default search action
Peer-to-Peer Networking and Applications, Volume 15
Volume 15, Number 1, January 2022
- K. Mohaideen Pitchai:
Determination of energy efficient optimal sojourn location of mobile sinks in clustered corona-based wireless sensor networks. 1-12 - S. Shiny, J. Jasper:
Decentralized access control technique with multi-tier authentication of user for cloud storage. 13-27 - Hua-Rui Wu, Huaji Zhu, Xiao Han:
An improved k-angle coverage algorithm for multimedia wireless sensor networks based on two-layer tabu search. 28-44 - Elham Moridi, Majid Haghparast, Mehdi Hosseinzadeh, Somayyeh Jafarali Jassbi:
A novel hierarchical fault management framework for wireless sensor networks: HFMF. 45-55 - Jianlong Liu, Jiaye Wen, Lixia Lin, Wen'an Zhou:
Double agents-DQL based D2D computing-offloading for SHVC. 56-76 - Abdul Saboor, Ahmad Kamil Mahmood, Abdullah Hisam Omar, Mohd Fadzil Hassan, Syed Nasir Mehmood Shah, Ali Ahmadian:
Enabling rank-based distribution of microservices among containers for green cloud computing environment. 77-91 - Tanakorn Karode, Warodom Werapun:
Robustness against fraudulent activities of a blockchain-based online review system. 92-106 - C. Suganthi Evangeline, Vinoth Babu Kumaravelu:
A two-phase fuzzy based access network selection scheme for vehicular ad hoc networks. 107-133 - Yaoguang Lu, Xingwei Wang, Bo Yi, Min Huang:
The reliable routing for software-defined vehicular networks towards beyond 5G. 134-148 - Jiefan Qiu, Zonghan Hua, Lei Liu, Mingsheng Cao, Dajiang Chen:
Machine-learning-based cache partition method in cloud environment. 149-162 - Duc V. Nguyen, Giang L. Nguyen, Thang T. Nguyen, Anh H. Ngo, Giang T. Pham:
MINAD: Multi-inputs Neural Network based on Application Structure for Android Malware Detection. 163-177 - Mohammed B. M. Kamel, Péter Ligeti, Adam Nagy, Christoph Reich:
Distributed Address Table (DAT): A Decentralized Model for End-to-End Communication in IoT. 178-193 - Zheyi Chen, Hongqiang Zheng, Jianshan Zhang, Xianghan Zheng, Chunming Rong:
Joint computation offloading and deployment optimization in multi-UAV-enabled MEC systems. 194-205 - Vidyotma Thakur, Gaurav Indra, Nitin Gupta, Pushpita Chatterjee, Omar Said, Amr Tolba:
Cryptographically secure privacy-preserving authenticated key agreement protocol for an IoT network: A step towards critical infrastructure protection. 206-220 - Wai Kheong Chong, Micheal Drieberg, Varun Jeoti, Rizwan Ahmad:
Analytical modelling of false blocking problem in wireless ad hoc networks. 221-245 - Maryam Ataei Kachooei, Faramarz Hendessi, Behrouz Shahgholi Ghahfarokhi, Mostafa Nozari:
An OLSR-based Geocast Routing Protocol for Vehicular Ad Hoc Networks. 246-266 - Varun Deshpande, Hakim Badis, Laurent George:
Efficient topology control of blockchain peer to peer network based on SDN paradigm. 267-289 - Federico Franzoni, Vanesa Daza:
Clover: An anonymous transaction relay protocol for the bitcoin P2P network. 290-303 - Guanglai Guo, Yan Zhu, E. Chen, Guizhen Zhu, Di Ma, William Cheng-Chung Chu:
Continuous improvement of script-driven verifiable random functions for reducing computing power in blockchain consensus protocols. 304-323 - Deyu Zhang, Heguo Zhang, Sijing Duan, Yunzhen Luo, Fucheng Jia, Feng Liu:
Deep action: A mobile action recognition framework using edge offloading. 324-339 - Xuejiao Liu, Chuanhua Wang, Wei Chen, Yingjie Xia, Gaoxiang Zhu:
SCMP-V: A secure multiple relays cooperative downloading scheme with privacy preservation in VANETs. 340-354 - Shuai Zhou, Ge Zhang, Xianfu Meng:
LocTrust: A local and global consensus-combined trust model in MANETs. 355-368 - Haina Song, Xinyu Han, Jie Lv, Tao Luo, Jianfeng Li:
MPLDS: An integration of CP-ABE and local differential privacy for achieving multiple privacy levels data sharing. 369-385 - Khaled S. El Gayyar, Ahmed I. Saleh, Labib M. Labib:
A new fog-based routing strategy (FBRS) for vehicular ad-hoc networks. 386-407 - Federico Franzoni, Xavier Salleras, Vanesa Daza:
AToM: Active topology monitoring for the bitcoin peer-to-peer network. 408-425 - Mrinai Maneetkumar Dhanvijay, Shailaja C. Patil:
Energy aware MAC protocol with mobility management in wireless body area network. 426-443 - Qiaohong Hu, Hongju Cheng, Xiaoqi Zhang, Chengkuan Lin:
Trusted resource allocation based on proof-of-reputation consensus mechanism for edge computing. 444-460 - Leila Benarous, Benamar Kadri:
Obfuscation-based location privacy-preserving scheme in cloud-enabled internet of vehicles. 461-472 - Bharati Sinha, Awadhesh Kumar Singh, Poonam Saini:
A hybrid approach towards reduced checkpointing overhead in cloud-based applications. 473-483 - Mohammad Shirafkan, Ali Shahidinejad, Mostafa Ghobaei-Arani:
An autonomous intrusion detection system for the RPL protocol. 484-502 - Guang Yang, Junling Guo, Lidong Han, Xuejiao Liu, Chengliang Tian:
An improved secure certificateless public-key searchable encryption scheme with multi-trapdoor privacy. 503-515 - Yulei Chen, Jianhua Chen:
An efficient and privacy-preserving mutual authentication with key agreement scheme for telecare medicine information system. 516-528 - Weichang Zheng, Mingcong Yang, Chenxiao Zhang, Yu Zheng, Yunyi Wu, Yongbing Zhang, Jie Li:
Application-aware QoS routing in SDNs using machine learning techniques. 529-548 - Weinan Liu:
Privacy-preserving comparison based data aggregation protocols for mobile sensing. 549-558 - Jianhua Huang, Tianqi Li, Zhigang Shi:
An uneven annulus sector grid-based energy-efficient multi-hop routing protocol for wireless sensor networks. 559-575 - Shafi Shaik, Devanaboyina Venkata Ratnam:
A trust based energy and mobility aware routing protocol to improve infotainment services in VANETs. 576-591 - Radhakrishnan Maivizhi, Palanichamy Yogesh:
Fuzzy routing for in-network aggregation in wireless sensor networks. 592-611 - Xuefei Peng, Xiaoming Yuan, Kuan Zhang:
Clustered NOMA-based downlink adaptive relay coordinated transmission scheme for future 6G cell-free edge network. 612-625 - Douglas Henrique Silva, Erick Galani Maziero, Muhammad Saadi, Renata Lopes Rosa, Juan E. Casavílca Silva, Demóstenes Z. Rodríguez, Kostromitin Konstantin Igorevich:
Big data analytics for critical information classification in online social networks using classifier chains. 626-641 - Ankur O. Bang, Udai Pratap Rao:
EMBOF-RPL: Improved RPL for early detection and isolation of rank attack in RPL-based internet of things. 642-665 - Dharmendra Kumar, Mayank Pandey:
An optimal load balancing strategy for P2P network using chicken swarm optimization. 666-688 - Jie Jia, Yao Xu, Zhenjun Du, Jian Chen, Qinghu Wang, Xingwei Wang:
Joint resource allocation for QoE optimization in large-scale NOMA-enabled multi-cell networks. 689-702 - J. Thresa Jeniffer, A. Chandrasekar:
Optimal hybrid heat transfer search and grey wolf optimization-based homomorphic encryption model to assure security in cloud-based IoT environment. 703-723 - Chuxin Zhuang, Qingyun Dai, Yue Zhang:
BCPPT: A blockchain-based privacy-preserving and traceability identity management scheme for intellectual property. 724-738 - Xu Zhao, Chaowei Lin, Jianshan Zhang:
Cloudlet deployment for workflow applications in a mobile edge computing-wireless metropolitan area network. 739-750 - K. Tamil Selvi, R. Thamilselvan:
An intelligent traffic prediction framework for 5G network using SDN and fusion learning. 751-767 - Vojislav B. Misic, Jelena V. Misic, Xiaolin Chang:
Reducing the number of transaction messages in bitcoin. 768-782 - Wenbin Chen, Wei Wang, Zuguang Li, Qiang Ye, Qihui Wu:
Joint pricing and task allocation for blockchain empowered crowd spectrum sensing. 783-792 - Rahul N. Vaza, Ramesh Prajapati, Dushyantsinh Rathod, Dineshkumar Vaghela:
Developing a novel methodology for virtual machine introspection to classify unknown malware functions. 793-810 - Xiaoli Li, Huamei Qi, Jia Wu:
Efficient path-sense transmission based on IoT system in opportunistic social networks. 811-826 - Muhammad Ali, Rizwan Asghar, Ihsan Ullah, Atiq Ahmed, Waheed Noor, Junaid Baber:
Towards intelligent P2P IPTV overlay management through classification of peers. 827-838
Volume 15, Number 2, March 2022
- Luca Serena, Stefano Ferretti, Gabriele D'Angelo:
Cryptocurrencies activity as a complex network: Analysis of transactions graphs. 839-853 - Chaogang Tang, Huaming Wu:
Joint optimization of task caching and computation offloading in vehicular edge computing. 854-869 - Xingchen Wang, Chengwu Liao, Chao Chen, Jie Ma, Huayan Pu:
O2D: An uncooperative taxi-passenger's destination predication system via deep neural networks. 870-883 - Moayad Aloqaily, Ouns Bouachir, Öznur Özkasap, Faizan Safdar Ali:
SynergyGrids: blockchain-supported distributed microgrid energy trading. 884-900 - H. S. Jennath, S. Asharaf:
Reputation management in vehicular network using blockchain. 901-920 - Qingyang Li, Bin Guo, Zhu Wang:
A privacy-preserving multi-agent updating framework for self-adaptive tree model. 921-933 - Bing Tang, Linyao Kang:
EICache: A learning-based intelligent caching strategy in mobile edge computing. 934-949 - Xiao Ke, Wenyao Chen, Wenzhong Guo:
100+ FPS detector of personal protective equipment for worker safety: A deep learning approach for green edge computing. 950-972 - Longxin Zhang, Lan Wang, Mansheng Xiao, Zhicheng Wen, Cheng Peng:
EM_WOA: A budget-constrained energy consumption optimization approach for workflow scheduling in clouds. 973-987 - Chris Pollett, Thomas H. Austin, Katerina Potika, Justin Rietz, Prashant Pardeshi:
TontineCoin: Survivor-based Proof-of-Stake. 988-1007 - Xuelian Cao, Jianhui Zhang, Xuechen Wu, Bo Liu:
A survey on security in consensus and smart contracts. 1008-1028 - Zhengzhe Xiang, Yuhang Zheng, Mengzhu He, Longxiang Shi, Dongjing Wang, Shuiguang Deng, Zengwei Zheng:
Energy-effective artificial internet-of-things application deployment in edge-cloud systems. 1029-1044 - Xinning Chen, Xuan Liu, Canhui Luo, Jiangjin Yin:
Robust multi-agent reinforcement learning for noisy environments. 1045-1056 - Devarapalli Prasannababu, Tarachand Amgoth:
Adaptive SSO based node selection for partial charging in wireless sensor network. 1057-1075 - Songyang Wu, Wenju Xu, Zhiyong Hong, Pu Duan, Benyu Zhang, Yupu Hu, Baocang Wang:
Updatable privacy-preserving itK-nearest neighbor query in location-based s-ervice. 1076-1089 - Lili Jiang, Xiaolin Chang, Jelena V. Misic, Vojislav B. Misic, Jing Bai:
Understanding MEC empowered vehicle task offloading performance in 6G networks. 1090-1104 - Kalaivanan Karunanithy, Bhanumathi Velusamy:
An efficient data collection using wireless sensor networks and internet of things to monitor the wild animals in the reserved area. 1105-1125 - Qinglin Zhao, Xianqing Tai, Jianwen Yuan, Jie Xu, Li Feng, Zhijie Ma:
Performance analysis of PoUW consensus mechanism: Fork probability and throughput. 1126-1138 - Jianxin Zhao, Yanhao Feng, Xinyu Chang, Chi Harold Liu:
Energy-efficient client selection in federated learning with heterogeneous data on edge. 1139-1151 - Kai Fan, Zeyu Shi, Ruidan Su, Yuhan Bai, Pei Huang, Kuan Zhang, Hui Li, Yintang Yang:
Blockchain-based trust management for verifiable time synchronization service in IoT. 1152-1162 - Sriramulu Bojjagani, P. V. Venkateswara Rao, Dinesh Reddy Vemula, B. Ramachandra Reddy, T. Jaya Lakshmi:
A secure IoT-based micro-payment protocol for wearable devices. 1163-1188 - Vesal Hakami, Hadi Barghi, Seyedakbar Mostafavi, Ziba Arefinezhad:
A resource allocation scheme for D2D communications with unknown channel state information. 1189-1213 - Yongheng Deng, Shuang Gu, Chengbo Jiao, Xing Bao, Feng Lyu:
Making resource adaptive to federated learning with COTS mobile devices. 1214-1231 - Zainab Hassan Ali, Hesham A. Ali:
EEOMA: End-to-end oriented management architecture for 6G-enabled drone communications. 1232-1254 - Anika Mansura, Micheal Drieberg, Azrina Abd Aziz, Vandana Bassoo, Sohail Sarang:
An energy balanced and nodes aware routing protocol for energy harvesting wireless sensor networks. 1255-1280 - Nairy Moghaddas-Gholian, Vahid Solouk, Hashem Kalbkhani:
Relay selection and power allocation for energy-load efficient network-coded cooperative unicast D2D communications. 1281-1293 - Himanshuram Ranjan, Atul Kumar Dwivedi, Prakasam Periasamy:
An optimized architecture and algorithm for resource allocation in D2D aided fog computing. 1294-1310
Volume 15, Number 3, May 2022
- Gen Huang, Yi-bo Zou, Shi Chen, Yun Xu:
Bitrans: A bidirectional and trusted data transaction protocol based on the blockchain system. 1311-1327 - Mohammad Jalilvand Aghdam Bonab, Ramin Shaghaghi Kandovan:
QoS-aware resource allocation in mobile edge computing networks: Using intelligent offloading and caching strategy. 1328-1344 - Sheau-Ru Tong, Cheng-Han Yang:
Efficient broadcast scheduling at mobile cloud edges for supporting news-broadcast-on-demand over P2P streaming. 1345-1356 - Kai Chen, Fuwei Wang, Miaoyu Li, Baoying Liu, Hao Chen, Feng Chen:
HeadSee: Device-free head gesture recognition with commodity RFID. 1357-1369 - Pothuri Surendra Varma, Veena Anand:
Fault-Tolerant indoor localization based on speed conscious recurrent neural network using Kullback-Leibler divergence. 1370-1384 - Jin Ren, Yuyang Cheng, Shiyuan Xu:
EDPPA: An efficient distance-based privacy preserving authentication protocol in VANET. 1385-1397 - Jia Wu, Jiahao Xia, Fangfang Gou:
Information transmission mode and IoT community reconstruction based on user influence in opportunistic s ocial networks. 1398-1416 - Piyush Rawat, Siddhartha Chauhan:
Particle swarm optimization based sleep scheduling and clustering protocol in wireless sensor network. 1417-1436 - Jin Sun, Fu Wang:
An effective LS-SVM/AKF aided SINS/DVL integrated navigation system for underwater vehicles. 1437-1451 - Mahsa MalekiTabar, Amir Masoud Rahmani:
A delay-constrained node-disjoint multipath routing in software-defined vehicular networks. 1452-1472 - Soumya J. Bhat, Santhosh Krishnan Venkata:
A localization and deployment model for wireless sensor networks using arithmetic optimization algorithm. 1473-1485 - Ping Zhong, Aikun Xu, Yilin Kang, Shigeng Zhang, Yiming Zhang:
An optimal deployment scheme for extremely fast charging stations. 1486-1504 - Rahul Das, Mona Dwivedi:
Multi agent dynamic weight based cluster trust estimation for hierarchical wireless sensor networks. 1505-1520 - Dan Liao, Ruijin Zhou, Hui Li, Ming Zhang, Xue Chen:
GE-IDS: an intrusion detection system based on grayscale and entropy. 1521-1534 - Recep Özdag:
Multi-metric optimization with a new metaheuristic approach developed for 3D deployment of multiple drone-BSs. 1535-1561 - Chengzhe Lai, Zhe Ma, Rui Guo, Dong Zheng:
Secure medical data sharing scheme based on traceable ring signature and blockchain. 1562-1576 - Alper Bereketli:
Interference-Free Source Deployment for Coverage in Underwater Acoustic Backscatter Networks. 1577-1594 - Masoumeh Safkhani, Saru Kumari, Mohammad Shojafar, Sachin Kumar:
An authentication and key agreement scheme for smart grid. 1595-1616 - Alapaka Nagur Babu, Jakkala Vishnu, S. Nandakumar, T. Velmurugan:
Resource allocation and optimization in D2D communication with PDRAPC framework. 1617-1637 - Tao Ding, Guangrong Yan, Zhenggan Zhou, Yi Lei:
A novel manufacturing service model transformation method based on product lifecycle. 1638-1652 - Kai Zhang, Jinhu Yu, Chao Lin, Jianting Ning:
Blockchain-based access control for dynamic device management in microgrid. 1653-1668 - Xiaohua Wu, Hongji Ling, Huan Liu, Fangjian Yu:
A privacy-preserving and efficient byzantine consensus through multi-signature with ring. 1669-1684 - Keerthika A, V. Berlin Hency:
Reinforcement-Learning based energy efficient optimized routing protocol for WSN. 1685-1704 - Ankur Choudhary, Santosh Kumar, Krishna Pal Sharma:
RFDCS: A reactive fault detection and classification scheme for clustered wsns. 1705-1732 - Ashish Tomar, Sachin Tripathi:
BCAV: Blockchain-based certificateless authentication system for vehicular network. 1733-1756
Volume 15, Number 4, July 2022
- Aditi Mishra, Azad Azadmanesh, Lotfollah Najjar:
Consensus in sensor networks in presence of hybrid faults. 1757-1774 - Danfeng Wu, Jiancheng Zhang, Jinlai Zhang, Heng Shi:
A Novel Deep Link Prediction Model for Peer-to-Peer Dynamic Task Collaboration Networks. 1775-1791 - Mohammad Ali, Ximeng Liu:
Lightweight verifiable data management system for cloud-assisted wireless body area networks. 1792-1816 - Junfeng Tian, Ziwei Wang:
Cloud data assured deletion scheme based on dynamic sliding window. 1817-1833 - Dan Liao, Wentao Wang, Kairen Xiao, Hui Li, Ming Zhang:
Towards an architecture and algorithm for the satellite IoT based on a CCN. 1834-1848 - Yuetong Chen, Fengming Liu:
Research on improvement of DPoS consensus mechanism in collaborative governance of network public opinion. 1849-1861 - Radhika Kavra, Anjana Gupta, Sangita Kansal:
Systematic study of topology control methods and routing techniques in wireless sensor networks. 1862-1922 - Jing Bai, Xiaolin Chang, Fumio Machida, Zhen Han, Yang Xu, Kishor S. Trivedi:
Quantitative understanding serial-parallel hybrid sfc services: a dependability perspective. 1923-1938 - Pankaj Kumar, Hari Om:
A secure and efficient authentication protocol for wireless applications in multi-server environment. 1939-1952 - Peiyan Yuan, Saike Shao, Xiaoyan Huang:
RAPAR: Routing algorithm based on node relationship mining in opportunistic network. 1953-1963 - Pengge Chen, Fenhua Bai, Tao Shen, Bei Gong, Lei Zhang, Lin Huang, Zhengyuan An, Talha Mir, Shanshan Tu, Muhammad Waqas:
SCCA: A slicing-and coding-based consensus algorithm for optimizing storage in blockchain-based IoT data sharing. 1964-1978 - Xiaoyu Du, Yinyin Li, Sufang Zhou, Yi Zhou:
ATS-LIA: A lightweight mutual authentication based on adaptive trust strategy in flying ad-hoc networks. 1979-1993 - Yukun Zhang, Wenxue Wei:
Lightweight anonymous authentication and key agreement protocols for mobile edge computing. 1994-2006 - K. Anand, A. Vijayaraj, M. Vijay Anand:
An enhanced bacterial foraging optimization algorithm for secure data storage and privacy-preserving in cloud. 2007-2020 - Jinyong Chang, Maozhi Xu, Rui Xue:
Public auditing protocol with dynamic update and privacy-preserving properties in fog-to-cloud-based IoT applications. 2021-2036 - Kaiyu Wang, Zhiying Tu, Zhenzhou Ji:
PoTA: A hybrid consensus protocol to avoid miners' collusion for BaaS platform. 2037-2056 - Dong Liang, Qinrang Liu, Binghao Yan, Ting Chen, Xingyu Liu:
Efficient loop detection and congestion-free network update for SDN. 2057-2078 - Vikramjit Singh, Krishna Pal Sharma, Harsh Kumar Verma:
ABNT: Adaptive beaconing and neighbor timeout for geographical routing in UAV networks. 2079-2100 - Kunchang Li, Yifan Yang, Shuhao Wang:
Privacy-preserving aggregate signcryption scheme with allowing dynamic updating of pseudonyms for fog-based smart grids. 2101-2115 - Arnab Mukherjee, Swagatika Sahoo, Raju Halder:
A blockchain-based integrated and interconnected hybrid platform for Smart City ecosystem. 2116-2141 - Ehsan Kiamansouri, Hamid Barati, Ali Barati:
A two-level clustering based on fuzzy logic and content-based routing method in the internet of things. 2142-2159
Volume 15, Number 5, September 2022
- Taixin Li, Xu Zhou, Shen Yan, Xiaobo Zhang:
Service function path selection methods for multi-layer satellite networks. 2161-2178 - Bahaa Hussein Taher Algubili, Neeraj Kumar, Hongwei Lu, Ali A. Yassin, Rihab Boussada, Alzahraa J. Mohammed, Huiyu Liu:
EPSAPI: An efficient and provably secure authentication protocol for an IoT application environment. 2179-2198 - B. Gopalakrishnan, P. Purusothaman:
A new design of intrusion detection in IoT sector using optimal feature selection and high ranking-based ensemble learning model. 2199-2226 - Anqi Yu, Nuo Wang:
Scale-free networks: evolutionary acceleration of the network survivability and its quantification. 2227-2239 - Gordhan Jethava, Udai Pratap Rao:
A novel defense mechanism to protect users from profile cloning attack on Online Social Networks (OSNs). 2253-2269 - Xiaodong Yang, Tian Tian, Jiaqi Wang, Caifen Wang:
Blockchain-based multi-user certificateless encryption with keyword search for electronic health record sharing. 2270-2288 - Roshani V. Bhaskarwar, Dnyandeo J. Pete:
Energy efficient clustering with compressive sensing for underwater wireless sensor networks. 2289-2306 - Noureddine Moussa, Sondès Khemiri-Kallel, Abdelbaki El Belrhiti El Alaoui:
Fog-assisted hierarchical data routing strategy for IoT-enabled WSN: Forest fire detection. 2307-2325 - Parisa Goudarzi, Amir Masoud Rahmani, Mohammad Mosleh:
A Mixed-integer programming model using particle swarm optimization algorithm for resource discovery in the cloudiot. 2326-2346 - Venkatasamy Sureshkumar, S. Mugunthan, Ruhul Amin:
An enhanced mutually authenticated security protocol with key establishment for cloud enabled smart vehicle to grid network. 2347-2363 - Hua Hou, Shengke Zeng, Hongwei Li:
Privacy-preserving "Check-in Award" Service in Location-based Social Networks. 2364-2375 - Junchao Fan, Xiaolin Chang, Jelena V. Misic, Vojislav B. Misic, Hongyue Kang:
DHL: Deep reinforcement learning-based approach for emergency supply distribution in humanitarian logistics. 2376-2389 - Medikonda Asha Kiran, Syam Kumar Pasupuleti, Eswari Rajagopal:
A lightweight pairing-free ciphertext-policy attribute-based signcryption for cloud-assisted IoT. 2390-2403 - Barbara Guidi, Andrea Michienzi, Laura Ricci:
Managing communities in decentralised social environments. 2404-2429 - Haoran Zhu, Xiaolin Chang, Jelena V. Misic, Vojislav B. Misic, Runkai Yang:
Revisiting FAW attack in an imperfect PoW blockchain system. 2430-2443 - Haytham Qushtom, Jelena V. Misic, Vojislav B. Misic, Xiaolin Chang:
A high performance two-layer consensus architecture for blockchain-based IoT systems. 2444-2456
Volume 15, Number 6, November 2022
- Congcong Chen, Lifei Wei, Lei Zhang, Ya Peng, Jianting Ning:
MP-BADNet+: Secure and effective backdoor attack detection and mitigation protocols among multi-participants in private DNNs. 2457-2473 - Zhiguo Liu, Weijie Li, Jianxin Feng, Chengsheng Pan, Li Yunqi:
A regional interest-aware caching placement scheme for reducing latency in the LEO satellite networks. 2474-2487 - Yasmine Harbi, Allaoua Refoufi, Zibouda Aliouat, Saad Harous:
Improved bio-inspired security scheme for privacy-preserving in the internet of things. 2488-2502 - Weimin Gao, Jiawei Huang, Ning Jiang, Zhaoyi Li, Shaojun Zou, Zhidong He, Jian-Xin Wang:
HPLB: High precision load balancing based on in-band network telemetry in data center networks. 2503-2515 - Fan-Qi Ma, Quan-Lin Li, Yi-Han Liu, Yan-Xia Chang:
Stochastic performance modeling for practical byzantine fault tolerance consensus in the blockchain. 2516-2528 - Chang Xu, Guoxie Jin, Liehuang Zhu, Chuan Zhang, Yu Jia:
EPDL: An efficient and privacy-preserving deep learning for crowdsensing. 2529-2541 - Junying Zhang, Xindi Ma, Qi Jiang:
A geometric approach to analysing the effects of time delays on stability of vehicular platoons with ring interconnections. 2542-2556 - Sakshi Garg, Deepti Mehrotra, Hari Mohan Pandey, Sujata Pandey:
Enhancing RPL using E-MOF: a fuzzy-based mobility model for IoV. 2557-2571 - Nour El Houda Bourebia, Chunlin Li:
A greedy energy efficient clustering scheme based reinforcement learning for WSNs. 2572-2588 - Yanlin Wang, Liang Liu, Mengqi Li, Wenbin Zhai, Weihua Ma, Hang Gao:
Power level aware charging schedule in wireless rechargeable sensor network. 2589-2602 - Nabanita Das, Souvik Basu, Sipra Das Bit:
ReliefChain: A blockchain leveraged post disaster relief allocation system over smartphone-based DTN. 2603-2618 - Haitao Xu, Yuejun Sun, Jingnan Gao, Jianbo Guo:
Intelligent edge content caching: A deep recurrent reinforcement learning method. 2619-2632 - Xiaohua Wu, Jinpeng Chang, Hongji Ling, Xueqi Feng:
Scaling proof-of-authority protocol to improve performance and security. 2633-2649 - Priyanka Gaba, Ram Shringar Raw:
B-VANET: A blockchain-based vehicular ad-hoc network for data validation. 2650-2669 - Ankita Srivastava, Pramod Kumar Mishra:
Multi-attributes based energy efficient clustering for enhancing network lifetime in WSN's. 2670-2693 - Satinder Singh Mohar, Sonia Goyal, Ranjit Kaur:
Optimum deployment of sensor nodes in wireless sensor network using hybrid fruit fly optimization algorithm and bat optimization algorithm for 3D Environment. 2694-2718 - Jia Wu, Liao Yu, Fangfang Gou:
Data transmission scheme based on node model training and time division multiple access with IoT in opportunistic social networks. 2719-2743 - Chengxiao Yu, Wei Quan, Kang Liu, Mingyuan Liu, Ziheng Xu, Hongke Zhang:
Deep reinforcement learning-based fountain coding for concurrent multipath transfer in high-speed railway networks. 2744-2756
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.