IEEE Transactions on Network and Service Management

Last updated: 2026-03-12 05:01 UTC

All documents

Number of pages: 159

Author(s) Title Year Publication Keywords
Xing Li, Ge Gao, Zhaoyu Chen, Xin Li, Qian Huang MD-PCSN: Meta-motion Decoupling Point Cloud Sequence Network for Privacy-Preserving Human Action Recognition in AI machines 2026 Early Access Point cloud compression Convolution Three-dimensional displays
Amin Mohajer, Abbas Mirzaei, Mostafa Darabi, Xavier Fernando Joint SLA-Aware Task Offloading and Adaptive Service Orchestration with Graph-Attentive Multi-Agent Reinforcement Learning 2026 Early Access
Ying-Chin Chen, Chit-Jie Chew, Wei-Bin Lee, Iuon-Chang Lin, Jun-San Lee IROVF:Industrial Role-Oriented Verification Framework for safeguarding manufacture line deployment 2026 Early Access
Pietro Spadaccino, Paolo Di Lorenzo, Sergio Barbarossa, Antonia M. Tulino, Jaime Llorca SPARQ: An Optimization Framework for the Distribution of AI-Intensive Applications under Non-Linear Delay Constraints 2026 Early Access
MaoLin He, Bin Duo, Ping Huang, Junsong Luo, Dongfen Li, Jun Li 1+1 Protection Transmission for UAV-Enabled Computing Power Networks via Multi-Agent Reinforcement Learning 2026 Early Access
Rong Jiang, Yulin Li, Xuetao Pu, Xueke Wang, Yukun Xue A Contract Data Sharing Model Based on Consortium Blockchain and Local Differential Privacy 2026 Early Access Differential privacy Blockchains Computational modeling
Shankar K. Ghosh, Souvik Deb, Rishi Balamurugan, AB Santhosh Exploring the conditional effect of RLF on handover failure based on ns-3 under stochastic channel condition 2026 Early Access Handover Correlation Long Term Evolution
Shaohui Gong, Luohao Tang, Jianjiang Wang, Quan Chen, Cheng Zhu A Key Node Set Analysis Method For Regional Service Denial In Mega-Constellation Networks 2026 Early Access Satellites Measurement Analytical models
Ebrima Jaw, Moritz Müller, Cristian Hesselman, Lambert Nieuwenhuis Reproducibility Study and Assessment of the Evolution of Serial BGP Hijacking Events 2026 Early Access Internet Routing Border Gateway Protocol
Shi Dong, Fuxiang Zhao, Longhui Shu, Junjie Huang Android Zero-Day Guard: Zero-Shot Malware Detection Using Deep Learning and Generative Models 2026 Early Access Malware Feature extraction Accuracy
Yuanzhen Jiang, Yaqiong Liu, Xidian Wang, Nan Cheng, Zihan Jia, Duo Shi, Zhe Lv, Zhouyuan Li, Yan Zhang Entity-level Autoregressive Relational Triple Extraction toward Knowledge Graph Construction for Network Operation and Maintenance 2026 Early Access Knowledge graphs Tagging Maintenance
Beibei Li B-TWGA: A Trusted Gateway Architecture Based on Blockchain for Internet of Things 2026 Early Access Internet of Things Blockchains Security
Guolong Li, Yuan Gao, Jiongjiong Ren, Shaozhen Chen BPF-GNN: A multi-granularity feature extraction model using graph neural networks for encrypted traffic classification 2026 Early Access Feature extraction Cryptography Payloads
Jiazhong Lu, Jimin Peng, Jian Shu, Jiali Yin, Xiaolei Liu Adversarial Sample Based on Structured Fusion Noise for Botnet Detection in Industrial Control Systems 2026 Early Access Botnet Industrial control Feature extraction
Woojin Jeon, Donghyun Yu, Ruei-Hau Hsu, Jemin Lee Secure Data Sharing Framework with Fine-grained Access Control and Privacy Protection for IoT Data Marketplace 2026 Early Access Internet of Things Encryption Access control
Honghao Gao, Qionghuizi Ran, Ye Wang, Yueshen Xu BiTrustChain: A Dual-Blockchain Empowered Dynamic Vehicle Trust Management for Malicious Detection in IoV 2026 Early Access Blockchains Vehicle dynamics Trust management
Wenjing Jing, Quan Zheng, Siwei Peng, Shuangwu Chen, Xiaobin Tan, Jian Yang Equivalent Characteristic Time Approximation Based Network Planning for Cache-enabled Networks 2026 Early Access Planning Resource management Costs
Chengwei Liao, Guofeng Yan, Hengliang Tan, Jiao Du, Xia Deng, Heng Wu jTOLP-MADRL: A MADRL-based Joint Optimization Algorithm of Task Offloading Location and Proportion for Latency-sensitive Tasks in Vehicle Edge Computing Network 2026 Early Access Servers Resource management Edge computing
Wenxuan Li, Yu Yao, Ni Zhang, Chuan Sheng, Ziyong Ran, Wei Yang IMADP: Imputation-based Anomaly Detection in SCADA Systems via Adversarial Diffusion Process 2026 Early Access Anomaly detection Adaptation models Data models
Vaishnavi Kasuluru, Luis Blanco, Cristian J. Vaca-Rubio, Engin Zeydan, Albert Bel AI-Empowered Multivariate Probabilistic Forecasting: A Key Enabler for Sustainability in Open RAN 2026 Early Access Open RAN Forecasting Probabilistic logic