| 2 | -- | 0 | Nei Kato. Challenges of anything as a service in the cloud [Editor's Note] |
| 3 | -- | 0 | Xiaohua Tian. Scanning the literature |
| 4 | -- | 9 | Wenlong Shen, Bo Yin, Xianghui Cao, Lin X. Cai, Yu Cheng. Secure device-to-device communications over WiFi direct |
| 10 | -- | 16 | Qiang Duan, Nirwan Ansari, Mehmet Toy. Software-defined network virtualization: an architectural framework for integrating SDN and NFV for service provisioning in future networks |
| 18 | -- | 24 | Baochun Li, Y. Thomas Hou. The new automated IEEE INFOCOM review assignment system |
| 26 | -- | 34 | Qiang Liu, Xiping Hu, Edith C. H. Ngai, Min Liang, Victor C. M. Leung, Zhiping Cai, Jianping Yin. A security patch addressing bandwidth request vulnerabilities in the IEEE 802.16 standard |
| 35 | -- | 39 | Zhi Wang, Jiangchuan Liu, Wenwu Zhu 0001. Social-aware video delivery: challenges, approaches, and directions |
| 40 | -- | 45 | Mingjie Feng, Shiwen Mao. Harvest the potential of massive MIMO with multi-layer techniques |
| 46 | -- | 53 | Tianyu Wang, Lingyang Song, Zhu Han, Walid Saad. Overlapping coalition formation games for emerging communication networks |
| 54 | -- | 60 | Wei Song, Weihua Zhuang. Packet assignment under resource constraints with D2D communications |
| 61 | -- | 67 | Shengling Wang, Rongfang Bie, Feng Zhao, Nan Zhang, Xiuzhen Cheng, Hyeong-Ah Choi. Security in wearable communications |
| 68 | -- | 73 | Zhengguo Bian, Ruhai Wang, Kanglian Zhao, Dongming Bian, Zhidong Xie, Yi Qian. Bundle protocol for data delivery over highly asymmetric deep-space channels |
| 74 | -- | 79 | YuLong Zou, Jia Zhu, Xuelong Li, Lajos Hanzo. Relay selection for wireless communications against eavesdropping: a security-reliability trade-off perspective |