Journal: IEEE Network

Volume 36, Issue 4

4 -- 5Yingying (Jennifer) Chen, Cecilia Mascolo. Women in Networks: Professor Cecilia Mascolo
6 -- 7Xiaohua Tian. Scanning the Literature
8 -- 9Qilian Liang, Tariq S. Durrani, Jing Liang 0002, Xin Wang 0071, Jinhwan Koh, Shu Xiao. Guest Editorial: Networks in Harsh Environments
10 -- 17Peng Liu, Feng Zhao. Millimeter-Wave mMIMO-NOMA Communication System Design in a Complex Blocking Environment
18 -- 27Na Chen 0004, Chengbo Liu, Haohui Jia, Minoru Okada. Intelligent Reflecting Surface Aided Network under Interference toward 6G Applications
28 -- 37Zhuohui Yao, Wenchi Cheng, Wei Zhang 0001, Tao Zhang, Hailin Zhang 0001. The Rise of UAV Fleet Technologies for Emergency Wireless Communications in Harsh Environments
38 -- 44Yilin Wang, Jiayou Xie, Yuliang Tang, Bo Yang 0006. Offloading of Interdependent Computing Subtasks Based on VANET in the Harsh Environment
46 -- 53Bao Peng, Yulin Chen, Tianyi Zheng, Chi Duan, Zhi Yao. Safety Positioning for UAV Swarms in Harsh Environments
54 -- 60Yi Zhong 0002, Tianqi Bi, Ju Wang 0008, Jie Zeng 0001, Yan Huang 0023, Ting Jiang, Qiang Wu 0001, Siliang Wu. Empowering the V2X Network by Integrated Sensing and Communications: Background, Design, Advances, and Opportunities
62 -- 68Bowen Li, Zhenyu Na, Bin Lin 0001. UAV Trajectory Planning from a Comprehensive Energy Efficiency Perspective in Harsh Environments
70 -- 77Jiaqi Zou, Rui Liu, Chenwei Wang 0001, Yuanhao Cui, Zixuan Zou, Songlin Sun, Koichi Adachi. Aiming in Harsh Environments: A New Framework for Flexible and Adaptive Resource Management
78 -- 85Xin Liu 0009, Zengqi Li, Bin Wang 0031, Celimuge Wu. Transform-Domain-Based Cognitive Radio Networks for Harsh Interference Environments
86 -- 91Qi Bi. P-RAN: A Distributed Solution for Cellular Systems in High Frequency Bands
92 -- 99Jizhou Zhang, Jianan Li, Haixin Sun, Shenwang Jiang, Yuhan Zhang, Yiwen Chen, Jinhua Zhang, Tingfa Xu. Edge-Enabled Anti-Noise Telepathology Imaging Reconstruction Technology in Harsh Environments
100 -- 102Zheng Yan 0002, Laurence T. Yang, Tieyan Li, Yoan Miche, Shui Yu, Stephen S. Yau. Guest Editorial: Trust, Security and Privacy of 6G
104 -- 111Xintong Ling, Pengcheng Chen, Yuwei Le, Jiaheng Wang 0001, Xiaohu You. Blockchain-Based Network Hawkeye Function: Building the Trust Triangle in 6G
112 -- 119Guntur Dharma Putra, Volkan Dedeoglu, Salil S. Kanhere, Raja Jurdak. Toward Blockchain-Based Trust and Reputation Management for Trustworthy 6G Networks
120 -- 125Wenjuan Li 0001, Weizhi Meng 0001. BCTrustFrame: Enhancing Trust Management via Blockchain and IPFS in 6G Era
126 -- 133Yulei Wu. Ethically Responsible and Trustworthy Autonomous Systems for 6G
134 -- 140Liu Yang 0003, Yun Li 0001, Simon X. Yang, Yinzhi Lu, Tan Guo, Keping Yu. Generative Adversarial Learning for Intelligent Trust Management in 6G Wireless Networks
142 -- 148Sandro Rodriguez Garzon, Hakan Yildiz, Axel Küpper. Decentralized Identifiers and Self-Sovereign Identity in 6G
150 -- 158Haoyu Chen, Bin Yuan, Deqing Zou, Hai Jin 0001. A Fuzzing-Based Method for Testing Rules in Intrusion Detection Systems in 6G Networks
160 -- 165Mianjie Li, Wei Shi 0001, Fusheng Zhu, Zhihong Tian, Muhammad Shafiq, Zhiyong Luo, Chun Shan. Large-Capacity Local Multi-Dimensional Information Hiding Method for 6G Networks
166 -- 173Junbin Shi, Yong Yu 0002, Qiming Yu, Huilin Li, Lianhai Wang. Toward Data Security in 6G Networks: A Public-Key Searchable Encryption Approach
174 -- 180Renato Lo Cigno, Francesco Gringoli, Marco Cominelli, Lorenzo Ghiro. Integrating CSI Sensing in Wireless Networks: Challenges to Privacy and Countermeasures
182 -- 189Aditya Pribadi Kalapaaking, Veronika Stephanie, Ibrahim Khalil, Mohammed Atiquzzaman, Xun Yi, Mahathir Almashor. SMPC-Based Federated Learning for 6G-Enabled Internet of Medical Things
190 -- 196Zhigang Yang, Ruyan Wang, Honggang Wang 0001, Dapeng Wu 0002. Cloud Edge-Client Collaborative Trajectory Privacy Protection System and Technology
197 -- 202Boubakr Nour, Soumaya Cherkaoui. How Far Can We Go in Compute-less Networking: Computation Correctness and Accuracy
203 -- 209Daojing He, Jiayu Dai, Xiaoxia Liu, Shanshan Zhu, Sammy Chan, Mohsen Guizani. Adversarial Attacks for Intrusion Detection Based on Bus Traffic
210 -- 216Zhiwei Guo, Keping Yu, Ali Kashif Bashir, Di Zhang 0002, Yasser D. Al-Otaibi, Mohsen Guizani. Deep Information Fusion-Driven POI Scheduling for Mobile Social Networks
218 -- 225Lorenza Giupponi, Francesc Wilhelmi. Blockchain-Enabled Network Sharing for O-RAN in 5G and Beyond
226 -- 232Xinying Chen, Jianping An, Nan Zhao 0001, Chengwen Xing, Daniel B. da Costa 0001, Yonghui Li, F. Richard Yu. UAV Relayed Covert Wireless Networks: Expand Hiding Range via Drones
233 -- 240Elif Uysal, Onur Kaya, Anthony Ephremides, James Gross, Marian Codreanu, Petar Popovski, Mohamad Assaad, Gianluigi Liva, Andrea Munari, Beatriz Soret, Touraj Soleymani, Karl Henrik Johansson. Semantic Communications in Networked Systems: A Data Significance Perspective