


default search action
Peer-to-Peer Networking and Applications, Volume 15
Volume 15, Number 1, January 2022
- K. Mohaideen Pitchai:
Determination of energy efficient optimal sojourn location of mobile sinks in clustered corona-based wireless sensor networks. 1-12 - S. Shiny, J. Jasper
:
Decentralized access control technique with multi-tier authentication of user for cloud storage. 13-27 - Hua-Rui Wu, Huaji Zhu
, Xiao Han:
An improved k-angle coverage algorithm for multimedia wireless sensor networks based on two-layer tabu search. 28-44 - Elham Moridi, Majid Haghparast
, Mehdi Hosseinzadeh, Somayyeh Jafarali Jassbi:
A novel hierarchical fault management framework for wireless sensor networks: HFMF. 45-55 - Jianlong Liu, Jiaye Wen, Lixia Lin, Wen'an Zhou:
Double agents-DQL based D2D computing-offloading for SHVC. 56-76 - Abdul Saboor
, Ahmad Kamil Mahmood, Abdullah Hisam Omar, Mohd Fadzil Hassan
, Syed Nasir Mehmood Shah, Ali Ahmadian
:
Enabling rank-based distribution of microservices among containers for green cloud computing environment. 77-91 - Tanakorn Karode
, Warodom Werapun
:
Robustness against fraudulent activities of a blockchain-based online review system. 92-106 - C. Suganthi Evangeline
, Vinoth Babu Kumaravelu
:
A two-phase fuzzy based access network selection scheme for vehicular ad hoc networks. 107-133 - Yaoguang Lu
, Xingwei Wang, Bo Yi, Min Huang:
The reliable routing for software-defined vehicular networks towards beyond 5G. 134-148 - Jiefan Qiu
, Zonghan Hua, Lei Liu, Mingsheng Cao, Dajiang Chen:
Machine-learning-based cache partition method in cloud environment. 149-162 - Duc V. Nguyen, Giang L. Nguyen
, Thang T. Nguyen, Anh H. Ngo, Giang T. Pham:
MINAD: Multi-inputs Neural Network based on Application Structure for Android Malware Detection. 163-177 - Mohammed B. M. Kamel
, Péter Ligeti, Adam Nagy, Christoph Reich
:
Distributed Address Table (DAT): A Decentralized Model for End-to-End Communication in IoT. 178-193 - Zheyi Chen
, Hongqiang Zheng, Jianshan Zhang
, Xianghan Zheng, Chunming Rong
:
Joint computation offloading and deployment optimization in multi-UAV-enabled MEC systems. 194-205 - Vidyotma Thakur
, Gaurav Indra, Nitin Gupta
, Pushpita Chatterjee, Omar Said
, Amr Tolba
:
Cryptographically secure privacy-preserving authenticated key agreement protocol for an IoT network: A step towards critical infrastructure protection. 206-220 - Wai Kheong Chong
, Micheal Drieberg, Varun Jeoti, Rizwan Ahmad:
Analytical modelling of false blocking problem in wireless ad hoc networks. 221-245 - Maryam Ataei Kachooei
, Faramarz Hendessi, Behrouz Shahgholi Ghahfarokhi
, Mostafa Nozari
:
An OLSR-based Geocast Routing Protocol for Vehicular Ad Hoc Networks. 246-266 - Varun Deshpande
, Hakim Badis, Laurent George:
Efficient topology control of blockchain peer to peer network based on SDN paradigm. 267-289 - Federico Franzoni
, Vanesa Daza:
Clover: An anonymous transaction relay protocol for the bitcoin P2P network. 290-303 - Guanglai Guo, Yan Zhu
, E. Chen, Guizhen Zhu, Di Ma
, William Cheng-Chung Chu:
Continuous improvement of script-driven verifiable random functions for reducing computing power in blockchain consensus protocols. 304-323 - Deyu Zhang, Heguo Zhang, Sijing Duan, Yunzhen Luo, Fucheng Jia, Feng Liu
:
Deep action: A mobile action recognition framework using edge offloading. 324-339 - Xuejiao Liu, Chuanhua Wang, Wei Chen, Yingjie Xia
, Gaoxiang Zhu:
SCMP-V: A secure multiple relays cooperative downloading scheme with privacy preservation in VANETs. 340-354 - Shuai Zhou, Ge Zhang, Xianfu Meng
:
LocTrust: A local and global consensus-combined trust model in MANETs. 355-368 - Haina Song
, Xinyu Han, Jie Lv, Tao Luo
, Jianfeng Li:
MPLDS: An integration of CP-ABE and local differential privacy for achieving multiple privacy levels data sharing. 369-385 - Khaled S. El Gayyar
, Ahmed I. Saleh, Labib M. Labib:
A new fog-based routing strategy (FBRS) for vehicular ad-hoc networks. 386-407 - Federico Franzoni
, Xavier Salleras, Vanesa Daza:
AToM: Active topology monitoring for the bitcoin peer-to-peer network. 408-425 - Mrinai Maneetkumar Dhanvijay, Shailaja C. Patil:
Energy aware MAC protocol with mobility management in wireless body area network. 426-443 - Qiaohong Hu, Hongju Cheng
, Xiaoqi Zhang, Chengkuan Lin:
Trusted resource allocation based on proof-of-reputation consensus mechanism for edge computing. 444-460 - Leila Benarous
, Benamar Kadri:
Obfuscation-based location privacy-preserving scheme in cloud-enabled internet of vehicles. 461-472 - Bharati Sinha
, Awadhesh Kumar Singh, Poonam Saini:
A hybrid approach towards reduced checkpointing overhead in cloud-based applications. 473-483 - Mohammad Shirafkan, Ali Shahidinejad
, Mostafa Ghobaei-Arani
:
An autonomous intrusion detection system for the RPL protocol. 484-502 - Guang Yang, Junling Guo, Lidong Han
, Xuejiao Liu, Chengliang Tian:
An improved secure certificateless public-key searchable encryption scheme with multi-trapdoor privacy. 503-515 - Yulei Chen, Jianhua Chen:
An efficient and privacy-preserving mutual authentication with key agreement scheme for telecare medicine information system. 516-528 - Weichang Zheng
, Mingcong Yang, Chenxiao Zhang, Yu Zheng, Yunyi Wu, Yongbing Zhang
, Jie Li:
Application-aware QoS routing in SDNs using machine learning techniques. 529-548 - Weinan Liu
:
Privacy-preserving comparison based data aggregation protocols for mobile sensing. 549-558 - Jianhua Huang, Tianqi Li
, Zhigang Shi
:
An uneven annulus sector grid-based energy-efficient multi-hop routing protocol for wireless sensor networks. 559-575 - Shafi Shaik
, Devanaboyina Venkata Ratnam
:
A trust based energy and mobility aware routing protocol to improve infotainment services in VANETs. 576-591 - Radhakrishnan Maivizhi
, Palanichamy Yogesh:
Fuzzy routing for in-network aggregation in wireless sensor networks. 592-611 - Xuefei Peng, Xiaoming Yuan, Kuan Zhang:
Clustered NOMA-based downlink adaptive relay coordinated transmission scheme for future 6G cell-free edge network. 612-625 - Douglas Henrique Silva, Erick Galani Maziero, Muhammad Saadi
, Renata Lopes Rosa, Juan E. Casavílca Silva, Demóstenes Z. Rodríguez
, Kostromitin Konstantin Igorevich
:
Big data analytics for critical information classification in online social networks using classifier chains. 626-641 - Ankur O. Bang
, Udai Pratap Rao
:
EMBOF-RPL: Improved RPL for early detection and isolation of rank attack in RPL-based internet of things. 642-665 - Dharmendra Kumar
, Mayank Pandey:
An optimal load balancing strategy for P2P network using chicken swarm optimization. 666-688 - Jie Jia
, Yao Xu, Zhenjun Du, Jian Chen, Qinghu Wang, Xingwei Wang:
Joint resource allocation for QoE optimization in large-scale NOMA-enabled multi-cell networks. 689-702 - J. Thresa Jeniffer, A. Chandrasekar:
Optimal hybrid heat transfer search and grey wolf optimization-based homomorphic encryption model to assure security in cloud-based IoT environment. 703-723 - Chuxin Zhuang, Qingyun Dai, Yue Zhang:
BCPPT: A blockchain-based privacy-preserving and traceability identity management scheme for intellectual property. 724-738 - Xu Zhao, Chaowei Lin, Jianshan Zhang
:
Cloudlet deployment for workflow applications in a mobile edge computing-wireless metropolitan area network. 739-750 - K. Tamil Selvi
, R. Thamilselvan
:
An intelligent traffic prediction framework for 5G network using SDN and fusion learning. 751-767 - Vojislav B. Misic
, Jelena V. Misic, Xiaolin Chang:
Reducing the number of transaction messages in bitcoin. 768-782 - Wenbin Chen, Wei Wang
, Zuguang Li, Qiang Ye, Qihui Wu:
Joint pricing and task allocation for blockchain empowered crowd spectrum sensing. 783-792 - Rahul N. Vaza
, Ramesh Prajapati
, Dushyantsinh Rathod, Dineshkumar Vaghela:
Developing a novel methodology for virtual machine introspection to classify unknown malware functions. 793-810 - Xiaoli Li, Huamei Qi, Jia Wu:
Efficient path-sense transmission based on IoT system in opportunistic social networks. 811-826 - Muhammad Ali, Rizwan Asghar, Ihsan Ullah, Atiq Ahmed, Waheed Noor, Junaid Baber
:
Towards intelligent P2P IPTV overlay management through classification of peers. 827-838
Volume 15, Number 2, March 2022
- Luca Serena
, Stefano Ferretti
, Gabriele D'Angelo:
Cryptocurrencies activity as a complex network: Analysis of transactions graphs. 839-853 - Chaogang Tang, Huaming Wu
:
Joint optimization of task caching and computation offloading in vehicular edge computing. 854-869 - Xingchen Wang, Chengwu Liao
, Chao Chen
, Jie Ma, Huayan Pu:
O2D: An uncooperative taxi-passenger's destination predication system via deep neural networks. 870-883 - Moayad Aloqaily
, Ouns Bouachir
, Öznur Özkasap
, Faizan Safdar Ali:
SynergyGrids: blockchain-supported distributed microgrid energy trading. 884-900 - H. S. Jennath
, S. Asharaf:
Reputation management in vehicular network using blockchain. 901-920 - Qingyang Li
, Bin Guo, Zhu Wang:
A privacy-preserving multi-agent updating framework for self-adaptive tree model. 921-933 - Bing Tang
, Linyao Kang:
EICache: A learning-based intelligent caching strategy in mobile edge computing. 934-949 - Xiao Ke, Wenyao Chen
, Wenzhong Guo:
100+ FPS detector of personal protective equipment for worker safety: A deep learning approach for green edge computing. 950-972 - Longxin Zhang
, Lan Wang, Mansheng Xiao, Zhicheng Wen, Cheng Peng:
EM_WOA: A budget-constrained energy consumption optimization approach for workflow scheduling in clouds. 973-987 - Chris Pollett, Thomas H. Austin, Katerina Potika
, Justin Rietz, Prashant Pardeshi:
TontineCoin: Survivor-based Proof-of-Stake. 988-1007 - Xuelian Cao
, Jianhui Zhang, Xuechen Wu, Bo Liu
:
A survey on security in consensus and smart contracts. 1008-1028 - Zhengzhe Xiang
, Yuhang Zheng, Mengzhu He, Longxiang Shi, Dongjing Wang, Shuiguang Deng, Zengwei Zheng:
Energy-effective artificial internet-of-things application deployment in edge-cloud systems. 1029-1044 - Xinning Chen, Xuan Liu, Canhui Luo, Jiangjin Yin:
Robust multi-agent reinforcement learning for noisy environments. 1045-1056 - Devarapalli Prasannababu
, Tarachand Amgoth:
Adaptive SSO based node selection for partial charging in wireless sensor network. 1057-1075 - Songyang Wu, Wenju Xu
, Zhiyong Hong, Pu Duan, Benyu Zhang, Yupu Hu, Baocang Wang:
Updatable privacy-preserving itK-nearest neighbor query in location-based s-ervice. 1076-1089 - Lili Jiang, Xiaolin Chang
, Jelena V. Misic, Vojislav B. Misic, Jing Bai:
Understanding MEC empowered vehicle task offloading performance in 6G networks. 1090-1104 - Kalaivanan Karunanithy
, Bhanumathi Velusamy
:
An efficient data collection using wireless sensor networks and internet of things to monitor the wild animals in the reserved area. 1105-1125 - Qinglin Zhao, Xianqing Tai, Jianwen Yuan, Jie Xu, Li Feng, Zhijie Ma
:
Performance analysis of PoUW consensus mechanism: Fork probability and throughput. 1126-1138 - Jianxin Zhao
, Yanhao Feng, Xinyu Chang, Chi Harold Liu:
Energy-efficient client selection in federated learning with heterogeneous data on edge. 1139-1151 - Kai Fan, Zeyu Shi, Ruidan Su
, Yuhan Bai, Pei Huang, Kuan Zhang, Hui Li, Yintang Yang:
Blockchain-based trust management for verifiable time synchronization service in IoT. 1152-1162 - Sriramulu Bojjagani
, P. V. Venkateswara Rao, Dinesh Reddy Vemula
, B. Ramachandra Reddy, T. Jaya Lakshmi
:
A secure IoT-based micro-payment protocol for wearable devices. 1163-1188 - Vesal Hakami
, Hadi Barghi, Seyedakbar Mostafavi, Ziba Arefinezhad:
A resource allocation scheme for D2D communications with unknown channel state information. 1189-1213 - Yongheng Deng, Shuang Gu, Chengbo Jiao, Xing Bao, Feng Lyu
:
Making resource adaptive to federated learning with COTS mobile devices. 1214-1231 - Zainab Hassan Ali
, Hesham A. Ali:
EEOMA: End-to-end oriented management architecture for 6G-enabled drone communications. 1232-1254 - Anika Mansura
, Micheal Drieberg, Azrina Abd Aziz, Vandana Bassoo, Sohail Sarang:
An energy balanced and nodes aware routing protocol for energy harvesting wireless sensor networks. 1255-1280 - Nairy Moghadas-Gholian
, Vahid Solouk, Hashem Kalbkhani
:
Relay selection and power allocation for energy-load efficient network-coded cooperative unicast D2D communications. 1281-1293 - Himanshuram Ranjan, Atul Kumar Dwivedi
, Prakasam Periasamy
:
An optimized architecture and algorithm for resource allocation in D2D aided fog computing. 1294-1310
Volume 15, Number 3, May 2022
- Gen Huang, Yi-bo Zou
, Shi Chen, Yun Xu:
Bitrans: A bidirectional and trusted data transaction protocol based on the blockchain system. 1311-1327 - Mohammad Jalilvand Aghdam Bonab, Ramin Shaghaghi Kandovan:
QoS-aware resource allocation in mobile edge computing networks: Using intelligent offloading and caching strategy. 1328-1344 - Sheau-Ru Tong
, Cheng-Han Yang:
Efficient broadcast scheduling at mobile cloud edges for supporting news-broadcast-on-demand over P2P streaming. 1345-1356 - Kai Chen
, Fuwei Wang, Miaoyu Li, Baoying Liu
, Hao Chen, Feng Chen:
HeadSee: Device-free head gesture recognition with commodity RFID. 1357-1369 - Pothuri Surendra Varma
, Veena Anand:
Fault-Tolerant indoor localization based on speed conscious recurrent neural network using Kullback-Leibler divergence. 1370-1384 - Jin Ren
, Yuyang Cheng, Shiyuan Xu
:
EDPPA: An efficient distance-based privacy preserving authentication protocol in VANET. 1385-1397 - Jia Wu, Jiahao Xia, Fangfang Gou
:
Information transmission mode and IoT community reconstruction based on user influence in opportunistic s ocial networks. 1398-1416 - Piyush Rawat, Siddhartha Chauhan:
Particle swarm optimization based sleep scheduling and clustering protocol in wireless sensor network. 1417-1436 - Jin Sun
, Fu Wang:
An effective LS-SVM/AKF aided SINS/DVL integrated navigation system for underwater vehicles. 1437-1451 - Mahsa MalekiTabar, Amir Masoud Rahmani
:
A delay-constrained node-disjoint multipath routing in software-defined vehicular networks. 1452-1472 - Soumya J. Bhat
, Santhosh Krishnan Venkata
:
A localization and deployment model for wireless sensor networks using arithmetic optimization algorithm. 1473-1485 - Ping Zhong
, Aikun Xu, Yilin Kang, Shigeng Zhang
, Yiming Zhang:
An optimal deployment scheme for extremely fast charging stations. 1486-1504 - Rahul Das, Mona Dwivedi
:
Multi agent dynamic weight based cluster trust estimation for hierarchical wireless sensor networks. 1505-1520 - Dan Liao, Ruijin Zhou, Hui Li
, Ming Zhang, Xue Chen:
GE-IDS: an intrusion detection system based on grayscale and entropy. 1521-1534 - Recep Özdag
:
Multi-metric optimization with a new metaheuristic approach developed for 3D deployment of multiple drone-BSs. 1535-1561 - Chengzhe Lai
, Zhe Ma, Rui Guo, Dong Zheng:
Secure medical data sharing scheme based on traceable ring signature and blockchain. 1562-1576 - Alper Bereketli
:
Interference-Free Source Deployment for Coverage in Underwater Acoustic Backscatter Networks. 1577-1594 - Masoumeh Safkhani, Saru Kumari
, Mohammad Shojafar, Sachin Kumar
:
An authentication and key agreement scheme for smart grid. 1595-1616 - Alapaka Nagur Babu, Jakkala Vishnu, S. Nandakumar
, T. Velmurugan:
Resource allocation and optimization in D2D communication with PDRAPC framework. 1617-1637 - Tao Ding, Guangrong Yan
, Zhenggan Zhou, Yi Lei:
A novel manufacturing service model transformation method based on product lifecycle. 1638-1652 - Kai Zhang, Jinhu Yu, Chao Lin, Jianting Ning
:
Blockchain-based access control for dynamic device management in microgrid. 1653-1668 - Xiaohua Wu, Hongji Ling
, Huan Liu, Fangjian Yu:
A privacy-preserving and efficient byzantine consensus through multi-signature with ring. 1669-1684 - Keerthika A, V. Berlin Hency
:
Reinforcement-Learning based energy efficient optimized routing protocol for WSN. 1685-1704 - Ankur Choudhary, Santosh Kumar
, Krishna Pal Sharma:
RFDCS: A reactive fault detection and classification scheme for clustered wsns. 1705-1732 - Ashish Tomar
, Sachin Tripathi:
BCAV: Blockchain-based certificateless authentication system for vehicular network. 1733-1756
Volume 15, Number 4, July 2022
- Aditi Mishra, Azad Azadmanesh, Lotfollah Najjar:
Consensus in sensor networks in presence of hybrid faults. 1757-1774 - Danfeng Wu, Jiancheng Zhang
, Jinlai Zhang
, Heng Shi:
A Novel Deep Link Prediction Model for Peer-to-Peer Dynamic Task Collaboration Networks. 1775-1791 - Mohammad Ali
, Ximeng Liu:
Lightweight verifiable data management system for cloud-assisted wireless body area networks. 1792-1816 - Junfeng Tian, Ziwei Wang
:
Cloud data assured deletion scheme based on dynamic sliding window. 1817-1833 - Dan Liao
, Wentao Wang, Kairen Xiao, Hui Li, Ming Zhang:
Towards an architecture and algorithm for the satellite IoT based on a CCN. 1834-1848 - Yuetong Chen, Fengming Liu
:
Research on improvement of DPoS consensus mechanism in collaborative governance of network public opinion. 1849-1861 - Radhika Kavra, Anjana Gupta, Sangita Kansal:
Systematic study of topology control methods and routing techniques in wireless sensor networks. 1862-1922 - Jing Bai, Xiaolin Chang
, Fumio Machida, Zhen Han, Yang Xu, Kishor S. Trivedi:
Quantitative understanding serial-parallel hybrid sfc services: a dependability perspective. 1923-1938 - Pankaj Kumar
, Hari Om:
A secure and efficient authentication protocol for wireless applications in multi-server environment. 1939-1952 - Peiyan Yuan
, Saike Shao, Xiaoyan Huang:
RAPAR: Routing algorithm based on node relationship mining in opportunistic network. 1953-1963 - Pengge Chen, Fenhua Bai, Tao Shen, Bei Gong, Lei Zhang, Lin Huang, Zhengyuan An, Talha Mir, Shanshan Tu, Muhammad Waqas
:
SCCA: A slicing-and coding-based consensus algorithm for optimizing storage in blockchain-based IoT data sharing. 1964-1978 - Xiaoyu Du
, Yinyin Li, Sufang Zhou, Yi Zhou:
ATS-LIA: A lightweight mutual authentication based on adaptive trust strategy in flying ad-hoc networks. 1979-1993 - Yukun Zhang
, Wenxue Wei
:
Lightweight anonymous authentication and key agreement protocols for mobile edge computing. 1994-2006 - K. Anand, A. Vijayaraj
, M. Vijay Anand:
An enhanced bacterial foraging optimization algorithm for secure data storage and privacy-preserving in cloud. 2007-2020 - Jinyong Chang
, Maozhi Xu, Rui Xue:
Public auditing protocol with dynamic update and privacy-preserving properties in fog-to-cloud-based IoT applications. 2021-2036 - Kaiyu Wang, Zhiying Tu, Zhenzhou Ji
:
PoTA: A hybrid consensus protocol to avoid miners' collusion for BaaS platform. 2037-2056 - Dong Liang, Qinrang Liu, Binghao Yan, Ting Chen, Xingyu Liu:
Efficient loop detection and congestion-free network update for SDN. 2057-2078 - Vikramjit Singh, Krishna Pal Sharma, Harsh Kumar Verma:
ABNT: Adaptive beaconing and neighbor timeout for geographical routing in UAV networks. 2079-2100 - Kunchang Li
, Yifan Yang, Shuhao Wang:
Privacy-preserving aggregate signcryption scheme with allowing dynamic updating of pseudonyms for fog-based smart grids. 2101-2115 - Arnab Mukherjee
, Swagatika Sahoo, Raju Halder
:
A blockchain-based integrated and interconnected hybrid platform for Smart City ecosystem. 2116-2141 - Ehsan Kiamansouri, Hamid Barati
, Ali Barati
:
A two-level clustering based on fuzzy logic and content-based routing method in the internet of things. 2142-2159
Volume 15, Number 5, September 2022
- Taixin Li
, Xu Zhou, Shen Yan, Xiaobo Zhang:
Service function path selection methods for multi-layer satellite networks. 2161-2178 - Bahaa Hussein Taher Algubili
, Neeraj Kumar
, Hongwei Lu, Ali A. Yassin, Rihab Boussada, Alzahraa J. Mohammed, Huiyu Liu:
EPSAPI: An efficient and provably secure authentication protocol for an IoT application environment. 2179-2198 - B. Gopalakrishnan, P. Purusothaman:
A new design of intrusion detection in IoT sector using optimal feature selection and high ranking-based ensemble learning model. 2199-2226 - Anqi Yu
, Nuo Wang
:
Scale-free networks: evolutionary acceleration of the network survivability and its quantification. 2227-2239 - Gordhan Jethava
, Udai Pratap Rao
:
A novel defense mechanism to protect users from profile cloning attack on Online Social Networks (OSNs). 2253-2269 - Xiaodong Yang
, Tian Tian, Jiaqi Wang, Caifen Wang:
Blockchain-based multi-user certificateless encryption with keyword search for electronic health record sharing. 2270-2288 - Roshani V. Bhaskarwar
, Dnyandeo J. Pete:
Energy efficient clustering with compressive sensing for underwater wireless sensor networks. 2289-2306 - Noureddine Moussa
, Sondès Khemiri-Kallel, Abdelbaki El Belrhiti El Alaoui
:
Fog-assisted hierarchical data routing strategy for IoT-enabled WSN: Forest fire detection. 2307-2325 - Parisa Goudarzi, Amir Masoud Rahmani
, Mohammad Mosleh:
A Mixed-integer programming model using particle swarm optimization algorithm for resource discovery in the cloudiot. 2326-2346 - Venkatasamy Sureshkumar, S. Mugunthan, Ruhul Amin:
An enhanced mutually authenticated security protocol with key establishment for cloud enabled smart vehicle to grid network. 2347-2363 - Hua Hou, Shengke Zeng
, Hongwei Li:
Privacy-preserving "Check-in Award" Service in Location-based Social Networks. 2364-2375 - Junchao Fan, Xiaolin Chang
, Jelena V. Misic, Vojislav B. Misic, Hongyue Kang:
DHL: Deep reinforcement learning-based approach for emergency supply distribution in humanitarian logistics. 2376-2389 - Medikonda Asha Kiran
, Syam Kumar Pasupuleti, Eswari Rajagopal:
A lightweight pairing-free ciphertext-policy attribute-based signcryption for cloud-assisted IoT. 2390-2403 - Barbara Guidi, Andrea Michienzi
, Laura Ricci:
Managing communities in decentralised social environments. 2404-2429 - Haoran Zhu
, Xiaolin Chang
, Jelena V. Misic, Vojislav B. Misic, Runkai Yang:
Revisiting FAW attack in an imperfect PoW blockchain system. 2430-2443 - Haytham Qushtom, Jelena V. Misic, Vojislav B. Misic
, Xiaolin Chang:
A high performance two-layer consensus architecture for blockchain-based IoT systems. 2444-2456
Volume 15, Number 6, November 2022
- Congcong Chen
, Lifei Wei
, Lei Zhang, Ya Peng, Jianting Ning:
MP-BADNet+: Secure and effective backdoor attack detection and mitigation protocols among multi-participants in private DNNs. 2457-2473 - Zhiguo Liu, Weijie Li
, Jianxin Feng, Chengsheng Pan, Li Yunqi:
A regional interest-aware caching placement scheme for reducing latency in the LEO satellite networks. 2474-2487 - Yasmine Harbi, Allaoua Refoufi, Zibouda Aliouat
, Saad Harous
:
Improved bio-inspired security scheme for privacy-preserving in the internet of things. 2488-2502 - Weimin Gao
, Jiawei Huang
, Ning Jiang, Zhaoyi Li, Shaojun Zou, Zhidong He, Jian-Xin Wang:
HPLB: High precision load balancing based on in-band network telemetry in data center networks. 2503-2515 - Fan-Qi Ma
, Quan-Lin Li, Yi-Han Liu, Yan-Xia Chang:
Stochastic performance modeling for practical byzantine fault tolerance consensus in the blockchain. 2516-2528 - Chang Xu
, Guoxie Jin, Liehuang Zhu, Chuan Zhang, Yu Jia:
EPDL: An efficient and privacy-preserving deep learning for crowdsensing. 2529-2541 - Junying Zhang
, Xindi Ma, Qi Jiang:
A geometric approach to analysing the effects of time delays on stability of vehicular platoons with ring interconnections. 2542-2556 - Sakshi Garg
, Deepti Mehrotra
, Hari Mohan Pandey
, Sujata Pandey
:
Enhancing RPL using E-MOF: a fuzzy-based mobility model for IoV. 2557-2571 - Nour El Houda Bourebia
, Chunlin Li:
A greedy energy efficient clustering scheme based reinforcement learning for WSNs. 2572-2588 - Yanlin Wang, Liang Liu
, Mengqi Li, Wenbin Zhai
, Weihua Ma, Hang Gao:
Power level aware charging schedule in wireless rechargeable sensor network. 2589-2602 - Nabanita Das, Souvik Basu, Sipra Das Bit:
ReliefChain: A blockchain leveraged post disaster relief allocation system over smartphone-based DTN. 2603-2618 - Haitao Xu, Yuejun Sun
, Jingnan Gao, Jianbo Guo:
Intelligent edge content caching: A deep recurrent reinforcement learning method. 2619-2632 - Xiaohua Wu, Jinpeng Chang, Hongji Ling, Xueqi Feng:
Scaling proof-of-authority protocol to improve performance and security. 2633-2649 - Priyanka Gaba
, Ram Shringar Raw
:
B-VANET: A blockchain-based vehicular ad-hoc network for data validation. 2650-2669 - Ankita Srivastava
, Pramod Kumar Mishra:
Multi-attributes based energy efficient clustering for enhancing network lifetime in WSN's. 2670-2693 - Satinder Singh Mohar
, Sonia Goyal, Ranjit Kaur:
Optimum deployment of sensor nodes in wireless sensor network using hybrid fruit fly optimization algorithm and bat optimization algorithm for 3D Environment. 2694-2718 - Jia Wu, Liao Yu, Fangfang Gou
:
Data transmission scheme based on node model training and time division multiple access with IoT in opportunistic social networks. 2719-2743 - Chengxiao Yu, Wei Quan
, Kang Liu, Mingyuan Liu, Ziheng Xu
, Hongke Zhang:
Deep reinforcement learning-based fountain coding for concurrent multipath transfer in high-speed railway networks. 2744-2756

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.