Issue Date | Title | Author(s) |
2022-01-01 | Exploiting Blockchain and RMCV-Based Malicious Node Detection in ETD-LEACH for Wireless Sensor Networks | Khan, AU; Sajid, MBE; Rauf, A; Saqib, MN; Zaman, F; Javaid, N; Alamoodi, AH |
2022-01-01 | An Improved Authentication Scheme for Digital Rights Management System | Hussain, S; Zikria, YB; Mallah, GA; Chen, CM; Alshehri, MD; Ishmanov, F; Chaudhry, SA; Ravi, V |
2016-08-25 | A QoE centric distributed caching approach for vehicular video streaming in cellular networks | Sun, F; Liu, B; Hou, F; Zhou, H; Chen, J; Rui, Y; Gui, L |
2021-01-01 | (τ, m)-slicedBucket privacy model for sequential anonymization for improving privacy and utility | Khan, R; Tao, X; Anjum, A; Malik, SR; Yu, S; Khan, A; Rahman, W; Malik, H |
2018-01-01 | Network Traffic Prediction Based on Deep Belief Network and Spatiotemporal Compressive Sensing in Wireless Mesh Backbone Networks | Nie, L; Wang, X; Wan, L; Yu, S; Song, H; Jiang, D |
2022-01-15 | Efficient and reliable hybrid deep learning-enabled model for congestion control in 5G/6G networks | Khan, S; Hussain, A; Nazir, S; Khan, F; Oad, A; Alshehr, MD |
2022-01-01 | A Secure and Efficient Energy Trading Model Using Blockchain for a 5G-Deployed Smart Community | Yahaya, AS; Javaid, N; Ullah, S; Khalid, R; Javed, MU; Khan, RU; Wadud, Z; Khan, MA; Piro, G |
2020 | Privacy Preservation in Location-Based Services: A Novel Metric and Attack Model | Shaham, S; Ding, M; Liu, B; Dang, S; Lin, Z; Li, J |
2023-01-01 | Machine Learning-Powered Encrypted Network Traffic Analysis: A Comprehensive Survey | Shen, M; Ye, K; Liu, X; Zhu, L; Kang, J; Yu, S; Li, Q; Xu, K |
2023-01-01 | Combining Federated Learning and Edge Computing Toward Ubiquitous Intelligence in 6G Network: Challenges, Recent Advances, and Future Directions | Duan, Q; Huang, J; Hu, S; Deng, R; Lu, Z; Yu, S |