- A dynamic trust evaluation scheme based on cross-domain trust inheritance for VANETs
- Meta-enhanced hierarchical multi-agent reinforcement learning for dynamic spectrum management and trust-based routing in cognitive vehicular networks
- Joint power minimization and trajectory design for collaborative communication, sensing, and computing in uav networks
- Exploiting O-RAN neutral hosting for first responders connectivity in emergency scenarios
- Leveraging Reputation for Enhanced Decision Accuracy in Vehicle-to-Vehicle Communications Under Limited Infrastructure
- P3AKA: A PUF based Privacy Preserving Authentication and Key Agreement Framework for Secure Communication in Vehicle to Grid Network
- Enhancing Security in Vanets: Adaptive Bald Eagle Search Optimization Based Multi-Agent Deep Q Neural Network for Sybil Attack Detection
- Deep Learning-based Receiver Structure with Superimposed Channel Estimation for Autonomous Underwater Vehicles
- Multi-agent reinforcement learning with graph representation for green edge-cloud computation offloading
- Allocation of computing resources based on multi-objective strategy and performance improvement in 5G networks
- A multipath redundancy communication framework for enhancing 5G mobile communication quality
- An integrated routing and data fragmentation strategy for optimizing end-to-end delay in LEO satellite networks
- EPC: An ensemble packet classification framework for efficient and stable performance
- Toward auction-based edge AI: Orchestrating and incentivizing online transfer learning in edge networks
- Editorial Board
- Design and analysis of a LoRa-based system with scheduled transmissions from IoT nodes to UAV in rural areas
- Modeling and performance analysis of slotted ALOHA with interference cancellation for mMTC
- Optimizing virtual payment channel establishment in the face of on-path adversaries
- Front cover
- Series Editorial: Design and Implementation of Devices, Circuits, and Systems
- IEEE Foundation
- Comsoc Training-ISAC
- Series Editorial: Mobile Communications and Networks
- 2025 Conference Calendar
- Radio Map Estimation Based on Generative Artificial Intelligence: Evolution from Point-Level to Cell-Level Prediction
- Candidates Announced for Board of Governors Election
- TechRxiv
- Communications History: A Look Back
- Global Communications Newsletter
- Comsoc Publications
- Call for Papers
- Comsoc Technical Committees
- IEEE Access
- Table of Contents
- Advertisters Index
- Call for Papers
- Cover 3
- Call for Papers
- Toward 6G — Hexa-X Project's Key Findings
- Cover 4
- IEEE Collabratec
- Cover 2
- IEEE.TV
- Comsoc Training-Road6G
- IEEE App
- Comsoc Membership
- Women in Engineering
- Spectrum Management in Near-Field Multi-User Wireless Communications
- IEEE ComSoc Corporate Program
- Joint content popularity and audience retention-aware live streaming over RSMA edge networks
- A model checking-based framework for testing security properties of protocols under development
- Are D2D and RIS in the same league? Cooperative RSSI-based localization model and performance comparison
- Securing cell scheduling function in TSCH-based industrial IoT networks
- Interval type 2 fuzzy unequal clustering and sleep scheduling for IoT-based WSNs
- Self-organized task offloading and resource allocation in cognitive air-ground collaborative edge computing networks
- Exploring Power Usage and Inference Speed Evaluation of Low-power Clustered Many-core Platforms
- Cyber-Physical AI: Systematic Research Domain for Integrating AI and Cyber-Physical Systems
- PARD: A Dataflow Aware Profiler for ROS-Based Autonomous Driving Software
- Source Localization via Doppler Shifts Using Mobile Sensors in ICNets Within Industry 5.0
- HERO: From High-dimensional network traffic to zERO-Day attack detection
- ATPSO: Adaptive Task Priority Scheduling and Offloading Optimization Scheme for vehicles in harsh environments
- A parallel and pipelined high speed Montgomery modular multiplier for IoT devices
- Editorial Board
- KPI-aware Service Provisioning for Remote Industrial Control Systems Management
- TND: Two-stage non-invasive defense of intrusion detection system from adversarial attack
- An Adaptive Bendable Virtual Tunnel Routing Protocol for Flying Ad-Hoc Networks
- Optimal Coordinated Platoon Lane Change in Highways with Mixed Traffic
- UAV-Supported Communication: Current and Prospective Solutions
- MeshChain: A comprehensive blockchain-based framework for mesh networks
- ScasDK— An all-in-one test platform for security assurance in 5G core networks
- Blockchain security threats: A comprehensive classification and impact assessment
- Cross-domain trust aggregation in blockchain-based Internet of Things with dual-layer incentive mechanism
- Multi-Agent Proximal Policy Optimization based efficient user association and resource allocation in UAV-assisted Heterogeneous Cellular Networks
- Enhancing Security and Trust Using Efficient Privacy-Preserving Authentication in Vehicular Edge Computing Networks
- FDSS: Flight data sharing scheme based on blockchain with dynamic, secure and efficient consensus algorithm
- TokenGuard: A novel framework for robust access management in SDN controllers
- A two-way dynamic adaptive pricing resource allocation model based on combinatorial double auctions in computational network
- Snowflakes: Efficient schemes for source location privacy in Wireless Sensor Networks
- MFSI: Multi-flow based service identification for encrypted network traffic
- PDMA: Efficient and privacy-preserving dynamic task assignment with multi-attribute search in crowdsourcing
- Exploring the unseen: A transformer-based unknown traffic detection scheme with contextual feature representation
- Enhanced load balancing technique for SDN controllers: A multi-threshold approach with migration of switches
- Delay minimization in NTNs: Deployment and caching optimization for satellite- and cache-aided UAV
- A survey of attacks on blockchain systems using a layer-based approach
- Performance enhancement of UAV-enabled MEC systems through intelligent task offloading and resource allocation
- Gauss-AUKF based UWB/IMU fusion localization approach
- Double DQN-based Efficient Quality of Service Routing protocol in Internet of Underwater Things with mobile nodes
- A survey on security enhancing Digital Twins: Models, applications and tools
- Cache Periscope: Gain insights into the global epidemic of malicious domains through DNS Cache
- Maximizing the Energy Efficiency using M-PSO in Multi-Hop UAV-IRS Network for Improved Post-Disaster Emergency Communication Services
- Joint Carrier Frequency Offset, Doubly Selective Channel Estimation and Data Detection for RIS Assisted MIMO OFDMA Uplink System
- DTKD-IDS: A Dual-Teacher Knowledge Distillation Intrusion Detection Model for the Industrial Internet of Things
- A systematic literature review on spectrum detection for cognitive radio - internet of things networks
- The Application of 5G Networks on Construction Sites and in Underground Mines: Successful Outcomes from Field Trials
- On flexible association and placement in disaggregated RAN designs
- Mind the paths you choose: Speeding up segment routing-based traffic engineering with path preprocessing
- Editorial Board
- Frequency-domain augmentation and multi-scale feature alignment for improving transferability of adversarial examples
- Real-time latency prediction for cloud gaming applications
- Privacy-Aware Revocation in VANETs with a Blockchain using accumulator