IEEE Transactions on Network and Service Management

Last updated: 2026-03-13 05:01 UTC

All documents

Number of pages: 159

Author(s) Title Year Publication Keywords
MaoLin He, Bin Duo, Ping Huang, Junsong Luo, Dongfen Li, Jun Li 1+1 Protection Transmission for UAV-Enabled Computing Power Networks via Multi-Agent Reinforcement Learning 2026 Early Access Autonomous aerial vehicles Computer architecture Routing
Deemah H. Tashman, Soumaya Cherkaoui Trustworthy AI-Driven Dynamic Hybrid RIS: Joint Optimization and Reward Poisoning-Resilient Control in Cognitive MISO Networks 2026 Early Access Reconfigurable intelligent surfaces Reliability Optimization
Francesco Chiti, Simone Morosi, Laura Pierucci Multiple SDN Controllers Placement for Integrated Satellite/Terrestrial Network 2026 Early Access
Hyeongjin Kim, Hyunbum Kim, Wooil Kim, Athanasios V. Vasilakos, Paolo Bellavista Resting Drone-Enabled Enhanced ITS Coverage and V2X Integration Network Management for Urban Mobility Service 2026 Early Access
Jun Li, Yuxuan Chen, Zhiyuan Zhong, Yongcheng Li, Biswanath Mukherjee, Gangxiang Shen Resource Allocation for Time-Sensitive Services in Centralized Optical and Wi-Fi Access Networks 2026 Early Access
Yonghan Wu, Jin Li, Yi Huang, Weixuan Fan, Qi Zhang, Danshi Wang, Min Zhang Timeslot-Adaptive and Traffic Load-Aware Routing Computation in Two-layer LEO Satellite Networks 2026 Early Access
Jing Zhang, Chao Luo, Rui Shao MTG-GAN: A Masked Temporal Graph Generative Adversarial Network for Cross-Domain System Log Anomaly Detection 2026 Early Access Anomaly detection Adaptation models Generative adversarial networks
Jiazhong Lu, Jimin Peng, Jian Shu, Jiali Yin, Xiaolei Liu Adversarial Sample Based on Structured Fusion Noise for Botnet Detection in Industrial Control Systems 2026 Early Access Botnet Industrial control Feature extraction
Pengcheng Guo, Zhi Lin, Haotong Cao, Yifu Sun, Kuljeet Kaur, Sherif Moussa GAN-Empowered Parasitic Covert Communication: Data Privacy in Next-Generation Networks 2026 Early Access Interference Generators Generative adversarial networks
Fernando Martinez-Lopez, Lesther Santana, Mohamed Rahouti, Abdellah Chehri, Shawqi Al-Maliki, Gwanggil Jeon Learning in Multiple Spaces: Prototypical Few-Shot Learning with Metric Fusion for Next-Generation Network Security 2026 Early Access Measurement Prototypes Extraterrestrial measurements
Yanxu Lin, Renzhong Zhong, Jingnan Xie, Yueting Zhu, Byung-Gyu Kim, Saru Kumari, Shakila Basheer, Fatimah Alhayan Privacy-Preserving Digital Publishing Framework for Next-Generation Communication Networks: A Verifiable Homomorphic Federated Learning Approach 2026 Early Access Electronic publishing Federated learning Cryptography
Zhaoping Li, Mingshu He, Xiaojuan Wang HKD-Net: Hierarchical Knowledge Distillation Based on Multi-Domain Feature Fusion for Efficient Network Intrusion Detection 2026 Early Access Feature extraction Telecommunication traffic Knowledge engineering
Wenxuan Li, Yu Yao, Ni Zhang, Chuan Sheng, Ziyong Ran, Wei Yang IMADP: Imputation-based Anomaly Detection in SCADA Systems via Adversarial Diffusion Process 2026 Early Access Anomaly detection Adaptation models Data models
Chengwei Liao, Guofeng Yan, Hengliang Tan, Jiao Du, Xia Deng, Heng Wu jTOLP-MADRL: A MADRL-based Joint Optimization Algorithm of Task Offloading Location and Proportion for Latency-sensitive Tasks in Vehicle Edge Computing Network 2026 Early Access Servers Resource management Edge computing
Wenjing Jing, Quan Zheng, Siwei Peng, Shuangwu Chen, Xiaobin Tan, Jian Yang Equivalent Characteristic Time Approximation Based Network Planning for Cache-enabled Networks 2026 Early Access Planning Resource management Costs
Woojin Jeon, Donghyun Yu, Ruei-Hau Hsu, Jemin Lee Secure Data Sharing Framework with Fine-grained Access Control and Privacy Protection for IoT Data Marketplace 2026 Early Access Internet of Things Encryption Access control
Guolong Li, Yuan Gao, Jiongjiong Ren, Shaozhen Chen BPF-GNN: A multi-granularity feature extraction model using graph neural networks for encrypted traffic classification 2026 Early Access Feature extraction Cryptography Payloads
Beibei Li B-TWGA: A Trusted Gateway Architecture Based on Blockchain for Internet of Things 2026 Early Access Internet of Things Blockchains Security
Ebrima Jaw, Moritz Müller, Cristian Hesselman, Lambert Nieuwenhuis Reproducibility Study and Assessment of the Evolution of Serial BGP Hijacking Events 2026 Early Access Internet Routing Border Gateway Protocol
Wenxue Hu, Lei Sun, Zhangchao Ma, Rong Huang, Yushan Pei, Jianquan Wang A Novel Time-Window Scheduling Algorithm With Network Calculus Model in Time-Sensitive Networking 2026 Early Access Job shop scheduling Optimization Switches