default search action
Transactions on Emerging Telecommunications Technologies, Volume 35
Volume 35, Number 1, January 2024
RESEARCH ARTICLES
- Adlin Sheeba, R. Rajalakshmi, B. Uma Maheswari, A. Shamila Ebenezer:
Secure smart city application using webservice model and mayfly optimization-based lightweight CNN. - Yuzi Yi, Nafei Zhu, Jingsha He, Anca Delia Jurcut, Xiangjun Ma, Yehong Luo:
A privacy-sensitive data identification model in online social networks. - Arwa S. Aqel, Mamoun F. Al-Mistarihi:
Performance analysis of dual-hop dual-branch amplify-and-forward relaying cooperative diversity system using best-path selection technique over Nakagami-m fading channels. - Fershteh Salimian Rizi, Abolfazl Falahati:
A novel statistics for the NWDP: An appropriate fading model for 5G/6G mmWave communications. - Shuang Xu, Hao Wang, Yang Fang, Zhengpeng Zhao, Xingwei Wang, Min Huang:
Distributed and multi-layer hierarchical controller placement in software-defined satellite-terrestrial network. - Nitin Kali Raman, Himanshi Saini:
CSAT-FRMET: An energy-efficient hybrid FiWi network-based 5G model. - Mandeep Kaur, Pankaj Deep Kaur, Sandeep Kumar Sood:
Cloud-fog assisted human tracing and disaster evacuation framework. - Deepika Gautam, Aryan Rana, Mohammad S. Obaidat, Pankaj Kumar, Sunil Prajapat:
A probably secure biometric-based authentication and key agreement scheme for Internet of Drones. - Amal Megahed, Mahmoud M. Elmesalawy, Ibrahim I. Ibrahim, Ahmed M. Abd El-Haleem:
Deep learning-assisted reconfigurable intelligent surface for enhancing 6G mobile networks. - Mandeep Kumar, Amritpal Singh:
Anomalous vehicle recognition in smart cities using persistent bloom filter: Memory efficient and intelligent monitoring. - Arun Raj, Durbadal Mandal:
Design and experimental analysis of fractal antennae with ground-defected structure for expected 6G and 5G mm-wave communication and wireless applications. - Luyu Zhang, Chao Zhai, Lina Zheng, Wen Si:
Dual intelligent reflecting surfaces aided decode-and-forward relaying with wireless power transfer. - R. Nithiavathy, Sengathir Janakiraman, Deva Priya M.:
Adaptive Guided Differential Evolution-based Slime Mould Algorithm-based efficient Multi-objective Task Scheduling for Cloud Computing Environments. - Shikhar Bhardwaj, Sandeep Harit, Anil Yadav:
Towards a software-defined networking model for consumer-centric content delivery network for IoT. - Sonam Bhardwaj, Mayank Dave:
RAKSHAM: Responsive approach to Knock-off scavenging hackers and attack mitigation. - ChengJun Guo, Amin Rezaeipanah:
Dynamic service function chains placement based on parallelized requests in edge computing environment. - Lejun Zhang, Chendong Zhu, Zhihong Tian, Yuan Liu, Jing Qiu, Shen Su, Guangxia Xu, Ran Guo:
ICRB: An improved consensus-based redactable blockchain considering contextual consistency. - Hao Wang, Bo Li:
Double-deep Q-learning-based handover management in mmWave heterogeneous networks with dual connectivity. - Muyan Yao, Zuodong Jin, Ruipeng Gao, Peng Qi, Dan Tao:
Pattern unlocking guided multi-modal continuous authentication for smartphone with multi-branch context-aware representation learning and auto encoder. - Zhenglei Huang, Yupeng Du, Shujie Yang, Han Xiao, Dan Wang, Tao Sun:
Joint optimization of task scheduling and computing resource allocation for VR video services in 5G-advanced networks. - Tharindu D. Ponnimbaduge Perera, Dushantha Nalin K. Jayakody:
AoI-driven SWIPT-enabled UAV trajectory optimization for two-way relaying. - Amit Choksi, Mehul Shah:
Machine learning based centralized dynamic clustering algorithm for energy efficient routing in vehicular ad hoc networks. - Yangyang Sun, Xiangdong Jia, Xianghua Han, Mangang Xie, Liang Zhang:
Physical layer security-oriented energy-efficient resource allocation and trajectory design for UAV jammer over 5G millimeter wave cognitive relay system. - Rahman Md Azadur, Chaitali J. Pawase, KyungHi Chang:
Multi-UAV path planning utilizing the PGA algorithm for terrestrial IoT sensor network under ISAC framework. - Aashima Sharma, Sanmeet Kaur, Maninder Singh:
A secure blockchain framework for the internet of medical things. - Tarek Bouzid, Noureddine Chaib, Mohamed Lahcen Bensaad:
Crowd-sourced and incentive driven UAV system to assist with network slices. - Krati Dubey, Sudhakar Pandey, Sanjay Kumar:
Secrecy-enabled resource allocation in cloud-assisted IoT networks. - Mohamed Rahmani, Ghoutia Naima Sabri, Abdelhamid Cherifi, Abdullah S. Karar, Hichem Mrabet:
Massive capacity of novel three-dimensional OCDMA-FSO system for next generation of high-data wireless networks. - Sanjeev Shukla, Manoj Misra, Gaurav Varshney:
HTTP header based phishing attack detection using machine learning. - Ahmed Bashir Abbasi, Muhammad Usman Hadi:
Optimizing UAV computation offloading via MEC with deep deterministic policy gradient. - Meet Kumari, Vivek Arya:
Flat ball topology basics multi-transceivers 100 km/2.5 Tbps gigabit-ethernet PON architecture for energy efficiency in data centers. - Amit Agarwal, Keshav Singh:
Energy-efficient UOWC-RF systems with SLIPT. - Ashwini H. Raghavendra, Sanjeev Gurugopinath:
Beamforming and data detection in intelligent reflecting surfaces-assisted communication using deep learning. - Alisson Yury, Everaldo Andrade, Aldri Santos, Fernando Matos:
Vehicular social aspects in data dissemination of urban critical events with QoS and QoE for supporting emergency response. - Ahamed Ali Samsu Aliar, V. Gowri, A. Arockia Abins:
Detection of distributed denial of service attack using enhanced adaptive deep dilated ensemble with hybrid meta-heuristic approach. - Jianhong Zhang, Jie Wei, Jianan Zhang, Cao Bo:
CKAA: Certificateless key-agreement authentication scheme in digital twin telemedicine environment. - Yasir Ali, Yuanqing Xia:
Reliability weight-based extended puncturing mechanism for polar codes using translation shift. - Qing Pan, Qimiao Zeng, Yirong Zhuang, Zhifan Yin, Jinxia Hai, Ge Chen, Jie Liang, Han Xiao, Shujie Yang:
OJUMP: Optimization for joint unicast-multicast panoramic VR live streaming system. - C. Silpa, A. Vani, K. Rama Naidu:
Optimized deep learning based hypernet convolution neural network and long short term memory for joint pilot design and channel estimation in MIMO-OFDM model. - Sajjad Shahabodini, Mobina Mansoori, Jamshid Abouei, Konstantinos N. Plataniotis:
Recurrent neural network and federated learning based channel estimation approach in mmWave massive MIMO systems. - Haoyu Liang, Jun Wu, Cong Wang, Mingkun Su, Jianrong Bao, Jipeng Gan, Weiwei Cao:
Energy efficiency analysis of cooperative spectrum sensing: A malicious user's perspective on Byzantine attack. - Chenyang Yin, Yuyang Zhang, Ping Dong, Hongke Zhang:
Deep reinforcement learning-based joint task offloading and resource allocation in multipath transmission vehicular networks. - Zhuoyang Li, Yuan He, Di Yi, Jingyang Lv:
Spatiotemporal correlation and joint coverage probability in ultra-dense mobile networks. - Praveen Kumar Kollu, Tejaswini Sambrajyam Janjanam, Kavya Sharmila Siram:
Comparative analysis of cloud resources forecasting using deep learning techniques based on VM workload traces.
SURVEY ARTICLES
- Gaurav Kumar Soni, Dinesh Yadav, Ashok Kumar:
Design consideration and recent developments in flexible, transparent and wearable antenna technology: A review. - Hatem Ibn-Khedher, Mohammed Laroui, Mohammed Alfaqawi, Ahlam Magnouche, Hassine Moungla, Hossam Afifi:
6G-edge support of Internet of Autonomous Vehicles: A survey. - Wai-Ming To, Billy T. W. Yu, Andy W. L. Chung, David W. K. Chung:
Metaverse: Trend, emerging themes, and future directions. - Mohsen Khani, Shahram Jamali, Mohammad Karim Sohrabi, Mohammad Mohsen Sadr, Ali Ghaffari:
Resource allocation in 5G cloud-RAN using deep reinforcement learning algorithms: A review. - Renie Mathews, Deepa V. Jose:
Hybrid homomorphic-asymmetric lightweight cryptosystem for securing smart devices: A review. - M. Sri Lakshmi, K. Seshadri Ramana, Gandikota Ramu, K. Shyam Sunder Reddy, C. Sasikala, Gajula Ramesh:
Computational intelligence techniques for energy efficient routing protocols in wireless sensor networks: A critique. - Rucha Shinde, Shruti Patil, Ketan Kotecha, Vidyasagar M. Potdar, Ganeshsree Selvachandran, Ajith Abraham:
Securing AI-based healthcare systems using blockchain technology: A state-of-the-art systematic literature review and future research directions.
Volume 35, Number 2, February 2024
RESEARCH ARTICLES
- M. Kandan, K. Jayasakthi Velmurugan, P. Gururama Senthilvel, N. Sathish Kumar:
Air quality forecasting-driven cloud resource allocation for sustainable energy consumption: An ensemble classifier approach. - Hemalatha Sekar, Appranchi Sumathi:
AFHO-based link reliable routing and power-assisted channel allocation protocol in cognitive radio networks for healthcare applications. - G. Vishnupriya, S. Anusha, Safak Kayikci:
An efficient and secure wearable sensor based remote healthcare monitoring system using adaptive dilated transformer Bi-LSTM with gated recurrent unit. - Yousef Mostafa Shishter, Falah H. Ali, Rupert C. D. Young:
Performance analysis of FSO communications over a generalized turbulence fading channel with pointing error. - Kausthav Pratim Kalita, Debojit Boro, Dhruba Kumar Bhattacharyya:
SSE_CIB: Secure storage and exchange of copyrighted images using blockchain. - K. B. Aruna, C. Arunachalaperumal:
Development of hybrid heuristic-assisted dynamic data auditing strategy in cloud sector. - M. S. Gowtham, M. Vigenesh, M. Ramkumar:
An artificial immune system-based algorithm for selfish node detection in Mobile Ad Hoc Networks (MANETs). - Yicong Ma, S. B. Goyal, Anand Singh Rajawat, Pradeep Bedi, Safia Yasmeen:
Blockchain-based Human Intelligent Systems for Smart City Safety. - Mamta, Shivani Sharma, Sachin Kumar:
An efficient fine-grained searchable encryption for secure communication in IoT-based vehicular social networks. - Carlos Daniel de Sousa Bezerra, Flávio Henrique Teles Vieira, Anderson da Silva Soares:
Deep-Q-Network hybridization with extended Kalman filter for accelerate learning in autonomous navigation with auxiliary security module. - Karim Kamoun, Fatma Hmissi, Sofiane Ouni, Sonia Ouni:
Improvement of MQTT semantic to minimize data flow in IoT platforms based on distributed brokers.
Volume 35, Number 3, March 2024
RESEARCH ARTICLES
- Balamurali Pydi, A. V. Prabu, Amrit Mukherjee, Deepak Kumar Jain, S. Ravi Chand, Noel Anurag Prashanth:
An improved low-carbon intelligent agriculture system with energy optimization principles using wireless IoT environment. - Gefei Zhu, Jun Wu, Mingkun Su, Xiaorong Xu, Mingyuan Dai, Lei Qiao, Jipeng Gan, Jiangtao He, Weiwei Cao:
Dynamic sliding window-cooperative spectrum sensing against massive SSDF attack in interweave cognitive internet of things. - Riccardo Rusca, Alex Carluccio, Claudio Casetti, Paolo Giaccone:
Privacy-preserving WiFi-based crowd monitoring.
Volume 35, Number 4, April 2024
RESEARCH ARTICLES
- Sisi Zhu, Alireza Souri:
Blockchain technology for energy-aware mobile crowd sensing approaches in Internet of Things. - Fei Wang, Nan Yang, Pethuraj Mohamed Shakeel, Vijayalakshmi Saravanan:
Machine learning for mobile network payment security evaluation system.
SPECIAL ISSUE PAPERS
- Vikram Puri, Aman Kataria, Vishal Sharma:
Artificial intelligence-powered decentralized framework for Internet of Things in Healthcare 4.0.
RESEARCH ARTICLES
- Alireza Esfahani, Jérémie Decouchant, Marcus Völp, Shahid Mumtaz, Kostromitin Konstantin Igorevich:
SI-AKAV: Secure integrated authentication and key agreement for cellular-connected IoT devices in vehicular social networks. - Vankamamidi Srinivasa Naresh, Sivaranjani Reddi, V. V. L. Divakar Allavarpu:
Provable secure dynamic lightweight group communication in VANETs. - Nirav Patel, Arpit Shukla, Sudeep Tanwar, Dhananjay Singh:
KRanTi: Blockchain-based farmer's credit scheme for agriculture-food supply chain. - Jianghui Liu, Hongtao Zhang:
UcnPowerNet: Residual learning based clustering and interference coordination in 5G user-centric networks.
SPECIAL ISSUE ARTICLE
- Sathish Kumar, Velliangiri Sarveshwaran, Periyasami Karthikeyan, Saru Kumari, Sachin Kumar, Muhammad Khurram Khan:
A survey on the blockchain techniques for the Internet of Vehicles security.
RESEARCH ARTICLES
- Ashutosh Dhar Dwivedi, Rajani Singh, Keshav Kaushik, Raghava Rao Mukkamala, Waleed S. Alnumay:
Blockchain and artificial intelligence for 5G-enabled Internet of Things: Challenges, opportunities, and solutions.
SPECIAL ISSUE ARTICLES
- Ritu Nigam, Deepak Kumar Sharma, Satbir Jain, Kartik Krishna Bhardwaj, Siddhant Banyal:
AI-enabled trust-based routing protocol for social opportunistic IoT networks. - Youcef Djenouri, Gautam Srivastava, Asma Belhadi, Jerry Chun-Wei Lin:
Intelligent blockchain management for distributed knowledge graphs in IoT 5G environments. - Abdullah Lakhan, Mazin Abed Mohammed, Sergei A. Kozlov, Joel J. P. C. Rodrigues:
Mobile-fog-cloud assisted deep reinforcement learning and blockchain-enable IoMT system for healthcare workflows.
SURVEY ARTICLES
- Pronaya Bhattacharya, Umesh Bodkhe, Mohd. Zuhair, Mamoon Rashid, Xuan Liu, Ashwin Verma, Ram Kishan Dewangan:
Amalgamation of blockchain and sixth-generation-envisioned responsive edge orchestration in future cellular vehicle-to-anything ecosystems: Opportunities and challenges.
RESEARCH ARTICLES
- Waqas Buksh, Ying Guo, Saleem Iqbal, Kashif Naseer Qureshi, Jaime Lloret:
Trust-oriented peered customized mechanism for malicious nodes isolation for flying ad hoc networks. - Jiahui Huang, Teng Huang, Huanchun Wei, Jiehua Zhang, Hongyang Yan, Duncan S. Wong, Haibo Hu:
zkChain: A privacy-preserving model based on zk-SNARKs and hash chain for efficient transfer of assets. - Guiyun Qin, Limin Li, Pengtao Liu, Chengyu Hu, Shanqing Guo:
Blockchain-based secure deduplication of encrypted data supporting client-side semantically secure encryption without trusted third party. - Tong Zhang, Yujue Wang, Yong Ding, Xuhang Jiang, Hai Liang, Huiyong Wang:
Privacy-preserving blockchain-based contract signing with multi-party supervision. - Mu Han, Shuai Wu:
A search optimized blockchain-based verifiable searchable symmetric encryption framework. - Yudai Xue, Jinsong Wang, Kai Shi, Hongwei Zhang:
A privacy-preserving model for blockchain-based data sharing in the industrial internet. - Muhammad Jamshaid Iqbal, Muhammad Farhan, Farhan Ullah, Gautam Srivastava, Sohail Jabbar:
Intelligent multimedia content delivery in 5G/6G networks: A reinforcement learning approach. - Vu Khanh Quy, Dang Van Anh, Nguyen Tien Ban, Nguyen Minh Quy, Gwanggil Jeon:
A cross-layer routing approach for MANET-assisted IoT applications. - Mohammad Kamrul Hasan, Md. Sarwar Hosain, Md. Kawsar Ahmed, Shayla Islam, Arwa N. Aledaily, Safia Yasmeen, Khairul Akram Zainol Ariffin:
Encrypted images in a V-BLAST assisted SC-FDMA wireless communication system.
SURVEY ARTICLES
- Anindya Nag, Md. Mehedi Hassan, Ayontika Das, Anurag Sinha, Nisarga Chand, Anwesha Kar, Vandana Sharma, Ahmed Alkhayyat:
Exploring the applications and security threats of Internet of Thing in the cloud computing paradigm: A comprehensive study on the cloud of things.
RESEARCH ARTICLES
- Thavavel Vaiyapuri, K. Shankar, Surendran Rajendran, Sachin Kumar, Vimal Gaur, Deepak Gupta, Meshal Alharbi:
Automated cyberattack detection using optimal ensemble deep learning model. - Sourav Mahapatra, Ditipriya Sinha:
Smart h-Chain: A blockchain based healthcare framework with insurance fraud detection. - Ashok Kumar, Saurabh Singh, Mahadev, Rahul Kumar:
An intelligent human-centric systems to diagnose breast cancer using machine learning and optimized feature selection techniques. - Yali Tai, Anand Singh Rajawat, S. B. Goyal, Pradeep Bedi, Constance Amannah:
Internet of things-enabled intelligent systems for remote chronic disease monitoring.
SURVEY ARTICLES
- Priyanka Verma, Nitesh Bharot, John G. Breslin, Mukta Sharma, Nisha Chaurasia, Ankit Vidyarthi:
Uncovering collateral damages and advanced defense strategies in cloud environments against DDoS attacks: A comprehensive review.
RESEARCH ARTICLES
- Mohammed Sayeeduddin Habeeb, Tummala Ranga Babu:
Coarse and fine feature selection for Network Intrusion Detection Systems (IDS) in IoT networks. - Yue Hu, Ning Cao, Hao Lu, Yunzhe Jiang, Yinqiu Liu, Xiaoming He:
Multi-dimensional resource management with deep deterministic policy gradient for digital twin-enabled Industrial Internet of Things in 6 generation. - Yi-Hua Zhou, Bin Tang, Yu-Guang Yang:
A lattice-based searchable encryption scheme with multi-user authorization for the certificateless cloud computing environment. - Mengge Li, Liang Wang, Xiaoming Wang, Yaguang Lin, Jiarong Du, Miao Ma:
Fairness-aware eMBB/URLLC spectrum resource multiplexing to ensure reliability in vehicular networks. - Sahar Barzegari Banadkoki, Mahmoud Ferdosizade Naeiny:
Multitarget direction of arrival trajectory estimation using BiLSTM and sequential allocation. - Ritu Dewan, Sharik Ahmad, Arun Kumar Rana, Tapsi Nagpal, Vinish Kumar, Ngangbam Herojit Singh, Visvam Devadoss Ambeth Kumar, Awnish Kumar:
IoT-based energy efficient and longer lifetime compression approach for healthcare applications. - Manal Abdullah Alohali, Naif Alasmari, Nabil Sharaf Almalki, Majdi Khalid, Mrim M. Alnfiai, Mohammed Assiri, Sitelbanat Abdelbagi:
Textual emotion analysis using improved metaheuristics with deep learning model for intelligent systems.
SURVEY ARTICLES
- Ali Alferaidi, Kusum Yadav, Yasser Alharbi, Jalawi Sulaiman Alshudukhi, Abdulrahman Alreshidi, Eissa Jaber Alreshidi, Mnaouer Kachout, Md. Haidar Sharif:
Challenges in human centric intelligent systems for wireless sensor networks: A state of art.
RESEARCH ARTICLES
- Fahad Razaque Mughal, Jingsha He, Nafei Zhu, Mutiq Almutiq, Fayaz Ali Dharejo, Deepak Kumar Jain, Saqib Hussain, Zulfiqar Ali Zardari:
An intelligent Hybrid-Q Learning clustering approach and resource management within heterogeneous cluster networks based on reinforcement learning. - Dharminder Chaudhary, M. S. P. Durgarao, Dheerendra Mishra, Saru Kumari:
A module lattice based construction of post quantum secure blockchain architecture. - Karan Belsare, Manwinder Singh, Anudeep Gandam, Praveen Kumar Malik, Ritu Agarwal, Anita Gehlot:
An integrated approach of IoT and WSN using wavelet transform and machine learning for the solid waste image classification in smart cities. - Mubeen Aslam, Lukman bin A. B. Rahim, Junzo Watada, Saddaf Rubab, Muhammad Attique Khan, Salman A. AlQahtani, Thippa Reddy Gadekallu:
Cloud migration framework clustering method for social decision support in modernizing the legacy system. - Binita Kumari, Ajay Kumar Yadav, Korhan Cengiz, Bashir Salah:
Integrating CLDs and machine learning through hybridization for human-centric wireless networks. - Tippireddy Srinivasa Reddy, Rajeev Arya:
Vortex-induced vibration effects in underwater acoustic wireless sensor networks. - Timothy Malche, Priti Maheshwary, Pradeep Kumar Tiwari, Ahmed Hussein Alkhayyat, Abhinav Bansal, Raghvendra Kumar:
Efficient solid waste inspection through drone-based aerial imagery and TinyML vision model. - Vishal Sharma, Rohit Beniwal, Vinod Kumar:
Towards secure IoT system from a smart city perspective: An optimized algorithm and implementation. - Anichur Rahman, Md. Saikat Islam Khan, Antonio Montieri, Md. Jahidul Islam, Md. Razaul Karim, Mahedi Hasan, Dipanjali Kundu, Mostofa Kamal Nasir, Antonio Pescapè:
BlockSD-5GNet: Enhancing security of 5G network through blockchain-SDN with ML-based bandwidth prediction.
Volume 35, Number 5, May 2024
RESEARCH ARTICLES
- Saravanan Selvaraj, Manikandan Nanjappan, Mythili Nagalingam, Uma Maheswari Balasubramanian:
Crossover Boosted Grey Wolf Optimizer-based framework for leader election and resource allocation in Intrusion Detection Systems for MANETs.
ERRATUM
- Correction to "Multi-objective metaheuristic optimization-based clustering with network slicing technique for internet of things-enabled wireless sensor networks in 5G systems".
RESEARCH ARTICLES
- D. Gokulakrishan, R. Ramakrishnan, G. Saritha, B. Sreedevi:
An advancing method for web service reliability and scalability using ResNet convolution neural network optimized with Zebra Optimization Algorithm. - Divya Babu, Terli Sankara Rao:
A secure routing protocol using trust-based clustering and bionic intelligence algorithm for UAV-assisted vehicular ad hoc networks. - Rezvan Salimi, Sadoon Azizi, Jemal H. Abawajy:
A greedy randomized adaptive search procedure for scheduling IoT tasks in virtualized fog-cloud computing. - Yuning Cui, Yonghui Huang, Yongbing Bai, Yuchen Wang, Chao Wang:
Sensitive data identification for multi-category and multi-scenario data. - Munkenyi Mukhandi, Eduardo Andrade, Jorge Granjal, João P. Vilela:
Enhanced authentication and device integrity protection for GDOI using blockchain. - C. T. Kalaivani, R. Renugadevi, Jeffin Gracewell, A. Arul Edwin Raj:
Reinforcement learning based blockchain model for revoking unauthorized access in Virtualized Network Functions-based Internet of Things Mobile Edge Computing. - Xiaolong Zhuang, Yonghong Chen, Hui Tian:
A generalized detection framework for covert timing channels based on perceptual hashing.
Volume 35, Number 6, June 2024
RESEARCH ARTICLES
- K. V. Suresh Kumar, D. Madhavi:
RCVM-ASS-CICSKA-PAPT-VDF: VLSI design of high-speed reconfigurable compressed Vedic PAPT-VDF filter for ECG medical application. - Zahra Amiri, Arash Heidari, Mohammad Zavvar, Nima Jafari Navimipour, Mansour Esmaeilpour:
The applications of nature-inspired algorithms in Internet of Things-based healthcare service: A systematic literature review. - Nafei Zhu, Wenhui Li, Shijia Pan, Shuting Jin, Jingsha He:
Modeling the dissemination of privacy information in online social networks. - Ling Yin, Guang Zeng, Qingwen Long:
Signal points allocation for generalized enhanced spatial modulation. - Ahmed Abd Saeed, Mohamad A. Ahmed:
Algorithms and throughput analysis of cognitive radio-based MIMO-NOMA for the next generation of wireless communications. - Abdalla Hadabi, Zheng Qu, Rashad Elhabob, Sachin Kumar, Saru Kumari, Hu Xiong:
Efficient plaintext checkable identity-based signcryption in cyber-physical systems towards IIoT.
SURVEY ARTICLES
- Swati Goel:
A systematic literature review on past attack analysis on industrial control systems.
RESEARCH ARTICLES
- Ghani Ur Rehman, Muhammad Inam Ul Haq, Afzal Badshah, Muhammad Zubair, Amil Daraz, Salman A. AlQahtani, Atif M. Alamri:
Reliable community card system for detecting and isolating selfish vehicles in smart and connected communities-based VDTN's. - Zeena N. Al-kateeb, Dhuha Basheer Abdullah:
AdaBoost-powered cloud of things framework for low-latency, energy-efficient chronic kidney disease prediction. - Volkan Özduran, Nikolaos Nomikos, Imran Shafique Ansari:
Achievable secrecy rate analysis of OFDM-based multi-user untrusted relay networks with imperfect CSI.
Volume 35, Number 7, July 2024
RESEARCH ARTICLES
- Reyhaneh Ameri, Mohammad Reza Meybodi:
Cognitive blockchain and its application to optimize performance in blockchain systems. - Jun Wu, Mingyuan Dai, Xuyang Teng, Chao Wu, Meilin He, Haoyu Liang, Hao Chen, Ye Jin, Weiwei Cao:
Less sample-cooperative spectrum sensing against large-scale Byzantine attack in cognitive wireless sensor networks. - Muhammad Ilyas Khattak, Hui Yuan, Ayaz Ahmad, Manzoor Ahmed, Ajmal Khan, Inamullah:
PAM: Predictive analytics and modules-based computation offloading framework using greedy heuristics and 5G NR-V2X. - Haroun Bouchemoukha, Mohamed Nadjib Zennir, Ahmed Alioua:
A spatial-temporal graph gated transformer for traffic forecasting. - Sanket N. Dessai, Hemant Patidar:
Hardware software SoC co-design analysis and implementation of MIMO-OFDM for 4G/5G/6G eNodeB applications. - Meignanamoorthi Dhandapani, V. Vetriselvi:
DRL-based customised resource allocation for sub-slices in 6G network slicing. - Hema Shekhawat, Daya Sagar Gupta:
Quantum-safe Lattice-based mutual authentication and key-exchange scheme for the smart grid. - Ke Li, Xiaoming He, Yinqiu Liu, Meng Chen:
Multi-graph representation spatio-temporal attention networks for traffic forecasting in the cinematic metaverse.
RESEARCH ARTICLE
- A. Shali, Ambayiram Chinnasamy, PrabathKumar Selvakumari:
Development of novel intrusion detection in Internet of Things using improved dart game optimizer-derived optimal cascaded ensemble learning. - Laith Abualigah, Ahmad MohdAziz Hussein, Mohammad H. Almomani, Raed Abu Zitar, Mohammad Sh. Daoud, Hazem Migdady, Ahmed Ibrahim Alzahrani, Ayed Alwadain:
GIJA:Enhanced geyser-inspired Jaya algorithm for task scheduling optimization in cloud computing.
RESEARCH ARTICLES
- S. Vasudevan, S. Lenty Stuwart:
Identical code-data cyclic shift transmission for time-dispersive channel.
RESEARCH ARTICLE
- Anuradha Muthukrishnan, Jean Justus John, Kaliyaperumal Vijayalakshmi, J. K. Periasamy:
HRF-ExGB: Hybrid random forest-extreme gradient boosting for mobile edge computing.
Volume 35, Number 8, August 2024
Research Article
- Zhen-Xing Sun, Jin-Bin Qian, Miao Liu, Chun-Ping Nan, Guo-Hui Sha:
Interference management of cognitive IoT based on interference steering and alignment. - Jun Wu, Mingkun Su, Jianrong Bao, Lei Qiao, Xiaorong Xu, Hao Wang, Gefei Zhu, Weiwei Cao:
Sequential detection with feedback information for two-way cooperative spectrum sensing in cognitive internet of things. - Bharathi Shantha Loganathan, Sathya Priya Jaganathan:
Secure and efficient device-to-device communication in IoT: The DMBSOA-enhanced MQTT protocol. - Mehrdad Momen-Tayefeh, Ali Olfat:
Optimizing hybrid beamforming in millimeter-wave massive multiple-input multiple-output systems: A gradient projection approach.
Erratum
- Correction to "PAM: Predictive analytics and modules-based computation offloading framework using greedy heuristics and 5G NR-V2X".
Research Article
- Heling Jiang, Hai Xia, Mansoureh Zare:
Dynamic service function chain placement in mobile computing: An asynchronous advantage actor-critic based approach.
Volume 35, Number 9, September 2024
Research Article
- Ram Ji, Devanand Padha, Yashwant Singh, Surbhi Sharma:
Review of intrusion detection system in cyber-physical system based networks: Characteristics, industrial protocols, attacks, data sets and challenges. - Georg Thamer Francis, Alireza Souri, Nihat Inanç:
A hybrid intrusion detection approach based on message queuing telemetry transport (MQTT) protocol in industrial internet of things. - Xueda Huang, Kuanlei Zheng, Sisi Chen, Zhaoren He:
Construction of switch information security protection system based on software-defined networking. - Ridha Ilyas Bendjillali, Mohammed Sofiane Bendelhoum, Ali Abderrazak Tadjeddine, Miloud Kamline:
Enhancing 5G massive MIMO systems with EfficientNet-B7-powered deep learning-driven beamforming. - Maryam Nooraei Abadeh:
A semantic axiomatic design for integrity in IoT. - Shuhong Kuang, Jiyong Zhang, Amin Mohajer:
Reliable information delivery and dynamic link utilization in MANET cloud using deep reinforcement learning. - Vishnu Sakthi D, P. Ezhumalai:
RF-GCN: Residual fused-graph convolutional network using multimodalities for facial emotion recognition. - Saeed Ullah Jan, Anwar Ghani, Abdulrahman Alzahrani, Muhammad Usman Tariq, Fahad Algarni, Syed Husnain Abbas Naqvi:
SKALP: Secure key agreement and lightweight protocol for dew-assisted IoT enabled edge computing.
Volume 35, Number 10, October 2024
Research Article
- Atul Kumar Agnihotri, Vishal Awasthi:
Delay sensitive and energy adaptive clustering hierarchy protocol using enhanced agglomerative hierarchy algorithm with time-controlled jellyfish optimization. - Song Han, Aijia Li, Xiaotong Jiang, Xinbin Li, Zhixin Liu, Lei Yan, Tongwei Zhang:
Robust joint multiple resources allocation algorithm for cooperative underwater acoustic communication networks. - Jianhong Zhang, Xinyan Cui:
LBCSC: Lattice-based chameleon signcryption scheme for secure and privacy-preserving vehicular communications.
Survey Article
- Hadjer Messabih, Chaker Abdelaziz Kerrache, Youssra Cheriguene, Marica Amadeo, Farhan Ahmad:
Machine learning solutions for mobile internet of things security: A literature review and research agenda.
Research Article
- Arif Husen, Muhammad Hasanain Chaudary, Farooq Ahmad, Abid Sohail:
Holistic learning and optimization scheme for wireless networks.
Retraction
- RETRACTION: Design and Implementation of Network-on-chip Router Using Multi-priority Based Iterative Round-robin Matching With Slip.
- RETRACTION: Dynamic Flow Scheduling Optimization Based on Intelligent Control for Digital Twins.
- RETRACTION: Affirmative Data Analytics Based Data Processing Method for 6G Wireless Network Applications.
- RETRACTION: A Lightweight Access Management Scheme for the Internet of Things Based Smart Applications.
- RETRACTION: Medical Data Quality Management Using Butterfly Optimization With Adaptive Threshold Sensitive Energy-efficient Routing Protocol and Multidimensional Chaotic Blowfish Encryption in Wireless Body Networks.
- RETRACTION: Multi-objective Metaheuristic Optimization-based Clustering With Network Slicing Technique for Internet of Things-enabled Wireless Sensor Networks in 5G Systems.
- RETRACTION: Data Location Integration With Stable Routing: Stable and Optimal Data Transmission in Wireless Sensor Networks.
- RETRACTION: Improving Mobile Cloud Computing Service Efficiency Using Energy Competent and Federated Learning Process.
- RETRACTION: Wireless Communication Channel Modeling Using Machine Learning.
- RETRACTION: Artificial Intelligence Framework-based Ultra-lightweight Communication Protocol for Prediction of Attacks in Internet of Things Environment.
- RETRACTION: Activation-based Recurrent Learning Method for Wearable Sensor Data Processing in Human Activity Recognition.
- RETRACTION: Internet of Things Security Framework Based on Near Field Communication With Otway Rees Protocol.
- RETRACTION: Workflow Task Scheduling for Homogeneous Environments on Multiprocessing Based on IoT Variant of Beta Artificial Bee Colony.
This Article has been retracted
- (Withdrawn) RETRACTED: Design and implementation of network-on-chip router using multi-priority based iterative round-robin matching with slip.
- (Withdrawn) Dynamic flow scheduling optimization based on intelligent control for digital twins.
- (Withdrawn) RETRACTED: Affirmative data analytics based data processing method for 6G wireless network applications.
- (Withdrawn) RETRACTED: A lightweight access management scheme for the internet of things based smart applications.
- (Withdrawn) RETRACTED: Medical data quality management using butterfly optimization with adaptive threshold sensitive energy-efficient routing protocol and multidimensional chaotic blowfish encryption in wireless body networks.
- (Withdrawn) RETRACTED: Data location integration with stable routing: Stable and optimal data transmission in wireless sensor networks.
- (Withdrawn) RETRACTED: Wireless communication channel modeling using machine learning.
- (Withdrawn) RETRACTED: Activation-based recurrent learning method for wearable sensor data processing in human activity recognition.
- (Withdrawn) RETRACTED: Internet of Things security framework based on near field communication with Otway Rees protocol.
- (Withdrawn) RETRACTED: Workflow task scheduling for homogeneous environments on multiprocessing based on IoT variant of beta artificial bee colony.
Research Article
- Zahra Seyedi, Farhad Rahmati, Mohammad Ali:
A practical vehicular-fog-based privacy-preserving attribute-based keyword search system using potential games. - Raj Mohan Singh, Geeta Sikka, Lalit Kumar Awasthi:
Energy Conscious Squirrel Search based Task Scheduling Mechanism in Fog Environment.
Volume 35, Number 11, November 2024
Survey Article
- Monika, Rajesh Bhatia, Manish Kumar:
An extensive multivocal literature review of blockchain technology: Evolution, challenges, platforms, security, and interoperability. - Mehdi Asadi, Mohammad Ali Jabraeil Jamali, Arash Heidari, Nima Jafari Navimipour:
Botnets Unveiled: A Comprehensive Survey on Evolving Threats and Defense Strategies.
Research Article
- Hadj Abdelkader Benzater, Djamal Teguig, Nacerredine Lassami:
Enhanced Cooperative Compressive Spectrum Sensing in Cognitive Radio Networks. - Arun Raj, Durbadal Mandal:
Design and Analysis of Sierpinski Fractal Antennas for Millimeter-Wave 5G and Ground-Based Radio Navigation Applications. - Rekha Rani, Natarajan Jayanthi, Anup K. Mandpura:
Performance Analysis of Free Space Optical System Over Inverse Gaussian Gamma Turbulence Channel. - Jixian Zhang, Hao Sun, Zhemin Wang, Qian Su, Weidong Li:
A Novel Clinching Auction Mechanism for Edge Computing Resource Allocation With Budget Limits. - Peiying Zhang, Yilin Li, Lizhuang Tan, Kai Liu, Miao Wen, Hao Hao:
Latency-Sensitive Service Function Chains Intelligent Migration in Satellite Communication Driven by Deep Reinforcement Learning. - S. Syed Jamaesha, M. S. Gowtham, M. Ramkumar:
Deep Artificial Immune System With Malicious Node Detection and Secure Routing Protocol in MANET. - Bhupendra Sharma, Anirudh Agarwal, Deepak Mishra, Soumitra Debnath, Santosh Shah:
Optimal Capacitance Design for IRS Aided Wireless Power Transfer for Sustainable IoT Communication. - Qingqing Tu, Zheng Dong, Chenfei Xie, Xianbing Zou, Ning Wei, Ya Li, Fei Xu:
A Deep Reinforcement Learning-Based Physical Layer Security Enhancement Design for RIS-Aided mmWave Communications With Practical Constraints. - K. L. Neela:
DSDOS Cloud: A Decentralized Secure Data Outsourcing System With Hybrid Encryption, Blockchain Smart Contract-Based Access Control, and Hash Authentication Codes for Cloud Security. - Hosein Azarhava, Mehran Pourmohammad Abdollahi, Javad Musevi Niya:
Placement and Power Assignment for Hierarchical UAV Networks Under Hovering Fluctuations in mmWave Communications. - Cloudin Swamynathan, Revathy Shanmugam, Kanagasabapathy Pradeep Mohan Kumar, Balasubramani Subbiyan:
Traffic Prevention and Security Enhancement in VANET Using Deep Learning With Trusted Routing Aided Blockchain Technology. - Zhilin Li, Lei Lei, Gaoqing Shen, Xiaochang Liu, Xiaojiao Liu:
Digital Twin-Enabled Deep Reinforcement Learning for Safety-Guaranteed Flocking Motion of UAV Swarm. - V. Deepa Priya, M. Sundaram:
Blockchain With Hierarchical Auto-Associative Polynomial Convolutional Neural Network Fostered Cryptography for Securing Image. - Sadanand R. Inamdar, L. Sadananda, D. Shyam Prasad:
Hybrid Optimization With Deep Spiking Equilibrium Neural Network for Software Defined Network Based Congestion Prevention Routing. - Changkui Yin, Yingchi Mao, Meng Chen, Yi Rong, Yinqiu Liu, Xiaoming He:
Green Computation Offloading With DRL in Multi-Access Edge Computing. - Dhanalakshmi Ranganayakulu, Nithisha Jesubert Thangaraj, Sathya Priya Shanmugam, Balasubramani Subbiyan:
A Secure and Decentralized Using Blockchain and Ring-Based Cryptosystem. - Y. Roji, K. Jaya Sankar, L. Nirmala Devi:
An Automated Sparse Channel Estimation Framework for MU-MIMO-OFDM System With Adaptive Extreme Learning and Heuristic Mechanism. - W. S. Kiran, Allan Jenose Wilson, Aravindhan Sarojini Radhamani:
Spiking Quantum Fire Hawk Network Based Reliable Scheduling for Lifetime Maximization of Wireless Sensor Network. - Rambabu D, A. Govardhan:
Optimized Data Replication in Cloud Using Hybrid Optimization Approach. - Lixiang Geng, Qinglin Zheng, Chengbao Zhang, Jiao Hou:
Moving Target Detection in Clutter Environment Based on Track Posture Hypothesis Testing. - Haibo Huang, Min Yan, Qiang Yan, Xiaofan Zhang:
Research and Implementation of a Classification Method of Industrial Big Data for Security Management.
Erratum
- Correction to "Optimized LightGBM Model for Security and Privacy Issues in Cyber-Physical Systems".
Volume 35, Number 12, December 2024
Research Article
- Yassine Sabri, Adil Hilmani:
An IoT-Based 5G Wireless Sensor Network Employs a Secure Routing Methodology Leveraging DCNN Processing. - Pejman Goudarzi, Jaime Lloret Mauri:
Soft Actor-Critic Request Redirection for Quality Control in Green Multimedia Content Distribution. - Ayse Betül Büyüksar, Eylem Erdogan, Ibrahim Altunbas:
Secrecy Performance of Full-Duplex Space-Air-Ground Integrated Networks in the Presence of Active/Passive Eavesdropper, and Friendly Jammer. - B. Priya, J. M. Nandhini, S. Uma, K. Anuratha:
DRL-Based Computation-Efficient Offloading and Power Control for UAV-Assisted MEC Networks.
Survey Article
- Higinio Mora, Francisco A. Pujol, Tamai Ramírez-Gordillo, Antonio Jimeno:
Mobile Cloud Computing Paradigm: A Survey of Operational Concerns, Challenges and Open Issues. - Sohail Abbas, Manar Abu Talib, Ibtihal Ahmed, Omar Belal:
Integration of UAVs and FANETs in Disaster Management: A Review on Applications, Challenges and Future Directions.
Research Article
- Yingjie Wu, Shilian Wang, Junshan Luo, Weiyu Chen:
Reconfigurable Intelligent Surface-Aided MIMO Secure Communication System With Finite-Alphabet Inputs. - Krishnakumar Mahendran, Haridoss Sudarsan, Srinivasan Rathika, B. Shankarlal:
Deep Adaptive Learning-Based Beam Combining Framework for 5G Millimeter-Wave Massive 3D-MIMO Uplink Systems.
Erratum
- Correction to A Secure and Decentralized Authentication and Data Transmission in Internet of Vehicles Using Blockchain and Ring-Based Cryptosystem.
Research Article
- Shatakshi Singh, Aditya Trivedi, Divya Saxena:
Channel Estimation for IRS-Aided OTFS System Using Dilated Attention GAN.
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.