- Hu Li, Kun Wang, Huafeng Cao. A semi-grant-free scheme based on electricity information collection networks. IJSN, 20(1):1-7, 2025.
- Hu Li, Kai Wei, Xiaoqing Zhang. Pre-coding techniques for enhanced codebooks on electricity information collection networks. IJSN, 20(1):32-39, 2025.
- Jianlan Ren, Vladimir Mariano. A neural network for disease recognition of radiological images of pneumonia. IJSN, 20(1):23-31, 2025.
- Santosh Kumar Birthriya, Priyanka Ahlawat, Ankit Kumar Jain. Enhanced phishing URL identification using an integrated attention-based LSTM-CNN with hybrid features. IJSN, 20(1):8-22, 2025.
- Hebing Zhang, Zhangning Li, Zongkai Lin. Pursuing multi-agent Nash equilibria amidst DoS attacks with stochastic perturbations. IJSN, 20(1):40-57, 2025.
- Zhilei Ying, Yanan Meng, Ruoxi Chen, Jianlou Lou. HKB-YOLO: transmission line fire detection method based on hierarchical feature fusion. IJSN, 19(4):188-198, 2024.
- Rashmi Bhatia, Rohini Sharma. Multiclassification of DDoS attacks using machine and deep learning techniques. IJSN, 19(2):63-76, 2024.
- Xianmeng Meng, Cuicui Cai, Linglong Tan, Qijian Wang. Resource allocation for wireless networks based on enhanced Harris hawks optimisation algorithm. IJSN, 19(4):178-187, 2024.
- Wenbo Sun, Wei Wang, Chenguang Bai. A new method of large integer prime decomposition for network public key cryptosystem. IJSN, 19(3):159-167, 2024.
- Shiva Krishna Nallabothu, N. Rukma Rekha, Y. V. Subba Rao. Generalised secret sharing scheme for non-monotone access structures using MDS codes. IJSN, 19(2):101-108, 2024.