P. Vinoth Kumar, S. Muthu Vijaya Pandian, M. Muthukrishnaveni
{"title":"QoS-Driven Energy-Efficient Clustering and Routing in Wireless Sensor Networks Using Hybrid ASBO and Multi-Level Attention Dilated Residual Neural Network Approach","authors":"P. Vinoth Kumar, S. Muthu Vijaya Pandian, M. Muthukrishnaveni","doi":"10.1002/ett.70381","DOIUrl":"https://doi.org/10.1002/ett.70381","url":null,"abstract":"<div>\u0000 \u0000 <p>As Internet of Things (IoT) technologies continue to advance, their adoption in smart cities, healthcare, and smart grids has increased significantly. Wireless sensor networks (WSNs) serve as a key enabling technology for IoT-based data monitoring and transmission. An IoT-integrated WSN (IWSN) involves the deployment of numerous sensor nodes in heterogeneous and challenging environments, necessitating efficient and reliable communication mechanisms. A significant issue that requires urgent attention is the potential for security breaches, such as intrusions within WSN traffic. Ineffective intrusion detection can lead to excessive energy consumption by Sensor Nodes (SNs), potentially causing node failures and resulting in diminished network coverage and overall lifespan. Detecting such attacks has led to considerable computational complexity in the existing research. Considering the limited resources of SNs and their deployment in challenging environments, it is essential to design clustering and routing protocols for WSNs that emphasize energy efficiency and security. This study aims to address these issues by developing a clustering and routing protocol that enhances energy efficiency while ensuring robust security and integrating intrusion detection to boost network longevity and data integrity. Initially, clusters have been formed using the fuzzy clustering means (FCM) algorithm. The crested porcupine optimization (CPO) technique is then used to select the optimal cluster heads (CHs). Following the clustering process, an adaptive secretary bird optimization algorithm (ASBO) is used to select the most efficient data transmission routes between the clusters, thereby, the network's energy efficiency is increased. Finally, to enhance the security of clustered WSNs, an advanced intrusion detection system (IDS) based on a multilevel attention dilated residual neural network (MADR-Net) has been used to detect and mitigate network intrusions. The experimental findings indicate that the proposed method surpasses the existing techniques across various performance metrics. Quality of service (QoS) parameters are measured using a packet delivery ratio (PDR) of 98%, dispersion value of 0.1133, end-to-end delay (E2ED) of 45 ms, and energy consumption of 23 J. The MADR-Net algorithm has outperformed the existing algorithms by achieving 98.5% accuracy on the CICIDS-2017 dataset and 98.8% accuracy on the NSL-KDD 2015 dataset.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"37 3","pages":""},"PeriodicalIF":2.5,"publicationDate":"2026-02-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146256503","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Novel Multi-Objective Task Scheduling Using Hybrid Drawer-Mother Optimization Algorithm in Cloud Computing","authors":"Sterlin Rani D, K. Jayashree","doi":"10.1002/ett.70377","DOIUrl":"https://doi.org/10.1002/ett.70377","url":null,"abstract":"<div>\u0000 \u0000 <p>Due to the emergence of cloud and its functions, it provides adaptable and dynamic scaled computing power used at a reasonable price. Efficiently assigning tasks with high computational resources to the cloud server is a critical problem that must be addressed to enhance system efficiency and ensure the satisfaction of cloud users. This process involves the consideration of factors such as the availability of resources, task priority, and dependencies among tasks. Despite the fact that there are numerous task-planning algorithms, current methods mostly concentrate on reducing the total time taken to finish while disregarding load balance. With the aid of available assets, cloud computing has proven to be an effective technique for providing services to the customers. Due to the heavy stress on the assets, the network performance eventually suffers. One of the more challenging factors in the cloud is the effective use of the available computing power. This necessitates the creation of a task-scheduling approach that is effective and efficient; thus, it has the potential to significantly impact the online computing system's functionality and performance as a whole. In a dynamic way, the scheduling process becomes critical while changing the environmental structure and managing the virtual computers in an optimal manner. Though several models are implemented for improving scheduling tasks in cloud environments, the problem is still unresolved. Additionally, the manual scheduling does not provide a feasible solution. To combat the above difficulties, a novel task scheduling process is to be carried out. Hence, a new optimal task scheduling model is developed using hybrid optimization algorithms for assigning the tasks to the machines on several assumptions. Here, the task scheduling process is executed via the hybridization of Iterative Concept of Drawer and Mother Optimization (ICDMO). This optimization algorithm allocates the tasks after checking whether the machines are in an idle state or not. During the task scheduling, a few multi-objective constraints like makespan, energy, cost, active servers, throughput, and resource utilization are considered to enhance the performance. The developed model's efficiency is determined with the conventional task scheduling approaches to find the effectiveness of the developed task scheduling model.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"37 2","pages":""},"PeriodicalIF":2.5,"publicationDate":"2026-02-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146224445","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Shengzhuo Ge, Huan Meng, Shakir Khan, Fatimah Alhayan
{"title":"A Blockchain-Based Smart Contract Framework for Autonomous Sports Training Management in Multi-Agent Environment","authors":"Shengzhuo Ge, Huan Meng, Shakir Khan, Fatimah Alhayan","doi":"10.1002/ett.70364","DOIUrl":"https://doi.org/10.1002/ett.70364","url":null,"abstract":"<div>\u0000 \u0000 <p>In recent years, there has been a continuous growth in the demand for intelligent, decentralized and transparent systems in the field of sports training management. The combination of blockchain technology and multi-agent systems has provided secure and trustworthy technical support for autonomous training management scenarios. This paper proposes a Blockchain-based Autonomous Smart Contract Framework for Sports Training Management (BASM-STM), aiming to solve key problems such as low operational efficiency, lack of trust mechanisms, and inflexible coordination mechanisms that are commonly found in traditional training platforms. This framework adopts a six-layer architecture design, achieving a deep integration of modular smart contracts, multi-agent collaborative decision-making, and dynamic trust evaluation mechanisms. Its core innovation contributions are as follows: (1) Builds a modular smart contract system based on the Solidity language; (2) Designs a dynamic trust update mechanism driven by Bayesian networks; (3) Proposes a hybrid coordination engine of genetic algorithm and reinforcement learning. Experimental results show that compared with traditional centralized solutions and existing decentralized benchmark models, the comprehensive performance of BASM-STM has been significantly improved: Orchestration latency reduced by <span></span><math></math>, the session matching accuracy, fault tolerance under 5 node failures, and data tamper detection rate are all improved to varying degrees. The above experimental results verify the technical feasibility and system robustness of BASM-STM in secure and trustworthy, intelligent and efficient sports training management scenarios.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"37 2","pages":""},"PeriodicalIF":2.5,"publicationDate":"2026-02-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146211358","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
K. Raghavendra, Ramisetty Srividya, M. Manoj Kumar, A. S. Chandru
{"title":"Blockchain-Based Framework for Secure Cloud Data Encryption Using Heterogeneous Bi-Directional Recurrent Neural Network","authors":"K. Raghavendra, Ramisetty Srividya, M. Manoj Kumar, A. S. Chandru","doi":"10.1002/ett.70329","DOIUrl":"https://doi.org/10.1002/ett.70329","url":null,"abstract":"<div>\u0000 \u0000 <p>As more individuals use public cloud networks for data storage and handling, providing the security, integrity, and confidentiality of private data becomes essential. Classical encryption solutions are unable to address the growing threats and large-scale data processing required in such environments. Therefore, a Blockchain-Based Framework for Secure Cloud Data Encryption Using Heterogeneous Bi-Directional Recurrent Neural Network (BCF-SCDE-HBDRNN) is proposed in this paper. The input data is gathered from the IDS 2018 Intrusion CSVs Dataset. Initially, the data is encrypted using the Martino Homomorphic Encryption Algorithm (MHEA) for data security. The data is then secured using the Fair Proof-of-Reputation Consensus Algorithm (FPoR) based on blockchain technology for secure data storage. A Multi-Agent Cubature Kalman Optimizer (MACKO) is employed for optimal key management. Finally, Heterogeneous Bi-Directional Recurrent Neural Networks (HBDRNN) are used for threat detection such as normal and attack. Experimental evaluation demonstrates that the proposed framework enhances encryption efficiency, strengthens key management, and provides highly reliable threat detection compared to existing methods. The overall results highlight the framework's effectiveness as a robust and scalable solution for secure cloud data protection.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"37 2","pages":""},"PeriodicalIF":2.5,"publicationDate":"2026-02-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146211381","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ankit Tomar, Pramod Kumar, Vinay Rishiwal, Mano Yadav, Mohammad Shiblee, Kamal Kant Verma
{"title":"An Artificial Intelligence Framework for Crowd Surveillance and Risk Mitigation","authors":"Ankit Tomar, Pramod Kumar, Vinay Rishiwal, Mano Yadav, Mohammad Shiblee, Kamal Kant Verma","doi":"10.1002/ett.70376","DOIUrl":"https://doi.org/10.1002/ett.70376","url":null,"abstract":"<div>\u0000 \u0000 <p>Ensuring people's safety in public places is a significant challenge for administrations today. The importance of automated crowd-monitoring systems has recently expanded beyond their role in addressing security concerns in densely populated areas. These systems have become increasingly vital for safeguarding human lives by helping to mitigate the spread of lethal infectious viruses, such as H3N2, SARS-CoV-2, Influenza, and COVID-19. Artificial intelligence (AI) has added a new dimension to this effort by addressing novel and real-world human safety challenges through automated crowd-monitoring frameworks. The proposed AI framework for crowd surveillance (AIFCS) employs a deep C2DN network to count people and issue warning signals for images exceeding a specified crowd threshold. Four datasets, including three publicly available ones (Mall, Beijing-BRT, and SmartCity) and one self-constructed dataset (Indiana), were used to evaluate the alarm-based congestion monitoring efficiency. The people-counting results for highly crowded frame detection accuracy on the Mall, Beijing-BRT, SmartCity, and Indiana datasets were 98.21%, 86.23%, 75.0%, and 87.01%, respectively. The proposed AIFCS framework ensures real-time predictions across diverse sequences to prevent overcrowding in public places.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"37 2","pages":""},"PeriodicalIF":2.5,"publicationDate":"2026-02-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146211356","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Muhammad Jawad, Zafar Javed, Hamid Ali, Amjad Ali Naz
{"title":"Adaptive Feature Selection for Anomaly Detection in Vehicular Networks Using the Recruitment-Based Optimization Algorithm","authors":"Muhammad Jawad, Zafar Javed, Hamid Ali, Amjad Ali Naz","doi":"10.1002/ett.70374","DOIUrl":"https://doi.org/10.1002/ett.70374","url":null,"abstract":"<div>\u0000 \u0000 <p>Nowadays, we increasingly encounter with highly complex real-world optimization problems across various domains, including engineering, economics, healthcare, and artificial intelligence. Finding optimal or near-optimal solutions to these problems remains a significant challenge. In the existing body of literature, numerous stochastic-based optimization algorithms have been proposed to address such issues. However, ensuring consistent efficiency, robustness, and convergence across diverse problem landscapes remains an important concern. This paper introduces a novel and effective optimization algorithm called the Recruitment-Based Optimization Algorithm (RBOA), which draws inspiration from institutional recruitment and hiring process. The algorithm simulates the dynamic interactions and decision-making mechanisms involved in the selection of internal and external candidates during the recruitment process. Balancing exploration and exploitation is essential for any optimization approach and is achieved through the modeled behaviors of these two candidate types. External candidates facilitate global exploration, while internal candidates enhance local exploitation, together ensuring a comprehensive search of the solution space. Furthermore, the proposed RBOA has been effectively applied to an intelligent attack detection framework for Vehicular Ad Hoc Networks (VANETs), where it optimizes feature selection and classification parameters to enhance detection accuracy and reduce false alarms. In real-world validation for VANET attack detection, RBOA achieved 97.38% accuracy and a false-positive rate of 0.031, demonstrating its practical effectiveness in securing vehicular communications. To rigorously validate its performance, numerous benchmark functions have been used to test RBOA, encompassing multimodal, unimodal, and fixed-dimensional optimization problems. Comparative analysis with 11 well-established optimization algorithms reveals that RBOA consistently outperforms the compared algorithms.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"37 2","pages":""},"PeriodicalIF":2.5,"publicationDate":"2026-02-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146211379","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Robust Deep Ensemble Architecture for Safety-Critical Decision-Making in Autonomous Systems","authors":"Sri Raman Kothuri, Kabita Thaoroijam","doi":"10.1002/ett.70333","DOIUrl":"https://doi.org/10.1002/ett.70333","url":null,"abstract":"<div>\u0000 \u0000 <p>Real-world, unpredictable conditions for autonomous vehicles continue to be a challenge. This study presents a Python-developed “Redundancy Net” as a multi-model ensemble method in improving the autonomous vehicle systems in perception, decision making, fault tolerance, adaptability, and robustness. Evaluated with the KITTI Vision Benchmark Suite, the framework was developed through the integration of stereoscopic cameras, LiDAR, GPS, and IMU data fusion with the implementation of hardware sensor fusion. For analysis, redundancy net data pre-processing sequence normalization, voxelization, Kalman filtering, and sequence temporal alignment, the multimodal systems. Redundancy net uses the complementary features of CNNs for spatial perception, LSTMs for sequence learning, and transformers for global spatio-temporal integration. In the redundancy and reliability layer, model predictions are dynamically fused with “confidence” based weighting through sensor faulted downgrades ensuring dependable outcomes. A fail-safe decision module with Monte Carlo dropout and entropy-based uncertainty evaluates system low confidence outcomes and activates safety holds. The Online Validation and Self-Adaptation mechanism improves and enhances Self-Adaptation mechanisms in real time by adjusting a model's parameters based on continuous performance evaluations and feedback. The experimental evaluations show that Redundancy Net provides a performance boost of 94.8% accuracy as compared to standalone CNN, LSTM, and Transformer models, which speaks to the framework's contribution to developing safe, flexible, and robust autonomous navigation in complicated driving environments.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"37 2","pages":""},"PeriodicalIF":2.5,"publicationDate":"2026-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146193348","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Anomaly Detection of VANET Vehicle Communication Channel Driven by Artificial Intelligence","authors":"Qi Zhang, Hao Li, Fei Song, Kun Liu","doi":"10.1002/ett.70371","DOIUrl":"https://doi.org/10.1002/ett.70371","url":null,"abstract":"<div>\u0000 \u0000 <p>This research introduces an AI-powered adaptive spatio-temporal anomaly detection framework (AST-ADF) to address vulnerabilities in vehicular ad hoc networks (VANETs), which are susceptible to spoofing, message tampering, and denial-of-service attacks. The framework integrates three intelligence layers: (i) spatio-temporal feature extraction using graph convolutional networks to process mobility traces, channel states, and packet statistics, (ii) an adaptive deep detection layer that uses a hybrid CNN-BiLSTM model for capturing sequential dependencies and local fluctuations in communication channels, and (iii) a self-learning anomaly refinement module using reinforcement learning for dynamic detection updates. AST-ADF reduces false alarms, adapts to environmental changes, and provides robust detection against zero-day anomalies, outperforming static models. Simulation experiments in real VANET environments show over 96% detection accuracy with only 3% false positives. The framework's minimal computational overhead makes it suitable for vehicular edge devices and roadside infrastructure. AST-ADF demonstrates 97%–95% accuracy, 2.8%–3.5% false positives, 96%–93% precision, 97%–94% recall, and strong zero-day adaptability. Unlike previous AI-based detection frameworks, AST-ADF unifies spatial and temporal correlations, significantly improving robustness against noise and adversarial interference. Additionally, it supports real-time deployment with efficient inference through model pruning and edge optimization techniques, ensuring secure, reliable, and intelligent VANET communication for future transportation systems.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"37 2","pages":""},"PeriodicalIF":2.5,"publicationDate":"2026-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146199357","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Deep Learning Assisted Dynamic Channel Allocation in VANETs for Road Condition Monitoring With Fiber Bragg Grating Sensors","authors":"Hui Peng, Xiaoli Fang","doi":"10.1002/ett.70370","DOIUrl":"https://doi.org/10.1002/ett.70370","url":null,"abstract":"<div>\u0000 \u0000 <p>Reliable road-condition monitoring is essential for safe and efficient transportation. This study proposes a deep learning-based dynamic channel allocation (DLDCA) framework for Vehicular Ad Hoc Networks (VANETs) integrated with Fiber Bragg Grating (FBG) sensors to support real-time detection of cracks, potholes, and structural defects. The framework employs a Deep Reinforcement Learning (DRL) model that continuously adapts channel assignments based on traffic density, interference, signal strength, and latency constraints, enabling efficient spectrum usage under varying network conditions. Simulation results demonstrate significant gains over static allocation approaches, including a 90% increase in packet delivery rate, 25 Mbps improvement in throughput, 65% rise in channel utilization, and a 40 packets/s reduction in congestion. The end-to-end delay is consistently maintained below 80 ms. These outcomes confirm that the DLDCA framework enhances communication reliability and supports proactive road maintenance in next-generation intelligent transportation systems.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"37 2","pages":""},"PeriodicalIF":2.5,"publicationDate":"2026-01-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146193686","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Integrated Machine Learning Framework for Power Data Security and Misbehavior Detection in Next-Generation VANETs","authors":"Zhiqi Li, Yang Yang, Xiaolei Liu, Bo Shi","doi":"10.1002/ett.70373","DOIUrl":"https://doi.org/10.1002/ett.70373","url":null,"abstract":"<div>\u0000 \u0000 <p>Future generation Vehicular Ad-hoc Networks (VANETs) models primarily consider continuous power-aware communication to support Intelligent Transportation Systems (ITS) in exchanging diverse sensitive vehicular information. Existing systems often struggle to capture hidden misbehaviors, particularly in power-domain parameters such as abnormal power transmission, unexpected power changes, and malicious increases in signal strength. These threats disrupt sensitive vehicular communication and real-time vehicle coordination. This study aims to develop a lightweight, power-aware malicious-detection framework capable of identifying hidden, short-term power-domain attacks in resource-constrained VANET environments. To address these challenges, this study proposes a novel integrated machine learning (IML) framework that combines the strength of Feather Layer Perceptron (FLP) for feature encoding with a Dense Tree Module (DTM) for effective decision-making and Tiny-LSTM with the Endomode Sliding Window Approach to quickly analyze short-term changes in vehicle power signals. The suggested system is a future-expected green model that can efficiently analyze multidimensional power features in low-computation mode to identify malicious power patterns. The model is simulated using two distinct datasets: Secure VANET Vehicle Dataset and “The Indoor Localization Dataset,” both adapted from a public repository, which capture vehicular communication, power-related features, and motion information under everyday and attack scenarios. It also provides additional signal-based measurements and environmental features to enhance feature diversity. To improve the simulation, we consider additional synthetic features. Experimental results demonstrate that the proposed IML model achieves 99.7% test detection accuracy on standard P-OBU power data and maintains 97.6% accuracy under noisy power-domain inputs. By leveraging these advantages, the proposed framework effectively enhances power-domain security in VANETs by accurately detecting anomalies under realistic, noisy conditions. Also, it provides a scalable solution for next-generation intelligent vehicular networks.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"37 2","pages":""},"PeriodicalIF":2.5,"publicationDate":"2026-01-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146199458","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}