


default search action
Computer Communications, Volume 217
Volume 217, 2024
- Xiangdang Huang, Chao Chen
, Nuo Chen, Pengcheng Li, Rongxin Zhu, Qiuling Yang:
A robust and machine learning-driven identification scheme for malicious nodes in UASNs. 1-11 - Erik Daniel
, Florian Tschorsch:
Exploring the design space of privacy-enhanced content discovery for bitswap. 12-24 - Margherita Gambini
, Serena Tardelli
, Maurizio Tesconi:
The anatomy of conspiracy theorists: Unveiling traits using a comprehensive Twitter dataset. 25-40 - Suranjan Daw
, Anwesha Kar, Venkatarami Reddy Chintapalli, Bheemarjuna Reddy Tamma, C. Siva Ram Murthy:
LAMP: A latency-aware MAC protocol for joint scheduling of CAM and DENM traffic over 5G-NR sidelink. 41-56 - Konrad-Felix Krentz
, Thiemo Voigt
:
Secure opportunistic routing in 2-hop IEEE 802.15.4 networks with SMOR. 57-69 - Francesco Raviglione
, Carlos Mateo Risma Carletti
, Marco Malinverno
, Claudio Casetti
, Carla-Fabiana Chiasserini
:
ms-van3t: An integrated multi-stack framework for virtual validation of V2X communication and services. 70-86 - Li Yang, Huitao Zhang, Yaowen Qi
, Qilong Huang:
Available energy routing algorithm considering QoS requirements for LEO satellite network. 87-96 - Peiyan Jia, Chen Chen, Delong Zhang, Yulong Sang, Lei Zhang
:
Semantic segmentation of deep learning remote sensing images based on band combination principle: Application in urban planning and land use. 97-106 - Masoud Narimani Zaman Abadi
, Amir Jalaly Bidgoly
, Yaghoub Farjami
:
ASSOCIATE: A simulator for assessing soft security in the Cognitive Internet of Things. 107-125 - Mian Muaz Razaq
, Huanhuan Song, Limei Peng, Pin-Han Ho:
Optimizing Secrecy Energy Efficiency in RIS-assisted MISO systems using Deep Reinforcement Learning. 126-133 - Asmaa Amer
, Sahar Hoteit, Jalel Ben-Othman
:
Throughput maximization in multi-slice cooperative NOMA-based system with underlay D2D communications. 134-151 - Jiaqi Fan, Jiankui Yang
, Dacheng Yao:
Activate or sleep? An optimal two-threshold policy for transmission service. 152-165 - Yaser Azimi
, Saleh Yousefi
, Hashem Kalbkhani, Thomas Kunz:
Mobility aware and energy-efficient federated deep reinforcement learning assisted resource allocation for 5G-RAN slicing. 166-182 - Branka Mikavica
, Aleksandra Kostic-Ljubisavljevic:
A truthful double auction framework for security-driven and deadline-aware task offloading in fog-cloud environment. 183-199 - Awnish Kumar, Ngangbam Herojit Singh, Suyel Namasudra, Rubén González Crespo
, Nageswara Rao Moparthi
:
Traffic matrix estimation using matrix-CUR decomposition. 200-207 - Weiwei Jiang
, Haoyu Han, Miao He, Weixi Gu:
When game theory meets satellite communication networks: A survey. 208-229 - Miguel García-Torres
, Diego P. Pinto-Roa, Carlos Nunez Castillo, Brenda Quiñonez
, Gabriela Vázquez, Mauricio Allegretti, María E. García-Díaz
:
Feature selection applied to QoS/QoE modeling on video and web-based mobile data services: An ordinal approach. 230-245 - Weihang Ding, Yuxin Luo, Yifeng Lin
, Yuer Yang
, Siwei Lian:
VeriBypasser: An automatic image verification code recognition system based on CNN. 246-258 - Hui Xie
, Jun Zheng, Shengjun Wei, Changzhen Hu:
Blockchain-and-6G-based Ubiquitous UAV Task Security Management Architecture. 259-267

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.