Skip to main content


Peer-to-Peer Networking and Applications

Peer-to-Peer Networking and Applications 3/2021

Issue 3/2021

Includes 2 Special Issues: Special Issue on Privacy-Preserving Computing; Special Issue on P2P Computing for Deep Learning

Table of Contents ( 55 Articles )

15-02-2021 | Issue 3/2021

A mathematical model to describe resource discovery failure in distributed exascale computing systems

Elham Adibi, Ehsan Mousavi Khaneghah

06-02-2021 | Issue 3/2021

An efficient latency aware resource provisioning in cloud assisted mobile edge framework

Rajasekhar Bandapalle Mulinti, M. Nagendra

29-01-2021 | Issue 3/2021

A message transmission scheduling algorithm based on time-domain interference alignment in UWANs

Nan Zhao, Nianmin Yao, Zhenguo Gao

05-02-2021 | Issue 3/2021

Non-cryptography countermeasure against controllable event triggering attack in WSNs

Haoran Hu, Wei Chang

17-02-2021 | Issue 3/2021

Cellular traffic prediction on blockchain-based mobile networks using LSTM model in 4G LTE network

Varun Kurri, Vishweshvaran Raja, P. Prakasam

16-02-2021 | Issue 3/2021

A secure peer to peer multiparty transaction scheme based on blockchain

Hanshu Hong, Zhixin Sun

02-03-2021 | Issue 3/2021

A novel trust management method to preserve privacy in vehicular ad-hoc networks

Davood Behzad, Nazbanoo Farzaneh

15-02-2021 | Issue 3/2021

Packet classification based aerial intelligent relay-road side unit (air-rsu) framework for vehicular ad-hoc networks

A. Samson Arun Raj, Yogesh Palanichamy

16-03-2021 | Issue 3/2021

All-in-one: Toward hybrid data collection and energy saving mechanism in sensing-based IoT applications

Marwa Ibrahim, Hassan Harb, Ali Mansour, Abbass Nasser, Christophe Osswald

02-02-2021 | Issue 3/2021

Modeling & analysis of software defined networks under non-stationary conditions

Navya Vuppalapati, T. G. Venkatesh

01-02-2021 | Issue 3/2021

Computing tasks assignment optimization among edge computing servers via SDN

Chao Bu, Jinsong Wang

30-01-2021 | Issue 3/2021

Cost-effective migration-based dynamic platform defense technique: a CTMDP approach

Yipin Zhang, Xiaolin Chang, Jelena Mišić, Vojislav B. Mišić, Yutong Cai

04-03-2021 | Issue 3/2021

New incentive mechanism to enhance cooperation in wireless P2P networks

Nitin Singha, Yatindra Nath Singh

22-02-2021 | Issue 3/2021

High energy efficient lifetime management system and trust management framework for manet using self-configurable cluster mechanism

Gopala Krishnan C, Gomathi S, Anusha Bamini A.M

11-03-2021 | Issue 3/2021

Towards software defined low maintenance structured peer-to-peer overlays

Nitin Shukla, Dipmalya Datta, Mayank Pandey, Shashank Srivastava

13-02-2021 | Issue 3/2021

SDN-based offloading policy to reduce the delay in fog-vehicular networks

Alla Abbas Khadir, Seyed Amin Hosseini Seno

09-03-2021 | Correction | Issue 3/2021

Correction to: SDN-based offloading policy to reduce the delay in fog-vehicular networks

Alla Abbas Khadir, Seyed Amin Hosseini Seno

05-03-2021 | Issue 3/2021

A provably secure RFID authentication protocol based on ECQV for the medical internet of things

Abhay Kumar Agrahari, Shirshu Varma

29-01-2021 | Issue 3/2021

CP-ABSEL: Ciphertext-policy attribute-based searchable encryption from lattice in cloud storage

Uma Sankararao Varri, Syam Kumar Pasupuleti, K. V. Kadambari

08-01-2021 | Issue 3/2021

Hybrid meta-heuristic techniques based efficient charging scheduling scheme for multiple Mobile wireless chargers based wireless rechargeable sensor networks

Vrajesh Kumar Chawra, Govind P. Gupta

11-02-2021 | Correction | Issue 3/2021

Correction to: Hybrid meta-heuristic techniques based efficient charging scheduling scheme for multiple Mobile wireless chargers based wireless rechargeable sensor networks

Vrajesh Kumar Chawra, Govind P. Gupta

26-02-2021 | Issue 3/2021

Joint resource allocation and routing optimization for spectrum aggregation based CRAHNs

Jian Chen, Yunhe Xie, Jie Jia, Mingyang Zhang, Qinghu Wang, Xingwei Wang

03-03-2021 | Issue 3/2021

An energy-efficient cluster-based routing protocol using unequal clustering and improved ACO techniques for WSNs

Noureddine Moussa, Abdelbaki El Belrhiti El Alaoui

30-03-2021 | Issue 3/2021

Advances in privacy-preserving computing

Kaiping Xue, Zhe Liu, Haojin Zhu, Miao Pan, David S. L. Wei

29-10-2020 | Issue 3/2021

Privacy-aware smart card based biometric authentication scheme for e-health

Li Chen, Ke Zhang

31-10-2020 | Issue 3/2021

Efficient privacy-preserving authentication for V2G networks

Yinghui Zhang, Jian Zou, Rui Guo

03-11-2020 | Issue 3/2021

Privacy-preserving two-parties logistic regression on vertically partitioned data using asynchronous gradient sharing

Qianjun Wei, Qiang Li, Zhipeng Zhou, ZhengQiang Ge, Yonggang Zhang

07-01-2021 | Issue 3/2021

A location privacy protection scheme for convoy driving in autonomous driving era

Xin Ye, Jin Zhou, Yuedi Li, Mingsheng Cao, Dajiang Chen, Zhiguang Qin

11-01-2021 | Issue 3/2021

A novel spread estimation based abnormal flow detection in high-speed networks

Xiaofei Bu, Yu-E Sun, Yang Du, Xiaocan Wu, Boyu Zhang, He Huang

08-01-2021 | Issue 3/2021

High-throughput secure multiparty multiplication protocol via bipartite graph partitioning

Yi Xu, Changgen Peng, Weijie Tan, Youliang Tian, Minyao Ma, Hongfa Ding

05-01-2021 | Issue 3/2021

Three-stage Stackelberg game based edge computing resource management for mobile blockchain

Yuqi Fan, Zhifeng Jin, Guangming Shen, Donghui Hu, Lei Shi, Xiaohui Yuan

03-01-2021 | Issue 3/2021

An improved steganography without embedding based on attention GAN

Cong Yu, Donghui Hu, Shuli Zheng, Wenjie Jiang, Meng Li, Zhong-qiu Zhao

08-01-2021 | Issue 3/2021

Backdoors hidden in facial features: a novel invisible backdoor attack against face recognition systems

Mingfu Xue, Can He, Jian Wang, Weiqiang Liu

07-01-2021 | Issue 3/2021

Exploiting peer-to-peer communications for query privacy preservation in voice assistant systems

Bang Tran, Xiaohui Liang

30-01-2021 | Issue 3/2021

A robust and secure multi-authority access control system for cloud storage

Jin Gu, Jianqiang Shen, Baoyun Wang

16-01-2021 | Issue 3/2021

A uniformization-based approach to preserve individuals’ privacy during process mining analyses

Edgar Batista, Agusti Solanas

16-03-2021 | Issue 3/2021

Copyright protection method of big data based on nash equilibrium and constraint optimization

Yabin Xu, Bin Shi

07-02-2021 | Issue 3/2021

A reputation-based cooperative content delivery with parking vehicles in vehicular ad-hoc networks

Zihao Zhu, Yulin Xu, Zhou Su

01-04-2021 | Issue 3/2021

A robust provable-secure privacy-preserving authentication protocol for Industrial Internet of Things

Diksha Rangwani, Dipanwita Sadhukhan, Sangram Ray, Muhammad Khurram Khan, Mou Dasgupta

24-02-2021 | Issue 3/2021

Blockchain based Privacy Preserving User Authentication Protocol for Distributed Mobile Cloud Environment

Manojkumar Vivekanandan, Sastry V. N., Srinivasulu Reddy U.

09-03-2021 | Issue 3/2021

A machine learning based approach for user privacy preservation in social networks

Yuanming Zhang, Jing Tao, Shuo Zhang, Yuchao Zhang, Pinghui Wang

29-01-2021 | Issue 3/2021

Anonymized noise addition in subspaces for privacy preserved data mining in high dimensional continuous data

Shashidhar Virupaksha, Venkatesulu Dondeti

21-02-2021 | Issue 3/2021

An efficient clustering-based anonymization scheme for privacy-preserving data collection in IoT based healthcare services

J. Andrew Onesimu, J. Karthikeyan, Yuichi Sei

20-03-2021 | Issue 3/2021

Impact of data correlation on privacy budget allocation in continuous publication of location statistics

D. Hemkumar, S. Ravichandra, D. V. L. N. Somayajulu

08-03-2021 | Issue 3/2021 Open Access

Privacy-preserving neural networks with Homomorphic encryption: Challenges and opportunities

Bernardo Pulido-Gaytan, Andrei Tchernykh, Jorge M. Cortés-Mendoza, Mikhail Babenko, Gleb Radchenko, Arutyun Avetisyan, Alexander Yu Drozdov

05-02-2021 | Issue 3/2021

ASFGNN: Automated separated-federated graph neural network

Longfei Zheng, Jun Zhou, Chaochao Chen, Bingzhe Wu, Li Wang, Benyu Zhang

12-03-2021 | Issue 3/2021

Obfuscation of images via differential privacy: From facial images to general images

William L. Croft, Jörg-Rüdiger Sack, Wei Shi

09-02-2021 | Issue 3/2021

Guest editorial special issue on “P2P computing for deep learning”

Ying Li, R. K. Shyamasundar, Mohammad S. Obaidat, Yuyu Yin

03-10-2020 | Issue 3/2021

Group task allocation approach for heterogeneous software crowdsourcing tasks

Xiaojing Yin, Jiwei Huang, Wei He, Wei Guo, Han Yu, Lizhen Cui

26-09-2020 | Issue 3/2021

The throughput optimization for wireless sensor networks adopting interference alignment and successive interference cancellation

Xu Ding, Jing Wang, Chong Zhao, Peng Zhang, Yucheng Wu, Honghao Gao

02-07-2020 | Issue 3/2021

Surface and high-altitude combined rainfall forecasting using convolutional neural network

Pengcheng Zhang, Wennan Cao, Wenrui Li

17-09-2020 | Issue 3/2021

Machine learning models and techniques for VANET based traffic management: Implementation issues and challenges

Sahil Khatri, Hrishikesh Vachhani, Shalin Shah, Jitendra Bhatia, Manish Chaturvedi, Sudeep Tanwar, Neeraj Kumar

14-01-2021 | Issue 3/2021 Open Access

Improved differentiable neural architecture search for single image super-resolution

Yu Weng, Zehua Chen, Tianbao Zhou

11-12-2020 | Issue 3/2021 Open Access

Influencing factors analysis in pear disease recognition using deep learning

Fang Yang, Fuzhong Li, Kai Zhang, Wuping Zhang, Shancang Li

04-01-2021 | Issue 3/2021

AENEA: A novel autoencoder-based network embedding algorithm

Xiaolong Xu, Haoyan Xu, Yang Wang, Jing Zhang

Current Publications

Premium Partner

    Image Credits