IEEE Transactions on Network and Service Management

Last updated: 2026-03-11 05:01 UTC

All documents

Number of pages: 158

Author(s) Title Year Publication Keywords
Woojin Jeon, Donghyun Yu, Ruei-Hau Hsu, Jemin Lee Secure Data Sharing Framework with Fine-grained Access Control and Privacy Protection for IoT Data Marketplace 2026 Early Access Internet of Things Encryption Access control
Zhaoping Li, Mingshu He, Xiaojuan Wang HKD-Net: Hierarchical Knowledge Distillation Based on Multi-Domain Feature Fusion for Efficient Network Intrusion Detection 2026 Early Access Feature extraction Telecommunication traffic Knowledge engineering
Vaishnavi Kasuluru, Luis Blanco, Cristian J. Vaca-Rubio, Engin Zeydan, Albert Bel AI-Empowered Multivariate Probabilistic Forecasting: A Key Enabler for Sustainability in Open RAN 2026 Early Access Open RAN Forecasting Probabilistic logic
Jing Zhang, Chao Luo, Rui Shao MTG-GAN: A Masked Temporal Graph Generative Adversarial Network for Cross-Domain System Log Anomaly Detection 2026 Early Access Anomaly detection Adaptation models Generative adversarial networks
Wenxuan Li, Yu Yao, Ni Zhang, Chuan Sheng, Ziyong Ran, Wei Yang IMADP: Imputation-based Anomaly Detection in SCADA Systems via Adversarial Diffusion Process 2026 Early Access Anomaly detection Adaptation models Data models
Shankar K. Ghosh, Souvik Deb, Rishi Balamurugan, AB Santhosh Exploring the conditional effect of RLF on handover failure based on ns-3 under stochastic channel condition 2026 Early Access
Fernando Martinez-Lopez, Lesther Santana, Mohamed Rahouti, Abdellah Chehri, Shawqi Al-Maliki, Gwanggil Jeon Learning in Multiple Spaces: Prototypical Few-Shot Learning with Metric Fusion for Next-Generation Network Security 2026 Early Access Measurement Prototypes Extraterrestrial measurements
Pengcheng Guo, Zhi Lin, Haotong Cao, Yifu Sun, Kuljeet Kaur, Sherif Moussa GAN-Empowered Parasitic Covert Communication: Data Privacy in Next-Generation Networks 2026 Early Access Interference Generators Generative adversarial networks
Chengwei Liao, Guofeng Yan, Hengliang Tan, Jiao Du, Xia Deng, Heng Wu jTOLP-MADRL: A MADRL-based Joint Optimization Algorithm of Task Offloading Location and Proportion for Latency-sensitive Tasks in Vehicle Edge Computing Network 2026 Early Access Servers Resource management Edge computing
Rong Jiang, Yulin Li, Xuetao Pu, Xueke Wang, Yukun Xue A Contract Data Sharing Model Based on Consortium Blockchain and Local Differential Privacy 2026 Early Access
Wenjing Jing, Quan Zheng, Siwei Peng, Shuangwu Chen, Xiaobin Tan, Jian Yang Equivalent Characteristic Time Approximation Based Network Planning for Cache-enabled Networks 2026 Early Access Planning Resource management Costs
Honghao Gao, Qionghuizi Ran, Ye Wang, Yueshen Xu BiTrustChain: A Dual-Blockchain Empowered Dynamic Vehicle Trust Management for Malicious Detection in IoV 2026 Early Access Blockchains Vehicle dynamics Trust management
Xing Li, Ge Gao, Zhaoyu Chen, Xin Li, Qian Huang MD-PCSN: Meta-motion Decoupling Point Cloud Sequence Network for Privacy-Preserving Human Action Recognition in AI machines 2026 Early Access Point cloud compression Convolution Three-dimensional displays
Guolong Li, Yuan Gao, Jiongjiong Ren, Shaozhen Chen BPF-GNN: A multi-granularity feature extraction model using graph neural networks for encrypted traffic classification 2026 Early Access Feature extraction Cryptography Payloads
Beibei Li B-TWGA: A Trusted Gateway Architecture Based on Blockchain for Internet of Things 2026 Early Access Internet of Things Blockchains Security
Tuan-Vu Truong, Van-Dinh Nguyen, Quang-Trung Luu, Phi-Son Vo, Xuan-Phu Nguyen, Fatemeh Kavehmadavani, Symeon Chatzinotas Accelerating Resource Allocation in Open RAN Slicing via Deep Reinforcement Learning 2026 Early Access Resource management Open RAN Ultra reliable low latency communication
Yuanzhen Jiang, Yaqiong Liu, Xidian Wang, Nan Cheng, Zihan Jia, Duo Shi, Zhe Lv, Zhouyuan Li, Yan Zhang Entity-level Autoregressive Relational Triple Extraction toward Knowledge Graph Construction for Network Operation and Maintenance 2026 Early Access Knowledge graphs Tagging Maintenance
Shi Dong, Fuxiang Zhao, Longhui Shu, Junjie Huang Android Zero-Day Guard: Zero-Shot Malware Detection Using Deep Learning and Generative Models 2026 Early Access Malware Feature extraction Accuracy
Ebrima Jaw, Moritz Müller, Cristian Hesselman, Lambert Nieuwenhuis Reproducibility Study and Assessment of the Evolution of Serial BGP Hijacking Events 2026 Early Access Internet Routing Border Gateway Protocol
Shaohui Gong, Luohao Tang, Jianjiang Wang, Quan Chen, Cheng Zhu A Key Node Set Analysis Method For Regional Service Denial In Mega-Constellation Networks 2026 Early Access Satellites Measurement Analytical models