IEEE Transactions on Network and Service Management

Last updated: 2026-01-30 05:01 UTC

All documents

Number of pages: 155

Author(s) Title Year Publication Keywords
Fengqi Li, Yudong Li, Lingshuang Ma, Kaiyang Zhang, Yan Zhang, Chi Lin, Ning Tong Integrated Cloud-Edge-SAGIN Framework for Multi-UAV Assisted Traffic Offloading Based On Hierarchical Federated Learning 2026 Early Access Resource management Autonomous aerial vehicles Heuristic algorithms
Zhihao Wen, Weishi An, Chuanhua Wang, Quanbo Ge, Thippa Reddy Gadekallu, Hailin Feng, Kai Fang EK-IGNN: Defending Meteorological Networks Against Covert Attacks using EMD-Kalman Noise Fingerprinting and Intrinsic Graph Neural Networks 2026 Early Access
Islam Elgarhy, Mahmoud M. Badr, Ahmed T. Eltoukhy, Mohamed Mahmoud, Tariq Alshawi, Maazen Alsabaan, Mostafa Fouda Interpretable Detector Secure Against Stealthy False Power Consumption Attacks 2026 Early Access
Muhammad Umar Farooq Qaisar, Weijie Yuan, Lin Zhang, Shehzad Ashraf Chaudhry, Guangjie Han, Yunyang Zhang A Robust Trust Management System for V2X Networks Integrating ISAC with Blockchain Smart Contracts 2026 Early Access
Fekri Saleh, Abraham O. Fapojuwo, Diwakar Krishnamurthy vEdge: Flow-based Network Slicing for Smart Cities in Edge Cloud Environments 2026 Early Access
Shagufta Henna, Upaka Rathnayake Hypergraph Representation Learning-Based xApp for Traffic Steering in 6G O-RAN Closed-Loop Control 2026 Early Access Open RAN Resource management Ultra reliable low latency communication
Apurba Adhikary, Avi Deb Raha, Yu Qiao, Md. Shirajum Munir, Mrityunjoy Gain, Zhu Han, Choong Seon Hong Age of Sensing Empowered Holographic ISAC Framework for NextG Wireless Networks: A VAE and DRL Approach 2026 Early Access Array signal processing Resource management Integrated sensing and communication
Jing Zhang, Chao Luo, Rui Shao MTG-GAN: A Masked Temporal Graph Generative Adversarial Network for Cross-Domain System Log Anomaly Detection 2026 Early Access Anomaly detection Adaptation models Generative adversarial networks
Ze Wei, Rongxi He, Chengzhi Song, Xiaojing Chen Differentiated Offloading and Resource Allocation with Energy Anxiety Level Consideration in Heterogeneous Maritime Internet of Things 2026 Early Access Internet of Things Resource management Carbon footprint
Xinshuo Wang, Lei Liu, Baihua Chen, Yifei Li ENCC: Explicit Notification Congestion Control in RDMA 2026 Early Access Bandwidth Data centers Heuristic algorithms
Awaneesh Kumar Yadav, An Braeken, Madhusanka Liyanage A Provably Secure Lightweight Three-factor 5G-AKA Authentication Protocol relying on an Extendable Output Function 2026 Early Access Authentication Protocols Security
Qian Yang, Suoping Li, Jaafar Gaber, Sa Yang An Optimal Matching Channel Selection Strategy Based on (K+1)-layer 3-D CTMC for Suppressing Spectrum Fragmentation in 5G/B5G Cognitive Radio Ad Hoc Networks 2026 Early Access Copper Three-dimensional displays Cognitive radio
Divya D Kulkarni, Manit Baser, Mohan Gurusamy ARCANE: Adversarial Resilience and Adaptive Network Slicing for UAV-based MEC 2026 Early Access Autonomous aerial vehicles Servers Power demand
Zhenyang Guo, Jin Cao, XiongPeng Ren, Yuchen Zhou, Lifu Cheng, Peijie Yin, Hui Li LDST-UAVS: A Lightweight Data Secure Transmission Protocol for Unmanned Aerial Vehicle Swarms in Emergency Rescue Scenarios 2026 Early Access Autonomous aerial vehicles Security Protocols
Suyong Eum, Shin’ichi Arakawa, Masayuki Murata Deterministic and Probabilistic Scheduling for Latency Guarantees in B5G/6G Network Management 2026 Early Access Delays Probabilistic logic Ultra reliable low latency communication
Xiujun Xu, Qi Wang, Qingshan Wang, Yinlong Xu Contract-Based Incentive Mechanism for Long-term Participation in Federated Learning 2026 Early Access Contracts Data models Computational modeling
Somchart Fugkeaw, Kittipat Tangtanawirut, Pakapon Rattanasrisuk, Archawit Changtor MK-WISE: Secure and Efficient Multi-Keyword Wildcard ABSE with Keyword-Level Revocation for Device–Edge–Cloud EHRs Data Sharing 2026 Early Access Encryption Cryptography Access control
Aruna Malik, Sandeep Verma, Samayveer Singh, Rajeev Kumar, Neeraj Kumar Greylag Goose-Based Optimized Cluster Routing for IoT-Based Heterogeneous Wireless Sensor Networks 2026 Vol. 23, Issue Wireless sensor networks Energy consumption Clustering algorithms
Md Ibrahim Ibne Alam, Anindo Mahmood, Prasun Kanti Dey, Murat Yuksel, Koushik Kar Meta-Peering: Automating ISP Peering Decision Process 2026 Vol. 23, Issue Costs Routing Internet
Zhengge Yi, Tengyao Li, Meng Zhang, Xiaoyun Yuan, Shaoyong Du, Xiangyang Luo An Efficient Website Fingerprinting for New Websites Emerging Based on Incremental Learning 2026 Vol. 23, Issue Incremental learning Fingerprint recognition Data models