default search action
IEEE Transactions on Network and Service Management, Volume 20
Volume 20, Number 1, March 2023
- Pramit Biswas, Md Shahbaz Akhtar, Sriparna Saha, Sudhan Majhi, Aneek Adhya:
Q-Learning-Based Energy-Efficient Network Planning in IP-Over-EON. 3-13 - Marco Polverini, Antonio Cianfrani, Marco Listanti, Giulio Siano, Francesco Giacinto Lavacca, Carlo Candeloro Campanile:
Investigating on Black Holes in Segment Routing Networks: Identification and Detection. 14-29 - Hua Wu, Ya Liu, Shanshan Ni, Guang Cheng, Xiaoyan Hu:
LossDetection: Real-Time Packet Loss Monitoring System for Sampled Traffic Data. 30-45 - Rui Zhuang, Jiangping Han, Kaiping Xue, Jian Li, David S. L. Wei, Ruidong Li, Qibin Sun, Jun Lu:
Achieving Flexible and Lightweight Multipath Congestion Control Through Online Learning. 46-59 - Lei Wang, Anmin Yin, Xue Jiang, Mingkai Chen, Kapal Dev, Nawab Muhammad Faseeh Qureshi, Jiming Yao, Baoyu Zheng:
Resource Allocation for Multi-Traffic in Cross-Modal Communications. 60-72 - Yujie Song, Kai Jiang, Yue Cao, Ruiting Zhou, Chakkaphong Suthaputchakun, Yuan Zhuang:
STALB: A Spatio-Temporal Domain Autonomous Load Balancing Routing Protocol. 73-87 - Haonan Bai, Yong Zhang, Zhenyu Zhang, Siyu Yuan:
Latency Equalization Policy of End-to-End Network Slicing Based on Reinforcement Learning. 88-103 - Yun Chai, Youguo Wang:
Optimal Control of Information Diffusion in Temporal Networks. 104-119 - Viktoria-Maria Alevizaki, Markos P. Anastasopoulos, Alexandros-Ioannis Manolopoulos, Anna Tzanakaki:
Distributed Service Provisioning for Disaggregated 6G Network Infrastructures. 120-137 - A. H. M. Jakaria, Mohammad Ashiqur Rahman, Muneeba Asif, Alvi Ataur Khalil, Hisham A. Kholidy, Matthew Anderson, Steven Drager:
Trajectory Synthesis for a UAV Swarm Based on Resilient Data Collection Objectives. 138-151 - Yahui Hu, Yujiang Zhou, Junping Song, Luyang Xu, Xu Zhou:
Citywide Mobile Traffic Forecasting Using Spatial-Temporal Downsampling Transformer Neural Networks. 152-165 - Mohammed Seid Abegaz, Hayla Nahom Abishu, Yasin Habtamu Yacob, Tewodros Alemu Ayall, Aiman Erbad, Mohsen Guizani:
Blockchain-Based Resource Trading in Multi-UAV-Assisted Industrial IoT Networks: A Multi-Agent DRL Approach. 166-181 - Quan-Lin Li, Yan-Xia Chang, Chi Zhang:
Tree Representation, Growth Rate of Blockchain and Reward Allocation in Ethereum With Multiple Mining Pools. 182-200 - Ruba Alkadi, Abdulhadi Shoufan:
Unmanned Aerial Vehicles Traffic Management Solution Using Crowd-Sensing and Blockchain. 201-215 - Guohuai Sang, Jingwei Chen, Yiliang Liu, Haiqin Wu, Yong Zhou, Shunrong Jiang:
PACM: Privacy-Preserving Authentication Scheme With on-Chain Certificate Management for VANETs. 216-228 - Haritha K, Chandramani Singh:
Scheduling Policies for Stability and Optimal Server Running Cost in Cloud Computing Platforms. 229-245 - Aleteng Tian, Bohao Feng, Huachun Zhou, Yunxue Huang, Keshav Sood, Shui Yu, Hongke Zhang:
Efficient Federated DRL-Based Cooperative Caching for Mobile Edge Networks. 246-260 - Mona Elsaadawy, Mohamed Younis, Jifeng Wang, Xinchen Hou, Bettina Kemme:
Dynamic Application Call Graph Formation and Service Identification in Cloud Data Centers. 261-275 - Shreshth Tuli, Giuliano Casale, Nicholas R. Jennings:
DRAGON: Decentralized Fault Tolerance in Edge Federations. 276-291 - Chuan Feng, Pengchao Han, Xu Zhang, Qihan Zhang, Yue Zong, Yejun Liu, Lei Guo:
Cost-Minimized Computation Offloading of Online Multifunction Services in Collaborative Edge-Cloud Networks. 292-304 - Jindou Xie, Yunjian Jia, Wanli Wen, Zhengchuan Chen, Liang Liang:
Dynamic D2D Multihop Offloading in Multi-Access Edge Computing From the Perspective of Learning Theory in Games. 305-318 - Tung V. Doan, Giang T. Nguyen, Martin Reisslein, Frank H. P. Fitzek:
SAP: Subchain-Aware NFV Service Placement in Mobile Edge Cloud. 319-341 - Shraddha Tripathi, Om Jee Pandey, Linga Reddy Cenkeramaddi, Rajesh M. Hegde:
A Socially-Aware Radio Map Framework for Improving QoS of UAV-Assisted MEC Networks. 342-356 - Jie Cui, Fengqun Wang, Qingyang Zhang, Chengjie Gu, Hong Zhong:
Efficient Batch Authentication Scheme Based on Edge Computing in IIoT. 357-368 - Yao Chiang, Chih-Ho Hsu, Guan-Hao Chen, Hung-Yu Wei:
Deep Q-Learning-Based Dynamic Network Slicing and Task Offloading in Edge Network. 369-384 - Hao Luo, Hung-Yu Wei:
Resource Orchestration at the Edge: Intelligent Management of mmWave RAN and Gaming Application QoE Enhancement. 385-399 - Jungyeon Baek, Georges Kaddoum:
FLoadNet: Load Balancing in Fog Networks With Cooperative Multiagent Using Actor-Critic Method. 400-414 - Francisco Muro, Eduardo Baena, Sergio Fortes, Lars Nielsen, Raquel Barco:
Noisy Neighbour Impact Assessment and Prevention in Virtualized Mobile Networks. 415-425 - Zheheng Rao, Yanyan Xu, Shaoming Pan, Jiabao Guo, Yuejing Yan, Zhiheng Wang:
Cellular Traffic Prediction: A Deep Learning Method Considering Dynamic Nonlocal Spatial Correlation, Self-Attention, and Correlation of Spatiotemporal Feature Fusion. 426-440 - Andrew Lappalainen, Yuhao Zhang, Catherine Rosenberg:
Planning 5G Networks for Rural Fixed Wireless Access. 441-455 - Rui Zhang, Libing Wu, Shuqin Cao, Dan Wu, Jianxin Li:
A Vehicular Task Offloading Method With Eliminating Redundant Tasks in 5G HetNets. 456-470 - Mojdeh Karbalaee Motalleb, Vahid Shah-Mansouri, Saeedeh Parsaeefard, Onel Luis Alcaraz López:
Resource Allocation in an Open RAN System Using Network Slicing. 471-485 - Yan Liu, Jinling Jia, Jun Cai, Taiqin Huang:
Deep Reinforcement Learning for Reactive Content Caching With Predicted Content Popularity in Three-Tier Wireless Networks. 486-501 - Mandar Datar, Eitan Altman, Hélène Le Cadre:
Strategic Resource Pricing and Allocation in a 5G Network Slicing Stackelberg Game. 502-520 - Genghua Yu, Zhigang Chen, Jian Wu:
Content-Aware Personalized Sharing Based on Cooperative User Selection and Attention in Mobile Internet of Things. 521-532 - Yudong Huang, Shuo Wang, Xinyuan Zhang, Tao Huang, Yunjie Liu:
Flexible Cyclic Queuing and Forwarding for Time-Sensitive Software-Defined Networks. 533-546 - Keigo Akahoshi, Fujun He, Eiji Oki:
Service Deployment Model Based on Virtual Network Function Resizing. 547-562 - Zhiyuan Li, Lijun Wu, Xiangyun Zeng, Xiaofeng Yue, Yulin Jing, Wei Wu, Kaile Su:
Online Coordinated NFV Resource Allocation via Novel Machine Learning Techniques. 563-577 - Xinxin Tang, Xuewen Zeng, Lei Song:
Accelerating Protocol Oblivious Forwarding Programmable Data Plane With Flow Cache. 578-594 - Davide Borsatti, Chiara Grasselli, Chiara Contoli, Luigia Micciullo, Luca Spinacci, Marina Settembre, Walter Cerroni, Franco Callegati:
Mission Critical Communications Support With 5G and Network Slicing. 595-607 - Ricardo Martínez, Luca Vettori, Jorge Baranda, Josep Mangues-Bafalluy, Engin Zeydan, Bahador Bakhshi:
Resource Abstractions in NFV Management and Orchestration: Experimental Evaluation. 608-624 - Reza Farahani, Mohammad Shojafar, Christian Timmerer, Farzad Tashtarian, Mohammed Ghanbari, Hermann Hellwagner:
ARARAT: A Collaborative Edge-Assisted Framework for HTTP Adaptive Video Streaming. 625-643 - Johannes K. Becker, David Starobinski:
Snout: A Middleware Platform for Software-Defined Radios. 644-657 - Misbah Shafi, Rakesh Kumar Jha, Sanjeev Jain:
LGTBIDS: Layer-Wise Graph Theory-Based Intrusion Detection System in Beyond 5G. 658-671 - Yuan-Cheng Lai, Didik Sudyana, Ying-Dar Lin, Miel Verkerken, Laurens D'hooge, Tim Wauters, Bruno Volckaert, Filip De Turck:
Task Assignment and Capacity Allocation for ML-Based Intrusion Detection as a Service in a Multi-Tier Architecture. 672-683 - Xiaoheng Deng, Jincai Zhu, Xinjun Pei, Lan Zhang, Zhen Ling, Kaiping Xue:
Flow Topology-Based Graph Convolutional Network for Intrusion Detection in Label-Limited IoT Networks. 684-696 - Namrata Tiwari, Neminath Hubballi:
Secure Socket Shell Bruteforce Attack Detection With Petri Net Modeling. 697-710 - Huaiying Sun, Huiqun Yu, Guisheng Fan, Liqiong Chen, Zheng Liu:
Security-Aware and Time-Guaranteed Service Placement in Edge Clouds. 711-725 - Chaoqun You, Yangming Zhao, Gang Feng, Tony Q. S. Quek, Lemin Li:
Hierarchical Multiresource Fair Queueing for Packet Processing. 726-740 - Muhammad Asghar Khan, Neeraj Kumar, Syed Agha Hassnain Mohsan, Wali Ullah Khan, Moustafa M. Nasralla, Mohammed H. Alsharif, Justyna Zywiolek, Insaf Ullah:
Swarm of UAVs for Network Management in 6G: A Technical Review. 741-761 - Edson Rodrigues, Denis Rosário, Eduardo Cerqueira, Helder M. N. S. Oliveira:
Analysis of Routing and Resource Allocation Mechanism for Space-Division Multiplexing Elastic Optical Networks. 762-773 - Angelo Tulumello, Andrea Mayer, Marco Bonola, Paolo Lungaroni, Carmine Scarpitta, Stefano Salsano, Ahmed Abdelsalam, Pablo Camarillo, Darren Dukes, François Clad, Clarence Filsfils:
Micro SIDs: A Solution for Efficient Representation of Segment IDs in SRv6 Networks. 774-786 - Xiaofan Yu, Kazim Ergun, Xueyang Song, Ludmila Cherkasova, Tajana Simunic Rosing:
Automating and Optimizing Reliability-Driven Deployment in Energy-Harvesting IoT Networks. 787-799 - Seyed Soheil Johari, Sepehr Taeb, Nashid Shahriar, Shihabur Rahman Chowdhury, Massimo Tornatore, Raouf Boutaba, Jeebak Mitra, Mahdi Hemmati:
DRL-Assisted Reoptimization of Network Slice Embedding on EON-Enabled Transport Networks. 800-814 - Kokouvi Bénoît Nougnanke, Yann Labit, Marc Bruyere, Ulrich Aïvodji, Simone Ferlin:
ML-Based Performance Modeling in SDN-Enabled Data Center Networks. 815-829 - Matthews Jose, Kahina Lazri, Jérôme François, Olivier Festor:
Stateful InREC: Stateful In-Network Real Number Computation With Recursive Functions. 830-845 - Filipe Bachini Lopes, Alberto E. Schaeffer-Filho, Gabriel Luca Nazar:
Modular VNF Components Acceleration With FPGA Overlays. 846-857 - Jiahua Xu, Yebo Feng:
Reap the Harvest on Blockchain: A Survey of Yield Farming Protocols. 858-869 - Alexander Clemm:
High-Precision Networking Services: Problems, Approaches, and Opportunities. 870-878
Volume 20, Number 2, June 2023
- Nur Zincir-Heywood, Robert Birke, Elias Bou-Harb, Giuliano Casale, Khalil El-Khatib, Takeru Inoue, Neeraj Kumar, Hanan Lutfiyya, Deepak Puthal, Abdallah Shami, Natalia Stakhanova, Farhana H. Zulkernine:
Guest Editorial: Special Section on Machine Learning and Artificial Intelligence for Managing Networks, Systems, and Services - Part II. 882-889 - Tai Manh Ho, Kim Khoa Nguyen, Mohamed Cheriet:
Converging Game Theory and Reinforcement Learning For Industrial Internet of Things. 890-903 - Yang Yang, Yindong Sun, Yuhan Long, Jingting Mei, Peng Yu:
Root Cause Location Based on Prophet and Kernel Density Estimation. 904-917 - Jie Zhou, Ding Ding, Ziteng Wu, Yuting Xiu:
Spatial Context-Aware Time-Series Forecasting for QoS Prediction. 918-931 - Yinong Li, Jianbo Li, Zhiqiang Lv, Haoran Li, Yue Wang, Zhihao Xu:
GASTO: A Fast Adaptive Graph Learning Framework for Edge Computing Empowered Task Offloading. 932-944 - Xuanyu Liu, Xiao Fu, Xiaojiang Du, Bin Luo, Mohsen Guizani:
Machine Learning-Based Non-Intrusive Digital Forensic Service for Smart Homes. 945-960 - Jiong Lou, Zhiqing Tang, Weijia Jia:
Energy-Efficient Joint Task Assignment and Migration in Data Centers: A Deep Reinforcement Learning Approach. 961-973 - Jessica S. Mendoza, Isabel de la Bandera, David Palacios, Raquel Barco:
Forecasting Framework for Mobile Networks Based on Automatic Feature Selection. 974-984 - Gorla Praveen, V. Keerthivasan, Vinay Chamola, Mohsen Guizani:
A Novel Framework of Federated and Distributed Machine Learning for Resource Provisioning in 5G and Beyond Using Mobile-Edge SCBS. 985-994 - Anubhab Banerjee, Stephen S. Mwanje, Georg Carle:
Trust and Performance in Future AI-Enabled, Open, Multi-Vendor Network Management Automation. 995-1007 - Carolina Gijón, Matías Toril, Salvador Luna-Ramírez:
Data-Driven Estimation of Throughput Performance in Sliced Radio Access Networks via Supervised Learning. 1008-1023 - Alaa Awad Abdellatif, Amr Abo-eleneen, Amr Mohamed, Aiman Erbad, Nikhil V. Navkar, Mohsen Guizani:
Intelligent-Slicing: An AI-Assisted Network Slicing Framework for 5G-and-Beyond Networks. 1024-1039 - Yifan He, Zhao Li, Zhenpeng Li, Shuigeng Zhou, Ting Yu, Ji Zhang:
Towards Cross-Lingual Multi-Modal Misinformation Detection for E-Commerce Management. 1040-1050 - Yaowen Qi, Li Yang, Chengsheng Pan, Cheng Chi, Qilong Huang:
A Flexible Topology Reconstruction Strategy Based on Deep Q-Learning for Balance Performance and Efficiency of STINs. 1051-1064 - Ali Raza, Nabeel Akhtar, Vatche Isahagian, Ibrahim Matta, Lei Huang:
Configuration and Placement of Serverless Applications Using Statistical Learning. 1065-1077 - Buqing Cao, Lulu Zhang, Mi Peng, Yueying Qing, Guosheng Kang, Jianxun Liu:
Web Service Recommendation via Combining Bilinear Graph Representation and xDeepFM Quality Prediction. 1078-1092 - Chengyi Qu, Francesco Betti Sorbelli, Rounak Singh, Prasad Calyam, Sajal K. Das:
Environmentally-Aware and Energy-Efficient Multi-Drone Coordination and Networking for Disaster Response. 1093-1109 - Muhammad Sulaiman, Arash Moayyedi, Mahdieh Ahmadi, Mohammad Ali Salahuddin, Raouf Boutaba, Aladdin Saleh:
Coordinated Slicing and Admission Control Using Multi-Agent Deep Reinforcement Learning. 1110-1124 - Lei Tan, Daofu Gong, Zhenyu Li, Shaoyong Du, Fenlin Liu:
Neural Attention Networks for Recommendation With Auxiliary Data. 1125-1139 - Mohammad Ariful Islam, Hisham Siddique, Wenbin Zhang, Israat Haque:
A Deep Neural Network-Based Communication Failure Prediction Scheme in 5G RAN. 1140-1152 - Sharva Garg, Tanmoy Bag, Andreas Mitschele-Thiel:
Data-Driven Self-Organization With Implicit Self-Coordination for Coverage and Capacity Optimization in Cellular Networks. 1153-1169 - Ahmad M. Nagib, Hatem Abou-Zeid, Hossam S. Hassanein:
Accelerating Reinforcement Learning via Predictive Policy Transfer in 6G RAN Slicing. 1170-1183 - Anselme Ndikumana, Kim Khoa Nguyen, Mohamed Cheriet:
Two-Level Closed Loops for RAN Slice Resources Management Serving Flying and Ground-Based Cars. 1184-1198 - Sajid Ali, Omar Abusabha, Farman Ali, Muhammad Imran, Tamer Abuhmed:
Effective Multitask Deep Learning for IoT Malware Detection and Identification Using Behavioral Traffic Analysis. 1199-1209 - Subhash Sagar, Adnan Mahmood, Kai Wang, Quan Z. Sheng, Jitander Kumar Pabani, Wei Emma Zhang:
Trust-SIoT: Toward Trustworthy Object Classification in the Social Internet of Things. 1210-1223 - Ting-Li Huoh, Yan Luo, Peilong Li, Tong Zhang:
Flow-Based Encrypted Network Traffic Classification With Graph Neural Networks. 1224-1237 - Steffen Lindner, Daniel Merling, Michael Menth:
Learning Multicast Patterns for Efficient BIER Forwarding With P4. 1238-1253 - Anderson Bergamini de Neira, Alex Medeiros de Araújo, Michele Nogueira:
An Intelligent System for DDoS Attack Prediction Based on Early Warning Signals. 1254-1266 - Alfredo Nascita, Antonio Montieri, Giuseppe Aceto, Domenico Ciuonzo, Valerio Persico, Antonio Pescapè:
Improving Performance, Reliability, and Feasibility in Multimodal Multitask Traffic Classification with XAI. 1267-1289 - Pratyush Kr. Deka, Yash Verma, Adil Bin Bhutto, Erik Elmroth, Monowar H. Bhuyan:
Semi-Supervised Range-Based Anomaly Detection for Cloud Systems. 1290-1304 - Willian Tessaro Lunardi, Martin Andreoni Lopez, Jean Pierre Giacalone:
ARCADE: Adversarially Regularized Convolutional Autoencoder for Network Anomaly Detection. 1305-1318 - Guilherme Werneck de Oliveira, Michele Nogueira, Aldri Luiz dos Santos, Daniel Macêdo Batista:
Intelligent VNF Placement to Mitigate DDoS Attacks on Industrial IoT. 1319-1331 - Ehsan Nowroozi, Abhishek, Mohammadreza Mohammadi, Mauro Conti:
An Adversarial Attack Analysis on Malicious Advertisement URL Detection Framework. 1332-1344 - Sajal Saha, Anwar Haque, Greg Sidebottom:
Analyzing the Impact of Outlier Data Points on Multi-Step Internet Traffic Prediction Using Deep Sequence Models. 1345-1362 - Hassan Fawaz, Julien Lesca, Pham Tran Anh Quang, Jérémie Leguay, Djamal Zeghlache, Paolo Medagliani:
Graph Convolutional Reinforcement Learning for Collaborative Queuing Agents. 1363-1377 - Jiaxing Qi, Zhongzhi Luan, Shaohan Huang, Carol J. Fung, Hailong Yang, Hanlu Li, Danfeng Zhu, Depei Qian:
LogEncoder: Log-Based Contrastive Representation Learning for Anomaly Detection. 1378-1391 - Andressa Vergütz, Bruna V. Dos Santos, Burak Kantarci, Michele Nogueira:
Data Instrumentation From IoT Network Traffic as Support for Security Management. 1392-1404 - Xiaodong Zang, Jian Gong, Maoli Wang, Peng Gao:
Encrypted DNS Traffic Analysis for Service Intention Inferring. 1405-1417 - Na Zhao, Biao Han, Ruidong Li, Jinshu Su, Cong Zhou:
A Multivariate KPIs Anomaly Detection Framework With Dynamic Balancing Loss Training. 1418-1429 - Guangjie Han, Zhengwei Xu, Chuanliang Chen, Li Liu, Hongbo Zhu:
Fault Diagnosis in Industrial Control Networks Using Transferability-Measured Adversarial Adaptation Network. 1430-1440 - Azzam Mourad, Hadi Otrok, Ernesto Damiani, Mérouane Debbah, Nadra Guizani, Shiqiang Wang, Guangjie Han, Rabeb Mizouni, Jamal Bentahar, Chamseddine Talhi:
Guest Editorial: Special Section on the Latest Developments in Federated Learning for the Management of Networked Systems and Resources. 1441-1445 - Lei Liu, Yuxing Tian, Chinmay Chakraborty, Jie Feng, Qingqi Pei, Li Zhen, Keping Yu:
Multilevel Federated Learning-Based Intelligent Traffic Flow Forecasting for Transportation Network Management. 1446-1458 - Xikang Jiang, Jinhui Zhang, Lin Zhang:
FedRadar: Federated Multi-Task Transfer Learning for Radar-Based Internet of Medical Things. 1459-1469 - Venkatraman Balasubramanian, Moayad Aloqaily, Martin Reisslein:
Fed-TSN: Joint Failure Probability-Based Federated Learning for Fault-Tolerant Time-Sensitive Networks. 1470-1486 - Yuchang Sun, Jiawei Shao, Yuyi Mao, Jessie Hui Wang, Jun Zhang:
Semi-Decentralized Federated Edge Learning With Data and Device Heterogeneity. 1487-1501 - Abdullatif Albaseer, Mohamed M. Abdallah, Ala I. Al-Fuqaha, Abegaz Mohammed Seid, Aiman Erbad, Octavia A. Dobre:
Fair Selection of Edge Nodes to Participate in Clustered Federated Multitask Learning. 1502-1516 - Dost Muhammad Saqib Bhatti, Haewoon Nam:
FedCLS: Class-Aware Federated Learning in a Heterogeneous Environment. 1517-1528 - Lin Teng, Yulong Qiao, Muhammad Shafiq, Gautam Srivastava, Abdul Rehman Javed, Thippa Reddy Gadekallu, Shoulin Yin:
FLPK-BiSeNet: Federated Learning Based on Priori Knowledge and Bilateral Segmentation Network for Image Edge Extraction. 1529-1542 - Ibrahim Shaer, Abdallah Shami:
CorrFL: Correlation-Based Neural Network Architecture for Unavailability Concerns in a Heterogeneous IoT Environment. 1543-1557 - Feng Yu, Hui Lin, Xiaoding Wang, Sahil Garg, Georges Kaddoum, Satinder Singh, Mohammad Mehedi Hassan:
Communication-Efficient Personalized Federated Meta-Learning in Edge Networks. 1558-1571 - Feng Sun, Zhenjiang Zhang, Xiaolin Chang, Kaige Zhu:
Toward Heterogeneous Environment: Lyapunov-Orientated ImpHetero Reinforcement Learning for Task Offloading. 1572-1586 - Ali Riahi, Amr Mohamed, Aiman Erbad:
RL-Based Federated Learning Framework Over Blockchain (RL-FL-BC). 1587-1599 - Aditya Pribadi Kalapaaking, Ibrahim Khalil, Mohammed Atiquzzaman:
Smart Policy Control for Securing Federated Learning Management System. 1600-1611 - Sabra Ben Saad, Bouziane Brik, Adlen Ksentini:
Toward Securing Federated Learning Against Poisoning Attacks in Zero Touch B5G Networks. 1612-1624 - Xuan-Son Vu, Maode Ma, Monowar H. Bhuyan:
MetaVSID: A Robust Meta-Reinforced Learning Approach for VSI-DDoS Detection on the Edge. 1625-1643 - Alessio Sacco, Matteo Flocco, Flavio Esposito, Guido Marchetto:
Partially Oblivious Congestion Control for the Internet via Reinforcement Learning. 1644-1659 - Qize Guo, Rentao Gu, Hao Yu, Tarik Taleb, Yuefeng Ji:
Probabilistic-Assured Resource Provisioning With Customizable Hybrid Isolation for Vertical Industrial Slicing. 1660-1675 - Moeen Al-Makhlafi, Huaxi Gu, Ahlam Almuaalemi, Eiad Almekhlafi, Musbahu M. Adam:
RibsNet: A Scalable, High-Performance, and Cost-Effective Two-Layer-Based Cloud Data Center Network Architecture. 1676-1690 - Yitu Wang, Takayuki Nakachi, Wei Wang:
Pattern Discovery and Multi-Slot-Ahead Forecast of Network Traffic: A Revisiting to Gaussian Process. 1691-1706 - Yuan Gao, Liquan Chen, Ge Wu, Qianmu Li, Tong Fu:
A Game Theory Study of Big Data Analytics in Internet of Things. 1707-1716 - Venkatarami Reddy Chintapalli, Sai Balaram Korrapati, Madhura Adeppady, Bheemarjuna Reddy Tamma, A. Antony Franklin, Balaprakasa Rao Killi:
NFVPermit: Toward Ensuring Performance Isolation in NFV-Based Systems. 1717-1732 - Diogo Menezes Ferrazani Mattos, Gabriel Reis Carrara, Célio Vinicius N. de Albuquerque, Daniel Mossé:
Exploring Overlay Topology Cost-Termination Tradeoff in Blockchain Vicinity-Based Consensus. 1733-1744 - Suhui Liu, Jiguo Yu, Liquan Chen, Baobao Chai:
Blockchain-Assisted Comprehensive Key Management in CP-ABE for Cloud-Stored Data. 1745-1758 - Hao Guo, Wanxin Li, Mark M. Nejad, Chien-Chung Shen:
A Hybrid Blockchain-Edge Architecture for Electronic Health Record Management With Attribute-Based Cryptographic Mechanisms. 1759-1774 - Mohamed A. El-Zawawy, Alessandro Brighente, Mauro Conti:
Authenticating Drone-Assisted Internet of Vehicles Using Elliptic Curve Cryptography and Blockchain. 1775-1789 - Subhra Mazumdar, Prabal Banerjee, Abhinandan Sinha, Sushmita Ruj, Bimal Kumar Roy:
Strategic Analysis of Griefing Attack in Lightning Network. 1790-1803 - Joonwoo Kim, Jaewook Lee, Taeyun Kim, Sangheon Pack:
Deep Q-Network-Based Cloud-Native Network Function Placement in Edge Cloud-Enabled Non-Public Networks. 1804-1816 - Wenting Wei, Huaxi Gu, Kun Wang, Jianjia Li, Xuan Zhang, Ning Wang:
Multi-Dimensional Resource Allocation in Distributed Data Centers Using Deep Reinforcement Learning. 1817-1829 - Mahdi Dolati, Seyed Hamed Rastegar, Ahmad Khonsari, Majid Ghaderi:
Layer-Aware Containerized Service Orchestration in Edge Networks. 1830-1846 - Su Wang, Seyyedali Hosseinalipour, Maria Gorlatova, Christopher G. Brinton, Mung Chiang:
UAV-Assisted Online Machine Learning Over Multi-Tiered Networks: A Hierarchical Nested Personalized Federated Learning Approach. 1847-1865 - Seyedeh Negar Afrasiabi, Amin Ebrahimzadeh, Carla Mouradian, Sepideh Malektaji, Roch H. Glitho:
Reinforcement Learning-Based Optimization Framework for Application Component Migration in NFV Cloud-Fog Environments. 1866-1883 - Nidhi Sharma, Krishan Kumar:
Energy Efficient Clustering and Resource Allocation Strategy for Ultra-Dense Networks: A Machine Learning Framework. 1884-1897 - Jinbin Hu, Jiawei Huang, Zhaoyi Li, Jianxin Wang, Tian He:
A Receiver-Driven Transport Protocol With High Link Utilization Using Anti-ECN Marking in Data Center Networks. 1898-1912 - Ahmad Hammoud, Maria Kantardjian, Amir Najjar, Azzam Mourad, Hadi Otrok, Zbigniew Dziong, Nadra Guizani:
Dynamic Fog Federation Scheme for Internet of Vehicles. 1913-1923 - Ahmed Alagha, Shakti Singh, Hadi Otrok, Rabeb Mizouni:
Influence- and Interest-Based Worker Recruitment in Crowdsourcing Using Online Social Networks. 1924-1936 - Mohammad Al-Quraan, Ahsan Raza Khan, Lina S. Mohjazi, Anthony Centeno, Ahmed Zoha, Muhammad Ali Imran:
Intelligent Beam Blockage Prediction for Seamless Connectivity in Vision-Aided Next-Generation Wireless Networks. 1937-1948 - Xing Su, Yiting Ren, Zhi Cai, Yi Liang, Limin Guo:
A Q-Learning-Based Routing Approach for Energy Efficient Information Transmission in Wireless Sensor Network. 1949-1961 - Dor Harris, Arik Rinberg, Ori Rottenstreich:
Compressing Distributed Network Sketches With Traffic-Aware Summaries. 1962-1975 - Foivos Michelinakis, Joan S. Pujol Roig, Sara Malacarne, Min Xie, Thomas Dreibholz, Sayantini Majumdar, Wint Yi Poe, Georgios Patounas, Carmen Guerrero, Ahmed Elmokashfi, Vasileios Theodorou:
AI Anomaly Detection for Cloudified Mobile Core Architectures. 1976-1992 - Jianbang Dai, Xiaolong Xu, Honghao Gao, Xinheng Wang, Fu Xiao:
SHAPE: A Simultaneous Header and Payload Encoding Model for Encrypted Traffic Classification. 1993-2012 - Tingyu Li, Zuqing Zhu:
QoS-Aware Management Reconfiguration of vNF Service Trees With Heterogeneous NFV Platforms. 2013-2024 - Haoxian Feng, Zhaogang Shu, Tarik Taleb, Yuantao Wang, Zhiwei Liu:
An Aggressive Migration Strategy for Service Function Chaining in the Core Cloud. 2025-2039 - Roger Robson dos Santos, Eduardo K. Viegas, Altair O. Santin, Vinicius Vielmo Cogo:
Reinforcement Learning for Intrusion Detection: More Model Longness and Fewer Updates. 2040-2055 - Wendi Feng, Chuanchang Liu, Bo Cheng, Junliang Chen, Zhiguo Wan:
An End-Host-Importance-Aware Secure Service-Enabled Hybrid SDN Deployment. 2056-2070 - Onur Barut, Yan Luo, Peilong Li, Tong Zhang:
R1DIT: Privacy-Preserving Malware Traffic Classification With Attention-Based Neural Networks. 2071-2085 - Rikima Mitsuhashi, Yong Jin, Katsuyoshi Iida, Takahiro Shinagawa, Yoshiaki Takai:
Malicious DNS Tunnel Tool Recognition Using Persistent DoH Traffic Analysis. 2086-2095 - Ehsan Nowroozi, Mohammadreza Mohammadi, Erkay Savas, Yassine Mekdad, Mauro Conti:
Employing Deep Ensemble Learning for Improving the Security of Computer Networks Against Adversarial Attacks. 2096-2105
Volume 20, Number 3, September 2023
- Efterpi Paraskevoulakou, Dimosthenis Kyriazis:
ML-FaaS: Toward Exploiting the Serverless Paradigm to Facilitate Machine Learning Functions as a Service. 2110-2123 - Müge Erel-Özçevik, Ferdi Tekçe:
Grant-Free SCMA Design Using SDN/NFV With Physical Layer Security. 2124-2135 - Martin Westerkamp, Axel Küpper:
Instant Function Calls Using Synchronized Cross-Blockchain Smart Contracts. 2136-2150 - Massimo Tornatore, Teresa Gomes, Carmen Mas Machuca, Eiji Oki, Chadi Assi, Dominic Schupke:
Guest Editors' Introduction: Special Section on Robust and Reliable Networks of the Future. 2151-2156 - Danyang Zheng, Gangxiang Shen, Yongcheng Li, Xiaojun Cao, Biswanath Mukherjee:
Service Function Chaining and Embedding With Heterogeneous Faults Tolerance in Edge Networks. 2157-2171 - Roi Ben Haim, Ori Rottenstreich:
Low-Latency and Reliable Virtual Network Function Placement in Edge Clouds. 2172-2185 - Brigitte Jaumard, Quang Huy Duong:
A Nested Decomposition Model for Reliable NFV 5G Network Slicing. 2186-2200 - Andrés F. Ocampo, Mah-Rukh Fida, Juan Felipe Botero, Ahmed Elmokashfi, Haakon Bryhni:
Opportunistic CPU Sharing in Mobile Edge Computing Deploying the Cloud-RAN. 2201-2217 - Masoud Taghavian, Yassine Hadjadj Aoul, Géraldine Texier, Nicolas Huin, Philippe Bertin:
An Approach to Network Service Placement Reconciling Optimality and Scalability. 2218-2229 - Rui Li, Bertr Decocq, Anne Barros, Yi-Ping Fang, Zhiguo Zeng:
Estimating 5G Network Service Resilience Against Short Timescale Traffic Variation. 2230-2243 - Alessio Sacco, Flavio Esposito, Guido Marchetto:
Completing and Predicting Internet Traffic Matrices Using Adversarial Autoencoders and Hidden Markov Models. 2244-2258 - Siamak Azadiabad, Ferhat Khendek, Maria Toeroe:
Runtime Adaptation Framework for Fulfilling Availability and Continuity Requirements of Network Services. 2259-2282 - Sai Shreyas Bhavanasi, Lorenzo Pappone, Flavio Esposito:
Dealing With Changes: Resilient Routing via Graph Neural Networks and Multi-Agent Deep Reinforcement Learning. 2283-2294 - Joël Roman Ky, Bertrand Mathieu, Abdelkader Lahmadi, Raouf Boutaba:
ML Models for Detecting QoE Degradation in Low-Latency Applications: A Cloud-Gaming Case Study. 2295-2308 - Balázs Varga, János Farkas, Ferenc Fejes, Junaid Ansari, István Moldován, Miklós Máté:
Robustness and Reliability Provided by Deterministic Packet Networks (TSN and DetNet). 2309-2318 - Fábio L. Verdi, Gustavo V. Luz:
InFaRR: In-Network Fast ReRouting. 2319-2330 - Yuxiao Zhang, Qian Lv, Ruoxing Li, Xiaojian Tian, Zuqing Zhu:
Planning of Survivable Wavelength-Switched Optical Networks Based on P2MP Transceivers. 2331-2342 - Giacomo Borraccini, Stefano Straullu, Alessio Giorgetti, Renato Ambrosone, Emanuele Virgillito, Andrea D'Amico, Rocco D'Ingillo, Francesco Aquilino, Antonino Nespola, Nicola Sambo, Filippo Cugini, Vittorio Curri:
Experimental Demonstration of Partially Disaggregated Optical Network Control Using the Physical Layer Digital Twin. 2343-2355 - Yuanhao Liu, Fen Zhou, Tao Shang, Juan-Manuel Torres-Moreno:
Disaster Protection for Service Function Chain Provisioning in EO-DCNs. 2356-2369 - Ori Rottenstreich:
Path Diversity and Survivability for the HyperX Datacenter Topology. 2370-2385 - Gilson Miranda, Esteban Municio, Jetmir Haxhibeqiri, Jeroen Hoebeke, Ingrid Moerman, Johann M. Márquez-Barja:
Enabling Time-Sensitive Network Management Over Multi-Domain Wired/Wi-Fi Networks. 2386-2399 - Badreddine Yacine Yacheur, Toufik Ahmed, Mohamed Mosbah:
Efficient DRL-Based Selection Strategy in Hybrid Vehicular Networks. 2400-2411 - Amin Azari, Meysam Masoudi, Cedomir Stefanovic, Cicek Cavdar:
Reliable and Energy-Efficient IoT Systems: Design Considerations in Coexistence Deployments. 2412-2427 - Pedro Rosa, André Souto, José Cecílio:
Light-SAE: A Lightweight Authentication Protocol for Large-Scale IoT Environments Made With Constrained Devices. 2428-2441 - Ahmad Zainudin, Rubina Akter, Dong-Seong Kim, Jae-Min Lee:
Federated Learning Inspired Low-Complexity Intrusion Detection and Classification Technique for SDN-Based Industrial CPS. 2442-2459 - Yutaro Yoshinaka, Kentaro Kita, Junji Takemasa, Yuki Koizumi, Toru Hasegawa:
Programmable Name Obfuscation Framework for Controlling Privacy and Performance on CCN. 2460-2474 - Giovanna Carofiglio, Giulio Grassi, Luca Muscariello, Michele Papalini, Jacques Samain:
ROBUST: A Reliable and Flexible Media Transport for Real-Time Services. 2475-2488 - Raffaele Bolla, Roberto Bruschi, Franco Davoli, Chiara Lombardo, Alireza Mohammadpour, Riccardo Trivisonno, Wint Yi Poe:
Adaptive Reliability for the Automated Control of Human-Robot Collaboration in Beyond-5G Networks. 2489-2503 - Dao Thanh Hai:
On Routing, Wavelength, Network Coding Assignment, and Protection Configuration Problem in Optical-Processing-Enabled Networks. 2504-2514 - Mohammad J. Hashemi, Eric Keller, Saeid Tizpaz-Niari:
Detecting Unseen Anomalies in Network Systems by Leveraging Neural Networks. 2515-2528 - Ruizhi Xiao, Hao Chen, Jintian Lu, Weilong Li, Shuyuan Jin:
AllInfoLog: Robust Diverse Anomalies Detection Based on All Log Features. 2529-2543 - Merkouris Karaliopoulos, Georgios Cheirmpos, Iordanis Koutsopoulos:
Sharing Data Plans for Cellular Mobile Data Access. 2544-2557 - Toru Mano, Takeru Inoue, Kimihiro Mizutani, Osamu Akashi:
Redesigning the Nonblocking Clos Network to Increase Its Capacity. 2558-2574 - Albert Pagès, Fernando Agraz, Jordi Biosca Caro, Salvatore Spadaro:
Machine Learning-Based Multi-Domain Actuation Orchestration in Support of End-to-End Service Quality-Assurance. 2575-2586 - Huiqiang Lian, Jiahui Li, Hao Wu, Yiji Zhao, Lei Zhang, Xin Wang:
Toward Effective Personalized Service QoS Prediction From the Perspective of Multi-Task Learning. 2587-2597 - Binglin Tao, Mingyu Xiao, Jingyang Zhao:
Minimum-Weight Link-Disjoint Paths With a Bounded Number of Shared Nodes. 2598-2610 - Kotaro Hatanaka, Tatsuaki Kimura, Yuka Komai, Keisuke Ishibashi, Masahiro Kobayashi, Shigeaki Harada:
Extraction and Prediction of User Communication Behaviors From DNS Query Logs Based on Nonnegative Tensor Factorization. 2611-2624 - Chuan Sheng, Yu Yao, Wenxuan Li, Wei Yang, Ying Liu:
Unknown Attack Traffic Classification in SCADA Network Using Heuristic Clustering Technique. 2625-2638 - Wenting Wei, Liying Fu, Huaxi Gu, Yan Zhang, Tao Zou, Chao Wang, Ning Wang:
GRL-PS: Graph Embedding-Based DRL Approach for Adaptive Path Selection. 2639-2651 - Jiayu Yang, Jiangping Han, Kaiping Xue, Yansen Wang, Jian Li, Yitao Xing, Hao Yue, David S. L. Wei:
TCCC: A Throughput Consistency Congestion Control Algorithm for MPTCP in Mixed Transmission of Long and Short Flows. 2652-2667 - Zhixuan Jia, Yushun Fan, Jia Zhang:
MGMASR: Multi-Graph and Multi-Aspect Neural Network for Service Recommendation in Internet of Services. 2668-2681 - Ákos Recse, Nattakorn Promwongsa, Amin Ebrahimzadeh, Seyedeh Negar Afrasiabi, Carla Mouradian, Wubin Li, Róbert Szabó, Roch H. Glitho:
Look-Ahead VNF-FG Embedding Framework for Latency-Sensitive Network Services. 2682-2697 - Adil Israr, Qiang Yang, Ali Israr:
Renewable Energy Provision and Energy-Efficient Operational Management for Sustainable 5G Infrastructures. 2698-2710 - Tong Xiao, Zhe Quan, Zhi-Jie Wang, Kaiqi Zhao, Xiangke Liao, Huang Huang, Yunfei Du, Kenli Li:
LPV: A Log Parsing Framework Based on Vectorization. 2711-2725 - Liangkang Zhang, Yulai Xie, Minpeng Jin, Pan Zhou, Gongming Xu, Yafeng Wu, Dan Feng, Darrell D. E. Long:
A Novel Hybrid Model for Docker Container Workload Prediction. 2726-2743 - Fan Yang, Fangmin Xu, Tao Feng, Chao Qiu, Chenglin Zhao:
pDPoSt+sPBFT: A High Performance Blockchain-Assisted Parallel Reinforcement Learning in Industrial Edge-Cloud Collaborative Network. 2744-2759 - Chuanyun Li, Florian Spychiger, Claudio J. Tessone:
The Miner's Dilemma With Migration: The Control Effect of Solo-Mining. 2760-2770 - Harsh Kasyap, Arpan Manna, Somanath Tripathy:
An Efficient Blockchain Assisted Reputation Aware Decentralized Federated Learning Framework. 2771-2782 - Nisita Weerasinghe, Raaj Anand Mishra, Pawani Porambage, Madhusanka Liyanage, Mika Ylianttila:
Proof-of-Monitoring (PoM): A Novel Consensus Mechanism for Blockchain-Based Secure Service Level Agreement Management. 2783-2803 - PeiYun Zhang, WeiFeng Guo, ZiJie Liu, MengChu Zhou, Bo Huang, Khaled Sedraoui:
Optimized Blockchain Sharding Model Based on Node Trust and Allocation. 2804-2816 - Ke Mu, Xuetao Wei:
EfShard: Toward Efficient State Sharding Blockchain via Flexible and Timely State Allocation. 2817-2829 - Xu Wu, Shuang Wei, Zhen Zhang, Pin Lv:
Main-Secondary Blockchain Framework: Cross-Domain Trust Management Mechanism Using Trust Ticket. 2830-2844 - Muhammad Rasyid Redha Ansori, Allwinnaldo, Revin Naufal Alief, Igboanusi Ikechi Saviour, Jae Min Lee, Dong-Seong Kim:
HADES: Hash-Based Audio Copy Detection System for Copyright Protection in Decentralized Music Sharing. 2845-2853 - Jing Zhang, Huixia Fang, Hong Zhong, Jie Cui, Debiao He:
Blockchain-Assisted Privacy-Preserving Traffic Route Management Scheme for Fog-Based Vehicular Ad-Hoc Networks. 2854-2868 - Xiangli Xiao, Yushu Zhang, Youwen Zhu, Pengfei Hu, Xiaochun Cao:
FingerChain: Copyrighted Multi-Owner Media Sharing by Introducing Asymmetric Fingerprinting Into Blockchain. 2869-2885 - PeiYun Zhang, ZiJie Liu, MengChu Zhou, Bo Huang:
A Group-Based Block Storage Model With Block Splitting and Unit Encoding for Consortium Blockchains. 2886-2897 - Gang Liu, Zhenping Wu, Yufei Zhou, Yan Liu, Hongzhaoning Kang:
Communitychain: Toward a Scalable Blockchain in Smart Home. 2898-2911 - Thomas Kwantwi, Guolin Sun, Noble Arden Elorm Kuadey, Gerald Tietaa Maale, Guisong Liu:
Blockchain-Based Computing Resource Trading in Autonomous Multi-Access Edge Network Slicing: A Dueling Double Deep Q-Learning Approach. 2912-2928 - Jayasree Sengupta, Sushmita Ruj, Sipra Das Bit:
FairShare: Blockchain Enabled Fair, Accountable and Secure Data Sharing for Industrial IoT. 2929-2941 - Riham AlTawy, Hisham S. Galal, Amr M. Youssef:
Mjolnir: Breaking the Glass in a Publicly Verifiable Yet Private Manner. 2942-2956 - Sivaselvan N, Vivekananda Bhat K., Muttukrishnan Rajarajan, Ashok Kumar Das:
A New Scalable and Secure Access Control Scheme Using Blockchain Technology for IoT. 2957-2974 - Juxing Zhu, Ning Huang, Junliang Wang, Xiaopeng Qin:
Availability Model for Data Center Networks With Dynamic Migration and Multiple Traffic Flows. 2975-2989 - Mahdi Sharara, Sahar Hoteit, Patrick Brown, Véronique Vèque:
On Coordinated Scheduling of Radio and Computing Resources in Cloud-RAN. 2990-3003 - Chengyuan Huang, Jiao Zhang, Tao Huang:
SLIT: Achieving Fast Bandwidth Isolation Across Virtual Machines. 3004-3019 - Shuo Qin, Dechang Pi, Zhongshi Shao, Yue Xu:
A Discrete Interval-Based Multi-Objective Memetic Algorithm for Scheduling Workflow With Uncertainty in Cloud Environment. 3020-3037 - Guilherme Weigert Cassales, Heitor Murilo Gomes, Albert Bifet, Bernhard Pfahringer, Hermes Senger:
Balancing Performance and Energy Consumption of Bagging Ensembles for the Classification of Data Streams in Edge Computing. 3038-3054 - Vijay Kumar, Poonam Yadav, Leandro Soares Indrusiak:
Resilient Edge: Building an Adaptive and Resilient Multi-Communication Network for IoT Edge Using LPWAN and WiFi. 3055-3071 - Ashish Pandey, Prasad Calyam, Zhen Lyu, Songjie Wang, Dmitrii Chemodanov, Trupti Joshi:
Knowledge-Engineered Multi-Cloud Resource Brokering for Application Workflow Optimization. 3072-3088 - Guisheng Fan, Xingpeng Chen, Zengpeng Li, Huiqun Yu, Yingxue Zhang:
An Energy-Efficient Dynamic Scheduling Method of Deadline-Constrained Workflows in a Cloud Environment. 3089-3103 - Alireza R. Erfanian, Hadi Amirpour, Farzad Tashtarian, Christian Timmerer, Hermann Hellwagner:
CD-LwTE: Cost- and Delay-Aware Light-Weight Transcoding at the Edge. 3104-3118 - Bing Tang, Feiyan Guo, Buqing Cao, Mingdong Tang, Kuan-Ching Li:
Cost-Aware Deployment of Microservices for IoT Applications in Mobile Edge Computing Environment. 3119-3134 - Madhura Adeppady, Paolo Giaccone, Holger Karl, Carla-Fabiana Chiasserini:
Reducing Microservices Interference and Deployment Time in Resource-Constrained Cloud Systems. 3135-3147 - Itamar Cohen, Gil Einziger, Maayan Goldstein, Yaniv Sa'ar, Gabriel Scalosub, Erez Waisbard:
High Throughput VMs Placement With Constrained Communication Overhead and Provable Guarantees. 3148-3161 - Jine Tang, Taishan Qin, Deliang Kong, Zhangbing Zhou, Xiaocui Li, Yongdong Wu, Junhua Gu:
Anomaly Detection in Social-Aware IoT Networks. 3162-3176 - Shuting Qiu, Qilin Fan, Xiuhua Li, Xu Zhang, Geyong Min, Yongqiang Lyu:
OA-Cache: Oracle Approximation-Based Cache Replacement at the Network Edge. 3177-3189 - Prasun Kanti Dey, Murat Yuksel:
Delegating Data Plane With Cloud-Assisted Routing. 3190-3204 - Jian Yang, Qifeng Yuan, Shuangwu Chen, Huasen He, Xiaofeng Jiang, Xiaobin Tan:
Cooperative Task Offloading for Mobile Edge Computing Based on Multi-Agent Deep Reinforcement Learning. 3205-3219 - Zengpeng Li, Huiqun Yu, Guisheng Fan, Jiayin Zhang:
Cost-Efficient Fault-Tolerant Workflow Scheduling for Deadline-Constrained Microservice-Based Applications in Clouds. 3220-3232 - Xiaocui Li, Zhangbing Zhou, Qiang He, Zhensheng Shi, Walid Gaaloul, Sami Yangui:
Re-Scheduling IoT Services in Edge Networks. 3233-3246 - Marcos Carvalho, Daniel Fernandes Macedo:
Container Scheduling in Co-Located Environments Using QoE Awareness. 3247-3260 - Anselme Ndikumana, Kim Khoa Nguyen, Mohamed Cheriet:
Federated Learning Assisted Deep Q-Learning for Joint Task Offloading and Fronthaul Segment Routing in Open RAN. 3261-3273 - Fernando Zanferrari Morais, Gustavo Zanatta Bruno, Julio Renner, Gabriel Matheus F. de Almeida, Luis M. Contreras, Rodrigo da Rosa Righi, Kleber Vieira Cardoso, Cristiano Bonato Both:
OPlaceRAN - A Placement Orchestrator for Virtualized Next-Generation of Radio Access Network. 3274-3288 - Khondokar Fida Hasan, Yanming Feng, Yu-Chu Tian:
Precise GNSS Time Synchronization With Experimental Validation in Vehicular Networks. 3289-3301 - Endri Goshi, Raffael Stahl, Hasanin Harkous, Mu He, Rastin Pries, Wolfgang Kellerer:
PP5GS - An Efficient Procedure-Based and Stateless Architecture for Next-Generation Core Networks. 3318-3333 - Giap Le, Sifat Ferdousi, Andrea Marotta, Sugang Xu, Yusuke Hirota, Yoshinari Awaji, S. Sedef Savas, Massimo Tornatore, Biswanath Mukherjee:
Reliable Provisioning With Degraded Service Using Multipath Routing From Multiple Data Centers in Optical Metro Networks. 3334-3347 - Peiying Zhang, Yuanjie Li, Neeraj Kumar, Ning Chen, Ching-Hsien Hsu, Ahmed Barnawi:
Distributed Deep Reinforcement Learning Assisted Resource Allocation Algorithm for Space-Air-Ground Integrated Networks. 3348-3358 - Zheshun Wu, Xiaoping Wu, Yunliang Long:
Joint Scheduling and Robust Aggregation for Federated Localization Over Unreliable Wireless D2D Networks. 3359-3379 - Shaofeng Dong, Jinsong Zhan, Wei Hu, Amin Mohajer, Maryam Bavaghar, Abbas Mirzaei:
Energy-Efficient Hierarchical Resource Allocation in Uplink-Downlink Decoupled NOMA HetNets. 3380-3395 - Sujie Shao, Juntao Zheng, Cheng Zhong, Pengcheng Lu, Shaoyong Guo, Xiande Bu:
IEEE 802.11ax Meet Edge Computing: AP Seamless Handover for Multi-Service Communications in Industrial WLAN. 3396-3412 - Showkat Ahmad Bhat, Nen-Fu Huang, Imtiyaz Hussain, Uzair Sajjad:
Correlating the Ambient Conditions and Performance Indicators of the LoRaWAN via Surrogate Gaussian Process-Based Bidirectional LSTM Stacked Autoencoder. 3413-3427 - Hani Sami, Reem Saado, Ahmad El Saoudi, Azzam Mourad, Hadi Otrok, Jamal Bentahar:
Opportunistic UAV Deployment for Intelligent On-Demand IoV Service Management. 3428-3442 - Piotr Wiecek, Oussama Habachi, Majed Haddad:
To Lie or Not to Lie in Non-Cooperative User-Centric Networks: Is Lying Worth It? 3443-3459 - Jing Mei, Longbao Dai, Zhao Tong, Xin Deng, Keqin Li:
Throughput-Aware Dynamic Task Offloading Under Resource Constant for MEC With Energy Harvesting Devices. 3460-3473 - Yulun Cheng, Haitao Zhao, Yiyang Ni, Wenchao Xia, Longxiang Yang, Hongbo Zhu:
A Game-Theoretic Incentive Mechanism for Battery Saving in Full Duplex Mobile Edge Computing Systems With Wireless Power Transfer. 3474-3486 - Basabdatta Palit, Argha Sen, Abhijit Mondal, Ayan Zunaid, Jay Jayatheerthan, Sandip Chakraborty:
Improving UE Energy Efficiency Through Network-Aware Video Streaming Over 5G. 3487-3500 - Kyoomars Alizadeh Noghani, Andreas Kassler, Javid Taheri, Peter Öhlén, Calin Curescu:
Multiobjective Genetic Algorithm for Fast Service Function Chain Reconfiguration. 3501-3522 - Mario Minardi, Thang X. Vu, Lei Lei, Christos Politis, Symeon Chatzinotas:
Virtual Network Embedding for NGSO Systems: Algorithmic Solution and SDN-Testbed Validation. 3523-3535 - Suneet Kumar Singh, Christian Esteve Rothenberg, Marcelo Caggiani Luizelli, Gianni Antichi, Pedro Henrique Gomes, Gergely Pongrácz:
HH-IPG: Leveraging Inter-Packet Gap Metrics in P4 Hardware for Heavy Hitter Detection. 3536-3548 - Misbah Shafi, Rakesh Kumar Jha, Sanjeev Jain:
Intelligent Trust Ranking Security Preserving Model for B5G/6G. 3549-3561 - Takehiro Sato, Takashi Kurimoto, Shigeo Urushidani, Eiji Oki:
Virtualized Network Graph Design and Embedding Model to Minimize Provisioning Cost. 3562-3584 - Shuang Qin, Mengjie Liu, Gang Feng:
Dynamic Service Chaining for Ultra-Reliable Services in Softwarized Networks. 3585-3595 - Sanaz Soltani, Mohammad Shojafar, Habib Mostafaei, Rahim Tafazolli:
Real-Time Link Verification in Software-Defined Networks. 3596-3611 - Ting-Shan Wong, Steven S. W. Lee:
Design of an In-Band Control Plane for Automatic Bootstrapping and Fast Failure Recovery in P4 Networks. 3612-3629 - Amir Gharehgoli, Ali Nouruzi, Nader Mokari, Paeiz Azmi, Mohammad Reza Javan, Eduard A. Jorswieck:
AI-Based Resource Allocation in End-to-End Network Slicing Under Demand and CSI Uncertainties. 3630-3651 - Hang Li, Zixuan Kong, Yawen Chen, Luhan Wang, Zhaoming Lu, Xiangming Wen, Wenpeng Jing, Wan Xiang:
Slice-Based Service Function Chain Embedding for End-to-End Network Slice Deployment. 3652-3672 - Ya-Ting Yang, Hung-Yu Wei:
A Coalition Formation Approach for Privacy and Energy-Aware Split Deep Learning Inference in Edge Camera Network. 3673-3685 - Dan Tang, Zhiqing Zheng, Xiaocai Wang, Sheng Xiao, Qiuwei Yang:
PeakSAX: Real-Time Monitoring and Mitigation System for LDoS Attack in SDN. 3686-3698 - Minzhao Lyu, Hassan Habibi Gharakheili, Craig Russell, Vijay Sivaraman:
Enterprise DNS Asset Mapping and Cyber-Health Tracking via Passive Traffic Analysis. 3699-3716 - Junchao Xiao, Lin Yang, Fuli Zhong, Xiaolei Wang, Hongbo Chen, Dongyang Li:
Robust Anomaly-Based Insider Threat Detection Using Graph Neural Network. 3717-3733 - Rodolfo Vieira Valentim, Idilio Drago, Martino Trevisan, Marco Mellia:
URLGEN - Toward Automatic URL Generation Using GANs. 3734-3746 - Yifan Li, Xiaohe Hu, Chengjun Jia, Kai Wang, Jun Li:
Kano: Efficient Cloud Native Network Policy Verification. 3747-3764 - Chang-Seop Park, Wang-Seok Park, Samuel Woo:
Security Bootstrapping for Securing Data Plane and Control Plane in Named Data Networking. 3765-3781 - Cainã Figueiredo, João Gabriel Lopes de Oliveira, Rodrigo Azevedo Santos, Daniel Vieira, Lucas Miranda, Gerson Zaverucha, Leandro Pfleger de Aguiar, Daniel Sadoc Menasché:
A Statistical Relational Learning Approach Towards Products, Software Vulnerabilities and Exploits. 3782-3802 - Weibin Meng, Federico Zaiter, Yuzhe Zhang, Ying Liu, Shenglin Zhang, Shimin Tao, Yichen Zhu, Tao Han, Yongpeng Zhao, En Wang, Yuzhi Zhang, Dan Pei:
LogSummary: Unstructured Log Summarization for Software Systems. 3803-3815 - Zelin Wan, Jin-Hee Cho, Mu Zhu, Ahmed H. Anwar, Charles A. Kamhoua, Munindar P. Singh:
Resisting Multiple Advanced Persistent Threats via Hypergame-Theoretic Defensive Deception. 3816-3830 - Keshav Sood, Dinh Duc Nha Nguyen, Mohammad Reza Nosouhi, Neeraj Kumar, Frank Jiang, Morshed Chowdhury, Robin Doss:
Performance Evaluation of a Novel Intrusion Detection System in Next Generation Networks. 3831-3847 - Zaid Shakir Al-Attar, Tarek Abbes, Faouzi Zerai:
Smartphone-Key: Hands-Free Two-Factor Authentication for Voice-Controlled Devices Using Wi-Fi Location. 3848-3864 - Wenhao Shao, Yanyan Wei, Praboda Rajapaksha, Dun Li, Zhigang Luo, Noël Crespi:
Low-Latency Dimensional Expansion and Anomaly Detection Empowered Secure IoT Network. 3865-3879 - Xiongpeng Ren, Jin Cao, Ruhui Ma, Yurong Luo, Jian Guan, Yinghui Zhang, Hui Li:
A Novel Access and Handover Authentication Scheme in UAV-Aided Satellite-Terrestrial Integration Networks Enabling 5G. 3880-3899 - Chiho Kim, Sang-Yoon Chang, Jonghyun Kim, Dongeun Lee, Jinoh Kim:
Automated, Reliable Zero-Day Malware Detection Based on Autoencoding Architecture. 3900-3914 - Miel Verkerken, Laurens D'hooge, Didik Sudyana, Ying-Dar Lin, Tim Wauters, Bruno Volckaert, Filip De Turck:
A Novel Multi-Stage Approach for Hierarchical Intrusion Detection. 3915-3929 - Amir Javadpour, Forough Ja'fari, Tarik Taleb, Chafika Benzaïd:
Reinforcement Learning-Based Slice Isolation Against DDoS Attacks in Beyond 5G Networks. 3930-3946
Volume 20, Number 4, December 2023
- Shixiong Qi, Ziteng Zeng, Leslie Monis, K. K. Ramakrishnan:
MiddleNet: A Unified, High-Performance NFV and Middlebox Framework With eBPF and DPDK. 3950-3967 - Keita Hasegawa, Daishi Kondo, Masato Osumi, Hideki Tode:
Collaborative Defense Framework Using FQDN-Based Allowlist Filter Against DNS Water Torture Attack. 3968-3983 - Luigi De Simone, Mario Di Mauro, Maurizio Longo, Roberto Natella, Fabio Postiglione:
Multi-Provider IMS Infrastructure With Controlled Redundancy: A Performability Evaluation. 3984-3998 - Zhonghui Li, Jian Li, Kaiping Xue, David S. L. Wei, Ruidong Li, Nenghai Yu, Qibin Sun, Jun Lu:
Swapping-Based Entanglement Routing Design for Congestion Mitigation in Quantum Networks. 3999-4012 - Daniel Merling, Thomas Stüber, Michael Menth:
Efficiency of BIER Multicast in Large Networks. 4013-4027 - Ali Nikkhah, Scott Jordan:
Analysis of the Requirements of Settlement-Free Interconnection Policies. 4028-4046 - Bofan Chen, Feng Chen, Shaofei Tang, Qitao Zheng, Zuqing Zhu:
On Orchestration of Segment Routing and In-Band Network Telemetry. 4047-4060 - Claudio Marche, Gian Giuseppe Soma, Michele Nitti:
A Cognitive Social IoT Approach for Smart Energy Management in a Real Environment. 4061-4072 - Yang Yang, Yu Yan, Zhipeng Gao, Lanlan Rui, Rui Lyu, Bowen Gao, Peng Yu:
A Network Traffic Classification Method Based on Dual-Mode Feature Extraction and Hybrid Neural Networks. 4073-4084 - Eduardo Sant'Ana da Silva, Hélio Pedrini, Aldri Luiz dos Santos:
Applying Graph Neural Networks to Support Decision Making on Collective Intelligent Transportation Systems. 4085-4096 - Vinod S. Khandkar, Manjesh K. Hanawal:
FairNet: A Measurement Framework for Traffic Discrimination Detection on the Internet. 4097-4109 - Patrick Krämer, Oliver Zeidler, Philip Diederich, Johannes Zerwas, Andreas Blenk, Wolfgang Kellerer:
Mistill: Distilling Distributed Network Protocols From Examples. 4110-4125 - Mauro Femminella, Gianluca Reali:
Gossip-Based Monitoring Protocol for 6G Networks. 4126-4140 - Rama Krishna Muni, Kolar Purushothama Naveen:
Optimal Subscription Policies for Participation-Dependent Social-Learning Markets. 4141-4157 - Joy Halder, Bijoy Chand Chatterjee:
A Resource Allocation Model for Mixed-Grid Optical Networks. 4158-4169 - Nagao Ogino:
Robust Design of Interdependent Networks Considering Intra-Network Support Flow. 4170-4185 - Leyi Shi, Yifan Miao, Jiahao Ren, Ran Liu:
Game Analysis and Optimization for Evolutionary Dynamic Heterogeneous Redundancy. 4186-4197 - Dandan Niu, Guang Cheng, Zihan Chen:
TDS-KRFI: Reference Frame Identification for Live Web Streaming Toward HTTP Flash Video Protocol. 4198-4215 - Arnau Romero, Carmen Delgado, Lanfranco Zanzi, Xi Li, Xavier Costa-Pérez:
OROS: Online Operation and Orchestration of Collaborative Robots Using 5G. 4216-4230 - Paolo Notaro, Soroush Haeri, Jorge Cardoso, Michael Gerndt:
LogRule: Efficient Structured Log Mining for Root Cause Analysis. 4231-4243 - Seyyed Mohammad Mahdi Hosseini Daneshvar, Sayyed Majid Mazinani:
On the Best Fitness Function for the WSN Lifetime Maximization: A Solution Based on a Modified Salp Swarm Algorithm for Centralized Clustering and Routing. 4244-4254 - Bentian Li, Yunxia Lin, Izhar Ahmed Khan:
Self-Supervised Learning IoT Device Features With Graph Contrastive Neural Network for Device Classification in Social Internet of Things. 4255-4267 - Salma Matoussi, Ilhem Fajjari, Nadjib Aitsaadi, Rami Langar:
User-Centric Slice Allocation Scheme in 5G Networks and Beyond. 4268-4282 - Yaniv Sadeh, Ori Rottenstreich, Haim Kaplan:
Load Balancing With Minimal Deviation in Switch Memories. 4283-4296 - Da Xiao, J. Andrew Zhang, Xin Liu, Yiwen Qu, Wei Ni, Ren Ping Liu:
A Two-Stage GCN-Based Deep Reinforcement Learning Framework for SFC Embedding in Multi-Datacenter Networks. 4297-4312 - Yi Liu, Jiangping Han, Kaiping Xue, Jian Li, Qibin Sun, Jun Lu:
DECC: Achieving Low Latency in Data Center Networks With Deep Reinforcement Learning. 4313-4324 - Huaiyi Zhao, Xinyi Zhang, Yang Wang, Zulong Diao, Yanbiao Li, Gaogang Xie:
Improving the Scalability of Distributed Network Emulations: An Algorithmic Perspective. 4325-4339 - Qian Zhang, Shangping Wang, Duo Zhang, Jifang Wang, Jin Sun:
FortunChain: EC-VRF-Based Scalable Blockchain System for Realizing State Sharding. 4340-4353 - Li Duan, Liu Yang, Chunhong Liu, Wei Ni, Wei Wang:
A New Smart Contract Anomaly Detection Method by Fusing Opcode and Source Code Features for Blockchain Services. 4354-4368 - Faheem Zafari, Prithwish Basu, Kin K. Leung, Jian Li, Don Towsley, Ananthram Swami:
Resource Sharing in the Edge: A Distributed Bargaining-Theoretic Approach. 4369-4382 - Liangmin Guo, Hao Yang, Kaixuan Luan, Li Sun, Yonglong Luo, Liping Sun:
A Trust Model Based on Characteristic Factors and SLAs for Cloud Environments. 4383-4396 - Jie Li, Yuhui Deng, Yi Zhou, Zhaorui Wu, Shujie Pang, Geyong Min:
TADRP: Toward Thermal-Aware Data Replica Placement in Data-Intensive Data Centers. 4397-4415 - Akito Suzuki, Masahiro Kobayashi, Eiji Oki:
Multi-Agent Deep Reinforcement Learning for Cooperative Computing Offloading and Route Optimization in Multi Cloud-Edge Networks. 4416-4434 - Domenico Scotece, Claudio Fiandrino, Luca Foschini:
Handling Data Handoff of AI-Based Applications in Edge Computing Systems. 4435-4447 - Shreshth Tuli, Giuliano Casale, Nicholas R. Jennings:
CILP: Co-Simulation-Based Imitation Learner for Dynamic Resource Provisioning in Cloud Computing Environments. 4448-4460 - José Santos, Chen Wang, Tim Wauters, Filip De Turck:
Diktyo: Network-Aware Scheduling in Container-Based Clouds. 4461-4477 - Wentao Fan, Fan Yang, Peilong Wang, Mao Miao, Pengcheng Zhao, Tao Huang:
DRL-Based Service Function Chain Edge-to-Edge and Edge-to-Cloud Joint Offloading in Edge-Cloud Network. 4478-4493 - Long Cheng, Ying Wang, Rutvij H. Jhaveri, Qingle Wang, Ying Mao:
Toward Network-Aware Query Execution Systems in Large Datacenters. 4494-4504 - Georgios Boulougaris, Kostas Kolomvatsos:
An Inference Mechanism for Proactive Service Migration at the Edge. 4505-4516 - Claudio Marche, Valeria Loscrì, Michele Nitti:
A Channel Selection Model Based on Trust Metrics for Wireless Communications. 4517-4527 - Zhuofan Liao, Shuangle Xu, Jiawei Huang, Jianxin Wang:
Task Migration and Resource Allocation Scheme in IoV With Roadside Unit. 4528-4541 - Hui Xiao, Jiawei Huang, Zhigang Hu, Meiguang Zheng, Keqin Li:
Collaborative Cloud-Edge-End Task Offloading in MEC-Based Small Cell Networks With Distributed Wireless Backhaul. 4542-4557 - Qiang Tang, Yong Yang, Lixin Liu, Kun Yang:
Minimal Throughput Maximization of UAV-Enabled Wireless Powered Communication Network in Cuboid Building Perimeter Scenario. 4558-4571 - Xin Wang, Hong Shen, Hui Tian:
Efficient and Fair: Information-Agnostic Online Coflow Scheduling by Combining Limited Multiplexing With DRL. 4572-4584 - Neha Sharma, Udit Agarwal, Sunny Shaurya, Shashank Mishra, Om Jee Pandey:
Energy-Efficient and QoS-Aware Data Routing in Node Fault Prediction Based IoT Networks. 4585-4599 - Kaushik Mishra, Goluguri N. V. Rajareddy, Umashankar Ghugar, Gurpreet Singh Chhabra, Amir H. Gandomi:
A Collaborative Computation and Offloading for Compute-Intensive and Latency-Sensitive Dependency-Aware Tasks in Dew-Enabled Vehicular Fog Computing: A Federated Deep Q-Learning Approach. 4600-4614 - Sepideh Malektaji, Marsa Rayani, Amin Ebrahimzadeh, Vahid Maleki Raee, Halima Elbiaze, Roch H. Glitho:
Dynamic Joint VNF Forwarding Graph Composition and Embedding: A Deep Reinforcement Learning Framework. 4615-4633 - Hang Li, Luhan Wang, Zhenghe Zhu, Yawen Chen, Zhaoming Lu, Xiangming Wen:
Multicast Service Function Chain Orchestration in SDN/NFV-Enabled Networks: Embedding, Readjustment, and Expanding. 4634-4651 - Rahul Mishra, Dharavath Ramesh, Paolo Bellavista, Damodar Reddy Edla:
Redactable Blockchain-Assisted Secure Data Aggregation Scheme for Fog-Enabled Internet-of-Farming-Things. 4652-4667 - Jingyu Liang, Bowen Ma, Zihan Feng, Jiwei Huang:
Reliability-Aware Task Processing and Offloading for Data-Intensive Applications in Edge computing. 4668-4680 - Zeyuan Yang, Rentao Gu, Yuefeng Ji:
Virtual Network Embedding Over Multi-Band Elastic Optical Network Based on Cross-Matching Mechanism and Hypergraph Theory. 4681-4697 - Wissal Attaoui, Essaid Sabir, Halima Elbiaze, Mohsen Guizani:
VNF and CNF Placement in 5G: Recent Advances and Future Trends. 4698-4733 - Zhuo Li, Xingdi Shen, Hao Xun, Yang Miao, Weizhe Zhang, Peng Luo, Kaihua Liu:
CoopCon: Cooperative Hybrid Congestion Control Scheme for Named Data Networking. 4734-4750 - Ningyuan Sun, Xiaole Li, Hongyun Zheng, Yongxiang Zhao, Yuchun Guo:
Dynamic Upgrade to SDN From a Global Perspective: Model and Its Heuristic Solutions. 4751-4764 - Hasanin Harkous, Bassel Aboul Hosn, Mu He, Michael Jarschel, Rastin Pries, Wolfgang Kellerer:
Performance-Aware Orchestration of P4-Based Heterogeneous Cloud Environments. 4765-4778 - Shintaro Ozaki, Takehiro Sato, Eiji Oki:
Service Chain Provisioning Model Considering Traffic Changes Due to Virtualized Network Functions. 4779-4802 - Zhenke Chen, He Li, Kaoru Ota, Mianxiong Dong:
HyScaler: A Dynamic, Hybrid VNF Scaling System for Building Elastic Service Function Chains Across Multiple Servers. 4803-4814 - Hai Yang, Bingli Guo, Xuwei Xue, Xinyuan Deng, Yisong Zhao, Xinbin Cui, Chengguang Pang, Huilin Ren, Shanguo Huang:
Interruption Tolerance Strategy for LEO Constellation With Optical Inter-Satellite Link. 4815-4830 - Antonio Petrosino, Giuseppe Piro, Luigi Alfredo Grieco, Gennaro Boggia:
On the Optimal Deployment of Virtual Network Functions in Non-Terrestrial Segments. 4831-4845 - Arled Papa, Polina Kutsevol, Fidan Mehmeti, Wolfgang Kellerer:
Delphi: Computing the Maximum Achievable Throughput in SD-RAN Environments. 4846-4860 - Fujun He, Eiji Oki:
Service Deployment With Priority Queueing for Traffic Processing and Transmission in Network Function Virtualization. 4861-4874 - Qianqian Wu, Qiang Liu, Zequn Jia, Ning Xin, Te Chen:
P4SQA: A P4 Switch-Based QoS Assurance Mechanism for SDN. 4875-4886 - Shinji Noda, Takehiro Sato, Eiji Oki:
Fault-Tolerant Controller Placement Model Considering Load-Dependent Sojourn Time in Software-Defined Network. 4887-4908 - Konstantinos Papadopoulos, Panagiotis Papadimitriou, Chrysa Papagianni:
Deterministic and Probabilistic P4-Enabled Lightweight In-Band Network Telemetry. 4909-4922 - Run-Hua Shi, Hui Yu:
Privacy-Preserving Range Query Quantum Scheme With Single Photons in Edge-Based Internet of Things. 4923-4936 - Ghulam Mohiuddin, Zhiqiang Liu, Jiangbin Zheng, Sifei Wang, Zhijun Lin, Muhammad Asim, Yuxuan Zhong, Yuxin Chen:
Intrusion Detection Using Hybrid Enhanced CSA-PSO and Multivariate WLS Random-Forest Technique. 4937-4950 - Paulo Freitas de Araujo-Filho, Mohamed Naili, Georges Kaddoum, Emmanuel Thepie Fapi, Zhongwen Zhu:
Unsupervised GAN-Based Intrusion Detection System Using Temporal Convolutional Networks and Self-Attention. 4951-4963 - Ziling Shao, Tingzheng Chen, Guang Cheng, Xiaoyan Hu, Weina Li, Hua Wu:
AF-FDS: An Accurate, Fast, and Fine-Grained Detection Scheme for DDoS Attacks in High-Speed Networks With Asymmetric Routing. 4964-4981 - Ke Gu, Wenbin Zhang, Xingqiang Wang, Xiong Li, Weijia Jia:
Dual Attribute-Based Auditing Scheme for Fog Computing-Based Data Dynamic Storage With Distributed Collaborative Verification. 4982-4999 - Ari Adler, Lior Bass, Yuval Elovici, Rami Puzis:
How Polynomial Regression Improves DeNATing. 5000-5011 - Francesca Soro, Thomas Favale, Danilo Giordano, Idilio Drago, Tommaso Rescio, Marco Mellia, Zied Ben-Houidi, Dario Rossi:
Enlightening the Darknets: Augmenting Darknet Visibility With Active Probes. 5012-5025 - Jude Tchaye-Kondi, Yanlong Zhai, Jun Shen, Liehuang Zhu:
Privacy-Preserving Offloading in Edge Intelligence Systems With Inductive Learning and Local Differential Privacy. 5026-5037 - Hnin Pann Phyu, Razvan Stanica, Diala Naboulsi:
Multi-Slice Privacy-Aware Traffic Forecasting at RAN Level: A Scalable Federated-Learning Approach. 5038-5052 - Aida Meftah, Tri Nhu Do, Georges Kaddoum, Chamseddine Talhi, Satinder Singh:
Federated Learning-Enabled Jamming Detection and Waveform Classification for Distributed Tactical Wireless Networks. 5053-5072 - Dan Tang, Chenjun Gao, Wei Liang, Jiliang Zhang, Keqin Li:
FTMaster: A Detection and Mitigation System of Low-Rate Flow Table Overflow Attacks via SDN. 5073-5084 - Kento Yokouchi, Fujun He, Eiji Oki:
Backup Resource Allocation of Virtual Machines With Two-Stage Probabilistic Protection. 5085-5102 - Peng Zhou, Chengyuan Li, Chong Chen, Dakui Wu, Minrui Fei:
P3 AD: Privacy-Preserved Payload Anomaly Detection for Industrial Internet of Things. 5103-5114 - Gaith Rjoub, Jamal Bentahar, Omar Abdel Wahab, Rabeb Mizouni, Alyssa Song, Robin Cohen, Hadi Otrok, Azzam Mourad:
A Survey on Explainable Artificial Intelligence for Cybersecurity. 5115-5140 - Umar S. Suryahatmaja, Mehdi Mrad, Mohamed Naceur Azaiez, Asma Ben Yaghlane, Anis Gharbi:
The K Critical Path Sets to Protect in Interdiction Networks Under Limited Defensive Resources. 5141-5154 - Lihe Hou, Weiwei Ni, Sen Zhang, Nan Fu, Dongyue Zhang:
WDP-GAN: Weighted Graph Generation With GAN Under Differential Privacy. 5155-5165
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.