jindal
, Muhammad Ali Imran
:
Aerial Base Station Assisted Cellular Communication: Performance and Trade-Off. 2765-2779 - Shuming Seng

, Guang Yang, Xi Li
, Hong Ji
, Changqing Luo
:
Energy-Efficient Communications in Unmanned Aerial Relaying Systems. 2780-2791 - Gunasekaran Manogaran, Ching-Hsien Hsu

, P. Mohamed Shakeel, Mamoun Alazab
:
Non-Recurrent Classification Learning Model for Drone Assisted Vehicular Ad-Hoc Network Communication in Smart Cities. 2792-2800 - Jin Wang

, Caiyan Jin
, Qiang Tang
, Neal N. Xiong
, Gautam Srivastava
:
Intelligent Ubiquitous Network Accessibility for Wireless-Powered MEC in UAV-Assisted B5G. 2801-2813 - Xin Liu

, Biaojun Lai
, Linfeng Gou, Chuan Lin
, Mu Zhou
:
Joint Resource Optimization for UAV-Enabled Multichannel Internet of Things Based on Intelligent Fog Computing. 2814-2824 - Wang Miao

, Chunbo Luo, Geyong Min, Yang Mi, Haozhe Wang
:
Unlocking the Potential of 5G and Beyond Networks to Support Massive Access of Ground and Air Devices. 2825-2836 - Shaohua Wan

, Jinna Hu
, Chen Chen
, Alireza Jolfaei
, Shahid Mumtaz
, Qingqi Pei
:
Fair-Hierarchical Scheduling for Diversified Services in Space, Air and Ground for 6G-Dense Internet of Things. 2837-2848 - Xiaoding Wang

, Hui Lin
, Hongyan Zhang, Dejun Miao, QinYang Miao, Wenxin Liu:
Intelligent Drone-Assisted Fault Diagnosis for B5G-Enabled Space-Air-Ground-Space Networks. 2849-2860 - Xiaoyi Tao

, Kaoru Ota
, Mianxiong Dong
, Heng Qi
, Keqiu Li:
Congestion-Aware Scheduling for Software-Defined SAG Networks. 2861-2871 - Jiahao Liu

, Baokang Zhao
, Qin Xin
, Jinshu Su
, Wei Ou:
DRL-ER: An Intelligent Energy-Aware Routing Protocol With Guaranteed Delay Bounds in Satellite Mega-Constellations. 2872-2884 - Tianxi Ji

, Yifan Guo
, Qianlong Wang
, Xufei Wang
, Pan Li
:
ECONOMY: Point Clouds-Based Energy-Efficient Autonomous Navigation for UAVs. 2885-2896 - Jian Wang

, Yongxin Liu
, Shuteng Niu
, Houbing Song
:
Optimal Routing for Beamforming-Constrained Swarm UAS Networking. 2897-2908 - Jianqiang Li

, Shuqing Hu
, Qinjian Li, Jie Chen
, Victor C. M. Leung
, Houbing Song
:
Global Visual and Semantic Observations for Outdoor Robot Localization. 2909-2921 - Tongwei Zhang

, Guangjie Han
, Lei Yan
, Yan Peng
:
Fast Calculation of Underwater Acoustic Horizontal Range: A Guarantee for B5G Ocean Mobile Networks. 2922-2933 - Umar Draz

, Amjad Ali
, Muhammad Bilal
, Tariq Ali
, Muhammad Aksam Iftikhar, Alireza Jolfaei
, Doug Young Suh
:
Energy Efficient Proactive Routing Scheme for Enabling Reliable Communication in Underwater Internet of Things. 2934-2945 - Yang Xu

, Xiaodan Yan
, Yulei Wu
, Yupeng Hu
, Wei Liang
, Jixin Zhang
:
Hierarchical Bidirectional RNN for Safety-Enhanced B5G Heterogeneous Networks. 2946-2957 - Rajesh Gupta

, Arpit Shukla
, Sudeep Tanwar
:
BATS: A Blockchain and AI-Empowered Drone-Assisted Telesurgery System Towards 6G. 2958-2967 - Muna Al-Hawawreh

, Nour Moustafa
, Sahil Garg
, M. Shamim Hossain
:
Deep Learning-Enabled Threat Intelligence Scheme in the Internet of Things Networks. 2968-2981 - Jing Zhang, Jie Cui

, Hong Zhong
, Irina Bolodurina
, Lu Liu
:
Intelligent Drone-assisted Anonymous Authentication and Key Agreement for 5G/B5G Vehicular Ad-Hoc Networks. 2982-2994 - Xingwang Li

, Mengyan Huang
, Yuanwei Liu
, Varun G. Menon
, Anand Paul
, Zhiguo Ding
:
I/Q Imbalance Aware Nonlinear Wireless-Powered Relaying of B5G Networks: Security and Reliability Analysis. 2995-3008 - Weiqi Liu

, Liang Zhang
, Nirwan Ansari
:
Laser Charging Enabled DBS Placement for Downlink Communications. 3009-3018 - Jesús Arroyo

, Carey E. Priebe
, Vince Lyzinski:
Graph Matching Between Bipartite and Unipartite Networks: To Collapse, or Not to Collapse, That Is the Question. 3019-3033 - Jueyou Li, Chaojie Li

, Wenwu Yu, Xiaomei Zhu, Xinghuo Yu
:
Distributed Online Bandit Learning in Dynamic Environments Over Unbalanced Digraphs. 3034-3047 - Zuyuan Zhang

, Sridhar Radhakrishnan
, C. R. Subramanian, Kash Barker
, Andrés D. González:
Causal Node Failures and Computation of Giant and Small Components in Networks. 3048-3060 - Renjie Zhou

, Chen Liu
, Jian Wan
, Qing Fan
, Yongjian Ren
, Jilin Zhang
, Naixue Xiong
:
A Hybrid Neural Network Architecture to Predict Online Advertising Click-Through Rate Behaviors in Social Networks. 3061-3072 - Runkai Yang

, Xiaolin Chang
, Jelena V. Misic
, Vojislav B. Misic
, Hongyue Kang
:
On Selfholding Attack Impact on Imperfect PoW Blockchain Networks. 3073-3086 - Zhengyang Hu, Xiaopeng Li, Juan Wang, Chengyi Xia

, Zhen Wang
, Matjaz Perc
:
Adaptive Reputation Promotes Trust in Social Networks. 3087-3098 - Zhen-Hua Zhu

, Bin Hu
, Zhi-Hong Guan
, Ding-Xue Zhang, Xin-Ming Cheng:
Collective Behaviors of Discrete-Time Multi-Agent Systems Over Signed Digraphs. 3099-3112 - Rui Zhang

, Shaobo Zhang
, Tian Wang
, Neal N. Xiong
:
A Class of Differential Data Processing-Based Data Gathering Schemes in Internet of Things. 3113-3128 - Rutvij H. Jhaveri

, Sagar V. Ramani, Gautam Srivastava
, Thippa Reddy Gadekallu
, Vaneet Aggarwal
:
Fault-Resilience for Bandwidth Management in Industrial Software-Defined Networks. 3129-3139 - Hayato Shimada

, Yuichi Kawamoto
, Nei Kato
:
Novel Computation and Communication Resources Allocation Using Relay Communications in UAV-Mounted Cloudlet Systems. 3140-3151 - Tianchong Gao

, Feng Li
:
Differential Private Social Network Publication and Persistent Homology Preservation. 3152-3166 - Dong Ding

, Ze Tang
, Yan Wang
, Zhicheng Ji
, Ju H. Park
:
Secure Synchronization for Cyber-Physical Complex Networks Based on Self-Triggering Impulsive Control: Static and Dynamic Method. 3167-3178 - Shanchen Pang

, Nuanlai Wang
, Min Wang
, Sibo Qiao, Xue Zhai
, Neal N. Xiong
:
A Smart Network Resource Management System for High Mobility Edge Computing in 5G Internet of Vehicles. 3179-3191 - Dinh C. Nguyen

, Pubudu N. Pathirana
, Ming Ding
, Aruna Seneviratne
:
Secure Computation Offloading in Blockchain Based IoT Networks With Deep Reinforcement Learning. 3192-3208 - Yang Lou

, Ruizi Wu
, Junli Li, Lin Wang
, Guanrong Chen
:
A Convolutional Neural Network Approach to Predicting Network Connectedness Robustness. 3209-3219 - Jie Gao

, Fei Hao
, Zheng Pei
, Geyong Min
:
Learning Concept Interestingness for Identifying Key Structures From Social Networks. 3220-3232 - Zhou Gu

, Peng Shi
, Dong Yue
, Shen Yan
, Xiangpeng Xie
:
Fault Estimation and Fault-Tolerant Control for Networked Systems Based on an Adaptive Memory-Based Event-Triggered Mechanism. 3233-3241 - Srinjoy Chattopadhyay

, Huaiyu Dai
, Do Young Eun:
Controlling Metastable Infection Patterns in Multilayer Networks via Interlink Design. 3242-3256 - Shengwei Lei

, Chunhe Xia
, Zhong Li, Xiaojian Li, Tianbo Wang
:
HNN: A Novel Model to Study the Intrusion Detection Based on Multi-Feature Correlation and Temporal-Spatial Analysis. 3257-3274 - Lun Hu

, Jun Zhang
, Xiangyu Pan, Xin Luo
, Huaqiang Yuan:
An Effective Link-Based Clustering Algorithm for Detecting Overlapping Protein Complexes in Protein-Protein Interaction Networks. 3275-3289 - Tianming Zhao

, Weisheng Si
, Wei Li
, Albert Y. Zomaya
:
Towards Minimizing the $R$ Metric for Measuring Network Robustness. 3290-3302 - Harir Seddiqi, Shahram Babaie

:
A New Protection-Based Approach for Link Failure Management of Software-Defined Networks. 3303-3312 - Xiaona Song

, Jingtao Man
, Choon Ki Ahn
, Shuai Song
:
Synchronization in Finite/Fixed Time for Markovian Complex-Valued Nonlinear Interconnected Neural Networks With Reaction-Diffusion Terms. 3313-3324 - Lei Shi

, Lulu Chen, Yuhua Cheng:
High-Order Bipartite Consensus for Multiagent Systems Over Signed Networks Subject to Asynchronous Communications. 3325-3334 - Juan Xia

, Shesheng Gao, Guo Li
, Xiaomin Qi
, Bingbing Gao
, Jiahao Zhang
:
Distributed H$\infty$-Constraint Robust Estimator for Multi-Sensor Networked Hybrid Uncertain Systems. 3335-3348 - Teng Long

, Shan Qu
, Qi Li, Huquan Kang, Luoyi Fu
, Xinbing Wang
, Chenghu Zhou:
Efficient Block Propagation in Wireless Blockchain Networks and Its Application in Bitcoin. 3349-3368 - Ying Zhang, Lei Ma

, Guoqing Wang
, Chunyu Yang
, Linna Zhou
, Wei Dai:
Observer-Based Control for the Two-Time-Scale Cyber-Physical Systems: The Dual-Scale DoS Attacks Case. 3369-3379 - Haifeng Dai

, Wang Li, Chunyu Yang
, Guanghui Wen
, Yongzheng Sun
:
Time and Energy Costs for Consensus of Multi-Agent Networks With Undirected and Directed Topologies. 3380-3391 - Sina Fathi Kazerooni

, Roberto Rojas-Cessa
:
Countering Machine-Learning Classification of Applications by Equalizing Network Traffic Statistics. 3392-3403 - Zhengcheng Dong

, Meng Tian
:
Modeling and Vulnerability Analysis of Spatially Embedded Heterogeneous Cyber-Physical Systems With Functional Dependency. 3404-3416 - Kaixin Tian, Zhenhong Guo, Jie Mei

, Chunjing Jiang, Guangfu Ma:
Leaderless Consensus for Second-Order Inertia Uncertain Multi-Agent Systems Under Directed Graphs Without Relative Velocity Information. 3417-3429 - Litao Ma

, Wei Bian
:
A Simple Neural Network for Sparse Optimization With $l_1$ Regularization. 3430-3442 - Housheng Su

, Liren Zhang
:
Model-Independent Containment Control for Dynamic Multiple Euler-Lagrange Systems With Disturbances and Uncertainties. 3443-3452 - Humberto Hayashi Sano

, Lilian Berton
:
A Temporal Event Graph Approach and Robustness Analysis for Air Transport Network. 3453-3464 - Mohammadreza Doostmohammadian

, Houman Zarrabi, Hamid R. Rabiee
, Usman A. Khan
, Themistoklis Charalambous
:
Distributed Detection and Mitigation of Biasing Attacks Over Multi-Agent Networks. 3465-3477 - Jinhuan Wang, Pengtao Chen

, Bin Ma, Jiajun Zhou
, Zhongyuan Ruan
, Guanrong Chen
, Qi Xuan
:
Sampling Subgraph Network With Application to Graph Classification. 3478-3490 - Yanzhi Wu

, Lu Liu
:
Distributed Average Tracking for Linear Heterogeneous Multi-Agent Systems With External Disturbances. 3491-3500 - Ashok Kumar

, Krishan Kumar
:
A Game Theory Based Hybrid NOMA for Efficient Resource Optimization in Cognitive Radio Networks. 3501-3514

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














