


default search action
IEEE Transactions on Network Science and Engineering, Volume 8
Volume 8, Number 1, January - March 2021
- Miklós Z. Rácz
, Jacob Richey
:
Rumor Source Detection With Multiple Observations Under Adaptive Diffusions. 2-12 - Hongwei Du
, Qiang Ye
, Zhipeng Sun, Chuang Liu
, Wen Xu:
FAST-ODT: A Lightweight Outlier Detection Scheme for Categorical Data Sets. 13-24 - Bo Liu, Housheng Su
, Licheng Wu
, Xixi Shen:
Observability of Leader-Based Discrete-Time Multi-Agent Systems Over Signed Networks. 25-39 - Ding Xiang
, Ermin Wei
:
A General Sensitivity Analysis Approach for Demand Response Optimizations. 40-52 - Hongbo Jiang
, Yu Zhang
, Zhu Xiao
, Ping Zhao
, Arun Iyengar
:
An Empirical Study of Travel Behavior Using Private Car Trajectory Data. 53-64 - Yilun Shang
:
Resilient Consensus for Robust Multiplex Networks with Asymmetric Confidence Intervals. 65-74 - Fabien Geyer
, Steffen Bondorf
:
Graph-Based Deep Learning for Fast and Tight Network Calculus Analyses. 75-88 - Yinxin Wan, Kuai Xu
, Feng Wang
, Guoliang Xue
:
Characterizing and Mining Traffic Patterns of IoT Devices in Edge Networks. 89-101 - Shuang Li
, Weiguo Xia
, Xi-Ming Sun
:
Synchronization of Identical Oscillators Under Matrix-Weighted Laplacian With Sampled Data. 102-113 - Magdi Sadek Mahmoud
, Bilal J. Karaki:
Output-Synchronization of Discrete-Time Multiagent Systems: A Cooperative Event-Triggered Dissipative Approach. 114-125 - Xiangli Jiang
, Guihua Xia
, Zhiguang Feng
, Zhengyi Jiang
:
Consensus Tracking of Data-Sampled Nonlinear Multi-Agent Systems With Packet Loss and Communication Delay. 126-137 - Klaus Wehmuth, Artur Ziviani
, Leonardo Chinelate Costa, Ana Paula Couto da Silva
, Alex Borges Vieira
:
You Shall Not Pass: Avoiding Spurious Paths in Shortest-Path Based Centralities in Multidimensional Complex Networks. 138-148 - Qian Xu
, Xiang Yan, Kui Wu
, Jianping Wang
, Kejie Lu
, Weiwei Wu
:
Leveraging Multiplexing Gain in Network Slice Bundles. 149-162 - Jing Wang
, Tingting Ru, Hao Shen
, Jinde Cao
, Ju H. Park
:
Finite-Time $\mathcal {L}_{2}$-$\mathcal {L}_{\infty }$ Synchronization for Semi-Markov Jump Inertial Neural Networks Using Sampled Data. 163-173 - Megan Morrison
, J. Nathan Kutz
:
Nonlinear Control of Networked Dynamical Systems. 174-189 - Jiajun Zhou
, Jie Shen, Shanqing Yu
, Guanrong Chen
, Qi Xuan
:
M-Evolve: Structural-Mapping-Based Data Augmentation for Graph Classification. 190-200 - Yan Ouyang
, Anfeng Liu
, Naixue Xiong
, Tian Wang
:
An Effective Early Message Ahead Join Adaptive Data Aggregation Scheme for Sustainable IoT. 201-219 - Matheus R. F. Mendonça
, André Barreto, Artur Ziviani
:
Approximating Network Centrality Measures Using Node Embedding and Machine Learning. 220-230 - Tong Wu, Pan Zhou
, Binghui Wang
, Ang Li
, Xueming Tang, Zichuan Xu
, Kai Chen
, Xiaofeng Ding
:
Joint Traffic Control and Multi-Channel Reassignment for Core Backbone Network in SDN-IoT: A Multi-Agent Deep Reinforcement Learning Approach. 231-245 - Saiwei Wang
, Xin Jin
, Shuai Mao
, Athanasios V. Vasilakos
, Yang Tang
:
Model-Free Event-Triggered Optimal Consensus Control of Multiple Euler-Lagrange Systems via Reinforcement Learning. 246-258 - Yang Zhai
, Zhi-Wei Liu
, Ming-Feng Ge
, Guanghui Wen
, Xinghuo Yu
, Yuzhen Qin
:
Trusted-Region Subsequence Reduction for Designing Resilient Consensus Algorithms. 259-268 - Youyang Qu
, Shui Yu
, Wanlei Zhou
, Shiping Chen
, Jun Wu:
Customizable Reliable Privacy-Preserving Data Sharing in Cyber-Physical Social Networks. 269-281 - Lucia Valentina Gambuzza
, Mattia Frasca
, Francesco Sorrentino
, Louis M. Pecora
, Stefano Boccaletti:
Controlling Symmetries and Clustered Dynamics of Complex Networks. 282-293 - Yapu Zhang
, Jianxiong Guo
, Wenguo Yang
, Weili Wu
:
Targeted Activation Probability Maximization Problem in Online Social Networks. 294-304 - Zhen Li
, Yang Tang
, Jian-An Fang, Tingwen Huang
:
Formation Control of Multi-Agent Systems With Orientation Noises. 305-317 - Zhihua Xia
, Lan Wang, Jian Tang, Neal N. Xiong
, Jian Weng
:
A Privacy-Preserving Image Retrieval Scheme Using Secure Local Binary Pattern in Cloud Computing. 318-330 - Prasad Vilas Chanekar
, Erfan Nozari
, Jorge Cortés
:
Energy-Transfer Edge Centrality and Its Role in Enhancing Network Controllability. 331-346 - Shaobo Huang
, Zhiwen Zeng
, Kaoru Ota
, Mianxiong Dong
, Tian Wang
, Neal N. Xiong
:
An Intelligent Collaboration Trust Interconnections System for Mobile Information Control in Ubiquitous 5G Networks. 347-365 - Eduardo Viegas
, Altair Olivo Santin
, Vilmar Abreu:
Machine Learning Intrusion Detection in Big Data Era: A Multi-Objective Approach for Longer Model Lifespans. 366-376 - Yang Chen
, Jie Wu
, Rajorshi Biswas:
Grouping Service Chains of Multiple Flows in NFV-Based Networks. 377-388 - Yang Chen
, Jie Wu
:
Flow Scheduling of Service Chain Processing in a NFV-Based Network. 389-399 - Canhui Chen, Xu Chen
, Jiangshan Yu
, Weigang Wu
, Di Wu
:
Impact of Temporary Fork on the Evolution of Mining Pools in Blockchain Networks: An Evolutionary Game Analysis. 400-418 - Pan Zhou
, Yulai Xie
, Ben Niu
, Lingjun Pu
, Zichuan Xu
, Hao Jiang
, Huawei Huang
:
QoE-Aware 3D Video Streaming via Deep Reinforcement Learning in Software Defined Networking Enabled Mobile Edge Computing. 419-433 - Sifat Afroj Moon
, Faryad Darabi Sahneh, Caterina M. Scoglio:
Group-Based General Epidemic Modeling for Spreading Processes on Networks: GroupGEM. 434-446 - Xiao Chen
, Jie Ding
, Zhenyu Lu
, Tianming Zhan
:
An Efficient Formal Modeling Framework for Hybrid Cloud-Fog Systems. 447-462 - Xin Luo
, Zhigang Liu
, Mingsheng Shang
, Jungang Lou
, MengChu Zhou
:
Highly-Accurate Community Detection via Pointwise Mutual Information-Incorporated Symmetric Non-Negative Matrix Factorization. 463-476 - Xingjian Ding
, Jianxiong Guo
, Deying Li
, Weili Wu
:
An Incentive Mechanism for Building a Secure Blockchain-Based Internet of Things. 477-487 - Meirong Zhang
, Ali Saberi
, Anton A. Stoorvogel
:
Semi-Global State Synchronization for Multi-Agent Systems Subject to Actuator Saturation and Unknown Nonuniform Input Delay. 488-497 - Ze Tang
, Deli Xuan, Ju H. Park
, Yan Wang
, Jianwen Feng
:
Impulsive Effects Based Distributed Synchronization of Heterogeneous Coupled Neural Networks. 498-510 - Liangtian Wan
, Feng Xia
, Xiangjie Kong
, Ching-Hsien Hsu
, Runhe Huang
, Jianhua Ma:
Deep Matrix Factorization for Trust-Aware Recommendation in Social Networks. 511-528 - Yuxin Mao
, Lujie Zhou, Naixue Xiong
:
TPS: A Topological Potential Scheme to Predict Influential Network Nodes for Intelligent Communication in Social Networks. 529-540 - Yu Wang
, Chengzhe Piao
, Chi Harold Liu
, Chijin Zhou
, Jian Tang
:
Modeling User Interests With Online Social Network Influence by Memory Augmented Sequence Learning. 541-554 - Pan Lai
, Costas Courcoubetis
, Lingjie Duan
, Stefano Galelli
:
Economic Controls for Smart Water Distribution Networks Undergoing Supply Failures. 555-574 - Chunyu Wu
, Xudong Zhao
:
Quantized Dynamic Output Feedback Control and $L_2$-Gain Analysis for Networked Control Systems: A Hybrid Approach. 575-587 - Song Li
, Weibin Sun
, Yanjing Sun
, Yu Huo
:
Energy-Efficient Task Offloading Using Dynamic Voltage Scaling in Mobile Edge Computing. 588-598 - Shuwen Yi
, Hao Jiang
, Ying Jiang
, Pan Zhou
, Qiang Wang
:
A Hyperbolic Embedding Method for Weighted Networks. 599-612 - Xin Gong
, Yukang Cui
, Jun Shen
, Zhan Shu
, Tingwen Huang
:
Distributed Prescribed-Time Interval Bipartite Consensus of Multi-Agent Systems on Directed Graphs: Theory and Experiment. 613-624 - Yiming Miao
, Yixue Hao
, Min Chen
, Hamid Gharavi
, Kai Hwang:
Intelligent Task Caching in Edge Cloud via Bandit Learning. 625-637 - Xiaoping Wu
, Hengnian Qi, Naixue Xiong
:
Rank-One Semidefinite Programming Solutions for Mobile Source Localization in Sensor Networks. 638-650 - Yang Chen
, Jie Wu
:
Latency-Efficient VNF Deployment and Path Routing for Reliable Service Chain. 651-661 - Reza Entezari-Maleki
, Mohammed Gharib
, Shahbaz Rezaei
, Kishor S. Trivedi
, Ali Movaghar
:
Modeling and Evaluation of Multi-Hop Wireless Networks Using SRNs. 662-679 - Junxiao Wang
, Heng Qi
, Wenxin Li
, Keqiu Li, Steve Uhlig
, Yuxin Wang
:
Dynamic SDN Control Plane Request Assignment in NFV Datacenters. 680-694 - Zhongying Zhao
, Hui Zhou
, Liang Qi, Liang Chang
, MengChu Zhou
:
Inductive Representation Learning via CNN for Partially-Unseen Attributed Networks. 695-706 - Thomas Magelinski
, Mihovil Bartulovic, Kathleen M. Carley
:
Measuring Node Contribution to Community Structure With Modularity Vitality. 707-723 - Saeideh Gholamrezazadeh Motlagh
, Jelena V. Misic
, Vojislav B. Misic
:
The Impact of Selfish Mining on Bitcoin Network Performance. 724-735 - Deqiang Li
, Qianmu Li
, Yanfang Ye
, Shouhuai Xu
:
A Framework for Enhancing Deep Neural Networks Against Adversarial Malware. 736-750 - Abdullah Aydeger
, Mohammad Hossein Manshaei, Mohammad Ashiqur Rahman
, Kemal Akkaya
:
Strategic Defense Against Stealthy Link Flooding Attacks: A Signaling Game Approach. 751-764 - Xu Wang
, Randall A. Berry
:
Market Competition Between LTE-U and WiFi. 765-779 - Ruoyu Wei
, Jinde Cao
, Jürgen Kurths:
Fixed-Time Output Synchronization of Coupled Reaction-Diffusion Neural Networks With Delayed Output Couplings. 780-789 - Jin-Liang Wang
, Lin-Hao Zhao
:
PD and PI Control for Passivity and Synchronization of Coupled Neural Networks With Multi-Weights. 790-802 - Evgenia Christoforou
, Alessandro Nordio
, Alberto Tarable
, Emilio Leonardi
:
Ranking a Set of Objects: A Graph Based Least-Square Approach. 803-813 - Cong Li
, Yuan Zhang, Xiang Li
:
Epidemic Threshold in Temporal Multiplex Networks With Individual Layer Preference. 814-824
Volume 8, Number 2, April - June 2021
- Jianwei Huang:
Message From the Editor-in-Chief. 825 - Yingshu Li, Mihaela Cardei, Chaokun Wang, Anton Umek:
Guest Editorial Introduction to the Special Section on Artificial Intelligence For Social Networks. 826-827 - Yinxue Yi
, Zufan Zhang
, Laurence T. Yang
, Chenquan Gan, Xianjun Deng
, Lingzhi Yi
:
Reemergence Modeling of Intelligent Information Diffusion in Heterogeneous Social Networks: The Dynamics Perspective. 828-840 - Yuan Yuan, Feng Li
, Dongxiao Yu
, Jichao Zhao, Jiguo Yu
, Xiuzhen Cheng
:
Distributed Social Learning With Imperfect Information. 841-852 - Xiao Liu
, Houbing Song
, Anfeng Liu:
Intelligent UAVs Trajectory Optimization From Space-Time for Data Collection in Social Networks. 853-864 - Ting Li, Zhijin Qiu
, Lijuan Cao, Dazhao Cheng
, Weichao Wang, Xinghua Shi, Yu Wang
:
Privacy-Preserving Participant Grouping for Mobile Social Sensing Over Edge Clouds. 865-880 - Jian Mao
, Yitong Yang, Tianchen Zhang:
Empirical Analysis of Attribute Inference Techniques in Online Social Network. 881-893 - Xiaokang Zhou
, Wei Liang
, Zijia Luo, Yi Pan
:
Periodic-Aware Intelligent Prediction Model for Information Diffusion in Social Networks. 894-904 - Xiaojiang Du, Willy Susilo
, Mohsen Guizani
, Zhihong Tian:
Introduction to the Special Section on Artificial Intelligence Security: Adversarial Attack and Defense. 905-907 - SeokHwan Choi
, Jin-Myeong Shin
, Peng Liu
, Yoon-Ho Choi
:
EEJE: Two-Step Input Transformation for Robust DNN Against Adversarial Examples. 908-920 - Zhaoquan Gu
, Weixiong Hu
, Chuanjing Zhang
, Hui Lu
, Lihua Yin, Le Wang
:
Gradient Shielding: Towards Understanding Vulnerability of Deep Neural Networks. 921-932 - Jianmin Guo, Yue Zhao, Houbing Song
, Yu Jiang
:
Coverage Guided Differential Adversarial Testing of Deep Learning Systems. 933-942 - Xiangyu Ma
, Wei Shi
:
AESMOTE: Adversarial Reinforcement Learning With SMOTE for Anomaly Detection. 943-956 - Zikai Zhang
, Yidong Li
, Hairong Dong
, Honghao Gao
, Yi Jin
, Wei Wang
:
Spectral-Based Directed Graph Network for Malware Detection. 957-970 - Chao Pei, Yang Xiao
, Wei Liang
, Xiaojia Han
:
Detecting False Data Injection Attacks Using Canonical Variate Analysis in Power Grid. 971-983 - Huijuan Zhu
, Yang Li, Ruidong Li
, Jianqiang Li
, Zhuhong You
, Houbing Song
:
SEDMDroid: An Enhanced Stacking Ensemble Framework for Android Malware Detection. 984-994 - Zhuoqun Xia, Jingjing Tan
, Ke Gu
, Xiong Li
, Weijia Jia:
IDS Intelligent Configuration Scheme Against Advanced Adaptive Attacks. 995-1008 - Rabeya Bosri, Mohammad Shahriar Rahman
, Md. Zakirul Alam Bhuiyan
, Abdullah Al Omar
:
Integrating Blockchain With Artificial Intelligence for Privacy-Preserving Recommender Systems. 1009-1018 - Huilin Li, Yannan Li
, Yong Yu
, Baocang Wang
, Kefei Chen
:
A Blockchain-Based Traceable Self-Tallying E-Voting Protocol in AI Era. 1019-1032 - Ronald Doku
, Danda B. Rawat
, Chunmei Liu:
On the Blockchain-Based Decentralized Data Sharing for Event Based Encryption to Combat Adversarial Attacks. 1033-1043 - Shivani Bharatbhai Patel, Pronaya Bhattacharya
, Sudeep Tanwar
, Neeraj Kumar
:
KiRTi: A Blockchain-Based Credit Recommender System for Financial Institutions. 1044-1054 - Yuntao Wang
, Zhou Su
, Ning Zhang
, Abderrahim Benslimane
:
Learning in the Air: Secure Federated Learning for UAV-Assisted Crowdsensing. 1055-1069 - Zheyi Chen, Pu Tian
, Weixian Liao
, Wei Yu
:
Zero Knowledge Clustering Based Adversarial Mitigation in Heterogeneous Federated Learning. 1070-1083 - Hongwei Yang
, Hui He, Weizhe Zhang
, Xiaochun Cao
:
FedSteg: A Federated Transfer Learning Framework for Secure Image Steganalysis. 1084-1094 - Peiying Zhang
, Chao Wang, Chunxiao Jiang
, Abderrahim Benslimane
:
Security-Aware Virtual Network Embedding Algorithm Based on Reinforcement Learning. 1095-1105 - Xinyu Yin, Xiaojie Fang
, Ning Zhang
, Peng Yang
, Xuejun Sha
, Jinghui Qiu:
Online Learning Aided Adaptive Multiple Attribute-Based Physical Layer Authentication in Dynamic Environments. 1106-1116 - Yulei Wu, Zheng Yan, Ruppa K. Thulasiram, Mohammed Atiquzzaman:
Guest Editorial Introduction to the Special Section on Blockchain in Future Networks and Vertical Industries. 1117-1119 - Abbas Yazdinejad, Reza M. Parizi
, Ali Dehghantanha
, Kim-Kwang Raymond Choo
:
Blockchain-Enabled Authentication Handover With Efficient Privacy Protection in SDN-Based 5G Networks. 1120-1132 - Wei Wang
, Jingjing Song
, Guangquan Xu
, Yidong Li
, Hao Wang
, Chunhua Su
:
ContractWard: Automated Vulnerability Detection Models for Ethereum Smart Contracts. 1133-1144 - Lianyong Qi
, Xiaokang Wang
, Xiaolong Xu
, Wanchun Dou
, Shancang Li
:
Privacy-Aware Cross-Platform Service Recommendation Based on Enhanced Locality-Sensitive Hashing. 1145-1153 - Li-e Wang
, Yan Bai
, Quan Jiang, Victor C. M. Leung
, Wei Cai
, Xianxian Li
:
Beh-Raft-Chain: A Behavior-Based Fast Blockchain Protocol for Complex Networks. 1154-1166 - Shuming Seng
, Changqing Luo
, Xi Li
, Heli Zhang
, Hong Ji
:
User Matching on Blockchain for Computation Offloading in Ultra-Dense Wireless Networks. 1167-1177 - Hao Yin
, Zijian Zhang
, Liehuang Zhu
, Meng Li
, Xiaojiang Du
, Mohsen Guizani
, Bakh Khoussainov:
A Blockchain-Based Storage System With Financial Incentives for Load-balancing. 1178-1188 - Siming Wang
, Dongdong Ye
, Xumin Huang
, Rong Yu
, Yongjian Wang, Yan Zhang
:
Consortium Blockchain for Secure Resource Sharing in Vehicular Edge Computing: A Contract-Based Approach. 1189-1201 - Yang Xu
, Cheng Zhang
, Quanrun Zeng, Guojun Wang
, Ju Ren
, Yaoxue Zhang
:
Blockchain-Enabled Accountability Mechanism Against Information Leakage in Vertical Industry Services. 1202-1213 - Mohamed Baza, Noureddine Lasla, Mohamed M. E. A. Mahmoud, Gautam Srivastava, Mohamed Abdallah:
B-Ride: Ride Sharing With Privacy-Preservation, Trust and Fair Payment Atop Public Blockchain. 1214-1229 - Yan Wu, Fang Tao, Lu Liu
, Jiayan Gu, John Panneerselvam
, Rongbo Zhu
, Mohammad Nasir Shahzad
:
A Bitcoin Transaction Network Analytic Method for Future Blockchain Forensic Investigation. 1230-1241 - Pronaya Bhattacharya
, Sudeep Tanwar
, Umesh Bodkhe, Sudhanshu Tyagi, Neeraj Kumar
:
BinDaaS: Blockchain-Based Deep-Learning as-a-Service in Healthcare 4.0 Applications. 1242-1255 - Andrea Tagarelli, Sabrina Gaito, Roberto Interdonato, Tsuyoshi Murata, Alessandra Sala, My T. Thai:
Guest Editorial Introduction to the Special Section on Reloading Feature-Rich Information Networks. 1256-1258 - Nathaniel Hudson
, Hana Khamfroush
:
Behavioral Information Diffusion for Opinion Maximization in Online Social Networks. 1259-1268 - Konstantinos Tsitseklis
, Maria Krommyda
, Vasileios Karyotis
, Verena Kantere, Symeon Papavassiliou
:
Scalable Community Detection for Complex Data Graphs via Hyperbolic Network Embedding and Graph Databases. 1269-1282 - Giorgia Minello
, Luca Rossi
, Andrea Torsello:
k-Anonymity on Graphs Using the Szemerédi Regularity Lemma. 1283-1292 - Cheng-Lung Chen
, Qipeng P. Zheng
, Alexander Veremyev
, Eduardo L. Pasiliao
, Vladimir Boginski
:
Failure Mitigation and Restoration in Interdependent Networks via Mixed-Integer Optimization. 1293-1304 - Çiçek Güven, Dietmar Seipel, Martin Atzmueller
:
Applying ASP for Knowledge-Based Link Prediction With Explanation Generation in Feature-Rich Networks. 1305-1315 - Su Gao
, Zhigeng Fang:
Multilayer Feature-Rich Satellite Network Analysis: An Application-Oriented and Time-Evolving Approach. 1316-1327 - Ilaria Bordino, Francesco Gullo
, Giacomo Legnaro:
Advancing Receivable Financing via a Network-Based Approach. 1328-1337 - Jon Crowcroft
, Damiano Di Francesco Maesa
, Alessandro Magrini
, Andrea Marino, Laura Ricci
:
Leveraging the Users Graph and Trustful Transactions for the Analysis of Bitcoin Price. 1338-1352 - Huazhong Liu
, Laurence T. Yang
, Tong Yao, Jihong Ding
, Anyuan Deng
:
Tensor-Train-Based Higher Order Dominant Z-Eigen Decomposition for Multi-Modal Prediction and Its Cloud/Edge Implementation. 1353-1366 - Jacob D. Moorman
, Thomas K. Tu
, Qinyi Chen
, Xie He
, Andrea L. Bertozzi
:
Subgraph Matching on Multiplex Networks. 1367-1384 - Youqi Li
, Fan Li
, Song Yang
, Pan Zhou
, Liehuang Zhu
, Yu Wang
:
Three-Stage Stackelberg Long-Term Incentive Mechanism and Monetization for Mobile Crowdsensing: An Online Learning Approach. 1385-1398 - Kun Xie
, Shuyu Pei, Xin Wang
, Wen Shi, Gaogang Xie
, Kenli Li
, Yanbiao Li, Jigang Wen:
A Stateful Bloom Filter for Per-Flow State Monitoring. 1399-1413 - Yuqiang Luo
, Zidong Wang
, Yun Chen
, Xiao-jian Yi
:
$H_{\infty }$ State Estimation for Coupled Stochastic Complex Networks With Periodical Communication Protocol and Intermittent Nonlinearity Switching. 1414-1425 - Krzysztof Turowski, Jithin K. Sreedharan
, Wojciech Szpankowski:
Temporal Ordered Clustering in Dynamic Networks: Unsupervised and Semi-Supervised Learning Algorithms. 1426-1442 - Huaying Wu, Luoyi Fu
, Huan Long, Guie Meng, Xiaoying Gan
, Yuanhao Wu, Haisong Zhang, Xinbing Wang
:
Unraveling the Detectability of Stochastic Block Model With Overlapping Communities. 1443-1455 - Abdul Rehman Javed
, Saif ur Rehman
, Mohib Ullah Khan
, Mamoun Alazab
, Thippa Reddy Gadekallu
:
CANintelliIDS: Detecting In-Vehicle Intrusion Attacks on a Controller Area Network Using CNN and Attention-Based GRU. 1456-1466 - Rajorshi Biswas
, Jie Wu
:
Traffic Engineering to Minimize the Number of Rules in SDN Datacenters. 1467-1477 - Mingcheng He, Cunqing Hua
, Wenchao Xu
, Pengwenlong Gu
, Xuemin Sherman Shen
:
Delay Optimal Concurrent Transmissions With Raptor Codes in Dual Connectivity Networks. 1478-1491 - Zhirong Shen
, Changle Wu, Lin Wang
, Guanglin Zhang
:
Real-Time Energy Management for Microgrid With EV Station and CHP Generation. 1492-1501 - Liping Zhang
, Zhen Wei, Wei Ren
, Xianghan Zheng, Kim-Kwang Raymond Choo
, Neal N. Xiong
:
SIP: An Efficient and Secure Information Propagation Scheme in E-Health Networks. 1502-1516 - Saber Jafarizadeh
, Darryl Veitch
, Farzad Tofigh, Justin Lipman
, Mehran Abolhasan
:
Optimal Synchronizability in Networks of Coupled Systems: Topological View. 1517-1530 - Duxin Chen
, Xiaolu Liu
, Wenwu Yu, Lei Zhu
, Qipeng Tang
:
Neural-Network Based Adaptive Self-Triggered Consensus of Nonlinear Multi-Agent Systems With Sensor Saturation. 1531-1541 - Bo Yin
, Jun Lu, Xuetao Wei
:
Correlation-Based Task Processing Plans in Crowdsensing Platforms. 1542-1556 - Lei Zhang
, Yutong Liu, Fan Cheng, Jianfeng Qiu, Xingyi Zhang
:
A Local-Global Influence Indicator Based Constrained Evolutionary Algorithm for Budgeted Influence Maximization in Social Networks. 1557-1570 - Shen Yan
, Zhou Gu
, Ju H. Park
:
Memory-Event-Triggered $H_{\infty }$ Load Frequency Control of Multi-Area Power Systems With Cyber-Attacks and Communication Delays. 1571-1583 - Xin Cong, Lingling Zi
, Ding-Zhu Du:
DTNB: A Blockchain Transaction Framework With Discrete Token Negotiation for the Delay Tolerant Network. 1584-1599 - Guangmo Tong
, Ruiqi Wang, Zheng Dong
:
On Multi-Cascade Influence Maximization: Model, Hardness and Algorithmic Framework. 1600-1613 - Neda Zarayeneh
, Ananth Kalyanaraman
:
Delta-Screening: A Fast and Efficient Technique to Update Communities in Dynamic Graphs. 1614-1629 - Zhenzhen Hu, Fanzi Zeng, Zhu Xiao
, Bin Fu, Hongbo Jiang
, Hongyang Chen
:
Computation Efficiency Maximization and QoE-Provisioning in UAV-Enabled MEC Communication Systems. 1630-1645 - Can Chen
, Amit Surana, Anthony M. Bloch
, Indika Rajapakse
:
Controllability of Hypergraphs. 1646-1657 - Haiyang Yu
, Qi Hu, Zhen Yang
, Huan Liu
:
Efficient Continuous Big Data Integrity Checking for Decentralized Storage. 1658-1673 - Zecheng Li, Shang Gao
, Zhe Peng
, Songtao Guo
, Yuanyuan Yang
, Bin Xiao
:
B-DNS: A Secure and Efficient DNS Based on the Blockchain Technology. 1674-1686 - Ehsan Tohidi
, Saeedeh Parsaeefard
, Mohammad Ali Maddah-Ali, Babak Hossein Khalaj
, Alberto Leon-Garcia
:
Near-Optimal Robust Virtual Controller Placement in 5G Software Defined Networks. 1687-1697 - Abba Garba, Zhong Chen, Zhi Guan, Gautam Srivastava
:
LightLedger: A Novel Blockchain-Based Domain Certificate Authentication and Validation Scheme. 1698-1710 - Renato Vizuete
, Federica Garin
, Paolo Frasca
:
The Laplacian Spectrum of Large Graphs Sampled From Graphons. 1711-1721 - Aleksandar Haber
:
Joint Sensor Node Selection and State Estimation for Nonlinear Networks and Systems. 1722-1732 - Yanan Zhu
, Guanghui Wen
, Wenwu Yu
, Xinghuo Yu
:
Continuous-Time Distributed Proximal Gradient Algorithms for Nonsmooth Resource Allocation Over General Digraphs. 1733-1744 - Cho-Chun Chiu
, Ting He
:
Stealthy DGoS Attack Against Network Tomography: The Role of Active Measurements. 1745-1758 - Walid Ahmad
, Mason A. Porter
, Mariano Beguerisse-Díaz
:
Tie-Decay Networks in Continuous Time and Eigenvector-Based Centralities. 1759-1771 - Davide Cecchinato
, Tomaso Erseghe
, Michele Rossi
:
Elastic and Predictive Allocation of Computing Tasks in Energy Harvesting IoT Edge Networks. 1772-1788 - Qisheng Huang
, Yunjian Xu
, Costas Courcoubetis
:
Strategic Storage Operation in Wholesale Electricity Markets: A Networked Cournot Game Analysis. 1789-1801 - Yubin Duan
, Ning Wang
, Jie Wu
:
Minimizing Training Time of Distributed Machine Learning by Reducing Data Communication. 1802-1814 - Benyun Shi
, Jianan Zhong
, Hongjun Qiu
, Qing Bao
, Kai Liu, Jiming Liu
:
Hybrid Embedding via Cross-Layer Random Walks on Multiplex Networks. 1815-1827 - Bo Liu, Xixi Shen, Licheng Wu
, Housheng Su
:
Observability of Heterogeneous Multi-Agent Systems. 1828-1841 - Jinsong Gui
, Xiangwen Dai, Neal N. Xiong
:
Design and Analysis of Network Behaviors for Optimizing Network Energy Efficiency in 5G Mmwave Systems. 1842-1861 - Xianhao Chen
, Guangyu Zhu, Lan Zhang
, Yuguang Fang
, Linke Guo
, Xinguang Chen:
Age-Stratified COVID-19 Spread Analysis and Vaccination: A Multitype Random Network Approach. 1862-1872 - Jing Wu
, Juzhen Wang
, Qimei Chen
, Zenghui Yuan, Pan Zhou
, Xiumin Wang
, Cai Fu:
Resource Allocation for Delay-Sensitive Vehicle-to-Multi-Edges (V2Es) Communications in Vehicular Networks: A Multi-Agent Deep Reinforcement Learning Approach. 1873-1886 - Jun-Yi Li
, Zidong Wang
, Renquan Lu
, Yong Xu
:
Partial-Nodes-Based State Estimation for Complex Networks With Constrained Bit Rate. 1887-1899 - Xiaoheng Deng
, Peiyuan Guan
, Cong Hei, Feng Li, Jianqing Liu
, Naixue Xiong
:
An Intelligent Resource Allocation Scheme in Energy Harvesting Cognitive Wireless Sensor Networks. 1900-1912 - Li-Ning Liu, Guang-Hong Yang
:
Distributed Optimal Economic Environmental Dispatch for Microgrids Over Time-Varying Directed Communication Graph. 1913-1924 - Pan Lai
, Lingjie Duan
, Xiaojun Lin
:
Learning Large Electrical Loads via Flexible Contracts With Commitment. 1925-1940 - Xiang-Gui Guo
, Pei-Ming Liu
, Jian-Liang Wang
, Choon Ki Ahn
:
Event-Triggered Adaptive Fault-Tolerant Pinning Control for Cluster Consensus of Heterogeneous Nonlinear Multi-Agent Systems Under Aperiodic DoS Attacks. 1941-1956 - Mohammad Esmaeili
, Hussein Metwaly Saad
, Aria Nosratinia
:
Semidefinite Programming for Community Detection With Side Information. 1957-1973 - Jiajun Zhou
, Jie Shen, Shanqing Yu
, Guanrong Chen
, Qi Xuan
:
Corrections to "M-Evolve: Structural-Mapping-Based Data Augmentation for Graph Classification". 1974
Volume 8, Number 3, July - September 2021
- Jiming Chen, Enrico Natalizio, Hideaki Ishii, Rongxing Lu, Sangheon Pack:
Introduction to the Special Section on Security and Privacy of Smart Network Systems. 1975-1977 - Amir Amini
, Amir Asif
, Arash Mohammadi
, Ali Azarbahram
:
Sampled-Data Dynamic Event-Triggering Control for Networked Systems Subject to DoS Attacks. 1978-1990 - Mohammad Pirani
, Ehsan Nekouei
, Henrik Sandberg
, Karl Henrik Johansson
:
A Graph-Theoretic Equilibrium Analysis of Attacker-Defender Game on Consensus Dynamics Under $\mathcal {H}_2$ Performance Metric. 1991-2000 - Lu-Xing Yang
, Kaifan Huang
, Xiaofan Yang
, Yushu Zhang
, Yong Xiang
, Yuan Yan Tang:
Defense Against Advanced Persistent Threat Through Data Backup and Recovery. 2001-2013 - Mingjing Sun
, Chengcheng Zhao
, Jianping He
, Peng Cheng
, Daniel E. Quevedo
:
Privacy-Preserving Correlated Data Publication: Privacy Analysis and Optimal Noise Design. 2014-2024 - Qi Xia
, Zeyi Tao
, Qun Li
:
Defenses Against Byzantine Attacks in Distributed Deep Neural Networks. 2025-2035 - Wen Yang
, Weijie Luo, Xinting Zhang:
Distributed Secure State Estimation Under Stochastic Linear Attacks. 2036-2047 - Biwen Chen, Debiao He
, Neeraj Kumar
, Huaqun Wang
, Kim-Kwang Raymond Choo
:
A Blockchain-Based Proxy Re-Encryption With Equality Test for Vehicular Communication Systems. 2048-2059 - Luis Puche Rondon
, Leonardo Babun
, Kemal Akkaya, A. Selcuk Uluagac
:
HDMI-Watch: Smart Intrusion Detection System Against HDMI Attacks. 2060-2072 - Xinghua Li
, Yanbing Ren
, Laurence T. Yang
, Ning Zhang
, Bin Luo
, Jian Weng
, Ximeng Liu
:
Perturbation-Hidden: Enhancement of Vehicular Privacy for Location-Based Services in Internet of Vehicles. 2073-2086 - Shaobo Huang, Anfeng Liu, Shaobo Zhang, Tian Wang, Neal N. Xiong:
BD-VTE: A Novel Baseline Data Based Verifiable Trust Evaluation Scheme for Smart Network Systems. 2087-2105 - Chunming Zhang
, Fengji Luo
, Mingyang Sun, Gianluca Ranzi
:
Modeling and Defending Advanced Metering Infrastructure Subjected to Distributed Denial-of-Service Attacks. 2106-2117 - Dongxiao Liu
, Cheng Huang, Jianbing Ni
, Xiaodong Lin
, Xuemin Shen
:
Blockchain-Based Smart Advertising Network With Privacy-Preserving Accountability. 2118-2130 - Taotao Wang
, Chonghe Zhao, Qing Yang, Shengli Zhang
, Soung Chang Liew
:
Ethna: Analyzing the Underlying Peer-to-Peer Network of Ethereum Blockchain. 2131-2146 - PeiYun Zhang, MengChu Zhou
, Qixi Zhao, Abdullah Abusorrah
, Omaimah Omar Bamasag
:
A Performance-Optimized Consensus Mechanism for Consortium Blockchains Consisting of Trust-Varying Nodes. 2147-2159 - Jing Zhang
, Jianquan Lu
, Mengping Xing
, Jinling Liang
:
Synchronization of Finite Field Networks With Switching Multiple Communication Channels. 2160-2169 - Yi-Jheng Lin
, Che-Hao Yu
, Tzu-Hsuan Liu, Cheng-Shang Chang
, Wen-Tsuen Chen
:
Positively Correlated Samples Save Pooled Testing Costs. 2170-2182 - Wei Jiang, Wanchun Jiang
, Jianxin Wang, Jianliang Gao
, Neal N. Xiong
:
ORP: An Online Rule Placement Scheme to Optimize the Traffic Overhead for Data Center Networks. 2183-2197 - Habib Mostafaei
, Davinder Kumar, Gabriele Lospoto, Marco Chiesa
, Giuseppe Di Battista:
DeSI: A Decentralized Software-Defined Network Architecture for Internet Exchange Points. 2198-2212 - Shiqian Li, Wei Li
, Shiping Wen
, Kaibo Shi
, Yin Yang
, Pan Zhou
, Tingwen Huang
:
Auto-FERNet: A Facial Expression Recognition Network With Architecture Search. 2213-2222 - Arnau Rovira-Sugranes
, Fatemeh Afghah
, Junsuo Qu
, Abolfazl Razi
:
Fully-Echoed Q-Routing With Simulated Annealing Inference for Flying Adhoc Networks. 2223-2234 - Ka-Cheong Leung
, Chengdi Lai, Huiyi Ding:
Leave No Cash on the Table: An Optimal Approach for Controlling Wireless TCP AIMD. 2235-2248 - Yaoming Zhou
, Siping Li
, Tanmoy Kundu, Xiwen Bai, Wei Qin:
The Impact of Network Topology on Air Transportation Robustness to Pandemics. 2249-2261 - Ashish R. Hota
, Jaydeep Godbole, Philip E. Paré
:
A Closed-Loop Framework for Inference, Prediction, and Control of SIR Epidemics on Networks. 2262-2278 - Mengsi Cai
, Ge Huang, Mirjam E. Kretzschmar
, Xiaohong Chen, Xin Lu
:
Extremely Low Reciprocity and Strong Homophily in the World Largest MSM Social Network. 2279-2287 - Xiaoling Ling, Jie Gong
, Rui Li
, Shuai Yu
, Qian Ma
, Xu Chen
:
Dynamic Age Minimization With Real-Time Information Preprocessing for Edge-Assisted IoT Devices With Energy Harvesting. 2288-2300 - Guangcheng Li
, Qinglin Zhao
, Yu Wang
, Tie Qiu
, Kan Xie
, Li Feng
:
A Blockchain-Based Decentralized Framework for Fair Data Processing. 2301-2315 - Minseo Kim
:
Visualization of Dynamic Network Evolution With Quantification of Node Attributes. 2316-2325 - Prabhat Kumar
, Randhir Kumar
, Gautam Srivastava
, Govind P. Gupta, Rakesh Tripathi
, Thippa Reddy Gadekallu
, Neal N. Xiong
:
PPSF: A Privacy-Preserving and Secure Framework Using Blockchain-Based Machine-Learning for IoT-Driven Smart Cities. 2326-2341 - Junjie Fu
, Yuezu Lv
, Guanghui Wen
, Xinghuo Yu
:
Local Measurement Based Formation Navigation of Nonholonomic Robots With Globally Bounded Inputs and Collision Avoidance. 2342-2354 - Ramya Burra
, Chandramani Singh, Joy Kuri
:
Service Scheduling for Random Requests With Deadlines and Linear Waiting Costs. 2355-2371 - Juan Sebastian Borrero
, Majid Akhgar
, Pavlo A. Krokhmal:
A Scalable Markov Chain Framework for Influence Maximization in Arbitrary Networks. 2372-2387 - Hengnian Qi
, Xiaoping Wu
, Naixue Xiong
, Xuefeng Zhu:
A Source Prediction System for Dynamic Networks Based on TDOA Measurements. 2388-2401 - Rohit Singh
, Deepak Saluja
, Suman Kumar
:
Graph Based Training Resource Allocation Scheme for CoMP Transmission in CRAN: A Low Complexity Solution. 2402-2411 - JoonYoung Lee
, Geon-Hwan Kim
, Ashok Kumar Das
, YoungHo Park
:
Secure and Efficient Honey List-Based Authentication Protocol for Vehicular Ad Hoc Networks. 2412-2425 - Zongsheng Zheng
, Yijun Xu
, Lamine Mili
, Zhigang Liu
, Long Peng
, Yuhong Wang:
Derivative-Free Observability Analysis of a Stochastic Dynamical System. 2426-2437 - Baoqian Wang, Junfei Xie
, Kejie Lu
, Yan Wan
, Shengli Fu:
On Batch-Processing Based Coded Computing for Heterogeneous Distributed Computing Systems. 2438-2454 - Dan Liu, Zidong Wang
, Yurong Liu
, Fawaz E. Alsaadi
, Fuad E. Alsaadi
:
Recursive State Estimation for Stochastic Complex Networks Under Round-Robin Communication Protocol: Handling Packet Disorders. 2455-2468 - Haiyang Yu
, Yang Yang
, Haoyang Zhang
, Runkun Liu
, Yilong Ren
:
Reputation-Based Reverse Combination Auction Incentive Method to Encourage Vehicles to Participate in the VCS System. 2469-2481 - Kshitij Bhatta
, Majeed M. Hayat
, Francesco Sorrentino
:
Modal Decomposition of the Linear Swing Equation in Networks With Symmetries. 2482-2494 - Lamine Mili
, Jaber Valinejad
, Yijun Xu
:
Alleviating Fractal and Ill-Conditioning Problems of the AC Power Flow Using a Polynomial Form. 2495-2505 - Xin Wang
, Ju H. Park
, Huilan Yang:
An Improved Protocol to Consensus of Delayed MASs With UNMS and Aperiodic DoS Cyber-Attacks. 2506-2516 - Yujuan Han
, Wenlian Lu
, Shouhuai Xu
:
Preventive and Reactive Cyber Defense Dynamics With Ergodic Time-Dependent Parameters is Globally Attractive. 2517-2532 - Xin Jin, Zhengxin Wang
, Xiaojie Chen
, Yang Cao, Guo-Ping Jiang
:
Stochastic Synchronization of Multiplex Networks With Continuous and Impulsive Couplings. 2533-2544 - Keke Huang
, Zili Xiang, Wenfeng Deng
, Chunhua Yang
, Zhen Wang
:
False Data Injection Attacks Detection in Smart Grid: A Structural Sparse Matrix Separation Method. 2545-2558 - Darshana Upadhyay
, Jaume Manero
, Marzia Zaman
, Srinivas Sampalli
:
Intrusion Detection in SCADA Based Power Grids: Recursive Feature Elimination Model With Majority Vote Ensemble Algorithm. 2559-2574 - Xiaofeng Ding, Shujun Sheng, Jing Liu, Pan Zhou:
Efficient Probabilistic K-NN Computation in Uncertain Sensor Networks. 2575-2587 - Tianyu Liu
, Boya Di
, Peng An, Lingyang Song
:
Privacy-Preserving Incentive Mechanism Design for Federated Cloud-Edge Learning. 2588-2600 - Juntao Chen
, Corinne Touati
, Quanyan Zhu
:
A Dynamic Game Approach to Designing Secure Interdependent IoT-Enabled Infrastructure Network. 2601-2612 - Chuang Liu
, Shimin Yu, Ying Huang
, Zi-Ke Zhang
:
Effective Model Integration Algorithm for Improving Link and Sign Prediction in Complex Networks. 2613-2624 - Ying Lin
, Junji Ma, Bingjing Huang, Jinbo Zhang
, Yining Zhang, Zhengjia Dai:
Predicting Human Intrinsic Functional Connectivity From Structural Connectivity: An Artificial Neural Network Approach. 2625-2638 - Rui Hou
, Shuo Zhou, Yong Zheng, Mianxiong Dong
, Kaoru Ota
, Deze Zeng
, Jiangtao Luo
, Maode Ma
:
Cluster Routing-Based Data Packet Backhaul Prediction Method in Vehicular Named Data Networking. 2639-2650 - Bowen Wang
, Yanjing Sun
, Tan Do-Duy
, Emiliano Garcia-Palacios
, Trung Q. Duong
:
Adaptive $ D$-Hop Connected Dominating Set in Highly Dynamic Flying Ad-Hoc Networks. 2651-2664 - Shanchen Pang
, Xuliang Li
, Neal N. Xiong
, Min Wang
, Sibo Qiao
:
Optimal Target User Selection Policy for D2D Wireless Caching Networks. 2665-2678 - Ping Zhao
, Hongbo Jiang
, Jie Li
, Zhu Xiao
, Daibo Liu
, Ju Ren
, Deke Guo
:
Garbage In, Garbage Out: Poisoning Attacks Disguised With Plausible Mobility in Data Aggregation. 2679-2693 - Yujie Li
, Zhoujin Tang, Zhijian Lin, Yanfei Gong, Xiaojiang Du
, Mohsen Guizani
:
Reinforcement Learning Power Control Algorithm Based on Graph Signal Processing for Ultra-Dense Mobile Networks. 2694-2705 - Lihua Yin, Jiyuan Feng, Hao Xun, Zhe Sun
, Xiaochun Cheng
:
A Privacy-Preserving Federated Learning for Multiparty Data Sharing in Social IoTs. 2706-2718
Volume 8, Number 4, October - December 2021
- Liang Zhao
, Neeraj Kumar
, Celimuge Wu
, Jia Hu
, Ahmed Al-Dubai
:
Guest Editorial: Introduction to the Special Section on Intelligence-Empowered Collaboration Among Space, Air, Ground, and Sea Mobile Networks Towards B5G. 2719-2721 - Pallav Kumar Deb
, Anandarup Mukherjee
, Sudip Misra
:
XiA: Send-It-Anyway Q-Routing for 6G-Enabled UAV-LEO Communications. 2722-2731 - Long Chen
, Feilong Tang
, Xu Li, Laurence T. Yang
, Lijun Cao, Jiadi Yu
, Luoyi Fu, Zhetao Li
, Linghe Kong:
Dynamical Control Domain Division for Software-Defined Satellite-Ground Integrated Vehicular Networks. 2732-2741 - Muhammad Karam Shehzad
, Arsalan Ahmad
, Syed Ali Hassan
, Haejoon Jung
:
Backhaul-Aware Intelligent Positioning of UAVs and Association of Terrestrial Base Stations for Fronthaul Connectivity. 2742-2755 - Bin Cao
, Meng Li, Xin Liu, Jianwei Zhao
, Wenxi Cao, Zhihan Lv
:
Many-Objective Deployment Optimization for a Drone-Assisted Camera Network. 2756-2764 - Navuday Sharma
, Atul Kumar
, Haris Pervaiz
, Maurizio Magarini
, Leila Musavian
, Muhammad Mahtab Alam
, Anish Jindal
, Muhammad Ali Imran
:
Aerial Base Station Assisted Cellular Communication: Performance and Trade-Off. 2765-2779 - Shuming Seng
, Guang Yang, Xi Li
, Hong Ji
, Changqing Luo
:
Energy-Efficient Communications in Unmanned Aerial Relaying Systems. 2780-2791 - Gunasekaran Manogaran, Ching-Hsien Hsu
, P. Mohamed Shakeel, Mamoun Alazab
:
Non-Recurrent Classification Learning Model for Drone Assisted Vehicular Ad-Hoc Network Communication in Smart Cities. 2792-2800 - Jin Wang
, Caiyan Jin
, Qiang Tang
, Neal N. Xiong
, Gautam Srivastava
:
Intelligent Ubiquitous Network Accessibility for Wireless-Powered MEC in UAV-Assisted B5G. 2801-2813 - Xin Liu
, Biaojun Lai
, Linfeng Gou, Chuan Lin
, Mu Zhou
:
Joint Resource Optimization for UAV-Enabled Multichannel Internet of Things Based on Intelligent Fog Computing. 2814-2824 - Wang Miao
, Chunbo Luo, Geyong Min, Yang Mi, Haozhe Wang
:
Unlocking the Potential of 5G and Beyond Networks to Support Massive Access of Ground and Air Devices. 2825-2836 - Shaohua Wan
, Jinna Hu
, Chen Chen
, Alireza Jolfaei
, Shahid Mumtaz
, Qingqi Pei
:
Fair-Hierarchical Scheduling for Diversified Services in Space, Air and Ground for 6G-Dense Internet of Things. 2837-2848 - Xiaoding Wang
, Hui Lin
, Hongyan Zhang, Dejun Miao, QinYang Miao, Wenxin Liu:
Intelligent Drone-Assisted Fault Diagnosis for B5G-Enabled Space-Air-Ground-Space Networks. 2849-2860 - Xiaoyi Tao
, Kaoru Ota
, Mianxiong Dong
, Heng Qi
, Keqiu Li:
Congestion-Aware Scheduling for Software-Defined SAG Networks. 2861-2871 - Jiahao Liu
, Baokang Zhao
, Qin Xin
, Jinshu Su
, Wei Ou:
DRL-ER: An Intelligent Energy-Aware Routing Protocol With Guaranteed Delay Bounds in Satellite Mega-Constellations. 2872-2884 - Tianxi Ji
, Yifan Guo
, Qianlong Wang
, Xufei Wang
, Pan Li
:
ECONOMY: Point Clouds-Based Energy-Efficient Autonomous Navigation for UAVs. 2885-2896 - Jian Wang
, Yongxin Liu
, Shuteng Niu
, Houbing Song
:
Optimal Routing for Beamforming-Constrained Swarm UAS Networking. 2897-2908 - Jianqiang Li
, Shuqing Hu
, Qinjian Li, Jie Chen
, Victor C. M. Leung
, Houbing Song
:
Global Visual and Semantic Observations for Outdoor Robot Localization. 2909-2921 - Tongwei Zhang
, Guangjie Han
, Lei Yan
, Yan Peng
:
Fast Calculation of Underwater Acoustic Horizontal Range: A Guarantee for B5G Ocean Mobile Networks. 2922-2933 - Umar Draz
, Amjad Ali
, Muhammad Bilal
, Tariq Ali
, Muhammad Aksam Iftikhar, Alireza Jolfaei
, Doug Young Suh
:
Energy Efficient Proactive Routing Scheme for Enabling Reliable Communication in Underwater Internet of Things. 2934-2945 - Yang Xu
, Xiaodan Yan
, Yulei Wu
, Yupeng Hu
, Wei Liang
, Jixin Zhang
:
Hierarchical Bidirectional RNN for Safety-Enhanced B5G Heterogeneous Networks. 2946-2957 - Rajesh Gupta
, Arpit Shukla
, Sudeep Tanwar
:
BATS: A Blockchain and AI-Empowered Drone-Assisted Telesurgery System Towards 6G. 2958-2967 - Muna Al-Hawawreh
, Nour Moustafa
, Sahil Garg
, M. Shamim Hossain
:
Deep Learning-Enabled Threat Intelligence Scheme in the Internet of Things Networks. 2968-2981 - Jing Zhang, Jie Cui
, Hong Zhong
, Irina Bolodurina
, Lu Liu
:
Intelligent Drone-assisted Anonymous Authentication and Key Agreement for 5G/B5G Vehicular Ad-Hoc Networks. 2982-2994 - Xingwang Li
, Mengyan Huang
, Yuanwei Liu
, Varun G. Menon
, Anand Paul
, Zhiguo Ding
:
I/Q Imbalance Aware Nonlinear Wireless-Powered Relaying of B5G Networks: Security and Reliability Analysis. 2995-3008 - Weiqi Liu
, Liang Zhang
, Nirwan Ansari
:
Laser Charging Enabled DBS Placement for Downlink Communications. 3009-3018 - Jesús Arroyo
, Carey E. Priebe
, Vince Lyzinski:
Graph Matching Between Bipartite and Unipartite Networks: To Collapse, or Not to Collapse, That Is the Question. 3019-3033 - Jueyou Li, Chaojie Li
, Wenwu Yu, Xiaomei Zhu, Xinghuo Yu
:
Distributed Online Bandit Learning in Dynamic Environments Over Unbalanced Digraphs. 3034-3047 - Zuyuan Zhang
, Sridhar Radhakrishnan
, C. R. Subramanian, Kash Barker
, Andrés D. González:
Causal Node Failures and Computation of Giant and Small Components in Networks. 3048-3060 - Renjie Zhou
, Chen Liu
, Jian Wan
, Qing Fan
, Yongjian Ren
, Jilin Zhang
, Naixue Xiong
:
A Hybrid Neural Network Architecture to Predict Online Advertising Click-Through Rate Behaviors in Social Networks. 3061-3072 - Runkai Yang
, Xiaolin Chang
, Jelena V. Misic
, Vojislav B. Misic
, Hongyue Kang
:
On Selfholding Attack Impact on Imperfect PoW Blockchain Networks. 3073-3086 - Zhengyang Hu, Xiaopeng Li, Juan Wang, Chengyi Xia
, Zhen Wang
, Matjaz Perc
:
Adaptive Reputation Promotes Trust in Social Networks. 3087-3098 - Zhen-Hua Zhu
, Bin Hu
, Zhi-Hong Guan
, Ding-Xue Zhang, Xin-Ming Cheng:
Collective Behaviors of Discrete-Time Multi-Agent Systems Over Signed Digraphs. 3099-3112 - Rui Zhang
, Shaobo Zhang
, Tian Wang
, Neal N. Xiong
:
A Class of Differential Data Processing-Based Data Gathering Schemes in Internet of Things. 3113-3128 - Rutvij H. Jhaveri
, Sagar V. Ramani, Gautam Srivastava
, Thippa Reddy Gadekallu
, Vaneet Aggarwal
:
Fault-Resilience for Bandwidth Management in Industrial Software-Defined Networks. 3129-3139 - Hayato Shimada
, Yuichi Kawamoto
, Nei Kato
:
Novel Computation and Communication Resources Allocation Using Relay Communications in UAV-Mounted Cloudlet Systems. 3140-3151 - Tianchong Gao
, Feng Li
:
Differential Private Social Network Publication and Persistent Homology Preservation. 3152-3166 - Dong Ding
, Ze Tang
, Yan Wang
, Zhicheng Ji
, Ju H. Park
:
Secure Synchronization for Cyber-Physical Complex Networks Based on Self-Triggering Impulsive Control: Static and Dynamic Method. 3167-3178 - Shanchen Pang
, Nuanlai Wang
, Min Wang
, Sibo Qiao, Xue Zhai
, Neal N. Xiong
:
A Smart Network Resource Management System for High Mobility Edge Computing in 5G Internet of Vehicles. 3179-3191 - Dinh C. Nguyen
, Pubudu N. Pathirana
, Ming Ding
, Aruna Seneviratne
:
Secure Computation Offloading in Blockchain Based IoT Networks With Deep Reinforcement Learning. 3192-3208 - Yang Lou
, Ruizi Wu
, Junli Li, Lin Wang
, Guanrong Chen
:
A Convolutional Neural Network Approach to Predicting Network Connectedness Robustness. 3209-3219 - Jie Gao
, Fei Hao
, Zheng Pei
, Geyong Min
:
Learning Concept Interestingness for Identifying Key Structures From Social Networks. 3220-3232 - Zhou Gu
, Peng Shi
, Dong Yue
, Shen Yan
, Xiangpeng Xie
:
Fault Estimation and Fault-Tolerant Control for Networked Systems Based on an Adaptive Memory-Based Event-Triggered Mechanism. 3233-3241 - Srinjoy Chattopadhyay
, Huaiyu Dai
, Do Young Eun:
Controlling Metastable Infection Patterns in Multilayer Networks via Interlink Design. 3242-3256 - Shengwei Lei
, Chunhe Xia
, Zhong Li, Xiaojian Li, Tianbo Wang
:
HNN: A Novel Model to Study the Intrusion Detection Based on Multi-Feature Correlation and Temporal-Spatial Analysis. 3257-3274 - Lun Hu
, Jun Zhang
, Xiangyu Pan, Xin Luo
, Huaqiang Yuan:
An Effective Link-Based Clustering Algorithm for Detecting Overlapping Protein Complexes in Protein-Protein Interaction Networks. 3275-3289 - Tianming Zhao
, Weisheng Si
, Wei Li
, Albert Y. Zomaya
:
Towards Minimizing the $R$ Metric for Measuring Network Robustness. 3290-3302 - Harir Seddiqi, Shahram Babaie
:
A New Protection-Based Approach for Link Failure Management of Software-Defined Networks. 3303-3312 - Xiaona Song
, Jingtao Man
, Choon Ki Ahn
, Shuai Song
:
Synchronization in Finite/Fixed Time for Markovian Complex-Valued Nonlinear Interconnected Neural Networks With Reaction-Diffusion Terms. 3313-3324 - Lei Shi
, Lulu Chen, Yuhua Cheng:
High-Order Bipartite Consensus for Multiagent Systems Over Signed Networks Subject to Asynchronous Communications. 3325-3334 - Juan Xia
, Shesheng Gao, Guo Li
, Xiaomin Qi
, Bingbing Gao
, Jiahao Zhang
:
Distributed H$\infty$-Constraint Robust Estimator for Multi-Sensor Networked Hybrid Uncertain Systems. 3335-3348 - Teng Long
, Shan Qu
, Qi Li, Huquan Kang, Luoyi Fu
, Xinbing Wang
, Chenghu Zhou:
Efficient Block Propagation in Wireless Blockchain Networks and Its Application in Bitcoin. 3349-3368 - Ying Zhang, Lei Ma
, Guoqing Wang
, Chunyu Yang
, Linna Zhou
, Wei Dai:
Observer-Based Control for the Two-Time-Scale Cyber-Physical Systems: The Dual-Scale DoS Attacks Case. 3369-3379 - Haifeng Dai
, Wang Li, Chunyu Yang
, Guanghui Wen
, Yongzheng Sun
:
Time and Energy Costs for Consensus of Multi-Agent Networks With Undirected and Directed Topologies. 3380-3391 - Sina Fathi Kazerooni
, Roberto Rojas-Cessa
:
Countering Machine-Learning Classification of Applications by Equalizing Network Traffic Statistics. 3392-3403 - Zhengcheng Dong
, Meng Tian
:
Modeling and Vulnerability Analysis of Spatially Embedded Heterogeneous Cyber-Physical Systems With Functional Dependency. 3404-3416 - Kaixin Tian, Zhenhong Guo, Jie Mei
, Chunjing Jiang, Guangfu Ma:
Leaderless Consensus for Second-Order Inertia Uncertain Multi-Agent Systems Under Directed Graphs Without Relative Velocity Information. 3417-3429 - Litao Ma
, Wei Bian
:
A Simple Neural Network for Sparse Optimization With $l_1$ Regularization. 3430-3442 - Housheng Su
, Liren Zhang
:
Model-Independent Containment Control for Dynamic Multiple Euler-Lagrange Systems With Disturbances and Uncertainties. 3443-3452 - Humberto Hayashi Sano
, Lilian Berton
:
A Temporal Event Graph Approach and Robustness Analysis for Air Transport Network. 3453-3464 - Mohammadreza Doostmohammadian
, Houman Zarrabi, Hamid R. Rabiee
, Usman A. Khan
, Themistoklis Charalambous
:
Distributed Detection and Mitigation of Biasing Attacks Over Multi-Agent Networks. 3465-3477 - Jinhuan Wang, Pengtao Chen
, Bin Ma, Jiajun Zhou
, Zhongyuan Ruan
, Guanrong Chen
, Qi Xuan
:
Sampling Subgraph Network With Application to Graph Classification. 3478-3490 - Yanzhi Wu
, Lu Liu
:
Distributed Average Tracking for Linear Heterogeneous Multi-Agent Systems With External Disturbances. 3491-3500 - Ashok Kumar
, Krishan Kumar
:
A Game Theory Based Hybrid NOMA for Efficient Resource Optimization in Cognitive Radio Networks. 3501-3514

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.