default search action
Peer-to-Peer Networking and Applications, Volume 18
Volume 18, Number 1, February 2025
- Sumayah A. Almuntasheri, Mohammed J. F. Alenazi
:
EEPS: Optimizing energy-efficient path selection in the Internet of Battlefield Things (IoBT) utilizing SDN. 1-23 - Jian Luo, Zechao Chen, Wenxiong Chen, Huali Lu, Feng Lyu:
A study on the application of the T5 large language model in encrypted traffic classification. 1-13 - Changsong Yang
, Yueling Liu, Yong Ding:
Fine-grained data deletion supporting dynamic data insertion for cloud storage. 1-16 - Biao Ma, Haifeng Qian:
A scalable identity management scheme via blockchain: Identity protection and traceability. 1-12 - Jingliang Wen, Changli Zhou, Linghui Zhang:
Efficient anti-quantum attack batch authentication and key agreement protocol based on NTRU in VANET. 1-21 - Yi Li, Jinsong Wang, Zening Zhao, Duobin Lv:
Hague: a hybrid scaling stateless blockchain. 1-16 - Bhabani Sankar Samantray, K. Hemant Kumar Reddy:
A novel secure supply chain for smart healthcare systems: An approach to leverage blockchain, Keccak-256, and ZKP for drug safety assurance. 1-17 - Mo Hai, Wenchang Li
, Haifeng Li:
An efficient propagation algorithm based on node clustering and seed node selection in a blockchain network. 1-15 - You Lu, Zhe Zhang, Xiao Xu, Lanhui Liu, Qiming Fu
, Jianping Chen
, Chen Chen:
GTD3-NET: A deep reinforcement learning-based routing optimization algorithm for wireless networks. 1-12 - Weimin Li, ZiTong Li, Zhengmao Yan, Yi Liu, Detian Zeng, Haoyang Yu, Wenxiong Chen, Fan Wu:
A data encryption and file sharing framework among microservices-based edge nodes with blockchain. 1-16 - Tao Zheng, Xueyang Li, Xingshu Chen, Hao Ren, Changxiang Shen:
Efficient privacy-preserving federated logistic regression with poor-quality users. 1-12 - Mamta Mann, Rishipal Singh:
Optimized stochastic particle swarm optimization integrated ranked backoff medium access control for optimal route selection in wireless sensor networks. 1-17 - Haoran Shi, Zehua Chen, Yongqiang Cheng, Xiaofeng Liu, Qianqian Wang:
PB-Raft: A Byzantine fault tolerance consensus algorithm based on weighted PageRank and BLS threshold signature. 1-16 - E. S. Phalguna Krishna, Daria Sandeep, Raviteja Kocherla, Kranthi Kumar Lella, Srikanth Molugu
, Shaik Hussain Shaik Ibrahim, Ramesh Vatambeti:
Enhancing intrusion detection in MANETs with blockchain-based trust management and enhanced GRU model. 1-22 - G. Suneetha, D. Haripriya:
An enhanced deep learning integrated blockchain framework for securing industrial IoT. 1-20 - Richa Kumari
, Dinesh Kumar Tyagi, Ramesh Babu Battula:
NEIL: aN EfficIent cLuster-based device discovery for D2D communication in B5G. 1-25 - Hongxia Zhang, Zeya Li, Shiyu Xi, Xiangxu Zhao, Jianhang Liu, Peiying Zhang:
Heterogeneity-aware device selection for clustered federated learning in IoT. 1-17 - Irshad Ullah
, Xiaoheng Deng, Xinjun Pei, Husnain Mushtaq
, Muhammad Uzair:
IoV-SFL: A blockchain-based federated learning framework for secure and efficient data sharing in the internet of vehicles. 1-20 - Muhammad Kashif, Kübra Kalkan:
Differential privacy preserving based framework using blockchain for internet-of-things. 1-23 - Ran Wang, Fuqiang Ma, Sisui Tang, Hangning Zhang, Jie He, Zhiyuan Su, Xiaotong Zhang, Cheng Xu:
Parallel Byzantine fault tolerance consensus based on trusted execution environments. 1-24 - Swati Priyambada Satpathy, Sujata Mohanty, Manabhanjan Pradhan:
A sustainable mutual authentication protocol for IoT-Fog-Cloud environment. 1-23 - Guanjie Li, Tom H. Luan
, Jinkai Zheng, Dihao Hu, Jie Cao, Yalun Wu:
A secure and lightweight data sharing scheme in vehicular digital twin network. 1-17 - Chandra Priya Jayabal, Priyadharsini Selvaraj, Madhavan M., Nikil Sri Shen R.:
WikiChain: An improved resilient, pseudo-transparent knowledge base. 1-24 - Jian Wang, Fanfan Meng, Jia Liu, Guanzhi He, Guosheng Zhao:
Multimodal data privacy protection and completeness verification method for mobile crowd sensing. 1-20 - Rachit Patel, Rajeev Arya:
Trust-based resource allocation and task splitting in ultra-dense mobile edge computing network. 1-17 - Aparna Singh
, Geetanjali Rathee:
Smart contract empowered dynamic consent: decentralized storage and access control for healthcare applications. 1-16 - Nagarajan Babu
, Santhosh Kumar SVN:
An intelligent sailfish optimization based fault diagnosis and classification in wireless sensor networks. 1-22 - Raja Basha Adam Sahib, R. Bhavani:
IoT-based smart healthcare using efficient data gathering and data analysis. 1-24 - Zhixin Xie, Ying Su, Guangbiao Liu, Yishi Yang, Peyman Arebi:
Dynamical repair strategy of data network controllability processes against DoS attack on complex temporal networks. 1-15 - Dongyu Cao, Bixin Li, Jingyuan Cai:
A privacy-preserving method for cross-chain interoperability using homomorphic encryption. 1-16 - B. Nagarajan
, Santhosh Kumar SVN:
An intelligent fault node diagnosis and classification approach using XGBoost with whale optimization in wireless sensor networks. 1-20 - K. Mekala, S. Sumathi, Belsam Jeba Ananth M:
Coot-feedback artificial tree-based energy-aware electric vehicle charge scheduling algorithm. 1-17 - Monali Shetty
, Sharvari Tamane
:
Unveiling bitcoin network attack using deep reinforcement learning with Boltzmann exploration. 1-19 - Hang Zhang, Jinsong Wang, Zening Zhao, Huayue Sun:
Security resource allocation in blockchain-based IoT. 1-12 - Yuan Zhao, Yan Li, Hongmin Gao, Shuangshuang Yuan:
Performance analysis of D2D cooperative networks based on probabilistic relay forwarding mechanism. 1-18 - Brijmohan Lal Sahu
, Preeti Chandrakar:
Blockchain-oriented secure communication and smart parking model for internet of electric vehicles in smart cities. 1-17 - Neha Sharma
, Pankaj Dhiman
:
Design of secure and unique addressing with mutual authentication scheme in IoT networks. 1-18 - G. A. Thushara, S. Mary Saira Bhanu:
Chebyshev chaotic map with attribute based encryption on session based data-sharing in fog environment. 1-25 - Vinay Maurya, Vinay Rishiwal, Mano Yadav, Mohammad Shiblee, Preeti Yadav, Udit Agarwal, Rashmi Chaudhry:
Blockchain-driven security for IoT networks: State-of-the-art, challenges and future directions. 1-35 - Shams Mhmood Abd Ali, Mohd Najwadi Yusoff, Je Sen Teh, Hasan Falah Hasan:
OREVI_PCH: An optimized resource-efficient redaction mechanism with integrity validation in policy-based chameleon hash for IoT applications. 1-17 - Shahrbanoo Zangaraki, Meghdad Mirabi, Seyed Hossein Erfani, Amir Sahafi:
SecShield: An IoT access control framework with edge caching using software defined network. 1-17 - S. Harishkumar, R. S. Bhuvaneswaran:
Enhanced DGA detection in Botnet traffic: leveraging N-Gram, topic modeling, and attention BiLSTM. 1-20 - Ayodeji Ayorinde, John Panneerselvam, Bo Yuan, Lu Liu:
A multi-cycle recursive clustering algorithm for the analysis of social media data streams. 1-18 - Liyuan Zhang
, Limian Ci, Yonghong Wu, Benchawan Wiwatanapataphee:
The real estate tokenized investment system based on ethereum blockchain. 1-24 - Huizi Tian, Lin Zhu, Long Tan:
A joint task caching and computation offloading scheme based on deep reinforcement learning. 1-19 - Zhiying Wang, Guanhua Huang, Gang Sun, Hongfang Yu, Jian Sun:
Reinforcement Q-learning enabled energy-efficient service function chain provisioning in multi-domain networks. 1-19 - Vikramjit Singh, Krishna Pal Sharma, Harsh Kumar Verma:
CLGR: Connectivity and link quality aware geographical routing using AHP-TOPSIS for FANETs. 1-20 - Wei Chen, Xiangyang Li, Gaoli Wang, Leibo Li, Jiachen Shen, Entang Li:
HML-BFT: Hybrid multi-layer BFT consensus with reputation model for large-scale blockchain. 1-14 - Prity Rani, Rohit Kumar Sachan, Sonal Kukreja:
BT-CNV: A distributed and decentralized solution for certificate notarization and verification for academia using public blockchain. 1-26
Volume 18, Number 2, April 2025
- Yuxuan Meng, Baosheng Wang, Qianqian Xing, Xiaofeng Wang, Jian Liu, Xinyue Xu:
BBAD: Blockchain-based data assured deletion and access control system for IoT. 1 - Mahdi Rabbani, Jinkun Gui, Zeming Zhou, Fatemeh Nejati, Mansur Mirani, Gunjan Piya, Igor V. Opushnyev, Rongxing Lu, Ali Ghorbani:
A lightweight IoT device identification using enhanced behavioral-based features. 2 - Mohana Bhindu K, Yogesh Palanichamy:
SJO-MRL: Energy efficient path selection algorithm for WSNs. 3 - U. Nandhini
, S. V. N. Santhosh Kumar:
An enhanced whale optimizer based feature selection technique with effective ensemble classifier for network intrusion detection system. 4 - Deepti Rani, Nasib Singh Gill, Preeti Gulia, Mohammad A. Yahya
, Tariq Ahamed Ahanger, Mohamed M. Hassan, Fethi Ben Abdallah, Piyush Kumar Shukla:
A secure digital evidence preservation system for an iot-enabled smart environment using ipfs, blockchain, and smart contracts. 5 - Amir Soleimani Borujerdi, Arman Sanahmadi, Mohammad Abdollahi Azgomi
:
Unified modeling and evaluation of availability and power consumption in the internet of things. 6 - Gang Xu, Shiyuan Xu, Yibo Cao, Ke Xiao, Yanhui Mao, Xiubo Chen, Mianxiong Dong, Shui Yu
:
AAQ-PEKS: An Attribute-based Anti-Quantum Public Key Encryption Scheme with Keyword Search for E-healthcare Scenarios. 64 - Hatim Alsuwat, Emad Alsuwat
:
Energy-aware and efficient cluster head selection and routing in wireless sensor networks using improved artificial bee Colony algorithm. 65 - R. S. Amshavalli, D. Devi, S. Srinivasan, R. ShaliniRajan, S. Anitha Jebamani:
Boosted sooty tern and piranhav foraging meta-heuristic optimized cluster head selection-based routing algorithm for extending network lifetime in WSNs. 66 - D. Prabakar
, Konda Hari Krishna
, D. Prabhu
, Femila L:
Classification of intrusion using Multi-Stream Generative Adversarial Networks in Wireless Sensor Networks. 67 - S. Milton Ganesh, S. Priya, Vinayakumar Ravi
, Suliman A. Alsuhibany:
A privacy preserving batch audit scheme for IoT based cloud data storage. 68 - Manuela de Jesus Sousa, Paulo Roberto de Lira Gondim
:
A multi-factor user authentication protocol for the internet of drones environment. 69 - Mohamed Elhoseny, Hashem Alyami, Majid Altuwairiqi, Papiya Dutta, Bala Dhandayuthapani Veerasamy
, Piyush Kumar Shukla:
An efficient and secured voting system using blockchain and hybrid validation technique with deep learning. 70 - Boqian Fu, Fahao Chen, Shengli Pan, Peng Li, Zhou Su:
Efficient multi-job federated learning scheduling with fault tolerance. 71 - Bing Rao, Guiqin Zhu, Qiaolong Ding, Dajiang Chen, Mingsheng Cao, Yang Cao, Feiyan Wang:
A steganographic backdoor attack scheme on encrypted traffic. 72 - Habib Ullah Khan, Anwar Hussain, Shah Nazir, Farhad Ali:
AIoT-enabled service prioritization for mobile nodes using enhanced PMIPv6 extension protocol. 73 - Zhipeng Gao, Chunxi Li, Yongxiang Zhao, Baoxian Zhang, Cheng Li:
Startup delay aware short video ordering: Problem, model, and a reinforcement learning based algorithm. 74 - Gummarekula Sattibabu
, Nagarajan Ganesan, R. Senthil Kumaran
:
IoT-enabled wireless sensor networks optimization based on federated reinforcement learning for enhanced performance. 75 - Pankaj Chandra, Santosh Soni:
Novel joint data collection and wireless charging algorithm for rechargeable wireless sensor networks. 76 - Vinothini J, Srie Vidhya Janani Elangeswaran:
QoS-Aware cloud security using lightweight EfficientNet with Adaptive Sparse Bayesian Optimization. 77 - Faeiz M. Alserhani
:
Provisioning, authentication, and integrity-preserving communication scheme for Internet of things-enabled devices. 78 - Agitha W, D. R. Denslin Brabin
, K. Kalai Kumar, T. Sunitha:
Strengthening security in IoT-based smart cities utilizing cycle-consistent generative adversarial networks for attack detection and secure data transmission. 79 - Xinyi Chen, Mengjian Zhang
, Ming Yang, Deguang Wang:
NHBBWO: A novel hybrid butterfly-beluga whale optimization algorithm with the dynamic strategy for WSN coverage optimization. 80 - Md. Mobin Akhtar, Sultan Ali Alasmari, S. K. Wasim Haidar, Ali Abdulaziz Alzubaidi
:
Distributed denial of service attack detection and mitigation strategy in 5G-enabled internet of things networks with adaptive cascaded gated recurrent unit. 81 - Aiwen Huang
, Xianger Li, Xuyang Chen, Wei Song, Zhihai Tang, Le Chang, Tian Wang:
MobiPower: Scheduling mobile charging stations for UAV-mounted edge servers in Internet of Vehicles. 82 - Tsu-Yang Wu, Haozhi Wu, Saru Kumari, Chien-Ming Chen:
An enhanced three-factor based authentication and key agreement protocol using PUF in IoMT. 83 - Leyou Yang, Jie Jia, Jian Chen, Baoxin Yin, Xingwei Wang:
End-to-end supervised learning for NOMA-enabled resource allocation: A dynamic and scalable approach. 84 - Le Chang, Xinyan Yang, Kai Zhang, Zhimei Sui, Jian Zhao:
Blockchain-based synchronized data transmission with dynamic device management for digital twin in IIoT. 85 - K. John Peter
, S. P. Predeep Kumar, S. Padmalal, C. Sahaya Kingsly:
IPML-ANP: An integrated polynomial manifold learning model and anchor node placement for wireless sensor node localization. 86 - Jie Jia, Yiyue Zhang, Yi Xue, Jian Chen, An Du, Xingwei Wang:
Joint scheduling and routing for end-to-end deterministic transmission in TSN. 87 - Sudhani Verma, Girish Chandra, Divakar Yadav:
LVCA: An efficient voting-based consensus algorithm in private Blockchain for enhancing data security. 88 - Xingwen Zhao, Xuan Wang, Haimei Guan, Jiayin Cai, Hui Li, Qingwen Li:
A comprehensive and efficient CP-ABE scheme with full policy hiding and pre-decryption verification in peer-to-peer cyber-physical systems. 89 - Bing Han, Yong Yuan, Xuhao Ren, Zihang Yin, Cheng Chi, Chuan Zhang:
An efficient and private economic evaluation scheme in data markets. 90 - Liquan Zheng, Long Tan:
A decentralized scheme for multi-user edge computing task offloading based on dynamic pricing. 91 - Guirong Piao, Jianming Zhu:
AccessChain: A scalable and privacy-preserving access control scheme for blockchain-based IoT. 92 - Yinglong Li, Zhengjiang Zhang, Han-Chieh Chao:
Service caching with multi-agent reinforcement learning in cloud-edge collaboration computing. 93 - Zixuan Han, Lei-lei Shi, Ya-Si Wang, Lu Liu, Bing Lei, Xiu-liang Huang, Liang Jiang, John Panneerselvam, Ren-jiao Gao:
CoHide: Overlapping community hiding algorithm based on multi-criteria learning optimization. 94 - Sylia Mekhmoukh Taleb, Karim Baiche, Yassine Meraihi, Selma Yahia, Seyedali Mirjalili, Amar Ramdane-Cherif:
A binary multi-objective approach for solving the WMNs topology planning problem. 95 - Libin Xue, Chunjie Cao:
Research on distributed UWSN power control algorithm based on cooperative game. 96 - Rakesh Kumar Godi, Santosh Reddy P, Shobha. N, B. Vikranth Bhoothpur
, Abhijit Das
:
A highly secure and stable energy aware multi-objective constraints-based hybrid optimization algorithms for effective optimal cluster head selection and routing in wireless sensor networks. 97 - Chetan Gupta
, Amit Kumar, Neelesh Kumar Jain:
Intrusion defense: Leveraging ant colony optimization for enhanced multi-optimization in network security. 98 - B. Prabha, Mallikarjun Yaramadhi
, Abhishek Sharma, K. Padmanaban:
Optimized auxiliary physics neural network based multi-target detection for edge-cloud in smart internet of things. 12 - D. Dhinakaran
, R. Ramani, Edwin Raja S.
, D. Selvaraj:
Enhancing security in electronic health records using an adaptive feature-centric polynomial data security model with blockchain integration. 7 - PL. Rajarajeswari, Brindha Devi V
, Angel Latha Mary S
:
Hybrid Termite Queen and Walrus Optimization Algorithm-based energy efficient cluster-based routing with static and mobile sink node in WSNs. 8 - Tiantian Zhou, Zehui Tang, Shengke Zeng, Minfeng Shao:
Deduplication-enabled CP-ABE with revocation. 9 - Bhupal Naik D. S., Venkatesulu Dondeti:
Trust-based secure federated learning framework to mitigate internal attacks for intelligent vehicular networks. 10 - Yazhi Liu, Haonan Xia, Wei Li, Teng Niu:
Mitigating bias in heterogeneous federated learning via stratified client selection. 11 - N. Nathiya
, C. Rajan, K. Geetha:
A hybrid optimization and machine learning based energy-efficient clustering algorithm with self-diagnosis data fault detection and prediction for WSN-IoT application. 13 - Mehdi Selem, Farah Jemili
, Ouajdi Korbaa
:
Deep learning for intrusion detection in IoT networks. 22
Volume 18, Number 3, June 2025
- R. Loganathan, S. SelvakumaraSamy:
An efficient privacy-preserving authentication scheme for internet of vehicles based on blockchain technology with hybrid adaptive network. 99 - Kaoutar Jouti, Manal Jlil, Chakir Loqman:
Blockchain technology to improve traceability of data exchanges in the Judicial system: A road traffic accident victims as use case. 100 - Bin Wu, Ning Shi, Yahong Li, Kaijun Wu, Caifen Wang:
A key leakage resistant linearly homomorphic signature scheme and its application. 101 - Minli Chen, Yifeng Zheng, Jingmin Yang, Liwei Yang, Wenjie Zhang:
Computation offloading and pricing strategy for heterogeneous multicell network with mobile edge computing. 102 - Yalong Yang, Muhua Liu, Lin Wang, Yi Pu, Ruijuan Zheng, Qingtao Wu, Jing Guo:
A ring signature scheme with linkability and traceability for blockchain-based medical data sharing system. 103 - Zhenyu Li, Yong Ding, Chen Yi:
RDDNS: A domain name system for robust dynamic address resolution. 104 - Rajesh Kumar Kaushal, Naveen Kumar, Vinay Kukreja, Ekkarat Boonchieng:
Hyperledger fabric based remote patient monitoring solution and performance evaluation. 105 - B. Prabha, Mallikarjun Yaramadhi, Abhishek Sharma, K. Padmanaban:
Correction to: Optimized auxiliary physics neural network based multi‑target detection for edge‑cloud in smart internet of things. 106 - Satheesh Kumar D, Satheesh Kumar N, Divya R, Sampath Kumar S
:
Grey wolf optimizer with softmax-regressed and tanimoto reweight for AI-ML-based wireless sensor network routing. 107 - Komal Pursharthi, Dheerendra Mishra:
Cryptanalysis and amendment of authenticated key exchange protocol for mobile devices. 108 - Vijay Ramasamy, Rengarajan Amirtharajan
, Padmapriya Pravinkumar:
Sustaining immutability in pharmaceutical cold supply chain integrating quantum blockchain. 109 - Vimal Kumar, Ishan Budhiraja, Abdoh M. A. Jabbari, Deepak Garg, Dipanshu Singh, Nithin Mengani:
Efficient blockchain interoperability design for cross-chain transactions in future internet-of-value. 110 - Zongyang Zhang, Bin Hu, Lei Tian, You Zhou, Jianwei Liu:
Efficient dynamic-committee BFT consensus based on HotStuff. 111 - Debasis Gountia, Pranati Mishra, Ranjan Kumar Dash, Nihar Ranjan Pradhan, Sachi Nandan Mohanty:
An AI-based approach for dynamic routing in IoT networks. 112 - Hang Shen, Xiang Li, Yan Wang, Tianjing Wang, Guangwei Bai:
Collaborative path penetration in 5G-IoT networks: A multi-agent deep reinforcement learning approach. 113 - Jiajia Xu, Xiaonan Wang, Hongbin Cheng:
Forwarding information base construction and hybrid data transmission for information-centric IoT. 114 - G. Senthilkumar
, R. Naveenkumar
, S. Rajeshkannan, S. Rama Sree:
Efficient energy management in wireless sensor networks based on optimized explicit feature interaction-aware graph neural network. 115 - Gaoli Yan
, Xue Fu, Yu Wang, Qianyun Zhang, Guan Gui:
Radio frequency fingerprint identification towards statistical and deep learning features: Review, recent results and future directions. 116 - Xianqi Cao:
Enhanced security data management in power grids using deep learning with genetic algorithm-based hyperparameter optimization. 117 - Zhenqi Huang, Zhufang Kuang, Bin Xu, Yuanguo Bi, Anfeng Liu:
Dependency-aware task collaborative offloading and resource allocation in UAV enabled edge computing. 118 - Aradhana Behura, Arun Kumar, Puneet Kumar Jain:
A multi-objective approach for secure cluster based routing & attack classification in VANETs. 119 - Zhuo Li, Qiansheng Yang, Zecheng Li:
Optimal incentive mechanism design for short video collaborative caching system in mobile edge networks based on contract theory. 120 - Qinglei Yao, Xiaoqiang Zhao:
An intrusion detection imbalanced data classification algorithm based on CWGAN-GP oversampling. 121 - Rui Tang, Yiming Peng, Jingxi Li, Xingshu Chen, Yi Zhang, Xian Mo
:
Compact network alignment with mitigated sensitive information exposing in P2P networks: a community partition-based approach. 122 - Jamal Alotaibi:
A hybrid software-defined networking approach for enhancing IoT cybersecurity with deep learning and blockchain in smart cities. 123 - Maheshwari Biradar, Nandini Sidnal, Rajeshree Rokade, Bahubali Shiragapur:
Dairy product quality evaluation using optimization-based deep maxout network with blockchain-driven internet of things. 124 - Erhan Sesli
, Erdal Gürsoy
, Gokce Hacioglu:
Energy-efficient OFDMA resource allocation in HetNets using discrete particle swarm optimization. 125 - Feshalbhai Naguji, Nilesh Kumar Jadav, Sudeep Tanwar, Giovanni Pau, Fayez Alqahtani, Amr Tolba
:
Green secure land registration scheme for blockchain-enabled agriculture industry 5.0. 126 - Jinyu Zhu, Yu Zhang, Yunan Wang, Hongli Zhang, Binxing Fang:
Paths in the cloud: Geolocation mapping of Amazon's cross-border connectivity. 127 - Sameer Dixit, Shaima Qureshi:
Security-aware, Red fox optimization-based cluster-based routing in wireless sensor network. 128 - Rahma Jablaoui, Noureddine Liouane:
Network security based combined CNN-RNN models for IoT intrusion detection system. 129 - Riaz A. Khan, Saba Mushtaq, Sajaad A. Lone, Rajesh Gupta, Ayaz Hassan Moon:
Integrating ABHA for authentication and key exchange: A hybrid security framework for smart healthcare in India. 130 - Akhilesh Sharma, Preeti Chandrakar, Saru Kumari, Chien-Ming Chen:
FinSec: A Consortium Blockchain-Enabled Privacy-Preserving and Scalable Framework For Customer Data Protection In FinTech. 131 - Avaneesh Singh, Atul Raj, Preeti Rani
, Ali Khatibi, Horiya Aldeeb, Piyush Kumar Shukla, Ayman Sabry, Mohamed M. Hassan:
Resilient wireless sensor networks in industrial contexts via energy-efficient optimization and trust-based secure routing. 132 - Pranalini Joshi, Pratibha Mahajan:
Secure and interoperable EHR management via hyperledger fabric: The Mrblock framework. 133 - Thiyagarajan N
, Shanmugasundaram N:
Deep learning based Enhanced Data Aggregation with Multi-Objective Optimization method in Wireless Sensor Networks. 134 - Pengfei Yu, Weicong Huang, Zhenjiang Li:
A Secure, lightweight, and verifiable data aggregation scheme for smart grids. 135 - R. Rajan, P. Venkata Rama Raju, Santhosh Kumar SVN, Munuswamy Selvi, Rathinam Shanmugapriya:
RL-BOT - Reinforcement learning based billfish optimization technique for secured data aggregation in internet of things. 136 - Yazhou Wang, Bing Li, Jiaxin Wu, Guozhu Liu, Yuqi Li, Zhen Mao:
An efficient multi-party signature for securing blockchain wallet. 137 - Yangyang Bao, Lingrui Pan, Xiaochun Cheng, Liming Nie:
Enabling privacy-preserving and distributed intelligent credit scoring by zero-knowledge proof and functional encryption. 138 - Suvrima Datta, Venkanna U., Mallikharjuna Rao K
:
Mudscan: Double authentication based secure control mechanism for MUD enable IoT networks. 139 - Dinesh G, W. Deva Priya, C. P. Shirley, T. Vignesh:
Automatic modulation classification scheme for next-generation cellular networks using optimized adaptive multi-scale dual attention network. 140 - Tao Wu, Yulin Deng, Qizhao Zhou, Xi Chen, Ming Zhang:
ADPHE-FL: Federated learning method based on adaptive differential privacy and homomorphic encryption. 141 - Rahul
, Preeti Gulia
, Nasib Singh Gill
:
Articulation of blockchain enabled e-voting systems: a systematic literature review. 142 - Yilin Liu, Yujue Wang, Chen Yi, Jun Li, Yong Ding, Changsong Yang, Huiyong Wang:
Secure traffic data sharing in UAV-assisted VANET through certificateless proxy re-encryption and consortium blockchain. 143 - Neha Sharma
, Vishal Gupta, Prashant Johri, Ahmed A. Elngar:
SHO-CH: Spotted hyena optimization for cluster head selection to optimize energy in wireless sensor network. 144 - Rima Alshaya, Salim El Khediri:
Optimizing cybercrime detection: A hybrid deep learning approach for enhanced intrusion detection systems. 145 - Muthuvinayagam Madasamy, Manasea Selvin Belsam Jeba Ananth, Agalya Vedi:
Blockchain-based secure data communication with an optimal energy trading model in the IoEV system. 146 - D. Vijayakumar, K. G. Srinivasagan, K. Vivekrabinson:
Enhancing cloud storage security through blockchain-enabled data deduplication and auditing with a fair payment. 147 - Peng Xiao, Shunkun Yang, Hailin Wang, Zhenhong Zhang, Chunsheng Zou:
Privacy-preserving revocable access control for LLM-driven electrical distributed systems. 148 - Robertas Damasevicius, Rytis Maskeliunas:
Adaptive sensor clustering for environmental monitoring in dynamic forest ecosystems. 149 - D. Hemila Rexline, X. Anita:
LCMAS-IoMT: Lightweight certificate-less mutualauthentication scheme for internet of medical things. 150 - Ritu Ratra, Preeti Gulia, Nasib Singh Gill, Piyush Kumar Shukla
, Mohamed M. Hassan
, Fayez Althobaiti:
A technique for improving healthcare privacy by applying principal component analysis. 151 - Hong-Quan Wang, Jin Li, Dong-Hua Huang, Yao-Dong Tao:
Meta-IDS: Meta-Learning Automotive Intrusion Detection Systems with Adaptive and Learnable. 152 - Jingting Xue, Lusha Zeng, Wenzheng Zhang, Fagen Li, Xiaojun Zhang, Yu Zhou, Liang Liu:
Incentive-assisted multi-keyword ranked searchable encryption with hidden attributes for community data sharing. 153 - Narendra K. Dewangan, Preeti Chandrakar:
TreatChain: A patient-centric treatment cycle blockchain using proof-of-upload consensus. 154 - Shashank Singh
, Rohit Sharma:
Threshold-sensitive energy efficient routing for precision agriculture. 155 - Yuzhou Dai, Qian Cheng, Hui Li, Dan Liao, Ming Zhang, Hailing Zhang, Zhiliang Xu, Guangxin Li:
An enhancing privacy training architecture for federal vehicle networking. 156 - Saeed Banaeian Far, Mohammad Reza Chalak Qazani, Azadeh Imani Rad:
Exploring blockchain-based open finance: The role of advanced cryptographic tools, state-of-the-art achievements, and background challenges. 157 - Guosheng Zhao, Hongqi Bao, Jian Wang:
A lightweight security authentication protocol for RFID. 158 - Meysam Jahani, Zahra Zojaji, Fatemeh Raji:
Blockchain-driven peer-to-peer system: Elevating trust in pharmaceutical manufacturer selection through bert-based sentiment analysis. 159 - Kaibin Zhang, Liang Liu, Wenbin Zhai, Youwei Ding, Jun Hu:
OSIS: Obstacle-Sensitive and Initial-Solution-first path planning. 160 - Emre Emirmahmutoglu, Yilmaz Atay:
A feature selection-driven machine learning framework for anomaly-based intrusion detection systems. 161 - Yulong Wang
, Yubing Duan, Jun Han, Zhi Chen, Mingyong Yin, Guoxin Zhong:
Privacy-enhanced deep learning inference acceleration towards third-party cloud based on trusted execution environment. 162 - Raghini M, Selvam Durairaj, Sasikala S, S. Appavu alias Balamurugan:
Hybrid key management WSN protocol to enhance network performance using ML techniques for IoT application in cloud environment. 163
Volume 18, Number 4, August 2025
- Aanchal Khatri, Mahima, Punit Kumar, Balak Ram, Upasana Dohare, Sushil Kumar:
Towards precision agriculture: utilizing IoT and deep learning for automatic farm fire detection and extinguishing. 164 - Ashok Kumar Munnangi, Kumaresan Maruthapillai, Sivaram Rajeyyagari, Ramesh Sekaran, Vinayakumar Ravi
, Alanoud Al Mazroa:
Message digest and blockchain based chaotic ordered cyber secured cloud of things for smart health care. 165 - Zhengjun Cao:
Corrigendum to "SE-LAKAF: Security Enhanced Lightweight Authentication and Key Agreement Framework for Smart Grid Network". 166 - Seyedeh Maryam Mousavi Jalali, Fatemeh Rezaei:
IoT data caching and scheduling in heterogeneous mobile networks by exploiting mobility and transient data characteristics. 167 - Sreenu Maloth
, Nishant Singh Hada, Chandrashekar Jatoth, Nitin Gupta, Ugo Fiore, Pradip Kumar Sharma:
Minecrafter: A secure and decentralized consensus protocol for blockchain-enabled vaccine supply chain. 168 - Yunxiang Qiu, Yuting Tang, Liangguo Chen, Shuyu Jiang, Ying Huang, Xingshu Chen:
Reinforcement learning-driven temporal knowledge graph reasoning for secure data provenance in distributed networks. 169 - Chao Cai, Jiahui Qiu, Bin Chen, Xiangyun Zhang, Xuanhan Zhu, Yang Li, Quan Yuan, Lili Li:
Attentional value-factorization-based resource allocation and performance evaluation for intelligent connected vehicles. 170 - Gang Liu, Zheng He, Le Cheng, Yi Luo, Senmiao Su, Jingchen Su, Keming Zhang:
Pivacy-preserving federated learning based on multi-key fully homomorphic encryption and trusted execution environment. 171 - Ravi Kumar Suggala
, Jaydip Kumar, Prateek Jain, Boddepalli Kiran Kumar:
Blockchain technology for digital twin security in smart grids using interpretable generalized additive neural networks. 172 - Aarti Punia
, Preeti Gulia, Nasib Singh Gill, Deepti Rani, Deepak Kaushik
, Ayman Sabry, Mohamed M. Hassan, Piyush Kumar Shukla
:
The security and vulnerability issues of blockchain technology: A SWOC analysis. 173 - Bhabani Sankar Samantray, K. Hemant Kumar Reddy:
Blockchain-enabled secured supply chain for smart cities: A systematic review on architecture, technology, and service management. 174 - A. Daniel Gurwin Das, E. Anna Devi:
Energy aware DBSCAN and mobility aware balanced q-learning based opportunistic routing protocol in MANET. 175 - Udit Agarwal, Vinay Rishiwal, Mano Yadav, Preeti Yadav:
Blockchain and homomorphic encryption based system for secure supply chain network against counterfeit drugs. 176 - Priyanka Amol Kadam, Shashi Bhushan, Vinay Rishiwal, Mano Yadav, Preeti Yadav, Udit Agarwal:
ValidCertify: an effective blockchain-based domain certificate authentication and verification scheme. 177 - Jimei Gao, Chunhua Cai:
Integrating request stochasticity for efficient resource placement in general edge architecture with no level limit. 178 - Jingchao Hu, Yaodong Zhang, Hao Zhang:
Hybrid optimization and deep learning for enhancing accuracy in fraud detection using big data techniques. 179 - Jie Zhu, Weizhi Cui, Haiping Huang, Tao Zhu, Yuzhong Sun:
An effective meta-heuristics for trajectory planning problem in UAV-assisted vessel emission detection system. 180 - Chunhua Jin, Wenyu Qin, Zhiwei Chen, Chenhao Li, Xiaobing Chen, Guanhua Chen, Hao Zhang, Jian Weng:
Heterogeneous signcryption scheme from CLC to IBC for IIoT. 181 - Bhupesh B. Lonkar
, Annaji Kuthe
, Pallavi Charde, Archana Dehankar, Roshan Kolte:
Optimal hybrid energy-saving cluster head selection for wireless sensor networks: an empirical study. 182 - Rui Wu, Long Chen, Guangmin Song, Yang Xu, Xinlong Wang:
Multi-layered retrieval integrity verification mechanism for blockchain oracle. 183 - Jiazheng Zhang
, Shouwei Li, Minghui Chen:
Multifactor SM9 blind signature large models data privacy preservation approach. 184 - Yuke Cao, Kun She, Yuxuan Xiao, Yongyue Wu, Yuntao Ren, Ruidong Chen:
PTSC: an efficient random boolean consensus algorithm for distributed systems with the probabilistic propagation model. 185 - Jie Gao, Xiaohong Zhang, Shaojiang Zhong:
Data security and access control method of blockchain with revocable attribute encryption in steel supply chain. 186 - Jun Sun, Bin Chen, Bin Li, Ziyu Huang, Yiwen Zhang, Hui Li, Xinlong Wu:
Starkburger-game-based real-time pricing method for energy transactions in smart grid. 187 - Huisi Zhou, Xinyu Zhang, Wei Hu, Dan Zhu, Liwei Wang:
DPSLS: an efficient local search algorithm for pure MaxSAT. 188 - Muhammad Tayyab Chaudhry, Abdullah Yousafzai
, Ali Zia, Shahbaz Akhtar Abid, Farooq Ahmad:
Deadline-aware workload scheduling for edge-enhanced iot devices: A blockchain-enabled approach to incentive-based computing. 189 - Liqiong Chen, Kaiwen Zhi
, Huaiying Sun:
User satisfaction aware edge server utilization enhancement in mobile edge computing. 190 - Omer Fawzi Awad
, Mesut Çevik, Hameed Mutlag Farhan
:
An enhanced attention and dilated convolution-based ensemble model for network intrusion detection system against adversarial evasion attacks. 191 - Mai Shawkat, Ali I. El-Desouky, Zainab Hassan Ali, Mofreh Salem:
Blockchain and federated learning based on aggregation techniques for industrial IoT: A contemporary survey. 192 - Zhiqiang Du
, Xiaopeng Zhang, Wendong Zhang, Yanfang Fu, Yibo Liang:
Dynamic sharding mechanism for vehicle networking to ensure load balancing and data reliability. 193 - Raouf Jmal, Mariam Masmoudi, Ikram Amous Ben Amor, Florence Sèdes:
Blockchain-powered trust management methodology in SIoT: A survey. 194 - Kamal Rahmani, Shahram Babaie:
A lightweight biometric-assisted authentication approach for internet of things. 195 - A. Sridevi, Siva Janakiraman
, Rengarajan Amirtharajan
:
Intrusion detection system for Denial of Service (DoS) attacks in healthcare cybersecurity on System on Chip (SoC) - PYTHON productivity for ZYNQ (PYNQ Z1). 196 - Richa Jain, Pankaj Jain
, Bhawana Tyagi:
A model for SLA aware admission control and QoS aware task scheduling in cloud environment. 197 - Ghazaleh Shirvani, Saeid Ghasemshirazi, Mohammad Abdollahi Azgomi:
Mitigating DDoS attacks on the internet of things using federated learning. 198 - Kapil Kumar, Manju Khari:
Federated active meta-learning with blockchain for zero-day attack detection in industrial IoT. 199 - Muhammad Tanveer, Abdullah G. Alharbi, Muhammad Jawad Akhtar:
A secure and resource-efficient authenticated key agreement framework for mobile edge computing. 200 - Ali Al-Balaghee, Vesal Hakami
:
Content caching in relay-assisted D2D communications using robust combinatorial optimization. 201 - Gadde Pranitha, P. V. Lakshmi:
A novel approach for ensuring drug safety in the pharmaceutical supply Chain by using IoT devices and blockchain technology. 202 - Tejeswara Kumar M, N. V. R. Vikram G:
Blockchain based deep learning model for the security in industrial internet of things. 203 - Dong Li, Wentao Tang, Liangliang Wang, Yang Liu, Zhiquan Liu, Kai Zhang, Weiwei Li:
A security enhanced certificateless aggregate signcryption scheme for VANETs. 204 - Jingzhe Zhao, Hongzhang Yang, Guangping Xu, Jiangpu Guo, Yu Feng, Yangyang Fan:
MHQoS: A multi-user hierarchical quality of service optimization for P2P storage. 205 - Wei-Kuo Chiang
, Wen-Yi Wang:
An efficient certificateless signcryption for mutual and batch authentication in Vehicular Ad-hoc Networks (VANETs). 206 - Alexander Yohan
, Nai-Wei Lo, Liem Peter Santoso:
A robust and efficient blockchain-based framework for updating firmware in IoT environments. 207 - Peyman Mokaripoor, Mirsaeid Hosseini Shirvani, Hamid Reza Ghaffari, Reza Noorian Talouki
:
A hybrid shuffled frog-leaping scheduling algorithm for power management of directional sensor networks. 208 - Kalaiselvi Subbarayan, Garikapati Bindu, Sivakumar Chinnavel, Velliangiri Sarveshwaran:
Deep learning and blockchain-based secure authentication protocol for privacy protection in cloud environments. 209 - Vijitha S, Anandan R:
Blockchain-based decentralized identifier in metaverse environment for secure and privacy-preserving authentication with improved key management and cryptosystem. 210 - Vaishnavi M
, Srikanth Vemuru
:
A privacy-preserving hybrid ensemble classifier using decision tree and naïve bayes approach for federated learning. 211 - Kajal Tiwari, Sanjay Kumar:
BCT-FLHD: A blockchain-enabled federated learning framework for healthcare 5.0 disease detection. 212 - Zheng Zhang, Amit Das, Guan Huang
, Sanjeev Baskiyar:
CAT: A simple heterogeneous ensemble learning framework for network intrusion detection. 213 - Yinuo Jin, Fei He, Yi Zhu, Hao Ren:
Combating evolving threats: A robust malicious domain detection framework for distributed networks. 214 - Yang Zhang, Zhezheng Ning, Yunxiang Song:
Design and optimization of intelligent sports IoT system based on big data and quantum computing. 215 - Vijayalakshmi Khagga, Sangeetha Priya. N, A. M. Prasad:
Enhanced QoS-aware secure routing protocol for WAHNs using advanced fast double decker new binary archimedes kepler pure convolutional transformer network and cryptographic techniques. 216 - Y. Lavanya, A. Maheswara Rao:
Optimized energy-efficient routing in agriculture using wireless sensor networks. 217 - Mohammad Abdussami, Sanjeev Kumar Dwivedi, Ruhul Amin, Cheng-Chi Lee, Taher Al-Shehari, Taha Alfakih, Hussain Alsalman:
LEFAM: Lightweight scalable efficient failover authentication mechanism for fog-based IoT environment. 218 - V. Srinivas Lokavarapu, Kunjam Nageswara Rao, Sitaratnam Gokuruboyina, Shiva Shankar Reddy:
An in-depth analysis of computation offloading approaches in multi-access edge computing systems. 219 - N. Sheena, Shelbi Joseph, Shailesh Sivan, Bharat Bhushan:
EESDA: Energy-Efficient And Secure Data Aggregation Protocol for IoT. 220 - Hai Liang, Xiaoye Lu, Xinyong Peng, Yujue Wang, Changsong Yang, Lun Wang, Jun Li:
A multi-notary cross-chain system with supervision and identity tracking. 221 - Vishal Pareek, Chinmoy Biswas, Aditi Kar Gangopadhyay, Sugata Gangopadhyay:
Secure and efficient fully dynamic group signature based on RSIS and RLWE. 222 - Ye Yuan, Mingxing Yang, Ruoting Xiong, Jia Duan, Xi Liu, Lianchong Zhang, Wei Ren, Xin Zhang:
A blockchain-based data transaction method with privacy protection and fairness. 223 - Pritam Rani, Pratima Sharma, Indrajeet Gupta, Priyanka Gaba:
STP: a permissioned blockchain solution for dynamic pricing and traceability in food supply chain. 224 - Maher Boughdiri, Mohamed Hkima, Takoua Abdelatif, Chirine Ghedira Guégan:
A standard-driven framework for blockchain security risk assessment. 225 - Houda Hassen, Soumaya Meherzi, Zouhair Ben Jemaa:
A hybrid reinforcement learning approach for multipath routing optimization in software-defined networks. 226 - Yinghui Wang, Yufeng Bi, Haiyang Yu, Xinpeng Yao, Yilong Ren, Wen Rong:
AI-driven proactive security defense in distributed iov systems: Cyber threat intelligence modeling for connected autonomous vehicles. 227 - Zhen Liu, Changsong Yang, Yong Ding, Yujue Wang, Huiyong Wang:
EMKPPA: Efficient multi-key privacy-preserving aggregation in federated learning. 228 - Salim Salmi, Lahcen Oughdir:
Adaptive meta-learning for denial-of-service defense. 229 - Vankamamidi S. Naresh, D. Ayaaappa:
Privacy preserving hierarchical federated learning approach for secure urban mobility prediction. 230 - Lokendra Vishwakarma, Samanyu A. Saji, Debasis Das:
CuraFrame: a patient-centric secure and privacy preserving medical framework with zero-leak using blockchain. 231 - Prashant Kumar Shukla, Bala Dhandayuthapani Veerasamy, Noha Alduaiji, Santosh Reddy Addula, Sachin Sharma, Piyush Kumar Shukla:
Encoder only attention-guided transformer framework for accurate and explainable social media fake profile detection. 232 - Bingyun Liu, Xiaojun Zhang, Chong Zhang, Lei Li, Jingting Xue:
Lightweight batch tamper proof detection for anonymous outsourced data in cloud-assisted industrial internet of things. 233 - Taner Guven, Ziya Cihan Taysi:
Creating a realistic sybil attack dataset for inter-vehicle communication. 234 - Shriniwas Patil, Keyur Parmar:
Mitigation of selfish mining attack using dynamic difficulty adjustment algorithm. 235 - Leila Bouchrit, Sajeh Zairi, Ikbal Chammakhi Msadaa, Amine Dhraief:
A state machine-based mobility model for UAVs supporting VANETs. 236 - Gang Han, Jiping Ma, Liqi Gong, Qian Wang, Zhongliang Zhang:
Cross-domain secure communication scheme in industrial internet of things based on consortium blockchain. 237 - Swethambri Mohan, Nandhini S, Aparna H, Gunaseelan K:
Ensemble bagging-based classifier for eavesdropper detection in 6G wireless networks. 238 - Mohammad Reza Saeidi, Hamid Mala:
Cryptanalysis and enhancement of a quantum-secure two-party authentication protocol for mobile devices. 239 - Pankaj Gugnani, W. Wilfred Godfrey, Debanjan Sadhya:
Proof of time offset: Blockchain consensus for resource constrained environments. 240 - Jiajun Li, Wenyi Tang, Rui Tang, Danyang Zheng:
Exploring equivariant and invariant features for website fingerprinting in distributed networks. 241 - D. Prabakar, Konda Hari Krishna, D. Prabhu, Femila L:
Correction to: Classification of intrusion using Multi-Stream Generative Adversarial Networks in Wireless Sensor Networks. 242 - Yining Ren, Zhizhou Wu, Jing Zhao, Yunyi Liang:
Joint optimization of roadside unit deployment and connected vehicle routing for emergency information propagation. 243
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.