MONET - volume 26 - 2021 论文列表 |
点击这里查看 Mobile Networks & Applications 的JCR分区、影响因子等信息 |
Hoda Jannati Ebrahim Ardeshir-Larijani Behnam Bahrak
A Survey of Android Mobile Phone Authentication Schemes. Fuzzy Logic with Expert Judgment to Implement an Adaptive Risk-Based Access Control Model for IoT.Hany F. Atlam Robert John Walters Gary B. Wills Joshua Daniel
New Engineering Method for the Risk Assessment: Case Study Signal Jamming of the M-Health Networks. Fine-grained Trust-based Routing Algorithm for Wireless Sensor Networks.Liangyi Gong Chundong Wang Hong Yang Zhiyuan Li Zhentang Zhao
A Fine-Grained Attribute Based Data Retrieval with Proxy Re-Encryption Scheme for Data Outsourcing Systems.Hanshu Hong Ximeng Liu Zhixin Sun
A Novel Visual Medical Image Encryption for Secure Transmission of Authenticated Watermarked Medical Images. Verifiable Public-Key Encryption with Keyword Search Secure against Continual Memory Attacks.Chengyu Hu Zhen Li Pengtao Liu Rupeng Yang Shanqing Guo Hailong Zhang
Security and Privacy in New Computing Environments (SPNCE 2016). Fast Blind Deblurring of QR Code Images Based on Adaptive Scale Control.Rongjun Chen Zhijun Zheng Junfeng Pan Yongxing Yu Huimin Zhao Jinchang Ren
Self-Organised Collision-Free Flocking Mechanism in Heterogeneous Robot Swarms.Zhe Ban Junyan Hu Barry Lennox Farshad Arvin
Point-of-Interest Recommendation with User's Privacy Preserving in an IoT Environment.Guoming Zhang Lianyong Qi Xuyun Zhang Xiaolong Xu Wanchun Dou
PR-RCUC: A POI Recommendation Model Using Region-Based Collaborative Filtering and User-Based Mobile Context.Jun Zeng Haoran Tang Yizhu Zhao Min Gao Junhao Wen
Edge User Allocation in Overlap Areas for Mobile Edge Computing.Fangzheng Liu Bofeng Lv Jiwei Huang Sikandar Ali
Secure and Usable Handshake Based Pairing for Wrist-Worn Smart Devices on Different Users.Guichuan Zhao Qi Jiang Xiaohan Huang Xindi Ma Youliang Tian Jian Feng Ma
Runtime Verification of Spatio-Temporal Specification Language.Tengfei Li Jing Liu Haiying Sun Xiaohong Chen Ling Yin Xia Mao Junfeng Sun
Artificial Intelligence in Collaborative Computing.Xinheng Wang Honghao Gao Kaizhu Huang
Mapping the Evolution of Intellectual Structure in Information Management Using Author Co-citation Analysis.Carlos Luis González-Valiente Magda León Santos Ricardo Arencibia Jorge Ed C. M. Noyons Rodrigo Costas
TORM: Tunicate Swarm Algorithm-based Optimized Routing Mechanism in IoT-based Framework.Roopali Dogra Shalli Rani Sandeep Verma Sahil Garg Mohammad Mehedi Hassan
A Survey On Log Research Of AIOps: Methods and Trends.Jiang Zhaoxue Tong Li Zhenguo Zhang Jingguo Ge Junling You Liangxiong Li
A Multi-modal Data Platform for Diagnosis and Prediction of Alzheimer's Disease Using Machine Learning Methods.Zhen Pang Xiang Wang Xulong Wang Jun Qi Zhong Zhao Yuan Gao Yun Yang Po Yang
Deep Learning Based Customer Preferences Analysis in Industry 4.0 Environment.Qindong Sun Xingyu Feng Shanshan Zhao Han Cao Shancang Li Yufeng Yao
A Deep Neural Network Combined with Radial Basis Function for Abnormality Classification.Noushin Jafarpisheh Effat Jalaeian Zaferani Mohammad Teshnehlab Hadis Karimipour Reza M. Parizi Gautam Srivastava
Editorial: Deep Learning for Big Data Analytics.Yulei Wu Fei Hao Sambit Bakshi Haojun Huang
TA-BiLSTM: An Interpretable Topic-Aware Model for Misleading Information Detection in Mobile Social Networks.Shuyu Chang Rui Wang Haiping Huang Jian Luo
SDTIOA: Modeling the Timed Privacy Requirements of IoT Service Composition: A User Interaction Perspective for Automatic Transformation from BPEL to Timed Automata.Honghao Gao Yida Zhang Huaikou Miao Ramón J. Durán Barroso Xiaoxian Yang
Formal analysis and automated validation of privacy-preserving AICE protocol in mobile edge computing.Jiaqi Yin Huibiao Zhu Yuan Fei
Tolerance-Oriented Wi-Fi Advertisement Scheduling: A Near Optimal Study on Accumulative User Interests.Wanru Xu Xiaochen Fan Tao Wu Wei Tao Yue Xi Panlong Yang Chang Tian
Edge Network Routing Protocol Base on Target Tracking Scenario.Zhongyi Zhang Weihua Zhao Ouhan Huang Gangyong Jia Youhuizi Li Songzhu Mei Duan Zhao
Tiny FCOS: a Lightweight Anchor-Free Object Detection Algorithm for Mobile Scenarios. Special Issue on Deep Learning in Mobile and Wireless Networks: Algorithms, Models and Techniques.Rafeeq Ahmed Tanvir Ahmad Fadiyah M. Almutairi Abdulrahman M. Qahtani Abdulmajeed Alsufyani Omar Almutiry
Movie Recommendation System for Educational Purposes Based on Field-Aware Factorization Machine.Fei Lang Lili Liang Kai Huang Teng Chen Suxia Zhu
Evaluation Method of Online and Offline Hybrid Teaching Quality of Physical Education Based on Mobile Edge Computing. Improvement of Adaptive Learning Service Recommendation Algorithm Based on Big Data.Ya-zhi Yang Yong Zhong Marcin Wozniak
Application and Exploration of Artificial Intelligence and Edge Computing in Long-Distance Education on Mobile Network.Changbo Hou Lijie Hua Yun Lin Jing Zhang Guowei Liu Yihan Xiao
Correction to: Research on Adaptive Updating Method of Education Resource Index Based on Mobile Computing.Jian-Wei Liu Arun Kumar Sangaiah
Research on Adaptive Updating Method of Education Resource Index Based on Mobile Computing.Jian-Wei Liu Arun Kumar Sangaiah
The Design of Mobile Distance Online Education Resource Sharing from the Perspective of Man-Machine Cooperation.Chun-yu Li Qun Zhao Norbert Herencsar Gautam Srivastava
Cross-Dimension Mining Model of Public Opinion Data in Online Education Based on Fuzzy Association Rules.Li-xuan Li Ying Huo Jerry Chun-Wei Lin
An Introduction to Key Technology in Artificial Intelligence and big Data Driven e-Learning and e-Education. Distributed Network Slicing Management Using Blockchains in E-Health Environments.João Paulo de Brito Gonçalves Henrique Cesar Carvalho de Resende Rodolfo da Silva Villaça Esteban Municio Cristiano Bonato Both Johann M. Márquez-Barja
Analysis of Witnesses in the Steem Blockchain.Barbara Guidi Andrea Michienzi Laura Ricci
An Engaging Serious Game Aiming at Awareness of Therapy Skills Associated with Social Anxiety Disorder.Imre Dániel Báldy Nikolaj Hansen Thomas Bjørner
Alternative Deep Learning Architectures for Feature-Level Fusion in Human Activity Recognition.Julien Maitre Kevin Bouchard Sébastien Gaboury
On exploiting Data Visualization and IoT for Increasing Sustainability and Safety in a Smart Campus.Chiara Ceccarini Silvia Mirri Paola Salomoni Catia Prandi
Location Dynamic Tabu Routing Protocol for MANETs.Armir Bujari Luigi De Giovanni Claudio E. Palazzi Daniele Ronzani
LADEA: A Software Infrastructure for Audio Delivery and Analytics.Kiyoshy Nakamura Daniel Hernández José M. Cecilia Pietro Manzoni Marco Zennaro Juan-Carlos Cano Carlos T. Calafate
Editorial: Smart Objects and Technologies for Social Good.Catia Prandi Johann M. Márquez-Barja
Neural Networks with Improved Extreme Learning Machine for Demand Prediction of Bike-sharing.Fan Wu Si Hong Wei Zhao Xiaoyan Wang Xun Shao Xiujun Wang Xiao Zheng
APFNet: Amplitude-Phase Fusion Network for CSI-Based Action Recognition.Pengsong Duan Hao Li Bo Zhang Yangjie Cao Endong Wang
A Displacement Estimated Method for Real Time Tissue Ultrasound Elastography.Hong-an Li Min Zhang Keping Yu Xin Qi Jianfeng Tong
Distributed Spectrum and Power Allocation for D2D-U Networks: a Scheme Based on NN and Federated Learning.Rui Yin Zhiqun Zou Celimuge Wu Jiantao Yuan Xianfu Chen
An Optimal Uplink Scheduling in Heterogeneous PLC and LTE Communication for Delay-aware Smart Grid Applications.Qiyue Li Tengfei Cao Wei Sun Weitao Li Jinjin Ding Guojun Luo Jie Li
An Efficient Protocol for the Tag-information Sampling Problem in RFID Systems.Xiujun Wang Yan Gao Yangzhao Yang Xiao Zheng Xuangou Wu Wei Zhao
Editorial: Recent Advances on Intelligent Mobility and Edge Computing.Xun Shao Zhi Liu Xianfu Chen Seng W. Loke Hwee-Pink Tan
Research on Image Fusion Algorithm Based on NSST Frequency Division and Improved LSCN.Hongna Zhang Wei Yan Chunyou Zhang Lihua Wang
Research on Optimal Checkpointing-Interval for Flink Stream Processing Applications.Zhan Zhang Wenhao Li Xiao Qing Xian Liu Hongwei Liu
"3 M" Performability Creative Practical Platform Application Research. Video Question Answering: a Survey of Models and Datasets.Guanglu Sun Lili Liang Tianlin Li Bo Yu Meng Wu Bolun Zhang
A Survey of CRF Algorithm Based Knowledge Extraction of Elementary Mathematics in Chinese.Shuai Liu Tenghui He Jianhua Dai
Design and Research of Intelligent Question-Answering(Q&A) System Based on High School Course Knowledge Graph.Zhijun Yang Yang Wang Jianhou Gan Hang Li Ning Lei
Introduction of Progress in Education under Recent Technology Revolution.Chengyan Li Xin Gao Qingquan Sun
A Multipath Routing Protocol with Load Balancing and Energy Constraining Based on AOMDV in Ad Hoc Network. Characteristics Analysis of the Fractional-Order Chaotic Memristive Circuit Based on Chua's Circuit. Image Compression and Encryption Algorithm Based on Hyper-chaotic Map.Jun Mou Feifei Yang Ran Chu Yinghong Cao
A Novel Relay-Assisted DCO-OFDM Green VLC System Based on NOMA.Xin Liu Yuyao Wang Zhenyu Na Mudi Xiong
Correction to: Antenna Selection in TDD Massive MIMO Systems.Guiyue Jin Chaoyue Zhao Zhuyun Fan Jiyu Jin
Antenna Selection in TDD Massive MIMO Systems.Guiyue Jin Chaoyue Zhao Zhuyun Fan Jiyu Jin
A Carrier Selection Method Based on Single RF Chain SM-OFDM Systems. Editorial: Recent Advances on Communication Signal Processing and Networking.Qamar Usman Omer Chughtai Nadia Nawaz Zeeshan Kaleem Kishwer Abdul Khaliq Long Dinh Nguyen
Meteorological and Hydrological Drought Assessment for Dong Nai River Basin, Vietnam under Climate Change.Vu Thuy Linh Vo Ngoc Quynh Tram Ho Minh Dung Dang Nguyen Dong Phuong Liem D. Nguyen Long Dinh Nguyen Cheng Yin Ayse Kortun Nguyen Kim Loi
Evaluating the Performance of Full-Duplex Energy Harvesting Vehicle-to-Vehicle Communication System over Double Rayleigh Fading Channels.Ba Cao Nguyen Tran Manh Hoang Xuan Nam Tran Xuan Nghia Pham Le The Dung
ClusTi: Clustering Method for Table Structure Recognition in Scanned Images.Arthur Zucker Younes Belkada Hanh Vu Nam Van Nguyen
Energy efficiency of full-duplex cognitive radio in low-power regimes under imperfect spectrum sensing.Mohammad Ranjbar H. L. Nguyen Nghi H. Tran Tutku Karacolak Shivakumar Sastry L. D. Nguyen
Convergence of 5G Technologies, Artificial Intelligence and Cybersecurity of Networked Societies for the Cities of Tomorrow.Trung Q. Duong Van-Phuc Hoang Cong-Kha Pham
ShadowFPE: New Encrypted Web Application Solution Based on Shadow DOM.Xiaojie Guo Yanyu Huang Jinhui Ye Sijie Yin Min Li Zhaohui Li Siu-Ming Yiu Xiaochun Cheng
Research on Intelligent Detection of Command Level Stack Pollution for Binary Program Analysis.Hui Lu Chengjie Jin Xiaohan Helu Man Zhang Yanbin Sun Yi Han Zhihong Tian
MF-CNN: a New Approach for LDoS Attack Detection Based on Multi-feature Fusion and CNN.Dan Tang Liu Tang Wei Shi Sijia Zhan Qiuwei Yang
Accurate and Cognitive Intrusion Detection System (ACIDS): a Novel Black Hole Detection Mechanism in Mobile Ad Hoc Networks.S. Sivanesh V. R. Sarma Dhulipala
Secure Encrypted Data Deduplication Based on Data Popularity.Yunlong He Hequn Xian Liming Wang Shuguang Zhang
Malware Detection Based on Multi-level and Dynamic Multi-feature Using Ensemble Learning at Hypervisor.Jian Zhang Cheng Gao Liangyi Gong Zhaojun Gu Dapeng Man Wu Yang Wenzhen Li
A Fault Tolerant Mechanism for UE Authentication in 5G Networks.Fang-Yie Leu Kun-Lin Tsai Heru Susanto Cheng-Yan Gu Ilsun You
A Confidence-Guided Evaluation for Log Parsers Inner Quality.Xueshuo Xie Zhi Wang Xuhang Xiao Ye Lu Shenwei Huang Tao Li
Network Risk Assessment Based on Baum Welch Algorithm and HMM.Chundong Wang Kongbo Li Xiaonan He
An Evolutionary-Based Black-Box Attack to Deep Neural Network Classifiers.Yutian Zhou Yu-an Tan Quanxin Zhang Xiaohui Kuang Yahong Han Jingjing Hu
Cryptanalysis of a Public Key Cryptosystem Based on Data Complexity under Quantum Environment.Zhengjun Jing Chunsheng Gu Chunpeng Ge Peizhong Shi
An Efficient Scheme of Cloud Data Assured Deletion. Quadratic Poly Certificateless Inductive Signcryption for Network Security. A Privacy-preserving Fuzzy Search Scheme Supporting Logic Query over Encrypted Cloud Data.Shaojing Fu Qi Zhang Nan Jia Ming Xu
A Novel Algorithm for Improving Malicious Node Detection Effect in Wireless Sensor Networks.Hongyu Yang Xugao Zhang Fang Cheng
A Graded Reversible Watermarking Scheme for Relational Data. Correction to: Identity-based Multi-Recipient Public Key Encryption Scheme and Its Application in IoT.Jing Li Xiangyan Tang Zhijun Wei Yu Wang Wenbin Chen Yu-an Tan
Identity-based Multi-Recipient Public Key Encryption Scheme and Its Application in IoT.Jing Li Xiangyan Tang Zhijun Wei Yu Wang Wenbin Chen Yu-an Tan
Security Assessment for Interdependent Heterogeneous Cyber Physical Systems.Hao Peng Zhe Kan Dandan Zhao Jianmin Han
A Privacy-sensitive Service Selection Method Based on Artificial Fish Swarm Algorithm in the Internet of Things.Bing Jia Lifei Hao Chuxuan Zhang Baoqi Huang
PRIA: a Multi-source Recognition Method Based on Partial Observation in SIR Model.Yong Ding Xiaoqing Cui Huiyong Wang Kun Zhang
An Efficient Bounded Model Checking Approach for Web Service Composition.Yuanzhang Li Dongyan Ma Chen Liu Wencong Han Hongwei Jiang Jingjing Hu
A Timestamp-Regulating VoLTE Covert Channel against Statistical Analysis.Quanxin Zhang Mengyan Zhu Chen Liang Kunqing Wang Kai Yang Yuanzhang Li
Role-Based Access Control Model for Cloud Storage Using Identity-Based Cryptosystem.Jian Xu Yanbo Yu Qingyu Meng Qiyu Wu Fucai Zhou
Intrusion Detection System for IoT Heterogeneous Perceptual Network.Man Zhou Lansheng Han Hongwei Lu Cai Fu
Cognitive Radio Based System for Best Effort Communications in Sound-based Covert Channel for IoT Environments.Jorge Enrique Coyac-Torres Mario E. Rivero-Angeles Eleazar Aguirre Anaya
Throughput Analysis of Smart Buildings-oriented Wireless Networks under Jamming Attacks.Xianglin Wei Tongxiang Wang Chaogang Tang
Privacy-Preserving Top-k Location-based Services Retrieval in Mobile Internet.Na Wang Jian Li Junsong Fu Yan Zheng
A Revocable Group Signatures Scheme to Provide Privacy-Preserving Authentications.Xiaohan Yue Mengzhe Xi Bing Chen Mingchao Gao Yuan He Jian Xu
Editorial: Security and Privacy in Computing and Communications.Jingyi Liu Hengyu Li Jun Liu Shaorong Xie Jun Luo
A Personalized Feature Extraction and Classification Method for Motor Imagery Recognition.Jian-Guo Wang Hui-Min Shao Yuan Yao Jian-Long Liu Shi-Wei Ma
Distributed Power Controller of Massive Wireless Body Area Networks based on Deep Reinforcement Learning.Peng He Ming Liu Chunhui Lan Mengnan Su Linhai Wang Zhidu Li Tong Tang
Editorial: Biologically Inspired Computing and Networking.Yifan Chen Tadashi Nakano Lin Lin Weisi Guo Mohammad Upal Mahfuz
Toward Modeling Fuzzy Dynamic System Based on Linguistic Values. Analyzing Energy Leaks of Android Applications Using Event-B. Brown Planthopper Sensor Network Optimization Based on Climate and Geographical Factors using Cellular Automata Technique.Hiep Xuan Huynh Nga My Lam Phan Huong Hoang Luong Linh My Thi Ong Hai Thanh Nguyen Bernard Pottier
Content Based Medical Image Retrieval Based on Salient Regions Combined with Deep Learning.Vo Thi Hong Tuyet Thanh Binh Nguyen Nguyen Kim Quoc Ashish Khare
A Framework for Protecting Privacy on Mobile Social Networks.Seyyed Mohammad Safi Ali Movaghar Komeil Safikhani Mahmoodzadeh
Data Offloading via Optimal Target Set Selection in Opportunistic Networks.Prince Sharma Shailendra Shukla Amol Vasudeva
Context-Aware Computing and Nature-Inspired Computing. An Object Recognition Approach for Synthetic Aperture Radar Images.Chen Ning Wenbo Liu Gong Zhang Xin Wang
An Effective Algorithm for Single Image Fog Removal.Xin Wang Xin Zhang Hangcheng Zhu Qiong Wang Chen Ning
Cooperation of Mobile Devices for Fast Inference of Deep Learning Applications.Qinglin Yang Xiaofei Luo Peng Li Toshiaki Miyazaki Wenfeng Shen Weiqin Tong
Cluster-Based Joint Resource Allocation with Successive Interference Cancellation for Ultra-Dense Networks.Lihua Yang Junhui Zhao Feifei Gao Yi Gong
Energy-Efficient Power Allocation Scheme for Uplink Distributed Antenna System with D2D Communication.Guangying Wang Xiangbin Yu Tao Teng
Robust Spectrum-Energy Efficiency for Green Cognitive Communications. Optimization of FBMC Waveform by Designing NPR Prototype Filter with Improved Stopband Suppression.Jingyu Hua Jiangang Wen Anding Wang Zhijiang Xu Feng Li
User-Centered Interference Coordination in the Ultra-Dense Network: a Cluster and Priority Perspective.Guomin Wu Guoping Tan Defu Jiang Fei Feng Hanfu Xun Qi Wang Xinyu Shen Ziming Sheng
Performance Evaluation of URLLC in 5G Based on Stochastic Network Calculus.Shengcheng Ma Xin Chen Zhuo Li Ying Chen
A Network Calculus Based Delay and Backlog Analysis for Cloud Radio Access Networks.Muzhou Xiong Lin Gu Haixin Liu Deze Zeng Hong Yao Zhuzhong Qian
Editorial: 5G Wireless Communication Systems and Advanced Image Processing. Vehicular Edge Computing and Networking: A Survey.Lei Liu Chen Chen Qingqi Pei Sabita Maharjan Yan Zhang
Robust Network Intrusion Detection Scheme Using Long-Short Term Memory Based Convolutional Neural Networks.Chia-Ming Hsu Muhammad Zulfan Azhari He-Yen Hsieh Setya Widyawan Prakosa Jenq-Shiou Leu
MAC Technology of IEEE 802.11ax: Progress and Tutorial. A Coverage Vulnerability Repair Algorithm Based on Clustering in Underwater Wireless Sensor Networks.Wenbo Zhang Guangjie Han Yue Liu Jing Wang
Co-Tier Uplink Power Control in Small Cell Networks by Stackelberg Game with Two-Way Pricing Mechanism.Chih-Cheng Tseng Hwang-Cheng Wang Kuo-Chang Ting Shih-Han Lo Fang-Chang Kuo
The Implementation of a Cloud-Edge Computing Architecture Using OpenStack and Kubernetes for Air Quality Monitoring Application.Endah Kristiani Chao-Tung Yang Chin-Yin Huang Yuan-Ting Wang Po-Cheng Ko
Editorial: Recent Advances in Wireless Internet.Der-Jiunn Deng Xun Yang Mohammed Atiquzzaman
An Improved IDAF-FIT Clustering Based ASLPP-RR Routing with Secure Data Aggregation in Wireless Sensor Network.M. Vasim Babu Jafar Ahmad Abed Alzubi Ramesh Sekaran Rizwan Patan Manikandan Ramachandran Deepak Gupta
A QoS Ensuring Two-Layered Multi-Attribute Auction Mechanism to Mitigate DDoS Attack. Indoor WLAN Personnel Intrusion Detection Using Transfer Learning-Aided Generative Adversarial Network with Light-Loaded Database.Mu Zhou Yaoping Li Hui Yuan Jiacheng Wang Qiaolin Pu
Network Security Situation Prediction of Improved Lanchester Equation Based on Time Action Factor.Huiqian Song Dongmei Zhao Chunyang Yuan
Fiber Bragg Grating Sensor Based on Refractive Index Segment Code of Mobile Modulation.Juan Wang Zhi-Chao Liu Jin-Hua Yang
The Effect of Mobile Wearable Waist Assist Robot on Lower Back Pain during Lifting and Handling Tasks.Peng Yin Liang Yang Shaofeng Du Shengguan Qu Bochen Jia Ning Zhao
Occlusion-Aware Detection for Internet of Vehicles in Urban Traffic Sensing Systems.Linkai Chen Yaduan Ruan Honghui Fan Hongjin Zhu XiangJun Chen Qimei Chen
Creating Collision-Free Communication in IoT with 6G Using Multiple Machine Access Learning Collision Avoidance Protocol.P. Mohamed Shakeel S. Baskar Hassan Fouad Gunasekaran Manogaran Vijayalakshmi Saravanan Qin Xin
Using Multiple RPL Instances to Enhance the Performance of New 6G and Internet of Everything (6G/IoE)-Based Healthcare Monitoring Systems. Editorial: Potential Sensors for the Forthcoming 6G/IoE - Electronics and Physical Communication Aspects.Yanbin Sun Mohan Li Shen Su Zhihong Tian Wei Shi Meng Han
Ergodic Capacity Analysis on MIMO Communications in Internet of Vehicles. Joint User Association and Time Partitioning for Load Balancing in Ultra-Dense Heterogeneous Networks.Tianqing Zhou Junhui Zhao Dong Qin Xuan Li Chunguo Li Luxi Yang
Cost Efficient Edge Service Placement for Crowdsensing via Bus Passengers.Haixiang Hou Hai Jin Xiaofei Liao
An Extendable Layered Architecture for Collective Computing to Support Concurrent Multi-sourced Heterogeneous Tasks.Yang Li Yunlong Zhao Bin Guo Zhenhua Zhang Qian Geng Ran Wang
VariSecure: Facial Appearance Variance based Secure Device Pairing.Zhiping Jiang Chen Qian Kun Zhao Shuaiyu Chen Rui Li Xu Wang Chen He Junzhao Du
Indoor Geofencing Based on Sensorless Motion Sensing and Fingerprint Self-Updating.Kun Zhao Wei Xi Zhiping Jiang Zhi Wang Hui He Tao Li Xiaobin Zhang Jizhong Zhao
A Multi-grained Log Auditing Scheme for Cloud Data Confidentiality.Zhen Yang Wenyu Wang Yongfeng Huang Xing Li
Cloud-Based Data Offloading for Multi-focus and Multi-views Image Fusion in Mobile Applications.Yiqi Shi Jianguo Sun Duo Liu Liang Kou Boquan Li Qing Yang Liguo Zhang
A Survey on the Development of Self-Organizing Maps for Unsupervised Intrusion Detection.Xiaofei Qu Lin Yang Kai Guo Linru Ma Meng Sun Mingxing Ke Mu Li
Time-Based Access Control for Multi-attribute Data in Internet of Things.Baowei Wang Wei Li Neal N. Xiong
Editorial: Collaborative Next Generation Networking.Zhangbing Zhou Takahiro Hara Deze Zeng Yu Zhang Chunsheng Zhu
A Hybrid Virtualization Approach to Emulate Network Nodes of Heterogeneous Architectures.Junyu Lai Jiaqi Tian Rui Liu Zheng Yang Dingde Jiang
Network Emulation as a Service (NEaaS): Towards a Cloud-Based Network Emulation Platform.Junyu Lai Jiaqi Tian Ke Zhang Zheng Yang Dingde Jiang
Weaker Convergence of Global Relaxed Multisplitting USAOR Methods for an H-matrix.Li-Tao Zhang Dingde Jiang Xianyu Zuo Ying-Chao Zhao
Relaxed Modulus-Based Synchronous Multisplitting Multi-Parameter Methods for Linear Complementarity Problems.Li-Tao Zhang Dingde Jiang Xianyu Zuo Ying-Chao Zhao Yi-Fan Zhang
Investigating the Strategy on Path Planning on Aircraft Evacuation Process Using Discrete Event Simulation. A Prediction Approach to End-to-End Traffic in Space Information Networks.Sheng Qi Dingde Jiang Liuwei Huo
A New Traffic Prediction Algorithm to Software Defined Networking.Yuqing Wang Dingde Jiang Liuwei Huo Yong Zhao
A QoE Test System for Vehicular Voice Cloud Services.Kailiang Zhang Lei Chen Yuan An Ping Cui
Spectral Efficiency Analysis for Massive MIMO System Under QoS Constraint: an Effective Capacity Perspective. A New Network Traffic Prediction Approach in Software Defined Networks. An Adaboost Based Link Planning Scheme in Space-Air-Ground Integrated Networks.Feng Wang Dingde Jiang Sheng Qi Chen Qiao
A Novel Fireworks Algorithm for the Protein-Ligand Docking on the AutoDock.Zhuoran Liu Dingde Jiang Changsheng Zhang Haitong Zhao Qidong Zhao Bin Zhang
MAPS: Indoor Localization Algorithm Based on Multiple AP Selection.Pengyu Huang Haojie Zhao Wei Liu Dingde Jiang
Adaptive Morphological Contrast Enhancement Based on Quantum Genetic Algorithm for Point Target Detection. Efficient Traffic Sign Recognition Using Cross-Connected Convolution Neural Networks Under Compressive Sensing Domain.Jiping Xiong Lingfeng Ye Dingde Jiang Tong Ye Fei Wang Lingyun Zhu
A Quantum Key Distribution Protocol Based on the EPR Pairs and its Simulation.Jian Li Hengji Li Na Wang Chaoyang Li Yanyan Hou Xiubo Chen Yu-Guang Yang
DSWIPT Scheme for Cooperative Transmission in Downlink NOMA System.Kai Yang Xiao Yan Qian Wang Dingde Jiang Kaiyu Qin
A Dynamic Resource Scheduling Scheme in Edge Computing Satellite Networks.Feng Wang Dingde Jiang Sheng Qi Chen Qiao Lei Shi
A Blockchain-Based Security Traffic Measurement Approach to Software Defined Networking.Liuwei Huo Dingde Jiang Sheng Qi Lei Miao
An AI-Based Adaptive Cognitive Modeling and Measurement Method of Network Traffic for EIS.Liuwei Huo Dingde Jiang Sheng Qi Houbing Song Lei Miao
Editorial: Simulation Tools and Techniques for Communications and Networking.Dingde Jiang Houbing Song Haijun Rong Huihui Wang
Charging Control of Electric Vehicles in Smart Grid: a Stackelberg Differential Game Based Approach.Haitao Xu Hung Khanh Nguyen Xianwei Zhou Zhu Han
Demand Response Management in Smart Grid Networks: a Two-Stage Game-Theoretic Learning-Based Approach.Pavlos Athanasios Apostolopoulos Eirini-Eleni Tsiropoulou Symeon Papavassiliou
Low-Complexity Channel Estimation and Cooperative Channel Allocation in Millimeter-Wave Small Cell Networks.Carlos Saavedra Arancibia Ju Bin Song
New Method of Energy Efficient Subcarrier Allocation Based on Evolutionary Game Theory.De-gan Zhang Chen Chen Yu-ya Cui Ting Zhang
Duopoly Provision of Services Based on Wireless Sensor-supplied Data: a Differential Game Model.Angel Sanchis-Cano Luis Guijarro Vicent Pla José R. Vidal
Pricing and Revenue Sharing Between ISPs Under Content Sponsoring. Time-Consistent Solutions for Two-Stage Network Games with Pairwise Interactions. Editorial: Game Theory for Networks.Hao-Peng Chan Liang Xu Hui-Hui Liu Run-Tian Zhang Arun Kumar Sangaiah
Dynamic Fusion Algorithm of Building Surface Data in Heterogeneous Environment. Improving Tightly LiDAR/Compass/Encoder-Integrated Mobile Robot Localization with Uncertain Sampling Period Utilizing EFIR Filter.Yuan Xu Yuriy S. Shmaliy Wanfeng Ma Xianwei Jiang Tao Shen Shuhui Bi Hang Guo
Research on Air Traffic Flow Forecast Based on ELM Non-Iterative Algorithm.Zhaoyue Zhang An Zhang Cong Sun Shuaida Xiang Jichen Guan Xuedong Huang
Synthesizing Multi-Contrast MR Images Via Novel 3D Conditional Variational Auto-Encoding GAN.Huan Yang Xianling Lu Shui-Hua Wang Zhihai Lu Jian Yao Yizhang Jiang Pengjiang Qian
Feature Extraction for Medical CT Images of Sports Tear Injury.Qi Nie Yebing Zou Jerry Chun-Wei Lin
An Image Super-Resolution Reconstruction Method with Single Frame Character Based on Wavelet Neural Network in Internet of Things. Contour Feature Extraction of Medical Image Based on Multi-Threshold Optimization.Wei Li Qian Huang Gautam Srivastava
A Review of Deep Learning on Medical Image Analysis.Jian Wang Hengde Zhu Shui-Hua Wang Yu-Dong Zhang
An Introduction to Multimedia Technology and Enhanced Learning. Terminological (di) Similarities between Information Management and Knowledge Management: a Term Co-Occurrence Analysis.Carlos Luis González-Valiente Rodrigo Costas Ed C. M. Noyons Jela Steinerová Jaroslav Susol
Predicting Systolic Blood Pressure in Real-Time Using Streaming Data and Deep Learning.Hager Saleh Eman M. G. Younis Radhya Sahal Abdelmgeid A. Ali
An Improved NER Methodology to the Portuguese Language.Rogerio de Aquino Silva Luana da Silva Moisés Lima Dutra Gustavo Medeiros de Araújo
A Proposed Approach for Provenance Data Gathering.Márcio José Sembay Douglas Dyllon Jeronimo de Macedo Moisés Lima Dutra
Mobile Data Science and Intelligent Apps: Concepts, AI-Based Modeling and Research Directions.Iqbal H. Sarker Mohammed Moshiul Hoque Md Kafil Uddin Tawfeeq Alsanoosy
Blockchain for Collaborative Businesses.Augusto R. C. Bedin Miriam A. M. Capretz Syed Mir
An Analysis of Blockchain and GDPR under the Data Lifecycle Perspective.Gislaine Parra Freund Priscila Basto Fagundes Douglas Dyllon Jeronimo de Macedo
Financial Times Series Forecasting of Clustered Stocks.Felipe Affonso Thiago Magela Rodrigues Dias Adilson Luiz Pinto
Editorial: Smart Data Management and Applications. A Comprehensive Survey on Machine Learning-Based Big Data Analytics for IoT-Enabled Smart Healthcare System.Wei Li Yuanbo Chai Fazlullah Khan Syed Rooh Ullah Jan Sahil Verma Varun G. Menon Kavita Xingwang Li
Mining of High-Utility Patterns in Big IoT-based Databases.Jimmy Ming-Tai Wu Gautam Srivastava Jerry Chun-Wei Lin Youcef Djenouri Min Wei Reza M. Parizi Mohammad S. Khan
Convolutional Neural Network for the Semantic Segmentation of Remote Sensing Images.Muhammad Alam Jian-Feng Wang Guangpei Cong Yunrong Lv Yuanfang Chen
MapReduce-Based Improved Random Forest Model for Massive Educational Data Processing and Classification. BP Neural Network Combination Prediction for Big Data Enterprise Energy Management System.Sen Xu Ryan Alturki Ateeq Ur Rehman Muhammad Usman Tariq
Research on Sentiment Analysis of Network Forum Based on BP Neural Network.Yushou Tang Jianhuan Su Muazzam Ali Khan
Machine Learning Based Approach for Sustainable Social Protection Policies in Developing Societies. Editorial: Machine Learning and Big Data Analytics for IoT-Enabled Smart Cities.Mian Ahmad Jan Xiangjian He Houbing Song Muhammad Babar
Indoor Wi-Fi Positioning Algorithm Based on Location Fingerprint.Xue-rong Cui Mengyan Wang Juan Li Meiqi Ji Jin Yang Jianhang Liu Tingpei Huang Haihua Chen
Enhancing Representation of Deep Features for Sensor-Based Activity Recognition.Xue Li Lanshun Nie Xiandong Si Renjie Ding De-chen Zhan
Node Attitude Aware Information Dissemination Model Based on Evolutionary Game in Social Networks.Hongcheng Huang Tingting Wang Min Hu Mengyuan Dong Licheng Lai
Bit-Quantized-Net: An Effective Method for Compressing Deep Neural Networks.Chunshan Li Qing Du Xiaofei Xu Jin-Hui Zhu Dianhui Chu
Detection of Fake Reviews Using Group Model.Yuejun Li Fangxin Wang Shuwu Zhang Xiaofei Niu
Editorial: Recent Advances on the Mobile Multimedia Services and Applications.Shengping Zhang Dianhui Chu Yanxiao Zhao Dalei Wu Qing Yang
RSANet: Towards Real-Time Object Detection with Residual Semantic-Guided Attention Feature Pyramid Network.Quan Zhou Jie Wang Jia Liu Shenghua Li Weihua Ou Xin Jin
Multi-Scale Vehicle Logo Detector.Junxing Zhang Lijun Chen Chunjuan Bo Shuo Yang
RoDeRain: Rotational Video Derain via Nonconvex and Nonsmooth Optimization.Lizhen Deng Guoxia Xu Hu Zhu Bing-Kun Bao
Region- and Pixel-Level Multi-Focus Image Fusion through Convolutional Neural Networks.Wenyi Zhao Huihua Yang Jie Wang Xipeng Pan Zhiwei Cao
Intelligent Handover Triggering Mechanism in 5G Ultra-Dense Networks Via Clustering-Based Reinforcement Learning.Qianyu Liu Chiew Foong Kwong Sun Wei Lincan Li Sibo Zhang
ASDN: A Deep Convolutional Network for Arbitrary Scale Image Super-Resolution.Jialiang Shen Yucheng Wang Jian Zhang
SCCGAN: Style and Characters Inpainting Based on CGAN.Ruijun Liu Xiangshang Wang Huimin Lu Zhaohui Wu Qian Fan Shanxi Li Xin Jin
Editorial: Cognitive Computing for Internet of Multimedia Things.