Security and Communication Networks

Table of Contents

Table of Contents

  • Security and Communication Networks -
  • Special Issue
  • - Volume 2021
  • - Article ID 6637936
  • - Research Article

Attention-Guided Digital Adversarial Patches on Visual Detection

Dapeng Lang | Deyun Chen | ... | Yongjun He
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2021
  • - Article ID 5567991
  • - Research Article

Social Network Spam Detection Based on ALBERT and Combination of Bi-LSTM with Self-Attention

Guangxia Xu | Daiqi Zhou | Jun Liu
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2021
  • - Article ID 5557138
  • - Research Article

[Retracted] Research on Sports Balanced Development Evaluation System Based on Edge Computing and Balanced Game

Zhong Han
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2021
  • - Article ID 8817569
  • - Research Article

Wasserstein Metric-Based Location Spoofing Attack Detection in WiFi Positioning Systems

Yinghua Tian | Nae Zheng | ... | Liuyang Gao
  • Security and Communication Networks -
  • Special Issue
  • Volume 2021
  • - Article ID 6653386
  • - Research Article

HTTP-Based APT Malware Infection Detection Using URL Correlation Analysis

Wei-Na Niu | Jiao Xie | ... | Xiao-Lei Liu
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2021
  • - Article ID 5580272
  • - Research Article

[Retracted] Neural Reversible Steganography with Long Short-Term Memory

Ching-Chun Chang
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2021
  • - Article ID 5582921
  • - Research Article

An Attribute-Based Access Control Policy Retrieval Method Based on Binary Sequence

Ruijie Pan | Gaocai Wang | Man Wu
  • Security and Communication Networks -
  • Special Issue
  • Volume 2021
  • - Article ID 5599334
  • - Research Article

Security-Reliability Tradeoff for Friendly Jammer Aided Multiuser Scheduling in Energy Harvesting Communications

Xiao Jiang | Peng Li | ... | Ruchuan Wang
  • Security and Communication Networks -
  • Special Issue
  • Volume 2021
  • - Article ID 6678345
  • - Research Article

Grouped Secret Sharing Schemes Based on Lagrange Interpolation Polynomials and Chinese Remainder Theorem

Fuyou Miao | Yue Yu | ... | Chin-Chen Chang
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2021
  • - Article ID 5563312
  • - Research Article

Blockchain-Enhanced Fair Task Scheduling for Cloud-Fog-Edge Coordination Environments: Model and Algorithm

Wenjuan Li | Shihua Cao | ... | Rajkumar Buyya
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2021
  • - Article ID 5564831
  • - Research Article

[Retracted] Research on Optimal Design of Short-Life Cycle Product Logistics Supply Chain Based on Multicriteria Decision Model

Cuimin Wang
  • Security and Communication Networks -
  • Special Issue
  • Volume 2021
  • - Article ID 6619770
  • - Research Article

Privacy-Preserving Multipoint Traffic Flow Estimation for Road Networks

Elmahdi Bentafat | M. Mazhar Rathore | Spiridon Bakiras
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2021
  • - Article ID 5587511
  • - Research Article

Employing Deep Learning and Time Series Analysis to Tackle the Accuracy and Robustness of the Forecasting Problem

Haseeb Tariq | Muhammad Kashif Hanif | ... | Rozita Jamili Oskouei
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2021
  • - Article ID 8855341
  • - Research Article

CP-ABE-Based Secure and Verifiable Data Deletion in Cloud

Jun Ma | Minshen Wang | ... | Yongjin Hu
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2021
  • - Article ID 5550153
  • - Research Article

Blockchain-Enabled 5G Edge Networks and Beyond: An Intelligent Cross-Silo Federated Learning Approach

Sandi Rahmadika | Muhammad Firdaus | ... | Kyung-Hyune Rhee
Security and Communication Networks
Publishing Collaboration
More info
Wiley Hindawi logo
 Journal metrics
See full report
Acceptance rate10%
Submission to final decision143 days
Acceptance to publication35 days
CiteScore2.600
Journal Citation Indicator-
Impact Factor-
 Submit Evaluate your manuscript with the free Manuscript Language Checker

We have begun to integrate the 200+ Hindawi journals into Wiley’s journal portfolio. You can find out more about how this benefits our journal communities on our FAQ.