- Sushama A. Deshmukh, Smita L. Kasar. A comprehensive survey of the privacy preservation models for secure data sharing in decentralised cloud. IJSN, 20(4):197-220, 2025.
- Kiran Shehzadi, Touqeer Abbas, Ayesha Zainab, Hui Li 0027. A survey of intruder detection in smart grid systems: comparative analysis of rule-based, machine learning and deep learning. IJSN, 20(2):67-92, 2025.
- Enlin Xie. Multimodal speech-based human-computer interaction in automotive systems with integrated service recommendation. IJSN, 20(3):164-174, 2025.
- Anju Raveendran, R. Dhanapal. Optimised deep learning-based intrusion detection using Ethereum blockchain framework for secure data sharing. IJSN, 20(3):133-150, 2025.
- Xiaokai Meng, Hong Yang, Taoning Guo, Yan Ren. An optimisation of an intelligent lighting system for high-voltage cable corridors based on improved edge computing. IJSN, 20(4):231-242, 2025.
- Kamaljeet Kaur, Ankit Kumar Jain. OptiPhish: URL-based phishing detection using an optimised feature framework. IJSN, 20(2):93-109, 2025.
- Hu Li, Kun Wang, Huafeng Cao. A semi-grant-free scheme based on electricity information collection networks. IJSN, 20(1):1-7, 2025.
- Hu Li, Kai Wei, Xiaoqing Zhang. Pre-coding techniques for enhanced codebooks on electricity information collection networks. IJSN, 20(1):32-39, 2025.
- Jianlan Ren, Vladimir Mariano. A neural network for disease recognition of radiological images of pneumonia. IJSN, 20(1):23-31, 2025.
- Zhihong Chen, Huiying Hou, Zhenyu Liu, Zhiyuan Ren, Yucong Ma. Enable membership privacy-preserving group signature scheme. IJSN, 20(2):122-131, 2025.