no |
title |
author |
magazine |
year |
volume |
issue |
page(s) |
type |
1 |
An efficient flow-based multi-level hybrid intrusion detection system for software-defined networks
|
Latah, Majd |
|
|
3 |
3-4 |
p. 261-271 |
article |
2 |
A trusted recommendation scheme for privacy protection based on federated learning
|
Wang, Yichuan |
|
|
3 |
3-4 |
p. 218-228 |
article |
3 |
Blockchain-driven anomaly detection framework on edge intelligence
|
Xie, Xueshuo |
|
|
3 |
3-4 |
p. 171-192 |
article |
4 |
Cooperative abnormal sound event detection in end-edge-cloud orchestrated systems
|
Wang, Jingrong |
|
|
3 |
3-4 |
p. 158-170 |
article |
5 |
ECAS: an efficient and conditional privacy preserving collision warning system in fog-based vehicular ad hoc networks
|
Qin, Zhiguang |
|
|
3 |
3-4 |
p. 205-217 |
article |
6 |
Editorial of CCF transactions on networking: special issue on intelligence-enabled end-edge-cloud orchestrated computing
|
Ren, Ju |
|
|
3 |
3-4 |
p. 155-157 |
article |
7 |
Energy efficient broadcast protocol for Underwater Wireless Sensor Networks
|
Touzene, Abderezak |
|
|
3 |
3-4 |
p. 1-10 |
article |
8 |
Performance analysis of hybrid SAC-OCDMA-OFDM model over free space optical communication
|
Bhanja, Urmila |
|
|
3 |
3-4 |
p. 272-285 |
article |
9 |
Proof of outsourced encryption: cross verification of security service level agreement
|
Alasmari, Sultan |
|
|
3 |
3-4 |
p. 229-244 |
article |
10 |
QoE evaluation of dynamic adaptive streaming over HTTP (DASH) with promising transport layer protocols
|
Khan, Koffka |
|
|
3 |
3-4 |
p. 245-260 |
article |
11 |
Towards fair and efficient task allocation in blockchain-based crowdsourcing
|
Pang, Xiaoyi |
|
|
3 |
3-4 |
p. 193-204 |
article |