default search action
Peer-to-Peer Networking and Applications, Volume 17
Volume 17, Number 1, January 2024
- Judy Simon, M. Aarthi Elaveini, Nellore Kapileswar, Phani Kumar Polasi:
ARO-RTP: Performance analysis of an energy efficient opportunistic routing for underwater IoT networks. 1-17 - Xuhang Jiang, Yujue Wang, Yong Ding, Zhenyu Li, Huiyong Wang, Hai Liang:
Semi-shadow file system: An anonymous files storage solution. 18-32 - Kunpeng Wang, Jingmei Li, Weifei Wu:
A novel transfer extreme learning machine from multiple sources for intrusion detection. 33-47 - Wenbo Zhang, Xiaotong Huo, Zhenshan Bao:
An alliance chain-based incentive mechanism for PSG data sharing. 48-67 - Chahrazed Benrebbouh, Houssem Mansouri, Sarra Cherbal, Al-Sakib Khan Pathan:
Enhanced secure and efficient mutual authentication protocol in IoT-based energy internet using blockchain. 68-88 - S. Rajasoundaran, Sripathi Venkata Naga Santhosh Kumar, Munuswamy Selvi, Arputharaj Kannan:
Reactive handover coordination system with regenerative blockchain principles for swarm unmanned aerial vehicles. 89-114 - Haoxiang Wang, Weidong Yang, Wei Wei:
Efficient algorithms for urban vehicular Ad Hoc networks quality based on average network flows. 115-124 - Ming Luo, Xinhuang Zhou, Minrong Qiu:
A revocable anonymous cross-domain communication scheme for smart grid based on ring signcryption. 125-138 - Sapna Jha, Aditya Trivedi, K. K. Pattanaik, Himanshu Gauttam, Paolo Bellavista:
Efficient data harvesting from boundary nodes for smart irrigation. 139-162 - D. Udaya Suriya Rajkumar, Shanmugaraja P, K. Arunkumar, Sathiyaraj R, Manivannan P:
A HSEERP - Hierarchical secured energy efficient routing protocol for wireless sensor networks. 163-175 - Komuraiah Bejjam, M. S. Anuradha:
A New Trust-Based Optimal Stochastic Data Scheduling for Wireless Sensor Networks. 176-199 - Ta Minh Thanh, Tien Quyet Do:
A study on gas cost of ethereum smart contracts and performance of blockchain on simulation tool. 200-212 - Jing Zhang, Jian-Yu Hu, Liwei Lin, Xiucai Ye:
Attribute and closeness based scheduling model for vehicle-to-grid network. 213-226 - Fang Li, Hang Shen, Jieai Mai, Tianjing Wang, Yuanfei Dai, Xiaodong Miao:
Pre-trained language model-enhanced conditional generative adversarial networks for intrusion detection. 227-245 - Yanjun Liu, Hongwei Li, Meng Hao:
SVFGNN: A privacy-preserving vertical federated graph neural network model training framework based on split learning. 246-260 - Yibin Zhang, Jinlong Sun, Guan Gui, Yun Lin, Haris Gacanin, Hikmet Sari, Fumiyuki Adachi:
Attention mechanism based intelligent channel feedback for mmWave massive MIMO systems. 261-283 - Songshou Dong, Yanqing Yao, Yihua Zhou, Yu-Guang Yang:
A lattice-based unordered certificateless aggregate signature scheme for cloud medical health monitoring system. 284-296 - Parisa Rahmani, Mohamad Arefi:
Improvement of energy-efficient resources for cognitive internet of things using learning automata. 297-320 - Vinod Kumar Mahor, R. Padmavathy, Santanu Chatterjee:
Secure and lightweight authentication protocol for anonymous data access in cloud assisted IoT system. 321-336 - Jay Gandhi, Zunnun Narmawala:
A case study on the estimation of sensor data generation in smart cities and the role of opportunistic networks in sensor data collection. 337-357 - Leyou Yang, Jie Jia, Jian Chen, Xingwei Wang:
Joint power allocation and blocklength assignment for reliability optimization in CA-enabled HetNets. 358-372 - Patruni Muralidhara Rao, Bakkiam David Deebak:
Lightweight two-factor authentication framework with privacy preserving for smart eHealth. 373-396 - Himadry Sekhar Roy, Prakash Dey, Sandip Kumar Mondal, Avishek Adhikari:
Cryptanalysis of full round FUTURE with multiple biclique structures. 397-409 - Zahra Seyedi, Farhad Rahmati, Mohammad Ali, Ximeng Liu:
Verifiable and privacy-preserving fine-grained data management in vehicular fog computing: A game theory-based approach. 410-431 - Rituparna Paul, Shanvendra Rai, Subhasish Banerjee, Preetisudha Meher:
A Robust Smart Card based Authentication and Key Agreement Scheme for WSN using Fuzzy Extractor. 432-450 - Disuja Kumari, Karan Singh:
Lightweight secure authentication and key agreement technique for smart grid. 451-478 - Menas Ebrahim Eissa, M. A. Mohamed, Mohamed Maher Ata:
A robust supervised machine learning based approach for offline-online traffic classification of software-defined networking. 479-506 - Sepideh Niktabe, Arash Habibi Lashkari, Arousha Haghighian Roudsari:
Unveiling DoH tunnel: Toward generating a balanced DoH encrypted traffic dataset and profiling malicious behavior using inherently interpretable machine learning. 507-531 - Xi Liu, Jun Liu:
A truthful mechanism for multi-access multi-server multi-task resource allocation in mobile edge computing. 532-548 - N. Nandini Devi, Surmila Thokchom, Gautam Srivastava, Rutvij H. Jhaveri, Diptendu Sinha Roy:
Demcrp-et: decentralized multi-criteria ranked prosumers energy trading using distributed ledger technology. 549-565 - Judy Simon, M. Aarthi Elaveini, Nellore Kapileswar, Phani Kumar Polasi:
Correction to: ARO-RTP: Performance analysis of an energy efficient opportunistic routing for underwater IoT networks. 566 - Junlu Wang, Su Li, Wanting Ji, Dong Li, Baoyan Song:
Author Correction to: A composite blockchain associated event traceability method for financial activities. 567-568
Volume 17, Number 2, March 2024
- Hui Xie, Jun Zheng, Teng He, Shengjun Wei, Changzhen Hu:
A blockchain-based ubiquitous entity authentication and management scheme with homomorphic encryption for FANET. 569-584 - K. Dinesh, S. V. N. Santhosh Kumar:
GWO-SMSLO: Grey wolf optimization based clustering with secured modified Sea Lion optimization routing algorithm in wireless sensor networks. 585-611 - Shijie Tang, Yong Ding, Meng Zhao, Huiyong Wang:
SAKMR: Industrial control anomaly detection based on semi-supervised hybrid deep learning. 612-623 - Haradhan Ghosh, Pramod Kumar Maurya, Satya Bagchi:
Secret sharing based RFID protocol using ECC for TMIS. 624-638 - Chunjiao Li, Liangmin Wang, Jiayi Li, Yue Fei:
CIM: CP-ABE-based identity management framework for collaborative edge storage. 639-655 - Qingquan Bian, Yue Zhang, Chang Song, Axin Wu:
Flexible symmetric predicate encryption for data privacy in IoT environments. 656-664 - Chandan Trivedi, Keyur Parmar, Udai Pratap Rao:
PGASH: Provable group-based authentication scheme for Internet of Healthcare Things. 665-684 - Min Liu, Liangliang Wang, Kai Zhang, Yu Long, Baodong Qin:
A pairing-free certificate-based key-insulated aggregate signature scheme for wireless medical sensor networks. 685-700 - Anurag Shukla, Sarsij Tripathi, Mohit Sajwan, Deepak Singh:
SEE2PK: Secure and energy efficient protocol based on pairwise key for hierarchical wireless sensor network. 701-721 - V. Sasireka, Shyamala Ramachandran:
Hybrid optimized task scheduling with multi-objective framework for crowd sensing in mobile social networks. 722-738 - Xin Su, Shengwen Wang, Renzhu Yu:
A bibliometric analysis of blockchain development in industrial digital transformation using CiteSpace. 739-755 - Xinyu Lai, Youchi Zhang, Haoxiang Luo:
A low-cost blockchain node deployment algorithm for the internet of things. 756-766 - V. Deepa, B. Sivakumar:
Heuristic-aided multi-objective function for satellite controller placement and routing in integrated satellite terrestrial network. 767-783 - D. Hemkumar:
Preserving location privacy against inference attacks in indoor positioning system. 784-799 - Xia Deng, Junbin Shao, Le Chang, Junbin Liang:
A Blockchain-based Privacy Protection Protocol using Smart Contracts in LEO satellite networks. 800-818 - Jiangshan Hao, Linghao Zhang, Yanchao Zhao:
Grouped federated learning for time-sensitive tasks in industrial IoTs. 819-833 - Gurjot Kaur, Deepti Kakkar:
DRIVE: Dual rider-remora optimization for vehicular routing. 834-857 - Tian-Fu Lee, I-Pin Chang, Jyun-Guo Wang, Yen-Chang Chen, Sheng-Tzung Tsai, Rui-Yu Chen:
Extended chaotic map-based key management for hierarchical access control in e-medicine systems. 858-870 - Yi Gong, Hongbin Liang, Lei Wang, Yiting Yao:
Anonymous credentials for the internet of vehicles. 871-880 - S. Vinu, B. Diwan:
Tangent Pelican search optimization for block assignment in blockchain based IoT. 881-895 - Wenguang Zhou, Zhiwei Jia, Chao Feng, Huali Lu, Feng Lyu, Ling Li:
Towards driver distraction detection: a privacy-preserving federated learning approach. 896-910 - G. Sahaya Stalin Jose, Sugitha G, Ayshwarya Lakshmi S, B. C. Preethi:
A multi-objective privacy preservation model for cloud security using hunter prey optimization algorithm. 911-923 - M. Anuradha, Jean Justus John, L. Mary Immaculate Sheela:
MMCNN-ZO: Modified multi-scale convolutional neural network-based zebra optimization for enhancing data encryption system. 924-943 - Xueshu Hong, Shaoyong Li, Xingkong Ma, Bo Liu, Fan Wu:
A website fingerprinting technology with time-sampling. 944-960 - Rathindra Nath Biswas, Anurup Saha, Swarup Kumar Mitra, Mrinal Kanti Naskar:
Design and implementation of anchor coprocessor architecture for wireless node localization applications. 961-984 - Xingchen Liu, Shaohui Zhang, Haiping Huang, Reza Malekian:
A trustworthy and reliable multi-keyword search in blockchain-assisted cloud-edge storage. 985-1000 - Yanming Fu, Shenglin Lu, Jiayuan Chen, Xiao Liu, Bocheng Huang:
Socially-aware and privacy-preserving multi-objective worker recruitment in mobile crowd sensing. 1001-1019 - Retraction Note: Issues of crowdsourcing and mobile app development through the intellectual property protection of third parties. 1020
Volume 17, Number 3, May 2024
- Yizhe Zhou, Xianwei Zhu, Ailin Chen, Zhouyang Zhang, Pengchong Han, Feng Zhang, Zhaoyang Han, Jiang Xu, Bo Lan:
Access control mechanism in distributed smart power plants based on blockchain and ciphertext updatable functional encryption. 1021-1035 - Venkata Bhikshapathi Chenam, Suneeth Yadav Tummala, Syed Taqi Ali:
Public key authenticated encryption with field-free subset conjunctive and disjunctive keyword search against keyword guessing attacks. 1036-1050 - V. V. Satyanarayana Kona, M. Subramoniam:
A smart Iot-based waste management system using vehicle shortest path routing and trashcan visiting decision making based on deep convolutional neural network. 1051-1074 - Guohao Li, Zhongda Tian:
A new method of network traffic prediction based on combination model. 1075-1090 - Jiaming Wang, Zhengli Zhu, Fuquang Zhang, Yanxiong Liu:
An improved salp swarm algorithm for solving node coverage optimization problem in WSN. 1091-1102 - Youcef Azzoug, Abdelmadjid Boukra:
A bio-inspired adaptive junction-based routing protocol for VANETs. 1103-1137 - Volodymyr Kharchenko, Andrii Grekhov, Vasyl Kondratiuk:
Traffic modelling in stratospheric drone-assisted VANET. 1138-1148 - Peng Xiao, Shunkun Yang, Zhenhong Zhang, Hailin Wang:
Edge-assisted and energy-efficient access control for dynamic users group in smart grids. 1149-1157 - R. Pradeep, G. Kavithaa:
Network lifetime optimization and route selection strategy towards energy enrichment in wireless body area networks. 1158-1168 - Komeil Moghaddasi, Shakiba Rajabi, Farhad Soleimanian Gharehchopogh:
An enhanced asynchronous advantage actor-critic-based algorithm for performance optimization in mobile edge computing -enabled internet of vehicles networks. 1169-1189 - Adda Boualem, Cyril De Runz, Marwane Ayaida, Hisham A. Kholidy:
Probabilistic intrusion detection based on an optimal strong K-barrier strategy in WSNs. 1190-1207 - Yawen Feng, Shengke Zeng:
Secure and flexible authorized data sharing for smart grid. 1208-1224 - Qiang Zhou, Ming Zhan, Jiangwu Zhang, Kan Yu, Fang Wu, Zhibo Pang:
Energy efficient noise error pattern generator for guessing decoding in bursty channels. 1225-1236 - K. Yesodha, M. Krishnamurthy, Munuswamy Selvi, Arputharaj Kannan:
Intrusion detection system extended CNN and artificial bee colony optimization in wireless sensor networks. 1237-1262 - Y. Rajkumar, Sripathi Venkata Naga Santhosh Kumar:
A comprehensive survey on communication techniques for the realization of intelligent transportation systems in IoT based smart cities. 1263-1308 - Farnam Honarmand, Alireza Keshavarz-Haddad:
T-AODV: A trust-based routing against black-hole attacks in VANETs. 1309-1321 - Zheng Yang, Hua Zhu, Chunlin Yin, Zhidong Xie, Wei Chen, Cheng Chen:
Lightweight privacy-enhanced secure data sharing scheme for smart grid. 1322-1334 - Zahra Naderi, Seyed Pooya Shariatpanahi, Behnam Bahrak:
A novel approach to alleviate wealth compounding in proof-of-stake cryptocurrencies. 1335-1343 - Shanthi Govindaraj, L. Raja, S. Velmurugan, K. Vijayalakshmi:
Extreme learning machine optimized by artificial cell swarm optimization for the data fusion modal in WSNs. 1344-1357 - Faraz Masood, Arman Rasool Faridi:
Developing a novel blockchain-based vaccine tracking and certificate system: An end-to-end approach. 1358-1376 - Wajih Abdallah, Sami Mnasri, Thierry Val:
Centralized and distributed approaches of Artificial Bee Colony algorithm and Delaunay Triangulation for the coverage in IoT networks. 1377-1402 - Ayes Chinmay, Hemanta Kumar Pati:
Voice over WiFi cell capacity enhancement using A-MPDU frame aggregation in WLAN standard. 1403-1421 - Bo Ma, Qin Lu, Xuxin Fang, Junhu Liao, Haoyue Liu, Zebin Chen, Chuanhuang Li:
ARGCN: An intelligent prediction model for SDN network performance. 1422-1441 - Y. Rajkumar, Sripathi Venkata Naga Santhosh Kumar:
A lightweight privacy preserving distributed certificate-less aggregate based mutual authentication scheme for vehicular adhoc networks. 1442-1466 - N. Sakthipriya, Govindasamy Vaiyapuri, Akila Venkatesan:
Security-aware IoT botnet attack detection framework using dilated and cascaded deep learning mechanism with conditional adversarial autoencoder-based features. 1467-1485 - Shashank Singh, Veena Anand, Sonal Yadav:
Trust-based clustering and routing in WSNs using DST-WOA. 1486-1498 - Yihuai Liang, Yan Li, Byeong-Seok Shin:
A blockchain-based platform for decentralized trusted computing. 1499-1513 - Yao Li, Xingshu Chen, Wenyi Tang, Bingyu Chen:
A green computing method for encrypted IoT traffic recognition based on traffic fingerprint graphs. 1514-1526 - R. Anirudh Reddy, N. Venkatram:
Intelligent energy efficient routing in wireless body area network with mobile sink nodes using horse electric fish optimization. 1527-1551 - Shreedhar Yadawad, S. M. Joshi:
Efficient energy consumption and fault tolerant method for clustering and reliable routing in wireless sensor network. 1552-1568 - Xiaohui Yang, Kun Zhang, Kai Jia, Peiyin Zhao:
A personalized and efficient EMR sharing and management scheme based on smart contracts. 1569-1587 - S. Syed Jamaesha, R. Sarath Kumar, M. S. Gowtham:
Cluster based hybrid optimization and kronecker gradient factored approximate optimum path curvature network for energy efficiency routing in WSN. 1588-1609 - Rashmi Raj, Mohona Ghosh:
A blockchain based lightweight and secure access control framework for IoT-enabled supply chain. 1610-1630 - Hang Shen, Beining Zhang, Tianjing Wang, Xin Liu, Guangwei Bai:
Consortium blockchain-based secure cross-operator V2V video content distribution. 1631-1644 - Yuvaraj Rajendra, Venkatesan Subramanian, Sandeep Kumar Shukla:
Sybil attack detection in ultra-dense VANETs using verifiable delay functions. 1645-1666 - Meng Huang, Hanming Li, Yina Zhou, Ting Ma, Jinshan Su, Haibo Zhou:
A UAV aided lightweight target information collection and detection approach. 1667-1681 - Su Li, Haolin Zhang, Ze Chen, Junlu Wang, Baoyan Song:
Enterprise Composite Blockchain Double Layer Consensus Algorithm Based on Improved DPoS and BFT. 1682-1701 - Yu Sun, Yanyi Wang, Gaoxiang Jiang, Bo Cheng, Haibo Zhou:
Deep learning-based power usage effectiveness optimization for IoT-enabled data center. 1702-1719 - Zhuo Li, Yashi Dang, Xin Chen:
Node selection for model quality optimization in hierarchical federated learning based on deep reinforcement learning. 1720-1731 - Anirban Tarafdar, Azharuddin Sheikh, Pinki Majumder, Abhijit Baidya, Alak Majumder, Bidyut K. Bhattacharyya, Uttam Kumar Bera:
Enhancing intrusion detection using wireless sensor networks: A novel ahp-madm aggregated multiple type 3 fuzzy logic-based k-barriers prediction system. 1732-1749 - Xuejiao Liu, Chuanhua Wang, Lingfeng Huang, Yingjie Xia:
ARSL-V: A risk-aware relay selection scheme using reinforcement learning in VANETs. 1750-1767 - Gaurav Goel, Rajeev Tiwari:
IGWOA: Improved Grey Wolf optimization algorithm for resource scheduling in cloud-fog environment for delay-sensitive applications. 1768-1790 - Malle Gopal, T. Velmurugan:
Efficient hybrid resource allocation for uplink and downlink device-to-device underlay communication in 5G and beyond wireless networks. 1791-1811
Volume 17, Number 4, July 2024
- Kirti Bala, Pankaj Deep Kaur:
Social relation based DAG blockchain inspired healthcare of livestock. 1-21 - Binthiya A, Selvi Ravindran:
Intelligent fuzzy logic based intrusion detection system for effective detection of black hole attack in WSN. 1813-1829 - R. Shanmugapriya, Santhosh Kumar SVN:
An energy efficient Swan Intelligent based Clustering Technique (SICT) with fuzzy based secure routing protocol in IoT. 1830-1864 - Jinsung Kim, Eunsam Kim:
Supporting efficient video file streaming in P2P cloud storage. 1865-1884 - J. Sangeethapriya, Michael Arock, U. Srinivasulu Reddy:
Secured Frank Wolfe learning and Dirichlet Gaussian Vicinity based authentication for IoT edge computing. 1885-1897 - Xingguang Zhou, Weihan Li, Lin Zhong:
A supervised privacy preservation transaction system for aviation business. 1898-1913 - Liang Wang, Wenying Zhou, Lina Zuo, Haibo Liu, Wenchi Ying:
ONMCA: One-Network-Multi-Chain Architecture for customizable asset-oriented blockchain systems. 1914-1933 - S. Kishore Verma, K. Lokeshwaran, J. Martin Sahayaraj, J. S. Adeline Johnsana:
Energy efficient multi-objective cluster-based routing protocol for WSN using Interval Type-2 Fuzzy Logic modified dingo optimization. 1934-1962 - Guangfu Wu, Xin Lai, Daojing He, Sammy Chan, Xiaoyan Fu:
Improving byzantine fault tolerance based on stake evaluation and consistent hashing. 1963-1975 - Rishikesh, Ditipriya Sinha:
Bsfra: Blockchain based smart forward-reverse agrichain. 1976-2000 - Zhi-Yuan Li, Zeng-Xiang Zhang:
Deep reinforcement learning-based joint optimization model for vehicular task offloading and resource allocation. 2001-2015 - R. Prabha, G. A. Senthil, G. P. Bharathi, S. Sridevi:
Hybrid Multipath Routing Cluster head prediction based on SDN-enabled IoT and Heterogeneous context-aware graph convolution network. 2016-2030 - Guanglu Wei, Kai Fan, Kuan Zhang, Haoyang Wang, Yirui Wang, Kan Yang, Hui Li, Yintang Yang:
Lower rounds lattice-based anonymous AKA under the seCK model for the IoT. 2031-2046 - Jun Ge, Lei-lei Shi, Lu Liu, Zixuan Han, Anthony Miller:
DIEET: Knowledge-Infused Event Tracking in Social Media based on Deep Learning. 2047-2064 - M. S. Minu, P. Jona Innisai Rani, Vijaya Krishna Sonthi, G. Shankar, Mohan Ellappan, A. Rajesh:
An innovative privacy preservation and security framework with fog nodes in enabled vanet system using hybrid encryption techniques. 2065-2089 - Ishita Seth, Kalpna Guleria, Surya Narayan Panda:
A comprehensive review on vehicular ad-hoc networks routing protocols for urban and highway scenarios, research gaps and future enhancements. 2090-2122 - Yang Ning, Li Xiang, Hongyuan Jing, Xinna Shang, Shen Ping, Aidong Chen:
Insulator defect detection in complex scenarios based on cascaded networks with lightweight attention mechanism. 2123-2136 - Asif Iqbal Middya, Sarbani Roy:
Truthful double auction based incentive mechanism for participatory sensing systems. 2137-2166 - Ming Zhang, Yutong Liu, Qian Cheng, Hui Li, Dan Liao, Huiyong Li:
Smart grid security based on blockchain and smart contract. 2167-2184 - Ali Shamekhi, Pirooz Shamsinejad Babaki, Reza Javidan:
An intelligent behavioral-based DDOS attack detection method using adaptive time intervals. 2185-2204 - Rafiq Ullah, Amjad Mehmood, Muhammad Altaf Khan, Carsten Maple, Jaime Lloret:
An optimal secure and reliable certificateless proxy signature for industrial internet of things. 2205-2220 - Qixu Wang, Peng Xiao, Xiang Li, Yunxiang Qiu, Tao Zheng, Zhiguang Qin:
Taas: Trust assessment as a service for secure communication of green edge-assisted UAV network. 2221-2236 - Tripti Sharma, Sanjeev Kumar Prasad:
Enhancing cybersecurity in IoT networks: SLSTM-WCO algorithm for anomaly detection. 2237-2258 - Badiea Abdulkarem Mohammed, Mahmood A. Al-Shareeda, Abeer Abdullah Alsadhan, Zeyad Ghaleb Al-Mekhlafi, Amer A. Sallam, Bassam Ali Al-Qatab, Mohammad T. Alshammari, Abdulaziz M. Alayba:
Service based VEINS framework for vehicular Ad-hoc network (VANET): A systematic review of state-of-the-art. 2259-2281 - S. Saravanan, V. Surya, V. Valarmathi, E. Nalina:
Enhancing IoT security in MANETs: A novel adaptive defense reinforcement approach. 2282-2297 - Arian Arabnouri, Alireza Shafieinejad:
BACASE-SH: Blockchain-based authenticated certificate-less asymmetric searchable encryption for smart healthcare. 2298-2314 - Ankita Srivastava, Pramod Kumar Mishra:
IDA: Improved dragonfly algorithm for load balanced cluster heads selection in wireless sensor networks. 2315-2333 - Zixuan Han, Lei-lei Shi, Lu Liu, Liang Jiang, Wan Tang, Xiao Chen, Jing-yu Yang, Ayodeji Ayorinde, Nick Antonopoulos:
H-Louvain: Hierarchical Louvain-based community detection in social media data streams. 2334-2353 - Majd Latah, Kübra Kalkan:
HostSec: A blockchain-based authentication framework for SDN hosts. 2354-2370 - Nidhi Kashyap, Shuchita Upadhyaya, Monika Poriye, Sachin Lalar, Shalini Aggarwal:
Assessing the efficacy of a novel adaptive fuzzy c-means (AFCM) based clustering algorithm for mobile agent itinerary planning in wireless sensor networks using validity indices. 2371-2383 - G. Bavani, Prasanna Srinivasan V., Balasubadra K., Velankanni Cyril Raj:
Improving NB-IoT performance in weak coverage areas with CBSTO polar coding and LMMSE channel estimation. 2384-2396 - Chandan Goswami, Avishek Adhikari, Suraj Kumar Sahoo, Pinaki Sarkar:
Authenticated key agreement for IoT network using HECC and CRT four co-primes. 2397-2414 - Chandra Priya Jayabal, Praveen Ramalingam, K. Nivitha, T. Sudhakar:
Improved blockchain-based user authentication protocol with ring signature for internet of medical things. 2415-2434 - Kun Lu, Guorui Xu, Runfa Zhang, Mingchu Li, Rongda Li:
DDPG-based optimal task placement strategy for computation offloading in green mobile edge networks. 2435-2449 - Senthilraja P, Kanmani Palaniappan, Brindha Duraipandi, Uma Maheswari Balasubramanian:
Dynamic behavioral profiling for anomaly detection in software-defined IoT networks: A machine learning approach. 2450-2469 - Jie Zhu, Kaiyu Guo, Pengfei He, Haiping Huang, Reza Malekian, Yuzhong Sun:
An effective trajectory planning heuristics for UAV-assisted vessel monitoring system. 2491-2506 - Pengbiao Zhao, Bintao Wang, Zhen Qin, Yi Ding, Kim-Kwang Raymond Choo:
A privacy protection scheme for green communication combining digital steganography. 2507-2522 - Xiaoyu Kou, Fengwei Wang, Hui Zhu, Yandong Zheng, Xiaopeng Yang, Zhe Liu:
Masked image: Visually protected image dataset privacy-preserving scheme for convolutional neural networks. 2523-2537 - K. Ravivarma, B. Lokeshgupta:
A peer-to-peer energy trading model for community microgrids with energy management. 2538-2554 - Saba Marandi, Farokhlagha Moazami, Amir Malekinezhad:
A lightweight and anonymous mutual authentication and key agreement scheme for WBAN. 2555-2571 - Pradeep Radhakrishnan, Praveen Kumar Sugumar, Preethi Ponnan, Gopirajan Punniyakotti Varadharajan:
Certificate-less Aggregate Signature Authentication Scheme (CLASAS) for secure and efficient data transmission in Wireless Sensor Networks (WSNs). 2572-2594 - Beining Zhang, Hang Shen, Tianjing Wang, Guangwei Bai:
Invisible man: blockchain-enabled peer-to-peer collaborative privacy games in LBSs. 2595-2607
Volume 17, Number 5, September 2024
- K. Dinesh, S. V. N. Santhosh Kumar:
HBO-SROA: Honey Badger optimization based clustering with secured remora optimization based routing algorithm in wireless sensor networks. 2609-2636 - Xiuwu Yu, Wei Peng, Zixiang Zhou, Ke Zhang, Yong Liu:
An IMOA DV-Hop localization algorithm in WSN based on hop count and hop distance correction. 2637-2650 - Tingping Zhang, Yuanjun Xiong, Shixin Jiang, Pingxi Dan, Guan Gui:
Small target disease detection based on YOLOv5 framework for intelligent bridges. 2651-2660 - B. Sriman, S. Ganesh Kumar:
Efficient non-interactive zero-knowledge proofs for quantum range verification in blockchain. 2661-2674 - S. Ramya, Manivannan Doraipandian, Rengarajan Amirtharajan:
SLAKA_CPS: Secured lightweight authentication and key agreement protocol for reliable communication among heterogenous devices in cyber-physical system framework. 2675-2691 - Ozgur Oksuz:
Consortium blockchain based secure and efficient data aggregation and dynamic billing system in smart grid. 2717-2736 - Chandra Prabha Kaliappan, Kanmani Palaniappan, Devipriya Ananthavadivel, Ushasukhanya Subramanian:
Advancing IoT security: a comprehensive AI-based trust framework for intrusion detection. 2737-2757 - Dingari Kalpana, P. Ajitha:
A hybrid heuristic-assisted deep learning for secured routing and malicious node detection in wireless sensor networks. 2758-2780 - Omid Tasbaz, Bahar Farahani, Vahideh Moghtadaiee:
Feature fusion federated learning for privacy-aware indoor localization. 2781-2795 - M. Vijay Anand, Anand Krishnamurthy, Karuppiah Subramanian, Saravanan Raju:
Advancing security and efficiency in MANET using dynamic algorithm switching. 2796-2809 - Jing Cai, Haihui Huang, Chuang Ma, Jun Liu:
A blockchain-based privacy protecting framework with multi-channel access control model for asset trading. 2810-2829 - Oroos Arshi, Akanksha Rai, Gauri Gupta, Jitendra Kumar Pandey, Surajit Mondal:
IoT in energy: a comprehensive review of technologies, applications, and future directions. 2830-2869 - Chunhua Jin, Yongliang Xu, Wenyu Qin, Jie Zhao, Ge Kan, Fugeng Zeng:
A blockchain-based auditable deduplication scheme for multi-cloud storage. 2870-2883 - Pengzhou Cheng, Lei Hua, Haobin Jiang, Gongshen Liu:
LSF-IDM: Deep learning-based lightweight semantic fusion intrusion detection model for automotive. 2884-2905 - Xing Zhang, Min Yang, Jian Chen, Tianning Li, Changda Wang:
RAB: A lightweight block cipher algorithm with variable key length. 2906-2920 - M. Ramesh Kumar, Pradeep Sudhakaran:
Securing IoT networks: A robust intrusion detection system leveraging feature selection and LGBM. 2921-2943 - U. Nandhini, S. V. N. Santhosh Kumar:
An improved Harris Hawks optimizer based feature selection technique with effective two-staged classifier for network intrusion detection system. 2944-2978 - J. Vellingiri, T. R. Vedhavathy, S. Senthil Pandi, C. Bala Subramanian:
Fuzzy logic and CPSO-optimized key management for secure communication in decentralized IoT networks: A lightweight solution. 2979-2997 - Vijay Nandal, Sunita Dahiya:
Cluster based hybrid flamingo hazelnut tree with improved marine predators for fault tolerant energy efficient routing in wireless sensor network. 2998-3024 - Toan-Thinh Truong, Minh-Triet Tran, Anh Duc Duong:
A secure user authentication scheme for crypto-wallet in IoT environment. 3025-3048 - S. Jayashree, S. V. N. Santhosh Kumar:
PFCAS - Paring free certificate less aggregate scheme for ensuring efficient authentication in vehicular Ad-hoc networks. 3049-3079 - P. Karpurasundharapondian, M. Selvi:
A comprehensive survey on optimization techniques for efficient cluster based routing in WSN. 3080-3093 - Runze Wu, Baocang Wang, Zhen Zhao:
Privacy-preserving medical diagnosis system with Gaussian kernel-based support vector machine. 3094-3109 - Fangfang Gou, Jia Wu:
Optimization of edge server group collaboration architecture strategy in IoT smart cities application. 3110-3132 - Jing Qin, Zhiguang Qin, Peng Xiao:
BranchFusionNet: An energy-efficient lightweight framework for superior retinal vessel segmentation. 3133-3145 - Qinglei Kong, Yifan Wang, Maode Ma, Xiaodong Qu, Haiyong Bao:
A secure location management scheme in an LEO-satellite network with dual-mobility. 3146-3158 - Ashutosh Kumar Rao, Kapil Kumar Nagwanshi, Manoj Kumar Shukla:
An optimized secure cluster-based routing protocol for IoT-based WSN structures in smart agriculture with blockchain-based integrity checking. 3159-3181 - Wenju Xu, Xin Li, Yunxuan Su, Baocang Wang, Wei Zhao:
Verifiable privacy-preserving cox regression from multi-key fully homomorphic encryption. 3182-3199 - Maros Baumgartner, Ján Papaj, Natalia Kurkina, L'ubomír Dobos, Anton Cizmar:
Resilient enhancements of routing protocols in MANET. 3200-3221 - Peiqiang Li, Guojun Wang, Xiaofei Xing, Jinyao Zhu, Wanyi Gu, Guangxin Zhai:
A smart contract vulnerability detection method based on deep learning with opcode sequences. 3222-3238 - Nabanita Das, Souvik Basu, Sipra Das Bit:
Incentive minimization using energy and buffer efficient routing protocol over Blockchain enabled DTN. 3239-3254 - Kai Zhang, Ludan Lu, Jian Zhao, Lifei Wei, Jianting Ning:
Secure multi-asks/bids with verifiable equality retrieval for double auction in smart grid. 3255-3268 - Yuvaraj Renu, Velliangiri Sarveshwaran:
Secure communication routing and attack detection in UAV networks using Gannet Walruses optimization algorithm and Sheppard Convolutional Spinal Network. 3269-3285 - Man Gun Ri, Il Gwang Kim, Se Hun Pak, Nam Jun Jong, Song Jo Kim:
An integrated MCDM-based charging scheduling in a WRSN with multiple MCs. 3286-3303 - Jiajun Sun:
Online budget-limited pricing incentives for remote mobile sensing. 3304-3313 - Vikas Tyagi, Samayveer Singh:
MS-EAR: A mobile sink based energy aware routing technique for SDN enabled WSNs. 3314-3334 - Sunil Kumar Kammula, Deepak Singh, Veena Anand:
Dcaro: Dynamic cluster formation and AUV-aided routing optimization for energy-efficient UASNs. 3335-3352 - Rupinder Kaur, Sonia Goyal:
Flexible localization protocol for underwater wireless sensor networks using hybrid reward evaluation scheme. 3353-3368 - Tae Hoon Kim, Moez Krichen, Meznah A. Alamro, Alaeddine Mihoub, Gabriel Avelino R. Sampedro, Sidra Abbas:
Exploiting smartphone defence: a novel adversarial malware dataset and approach for adversarial malware detection. 3369-3384 - Zhendong Wang, Xin Yang, Zhiyuan Zeng, Daojing He, Sammy Chan:
A hierarchical hybrid intrusion detection model for industrial internet of things. 3385-3407 - K. Rajkumar, B. Paramasivan:
Energy Efficient Routing Mechanism Based on Similarity Guided Graph Neural Network and Decision Tree with Golden Eagle Optimization in VSN. 3408-3423 - S. Shiny, M. Marsaline Beno:
Dynamic load scheduling and power allocation for energy efficiency and cost reduction in smart grids: An RL-SAL-BWO approach. 3424-3444 - Chunyan Liu, Tao Feng:
Blockchain based multi-signature smart contract electronic seal orienting mobile IoT terminals. 3445-3458 - Xiaodong Yang, Lizhen Wei, Songyu Li, Xiaoni Du, Caifen Wang:
Proxy re-signature scheme with cryptographic reverse firewall for medical data security. 3459-3475 - Yunyi Fang, Xiaopeng Yang, Hui Zhu, Wei Xu, Yandong Zheng, Xingdong Liu, Dong Zhang:
Enhancing paillier to fully homomorphic encryption with semi-honest TEE. 3476-3488 - Haonan Wang, Jingyu Wang, Lixin Liu, Yu Lu:
Temporary relay: A more flexible way to cross chains. 3489-3504 - Pradeep Radhakrishnan, Praveen Kumar Sugumar, Preethi Ponnan, Gopirajan Punniyakotti Varadharajan:
Correction to: Certificate-less Aggregate Signature Authentication Scheme (CLASAS) for secure and efficient data transmission in Wireless Sensor Networks (WSNs). 3505
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.