{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T13:25:45Z","timestamp":1773667545765,"version":"3.50.1"},"reference-count":50,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T00:00:00Z","timestamp":1773619200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T00:00:00Z","timestamp":1773619200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Cloud Comp"],"DOI":"10.1186\/s13677-026-00879-5","type":"journal-article","created":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T12:20:58Z","timestamp":1773663658000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["BIoT-Chain: a hyperledger blockchain cloud framework with SHA-3 keccak-enabled privacy for robust drone IoT network security"],"prefix":"10.1186","volume":"15","author":[{"given":"Abdullah Ayub","family":"Khan","sequence":"first","affiliation":[]},{"given":"Hamad","family":"Almansour","sequence":"additional","affiliation":[]},{"given":"Ahod","family":"Alghuried","sequence":"additional","affiliation":[]},{"given":"Jamil Abedalrahim Jamil","family":"Alsayaydeh","sequence":"additional","affiliation":[]},{"given":"Mohamad Afendee","family":"Mohamed","sequence":"additional","affiliation":[]},{"given":"Sajid","family":"Ullah","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,3,16]]},"reference":[{"issue":"2","key":"879_CR1","doi-asserted-by":"publisher","first-page":"3964","DOI":"10.1109\/JSEN.2024.3510568","volume":"25","author":"P Li","year":"2025","unstructured":"Li P, Liu S, Tian Y, Hou T, Ling J (2025) Automatic Perception of Aircraft Taxiing Behavior via Laser Rangefinders and Machine Learning. IEEE Sens J 25(2):3964\u20133973. https:\/\/doi.org\/10.1109\/JSEN.2024.3510568","journal-title":"IEEE Sens J"},{"key":"879_CR2","doi-asserted-by":"publisher","first-page":"104165","DOI":"10.1016\/j.jnca.2025.104165","volume":"238","author":"G Xu","year":"2025","unstructured":"Xu G, Lei L, Mao Y, Li Z, Chen X, Zhang K (2025) CBRFL: A framework for Committee-based Byzantine-Resilient Federated Learning. J Netw Comput Appl 238:104165. https:\/\/doi.org\/10.1016\/j.jnca.2025.104165","journal-title":"J Netw Comput Appl"},{"key":"879_CR3","doi-asserted-by":"publisher","first-page":"110750","DOI":"10.1016\/j.automatica.2022.110750","volume":"147","author":"Q Ma","year":"2023","unstructured":"Ma Q, Xu S (2023) Intentional delay can benefit consensus of second-order multi-agent systems. Automatica 147:110750. https:\/\/doi.org\/10.1016\/j.automatica.2022.110750","journal-title":"Automatica"},{"issue":"11","key":"879_CR4","doi-asserted-by":"publisher","first-page":"4658","DOI":"10.1002\/rnc.7932","volume":"35","author":"J Xiong","year":"2025","unstructured":"Xiong J, Chen Y (2025) RBFNN-Based Parameter Adaptive Sliding Mode Control for an Uncertain TQUAV With Time-Varying Mass. Int J Robust Nonlinear Control 35(11):4658\u20134668. https:\/\/doi.org\/10.1002\/rnc.7932","journal-title":"Int J Robust Nonlinear Control"},{"issue":"1","key":"879_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11227-024-06782-7","volume":"81","author":"AA Khan","year":"2025","unstructured":"Khan AA, Laghari AA, Baqasah AM, Bacarra R, Alroobaea R, Alsafyani M, Alsayaydeh JAJ (2025) BDLT-IoMT-a novel architecture: SVM machine learning for robust and secure data processing in Internet of Medical Things with blockchain cybersecurity. J Supercomputing 81(1):1\u201322","journal-title":"J Supercomputing"},{"key":"879_CR6","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2022.3205017","author":"F Xu","year":"2022","unstructured":"Xu F, Yang H, Alouini M (2022) IEEE Sens J 22(20):19886\u201319896. https:\/\/doi.org\/10.1109\/JSEN.2022.3205017. Energy Consumption Minimization for Data Collection From Wirelessly-Powered IoT Sensors: Session-Specific Optimal Design With DRL"},{"issue":"1","key":"879_CR7","first-page":"1","volume":"15","author":"AA Khan","year":"2025","unstructured":"Khan AA, Laghari AA, Alsafyani M, Baqasah AM, Kryvinska N, Almadhor A, Gregus M (2025) A cost-effective approach using generative AI and gamification to enhance biomedical treatment and real-time biosensor monitoring. Sci Rep 15(1):1\u201316","journal-title":"Sci Rep"},{"issue":"3","key":"879_CR8","doi-asserted-by":"publisher","first-page":"4759","DOI":"10.32604\/cmc.2025.059224","volume":"82","author":"Y Abbas","year":"2025","unstructured":"Abbas Y, Alarfaj AA, Alabdulqader EA, Algarni A, Jalal A, Liu H (2025) Drone-Based Public Surveillance Using 3D Point Clouds and Neuro-Fuzzy Classifier. Computers Mater Continua 82(3):4759\u20134776. https:\/\/doi.org\/10.32604\/cmc.2025.059224","journal-title":"Computers Mater Continua"},{"issue":"1","key":"879_CR9","first-page":"1","volume":"15","author":"AA Khan","year":"2025","unstructured":"Khan AA, Laghari AA, Alroobaea R, Baqasah AM, Alsafyani M, Alsufyani H, Ullah S (2025) A lightweight scalable hybrid authentication framework for Internet of Medical Things (IoMT) using blockchain hyperledger consortium network with edge computing. Sci Rep 15(1):1\u201320","journal-title":"Sci Rep"},{"key":"879_CR10","doi-asserted-by":"publisher","first-page":"1582995","DOI":"10.3389\/fnbot.2025.1582995","volume":"19","author":"M Alshehri","year":"2025","unstructured":"Alshehri M, Zahoor L, AlQahtani Y, Alshahrani A, AlHammadi DA, Jalal A, Liu H (2025) Unmanned aerial vehicle based multi-person detection via deep neural network models. Front Neurorobot 19:1582995. https:\/\/doi.org\/10.3389\/fnbot.2025.1582995","journal-title":"Front Neurorobot"},{"issue":"1","key":"879_CR11","doi-asserted-by":"publisher","first-page":"26843","DOI":"10.1038\/s41598-025-11738-9","volume":"15","author":"AA Laghari","year":"2025","unstructured":"Laghari AA, Khan AA, Ksibi A, Hajjej F, Kryvinska N, Almadhor A, Alsubai S (2025) A novel and secure artificial intelligence enabled zero trust intrusion detection in industrial internet of things architecture. Sci Rep 15(1):26843","journal-title":"Sci Rep"},{"issue":"9","key":"879_CR12","doi-asserted-by":"publisher","first-page":"6670","DOI":"10.1109\/TII.2025.3567265","volume":"21","author":"G Xu","year":"2025","unstructured":"Xu G, Xu S, Fan X, Cao Y, Mao Y, Xie Y, Chen X (2025) RAT Ring: Event Driven Publish\/Subscribe Communication Protocol for IIoT by Report and Traceable Ring Signature. IEEE Trans Industr Inf 21(9):6670\u20136678. https:\/\/doi.org\/10.1109\/TII.2025.3567265","journal-title":"IEEE Trans Industr Inf"},{"issue":"5","key":"879_CR13","doi-asserted-by":"publisher","first-page":"3416","DOI":"10.1109\/TCSS.2025.3543419","volume":"12","author":"T Wang","year":"2025","unstructured":"Wang T, Wang Z, Li H, Xia C, Zhao C (2025) HHG-Bot: A Hyperheterogeneous Graph-Based Twitter Bot Detection Model. IEEE Trans Comput Social Syst 12(5):3416\u20133430. https:\/\/doi.org\/10.1109\/TCSS.2025.3543419","journal-title":"IEEE Trans Comput Social Syst"},{"issue":"1","key":"879_CR14","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1186\/s13677-025-00771-8","volume":"14","author":"AA Khan","year":"2025","unstructured":"Khan AA, Laghari AA, Almansour H, Jamel L, Hajjej F, Estrela VV, Ullah S (2025) Quantum computing empowering blockchain technology with post quantum resistant cryptography for multimedia data privacy preservation in cloud-enabled public auditing platforms. J Cloud Comput 14(1):43","journal-title":"J Cloud Comput"},{"key":"879_CR15","doi-asserted-by":"publisher","unstructured":"Wang F, Zhang S, Hong E, Quek TQS (2025) Constellation as a Service: Tailored Connectivity Management in Direct-Satellite-to-Device Networks. IEEE Commun Mag 1\u20137. https:\/\/doi.org\/10.1109\/MCOM.001.2500138","DOI":"10.1109\/MCOM.001.2500138"},{"key":"879_CR16","doi-asserted-by":"publisher","first-page":"270","DOI":"10.1007\/s12083-025-02086-6","volume":"18","author":"AA Khan","year":"2025","unstructured":"Khan AA, Alsufyani A, Alsufyani N et al (2025) BAML: a decentralized approach to secure, privacy-preserving financial compliance for enhancing anti-money laundering with blockchain hyperledger and federated learning. Peer-to-Peer Netw. Appl 18:270. https:\/\/doi.org\/10.1007\/s12083-025-02086-6","journal-title":"Appl"},{"issue":"6","key":"879_CR17","doi-asserted-by":"publisher","first-page":"4126","DOI":"10.1109\/TCCN.2025.3543365","volume":"11","author":"T Wu","year":"2025","unstructured":"Wu T, Li M, Qu Y, Wang H, Wei Z, Cao J (2025) Joint AAV Deployment and Edge Association for Energy-Efficient Federated Learning. IEEE Trans Cogn Commun Netw 11(6):4126\u20134140. https:\/\/doi.org\/10.1109\/TCCN.2025.3543365","journal-title":"IEEE Trans Cogn Commun Netw"},{"issue":"17","key":"879_CR18","doi-asserted-by":"publisher","first-page":"34793","DOI":"10.1109\/JIOT.2025.3581314","volume":"12","author":"G Xu","year":"2025","unstructured":"Xu G, Wang L, Chen S, Zhu L, Guizani M, Shi L (2025) MPAEE: A Multipath Adaptive Energy-Efficient Routing Scheme for Low Earth Orbit-Based Industrial Internet of Things. IEEE Internet Things J 12(17):34793\u201334805. https:\/\/doi.org\/10.1109\/JIOT.2025.3581314","journal-title":"IEEE Internet Things J"},{"issue":"1","key":"879_CR19","doi-asserted-by":"publisher","first-page":"21606","DOI":"10.1038\/s41598-025-05261-0","volume":"15","author":"Y Lu","year":"2025","unstructured":"Lu Y, Chen S, Zhang X, Pan X, Gang Y, Wang C (2025) A quantum-enhanced heuristic algorithm for optimizing aircraft landing problems in low-altitude intelligent transportation systems. Sci Rep 15(1):21606. https:\/\/doi.org\/10.1038\/s41598-025-05261-0","journal-title":"Sci Rep"},{"issue":"2","key":"879_CR20","doi-asserted-by":"publisher","first-page":"658","DOI":"10.1109\/TGCN.2021.3067309","volume":"5","author":"Z Zhou","year":"2021","unstructured":"Zhou Z, Shojafar M, Alazab M, Abawajy J, Li F (2021) AFED-EF: An Energy-Efficient VM Allocation Algorithm for IoT Applications in a Cloud Data Center. IEEE Trans Green Commun Netw 5(2):658\u2013669. https:\/\/doi.org\/10.1109\/TGCN.2021.3067309","journal-title":"IEEE Trans Green Commun Netw"},{"key":"879_CR21","doi-asserted-by":"publisher","unstructured":"Shi L, Huang D, Zong G, Zhou Y, Cheng Y (2025) Zero-trust-based privacy-preserving distributed localization for mobile robot networks. IEEE Trans Autom Control 1\u201314. https:\/\/doi.org\/10.1109\/TAC.2025.3597945","DOI":"10.1109\/TAC.2025.3597945"},{"key":"879_CR22","doi-asserted-by":"publisher","unstructured":"Du X, Liu X, Zhou J, Lin Z, Pun C, Wu C, Luo J (2025) Defensive adversarial CAPTCHA: a semantics-driven framework for natural adversarial example generation. IEEE Trans Dependable Secur Comput 1\u201313. https:\/\/doi.org\/10.1109\/TDSC.2025.3636741","DOI":"10.1109\/TDSC.2025.3636741"},{"issue":"3","key":"879_CR23","doi-asserted-by":"publisher","first-page":"2822","DOI":"10.1109\/TNSM.2025.3559255","volume":"22","author":"T Wang","year":"2025","unstructured":"Wang T, Liu M, Li H, Zhao L, Jiang C, Xia C, Cui B (2025) ArchSentry: Enhanced Android Malware Detection via Hierarchical Semantic Extraction. IEEE Trans Netw Serv Manage 22(3):2822\u20132837. https:\/\/doi.org\/10.1109\/TNSM.2025.3559255","journal-title":"IEEE Trans Netw Serv Manage"},{"issue":"8","key":"879_CR24","doi-asserted-by":"publisher","first-page":"6705","DOI":"10.1109\/TCOMM.2025.3529250","volume":"73","author":"D Zhou","year":"2025","unstructured":"Zhou D, Sheng M, Bao C, Wang Y, Li J, Han Z (2025) Mission-Driven Resource Scheduling in Satellite-Terrestrial Networks: From Perspective of Collaboration and Reconfiguration. IEEE Trans Commun 73(8):6705\u20136719. https:\/\/doi.org\/10.1109\/TCOMM.2025.3529250","journal-title":"IEEE Trans Commun"},{"issue":"1","key":"879_CR25","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1186\/s13677-024-00608-w","volume":"13","author":"G Liu","year":"2024","unstructured":"Liu G, Xie H, Wang W, Huang H (2024) A secure and efficient electronic medical record data sharing scheme based on blockchain and proxy re-encryption. J cloud Comput 13(1):44","journal-title":"J cloud Comput"},{"issue":"16","key":"879_CR26","doi-asserted-by":"publisher","first-page":"32366","DOI":"10.1109\/JIOT.2025.3576735","volume":"12","author":"W Xu","year":"2025","unstructured":"Xu W, Deng J, Yu J, Mao S, Li Y, PENG Z, Xiao B (2025) Blockchain-Based Verifiable Decentralized Identity for Intelligent Flexible Manufacturing. IEEE Internet Things J 12(16):32366\u201332378. https:\/\/doi.org\/10.1109\/JIOT.2025.3576735","journal-title":"IEEE Internet Things J"},{"key":"879_CR27","doi-asserted-by":"publisher","unstructured":"Gu J, Wang Y, Ji W, Wei Z, Wang J (2025) LLM-based dynamic event-triggered communication for multi-UAV formation control in urban environments. IEEE Trans Cogn Commun Netw 1. https:\/\/doi.org\/10.1109\/TCCN.2025.3644040","DOI":"10.1109\/TCCN.2025.3644040"},{"key":"879_CR28","doi-asserted-by":"publisher","unstructured":"Zhang, F., Zhang, C., Guan, J., Zhou, Q., Chen, K., Zhang, X.,\u2026 Du, X. (2025). Breaking the edge: enabling efficient neural network inference on integrated edge devices. IEEE Trans Cloud Comput 13(2):694\u2013710. https:\/\/doi.org\/10.1109\/TCC.2025.3559346","DOI":"10.1109\/TCC.2025.3559346"},{"key":"879_CR29","doi-asserted-by":"publisher","first-page":"103801","DOI":"10.1016\/j.compind.2022.103801","volume":"144","author":"A Yazdinejad","year":"2023","unstructured":"Yazdinejad A, Dehghantanha A, Parizi RM, Srivastava G, Karimipour H (2023) Secure intelligent fuzzy blockchain framework: Effective threat detection in iot networks. Comput Ind 144:103801","journal-title":"Comput Ind"},{"issue":"2","key":"879_CR30","doi-asserted-by":"publisher","first-page":"148","DOI":"10.3390\/drones9020148","volume":"9","author":"P Han","year":"2025","unstructured":"Han P, Sui A, Wu J (2025) A Secure and Efficient Access-Control Scheme Based on Blockchain and CP-ABE for UAV Swarm. Drones 9(2):148","journal-title":"Drones"},{"key":"879_CR31","volume-title":"Leveraging Hyperledger Fabric for Enhanced Compliance Monitoring in UAV Operations","author":"D Hawashin","year":"2025","unstructured":"Hawashin D, Madine M, Nemer M, Salah K, Jayaraman R, Damiani E, Yaqoob I (2025) Leveraging Hyperledger Fabric for Enhanced Compliance Monitoring in UAV Operations. Research and Practice, Distributed Ledger Technologies"},{"issue":"1","key":"879_CR32","doi-asserted-by":"publisher","first-page":"5","DOI":"10.3390\/blockchains3010005","volume":"3","author":"OS Igonor","year":"2025","unstructured":"Igonor OS, Amin MB, Garg S (2025) The application of blockchain technology in the field of digital forensics: A literature review. Blockchains 3(1):5","journal-title":"Blockchains"},{"key":"879_CR33","doi-asserted-by":"crossref","unstructured":"Prajapat S, Kumar P, Das AK, Muhammad G (2025) Generative AI-enabled quantum encryption algorithm for securing IoT-based healthcare application using blockchain. IEEE Internet of Things Journal","DOI":"10.1109\/JIOT.2025.3555159"},{"key":"879_CR34","doi-asserted-by":"publisher","first-page":"6693","DOI":"10.1109\/TIFS.2024.3420126","volume":"19","author":"A Yazdinejad","year":"2024","unstructured":"Yazdinejad A, Dehghantanha A, Karimipour H, Srivastava G, Parizi RM (2024) A robust privacy-preserving federated learning model against model poisoning attacks. IEEE Trans Inf Forensics Secur 19:6693\u20136708","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"879_CR35","doi-asserted-by":"crossref","unstructured":"Marzougui F, Elleuch M, Kherallah M (2024) Survey of recent literature on advanced technologies in digital agriculture: internet of things and blockchain. J Inform Assur Secur 19(1)","DOI":"10.2478\/ias-2024-0003"},{"issue":"12","key":"879_CR36","doi-asserted-by":"publisher","first-page":"760","DOI":"10.1007\/s10586-025-05423-9","volume":"28","author":"V Kumar","year":"2025","unstructured":"Kumar V, Ali R, Sharma PK (2025) HM-6G+: A Secure Real-time E-healthcare Monitoring Framework using Smart-contract over 6G Tactile-internet. Cluster Comput 28(12):760","journal-title":"Cluster Comput"},{"key":"879_CR37","doi-asserted-by":"crossref","unstructured":"Yazdinejad A, Mohammadabadi ZD, Dehghantanha A, Srivastava G (2025) An explainable and privacy-preserving federated learning model for threat detection in cyber-physical-social systems. IEEE Transactions on Computational Social Systems","DOI":"10.1109\/TCSS.2025.3606798"},{"key":"879_CR38","first-page":"100783","volume":"47","author":"V Kumar","year":"2024","unstructured":"Kumar V, Ali R, Sharma PK (2024) IoV-6G+: A secure blockchain-based data collection and sharing framework for Internet of vehicles in 6G-assisted environment. Veh Commun 47:100783","journal-title":"Veh Commun"},{"key":"879_CR39","doi-asserted-by":"crossref","unstructured":"He, W., Tan, J., Wang, R., Liu, Z., Luo, X., Hu, H.,\u2026 Zhang, H. (2025). A Deep Reinforcement Learning Approach to Time Delay Differential Game Deception Resource Deployment. IEEE Transactions on Dependable and Secure Computing, 1\u201316. doi: 10.1109\/TDSC.2025.3620151","DOI":"10.1109\/TDSC.2025.3620151"},{"key":"879_CR40","doi-asserted-by":"publisher","unstructured":"Fu, Y., Wang, B., Zhao, H., Zhou, M., Li, N.,\u2026 Gao, Z. (2025). Adaptive safety attitude control of a hybrid VTOL UAV under transition flight subject to multiple faults and uncertainties. Aerospace Science and Technology, 163, 110284. doi: https:\/\/doi.org\/10.1016\/j.ast.2025.110284","DOI":"10.1016\/j.ast.2025.110284"},{"key":"879_CR41","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2025.108256","author":"P Chen","year":"2025","unstructured":"Chen P, Song Y, Xia Y (2025) Adaptively Diagnosing System Faults in Microservice Architecture: An Autonomous Predictive Model Construction Framework. Future Generation Comput Syst. 108256https:\/\/doi.org\/10.1016\/j.future.2025.108256","journal-title":"Future Generation Comput Syst"},{"key":"879_CR42","doi-asserted-by":"crossref","unstructured":"Li, D., Li, P., Zhao, J., Liang, J., Liu, J., Liu, G.,\u2026 Ma, J. (2024). Ground-to-UAV sub-terahertz channel measurement and modeling. Optics Express, 32(18), 32482\u201332494.doi: 10.1364\/OE.534369.","DOI":"10.1364\/OE.534369"},{"key":"879_CR43","doi-asserted-by":"publisher","first-page":"111643","DOI":"10.1016\/j.comnet.2025.111643","volume":"271","author":"P Chen","year":"2025","unstructured":"Chen P, Li Y, Wu H, Zhang J (2025) A deep learning-based reverse auction mechanism for semantic communication in IoV crowdsensing services. Comput Netw 271:111643. https:\/\/doi.org\/10.1016\/j.comnet.2025.111643","journal-title":"Comput Netw"},{"key":"879_CR44","doi-asserted-by":"crossref","unstructured":"Jiang, H., Ye, L., Hu, J., Chen, X., Chen, S., Zhang, W.,\u2026 Yang, K. (2025). WarmGait:Thermal Array-based Gait Recognition for Privacy-Preserving Person Re-ID. IEEE Transactions on Mobile Computing, 1\u201314. doi: 10.1109\/TMC.2025.3608447.","DOI":"10.1109\/TMC.2025.3608447"},{"key":"879_CR45","doi-asserted-by":"crossref","unstructured":"Yin, R., Peng, J., Cai, Y., Wu, C., Champagne, B.,\u2026 Al-Dhahir, N. (2025). Radar-Assisted Predictive Beamforming for UAV-Aided Networks: A Deep-Learning Solution. IEEE Transactions on Vehicular Technology, 1\u201315. doi: 10.1109\/TVT.2025.3572037","DOI":"10.1109\/TVT.2025.3572037"},{"key":"879_CR46","doi-asserted-by":"crossref","unstructured":"Yin, R., Shi, Y., Qi, W., Wu, C., Wang, W.,\u2026 Huang, C. (2025). Joint Beamforming and Frame Structure Design for ISAC Networks Under Imperfect Synchronization. IEEE Transactions on Cognitive Communications and Networking, 11(4), 2259\u20132274. doi: 10.1109\/TCCN.2024.3510542","DOI":"10.1109\/TCCN.2024.3510542"},{"key":"879_CR47","doi-asserted-by":"publisher","unstructured":"Li, S., Wang, S., Zhang, Y., Wang, X., Zhang, Y., Wu, W.,\u2026 Mu, R. (2025). Distributed Bearing-based Fault-tolerant Formation Control of Fixed-wing UAV Swarm with Prescribed Performance. Aerospace Science and Technology, 110897. doi: https:\/\/doi.org\/10.1016\/j.ast.2025.110897","DOI":"10.1016\/j.ast.2025.110897"},{"key":"879_CR48","doi-asserted-by":"publisher","unstructured":"Xue, B., Zheng, Q., Li, Z., Wang, J., Mu, C., Yang, J.,\u2026 Li, X. (2024). Perturbation defense ultra high-speed weak target recognition. Engineering Applications of Artificial Intelligence, 138, 109420. doi: https:\/\/doi.org\/10.1016\/j.engappai.2024.109420","DOI":"10.1016\/j.engappai.2024.109420"},{"key":"879_CR49","doi-asserted-by":"crossref","unstructured":"Xue, B., Zheng, Q., Li, Z., Wang, J., Mu, C., Yang, J.,\u2026 Li, X. (2024). ISAR Weak Feature Enhancement With Perturbation Defense Using Hybrid Clustering Oversegmentation.IEEE Transactions on Aerospace and Electronic Systems, 60(5), 6256\u20136274. doi: 10.1109\/TAES.2024.3408139","DOI":"10.1109\/TAES.2024.3408139"},{"key":"879_CR50","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2025.3619970","author":"K Zhang","year":"2025","unstructured":"Zhang K, Zheng B, Xue J, Zhou Y (2025) Explainable and Trust-Aware AI-Driven Network Slicing Framework for 6G IoT Using Deep Learning. IEEE Internet Things J. 110.1109\/JIOT.2025.3619970","journal-title":"IEEE Internet Things J"}],"container-title":["Journal of Cloud Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13677-026-00879-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s13677-026-00879-5","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13677-026-00879-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T12:21:03Z","timestamp":1773663663000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1186\/s13677-026-00879-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,3,16]]},"references-count":50,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2026,12]]}},"alternative-id":["879"],"URL":"https:\/\/doi.org\/10.1186\/s13677-026-00879-5","relation":{"references":[{"id-type":"doi","id":"10.1109\/JSEN.2022.3205017","asserted-by":"subject"}]},"ISSN":["2192-113X"],"issn-type":[{"value":"2192-113X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,3,16]]},"assertion":[{"value":"20 September 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 February 2026","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 March 2026","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The committee of the Bahria University Karachi Campus confirmed that all experimental protocols were approved by the organization.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}},{"value":"No human subjects are harmed in this research, and we confirmed that all data shared with the participants. The datasets generated during and\/or analyzed during the current study are available from the corresponding author upon reasonable request.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Informed consent"}},{"value":"Not applicable.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Permission to reproduce material from other sources"}},{"value":"The authors declare no competing interests.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"40"}}