![](https://dblp.uni-trier.de./img/logo.320x120.png)
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
IEEE Networking Letters, Volume 6
Volume 6, Number 1, March 2024
- You Zhao
, Yuchao Zhu
, Shaowei Wang
:
User Scheduling in Wireless Networks for Deterministic Service: An Efficient Genetic Algorithm Method. 1-5 - Xiaojun Zhu
, Jiao Tang
:
NB-SSH: NB-IoT-Based Remote SSH Access to UAVs Under Symmetric NAT. 6-10 - Marius Corici
, Fabian Eichhorn
, Thomas Magedanz:
Organic 6G Continuum Architecture: A Uniform Control Plane Across Devices, Radio, and Core. 11-15 - Yingqi Li
, Mingxiang Hao
, Xiaochuan Sun
, Haijun Zhang
:
Modeling Super-Lightweight Cellular Traffic Prediction via Multiservice and Multimodal Feature Fusion Network. 16-20 - Maryam Salamatmoghadasi
, Amir Mehrabian, Halim Yanikomeroglu
:
Energy Sustainability in Dense Radio Access Networks via High Altitude Platform Stations. 21-25 - Junfei Zhan, Jiayi Wu, Tengjiao He
, Kwan-Wu Chin
:
Task Offloading and Approximate Computing in Solar Powered IoT Networks. 26-30 - Moyukh Laha
, Dibbendu Roy
, Sourav Dutta
, Goutam Das
:
AI-Assisted Improved Service Provisioning for Low-Latency XR Over 5G NR. 31-35 - Davide Borsatti
, Gianluca Davoli
, Federico Tonini
, Walter Cerroni
, Carla Raffaelli
, Wint Yi Poe, Riccardo Trivisonno
:
Hierarchical Management Algorithms for Highly Reliable Communication in 6G Industrial Environments. 36-40 - Sonu Rathi
, Jorge F. Schmidt, Udo Schilcher
, Siddhartha S. Borkotoky
:
Energy-Aware Relaying in Dense LoRa Networks With Heterogeneous Batteries. 41-45 - Avijit Gayen, Sukriti Santra
, Ayush Dey
, Angshuman Jana
:
A Network Model to Study the Underlying Characteristics of Phishing Sites. 46-49 - Gianmarco Baldini
, Kandeepan Sithamparanathan
:
Intrusion Detection System for MIL-STD-1553 Based on Convolutional Neural Networks With Binary Images and Adaptive Quantization. 50-54 - Fabio David
, José Ferreira de Rezende
, Valmir C. Barbosa
:
Exact Solution of the Full RMSA Problem in Elastic Optical Networks. 55-59 - Haruto Taka
, Takeru Inoue
, Eiji Oki
:
Twisted and Folded Clos-Network Design Model With Two-Step Blocking Probability Guarantee. 60-64 - Martin Slabber
, Neco Ventura
, Joyce B. Mwangama
:
SDN-Based Multicast Traffic Engineering for Radio Telescope Data Networks. 65-69 - Sonu Rathi
, Siddhartha S. Borkotoky
:
Energy and Delay Efficient Fountain-Coded File Transfer Assisted by Unreliable Feedback. 70-74
Volume 6, Number 2, June 2024
- Zahra Mohammadi
, Mohadeseh Soleimanpour-Moghadam
, Siamak Talebi
, Hamed Ahmadi
:
Shared Spectrum Cooperative Networks: A Linear Programming-Based Approach. 77-81 - Mathias Thorsager
, Israel Leyva-Mayorga
, Beatriz Soret
, Petar Popovski
:
Generative Network Layer for Communication Systems With Artificial Intelligence. 82-86 - Biao Zhou
, Xuan Su
, Min Pang
, Le Yang
:
Interval Hyperbolic Localization Based on Iterative Contraction for Cellular Networks. 87-91 - Qiong Wu
, Le Kuai
, Pingyi Fan
, Qiang Fan
, Junhui Zhao
, Jiangzhou Wang
:
Blockchain-Enabled Variational Information Bottleneck for IoT Networks. 92-96 - Washim Uddin Mondal
, Veni Goyal
, Satish V. Ukkusuri
, Goutam Das
, Di Wang
, Mohamed-Slim Alouini
, Vaneet Aggarwal
:
Near-Perfect Coverage Manifold Estimation in Cellular Networks via Conditional GAN. 97-100 - Diogo Pereira
, Rodolfo Oliveira
, Daniel Benevides da Costa
, Hyong Kim:
Performance Analysis of Slotted-Aloha With Mandatory Access and Retries in a Finite Frame. 101-105 - Marc Jayson Baucas
, Petros Spachos
:
Secure Private Blockchain-Based Instant Messaging Platform for Social Media Services. 106-109 - Alex Piccioni
, Andrea Marotta
, Claudia Rinaldi
, Fabio Graziosi
:
Enhancing Mobile Networks for Urban Air Mobility Connectivity. 110-114 - Anne Bouillard
:
Admission Shaping With Network Calculus. 115-118 - Natchanon Luangsomboon
, Jörg Liebeherr
:
Necessary and Sufficient Condition for Triggering ECN Before PFC in Shared Memory Switches. 119-123 - Han Zhang
, Halvin Yang
, Guopeng Zhang
:
Price-Discrimination Game for Distributed Resource Management in Federated Learning. 124-128 - Upendra Prajapati
, Bijoy Chand Chatterjee
, Amit Banerjee
:
FractionalLB: Controller Load Balancing Using Fractional Switch Migration in Software-Defined Networks. 129-133 - Pranava Singhal
, Shashi Raj Pandey
, Petar Popovski
:
Greedy Shapley Client Selection for Communication-Efficient Federated Learning. 134-138 - Anmol Kumar
, Gaurav Somani
, Mayank Agarwal
:
Comparing HAProxy Scheduling Algorithms During the DDoS Attacks. 139-142 - Akio Kawabata
, Bijoy Chand Chatterjee
, Eiji Oki
:
DSND: Delay-Sensitive Network Design Scheme for Multi-Service Slice Networks. 143-147 - Qingjun Yuan
, Weina Niu
, Yongjuan Wang
, Gaopeng Gou, Bin Lu
:
Malicious Traffic Detection With Noise Labels Based on Cross-Modal Consistency. 148-151 - Ammar Ibrahim El Sayed
, Mahmoud Abdelaziz
, Mohamed Hussein
, Ashraf D. Elbayoumy
:
DDoS Mitigation in IoT Using Machine Learning and Blockchain Integration. 152-155
Volume 6, Number 3, September 2024
- Rashika Raina
, David E. Simmons
, Nidhi Simmons
, Michel Daoud Yacoub
:
Optimal Classifier for an ML-Assisted Resource Allocation in Wireless Communications. 158-162 - Solomon Orduen Yese
, Sara Berri
, Arsenia Chorti
:
Efficient Online Slice Admission Control Scheme in Next Generation Networks. 163-167 - Anastasios C. Politis
, Constantinos S. Hilas
:
Throughput and Delay Performance of Slotted Aloha in SmartBANs Under Saturation Conditions. 168-172 - Yousef N. Shnaiwer
, Megumi Kaneko
:
A Risk-Averse Outage Probability Minimization Method for RIS-Aided RSMA Systems. 173-178 - Shirwan Piroti
, Ashima Chawla
, Tahar Zanouda
:
Mobile Network Configuration Recommendation Using Deep Generative Graph Neural Network. 179-182 - Omid Abbasi
, Georges Kaddoum
:
Channel Aging-Aware LSTM-Based Channel Prediction for Satellite Communications. 183-187 - Weibiao Tian, Ye Li
, Jinwei Zhao
, Sheng Wu
, Jianping Pan
:
An eBPF-Based Trace-Driven Emulation Method for Satellite Networks. 188-192 - Murat Arda Onsu, Poonam Lohan, Burak Kantarci
, Emil Janulewicz
, Sergio Slobodrian:
Unlocking Reconfigurability for Deep Reinforcement Learning in SFC Provisioning. 193-197 - Ayaka Oki, Yukio Ogawa
, Kaoru Ota
, Mianxiong Dong
:
Evaluation of Applying Federated Learning to Distributed Intrusion Detection Systems Through Explainable AI. 198-202 - Yanzhuo Jiang
, Xueman Wang
, Yingxu Lai
, Yipeng Wang
:
A Packet Sequence Permutation-Aware Approach to Robust Network Traffic Classification. 203-207 - Mohamed el Shehaby
, Aditya Kotha, Ashraf Matrawy
:
Introducing Adaptive Continuous Adversarial Training (ACAT) to Enhance Machine Learning Robustness. 208-212
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.