- Chandra Priya Jayabal, Praveen Ramalingam, K. Nivitha, T. Sudhakar:
Improved blockchain-based user authentication protocol with ring signature for internet of medical things. Peer Peer Netw. Appl. 17(4): 2415-2434 (2024) - S. Jayashree, S. V. N. Santhosh Kumar:
PFCAS - Paring free certificate less aggregate scheme for ensuring efficient authentication in vehicular Ad-hoc networks. Peer Peer Netw. Appl. 17(5): 3049-3079 (2024) - Sapna Jha, Aditya Trivedi, K. K. Pattanaik, Himanshu Gauttam, Paolo Bellavista:
Efficient data harvesting from boundary nodes for smart irrigation. Peer Peer Netw. Appl. 17(1): 139-162 (2024) - Xuhang Jiang, Yujue Wang, Yong Ding, Zhenyu Li, Huiyong Wang, Hai Liang:
Semi-shadow file system: An anonymous files storage solution. Peer Peer Netw. Appl. 17(1): 18-32 (2024) - Chunhua Jin, Yongliang Xu, Wenyu Qin, Jie Zhao, Ge Kan, Fugeng Zeng:
A blockchain-based auditable deduplication scheme for multi-cloud storage. Peer Peer Netw. Appl. 17(5): 2870-2883 (2024) - G. Sahaya Stalin Jose, Sugitha G, Ayshwarya Lakshmi S, B. C. Preethi:
A multi-objective privacy preservation model for cloud security using hunter prey optimization algorithm. Peer Peer Netw. Appl. 17(2): 911-923 (2024) - Chandra Prabha Kaliappan, Kanmani Palaniappan, Devipriya Ananthavadivel, Ushasukhanya Subramanian:
Advancing IoT security: a comprehensive AI-based trust framework for intrusion detection. Peer Peer Netw. Appl. 17(5): 2737-2757 (2024) - Dingari Kalpana, P. Ajitha:
A hybrid heuristic-assisted deep learning for secured routing and malicious node detection in wireless sensor networks. Peer Peer Netw. Appl. 17(5): 2758-2780 (2024) - Sunil Kumar Kammula, Deepak Singh, Veena Anand:
Dcaro: Dynamic cluster formation and AUV-aided routing optimization for energy-efficient UASNs. Peer Peer Netw. Appl. 17(5): 3335-3352 (2024) - P. Karpurasundharapondian, M. Selvi:
A comprehensive survey on optimization techniques for efficient cluster based routing in WSN. Peer Peer Netw. Appl. 17(5): 3080-3093 (2024) - Nidhi Kashyap, Shuchita Upadhyaya, Monika Poriye, Sachin Lalar, Shalini Aggarwal:
Assessing the efficacy of a novel adaptive fuzzy c-means (AFCM) based clustering algorithm for mobile agent itinerary planning in wireless sensor networks using validity indices. Peer Peer Netw. Appl. 17(4): 2371-2383 (2024) - Rupinder Kaur, Sonia Goyal:
Flexible localization protocol for underwater wireless sensor networks using hybrid reward evaluation scheme. Peer Peer Netw. Appl. 17(5): 3353-3368 (2024) - Gurjot Kaur, Deepti Kakkar:
DRIVE: Dual rider-remora optimization for vehicular routing. Peer Peer Netw. Appl. 17(2): 834-857 (2024) - Volodymyr Kharchenko, Andrii Grekhov, Vasyl Kondratiuk:
Traffic modelling in stratospheric drone-assisted VANET. Peer Peer Netw. Appl. 17(3): 1138-1148 (2024) - Jinsung Kim, Eunsam Kim:
Supporting efficient video file streaming in P2P cloud storage. Peer Peer Netw. Appl. 17(4): 1865-1884 (2024) - Tae Hoon Kim, Moez Krichen, Meznah A. Alamro, Alaeddine Mihoub, Gabriel Avelino R. Sampedro, Sidra Abbas:
Exploiting smartphone defence: a novel adversarial malware dataset and approach for adversarial malware detection. Peer Peer Netw. Appl. 17(5): 3369-3384 (2024) - V. V. Satyanarayana Kona, M. Subramoniam:
A smart Iot-based waste management system using vehicle shortest path routing and trashcan visiting decision making based on deep convolutional neural network. Peer Peer Netw. Appl. 17(3): 1051-1074 (2024) - Qinglei Kong, Yifan Wang, Maode Ma, Xiaodong Qu, Haiyong Bao:
A secure location management scheme in an LEO-satellite network with dual-mobility. Peer Peer Netw. Appl. 17(5): 3146-3158 (2024) - Xiaoyu Kou, Fengwei Wang, Hui Zhu, Yandong Zheng, Xiaopeng Yang, Zhe Liu:
Masked image: Visually protected image dataset privacy-preserving scheme for convolutional neural networks. Peer Peer Netw. Appl. 17(4): 2523-2537 (2024) - M. Ramesh Kumar, Pradeep Sudhakaran:
Securing IoT networks: A robust intrusion detection system leveraging feature selection and LGBM. Peer Peer Netw. Appl. 17(5): 2921-2943 (2024) - Disuja Kumari, Karan Singh:
Lightweight secure authentication and key agreement technique for smart grid. Peer Peer Netw. Appl. 17(1): 451-478 (2024) - Xinyu Lai, Youchi Zhang, Haoxiang Luo:
A low-cost blockchain node deployment algorithm for the internet of things. Peer Peer Netw. Appl. 17(2): 756-766 (2024) - Majd Latah, Kübra Kalkan:
HostSec: A blockchain-based authentication framework for SDN hosts. Peer Peer Netw. Appl. 17(4): 2354-2370 (2024) - Tian-Fu Lee, I-Pin Chang, Jyun-Guo Wang, Yen-Chang Chen, Sheng-Tzung Tsai, Rui-Yu Chen:
Extended chaotic map-based key management for hierarchical access control in e-medicine systems. Peer Peer Netw. Appl. 17(2): 858-870 (2024) - Yao Li, Xingshu Chen, Wenyi Tang, Bingyu Chen:
A green computing method for encrypted IoT traffic recognition based on traffic fingerprint graphs. Peer Peer Netw. Appl. 17(3): 1514-1526 (2024) - Zhuo Li, Yashi Dang, Xin Chen:
Node selection for model quality optimization in hierarchical federated learning based on deep reinforcement learning. Peer Peer Netw. Appl. 17(3): 1720-1731 (2024) - Fang Li, Hang Shen, Jieai Mai, Tianjing Wang, Yuanfei Dai, Xiaodong Miao:
Pre-trained language model-enhanced conditional generative adversarial networks for intrusion detection. Peer Peer Netw. Appl. 17(1): 227-245 (2024) - Guohao Li, Zhongda Tian:
A new method of network traffic prediction based on combination model. Peer Peer Netw. Appl. 17(3): 1075-1090 (2024) - Chunjiao Li, Liangmin Wang, Jiayi Li, Yue Fei:
CIM: CP-ABE-based identity management framework for collaborative edge storage. Peer Peer Netw. Appl. 17(2): 639-655 (2024) - Peiqiang Li, Guojun Wang, Xiaofei Xing, Jinyao Zhu, Wanyi Gu, Guangxin Zhai:
A smart contract vulnerability detection method based on deep learning with opcode sequences. Peer Peer Netw. Appl. 17(5): 3222-3238 (2024)