Transactions on Emerging Telecommunications Technologies, Volume 34 (original) (raw)



default search action
- combined dblp search
- author search
- venue search
- publication search
Authors:
- no matches

Venues:
- no matches

Publications:
- no matches



jump to

SPARQL queries 
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Volume 34, Number 1, January 2023
SURVEY ARTICLES
RESEARCH ARTICLES

Shweta Kukade
, Mukul S. Sutaone, Rajendrakumar A. Patil
:
Uplink transmission with multiuser scheduling in non-stand-alone cellular network using virtual MIMO system.

Drakshayini Melkote NanjundaShetty
, Manjunath R. Kounte
:
Estimation of Rayleigh flat channel coefficients using deep learning.

Ramamoorthy Karthikeyan
, Venkatachalam Balamurugan, Robin Cyriac
, B. Sundaravadivazhagan:
COSCO2: AI-augmented evolutionary algorithm based workload prediction framework for sustainable cloud data centers.

Chandini Avula Gopalakrishna, Prabhugoud I. Basarkod:
An efficient lightweight encryption model with re-encryption scheme to create robust blockchain architecture for COVID-19 data.

Viswanadham Baby Koti Lakshmi Aruna
, Chitra Ekambaram
, Mididoddi Padmaja
:
Field programmable gate array implementation of an adaptive filtering based noise reduction and enhanced compression technique for healthcare applications.

Amrutanshu Panigrahi
, Ajit Kumar Nayak
, Rourab Paul
:
Smart contract assisted blockchain based public key infrastructure system.

Peng Wei
, Ruimin Lu, Ganhua Ye, Shijun Xie, Ruidong Wang
:
Channel synchronization based on deep learning.

Kehinde Oluwasesan Odeyemi, Pius Adewale Owolawi, Oladayo Olufemi Olakanmi:
Secure transmission in smart grid dynamic wide area network by exploiting full-duplex jamming scheme.

Mevlüt Ersoy
, Remzi Gürfidan
:
Blockchain-based asset storage and service mechanism to metaverse universe: Metarepo.

Samad Fazeli, Soroush Akhlaghi
:
On the secrecy rate balancing problem of two-way multiple-input multiple-output relaying networks using rank-1 beamforming strategy.

Uddeshaya Kumar, Manish Garg
, Saru Kumari
, Dharminder Dharminder
:
A construction of post quantum secure and signal leakage resistant authenticated key agreement protocol for mobile communication.

Ahmed Al Amin
, Soo Young Shin
:
Performance evaluation of cooperative-nonorthogonal multiple access-based improved hybrid simultaneous wireless information and power transfer protocol.

Sulaiman Saleem Patel
, Tahmid Quazi
:
A multiple-input, multiple-output broadcasting system with space, time, polarization, and labeling diversity.

P. Velmurugadass, S. Dhanasekaran, S. Shasi Anand, V. Vasudevan:
Quality of Service aware secure data transmission model for Internet of Things assisted wireless sensor networks.

Danilo Renato de Assis
, Joilson Alves Junior, Emílio Carlos Gomes Wille:
Strategies to increase connectivity and performance of VANETs: Analysis of route lifetime and routing protocol proposal.

Yanfei Xu
, Adil Hussein Mohammed:
An energy-aware resource management method in cloud-based Internet of Things using a multi-objective algorithm and crowding distance.

Shuang Yao
, Dawei Zhang
:
BPRT: A blockchain-based privacy-preserving transaction scheme based on an efficient broadcast encryption with personalized messages.

Mostafa M. Abdelhakam, Mahmoud M. Elmesalawy
, Ibrahim I. Ibrahim, Samir G. Sayed:
Two-timescale optimization approach for coordinated multi-point design in unmanned aerial vehicle-assisted cellular networks.

Deepan Nagarajan
, Rebekka Balakrishnan:
Intelligent reflecting surface empowered WPCN system over generalized fading channels: Performance analysis and optimization.

Muhammet Kirik
, Jehad M. Hamamreh
:
A novel interference signal superposition algorithm for providing secrecy to subcarrier number modulation-based orthogonal frequency division multiplexing systems.

Mengtian Wen
, Zhe Zhang, Jianxin Chen, Xin Wei, Mingkai Chen
:
Power control and resource allocation for return on investment maximization in cross-modal communications.
Volume 34, Number 2, February 2023
RESEARCH ARTICLES

Rajasekar Deepa
, Revathi Venkataraman:
Efficient target monitoring with fault-tolerant connectivity in wireless sensor networks.

Samayveer Singh
, Mohit Kumar
, Om Prakash Verma
, Rajeev Kumar
, Sukhpal Singh Gill
:
An IIoT based secure and sustainable smart supply chain system using sensor networks.

Oshin Rawlley
, Shashank Gupta:
Artificial intelligence-empowered vision-based self driver assistance system for internet of autonomous vehicles.

Haowei Wu, Fengjiao Huang, Pei Xiao
, Ke Fang, Jinglan Ou:
Secrecy satellite-terrestrial downlink transmissions against randomly located eavesdroppers.

Ali Asghar Ansari, Mohsen Eslami
, Mohammad Javad Dehghani
:
Pricing-based power allocation in cloud radio access network with multiple access technology selection.

Yuan Zhang
, Peng Du:
Parallel minimum mean square error equalization for reduced-zero-padding orthogonal time frequency space with the aid of unitary precoding.

Pradheep T. Rajan B
, N. Muthukumaran
:
Grey neural network channel estimation and RBFNN hybrid precoding schemes for the multi user millimeter wave massive MIMO.

Malathy Navaneetha Krishnan, Revathi Thiyagarajan
:
Entropy-based complex proportional assessment for efficient task scheduling in fog computing.

Osama S. Faragallah
, Hala S. El-sayed
, Mohamed G. El-Mashed:
Hybrid precoding design for MmWave multi-user massive MIMO systems under high mobility.

Vanitha M
, Sujatha Jamuna Anand
, Radhamani V, N. R. Rajalakshmi:
Dual-channel capsule generation adversarial network based blockchain technology for a secured dynamic optimal routing in mobile ad hoc network.

Adelcio M. de Souza
, Caio L. M. P. Plazas
, Daniel R. Celino
, Murilo Araújo Romero
:
Double-RSOA colorless WDM-PON for 5G fronthaul applications.

Chao Liu, Shuai Liu, Amjad Osmani:
An ensemble clustering method based on consistency cluster consensus approach and MapReduce model.

Xin Song
, Jiahui Zhu
, Runfeng Zhang
, Mingjv Peng
, Siyang Xu
:
Adaptive secure transmission for two-way energy harvesting relay networks with two-sided eavesdropping.

Mohsen Sheikh-Hosseini
, Mohammad Hasheminejad
, Farhad Rahdari
:
Linear precoder design for peak-to-average power ratio reduction of generalized frequency division multiplexing signal using gradient descent methods.

Meet Kumari
, Yogendra Narayan
, Vivek Arya:
Design and investigation of hybrid PON-FSO system employing modified NZCC code under distinct weather conditions.

Ruidong Wang
, Shilian Wang, Wei Zhang:
Joint power and hopping rate adaption against follower jammer based on deep reinforcement learning.

Jun Wu
, Pei Li, Jianrong Bao:
Optimal sequential decision rule for cooperative spectrum sensing of CUAVNs.

Haitao Xu, Zhihui Guo, Ziliang Shang, Ji Zhao, Hui Dai:
Edge server placement for offloading real-time statistics tasks of bus passenger.
SURVEY ARTICLES
Volume 34, Number 3, March 2023
RESEARCH ARTICLES

D. Salangai Nayagi, Sivasankari G. G, Vinayakumar Ravi
, K. R. Venugopal, Sankar Sennan:
Fault tolerance aware workload resource management technique for real-time workload in heterogeneous computing environment.

Yu Liu
, Xin Li, Wei Xu, Shanguo Huang:
Free-space optical communication assisted emergency communication scheme against multiple fiber link failures in low-edge-connected optical networks.

Yining Zhang, Hengsheng Zhang, Xiaokai Liu, Chenglin Zhao, Fangmin Xu
:
Digital twin-enabled deep reinforcement learning for joint scheduling of ultra-reliable low latency communication and enhanced mobile broad band: A reliability-guaranteed approach.

Fei Xu
, Jianqiang Feng
, Zhuoya Zhang
, Linpeng Ning
, Yuxi Jia
:
EdgeMesh: A hybrid distributed training mechanism for heterogeneous edge devices.

Duraimurugan Samiayya
, Jayabharathi Ramasamy, Manikandan Gunasekar
:
An efficient congestion control in multimedia streaming using adaptive BRR and fuzzy butterfly optimization.

B. Meenakshi
, D. Karunkuzhali:
Enhanced Elman spike neural network for cluster head based energy aware routing in WSN.

Michaelraj Kingston Roberts
, Jayapratha Thangavel
:
An improved optimal energy aware data availability approach for secure clustering and routing in wireless sensor networks.

Uma Meena
, Promila Sharma:
An improved blockchain based encryption scheme for secure routing in wireless sensor network using machine learning technique.

Akanksha Srivastava, Gurjit Kaur:
Cooperation and energy harvesting based spectrum sensing schemes for green cognitive radio networks.

Mesut Toka
, Eray Güven, Mehmet Akif Durmaz, Günes Karabulut-Kurt, Oguz Kucur:
Performance analyses of TAS/Alamouti-MRC NOMA in dual-hop full-duplex AF relaying networks.

C. Shanmuganathan
, K. Boopalan, G. Elangovan
, P. J. Sathish Kumar:
Enabling security in MANETs using an efficient cluster based group key management with elliptical curve cryptography in consort with sail fish optimization algorithm.

Zhi Ji:
Maximizing the energy efficiency in intelligent reflecting surface-aided unmanned aerial vehicle data collection system in presence of malicious jammers.

Pramod Kumar Aylapogu
, Kiran Kumar Gurrala:
Blind modulation classification in multiple input and output-orthogonal frequency division multiplexing using time-frequency analysis and customized convolutional neural network architecture.

Lijuan Wu, Chaoqin Gan, Zhongsen Xu, Jianqiang Hui:
(Network value)-based adaptive dynamic bandwidth allocation algorithm for 5G network slicing.

Saleh Muhammad Rubai:
Development of hyper-parameter-tuned-recurrent neural network for detection and mitigation of fraudulent resource consumption attack in cloud.

Zheng Guan, Ya Li
, Shengqian Yu, Zhijun Yang:
Deep reinforcement learning-based full-duplex link scheduling in federated learning-based computing for IoMT.

Amandeep Kumar, Balwinder Singh Dhaliwal, Damanpreet Singh:
CL-HPWSR: Cross-layer-based energy efficient cluster head selection using hybrid particle swarm wild horse optimizer and stable routing in IoT-enabled smart farming applications.

Bokka Raveendranadh
, Sadasivam Tamilselvan:
An accurate attack detection framework based on exponential polynomial kernel-centered deep neural networks in the wireless sensor network.

Xinyang Li
, Songjie Yang
, Wanting Lyu, Zhongpei Zhang
, Xiang Ling
:
Hierarchical multi-beam training with the presence of the sub-connected hybrid beamforming architecture.
SURVEY ARTICLE
Volume 34, Number 4, April 2023
SURVEY ARTICLES

Wajid Rafique
, Abdelhakim Senhaji Hafid, Junaid Qadir:
Developing smart city services using intent-aware recommendation systems: A survey.

Kirandeep Kaur, Arjan Singh, Anju Sharma
:
A systematic review on resource provisioning in fog computing.
RESEARCH ARTICLES

Ilyas Benkhaddra
, Abhishek Kumar
, Mohamed Ali Setitra
, Zine El Abidine Bensalem
, Hang Lei:
Prevention of DDoS attacks using an optimized deep learning approach in blockchain technology.

Sapir Nativ Zucker, Itsik Bergel
:
Optimal and sub-optimal rate and power allocation for random networks.

Ramalingam Praveen
, Parameswaran Pabitha
:
Improved Gentry-Halevi's fully homomorphic encryption-based lightweight privacy preserving scheme for securing medical Internet of Things.

G. Kumaresan
, K. Devi
, S. Shanthi
, Balasubramanian Muthusenthil
, Samydurai Arumugam
:
Hybrid Fuzzy Archimedes-based Light GBM-XGBoost model for distributed task scheduling in mobile edge computing.

Hiral S. Trivedi
, Sankita J. Patel:
Key-aggregate searchable encryption with multi-user authorization and keyword untraceability for distributed IoT healthcare systems.

Ipsita Sengupta, Shounak Dasgupta, Abhirup Das Barman:
Index and mode modulated orthogonal frequency division multiplexing with enhanced spectral efficiency.

Chandra Mohan Dharmapuri
, B. V. Ramana Reddy
:
Enhanced capsule generative adversarial network for spectrum and energy efficiency of cooperative spectrum prediction framework in cognitive radio network.

Hongtao Zhang
, Xueyuan Li:
Directional antennas modelling and coverage analysis for UAV networks with blockage effects in urban environment.

Tasneem Alshamaseen, Saud Althunibat
, Marwa K. Qaraqe, Haitham Alashaary:
Phase-assisted NOMA based key distribution for IoT networks.

Pravin G. Dhawale
, Vikram Kumar Kamboj, S. K. Bath:
A levy flight based strategy to improve the exploitation capability of arithmetic optimization algorithm for engineering global optimization problems.

S. Sumathi
, T. K. Ramesh, Zhiguo Ding:
Dynamic user clustering with hybrid beamforming in millimeter wave non-orthogonal multiple access (NOMA) and power allocation using teaching learning based optimization (TLBO).

Zuxia Yuan, Jian Ouyang, Xiaoyu Liu, Pengcheng Kan:
On the performance of uplink NOMA-based satellite-aerial-terrestrial integrated networks.

Reza Gholamrezaei
, Ghasem Mirjalily
, Sima Emadi
:
Learning-based multi-constraint resilient controller placement and assignment in software-defined networks using covering graph.
Volume 34, Number 5, May 2023
RESEARCH ARTICLES

Naskath Jahangeer
:
Fast multicriteria network selection scheme using hybrid of cat swarm optimization and TOPSIS algorithm for optimal handover in VANET.

Adnane Talha, Anas Bouayad, Mohammed Ouçamah Cherkaoui Malki:
A chaos opposition-based dwarf mongoose approach for workflow scheduling in cloud.

Waseem Sheikh
:
Jitter-sensitive data communication in emerging wireless networks.

Neerul, Devender Kumar
:
Cryptanalysis and improvement of an authentication protocol for wireless sensor networks.

Atena Ebrahimkhani
, Bahareh Akhbari
:
Shannon meets Stackelberg on the cognitive interference channel part I: A deterministic view.

Jun Wu
, Cong Wang, Haoyu Liang:
Bayesian quickest detection-based spectrum sensing for cognitive UAV networks.

Cong Wang
, Xiaohang Li, Maode Ma
, Tong Zhou, Guangquan Xu, Naixue Xiong, Yiying Zhang:
PSAK: A provably secure authenticated key agreement scheme based on extended Chebyshev chaotic maps for smart grid environments.

Aditya Singh Sengar
, Ranjan Gangopadhyay
, Soumitra Debnath:
Gaussian mixture model based radio environment mapping for an underlay Device-to-Device network.

Avishek Chakraborty
, Gopi Ram
, Durbadal Mandal
:
Phase center motion based time modulated arrays with preprocessed time schemes for selective harmonic beamforming in B5G communication systems.

Qimiao Zeng, Zhifan Yin, Qing Pan, Yunxiao Ma, Yuan Yu, Yirong Zhuang, Jie Liang, Shujie Yang, Han Xiao:
TVSR-OR: Tile-based 360-degree video streaming over real time streaming protocol with optimized read.

K. Ramya
, Senthilselvi Ayothi:
Hybrid dingo and whale optimization algorithm-based optimal load balancing for cloud computing environment.

Jiancong Zhang
, Changhao Wang, Shining Li:
Energy efficient federated learning in internet of vehicles: A game theoretic scheme.
RETRACTION
Volume 34, Number 6, June 2023
SURVEY ARTICLE

Seyed Salar Sefati
, Simona Halunga:
Ultra-reliability and low-latency communications on the internet of things based on 5G network: Literature review, classification, and future research view.
RESEARCH ARTICLES

Naveen Kumar, Anwar Ahmad
:
Quality of service-aware adaptive radio resource management based on deep federated Q-learning for multi-access edge computing in beyond 5G cloud-radio access network.

Lilatul Ferdouse
, Ahmed Shaharyar Khwaja, Alagan Anpalagan
, Brad Stimpson, Ali Arad, Isaac Woungang:
Resource allocation and user assignment schemes in cellular supported industrial IoT networks.

Sreya Ghosh
, Iti Saha Misra
, Tamal Chakraborty
:
Improved Quality of Service by canine olfactory route finding algorithm for Vehicular Ad Hoc Network.

Zhenqi Wang
, Yi Li
, Shaopeng Guan
:
A robust-link controller placement model for large-scale software defined networks.

Gondhi Navabharat Reddy
, Chinthaginjala Venkata Ravikumar:
Ensemble learning-based channel estimation and hybrid precoding for millimeter-wave massive multiple input multiple output system.

Imran Mohammed, Iain B. Collings
, Stephen V. Hanly
:
A new connectivity model for unmanned aerial vehicle communications and flying height optimization.

Dauda Ayanda, Shaheen Solwa, Khadeejah A. Abdulsalam
:
Eigenfilter-based analysis of uncoded space-time labeling diversity with three transmit antennas in correlated Nakagami-m fading channels.

Mahsa Shirzadian Gilan
, Raman Paranjape:
Beam tracking in phased array antenna based on the trajectory classification.

Surjeet Dalal
, M. Poongodi
, Umesh Kumar Lilhore
, Fadl Dahan, Thavavel Vaiyapuri, Ismail Keshta, Sultan Mesfer Aldossary, Amena Mahmoud
, Sarita Simaiya
:
Optimized LightGBM model for security and privacy issues in cyber-physical systems.
Volume 34, Number 7, July 2023
RESEARCH ARTICLES

Nishi Yadav
, Pabitra Mohan Khilar:
An efficient 3D localization algorithm for compensating stratification effect in underwater acoustic sensor network.

Doaa Gamal
, Khaled M. F. Elsayed, Ahmed Hesham Mehana:
Deep SCMA receiver: A low-complexity joint decoder and channel estimator for SCMA over time-varying channels using RNNs.

Yang Zhao, Hao Li, Zhaozhong Liu, Guobin Zhu:
A lightweight CP-ABE scheme in the IEEEP1363 standard with key tracing and verification and its application on the Internet of Vehicles.

Mohamed Amine Ouamri, Mohamed Azni
, Daljeet Singh
, Waleed Almughalles, Mohammed Saleh Ali Muthanna
:
Request delay and survivability optimization for software defined-wide area networking (SD-WAN) using multi-agent deep reinforcement learning.

Xifeng Wang
, Hongsong Zhu, Han Xiao, Zan Zhou
, Shujie Yang, Limin Sun:
Blockchain-enhanced trust management for mobile edge computing-enabled intelligent vehicular collaboration in the 6G era.

Chaonan Kan, Honghai Wu, Ling Xing, Huahong Ma:
Cooperative caching strategy based mobile vehicle social-aware in internet of vehicles.

R. Josphineleela, Vidyullatha Pellakuri, R. Thanuja, Diana Moses
:
Secure Internet of Thing based data communication in blockchain model using novel teaching-learning optimized fuzzy approach.

Kothapalli Ramesh Chandra
, Somasekhar Borugadda:
Joint resource allocation and power allocation scheme for MIMO assisted NOMA system.

Burak Ahmet Ozden
, Fatih Cogen
, Erdogan Aydin
:
Mirror activation pattern selection for energy efficient hexagonal QAM aided media-based modulation.

Jun Wu
, Jiangtao He, Jipeng Gan, Ze Chen, Jia Zhang, Zehao Chen, Gefei Zhu:
Sequential spectrum sensing against random Byzantine attack in cognitive radio networks.

B. M. R. Manasa, Venugopal P.
:
Efficient Channel Estimation in Multiple Input Multiple Output Communication Systems using Hybrid Intelligence-based Deep Learning Model using Horse Dingo Optimizer.

P. Blessed Angelin, S. Wilfred Franklin
:
Hyper contour cryptography with master Birch-Brown Paruvala-SLSTM model for enhanced healthcare security.
SURVEY ARTICLES

Prachi Goyal
, Vinay Rishiwal, Ashish Negi:
A comprehensive survey on QoS for video transmission in heterogeneous mobile ad hoc network.

Ravinder Kumar, Amita Malik, Virender Ranga
:
Security concerns over IoT routing using emerging technologies: A review.
Volume 34, Number 8, August 2023
SURVEY ARTICLES
RESEARCH ARTICLES

Chunfen Hu, Haifei Zhou, Shiyun Lv, Shelesh Krishna Saraswat:
LPB-SPP: Solving the internet of things service placement problem using the learner performance-based behavior algorithm.

Mamatha C. R, M. Ramakrishna
:
Integrating interval type-2 fuzzy logic and modified dingo optimization for node ranking and energy efficient MANET.

Meigen Huang
, Bi Gong, Xin Zhou, Tao Wang, Yanfeng Wang:
HIC: A high-reliable in-band control network for perception layer of software-defined IoT.

Somaye Jafarali Jassbi, Sahar Teymori:
The improvement of wavefront cellular learning automata for task scheduling in fog computing.

Rajasi Gore
, Shashwati Banerjea, Neeraj Tyagi:
An event-driven fusion framework with auto-scaling of edge intelligence for resilient smart applications in developing countries.

Kuldeep Narayan Tripathi
, Subhash Chander Sharma:
An optimal trust and secure model using deep metric learning for fog-based VANET.

Alishba Azam, Muhammad Imran
, Mudassar Ali
, Humayun Zubair Khan
, Abdul Wakeel
, Muhammad Naeem
:
Joint user and throughput maximization in re-configurable intelligent surface assisted beyond 5G/6G networks.

Ahmed F. Tayel
, Ahmed Y. Zakariya, Sherif I. Rabia, Ahmed H. Abd El-Malek
:
Discrete practical RF energy harvesting models for wireless communication networks.

Zeeshan Ahmad
, Adnan Shahid Khan, Kartinah bt Hj Zen, Farhan Ahmad:
MS-ADS: Multistage Spectrogram image-based Anomaly Detection System for IoT security.

Darwin Nesakumar A., Rukmani Devi S.
, T. M. Inbamalar
, Pavithra K. N.
:
Byzantine attack detection using optimized dual-channel capsule generative adversarial network for securing cognitive radio network.

Sudesh Kumar
, Ram Shringar Raw
, Abhishek Bansal
, Pawan Singh
:
UF-GPSR: Modified geographical routing protocol for flying ad-hoc networks.

Onur Berkay Gamgam
, Ezhan Karasan
:
Satisfying strict deadlines for cellular Internet of Things through hybrid multiple access.
Volume 34, Number 9, September 2023
SURVEY ARTICLE
RESEARCH ARTICLES

Caiyuan Tang
, Feng Wang, Chenbin Zhao
, Xiuqiang Chen:
IPAPS: An improved public auditing protocol for secure data storage in cloud-based medical storage system.

Farhad Banoori, Jinglun Shi, Khalid Khan, Jehangir Arshad
, Xiongying Liu, Sohail Muhammad Noman, Muhammad Irshad
:
Energy efficiency augmentation in UWA-OFDM transducer by peak to average power ratio alleviation through hybrid companding approach.

Khaled Farouq Hayajneh
, Ferdos Abualkishik, Khaled Bani-Hani, Hazim Shakhatreh
, Zaid Albataineh:
Efficient three-dimensional deployment of multiple unmanned aerial vehicles supporting ground base station toward maximizing served users with heterogeneous quality-of-service requirements.

Yonghua Luo
, Qian Ning, Bingcai Chen, Xinzhi Zhou, Linyu Huang
:
Software defined network-based multipath state-aware routing with traffic prediction in satellite network.

Han Wang
, Hui Li
, Qiongwei Ye, Ping Lu, Yong Yang, Peter Han Joo Chong
, Xiaoli Chu
, Qi Lv, Abla Smahi:
A physical topology for optimizing partition tolerance in consortium blockchains to reach CAP guarantee bound.

Amina Djir
, Fatiha Meskine
, Mohamed Larbi Tayebi
:
Image transmission performance analysis through free space optical communication link using coherent QPSK modulation under various environmental conditions.

Priyanka Gaba
, Ram Shringar Raw
:
Impact of endorsement policy on the performance of blockchain-based VANET.

Xin Song
, Yu Wang
, Zhigang Xie
, Runfeng Zhang
, Siyang Xu
:
Dingo-optimization-based task-offloading algorithm in multihop V2V/V2I-enabled networks.

Nikita Mittal, Vidyottama Jain
, Selvamuthu Dharmaraja
:
Power efficient stochastic modeling for Narrowband Internet of Things devices in 5G networks.

Kiran Khurshid
, Muhammad Imran
, Abdul Wakeel
:
Performance analysis and comparison of approximate detectors with linear detectors in massive MIMO systems under imperfect channel state information.

Mohamed Ali Setitra
, Mingyu Fan
, Zine El Abidine Bensalem
:
An efficient approach to detect distributed denial of service attacks for software defined internet of things combining autoencoder and extreme gradient boosting with feature selection and hyperparameter tuning optimization.
Volume 34, Number 10, October 2023
RESEARCH ARTICLES

Mohamed Ali Syed Rabiya
, Ramalakshmi Ramar
, Naskath Jahangeer
:
Regular routine aware routing in opportunistic mobile social networks.

Yujian Zhang
, Mingde Li, Fei Tong:
Energy-efficient load balancing for divisible tasks on heterogeneous clusters.

Wenqin Zhuang, Yiming Song, Mingkai Chen
, Jianxin Chen, Haibo Li:
Content sharing strategy for blind popularity distribution in D2D communications.

Ruiyan Du, Zhiqing Guan, Tian Feng, Fulai Liu:
Hybrid TH precoding with subarray connection for multi-user mmWave MIMO systems.

David Judson, A. Annie Portia, L. G. X. Agnel Livingston
:
Low-complexity joint equalization and CFO compensation in uplink SC-FDMA NOMA system under different power allocation strategies.

Rolando Herrero
:
Integrating cloud and mist computing to lower latency in IoT topologies.

Sreelakshmi P, Donuru Keerthi, Deepthi P. P.:
User grouping and resource management in efficient NOMA-OMA transmission scheme for infotainment message dissemination in VANETs.

N. V. K. Maha Lakshmi, A. Mallikarjuna Prasad:
Triple-band circularly polarized conformal antenna for vehicular communication applications.

Negar Zabetian, Babak Hossein Khalaj:
Quality of Experience (QoE)-based joint admission control and power allocation with guaranteed data rate.

Sai Satwik Vaddi
, T. G. Venkatesh, Ankit Kumar Gupta
:
Modeling medium dense cellular network and evaluation of probability of coverage.

Anil Kumar Dubey
, N. Ramanjaneyulu, Mala Saraswat, Brammya Ganesan, Govindasamy Chinnaraj, Ninu Preetha Nirmala Sreedharan:
HECC-ABE: A novel blockchain-based IoT healthcare data storage using hybrid cryptography schemes with key optimization by hybrid meta-heuristic algorithm.
SURVEY ARTICLE
Volume 34, Number 11, November 2023
EDITORIAL

Gautam Srivastava, Jerry Chun-Wei Lin
, Yudong Zhang:
Future of wireless access technologies and frameworks for internet of things applications.
SURVEY ARTICLE

Rohit Sharma, Rajeev Arya
:
Security threats and measures in the Internet of Things for smart city infrastructure: A state of art.
RESEARCH ARTICLES

Manik Gupta
, Ram Bahadur Patel, Shaily Jain
, Hitendra Garg
, Bhisham Sharma
:
Lightweight branched blockchain security framework for Internet of Vehicles.

Deepak Kumar Sharma
, Vidhi Jain, Bhavya Dhingra
, Koyel Datta Gupta
, Uttam Ghosh, Waleed S. Alnumay
:
A novel Hypertuned Prophet based power saving approach for IoT enabled smart homes.

Shalini Dhar, Ashish Khare
, Rajani Singh
:
Advanced security model for multimedia data sharing in Internet of Things.

Ishita Chakraborty
, Prodipto Das
, Buddhadeb Pradhan:
An Intelligent Routing for Internet of Things Mesh Networks.

D. Sunitha, Kavitha Rani Balmuri
, Rocío Pérez de Prado
, Parameshachari Bidare Divakarachari, R. Vijayarangan, K. L. Hemalatha
:
Congestion centric multi-objective reptile search algorithm-based clustering and routing in cognitive radio sensor network.

Hamza Sulimani
, Akbar Muhammad Sajjad, Wael Y. Alghamdi, Omprakash Kaiwartya, Tony Jan
, Simeon Simoff
, Mukesh Prasad
:
Reinforcement optimization for decentralized service placement policy in IoT-centric fog environment.

Sangjukta Das
, Suyel Namasudra
:
Lightweight and efficient privacy-preserving mutual authentication scheme to secure Internet of Things-based smart healthcare.

Ishaani Priyadarshini, Pinaki Mohanty, Ahmed Alkhayyat, Rohit Sharma, Sachin Kumar
:
SDN and application layer DDoS attacks detection in IoT devices by attention-based Bi-LSTM-CNN.

M. Poongodi
, Mounir Hamdi:
Intrusion detection system using distributed multilevel discriminator in GAN for IoT system.

Khalid Mahmood Awan, Madeeha Tariq, Kashif Naseer Qureshi, Thomas Newe, Gwanggil Jeon
:
Congestion aware reward based scheme based on delay tolerant networks for emergency evacuation in 6G-based internet of things networks.
EDITORIAL

Saru Kumari, Hu Xiong, Lyes Khoukhi, Joel J. P. C. Rodrigues:
Safety and security of autonomous vehicles.
RESEARCH ARTICLES

Chien-Ming Chen
, Qingkai Miao, Sachin Kumar
, Tsu-Yang Wu:
Privacy-preserving authentication scheme for digital twin-enabled autonomous vehicle environments.

Ganesh Gopal Devarajan, M. Thirunavukkarasan, Sardar Irfanullah Amanullah
, Vignesh T.
, Audithan Sivaraman
:
An integrated security approach for vehicular networks in smart cities.

Haiyang Yu, Shuai Liu, Yilong Ren, Yanan Zhao
, Han Jiang, Runkun Liu:
Reducing hysteresis and over-smoothing in traffic estimation: A multistream spatial-temporal graph convolutional network.

Yuanjian Zhou, Zhenfu Cao, Xiaolei Dong:
Dynamic identity-based broadcast proxy re-encryption for data sharing in autonomous vehicles.

Yilong Ren, Yuhao Liang
, Xiaoyuan Feng, Yanan Zhao
, Jiejie Zhao
, Haiyang Yu:
A participant selection based vehicle platoon asynchronous federated learning framework.

Binhui Tang
, Hai Da, Bochang Wang, Junfeng Wang:
MUDROID: Android malware detection and classification based on permission and behavior for autonomous vehicles.

Sean Joe Taylor
, Farhan Ahmad, Hoang Nga Nguyen, Siraj Ahmed Shaikh
, Jeremy W. Bryans
, Charles Wartnaby:
A comparative analysis of multi-criteria decision methods for secure beacon selection in vehicular platoons.
Volume 34, Number 12, December 2023
RESEARCH ARTICLES

B. R. Sreenivasa
, Husam Lahza, Nandini G, Tawfeeq A. Shawly
, Ahmed A. Alsheikhy
, K. R. Naveen Kumar, Hassan Fareed M. Lahza:
Social context-aware macroscopic routing scheme for opportunistic network.

Belal Ali
, Mark A. Gregory
, Shuo Li
:
Trust-aware task load balancing in multi-access edge computing based on blockchain and a zero trust security capability framework.

Ruyan Wang, Kang Wang, Yaping Cui, Peng He, Dapeng Wu:
Channel reconfiguration for intelligent reflecting surface-aided vehicular networks.

Syed Waqas Haider Shah
, Marwa K. Qaraqe:
Energy-efficient machine type communication in HetNets under statistical QoS guarantees.

Periaswamy Bhanupriya
, Ramachandran Balasubramanian:
Intelligent data offloading learning model for autonomous vehicular networks.

Soundararajan S.
, Vimal Shanmugam
, D. Karunkuzhali, Pradeep Kumar S.:
Hybrid Pelican and Archimedes optimization algorithm fostered energy aware task scheduling in heterogeneous virtualized cloud computing.

Muhammad Faraz Hyder
, Tasbiha Fatima
, Shariq Mahmood Khan, Saadia Arshad
:
Countering crossfire DDoS attacks through moving target defense in SDN networks using OpenFlow traffic modification.

Rojin Aslani
, Ebrahim Saberinia:
Energy-efficient power control and altitude planning for UAV-based vehicular communications in 5G NR-V2X networks.

Yue Zhong
, Jinbo Wen, Junhong Zhang, Jiawen Kang
, Yuna Jiang, Yang Zhang, Yanyu Cheng
, Yongju Tong:
Blockchain-assisted twin migration for vehicular metaverses: A game theory approach.

Subhankar Ghosh, Anuradha Banerjee, Abu Sufian, Sachin Kumar Gupta, Saeed H. Alsamhi
, Abdu Saif:
Efficient selfish node detection using SVM in IoT-MANET environment.

Mousa Alizadeh
, Mohammad T. H. Beheshti, Amin Ramezani, Sadegh Bolouki:
An optimized hybrid methodology for short-term traffic forecasting in telecommunication networks.

Nishi Yadav
, Pabitra Mohan Khilar:
UASN-3D: An energy efficient localization based on LEACH-BR algorithm (EELBL-BR).

Jun Yang:
NN-based method for regulating electrical impulse firing behavior of semiconductor low-dimensional nanomaterials.

Madhumitha Kulandaivel
, Ganesh Kumar
, Sathiyamoorthi Velayutham, Sachin Kumar Gupta
:
A novel sensitive DDoS attacks against statistical test in network traffic fusion.

Bülent Bilgehan
, Özlem Sabuncu
:
Optimized blockchain network model for 6G cellular vehicle-to-everything communication.

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
load links from unpaywall.org
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
load content from archive.org
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
load data from openalex.org
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
dblp was originally created in 1993 at:
since 2018, dblp has been operated and maintained by:






