IEEE Transactions on Network and Service Management

Last updated: 2025-04-02 03:01 UTC

All documents

Number of pages: 136

Author(s) Title Year Publication Keywords
Wei-Che Chien, Gwanggil Jeon, Hsin-Hung Cho Multi-Objective Optimization of 3D Cell Deployment in Sustainable B5G/6G Networks: Balancing Performance and Sustainability 2025 Early Access Base stations 5G mobile communication Wireless communication
Xin Yang, Yimin Guo IAR-AKA: An Efficient Authentication Scheme for Healthcare Tactile Internet Beyond Conventional Security 2025 Early Access Authentication Security Medical services
Na Xia, Lei Chen, Meng Li, Yutao Yin, Ke Zhang Joint Double Auction-Based Channel Selection in Wireless Monitoring Networks 2025 Early Access Monitoring Heuristic algorithms Wireless networks
Giampaolo Bovenzi, Francesco Cerasuolo, Domenico Ciuonzo, Davide Di Monda, Idio Guarino, Antonio Montieri, Valerio Persico, Antonio Pescapé Mapping the Landscape of Generative AI in Network Monitoring and Management 2025 Early Access Surveys Monitoring Artificial intelligence
Jiajun Chen, Chunqiang Hu, Weihong Sheng, Ruinian Li, Ruifeng Zhao, Jiguo Yu A Trust-Based Personalized Differential Privacy Guarantees for Online Social Networks 2025 Early Access Privacy Protection Social networking (online)
Amina Hentati, Amin Ebrahimzadeh, Roch H. Glitho, Fatna Belqasmi, Rabeb Mizouni Deterministic and Dynamic Joint Placement and Scheduling of VNF-FGs for Remote Robotic Surgery 2025 Early Access Surgery Haptic interfaces Robots
Xinrui Dong, Yingxu Lai, Xiao Zhang, Xinyu Xu Counteracting New Attacks in CPS: A Few-shot Class-incremental Adaptation Strategy for Intrusion Detection System 2025 Early Access Adaptation models Intrusion detection Training
Jaidip Kotak, Idan Yankelev, Idan Bibi, Yuval Elovici, Asaf Shabtai VPN-Encrypted Network Traffic Classification Using a Time-Series Approach 2025 Early Access Telecommunication traffic Virtual private networks Cryptography
Arad Kotzer, Bence Ladóczki, János Tapolcai, Ori Rottenstreich Addressing Scalability Issues of Blockchains with Hypergraph Payment Networks 2025 Early Access Blockchains Lightning Bitcoin
Yali Yuan, Yangyang Du, Guang Cheng Class Incremental Website Fingerprinting Attack Based on Dynamic Expansion Architecture 2025 Early Access Monitoring Fingerprint recognition Feature extraction
Adam Kadi, Lyes Khoukhi, Jouni Viinikka, Pierre-Edouard Fabre Adapting to the Evolution: Enhancing Intrusion Detection Through Machine Learning in the QUIC Protocol Era 2025 Early Access Denial-of-service attack Protocols Machine learning algorithms
Jiangang Liu, Hanjiang Luo, Hang Tao, Jiahong Liu, Jiehan Zhou JLOS: a Cooperative UAV-Based Optical Wireless Communication With Multi-Agent Reinforcement Learning 2025 Early Access Autonomous aerial vehicles Optical fiber communication Atmospheric modeling
Jun Jiang, Bin Wang, Quan Tang, Guoxiang Zhong, Xuhao Tang, Joel J. P. C. Rodrigues Incremental Semi-Supervised Learning for Data Streams Classification in Internet of Things 2025 Early Access Streams Data models Heuristic algorithms
Jing Mei, Cuibin Zeng, Zhao Tong, Zhibang Yang, Keqin Li Stackelberg Game-Based Pricing and Offloading for the DVFS-Enabled MEC Systems 2025 Early Access Servers Games Pricing
Gerald Tietaa Maale, Noble Arden Elorm Kuadey, Yeasin Arafat, Kwantwi Thomas, Guolin Sun, Guisong Liu Multi-Task Learning for UAV Trajectory and Caching with Federated Cloud-Assisted Knowledge Distillation 2025 Early Access Autonomous aerial vehicles Optimization Trajectory
Mengjie Guo, Guochu Shou, Yaqiong Liu, Yihong Hu An Enhanced Reconfiguration for Deterministic Transmission in Time-Sensitive Networks 2025 Early Access Logic gates Heuristic algorithms Vehicle dynamics
Sławomir Hanczewski, Maciej Stasiak, Joanna Weissenberg, Michał Weissenberg Modelling of Heterogeneous 5G Network Slice for Smart Real-Time Railway Communications 2025 Early Access Real-time systems Rail transportation Analytical models
Kai Peng, Jialu Guo, Hao Wang, Jintao He, Zhiqing Zou, Tianping Deng, Menglan Hu Delay-Aware Joint Microservice Deployment and Request Routing in Multi-Edge Environments Based on Reinforcement Learning 2025 Early Access Microservice architectures Routing Cloud computing
Ammar Kamal Abasi, Moayad Aloqaily, Mohsen Guizani 6G mmWave Security Advancements through Federated Learning and Differential Privacy 2025 Early Access Millimeter wave communication 6G mobile communication Data models
Takanori Hara, Masahiro Sasabe eBPF-Based Ordered Proof of Transit for Trustworthy Service Function Chaining 2025 Early Access Security Routing Kernel