


default search action
IEEE Transactions on Network and Service Management, Volume 22
Volume 22, Number 1, February 2025
- Malte Tashiro

, Emile Aben
, Romain Fontugne
:
Metis: Selecting Diverse Atlas Vantage Points. 3-14 - Cong Zhou

, Baokang Zhao
, Fengxiao Tang
, Biao Han
, Baosheng Wang:
Dynamic Multi-Objective Service Function Chain Placement Based on Deep Reinforcement Learning. 15-29 - Katalin Hajdú-Szücs

, Péter Vaderna, Zsófia Kallus
, Péter Kersch, János Márk Szalai-Gindl, Sándor Laki
:
Ensemble Graph Attention Networks for Cellular Network Analytics: From Model Creation to Explainability. 30-44 - Yong Xiao

, Jianxun Liu
, Guosheng Kang
, Buqing Cao
:
Group Feature Aggregation for Web Service Recommendations. 45-57 - Yacine Anser

, Chrystel Gaber
, Jean-Philippe Wary, Samia Bouzefrane
, Méziane Yacoub, Onur Kalinagac, Gürkan Gür:
Liability and Trust Analysis Framework for Multi-Actor Dynamic Microservices. 58-71 - Tailai Song

, Gianluca Perna
, Paolo Garza
, Michela Meo
, Maurizio Matteo Munafò:
Packet Loss in Real-Time Communications: Can ML Tame Its Unpredictable Nature? 72-91 - Linghao Wang

, Lu Lu
, Miao Wang
, Zhiqiang Li, Hongwei Yang, Shuyong Zhu, Yujun Zhang
:
SNS: Smart Node Selection for Scalable Traffic Engineering in Segment Routing Networks. 92-106 - Roberto Gonçalves Pacheco

, Divya J. Bajpai
, Mark Shifrin
, Rodrigo S. Couto
, Daniel Sadoc Menasché
, Manjesh K. Hanawal
, Miguel Elias M. Campista
:
UCBEE: A Multi Armed Bandit Approach for Early-Exit in Neural Networks. 107-120 - Behshid Shayesteh

, Chunyan Fu
, Amin Ebrahimzadeh
, Roch H. Glitho
:
Adaptive Feature Selection for Predicting Application Performance Degradation in Edge Cloud Environments. 121-138 - Yibo Zhang

, Xiangwang Hou
, Guoyu Du
, Qi Li
, Mian Ahmad Jan
, Alireza Jolfaei
, Muhammad Usman
:
Machine Learning-Based Reliable Transmission for UAV Networks With Hybrid Multiple Access. 139-150 - Yu-Zhen Janice Chen

, Daniel S. Menasché
, Don Towsley
:
On Collaboration in Distributed Parameter Estimation With Resource Constraints. 151-167 - Yuyang Zhou

, Guang Cheng
, Zhi Ouyang, Zongyao Chen
:
Resource-Efficient Low-Rate DDoS Mitigation With Moving Target Defense in Edge Clouds. 168-186 - Xu Yu

, Yan Lu, Feng Jiang
, Qiang Hu
, Junwei Du, Dunwei Gong
:
A Cross-Domain Intrusion Detection Method Based on Nonlinear Augmented Explicit Features. 187-197 - Jianhua Wang

, Xiaolin Chang
, Jelena V. Misic
, Vojislav B. Misic
, Lin Li
, Yingying Yao:
CRS-FL: Conditional Random Sampling for Communication-Efficient and Privacy-Preserving Federated Learning. 198-208 - Renato Souza Silva

, Luís Felipe M. de Moraes
:
GonoGo - Assessing the Confidence Level of Distribute Intrusion Detection Systems Alarms Based on BGP. 209-219 - Yonghan Wu

, Jin Li
, Min Zhang, Bing Ye
, Xiongyan Tang:
A Comprehensive and Efficient Topology Representation in Routing Computation for Large-Scale Transmission Networks. 220-241 - Jatinder Kumar, Deepika Saxena

, Jitendra Kumar, Ashutosh Kumar Singh, Athanasios V. Vasilakos
:
An Adaptive Evolutionary Neural Network Model for Load Management in Smart Grid Environment. 242-254 - Yujie Zhao

, Tao Peng
, Yichen Guo
, Yijing Niu
, Wenbo Wang
:
An Intelligent Scheme for Energy-Efficient Uplink Resource Allocation With QoS Constraints in 6G Networks. 255-269 - Yang Gao

, Jun Tao
, Zuyan Wang
, Yifan Xu
:
Analytical Scheduling for Selfishness Detection in OppNets Based on Differential Game. 270-283 - Qiyuan Fan

, Xue Li
, Puming Wang
, Xin Jin, Shaowen Yao
, Shengfa Miao, Sizhang Li
, Min An
, Jing Xu:
BDIP: An Efficient Big Data-Driven Information Processing Framework and Its Application in DDoS Attack Detection. 284-298 - Xiangshuo Zheng

, Wenting Shen
, Ye Su
, Yuan Gao:
DIADD: Secure Deduplication and Efficient Data Integrity Auditing With Data Dynamics for Cloud Storage. 299-316 - Ting Yu

, Zijian Gao
, Kele Xu
, Xu Wang
, Peichang Shi
, Bo Ding
, Dawei Feng
:
Dual Temporal Masked Modeling for KPI Anomaly Detection via Similarity Aggregation. 317-330 - Van Tong

, Cuong Dao
, Hai Anh Tran
, Duc Tran
, Huynh Thi Thanh Binh
, Nam-Thang Hoang
, Truong X. Tran
:
Encrypted Traffic Classification Through Deep Domain Adaptation Network With Smooth Characteristic Function. 331-343 - Yingjun Ye

, Ke Ruan, Weihao Yu
:
Evaluation and Optimization of Backbone Network Reliability Problems Using Decision Diagram Methods. 344-360 - Daniel Ayepah-Mensah

, Guolin Sun
, Gordon Owusu Boateng
, Guisong Liu
:
Federated Policy Distillation for Digital Twin-Enabled Intelligent Resource Trading in 5G Network Slicing. 361-379 - Jia Xu

, Xiao Liu
, Jiong Jin
, Wuzhen Pan, Xuejun Li
, Yun Yang
:
Holistic Service Provisioning in a UAV-UGV Integrated Network for Last-Mile Delivery. 380-393 - Qianwei Meng

, Qingjun Yuan
, Weina Niu
, Yongjuan Wang
, Siqi Lu
, Guangsong Li, Xiangbin Wang, Wenqi He:
IIT: Accurate Decentralized Application Identification Through Mining Intra- and Inter-Flow Relationships. 394-408 - Endri Goshi

, Fidan Mehmeti
, Thomas F. La Porta
, Wolfgang Kellerer
:
Modeling and Analysis of mMTC Traffic in 5G Core Networks. 409-425 - Hua Wang, Yanxian Bi, Fulong Yan

, Long Wang
, Jie Zhang
, Lena Wosinska
:
Multi-Beam Satellite Optical Networks: A Joint Time-Slot Resource Scheduling for End-to-End Services From a Networking Perspective. 426-438 - Redha A. Alliche

, Ramon Aparicio-Pardo
, Lucile Sassatelli
:
O-DQR: A Multi-Agent Deep Reinforcement Learning for Multihop Routing in Overlay Networks. 439-455 - Lifan Mei

, Jinrui Gou, Jingrui Yang, Yujin Cai, Yong Liu
:
On Routing Optimization in Networks With Embedded Computational Services. 456-469 - Lihui Zhang, Gang Sun

, Rulin Liu, Wei Quan
, Hongfang Yu
, Dusit Niyato
:
Priority-Dominated Traffic Scheduling Enabled ATS in Time-Sensitive Networking. 470-484 - Tamás Lévai

, Balázs Vass
, Gábor Rétvári:
Programmable Real-Time Scheduling of Disaggregated Network Functions: A Theoretical Model. 485-498 - Ailing Xiao

, Sheng Wu
, Yongkang Ou, Ning Chen
, Chunxiao Jiang
, Wei Zhang
:
QoE-Fairness-Aware Bandwidth Allocation Design for MEC-Assisted ABR Video Transmission. 499-515 - Xuwei Fan

, Zhipeng Cheng
, Ning Chen
, Lianfen Huang
, Xianbin Wang
:
QoE-Oriented Dependent Task Scheduling Under Multi-Dimensional QoS Constraints Over Distributed Networks. 516-531 - He Bai

, Hui Li
, Jianming Que, Abla Smahi, Minglong Zhang
, Peter Han Joo Chong
, Shuo-Yen Robert Li, Xiyu Wang, Ping Lu:
QSCCP: A QoS-Aware Congestion Control Protocol for Information-Centric Networking. 532-556 - Theodoros Giannakas

, Dimitrios Tsilimantos
, Apostolos Destounis
, Thrasyvoulos Spyropoulos:
Fast Edge Resource Scaling With Distributed DNN. 557-571 - Chang-Lin Chen

, Hanhan Zhou, Jiayu Chen
, Mohammad Pedramfar, Tian Lan, Zheqing Zhu, Chi Zhou, Pol Mauri Ruiz, Neeraj Kumar, Hongbo Dong, Vaneet Aggarwal
:
Learning-Based Two-Tiered Online Optimization of Region-Wide Datacenter Resource Allocation. 572-581 - Saksham Katwal

, Nidhi Sharma
, Krishan Kumar
:
A Deep Learning Approach for Throughput Enhanced Clustering and Spectrally Efficient Resource Allocation in Ultra-Dense Networks. 582-591 - Krishna Pal Thakur, Basabdatta Palit

:
A QoS-Aware Uplink Spectrum and Power Allocation With Link Adaptation for Vehicular Communications in 5G Networks. 592-604 - Na Lin

, Xiao Han, Ammar Hawbani
, Yunhe Sun, Yunchong Guan
, Liang Zhao
:
Deep Reinforcement Learning-Based Dual-Timescale Service Caching and Computation Offloading for Multi-UAV Assisted MEC Systems. 605-617 - Renchao Xie

, Wen Wen
, Wenzheng Wang
, Qinqin Tang
, Xiaodong Duan, Lu Lu
, Tao Sun
, Tao Huang
, Fei Richard Yu
:
Incentive Mechanism Design for Trust-Driven Resources Trading in Computing Force Networks: Contract Theory Approach. 618-634 - Merim Dzaferagic

, Bruno Missi Xavier, Diarmuid Collins, Vince D'Onofrio, Magnos Martinello, Marco Ruffini
:
ML-Based Handover Prediction Over a Real O-RAN Deployment Using RAN Intelligent Controller. 635-647 - Patrick Luiz de Araújo

, Murillo Guimarães Carneiro
, Luis M. Contreras
, Rafael Pasquini
:
MTP-NT: A Mobile Traffic Predictor Enhanced by Neighboring and Transportation Data. 648-659 - Hiba Hojeij

, Mahdi Sharara
, Sahar Hoteit
, Véronique Vèque
:
On Flexible Placement of O-CU and O-DU Functionalities in Open-RAN Architecture. 660-674 - Xiao He

, Shanchen Pang
, Haiyuan Gui, Kuijie Zhang, Nuanlai Wang
, Shihang Yu
:
Online Offloading and Mobility Awareness of DAG Tasks for Vehicle Edge Computing. 675-690 - Shachi Sharma

, Prakash Datt Bhatt
:
Performance Modeling of IoT-Cloud Gateway Under Diverse Traffic Characteristics. 691-701 - Zhaowei Zhang, Chunfeng Liu, Wenyu Qu, Zhao Zhao, Weisi Guo:

PRobust: A Percolation-Based Robustness Optimization Model for Underwater Acoustic Sensor Networks. 702-717 - Bing Tang

, Zhikang Wu, Wei Xu, Buqing Cao
, Mingdong Tang, Qing Yang:
TP-MDU: A Two-Phase Microservice Deployment Based on Minimal Deployment Unit in Edge Computing Environment. 718-731 - Subhrajit Barick

, Chetna Singhal
:
UAV-Assisted MEC Architecture for Collaborative Task Offloading in Urban IoT Environment. 732-743 - Reo Uneyama

, Takehiro Sato
, Eiji Oki
:
Flow Update Model Based on Probability Distribution of Migration Time in Software-Defined Networks. 744-759 - Yanfei Wu

, Liang Liang
, Yunjian Jia
, Wanli Wen
:
HFL-TranWGAN: Knowledge-Driven Cross-Domain Collaborative Anomaly Detection for End-to-End Network Slicing. 760-776 - Niloy Saha

, Nashid Shahriar
, Muhammad Sulaiman
, Noura Limam
, Raouf Boutaba
, Aladdin Saleh:
Monarch: Monitoring Architecture for 5G and Beyond Network Slices. 777-790 - Shimin Sun

, Xiangyun Liu
, Meiyu Wang, Ze Wang
, Li Han
:
Predictive Control Plane Balancing in SD-IoT Networks Based on Elitism Genetic Algorithm and Non-Cooperative Game Theory. 791-806 - Yahuza Bello

, Ahmed Refaey Hussein
:
Dynamic Policy Decision/Enforcement Security Zoning Through Stochastic Games and Meta Learning. 807-821 - Ehsan Nowroozi

, Imran Haider, Rahim Taheri
, Mauro Conti
:
Federated Learning Under Attack: Exposing Vulnerabilities Through Data Poisoning Attacks in Computer Networks. 822-831 - Bo Yang

, Liquan Chen
, Jiaorui Shen
, Huaqun Wang
, Yang Ma:
FHE-Based Publicly Verifiable Sealed-Bid Auction Protocol Atop Cross-Blockchain. 832-845 - Yin Wang

, Na Xia
, Bin Chen
, Yutao Yin
, Lei Chen
, Zijian Wang
, Sizhou Wei
, Ke Zhang
:
Flow Adjustment and Scale-Free Reliable Topology Control for Underwater Acoustic Sensor Networks. 846-859 - Xin Tang

, Luchao Jin
, Jing Bai
, Linjie Shi, Yudan Zhu
, Ting Cui:
Key Transferring-Based Secure Deduplication for Cloud Storage With Resistance Against Brute-Force Attacks. 860-876 - Zhengran Tian, Hao Wang

, Zhi Li
, Ziyu Niu, Xiaochao Wei
, Ye Su
:
MDTL: Maliciously Secure Distributed Transfer Learning Based on Replicated Secret Sharing. 877-891 - Muhammad Asghar Khan

, Neeraj Kumar
, Saeed Hamood Alsamhi
, Gordana Barb
, Justyna Zywiolek
, Insaf Ullah
, Fazal Noor
, Jawad Ali Shah, Abdullah Mohammed Almuhaideb
:
Security and Privacy Issues and Solutions for UAVs in B5G Networks: A Review. 892-912 - Ashutosh Dutta

, Ehab Al-Shaer
, Ehsan Aghaei, Qi Duan
, Hasan Yasar:
Security Control Grid for Optimized Cyber Defense Planning. 913-929 - Kai Zhao

, Xiaowei Chuo, Fangchao Yu, Bo Zeng
, Zhi Pang, Lina Wang
:
SplitAUM: Auxiliary Model-Based Label Inference Attack Against Split Learning. 930-940 - Hongping Gan

, Hejie Zheng
, Zhangfa Wu
, Chunyan Ma
, Jie Liu
:
TFD-Net: Transformer Deviation Network for Weakly Supervised Anomaly Detection. 941-954
Volume 22, Number 2, April 2025
- Kengo Tajiri

, Ryoichi Kawahara:
Optimization of Data and Model Transfer for Federated Learning to Manage Large-Scale Network. 958-973 - Zhenyu Fu, Juan Liu

, Yuyi Mao
, Long Qu
, Ling Fu Xie
, Xijun Wang
:
Energy-Efficient UAV-Assisted Federated Learning: Trajectory Optimization, Device Scheduling, and Resource Management. 974-988 - Lo-Yao Yeh

, Sheng-Po Tseng, Chia-Hsun Lu, Chih-Ya Shen
:
Auditable Homomorphic-Based Decentralized Collaborative AI With Attribute-Based Differential Privacy. 989-1004 - Xinlei Yu

, Yijing Lin
, Zhipeng Gao
, Hongyang Du
, Dusit Niyato
:
Dynamic and Fast Convergence for Federated Learning via Optimized Hyperparameters. 1005-1018 - Yingying Wu

, Bomin Mao
, Nei Kato
:
MSFL: Model-Safeguarded Federated Learning With Intelligent Reflecting Surface for Industrial Networks. 1019-1028 - Wathsara Daluwatta

, Ibrahim Khalil
, Shehan Edirimannage
, Mohammed Atiquzzaman
:
UaaS-SFL: Unlearning as a Service for Safeguarding Federated Learning. 1029-1045 - Abhijit Biswas, Subhrajyoti Deb

, Nirmalya Kar
, Joy Lal Sarkar
, Ayan Mondal
:
Event-Triggered Sliding Mode Controller for Cognitive Internet of Things. 1046-1054 - Aroosa Hameed

, John Violos
, Nina Santi
, Aris Leivadeas
, Nathalie Mitton
:
FeD-TST: Federated Temporal Sparse Transformers for QoS Prediction in Dynamic IoT Networks. 1055-1069 - Yanli Xu

, Zhou Kong
:
Joint Frame Preemption and Credit-Based Shaping Scheduling for Real-Time Transmission. 1070-1082 - Canghai Wu

, Lingdan Chen
, Huanliang Xiong, Jianwen Hu:
USMN-SCA: A Blockchain Sharding Consensus Algorithm With Tolerance for an Unlimited Scale of Malicious Nodes. 1083-1098 - Chengjie Li

, Lidong Zhu
, Zhen Zhang
:
Toward 6G Networks: Architecture and Strategy for Information Security Transmission Based on Multi-Source Heterogeneous Data. 1099-1107 - Sotirios T. Spantideas

, Anastasios E. Giannopoulos, Panagiotis Trakadas:
Smart Mission Critical Service Management: Architecture, Deployment Options, and Experimental Results. 1108-1128 - Curtis Rookard

, Anahita Khojandi
:
Unsupervised Machine Learning for Cybersecurity Anomaly Detection in Traditional and Software-Defined Networking Environments. 1129-1144 - Giannis Savva

, Konstantinos Manousakis
, Georgios Ellinas
:
A Network Coding Optimization Approach for Physical Layer Security in Elastic Optical Networks. 1145-1159 - Xingyu He

, Xiankai Li
, Guisong Yang
, Shi Chang, Jiehan Zhou
:
A Network Connectivity-Aware Reinforcement Learning Method for Task Exploration and Allocation. 1160-1173 - Yogita Pimpalkar

, Sharvari Ravindran
, Jyotsna Bapat
, Debabrata Das
:
A Novel E2E Path Selection Algorithm for Superior QoS and QoE for 6G Services. 1174-1187 - Yukti Kaura

, Brejesh Lall
, Ranjan K. Mallik
, Amit Singhal
:
Adaptive Scheduling of Shared Grant-Free Resources for Heterogeneous Massive Machine Type Communication in 5G and Beyond Networks. 1188-1204 - Jun Dai

, Xinbin Li
, Song Han
, Junzhi Yu
, Zhixin Liu
, Tongwei Zhang
:
An Extended Bandit-Based Game Scheme for Distributed Joint Resource Allocation in Underwater Acoustic Communication Networks. 1205-1218 - Navya Vuppalapati

, T. G. Venkatesh
:
Candidate Selection Algorithms for Hybrid IP/SDN Networks With Multi-Link Failures. 1219-1231 - Meng Sun

, Tao Zhang
, Liang Liu
:
Constellation Configuration Optimization Method for User Distribution Characteristics of LEO Satellite Networks. 1232-1246 - Qiang Tang

, Bao Li
, Halvin Yang
, Yan Li, Shiming He, Kun Yang
:
Delay and Load Fairness Optimization With Queuing Model in Multi-AAV Assisted MEC: A Deep Reinforcement Learning Approach. 1247-1258 - Xinyu Yuan

, Yan Qiao
, Zhenchun Wei
, Zeyu Zhang, Minyue Li, Pei Zhao, Rongyao Hu, Wenjing Li
:
Diffusion Models Meet Network Management: Improving Traffic Matrix Analysis With Diffusion-Based Approach. 1259-1275 - Omar Nassef

, Toktam Mahmoodi
, Federico Chiariotti
, Stephen H. Johnson:
DRel: Dynamically Assigning Per-Packet Reliability at the Transport Layer. 1276-1294 - Abdul Basit

, Muddasir Rahim
, Tri Nhu Do
, Nadir H. Adam
, Georges Kaddoum
:
DRL-Based Maximization of the Sum Cross-Layer Achievable Rate for Networks Under Jamming. 1295-1313 - Peiran Zhong

, Fanqin Zhou
, Lei Feng
, Wenjing Li
:
FINT: Freshness-Based In-Band Network-Wide Telemetry in Resource-Constrained Environments. 1314-1329 - Sharvari N. P

, Dibakar Das, Jyotsna Bapat
, Debabrata Das
:
Improved Q-Learning-Based Multi-Hop Routing for UAV-Assisted Communication. 1330-1344 - Jiangang Liu

, Hanjiang Luo
, Hang Tao
, Jiahong Liu
, Jiehan Zhou
:
JLOS: A Cooperative UAV-Based Optical Wireless Communication With Multi-Agent Reinforcement Learning. 1345-1356 - Parisa Fard Moshiri

, Murat Simsek
, Burak Kantarci
:
Joint Optimization of Completion Ratio and Latency of Offloaded Tasks With Multiple Priority Levels in 5G Edge. 1357-1371 - Nguyen Xuan Tung

, Trinh Van Chien
, Dinh Thai Hoang
, Won-Joo Hwang
:
Jointly Optimizing Power Allocation and Device Association for Robust IoT Networks Under Infeasible Circumstances. 1372-1390 - Xindi Hou

, Shuai Gao
, Ningchun Liu
, Fangtao Yao
, Bo Lei, Hongke Zhang
, Sajal K. Das
:
L3DML: Facilitating Geo-Distributed Machine Learning in Network Layer. 1391-1408 - Amit Dilip Patil

, Abdorasoul Ghasemi
, Hermann de Meer:
Optimal Redundant Sensor Placement for Protection Blinding in Active Distribution Grids. 1409-1419 - Ren-Hung Hwang

, Tsai-Ying Chou, Jia-You Lin
, Didik Sudyana
, Yuan-Cheng Lai
, Ying-Dar Lin
:
Optimal Resource Allocation for AIoT as a Service Under Various Service Scenarios and Architectures. 1420-1436 - Ruowen Yan

, Qiao Li
, Huagang Xiong
:
Optimizing Traffic Management in Airborne Power Line Communication Networks: A Credit-Based Shaping Approach Using Network Calculus. 1437-1449 - Madhu Donipati

, Ankur Jaiswal
, Abhishek Hazra
, Nabajyoti Mazumdar
, Jagpreet Singh:
Optimizing UAV-Based Data Collection in IoT Networks With Dynamic Service Time and Buffer-Aware Trajectory Planning. 1450-1460 - Xiaobo Fan

:
Path Selection via Mutual Coherence Optimization in Network Monitoring. 1461-1472 - Xiaonan Wang

, Yajing Song
:
Personalized Preference and Social Attribute-Based Data Sharing for Information-Centric IoT. 1473-1483 - Luis Velasco

, Gianluca Graziadei
, Sima Barzegar
, Marc Ruiz
:
Provisioning of Time-Sensitive and Non-Time-Sensitive Flows With Assured Performance. 1484-1499 - Abdulsamet Dagasan

, Ezhan Karasan
:
Resilient Multi-Hop Autonomous UAV Networks With Extended Lifetime for Multi-Target Surveillance. 1500-1513 - Tianhao Ouyang

, Haipeng Yao
, Wenji He
, Tianle Mai
, Fu Wang
, F. Richard Yu
:
Self-Adaptive Dynamic In-Band Network Telemetry Orchestration for Balancing Accuracy and Stability. 1514-1530 - Ahsan Raza Khan

, Habib Ullah Manzoor
, Rao Naveed Bin Rais
, Sajjad Hussain
, Lina S. Mohjazi
, Muhammad Ali Imran
, Ahmed Zoha
:
Semantic-Aware Federated Blockage Prediction (SFBP) in Vision-Aided Next-Generation Wireless Network. 1531-1543 - Vikash Kumar Bhardwaj, Gagan Mundada

, Omm Prakash Sahoo
, Mahendra Kumar Shukla
, Om Jee Pandey
:
SINR-Delay Constrained Node Localization in RIS-Assisted Time-Varying IoT Networks Using ML Frameworks. 1544-1557 - Guosheng Kang

, Hongshuai Ren
, Wanjun Chen, Jianxun Liu
, Buqing Cao
, Yu Xu
:
Web API Recommendation via Exploring Textual and Structural Semantics With Contrastive Learning and Joint Training. 1558-1568 - Saifullah Khalid

, Ishfaq Ahmad, Hansheng Lei:
A Consortium Blockchain-Based Approach for Energy Sharing in Distribution Systems. 1569-1582 - Zhiwei Wang

:
A Decentralized Oracle Network Constructed From Weighted Schnorr Multisignature. 1583-1593 - C. Venkatesan

, S. Jeevanantham
, Rebekka B.
:
A Lightweight Physical Layer Authentication-Based Blockchain Consensus Mechanism for Edge Networks. 1594-1607 - Longxia Huang

, Chengzhi Ge
, Xue Mao
, Shui Yu
:
DARB: Decentralized, Accountable and Redactable Blockchain for Data Management. 1608-1617 - Chaofeng Lin, Jinchuan Tang

, Shuping Dang
, Gaojie Chen
:
Priority-Based Blockchain Packing for Dependent Industrial IoT Transactions. 1618-1628 - Min An

, Xuan Zhang
, Jishu Wang
, Qiyuan Fan, Chen Gao, LinYu Li
, Cuizhen Lu, Nan Li, Yingchen Liu:
RLChain: A DRL Approach for Blockchain Performance Optimization Toward IIoT. 1629-1645 - Madhura Adeppady

, Alberto Conte
, Paolo Giaccone
, Holger Karl
, Carla-Fabiana Chiasserini
:
Dynamic Management of Constrained Computing Resources for Serverless Services. 1646-1663 - Haijie Wu

, Wangbo Shen
, Weiwei Lin
, Wei Li
, Keqin Li
:
End-Edge-Cloud Heterogeneous Resources Scheduling Method Based on RNN and Particle Swarm Optimization. 1664-1676 - Soyi Jung

, Jae-Hyun Kim
, Joongheon Kim
:
Intelligent Extra Resource Allocation for Cooperative Awareness Message Broadcasting in Cellular-V2X Networks. 1677-1689 - Xiang Xie

, Jianxun Liu
, Buqing Cao
, Qian Peng
, Shanpeng Liu
, Guosheng Kang
:
Service Recommendation Based on Multi-Level View Contrastive Learning. 1690-1702 - Hangfan Li

, Li Li, Shuaishuai Tan
, Xiaoxiong Zhong
, Sheng Zhang
:
A Multi-User Effective Computation Offloading Mechanism for MEC System: Batched Multi-Armed Bandits Approach. 1703-1715 - Bing Shi

, Zihao Chen:
A Stackelberg Game-Based Trajectory Planning Strategy for Multi-AAVs-Assisted MEC System. 1716-1726 - Yifei Zhu

, Lei Feng
, Fanqin Zhou
, Wenjing Li
:
An Adaptive Ensemble Learning Paradigm With Spatial-Temporal Feature Extraction for Wireless Traffic Prediction. 1727-1743 - Lei Feng

, Chaorui Liao, Yingji Shi
, Fanqin Zhou
:
Explainable and Energy-Efficient Selective Ensemble Learning in Mobile Edge Computing Systems. 1744-1759 - Shuqin Cao

, Libing Wu
, Rui Zhang
, Jianfeng Lu
, Dan Wu
, Zhuangzhuang Zhang
:
Hypergraph Attention Recurrent Network for Cellular Traffic Prediction. 1760-1774 - Maryam Bandali

, Jaume Rius i Riu, Andreas Lewitzki, Dibbendu Roy, James Gross
:
ML-Based Fault Management Automation in Large-Scale Fixed and Mobile Telecommunication Networks. 1775-1787 - Jiaxin Zeng

, Xiaobo Zhou
, Keqiu Li:
Resource-Efficient Joint Service Caching and Workload Scheduling in Ultra-Dense MEC Networks: An Online Approach. 1788-1800 - Cheng Ren

, Jinsong Gao
, Yu Wang
, Yaxin Li
:
A Fastformer Assisted DRL Method on Energy Efficient and Interference Aware Service Provisioning. 1801-1811 - Erison Ballasheni, Dritan Nace, Artur Tomaszewski, Alban Zyle

:
A Probabilistic Optimization Approach to the Equitable Controller Location Problem. 1812-1824 - Mohamed Abderrahmane Madani

, Fen Zhou
, Ahmed Meddahi
:
Deploying Disaster-Resilient Service Function Chains Using Adaptive Multi-Path Routing. 1825-1840 - Amina Hentati

, Amin Ebrahimzadeh
, Roch H. Glitho, Fatna Belqasmi
, Rabeb Mizouni
:
Deterministic and Dynamic Joint Placement and Scheduling of VNF-FGs for Remote Robotic Surgery. 1841-1858 - Hnin Pann Phyu

, Diala Naboulsi
, Razvan Stanica
:
ICE-CREAM: Multi-Agent Fully Cooperative Decentralized Framework for Energy Efficiency in RAN Slicing. 1859-1873 - Nemanja Ðeric

, Amir Varasteh
, Andreas Blenk
, Wolfgang Kellerer
:
NAGA: A Deterministic Programmable Network With Update Timing Guarantees. 1874-1888 - Tien Van Do

, Nam H. Do, Csaba Rotter
, T. V. Lakshman, Csaba Biró, Tamás Bérczes:
Properties of Horizontal Pod Autoscaling Algorithms and Application for Scaling Cloud-Native Network Functions. 1889-1898 - Dongliang Zhang

, Lei Wang
, Amin Rezaeipanah
:
Toward Deploying Parallelized Service Function Chains Under Dynamic Resource Request in Multi-Access Edge Computing. 1899-1910 - Ammar Kamal Abasi, Moayad Aloqaily

, Mohsen Guizani
:
6G mmWave Security Advancements Through Federated Learning and Differential Privacy. 1911-1928 - Adam Kadi

, Lyes Khoukhi
, Jouni Viinikka
, Pierre-Edouard Fabre:
Adapting to the Evolution: Enhancing Intrusion Detection Through Machine Learning in the QUIC Protocol Era. 1929-1944 - Taeyun Kim

, Joonwoo Kim
, Hochan Lee
, Seoyul Oh, Sangheon Pack
:
An Efficient Winner and Payment Determination Algorithm in Reverse Auction for Edge Federation. 1945-1954 - Yali Yuan

, Yangyang Du
, Guang Cheng
:
Class Incremental Website Fingerprinting Attack Based on Dynamic Expansion Architecture. 1955-1971 - Luyao Zou

, Quang Hieu Vo
, Kitae Kim
, Huy Q. Le
, Chu Myaet Thwal
, Chaoning Zhang
, Choong Seon Hong
:
Cyber Attacks Prevention Toward Prosumer-Based EV Charging Stations: An Edge-Assisted Federated Prototype Knowledge Distillation Approach. 1972-1999 - Ke Gu

, Yiming Zuo, Jingjing Tan
, Bo Yin
, Zheng Yang, Xiong Li
:
Dual-Layered Model Protection Scheme Against Backdoor Attacks in Fog Computing-Based Federated Learning. 2000-2016 - Xiaojun Zhang

, Qing Liu, Bingyun Liu, Yuan Zhang
, Jingting Xue
:
Dynamic Certificateless Outsourced Data Auditing Mechanism Supporting Multi-Ownership Transfer via Blockchain Systems. 2017-2030 - Gerald Budigiri

, Christoph Baumann
, Eddy Truyen
, Wouter Joosen
:
Elastic Cross-Layer Orchestration of Network Policies in the Kubernetes Stack. 2031-2058 - Saihua Cai

, Han Tang, Jinfu Chen
, Tianxiang Lv, Wenjun Zhao, Chunlei Huang:
GSA-DT: A Malicious Traffic Detection Model Based on Graph Self-Attention Network and Decision Tree. 2059-2073 - Junming Zhang

, Jingru Wang, Shigong Long, Yanen Li, Lun Wang:
Interval Mean Estimation Under (ε,δ)-Local Differential Privacy. 2074-2086 - Jiajie Shen

, Bochun Wu
, Wang Xiang, Sai Zou, Wenyong Wang
, Laizhong Cui
, Wei Ni:
Novel Bandwidth-Aware Network Coding for Fast Cloud-of-Clouds Disaster Backup. 2087-2105 - Qian Zhang

, Yi He
, Yue Xiao, Xiaoli Zhang
, Chunhua Song
:
OTA-Key: Over-the-Air Key Management for Flexible and Reliable IoT Device Provision. 2106-2119 - Liam Daly Manocchio, Yaying Chen

, Siamak Layeghy
, David Gwynne, Marius Portmann
:
P4-Secure: In-Band DDoS Detection in Software Defined Networks. 2120-2137 - Xun Liu

, Jian Yang
, Shuangwu Chen
, Huasen He
, Xiaofeng Jiang
:
PRFL: Achieving Efficient Robust Aggregation in Privacy-Preserving Federated Learning. 2138-2155 - Chenlu Zhang

, Takehiro Sato
, Eiji Oki
:
Robust Deployment Model for Parallelized Service Function Chains Against Uncertain Traffic Arrival Rates. 2156-2180 - Enio Marku, Colin Boyd, Gergely Biczók

:
SafeLib: A Comprehensive Framework for Secure Outsourcing of Network Functions. 2181-2198 - Qiang Fu

, Jiajia Liu
, Jiadai Wang
, Jiapeng Li
:
SecHARQ: A Secure Scheme for HARQ-Assisted NR V2X Communications. 2199-2213 - Meet Udeshi

, Prashanth Krishnamurthy
, Ramesh Karri
, Farshad Khorrami
:
Tamper-Proof Network Traffic Measurements on a NIC for Intrusion Detection. 2214-2224 - Jaidip Kotak

, Idan Yankelev
, Idan Bibi, Yuval Elovici
, Asaf Shabtai
:
VPN-Encrypted Network Traffic Classification Using a Time-Series Approach. 2225-2242 - Xingyu Yang

, Jipeng Hou
, Lei Xu
, Liehuang Zhu
:
zkFabLedger: Enabling Privacy Preserving and Regulatory Compliance in Hyperledger Fabric. 2243-2263
Volume 22, Number 3, June 2025
- Jie Zhang, Degan Zhang, Meng Qiao, E. Hong-Lin, Ting Zhang, Ping Zhang:

New Offloading Method of Computing Task Based on Gray Wolf Hunting Optimization Mechanism for the IOV. 2264-2277 - Eiji Oki

, Ryotaro Taniguchi, Kazuya Anazawa, Takeru Inoue
:
Design of Multiple-Plane Twisted and Folded Clos Network Guaranteeing Admissible Blocking Probability. 2278-2294 - Yu-Fang Chen, Frank Yeong-Sung Lin, Sheng-Yung Hsu, Tzu-Lung Sun, Yennun Huang

, Chiu-Han Hsiao
:
Adaptive Traffic Control: OpenFlow-Based Prioritization Strategies for Achieving High Quality of Service in Software-Defined Networking. 2295-2310 - Liang Feng

, Cunqing Hua
, Jianan Hong
:
Zero-Determinant Incentive Strategy for Transaction Trading in Blockchain System. 2311-2322 - Abderrafi Abdeddine

, Youssef Iraqi
, Loubna Mekouar
:
An Efficient Task Allocation in Mobile Crowdsensing Environments. 2323-2342 - Neha Sharma

, Mayank Swarnkar
, Divyanshu
:
DLAZE: Detecting DNS Tunnels Using Lightweight and Accurate Method for Zero-Day Exploits. 2343-2353 - Jialin Zhang

, Wei Liang
, Bo Yang
, Huaguang Shi
, Ying-Chang Liang
:
Minimizing Data Collection Latency for Coexisting Time-Critical Wireless Networks With Tree Topologies. 2354-2369 - Sayed M. Taheri, Achintha Ihalage

, Prateek Mishra
, Sean Coaker, Faris Muhammad, Hamed S. Al-Raweshidy
:
Domain Tailored Large Language Models for Log Mask Prediction in Cellular Network Diagnostics. 2370-2381 - Junwei Zhou

, Yuyang Gao, Ying Zhu
, Xiangtian Yu
, Yanchao Yang, Cheng Tan
, Jianwen Xiang
:
DRLLog: Deep Reinforcement Learning for Online Log Anomaly Detection. 2382-2395 - Xin Yang

, Yimin Guo
:
IAR-AKA: An Efficient Authentication Scheme for Healthcare Tactile Internet Beyond Conventional Security. 2396-2411 - Na Xia

, Lei Chen
, Meng Li
, Yutao Yin
, Ke Zhang
:
Joint Double Auction-Based Channel Selection in Wireless Monitoring Networks. 2412-2426 - Arad Kotzer, Bence Ladóczki, János Tapolcai

, Ori Rottenstreich
:
Addressing Scalability Issues of Blockchains With Hypergraph Payment Networks. 2427-2440 - Giampaolo Bovenzi

, Francesco Cerasuolo
, Domenico Ciuonzo
, Davide Di Monda
, Idio Guarino
, Antonio Montieri
, Valerio Persico
, Antonio Pescapè
:
Mapping the Landscape of Generative AI in Network Monitoring and Management. 2441-2472 - Xinrui Dong

, Yingxu Lai
, Xiao Zhang
, Xinyu Xu
:
Counteracting New Attacks in CPS: A Few-Shot Class-Incremental Adaptation Strategy for Intrusion Detection System. 2473-2488 - Jun Jiang

, Bin Wang
, Quan Tang
, Guoxiang Zhong
, Xuhao Tang
, Joel J. P. C. Rodrigues
:
Incremental Semi-Supervised Learning for Data Streams Classification in Internet of Things. 2489-2501 - Jing Mei

, Cuibin Zeng
, Zhao Tong
, Zhibang Yang
, Keqin Li
:
Stackelberg Game-Based Pricing and Offloading for the DVFS-Enabled MEC Systems. 2502-2515 - Gerald Tietaa Maale

, Noble Arden Elorm Kuadey
, Yeasin Arafat, Thomas Kwantwi
, Guolin Sun
, Guisong Liu
:
Multi-Task Learning for UAV Trajectory and Caching With Federated Cloud-Assisted Knowledge Distillation. 2516-2533 - Slawomir Hanczewski

, Maciej Stasiak
, Joanna Weissenberg
, Michal Weissenberg
:
Modeling of Heterogeneous 5G Network Slice for Smart Real-Time Railway Communications. 2534-2545 - Mengjie Guo

, Guochu Shou
, Yaqiong Liu
, Yihong Hu
:
An Enhanced Reconfiguration for Deterministic Transmission in Time-Sensitive Networks. 2546-2563 - Giulio Sidoretti

, Lorenzo Bracciale
, Stefano Salsano
, Hesham Elbakoury
, Pierpaolo Loreti
:
DIDA: Distributed In-Network Intelligent Data Plane for Machine Learning Applications. 2564-2579 - Giuseppe Ruggeri

, Marica Amadeo
, Claudia Campolo
, Antonella Molinaro
:
Optimal Placement of the Virtualized Federated Learning Aggregation Function at the Edge. 2580-2594 - Dev Gurung

, Shiva Raj Pokhrel
, Gang Li
:
Quantum Federated Learning for Metaverse: Analysis, Design, and Implementation. 2595-2606 - Abdullah Aljumah, Tariq Ahamed Ahanger

, Imdad Ullah:
Challenges in Securing UAV IoT Framework: Future Research Perspective. 2607-2629 - Ximin Li

, Xiaodong Xu
, Guo Wei, Xiaowei Qin
:
Unveiling Real-Time Stalling Detection for Video Streaming Traffic. 2630-2646 - Xuan Zheng

, Xiuli Ma
, Lifu Xu
, Yanliang Jin
, Chun Ke
:
Augmentation and Fusion: Multi-Feature Fusion-Based Self-Supervised Learning Approach for Traffic Tables. 2647-2662 - Jinghui Chen, Qingqing Cai, Gang Sun

, Hongfang Yu
, Dusit Niyato
:
CRP: A Cluster-Based Routing Protocol for Lightweight Nodes in Payment Channel Networks. 2663-2678 - Shoya Imanaka, Akio Kawabata

, Bijoy Chand Chatterjee
, Eiji Oki
:
Distributed Server Allocation for Internet-of-Things Monitoring Services With Preventive Start-Time Optimization Against Server Failure. 2679-2701 - Xiaochang Guo

, Gang Liu
, Haoyan Ling
, Lei Meng
, Tao Wang:
BECHAIN: A Sharding Blockchain With Higher Security. 2702-2714 - Rui Tang

, Ruizhi Zhang
, Yongjun Xu, Chuan Liu, Chongwen Huang
, Chau Yuen
:
Resource Allocation for Underwater Acoustic Sensor Networks With Partial Spectrum Sharing: When Optimization Meets Deep Reinforcement Learning. 2715-2730 - Panagiotis I. Nikolaidis

, John S. Baras
:
Robust Resource Sharing in Network Slicing via Hypothesis Testing. 2731-2746 - André V. S. Xavier

, Raul C. Almeida
, Leonardo Didier Coelho
, Joaquim F. Martins-Filho
:
Classification-Model Applied to Routing Problem in Flexible-Grid Optical Networks. 2747-2763 - Ruiwei Hou

, Fucai Zhou
, Qiang Wang, Zi Jiao, Jintong Sun, Zongye Zhang
:
Revokable Blockchain-Enabled Ranked Multi-Keyword Attribute-Based Searchable Encryption Scheme With Mobile Edge Computing for Vehicular. 2764-2779 - Kun Wu, Jiayuan Chen

, Lucheng Chen, Zili Liu, Changyan Yi
, Shuai Xu
, Junyi Wang
, Jiawen Kang
:
QoE-Aware Joint Visual and Haptic Signal Transmission With Adaptive Data Compression for Immersive Interactions in Human Digital Twin. 2780-2794 - Itamar Cohen

:
Bandwidth Efficient Cache Selection and Cache-Content Advertisement. 2795-2806 - Yiannis Papageorgiou

, Merkouris Karaliopoulos
, Kostas Choumas
, Iordanis Koutsopoulos
:
Joint Controller Placement and TDMA Scheduling in Software Defined Wireless Multihop Networks. 2807-2821 - Tianbo Wang

, Mengyao Liu
, Huacheng Li
, Lei Zhao
, Changnan Jiang, Chunhe Xia
, Baojiang Cui
:
ArchSentry: Enhanced Android Malware Detection via Hierarchical Semantic Extraction. 2822-2837 - Qifeng Liu, Qilin Fan

, Xu Zhang
, Xiuhua Li
, Kai Wang
, Qingyu Xiong:
DRL-Based Time-Varying Workload Scheduling With Priority and Resource Awareness. 2838-2852 - Huili Liu

, Yinglong Ma
, Chenqi Guo
, Xiaofeng Liu
, Tingdong Wang
:
MOHFL: Multi-Level One-Shot Hierarchical Federated Learning With Enhanced Model Aggregation Over Non-IID Data. 2853-2865 - Min Jia

, Liang Zhang
, Jian Wu
, Qing Guo
, Xuemai Gu
:
Asynchronous Federated Caching Strategy for Multi-Satellite Collaboration Based on Deep Reinforcement Learning. 2866-2881 - Lijun He

, Ziye Jia
, Juncheng Wang
, Erick Lansard, Zhu Han
, Chau Yuen
:
Joint Power Allocation and Task Scheduling for Data Offloading in Non-Geostationary Orbit Satellite Networks. 2882-2896 - Vikash Kumar Bhardwaj, Aagat Shukla, Om Jee Pandey

:
Energy-Efficient Node Localization in Time-Varying UAV-RIS-Assisted and Cluster-Based IoT Networks. 2897-2913 - Mengyuan Zhang

, Juan Fang
, Ziyi Teng
, Yaqi Liu
, Shen Wu
:
Joint DNN Partitioning and Task Offloading Based on Attention Mechanism-Aided Reinforcement Learning. 2914-2927
Volume 22, Number 4, August 2025
- Shashank Motepalli

, Hans-Arno Jacobsen
:
Decentralization in PoS Blockchain Consensus: Quantification and Advancement. 2930-2943 - Pavlos S. Bouzinis

, Panagiotis I. Radoglou-Grammatikis
, Ioannis Makris
, Thomas Lagkas
, Vasileios Argyriou
, Georgios Th. Papadopoulos
, Panagiotis G. Sarigiannidis
, George K. Karagiannidis
:
StatAvg: Mitigating Data Heterogeneity in Federated Learning for Intrusion Detection Systems. 2944-2955 - Yi-Han Xu

, Rong-Xing Ding
, Xiao-Ren Xu, Zhou Ding
, Wen Zhou
:
A DDPG Hybrid With Graph Scheme for Resource Management in Digital Twin-Assisted Biomedical Cyber-Physical Systems. 2956-2970 - Kai Peng

, Jialu Guo, Hao Wang
, Jintao He
, Zhiqing Zou, Tianping Deng, Menglan Hu
:
Delay-Aware Joint Microservice Deployment and Request Routing in Multi-Edge Environments Based on Reinforcement Learning. 2971-2986 - Pedro Martinez-Julia

, Ved P. Kafle
, Hitoshi Asaeda
:
Intelligent Network Service Automation: Improving Accuracy and Efficiency in Network Management. 2987-3002 - Qiaolun Zhang

, Omran Ayoub
, Ruikun Wang, Emanuele Viadana, Francesco Musumeci
, Massimo Tornatore
:
Capacity Sharing for Survivable Virtual Network Mapping Against Double-Link Failures. 3003-3015 - Alessandro Tundo

, Federica Filippini
, Francesco Regonesi, Michele Ciavotta
, Marco Savi
:
Decentralized Edge Workload Forecasting With Gossip Learning. 3016-3031 - Jaime Galán-Jiménez

, Marco Polverini
, Juan Luis Herrera
, Francesco Giacinto Lavacca
, Javier Berrocal
:
ELTO: Energy Efficiency-Load Balancing Trade-Off Solution to Handle With Conflicting Metrics in Hybrid IP/SDN Scenarios. 3032-3045 - Milan Groshev

, Lanfranco Zanzi
, Carmen Delgado
, Xi Li
, Antonio de la Oliva
, Xavier Costa-Pérez
:
Energy-Aware Joint Orchestration of 5G and Robots: Experimental Testbed and Field Validation. 3046-3059 - Qingwei Tang

, Wei Sun
, Zhi Liu
, Yang Xiao
, Qiyue Li
, Xiaohui Yuan
, Qian Zhang:
Multi-Agent Reinforcement Learning-Based Delay and Power Optimization for UAV-WMN Substation Inspection. 3060-3076 - Wei-Che Chien, Gwanggil Jeon

, Hsin-Hung Cho
:
Multi-Objective Optimization of 3-D Cell Deployment in Sustainable B5G/6G Networks: Balancing Performance and Sustainability. 3077-3091 - Luqi Wang

, Shanchen Pang
, Haiyuan Gui
, Xiao He
, Nuanlai Wang
, Sibo Qiao
, Zhiyuan Zhao
:
Sustainable Energy-Efficient Multi-Objective Task Processing Based on Edge Computing. 3092-3105 - Awaneesh Kumar Yadav

, Shalitha Wijethilaka
, Madhusanka Liyanage
:
Blockchain-Based Cross-Operator Network Slice Authentication Protocol for 5G Communication. 3106-3119 - Dahina Koulougli

, Kim Khoa Nguyen
, Mohamed Cheriet
:
Cost Optimization of FlexEthernet Over Elastic Optical Network Fronthaul Design. 3120-3137 - Takanori Hara

, Masahiro Sasabe
:
eBPF-Based Ordered Proof of Transit for Trustworthy Service Function Chaining. 3138-3149 - Tao Huang

, Jingyuan Liu
, Zheng Chang
, Yao Wei, Xu Zhao, Ying-Chang Liang
:
Energy Efficient Spectrum Sharing and Resource Allocation for 6G Air-Ground Integrated Networks. 3150-3161 - Mahdi Nouri

, Sima Sobhi-Givi
, Hamid Behroozi
, Mahrokh G. Shayesteh
, Md. Jalil Piran
, Zhiguo Ding:
Joint Slice Resource Allocation and Hybrid Beamforming With Deep Reinforcement Learning for NOMA-Based Vehicular 6G Communications. 3162-3178 - Feng Zhou

, Kefeng Guo
, Gaojian Huang
, Xingwang Li
, Evangelos K. Markakis
, Ilias Politis
, Muhammad Asif
:
Performance Evaluations for RIS-Aided Satellite Aerial Terrestrial Integrated Networks With Link Selection Scheme and Practical Limitations. 3179-3190 - Tingnan Bao

, Aisha Syed
, William Sean Kennedy
, Melike Erol-Kantarci
:
Sustainable Task Offloading in Secure UAV-Assisted Smart Farm Networks: A Multi-Agent DRL With Action Mask Approach. 3191-3200 - Hai Zhu, Xingsi Xue

, Mengmeng Xu, Byung-Gyu Kim
, Xiaohong Lyu
, Shalli Rani
:
Zero-Trust Blockchain-Enabled Secure Next-Generation Healthcare Communication Network. 3201-3212 - Jiajun Chen

, Chunqiang Hu
, Weihong Sheng
, Ruinian Li
, Ruifeng Zhao
, Jiguo Yu
:
A Trust-Based Personalized Differential Privacy Guarantees for Online Social Networks. 3213-3227 - Mohamed Elloumi

, Md. Zoheb Hassan
, Georges Kaddoum
:
Spectrum Sharing in Internet-of-Vehicles Networks: Digital Twin-Empowered Proactive Interference Management Approach. 3228-3248 - Mani Shekhar Gupta

, Akanksha Srivastava
, Krishan Kumar
:
PORA: A Proactive Optimal Resource Allocation Framework for Spectrum Management in Cognitive Radio Networks. 3249-3261 - Cyril Shih-Huan Hsu

, Jorge Martín-Pérez
, Danny De Vleeschauwer
, Luca Valcarenghi
, Xi Li
, Chrysa Papagianni
:
A Deep RL Approach on Task Placement and Scaling of Edge Resources for Cellular Vehicle-to-Network Service Provisioning. 3262-3280 - Shiming He

, Ying Zhang
, Diqing Liang
, Pradip Kumar Sharma
:
An Unsupervised Malicious Web Request Detection Based on Transformer and Contrastive Learning. 3281-3294 - Jing Zhu

, Dan Wang, Jiao Xing, Shuxin Qin, Gaofeng Tao
, Pingping Chen, Zuqing Zhu
:
Bilevel Optimization for Provisioning Heterogeneous Traffic in Deterministic Networks. 3295-3308 - Latif U. Khan

, Waseem Ullah
, Sami Muhaidat
, Mohsen Guizani
, Bechir Hamdaoui:
Block Successive Upper-Bound Minimization for Resource Scheduling in Wireless Metaverse. 3309-3324 - Xiaojie Zhang

, Saptarshi Debroy
, Peng Wang
, Keqin Li
:
DeepRB: Deep Resource Broker Based on Clustered Federated Learning for Edge Video Analytics. 3325-3340 - Wenjing Gao

, Jia Yu
:
Enabling Privacy-Preserving Top-k Hamming Distance Query on the Cloud. 3341-3354 - Shuaibing Lu

, Xin Jin
, Jie Wu
, Shuyang Zhou, Jackson Yang, Ran Yan, Haiming Liu
, Zhi Cai
:
Enhanced Multi-Stage Optimization of Dynamic QoS-Aware Service Caching and Updating in Mobile Edge Computing. 3355-3369 - Jinshui Wang

, Yao Xin
, Chongwu Dong
, Lingfeng Qu, Yiming Ding
:
ERPC: Efficient Rule Partitioning Through Community Detection for Packet Classification. 3370-3387 - Shengxiang Hu

, Guobing Zou
, Bofeng Zhang
, Shaogang Wu, Shiyi Lin
, Yanglan Gan
, Yixin Chen
:
GACL: Graph Attention Collaborative Learning for Temporal QoS Prediction. 3388-3402 - Antonino Angi

, Alessio Sacco
, Guido Marchetto
:
LLNet: An Intent-Driven Approach to Instructing Softwarized Network Devices Using a Small Language Model. 3403-3418 - Haiyuan Li

, Peizheng Li
, Karcius Day Rosario Assis
, Juan Marcelo Parra Ullauri
, Adnan Aijaz
, Shuangyi Yan
, Dimitra Simeonidou
:
NetMind+: Adaptive Baseband Function Placement With GCN Encoding and Incremental Maze-Solving DRL for Dynamic and Heterogeneous RANs. 3419-3432 - Ying-Dar Lin, Yin-Tao Ling

, Yuan-Cheng Lai
, Didik Sudyana
:
Reinforcement Learning for AI as a Service: CPU-GPU Task Scheduling for Preprocessing, Training, and Inference Tasks. 3433-3448 - Lingling Wang

, Zhengyin Zhang
, Mei Huang
, Keke Gai
, Jingjing Wang
, Yulong Shen
:
RoPA: Robust Privacy-Preserving Forward Aggregation for Split Vertical Federated Learning. 3449-3462 - Xueqi Peng

, Wenting Shen
, Yang Yang
, Xi Zhang
:
Secure Deduplication and Cloud Storage Auditing With Efficient Dynamic Ownership Management and Data Dynamics. 3463-3479 - Dana Haj Hussein

, Mohamed Ibnkahla
:
Toward Intelligent Intent-Based Network Slicing for IoT Systems: Enabling Technologies, Challenges, and Vision. 3480-3495 - Wenxian Li

, Pingang Cheng, Yong Feng
, Nianbo Liu
, Ming Liu
, Yingna Li
:
A Blockchain-Assisted Hierarchical Data Aggregation Framework for IIoT With Computing First Networks. 3496-3512 - Fuhao Yang, Hua Wu

, Xiangyu Zheng
, Jinfeng Chen, Xiaoyan Hu
, Jing Ren
:
A Detection Scheme for Multiplexed Asymmetric Workload DDoS Attacks in High-Speed Networks. 3513-3527 - Yi-Huai Hsu

, Chen-Fan Chang
, Chao-Hung Lee:
A DRL-Based Spectrum Sharing Scheme for Multi-MNO in 5G and Beyond. 3528-3541 - Hao Yang

, Liangmin Guo
, Taochun Wang
, Chengmei Lv:
A Novel Lightweight Dynamic Trust Evaluation Model for Edge Computing. 3542-3554 - Junfeng Tian

, Yiting Wang
, Yue Shen
:
A Security-Enhanced Certificateless Anonymous Authentication Scheme With High Computational Efficiency for Mobile Edge Computing. 3555-3572 - Karcius D. R. Assis

, Raul C. Almeida
, Hojjat Baghban
, Alex Ferreira dos Santos
, Raouf Boutaba
:
A Two-Stage Reconfiguration in Network Function Virtualization: Toward Service Function Chain Optimization. 3573-3585 - Kaijie Wang

, Zhicheng Bao
, Kaijun Liu
, Haotai Liang
, Chen Dong
, Xiaodong Xu
, Lin Li
:
Adaptive Bitrate Video Semantic Increment Transmission System Based on Buffer and Semantic Importance. 3586-3600 - Genxin Chen

, Jin Qi
, Jialin Hua, Ying Sun
, Zhenjiang Dong
, Yanfei Sun
:
AFAS: Arbitrary-Freedom Adaptive Scheduling for Multiworkflow Cloud Computing via Deep Reinforcement Learning. 3601-3616 - Cristian Zilli

, Alessio Sacco
, Flavio Esposito
, Guido Marchetto
:
ClearNET: Enhancing Transparency in Opaque Network Models Using Explainable AI (XAI) for Efficient Traffic Engineering. 3617-3631 - Akio Kawabata

, Sanetora Hiragi, Bijoy Chand Chatterjee
, Eiji Oki
:
Distributed Processing Network Design Scheme for Virtual Application Processing Platform. 3632-3645 - Chao Zha

, Zhiyu Wang
, Yifei Fan, Bing Bai
, Yinjie Zhang
, Sainan Shi
, Ruyun Zhang
:
DM-IDS - A Network Intrusion Detection Method Based on Dual-Modal Fusion. 3646-3661 - Yating Li

, Le Wang
, Liang Xue
, Jingwei Liu
, Xiaodong Lin
:
Efficient and Privacy-Enhancing Non-Interactive Periocular Authentication for Access Control Services. 3662-3675 - Vaishnavi Kasuluru

, Luis Blanco, Engin Zeydan:
Enhancing Open RAN Operations: The Role of Probabilistic Forecasting in Network Analysis. 3676-3691 - Jin-Xian Liu

, Jenq-Shiou Leu
:
ETCN-NNC-LB: Ensemble TCNs With L-BFGS-B Optimized No Negative Constraint-Based Forecasting for Network Traffic. 3692-3704 - Fangyu Zhang

, Yuang Chen
, Hancheng Lu
, Yongsheng Huang:
Network-Aware Reliability Modeling and Optimization for Microservice Placement. 3705-3720 - Zhenxing Chen

, Pan Gao, Teng-Fei Ding
, Zhi-Wei Liu
, Ming-Feng Ge
:
Practical Prescribed-Time Resource Allocation of NELAs With Event-Triggered Communication and Input Saturation. 3721-3731 - Soosan Naderi Mighan

, Jelena V. Misic
, Vojislav B. Misic
:
Probabilistic Analysis of Validator Lifecycle and Fork Resolution in Ethereum 2.0-Like PoS System. 3732-3742 - Retraction Notice A Hybrid Multistage DNN-Based Collaborative IDPS for High-Risk Smart Factory Networks. 3743

- (Withdrawn) Retraction Notice Communication-Efficient Personalized Federated Meta-Learning in Edge Networks. 3744

Volume 22, Number 5, October 2025
- Panagiotis Michalopoulos

, Odunayo Olowookere
, Nadia Pocher
, Johannes Sedlmeir
, Andreas G. Veneris, Poonam Puri:
Privacy and Compliance Design Options in Offline Central Bank Digital Currencies. 3748-3763 - Alessio Sacco, Kohei Shiomoto, Mohamed Faten Zhani, Guido Marchetto, Shahid Mumtaz, Michael Welzl, Ramón J. Durán Barroso:

Guest Editors' Introduction: Special section on Research Advances Toward Effective and Sustainable Next Generation Networks. 3764-3768 - Wei-Kuo Chiang

, Ting-Yu Wang, Yun-Fan Huang, Kun-Ting Liao:
A Quantitative Approach to Optimize 5GC Refactoring for Minimum Signaling Latency and Resource Allocation. 3769-3791 - Shiqi Zhang

, Mridul Gupta
, Behnam Dezfouli
:
Understanding Linux Kernel-Based Packet Switching on WiFi Access Points. 3792-3808 - Sergi Alcalá-Marín

, Dario Bega
, Marco Gramaglia
, Albert Banchs
, Xavier Costa-Pérez
, Marco Fiore
:
AZTEC+: Long- and Short-Term Resource Provisioning for Zero-Touch Network Management. 3809-3822 - Bo Pang

, Deyun Gao
, Xianchao Zhang
, Chuan Heng Foh
, Hongke Zhang
, Victor C. M. Leung
:
FR-SFCO: Energy-Aware Offloading on Data Plane for Delay-Sensitive SFC. 3823-3837 - Huanlin Liu

, Bing Ma, Jianjian Zhang
, Yong Chen
, Bo Liu, Haonan Chen, Di Deng:
Blockchain-Assisted Secure Embedding of Virtual Networks in Multi-Domain Elastic Optical Network. 3838-3848 - Fabio Busacca

, Sergio Palazzo
, Raoul Raftopoulos
, Giovanni Schembra
:
MANTRA: A Distributed MAB-Based Multi-Agent Framework for Latency- and Energy-Aware Offloading in Vehicular Networks. 3849-3865 - Chi Guo

, Cong Wang
, Qiuzhan Zhou
, Juan Li
:
A Bi-Level Scheme for Mixed-Motive and Energy-Efficient Task Offloading in Vehicular Edge Computing Systems. 3866-3881 - Nicola Di Cicco

, Gaetano Francesco Pittalà, Gianluca Davoli
, Davide Borsatti
, Walter Cerroni
, Carla Raffaelli
, Massimo Tornatore
:
Scalable and Energy-Efficient Service Orchestration in the Edge-Cloud Continuum With Multi-Objective Reinforcement Learning. 3882-3894 - Aren Alyahya

, David Tipper
, Amy Babay
:
Availability and Cost Analysis of Network-Attack-Resilient Byzantine Fault Tolerant Systems. 3895-3908 - Xiaoyan Dong

, Xiaoliang Chen
, Zuqing Zhu
:
On the Risk-Aware Connection Defragmentation in OCS-Based Data-Center Networks. 3909-3920 - Gabriele Gemmi

, Llorenç Cerdà-Alabern
, Leonardo Maccari
:
Next-Generation Wireless Backhaul Design for Rural Areas. 3921-3932 - Satoru Kobayashi

, Ryusei Shiiba
, Shinsuke Miwa
, Toshiyuki Miyachi, Kensuke Fukuda
:
Topology-Driven Configuration of Emulation Networks With Deterministic Templating. 3933-3946 - Luca Borgianni

, Davide Adami, Marina Bosi
, Stefano Giordano
, Chris Chafe
:
A Comprehensive Evaluation of Networked Music Performance Using LEO Satellite Internet: The Starlink Use Case. 3947-3963 - Alex Huang Feng

, Pierre François, Maxence Younsi, Stéphane Frénot, Thomas Graf, Wanting Du, Paolo Lucente, Ahmed Elhassany:
Detecting Service Disruptions in Large BGP/MPLS VPN Networks. 3964-3977 - Boubakr Nour

, Makan Pourzandi
, Mourad Debbabi
:
Threatify: APT Threat Variant Generation Using Graph-Based Machine Learning. 3978-3994 - Ippokratis Koukoulis

, Ilias Syrigos
, Apostolis Prassas
, Kostas Choumas
, Thanasis Korakis
:
Routing Optimization Under an SDN Architecture for 802.11 MANETs. 3995-4008 - Jian An

, Siyu Tang
, Ruyuan Ping
, Ran Li, Xin He, Xiaolong Jin
:
Fed-RDP: A Robust Federated Learning Framework for Multi-Party Decision-Making. 4009-4020 - Ke Chen

, Li Zhang
, Jihai Zhong
:
Space-Air-Ground Integrated Network (SAGIN) in Disaster Management: A Survey. 4021-4049 - Dan Tang

, Chenguang Zuo
, Jiliang Zhang
, Keqin Li
, Qiuwei Yang
, Zheng Qin
:
MARS: Defending TCP Protocol Abuses in Programmable Data Plane. 4050-4060 - Jinbin Hu

, Zikai Zhou, Jing Wang
:
Hierarchical Adaptive Learning-Based Congestion Control With Low Training Overhead for Datacenter Networks. 4061-4069 - Wentao Wang

, Jiangping Han
, Kaiping Xue
, Jiayu Yang
, Jian Li
, Qibin Sun
, Jun Lu
:
RGuide: Fast and Accurate Congestion Control Guided via Explicit Rate Control in Data Center Networks. 4070-4082 - Peng Zheng

, Jian Li
, Zhonghui Li
, Kaiping Xue
, Nenghai Yu
, Ruidong Li
, Qibin Sun
, Jun Lu
:
An Efficient and Robust Resource Allocation Method for Quantum Key Distribution Networks. 4083-4095 - Lan Kun

, Gaolei Li
, Wenkai Huang
, Jianhua Li
:
HFL-RD: Heterogeneous Federated Learning-Empowered Ransomware Detection via APIs and Traffic Features. 4096-4111 - Bijoy Chand Chatterjee

, Vinay Kumar
, Eiji Oki
:
Optimizing Virtual Network Embedding in Spectrally-Spatially Elastic Optical Networks: A Crosstalk-Aware Perspective. 4112-4125 - Hao Yin

, Changling Zhou
, Weiping Wen, Yiwei Liu
:
Fountain: DAG-Based Separate BFT Consensus Made Hashgraph Practical. 4126-4136 - Wenbo Zhang

, Jialin Dong
, Guangjie Han
, Yuchen Zhao
:
BDAFL: A Blockchain-Integrated Decentralized Asynchronous Federated Learning Algorithm in Industrial Internet. 4137-4154 - Chang Xing

, Ronald G. Addie
, Moshe Zukerman
:
GoS-Aware Optimization of a Multi-Layered Network for Cost Effectiveness and Fault Tolerance. 4155-4174 - Shiwen Zhang

, Feixiang Ren
, Wei Liang
, Kuanching Li
, Nam Ling
:
GPVO-FL: Grouped Privacy-Preserving and Verification-Outsourced Federated Learning in Cloud-Edge Collaborative Environment. 4175-4191 - Rafael Pires Orozco

, Jere Malinen, Pawani Porambage
, Pol Alemany
, Daniel Adanza Dopazo, Raul Muñoz
, Ricard Vilalta
, Pietro G. Giardina
, Michael De Angelis, Giada Landi
:
Intent-Based Service Provisioning and Closed-Loop Automation for Cobot Service Migration in a Multi-Stakeholder Environment. 4192-4205 - Chenxu Li

, Lei Feng
, Wenjing Li
, Fanqin Zhou
:
Long-Term Traffic Flow Prediction: A Knowledge-Driven Graph Attention Spatio-Temporal Network. 4206-4221 - Shun-Wen Hsiao

, Po-Yu Chu:
Attention-Enhanced Graph Convolution Network for Malware Family Feature Extraction and Embedding. 4222-4238 - Yizhi Huang, Jiayi Liu

, Chen Wang, Xuemei Xie
, Guangming Shi
:
Reconfiguring Satellite CDNs With Dynamic Uncertain User Requests Based on Multi-Agent DRL. 4239-4256 - Bing Xiong

, Guanglong Hu
, Songyu Liu, Jinyuan Zhao, Jin Zhang
, Baokang Zhao
, Keqin Li
:
TECache: Traffic-Aware Energy-Saving Cache With Optimal Utilization for TCAM Flow Tables in SDN Data Plane. 4257-4273 - Pengfei Zhang

, Junhuai Li
, Dong Ding
, Huaijun Wang
, Kan Wang
, Xiaofan Wang
:
A Two-Step Cellular Network Traffic Forecasting Method Integrating Decomposition and Deep Neural Networks Based on Bayesian Joint Parameter Optimization. 4274-4287 - Bing Tang

, Wei Xu, Li Zhang
, Buqing Cao
, Mingdong Tang
, Qing Yang:
Location-Aware Dynamic Scaling of Microservices in Mobile Edge Computing. 4288-4301 - Xiaowei Zhao

, Mingshu He
, Xiaojuan Wang
:
Semi-Supervised Learning With Interpolation and Pseudo-Labeling for Few-Label Intrusion Detection. 4302-4320 - Jiao Li

, Yuanhang Ning, Xiaoyu Song
:
A Novel Blockchain Transaction Sharding Scheme for Low Cross-Shard and Adaptive Load Balance. 4321-4335 - Zhichao Zhang

, Yanan Cheng
, Zhaoxin Zhang
, Xinran Liu, Ning Li
:
6Hound: An Efficient IPv6 DNS Resolver Discovery Model Based on Reinforcement Learning. 4336-4354 - Chenlu Zhang

, Akio Kawabata
, Eiji Oki
:
Robust Distributed Server Selection Model Against Delay Uncertainty. 4355-4375 - Marwan Dhuheir

, Aiman Erbad
, Ala I. Al-Fuqaha
, Bechir Hamdaoui, Mohsen Guizani
:
AoI-Aware Intelligent Platform for Energy and Rate Management in Multi-UAV Multi-RIS System. 4376-4393 - Yuan He, Yaqun Liu

, Jun Xie
:
A Distributed Approach for User Association and UAV Deployment in QoE-Aware Multi-UAV Networks. 4394-4406 - Numidia Zaidi, Sylia Zenadji

, Mohamed Amine Ouamri
, Daljeet Singh
, F. Hamida Abdelhak:
CARRAS: Combined AOA and RBFNN for Resource Allocation in Single Site 5G Network. 4407-4418 - Yukun Zhu

, Ruhui Ma
, Luyao Liu, Jin Cao
, Hui Li
, Xiaosong Zhang
:
Ultra-High-Speed Terminal Secure Access and Intragroup Authentication Scheme in Satellite Networks. 4419-4431 - Qingqing Cai, Jinghui Chen, Tingxuan Su

, Gang Sun
, Hongfang Yu
, Dusit Niyato
:
Transaction Scheduling Optimization With Bi-Directional Coordination in Payment Channels. 4432-4447 - Muhammad Sulaiman

, Mahdieh Ahmadi, Bo Sun
, Mohammad A. Salahuddin
, Raouf Boutaba
, Aladdin Saleh:
MicroOpt: Model-Driven Slice Resource Optimization in 5G and Beyond Networks. 4448-4462 - Zhe Sun

, Shangzhe Li, Lihua Yin
, Yahong Chen, Aohai Zhang, Meifan Zhang, Yuanyuan He
:
SuperMPFL: A Supermask-Based Mechanism for Personalized Federated Learning. 4463-4475 - Mansi Zhang, Chaklam Cheong

, Yue Cao
, Liqiang Zhang, Hai Lin
, Ahmed A. Abd El-Latif
:
A UAV-Assisted Traceable and Hierarchical Trust Management in VANET for Disaster Data Collection. 4476-4494 - Fabio Palmese

, Alessandro Enrico Cesare Redondi
, Matteo Cesana
:
Resource Optimization for Evidence Collection and Preservation in IoT Forensics-Ready Access Points. 4495-4508 - Makhduma F. Saiyed

, Irfan S. Al-Anbagi
:
A Game Theoretic Model for Strategic Defence Selection Against DDoS Attacks in IoT Networks. 4509-4524 - Heiko Geppert

, Frank Dürr
, Kurt Rothermel
:
Efficient Conflict Graph Creation for Time-Sensitive Networks With Dynamically Changing Communication Demands. 4525-4537 - Fan Zhang

, Pengfei Yu, Shaoyong Guo
, Weicong Huang
, Feng Qi
:
Computing Sandbox Driven Secure Edge Computing System for Industrial IoT. 4538-4550 - Seyed Salar Sefati

, Bahman Arasteh
, Simona Halunga
, Octavian Fratu
:
Adaptive Service Recommendation in Internet of Things Using a Reinforcement Learning and Optimization Algorithm. 4551-4576 - Hui Liu

, Xinjie Guan
, Xili Wan
, Fuliang Yang:
All-Time Dynamic Minimum Spanning Tree for Inter-Satellite Link Optimization in LEO Networks. 4577-4589 - Yang Shi

, Qiaoliang Ouyang, Yimin Li
, Jinkun Wang, Guodong Ye, Bowen Du
, Yanxiang Chen
, Jun Liu
, Jiayao Gao
:
SHBC-VDRM: Space-Hard Block Cipher for Video Digital Rights Management. 4590-4602 - Yuhao Hou

, Jiazheng Zou
, Licheng Wang
, Xijie Lu
, Xiuhua Lu
, Maoli Wang
:
PRBCP: Publicly Redactable Blockchain With Off-Chain Reputation-Based Consensus Protocol. 4603-4618 - Donglei Yuan

, Chi Jiang, Yuli Zhao
, Hai Yu
, Zhiliang Zhu
:
A Hybrid Data Plane SDN Architecture Based on Cloud-Native for Segment Routing Over IPv6. 4619-4635 - Qihao Bao

, Bixin Li
, Yujun Wang, Dongyu Cao
:
How Do Characteristic Parameters Affect the Security of Proof-of-Work Blockchain? 4636-4650 - Sergi Alcalá-Marín

, Weili Wu
, Aravindh Raman, Marcelo Bagnulo
, Ozgu Alay
, Fabián E. Bustamante
, Marco Fiore
, Andra Lutu
:
A Comparative Analysis of Global Mobile Network Aggregators. 4651-4667 - Jyoti Shokhanda

, Utkarsh Pal
, Aman Kumar
, Soumi Chattopadhyay
, Arani Bhattacharya
:
SafeTail: Tail Latency Optimization in Edge Service Scheduling via Redundancy Management. 4668-4680 - Elham Amini

, Jelena V. Misic
, Vojislav B. Misic
:
Paxos With Priorities for Blockchain Applications. 4681-4693 - Alexandros I. Papadopoulos

, Dimitrios Tyrovolas
, Antonios Lalas, Konstantinos Votis
, Stefan Schmid
, Sotiris Ioannidis, George K. Karagiannidis
, Christos K. Liaskos
:
On Modeling the RIS as a Resource: Multi-User Allocation and Efficiency-Proportional Pricing. 4694-4705 - Zhang Sheng

, Liangliang Song, Yanbin Wang
:
Dynamic Feature Fusion: Combining Global Graph Structures and Local Semantics for Blockchain Phishing Detection. 4706-4718 - Deyu Luo

, Gang Sun
, Mochan Fan
, Hongfang Yu
, Dusit Niyato
:
Scalable Storage Optimization for Blockchain-Based Cross-Domain Authentication in IoT. 4719-4731 - Hamza Mokhtar

, Xiaoqiang Di
, Zhengang Jiang
, Jing Chen
, Abdelrhman Hassan:
Efficient Spatiotemporal Prediction Transformer for Cooperative Satellite Remote Sensing. 4732-4746 - Gulshan Kumar

, Rahul Saha
, Mauro Conti
, Tai-Hoon Kim
:
DAWS: A Comprehensive Solution Against De-Anonymization Attacks in Blockchains. 4747-4761 - Philipp Gritsch

, Marco Cotrotzo, Sashko Ristov
:
Scale Interoperable Composite Backend Services With AFCL Workflows in Serverless Sky Computing. 4762-4774 - Arthur Selle Jacobs

, Ricardo José Pfitscher
, Rafael Hengen Ribeiro
, Lisandro Zambenedetti Granville
, Ronaldo Alves Ferreira
, Walter Willinger
, Sanjay G. Rao
:
Establishing Trust for Using Natural Language for Intent-Based Networking. 4775-4787 - Zhuoyue Fang

, Huiqun Yu
, Guisheng Fan
, Zengpeng Li
, Jiayin Zhang
:
Energy, Cost and Reliability-Aware Workflow Scheduling on Multi-Cloud Systems: A Multi-Objective Evolutionary Approach. 4788-4805 - Antonio Calagna

, Yenchia Yu
, Paolo Giaccone
, Carla-Fabiana Chiasserini
:
MOSE: A Novel Orchestration Framework for Stateful Microservice Migration at the Edge. 4827-4841 - Haotian Wang

, Jun Tao
, Yu Gao
, Dingwen Chi
, Yuehao Zhu
:
A Two-Way Auction Approach Toward Data Quality Incentive Mechanisms for Mobile Crowdsensing. 4842-4855 - Jiali Zheng

, Jiawen Li
:
MGRS-PBFT: An Optimized Consensus Algorithm Based on Multi-Group Ring Signatures for Blockchain Privacy Protection. 4856-4870 - Yuhang Liu

, Fanqin Zhou
, Lei Feng
, Wenjing Li
, Jing Gao
:
DINT-Based DWRR: Decentralized INT-Based Packet Scheduling Method for Multipath Communication. 4871-4883 - Junjun Li

, Shi Ying, Tiangang Li
, Xiangbo Tian
:
TraceDAE: Trace-Based Anomaly Detection in Microservice Systems via Dual Autoencoder. 4884-4897 - Jiasong Li

, Yunhe Cui
, Yi Chen
, Guowei Shen, Chun Guo, Qing Qian:
The DUDFTO Attack: Towards Down-to-UP Timeout Probing and Dynamically Flow Table Overflowing in SDN. 4898-4916 - Huaqing Tu

, Ziqiang Hua
, Qi Xu, Jun Zhu
, Tao Zou
, Hongli Xu
, Qiao Xiang
, Zuqing Zhu
:
Achieving Efficient SFC Proactive Reconfiguration Through Deep Reinforcement Learning in Programmable Networks. 4917-4932 - Yaoxu He

, Hongyan Li
, Peng Wang
:
Enhancing Throughput for TTEthernet via Co-Optimizing Routing and Scheduling: An Online Time-Varying Graph-Based Method. 4933-4949 - Jiangping Han

, Yitao Xing
, Jinhao Liu
, Kaiping Xue
, Jian Li
, David S. L. Wei
, Qibin Sun
, Jun Lu
:
From an In-Depth Understanding of Multipath TCP Enhancement Schemes to an Adaptive Control Framework in Wireless Networks. 4950-4963 - Ruopeng Geng

, Jianyuan Lu
, Chongrong Fang
, Shaokai Zhang, Jiangu Zhao, Zhigang Zong, Biao Lyu
, Shunmin Zhu, Peng Cheng
, Jiming Chen
:
Enabling Stateful TCP Performance Profiling With Key Event Capturing. 4964-4982 - Kiymet Kaya

, Elif Ak
, Eren Ozaltun
, Leandros Maglaras
, Trung Q. Duong
, Berk Canberk
, Sule Gündüz Ögüdücü:
Black Hole Prediction in Backbone Networks: A Comprehensive and Type-Independent Forecasting Model. 4983-4997 - Yasaman Haghbin

, Mohammad Hossein Badiei, Nguyen Hoang Tran
, Md. Jalil Piran
:
Resilient Federated Adversarial Learning With Auxiliary-Classifier GANs and Probabilistic Synthesis for Heterogeneous Environments. 4998-5014 - Xi Yao

, Fagui Liu
, Jun Jiang
, Guoxiang Zhong
, C. L. Philip Chen
:
Category-Constrained Broad Recurrent System for Cloud Anomaly Detection. 5015-5030 - Nilesh Kumar Jadav

, Sudeep Tanwar
:
FL-ORA: Optimized and Decentralized Resource Allocation Scheme for D2D Communication. 5031-5047 - Md Shahbaz Akhtar

, Mohit Kumar
, Md Iftekhar Alam, Aneek Adhya
:
XGS-PON-Standard Compliant DBA Algorithm for Option 7.x Functional Split-Based 5G C-RAN. 5048-5061 - Qiangqiang Shi

, Jin Liu
, Lai Wei
, Jiajia Jiao
, Bing Han
, Zhongdai Wu
:
SegCoT: Dependable Intrusion Detection System Based on Segment-Wise CoTransformer for Ship Communication Networks. 5062-5073 - Xu Liu

, Zhengyi Chai
, Yan-Yang Cheng, Yalun Li
, Tao Li
:
Evolutionary Multi-Objective Deep Reinforcement Learning for Task Offloading in Industrial Internet of Things. 5074-5089 - Xueling Wu, Long Qu

, Maurice Khabbaz
:
Energy and Interference-Aware Scheduling for Minimizing the Age of Aggregate Information in Multi-Hop IoT Networks. 5090-5105 - Zhangxuan Dang

, Yu Zheng, Xinglin Lian
, Chunlei Peng
, Qiuyu Chen, Xinbo Gao
:
Semi-Supervised Learning for Anomaly Traffic Detection via Bidirectional Normalizing Flows. 5106-5117 - Anna Prado

, Wolfgang Kellerer
, Fidan Mehmeti
:
α-Fair Mobility Management in 5G Networks. 5118-5136 - Wenjie Zhang

, Yi Liu, Hong Zhao
, Chai Kiat Yeo
:
Deep Reinforcement Learning-Based Contract Incentive and Computation Offloading for Mobile Edge Computing-Enabled Blockchain. 5137-5151 - Kashif Mehmood

, Katina Kralevska
, David Palma
:
Knowledge-Driven Intent Life-Cycle Management for Cellular Networks. 4806-4826
Volume 22, Number 6, December 2025
- Ayman Younis

, Chuanneng Sun
, Dario Pompili
:
Communication-Efficient Disaggregated and Distributed Federated Learning in NG-RANs. 5155-5166 - Mengyao Li, Noah Ploch, Sebastian Troia

, Carlo Spatocco, Wolfgang Kellerer
, Guido Maier
:
On the Optimization of Model Aggregation for Federated Learning at the Network Edge. 5167-5178 - Yaqin Xie

, Zhongyu Liu, Jianyue Zhu
, Yu Zhang
, Zhizhong Zhang
, Junmin Wu
:
A Fairness-Based Adaptive Explicit Congestion Control Protocol in Microburst Traffic Scenarios. 5179-5195 - ZhiBin Zuo

, De-Min Wang
, Mimi Ma
, Miaolei Deng
, Chun Wang:
An Adaptive Contention Window Backoff Scheme Differentiating Network Conditions Based on Deep Q-Learning Network. 5196-5210 - Yadi He, Zhou Wu

, Linfeng Liu
:
Deep Learning-Based Link Prediction Method Against Strong Sparsity for Mobile Social Networks. 5211-5222 - V. Maruthi

, Kunwar Singh:
Enhancing Security and Privacy of IoMT Data for Unconscious Patient With Blockchain. 5223-5238 - Menna Helmy

, Alaa Awad Abdellatif
, Naram Mhaisen
, Amr Mohamed
, Aiman Erbad
:
Slicing for AI: An Online Learning Framework for Network Slicing Supporting AI Services. 5239-5254 - Sheng Han

, Hong Zhu
, Qishui Zhong
, Kaibo Shi
, Yankai Cao
, Jianfeng Liu
:
An Edge-Based Adaptive Event-Triggered Network Transmission Scheme for Fully Distributed Power and Frequency Control of Islanded AC Microgrids. 5255-5269 - José Santos

, Bibin V. Ninan, Bruno Volckaert
, Filip De Turck
, Mays F. Al-Naday
:
A Comprehensive Benchmark of Flannel CNI in SDN/Non-SDN Enabled Cloud-Native Environments. 5270-5284 - Ding Li, Jing Lei

, Huaying Zhou
, Pengtao Liu
:
A Long and Short Term Network Security Situation Prediction Method Based on RSMHA. 5285-5300 - Ehsan Nowroozi

, Mohammadreza Mohammadi
, Ahmad Rahdari
, Rahim Taheri
, Mauro Conti
:
A Random Deep Feature Selection Approach to Mitigate Transferable Adversarial Attacks. 5301-5310 - Chunmao Jiang

, Xuan Wang:
A Task Affinity Scheduling Framework Based on Multidimensional Resource Fingerprints. 5311-5327 - Yan Wang

, Sheng Cao
, Jingwei Li
, Xiaosong Zhang
:
A Unified Framework for Hybrid Network Intrusion Detection. 5328-5347 - Shruti Mishra

, Sujata Pal
:
AMORA-Adaptive Multi-Objective Routing Algorithm in Payment Channel Networks. 5348-5359 - Akhirul Islam, Manojit Ghose

, Sudeep Pasricha
:
An RL-Based Framework for Task Offloading and Resource Allocation in Energy Harvesting-Based Multi-Access Edge Computing. 5360-5374 - Kang Liu

, Yaru Fu
, Guangping Xu
, Wenguang Zheng, Mingyuan Ding
, Yulei Wu
, Tony Q. S. Quek
:
Backhaul Traffic-Aware Edge Caching for Recommended Content With Personalized Privacy. 5375-5389 - Hao Guo

, Wanxin Li
, Collin Meese
, Yetong Wang
, Mark M. Nejad
:
Beyond Liability: Decentralized Forensics for Autonomous Vehicle Events via a Redactable Blockchain Approach. 5390-5403 - Feng Liu

, Zhenyu Li
, Chunfang Yang
, Daofu Gong
, Fenlin Liu
, Rui Ma
, Adrian G. Bors
:
BotCF: Improving the Social Bot Detection Performance By Focusing on the Community Features. 5404-5418 - Jia Xu

, Mengmeng Zhu
, Xiao Liu
, Xuejun Li
, Yun Yang
:
Cost-Aware Heterogeneous Service Placement Strategies for MEC-Based Uncrewed Delivery. 5419-5432 - Azadeh Azhdari

, Amin Ebrahimzadeh
, Carla Mouradian
, Róbert Szabó
, Roch H. Glitho:
Cost-Aware VNF Decomposition for VNF Forwarding Graph Embedding. 5433-5451 - Andrea Detti

, Ludovico Funari
:
Critical Limitations of the Least Outstanding Request Load Balancing Policy in Service Meshes for Large-Scale Microservice Applications. 5452-5463 - Peng Qin

, Yang Fu
, Zhigang Yu, Jing Zhang
, Zhou Lu:
Cross-Domain Resource Allocation for Information Retrieving Delay Minimization in UAV-Empowered 6G Network. 5464-5476 - Bo Yin

, Rongyao Rong
:
DATS: Scaling Out Blockchain With Deep-Learning-Powered Dynamic Sharding. 5477-5488 - Yingbo Fan, Yajie Li

, Carlos Natalino
, Jiaxing Guo, Wanping Wu, Rongrong Ruan, Wei Wang
, Yongli Zhao
, Jie Zhang
:
Distributed Model Training Task Migration for Hotspot Management in Intelligent Computing Center Interconnection With Tidal Characteristics. 5489-5502 - Muhammad Wasim Abbas Ashraf

, Shivanshu Shrivastava
, Om Jee Pandey
, Arvind R. Singh
, Khuhawar Arif Raza
:
DRL-Driven Optimal User Association and Load Balancing in Hybrid RF/LiFi-Based IoT Systems. 5503-5516 - Ziwang Wang

, Huili Yan, Zhize Wu
, Liang Wang
:
Efficient Cross-Shard Blockchain Atomic Submission Scheme Based on Pledge Transactions. 5517-5531 - Sankalp Mittal

, Praveen Tammana
:
Efficient In-Network Traffic Classification Using Programmable Switches With AdaFlow. 5532-5549 - Chongxiang Yao

, Chen Guo
, Weiguang Zhang
, Shengbo Chen
:
Efficient Optimization Algorithm for Virtual Backbone in Wireless Sensor Networks by Removing Redundant Dominators. 5550-5563 - Menaka Pushpa Arthur

, Ganesan Ramachandran, Keshav Sood
, Pavan Kaarthik, Srivarshinee Sridhar, Morshed Chowdhury:
Empirical Study of Hierarchical Intrusion Detection Systems for Unknown Attacks. 5564-5581 - Shixuan Xian

, Tuanfa Qin
, Ming Yan
, Wenhao Guo, Zhanyong Zhang, Weiyu Gu, Junjiang Chen, Yongle Hu:
Energy-Aware Deployment of Parallelized SFCs With Delay and Reliability Constraints for Smart Firefighting. 5582-5596 - Iwan Setiawan

, Binayak Kar
, Shan-Hsiang Shen
:
Energy-Efficient Softwarized Networks: A Survey. 5597-5618 - Fekri Saleh

, Abraham O. Fapojuwo
, Diwakar Krishnamurthy
:
eSlice: Elastic Inter-Slice Resource Allocation for Smart City Applications. 5619-5639 - Dániel Unyi

, Erno Rigó
, Bálint Gyires-Tóth
, Róbert Lovas
:
Explainable GNN-Based Approach to Fault Forecasting in Cloud Service Debugging. 5640-5657 - Saif Eddine Khelifa

, Miloud Bagaa, Oussama Bekkouche, Messaoud Ahmed Ouameur
, Adlen Ksentini
:
Extending WebAssembly for Deep-Learning Inference Across the Cloud Continuum. 5658-5674 - Cheng Long

, Haoming Zhang
, Zixiao Wang
, Yiming Zheng
, Zonghui Li
:
FastScheduler: Polynomial-Time Scheduling for Time-Triggered Flows in TSN. 5675-5689 - Shadi Moazzeni

, Zijie Huang
, Shah Zeb
, Xunzheng Zhang
, Juan Marcelo Parra Ullauri
, Anderson Bravalheri
, Rasheed Hussain
, Yulei Wu
, Xenofon Vasilakos
, Dimitra Simeonidou
:
Federated Intelligent Service Function Chain Orchestration in Future 6G Networks. 5690-5704 - Bo Mi

, Hangcheng Zou
, Darong Huang
:
FedPP: Privacy-Enhanced Federated Learning for Parameter Aggregation in Heterogeneous Intelligent Connected Vehicles. 5705-5722 - Xin Tong

, Shike Li, Ni Jin, Baojiang Cui
:
Fed-RWM: A Robust Watermarking Approach for Federated Learning Model Ownership Protection. 5723-5737 - Alisson Medeiros

, Antonio Di Maio
, Torsten Braun
:
FLATWISE: Flow Latency and Throughput Aware Sensitive Routing for 6DoF VR Over SDN. 5738-5755 - Osel Lhamo

, Tung V. Doan
, Elif Tasdemir
, Mahdi Attawna
, Giang T. Nguyen
, Patrick Seeling
, Martin Reisslein
, Frank H. P. Fitzek
:
FlexNC + RecNet: Flexible Network (Re)Coding in Cloud-Native 5G: Design and Testbed Measurements. 5756-5774 - Xiaoming He

, Zijing He, Wenyun Li
, Gang Liu
, Xuan Wei:
Framework for Real-Time Monitoring of Packet Loss Caused by Network Congestion. 5775-5787 - Lu Cao

, Lin Yao
, Weizhe Zhang
, Yao Wang:
HeavyFinder: A Lightweight Network Measurement Framework for Detecting High-Frequency Elements in Skewed Data Streams. 5788-5802 - Ahan Kak

, Van-Quan Pham
, Huu-Trung Thieu, Nakjung Choi
:
HexRAN: A Programmable Approach to Open RAN Base Station System Design. 5803-5821 - Mingyang Yu

, Haorui Yang
, Shengwei Fu
, Desheng Kong, Xiaoxuan Xu, Jun Zhang
, Jing Xu
:
Improved Coverage and Redundancy Management in WSN Using ENMDBO: An Enhanced Metaheuristic Solution. 5822-5839 - Jian Wang

, Delei Zhao, Guosheng Zhao
:
Incremental Survivability Enhancement in Mobile Crowdsensing Systems. 5840-5855 - Yuntao Hu

, Ming Chen
, Yinlu Wang
, Yihan Cang, Liqing Shan
, Zhiyang Li
:
Joint Optimal Allocation of Radio and Computational Resources Aiming at Minimizing Global Average Task Offloading Age for Long-Term Multi-Cell MEC Systems. 5856-5874 - Runze Wu

, Kai Wang
, Haobo Guo
, Yuxin Liu, Wenting Wang
, Jing Liu:
Joint Optimization Algorithm for Multi-Dimensional Wireless Communication Resources Adapt to Deterministic Monitoring of Power Distribution Areas. 5875-5886 - Xianchao Zhang

, Qinghua Zhang
, Jia Chen
, Deyun Gao
, Shuxiao Ye
, Hongke Zhang
:
Joint Optimization of Task Planning and Service Function Chain Scheduling in the UAVs Networks. 5887-5899 - Erhe Yang

, Zhiwen Yu
, Yao Zhang
, Helei Cui
, Zhaoxiang Huang
, Hui Wang, Jiaju Ren, Bin Guo
:
Joint Semantic Extraction and Resource Optimization in Communication-Efficient UAV Crowd Sensing. 5900-5914 - Ahmed Bannour

, Véronique Moeyaert
, Patrice Mégret
:
Latency Characterization and Performance Evaluation of Synchronized Daisy-Chain EtherCAT Networks Using Standard Cable Pairs and Open-Source Master Solutions. 5915-5926 - Zhijie Wang, Zhen Zhang

, Tengjiao He
, Hao Xie:
LPCD: A Parallel Candidate Deployment Strategy in Stateful Serverless Computing With Low Latency. 5927-5944 - Beibei Li

, Wei Hu
, Yiwei Li, Lemei Da
:
Modeling and Maximizing Network Reliability in Large Scale Infrastructure Networks: A Heat Conduction Model Perspective. 5945-5958 - Wen-Hsing Kuo

, Ming-Chin Hsu, Hsiao-Chun Wu
:
Novel Downlink Multiuser Resource-Allocation Scheme for Providing Layer-Encoded Multimedia Streams Using Massive MIMO Transmissions. 5959-5971 - Xin Wang

, Hong Shen
, Hui Tian
:
Optimal Partitioning of Traffic Demand for Coflow Scheduling in Hybrid Switches. 5972-5986 - Wei Lin, Chunyan Ma

, Jinong Li
, Zhe Zhang
, Hongping Gan
:
Optimized CQF Scheduling in TSN: A Formal Architecture-Based Neuro-Tabu Optimized Scheduling Algorithm. 5987-6000 - Bakkiam David Deebak

, Seong Oun Hwang
:
Privacy-Preserving Authentication With Service Analytics for Forensic-Aware Cyber-Physical Systems. 6001-6020 - Wei-Kun Chen

, Ya-Feng Liu
, Yu-Hong Dai
, Zhi-Quan Luo
:
QoS-Aware and Routing-Flexible Network Slicing for Service-Oriented Networks. 6021-6036 - Liang Feng

, Cunqing Hua
, Lingya Liu
, Jianan Hong
:
Quality and Diversity Balanced Neighbor Selection Against Eclipse Attack in Blockchain System. 6037-6047 - Anna Prado

, Fidan Mehmeti
, Wolfgang Kellerer
:
Reducing Mobility-Related Signaling With Network Sum Throughput Maximization in 5G. 6048-6065 - Shuangwu Chen

, Siyang Chen
, Yuxing Wei, Dong Jin
, Xiaobin Tan
, Xiaofeng Jiang, Jian Yang
:
RLpatch: A Robust Low-Overhead Website Fingerprinting Defense Method Based on Reinforcement Learning Within Sensitive Regions. 6066-6082 - Mahmoud Abouyoussef

, Muhammad Ismail
, Mostafa F. Shaaban
:
Secure and Semi-Decentralized Blockchain-Based Privacy-Preserving Networking Strategy for Dynamic Wireless Charging of EVs. 6083-6096 - Wenjun Fan

, Na Fan
, Junhui Zhang, Jia Liu
, Yifan Dai
:
Securing VNDN With Multi-Indicator Intrusion Detection Approach Against the IFA Threat. 6097-6111 - Zhuolun Li

, Srijoni Majumdar
, Evangelos Pournaras
:
Send Message to the Future? Blockchain-Based Time Machines for Decentralized Reveal of Locked Information. 6112-6127 - Shabnam Seradji

, Ahmad Khonsari
, Vahid Shah-Mansouri
, Mahdi Dolati
, Masoumeh Moradian
:
Sensify: A Learning-Based Budget-Aware Task Assignment in Mobile Crowdsensing. 6128-6142 - Sihyun Choi

, Taewoo Kang, Subin Huh
, Sung-Guk Yoon
, Saewoong Bahk
:
SHIFT: Multi-Agent Reinforcement Learning for Spatiotemporal Mobile Traffic Shaping via Dynamic Pricing. 6143-6158 - Mounir Bensalem

, Admela Jukan
:
Signaling Rate and Performance of RIS Reconfiguration and Handover Management in Next Generation Mobile Networks. 6159-6176 - Qian Lu

, Zaiting Xu
, Hanlin Zhang
, Hequn Xian
:
SLIoTDI: Scalable and Lightweight IoT Device Identification With Session-Level Grayscale Fingerprinting and Adversarial Training. 6177-6189 - Kaimin Wei

, Guozi Qi
, Lin Cui
, Jinpeng Chen
, Xiaohui Chen, Ke Xu:
Stable Task Allocation in Mobile Crowdsensing: An Interruption-Driven Approach. 6190-6199 - Jianan Huang

, Weiwei Liu
, Guangjie Liu
, Bo Gao
, Fengyuan Nie
, Marco Mellia
:
STAP: Leveraging State-Transition Adversarial Perturbations for Asymmetric Website Fingerprinting Defenses. 6200-6214 - Shiwen Zhang

, Wen Zhang, Wei Liang
, Wenqiang Jin
, Keqin Li
:
StorSec: A Comprehensive Design for Securing the Distributed IoT Storage Systems. 6215-6228 - Amit Kumar Bhuyan

, Hrishikesh Dutta
, Subir Biswas
:
Top-k Multi-Armed Bandit Learning for Content Dissemination in Swarms of Micro-UAVs. 6229-6244 - Ori Mazor

, Ori Rottenstreich
:
Understanding the Blockchain Interoperability Graph Based on Cryptocurrency Price Correlation. 6245-6259 - Huigyu Yang

, JeongJun Park
, Syed M. Raza
, Moonseong Kim
, Min Young Chung
, Hyunseung Choo
:
Urban Mobile Data Prediction With Geospatial Clustering and Dual Residual Learning. 6260-6273

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














