


default search action
IEEE Transactions on Network Science and Engineering, Volume 9
Volume 9, Number 1, January - February 2022
- Jianwei Huang:
Message From the Editor-in-Chief. 1-3 - Priyanthi M. Dassanayake
, Ashiq Anjum, Ali Kashif Bashir
, Joseph Bacon, Rabia Saleem, Warren Manning:
A Deep Learning Based Explainable Control System for Reconfigurable Networks of Edge Devices. 7-19 - Shudip Datta, Sanjay Kumar Madria
:
Prioritized Content Determination and Dissemination Using Reinforcement Learning in DTNs. 20-32 - Jianbo Du
, Wenjie Cheng, Guangyue Lu
, Haotong Cao
, Xiaoli Chu
, Zhicai Zhang
, Junxuan Wang
:
Resource Pricing and Allocation in MEC Enabled Blockchain Systems: An A3C Deep Reinforcement Learning Approach. 33-44 - Shahram Mollahasani, Melike Erol-Kantarci
, Mahdi Hirab, Hoda Dehghan, Rodney Wilson:
Actor-Critic Learning Based QoS-Aware Scheduler for Reconfigurable Wireless Networks. 45-54 - Naram Mhaisen, Alaa Awad Abdellatif, Amr Mohamed
, Aiman Erbad
, Mohsen Guizani
:
Optimal User-Edge Assignment in Hierarchical Federated Learning Based on Statistical Properties and Network Topology Constraints. 55-66 - Muhammad Ibrar
, Aamir Akbar
, Syed Rooh Ullah Jan
, Mian Ahmad Jan
, Lei Wang
, Houbing Song
, Nadir Shah
:
ARTNet: Ai-Based Resource Allocation and Task Offloading in a Reconfigurable Internet of Vehicular Networks. 67-77 - Dingde Jiang, Zhihao Wang
, Wenjuan Wang, Zhihan Lv
, Kim-Kwang Raymond Choo:
AI-Assisted Energy-Efficient and Intelligent Routing for Reconfigurable Wireless Networks. 78-88 - Anshu Thakur, Ashok Kumar, Nitin Gupta
, Puspita Chatterjee:
Secrecy Analysis of Reconfigurable Underlay Cognitive Radio Networks With SWIPT and Imperfect CSI. 89-97 - Xumin Huang
, Sahil Garg
, Jiangtian Nie
, Wei Yang Bryan Lim
, Yuanhang Qi, Yang Zhang
, M. Shamim Hossain
:
Toward Efficient Data Trading in AI Enabled Reconfigurable Wireless Sensor Network Using Contract and Game Theories. 98-108 - Shiping Wen
, Tingwen Huang
, Björn W. Schuller
, Ahmad Taher Azar
:
Guest Editorial: Introduction to the Special Section on Efficient Network Design for Convergence of Deep Learning and Edge Computing. 109-110 - Guanghui Wen, Jian Qin
, Xingquan Fu
, Wenwu Yu:
DLSTM: Distributed Long Short-Term Memory Neural Networks for the Internet of Things. 111-120 - Xiaojun Zhou
, Yuan Gao, Chaojie Li
, Zhaoke Huang
:
A Multiple Gradient Descent Design for Multi-Task Learning on Edge Computing: Multi-Objective Machine Learning Approach. 121-133 - Anis Koubaa
, Adel Ammar
, Anas Kanhouch
, Yasser AlHabashi
:
Cloud Versus Edge Deployment Strategies of Real-Time Face Recognition Inference. 143-160 - Lin Xu
, Xiangyong Cao
, Jing Yao
, Zheng Yan
:
Orthogonal Super Greedy Learning for Sparse Feedforward Neural Networks. 161-170 - Bin Xiao
, Fan Wu
, Francesco Chiti, Mohammad Hossein Manshaei, Giuseppe Ateniese
:
Guest Editorial: Introduction to the Special Section on Security and Privacy for AI Models and Applications. 171-172 - Zhe Peng
, Jianliang Xu
, Xiaowen Chu
, Shang Gao
, Yuan Yao
, Rong Gu
, Yuzhe Tang
:
VFChain: Enabling Verifiable and Auditable Federated Learning via Blockchain Systems. 173-186 - Qiao Zhang
, Chunsheng Xin
, Hongyi Wu:
SecureTrain: An Approximation-Free and Computationally Efficient Framework for Privacy-Preserved Neural Network Training. 187-202 - Jialin Guo, Anfeng Liu
, Kaoru Ota
, Mianxiong Dong
, Xiaoheng Deng
, Neal N. Xiong
:
ITCN: An Intelligent Trust Collaboration Network System in IoT. 203-218 - Xianyi Chen
, Zhentian Zhang, Anqi Qiu, Zhihua Xia
, Neal N. Xiong
:
Novel Coverless Steganography Method Based on Image Selection and StarGAN. 219-230 - Shigeng Zhang
, Shuxin Chen, Xuan Liu, Chengyao Hua, Weiping Wang
, Kai Chen
, Jian Zhang
, Jianxin Wang:
Detecting Adversarial Samples for Deep Learning Models: A Comparative Study. 231-244 - Yin Zhang
, Ala I. Al-Fuqaha
, Giancarlo Fortino
, Limei Peng, Iztok Humar
, Hua Wang
:
Guest Editorial: Introduction to the Special Section on Advanced Networking Technologies in the Battle Against the Outbreak of Epidemic Diseases. 245-246 - Miao Li
, Yixue Hao
, Yaxiong Ma
, Jincai Chen
, Long Hu
, Min Chen
, Kai Hwang, Zhongchun Liu:
Adjuvant Therapy System of COVID-19 Patient: Integrating Warning, Therapy, Post-Therapy Psychological Intervention. 247-257 - Zina Chkirbene
, Alaa Awad Abdellatif
, Amr Mohamed
, Aiman Erbad
, Mohsen Guizani
:
Deep Reinforcement Learning for Network Selection Over Heterogeneous Health Systems. 258-270 - Liang Tan
, Keping Yu
, Na Shi
, Caixia Yang
, Wei Wei
, Huimin Lu
:
Towards Secure and Privacy-Preserving Data Sharing for COVID-19 Medical Records: A Blockchain-Empowered Approach. 271-281 - Wenzhe Lv
, Sheng Wu
, Chunxiao Jiang
, Yuanhao Cui
, Xuesong Qiu
, Yan Zhang
:
Towards Large-Scale and Privacy-Preserving Contact Tracing in COVID-19 Pandemic: A Blockchain Perspective. 282-298 - Yingying Jiang
, Yujun Ma
, Jia Liu, Long Hu, Min Chen
, Iztok Humar
:
MER-WearNet: Medical-Emergency Response Wearable Networking Powered by UAV-Assisted Computing Offloading and WPT. 299-309 - Abdulsalam Yassine, M. Shamim Hossain
:
COVID-19 Networking Demand: An Auction-Based Mechanism for Automated Selection of Edge Computing Services. 308-318 - Wen Sun
, Ning Xu, Lu Wang
, Haibin Zhang
, Yan Zhang:
Dynamic Digital Twin and Federated Learning With Incentives for Air-Ground Networks. 321-333 - Zhaoquan Gu
, Le Wang
, Xiaolong Chen, Yunyi Tang, Xingang Wang, Xiaojiang Du
, Mohsen Guizani
, Zhihong Tian
:
Epidemic Risk Assessment by a Novel Communication Station Based Method. 332-344
Volume 9, Number 2, March - April 2022
- Wanjie Zhu
, Jinde Cao
, Xinli Shi, Leszek Rutkowski
:
Synchronization of Finite-Field Networks With Time Delays. 347-355 - Jinke Geng
, Yi Li
, Li Fang, Ping Chen:
VW-DBG: A Dynamically Evolving Bitcoin Transaction Network Model. 356-363 - Miaojiang Chen
, Anfeng Liu
, Wei Liu
, Kaoru Ota
, Mianxiong Dong
, Neal N. Xiong
:
RDRL: A Recurrent Deep Reinforcement Learning Scheme for Dynamic Spectrum Access in Reconfigurable Wireless Networks. 364-376 - Xinrui Ge
, Guofu Wei, Jia Yu
, Amit Kumar Singh
, Neal N. Xiong
:
An Intelligent Fuzzy Phrase Search Scheme Over Encrypted Network Data for IoT. 377-388 - Zhenyuan Guo
, Mengke Lian, Shiping Wen
, Tingwen Huang
:
An Adaptive Multi-Agent System With Duplex Control Laws for Distributed Resource Allocation. 389-400 - Naram Mhaisen, Mhd Saria Allahham
, Amr Mohamed
, Aiman Erbad
, Mohsen Guizani
:
On Designing Smart Agents for Service Provisioning in Blockchain-Powered Systems. 401-415 - Wei Ren
, Yan Sun
, Hong Luo
, Mohsen Guizani
:
A Demand-Driven Incremental Deployment Strategy for Edge Computing in IoT Network. 416-430 - Xiangli Jiang
, Guihua Xia
, Zhiguang Feng
, Zheng-Guang Wu
:
Nonfragile Formation Seeking of Unmanned Surface Vehicles: A Sliding Mode Control Approach. 431-444 - Jun Cheng
, Ju H. Park
, Zheng-Guang Wu
, Huaicheng Yan
:
Ultimate Boundedness Control for Networked Singularly Perturbed Systems With Deception Attacks: A Markovian Communication Protocol Approach. 445-456 - Yanhua Yang
, Wenfeng Hu
:
Containment Control of Double-Integrator Multi-Agent Systems With Time-Varying Delays. 457-466 - Yi-Jheng Lin
, Che-Hao Yu
, Tzu-Hsuan Liu, Cheng-Shang Chang
, Wen-Tsuen Chen
:
Constructions and Comparisons of Pooling Matrices for Pooled Testing of COVID-19. 467-480 - Xiang-Gui Guo
, Dongyu Zhang
, Jian-Liang Wang
, Ju H. Park
, Lei Guo
:
Event-Triggered Observer-Based $\mathcal {H}_\infty$ Consensus Control and Fault Detection of Multiagent Systems Under Stochastic False Data Injection Attacks. 481-494 - Lei Shi
, Yuhua Cheng, Jinliang Shao
, Xiaofan Wang
, Hanmin Sheng
:
Leader-Follower Opinion Dynamics of Signed Social Networks With Asynchronous Trust/Distrust Level Evolution. 495-509 - Lan Gao
, Shaojiang Deng, Huaqing Li
, Chaojie Li
:
An Event-Triggered Approach for Gradient Tracking in Consensus-Based Distributed Optimization. 510-523 - Lavanya Marla
, Lav R. Varshney
, Devavrat Shah
, Nirmal A. Prakash
, Michael E. Gale:
Short and Wide Network Paths. 524-537 - Mingshan Jia
, Bogdan Gabrys
, Katarzyna Musial
:
Measuring Quadrangle Formation in Complex Networks. 538-551 - Igor Tomovski
, Lasko Basnarkov
, Alajdin Abazi
:
Discrete-Time Non-Markovian SEIS Model on Complex Networks. 552-563 - Xin Gong
, Yukang Cui
, Jun Shen
, Junlin Xiong
, Tingwen Huang
:
Distributed Optimization in Prescribed-Time: Theory and Experiment. 564-576 - Jinyin Chen
, Dunjie Zhang, Zhaoyan Ming
, Kejie Huang
, Wenrong Jiang, Chen Cui:
GraphAttacker: A General Multi-Task Graph Attack Framework. 577-595 - Hao Yu
, Tarik Taleb
, Jiawei Zhang, Honggang Wang
:
Deterministic Latency Bounded Network Slice Deployment in IP-Over-WDM Based Metro-Aggregation Networks. 596-607 - Xi Qin
, Cheng Zhong
, Qingshan Yang:
An Influence Maximization Algorithm Based on Community-Topic Features for Dynamic Social Networks. 608-621 - Abubakr O. Al-Abbasi, Lutfi Samara
, Ahmed Kamal Sultan-Salem, Ridha Hamila
, Naofal Al-Dhahir
:
A Unified Framework for Differentiated Services in Intelligent Healthcare Systems. 622-633 - Xinrui Ji
, Jianquan Lu
, Bangxin Jiang
, Kaibo Shi
:
Distributed Synchronization of Delayed Neural Networks: Delay-Dependent Hybrid Impulsive Control. 634-647 - Yue Zhao
, Chunjie Zhou
, Yu-Chu Tian
, Yuanqing Qin
, Xiaoya Hu
:
$L_2$ Gain Secure Control of Cyber-Physical Systems Under Fast Time-Varying Cyber Attacks. 648-659 - Jiayan Liu
, Xiongwen Zhao
, Peng Qin
, Suiyan Geng, Sachula Meng:
Joint Dynamic Task Offloading and Resource Scheduling for WPT Enabled Space-Air-Ground Power Internet of Things. 660-677 - Fan Wang
, Zidong Wang
, Jinling Liang
, Carlos Silvestre
:
A Recursive Algorithm for Secure Filtering for Two-Dimensional State-Saturated Systems Under Network-Based Deception Attacks. 678-688 - Junyou Zhu
, Chunyu Wang
, Chao Gao
, Fan Zhang, Zhen Wang
, Xuelong Li:
Community Detection in Graph: An Embedding Method. 689-702 - Lijuan Xu
, Bailing Wang, Xiaoming Wu, Dawei Zhao
, Lei Zhang
, Zhen Wang
:
Detecting Semantic Attack in SCADA System: A Behavioral Model Based on Secondary Labeling of States-Duration Evolution Graph. 703-715 - Yichao Zhang
, Huangxin Zhuang
, Tiantian Liu, Bowei Chen
, Zhiwei Cao
, Yun Fu
, Zhijie Fan
, Guanrong Chen
:
A Bayesian Graph Embedding Model for Link-Based Classification Problems. 716-727 - Mayee F. Chen, Miklós Z. Rácz
:
An Adversarial Model of Network Disruption: Maximizing Disagreement and Polarization in Social Networks. 728-739 - Abhiram Singh
, Sidharth Sharma
, Ashwin Gumaste
, Jianping Wang
:
Grafnet: Using Graph Neural Networks to Create Table-Less Routers. 740-754 - Yinyan Liu
, Jing Qiu
, Junda Lu
, Wei Wang
, Jin Ma
:
A Single-to-Multi Network for Latency-Free Non-Intrusive Load Monitoring. 755-768 - Marsa Rayani
, Amin Ebrahimzadeh
, Roch H. Glitho
, Halima Elbiaze
:
Ensuring Profit and QoS When Dynamically Embedding Delay-Constrained ICN and IP Slices for Content Delivery. 769-782 - Bingyi Liu
, Dongxiao Deng, Wenbi Rao, Enshu Wang
, Shengwu Xiong
, Dongyao Jia
, Jianping Wang
, Chunming Qiao:
CPA-MAC: A Collision Prediction and Avoidance MAC for Safety Message Dissemination in MEC-Assisted VANETs. 783-794 - Guanglei Zhao
, Changchun Hua
:
Sampled-Data Leaderless and Leader-Following Consensus of Multiagent Systems Under Nonidentical Packet Losses. 795-806 - Zhengran Cao
, Chuandong Li
, Zhilong He
, Xiaoyu Zhang, Le You
:
Synchronization of Coupled Stochastic Reaction-Diffusion Neural Networks With Multiple Weights and Delays via Pinning Impulsive Control. 820-833 - Chenxi Liu
, Zhu Xiao
, Dong Wang
, Lei Wang, Hongbo Jiang
, Hongyang Chen
, Jiangxia Yu:
Exploiting Spatiotemporal Correlations of Arrive-Stay-Leave Behaviors for Private Car Flow Prediction. 834-847 - Ruohan Meng
, Qi Cui
, Zhili Zhou
, Zhetao Li
, Q. M. Jonathan Wu
, Xingming Sun
:
High-Capacity Steganography Using Object Addition-Based Cover Enhancement for Secure Communication in Networks. 848-862 - Roya Aliakbarisani
, Abdorasoul Ghasemi
, M. Ángeles Serrano
:
Perturbation of the Normalized Laplacian Matrix for the Prediction of Missing Links in Real Networks. 863-874 - Xin Shen
, Sarah Aliko
, Yue Han, Jeremy I. Skipper
, Chengbin Peng
:
Finding Core-Periphery Structures With Node Influences. 875-887 - Jingxuan Tan
, Xin Liao
, Jiate Liu, Yun Cao
, Hongbo Jiang:
Channel Attention Image Steganography With Generative Adversarial Networks. 888-903 - Weijian Pan, Zhaoji Deng, Xiumin Wang
, Pan Zhou
, Weiwei Wu
:
Optimizing the Age of Information for Multi-Source Information Update in Internet of Things. 904-917 - Huan Gao
, Yongqiang Wang
:
Algorithm-Level Confidentiality for Average Consensus on Time-Varying Directed Graphs. 918-931 - Kung-Jui Pai
, Jinn-Shyong Yang, Guan-Yu Chen, Jou-Ming Chang
:
Configuring Protection Routing via Completely Independent Spanning Trees in Dense Gaussian On-Chip Networks. 932-946 - Jiwei Tian
, Buhong Wang
, Jing Li, Zhen Wang
:
Adversarial Attacks and Defense for CNN Based Power Quality Recognition in Smart Grid. 807-819
Volume 9, Number 3, May - June 2022
- Ching-Hsien Hsu, Carlos Enrique Montenegro-Marín
, Rubén González Crespo
, Hassan Fouad Mohamed El-sayed:
Guest Editorial Introduction to the Special Section on Social Computing and Social Internet of Things. 947-949 - Haibo Yi
:
Secure Social Internet of Things Based on Post-Quantum Blockchain. 950-957 - Hassam Mughal, Muhammad Bilal
, Uttam Ghosh
, Gautam Srivastava
, Sayed Chhattan Shah
:
Efficient Allocation of Resource-Intensive Mobile Cyber-Physical Social System Applications on a Heterogeneous Mobile Ad Hoc Cloud. 958-969 - Xiaogang Zhu
, Sheng Wen
, Alireza Jolfaei
, Mohammad Sayad Haghighi
, Seyit Camtepe
, Yang Xiang
:
Vulnerability Detection in SIoT Applications: A Fuzzing Method on their Binaries. 970-979 - Yong Cui
, Xiao Song
, Jianwei Liu
, Kai Chen
, Guoqiang Shi, Junhua Zhou, Tamizharasi G. Seetharam
:
AACF - Accessible Application-Centric Framework for the Internet of Things Backhauled Smart City Applications. 980-989 - Feng Xia
, Shuo Yu
, Chengfei Liu
, Jianxin Li
, Ivan Lee
:
CHIEF: Clustering With Higher-Order Motifs in Big Networks. 990-1005 - Yuanman Li
, Rongqin Liang
, Wei Wei
, Wei Wang
, Jiantao Zhou
, Xia Li
:
Temporal Pyramid Network With Spatial-Temporal Attention for Pedestrian Trajectory Prediction. 1006-1019 - Yixuan Yang
, Fei Hao
, Beibei Pang, Geyong Min
, Yulei Wu
:
Dynamic Maximal Cliques Detection and Evolution Management in Social Internet of Things: A Formal Concept Analysis Approach. 1020-1032 - Guofeng Qin
, Shuo Yang, Sichang Li:
A Vehicle Path Tracking System With Cooperative Recognition of License Plates and Traffic Network Big Data. 1033-1043 - Fangfang Luo
, Genggeng Liu
, Wenzhong Guo
, Guolong Chen
, Naixue Xiong
:
ML-KELM: A Kernel Extreme Learning Machine Scheme for Multi-Label Classification of Real Time Data Stream in SIoT. 1044-1055 - Shenghao Liu
, Bang Wang
, Laurence T. Yang
, Philip S. Yu
:
HNF: Hybrid Neural Filtering Based on Centrality-Aware Random Walk for Personalized Recommendation. 1056-1066 - Zhiwei Guo
, Keping Yu
, Yu Li
, Gautam Srivastava
, Jerry Chun-Wei Lin
:
Deep Learning-Embedded Social Internet of Things for Ambiguity-Aware Social Recommendations. 1067-1081 - Gunasekaran Manogaran, Bharat S. Rawal
, Mamoun Alazab
:
Boosted Tree Classifier Algorithm Based Collaborative Computing Framework for Smart System. 1082-1090 - Kazuya Sakai
, Min-Te Sun
, Wei-Shinn Ku
, Jie Wu
:
Towards Wireless Power Transfer in Mobile Social Networks. 1091-1103 - Akhil Bhimaraju
, Avhishek Chatterjee
, Lav R. Varshney
:
Expected Extinction Times of Epidemics With State-Dependent Infectiousness. 1104-1116 - Qingnan Rong
, Jun Zhang
, Xiaoqian Sun
, Sebastian Wandelt
, Massimiliano Zanin
, Liang Tian:
Optimal Cost-Based Strengthening of Complex Networks. 1117-1127 - Nhu-Ngoc Dao
, Duc-Nghia Vu
, Anh-Tien Tran
, Trung V. Phan
, Schahram Dustdar
, Sungrae Cho
:
On System Stability in Multitier Roadside Computing Toward an Intelligent Transportation. 1128-1138 - Kazuki Nakajima
, Kazuyuki Shudo
, Naoki Masuda
:
Randomizing Hypergraphs Preserving Degree Correlation and Local Clustering. 1139-1153 - Yuwen Song
, Jinde Cao
, Leszek Rutkowski
:
A Fixed-Time Distributed Optimization Algorithm Based on Event-Triggered Strategy. 1154-1162 - Peihu Duan
, Yuezu Lv
, Zhisheng Duan
, Guanrong Chen
:
Distributed State Estimation for Uncertain Linear Systems With a Recursive Architecture. 1163-1174 - Zhongyi Zhao
, Zidong Wang
, Lei Zou
, Yun Chen
, Weiguo Sheng
:
Event-Triggered Set-Membership State Estimation for Complex Networks: A Zonotopes-Based Method. 1175-1186 - Qiufen Ni
, Jianxiong Guo
, Weili Wu
, Huan Wang
, Jigang Wu
:
Continuous Influence-Based Community Partition for Social Networks. 1187-1197 - Jin Xu
, I-Hong Hou
, Natarajan Gautam
:
Age of Information for Single Buffer Systems With Vacation Server. 1198-1214 - Li Zou
, Xiu-Xiu Zhan
, Jie Sun
, Alan Hanjalic
, Huijuan Wang
:
Temporal Network Prediction and Interpretation. 1215-1224 - Jiacheng Shang
, Jie Wu
:
Voice Liveness Detection for Voice Assistants Through Ear Canal Pressure Monitoring. 1225-1234 - Yongjie Xie, Li Pan
, Shengsong Yang, Shijun Liu
:
A Random Online Algorithm for Reselling Reserved IaaS Instances in Amazon's Cloud Marketplace. 1235-1244 - Ke Gu
, Xinying Dong
, Xiong Li
, Weijia Jia
:
Cluster-Based Malicious Node Detection for False Downstream Data in Fog Computing-Based VANETs. 1245-1263 - Karlo Griparic, Marsela Polic
, Marko Krizmancic
, Stjepan Bogdan
:
Consensus-Based Distributed Connectivity Control in Multi-Agent Systems. 1264-1281 - Yifan Zhuang
, Ziyuan Pu
, Jia Hu
, Yinhai Wang
:
Illumination and Temperature-Aware Multispectral Networks for Edge-Computing-Enabled Pedestrian Detection. 1282-1295 - Bo Liang
, Xiaofan Wang
, Lin Wang
:
Impact of Heterogeneity on Network Embedding. 1296-1307 - Junhao Peng
, Tengjie Chen, Guoai Xu
:
Optimizing the Trapping (Transport) Efficiency in Regular Branched Networks. 1308-1318 - Junkang Ni
, Yu Zhao
, Jinde Cao
, Weilin Li:
Fixed-Time Practical Consensus Tracking of Multi-Agent Systems With Communication Delay. 1319-1334 - Fei Ma
, Ping Wang
, Xudong Luo
:
Random Walks on Stochastic Generalized Vicsek Fractal Networks: Analytic Solution and Simulations. 1335-1345 - Seunghwan Son
, JoonYoung Lee
, Yohan Park
, Youngho Park
, Ashok Kumar Das
:
Design of Blockchain-Based Lightweight V2I Handover Authentication Protocol for VANET. 1346-1358 - Xiangjie Kong
, Ning Li
, Chenwei Zhang
, Guojiang Shen
, Zhaolong Ning
, Tie Qiu
:
Multi-Feature Representation Based COVID-19 Risk Stage Evaluation With Transfer Learning. 1359-1375 - Danhu Li, Maojiao Ye
, Lei Ding
, Shengyuan Xu
:
Distributed Nash Equilibrium Computation With Uncertain Dynamics and Disturbances. 1376-1385 - Qian Qiu, Housheng Su
:
Finite-Time Output Synchronization for Output-Coupled Reaction-Diffusion Neural Networks With Directed Topology. 1386-1394 - Lifeng Ma
, Zidong Wang
, Hongjian Liu
, Fuad E. Alsaadi
, Fawaz E. Alsaadi
:
Neural-Network-Based Filtering for A General Class of Nonlinear Systems under Dynamically Bounded Innovations Over Sensor Networks. 1395-1408 - Siddharth Pal
, Ananthram Swami:
Geometric Nodal Degree Distributions Arise in Barabási-Albert Graphs! 1409-1421 - Mingtao Xia
, Lucas Böttcher
, Tom Chou
:
Controlling Epidemics Through Optimal Allocation of Test Kits and Vaccine Doses Across Networks. 1422-1436 - Franck Plouraboué
, Pierre Uszes, Romain Guibert
:
Source Identification of Propagating Waves Inside a Network. 1437-1450 - Huifen Hong
, Changbin Yu
, Wenwu Yu:
Adaptive Fixed-Time Control for Attitude Consensus of Disturbed Multi-Spacecraft Systems With Directed Topologies. 1451-1461 - Younghwan Shin
, Wonsik Yang
, Sangdo Kim, Jong-Moon Chung
:
Multiple Adaptive-Resource-Allocation Real-Time Supervisor (MARS) for Elastic IIoT Hybrid Cloud Services. 1462-1476 - Sen Li, Xiangnuo Ren, Wenxue Li
:
Inter-Layer Noise-Based Topology of Complex-Valued Multi-Layer Networks: Almost Sure Stability via Time-Varying Hybrid Intermittent Pinning Control. 1477-1492 - Yuqing Hao
, Qingyun Wang
, Zhisheng Duan
, Guanrong Chen
:
Target Controllability of Networked LTI Systems. 1493-1500 - Zitong Liu
, Wei Wang
, Guoru Ding
, Qihui Wu
, Xianbin Wang
:
Topology Sensing of Non-Collaborative Wireless Networks With Conditional Granger Causality. 1501-1515 - Qi Xuan
, Jinchao Zhou, Kunfeng Qiu, Zhuangzhi Chen
, Dongwei Xu
, Shilian Zheng
, Xiaoniu Yang
:
AvgNet: Adaptive Visibility Graph Neural Network and Its Application in Modulation Classification. 1516-1526 - Yiping Luo
, Wanling Zhu, Jinde Cao
, Leszek Rutkowski
:
Event-Triggered Finite-Time Guaranteed Cost H-Infinity Consensus for Nonlinear Uncertain Multi-Agent Systems. 1527-1539 - Xiaotian Wang
, Housheng Su
:
Robust Consensus of Multiagent Dynamics With Transmission Constraints and Noises. 1540-1552 - Linhao Zhao
, Shiping Wen
, Min Xu
, Kaibo Shi
, Song Zhu, Tingwen Huang
:
PID Control for Output Synchronization of Multiple Output Coupled Complex Networks. 1553-1566 - Wei Li
, Shiping Wen
, Kaibo Shi
, Yin Yang
, Tingwen Huang
:
Neural Architecture Search With a Lightweight Transformer for Text-to-Image Synthesis. 1567-1576 - Quang Ngoc Nguyen
, Rehmat Ullah
, Byung-Seo Kim
, Rosilah Hassan
, Takuro Sato, Tarik Taleb
:
A Cross-Layer Green Information-Centric Networking Design Toward the Energy Internet. 1577-1593 - Suman Saha
:
Resilience in Multiplex Networks by Addition of Cross-Repulsive Links. 1594-1603 - Yang Jiao
, Kai Yang
, Dongjin Song, Dacheng Tao
:
TimeAutoAD: Autonomous Anomaly Detection With Self-Supervised Contrastive Loss for Multivariate Time Series. 1604-1619 - Yilun Shang
:
Scaled Consensus and Reference Tracking in Multiagent Networks With Constraints. 1620-1629 - Anqi Zhu
, Mingfang Ma, Songtao Guo
, Yuanyuan Yang
:
Adaptive Access Selection Algorithm for Multi-Service in 5G Heterogeneous Internet of Things. 1630-1644 - Marcin Waniek
, Petter Holme
, Talal Rahwan
:
Hiding in Temporal Networks. 1645-1657 - Junyang Chen
, Zhiguo Gong
, Yuanman Li
, Huanjian Zhang, Hongyong Yu, Junzhang Zhu, Ge Fan
, Xiao-Ming Wu
, Kaishun Wu
:
Meta-Path Based Neighbors for Behavioral Target Generalization in Sequential Recommendation. 1658-1667 - Murk Marvi
, Adnan Aijaz, Muhammad Khurram
:
Integrating Stochastic Geometry and ON/OFF Traffic Models: Toward Spatio-Temporal Analysis of Wireless Networks With Heterogeneous Services. 1668-1679 - Qi Liu, Bo Yang
, Zhaojian Wang
, Dafeng Zhu
, Xinyi Wang, Kai Ma
, Xinping Guan
:
Asynchronous Decentralized Federated Learning for Collaborative Fault Diagnosis of PV Stations. 1680-1696 - Weisheng Si
, Balume Mburano
, Wei Xing Zheng
, Tie Qiu
:
Measuring Network Robustness by Average Network Flow. 1697-1712 - Xiaonan Wang
, Shaohao Cai
:
Edge-Assisted NDN-Based IoT Framework With Provider and Consumer Mobility Support. 1713-1725 - Dongqing Liu
, Abdelhakim Hafid
, Lyes Khoukhi
:
Workload Balancing in Mobile Edge Computing for Internet of Things: A Population Game Approach. 1726-1739 - Haiqin Wu
, Liangmin Wang
, Ke Cheng
, Dejun Yang
, Jian Tang
, Guoliang Xue
:
Privacy-Enhanced and Practical Truth Discovery in Two-Server Mobile Crowdsensing. 1740-1755 - Jing Zhang
, Jianquan Lu
, Jungang Lou
:
Privacy-Preserving Average Consensus via Finite Time-Varying Transformation. 1756-1764 - Zichuan Liu, Rui Zhang
, Chen Wang
, Zhu Xiao
, Hongbo Jiang
:
Spatial-Temporal Conv-Sequence Learning With Accident Encoding for Traffic Flow Prediction. 1765-1775 - Xianghua Li
, Xin Qi, Xingjian Liu, Chao Gao
, Zhen Wang
, Fan Zhang, Jiming Liu
:
A Discrete Moth-Flame Optimization With an $l_2$-Norm Constraint for Network Clustering. 1776-1788 - Qingguo Lü
, Xiaofeng Liao
, Shaojiang Deng
, Huaqing Li
:
ET-DASG: An Efficient Decentralized Algorithm for Convex Optimization Over Networks. 1789-1801 - Kexin Fan
, Bowen Feng
, Xilin Zhang
, Qinyu Zhang
:
Network Selection Based on Evolutionary Game and Deep Reinforcement Learning in Space-Air-Ground Integrated Network. 1802-1812 - Lei Ma
, Hongyu Liu, Linna Zhou
, Chunyu Yang
, Wei Dai, Guoqing Wang
:
Security Control for Multi-Time-Scale CPSs Under DoS Attacks: An Improved Dynamic Event-Triggered Mechanism. 1813-1826 - Junyang Chen
, Xueliang Li
, Yuanman Li
, Paul Li, Mengzhu Wang
, Xiang Zhang
, Zhiguo Gong
, Kaishun Wu
, Victor C. M. Leung
:
A Simple Yet Effective Layered Loss for Pre-Training of Network Embedding. 1827-1837 - Zheng Wu
, Yu-ning Dong
, Jiong Jin
, Hua-Liang Wei
, Gaogang Xie
:
Multimedia Traffic Classification for Imbalanced Environment. 1838-1852 - Peican Zhu
, Le Cheng
, Chao Gao
, Zhen Wang
, Xuelong Li
:
Locating Multi-Sources in Social Networks With a Low Infection Rate. 1853-1865 - Shuyi Xiao
, Jiuxiang Dong
:
Distributed Fault-Tolerant Tracking Control for Uncertain Homogeneous and Heterogeneous MASs Under Asynchronous Sampled Communications. 1866-1879 - Yu Luo
, Lina Pu
, Zheng Peng:
Energy Stimulated Time Synchronization for Energy Harvesting Wireless Networks. 1880-1894 - Qianlan Bai
, Yuedong Xu
, Xin Wang:
Understanding the Benefit of Being Patient in Payment Channel Networks. 1895-1908 - Zhongzheng Tang
, Luning Wang, Qian Xu
, Kejie Lu
, Jianping Wang
, Kui Wu
, Xiaohua Jia
:
SNIFF: A Scalable Network Inference Framework for Measuring End-to-End Performance. 1909-1923 - Peng Zhang, Quanbao Wang
, Yueying Wang
, Jiwei Tang
, Dengping Duan:
Agent-Based Finite-Time Leader-Following Consensus for Earth-Observation Tasks on Multiple Airships. 1924-1931 - Taizhou Yi
, Guopeng Zhang
, Kezhi Wang
, Kun Yang
:
Joint Program Partitioning and Resource Allocation for Completion Time Minimization in Multi-MEC Systems. 1932-1948
Volume 9, Number 4, July - August 2022
- Xiaowen Chu, Fausto Giunchiglia
, Giovanni Neglia
, David Gregg, Jiangchuan Liu
:
Guest Editorial: Introduction to the Special Section on Communication-Efficient Distributed Machine Learning. 1949-1950 - Menglu Yu
, Jia Liu
, Chuan Wu
, Bo Ji
, Elizabeth S. Bentley:
Toward Efficient Online Scheduling for Distributed Machine Learning Systems. 1951-1969 - Shuqi Li, Yang Qin
, Zukai Jiang, Weihong Yang
:
Efficient Communication Scheduling for Parameter Synchronization of DML in Data Center Networks. 1970-1985 - Lorenzo Valerio
, Andrea Passarella
, Marco Conti:
Optimising Cost vs Accuracy of Decentralised Analytics in Fog Computing Environments. 1986-2002 - Jiangang Shu
, Weizhe Zhang
, Ying Zhou
, Zhengtao Cheng, Laurence T. Yang
:
FLAS: Computation and Communication Efficient Federated Learning via Adaptive Sampling. 2003-2014 - Tian Wang
, Yan Liu, Xi Zheng
, Hong-Ning Dai
, Weijia Jia
, Mande Xie:
Edge-Based Communication Optimization for Distributed Federated Learning. 2015-2024 - Felix Sattler
, Arturo Marbán
, Roman Rischke
, Wojciech Samek
:
CFD: Communication-Efficient Federated Distillation via Soft-Label Quantization and Delta Coding. 2025-2038 - Zeou Hu
, Kiarash Shaloudegi, Guojun Zhang
, Yaoliang Yu:
Federated Learning Meets Multi-Objective Optimization. 2039-2051 - Hui Lu
, Chengjie Jin
, Xiaohan Helu
, Xiaojiang Du
, Mohsen Guizani
, Zhihong Tian
:
DeepAutoD: Research on Distributed Machine Learning Oriented Scalable Mobile Communication Security Unpacking System. 2052-2065 - Emna Baccour
, Aiman Erbad, Amr Mohamed
, Mounir Hamdi
, Mohsen Guizani
:
RL-DistPrivacy: Privacy-Aware Distributed Deep Inference for Low Latency IoT Systems. 2066-2083 - Huaqing Li
, Wentao Ding
, Zheng Wang
, Qingguo Lü
, Yongfu Li
, Dawen Xia
:
Decentralized Dual Operator Splitting for Nonsmooth Composite Optimization. 2084-2097 - Yulong Cui, Mincheng Wu, Shibo He
, Peng Cheng, Hairong Dong
:
Fast Restoring the Controllability of Networked Systems With Symmetric Weights. 2098-2109 - Shijing Li
, Tian Lan
, Bharath Balasubramanian
, Hee Won Lee, Moo-Ryong Ra
, Rajesh Krishna Panta:
Pushing Collaborative Data Deduplication to the Network Edge: An Optimization Framework and System Design. 2110-2122 - Quentin Laporte-Chabasse
, Radu S. Stoica
, Marianne Clausel, François Charoy, Gérald Oster
:
Morpho-Statistical Description of Networks Through Graph Modelling and Bayesian Inference. 2123-2138 - Qin Huang
, Li Quan
, Shengli Zhang
:
Downsampling and Transparent Coding for Blockchain. 2139-2149 - Jiayi Cai
, Jianwen Feng
, Jingyi Wang
, Yi Zhao
:
Tracking Consensus of Multi-Agent Systems Under Switching Topologies via Novel SMC: An Event-Triggered Approach. 2150-2163 - Jiaojiao Yan, Jinde Cao
:
Privacy Preservation of Optimization Algorithm Over Unbalanced Directed Graph. 2164-2173 - Abderrahime Filali
, Zoubeir Mlika, Soumaya Cherkaoui
, Abdellatif Kobbane:
Dynamic SDN-Based Radio Access Network Slicing With Deep Reinforcement Learning for URLLC and eMBB Services. 2174-2187 - Baowei Wang
, Jiawei Shi
, Weishen Wang, Peng Zhao:
Image Copyright Protection Based on Blockchain and Zero-Watermark. 2188-2199 - Zhaoyue Zhong
, Xiangrong Wang, Cunquan Qu
, Guanghui Wang:
Efficient Algorithm Based on Non-Backtracking Matrix for Community Detection in Signed Networks. 2200-2211 - Ming Chen
, Zhirong Shen
, Lin Wang
, Guanglin Zhang
:
Intelligent Energy Scheduling in Renewable Integrated Microgrid With Bidirectional Electricity-to-Hydrogen Conversion. 2212-2223 - Zhen Li
, Yang Tang
, Yongqing Fan
, Tingwen Huang
, Leszek Rutkowski
:
Formation Control of Multi-Agent Systems With Constrained Mismatched Compasses. 2224-2236 - Shiyuan Zheng, Hong Xie
, John C. S. Lui
:
Optimizing Social Visibility in OSNs With Anonymity Guarantees: Efficient Algorithms and Applications. 2237-2251 - Xiangqiang Gao
, Rongke Liu
, Aryan Kaushik
, Hangyu Zhang
:
Dynamic Resource Allocation for Virtual Network Function Placement in Satellite Edge Clouds. 2252-2265 - Deepan Muthirayan
, Pramod P. Khargonekar
:
Online Algorithms for Network Robustness Under Connectivity Constraints. 2266-2277 - Yue-Yue Tao
, Zheng-Guang Wu
:
Asynchronous Control of Two-Dimensional Markov Jump Roesser Systems: An Event-Triggering Strategy. 2278-2289 - Yuan-Xin Li
, Xiaoyan Hu
, Choon Ki Ahn
, Zhongsheng Hou
, Hyun Ho Kang
:
Event-Based Adaptive Neural Asymptotic Tracking Control for Networked Nonlinear Stochastic Systems. 2290-2300 - Yushuai Li
, Tianyi Li
, Huaguang Zhang
, Xiangpeng Xie
, Qiuye Sun
:
Distributed Resilient Double-Gradient-Descent Based Energy Management Strategy for Multi-Energy System Under DoS Attacks. 2301-2316 - Rui Luo
, Buddhika Nettasinghe
, Vikram Krishnamurthy
:
Controlling Segregation in Social Network Dynamics as an Edge Formation Game. 2317-2329 - Ming Zhao
, Jiahua Li
, Fengxiao Tang
, Sohaib Asif
, Yusen Zhu:
Learning Based Massive Data Offloading in the IoV: Routing Based on Pre-RLGA. 2330-2340 - Derui Ding
, Huanyi Liu, Hongli Dong, Hongjian Liu
:
Resilient Filtering of Nonlinear Complex Dynamical Networks Under Randomly Occurring Faults and Hybrid Cyber-Attacks. 2341-2352 - Xinxin Zhang, Li Xu
, Zhenyu Xu:
Influence Maximization Based on Network Motifs in Mobile Social Networks. 2353-2363 - Qi Cao, Man-On Pun
, Yi Chen:
Deep Learning in Network-Level Performance Prediction Using Cross-Layer Information. 2364-2377 - Xiaoqiang Zhu
, Wenyu Qu
, Xiaobo Zhou
, Laiping Zhao
, Zhaolong Ning
, Tie Qiu
:
Intelligent Fingerprint-Based Localization Scheme Using CSI Images for Internet of Things. 2378-2391 - Fei Liu
, Xiwang Dong
, Jianglong Yu
, Yongzhao Hua
, Qingdong Li
, Zhang Ren
:
Distributed Nash Equilibrium Seeking of $N$-Coalition Noncooperative Games With Application to UAV Swarms. 2392-2405 - Chunyu Wu
, Xudong Zhao
, Bohui Wang
, Wei Xing
, Le Liu
, Xinwei Wang
:
Model-Based Dynamic Event-Triggered Control for Cyber-Physical Systems Subject to Dynamic Quantization and DoS Attacks. 2406-2417 - Yu Ding, Lichen Zhang
, Longjiang Guo
:
Dynamic Delayed-Decision Task Assignment Under Spatial-Temporal Constraints in Mobile Crowdsensing. 2418-2431 - Nattakorn Promwongsa
, Amin Ebrahimzadeh
, Roch H. Glitho
, Noël Crespi:
Joint VNF Placement and Scheduling for Latency-Sensitive Services. 2432-2449 - Yuying Zhu
, Chengyi Xia
, Zhen Wang
, Zengqiang Chen
:
Networked Decision-Making Dynamics Based on Fair, Extortionate and Generous Strategies in Iterated Public Goods Games. 2450-2462 - Lucia Cavallaro
, Stefania Costantini
, Pasquale De Meo
, Antonio Liotta
, Giovanni Stilo
:
Network Connectivity Under a Probabilistic Node Failure Model. 2463-2480 - Abdulmalik Alwarafy
, Bekir Sait Ciftler, Mohamed Abdallah
, Mounir Hamdi
, Naofal Al-Dhahir
:
Hierarchical Multi-Agent DRL-Based Framework for Joint Multi-RAT Assignment and Dynamic Resource Allocation in Next-Generation HetNets. 2481-2494 - Yanting Yin
, Yajing Wu
, Xuebing Yang
, Wensheng Zhang
, Xiaojie Yuan:
SE-GRU: Structure Embedded Gated Recurrent Unit Neural Networks for Temporal Link Prediction. 2495-2509 - Tianhu Yu
, Jinde Cao
, Kuan Lu:
Finite-Time Synchronization Control of Networked Chaotic Complex-Valued Systems With Adaptive Coupling. 2510-2520 - Yang Liu
, Zidong Wang
, Lei Zou
, Jun Hu
, Hongli Dong:
Distributed Filtering for Complex Networks Under Multiple Event-Triggered Transmissions Within Node-Wise Communications. 2521-2534 - Heekang Song
, Bonjun Gu, Kyungrak Son
, Wan Choi
:
Joint Optimization of Edge Computing Server Deployment and User Offloading Associations in Wireless Edge Network via a Genetic Algorithm. 2535-2548 - Jiaojiao Jiang
, Shuiqiao Yang
, Sanjay Jha
:
Network Growth From Global and Local Influential Nodes. 2549-2561 - Yu-Jia Chen
, Xiao-Chun Chen, Miao Pan:
Defense Against Machine Learning Based Attacks in Multi-UAV Networks: A Network Coding Based Approach. 2562-2578 - Jieli Liu
, Jiatao Zheng, Jiajing Wu
, Zibin Zheng
:
FA-GNN: Filter and Augment Graph Neural Networks for Account Classification in Ethereum. 2579-2588 - Jie Wu
, Suhan Jiang:
On Increasing Scalability and Liquidation of Lightning Networks for Blockchains. 2589-2600 - Vajiheh Farhadi
, Sai Gopal Vennelaganti, Ting He
, Nilanjan Ray Chaudhuri, Thomas La Porta
:
Improvement of SCADA-Based Preventive Control Under Budget Constraints. 2601-2616 - Yuan Li
, Jianming Zhu
, Jianbin Jiao
, Qi Zhang:
Competitive Influence Minimization in Multi-Group Social Networks: An Opinion-Based Solution. 2617-2630 - Kuo Li
, Choon Ki Ahn
, Changchun Hua
, Dong Kyu Lee
:
An Output Feedback Cascade Control Approach to Distributed Consensus of Nonlinear Multiagent Systems With Output Delays. 2631-2640 - Shilpa Thakur
, Ajay Singh
:
Secrecy Performance of Underlay Cognitive Radio Networks With Primary Interference. 2641-2657 - Yongliang Zhang
, Lin Ma
, Xuezhi Tan, Danyang Qin
:
A Novel Tensor Completion Based Indoor Positioning Fingerprint Recovery Method in Mobile Crowdsensing Networks. 2658-2672 - Chenbei Lu
, Wenqian Jiang, Chenye Wu
:
Effective End-to-End Learning Framework for Economic Dispatch. 2673-2683 - Xiaona Song
, Renzhi Zhang
, Choon Ki Ahn
, Shuai Song
:
Synchronization for Semi-Markovian Jumping Reaction-Diffusion Complex Dynamical Networks: A Space-Time Sampled-Data Control Scheme. 2684-2696 - Xingtang Wu, Hairong Dong
, Chi K. Tse
, Qi Zhang:
Timetable Synchronization Optimization for Metro Networks With the Consideration of Station Centrality. 2697-2707 - Lei Tan
, Xiaoxi Zhang
, Yipeng Zhou
, Xinkai Che, Miao Hu, Xu Chen
, Di Wu
:
AdaFed: Optimizing Participation-Aware Federated Learning With Adaptive Aggregation Weights. 2708-2720 - Haoge Jia
, Chunxiao Jiang
, Linling Kuang
, Jianhua Lu:
Adaptive Access Control and Resource Allocation for Random Access in NGSO Satellite Networks. 2721-2733 - Hao Gao
, Alex Tong Lin
, Reginald A. Banez
, Wuchen Li, Zhu Han
, Stanley J. Osher
, H. Vincent Poor
:
Opinion Evolution in Social Networks: Connecting Mean Field Games to Generative Adversarial Nets. 2734-2746 - Jialing Zhou
, Yuezu Lv
, Changyun Wen
, Guanghui Wen
:
Solving Specified-Time Distributed Optimization Problem via Sampled-Data-Based Algorithm. 2747-2758 - Pau Ferrer-Cid
, José M. Barceló-Ordinas
, Jorge García-Vidal
:
Volterra Graph-Based Outlier Detection for Air Pollution Sensor Networks. 2759-2771 - Qiang Wang
, Hao Jiang
, Ying Jiang
, Shuwen Yi
, Lixia Li, Cong-Cong Xing
, Jun Huang
:
On Searching Multiple Disjoint Shortest Paths in Scale-Free Networks With Hyperbolic Geometry. 2772-2785 - Zhongliang Zhao
, Negar Emami
, Hugo Santos
, Lucas Pacheco, Mostafa Karimzadeh, Torsten Braun
, Arnaud Braud, Benoit Radier
, Philippe Tamagnan:
Reinforced-LSTM Trajectory Prediction-Driven Dynamic Service Migration: A Case Study. 2786-2802 - Chunlan An
, Housheng Su
, Shiming Chen
:
${H_\infty }$ Consensus for Discrete-Time Fractional-Order Multi-Agent Systems With Disturbance via Q-Learning in Zero-Sum Games. 2803-2814 - Mohammadsaleh Nikooroo
, Zdenek Becvar
:
Optimization of Total Power Consumed by Flying Base Station Serving Mobile Users. 2815-2832 - Kai Yang
, Shaoyu Dou
, Pan Luo, Xin Wang
, H. Vincent Poor
:
Robust Group Anomaly Detection for Quasi-Periodic Network Time Series. 2833-2845 - Yingting Yuan
, Xiaodong Xu
, Mengying Sun
, Ping Zhang
:
Terminal Cooperative Interdependent Computing Task Offloading for 6G. 2846-2856 - Dan Zhao
, Yuezu Lv
, Jialing Zhou
, Guanghui Wen
, Tingwen Huang
:
Attack-Isolation-Based Resilient Control of Large-Scale Systems Against Collusive Attacks. 2857-2869 - Yingya Guo
, Yulong Ma, Huan Luo
, Jianping Wu:
Traffic Engineering in a Shared Inter-DC WAN via Deep Reinforcement Learning. 2870-2881 - Zhenwei Liu
, Donya Nojavanzadeh
, Ali Saberi
, Anton A. Stoorvogel
:
Scale-Free Collaborative Protocol Design for Output Synchronization of Heterogeneous Multi-Agent Systems With Nonuniform Communication Delays. 2882-2894 - Quyuan Wang
, Songtao Guo
, Guiyan Liu
, Li Yang, Chengsheng Pan:
MotiLearn: Contract-Based Incentive Mechanism for Heterogeneous Edge Collaborative Training. 2895-2909 - Wei Yu
, Xuhui Bu
, Zhongsheng Hou:
Security Data-Driven Control for Nonlinear Systems Subject to Deception and False Data Injection Attacks. 2910-2921 - Jawad Ahmed
, Hassan Habibi Gharakheili
, Craig Russell, Vijay Sivaraman
:
Automatic Detection of DGA-Enabled Malware Using SDN and Traffic Behavioral Modeling. 2922-2939 - Xiaoxuan Wang
, Shaofu Yang
, Zhenyuan Guo
, Mengke Lian, Tingwen Huang
:
A Distributed Dynamical System for Optimal Resource Allocation Over State-Dependent Networks. 2940-2951
Volume 9, Number 5, September - October 2022
- Bouziane Brik
, Kapal Dev
, Yang Xiao
, Guangjie Han, Adlen Ksentini
:
Guest Editorial Introduction to the Special Section on AI-Powered Internet of Everything (IoE) Services in Next-Generation Wireless Networks. 2952-2954 - Timam Ghosh
, Arijit Roy
, Sudip Misra
:
I2M: Intelligent Information Management for Rendering IoE Services in Society 5.0. 2955-2965 - Jiawen Kang
, Xuandi Li, Jiangtian Nie
, Yi Liu
, Minrui Xu
, Zehui Xiong
, Dusit Niyato
, Qiang Yan:
Communication-Efficient and Cross-Chain Empowered Federated Learning for Artificial Intelligence of Things. 2966-2977 - Hajar Moudoud
, Zoubeir Mlika, Lyes Khoukhi
, Soumaya Cherkaoui
:
Detection and Prediction of FDI Attacks in IoT Systems via Hidden Markov Model. 2978-2990 - Yuhuai Peng
, Xiaojing Xue, Ali Kashif Bashir
, Xiaogang Zhu
, Yasser D. Al-Otaibi
, Usman Tariq
, Keping Yu
:
Securing Radio Resources Allocation With Deep Reinforcement Learning for IoE Services in Next-Generation Wireless Networks. 2991-3003 - Gunasekaran Manogaran, Tu N. Nguyen
, Jiechao Gao
, Priyan Malarvizhi Kumar
:
Deep Learning-Based Service Distribution Model for Wireless Network Assisted Internet of Everything. 3004-3014 - Qin Zhang
, Keping Yu
, Zhiwei Guo
, Sahil Garg
, Joel J. P. C. Rodrigues
, Mohammad Mehedi Hassan
, Mohsen Guizani
:
Graph Neural Network-Driven Traffic Forecasting for the Connected Internet of Vehicles. 3015-3027 - Demeke Shumeye Lakew
, Van-Dat Tuong
, Nhu-Ngoc Dao
, Sungrae Cho
:
Adaptive Partial Offloading and Resource Harmonization in Wireless Edge Computing-Assisted IoE Networks. 3028-3044 - Boubakr Nour
, Soumaya Cherkaoui
, Zoubeir Mlika:
Federated Learning and Proactive Computation Reuse at the Edge of Smart Homes. 3045-3056 - Abhishek Hazra
, Mainak Adhikari
, Tarachand Amgoth
, Satish Narayana Srirama
:
Intelligent Service Deployment Policy for Next-Generation Industrial Edge Networks. 3057-3066 - Jiabao Wen
, Jiachen Yang
, Wei Wei
, Zhihan Lv
:
Intelligent Multi-AUG Ocean Data Collection Scheme in Maritime Wireless Communication Network. 3067-3079 - Ryan Wen Liu
, Maohan Liang
, Jiangtian Nie
, Wei Yang Bryan Lim
, Yang Zhang
, Mohsen Guizani
:
Deep Learning-Powered Vessel Trajectory Prediction for Improving Smart Traffic Services in Maritime Internet of Things. 3080-3094 - Wei Cai
, Zehui Xiong
, Jiawen Kang
, Carla-Fabiana Chiasserini
, Ekram Hossain
, Mohsen Guizani
:
Guest Editorial Introduction to the Special Section on Collaborative Machine Learning for Next-Generation Intelligent Applications. 3095-3098 - Hongda Wu
, Ping Wang
:
Node Selection Toward Faster Convergence for Federated Learning on Non-IID Data. 3099-3111 - Tiantian Xu
, Guangjie Han
, Linfeng Gou, Miguel Martínez-García
, Dong Shao, Bin Luo, Zhenyu Yin:
SGBRT: An Edge-Intelligence Based Remaining Useful Life Prediction Model for Aero-Engine Monitoring System. 3112-3122 - Tianle Mai
, Haipeng Yao
, Jiaqi Xu, Ni Zhang, Qifeng Liu
, Song Guo
:
Automatic Double-Auction Mechanism for Federated Learning Service Market in Internet of Things. 3123-3135 - Zhicheng Liu
, Yunfeng Zhao, Jinduo Song, Chao Qiu
, Xu Chen
, Xiaofei Wang
:
Learn to Coordinate for Computation Offloading and Resource Allocation in Edge Computing: A Rational-Based Distributed Approach. 3136-3151 - Yuanfang Chi
, Z. Jane Wang
, Victor C. M. Leung
:
Distributed Knowledge Inference Framework for Intelligent Fault Diagnosis in IIoT Systems. 3152-3165 - Yi Liu
, Yuanshao Zhu
, James J. Q. Yu
:
Resource-Constrained Federated Edge Learning With Heterogeneous Data: Formulation and Analysis. 3166-3178 - Yuntao Wang
, Zhou Su
, Tom H. Luan
, Ruidong Li
, Kuan Zhang
:
Federated Learning With Fair Incentives and Robust Aggregation for UAV-Aided Crowdsensing. 3179-3196 - Ting Cai
, Zhihua Yang, Yufei Chen
, Wuhui Chen
, Zibin Zheng
, Yang Yu
, Hong-Ning Dai
:
Cooperative Data Sensing and Computation Offloading in UAV-Assisted Crowdsensing With Multi-Agent Deep Reinforcement Learning. 3197-3211 - Shenghao Liu
, Bang Wang
, Xianjun Deng
, Laurence T. Yang
:
Self-Attentive Graph Convolution Network With Latent Group Mining and Collaborative Filtering for Personalized Recommendation. 3212-3221 - Mingqian Liu
, Jiakun Wang
, Nan Zhao
, Yunfei Chen
, Hao Song
, F. Richard Yu
:
Radio Frequency Fingerprint Collaborative Intelligent Identification Using Incremental Learning. 3222-3233 - Sahaya Beni Prathiba
, Gunasekaran Raja
, Sudha Anbalagan
, Kapal Dev
, Sugeerthi Gurumoorthy, Atshaya P. Sankaran
:
Federated Learning Empowered Computation Offloading and Resource Management in 6G-V2X. 3234-3243 - Guangcheng Li
, Qinglin Zhao
, Dongbo Zhang, Mu-Yen Chen
, Mohammad Mehedi Hassan
, Jie Xu, Sahil Garg
:
GT-Chain: A Fair Blockchain for Intelligent Industrial IoT Applications. 3244-3257 - Abdullatif Albaseer
, Mohamed M. Abdallah
, Ala I. Al-Fuqaha
, Aiman Erbad
:
Fine-Grained Data Selection for Improved Energy Efficiency of Federated Edge Learning. 3258-3271 - Mohit Kumar
, Priya Mukherjee, Kavita
, Sahil Verma
, Danda B. Rawat
:
Improved Deep Convolutional Neural Network Based Malicious Node Detection and Energy-Efficient Data Transmission in Wireless Sensor Networks. 3272-3281 - Li Wang
, Xin Ye, Jialin Li, Yu Wen, Wenbin Liao
, Houbing Song
, Jie Chen
, Jianqiang Li
:
GAN-Based Dual Active Learning for Nosocomial Infection Detection. 3282-3291 - Guanglei Zhao
, Changchun Hua, Shuang Liu:
Sampled-Data Dynamic Output Feedback Consensus Control of Multi-Agent Systems. 3292-3301 - Dengcheng Yan
, Wenxin Xie
, Yiwen Zhang
, Qiang He
, Yun Yang
:
Hypernetwork Dismantling via Deep Reinforcement Learning. 3302-3315 - Yuan Wang
, Hideaki Ishii
, François Bonnet
, Xavier Défago
:
Resilient Consensus for Multi-Agent Systems Under Adversarial Spreading Processes. 3316-3331 - Dandan Wang
, Xiao Fang
, Yan Wan
, Jialing Zhou
, Guanghui Wen
:
Distributed Optimization Algorithms for MASs With Network Attacks: From Continuous-Time to Event-Triggered Communication. 3332-3344 - Yang Li
, Yuan Wu
, Minghui Dai
, Bin Lin
, Weijia Jia
, Xuemin Shen
:
Hybrid NOMA-FDMA Assisted Dual Computation Offloading: A Latency Minimization Approach. 3345-3360 - Chin-Jung Liu
, Li Xiao
:
Mitigating Interference and Blockage Through Fingerprinting in Mmwave-Enabled HetNets. 3361-3372 - Cong Mu
, Angelo Mele
, Lingxin Hao
, Joshua Cape, Avanti Athreya, Carey E. Priebe
:
On Spectral Algorithms for Community Detection in Stochastic Blockmodel Graphs With Vertex Covariates. 3373-3384 - Dingguo Liang
, Ying Yang
, Rongchang Li
, Zhengen Zhao
:
Plug-and-Play Robust Distributed Fault Estimation for Interconnected Systems. 3385-3395 - Lamiaa Basyoni
, Aiman Erbad
, Amr Mohamed
, Mohsen Guizani
:
QDRL: QoS-Aware Deep Reinforcement Learning Approach for Tor's Circuit Scheduling. 3396-3410 - Bimal Kumar Meher
, Ruhul Amin
, Ashok Kumar Das
, Muhammad Khurram Khan
:
KL-RAP: An Efficient Key-Less RFID Authentication Protocol Based on ECDLP for Consumer Warehouse Management System. 3411-3420 - Kostas Chounos
, Panagiotis Karamichailidis, Nikos Makris
, Thanasis Korakis:
Unlicensed Spectrum Forecasting: An Interference Umbrella Based on Channel Analysis and Machine Learning. 3421-3436 - Jing Li
, Tingting Liu
, Dusit Niyato
, Jun Li, Zhu Han
:
On Sidechain-Assisted Transaction Service Management for Internet of Things: A Random Contract Approach. 3437-3453 - Xinjie Zhang, Xinglin Zhang
, Wentao Yang:
Joint Offloading and Resource Allocation Using Deep Reinforcement Learning in Mobile Edge Computing. 3454-3466 - Shengminjie Chen
, Yapu Zhang
, Wenguo Yang
, Ruiqi Yang:
Information Spread Maximization With Multi-Boosting Stages. 3467-3477 - Dewen Qiao
, Guiyan Liu
, Songtao Guo
, Jing He
:
Adaptive Federated Learning for Non-Convex Optimization Problems in Edge Computing Environment. 3478-3491 - Tingting Yang
, Haobo Kang, Hong-Jun Ma
:
Adaptive Fuzzy Fixed-Time Tracking Control for Switched High-Order Multi-Agent Systems With Input Delay. 3492-3503 - Xiangmao Meng
, Wenkai Li, Ju Xiang
, Hayat Dino Bedru
, Wenkang Wang
, Fang-Xiang Wu
, Min Li
:
Temporal-Spatial Analysis of the Essentiality of Hub Proteins in Protein-Protein Interaction Networks. 3504-3514 - Zhao-Long Hu
, Jianmin Han
, Hao Peng, Jianfeng Lu
, Xiangbin Zhu
, Riheng Jia, Minglu Li
:
Locating Sources in Multiplex Networks for Linear Diffusion Systems. 3515-3530 - Wenbin Huang
, Kun Xie
, Jie Li
:
A Novel Sequence Tensor Recovery Algorithm for Quick and Accurate Anomaly Detection. 3531-3545 - Gang Wang
:
Consensus Control in Heterogeneous Nonlinear Multiagent Systems With Position Feedback and Switching Topologies. 3546-3557 - Zhuotao Lian
, Qinglin Yang
, Weizheng Wang
, Qingkui Zeng
, Mamoun Alazab
, Hong Zhao
, Chunhua Su
:
DEEP-FEL: Decentralized, Efficient and Privacy-Enhanced Federated Edge Learning for Healthcare Cyber Physical Systems. 3558-3569 - Meina Zhai, Qiuye Sun
, Rui Wang
, Bingyu Wang, Shu Liu
, Huaguang Zhang
:
Fully Distributed Fault-Tolerant Event-Triggered Control of Microgrids Under Directed Graphs. 3570-3579 - Zhilu Xu
, Rongqiang Tang, Yaping Sun, Xiaodi Li
, Xinsong Yang
:
Secure Synchronization of Coupled Systems via Double Event-Triggering Mechanisms With Actuator Fault. 3580-3589 - Yunxiao Ren
, Qishao Wang
, Zhisheng Duan
:
Optimal Leader-Following Consensus Control of Multi-Agent Systems: A Neural Network Based Graphical Game Approach. 3590-3601 - Kun-Peng Wang, Ze Tang
, Ju H. Park
, Jianwen Feng
:
Impulsive Time Window Based Quasi-Consensus on Stochastic Nonlinear Multi-Agent Systems. 3602-3613 - Shuang Zheng
, Yuna Jiang
, Xiaohu Ge
, Yong Xiao
, Yang Huang
, Yuan Liu
:
Cooperative Spectrum Sensing and Fusion Based on Tangle Networks. 3614-3632 - R. Vinoth
, Lazarus Jegatha Deborah, Pandi Vijayakumar
, Brij B. Gupta
:
An Anonymous Pre-Authentication and Post-Authentication Scheme Assisted by Cloud for Medical IoT Environments. 3633-3642 - Tianyou Li
, Dapeng Li
, Youyun Xu
, Xiaoming Wang
, Guanglin Zhang
:
Temporal-Spatial Collaborative Mobile Edge Caching With User Satisfaction Awareness. 3643-3658 - Zhenqian Wang
, Huigui Rong
, Hongbo Jiang
, Zhu Xiao
, Fanzi Zeng
:
A Load-Balanced and Energy-Efficient Navigation Scheme for UAV-Mounted Mobile Edge Computing. 3659-3674 - Qingxian Wang, Xinyu Liu
, Tianqi Shang, Zhigang Liu
, Han Yang, Xin Luo
:
Multi-Constrained Embedding for Accurate Community Detection on Undirected Networks. 3675-3690 - Xiaoxuan Wang
, Shaofu Yang
, Zhenyuan Guo
, Shiping Wen
, Tingwen Huang
:
A Distributed Network System for Nonsmooth Coupled-Constrained Optimization. 3691-3700 - Xin Jin
, Shuai Mao
, Ljupco Kocarev
, Chen Liang, Saiwei Wang
, Yang Tang
:
Event-Triggered Optimal Attitude Consensus of Multiple Rigid Body Networks With Unknown Dynamics. 3701-3714 - Chen Wang
, Zhiyuan Ren
, Wenchi Cheng
, Hailin Zhang
:
CDMR: Effective Computing-Dependent Multi-Path Routing Strategies in Satellite and Terrestrial Integrated Networks. 3715-3730 - Salma Emara
, Fei Wang
, Baochun Li
, Timothy Zeyl:
Pareto: Fair Congestion Control With Online Reinforcement Learning. 3731-3748 - Yue Yu
, Dawei Chen
, Xiao Tang
, Tiecheng Song
, Choong Seon Hong
, Zhu Han
:
Incentive Framework for Cross-Device Federated Learning and Analytics With Multiple Tasks Based on a Multi-Leader-Follower Game. 3749-3761 - Xiaoxiao Ma
, Shan Xue
, Jia Wu
, Jian Yang
, Cécile Paris, Surya Nepal
, Quan Z. Sheng
:
Deep Multi-Attributed-View Graph Representation Learning. 3762-3774 - Zhen Guo
, Jaber Valinejad, Jin-Hee Cho
:
Effect of Disinformation Propagation on Opinion Dynamics: A Game Theoretic Approach. 3775-3790 - Raveendra Babu Ponnuru
, Alavalapati Goutham Reddy
, Basker Palaniswamy
, Ashok Kumar Das
:
EV-PUF: Lightweight Security Protocol for Dynamic Charging System of Electric Vehicles Using Physical Unclonable Functions. 3791-3807 - Jun Huang, Debiao He
, Yitao Chen, Muhammad Khurram Khan
, Min Luo
:
A Blockchain-Based Self-Tallying Voting Protocol With Maximum Voter Privacy. 3808-3820
Volume 9, Number 6, November - December 2022
- Hai Jiang, Beniamino Di Martino, A. B. M. Shawkat Ali, Bernady O. Apduhan:
Guest Editorial Introduction to the Special Section on Computing and Networking for Cyber-Physical-Social Systems. 3821-3824 - Zhihua Cui, Zhixia Zhang, Zhaoming Hu, Shaojin Geng
, Jinjun Chen
:
A Many-Objective Optimization Based Intelligent High Performance Data Processing Model for Cyber-Physical-Social Systems. 3825-3834 - Renjie Zhou
, Hao Qian
, Jilin Zhang
, Chang Liu
, Jian Wan
, Yongjian Ren
, Naixue Xiong
, Nailiang Zhao
, Sanyuan Zhang
:
Self-Attention Mechanism Enhanced User Interests Modeling for Personalized Recommendation Services in Cyber-Physical-Social Systems. 3835-3846 - Xiaoyan Chen
, Wei Liang
, Jianbo Xu, Chong Wang, Kuan-Ching Li
, Meikang Qiu
:
An Efficient Service Recommendation Algorithm for Cyber-Physical-Social Systems. 3847-3859 - Li Feng
, Qinglin Zhao
, Yu Zeng, Mianxiong Dong
, Mu-Yen Chen
, Mohammad Mehedi Hassan
, Francesco Piccialli
, Giancarlo Fortino
:
M-T2F: A High-Efficient Contention Protocol for Wireless Networking in Cyber-Physical-Social Systems. 3860-3869 - Hui Huang, Qiang Ye
, Yitong Zhou:
Deadline-Aware Task Offloading With Partially-Observable Deep Reinforcement Learning for Multi-Access Edge Computing. 3870-3885 - Ti Zhou
, Man Lin
:
Deadline-Aware Deep-Recurrent-Q-Network Governor for Smart Energy Saving. 3886-3895 - Yaliang Zhao
, Laurence T. Yang
, Yiwen Zhang, Jiayu Sun, Xiaojing Wang, Chunchun Zhang
, Guangming Zhang
:
Tensor Train-Based Multiple Clusterings for Big Data in Cyber-Physical-Social Systems and Its Efficient Implementations. 3896-3908 - Huan Zhou
, Tong Wu
, Xin Chen
, Shibo He
, Jie Wu
:
RAIM: A Reverse Auction-Based Incentive Mechanism for Mobile Data Offloading Through Opportunistic Mobile Networks. 3909-3921 - Vinod Kumar Verma
, Anupam Sharma, Klimis S. Ntalianis
, Kuldeep Verma:
Catenarian-Trim Medley Routing System for Energy Balancing in Dispensed Computing Networks. 3922-3933 - Xiaokang Zhou
, Wei Liang
, Jianhua Ma, Zheng Yan
, Kevin I-Kai Wang
:
2D Federated Learning for Personalized Human Activity Recognition in Cyber-Physical-Social Systems. 3934-3944 - Demin Gao
, Lei Wang
, Bin Hu:
Spectrum Efficient Communication for Heterogeneous IoT Networks. 3945-3955 - Hanlin Zhang
, Peng Gao, Jia Yu
, Jie Lin
, Neal N. Xiong
:
Machine Learning on Cloud With Blockchain: A Secure, Verifiable and Fair Approach to Outsource the Linear Regression. 3956-3967 - Zakaria Benomar
, Francesco Longo
, Giovanni Merlino
, Antonio Puliafito
:
A Cloud-Based and Dynamic DNS Approach to Enable the Web of Things. 3968-3978 - Mahbuba Afrin
, Jiong Jin
, Ashfaqur Rahman, Andrea Gasparri
, Yu-Chu Tian
, Ambarish Kulkarni:
Robotic Edge Resource Allocation for Agricultural Cyber-Physical System. 3979-3990 - Yufeng Wang
, Bo Zhang
, Jianhua Ma, Qun Jin
:
Earning While Learning: An Adversarial Multi-Armed Bandit Based Real-Time Bidding Scheme in Deregulated Electricity Market. 3991-4000 - Misbah Shafi, Rakesh Kumar Jha
:
Artificial Dust Based Attack Modelling: A Threat to the Security of Next Generation WCN. 4001-4016 - Juan Chen
, Xinru Li
, Xiaoqun Wu
, Ganbin Shen:
Prescribed-Time Synchronization of Complex Dynamical Networks With and Without Time-Varying Delays. 4017-4027 - Xianjun Han
, Huabin Wang
, Xuejun Li
, Hongyu Yang:
Pyramid Attention "Zero-Shot" Network for Single-Image Superresolution. 4028-4039 - Xiaoyu Chen, Yang Liu
, Jianquan Lu
, Jinde Cao
:
Weighted Directed $\hbar$-Index and Its Application. 4040-4050 - Chen Gao
, Zidong Wang
, Jun Hu
, Yang Liu
, Xiao He
:
Consensus-Based Distributed State Estimation Over Sensor Networks With Encoding-Decoding Scheme: Accommodating Bandwidth Constraints. 4051-4064 - Xuelei Qi
, Hong-Jun Ma
, Yuanwei Jing
:
A Novel Congestion Controller With Prescribed Settling Time for TCP/AQM Network System. 4065-4074 - Shijing Li
, Tian Lan
:
From Network Inference Errors to Utility Suboptimality: How Much Is the Impact? 4075-4086 - Yan Liu
, Zhiyu Yang, Hui Zhou
:
Periodic Self-Triggered Intermittent Control With Impulse for Synchronization of Hybrid Delayed Multi-Links Systems. 4087-4100 - Miao Dai
, Long Luo, Jing Ren, Hongfang Yu
, Gang Sun
:
PSACCF: Prioritized Online Slice Admission Control Considering Fairness in 5G/B5G Networks. 4101-4114 - Yingcheng Lai, Feng Chen
, Minyu Feng
, Jürgen Kurths
:
Online Distributed ADMM Algorithm With RLS-Based Multitask Graph Filter Models. 4115-4128 - Zizhen Zhang, Tengfei Cao
, Xiaoying Wang, Han Xiao
, Jianfeng Guan
:
VC-PPQ: Privacy-Preserving Q-Learning Based Video Caching Optimization in Mobile Edge Networks. 4129-4144 - Keke Zhang
, Xiaofeng Liao
, Qingguo Lü
:
Privacy-Protected Decentralized Dual Averaging Push With Edge-Based Correlated Perturbations Over Time-Varying Directed Networks. 4145-4158 - Xiang Li
, Jie Chen
, Quan Yuan
:
Adaptive Vertex Cover of Dynamical Networks With Prospect Theoretic Perspective. 4159-4170 - Nan Hou
, Zidong Wang
, Hongli Dong
, Jun Hu
, Xiaohui Liu
:
Sensor Fault Estimation for Nonlinear Complex Networks With Time Delays Under Saturated Innovations: A Binary Encoding Scheme. 4171-4183 - Jiyue Guo
, Zidong Wang
, Lei Zou
, Hongli Dong
:
Finite-Horizon $H_{\infty }$ State Estimation for Discrete Time-Varying Artificial Neural Networks: An Accumulation-Based Event-Triggered Mechanism. 4184-4197 - Haoyan Zhang
, Xudong Zhao
, Guangdeng Zong
, Ning Xu
:
Fully Distributed Consensus of Switched Heterogeneous Nonlinear Multi-Agent Systems With Bouc-Wen Hysteresis Input. 4198-4208 - Hanxiao Zhou
, Leishan Zhou
, Bin Guo
, Zixi Bai
, Zeyu Wang
:
Analyzing the Railway Operation Network by Evaluating the Importance of Time-Space Nodes. 4209-4219 - Yuchen Mu
, Navneet Garg
, Tharmalingam Ratnarajah
:
Federated Learning in Massive MIMO 6G Networks: Convergence Analysis and Communication-Efficient Design. 4220-4234 - Linhao Zhao
, Shiping Wen
, Chaojie Li, Kaibo Shi
, Tingwen Huang
:
A Recent Survey on Control for Synchronization and Passivity of Complex Networks. 4235-4254 - Yifan Sun
, Lulu Li
, Daniel W. C. Ho
:
Synchronization Control of Complex Dynamical Networks: Invariant Pinning Impulsive Controller With Asynchronous Actuation. 4255-4265 - Pei Zhang, Qingfeng Cheng
, Mingliang Zhang
, Xiangyang Luo
:
A Group Covert Communication Method of Digital Currency Based on Blockchain Technology. 4266-4276 - Zhiyong Li, Gang Chen
:
Distributed Dynamic Weighted Average Consensus for Disturbed Multiagent Systems in Fixed Time. 4277-4286 - Guangru Shao
, Xue-Fang Wang
, Maojiao Ye
, Rui Wang
:
Distributed Resilient Nash Equilibrium Seeking Under Network Attacks and Disturbances. 4287-4296 - Jian Chen
, Jianhui Shang, Jie Jia
, Yansha Deng
, Xingwei Wang
, Abdol-Hamid Aghvami
:
RACH Success Probability Analysis and Optimization in NB-IoT Networks. 4297-4309 - Anwesha Mukherjee
, Shreya Ghosh
, Debashis De
, Soumya K. Ghosh
:
MCG: Mobility-Aware Computation Offloading in Edge Using Weighted Majority Game. 4310-4321 - Mujeeb Ur Rehman
, Arslan Shafique
, Yazeed Yasin Ghadi
, Wadii Boulila
, Sana Ullah Jan, Thippa Reddy Gadekallu
, Maha Driss, Jawad Ahmad
:
A Novel Chaos-Based Privacy-Preserving Deep Learning Model for Cancer Diagnosis. 4322-4337 - Suoxia Miao
, Housheng Su
:
Second-Order Hybrid Consensus of Multi-Agent Systems With Matrix-Weighted Networks. 4338-4348 - Zhixun Zhang, Jianqiang Hu, Jianquan Lu, Jinde Cao, Fawaz E. Alsaadi:
Preventing False Data Injection Attacks in LFC System via the Attack-Detection Evolutionary Game Model and KF Algorithm. 4349-4362 - Prohim Tam
, Sa Math
, Seokhoon Kim
:
Optimized Multi-Service Tasks Offloading for Federated Learning in Edge Virtualization. 4363-4378 - Made Widhi Surya Atman
, Azwirman Gusrialdi
:
Finite-Time Distributed Algorithms for Verifying and Ensuring Strong Connectivity of Directed Networks. 4379-4392 - Xueying Ding
, Jianquan Lu
, Xiangyong Chen
:
Stabilization of Logical Dynamic Networks via Event-Triggered Switching Signals and Its Application. 4393-4402 - Simiao Chen, Qiang He
, Chensheng Zheng
, Lihong Sun, Xingwei Wang, Lianbo Ma
, Yuliang Cai
:
Differential Evolution Based Simulated Annealing Method for Vaccination Optimization Problem. 4403-4415 - Yilun Shang
:
Constrained Consensus in State-Dependent Directed Multiagent Networks. 4416-4425 - Shuying Zhang
, Zuyao Ni
, Linling Kuang
, Chunxiao Jiang
, Xu Zhao:
Load-Aware Distributed Resource Allocation for MF-TDMA Ad Hoc Networks: A Multi-Agent DRL Approach. 4426-4443 - Yuhan Xie
, Sanbo Ding
, Feisheng Yang
, Leimin Wang
, Xiangpeng Xie
:
Probabilistic-Constrained Distributed Set-Membership Estimation Over Sensor Networks: A Dynamic Periodic Event-Triggered Approach. 4444-4457 - Nadia Niknami
, Jie Wu
:
Entropy-KL-ML: Enhancing the Entropy-KL-Based Anomaly Detection on Software-Defined Networks. 4458-4467 - Ji-Hyeon Oh
, JoonYoung Lee
, MyeongHyun Kim
, Youngho Park
, Kisung Park
, Sungkee Noh:
A Secure Data Sharing Based on Key Aggregate Searchable Encryption in Fog-Enabled IoT Environment. 4468-4481

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.