Journal: Peer-to-Peer Networking and Applications

Volume 14, Issue 6

3405 -- 3415Mohammad Ammad Uddin, Muhammad Ayaz, Ali Mansour, El-Hadi M. Aggoune, Zubair Sharif, Imran Razzak. Cloud-connected flying edge computing for smart agriculture
3416 -- 3430R. Hemalatha, R. Umamaheswari, S. Jothi. Optimal route maintenance based on adaptive equilibrium optimization and GTA based route discovery model in MANET
3431 -- 3451Ting Li, Guosheng Huang, Shaobo Zhang, Zhiwen Zeng. NTSC: a novel trust-based service computing scheme in social internet of things
3452 -- 3459Zhenfang Teng, Ledan Qian, Jianfei Huang. Multi-target localization algorithm for wireless sensor network
3460 -- 3472Yepeng Deng, Fangfang Gou, Jia Wu 0002. Hybrid data transmission scheme based on source node centrality and community reconstruction in opportunistic social networks
3473 -- 3487Tao Wan, Luyao Wang, Weichuan Liao, Shixin Yue. A lightweight continuous authentication scheme for medical wireless body area networks
3488 -- 3501Zhiqiang Zhang, Suzhen Cao, Xiaodong Yang 0006, Xueyan Liu, Longbo Han. An efficient outsourcing attribute-based encryption scheme in 5G mobile network environments
3502 -- 3517S. Muruganandam, J. Arokia Renjit. Real-time reliable clustering and secure transmission scheme for QoS development in MANET
3518 -- 3539Akshay Verma, Sunil Kumar, Prateek Raj Gautam, Arvind Kumar. Neural-Fuzzy based effective clustering for large-scale wireless sensor networks with mobile sink
3540 -- 3558Amrendra Singh Yadav, Dharmender Singh Kushwaha. Blockchain-based digitization of land record through trust value-based consensus algorithm
3559 -- 3577Saleh A. Alghamdi. Stable zone-based 5G clustered MANET using interest-region-based routing and gateway selection
3578 -- 3594Huan Zhou 0006, Zeshun Shi, Xue Ouyang, Zhiming Zhao. Building a blockchain-based decentralized ecosystem for cloud and edge computing: an ALLSTAR approach and empirical study
3595 -- 3604Rossano Gaeta, Marco Grangetto. On the robustness of three classes of rateless codes against pollution attacks in P2P networks
3605 -- 3618Weixing Chen, Jingfang Su, Chaochen Cui, Bin Chen. Topology control routing strategy based on message forwarding in apron opportunistic networks
3619 -- 3633Prasanta Kumar Roy, Ansuman Bhattacharya. Desynchronization resistant privacy preserving user authentication protocol for location based services
3634 -- 3646Ali Arjomandi-Nezhad, Mahmud Fotuhi-Firuzabad, Ali Dorri, Payman Dehghanian. Proof of humanity: A tax-aware society-centric consensus algorithm for Blockchains
3647 -- 3659Chang Xu 0004, Lan Yu, Liehuang Zhu, Can Zhang. A blockchain-based dynamic searchable symmetric encryption scheme under multiple clouds
3660 -- 3673Ariel Orda, Ori Rottenstreich. Enforcing Fairness in Blockchain Transaction Ordering
3674 -- 3687Hua Wu, Qiuyan Wu, Guang Cheng, Shuyi Guo, Xiaoyan Hu, Shen Yan. SFIM: Identify user behavior based on stable features
3688 -- 3717Sreemana Datta, Ditipriya Sinha. BESDDFFS: Blockchain and EdgeDrone based secured data delivery for forest fire surveillance
3718 -- 3736Jian Gong, Ju Ren, Yaoxue Zhang. DeepNav: A scalable and plug-and-play indoor navigation system based on visual CNN
3737 -- 3757Mohd Shariq, Karan Singh, Pramod Kumar Maurya, Ali Ahmadian, Muhammad Rezal Kamel Ariffin. URASP: An ultralightweight RFID authentication scheme using permutation operation
3758 -- 3777Hasib Mahmud, Tanzilur Rahman. An Application of blockchain to securely acquire, diagnose and share clinical data through smartphone
3778 -- 3792Xingbing Zhao, Yu Zeng, Hongwei Ding, Bo Li, Zhijun Yang. Optimize the placement of edge server between workload balancing and system delay in smart city
3793 -- 3805Zhong-Nan Zhao, Yanli Wang, Huiqiang Wang. SDN-based cross-domain cooperative method for trusted nodes recommendation in Mobile crowd sensing
3806 -- 3819Dong Liang, Qinrang Liu, Binghao Yan, Yanbin Hu, Bo Zhao, Tao Hu 0002. Low interruption ratio link fault recovery scheme for data plane in software-defined networks
3820 -- 3830Balaji Coimbatore GaneshSankar, Krishnan Murugan. Extending the coverage of evolved Node-B by relaying data using device-to-device offloading in next generation cellular network
3831 -- 3850Munir Majdalawieh, Nishara Nizamuddin, Maher Ala'raj, Shafaq Naheed Khan, Anoud Bani-Hani. Blockchain-based solution for Secure and Transparent Food Supply Chain Network
3851 -- 3864Tripti Rathee, Parvinder Singh. Secure data sharing using Merkle hash digest based blockchain identity management
3865 -- 3890Abbas Najafizadeh, Afshin Salajegheh, Amir Masoud Rahmani, Amir Sahafi. Privacy-preserving for the internet of things in multi-objective task scheduling in cloud-fog computing using goal programming approach
3891 -- 3894Deze Zeng, Geyong Min, Qiang He, Song Guo 0001. Convergence of Edge Computing and Next Generation Networking
3895 -- 3914Liang Liu 0006, Yiting Wang, Weizhi Meng 0001, Zhe Xu, Wenzhao Gao, Zuchao Ma. Towards efficient and energy-aware query processing for industrial internet of things
3915 -- 3928Xiaofei Cao, Sanjay Madria. An efficient moving object tracking framework for WSNs using sequence-to-sequence learning model
3929 -- 3945Jiaqi Liu, Shiyue Huang, Wei Wang, Deng Li, Xiaoheng Deng. An incentive mechanism based on endowment effect facing social welfare in Crowdsensing
3946 -- 3958Zhuo Li, Wentao Dong, Xin Chen. Deep reinforcement learning-based incentive mechanism design for short video sharing through D2D communication
3959 -- 3970Dongdong Ren, Xiaocui Li, ZhangBing Zhou. Energy-efficient sensory data gathering in IoT networks with mobile edge computing
3971 -- 3983Runhua Wang, Feng Zeng, Xiaoheng Deng, Jinsong Wu. Joint computation offloading and resource allocation in vehicular edge computing based on an economic theory: walrasian equilibrium
3984 -- 3997Zhe Li, Honglong Chen, Kai Lin, Vladimir V. Shakhov, Leyi Shi, Jiguo Yu. From edge data to recommendation: A double attention-based deformable convolutional network
3998 -- 4013Dapeng Wu 0002, Haoyi Xu, Zhidu Li, Ruyan Wang. Video placement and delivery in edge caching networks: Analytical model and optimization scheme
4014 -- 4030Meimei Zhang, Jun Luo, Liangjie Zhang, Xiquan Yu, Ting Xu, Kai Lei. Comparative analysis of probabilistic forwarding strategies in ICN for edge computing
4031 -- 4045Lei Shi 0011, Zhigang Xu, Yabo Sun, Yi Shi, Yuqi Fan, Xu Ding. A DNN inference acceleration algorithm combining model partition and task allocation in heterogeneous edge computing system

Volume 14, Issue 5

2585 -- 2599Na Shi, Liang Tan, Ciaxia Yang, Chen He, Junli Xu, Yang Lu, Hao Xu. BacS: A blockchain-based access control scheme in distributed internet of things
2600 -- 2617Hoi Yan Lam, Yung Po Tsang, Chun-Ho Wu, Valerie Tang. Data analytics and the P2P cloud: an integrated model for strategy formulation based on customer behaviour
2618 -- 2625Zhijiang Liu, Viktor Shestak. Issues of crowdsourcing and mobile app development through the intellectual property protection of third parties
2626 -- 2634Kairat Imanbayev, Bakhtgerey Sinchev, Saulet Sibanbayeva, Axulu Mukhanova, Assel Nurgulzhanov, Nurgali Zaurbekov, Nurbike Zaurbekova, Natalya V. Korolyova, Lyazzat Baibolova. Analysis and mathematical modeling of big data processing
2635 -- 2650Akashdeep Bhardwaj, Syed Bilal Hussian Shah, Achyut Shankar, Mamoun Alazab, Manoj Kumar, Thippa Reddy Gadekallu. Penetration testing framework for smart contract Blockchain
2651 -- 2664Muhammad Usama, Qutaibah M. Malluhi, Nordin Zakaria, Imran Razzak, Waheed Iqbal. An efficient secure data compression technique based on chaos and adaptive Huffman coding
2665 -- 2680Abba Garba, Ashutosh Dhar Dwivedi, Mohsin Kamal, Gautam Srivastava, Muhammad Tariq, M. Anwar Hasan, Zhong Chen 0001. A digital rights management system based on a scalable blockchain
2681 -- 2693Weizheng Wang, Huakun Huang, Lejun Zhang, Chunhua Su. Secure and efficient mutual authentication protocol for smart grid under blockchain
2694 -- 2707Dan Liao, Hui Li, Wentao Wang, Xiong Wang 0001, Ming Zhang, Xue Chen. Achieving IoT data security based blockchain
2708 -- 2718Yuyu Meng, Shah Nazir, Jing Guo, Irfan Uddin. A decision support system for the uses of lightweight blockchain designs for P2P computing
2719 -- 2734Alberto Huertas Celdrán, Kallol Krishna Karmakar, Félix Gómez Mármol, Vijay Varadharajan. Detecting and mitigating cyberattacks using software defined networks for integrated clinical environments
2735 -- 2742Heli Wang, Qiao Yan, Victor C. M. Leung. The impact of propagation delay to different selfish miners in proof-of-work blockchains
2743 -- 2756Amr Tolba. A two-level traffic smoothing method for efficient cloud-IoT communications
2757 -- 2774Dakshita Reebadiya, Tejal Rathod, Rajesh Gupta 0007, Sudeep Tanwar, Neeraj Kumar 0001. Blockchain-based Secure and Intelligent Sensing Scheme for Autonomous Vehicles Activity Tracking Beyond 5G Networks
2775 -- 2788Debashis Das, Sourav Banerjee, Uttam Ghosh, Utpal Biswas, Ali Kashif Bashir. A decentralized vehicle anti-theft system using Blockchain and smart contracts
2789 -- 2800Wei Liu, Yang Li, Xiujun Wang, Yufei Peng, Wei She, Zhao Tian. A donation tracing blockchain model using improved DPoS consensus algorithm
2801 -- 2812Chenchen Li, Jiang Xiao, Xiaohai Dai, Hai Jin 0001. AMVchain: authority management mechanism on blockchain-based voting systems
2813 -- 2825S. Banupriya, Kottilingam Kottursamy, Ali Kashif Bashir. Privacy-preserving hierarchical deterministic key generation based on a lattice of rings in public blockchain
2826 -- 2839Yuxi Li, Liang Qiao, Zhihan Lv. An Optimized Byzantine Fault Tolerance Algorithm for Consortium Blockchain
2840 -- 2857Mahadev A. Gawas, Hemprasad Patil, Sweta S. Govekar. An integrative approach for secure data sharing in vehicular edge computing using Blockchain
2858 -- 2873Osamah Ibrahim Khalaf, Ghaida Muttashar Abdulsahib. Optimized dynamic storage of data (ODSD) in IoT based on blockchain for wireless sensor networks
2874 -- 2886Wei-Yang Chiu, Weizhi Meng 0001. EdgeTC - a PBFT blockchain-based ETC scheme for smart cities
2887 -- 2900Huimin Li, Xinyao Chen, Zhiwei Guo, Junli Xu, Yu Shen, Xu Gao. Data-driven peer-to-peer blockchain framework for water consumption management
2901 -- 2925Shafaq Naheed Khan, Faiza Loukil, Chirine Ghedira Guegan, Elhadj Benkhelifa, Anoud Bani-Hani. Blockchain smart contracts: Applications, challenges, and future trends
2926 -- 2951Anup Kumar Paul, Xin Qu, Zheng Wen. Blockchain-a promising solution to internet of things: A comprehensive analysis, opportunities, challenges and future research issues
2952 -- 2960Guangxia Xu, Jingnan Dong, Chuang Ma. A certificateless encryption scheme based on blockchain
2961 -- 2976Priyanka Kamboj, Shivang Khare, Sujata Pal. User authentication using Blockchain based smart contract in role-based access control
2977 -- 2991Chien-Ming Chen 0001, Zhuoyu Tie, Eric Ke Wang, Muhammad Khurram Khan, Sachin Kumar 0002, Saru Kumari. Verifiable dynamic ranked search with forward privacy over encrypted cloud data
2992 -- 3011Saeed Banaeian Far, Maryam Rajabzadeh Asaar. A blockchain-based quantum-secure reporting protocol
3012 -- 3028Soumya Purohit, Prasad Calyam, Mauro Lemus Alarcon, Naga Ramya Bhamidipati, Abu Mosa, Khaled Salah 0001. HonestChain: Consortium blockchain for protected data sharing in health information systems
3029 -- 3042Wei She, Lijuan Huo, Zhao Tian, Yan Zhuang, Chaoyi Niu, Wei Liu 0043. A double steganography model combining blockchain and interplanetary file system
3043 -- 3057Mehedi Masud, Gurjot Singh Gaba, Karanjeet Choudhary, Roobaea Alroobaea, M. Shamim Hossain. A robust and lightweight secure access scheme for cloud based E-healthcare services
3058 -- 3074Ajay Kumar, Kumar Abhishek 0004, Bharat Bhushan, Chinmay Chakraborty. Secure access control for manufacturing sector with application of ethereum blockchain
3075 -- 3091Xuan Chen, Kien Nguyen, Hiroo Sekiya. An experimental study on performance of private blockchain in IoT applications
3092 -- 3109Chukwuka Chukwuocha, Parimala Thulasiraman, Ruppa K. Thulasiram. Trust and scalable blockchain-based message exchanging scheme on VANET
3110 -- 3123Shakeel Zafar, Zareen Alamgir, M. H. Rehman. An effective blockchain evaluation system based on entropy-CRITIC weight method and MCDM techniques
3124 -- 3142Vibha Jain, Bijendra Kumar. Combinatorial auction based multi-task resource allocation in fog environment using blockchain and smart contracts
3143 -- 3165Liqun Liu, Weihan Zhang, Cunqi Han. A survey for the application of blockchain technology in the media
3166 -- 3169Anil Kumar Budati, George Ghinea, Dileep Kumar Yadav, Hafeez Basha Ranipet. Guest editorial: Cognitive models for peer to peer networking in 5G and beyond networks and systems
3170 -- 3180Anh-Tu Le, Dinh-Thuan Do, Wen-Thong Chang, Chien-Thang Vu. Cognitive IoT relaying NOMA networks with user clustering and imperfect SIC
3181 -- 3197Usman Rauf Kamboh, Ubaid Ullah, Shehzad Khalid, Umar Raza, Chinmay Chakraborty, Fadi Al-Turjman 0001. Path loss modelling at 60 GHz mmWave based on cognitive 3D ray tracing algorithm in 5G
3198 -- 3212Bhawna Chaudhary, Karan Singh. A Blockchain enabled location-privacy preserving scheme for vehicular ad-hoc networks
3213 -- 3224Vivek Gupta, N. S. Beniwal, Krishna Kant Singh, Shivendra Nath Sharan, Akansha Singh. Optimal cooperative spectrum sensing for 5G cognitive networks using evolutionary algorithms
3225 -- 3234Haythem Bany Salameh, Sarah Mahasneh, Ahmed Musa, Rami Halloush, Yaser Jararweh. Effective peer-to-peer routing in heterogeneous half-duplex and full-duplex multi-hop cognitive radio networks
3235 -- 3249S. B. Goyal, Pradeep Bedi, Jugnesh Kumar, Vijaykumar Varadarajan. Deep learning application for sensing available spectrum for cognitive radio: An ECRNN approach
3250 -- 3264Wali Ullah Khan, Xingwang Li 0001, Asim Ihsan, Zain Ali, Basem M. ElHalawany, Guftaar Ahmed Sardar Sidhu. Energy efficiency maximization for beyond 5G NOMA-enabled heterogeneous networks
3265 -- 3267Feng Lyu 0001, Wenchao Xu, Quan Yuan, Katsuya Suto. Space-air-ground integrated networks for future IoT: Architecture, management, service and performance
3268 -- 3290Yan Ouyang, Wei Liu, Qiang Yang, Xingliang Mao, Fangfang Li. Trust based task offloading scheme in UAV-enhanced edge computing network
3291 -- 3306Ying Wan, Jun Long, Limin Liu, Zheman Qian, Siwei Zhong. Downlink aware data scheduling with delay guarantees in resource-limited leo satellite networks
3307 -- 3318Ling Lyu, Zhenhang Chu, Bin Lin 0001. Joint association and power optimization for multi-UAV assisted cooperative transmission in marine IoT networks
3319 -- 3332Naijian Zhang, Qi Jiang 0001, Long Li, XinDi Ma, Jianfeng Ma 0001. An efficient three-factor remote user authentication protocol based on BPV-FourQ for internet of drones
3333 -- 3348Xiaobin Xu 0004, Hui Zhao, Chang Liu 0008, Qi Wang, Shangguang Wang. Resource management of GEO relays for real-time remote sensing
3349 -- 3359Xiaojuan Wei, Xu Han, Bichuan Zhu, Jinglin Li, Fangchun Yang. A double-layer collaborative apportionment method for personalized and balanced routing
3360 -- 3371Xinru Mi, Chungang Yang, Yanbo Song, Ying Ouyang. A distributed matching game for exploring resource allocation in satellite networks
3372 -- 3387Rongping Zheng, Jiaxiang Zhang, Qi Yang. An ACO-based cross-layer routing algorithm in space-air-ground integrated networks
3388 -- 3404Junjie Zhou, Zhou Su, Qichao Xu, Weiwei Chen 0007. Cooperative content offloading scheme in air-ocean integrated networks

Volume 14, Issue 4

1841 -- 1853Chang Xu 0004, Jiachen Wang, Liehuang Zhu, Kashif Sharif, Chuan Zhang 0003, Can Zhang. Enabling privacy-preserving multi-level attribute based medical service recommendation in eHealthcare systems
1854 -- 1868Zhong Li, Xueting Yang, Changjun Jiang. Tree-searching based trust assessment through communities in vehicular networks
1869 -- 0Abba Garba, Ashutosh Dhar Dwivedi, Mohsin Kamal, Gautam Srivastava, Muhammad Tariq, M. Anwar Hasan, Zhong Chen 0001. Correction to: A digital rights management system based on a scalable blockchain
1870 -- 1888MoeenUddin Tariq, Muhammad Ayaz, Fazli Subhan, Muhammad Zahid Abbas. 2LR) scheme for underwater sensor networks
1889 -- 1904Shuai Zhou, Ting Zhang, Xianfu Meng. iForest: An informed resource search strategy in mobile P2P networks
1905 -- 1916Fayez Alqahtani, Mohammed Amoon, Aida A. Nasr. Reliable scheduling and load balancing for requests in cloud-fog computing
1917 -- 1942Efat Yousefpoor, Hamid Barati, Ali Barati. A hierarchical secure data aggregation method using the dragonfly algorithm in wireless sensor networks
1943 -- 1962Kavita Jaiswal, Veena Anand. A Grey-Wolf based Optimized Clustering approach to improve QoS in wireless sensor networks for IoT applications
1963 -- 1975Xu Qin, Guanglun Huang, Baoxian Zhang, Cheng Li. Energy efficient data correlation aware opportunistic routing protocol for wireless sensor networks
1976 -- 1987D. Rajesh, D. Giji Kiruba. 2SR protocol for smart dust
1988 -- 1997Shubhanshi Singh, Drishti Kedia, Neha Rastogi, T. Velmurugan 0001, P. Prakasam. P2P mobility management for seamless handover using D2D communication in B5G wireless technology
1998 -- 2010Yuvaraj N, Mohanraj P. Radial kernelized regressive merkle-damgård cryptographic hash blockchain for secure data transmission with IoT sensor node
2011 -- 2025Chengzhe Lai, Yangyang Du, Qili Guo, Dong Zheng 0001. A trust-based privacy-preserving friend matching scheme in social Internet of Vehicles
2026 -- 2037M. Sudha 0003, V. P. Galdis pushparathi. Traffic sign detection and recognition using RGSM and a novel feature extraction method
2038 -- 2060S. P. Tamizhselvi, Vijayalakshmi Muthuswamy. Delay - aware bandwidth estimation and intelligent video transcoder in mobile cloud
2061 -- 2071Souhila Silmi, Zouina Doukha, Samira Moussaoui. A self-localization range free protocol for wireless sensor networks
2072 -- 2083Ramakrishnan Anandkumar. Hybrid fuzzy logic and artificial Flora optimization algorithm-based two tier cluster head selection for improving energy efficiency in WSNs
2084 -- 2098S. Jeen Shene, W. R. Sam Emmanuel. An energy aware modified PAM clustering with cluster head modulation in Mobile cloud sensor environment
2099 -- 2114Chunhai Li, Xiaohuan Li, Yujue Wang, Yong Ding, Feng Zhao 0002. Anonymous and Traceable Authentication for Securing Data Sharing in Parking Edge Computing
2115 -- 2126Zhixin Liu 0001, Xiangyun Meng, Yazhou Yuan, Yi Yang, Kit Yan Chan. Joint optimization for throughput maximization in underwater acoustic networks with energy harvesting
2127 -- 2138Masahiro Sasabe. Analysis of minimum distribution time of tit-for-tat-based P2P file distribution: Linear programming based approach
2139 -- 2155Mengying Jia, Jie Zhu 0002, Haiping Huang. Energy and delay-ware massive task scheduling in fog-cloud computing system
2156 -- 2170Min Zhou, Yandong Zheng, Yunguo Guan, Limin Peng, Rongxing Lu. Efficient and privacy-preserving range-max query in fog-based agricultural IoT
2171 -- 2186Xiaopeng Yang, Hui Zhu 0001, Fengwei Wang, Songnian Zhang, Rongxing Lu, Hui Li 0006. MASK: Efficient and privacy-preserving m-tree based biometric identification over cloud
2187 -- 2208Neeti Gupta, Anuradha Pughat, Vidushi Sharma. A critical analysis of RPL objective functions in internet of things paradigm
2209 -- 2223Ramaprabha Jayaram, S. Prabakaran. Adaptive cost and energy aware secure peer-to-peer computational offloading in the edge-cloud enabled healthcare system
2224 -- 2235Zheheng Rao, Yanyan Xu, ShaoMing Pan. A deep learning-based constrained intelligent routing method
2236 -- 2247Lunzhi Deng, Jianxin Shao, ZhenYu Hu. Identity based two-party authenticated key agreement scheme for vehicular ad hoc networks
2248 -- 2261Hua Shi, Ronghua Luo, Guan Gui. Joint offloading and energy optimization for wireless powered mobile edge computing under nonlinear EH Model
2262 -- 2274Yun Zhang, Hongwei Li 0001, Guowen Xu, Shuai Yuan, Xiaoming Huang. One radish, One hole: Specific adversarial training for enhancing neural network's robustness
2275 -- 2284K. Kannan, P. Sivaranjani, Sathish Kumar Shanmugam, M. Nalini, V. R. Balaji, Sanjeevi Pandiyan. SPAHN novel approach for PL-AG gateway discovery for internet connectivity
2285 -- 2294R. P. Meenaakshi Sundhari, L. Murali, S. Baskar 0002, P. Mohamed Shakeel. MDRP: Message dissemination with re-route planning method for emergency vehicle information exchange
2295 -- 2305Torki A. Altameem, Ayman Altameem. Scalable aggregation plan (SAP) for portable network in a box (NIB) architecture
2306 -- 2315Mengnan Liu, Bing Han, Liyou Xu, Yanying Li. CAN bus network design of bifurcated power electric tractor
2316 -- 2326Mohammad Al-Ma'aitah, Ayed Alwadain, Aldosary Saad. Transmission adaptive mode selection (TAMS) method for internet of things device energy management
2327 -- 2339K. Nirmal, B. Janet, R. Kumar. Analyzing and eliminating phishing threats in IoT, network and other Web applications using iterative intersection
2340 -- 2350Zafer Al-Makhadmeh, Amr Tolba. SRAF: Scalable Resource Allocation Framework using Machine Learning in user-Centric Internet of Things
2351 -- 2360V. K. Gnanavel, A. Srinivasan. Effective power allocation and distribution for 6 g - network in a box enabled peer to peer wireless communication networks
2361 -- 2371Rajan Regin, T. Menakadevi. A novel clustering technique to stop congestion occur vehicular ad-hoc networks using node density based on received signal strength
2372 -- 2384Chunduru Anilkumar, Sumathy Subramanian. A novel predicate based access control scheme for cloud environment using open stack swift storage
2385 -- 2398Deevi Radha Rani, G. Geethakumari. A framework for the identification of suspicious packets to detect anti-forensic attacks in the cloud environment
2399 -- 2409Achyut Shankar, P. Pandiaraja, K. Sumathi, Thompson Stephan, Pavika Sharma. Privacy preserving E-voting cloud system based on ID based encryption
2410 -- 2418Vamsinath Javangula, Suvarna Vani Koneru, Haritha Dasari. High utility itemset mining using path encoding and constrained subset generation
2419 -- 2429Preethi Devan, Neelu Khare. Sparse auto encoder driven support vector regression based deep learning model for predicting network intrusions
2430 -- 2442Suyel Namasudra, Rupak Chakraborty, Seifedine Nimer Kadry, Gunasekaran Manogaran, Bharat S. Rawal. FAST: Fast Accessing Scheme for data Transmission in cloud computing
2443 -- 2451Silambarasan Elkana Ebinazer, Nickolas Savarimuthu, S. Mary Saira Bhanu. An efficient secure data deduplication method using radix trie with bloom filter (SDD-RT-BF) in cloud environment
2452 -- 2461C. Rajesh Babu, B. Amutha. A novel energy-efficient data aggregation protocol for cognitive radio based wireless multimedia networks
2462 -- 2472M. Girija, P. Manickam, M. Ramaswami. PriPresent: an embedded prime LightWeight block cipher for smart devices
2473 -- 2486G. Sangeetha, G. Sumathi. An optimistic technique to detect Cache based Side Channel attacks in Cloud
2487 -- 2494Zhi-xian Chang. Dynamic intelligent resource allocation for emergency situations
2495 -- 2500Binbin Jiang. Research on wireless sensor location technology for biologic signal measuring based on intelligent bionic algorithm
2501 -- 2510Changyou Ye, Xiaowei Song, G. N. Vivekananda, V. Savitha. Intelligent physical systems for strategic planning and management of enterprise information
2511 -- 2523Zhun Tian, Shengrui Zhang. Application of big data optimized clustering algorithm in cloud computing environment in traffic accident forecast
2524 -- 2536Ravi Kumar D. N. S., Barani S.. Epidemic and transmission priority based data dissemination model in vehichular adhoc networks (VANETs)
2537 -- 2553Fatemehsadat Mirsadeghi, Marjan Kuchaki Rafsanjani, Brij B. Gupta. A trust infrastructure based authentication method for clustered vehicular ad hoc networks
2554 -- 2564Osama Alfarraj. A machine learning-assisted data aggregation and offloading system for cloud-IoT communication
2565 -- 2584Parasuraman Kumar, A. Anbarasa Kumar, C. Sahayakingsly, A. Udayakumar. Analysis of intrusion detection in cyber attacks using DEEP learning neural networks

Volume 14, Issue 3

1021 -- 1043Elham Adibi, Ehsan Mousavi Khaneghah. A mathematical model to describe resource discovery failure in distributed exascale computing systems
1044 -- 1057Rajasekhar Bandapalle Mulinti, M. Nagendra. An efficient latency aware resource provisioning in cloud assisted mobile edge framework
1058 -- 1070Nan Zhao, Nianmin Yao, Zhenguo Gao. A message transmission scheduling algorithm based on time-domain interference alignment in UWANs
1071 -- 1087Haoran Hu, Wei Chang. Non-cryptography countermeasure against controllable event triggering attack in WSNs
1088 -- 1105Varun Kurri, Vishweshvaran Raja, Prakasam Periasamy. Cellular traffic prediction on blockchain-based mobile networks using LSTM model in 4G LTE network
1106 -- 1117Hanshu Hong, Zhixin Sun. A secure peer to peer multiparty transaction scheme based on blockchain
1118 -- 1131Davood Behzad, Nazbanoo Farzaneh. A novel trust management method to preserve privacy in vehicular ad-hoc networks
1132 -- 1153A. Samson Arun Raj, Yogesh Palanichamy. Packet classification based aerial intelligent relay-road side unit (air-rsu) framework for vehicular ad-hoc networks
1154 -- 1173Marwa Ibrahim, Hassan Harb, Ali Mansour, Abbass Nasser, Christophe Osswald. All-in-one: Toward hybrid data collection and energy saving mechanism in sensing-based IoT applications
1174 -- 1189Navya Vuppalapati, T. G. Venkatesh 0001. Modeling & analysis of software defined networks under non-stationary conditions
1190 -- 1206Chao Bu, Jinsong Wang. Computing tasks assignment optimization among edge computing servers via SDN
1207 -- 1217Yipin Zhang, Xiaolin Chang, Jelena V. Misic, Vojislav B. Misic, Yutong Cai. Cost-effective migration-based dynamic platform defense technique: a CTMDP approach
1218 -- 1228Nitin Singha, Yatindra Nath Singh. New incentive mechanism to enhance cooperation in wireless P2P networks
1229 -- 1241C. Gopala Krishnan, S. Gomathi, Anusha Bamini A. M. High energy efficient lifetime management system and trust management framework for manet using self-configurable cluster mechanism
1242 -- 1260Nitin Shukla, Dipmalya Datta, Mayank Pandey, Shashank Srivastava. Towards software defined low maintenance structured peer-to-peer overlays
1261 -- 1275Alla Abbas Khadir, Seyed-Amin Hosseini-Seno. SDN-based offloading policy to reduce the delay in fog-vehicular networks
1276 -- 0Alla Abbas Khadir, Seyed-Amin Hosseini-Seno. Correction to: SDN-based offloading policy to reduce the delay in fog-vehicular networks
1277 -- 1289Abhay Kumar Agrahari, Shirshu Varma. A provably secure RFID authentication protocol based on ECQV for the medical internet of things
1290 -- 1302Umasankararao Varri, Syam Kumar Pasupuleti, K. V. Kadambari. CP-ABSEL: Ciphertext-policy attribute-based searchable encryption from lattice in cloud storage
1303 -- 1315Vrajesh Kumar Chawra, Govind P. Gupta. Hybrid meta-heuristic techniques based efficient charging scheduling scheme for multiple Mobile wireless chargers based wireless rechargeable sensor networks
1316 -- 0Vrajesh Kumar Chawra, Govind P. Gupta. Correction to: Hybrid meta-heuristic techniques based efficient charging scheduling scheme for multiple Mobile wireless chargers based wireless rechargeable sensor networks
1317 -- 1333Jian Chen, Yunhe Xie, Jie Jia, Mingyang Zhang, Qinghu Wang, Xingwei Wang. Joint resource allocation and routing optimization for spectrum aggregation based CRAHNs
1334 -- 1347Noureddine Moussa, Abdelbaki El Belrhiti El Alaoui. An energy-efficient cluster-based routing protocol using unequal clustering and improved ACO techniques for WSNs
1348 -- 1352Kaiping Xue, Zhe Liu, Haojin Zhu, Miao Pan, David S. L. Wei. Advances in privacy-preserving computing
1353 -- 1365Li Chen, Ke Zhang. Privacy-aware smart card based biometric authentication scheme for e-health
1366 -- 1378Yinghui Zhang, Jian Zou, Rui Guo. Efficient privacy-preserving authentication for V2G networks
1379 -- 1387Qianjun Wei, Qiang Li, Zhipeng Zhou, ZhengQiang Ge, Yonggang Zhang. Privacy-preserving two-parties logistic regression on vertically partitioned data using asynchronous gradient sharing
1388 -- 1400Xin Ye, Jin Zhou, Yuedi Li, Mingsheng Cao, Dajiang Chen, Zhiguang Qin. A location privacy protection scheme for convoy driving in autonomous driving era
1401 -- 1413Xiaofei Bu, Yu-e Sun, Yang Du 0006, Xiaocan Wu, Boyu Zhang, He Huang 0001. A novel spread estimation based abnormal flow detection in high-speed networks
1414 -- 1430Yi Xu, Changgen Peng, Weijie Tan, Youliang Tian, Minyao Ma, Hongfa Ding. High-throughput secure multiparty multiplication protocol via bipartite graph partitioning
1431 -- 1445Yuqi Fan, Zhifeng Jin, Guangming Shen, Donghui Hu, Lei Shi 0011, Xiaohui Yuan 0001. Three-stage Stackelberg game based edge computing resource management for mobile blockchain
1446 -- 1457Cong Yu 0014, Donghui Hu, Shuli Zheng, Wenjie Jiang, Meng Li 0006, Zhong-Qiu Zhao. An improved steganography without embedding based on attention GAN
1458 -- 1474Mingfu Xue, Can He, Jian Wang, Weiqiang Liu. Backdoors hidden in facial features: a novel invisible backdoor attack against face recognition systems
1475 -- 1487Bang Tran, Xiaohui Liang. Exploiting peer-to-peer communications for query privacy preservation in voice assistant systems
1488 -- 1499Jin Gu, Jianqiang Shen, Baoyun Wang. A robust and secure multi-authority access control system for cloud storage
1500 -- 1519Edgar Batista, Agusti Solanas. A uniformization-based approach to preserve individuals' privacy during process mining analyses
1520 -- 1530Yabin Xu, Bin Shi. Copyright protection method of big data based on nash equilibrium and constraint optimization
1531 -- 1547Zihao Zhu, Yulin Xu, Zhou Su. A reputation-based cooperative content delivery with parking vehicles in vehicular ad-hoc networks
1548 -- 1571Diksha Rangwani, Dipanwita Sadhukhan, Sangram Ray, Muhammad Khurram Khan, Mou Dasgupta. A robust provable-secure privacy-preserving authentication protocol for Industrial Internet of Things
1572 -- 1595Manojkumar Vivekanandan, V. N. Sastry, U. Srinivasulu Reddy. Blockchain based Privacy Preserving User Authentication Protocol for Distributed Mobile Cloud Environment
1596 -- 1607Yuanming Zhang, Jing Tao, Shuo Zhang, Yuchao Zhang, Pinghui Wang. A machine learning based approach for user privacy preservation in social networks
1608 -- 1628Shashidhar Virupaksha, Venkatesulu Dondeti. Anonymized noise addition in subspaces for privacy preserved data mining in high dimensional continuous data
1629 -- 1649J. Andrew Onesimu, J. Karthikeyan, Yuichi Sei. An efficient clustering-based anonymization scheme for privacy-preserving data collection in IoT based healthcare services
1650 -- 1665D. Hemkumar, S. Ravichandra, Durvasula V. L. N. Somayajulu. Impact of data correlation on privacy budget allocation in continuous publication of location statistics
1666 -- 1691Luis Bernardo Pulido-Gaytan, Andrei Tchernykh, Jorge M. Cortés-Mendoza, Mikhail G. Babenko, Gleb I. Radchenko, Arutyun Avetisyan, Alexander Yu. Drozdov. Privacy-preserving neural networks with Homomorphic encryption: Challenges and opportunities
1692 -- 1704Longfei Zheng, Jun Zhou 0011, Chaochao Chen 0001, Bingzhe Wu, Li Wang 0056, Benyu Zhang. ASFGNN: Automated separated-federated graph neural network
1705 -- 1733William Lee Croft, Jörg-Rüdiger Sack, Wei Shi 0001. Obfuscation of images via differential privacy: From facial images to general images
1734 -- 1735Ying Li, R. K. Shyamasundar, Mohammad S. Obaidat, Yuyu Yin. Guest editorial special issue on "P2P computing for deep learning"
1736 -- 1747Xiaojing Yin, Jiwei Huang, Wei He, Wei Guo, Han Yu 0001, LiZhen Cui. Group task allocation approach for heterogeneous software crowdsourcing tasks
1748 -- 1764Xu Ding, Jing Wang, Chong Zhao, Peng Zhang, Yucheng Wu, Honghao Gao. The throughput optimization for wireless sensor networks adopting interference alignment and successive interference cancellation
1765 -- 1777Pengcheng Zhang, Wennan Cao, Wenrui Li. Surface and high-altitude combined rainfall forecasting using convolutional neural network
1778 -- 1805Sahil Khatri, Hrishikesh Vachhani, Shalin Shah, Jitendra Bhatia, Manish Chaturvedi, Sudeep Tanwar, Neeraj Kumar 0001. Machine learning models and techniques for VANET based traffic management: Implementation issues and challenges
1806 -- 1815Yu Weng, Zehua Chen, Tianbao Zhou. Improved differentiable neural architecture search for single image super-resolution
1816 -- 1828Fang Yang, Fuzhong Li, Kai Zhang, Wuping Zhang, Shancang Li. Influencing factors analysis in pear disease recognition using deep learning
1829 -- 1840Xiaolong Xu 0002, Haoyan Xu, Yang Wang, Jing Zhang. AENEA: A novel autoencoder-based network embedding algorithm

Volume 14, Issue 2

453 -- 466Tri Gia Nguyen, Trung V. Phan, Hai Hoang Nguyen, Phet Aimtongkham, Chakchai So-In. An efficient distributed algorithm for target-coverage preservation in wireless sensor networks
467 -- 481Feng Zeng, Yaojia Chen, Lan Yao, Jinsong Wu. A novel reputation incentive mechanism and game theory analysis for service caching in software-defined vehicle edge computing
482 -- 496Yong Ding 0005, Decun Luo, Hengkui Xiang, Wenyao Liu, Yujue Wang. Design and implementation of blockchain-based digital advertising media promotion system
497 -- 506Qian Wang, Zhihua Cui, Lifang Wang. Charging path optimization for wireless rechargeable sensor network
507 -- 527Yanwu Ding, Yazan Ibdah. Simulation models for mobile-to-mobile channels with isotropic and nonisotropic scattering
528 -- 540Haobin Jiang, Lei Hua, Lukuman Wahab. SAES: A self-checking authentication scheme with higher efficiency and security for VANET
541 -- 558Amir Nader Shahbaz, Hamid Barati, Ali Barati. Multipath routing through the firefly algorithm and fuzzy logic in wireless sensor networks
559 -- 584Oluwafolake Ojo, Ayodeji Oluwatope, Suraju Olusegun Ajadi. A reliable peer-to-peer streaming protocol in low-capacity networks
585 -- 598Prasad Challa, B. Eswara Reddy. Construction of multi-level data aggregation trees for energy efficiency and delivery delay in machine-to-machine communications
599 -- 608Peiyan Yuan, Rong Huang. Integrating the device-to-device communication technology into edge computing: A case study
609 -- 626Mina Malekzadeh. Developing new connectivity architectures for local sensing and control IoT systems
627 -- 643Abderrahim Guerna, Salim Bitam, Carlos T. Calafate. AC-RDV: a novel ant colony system for roadside units deployment in vehicular ad hoc networks
644 -- 654Jieyu Xu, Wen Bai, Miao Hu, Haibo Tian, Di Wu 0001. Bitcoin miners: Exploring a covert community in the Bitcoin ecosystem
655 -- 671Zuyan Wang, Jun Tao, Yang Gao, Yifan Xu 0002, Weice Sun, Xiaoyan Li. A precision adjustable trajectory planning scheme for UAV-based data collection in IoTs
672 -- 686Debashis Das, Sourav Banerjee, Utpal Biswas. A secure vehicle theft detection framework using Blockchain and smart contract
687 -- 707Weverton Cordeiro, Luciano Paschoal Gaspary, Rafael Beltran, Kayuã Paim, Rodrigo B. Mansilha. Revisiting the coupon collector's problem to unveil users' online sessions in networked systems
708 -- 721Mohammad Saiful Islam Mamun, Atsuko Miyaji, Rongxing Lu, Chunhua Su. A lightweight multi-party authentication in insecure reader-server channel in RFID-based IoT
722 -- 728Lein Harn, Zhe Xia, Chingfang Hsu. Non-interactive secure multi-party arithmetic computations with confidentiality for P2P networks
729 -- 746Elahe Khatibi, Mohsen Sharifi. Resource discovery mechanisms in pure unstructured peer-to-peer systems: a comprehensive survey
747 -- 762Vani Rajasekar, J. Premalatha, K. Sathya. Cancelable Iris template for secure authentication based on random projection and double random phase encoding
763 -- 780Guisong Yang, Yanglin Zhang, Buye Wang, Xingyu He, Jiangtao Wang, Ming Liu. Task allocation through fuzzy logic based participant density analysis in mobile crowd sensing
781 -- 793Sahar Zargarzadeh, Neda Moghim, Behrouz Shahgholi Ghahfarokhi. A consensus-based cooperative Spectrum sensing technique for CR-VANET
794 -- 806Songzhu Zhang, Xingwei Wang 0001, Jianhui Lv, Min Huang 0001. Light forwarding based optimal CCN content delivery: a case study in metropolitan area network
807 -- 820Vishal Kumar Arora, Vishal Sharma. A novel energy-efficient balanced multi-hop routing scheme (EBMRS) for wireless sensor networks
821 -- 836Irin Loretta G, V. Kavitha. Privacy preserving using multi-hop dynamic clustering routing protocol and elliptic curve cryptosystem for WSN in IoT environment
837 -- 851Kun Tang, Shaowei Liao, Jian Dong, Ronghua Shi. Spectrum sharing protocol in two-way cognitive radio networks with energy accumulation in relay node
852 -- 872Bin Wu, Caifen Wang, Hailong Yao. A certificateless linearly homomorphic signature scheme for network coding and its application in the IoT
873 -- 887Elham Hasheminejad, Hamid Barati. A reliable tree-based data aggregation method in wireless sensor networks
888 -- 897Ruchir Gupta, Yatindra Nath Singh, Antriksh Goswami. Trust estimation in peer-to-peer network using BLUE
898 -- 916Junyan Guo, Ye Du. A secure three-factor anonymous roaming authentication protocol using ECC for space information networks
917 -- 932Shamsher Ullah, Nizamud Din. Blind signcryption scheme based on hyper elliptic curves cryptosystem
933 -- 947Xu Wu. Cross-domain trust management mechanism for internet of things systems
948 -- 961Sheng Yin, Jia Wu, Genghua Yu. Low energy consumption routing algorithm based on message importance in opportunistic social networks
962 -- 977Judy C. Guevara, Nelson L. S. Da Fonseca. Task scheduling in cloud-fog computing systems
978 -- 1005Sakshi Garg, Deepti Mehrotra, Hari Mohan Pandey, Sujata Pandey. Accessible review of internet of vehicle models for intelligent transportation and research gaps for potential future directions
1006 -- 1018Jia Wu 0002, Jingge Qu, Genghua Yu. Behavior prediction based on interest characteristic and user communication in opportunistic social networks
1019 -- 0Malini Balachandran, Noor Mohammed Vali Mohamad. Correction to: Joint power optimization and scaled beamforming approach in B5G network based massive MIMO enabled HetNet with full-duplex small cells

Volume 14, Issue 1

1 -- 17Abdennour Zekri, Weijia Jia 0001. Performance evaluation of rate adaptation algorithms for seamless heterogeneous vehicular communications
18 -- 29Hardik Dhingra, Gagan Deep Dhand, Rashmi Chawla, Shailender Gupta. An integrated service model to support user specific QoS routing in cognitive radio ad hoc network
30 -- 43S. Balamurugan, A. Ayyasamy, K. Suresh Joseph. Enhanced petri nets for traceability of food management using internet of things
44 -- 57Saunhita Sapre, S. Mini 0001. A differential moth flame optimization algorithm for mobile sink trajectory
58 -- 68Yuvaraj N, Saravanan G. Markov transition and smart cache congestion control for IoT enabled wireless mesh networks
69 -- 81Xiaoying Shen, Licheng Wang, Qingqi Pei, Yuan Liu 0013, Miaomiao Li. Location privacy-preserving in online taxi-hailing services
82 -- 100Vinod Kumar, Rajendra Kumar, Santosh K. Pandey. LKM-AMI: A Lightweight Key Management Scheme for Secure two Way Communications between Smart Meters and HAN Devices of AMI System in Smart Grid
101 -- 0Vinod Kumar, Rajendra Kumar, Santosh K. Pandey. Correction to: LKM-AMI: A Lightweight Key Management Scheme for Secure two Way Communications between Smart Meters and HAN Devices of AMI System in Smart Grid
102 -- 120Praveen Kumar Premkamal, Syam Kumar Pasupuleti, Abhishek Kumar Singh, P. J. A. Alphonse. Enhanced attribute based access control with secure deduplication for big data storage in cloud
121 -- 134Amir Mahdi Sazdar, Nasim Alikhani, Seyed Ali Ghorashi, Ahmad Khonsari. Privacy preserving in indoor fingerprint localization and radio map expansion
135 -- 150M'hammed Achour, Mohammed Mana, Abderrezak Rachedi. On the issues of selective jamming in IEEE 802.15.4-based wireless body area networks
151 -- 163Lili Jiang, Xiaolin Chang, Jelena V. Misic, Vojislav B. Misic, Runkai Yang. Performance analysis of heterogeneous cloud-edge services: A modeling approach
164 -- 176Zhixin Liu 0001, Xi Han, Yuanai Xie, Yazhou Yuan, Kit Yan Chan. Energy-efficiency maximization in D2D-enabled vehicular communications with consideration of dynamic channel information and fairness
177 -- 201Bipasha Mahato, Deepsubhra Guha Roy, Debashis De. Distributed bandwidth selection approach for cooperative peer to peer multi-cloud platform
202 -- 214Tianqi Zhang, Haibo Zhou, Bo Qian, Yunting Xu, Tianxiong Wu, Ting Ma 0004. A scalable unsignalized intersection system for automated vehicles and semi-physical implementation
215 -- 224Mahmoud M. Selim, Mohamed Rihan, Yatao Yang, Junxian Ma. Optimal task partitioning, Bit allocation and trajectory for D2D-assisted UAV-MEC systems
225 -- 239Yiming Hei, Yizhong Liu, Dawei Li, Jianwei Liu 0001, Qianhong Wu. Themis: An accountable blockchain-based P2P cloud storage scheme
240 -- 242P. Prakasam, Md Shohel Sayeed, J. Ajayan. Guest editorials: P2P computing for 5G, beyond 5G (B5G) networks and internet-of-everything (IoE)
243 -- 269Steffi Jayakumar, Nandakumar S. A review on resource allocation techniques in D2D communication for 5G and B5G technology
270 -- 278A. Senthil Kumar, V. Thirunavukkarasu. Peer to peer communication framework for 5G networks using Ambient Service
279 -- 295Divya Mohan, Geetha Mary Amalanathan. The efficacy of handoff strategy based spectrum allocation using TSB-MFO for D2D and CU communications
296 -- 304Noor Mohammed Vali Mohamad, Prasun Ambastha, Sukriti Gautam, Rishabh Jain, Hariharan Subramaniyam, Lakshmanan Muthukaruppan. Dynamic Sectorization and parallel processing for device-to-device (D2D) resource allocation in 5G and B5G cellular network
305 -- 318Mehmet Bilim. Dual-branch SC wireless systems with HQAM for beyond 5G over η-μ fading channels
319 -- 332J. Christopher Clement, N. Indira, P. Vijayakumar, R. Nandakumar. Deep learning based modulation classification for 5G and beyond wireless systems
333 -- 348Malini Balachandran, Noor Mohammed Vali Mohamad. Joint power optimization and scaled beamforming approach in B5G network based massive MIMO enabled HetNet with full-duplex small cells
349 -- 374D. P. Acharjya, N. Syed Siraj Ahmed. Tracing of online assaults in 5G networks using dominance based rough set and formal concept analysis
375 -- 391T. R. Reshmi, M. Azath. Improved self-healing technique for 5G networks using predictive analysis
392 -- 402S. Perumal Sankar, T. D. Subash, N. Vishwanath, Deepa Elizabeth Geroge. Security improvement in block chain technique enabled peer to peer network for beyond 5G and internet of things
403 -- 419Manojkumar Vivekanandan, V. N. Sastry, U. Srinivasulu Reddy. BIDAPSCA5G: Blockchain based Internet of Things (IoT) device to device authentication protocol for smart city applications using 5G technology
420 -- 438Pankaj Kumar, Lokesh Chouhan. A secure authentication scheme for IoT application in smart home
439 -- 452Riya, Nitin Gupta 0006, Sanjay Kumar Dhurandher. Efficient caching method in fog computing for internet of everything