![](https://dblp.uni-trier.de./img/logo.320x120.png)
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
IEEE Transactions on Network Science and Engineering, Volume 10
Volume 10, Number 1, January - February 2023
- Jianwei Huang:
Message From the Editor-in-Chief. 1-2 - Lynnette Hui Xian Ng
, Kathleen M. Carley
:
Pro or Anti? A Social Influence Model of Online Stance Flipping. 3-19 - Kirti Jain
, Vasudha Bhatnagar
, Sadanand Prasad
, Sharanjit Kaur
:
Coupling Fear and Contagion for Modeling Epidemic Dynamics. 20-34 - Jiaren Xiao
, Quanyu Dai
, Xiaochen Xie
, Qi Dou
, Ka-Wai Kwok
, James Lam
:
Domain Adaptive Graph Infomax via Conditional Adversarial Networks. 35-52 - Kai Jin
, Kun Xie
, Xin Wang
, Jiazheng Tian
, Gaogang Xie
, Jigang Wen, Kenli Li
:
Low Cost Online Network Traffic Measurement With Subspace-Based Matrix Completion. 53-67 - Mengping Xing
, Jianquan Lu
, Yang Liu
, Xiangyong Chen
:
Event-Based Bipartite Consensus of Multi-Agent Systems Subject to DoS Attacks. 68-80 - Jianhong Zhang
, Chenghe Dong:
Secure and Lightweight Data Aggregation Scheme for Anonymous Multi-Receivers in WBAN. 81-91 - Hisham S. Galal
, Amr M. Youssef
:
Aegis: Privacy-Preserving Market for Non-Fungible Tokens. 92-102 - Zahid Ghaffar
, Salman Shamshad
, Khalid Mahmood
, Mohammad S. Obaidat
, Saru Kumari
, Muhammad Khurram Khan
:
A Lightweight and Efficient Remote Data Authentication Protocol Over Cloud Storage Environment. 103-112 - Minghui Dai
, Yuan Wu
, Liping Qian
, Zhou Su
, Bin Lin
, Nan Chen
:
UAV-Assisted Multi-Access Computation Offloading via Hybrid NOMA and FDMA in Marine Networks. 113-127 - Weihao Song
, Zidong Wang
, Zhongkui Li
, Hongli Dong
, Qing-Long Han
:
Protocol-Based Particle Filtering for Nonlinear Complex Networks: Handling Non-Gaussian Noises and Measurement Censoring. 128-139 - Zhenhua Deng
:
Game-Based Formation Control of High-Order Multi-Agent Systems. 140-151 - Jing Xu, Xue Li, Puming Wang
, Xin Jin
, Shaowen Yao
:
Multi-Modal Noise-Robust DDoS Attack Detection Architecture in Large-Scale Networks Based on Tensor SVD. 152-165 - Gabriele Gemmi
, Renato Lo Cigno
, Leonardo Maccari
:
On the Properties of Next Generation Wireless Backhaul. 166-177 - Jieheng Zheng
, Lin Zhang
, Yan Feng
, Zhiqiang Wu
:
Blockchain-Based Key Management and Authentication Scheme for IoT Networks With Chaotic Scrambling. 178-188 - Hualing Ren, Kai Liu
, Guozhi Yan, Yantao Li
, Choujun Zhan
, Songtao Guo
:
A Memetic Algorithm for Cooperative Complex Task Offloading in Heterogeneous Vehicular Networks. 189-204 - Zhen Yang
, Ming Zhou, Haiyang Yu
, Richard O. Sinnott
, Huan Liu
:
Efficient and Secure Federated Learning With Verifiable Weighted Average Aggregation. 205-222 - Yating Liu, Yuantao Gu
, Xinyue Shen, Qingmin Liao
, Quan Yu
:
MSCA: An Unsupervised Anomaly Detection System for Network Security in Backbone Network. 223-238 - Zhijun Wu
, Silin Peng
, Liang Liu
, Meng Yue
:
Detection of Improved Collusive Interest Flooding Attacks Using BO-GBM Fusion Algorithm in NDN. 239-252 - Bogang Qu, Zidong Wang
, Bo Shen
, Hongli Dong
, Hongjian Liu
:
Event-Based Joint State and Unknown Input Estimation for Energy Networks: Handling Multi-Machine Power Grids. 253-264 - Sihan Ma, Haipeng Yao
, Tianle Mai
, Jingkai Yang, Wenji He, Kaipeng Xue
, Mohsen Guizani
:
Graph Convolutional Network Aided Virtual Network Embedding for Internet of Thing. 265-274 - Yuru Zhang, Chen Chen
, Lei Liu, Dapeng Lan
, Hongbo Jiang, Shaohua Wan
:
Aerial Edge Computing on Orbit: A Task Offloading and Allocation Scheme. 275-285 - Mohammad Esmaeili
, Aria Nosratinia
:
Community Detection With Known, Unknown, or Partially Known Auxiliary Latent Variables. 286-304 - Sepehr Elahi
, Andi Nika
, Cem Tekin
:
Online Context-Aware Task Assignment in Mobile Crowdsourcing via Adaptive Discretization. 305-320 - Liqing Wang
, Zheng-Guang Wu
, James Lam
:
Necessary and Sufficient Conditions for Security of Hidden Markov Boolean Control Networks Under Shifting Attacks. 321-330 - Chengzhang Ni
, Jun Yang
, Zezhao Pang, Yeming Gong
:
Seeding Strategy Based on Weighted Gravity Centrality in Multiplex Networks. 331-345 - Christy Lin
, Daniel L. Sussman
, Prakash Ishwar
:
Ergodic Limits, Relaxations, and Geometric Properties of Random Walk Node Embeddings. 346-359 - Yanli Yuan
, De Wen Soh, Zehui Xiong
, Tony Q. S. Quek
:
Applicable and Partial Learning of Graph Topology Without Sparsity Priors. 360-371 - Kamal Berahmand
, Mehrnoush Mohammadi, Farid Saberi-Movahed
, Yuefeng Li
, Yue Xu
:
Graph Regularized Nonnegative Matrix Factorization for Community Detection in Attributed Networks. 372-385 - Mingyan Zhu
, Tianju Sui, Rui Wang
, Jun Sun
:
Sensors Scheduling for Remote State Estimation Over an Unslotted CSMA/CA Channel. 386-397 - Canhui Wang
, Xiaowen Chu
, Yang Qin:
Dissecting Mining Pools of Bitcoin Network: Measurement, Analysis and Modeling. 398-412 - Emilia A. Monakhova
, Oleg G. Monakhov
, Aleksandr Yu. Romanov
:
Routing Algorithms in Optimal Degree Four Circulant Networks Based on Relative Addressing: Comparative Analysis for Networks-on-Chip. 413-425 - Pengfei Wan
, Xiaoming Wang
, Geyong Min
, Liang Wang
, Yaguang Lin
, Wangyang Yu
, Xiaojun Wu:
Optimal Control for Positive and Negative Information Diffusion Based on Game Theory in Online Social Networks. 426-440 - Qiang He
, Xin Yan, Xingwei Wang
, Tianhang Nan, Zhixue Chen, Xuan He
, Min Huang:
Dynamic Opinion Maximization Framework With Hybrid Method in Social Networks. 441-451 - Yong Xu
, Zheng-Guang Wu
:
Observer-Based Asynchronous Communication and Adaptive Control Protocols With Intermittent Updating and Interaction. 452-462 - Lulu Pan, Haibin Shao
, Yuanlong Li, Dewei Li
, Yugeng Xi
:
Event-Triggered Consensus of Matrix-Weighted Networks Subject to Actuator Saturation. 463-476 - Yuhua Cheng
, Lei Shi
, Jinliang Shao
, Libing Bai
, Kai Chen
:
Emergent Dynamics of Asynchronous Multiagent Systems Under Signed Networks and Limited Communication Resources. 477-488 - Govind Saraswat
, Vivek Khatana
, Sourav Patel
, Murti V. Salapaka
:
Distributed Finite-Time Termination for Consensus Algorithm in Switching Topologies. 489-499 - Ziwei Dong, Shuai Mao
, Matjaz Perc
, Wei Du, Yang Tang:
A Distributed Dynamic Event-Triggered Algorithm With Linear Convergence Rate for the Economic Dispatch Problem. 500-513 - Hongbo Li
, Lingjie Duan
:
Online Pricing Incentive to Sample Fresh Information. 514-526 - Yong Xu
, Yunsong Deng
, Zenghong Huang
, Ming Lin
, Peng Shi
:
Distributed State Estimation Over Sensor Networks With Substate Decomposition Approach. 527-537 - Baris Yamansavascilar
, Ahmet Cihat Baktir
, Cagatay Sonmez
, Atay Ozgovde, Cem Ersoy
:
DeepEdge: A Deep Reinforcement Learning Based Task Orchestrator for Edge Computing. 538-552 - Xiu-Xiu Zhan
, Kaiyue Zhang, Lun Ge, Junming Huang
, ZiNan Zhang, Lu Wei
, Gui-Quan Sun
, Chuang Liu
, Zi-Ke Zhang
:
Exploring the Effect of Social Media and Spatial Characteristics During the COVID-19 Pandemic in China. 553-564 - Wenrui Li
, Daniel L. Sussman
, Eric D. Kolaczyk
:
Estimation of the Branching Factor in Noisy Networks. 565-577
Volume 10, Number 2, March - April 2023
- Jichao Bi
, Fengji Luo
, Gaoqi Liang, Xiaofan Yang
, Shibo He
, Zhao Yang Dong
:
Impact Assessment and Defense for Smart Grids With FDIA Against AMI. 578-591 - Mengjie Lv
, Jianxi Fan
, Weibei Fan
, Xiaohua Jia
:
A High-Performantal and Server-Centric Based Data Center Network. 592-605 - Weiling Li
, Renfang Wang, Xin Luo
, MengChu Zhou
:
A Second-Order Symmetric Non-Negative Latent Factor Model for Undirected Weighted Network Representation. 606-618 - Xuefei Wang
, Hong-Jun Ma
, Haobo Kang:
Fuzzy Adaptive Group Obstacle Avoidance Control for Second-Order Multi-Agent Systems Under Fixed and Switching Topologies. 619-630 - Ru Huang
, Zijian Chen
, Guangtao Zhai
, Jianhua He
, Xiaoli Chu
:
A Graph Entropy Measure From Urelement to Higher-Order Graphlets for Network Analysis. 631-644 - Saiqin Long
, Ying Zhang
, Qingyong Deng
, Tingrui Pei
, Jinzhi Ouyang
, Zhihua Xia
:
An Efficient Task Offloading Approach Based on Multi-Objective Evolutionary Algorithm in Cloud-Edge Collaborative Environment. 645-657 - Amit Surana
, Can Chen
, Indika Rajapakse
:
Hypergraph Similarity Measures. 658-674 - Peter Travis Jardine
, Sidney N. Givigi
:
Flocks, Mobs, and Figure Eights: Swarming as a Lemniscatic Arch. 675-686 - Chongyang Chen
, Yiyan Han
, Song Zhu
, Zhigang Zeng
:
Distributed Fixed-Time Tracking and Containment Control for Second-Order Multi-Agent Systems: A Nonsingular Sliding-Mode Control Approach. 687-697 - Govindasamy Narayanan, M. Syed Ali
, Quanxin Zhu
, Bandana Priya
, Ganesh Kumar Thakur:
Fuzzy Observer-Based Consensus Tracking Control for Fractional-Order Multi-Agent Systems Under Cyber-Attacks and Its Application to Electronic Circuits. 698-708 - Jiachen Sun
, Ning Ge
, Xu Chen
, Wei Feng
, Jianhua Lu:
Truthful Transaction Protocol for E-Commerce Networks Based on Double Auction. 709-722 - Priyanka Kamboj, Sujata Pal
, Samaresh Bera
, Sudip Misra
:
QoS-Aware Multipath Routing in Software-Defined Networks. 723-732 - Zhengping Fan
, Xiaojun Tan
, Wanquan Liu
, Guanrong Chen
:
Asymptotically Consistent Estimation of Preferential Attachments in Growing Networks. 733-741 - Wahengbam Kanan Kumar, Kshetrimayum Linthoinganbi Devi, Aheibam Dinamani Singh:
Fortifying Brain Signals for Robust Interpretation. 742-753 - Ruhui Zhang
, Duan-Shin Lee
, Cheng-Shang Chang
:
A Generalized Configuration Model With Triadic Closure. 754-765 - Xiongbo Wan
, Chi Zhan
, Chuan-Ke Zhang
, Min Wu
:
Finite-Time Fault Detection Under Deception Attacks: A Hybrid Dynamic Variables-Dependent Event-Based Scheme. 766-779 - Jiexin Wu
, Cunlai Pu
, Shuxin Ding
, Guo Cao
, Chengyi Xia
, Panos M. Pardalos
:
Multi-Objective Optimization of Transport Processes on Complex Networks. 780-794 - Hao Wu
, Jian Yan
, Linling Kuang
:
DecTE: Achieving Optimal Network Group Efficiency in Selfish Multidomain Networks. 795-808 - Jeremy D. Wendt
, Richard V. Field Jr.
, Cynthia A. Phillips, Arvind Prasadan
, Tegan Wilson
, Sucheta Soundarajan, Sanjukta Bhowmick:
Partitioning Communication Streams Into Graph Snapshots. 809-826 - Gioele Zardini
, Nicolas Lanzetti
, Andrea Censi
, Emilio Frazzoli, Marco Pavone
:
Co-Design to Enable User-Friendly Tools to Assess the Impact of Future Mobility Solutions. 827-844 - Fei Yu
, Hui Shen, Qiulin Yu, Xinxin Kong
, Pradip Kumar Sharma
, Shuo Cai
:
Privacy Protection of Medical Data Based on Multi-Scroll Memristive Hopfield Neural Network. 845-858 - Shiyuan Zheng
, Hong Xie
, John C. S. Lui
:
Pricing Social Visibility Service in Online Social Networks: Modeling and Algorithms. 859-870 - Guangyao Pang
, Xiaoming Wang
, Liang Wang
, Fei Hao
, Yaguang Lin
, Pengfei Wan
, Geyong Min
:
Efficient Deep Reinforcement Learning-Enabled Recommendation. 871-886 - Tingting Yin
, Zhou Gu
, Xiangpeng Xie
:
Observer-Based Event-Triggered Sliding Mode Control for Secure Formation Tracking of Multi-UAV Systems. 887-898 - Jie Cui
, Nan Liu, Qingyang Zhang
, Debiao He
, Chengjie Gu, Hong Zhong
:
Efficient and Anonymous Cross-Domain Authentication for IIoT Based on Blockchain. 899-910 - Hao Shen
, Yinsheng Song, Jing Wang
, Ju H. Park
:
H∞ State Estimation for PDT-Switched Coupled Neural Networks Under Round-Robin Protocol: A Cooperation-Competition-Based Mechanism. 911-921 - Mingyue Zhang
, Junlong Zhou
, Gongxuan Zhang
, Lei Cui
, Tian Gao, Shui Yu
:
APDP: Attribute-Based Personalized Differential Privacy Data Publishing Scheme for Social Networks. 922-933 - Jinhui Hu
, Guo Chen
, Huaqing Li
, Zixiang Shen, Weidong Zhang
:
Push-LSVRG-UP: Distributed Stochastic Optimization Over Unbalanced Directed Networks With Uncoordinated Triggered Probabilities. 934-950 - Yabing Huang
, Jun Zhao
:
Game-Theoretic Switching Detection of Malicious Attacks in Switched Systems. 951-965 - Yunlong Song
, Yaqiong Liu
, Yan Zhang
, Zhifu Li
, Guochu Shou
:
Latency Minimization for Mobile Edge Computing Enhanced Proximity Detection in Road Networks. 966-979 - Zhenghong Jin
, Choon Ki Ahn
, Jiawen Li:
Momentum-Based Distributed Continuous-Time Nonconvex Optimization of Nonlinear Multi-Agent Systems via Timescale Separation. 980-989 - Manying Zeng, Xiumin Wang
, Weijian Pan, Pan Zhou
:
Heterogeneous Training Intensity for Federated Learning: A Deep Reinforcement Learning Approach. 990-1002 - Xiang Li
, Tianyi Pan
, Kai Pan
:
Identification of Key Components After Unintentional Failures for Cascading Failure Protection. 1003-1014 - Ricardo José López Dawn
, Anastasios Giovanidis
:
Optimal Influencer Marketing Campaign Under Budget Constraints Using Frank-Wolfe. 1015-1031 - Chenghao Xu
, Wei Song
:
Intelligent Task Allocation for Mobile Crowdsensing With Graph Attention Network and Deep Reinforcement Learning. 1032-1048 - Xiayang Li
, Jinzhi Wang
:
Fully Distributed Fault-Tolerant Leaderless Consensus of Multi-Agent Systems Under Directed Communication Graph. 1049-1059 - Yanhang Shi
, Siguang Chen
, Haijun Zhang
:
Uncertainty Minimization for Personalized Federated Semi-Supervised Learning. 1060-1073 - Banghua Huang, Yang Liu
, Zicong Xia
, Jun Wang
:
A Bi-Event-Triggered Multi-Agent System for Distributed Optimization. 1074-1084 - Kumar Prateek
, Soumyadev Maity
, Ruhul Amin
:
An Unconditionally Secured Privacy-Preserving Authentication Scheme for Smart Metering Infrastructure in Smart Grid. 1085-1095 - Wei Wang
, Qianwen Zhu
, Hefei Gao
:
Drift Detection of Intelligent Sensor Networks Deployment Based on Graph Stream. 1096-1106 - Wencheng Zou
, Xiao Wen, Jian Guo
, Zhengrong Xiang
:
Novel Reference Trajectory-Based Finite-Time Consensus Protocols for Multiagent Systems With Non-Identical Nonlinear Dynamics. 1107-1118 - Xinping Xu
, Xiaojun Lin
, Lingjie Duan
:
Design and Performance Analysis of Partial Computation Output Schemes for Accelerating Coded Machine Learning. 1119-1130 - Dario Giuseppe Lui
, Alberto Petrillo
, Stefania Santini
:
Bipartite Tracking Consensus for High-Order Heterogeneous Uncertain Nonlinear Multi-Agent Systems With Unknown Leader Dynamics via Adaptive Fully-Distributed PID Control. 1131-1142 - Chengwei Zhang, Dina Fang, Sandip Sen
, Xiaohong Li
, Zhiyong Feng
, Wanli Xue
, Dou An
, Xintian Zhao, Rong Chen
:
Opinion Dynamics in Gossiper-Media Networks Based on Multiagent Reinforcement Learning. 1143-1156 - Xuhui Lu
, Yingmin Jia
:
Scaled Event-Triggered Resilient Consensus Control of Continuous-Time Multi-Agent Systems Under Byzantine Agents. 1157-1174 - Xiaoling Tao, Ziyi Liu
, Feng Zhao
, Rushi Lan
, Runrong Liu, Lianyou Fu, Yifu Ouyang:
An SSA-LC-DAE Method for Extracting Network Security Elements. 1175-1185
Volume 10, Number 3, May - June 2023
- Zhi Zhou
, Dusit Niyato
, Zehui Xiong
, Xiaowen Gong
, Walid Saad
, Xiaoming Fu
:
Guest Editorial The Nexus Between Edge Computing and AI for 6G Networks. 1186-1189 - Zheng Di
, Tao Luo
, Chao Qiu
, Cheng Zhang, Zhutao Liu
, Xiaofei Wang
, Jing Jiang
:
In-Network Pooling: Contribution-Aware Allocation Optimization for Computing Power Network in B5G/6G Era. 1190-1202 - Yupei Liu, Haijun Zhang
, Huan Zhou
, Keping Long
, Victor C. M. Leung
:
User Association, Subchannel and Power Allocation in Space-Air-Ground Integrated Vehicular Network With Delay Constraints. 1203-1213 - Wen Sun
, Sijia Lian
, Haibin Zhang
, Yan Zhang
:
Lightweight Digital Twin and Federated Learning With Distributed Incentive in Air-Ground 6G Networks. 1214-1227 - Pin Lv
, Wenbiao Xu, Jiangtian Nie
, Yanli Yuan
, Chao Cai
, Zhe Chen, Jia Xu
:
Edge Computing Task Offloading for Environmental Perception of Autonomous Vehicles in 6G Networks. 1228-1245 - Sahaya Beni Prathiba
, Gunasekaran Raja
, Sudha Anbalagan
, Arikumar K S
, Sugeerthi Gurumoorthy, Kapal Dev
:
A Hybrid Deep Sensor Anomaly Detection for Autonomous Vehicles in 6G-V2X Environment. 1246-1255 - Yunzhi Xia
, Xianjun Deng
, Lingzhi Yi
, Laurence T. Yang
, Xiao Tang
, Chenlu Zhu, Zhongping Tian:
AI-Driven and MEC-Empowered Confident Information Coverage Hole Recovery in 6G-Enabled IoT. 1256-1269 - Weidang Lu
, Yandan Mo, Yunqi Feng
, Yuan Gao
, Nan Zhao
, Yuan Wu
, Arumugam Nallanathan
:
Secure Transmission for Multi-UAV-Assisted Mobile Edge Computing Based on Reinforcement Learning. 1270-1282 - Yulin He
, Xuan Ye, Laizhong Cui
, Philippe Fournier-Viger
, Chengwen Luo
, Joshua Zhexue Huang
, Ponnuthurai Nagaratnam Suganthan
:
Wireless Network Slice Assignment With Incremental Random Vector Functional Link Network. 1283-1296 - Huijun Tang
, Huaming Wu
, Guanjin Qu, Ruidong Li
:
Double Deep Q-Network Based Dynamic Framing Offloading in Vehicular Edge Computing. 1297-1310 - Hui Huang, Qiang Ye
, Yitong Zhou:
6G-Empowered Offloading for Realtime Applications in Multi-Access Edge Computing. 1311-1325 - Huan Zhou
, Zhenning Wang
, Hantong Zheng, Shibo He
, Mianxiong Dong
:
Cost Minimization-Oriented Computation Offloading and Service Caching in Mobile Cloud-Edge Computing: An A3C-Based Approach. 1326-1338 - Xiaoming Yuan
, Zedan Zhang
, Chujun Feng
, Yejia Cui
, Sahil Garg
, Georges Kaddoum
, Keping Yu
:
A DQN-Based Frame Aggregation and Task Offloading Approach for Edge-Enabled IoMT. 1339-1351 - Jianxin Zhao, Yanhao Feng, Xinyu Chang, Peng Xu, Shilin Li, Chi Harold Liu
, Wenke Yu, Jian Tang
, Jon Crowcroft
:
Energy-Efficient and Fair IoT Data Distribution in Decentralised Federated Learning. 1352-1363 - Jing He
, Songtao Guo
, Mingyan Li
, Yongdong Zhu
:
AceFL: Federated Learning Accelerating in 6G-Enabled Mobile Edge Computing Networks. 1364-1375 - Sizheng Fan
, Hongbo Zhang, Zehua Wang, Wei Cai
:
Mobile Devices Strategies in Blockchain-Based Federated Learning: A Dynamic Game Perspective. 1376-1388 - Ziqi He
, Lei Yang
, Wanyu Lin
, Weigang Wu
:
Improving Accuracy and Convergence in Group-Based Federated Learning on Non-IID Data. 1389-1404 - Jiaxin Li
, Fuhong Lin
, Lei Yang
, Daochao Huang:
AI Service Placement for Multi-Access Edge Intelligence Systems in 6G. 1405-1416 - Jialiang Feng
, Jie Gong
:
Joint Detection and Computation Offloading With Age of Information in Mobile Edge Networks. 1417-1430 - Wande Chen, Dingding Li
, Yidong Zhong, Yong Tang:
A Novel Non-Volatile Memory Update Mechanism for 6G Edge Computing. 1431-1444 - Changkun Jiang
, Lin Gao
, Jingjing Luo
, Pan Zhou
, Jianqiang Li
:
A Game-Theoretic Analysis of Joint Mobile Edge Caching and Peer Content Sharing. 1445-1461 - Mianjie Li
, Yuan Liu
, Zhihong Tian
, Chun Shan
:
Privacy Protection Method Based On Multidimensional Feature Fusion Under 6G Networks. 1462-1471 - Arooj Masood
, Taeyun Ha
, Demeke Shumeye Lakew
, Nhu-Ngoc Dao
, Sungrae Cho
:
Intelligent TCP Congestion Control Scheme in Internet of Deep Space Things Communication. 1472-1486 - Jiayin Li
, Wenzhong Guo
, Lehui Xie
, Ximeng Liu
, Jianping Cai
:
Privacy-Preserving Object Detection With Poisoning Recognition for Autonomous Vehicles. 1487-1500 - Li Chen
, Fan Ang
, Yunfei Chen
, Weidong Wang
:
Robust Federated Learning With Noisy Labeled Data Through Loss Function Correction. 1501-1511 - Dongdong Yue
, Simone Baldi
, Jinde Cao
:
Distributed Aperiodic Time-Triggered and Event-Triggered Consensus: A Scalability Viewpoint. 1512-1524 - Dandan Zhang, Song Zhu, Heng Zhang
, Weisheng Si
, Wei Xing Zheng
:
Fixed-Time Consensus for Multiple Mechanical Systems With Input Dead-Zone and Quantization Under Directed Graphs. 1525-1536 - Meng Qiu
, Di Liu
, He Wang, Wenwu Yu, Simone Baldi
:
A Cooperative Implementation of Mesh Stability in Vehicular Platoons. 1537-1550 - Yuxuan Shen
, Zidong Wang
, Hongli Dong
, Guoping Lu
, Fawaz E. Alsaadi
:
Distributed Recursive State Estimation for a Class of Multi-Rate Nonlinear Systems Over Wireless Sensor Networks Under FlexRay Protocols. 1551-1563 - Xueming Liu, Yue Xu, Mengqiao Xu
, Wenhui Deng, Linqiang Pan, Adolf K. Y. Ng
:
Two-Hop Biconnected Components in the Global Liner Shipping Network Reveal International Trade Statuses. 1564-1574 - Jiasheng Song
, Xiao-Heng Chang
, Zhi-Min Li
:
Secure P2P Nonfragile Sampled-Data Controller Design for Nonlinear Networked System under Sensor Saturation and DoS Attack. 1575-1585 - Ao Wang, Zhida Qin
, Lu Zheng
, Dapeng Li
, Lin Gao
:
Distributed Robust Bandits With Efficient Communication. 1586-1598 - Guisong Yang
, Xiaotian Wu, Yanglin Zhang, Xingyu He
, Sukai Wang
, Yunhuai Liu
:
Revisiting Path Planning Problem Towards Participant Executing Time Optimization in Mobile Crowd Sensing. 1599-1611 - Zhenyu Zhang
, Hua Li
, Yuanyuan Dong
, Xiyuan Wang, Jianuo Cui, Wei Hong, Xiaoming Dai
:
Residual Transceiver Impairments Aware Expectation Propagation Algorithm Receiver for PDMA Systems. 1612-1622 - Laishui Lv
, Peng Hu, Dalal Bardou, Zijun Zheng
, Ting Zhang:
Community Detection in Multilayer Networks Via Semi-Supervised Joint Symmetric Nonnegative Matrix Factorization. 1623-1635 - Karim Shahbaz
, Madhu N. Belur
, Ajay Ganesh
:
Algebraic Connectivity: Local and Global Maximizer Graphs. 1636-1647 - Ijaz Ahmed
, Muhammad Rehan
, Naeem Iqbal, Choon Ki Ahn
:
A Novel Event-Triggered Consensus Approach for Generic Linear Multi-Agents Under Heterogeneous Sector-Restricted Input Nonlinearities. 1648-1658 - Liangkun Yu
, Xiang Sun
, Sihua Shao
, Yougan Chen
, Rana Albelaihi
:
Backhaul-Aware Drone Base Station Placement and Resource Management for FSO-Based Drone-Assisted Mobile Networks. 1659-1668 - Tao Ye, Min Luo
, Yi Yang, Kim-Kwang Raymond Choo
, Debiao He
:
A Survey on Redactable Blockchain: Challenges and Opportunities. 1669-1683 - Junzhong Ji
, Hao Jia
, Yating Ren, Minglong Lei
:
Supervised Contrastive Learning With Structure Inference for Graph Classification. 1684-1695 - Xiaoling Wang
, Zhen Fan, Lin Wang
, Housheng Su
, James Lam
:
Fully Distributed Observer Design for Mobile Targets. 1696-1708 - Chunyu Liu, Kailin Wang
, Heli Zhang
, Xi Li
, Hong Ji
:
Rendered Tile Reuse Scheme Based on FoV Prediction for MEC-Assisted Wireless VR Service. 1709-1721 - Lei Zhang
, Huaijin Zhang, Haipeng Yang
, Zhengyi Liu
, Fan Cheng
:
An Interactive Co-Evolutionary Framework for Multi-Objective Critical Node Detection on Large-Scale Complex Networks. 1722-1735 - Jiayi Cai
, Jingyi Wang
, Jianwen Feng, Guanrong Chen
, Yi Zhao
:
Observer-Based Consensus for Multi-Agent Systems With Semi-Markovian Jumping Via Adaptive Event-Triggered SMC. 1736-1751 - Junliang Ye
, Lin Xiang
, Xiaohu Ge
:
Spatial-Temporal Modeling and Analysis of Reliability and Delay in Urban V2X Networks. 1752-1765 - Zhaoyuan Wu
, Lin Chen, Jianxiao Wang
, Ming Zhou
, Gengyin Li
, Qing Xia
:
Incentivizing the Spatiotemporal Flexibility of Data Centers Toward Power System Coordination. 1766-1778 - Ahmed ElHamamsy
, Farhad Aghili
, Amir G. Aghdam
:
Connectivity Preservation and Collision Avoidance in Multi-Agent Systems Using Model Predictive Control. 1779-1791
Volume 10, Number 4, July - August 2023
- Mengmeng Liu
, Jinyong Yu
, Juan J. Rodríguez-Andina
:
Adaptive Event-Triggered Asynchronous Fault Detection for Nonlinear Markov Jump Systems With Its Application: A Zonotopic Residual Evaluation Approach. 1792-1808 - Sadek Belamfedel Alaoui
, Badreddine El Haiek
, El Houssaine Tissir, Karina A. Barbosa
, Alejandro J. Rojas
:
Consensus Congestion Control for Ad Hoc Networks: Time-Delay and Saturation. 1809-1821 - Qing Wang
, Xiwang Dong
, Bohui Wang
, Yongzhao Hua
, Zhang Ren
:
Finite-Time Observer-Based $H_{\infty }$ Fault-Tolerant Output Formation Tracking Control for Heterogeneous Nonlinear Multi-Agent Systems. 1822-1834 - Huilan Yang
, Xin Wang
, Kaibo Shi
, Shouming Zhong
, Lan Shu:
An Adaptive Event-Triggered Consensus Approach for MASs With Network-Induced Delays. 1835-1845 - Dominic Yang
, Yurun Ge
, Thien Nguyen
, Denali Molitor
, Jacob D. Moorman
, Andrea L. Bertozzi
:
Structural Equivalence in Subgraph Matching. 1846-1862 - Da Yao
, Haibo Wang
, Hongli Xu
, Minli Zhang:
Lightweight Per-Flow Traffic Measurement Using Improved LRU List. 1863-1879 - Andreas Grammenos
, Themistoklis Charalambous
, Evangelia Kalyvianaki:
CPU Scheduling in Data Centers Using Asynchronous Finite-Time Distributed Coordination Mechanisms. 1880-1894 - Kuo Li
, Choon Ki Ahn
, Changchun Hua
:
Delays-Based Distributed Bipartite Consensus Control of Nonlinear Multiagent Systems With Switching Signed Topologies. 1895-1904 - Yuexia Zhang
, Lie Zou
, Dawei Pan:
Cloud-Edge Collaboration Dynamics Information Dissemination Model for Social Internet of Things. 1905-1918 - Abdorasoul Ghasemi
, Hermann de Meer:
Robustness of Interdependent Power Grid and Communication Networks to Cascading Failures. 1919-1930 - Sunjung Kang
, Atilla Eryilmaz
, Ness B. Shroff
:
Remote Tracking of Distributed Dynamic Sources Over a Random Access Channel With One-Bit Updates. 1931-1941 - Haofei Meng
, Lijun Zhu
, Hai-Tao Zhang
:
Output Synchronization of Linear Heterogeneous Multi-Agent Systems With Periodic Event-Triggered Output Communication. 1942-1951 - Dan Tang
, Chenjun Gao
, Xinmeng Li, Wei Liang, Sheng Xiao
, Qiuwei Yang
:
A Detection and Mitigation Scheme of LDoS Attacks via SDN Based on the FSS-RSR Algorithm. 1952-1963 - Shuang An
, Jie Lian
, Dong Wang
:
Distributed Tracking Control of Multi-Agent Systems With Transfer Restricted Switching Topologies: A Cycle Stabilization Approach. 1964-1974 - Hongjing Liang
, Zhenyu Chang
, Choon Ki Ahn
:
Hybrid Event-Triggered Intermittent Control for Nonlinear Multi-Agent Systems. 1975-1984 - Zakaria Abou El Houda
, Abdelhakim Senhaji Hafid
, Lyes Khoukhi
:
MiTFed: A Privacy Preserving Collaborative Network Attack Mitigation Framework Based on Federated Learning Using SDN and Blockchain. 1985-2001 - Yuhan Zhang, Zidong Wang
, Lei Zou
, Hongli Dong
, Xiao-jian Yi
:
Neural-Network-Based Secure State Estimation Under Energy-Constrained Denial-of-Service Attacks: An Encoding-Decoding Scheme. 2002-2015 - Rong Chai
, Lei Liu, Fei Zou, Jinhong Li, Qianbin Chen
:
Performance Analysis of NOMA-Based Hybrid Satellite-Terrestrial Relay Networks With CCI. 2016-2029 - Minsu Choi
, Sooeun Song
, Da-Eun Ko
, Jong-Moon Chung
:
Trajectory Optimization for FSO Based U-IoT Backhaul Networks. 2030-2044 - Pau Esteve
, José J. Ramasco
, Massimiliano Zanin
:
Structure, Resilience and Evolution of the European Air Route Network From 2015 to 2018. 2045-2058 - Aoyu Gong
, Yijin Zhang
, Lei Deng
, Fang Liu
, Jun Li, Feng Shu
:
Dynamic Optimization of Random Access in Deadline-Constrained Broadcasting. 2059-2073 - Chun-Yang Zhang
, Hai-Chun Cai
, C. L. Philip Chen
, Yue-Na Lin
, Wu-Peng Fang:
Graph Representation Learning With Adaptive Metric. 2074-2085 - Jie Lian
, Peilin Jia
, Feiyue Wu
, Xi Huang:
A Stackelberg Game Approach to the Stability of Networked Switched Systems Under DoS Attacks. 2086-2097 - Kunhao Li
, Zhenhua Huang
, Zhaohong Jia
:
RAHG: A Role-Aware Hypergraph Neural Network for Node Classification in Graphs. 2098-2108 - Jianping Zhou
, Dong Xu
, Weipeng Tai
, Choon Ki Ahn
:
Switched Event-Triggered H∞ Security Control for Networked Systems Vulnerable to Aperiodic DoS Attacks. 2109-2123 - Lei Zhang
, Bin Li
, Haipeng Yang
, Fan Cheng
, Cheng Zhang, Renzhi Cao
:
Multi-Objective Optimization of Local Overlapping Community Detection: A Formal Model and Novel Evolutionary Algorithm. 2124-2140 - Yishun Liu, Keke Huang
, Chunhua Yang
, Zhen Wang
:
Distributed Network Reconstruction Based on Binary Compressed Sensing via ADMM. 2141-2153 - Fanchao Kong
, Cheng Hu
, Leimin Wang
, Tingwen Huang
:
Fixed-Time Stabilization of Leakage-Delayed Neural Networks Modeled by Delayed Filippov Systems: Leakage-Delay-Dependent Settling-Time. 2154-2167 - Renli Zhang
, Ruiting Zhou
:
An Efficient Online Auction for Placing and Pricing Cloud Container Clusters. 2168-2179 - Ze Tang
, Chenhui Jiang, Yan Wang
, Jianwen Feng
, Ju H. Park
:
Average Impulsive Weight Based Event-Triggered Impulsive Synchronization on Coupled Neural Networks. 2180-2189 - Zhaoxia Peng
, Yingwen Zhang
, Guoguang Wen
, Jinhuan Wang, Tingwen Huang
:
Resilient Output Consensus to Cyber-Attacks in Continuous-Time Cyber-Physical Systems. 2190-2200 - Ying Liu
, Qi Zeng
, Liming Pan
, Ming Tang
:
Identify Influential Spreaders in Asymmetrically Interacting Multiplex Networks. 2201-2211 - Linhao Zhao
, Shiping Wen
, Zhenyuan Guo
, Kaibo Shi
, Jianying Xiao, Song Zhu, Tingwen Huang
:
Finite-Time Nonchattering Synchronization of Coupled Neural Networks With Multi-Weights. 2212-2225 - Kohei Watabe
, Shohei Nakazawa, Yoshiki Sato, Sho Tsugawa
, Kenji Nakagawa
:
GraphTune: A Learning-Based Graph Generative Model With Tunable Structural Features. 2226-2238 - Renjie Lin
, Shide Du
, Shiping Wang
, Wenzhong Guo
:
Multi-Channel Augmented Graph Embedding Convolutional Network for Multi-View Clustering. 2239-2249 - Wenqi Pan, Yuedong Xu
, Shaoteng Liu:
Making TCP BBR Pacing Adaptive With Domain Knowledge Assisted Reinforcement Learning. 2250-2264 - I-Cheng Lin
, Osman Yagan
, Carlee Joe-Wong
:
Dynamic Coupling Strategy for Interdependent Network Systems Against Cascading Failures. 2265-2282 - Xiaojie Huang
, Dawei Ding
, Yingying Ren, Xiangpeng Xie
:
Attack Detection of Complex Cyber-Physical Networks via Set-Membership Theory. 2283-2293 - Iman Vakilinia
, Weihong Wang
, Jiajun Xin
:
An Incentive-Compatible Mechanism for Decentralized Storage Network. 2294-2306 - Dawei Zhao
, Shudong Li
, Zhen Wang
, Haipeng Peng
:
Cooperation and Competition Coupled Diffusion of Multi-Feature on Multiplex Networks and Its Control. 2307-2318 - Jing Yan
, Zeqian Zhang, Xian Yang
, Xiaoyuan Luo
, Xinping Guan
:
Target Detection in Underwater Sensor Networks by Fusion of Active and Passive Measurements. 2319-2333 - Fei Han
, Zidong Wang
, Hongli Dong
, Xiao-jian Yi
, Fuad E. Alsaadi
:
Distributed $H_{\infty }$-Consensus Estimation for Random Parameter Systems Over Binary Sensor Networks: A Local Performance Analysis Method. 2334-2346 - Hui Cui
, Xuechao Yang
, Wencheng Yang
, Baodong Qin
, Xun Yi
:
Token-Based Biometric Enhanced Key Derivation for Authentication Over Wireless Networks. 2347-2357 - Xinglin Zhang
, Zhaojing Ou, Zheng Yang
:
FedMPT: Federated Learning for Multiple Personalized Tasks Over Mobile Computing. 2358-2371 - Tianbiao Shi
, Fanglai Zhu
:
Security Time-Varying Formation Control for Multi-Agent Systems Under Denial-of-Service Attacks via Unknown Input Observer. 2372-2385 - Qing Zhao, Xiangjuan Yao
, Xiangying Dang
, Dunwei Gong
:
The Nodes Influence Maximization in Open Source Software Community Based on Probability Propagation Model. 2386-2395
Volume 10, Number 5, September - October 2023
- Sahil Garg
, Yulei Wu
, Shahid Mumtaz
, Fabrizio Granelli, Kim-Kwang Raymond Choo
, Min Chen
:
Guest Editorial Introduction to the Special Section on AI-Driven Cybersecurity for Healthcare Cyber Physical Systems. 2396-2401 - Aitizaz Ali
, Muhammad Fermi Pasha
, Antonio Guerrieri
, Antonella Guzzo
, Xiaobing Sun
, Aamir Saeed, Amir Hussain, Giancarlo Fortino
:
A Novel Homomorphic Encryption and Consortium Blockchain-Based Hybrid Deep Learning Model for Industrial Internet of Medical Things. 2402-2418 - Ankita Sharma, Shalli Rani
, Syed Hassan Ahmed Shah
, Rohit Sharma
, Feng Yu
, Mohammad Mehedi Hassan
:
An Efficient Hybrid Deep Learning Model for Denial of Service Detection in Cyber Physical Systems. 2419-2428 - Senthil Murugan Nagarajan
, Ganesh Gopal Devarajan
, Amin Salih Mohammed, T. V. Ramana, Uttam Ghosh
:
Intelligent Task Scheduling Approach for IoT Integrated Healthcare Cyber Physical Systems. 2429-2438 - Chao-Lung Yang
, Hendrik Tampubolon
, Aji Setyoko, Kai-Lung Hua
, Mohammad Tanveer
, Wei Wei
:
Secure and Privacy-Preserving Human Interaction Recognition of Pervasive Healthcare Monitoring. 2439-2454 - Zakaria Abou El Houda
, Abdelhakim Senhaji Hafid
, Lyes Khoukhi
, Bouziane Brik
:
When Collaborative Federated Learning Meets Blockchain to Preserve Privacy in Healthcare. 2455-2465 - Abdullah Lakhan
, Mazin Abed Mohammed
, Jan Nedoma
, Radek Martinek
, Prayag Tiwari
, Neeraj Kumar
:
Blockchain-Enabled Cybersecurity Efficient IIOHT Cyber-Physical System for Medical Applications. 2466-2479 - Wenjing Xiao
, Yuan Tang
, Jia Liu, Di Wu
, Bander A. Alzahrani
, Yixue Hao
, Ning Zhou:
Semantic-Driven Efficient Service Network Towards Smart Healthcare System in Intelligent Fabric. 2480-2489 - Wensheng Gan
, Kaixia Hu, Gengsen Huang, Wei-Che Chien, Han-Chieh Chao, Weizhi Meng
:
Data Analytic for Healthcare Cyber Physical System. 2490-2502 - Bocheng Ren
, Laurence T. Yang
, Qingchen Zhang
, Jun Feng
, Xin Nie
:
Blockchain-Powered Tensor Meta-Learning-Driven Intelligent Healthcare System With IoT Assistance. 2503-2513 - Fei Song
, Yuyin Ma
, Ilsun You
, Hongke Zhang
:
Smart Collaborative Evolvement for Virtual Group Creation in Customized Industrial IoT. 2514-2524 - Muhammad Tanveer
, Abd Ullah Khan
, Musheer Ahmad
, Tu N. Nguyen
, Ahmed A. Abd El-Latif
:
Resource-Efficient Authenticated Data Sharing Mechanism for Smart Wearable Systems. 2525-2536 - Xiaoyu Yi, Jun Wu
, Gaolei Li
, Ali Kashif Bashir
, Jianhua Li, Ahmad Ali AlZubi
:
Recurrent Semantic Learning-Driven Fast Binary Vulnerability Detection in Healthcare Cyber Physical Systems. 2537-2550 - Zhiguo Qu
, Hanrong Sun:
A Secure Information Transmission Protocol for Healthcare Cyber Based on Quantum Image Expansion and Grover Search Algorithm. 2551-2563 - Baofeng Ji
, Yanan Wang
, Ling Xing
, Chunguo Li
, Yi Wang
, Hong Wen
:
IRS-Driven Cybersecurity of Healthcare Cyber Physical Systems. 2564-2573 - Muhammad Junaid Iqbal
, Sana Aurangzeb
, Muhammad Aleem
, Gautam Srivastava
, Jerry Chun-Wei Lin
:
RThreatDroid: A Ransomware Detection Approach to Secure IoT Based Healthcare Systems. 2574-2583 - Zhangyi Shen
, Feng Ding
, Alireza Jolfaei
, Kusum Yadav
, Sahil Vashisht
, Keping Yu
:
DeformableGAN: Generating Medical Images With Improved Integrity for Healthcare Cyber Physical Systems. 2584-2596 - Pradeep Kumar Roy
, Ashish Singh
, Jainam Vipul Desai
, Sunil Kumar Singh
:
Healthcare Data Security Using Lightweight Protocol for Cyber Physical System. 2597-2606 - Sunder Ali Khowaja
, Ik Hyun Lee
, Kapal Dev
, Muhammad Aslam Jarwar
, Nawab Muhammad Faseeh Qureshi
:
Get Your Foes Fooled: Proximal Gradient Split Learning for Defense Against Model Inversion Attacks on IoMT Data. 2607-2616 - Raju Pal
, Ashish Kumar Tripathi, Avinash Chandra Pandey, Mohammad Ayoub Khan
, Varun G. Menon
, Himanshu Mittal
:
A N2CNN-Based Anomaly Detection Method for Cardiovascular Data in Cyber-Physical System. 2617-2626 - Yu Liu, Junxin Chen
, Bo Fang
, Yongyong Chen
, Zhihan Lv
:
Ensemble Learning-Based Atrial Fibrillation Detection From Single Lead ECG Wave for Wireless Body Sensor Network. 2627-2636 - Prosanta Gope
, Yuening Wang, Zengpeng Li
, Biplab Sikdar
:
QR-PUF: Design and Implementation of a RFID-Based Secure Inpatient Management System Using XOR-Arbiter-PUF and QR-Code. 2637-2650 - Jiaming Pei
, Zhi Yu
, Jinhai Li
, Mian Ahmad Jan
, Kuruva Lakshmanna
:
TKAGFL: A Federated Communication Framework Under Data Heterogeneity. 2651-2661 - Kai Peng
, Peichen Liu, Muhammad Bilal
, Xiaolong Xu
, Edoardo Prezioso
:
Mobility and Privacy-Aware Offloading of AR Applications for Healthcare Cyber-Physical Systems in Edge Computing. 2662-2673 - Haotong Cao
, Anish Jindal
, Han Hu
, Md. Jalil Piran
, Longxiang Yang
:
Secure and Intelligent Service Function Chain for Sustainable Services in Healthcare Cyber Physical Systems. 2674-2684 - Yuan Liu
, Wangyuan Yu, Zhengpeng Ai
, Guangxia Xu
, Liang Zhao
, Zhihong Tian
:
A Blockchain-Empowered Federated Learning in Healthcare-Based Cyber Physical Systems. 2685-2696 - Mohammad Wazid
, Siddhant Thapliyal
, Devesh Pratap Singh
, Ashok Kumar Das
, Sachin Shetty
:
Design and Testbed Experiments of User Authentication and Key Establishment Mechanism for Smart Healthcare Cyber Physical Systems. 2697-2709 - Khalid Mahmood
, Mohammad S. Obaidat
, Zahid Ghaffar
, Bander A. Alzahrani
, Salman Shamshad
, Muhammad Asad Saleem
, Shafiq Hussain
:
Cloud-Assisted Secure and Cost-Effective Authenticated Solution for Remote Wearable Health Monitoring System. 2710-2718 - Muhammad Adil
, Muhammad Khurram Khan
, Muhammad Mohsin Jadoon
, Muhammad Attique
, Houbing Song
, Ahmed Farouk
:
An AI-Enabled Hybrid Lightweight Authentication Scheme for Intelligent IoMT Based Cyber-Physical Systems. 2719-2730 - Shudong Li
, Laiyuan Jiang, Qianqing Zhang, Zhen Wang
, Zhihong Tian
, Mohsen Guizani
:
A Malicious Mining Code Detection Method Based on Multi-Features Fusion. 2731-2739 - Mainak Adhikari
, Varun G. Menon
, Danda B. Rawat
, Xingwang Li
:
Guest Editorial Introduction to the Special Section on Computational Intelligence and Advanced Learning for Next-Generation Industrial IoT. 2740-2744 - Peiran Li
, Haoran Zhang
, Wenjing Li
, Keping Yu
, Ali Kashif Bashir
, Ahmad Ali AlZubi
, Jinyu Chen
, Xuan Song
, Ryosuke Shibasaki:
IIoT Based Trustworthy Demographic Dynamics Tracking With Advanced Bayesian Learning. 2745-2754 - Peng Zhang
, Hui Tian
, Pengtao Zhao, Shaoshuai Fan
:
Context-Aware Mobile Edge Resource Allocation in OFDMA Downlink System. 2755-2768 - Aishwariya Chakraborty
, Sudip Misra
:
QoS-Aware Resource Bargaining for Federated Learning Over Edge Networks in Industrial IoT. 2769-2778 - Zhili Zhou
, Yujiang Li
, Jin Li
, Keping Yu
, Guang Kou, Meimin Wang, Brij Bhooshan Gupta
:
GAN-Siamese Network for Cross-Domain Vehicle Re-Identification in Intelligent Transport Systems. 2779-2790 - Jiabao Wen
, Jiachen Yang
, Yang Li
, Jingyi He
, Zhengjian Li
, Houbing Song
:
Behavior-Based Formation Control Digital Twin for Multi-AUG in Edge Computing. 2791-2801 - Prabhat Kumar
, Randhir Kumar, Abhinav Kumar, A. Antony Franklin, Sahil Garg
, Satinder Singh
:
Blockchain and Deep Learning for Secure Communication in Digital Twin Empowered Industrial IoT Network. 2802-2813 - Song Wang
, Hai Lan, Yuwei Peng, Zhiyong Peng
:
Consolidating Industrial Small Files Using Robust Graph Clustering. 2814-2831 - Danfeng Sun
, Jianyong Zhao
, Baiping Chen
, Huifeng Wu
, Jia Wu
:
Cross-Level Dependability Assessment With a Distributed Split Mechanism for Wireless Communication Systems. 2832-2842 - Muhammad Ibrar
, Lei Wang
, Aamir Akbar
, Mian Ahmad Jan
, Venki Balasubramanian
, Gabriel-Miro Muntean
, Nadir Shah
:
Adaptive Capacity Task Offloading in Multi-Hop D2D-Based Social Industrial IoT. 2843-2852 - Mengyao Peng, Jia Hu
, Hui Lin
, Xiaoding Wang
, Peng Liu
, Kapal Dev
, Sunder Ali Khowaja
, Nawab Muhammad Faseeh Qureshi
:
Spatiotemporal Prediction Based Intelligent Task Allocation for Secure Spatial Crowdsourcing in Industrial IoT. 2853-2863 - Li Zhang
, Jianbo Xu, Pandi Vijayakumar
, Pradip Kumar Sharma
, Uttam Ghosh
:
Homomorphic Encryption-Based Privacy-Preserving Federated Learning in IoT-Enabled Healthcare System. 2864-2880 - Shunpu Tang
, Lunyuan Chen, Ke He
, Junjuan Xia
, Lisheng Fan
, Arumugam Nallanathan
:
Computational Intelligence and Deep Learning for Next-Generation Edge-Enabled Industrial IoT. 2881-2893 - Yichi Zhang
, Chunhua Yang
, Keke Huang
, Yonggang Li:
Intrusion Detection of Industrial Internet-of-Things Based on Reconstructed Graph Neural Networks. 2894-2905 - Jing Wang, Debiao He
, Aniello Castiglione
, Brij B. Gupta
, Marimuthu Karuppiah
, Libing Wu
:
PCNNCEC: Efficient and Privacy-Preserving Convolutional Neural Network Inference Based on Cloud-Edge-Client Collaboration. 2906-2923 - Zibo Wang
, Yifei Zhu
, Dan Wang
, Zhu Han
:
Federated Analytics Informed Distributed Industrial IoT Learning With Non-IID Data. 2924-2939 - Zheng Chang
, Hengwei Deng, Li You
, Geyong Min
, Sahil Garg
, Georges Kaddoum
:
Trajectory Design and Resource Allocation for Multi-UAV Networks: Deep Reinforcement Learning Approaches. 2940-2951 - Hasan Tooba, Jahanzaib Malik
, Iram Bibi, Wali Ullah Khan
, Fahd N. Al-Wesabi
, Kapal Dev
, Gaojian Huang
:
Securing Industrial Internet of Things Against Botnet Attacks Using Hybrid Deep Learning Approach. 2952-2963 - Qianwen Ye
, Xiaochen Fan
, Hongxia Bie, Deepak Puthal
, Tao Wu
, Xudong Song
, Gengfa Fang:
SE-Loc: Security-Enhanced Indoor Localization With Semi-Supervised Deep Learning. 2964-2977 - Honghao Gao
, Binyang Qiu, Ramón J. Durán Barroso
, Walayat Hussain
, Yueshen Xu
, Xinheng Wang
:
TSMAE: A Novel Anomaly Detection Approach for Internet of Things Time Series Data Using Memory-Augmented Autoencoder. 2978-2990 - Fan Zhang
, Guangjie Han
, Li Liu
, Miguel Martínez-García
, Yan Peng
:
Deep Reinforcement Learning Based Cooperative Partial Task Offloading and Resource Allocation for IIoT Applications. 2991-3006 - Yihong Yang
, Xuan Yang
, Mohsen Heidari
, Mohammad Ayoub Khan
, Gautam Srivastava
, Mohammad Reza Khosravi
, Lianyong Qi
:
ASTREAM: Data-Stream-Driven Scalable Anomaly Detection With Accuracy Guarantee in IIoT Environment. 3007-3016 - Yuexia Zhang
, Ying Zhou
:
Resource Allocation Strategy Based On Tripartite Graph in Vehicular Social Networks. 3017-3031 - Kai Peng
, Hualong Huang, Bohai Zhao
, Alireza Jolfaei
, Xiaolong Xu
, Muhammad Bilal
:
Intelligent Computation Offloading and Resource Allocation in IIoT With End-Edge-Cloud Computing Using NSGA-III. 3032-3046 - Jingcheng Song
, Weizheng Wang
, Thippa Reddy Gadekallu
, Jianyu Cao, Yining Liu
:
EPPDA: An Efficient Privacy-Preserving Data Aggregation Federated Learning Scheme. 3047-3057 - Muhammad Tanveer
, Abd Ullah Khan
, Tu N. Nguyen
, Musheer Ahmad
, Ahmed A. Abd El-Latif
:
Towards a Secure and Computational Framework for Internet of Drones Enabled Aerial Computing. 3058-3070 - Xianduo Li
, Xiaoli Gong
, Dong Wang
, Jin Zhang
, Thar Baker
, Jin Zhou, Tingjuan Lu:
ABM-SpConv-SIMD: Accelerating Convolutional Neural Network Inference for Industrial IoT Applications on Edge Devices. 3071-3085 - Yirui Wu
, Haifeng Guo, Chinmay Chakraborty
, Mohammad Reza Khosravi
, Stefano Berretti
, Shaohua Wan
:
Edge Computing Driven Low-Light Image Dynamic Enhancement for Object Detection. 3086-3098
Volume 10, Number 6, November - December 2023
- Shuya Zheng, Zhiyuan Ren
, Wenchi Cheng
, Hailin Zhang
:
Performance Analysis for Subgraph Isomorphism Based Embedding Service Function Chains. 3099-3113 - Richeng Jin
, Yufan Huang
, Zhaoyang Zhang
, Huaiyu Dai
:
On the Privacy Guarantees of Gossip Protocols in General Networks. 3114-3130 - You Zhao, Xiaofeng Liao
, Xing He
:
Distributed Inertial Continuous and Discrete Time Algorithms for Solving Resource Allocation Problem. 3131-3143 - Jinyin Chen
, Chengyu Jia, Haibin Zheng
, Ruoxi Chen, Chenbo Fu
:
Is Multi-Modal Necessarily Better? Robustness Evaluation of Multi-Modal Fake News Detection. 3144-3158 - Haibin Shao
, Haoyu Wei, Lulu Pan
, Dewei Li
:
Distributed Stabilization of Signed Networks via Self-Loop Compensation. 3159-3171 - Qi Xia
, Zeyi Tao
, Qun Li
, Songqing Chen
:
Byzantine Tolerant Algorithms for Federated Learning. 3172-3183 - Xiangli Jiang
, Guihua Xia
, Zhiguang Feng
, Qing-Long Han
, Rong Su
:
On Estimation of Reachable Sets for Approximate Consensus of Homogeneous Multiagent Systems Subject to Bounded Exogenous Disturbances. 3184-3197 - Xiaoyuan Luo
, Yuliang Fu
, Xiaolei Li
:
Resilient Synchronization of Networked Lagrangian Systems Over Event-Based Communication With Asynchronous DoS Attacks. 3198-3208 - Quan Yuan
, Xiang Li
:
Distributed Model Predictive Formation Control for a Group of UAVs With Spatial Kinematics and Unidirectional Data Transmissions. 3209-3222 - Mingfei Chen, Dong Wang, Xiaodong Wang, Zheng-Guang Wu, Wei Wang:
Distributed Aggregative Optimization via Finite-Time Dynamic Average Consensus. 3223-3231 - Benedetta Picano
, Enrico Vicario
, Romano Fantacci
:
An Efficient Flows Dispatching Scheme for Tardiness Minimization of Data-Intensive Applications in Heterogeneous Systems. 3232-3241 - Özge Canli Usta
, Serkan Günel
:
Causation Entropy En Route to Re-Synchronization Unfolds the Structure of Chaotic Dynamical Networks. 3242-3252 - Jiankang Ren
, Zheng Wang, Chi Lin
, Mohammad S. Obaidat
, Hongrui Xie, Haihui Zhu, Chunxiao Liu, Kaiwen Wang, Guozhen Tan
:
REORDER++: Enhanced Randomized Real-Time Scheduling Strategy Against Side-Channel Attacks. 3253-3266 - Armineh Rahmanian Kooshkaki
, Sadegh Bolouki
, S. Rasoul Etesami, Abolfazl Mohebbi
:
Partisan Confidence Model for Group Polarization. 3267-3280 - Jiyang Bai
, Xianbin Wang
, Jie Mei
, Yan Xin, Osama Aboul-Magd, Edward Au
:
Hybrid Services QoS Enhancement by Joint Traffic and Access Management in Unsaturated IEEE 802.11ax Network. 3281-3294 - Jia Zhao
, Jiangchuan Liu
, Haiyang Wang, Changqiao Xu
, Hongke Zhang
:
Multipath Congestion Control: Measurement, Analysis, and Optimization From the Energy Perspective. 3295-3307 - Shashwat Kumar
, A. Antony Franklin
, Jiong Jin
, Yu-Ning Dong
:
Seer: Learning-Based 360$^{\circ }$ Video Streaming for MEC-Equipped Cellular Networks. 3308-3319 - Wei Wang
, Zhenzhen Quan, Siwen Zhao, Guoqiang Sun, Yujun Li
, Xianye Ben
, Jianli Zhao
:
User-Context Collaboration and Tensor Factorization for GNN-Based Social Recommendation. 3320-3330 - Yuanyuan Zeng
, Kai Xiang
:
Persistence Augmented Graph Convolution Network for Information Popularity Prediction. 3331-3342 - Luyao Wang
, Guanglin Zhang
:
Joint Service Caching, Resource Allocation and Computation Offloading in Three-Tier Cooperative Mobile Edge Computing System. 3343-3353 - Guanghao Lv
, Zhouhua Peng
, Yongming Li
, Lu Liu
, Dan Wang
:
Barrier-Certified Model Predictive Cooperative Path Following Control of Connected Autonomous Surface Vehicles. 3354-3367 - Ke Li
, Kexun Chen, Shouxi Luo
, Honghao Zhang, Pingzhi Fan:
UbiNN: A Communication Efficient Framework for Distributed Machine Learning in Edge Computing. 3368-3383 - Zhirui Li
, Jesús Arroyo
, Konstantinos Pantazis
, Vince Lyzinski
:
Clustered Graph Matching for Label Recovery and Graph Classification. 3384-3395 - Daniel Setó-Rey
, José Ignacio San Martín
, Carlos López Nozal
:
Vulnerability of Package Dependency Networks. 3396-3408 - Chenyang Wang
, Ruibin Li
, Xiaofei Wang
, Tarik Taleb
, Song Guo
, Yuxia Sun
, Victor C. M. Leung
:
Heterogeneous Edge Caching Based on Actor-Critic Learning With Attention Mechanism Aiding. 3409-3420 - Peng Qin
, Xue Wu, Ziyuan Cai
, Xiongwen Zhao
, Yang Fu, Miao Wang, Suiyan Geng:
Joint Trajectory Plan and Resource Allocation for UAV-Enabled C-NOMA in Air-Ground Integrated 6G Heterogeneous Network. 3421-3434 - Yuhao Jing
, Zhaohui Yang
, Pingfang Zhou
, Yueying Wang
, Huaicheng Yan
:
Cooperative Deployment Multi-Objective Optimization Approach for High-Resolution Multi-Airship Earth-Observation Coverage Network. 3435-3449 - Miklós Z. Rácz
, Daniel E. Rigobon
:
Towards Consensus: Reducing Polarization by Perturbing Social Networks. 3450-3464 - Xianlong Jiao
, Hongjun Ou
, Shiguang Chen
, Songtao Guo
, Yuben Qu
, Chaocan Xiang
, Jiaxing Shang
:
Deep Reinforcement Learning for Time-Energy Tradeoff Online Offloading in MEC-Enabled Industrial Internet of Things. 3465-3479 - Juyi Li
, Xiaoqun Wu
, Su Zhong, Ruguo Fan, Jie Hu
, Jinhu Lü
:
A Novel Game Investment Model on Uniform Hypergraphs. 3480-3490 - Sanjeev Kumar Dwivedi
, Ruhul Amin
, Satyanarayana Vollala
, Muhammad Khurram Khan
:
B-HAS: Blockchain-Assisted Efficient Handover Authentication and Secure Communication Protocol in VANETs. 3491-3504 - Haoyue Yang
, Hao Zhang
, Zhuping Wang
, Huaicheng Yan
:
Reliable Leader-Following Consensus of Discrete-Time Semi-Markovian Jump Multi-Agent Systems. 3505-3518 - Dan Chen
, Defu Cai, Housheng Su
:
Scaling Properties of Scale-Free Networks in Degree-Thresholding Renormalization Flows. 3519-3528 - Wenqian Zhang
, Zhirong Shen
, Mengjiao Qin, Guanglin Zhang
:
Two Time-Scale Energy and Spectrum Allocation for MEC Networks With Hybrid Energy Supplies. 3529-3542 - Shichang Ding
, Xiangyang Luo
, Jinwei Wang
, Xiaoming Fu
:
GNN-Geo: A Graph Neural Network-Based Fine-Grained IP Geolocation Framework. 3543-3560 - Jiao Chen
, Jianhua Tang
, Weihua Li
:
Industrial Edge Intelligence: Federated-Meta Learning Framework for Few-Shot Fault Diagnosis. 3561-3573 - Jianfeng Zhou
, Wallace K. S. Tang
:
Reconstruction of Commuting Networks: A Distance-Tiered Graph Neural Network Approach. 3574-3586 - Xia Zhao, Fanrong Qu, Chunsheng Liu, Engang Tian
:
Observer-Based Quasi-Synchronization Control for Master-Slave Neural Networks Under Sojourn-Probability-Based Stochastic Communication Protocol. 3587-3596 - Xueyang Meng
, Zidong Wang
, Fan Wang
, Yun Chen
:
Distributed Fusion Filtering for Nonlinear Time-Varying Systems Over Amplify-and-Forward Relay Networks: An $H_{\infty }$ Quantized Framework. 3597-3608 - Jing Ping, Song Zhu
, Mingxiao Shi, Siman Wu, Mouquan Shen
, Xiaoyang Liu
, Shiping Wen
:
Event-Triggered Finite-Time Synchronization Control for Quaternion-Valued Memristive Neural Networks by an Non-Decomposition Method. 3609-3619 - Ningning Lang, Quanbo Zha
, Lin Wang
:
Time-Varying Targeted Marketing in Networks Based on Competitive Opinion Dynamics. 3620-3632 - Ge Fan
, Chaoyun Zhang, Junyang Chen
, Paul Li, Yingjie Li, Victor C. M. Leung
:
Improving Rating Prediction in Multi-Criteria Recommender Systems via a Collective Factor Model. 3633-3643 - Fanchao Kong
, Honglin Ni, Quanxin Zhu
, Cheng Hu
, Tingwen Huang
:
Fixed-Time and Predefined-Time Synchronization of Discontinuous Neutral-Type Competitive Networks via Non-Chattering Adaptive Control Strategy. 3644-3657 - Weihao Li
, Mengji Shi
, Lei Shi
, Boxian Lin, Kaiyu Qin
:
Containment Tracking for Networked Agents Subject to Nonuniform Communication Delays. 3658-3669 - Xiaojia Xu
, Yongcai Wang
, Lanling Xu
, Deying Li
:
LSA: Understanding the Threat of Link-Based Scapegoating Attack in Network Tomography. 3670-3681 - Jiaqi Zhu
, Fang Deng
, Jiachen Zhao
, Daoming Liu, Jie Chen
:
UAED: Unsupervised Abnormal Emotion Detection Network Based on Wearable Mobile Device. 3682-3696 - Ivan Jokic
, Piet Van Mieghem
:
Linear Clustering Process on Networks. 3697-3706 - Jinming Li
, Bo Gu
, Zhen Qin
, Yu Han
:
Graph Tasks Offloading and Resource Allocation in Multi-Access Edge Computing: A DRL-and-Optimization-Aided Approach. 3707-3718 - Wen Zhan
, Dewei Wu
, Xinghua Sun
, Ziyang Guo
, Peng Liu
, Jingjing Liu
:
Peak Age of Information Optimization of Slotted Aloha: FCFS Versus LCFS. 3719-3731 - Kathinka Frieswijk
, Lorenzo Zino
, Ming Cao
:
A Polarized Temporal Network Model to Study the Spread of Recurrent Epidemic Diseases in a Partially Vaccinated Population. 3732-3743 - Yanhu Wang
, Gan Yu
, Wei Xie
, Weidong Zhang
, Carlos Silvestre
:
Robust Saturated Formation Tracking Control of Multiple Quadrotors With Switching Communication Topologies. 3744-3753 - Weiwei Zhan
, Zhiqiang Miao
, Yanjie Chen
, Zheng-Guang Wu
, Yaonan Wang
:
Event-Triggered Finite-Time Formation Control for Networked Nonholonomic Mobile Robots Under Denial-of-Service Attacks. 3754-3766 - Jiaxing Chen, Shiwen Sun
, Chengyi Xia
, Dinghua Shi, Guanrong Chen
:
Modeling and Analyzing Malware Propagation Over Wireless Networks Based on Hypergraphs. 3767-3778 - Xing Li
, Rui Zhou, Guibin Sun
, Jie Zhang:
Connectivity-Preserving Flocking of Multiagent Systems via Selecting Critical Neighbors. 3779-3792 - Haipeng Peng
, Jie Zhao
, Lixiang Li
, Yeqing Ren
, Shanshan Zhao
:
One-Class Adversarial Fraud Detection Nets With Class Specific Representations. 3793-3803 - Jing Xiao
, Yu-Cheng Zou, Xiao-Ke Xu
:
A Metaheuristic-Based Modularity Optimization Algorithm Driven by Edge Directionality for Directed Networks. 3804-3817 - Saber Jafarizadeh
:
Convergence Speed and Robustness Analysis of Epidemic Spreading Processes With Time-Delay. 3818-3833 - Yinyin Zhang, Yongjun Li
, Wenli Ji
:
A Trajectory-Based User Movement Pattern Similarity Measure for User Identification. 3834-3845 - Dandan Wang
, Jialing Zhou
, Guanghui Wen
, Jinhu Lü
, Guanrong Chen
:
Event-Triggered Optimal Consensus of Second-Order MASs With Disturbances and Cyber Attacks on Communications Edges. 3846-3857 - Ebin M. Manuel
, Vinod Pankajakshan
, Manil T. Mohan
:
Energy-Efficient Data Aggregation in Low-Power Wireless Networks With Sensors of Discrete Transmission Ranges: A Mathematical Framework for Network Design. 3858-3870 - Zhi Feng
, Guoqiang Hu
, Xiwang Dong
, Jinhu Lü
:
Adaptively Distributed Nash Equilibrium Seeking of Noncooperative Games for Uncertain Heterogeneous Linear Multi-Agent Systems. 3871-3882 - Zhao Liu
, Feng Chen
, Shukai Duan
:
Distributed Subspace Projection Graph Signal Estimation With Anomaly Interference. 3883-3894 - Fuyi Qu, Ahmad W. Al-Dabbagh
, Zhengen Zhao
, Hao Liu
, Yuzhe Li
:
Remote State Estimation in Networked Systems: Data Pre-Processing or Not? 3895-3907 - Guangyu Peng
, Aiqing Zhang
, Xiaodong Lin
:
Patient-Centric Fine-Grained Access Control for Electronic Medical Record Sharing With Security via Dual-Blockchain. 3908-3921 - Wei Chen
, Zidong Wang
, Jun Hu
, Hongli Dong
, Guo-Ping Liu
:
Distributed Resilient State Estimation for Cyber-Physical Systems Against Bit Errors: A Zonotopic Set-Membership Approach. 3922-3932 - Jiani Li
, Weihan Wang, Waseem Abbas
, Xenofon D. Koutsoukos
:
Distributed Clustering for Cooperative Multi-Task Learning Networks. 3933-3942 - Juan Liu
, Guofeng Mei
, Xiaoqun Wu
, Yuanqing Xia
:
A Unified Inferring Framework of Multiplex Epidemic Networks Under Multiple Interlayer Interaction Modes. 3943-3952 - Guosheng Kang
, Linghang Ding, Jianxun Liu
, Buqing Cao
, Yu Xu:
Web API Recommendation Based on Self-Attentional Neural Factorization Machines With Domain Interactions. 3953-3963 - Jun Yang
, Xinhao Zhuang:
Integrated Energy Management Strategy Based on Finite Time Double Consistency Under Non-Ideal Communication Conditions. 3964-3974 - Zaiben Sun
, Xiaojie Chen
, Attila Szolnoki:
State-Dependent Optimal Incentive Allocation Protocols for Cooperation in Public Goods Games on Regular Networks. 3975-3988 - Jianbang Dai
, Xiaolong Xu
, Honghao Gao
, Fu Xiao
:
CMFTC: Cross Modality Fusion Efficient Multitask Encrypt Traffic Classification in IIoT Environment. 3989-4009 - Lin You
, Zhuobiao Wang, Gengran Hu
, Chengtang Cao
, Liang Li:
An Improved Model on the Vague Sets-Based DPoS's Voting Phase in Blockchain. 4010-4019 - Jingjing Tan
, Fengxiao Tang
, Ming Zhao
, Yusen Zhu:
Adaptive Caching Scheme for Jointly Optimizing Delay and Energy Consumption in Heterogeneous Digital Twin IoT. 4020-4032 - Bin Li
, Zhen Qian, Lei Liu
, Yuan Wu, Dapeng Lan, Celimuge Wu
:
Computation Offloading for Edge Computing in RIS-Assisted Symbiotic Radio Systems. 4033-4045 - Juan Zhang
, Dongsheng Yang
, Huaguang Zhang
, Hanguang Su
:
Adaptive Secure Practical Fault-Tolerant Output Regulation of Multiagent Systems With DoS Attacks by Asynchronous Communications. 4046-4055 - Christos Liaskos
, Konstantinos Alexandris
, Anindya Das
, Siyu Tang
, Leandros Tassiulas:
Analysis and Evaluation of Fully TCP-Compatible Backpressure-Driven Traffic Engineering. 4056-4070 - Ali Ranjha
, Muhammad Awais Javed
, Gautam Srivastava
, Muhammad Asif
:
Quasi-Optimization of Resource Allocation and Positioning for Solar-Powered UAVs. 4071-4081 - Sheng Gao
, Hao Zhang
, Zhuping Wang
, Chao Huang
, Huaicheng Yan
:
Data-Driven Injection Attack Strategy for Linear Cyber-Physical Systems: An Input-Output Data-Based Approach. 4082-4095
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.