IEEE Transactions on Network and Service Management

Last updated: 2026-03-10 05:01 UTC

All documents

Number of pages: 158

Author(s) Title Year Publication Keywords
Adel Chehade, Edoardo Ragusa, Paolo Gastaldo, Rodolfo Zunino Hardware-Aware Neural Architecture Search for Encrypted Traffic Classification on Resource-Constrained Devices 2026 Early Access Accuracy Computational modeling Cryptography
Jiazhong Lu, Jimin Peng, Jian Shu, Jiali Yin, Xiaolei Liu Adversarial Sample Based on Structured Fusion Noise for Botnet Detection in Industrial Control Systems 2026 Early Access Botnet Industrial control Feature extraction
Woojin Jeon, Donghyun Yu, Ruei-Hau Hsu, Jemin Lee Secure Data Sharing Framework with Fine-grained Access Control and Privacy Protection for IoT Data Marketplace 2026 Early Access Internet of Things Encryption Access control
Xing Li, Ge Gao, Zhaoyu Chen, Xin Li, Qian Huang MD-PCSN: Meta-motion Decoupling Point Cloud Sequence Network for Privacy-Preserving Human Action Recognition in AI machines 2026 Early Access Point cloud compression Convolution Three-dimensional displays
Guolong Li, Yuan Gao, Jiongjiong Ren, Shaozhen Chen BPF-GNN: A multi-granularity feature extraction model using graph neural networks for encrypted traffic classification 2026 Early Access Feature extraction Cryptography Payloads
Beibei Li B-TWGA: A Trusted Gateway Architecture Based on Blockchain for Internet of Things 2026 Early Access Internet of Things Blockchains Security
Yuanzhen Jiang, Yaqiong Liu, Xidian Wang, Nan Cheng, Zihan Jia, Duo Shi, Zhe Lv, Zhouyuan Li, Yan Zhang Entity-level Autoregressive Relational Triple Extraction toward Knowledge Graph Construction for Network Operation and Maintenance 2026 Early Access Knowledge graphs Tagging Maintenance
Shi Dong, Fuxiang Zhao, Longhui Shu, Junjie Huang Android Zero-Day Guard: Zero-Shot Malware Detection Using Deep Learning and Generative Models 2026 Early Access Malware Feature extraction Accuracy
Ebrima Jaw, Moritz Müller, Cristian Hesselman, Lambert Nieuwenhuis Reproducibility Study and Assessment of the Evolution of Serial BGP Hijacking Events 2026 Early Access Internet Routing Border Gateway Protocol
Shaohui Gong, Luohao Tang, Jianjiang Wang, Quan Chen, Cheng Zhu A Key Node Set Analysis Method For Regional Service Denial In Mega-Constellation Networks 2026 Early Access
Tuan-Vu Truong, Van-Dinh Nguyen, Quang-Trung Luu, Phi-Son Vo, Xuan-Phu Nguyen, Fatemeh Kavehmadavani, Symeon Chatzinotas Accelerating Resource Allocation in Open RAN Slicing via Deep Reinforcement Learning 2026 Early Access Resource management Open RAN Ultra reliable low latency communication
Honghao Gao, Qionghuizi Ran, Ye Wang, Yueshen Xu BiTrustChain: A Dual-Blockchain Empowered Dynamic Vehicle Trust Management for Malicious Detection in IoV 2026 Early Access Blockchains Vehicle dynamics Trust management
Wenxuan Li, Yu Yao, Ni Zhang, Chuan Sheng, Ziyong Ran, Wei Yang IMADP: Imputation-based Anomaly Detection in SCADA Systems via Adversarial Diffusion Process 2026 Early Access Anomaly detection Adaptation models Data models
Vaishnavi Kasuluru, Luis Blanco, Cristian J. Vaca-Rubio, Engin Zeydan, Albert Bel AI-Empowered Multivariate Probabilistic Forecasting: A Key Enabler for Sustainability in Open RAN 2026 Early Access Open RAN Forecasting Probabilistic logic
Zhaoping Li, Mingshu He, Xiaojuan Wang HKD-Net: Hierarchical Knowledge Distillation Based on Multi-Domain Feature Fusion for Efficient Network Intrusion Detection 2026 Early Access Feature extraction Telecommunication traffic Knowledge engineering
Deemah H. Tashman, Soumaya Cherkaoui Trustworthy AI-Driven Dynamic Hybrid RIS: Joint Optimization and Reward Poisoning-Resilient Control in Cognitive MISO Networks 2026 Early Access Reconfigurable intelligent surfaces Reliability Optimization
Pengcheng Guo, Zhi Lin, Haotong Cao, Yifu Sun, Kuljeet Kaur, Sherif Moussa GAN-Empowered Parasitic Covert Communication: Data Privacy in Next-Generation Networks 2026 Early Access Interference Generators Generative adversarial networks
Jing Zhang, Chao Luo, Rui Shao MTG-GAN: A Masked Temporal Graph Generative Adversarial Network for Cross-Domain System Log Anomaly Detection 2026 Early Access Anomaly detection Adaptation models Generative adversarial networks
Mahnoor Sajid, Mohib Ullah Khan, KyungHi Chang Intelligent Xn-Based Energy Aware Handover Optimization in 5G Networks via NWDAF-Orchestrated Agent Framework 2026 Early Access Handover 5G mobile communication Quality of service
Fernando Martinez-Lopez, Lesther Santana, Mohamed Rahouti, Abdellah Chehri, Shawqi Al-Maliki, Gwanggil Jeon Learning in Multiple Spaces: Prototypical Few-Shot Learning with Metric Fusion for Next-Generation Network Security 2026 Early Access Measurement Prototypes Extraterrestrial measurements