Journal: Peer-to-Peer Networking and Applications

Volume 12, Issue 6

1477 -- 1479Yong Jin, Hang Shen, Daniele D'Agostino, Nadjib Achir, James Nightingale. Guest editorials: Special issue on fog/edge networking for multimedia applications
1480 -- 1488Yan Chen, Yu Wang, Daofu Gong. Fog computing support scheme based on fusion of location service and privacy preservation for QoS enhancement
1489 -- 1498Feng Wang, Shaojiang Liu, Weichuan Ni, Zhiming Xu, Zhiping Wan. Heterogeneous mobile network access control technology based on mutual trust mechanism
1499 -- 1510Lu Liu. Multimedia intelligent fog computing scheme based on robust perception for complex networks
1511 -- 1518Yuan Shu, Fuxi Zhu. Green communication mobile convergence mechanism for computing self-offloading in 5G networks
1519 -- 1527Di Fan, Chunwei Zhu, Changzhi Lv. Time delay estimation algorithm based on virtual Array and MUSIC for single sensor system
1528 -- 1537Zengzhen Shao, Shulei Liu, Yanyu Zhao, Yanxiu Liu. Identifying influential nodes in complex networks based on Neighbours and edges
1538 -- 0Zengzhen Shao, Shulei Liu, Yanyu Zhao, Yanxiu Liu. Correction to: Identifying influential nodes in complex networks based on Neighbours and edges
1539 -- 1549YongGang Xu, Haohao Qi, Tianyi Xu, Qianqian Hua, Hongsheng Yin, Gang Hua 0002. Queue models for wireless sensor networks based on random early detection
1550 -- 1574Lang Hu, Anfeng Liu, Mande Xie, Tian Wang 0001. UAVs joint vehicles as data mules for fast codes dissemination for edge networking in Smart City
1575 -- 1584Wenjuan Zhang. A data fusion privacy protection strategy with low energy consumption based on time slot allocation and relay in WBAN
1585 -- 1593Zijia Yu, Biao Lu. A multipath routing protocol using congestion control in wireless multimedia sensor networks
1594 -- 1605Rongyu Tian, Hui Zhu. Complex application identification and private network mining algorithm based on traffic-aware model in large-scale networks
1606 -- 1614Chunguang Zhang, Guangping Zeng, Hongbo Wang, Xuyan Tu. Hierarchical resource scheduling method using improved cuckoo search algorithm for internet of things
1615 -- 1623Suqin Wu. Communication modulation recognition algorithm based on STFT mechanism in combination with unsupervised feature-learning network
1624 -- 1626Heng Zhang 0001, Zhiguo Shi, Mohammed Chadli, Yanzheng Zhu, Zhaojian Li. Guest editorial: Networked cyber-physical systems: Optimization theory and applications
1627 -- 1637Jinlong Ma, Zhichao Ju. Cascading failure model of scale-free networks for avoiding edge failure
1638 -- 1650Qingshan Wang, Haoen Yang, Qi Wang, Wei Huang, Bin Deng. A deep learning based data forwarding algorithm in mobile social networks
1651 -- 1661Wei Shen 0003, Jiehao Wang. A robust controller design for networked hydraulic pressure control system based on CPR
1662 -- 1672Mengni Ruan, Xin Chen, Huan Zhou 0002. Centrality prediction based on K-order Markov chain in Mobile Social Networks
1673 -- 1704Qiaoyan Li, Anfeng Liu, Tian Wang 0001, Mande Xie, Neal N. Xiong. Pipeline slot based fast rerouting scheme for delay optimization in duty cycle based M2M communications
1705 -- 1715Yulian Jiang, Yuhang Zhang, Shenquan Wang. Distributed adaptive consensus control for networked robotic manipulators with time-varying delays under directed switching topologies
1716 -- 1725Kaili Sun, Song Zhu. The express decay effect of time delays for globally exponentially stable nonlinear stochastic systems
1726 -- 1740Lei Mo, Angeliki Kritikakou. Mapping imprecise computation tasks on cyber-physical systems
1741 -- 1752Hui Peng, Junzheng Wang, Wei Shen, Dawei Shi. Cooperative attitude control for a wheel-legged robot
1753 -- 1760Chao Ma 0011, Erlong Kang. Distributed consensus of networked markov jump multi-agent systems with mode-dependent event-triggered communications and switching topologies
1761 -- 1773Xiaolei Ji, Yang Wang. Quantized control for nonhomogeneous Markovian jump T-S fuzzy systems with missing measurements
1774 -- 1784Jinhui Wu, Xu Chen, Andong Liu, Li Yu. Predictive control for visual servoing control of cyber physical systems with packet loss
1785 -- 1798Jian Zhao, Chengzhuo Han, Zhengqi Cui, Rui Wang, Tingting Yang 0001. Cyber-physical battlefield perception systems based on machine learning technology for data delivery
1799 -- 1809Fei Xiang, Daofu Gong, Jie Li, Fenlin Liu. A code protection method against function call analysis in P2P network
1810 -- 1819Dongzhe Wang, Shuyuan Wang, Shuai Yuan 0001, Bo Cai, Lixian Zhang. Guaranteed performance control of switched linear systems: A differential-Riccati-equation-based approach
1820 -- 1834Guangsheng Feng, Chengbo Wang, Bingyang Li, Haibin Lv, Xiaoxiao Zhuang, Hongwu Lv, Huiqiang Wang, Xianlang Hu. UAV-assisted wireless relay networks for mobile offloading and trajectory optimization

Volume 12, Issue 5

1013 -- 1027Xianfu Meng, Yu Deng. A time-aware resource search strategy with the ant colony optimization in MANETs
1028 -- 1040Tongrang Fan, Shixun Xiong, Wenbin Zhao, Tao Yu. Information spread link prediction through multi-layer of social network based on trusted central nodes
1041 -- 1060Chao Sha, Lian-hua Zhong, Yao Bian, Dandan Song, Chunhui Ren. A type of energy-efficient target tracking approach based on grids in sensor networks
1061 -- 1075Yesudhas Harold Robinson, Eanoch Golden Julie, Raghvendra Kumar, Le Hoang Son. Probability-based cluster head selection and fuzzy multipath routing for prolonging lifetime of wireless sensor networks
1076 -- 1096A. R. Rajeswari, Kanagasabai Kulothungan, Sannasi Ganapathy, Arputharaj Kannan. A trusted fuzzy based stable and secure routing algorithm for effective communication in mobile adhoc networks
1097 -- 1109Jian Wang, Yanli Wang, Guosheng Zhao, Zhong-Nan Zhao. Location protection method for mobile crowd sensing based on local differential privacy preference
1110 -- 1136Sandeep Verma, Neetu Sood, Ajay Kumar Sharma. A novelistic approach for energy efficient routing using single and multiple data sinks in heterogeneous wireless sensor network
1137 -- 1155Khaled Hamouid, Kamel Adi. Secure and reliable certification management scheme for large-scale MANETs based on a distributed anonymous authority
1156 -- 1177Balu L. Parne, Shubham Gupta, Narendra S. Chaudhari. PSE-AKA: Performance and security enhanced authentication key agreement protocol for IoT enabled LTE/LTE-A networks
1178 -- 1193Hui Li, Lishuang Pei, Dan Liao, Gang Sun, Du Xu. Blockchain Meets VANET: An Architecture for Identity and Location Privacy Protection in VANET
1194 -- 1213D. Dhanya, D. Arivudainambi. Dolphin partner optimization based secure and qualified virtual machine for resource allocation with streamline security analysis
1214 -- 1215Ki-Il Kim, Sana Ullah, Christos V. Verikoukis, Han-Chieh Chao. Editorial on "Special issue on fog computing for healthcare"
1216 -- 1224Yannis Nikoloudakis, Evangelos Pallis, George Mastorakis, Constandinos X. Mavromoustakis, Charalabos Skianis, Evangelos K. Markakis. Vulnerability assessment as a service for fog-centric ICT ecosystems: A healthcare use case
1225 -- 1235Iván García-Magariño, José Varela Aldás, Guillermo Palacios Navarro, Jaime Lloret. Fog computing for assisting and tracking elder patients with neurodegenerative diseases
1236 -- 1262Rida Zojaj Naeem, Saman Bashir, Muhammad Faisal Amjad, Haider Abbas, Hammad Afzal. Fog computing in internet of things: Practical applications and future directions
1263 -- 1276Fouzia Jabeen, Muazzam Maqsood, Mustansar Ali Ghazanfar, Farhan Aadil, Salabat Khan, Muhammad Fahad Khan, Irfan Mehmood. An IoT based efficient hybrid recommender system for cardiovascular disease
1277 -- 1288Shiyuan Tong, Yun Liu, Hsin-Hung Cho, Hua-Pei Chiang, Zhenjiang Zhang. Joint radio resource allocation in fog radio access network for healthcare
1289 -- 1307Thaier Hayajneh, Kristen N. Griggs, Muhammad Imran 0001, Bassam Jamil Mohd. Secure and efficient data delivery for fog-assisted wireless body area networks
1308 -- 1310Jiming Chen, Kaoru Ota, Lu Wang 0002, Jianping He. Big data and smart computing in network systems
1311 -- 1322Wenbin Yu 0001, Cailian Chen, Zhe Liu, Bo Yang 0006, Xinping Guan. DSESP: Dual sparsity estimation subspace pursuit for the compressive sensing based close-loop ecg monitoring structure
1323 -- 1335Alberto Aguilar, Camilo Lozoya, Luis Orona. A hamming distance and fuzzy logic-based algorithm for P2P content distribution in enterprise networks
1336 -- 1345Abdulrhman M. Alshareef, Mohammed F. Alhamid, Abdulmotaleb El-Saddik. Toward citation recommender systems considering the article impact in the extended nearby citation network
1346 -- 1357Huajun Zhang, Erdong Deng, Haojin Zhu, Zhenfu Cao. Smart contract for secure billing in ride-hailing service via blockchain
1358 -- 1368Zhun Li, ByungSoo Ko, Ho-Jin Choi. Naive semi-supervised deep learning using pseudo-label
1369 -- 1384Yazhou Yuan, Yuefeng Li, Zhixin Liu, Kit Yan Chan, Shanying Zhu, Xinping Guan. A three dimensional tracking scheme for underwater non-cooperative objects in mixed LOS and NLOS environment
1385 -- 1402Xinyang Jiang, Qiang Li 0008, Zhen Ma, Mianxiong Dong, Jun Wu 0001, Dong Guo 0002. QuickSquad: A new single-machine graph computing framework for detecting fake accounts in large-scale social networks
1403 -- 1417Lei Shi, Junping Du, MeiYu Liang, Feifei Kou. Dynamic topic modeling via self-aggregation for short text streams
1418 -- 1432Minghui Zhao, Wei Wang 0021, Yitu Wang, Zhaoyang Zhang 0001. Load scheduling for distributed edge computing: A communication-computation tradeoff
1433 -- 1444Danfeng Yan, Xuan Zhao, Rongheng Lin, Demeng Bai. PPQAR: Parallel PSO for quantitative association rule mining
1445 -- 1453Bo Qiao, Hao Yin. A data-driven and the deep learning based CDN recommendation framework for ICPs
1454 -- 1465Guangsheng Feng, Haibin Lv, Bingyang Li, Chengbo Wang, Hongwu Lv, Huiqiang Wang. A near-optimal cloud offloading under multi-user multi-radio environments
1466 -- 1475Masoud Tahmasebi, Mohammad-Reza Khayyambashi. An efficient model for vehicular cloud computing with prioritizing computing resources

Volume 12, Issue 4

689 -- 704Somaieh Zakariayi, Shahram Babaie. DEHCIC: A distributed energy-aware hexagon based clustering algorithm to improve coverage in wireless sensor networks
705 -- 723Chandrima Chakrabarti, Siuli Roy, Souvik Basu. Intention aware misbehavior detection for post-disaster opportunistic communication over peer-to-peer DTN
724 -- 739Rogelio Hasimoto-Beltrán, Francisco de Asís López-Fuentes, Misael Vera-Lopez. Hierarchical P2P architecture for efficient content distribution
740 -- 750Rui Hou, Lang Zhang, Yong Zheng, Yuzhou Chang, Bing Li, Tao Huang, Jiangtao Luo. Service-differentiated QoS routing based on ant colony optimisation for named data networking
751 -- 762Marco Antonio D'Alessandro Costa, Marcelo Gonçalves Rubinstein. Performance analysis of a locality-aware BitTorrent protocol in enterprise networks
763 -- 776Pelayo Nuño, Juan C. Granda, Francisco J. Suárez, Daniel F. García. Using self-regulation to increase resilience in overlay networks for interactive multimedia communications
777 -- 788Ghofrane Fersi, Maher Ben Jemaa. An analytical study of the main characteristics of Cluster-based Energy-aware Virtual Ring Routing (CLEVER): Number of clusters, number of hops and cluster diameter
789 -- 808Fan Wu, Wang Yang, Guochao He. FDCP: cache placement model for information-centric networking using fluid dynamics theory
809 -- 829André Sampaio, Pedro Sousa. An adaptable and ISP-friendly multicast overlay network
830 -- 849Ahsan Hussain, Bettahally N. Keshavamurthy. A multi-dimensional routing based approach for efficient communication inside partitioned social networks
850 -- 864Hyunsoo Kwon, Changhee Hahn, Kyungtae Kang, Junbeom Hur. Secure deduplication with reliable and revocable key management in fog computing
865 -- 880Ricardo Guedes, Vasco Furtado, Tarcisio H. C. Pequeno, Joel J. P. C. Rodrigues. Pareto set as a model for dispatching resources in emergency Centres
881 -- 892V. Kavidha, S. Ananthakumaran. Novel energy-efficient secure routing protocol for wireless sensor networks with Mobile sink
893 -- 911Jinguo Li, Mi Wen, Kui Wu 0001, Kejie Lu, Fengyong Li, Hongjiao Li. Secure, flexible and high-efficient similarity search over encrypted data in multiple clouds
912 -- 923Anil Thomas, Gunasekaran Raja. FINDER: A D2D based critical communications framework for disaster management in 5G
924 -- 933Jian Shen 0001, Huijie Yang, Anxi Wang, Tianqi Zhou, Chen Wang 0015. Lightweight authentication and matrix-based key agreement scheme for healthcare in fog computing
934 -- 950Xiaoqin Feng, Jianfeng Ma, Yinbin Miao, Qian Meng, Ximeng Liu, Qi Jiang 0001, Hui Li 0006. Pruneable sharding-based blockchain protocol
951 -- 968Francis N. Nwebonyi, Rolando Martins, Manuel Eduardo Correia. Reputation based approach for improved fairness and robustness in P2P protocols
969 -- 988Abdessamed Derder, Samira Moussaoui, Zouina Doukha, Abdelwahab Boualouache. An online target tracking protocol for vehicular Ad Hoc networks
989 -- 1011Shubham Gupta, Balu L. Parne, Narendra S. Chaudhari. PSEH: A provably secure and efficient handover AKA protocol in LTE/LTE-A network

Volume 12, Issue 3

539 -- 540Shibo He, Dong-Hoon Shin, Yuanchao Shu. Editorial: Network coverage: From theory to practice
541 -- 552Chakchai So-In, Tri Gia Nguyen, Gia Nhu Nguyen. An efficient coverage hole-healing algorithm for area-coverage improvements in mobile sensor networks
553 -- 567Mingfeng Huang, Anfeng Liu, Ming Zhao 0007, Tian Wang 0001. Multi working sets alternate covering scheme for continuous partial coverage in WSNs
568 -- 576Xu Hui, Wang Bailing, Song Jia, Hong Haohan, Zhang Xiaolei. An algorithm for calculating coverage rate of WSNs based on geometry decomposition approach
577 -- 588Jia Xu 0003, Wei Lu, Lijie Xu, Dejun Yang, Tao Li 0001. Incentive mechanisms for mobile crowd sensing based on supply-demand relationship
589 -- 603Yanjun Li, Chung Shue Chen, Kaikai Chi, Jianhui Zhang. Two-tiered relay node placement for WSN-based home health monitoring system
604 -- 619Margarita Vitoropoulou, Vasileios Karyotis, Symeon Papavassiliou. Sensing and monitoring of information diffusion in complex online social networks
620 -- 634Hassan Harb, Abdallah Makhoul. Energy-efficient scheduling strategies for minimizing big data collection in cluster-based sensor networks
635 -- 646Wei Li, Jianhui Zhang, Feilong Jiang, Zhi Li, Chong Xu. Asynchronous neighbor discovery with unreliable link in wireless mobile networks
647 -- 659Md Yeakub Hassan, Faisal Hussain, Salimur Choudhury. Connectivity preserving obstacle avoidance localized motion planning algorithms for mobile wireless sensor networks
660 -- 676Yushun Tan, Menghui Xiong, Dongsheng Du, Shumin Fei. Hybrid-triggered state feedback H ∞ control for networked control systems with stochastic nonlinearity and quantization
677 -- 688Daxing Xu, Yan Qin, Heng Zhang, Li Yu, Hailun Wang. Set-valued Kalman filtering: Event triggered communication with quantized measurements

Volume 12, Issue 2

291 -- 294Ahmed E. Kamal, Liangxiu Han, Liu Lu, Sohail Jabbar. Guest editorial: Special issue on software defined networking: Trends, challenges, and prospective smart solutions
295 -- 309Zhijie Fan, Ya Xiao, Amiya Nayak, Chengxiang Tan. An improved network security situation assessment approach in software defined networks
310 -- 325Xing Yin, Liangmin Wang, Shunrong Jiang. A hierarchical mobility management scheme based on software defined networking
326 -- 336Tong Bai, Jinzhao Lin, Guoquan Li, Huiqian Wang, Peng Ran, Zhangyong Li, Yu Pang, Wei Wu 0002, Gwanggil Jeon. An optimized protocol for QoS and energy efficiency on wireless body area networks
337 -- 347Xiaojun Xu, Shuliang Wang, Ying Li 0014. Identification and predication of network attack patterns in software-defined networking
348 -- 356Sadia Din, Anand Paul, Awais Ahmad 0001, Jeong-Hong Kim. Energy efficient topology management scheme based on clustering technique for software defined wireless sensor network
357 -- 370Zahid Ullah, Imran Ahmed, Kaleem Razzaq, Muhammad Kashif Naseer, Naveed Ahmed. DSCB: Dual sink approach using clustering in body area network
371 -- 380Syed Bilal Hussian Shah, Zhe Chen, Fuliang Yin, Awais Ahmad 0001. Water rippling shaped clustering strategy for efficient performance of software define wireless sensor networks
381 -- 391Chenxi Li, Xiaofei Liao, Hai Jin 0001. Enhancing application performance via DAG-driven scheduling in task parallelism for cloud center
392 -- 404Kaleem Razzaq Malik, Tauqir Ahmad, Muhammad Farhan, Mai Alfawair. Enhancing SDN performance by enabling reasoning abilities in data traffic control
405 -- 421Bo Yi, Xingwei Wang 0001, Min Huang 0001, Lianbo Ma. SDN and NFV enabled service function multicast mechanisms over hybrid infrastructure
422 -- 429Zhuo Li, Xin Chen, Lulu Li, Xiangkun Wang. Joint routing and scheduling for transmission service in software-defined full-duplex wireless networks
430 -- 439Junbi Xiao, Song Chen, Mengmeng Sui. The strategy of path determination and traffic scheduling in private campus networks based on SDN
440 -- 451Hong Zhong 0001, Jianqiao Sheng, Yan Xu, Jie Cui 0004. SCPLBS: a smart cooperative platform for load balancing and security on SDN distributed controllers
452 -- 464Tao Hu, Julong Lan, Jianhui Zhang, Wei Zhao. EASM: Efficiency-aware switch migration for balancing controller loads in software-defined networking
465 -- 480Dongyang Li, Chang-you Xing, Ningyun Dai, Fei Dai, Guomin Zhang. Estimating SDN traffic matrix based on online adaptive information gain maximization method
481 -- 492Peiying Zhang, Haipeng Yao, Maozhen Li, Yunjie Liu. Virtual network embedding based on modified genetic algorithm
493 -- 501Nasrin Sultana, Naveen Chilamkurti, Wei Peng, Rabei Alhadad. Survey on SDN based network intrusion detection system using machine learning approaches
502 -- 513Zhaohui Zhang, Lina Ge, Pengwei Wang, Xinxin Zhou. Behavior Reconstruction Models for Large-scale Network Service Systems
514 -- 538Sahrish Khan Tayyaba, Munam Ali Shah. Resource allocation in SDN based 5G cellular networks

Volume 12, Issue 1

1 -- 12Xiaoheng Deng, Jie Luo, Lifang He 0002, Qiang Liu, Xu Li, Lin Cai 0001. Cooperative channel allocation and scheduling in multi-interface wireless mesh networks
13 -- 31Paulo Henrique Cazarotto, Cristiano André da Costa, Rodrigo Da Rosa Righi, Jorge Luis Victória Barbosa. GTTracker: Location-aware hierarchical model for identifying M-commerce business opportunities
32 -- 42Haijiang Wang, Xiaolei Dong, Zhenfu Cao. Secure and efficient encrypted keyword search for multi-user setting in cloud computing
43 -- 59AmirHosein Adavoudi-Jolfaei, Maede Ashouri-Talouki, Seyed Farhad Aghili. Lightweight and anonymous three-factor authentication and access control scheme for real-time applications in wireless sensor networks
60 -- 73Michael Lescisin, Qusay H. Mahmoud. Ad-hoc messaging infrastructure for peer-to-peer communication
74 -- 87Guangyuan Wu, Zhigang Chen, Deyu Zhang, Jiaqi Liu. Resource allocation algorithm with worst case delay guarantees in energy harvesting body area networks
88 -- 101Saeideh Rahimi, Mohammad Ali Jabraeil Jamali. A hybrid geographic-DTN routing protocol based on fuzzy logic in vehicular ad hoc networks
102 -- 128Santosh Kumar Das, Sachin Tripathi. Energy efficient routing formation algorithm for hybrid ad-hoc network: A geometric programming approach
129 -- 142Saied Asghari, Nima Jafari Navimipour. Resource discovery in the peer to peer networks using an inverted ant colony optimization algorithm
143 -- 157Avinash Srinivasan, Hatoon Aldharrab. XTRA - eXtended bit-Torrent pRotocol for Authenticated covert peer communication - Authenticated covert P2P communication
158 -- 166Jia Wu, Zhigang Chen, Ming Zhao. Weight distribution and community reconstitution based on communities communications in social opportunistic networks
167 -- 176Abdulhamid Zahedi, Faryad Parma. An energy-aware trust-based routing algorithm using gravitational search approach in wireless sensor networks
177 -- 188Junjie Su, Qian Deng, Dongyang Long. PCLNC: A low-cost intra-generation network coding strategy for P2P content distribution
189 -- 208Xu Qin, Baoxian Zhang, Cheng Li. Localized topology control and on-demand power-efficient routing for wireless ad hoc and sensor networks
209 -- 226Mohammad Nikravan, Ali Movaghar, Mehdi Hosseinzadeh. A lightweight signcryption scheme for defense against fragment duplication attack in the 6LoWPAN networks
227 -- 0Mohammad Nikravan, Ali Movaghar, Mehdi Hosseinzadeh. Correction to: A lightweight signcryption scheme for defense against fragment duplication attack in the 6LoWPAN networks
228 -- 240Lei Wang 0009, Siran Liu, Mingkai Chen, Guan Gui, Hikmet Sari. Sidelobe interference reduced scheduling algorithm for mmWave device-to-device communication networks
241 -- 268Robabeh Ghafouri, Ali Movaghar, Mehran Mohsenzadeh. A budget constrained scheduling algorithm for executing workflow application in infrastructure as a service clouds
269 -- 279Desheng Wang, Wenting Ding, Xiaoqiang Ma, Hongbo Jiang, Feng Wang 0001, Jiangchuan Liu. MiFo: A novel edge network integration framework for fog computing
280 -- 290Zhiwei Zhao, Zhixin Liu, Panpan Wang, Xinping Guan. An approach of robust power control for cognitive radio networks based on chance constraints