IEEE Transactions on Network and Service Management

Last updated: 2026-03-08 05:01 UTC

All documents

Number of pages: 158

Author(s) Title Year Publication Keywords
Jing Zhang, Chao Luo, Rui Shao MTG-GAN: A Masked Temporal Graph Generative Adversarial Network for Cross-Domain System Log Anomaly Detection 2026 Early Access Anomaly detection Adaptation models Generative adversarial networks
Yuanzhen Jiang, Yaqiong Liu, Xidian Wang, Nan Cheng, Zihan Jia, Duo Shi, Zhe Lv, Zhouyuan Li, Yan Zhang Entity-level Autoregressive Relational Triple Extraction toward Knowledge Graph Construction for Network Operation and Maintenance 2026 Early Access
Xing Li, Ge Gao, Zhaoyu Chen, Xin Li, Qian Huang MD-PCSN: Meta-motion Decoupling Point Cloud Sequence Network for Privacy-Preserving Human Action Recognition in AI machines 2026 Early Access
Ghofran Khalaf, May Itani, Sanaa Sharafeddine A UAV-Aided Digital Twin Framework for IoT Networks with High Accuracy and Synchronization 2026 Early Access
Deemah H. Tashman, Soumaya Cherkaoui Trustworthy AI-Driven Dynamic Hybrid RIS: Joint Optimization and Reward Poisoning-Resilient Control in Cognitive MISO Networks 2026 Early Access Reconfigurable intelligent surfaces Reliability Optimization
Jiazhong Lu, Jimin Peng, Jian Shu, Jiali Yin, Xiaolei Liu Adversarial Sample Based on Structured Fusion Noise for Botnet Detection in Industrial Control Systems 2026 Early Access Botnet Industrial control Feature extraction
Tuan-Vu Truong, Van-Dinh Nguyen, Quang-Trung Luu, Phi-Son Vo, Xuan-Phu Nguyen, Fatemeh Kavehmadavani, Symeon Chatzinotas Accelerating Resource Allocation in Open RAN Slicing via Deep Reinforcement Learning 2026 Early Access Resource management Open RAN Ultra reliable low latency communication
Adel Chehade, Edoardo Ragusa, Paolo Gastaldo, Rodolfo Zunino Hardware-Aware Neural Architecture Search for Encrypted Traffic Classification on Resource-Constrained Devices 2026 Early Access Accuracy Computational modeling Cryptography
Pengcheng Guo, Zhi Lin, Haotong Cao, Yifu Sun, Kuljeet Kaur, Sherif Moussa GAN-Empowered Parasitic Covert Communication: Data Privacy in Next-Generation Networks 2026 Early Access Interference Generators Generative adversarial networks
Fernando Martinez-Lopez, Lesther Santana, Mohamed Rahouti, Abdellah Chehri, Shawqi Al-Maliki, Gwanggil Jeon Learning in Multiple Spaces: Prototypical Few-Shot Learning with Metric Fusion for Next-Generation Network Security 2026 Early Access Measurement Prototypes Extraterrestrial measurements
Yanxu Lin, Renzhong Zhong, Jingnan Xie, Yueting Zhu, Byung-Gyu Kim, Saru Kumari, Shakila Basheer, Fatimah Alhayan Privacy-Preserving Digital Publishing Framework for Next-Generation Communication Networks: A Verifiable Homomorphic Federated Learning Approach 2026 Early Access Electronic publishing Federated learning Cryptography
Mahnoor Sajid, Mohib Ullah Khan, KyungHi Chang Intelligent Xn-Based Energy Aware Handover Optimization in 5G Networks via NWDAF-Orchestrated Agent Framework 2026 Early Access Handover 5G mobile communication Quality of service
Zewei Han, Go Hasegawa BBR-ES: An Extended-State Optimization for BBR Congestion Control 2026 Early Access Delays Bandwidth Internet
Wenjing Jing, Quan Zheng, Siwei Peng, Shuangwu Chen, Xiaobin Tan, Jian Yang Equivalent Characteristic Time Approximation Based Network Planning for Cache-enabled Networks 2026 Early Access Planning Resource management Costs
Shi Dong, Fuxiang Zhao, Longhui Shu, Junjie Huang Android Zero-Day Guard: Zero-Shot Malware Detection Using Deep Learning and Generative Models 2026 Early Access Malware Feature extraction Accuracy
Beibei Li B-TWGA: A Trusted Gateway Architecture Based on Blockchain for Internet of Things 2026 Early Access Internet of Things Blockchains Security
Guolong Li, Yuan Gao, Jiongjiong Ren, Shaozhen Chen BPF-GNN: A multi-granularity feature extraction model using graph neural networks for encrypted traffic classification 2026 Early Access Feature extraction Cryptography Payloads
Woojin Jeon, Donghyun Yu, Ruei-Hau Hsu, Jemin Lee Secure Data Sharing Framework with Fine-grained Access Control and Privacy Protection for IoT Data Marketplace 2026 Early Access Internet of Things Encryption Access control
Honghao Gao, Qionghuizi Ran, Ye Wang, Yueshen Xu BiTrustChain: A Dual-Blockchain Empowered Dynamic Vehicle Trust Management for Malicious Detection in IoV 2026 Early Access Blockchains Vehicle dynamics Trust management
Zhaoping Li, Mingshu He, Xiaojuan Wang HKD-Net: Hierarchical Knowledge Distillation Based on Multi-Domain Feature Fusion for Efficient Network Intrusion Detection 2026 Early Access Feature extraction Telecommunication traffic Knowledge engineering