| 4 | -- | 5 | Yingying (Jennifer) Chen, Cecilia Mascolo. Women in Networks: Professor Cecilia Mascolo |
| 6 | -- | 7 | Xiaohua Tian. Scanning the Literature |
| 8 | -- | 9 | Qilian Liang, Tariq S. Durrani, Jing Liang 0002, Xin Wang 0071, Jinhwan Koh, Shu Xiao. Guest Editorial: Networks in Harsh Environments |
| 10 | -- | 17 | Peng Liu, Feng Zhao. Millimeter-Wave mMIMO-NOMA Communication System Design in a Complex Blocking Environment |
| 18 | -- | 27 | Na Chen 0004, Chengbo Liu, Haohui Jia, Minoru Okada. Intelligent Reflecting Surface Aided Network under Interference toward 6G Applications |
| 28 | -- | 37 | Zhuohui Yao, Wenchi Cheng, Wei Zhang 0001, Tao Zhang, Hailin Zhang 0001. The Rise of UAV Fleet Technologies for Emergency Wireless Communications in Harsh Environments |
| 38 | -- | 44 | Yilin Wang, Jiayou Xie, Yuliang Tang, Bo Yang 0006. Offloading of Interdependent Computing Subtasks Based on VANET in the Harsh Environment |
| 46 | -- | 53 | Bao Peng, Yulin Chen, Tianyi Zheng, Chi Duan, Zhi Yao. Safety Positioning for UAV Swarms in Harsh Environments |
| 54 | -- | 60 | Yi Zhong 0002, Tianqi Bi, Ju Wang 0008, Jie Zeng 0001, Yan Huang 0023, Ting Jiang, Qiang Wu 0001, Siliang Wu. Empowering the V2X Network by Integrated Sensing and Communications: Background, Design, Advances, and Opportunities |
| 62 | -- | 68 | Bowen Li, Zhenyu Na, Bin Lin 0001. UAV Trajectory Planning from a Comprehensive Energy Efficiency Perspective in Harsh Environments |
| 70 | -- | 77 | Jiaqi Zou, Rui Liu, Chenwei Wang 0001, Yuanhao Cui, Zixuan Zou, Songlin Sun, Koichi Adachi. Aiming in Harsh Environments: A New Framework for Flexible and Adaptive Resource Management |
| 78 | -- | 85 | Xin Liu 0009, Zengqi Li, Bin Wang 0031, Celimuge Wu. Transform-Domain-Based Cognitive Radio Networks for Harsh Interference Environments |
| 86 | -- | 91 | Qi Bi. P-RAN: A Distributed Solution for Cellular Systems in High Frequency Bands |
| 92 | -- | 99 | Jizhou Zhang, Jianan Li, Haixin Sun, Shenwang Jiang, Yuhan Zhang, Yiwen Chen, Jinhua Zhang, Tingfa Xu. Edge-Enabled Anti-Noise Telepathology Imaging Reconstruction Technology in Harsh Environments |
| 100 | -- | 102 | Zheng Yan 0002, Laurence T. Yang, Tieyan Li, Yoan Miche, Shui Yu, Stephen S. Yau. Guest Editorial: Trust, Security and Privacy of 6G |
| 104 | -- | 111 | Xintong Ling, Pengcheng Chen, Yuwei Le, Jiaheng Wang 0001, Xiaohu You. Blockchain-Based Network Hawkeye Function: Building the Trust Triangle in 6G |
| 112 | -- | 119 | Guntur Dharma Putra, Volkan Dedeoglu, Salil S. Kanhere, Raja Jurdak. Toward Blockchain-Based Trust and Reputation Management for Trustworthy 6G Networks |
| 120 | -- | 125 | Wenjuan Li 0001, Weizhi Meng 0001. BCTrustFrame: Enhancing Trust Management via Blockchain and IPFS in 6G Era |
| 126 | -- | 133 | Yulei Wu. Ethically Responsible and Trustworthy Autonomous Systems for 6G |
| 134 | -- | 140 | Liu Yang 0003, Yun Li 0001, Simon X. Yang, Yinzhi Lu, Tan Guo, Keping Yu. Generative Adversarial Learning for Intelligent Trust Management in 6G Wireless Networks |
| 142 | -- | 148 | Sandro Rodriguez Garzon, Hakan Yildiz, Axel Küpper. Decentralized Identifiers and Self-Sovereign Identity in 6G |
| 150 | -- | 158 | Haoyu Chen, Bin Yuan, Deqing Zou, Hai Jin 0001. A Fuzzing-Based Method for Testing Rules in Intrusion Detection Systems in 6G Networks |
| 160 | -- | 165 | Mianjie Li, Wei Shi 0001, Fusheng Zhu, Zhihong Tian, Muhammad Shafiq, Zhiyong Luo, Chun Shan. Large-Capacity Local Multi-Dimensional Information Hiding Method for 6G Networks |
| 166 | -- | 173 | Junbin Shi, Yong Yu 0002, Qiming Yu, Huilin Li, Lianhai Wang. Toward Data Security in 6G Networks: A Public-Key Searchable Encryption Approach |
| 174 | -- | 180 | Renato Lo Cigno, Francesco Gringoli, Marco Cominelli, Lorenzo Ghiro. Integrating CSI Sensing in Wireless Networks: Challenges to Privacy and Countermeasures |
| 182 | -- | 189 | Aditya Pribadi Kalapaaking, Veronika Stephanie, Ibrahim Khalil, Mohammed Atiquzzaman, Xun Yi, Mahathir Almashor. SMPC-Based Federated Learning for 6G-Enabled Internet of Medical Things |
| 190 | -- | 196 | Zhigang Yang, Ruyan Wang, Honggang Wang 0001, Dapeng Wu 0002. Cloud Edge-Client Collaborative Trajectory Privacy Protection System and Technology |
| 197 | -- | 202 | Boubakr Nour, Soumaya Cherkaoui. How Far Can We Go in Compute-less Networking: Computation Correctness and Accuracy |
| 203 | -- | 209 | Daojing He, Jiayu Dai, Xiaoxia Liu, Shanshan Zhu, Sammy Chan, Mohsen Guizani. Adversarial Attacks for Intrusion Detection Based on Bus Traffic |
| 210 | -- | 216 | Zhiwei Guo, Keping Yu, Ali Kashif Bashir, Di Zhang 0002, Yasser D. Al-Otaibi, Mohsen Guizani. Deep Information Fusion-Driven POI Scheduling for Mobile Social Networks |
| 218 | -- | 225 | Lorenza Giupponi, Francesc Wilhelmi. Blockchain-Enabled Network Sharing for O-RAN in 5G and Beyond |
| 226 | -- | 232 | Xinying Chen, Jianping An, Nan Zhao 0001, Chengwen Xing, Daniel B. da Costa 0001, Yonghui Li, F. Richard Yu. UAV Relayed Covert Wireless Networks: Expand Hiding Range via Drones |
| 233 | -- | 240 | Elif Uysal, Onur Kaya, Anthony Ephremides, James Gross, Marian Codreanu, Petar Popovski, Mohamad Assaad, Gianluigi Liva, Andrea Munari, Beatriz Soret, Touraj Soleymani, Karl Henrik Johansson. Semantic Communications in Networked Systems: A Data Significance Perspective |