WCMC - 2020 论文列表 |
点击这里查看 Wireless Communications and Mobile Computing 的JCR分区、影响因子等信息 |
Rab Nawaz Jadoon Adnan Anwar Awan Muhammad Amir Khan Wuyang Zhou Aqdas Naveed Malik
Research on Value Integration Mode of Agricultural E-Commerce Industry Chain Based on Internet of Things and Blockchain Technology. LTE-U based Train to Train Communication System in CBTC: System Desin and Reliability Analysis.Hao Liang Hongli Zhao Shuo Wang Yong Zhang
Performance of Hybrid RF/FSO Cooperative Systems Based on Quasicyclic LDPC Codes and Space-Coupled LDPC Codes.Ibrahima Gueye Ibra Dioum Idy Diop Khadidiatou Wane Keita Papis Ndiaye Moussa Diallo Sidi Mohamed Farssi
Determining the Image Base of Smart Device Firmware for Security Analysis.Ruijin Zhu Baofeng Zhang Yu-an Tan Jinmiao Wang Yueliang Wan
Q -Learning-Based High Credibility and Stability Routing Algorithm for Internet of Medical Things.Kefeng Wei Lincong Zhang Xin Jiang Yi Guo
Beam Pattern Optimization Method for Subarray-Based Hybrid Beamforming Systems.Joerg Eisenbeis Jonas Pfaff Christian Karg Jerzy Kowalewski Yueheng Li Mario Pauli Thomas Zwick
Improved Multiview Decomposition for Single-Image High-Resolution 3D Object Reconstruction.Jiansheng Peng Kui Fu Qingjin Wei Yong Qin Qiwen He
Data-Driven Cybersecurity Knowledge Graph Construction for Industrial Control System Security.Guowei Shen Wanling Wang Qilin Mu Yanhong Pu Ya Qin Miao Yu
Emotional Dialogue Generation Based on Conditional Variational Autoencoder and Dual Emotion Framework.Zhenrong Deng Hongquan Lin Wenming Huang Rushi Lan Xiaonan Luo
MFCFSiam: A Correlation-Filter-Guided Siamese Network with Multifeature for Visual Tracking.Chenpu Li Qianjian Xing Zhenguo Ma Ke Zang
Link Budget Analysis for 5G Communication in the Tropical Regions.Trilochan Patra Swarup Kumar Mitra
On the Performance of Wireless Video Communication Using Iterative Joint Source Channel Decoding and Transmitter Diversity Gain Technique.Amaad Khalil Nasru Minallah Muhammad Asfandyar Awan Hameed Ullah Khan Atif Sardar Khan Atiq ur Rehman
Mobile Data Traffic Offloading through Opportunistic Vehicular Communications. Intrusion Detection System for Internet of Things Based on Temporal Convolution Neural Network and Efficient Feature Engineering.Abdelouahid Derhab Arwa Aldweesh Ahmed Z. Emam Farrukh Aslam Khan
An Efficient ECG Denoising Method Based on Empirical Mode Decomposition, Sample Entropy, and Improved Threshold Function.Dengyong Zhang Shanshan Wang Feng Li Shang Tian Jin Wang Xiangling Ding Rongrong Gong
Study on Security and Privacy in 5G-Enabled Applications.Qin Qiu Shenglan Liu Sijia Xu Shengquan Yu
An Efficient Pairing-Free Certificateless Searchable Public Key Encryption for Cloud-Based IIoT.Mimi Ma Min Luo Shuqin Fan Dengguo Feng
High-Precision Mutual Coupling Coefficient Estimation for Adaptive Beamforming.Ziang Feng Guoping Hu Qichao Ge Hao Zhou
Construction of Virtual Reality-Interactive Classroom Based on Deep Learning Algorithm.Weijie Chen Xiaoxi Liu Lei Qiao Jian Wang Yanheng Zhao
Research on Channel Model and Price Dispersion of E-Commerce Market Based on Blockchain Technology. Smart Farming: An Enhanced Pursuit of Sustainable Remote Livestock Tracking and Geofencing Using IoT and GPRS.Qazi Mudassar Ilyas Muneer Ahmad
Wireless Communications and Mobile Computing Blockchain-Based Trust Management in Distributed Internet of Things.Fengyin Li Dongfeng Wang Yilei Wang Xiaomei Yu Nan Wu Jiguo Yu Huiyu Zhou
An Authentication Scheme Based on Novel Construction of Hash Chains for Smart Mobile Devices.Qinglong Huang Haiping Huang Wenming Wang Qi Li Yuhan Wu
SK-FMYOLOV3: A Novel Detection Method for Urine Test Strips.Rui Yang Yonglin Zhang Zhenrong Deng Wenming Huang Rushi Lan Xiaonan Luo
Service Recommendation with High Accuracy and Diversity.Shengqi Wu Huaizhen Kou Chao Lv Wanli Huang Lianyong Qi Hao Wang
An Intelligent Group Decision Evaluation Model with Interval-Valued Intuitionistic Fuzzy Entropy Technology for Microblog User Influence.Lihua Zeng Tonghua Yang Haiping Ren Neil N. Xiong
A Multiclass Detection System for Android Malicious Apps Based on Color Image Features.Hua Zhang Jiawei Qin Boan Zhang Hanbing Yan Jing Guo Fei Gao Senmiao Wang Yangye Hu
An Accurate Sparse Recovery Algorithm for Range-Angle Localization of Targets via Double-Pulse FDA-MIMO Radar.Qi Liu Xianpeng Wang Liangtian Wan Mengxing Huang Lu Sun
An Energy-Efficient Silicon Photonic-Assisted Deep Learning Accelerator for Big Data. A Novel Adaptive Directional Interpolation Algorithm for Digital Video Resolution Enhancement.Dong Sun Qingqing Xie Teng Li Yixiang Lu De Zhu Qingwei Gao
Detecting Overlapping Data in System Logs Based on Ensemble Learning Method.Chunbo Liu Yitong Ren Mengmeng Liang Zhaojun Gu Jialiang Wang Lanlan Pan Zhi Wang
Dimensionality Reduction for Internet of Things Using the Cuckoo Search Algorithm: Reduced Implications of Mesh Sensor Technologies.Azeema Yaseen Mohsin Nazir Aneeqa Sabah Shahzadi Tayyaba Zuhaib Ashfaq Khan Muhammad Waseem Ashraf Muhammad Ovais Ahmad
An Empirical Study on GAN-Based Traffic Congestion Attack Analysis: A Visualized Method.Yike Li Yingxiao Xiang Endong Tong Wenjia Niu Bowei Jia Long Li Jiqiang Liu Zhen Han
LSTM-Based Traffic Load Balancing and Resource Allocation for an Edge System.Thembelihle Dlamini Sifiso Vilakati
Measurement and Simulation for Vehicle-to-Infrastructure Communications at 3.5 GHz for 5G.Yi Zeng Haofan Yi Zijie Xia Shaoshi Wang Bo Ai Dan Fei Weidan Li Ke Guan
Data-Driven Predictive Control of Building Energy Consumption under the IoT Architecture.Ji Ke Yude Qin Biao Wang Shundong Yang Hao Wu Hang Yang Xing Zhao
Two-Round Password-Based Authenticated Key Exchange from Lattices.Anqi Yin Yuanbo Guo Yuanming Song Tongzhou Qu Chen Fang
Image Annotation via Reconstitution Graph Learning Model. Deep Reinforcement Learning-Based Collaborative Video Caching and Transcoding in Clustered and Intelligent Edge B5G Networks. Establishment of Music Emotion Model Based on Blockchain Network Environment. Indoor Visible Light Communication: A Tutorial and Survey.Galefang Allycan Mapunda Reuben Ramogomana Leatile Marata Bokamoso Basutli Amjad Saeed Khan Joseph Monamati Chuma
Analysis and Optimization of Asymmetric Wireless Power Transfer in Concrete.Zijian Tian Dairong Liu Wei Chen Wenqing Wang Shan Pan Ni Guo
A Novel DIBR 3D Image Hashing Scheme Based on Pixel Grouping and NMF.Chen Cui Xujun Wu Jun Yang Juyan Li
A Comparative Analysis of Different Outlier Detection Techniques in Cognitive Radio Networks with Malicious Users.Arshed Ahmed Muhammad Sajjad Khan Noor Gul Irfan Uddin Su Min Kim Junsu Kim
Modeling and Prediction of Stock Price with Convolutional Neural Network Based on Blockchain Interactive Information.Wei Zhang Ke-xin Tao Jun-feng Li Yanchun Zhu Jing Li
Fuzzy Obstacle Avoidance for the Mobile System of Service Robots.Shih-Pang Tseng Che-Wen Chen Ta-Wen Kuan Yao-Tsung Hsu Jhing-Fa Wang
Image Classification Model Based on Deep Learning in Internet of Things.Songshang Zou Wenshu Chen Hao Chen
Developing Deep Survival Model for Remaining Useful Life Estimation Based on Convolutional and Long Short-Term Memory Neural Networks.Chia-Hua Chu Chia-Jung Lee Hsiang-Yuan Yeh
Emerging Applications of Blockchain Technology on a Virtual Platform for English Teaching and Learning. Outage Probability Analysis of Decode-and-Forward Two-Way Relaying System with Energy Harvesting Relay.Hoang Van Toan Tran Manh Hoang Le The Dung
Network Performance Test and Analysis of LTE-V2X in Industrial Park Scenario.Yuanyuan Fan Liu Liu Shuoshuo Dong Lingfan Zhuang Jiahui Qiu Chao Cai Meng Song
DeepCF: A Deep Feature Learning-Based Car-Following Model Using Online Ride-Hailing Trajectory Data.Yizhen Xie Qichao Ni Osama Alfarraj Haoran Gao Guojiang Shen Xiangjie Kong Amr Tolba
Accelerated Depreciation Tax Credit and Corporate Financialization Based on the PSM-DID Model.Chunguang Ma Hongjun Bei Chuner Wang Guihua Chen
Distinguishing Hand Drawing Style Based on Multilevel Analytics Framework. An Algorithm Based on Influence to Predict Invisible Relationship.Junfeng Tian Lizheng Xue Hongyun Cai
Research on 3D International River Visualization Simulation Based on Human-Computer Interaction.Shuanhu Li Jun Yang Ziwen Zhang
Joint Radar-Communication Relying on Spread Spectrum: A Hybrid Chaotic Sequence Design.Hao Ma Jun Wang Xin Sun Tianwei Hou WenXin Jin
BMOP: Bidirectional Universal Adversarial Learning for Binary OpCode Features.Xiang Li Yuanping Nie Zhi Wang Xiaohui Kuang Kefan Qiu Cheng Qian Gang Zhao
Intrusion Detection Algorithm Based on Change Rates of Multiple Attributes for WSN.Hongying Bai Xiaotong Zhang Fangjie Liu
Modified Password Guessing Methods Based on TarGuess-I.Zhijie Xie Min Zhang Yuqi Guo Zhenhan Li Hongjun Wang
Study on Delay Optimization of Fog Computing Edge Nodes Based on the CPSO-LB Algorithm.J. Y. Wu R. Xin J. B. Zhao T. Zheng Dong Jiang P. F. Zhang
SIR Meta Distribution in the Heterogeneous and Hybrid Networks.Yuhong Sun Qinghai Liu Hua Wang
Application Research of File Fingerprint Identification Detection Based on a Network Security Protection System.Chunwei Wang Lina Yu Huixian Chang Sheng Shen Fang Hou Yingwei Li
Analysis of WOFDM over LTE 1.25 MHz Band.Sandeep Sarowa Naresh Kumar Ram Sewak Singh
Blind Photograph Watermarking with Robust Defocus-Based JND Model.Chun-Xing Wang Xiaoxiao Li Meiling Xu Jun Wang Wenbo Wan
A Random Walk-Based Energy-Aware Compressive Data Collection for Wireless Sensor Networks.Keming Dong Chao Chen Xiaohan Yu
Robust and Secure Data Fusion Algorithm Based on Intelligent Sensing in Wireless Sensor Networks.Yong Cheng Jun Wang Shuqiang Ji Ling Yang
Nonorthogonal Multiple Access for Next-Generation Mobile Networks: A Technical Aspect for Research Direction.Muhammad Hussain Haroon Rasheed
Bodacious-Instance Coverage Mechanism for Wireless Sensor Network.Shahzad Ashraf Omar Alfandi Arshad Ahmad Asad Masood Khattak Bashir Hayat Kyong Hoon Kim Ayaz Ullah
A Novel Pricing Mechanism for User Coalition in Blockchain. Analysis of Influencing Factors of Academic Entrepreneurship Based on Blockchain. Neural Model Stealing Attack to Smart Mobile Device on Intelligent Medical Platform.Liqiang Zhang Guanjun Lin Bixuan Gao Zhibao Qin Yonghang Tai Jun Zhang
Efficient Planning and Solving Algorithm of S -Shape Acceleration and Deceleration.Zhijie Li Ligang Cai Zhifeng Liu
Research on Financial Data Query and Distribution Scheme Based on SQL Database. A Big Data Mining and Blockchain-Enabled Security Approach for Agricultural Based on Internet of Things. Applying Robust Intelligent Algorithm and Internet of Things to Global Maximum Power Point Tracking of Solar Photovoltaic Systems. Digital Avatars: Promoting Independent Living for Older Adults.Manuel F. Bertoa Nathalie Moreno Alejandro Pérez-Vereda David Bandera José M. Álvarez-Palomo Carlos Canal
Sensor Ontology Metamatching with Heterogeneity Measures.Xingsi Xue Jiawei Lu Chengcai Jiang Yikun Huang
Detection Method of Three-Dimensional Echocardiography Based on Deep Learning.Qiao Wu Li Gao Wei Sun Jianzhong Yang
Research on English Online Education Platform Based on Genetic Algorithm and Blockchain Technology. Privacy-Protection Scheme Based on Sanitizable Signature for Smart Mobile Medical Scenarios.Zhiyan Xu Min Luo Neeraj Kumar Pandi Vijayakumar Li Li
Improved Conditional Differential Analysis on NLFSR-Based Block Cipher KATAN32 with MILP.Zhaohui Xing Wenying Zhang Guoyong Han
An Automated Real-Time Localization System in Highway and Tunnel Using UWB DL-TDoA Technology.Long Wen Jinkun Han Liangliang Song Qi Zhang Kai Li Zhi Li Weimin Zhang Beihai Zhang Xin You Yunsick Sung Sumi Ji Wei Song
Privacy-Preserving Graph Operations for Mobile Authentication.Peng Li Fucai Zhou Zifeng Xu Yuxi Li Jian Xu
Remote Identity Verification Using Gait Analysis and Face Recognition.Wen Si Jing Zhang Yu-Dong Li Wei Tan Yifan Shao Gelan Yang
An Anonymous and Efficient ECC-Based Authentication Scheme for SIP. Edge Computing-Based ERBS Time Synchronization Algorithm in WSNs.Xianbo Sun Yixin Su Yong Huang Jianjun Tan Jinqiao Yi Tao Hu Li Zhu
Behavior Anomaly Detection in SDN Control Plane: A Case Study of Topology Discovery Attacks.Li-Der Chou Chien-Chang Liu Meng-Sheng Lai Kai-Cheng Chiu Hsuan-Hao Tu Sen Su Chun-Lin Lai Chia-Kuan Yen Wei-Hsiang Tsai
Cognitive Routing in Software-Defined Maritime Networks. Using the Same PayWord Chains Associated with a Single Account from Multiple Mobile Devices. Designing Efficient Smart Home Management with IoT Smart Lighting: A Case Study.Tran Anh Khoa Le Mai Bao Nhu Hoang Hai Son Nguyen Minh Trong Cao Hoang Phuc Nguyen Thi Hoang Phuong Nguyen Van Dung Hoang Nam Nguyen Dong Si Thien Chau Duc Ngoc Minh Dang
Joint V2V-Assisted Clustering, Caching, and Multicast Beamforming in Vehicular Edge Networks.Kan Wang Ruijie Wang Junhuai Li Meng Li
Big Data Aspect-Based Opinion Mining Using the SLDA and HME-LDA Models.Ling Yuan JiaLi Bin YinZhen Wei Fei Huang XiaoFei Hu Min Tan
A Lightweight Nature Heterogeneous Generalized Signcryption (HGSC) Scheme for Named Data Networking-Enabled Internet of Things.Manazara Rehman Hizbullah Khattak Ahmed Saeed Alzahrani Insaf Ullah Muhammad Adnan Syed Sajid Ullah Noor Ul Amin Saddam Hussain Shah Jahan Khattak
Machine Learning-Based Resource Allocation Strategy for Network Slicing in Vehicular Networks.Yaping Cui Xinyun Huang Dapeng Wu Hao Zheng
A Secure and Verifiable Outsourcing Scheme for Assisting Mobile Device Training Machine Learning Model. Hardware Prototyping and Modelling of Prototype Filter for FBMC. Reversible Information Hiding Algorithm Based on Multikey Encryption.Zhaohui Li Yiqing Wang Zhi Wang Zheli Liu Jian Zhang Min Li
Research on Profit Maximization of New Retail E-Commerce Based on Blockchain Technology. Security Analysis on "Anonymous Authentication Scheme for Smart Home Environment with Provable Security".Meijia Xu Qiying Dong Mai Zhou Chenyu Wang Yangyang Liu
Intrusion Detection into Cloud-Fog-Based IoT Networks Using Game Theory.Poria Pirozmand Mohsen Angoraj Ghafary Safieh Siadat Jiankang Ren
Trust-Based Missing Link Prediction in Signed Social Networks with Privacy Preservation.Huaizhen Kou Fan Wang Chao Lv Zhaoan Dong Wanli Huang Hao Wang Yuwen Liu
Valid Probabilistic Anomaly Detection Models for System Logs.Chunbo Liu Lanlan Pan Zhaojun Gu Jialiang Wang Yitong Ren Zhi Wang
Beacon Transmission Rate Allocation Optimization under Synchronized P-Persistent Repetition MAC Protocol for Platooning.Lin Hu Yindong Xiao Zhijian Dai
A Smart Cache Content Update Policy Based on Deep Reinforcement Learning.Lincan Li Chiew Foong Kwong Qianyu Liu Jing Wang
LSEA: Software-Defined Networking-Based QoS-Aware Routing Mechanism for Live-Soccer Event Applications in Smart Cities. IMOC: Optimization Technique for Drone-Assisted VANET (DAV) Based on Moth Flame Optimization.Rehan Tariq Zeshan Iqbal Farhan Aadil
Research on Multinode Collaborative Computing Offloading Algorithm Based on Minimization of Energy Consumption.Dongsheng Han Yu Liu Junhong Ni
Channel Allocation Policy for Distributed Wireless Network: Derivation and Analysis of Optimal Interference.Amulya Bhattarai Prapun Suksompong Chalie Charoenlarpnopparut
A Hybrid Spectrum Combinational Auction Mechanism Based on a Weighted Bipartite Graph for Energy Internet in Smart Cities.Hui-Bin Feng Zhaocai Yu Jian Guan Geng Lin
Multiattribute Access Selection Algorithm Supporting Service Characteristics and User Preferences in Heterogeneous Wireless Networks.Xiaoxue Guo Mohd. Hasbullah Omar Khuzairi Mohd Zaini
AN-Aided Secure Beamforming in SWIPT-Aware Mobile Edge Computing Systems with Cognitive Radio.Zhe Wang Taoshen Li Jin Ye Xi Yang Ke Xiong
Fog-Based Distributed Networked Control for Connected Autonomous Vehicles.Zhuwei Wang Yuehui Guo Yu Gao Chao Fang Meng Li Yang Sun
Structure Optimization of e-Commerce Platform Based on Artificial Intelligence and Blockchain Technology. A Packet Scheduling Method Based on Dynamic Adjustment of Service Priority for Electric Power Wireless Communication Network.Bo Hu Xin Liu Jinghong Zhao Siya Xu Zhenjiang Lei Kun Xiao Dong Liu Zhao Li
Joint Task Offloading and Resource Allocation Strategy for DiffServ in Vehicular Cloud System.Ya Kang Zhanjun Liu Qianbin Chen Yingdi Dai
Leveraging Social Relationship-Based Graph Attention Model for Group Event Recommendation. Research on Construction of a Cloud Platform for Tourism Information Intelligent Service Based on Blockchain Technology.Cao Wei Qinan Wang Chengying Liu
High-Dimensional Text Clustering by Dimensionality Reduction and Improved Density Peak. Multiobjective Optimization Algorithms for Wireless Sensor Networks.Dionisis Kandris Alex Alexandridis Tasos Dagiuklas Emmanouil Panaousis Dimitrios D. Vergados
Low-Cost Authentication Protocol for D2D Communication in m-Health with Trust Evaluation.Ana Paula Golembiouski Lopes Paulo R. L. Gondim
Demystifying COVID-19 Digital Contact Tracing: A Survey on Frameworks and Mobile Apps.Tania Martin Georgios Karopoulos José Luis Hernández Ramos Georgios Kambourakis Igor Nai Fovino
SLR-SELinux: Enhancing the Security Footstone of SEAndroid with Security Label Randomization.Yan Ding Pan Dong Zhipeng Li Yusong Tan Chenlin Huang Lifeng Wei Yudan Zuo
(Withdrawn)System Design for Opportunistic Spectrum Access Using Statistical Decision-Making and Coded-MAC.
Enrique Rodríguez-Colina Ricardo Marcelín-Jiménez Leonardo Palacios-Luengas Michael Pascoe-Chalke
Integrating Mobile Ad Hoc Networks with the Internet Based on OLSR. Automatic Image Captioning Based on ResNet50 and LSTM with Soft Attention.Yan Chu Xiao Yue Lei Yu Mikhailov Sergei Zhengkui Wang
Cloud-Based Experimental Platform for the Space-Ground Integrated Network.Xiaofeng Wang Xinyu Chen Haiyang Ye Yuan Liu Guizhu Zhang
RO-RAW: Run-Time Restricted Access Window Optimization in IEEE 802.11ah Network with Extended Kalman Filter. Iterative Sensor Clustering and Mobile Sink Trajectory Optimization for Wireless Sensor Network with Nonuniform Density.Joohan Park Soohyeong Kim Jiseung Youn Seyoung Ahn Sunghyun Cho
Design of Improved BP Decoders and Corresponding LT Code Degree Distribution for AWGN Channels. PP-VCA: A Privacy-Preserving and Verifiable Combinatorial Auction Mechanism. Privacy-Preserving Vehicle Assignment in the Parking Space Sharing System.Tingting Fu Peng Liu Kun Liu Peng Li
IoT-Based Healthcare Support System for Alzheimer's Patients.Rozita Jamili Oskouei Zahra Mousavilou Zohreh Bakhtiari Khuda Bux Jalbani
A Privacy-Preserving Personalized Service Framework through Bayesian Game in Social IoT.Renwan Bi Qianxin Chen Lei Chen Jinbo Xiong Dapeng Wu
URDNet: A Unified Regression Network for GGO Detection in Lung CT Images.Weihua Liu Yuchen Ren Huiyu Li
A Deep Fusion Gaussian Mixture Model for Multiview Land Data Clustering.Peng Li Zhikui Chen Jing Gao Jianing Zhang Shan Jin Wenhan Zhao Feng Xia Lu Wang
A Novel Ray-Casting Algorithm Using Dynamic Adaptive Sampling.Huadeng Wang Guang Xu Xipeng Pan Zhenbing Liu Rushi Lan Xiaonan Luo
A Multidimensional Internet of Things Testbed System: Development and Evaluation. Social-Aware Task Allocation in Mobile Crowd Sensing.Weiping Zhu Wenzhong Guo Zhiyong Yu
Research on Composition of Social Credibility Index Based on Artificial Intelligence Model. Terrain Classification Algorithm for Lunar Rover Using a Deep Ensemble Network with High-Resolution Features and Interdependencies between Channels.Lanfeng Zhou Ziwei Liu Wenfeng Wang
A Novel Attack-and-Defense Signaling Game for Optimal Deceptive Defense Strategy Choice.Yongjin Hu Han Zhang Yuanbo Guo Tao Li Jun Ma
Demand Response Management Research Based on Cognitive Radio for Smart Grid.Tingting Yang Tiancong Huang Haifeng Zhang Peiyi Li Canyun Xiong Yucheng Wu
A Real-Time Garbage Truck Supervision and Data Statistics Method Based on Object Detection.Xuanyu Zhang Yining Gao Guangyi Xiao Bo Feng Wenshu Chen
A Security Situation Assessment Model of Information System for Smart Mobile Devices.Lixia Xie Liping Yan Xugao Zhang Hongyu Yang
Hierarchical Q-Learning Based UAV Secure Communication against Multiple UAV Adaptive Eavesdroppers.Jue Liu Nan Sha Weiwei Yang Jia Tu Lianxin Yang
Image Dehazing Method of Transmission Line for Unmanned Aerial Vehicle Inspection Based on Densely Connection Pyramid Network.Jun Liu Rong Jia Wei Li Fuqi Ma Xiaoyang Wang
Outage Probability and Normalized SINR-Based Power Allocation over Rician Fading Channels. SoftSystem: Smart Edge Computing Device Selection Method for IoT Based on Soft Set Technique.Muhammad Shafiq Zhihong Tian Ali Kashif Bashir Korhan Cengiz Adnan Tahir
Throughput Maximization for Multiple D2D Group Communications Underlaying Cellular Networks.Jiai He Lu Jia Lei Xu Wei Chen
Air Pollution Concentration Forecast Method Based on the Deep Ensemble Neural Network.Canyang Guo Genggeng Liu Chi-Hua Chen
A Host-Based Anomaly Detection Framework Using XGBoost and LSTM for IoT Devices. Aero Engine Gas-Path Fault Diagnose Based on Multimodal Deep Neural Networks.Liang Zhao Chunyang Mo Tingting Sun Wei Huang
Architecture and Protocol to Optimize Videoconference in Wireless Networks.José Miguel Jiménez José Luis García-Navas Jaime Lloret Óscar Romero
A Node Location Method in Wireless Sensor Networks Based on a Hybrid Optimization Algorithm.Jeng-Shyang Pan Fang Fan Shu-Chuan Chu Zhi-Gang Du Huiqi Zhao
New Application Task Offloading Algorithms for Edge, Fog, and Cloud Computing Paradigms. Evaluation of Localization by Extended Kalman Filter, Unscented Kalman Filter, and Particle Filter-Based Techniques.Inam Ullah Xin Su Jinxiu Zhu Xuewu Zhang Dongmin Choi Zhenguo Hou
A Blockchain-Based Public Auditing Scheme for Cloud Storage Environment without Trusted Auditors.Song Li Jian Liu Guannan Yang Jinguang Han
Algorithm for Target Detection in Smart City Combined with Depth Learning and Feature Extraction.Feng Wang Zhiming Xu Zemin Qiu Weichuan Ni Jiaqi Li YiLan Luo
Improved Personalized Recommendation Algorithm Based on Context-Aware in Mobile Computing Environment. Fault-Tolerant Privacy-Preserving Data Aggregation for Smart Grid.Huadong Liu Tianlong Gu Yining Liu Jingcheng Song Zhixin Zeng
Transmission Rate Sampling and Selection for Reliable Wireless Multicast.Thomas Geithner Fikret Sivrikaya
A Multidepth Load-Balance Scheme for Clusters of Congested Cells in Ultradense Cellular Networks.Wei Kuang Lai Ya-Ju Yu Pei-Lun Tsai Meng-Han Shen
Security Enhancement for Energy Harvesting Cognitive Networks with Relay Selection. On Performance of Full-Duplex Decode-and-Forward Relay Systems with an Optimal Power Setting under the Impact of Hardware Impairments.Ba Cao Nguyen Xuan Nam Tran Thi Thu Hang Nguyen Dinh Tan Tran Donatella Darsena
Research and Analysis of Sports Training Real-Time Monitoring System Based on Mobile Artificial Intelligence Terminal.Biao Ma Shangqi Nie Minghui Ji Jeho Song Wei Wang
From Hardware to Operating System: A Static Measurement Method of Android System Based on TrustZone.Xinhong Hei Wen Gao Yichuan Wang Lei Zhu Wenjiang Ji
A Medical Data Privacy Protection Scheme Based on Blockchain and Cloud Computing. TLFW: A Three-Layer Framework in Wireless Rechargeable Sensor Network with a Mobile Base Station.Anwen Wang Xianjia Meng Lvju Wang Xiang Ji Hao Chen Baoying Liu Feng Chen Yajuan Du Guangcheng Yin
Practical BER-Based Estimation of Residual OFDM CFO by Reducing Noise Margin.Ante Mihaljevic Adriana Lipovac Vlatko Lipovac Jasmin Musovic
The Influence of Demographic Characteristics on Employee Promotion: Research Based on Data Mining and Game Theory.Chang Zhang Tingjie Lv Chunhui Yuan Yuanyuan Ren Shuo Wang
Provably Secure Crossdomain Multifactor Authentication Protocol for Wearable Health Monitoring Systems.Hui Zhang Yuanyuan Qian Qi Jiang
Energy-Efficient Asynchronous QoS MAC Protocol for Wireless Sensor Networks.Sohail Sarang Goran M. Stojanovic Stevan Stankovski Zeljen Trpovski Micheal Drieberg
BEHT: Blockchain-Based Efficient Highway Toll Paradigm for Opportunistic Autonomous Vehicle Platoon.Zuobin Ying Longyang Yi Maode Ma
Multimodal Fusion Method Based on Self-Attention Mechanism.Hu Zhu Ze Wang Yu Shi Yingying Hua Guoxia Xu Lizhen Deng
A Novel Search Ranking Method for MOOCs Using Unstructured Course Information.Weiqiang Yao Haiquan Sun Xiaoxuan Hu
Research on Semiactive Control of Civil Engineering Structure Based on Neural Network.Longji Jian Feifei Song Yuansong Huang
Secrecy Wireless-Powered Sensor Networks for Internet of Things.Junxia Li Hui Zhao Xueyan Chen Zheng Chu Li Zhen Jing Jiang Haris Pervaiz
Distributed Congestion Control via Outage Probability Model for Delay-Constrained Flying Ad Hoc Networks.Shaojie Wen Lianbing Deng Shuo Shi Xiying Fan Hao Li
Smart River Monitoring Using Wireless Sensor Networks.Kofi Sarpong Adu-Manu Ferdinand Apietu Katsriku Jamal-Deen Abdulai Felicia Engmann
A Lightweight Attribute-Based Security Scheme for Fog-Enabled Cyber Physical Systems.Aisha Kanwal Junejo Nikos Komninos
A Lossless Compression Approach Based on Delta Encoding and T-RLE in WSNs.Abdeldjalil Saidani Jianwen Xiang Deloula Mansouri
Research on Sewage Monitoring and Water Quality Prediction Based on Wireless Sensors and Support Vector Machines.Cong Liu Hongji Li Qinkun Zhang
Analysis on the Construction of Personalized Physical Education Teaching System Based on a Cloud Computing Platform. The Construction of Builder Safety Supervision System Based on CPS.Wei Jin Yu Liu Yanfeng Jin Mengxiao Jia Lifeng Xue
Energy Efficiency Augmentation in Massive MIMO Systems through Linear Precoding Schemes and Power Consumption Modeling.Rao Muhammad Asif Jehangir Arshad Meo Mustafa Shakir Sohail M. Noman Ateeq Ur Rehman
Enhanced Biometric Recognition for Secure Authentication Using Iris Preprocessing and Hyperelliptic Curve Cryptography.Vani Rajasekar J. Premalatha K. Sathya
Flower End-to-End Detection Based on YOLOv4 Using a Mobile Device. An Embedded-Based Weighted Feature Selection Algorithm for Classifying Web Document.G. Siva Shankar Ashokkumar Palanivinayagam R. Vinayakumar Uttam Ghosh Wathiq Mansoor Waleed S. Alnumay
A New Private Information Encryption Method in Internet of Things under Cloud Computing Environment. An Efficient Radio Access Resource Management Scheme Based on Priority Strategy in Dense mmWave Cellular Networks. Rank-Based Report Filtering Scheme (RRFS) for Verifying Phoney Reports in Wireless Sensor Networks.Gayathri Santhosh Yogesh Palanichamy
Link Quality Improvement of Long-Term Evolution and 802.11ax in High-Density Areas. Automated Real-Time Intelligent Traffic Control System for Smart Cities Using Wireless Sensor Networks.Adil Hilmani Abderrahim Maizate Larbi Hassouni
Annular Spatial Pyramid Mapping and Feature Fusion-Based Image Coding Representation and Classification.Mengxi Xu Yingshu Lu Xiaobin Wu
An Efficient Anonymous Authentication Scheme for Mobile Pay-TV Systems.Yuting Li Qingfeng Cheng Jinzheng Cao
Trust-Based Attack and Defense in Wireless Sensor Networks: A Survey.Weidong Fang Wuxiong Zhang Wei Chen Tao Pan Yepeng Ni Yinxuan Yang
Efficient Task Offloading for 802.11p-Based Cloud-Aware Mobile Fog Computing System in Vehicular Networks.Qiong Wu Hongmei Ge Qiang Fan Wei Yin Bo Chang Guilu Wu
Research on the Evaluation Model of Rural Information Demand Based on Big Data.Yanfeng Jin Gang Li Jianmin Wu
Censoring-Based Relay Transmission for Achieving Energy Efficiency in Cognitive Radio Networks.Li Feng Jirong Sun Hua Sun Shengju Tang
Study on the Intelligent Selection Model of Fuzzy Semantic Optimal Solution in the Process of Translation Using English Corpus. Blockchain-Based Internet of Vehicles Privacy Protection System.Tianhong Su Sujie Shao Shaoyong Guo Min Lei
Achieving Privacy-Preserving Group Recommendation with Local Differential Privacy and Random Transmission.Hanyi Wang Kun He Ben Niu Lihua Yin Fenghua Li
Agent-Based Multipath Management for Supporting Sink Mobility in Wireless Sensor Networks.Cheonyong Kim Hyunchong Cho Kwansoo Jung Yongbin Yim Taehun Yang Sang-Ha Kim Sangdae Kim
Interference Minimization Resource Allocation for V2X Communication Underlaying 5G Cellular Networks.Xiaoqin Song Kuiyu Wang Lei Lei Liping Zhao Yong Li Jiankang Wang
Privacy-Enhancing Preferential LBS Query for Mobile Social Network Users.Madhuri Siddula Yingshu Li Xiuzhen Cheng Zhi Tian Zhipeng Cai
Urban Traffic Flow Prediction Model with CPSO/SSVM Algorithm under the Edge Computing Framework.Fengkai Liu Xingmin Ma Xingshuo An Guangnan Liang
Quasiconformal Mapping Kernel Machine Learning-Based Intelligent Hyperspectral Data Classification for Internet Information Retrieval. Robust Image Hashing with Low-Rank Representation and Ring Partition.Zhenjun Tang Zixuan Yu Zhixin Li Chunqiang Yu Xianquan Zhang
Authenticator Rebinding Attack of the UAF Protocol on Mobile Devices.Hui Li Xuesong Pan Xinluo Wang Haonan Feng Chengjie Shi
Secure and Intelligent Energy Data Management Scheme for Smart IoT Devices.Tianqi Zhou Jian Shen Sai Ji Yongjun Ren Leiming Yan
Corrigendum to "On Providing Differentiated Service Exploiting Multi-Instance RPL for Industrial Low-Power and Lossy Networks".Muhammad Mostafa Monowar Mohammed Basheri
The Lyapunov Optimization for Two-Tier Hierarchical-Based MAC in Cloud Robotics.Yansu Hu Ang Gao Changqing Wang Wen Cao Maode Yan
Automated Fraudulent Phone Call Recognition through Deep Learning.Jian Xing Miao Yu Shupeng Wang Yaru Zhang Yu Ding
Real-Time Performance Evaluation of IEEE 802.11p EDCA Mechanism for IoV in a Highway Environment.Hong Li Qiong Wu Jing Fan Qiang Fan Bo Chang Guilu Wu
A New Steganography Method for Dynamic GIF Images Based on Palette Sort.Jingzhi Lin Zhenxing Qian Zichi Wang Xinpeng Zhang Guorui Feng
An Invocation Chain Test and Evaluation Method for Fog Computing.Yue Zhao Yarang Yang Bo Tian Tianyi Zhang
Prediction of Repeat Customers on E-Commerce Platform Based on Blockchain. A New Computing Paradigm for Off-Grid Direction of Arrival Estimation Using Compressive Sensing.Hamid Ali Mirza Laeeq Aslam Muhammad Asif Zahoor Raja Naveed Ishtiaq Chaudhary Ijaz Mansoor Qureshi Aqdas Naveed Malik
Management of Load-Balancing Data Stream in Interposer-Based Network-on-Chip Using Specific Virtual Channels.Mona Soleymani Midia Reshadi Ahmad Khademzadeh
Avoiding Spurious Retransmission over Flooding-Based Routing Protocol for Underwater Sensor Networks.Sungwon Lee Yeongjoon Bae Muhammad Toaha Raza Khan Junho Seo Dongkyun Kim
SIC-Coding Schemes for Underlay Two-Way Relaying Cognitive Networks.Pham Ngoc Son Tran Trung Duy Khuong Ho-Van
Dynamic Priority-Based Service Resource Allocation for Context-Aware Conflict Resolution in Wisdom Network with Fog Computing.Lin Duo Qianqian Li Haitao Xu Yunhui Zhou
A Secure Data Dissemination in a DHT-Based Routing Paradigm for Wireless Ad Hoc Network.Rukhsana Kousar Majed Alhaisoni Shahbaz Akhtar Abid Nadir Shah Aamir Qamar Ahmad Karim
A Visual Tracking Method Based on an Adaptive Overlapping Correlation Filter for Robotic Real-Time Cognitive Imaging.Yihua Lan Pianpian Ma Anfeng Xu Jinjiang Liu
A Simple and Energy-Efficient Flooding Scheme for Wireless Routing.Satoshi Yamazaki Yu Abiko Hideki Mizuno
Truthful Mechanism Design for Multiregion Mobile Crowdsensing.Yu Qiao Jun Wu Hao Cheng Zilan Huang Qiangqiang He Chongjun Wang
Success Probability Analysis of C-V2X Communications on Irregular Manhattan Grids. A Homomorphic Encryption and Privacy Protection Method Based on Blockchain and Edge Computing.Xiaoyan Yan Qilin Wu Youming Sun
Presenting an Effective Method to Detect and Track the Broken Path in VANET Using UAVs.Zohreh Bakhtiari Rozita Jamili Oskouei Mona Soleymani Akhtar Hussain Jalbani
An Edge IDS Based on Biological Immune Principles for Dynamic Threat Detection. Smart Switching Strategy-Based Supervision Rule to Mitigate the Problem of Pilot Contamination in Massive MIMO Systems.Abdelfettah Belhabib Mohamed Boulouird Moha M'rabet Hassani
Hierarchical Combinatorial Auction in Computing Resource Allocation for Mobile Blockchain. Deep Reinforcement Learning-Based Content Placement and Trajectory Design in Urban Cache-Enabled UAV Networks.Chenyu Wu Shuo Shi Shushi Gu Lingyan Zhang Xuemai Gu
Air Gesture Recognition Using WLAN Physical Layer Information.Xiaochao Dang Yang Liu Zhanjun Hao Xuhao Tang Chenguang Shao
Learn-ing-Based On-AP TCP Performance Enhancement. Impact of Hardware Impairments with Imperfect Channel Estimation for Cache-Enabled UAV Relaying Networks.Dan Deng Yanyi Rao Fusheng Zhu
A Multichannel Biomedical Named Entity Recognition Model Based on Multitask Learning and Contextualized Word Representations.Hao Wei Mingyuan Gao Ai Zhou Fei Chen Wen Qu Yijia Zhang Mingyu Lu
A Blockchain Token-Based Trading Model for Secondary Spectrum Markets in Future Generation Mobile Networks.Mubbashar Altaf Khan Mohsin M. Jamali Taras Maksymyuk Juraj Gazda
A Data Encryption and Fast Transmission Algorithm Based on Surveillance Video. LoRa-Based Smart IoT Application for Smart City: An Example of Human Posture Detection.Jinkun Han Wei Song Amanda Gozho Yunsick Sung Sumi Ji Liangliang Song Long Wen Qi Zhang
A Hybrid Link-TDMA MAC Protocol for Conventional and Radio over Fiber WLANs.Anastasios Valkanis Petros Nicopolitidis Georgios Papadimitriou
A Multiscale-Based Adjustable Convolutional Neural Network for Multiple Organ Segmentation.Zhiqiang Tian Jingyi Song Chenyang Zhang Xiaohui Tian Zhong Shi Xiaofu Yu
Reducing the Energy Budget in WSN Using Time Series Models.Felicia Engmann Ferdinand Apietu Katsriku Jamal-Deen Abdulai Kofi Sarpong Adu-Manu
Novel Defense Schemes for Artificial Intelligence Deployed in Edge Computing Environment.Chengcheng Zhou Qian Liu Ruolei Zeng
Anomaly Detection for Industrial Control System Based on Autoencoder Neural Network.Chao Wang Bailing Wang Hongri Liu Haikuo Qu
A Novel Blockchain Identity Authentication Scheme Implemented in Fog Computing. New Signal Constellation Pairs for the ZTM-OFDM-IM System. A 5G Beam Selection Machine Learning Algorithm for Unmanned Aerial Vehicle Applications.Hao Meng Wasswa Shafik S. Mojtaba Matinkhah Zubair Ahmad
Physarum-Inspired Autonomous Optimized Routing Protocol for Coal Mine MANET.Haifeng Jiang Xiaoxiao Liu Shuo Xiao Chaogang Tang Wei Chen
Technological Features of Internet of Things in Medicine: A Systematic Mapping Study.Ali Behmanesh Nasrin Sayfouri Farahnaz Sadoughi
Efficient and Privacy-Preserving Outsourcing of 2D-DCT and 2D-IDCT.Dezhi An Shengcai Zhang Jun Lu Yan Li
Semantic Integration of Sensor Knowledge on Artificial Internet of Things.Yikun Huang Xingsi Xue Chao Jiang
Capacity of Cooperative Spatial Modulation (CSM) System with Optimum Relay Selection.Jamal A. Hassan Samah A. Mustafa
An Intelligent Planning-Based Modeling Method for Diagnosis and Repair.Chuang Li Dantong Ouyang Xiaoyu Wang Wei Wei
An Intelligent Adaptive Algorithm for Servers Balancing and Tasks Scheduling over Mobile Fog Computing Networks.Xuejing Li Yajuan Qin Huachun Zhou Du Chen Shujie Yang Zhewei Zhang
An SETM Algorithm for Combating SSDF Attack in Cognitive Radio Networks.S. Tephillah J. Martin Leo Manickam
CARTA: Coding-Aware Routing via Tree-Based Address. Location Privacy-Preserving Method Based on Historical Proximity Location.Xueying Guo Wenming Wang Haiping Huang Qi Li Reza Malekian
Support Vector Machine-Based Classification of Malicious Users in Cognitive Radio Networks.Muhammad Sajjad Khan Liaqat Khan Noor Gul Muhammad Amir Junsu Kim Su Min Kim
Multistep-Ahead Prediction of Urban Traffic Flow Using GaTS Model. A Mutual Selection Mechanism of Ride-Hailing Based on Hidden Points.Yi Jiang Yu Xia Xinyue Cheng Yuntao Xu
The Hybrid Solar-RF Energy for Base Transceiver Stations.Cuong V. Nguyen Minh Tuan Nguyen Toan V. Quyen Anh M. Le Linh H. Truong
An Efficient Searchable Public-Key Authenticated Encryption for Cloud-Assisted Medical Internet of Things.Tianyu Chi Baodong Qin Dong Zheng
Performance Analysis of IQI Impaired Cooperative NOMA for 5G-Enabled Internet of Things.Hui Guo Xuejiao Guo Chao Deng Shangqing Zhao
Hierarchical Protocol Based on Recursive Clusters for Smart Parking Applications Using Internet of Things (IOT).Adil Hilmani Abderrahim Maizate Larbi Hassouni
Superresolution Reconstruction of Video Based on Efficient Subpixel Convolutional Neural Network for Urban Computing.Jie Shen Mengxi Xu Xinyu Du Yunbo Xiong
A Novel Non-DC Biased Intensity Modulated Indoor MIMO-VLC System Using Walsh Precoder.P. Muneer V. P. Thafasal Ijyas Mohamed Abbas Hassen Loukil Ali Algahtani Amir Kessentini Abdul Wase Mohammed
Leveraging Deep Learning Techniques for Malaria Parasite Detection Using Mobile Application.Mehedi Masud Hesham Alhumyani Sultan S. Alshamrani Omar Cheikhrouhou Saleh Ibrahim Ghulam Muhammad M. Shamim Hossain Mohammad Shorfuzzaman
Joint Adaptive Blind Channel Estimation and Data Detection for MIMO-OFDM Systems.Ruo-Nan Yang Wei-Tao Zhang Shun-Tian Lou
Research on Privacy Security Risk Assessment Method of Mobile Commerce Based on Information Entropy and Markov.Tao Zhang Kun Zhao Ming Yang Tilei Gao Wanyu Xie
An Encoder-Decoder Network Based FCN Architecture for Semantic Segmentation.Yongfeng Xing Luo Zhong Xian Zhong
OEDDBOS: An Efficient Data Distributing Strategy with Energy Saving in Sensor-Cloud Systems.Qifei Zhao Gaocai Wang Ying Peng Yuting Lu
A Multilevel Mobile Fog Computing Offloading Model Based on UAV-Assisted and Heterogeneous Network.Zhixiong Chen Nan Xiao Dongsheng Han
An Efficient Algorithm for Extracting High-Utility Hierarchical Sequential Patterns.Chunkai Zhang Zilin Du Yiwen Zu
The Construction of a Virtual Backbone with a Bounded Diameter in a Wireless Network.Jiarong Liang Meng Yi Yanyan Li Xinyu Liang
Chinese Named Entity Recognition Based on Character-Word Vector Fusion.Na Ye Xin Qin Lili Dong Xiang Zhang Kangkang Sun
An Access Selection Algorithm for Heterogeneous Wireless Networks Based on Optimal Resource Allocation.Gen Liang Guoxi Sun Jingcheng Fang Xiaoxue Guo Hewei Yu
Light Deep Model for Pulmonary Nodule Detection from CT Scan Images for Mobile Devices.Mehedi Masud Ghulam Muhammad M. Shamim Hossain Hesham Alhumyani Sultan S. Alshamrani Omar Cheikhrouhou Saleh Ibrahim
Deep Reinforcement Learning for Performance-Aware Adaptive Resource Allocation in Mobile Edge Computing.Binbin Huang Zhongjin Li Yunqiu Xu Linxuan Pan Shangguang Wang Haiyang Hu Victor Chang
Adaptive Double-Threshold Cooperative Spectrum Sensing Algorithm Based on History Energy Detection.Shanshan Yu Ju Liu Jing Wang Inam Ullah
BSS: A Burst Error-Correction Scheme of Multipath Transmission for Mobile Fog Computing.Wentao Zhao Ping Dong Min Guo Yuyang Zhang Xuehong Chen
Collaborative Wireless Power Transfer in Wireless Rechargeable Sensor Networks.Azka Amin Xi-Hua Liu Muhammad Asim Saleem Shagufta Henna Taseer-ul Islam Imran Khan Peerapong Uthansakul Muhammad Zeshan Qurashi Seyed Sajad Mirjavadi Masoud Forsat
A Heterogeneous Image Fusion Method Based on DCT and Anisotropic Diffusion for UAVs in Future 5G IoT Scenarios.Shuai Hao Beiyi An Hu Wen Xu Ma Keping Yu
Energy Efficiency for Data Offloading in D2D Cooperative Caching Networks.Weiguang Wang Hui Li Wenjie Zhang Shanlin Wei
Artificial-Noise-Aided Energy-Efficient Secure Multibeam Wireless Communication Schemes Based on Frequency Diverse Array.Jianbang Gao Zhaohui Yuan Jing Zhou Bin Qiu
Stock Forecasting Model FS-LSTM Based on the 5G Internet of Things.Hui Li Jinjin Hua Jinqiu Li Geng Li
A Semi-Fragile Video Watermarking Algorithm Based on H.264/AVC.Chen Li Yi Yang Kai Liu Lihua Tian
Smart City Moving Target Tracking Algorithm Based on Quantum Genetic and Particle Filter.Zhigang Liu Jin Shang Xufen Hua
An Intelligent SDN Framework Based on QoE Predictions for Load Balancing in C-RAN.Gleison O. Medeiros João C. W. A. Costa Diego Lisboa Cardoso Adam Dreyton Ferreira dos Santos
A Hybrid Mobile Node Localization Algorithm Based on Adaptive MCB-PSO Approach in Wireless Sensor Networks.Hua Wu Ju Liu Zheng Dong Yang Liu
User-Edge Collaborative Resource Allocation and Offloading Strategy in Edge Computing.Zhenquan Qin Xueyan Qiu Jin Ye Lei Wang
Association Game for Conflict Resolution between UEs and Small Cells. Simultaneous Localization and Mapping Based on Kalman Filter and Extended Kalman Filter.Inam Ullah Xin Su Xuewu Zhang Dongmin Choi
Capsules TCN Network for Urban Computing and Intelligence in Urban Traffic Prediction.Dazhou Li Chuan Lin Wei Gao Zeying Chen Zeshen Wang Guangqi Liu
Channel Estimation Performance Analysis of FBMC/OQAM Systems with Bayesian Approach for 5G-Enabled IoT Applications.Han Wang Wencai Du Xianpeng Wang Guicai Yu Lingwei Xu
Understanding the Impact of the PC5 Resource Grid Design on the Capacity and Efficiency of LTE-V2X in Vehicular Networks.Leandro Miguel Lopez Charmae Franchesca Mendoza Jordi Casademont Daniel Camps-Mur
Analysis of Outage Probability and Throughput for Energy Harvesting Full-Duplex Decode-and-Forward Vehicle-to-Vehicle Relay System.Ba Cao Nguyen Nguyen Nhu Thang Tran Manh Hoang Le The Dung
Performance Evaluation of Proximity Services and Wi-Fi for Public Safety Mission Critical Voice Application.Wesley Garey Yishen Sun Richard A. Rouil
Reliability Evaluation of Generalized Exchanged X-Cubes Based on the Condition of g-Good-Neighbor.Xiaoyan Li Hongbin Zhuang Shuming Zhou Hongju Cheng Cheng-Kuan Lin Wenzhong Guo
Arabic Sign Language Recognition and Generating Arabic Speech Using Convolutional Neural Network. A Coupled Grid-Particle Method for Fluid Animation on GPU.Fengquan Zhang Qiuming Wei Zhaohui Wu
Dynamic Contract Incentives Mechanism for Traffic Offloading in Multi-UAV Networks.Nan Zhao Pengfei Fan Yiqiang Cheng
An Efficient Design of Systematic Rateless Codes.Jingke Dai Fenggan Zhang Wenke Yang Kai Kang
Adaptive Joint Lossy Source-Channel Coding for Multihop IoT Networks.Imad Ez-Zazi Mounir Arioua Ahmed El Oualkadi
Research on Phase Combination and Signal Timing Based on Improved K-Medoids Algorithm for Intersection Signal Control.Guojiang Shen Xiangyu Zhu Wei Xu Longfeng Tang Xiangjie Kong
Dynamic Interference Optimization in Cognitive Radio Networks for Rural and Suburban Areas.Rodney Martinez Alonso David Plets Margot Deruyck Luc Martens Glauco Guillen Nieto Wout Joseph
Saliency Detection via the Improved Hierarchical Principal Component Analysis Method.Yuantao Chen Jiajun Tao Qian Zhang Kai Yang Xi Chen Jie Xiong Runlong Xia Jingbo Xie
Competition of Duopoly MVNOs for IoT Applications through Wireless Network Virtualization.Wanli Zhang Xianwei Li Liang Zhao Xiaoying Yang
A New Kinect-Based Posture Recognition Method in Physical Sports Training Based on Urban Data. A Deep Multiscale Fusion Method via Low-Rank Sparse Decomposition for Object Saliency Detection Based on Urban Data in Optical Remote Sensing Images. Research on Intelligent Guidance Optimal Path of Shared Car Charging in the IOT Environment.Yuefang Sun Kangkang Jin Zhaozhuang Guo Chen Zhang Hao Wang
Nonorthogonal Multiple Access for Visible Light Communication IoT Networks.Chun Du Shuai Ma Yang He Songtao Lu Hang Li Han Zhang Shiyin Li
An Improved Anonymous Authentication Protocol for Wearable Health Monitoring Systems.Jiaqing Mo Wei Shen Weisheng Pan
A Novel Scheme of Product Polar Codes with High Efficiency and Rate Compatibility. Performance Analysis of Display Field Communication with Advanced Receivers.Pankaj Singh Byung Wook Kim Sung-Yoon Jung
Optimized Scheme to Secure IoT Systems Based on Sharing Secret in Multipath Protocol.Fatna El Mahdi Ahmed Habbani Zaid Kartit Bachir Bouamoud
Energy-Efficient Mobile Edge Computing: Three-Tier Computing under Heterogeneous Networks.Yongsheng Pei Zhangyou Peng Zhenling Wang Haojia Wang
Decentralized and Dynamic Band Selection in Uplink Enhanced Licensed-Assisted Access: Deep Reinforcement Learning Approach.Fitsum Debebe Tilahun Chung Gu Kang
The Lightweight RFID Grouping-Proof Protocols with Identity Authentication and Forward Security.Zhicai Shi Xiaomei Zhang Jin Liu
Performance Analysis of Cooperative NOMA Systems with Incremental Relaying.Zhenling Wang Zhangyou Peng Yongsheng Pei Haojia Wang
USPF: Underwater Shrewd Packet Flooding Mechanism through Surrogate Holding Time.Shahzad Ashraf Mingsheng Gao Zheng Mingchen Tauqeer Ahmed Asif Raza Hamad Naeem
Multiaccess Edge Computing-Based Simulation as a Service for 5G Mobile Applications: A Case Study of Tollgate Selection for Autonomous Vehicles.Junhee Lee Sungjoo Kang Jaeho Jeon Ingeol Chun
Secure Lightweight IoT Integrated RFID Mobile Healthcare System.Vankamamidi Srinivasa Naresh Reddi Sivaranjani Nistala V. E. S. Murthy
Energy Efficient Design Techniques in Next-Generation Wireless Communication Networks: Emerging Trends and Future Directions.Joshua Onyeka Ogbebor Agbotiname Lucky Imoize Aderemi Aaron-Anthony Atayero
A Novel Method for Recognizing Vietnamese Voice Commands on Smartphones with Support Vector Machine and Convolutional Neural Networks. Calculating Trust Using Multiple Heterogeneous Social Networks.Muhammad Imran Hasan Ali Khattak David E. Millard Thanassis Tiropanis Tariq Bashir Ghufran Ahmed
NCaAC: Network Coding-Aware Admission Control for Prioritized Data Dissemination in Vehicular Ad Hoc Networks.Shujuan Wang Qian Zhang Shuguang Lu
Waste Management System Using IoT-Based Machine Learning in University.Tran Anh Khoa Cao Hoang Phuc Pham Duc Lam Le Mai Bao Nhu Nguyen Minh Trong Nguyen Thi Hoang Phuong Nguyen Van Dung Nguyen Tan-Y Hoang Nam Nguyen Duc Ngoc Minh Dang
A New Online Dynamic Testing Method for Noise of Broadcast Transmitter.Shan-Shan Li Jian Zhou Xuan Wang
Query Privacy Preserving for Data Aggregation in Wireless Sensor Networks.Xiaowu Liu Xiaowei Zhang Jiguo Yu Can Fu
A Temporal and Spatial Data Redundancy Processing Algorithm for RFID Surveillance Data.Siye Wang Ziwen Cao Yanfang Zhang Weiqing Huang Jianguo Jiang
PCA-Aided Linear Precoding in Massive MIMO Systems with Imperfect CSI.Van Khoi Dinh Minh-Tuan Le Vu-Duc Ngo Chi Hieu Ta
Software-Defined Multilayered Admission Control for Quality of Service Assurance in Mobile Ad-hoc Networks.Ponraj Appandairaj Kathiravan Kannan
Butler Matrix Frequency Diverse Retrodirective Array Beamforming: An Energy-Efficient Technique for mmWave Networks.Shaddrack Yaw Nusenu Emmanuel Asare
Master-Slave Topologies with Phase-Locked Loops. Formal Verification of Hardware Components in Critical Systems.Wilayat Khan Muhammad Kamran Syed Rameez Naqvi Farrukh Aslam Khan Ahmed S. Alghamdi Eesa Alsolami
Applications of Tensor Models in Wireless Communications and Mobile Computing.Carlos Alexandre R. Fernandes Jianhe Du Alex Pereira da Silva André L. F. de Almeida
Text Data Security and Privacy in the Internet of Things: Threats, Challenges, and Future Directions.Umair Khadam Muhammad Munwar Iqbal Meshrif Alruily Mohammed A. AlGhamdi Muhammad Ramzan Sultan H. Almotiri
Real Network Traffic Collection and Deep Learning for Mobile App Identification.Xin Wang Shuhui Chen Jinshu Su
Performance Improvement on Nonorthogonal Multiple Access without CSIT.Wenlong Xia Yuanping Zhou Qingdang Meng
Quantitative Invulnerability Analysis of Artificial Spider-Web Topology Model Based on End-to-End Delay.Jun Wang Zhuangzhuang Du Zhitao He
Bargaining Solution-Based Resource Allocation Scheme for Cloud-Assisted Wireless Body Area Networks. A Robust IoT-Based Three-Factor Authentication Scheme for Cloud Computing Resistant to Session Key Exposure.Feifei Wang Guosheng Xu Guoai Xu Yuejie Wang Junhao Peng
Slicing Resource Allocation for eMBB and URLLC in 5G RAN.Tengteng Ma Yong Zhang Fanggang Wang Dong Wang Da Guo
Passive Method for Estimating Available Throughput for Autonomous Off-Peak Data Transfer.Kozo Satoda Eiji Takahashi Takeo Onishi Takayuki Suzuki Daisuke Ohta Kosei Kobayashi Tutomu Murase
Transmit Power Allocation with Connectivity Probability for Multi-QoS in Cluster Flight Spacecraft Network.Jinrong Mo Shengbo Hu Tingting Yan Xiaowei Song Yanfeng Shi
Integration of 5G Networks and Internet of Things for Future Smart City.Bo Rong Shuai Han Michel Kadoch Xi Chen Antonio Jara
Energy Harvesting and Information Transmission Mode Design for Cooperative EH-Abled IoT Applications in beyond 5G Networks.Hongyuan Gao Shibo Zhang Yumeng Su Ming Diao
Pilot Reuse Mode Based on Continuous Pilot Reuse Factors.Dongsheng Han Kai Fu Zhixiong Chen
Adaptive Secure MIMO Transmission Mechanism against Smart Attacker.Xujun Shen Qingchun Chen Yulong Nie Keming Gan
Complementary Color Barcode-Based Optical Camera Communications.Sung-Yoon Jung Ji-Hwan Lee Wonwoo Nam Byung Wook Kim
A Genetic Algorithm-Based Soft Decision Fusion Scheme in Cognitive IoT Networks with Malicious Users.Muhammad Sajjad Khan Noor Gul Junsu Kim Ijaz Mansoor Qureshi Su Min Kim
A Deep Learning-Aided Detection Method for FTN-Based NOMA.Jianxiong Pan Neng Ye Aihua Wang Xiangming Li
Privacy Preserving for Multiple Sensitive Attributes against Fingerprint Correlation Attack Satisfying c-Diversity.Razaullah Khan Xiaofeng Tao Adeel Anjum Sajjad Haider Saif Ur Rehman Malik Abid Khan Fatemeh Amiri
Statistical Detection of Weak Pulse Signal under Chaotic Noise Based on Elman Neural Network.Liyun Su Li Deng Wanlin Zhu Shengli Zhao
Development of Multilayer Partially Reflective Surfaces for Highly Directive Cavity Antennas: A Study.Sapna B. Abdulkareem Srivatsun Gopalakrishnan
Design of Wavelet-Encoded Symbol Constellations for Cyclostationary Spectrum Sensing.Pedro Thiago Valério de Souza Vinícius Samuel Valério de Souza Luiz Felipe de Queiroz Silveira
Security and Privacy in Vehicular Ad Hoc Network and Vehicle Cloud Computing: A Survey.Muhammad Sameer Sheikh Jun Liang Wensong Wang
Measurement of Objective Video Quality in Social Cloud Based on Reference Metric.Sajida Karim Hui He A. R. Junejo Mariyam Sattar
Three-Dimensional Coprime Array for Massive MIMO: Array Configuration Design and 2D DOA Estimation.Pan Gong Tanveer Ahmed Jianfeng Li
On Providing Differentiated Service Exploiting Multi-Instance RPL for Industrial Low-Power and Lossy Networks.Muhammad Mostafa Monowar Mohammed Basheri
Secure Green-Oriented Multiuser Scheduling for Wireless-Powered Internet of Things.Xiaohui Shang Hao Yin Aijun Liu Mu Li Yida Wang Yong Wang
Relay Selection Joint Consecutive Packet Routing Scheme to Improve Performance for Wake-Up Radio-Enabled WSNs. Optimizing Resource Discovery Technique in the P2P Grid Systems.