Security and Communication Networks

Table of Contents

Table of Contents

  • Security and Communication Networks -
  • Special Issue
  • - Volume 2021
  • - Article ID 5542919
  • - Research Article

An Adaptive Protection of Flooding Attacks Model for Complex Network Environments

Bashar Ahmad Khalaf | Salama A. Mostafa | ... | Adam Marks
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2021
  • - Article ID 8876893
  • - Research Article

Distributed Outsourced Privacy-Preserving Gradient Descent Methods among Multiple Parties

Zuowen Tan | Haohan Zhang | ... | Rui Gao
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2021
  • - Article ID 9919030
  • - Research Article

An Adaptive Communication-Efficient Federated Learning to Resist Gradient-Based Reconstruction Attacks

Yanbin Li | Yue Li | ... | Shougang Ren
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2021
  • - Article ID 5596820
  • - Research Article

[Retracted] A Segmentation Algorithm of Image Semantic Sequence Data Based on Graph Convolution Network

Zheshu Jia | Deyun Chen
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2021
  • - Article ID 8814068
  • - Research Article

Predicting the APT for Cyber Situation Comprehension in 5G-Enabled IoT Scenarios Based on Differentially Private Federated Learning

Xiang Cheng | Qian Luo | ... | Bing Chen
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2021
  • - Article ID 5554058
  • - Research Article

Coverless Steganography Based on Motion Analysis of Video

Yun Tan | Jiaohua Qin | ... | Zhangdong Wang
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2021
  • - Article ID 6626974
  • - Research Article

Countering Spoof: Towards Detecting Deepfake with Multidimensional Biological Signals

Xinlei Jin | Dengpan Ye | Chuanxi Chen
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2021
  • - Article ID 5521713
  • - Research Article

TBSMR: A Trust-Based Secure Multipath Routing Protocol for Enhancing the QoS of the Mobile Ad Hoc Network

Mohammad Sirajuddin | Ch. Rupa | ... | Cresantus Biamba
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2021
  • - Article ID 6616239
  • - Research Article

Robust Frame Duplication Detection for Degraded Videos

Qi Han | Hao Chen | ... | Qiong Li
  • Security and Communication Networks -
  • Special Issue
  • Volume 2021
  • - Article ID 5586959
  • - Research Article

An Image Encryption Scheme Based on Lorenz Hyperchaotic System and RSA Algorithm

Riguang Lin | Sheng Li
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2021
  • - Article ID 5530023
  • - Research Article

Adaptive Routing Strategy Based on Improved Double Q-Learning for Satellite Internet of Things

Jian Zhou | Xiaotian Gong | ... | Xiaoyong Yan
  • Security and Communication Networks -
  • Special Issue
  • Volume 2021
  • - Article ID 6698099
  • - Research Article

An Improved and Privacy-Preserving Mutual Authentication Scheme with Forward Secrecy in VANETs

Mengting Yao | Xiaoming Wang | ... | Chengpeng Huang
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2021
  • - Article ID 5589352
  • - Research Article

Intelligent Media Forensics and Traffic Handling Scheme in 5G Edge Networks

Sa Math | Prohim Tam | Seokhoon Kim
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2021
  • - Article ID 6631075
  • - Research Article

An Efficient Communication Intrusion Detection Scheme in AMI Combining Feature Dimensionality Reduction and Improved LSTM

Guanyu Lu | Xiuxia Tian
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2021
  • - Article ID 9923389
  • - Research Article

Artificial Intelligence-Based Digital Image Steganalysis

Ahmed I. Iskanderani | Ibrahim M. Mehedi | ... | Abdul Latif
Security and Communication Networks
Publishing Collaboration
More info
Wiley Hindawi logo
 Journal metrics
See full report
Acceptance rate10%
Submission to final decision143 days
Acceptance to publication35 days
CiteScore2.600
Journal Citation Indicator-
Impact Factor-
 Submit Evaluate your manuscript with the free Manuscript Language Checker

We have begun to integrate the 200+ Hindawi journals into Wiley’s journal portfolio. You can find out more about how this benefits our journal communities on our FAQ.