default search action
Computer Networks, Volume 256
Volume 256, 2025
- Syed Usman Jamil
, M. Arif Khan
, Muhammad Ali Paracha, Abdul Rasheed:
Using intelligence in resource allocation and task off-loading for the IoE-edge networks. 110884 - Wanjun Xiong, Yujue Wang, Yongzhuang Wei:
NTRU-CLS: Efficient quantum-resistant NTRU lattice-based certificateless signature scheme for VANETs. 110885 - Ruomu Hou, Haifeng Yu, Yucheng Sun:
Selfied: Sybil defense in permissionless blockchains via in-protocol bandwidth consumption. 110890 - Xiuwen Liu
, Shuo Wang, Yanjiao Chen
:
Adaptive scheduling for Internet of Vehicles using deconfounded graph transfer learning. 110899 - Nour-El-Houda Yellas
, Bernardetta Addis, Selma Boumerdassi, Roberto Riggio, Stefano Secci:
Function Placement for In-network Federated Learning. 110900 - Yasmany Prieto
, Christian Vega Caicedo
, Miguel E. Figueroa
:
Using virtual function replacement to mitigate 0-day attacks in a multi-vendor NFV-based network. 110902 - Mingtao Ji
, Ji Qi, Lei Jiao, Gangyi Luo, Hehan Zhao
, Xin Li, Baoliu Ye, Zhuzhong Qian
:
CPN meets learning: Online scheduling for inference service in Computing Power Network. 110903 - Dorine Chagnon, Kevin Thiry-Atighehchi, Gérard Chalhoub
:
A Survey on Path Validation: Towards Digital Sovereignty. 110905 - Biljana Bojovic
, Sandra Lagén
:
3GPP-compliant single-user MIMO model for high-fidelity mobile network simulations. 110912 - Ren-Hung Hwang
, Jia-You Lin
, Yen Chuang, Ben-Jye Chang:
Dynamic resource allocation and offloading optimization for network slicing in B5G multi-tier multi-tenant systems. 110876 - Mengyu Wang, Shuyong Zhu, Yujun Zhang:
FastDet: Providing faster deterministic transmission for time-sensitive flows in WAN. 110881 - Andrea Coletta, Flavio Giorgi, Gaia Maselli, Matteo Prata
, Domenicomichele Silvestri
, Jonathan D. Ashdown, Francesco Restuccia:
A 2-UAV: Application-Aware resilient edge-assisted UAV networks. 110887 - Yawen Tan
, Jiajia Liu, Jiadai Wang
:
Zoom-inRCL: Fine-grained root cause localization for B5G/6G network slicing. 110893 - Heng-Ru Zhang
, Ke-Xiong Wang, Xiang-Yu Liang, Yi-Fan Yu:
DUPS: Data poisoning attacks with uncertain sample selection for federated learning. 110909 - Jingyi Li, Jiajia Liu, Jiadai Wang:
Optimizing spectrum and energy efficiency in IRS-enabled UAV-ground communications. 110911 - Jingwen Lu, Chaowei Tang, Zhengchuan Chen, Jiayuan Guo, Aobo Zou, Wen Yang, Chenxi Tang:
Intraflow temporal correlation-based network traffic prediction. 110913
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.