


default search action
Mobile Networks and Applications, Volume 26
Volume 26, Number 1, February 2021
- Yujie Li:
Editorial: Cognitive Computing for Internet of Multimedia Things. 1-2 - Ruijun Liu
, Xiangshang Wang, Huimin Lu, Zhaohui Wu, Qian Fan, Shanxi Li, Xin Jin:
SCCGAN: Style and Characters Inpainting Based on CGAN. 3-12 - Jialiang Shen
, Yucheng Wang, Jian Zhang
:
ASDN: A Deep Convolutional Network for Arbitrary Scale Image Super-Resolution. 13-26 - Qianyu Liu
, Chiew Foong Kwong
, Sun Wei, Lincan Li, Sibo Zhang:
Intelligent Handover Triggering Mechanism in 5G Ultra-Dense Networks Via Clustering-Based Reinforcement Learning. 27-39 - Wenyi Zhao
, Huihua Yang, Jie Wang, Xipeng Pan, Zhiwei Cao:
Region- and Pixel-Level Multi-Focus Image Fusion through Convolutional Neural Networks. 40-56 - Lizhen Deng, Guoxia Xu, Hu Zhu, Bing-Kun Bao:
RoDeRain: Rotational Video Derain via Nonconvex and Nonsmooth Optimization. 57-66 - Junxing Zhang, Lijun Chen, Chunjuan Bo, Shuo Yang:
Multi-Scale Vehicle Logo Detector. 67-76 - Quan Zhou
, Jie Wang, Jia Liu, Shenghua Li, Weihua Ou, Xin Jin:
RSANet: Towards Real-Time Object Detection with Residual Semantic-Guided Attention Feature Pyramid Network. 77-87 - Shengping Zhang, Dianhui Chu, Yanxiao Zhao, Dalei Wu
, Qing Yang:
Editorial: Recent Advances on the Mobile Multimedia Services and Applications. 88-90 - Yuejun Li, Fangxin Wang, Shuwu Zhang, Xiaofei Niu:
Detection of Fake Reviews Using Group Model. 91-103 - Chunshan Li, Qing Du, Xiaofei Xu, Jin-Hui Zhu, Dianhui Chu
:
Bit-Quantized-Net: An Effective Method for Compressing Deep Neural Networks. 104-113 - Hongcheng Huang
, Tingting Wang, Min Hu, Mengyuan Dong, Licheng Lai:
Node Attitude Aware Information Dissemination Model Based on Evolutionary Game in Social Networks. 114-129 - Xue Li, Lanshun Nie
, Xiandong Si, Renjie Ding, De-chen Zhan:
Enhancing Representation of Deep Features for Sensor-Based Activity Recognition. 130-145 - Xue-rong Cui
, Mengyan Wang, Juan Li, Meiqi Ji, Jin Yang, Jianhang Liu, Tingpei Huang, Haihua Chen:
Indoor Wi-Fi Positioning Algorithm Based on Location Fingerprint. 146-155 - Mian Ahmad Jan
, Xiangjian He
, Houbing Song
, Muhammad Babar
:
Editorial: Machine Learning and Big Data Analytics for IoT-Enabled Smart Cities. 156-158 - Zahid Mumtaz
, Peter Whiteford
:
Machine Learning Based Approach for Sustainable Social Protection Policies in Developing Societies. 159-173 - Yushou Tang, Jianhuan Su, Muazzam Ali Khan:
Research on Sentiment Analysis of Network Forum Based on BP Neural Network. 174-183 - Sen Xu, Ryan Alturki, Ateeq Ur Rehman
, Muhammad Usman Tariq
:
BP Neural Network Combination Prediction for Big Data Enterprise Energy Management System. 184-190 - Wei Xu, Vinh Truong Hoang:
MapReduce-Based Improved Random Forest Model for Massive Educational Data Processing and Classification. 191-199 - Muhammad Alam, Jian-Feng Wang, Guangpei Cong, Yunrong Lv, Yuanfang Chen:
Convolutional Neural Network for the Semantic Segmentation of Remote Sensing Images. 200-215 - Jimmy Ming-Tai Wu, Gautam Srivastava, Jerry Chun-Wei Lin
, Youcef Djenouri
, Min Wei, Reza M. Parizi, Mohammad S. Khan
:
Mining of High-Utility Patterns in Big IoT-based Databases. 216-233 - Wei Li, Yuanbo Chai, Fazlullah Khan
, Syed Rooh Ullah Jan
, Sahil Verma
, Varun G. Menon
, Kavita
, Xingwang Li:
A Comprehensive Survey on Machine Learning-Based Big Data Analytics for IoT-Enabled Smart Healthcare System. 234-252 - Edgar Bisset Alvarez:
Editorial: Smart Data Management and Applications. 253-255 - Felipe Affonso
, Thiago Magela Rodrigues Dias
, Adilson Luiz Pinto
:
Financial Times Series Forecasting of Clustered Stocks. 256-265 - Gislaine Parra Freund
, Priscila Basto Fagundes
, Douglas Dyllon Jeronimo de Macedo:
An Analysis of Blockchain and GDPR under the Data Lifecycle Perspective. 266-276 - Augusto R. C. Bedin, Miriam A. M. Capretz
, Syed Mir:
Blockchain for Collaborative Businesses. 277-284 - Iqbal H. Sarker
, Mohammed Moshiul Hoque
, Md Kafil Uddin, Tawfeeq Alsanoosy:
Mobile Data Science and Intelligent Apps: Concepts, AI-Based Modeling and Research Directions. 285-303 - Márcio José Sembay
, Douglas Dyllon Jeronimo de Macedo
, Moisés Lima Dutra
:
A Proposed Approach for Provenance Data Gathering. 304-318 - Rogerio de Aquino Silva
, Luana da Silva Sousa
, Moisés Lima Dutra
, Gustavo Medeiros de Araújo
:
An Improved NER Methodology to the Portuguese Language. 319-325 - Hager Saleh
, Eman M. G. Younis, Radhya Sahal, Abdelmgeid A. Ali:
Predicting Systolic Blood Pressure in Real-Time Using Streaming Data and Deep Learning. 326-335 - Carlos Luis González-Valiente
, Rodrigo Costas
, Ed C. M. Noyons
, Jela Steinerová
, Jaroslav Susol:
Terminological (di) Similarities between Information Management and Knowledge Management: a Term Co-Occurrence Analysis. 336-346 - Liyun Xia, Shuai Liu
:
An Introduction to Multimedia Technology and Enhanced Learning. 347-350 - Jian Wang, Hengde Zhu
, Shui-Hua Wang, Yu-Dong Zhang
:
A Review of Deep Learning on Medical Image Analysis. 351-380 - Wei Li, Qian Huang, Gautam Srivastava
:
Contour Feature Extraction of Medical Image Based on Multi-Threshold Optimization. 381-389 - Ling-Li Guo, Marcin Wozniak
:
An Image Super-Resolution Reconstruction Method with Single Frame Character Based on Wavelet Neural Network in Internet of Things. 390-403 - Qi Nie, Yebing Zou, Jerry Chun-Wei Lin
:
Feature Extraction for Medical CT Images of Sports Tear Injury. 404-414 - Huan Yang, Xianling Lu, Shui-Hua Wang, Zhihai Lu, Jian Yao, Yizhang Jiang, Pengjiang Qian
:
Synthesizing Multi-Contrast MR Images Via Novel 3D Conditional Variational Auto-Encoding GAN. 415-424 - Zhaoyue Zhang
, An Zhang, Cong Sun, Shuaida Xiang, Jichen Guan, Xuedong Huang:
Research on Air Traffic Flow Forecast Based on ELM Non-Iterative Algorithm. 425-439 - Yuan Xu
, Yuriy S. Shmaliy, Wanfeng Ma, Xianwei Jiang, Tao Shen, Shuhui Bi, Hang Guo:
Improving Tightly LiDAR/Compass/Encoder-Integrated Mobile Robot Localization with Uncertain Sampling Period Utilizing EFIR Filter. 440-448 - Jing Zhu, Jing Gao:
Dynamic Fusion Algorithm of Building Surface Data in Heterogeneous Environment. 449-458 - Hao-Peng Chan, Liang Xu, Hui-Hui Liu, Run-Tian Zhang, Arun Kumar Sangaiah
:
System Design of Cloud Search Engine Based on Rich Text Content. 459-472 - Honggang Wang, Weina Fu
:
Personalized Learning Resource Recommendation Method Based on Dynamic Collaborative Filtering. 473-487
Volume 26, Number 2, April 2021
- Ju Bin Song, Husheng Li, Marceau Coupechoux:
Editorial: Game Theory for Networks. 489-490 - Leon A. Petrosyan, Maria A. Bulgakova, Artem A. Sedakov
:
Time-Consistent Solutions for Two-Stage Network Games with Pairwise Interactions. 491-500 - Abylay Satybaldy, Changhee Joo
:
Pricing and Revenue Sharing Between ISPs Under Content Sponsoring. 501-511 - Angel Sanchis-Cano
, Luis Guijarro
, Vicent Pla, José R. Vidal:
Duopoly Provision of Services Based on Wireless Sensor-supplied Data: a Differential Game Model. 512-522 - De-gan Zhang, Chen Chen, Yu-ya Cui, Ting Zhang:
New Method of Energy Efficient Subcarrier Allocation Based on Evolutionary Game Theory. 523-536 - Carlos Saavedra Arancibia, Ju Bin Song:
Low-Complexity Channel Estimation and Cooperative Channel Allocation in Millimeter-Wave Small Cell Networks. 537-547 - Pavlos Athanasios Apostolopoulos, Eirini-Eleni Tsiropoulou
, Symeon Papavassiliou
:
Demand Response Management in Smart Grid Networks: a Two-Stage Game-Theoretic Learning-Based Approach. 548-561 - Haitao Xu, Hung Khanh Nguyen, Xianwei Zhou, Zhu Han:
Charging Control of Electric Vehicles in Smart Grid: a Stackelberg Differential Game Based Approach. 562-570 - Dingde Jiang, Houbing Song
, Haijun Rong, Huihui Wang
:
Editorial: Simulation Tools and Techniques for Communications and Networking. 571-574 - Liuwei Huo, Dingde Jiang, Sheng Qi, Houbing Song
, Lei Miao:
An AI-Based Adaptive Cognitive Modeling and Measurement Method of Network Traffic for EIS. 575-585 - Liuwei Huo, Dingde Jiang, Sheng Qi, Lei Miao:
A Blockchain-Based Security Traffic Measurement Approach to Software Defined Networking. 586-596 - Feng Wang, Dingde Jiang, Sheng Qi, Chen Qiao, Lei Shi:
A Dynamic Resource Scheduling Scheme in Edge Computing Satellite Networks. 597-608 - Kai Yang, Xiao Yan
, Qian Wang, Dingde Jiang, Kaiyu Qin
:
DSWIPT Scheme for Cooperative Transmission in Downlink NOMA System. 609-619 - Jian Li, Hengji Li
, Na Wang, Chaoyang Li
, Yanyan Hou, Xiubo Chen, Yu-Guang Yang:
A Quantum Key Distribution Protocol Based on the EPR Pairs and its Simulation. 620-628 - Jiping Xiong
, Lingfeng Ye, Dingde Jiang, Tong Ye, Fei Wang, Lingyun Zhu:
Efficient Traffic Sign Recognition Using Cross-Connected Convolution Neural Networks Under Compressive Sensing Domain. 629-637 - Guofeng Zhang, Askar Hamdulla
:
Adaptive Morphological Contrast Enhancement Based on Quantum Genetic Algorithm for Point Target Detection. 638-648 - Pengyu Huang
, Haojie Zhao, Wei Liu, Dingde Jiang:
MAPS: Indoor Localization Algorithm Based on Multiple AP Selection. 649-656 - Zhuoran Liu, Dingde Jiang, Changsheng Zhang, Haitong Zhao, Qidong Zhao, Bin Zhang:
A Novel Fireworks Algorithm for the Protein-Ligand Docking on the AutoDock. 657-668 - Feng Wang, Dingde Jiang, Sheng Qi, Chen Qiao:
An Adaboost Based Link Planning Scheme in Space-Air-Ground Integrated Networks. 669-680 - Yuanqi Yang:
A New Network Traffic Prediction Approach in Software Defined Networks. 681-690 - Lei Chen
, Lu Zhang:
Spectral Efficiency Analysis for Massive MIMO System Under QoS Constraint: an Effective Capacity Perspective. 691-699 - Kailiang Zhang, Lei Chen
, Yuan An, Ping Cui:
A QoE Test System for Vehicular Voice Cloud Services. 700-715 - Yuqing Wang, Dingde Jiang, Liuwei Huo, Yong Zhao:
A New Traffic Prediction Algorithm to Software Defined Networking. 716-725 - Sheng Qi, Dingde Jiang, Liuwei Huo:
A Prediction Approach to End-to-End Traffic in Space Information Networks. 726-735 - Dahai Liu
, Xiaoqing Deng:
Investigating the Strategy on Path Planning on Aircraft Evacuation Process Using Discrete Event Simulation. 736-744 - Li-Tao Zhang
, Dingde Jiang, Xianyu Zuo, Ying-Chao Zhao, Yi-Fan Zhang:
Relaxed Modulus-Based Synchronous Multisplitting Multi-Parameter Methods for Linear Complementarity Problems. 745-754 - Li-Tao Zhang
, Dingde Jiang, Xianyu Zuo, Ying-Chao Zhao:
Weaker Convergence of Global Relaxed Multisplitting USAOR Methods for an H-matrix. 755-765 - Junyu Lai, Jiaqi Tian, Ke Zhang, Zheng Yang, Dingde Jiang:
Network Emulation as a Service (NEaaS): Towards a Cloud-Based Network Emulation Platform. 766-780 - Junyu Lai, Jiaqi Tian, Rui Liu, Zheng Yang, Dingde Jiang:
A Hybrid Virtualization Approach to Emulate Network Nodes of Heterogeneous Architectures. 781-793 - Zhangbing Zhou, Takahiro Hara, Deze Zeng, Yu Zhang, Chunsheng Zhu:
Editorial: Collaborative Next Generation Networking. 794-796 - Baowei Wang
, Wei Li, Neal N. Xiong
:
Time-Based Access Control for Multi-attribute Data in Internet of Things. 797-807 - Xiaofei Qu, Lin Yang, Kai Guo, Linru Ma, Meng Sun, Mingxing Ke, Mu Li:
A Survey on the Development of Self-Organizing Maps for Unsupervised Intrusion Detection. 808-829 - Yiqi Shi, Jianguo Sun, Duo Liu, Liang Kou, Boquan Li, Qing Yang, Liguo Zhang:
Cloud-Based Data Offloading for Multi-focus and Multi-views Image Fusion in Mobile Applications. 830-841 - Zhen Yang
, Wenyu Wang, Yongfeng Huang
, Xing Li:
A Multi-grained Log Auditing Scheme for Cloud Data Confidentiality. 842-850 - Kun Zhao, Wei Xi, Zhiping Jiang, Zhi Wang, Hui He, Tao Li, Xiaobin Zhang, Jizhong Zhao:
Indoor Geofencing Based on Sensorless Motion Sensing and Fingerprint Self-Updating. 851-869 - Zhiping Jiang, Chen Qian, Kun Zhao, Shuaiyu Chen, Rui Li
, Xu Wang, Chen He, Junzhao Du:
VariSecure: Facial Appearance Variance based Secure Device Pairing. 870-883 - Yang Li, Yunlong Zhao, Bin Guo
, Zhenhua Zhang, Qian Geng, Ran Wang:
An Extendable Layered Architecture for Collective Computing to Support Concurrent Multi-sourced Heterogeneous Tasks. 884-898 - Haixiang Hou, Hai Jin, Xiaofei Liao:
Cost Efficient Edge Service Placement for Crowdsensing via Bus Passengers. 899-908 - Tianqing Zhou
, Junhui Zhao, Dong Qin, Xuan Li, Chunguo Li, Luxi Yang:
Joint User Association and Time Partitioning for Load Balancing in Ultra-Dense Heterogeneous Networks. 909-922 - Shangwei Zhang, Jiajia Liu:
Ergodic Capacity Analysis on MIMO Communications in Internet of Vehicles. 923-939 - Yanbin Sun, Mohan Li, Shen Su, Zhihong Tian
, Wei Shi
, Meng Han:
Secure Data Sharing Framework via Hierarchical Greedy Embedding in Darknets. 940-948
Volume 26, Number 3, June 2021
- Fadi Al-Turjman
:
Editorial: Potential Sensors for the Forthcoming 6G/IoE - Electronics and Physical Communication Aspects. 949-951 - Wail Mardini, Shadi A. Aljawarneh
, Amnah Al-Abdi:
Using Multiple RPL Instances to Enhance the Performance of New 6G and Internet of Everything (6G/IoE)-Based Healthcare Monitoring Systems. 952-968 - P. Mohamed Shakeel, S. Baskar, Hassan Fouad
, Gunasekaran Manogaran, Vijayalakshmi Saravanan, Qin Xin:
Creating Collision-Free Communication in IoT with 6G Using Multiple Machine Access Learning Collision Avoidance Protocol. 969-980 - Linkai Chen
, Yaduan Ruan, Honghui Fan, Hongjin Zhu, XiangJun Chen, Qimei Chen:
Occlusion-Aware Detection for Internet of Vehicles in Urban Traffic Sensing Systems. 981-987 - Peng Yin, Liang Yang
, Shaofeng Du, Shengguan Qu, Bochen Jia
, Ning Zhao:
The Effect of Mobile Wearable Waist Assist Robot on Lower Back Pain during Lifting and Handling Tasks. 988-996 - Juan Wang, Zhi-Chao Liu, Jinhua Yang:
Fiber Bragg Grating Sensor Based on Refractive Index Segment Code of Mobile Modulation. 997-1007 - Huiqian Song, Dongmei Zhao, Chunyang Yuan:
Network Security Situation Prediction of Improved Lanchester Equation Based on Time Action Factor. 1008-1023 - Mu Zhou, Yaoping Li, Hui Yuan, Jiacheng Wang, Qiaolin Pu:
Indoor WLAN Personnel Intrusion Detection Using Transfer Learning-Aided Generative Adversarial Network with Light-Loaded Database. 1024-1042 - Amrita Dahiya, Brij B. Gupta
:
A QoS Ensuring Two-Layered Multi-Attribute Auction Mechanism to Mitigate DDoS Attack. 1043-1058 - M. Vasim Babu
, Jafar Ahmad Abed Alzubi, Ramesh Sekaran
, Rizwan Patan, Manikandan Ramachandran, Deepak Gupta
:
An Improved IDAF-FIT Clustering Based ASLPP-RR Routing with Secure Data Aggregation in Wireless Sensor Network. 1059-1067 - Der-Jiunn Deng, Xun Yang, Mohammed Atiquzzaman
:
Editorial: Recent Advances in Wireless Internet. 1068-1069 - Endah Kristiani
, Chao-Tung Yang
, Chin-Yin Huang
, Yuan-Ting Wang, Po-Cheng Ko:
The Implementation of a Cloud-Edge Computing Architecture Using OpenStack and Kubernetes for Air Quality Monitoring Application. 1070-1092 - Chih-Cheng Tseng, Hwang-Cheng Wang, Kuo-Chang Ting, Shih-Han Lo, Fang-Chang Kuo
:
Co-Tier Uplink Power Control in Small Cell Networks by Stackelberg Game with Two-Way Pricing Mechanism. 1093-1106 - Wenbo Zhang, Guangjie Han
, Yue Liu, Jing Wang:
A Coverage Vulnerability Repair Algorithm Based on Clustering in Underwater Wireless Sensor Networks. 1107-1121 - Mao Yang
, Bo Li, Zhongjiang Yan
:
MAC Technology of IEEE 802.11ax: Progress and Tutorial. 1122-1136 - Chia-Ming Hsu, Muhammad Zulfan Azhari, He-Yen Hsieh, Setya Widyawan Prakosa
, Jenq-Shiou Leu
:
Robust Network Intrusion Detection Scheme Using Long-Short Term Memory Based Convolutional Neural Networks. 1137-1144 - Lei Liu, Chen Chen, Qingqi Pei, Sabita Maharjan, Yan Zhang:
Vehicular Edge Computing and Networking: A Survey. 1145-1168 - Song Guo, Baoliu Ye:
Editorial: 5G Wireless Communication Systems and Advanced Image Processing. 1169-1171 - Muzhou Xiong, Lin Gu
, Haixin Liu, Deze Zeng, Hong Yao, Zhuzhong Qian:
A Network Calculus Based Delay and Backlog Analysis for Cloud Radio Access Networks. 1172-1181 - Shengcheng Ma, Xin Chen, Zhuo Li, Ying Chen:
Performance Evaluation of URLLC in 5G Based on Stochastic Network Calculus. 1182-1194 - Guomin Wu, Guoping Tan, Defu Jiang, Fei Feng, Hanfu Xun, Qi Wang, Xinyu Shen, Ziming Sheng:
User-Centered Interference Coordination in the Ultra-Dense Network: a Cluster and Priority Perspective. 1195-1205 - Jingyu Hua
, Jiangang Wen
, Anding Wang, Zhijiang Xu, Feng Li:
Optimization of FBMC Waveform by Designing NPR Prototype Filter with Improved Stopband Suppression. 1206-1216 - Cuimei Cui
, Dezhi Yang, Shi Jin:
Robust Spectrum-Energy Efficiency for Green Cognitive Communications. 1217-1224 - Guangying Wang
, Xiangbin Yu
, Tao Teng:
Energy-Efficient Power Allocation Scheme for Uplink Distributed Antenna System with D2D Communication. 1225-1232 - Lihua Yang, Junhui Zhao, Feifei Gao, Yi Gong
:
Cluster-Based Joint Resource Allocation with Successive Interference Cancellation for Ultra-Dense Networks. 1233-1242 - Qinglin Yang, Xiaofei Luo, Peng Li
, Toshiaki Miyazaki, Wenfeng Shen, Weiqin Tong:
Cooperation of Mobile Devices for Fast Inference of Deep Learning Applications. 1243-1249 - Xin Wang, Xin Zhang, Hangcheng Zhu, Qiong Wang, Chen Ning:
An Effective Algorithm for Single Image Fog Removal. 1250-1258 - Chen Ning, Wenbo Liu
, Gong Zhang, Xin Wang:
An Object Recognition Approach for Synthetic Aperture Radar Images. 1259-1266 - Phan Cong Vinh:
Context-Aware Computing and Nature-Inspired Computing. 1267-1269 - Prince Sharma
, Shailendra Shukla, Amol Vasudeva
:
Data Offloading via Optimal Target Set Selection in Opportunistic Networks. 1270-1280 - Seyyed Mohammad Safi, Ali Movaghar, Komeil Safikhani Mahmoodzadeh:
A Framework for Protecting Privacy on Mobile Social Networks. 1281-1299 - Vo Thi Hong Tuyet
, Thanh Binh Nguyen
, Nguyen Kim Quoc, Ashish Khare:
Content Based Medical Image Retrieval Based on Salient Regions Combined with Deep Learning. 1300-1310 - Hiep Xuan Huynh
, Nga My Lam Phan, Huong Hoang Luong
, Linh My Thi Ong, Hai Thanh Nguyen
, Bernard Pottier:
Brown Planthopper Sensor Network Optimization Based on Climate and Geographical Factors using Cellular Automata Technique. 1311-1328 - Hong Anh Le
:
Analyzing Energy Leaks of Android Applications Using Event-B. 1329-1338 - Nguyen Van Han, Phan Cong Vinh
:
Toward Modeling Fuzzy Dynamic System Based on Linguistic Values. 1339-1343 - Yifan Chen, Tadashi Nakano, Lin Lin, Weisi Guo, Mohammad Upal Mahfuz:
Editorial: Biologically Inspired Computing and Networking. 1344-1346 - Peng He
, Ming Liu, Chunhui Lan, Mengnan Su, Linhai Wang, Zhidu Li, Tong Tang:
Distributed Power Controller of Massive Wireless Body Area Networks based on Deep Reinforcement Learning. 1347-1358 - Jianguo Wang, Hui-Min Shao
, Yuan Yao, Jian-Long Liu, Shi-Wei Ma:
A Personalized Feature Extraction and Classification Method for Motor Imagery Recognition. 1359-1371 - Jingyi Liu
, Hengyu Li
, Jun Liu, Shaorong Xie, Jun Luo:
Real-Time Monocular Obstacle Detection Based on Horizon Line and Saliency Estimation for Unmanned Surface Vehicles. 1372-1385 - Min-Yan Tsai, Hsin-Hung Cho
:
A High Security Symmetric Key Generation by Using Genetic Algorithm Based on a Novel Similarity Model. 1386-1396 - Hsin-Te Wu
:
Developing an Intelligent Agricultural System Based on Long Short-Term Memory. 1397-1406
Volume 26, Number 4, August 2021
- Zheli Liu, Jin Li, Ilsun You, Siu-Ming Yiu:
Editorial: Security and Privacy in Computing and Communications. 1407-1411 - Xiaohan Yue, Mengzhe Xi, Bing Chen, Mingchao Gao, Yuan He
, Jian Xu
:
A Revocable Group Signatures Scheme to Provide Privacy-Preserving Authentications. 1412-1429 - Na Wang, Jian Li, Junsong Fu, Yan Zheng:
Privacy-Preserving Top-k Location-based Services Retrieval in Mobile Internet. 1430-1439 - Xianglin Wei, Tongxiang Wang, Chaogang Tang:
Throughput Analysis of Smart Buildings-oriented Wireless Networks under Jamming Attacks. 1440-1448 - Jorge Enrique Coyac-Torres
, Mario E. Rivero-Angeles
, Eleazar Aguirre Anaya:
Cognitive Radio Based System for Best Effort Communications in Sound-based Covert Channel for IoT Environments. 1449-1460 - Man Zhou, Lansheng Han
, Hongwei Lu, Cai Fu:
Intrusion Detection System for IoT Heterogeneous Perceptual Network. 1461-1474 - Jian Xu
, Yanbo Yu, Qingyu Meng, Qiyu Wu, Fucai Zhou:
Role-Based Access Control Model for Cloud Storage Using Identity-Based Cryptosystem. 1475-1492 - Quanxin Zhang, Mengyan Zhu, Chen Liang, Kunqing Wang, Kai Yang, Yuanzhang Li:
A Timestamp-Regulating VoLTE Covert Channel against Statistical Analysis. 1493-1502 - Yuanzhang Li, Dongyan Ma, Chen Liu, Wencong Han, Hongwei Jiang, Jingjing Hu
:
An Efficient Bounded Model Checking Approach for Web Service Composition. 1503-1513 - Yong Ding
, Xiaoqing Cui, Huiyong Wang, Kun Zhang:
PRIA: a Multi-source Recognition Method Based on Partial Observation in SIR Model. 1514-1522 - Bing Jia, Lifei Hao, Chuxuan Zhang, Baoqi Huang
:
A Privacy-sensitive Service Selection Method Based on Artificial Fish Swarm Algorithm in the Internet of Things. 1523-1531 - Hao Peng, Zhe Kan, Dandan Zhao, Jianmin Han:
Security Assessment for Interdependent Heterogeneous Cyber Physical Systems. 1532-1542 - Jing Li, Xiangyan Tang, Zhijun Wei, Yu Wang, Wenbin Chen
, Yu-an Tan:
Identity-based Multi-Recipient Public Key Encryption Scheme and Its Application in IoT. 1543-1550 - Jing Li, Xiangyan Tang, Zhijun Wei, Yu Wang, Wenbin Chen
, Yu-an Tan:
Correction to: Identity-based Multi-Recipient Public Key Encryption Scheme and Its Application in IoT. 1551 - Ruitao Hou, Hequn Xian
:
A Graded Reversible Watermarking Scheme for Relational Data. 1552-1563 - Hongyu Yang
, Xugao Zhang, Fang Cheng:
A Novel Algorithm for Improving Malicious Node Detection Effect in Wireless Sensor Networks. 1564-1573 - Shaojing Fu
, Qi Zhang, Nan Jia, Ming Xu:
A Privacy-preserving Fuzzy Search Scheme Supporting Logic Query over Encrypted Cloud Data. 1574-1585 - Alagarsamy Sumithra
:
Quadratic Poly Certificateless Inductive Signcryption for Network Security. 1586-1596 - Yuechi Tian, Tong Shao
, Zhen Li:
An Efficient Scheme of Cloud Data Assured Deletion. 1597-1608 - Zhengjun Jing
, Chunsheng Gu, Chunpeng Ge, Peizhong Shi:
Cryptanalysis of a Public Key Cryptosystem Based on Data Complexity under Quantum Environment. 1609-1615 - Yutian Zhou, Yu-an Tan, Quanxin Zhang, Xiaohui Kuang, Yahong Han, Jingjing Hu:
An Evolutionary-Based Black-Box Attack to Deep Neural Network Classifiers. 1616-1629 - Chundong Wang
, Kongbo Li
, Xiaonan He:
Network Risk Assessment Based on Baum Welch Algorithm and HMM. 1630-1637 - Xueshuo Xie, Zhi Wang
, Xuhang Xiao, Ye Lu, Shenwei Huang, Tao Li:
A Confidence-Guided Evaluation for Log Parsers Inner Quality. 1638-1649 - Fang-Yie Leu, Kun-Lin Tsai
, Heru Susanto
, Cheng-Yan Gu, Ilsun You
:
A Fault Tolerant Mechanism for UE Authentication in 5G Networks. 1650-1667 - Jian Zhang
, Cheng Gao, Liangyi Gong, Zhaojun Gu, Dapeng Man, Wu Yang, Wenzhen Li:
Malware Detection Based on Multi-level and Dynamic Multi-feature Using Ensemble Learning at Hypervisor. 1668-1685 - Yunlong He, Hequn Xian
, Liming Wang, Shuguang Zhang:
Secure Encrypted Data Deduplication Based on Data Popularity. 1686-1695 - S. Sivanesh, V. R. Sarma Dhulipala
:
Accurate and Cognitive Intrusion Detection System (ACIDS): a Novel Black Hole Detection Mechanism in Mobile Ad Hoc Networks. 1696-1704 - Dan Tang, Liu Tang
, Wei Shi, Sijia Zhan, Qiuwei Yang:
MF-CNN: a New Approach for LDoS Attack Detection Based on Multi-feature Fusion and CNN. 1705-1722 - Hui Lu, Chengjie Jin, Xiaohan Helu, Man Zhang, Yanbin Sun
, Yi Han, Zhihong Tian:
Research on Intelligent Detection of Command Level Stack Pollution for Binary Program Analysis. 1723-1732 - Xiaojie Guo, Yanyu Huang, Jinhui Ye, Sijie Yin, Min Li, Zhaohui Li
, Siu-Ming Yiu, Xiaochun Cheng
:
ShadowFPE: New Encrypted Web Application Solution Based on Shadow DOM. 1733-1746 - Trung Q. Duong, Van-Phuc Hoang
, Cong-Kha Pham
:
Convergence of 5G Technologies, Artificial Intelligence and Cybersecurity of Networked Societies for the Cities of Tomorrow. 1747-1749 - Mohammad Ranjbar, H. L. Nguyen, Nghi H. Tran
, Tutku Karacolak, Shivakumar Sastry, L. D. Nguyen:
Energy efficiency of full-duplex cognitive radio in low-power regimes under imperfect spectrum sensing. 1750-1764 - Arthur Zucker, Younes Belkada, Hanh Vu, Nam Van Nguyen
:
ClusTi: Clustering Method for Table Structure Recognition in Scanned Images. 1765-1776 - Ba Cao Nguyen
, Tran Manh Hoang
, Xuan Nam Tran, Xuan Nghia Pham, Le The Dung
:
Evaluating the Performance of Full-Duplex Energy Harvesting Vehicle-to-Vehicle Communication System over Double Rayleigh Fading Channels. 1777-1787 - Vu Thuy Linh, Vo Ngoc Quynh Tram, Ho Minh Dung, Dang Nguyen Dong Phuong
, Liem D. Nguyen, Long Dinh Nguyen, Cheng Yin, Ayse Kortun, Nguyen Kim Loi
:
Meteorological and Hydrological Drought Assessment for Dong Nai River Basin, Vietnam under Climate Change. 1788-1800 - Qamar Usman, Omer Chughtai
, Nadia Nawaz, Zeeshan Kaleem, Kishwer Abdul Khaliq
, Long Dinh Nguyen:
A Reliable Link-Adaptive Position-Based Routing Protocol for Flying ad hoc Network. 1801-1820
Volume 26, Number 5, October 2021
- Fan-Yi Meng
:
Editorial: Recent Advances on Communication Signal Processing and Networking. 1821-1822 - Zhuyun Fan, Jiyu Jin, Guiyue Jin
, Jun Mou
:
A Carrier Selection Method Based on Single RF Chain SM-OFDM Systems. 1823-1830 - Guiyue Jin
, Chaoyue Zhao, Zhuyun Fan, Jiyu Jin:
Antenna Selection in TDD Massive MIMO Systems. 1831-1837 - Guiyue Jin, Chaoyue Zhao, Zhuyun Fan, Jiyu Jin:
Correction to: Antenna Selection in TDD Massive MIMO Systems. 1838 - Xin Liu
, Yuyao Wang, Zhenyu Na, Mudi Xiong:
A Novel Relay-Assisted DCO-OFDM Green VLC System Based on NOMA. 1839-1848 - Jun Mou
, Feifei Yang
, Ran Chu, Yinghong Cao:
Image Compression and Encryption Algorithm Based on Hyper-chaotic Map. 1849-1861 - Feifei Yang
, Peng Li
:
Characteristics Analysis of the Fractional-Order Chaotic Memristive Circuit Based on Chua's Circuit. 1862-1870 - Peng Li, Lu Guo, Fang Wang:
A Multipath Routing Protocol with Load Balancing and Energy Constraining Based on AOMDV in Ad Hoc Network. 1871-1880 - Chengyan Li, Xin Gao
, Qingquan Sun:
Introduction of Progress in Education under Recent Technology Revolution. 1881-1883 - Zhijun Yang, Yang Wang, Jianhou Gan, Hang Li, Ning Lei:
Design and Research of Intelligent Question-Answering(Q&A) System Based on High School Course Knowledge Graph. 1884-1890 - Shuai Liu
, Tenghui He, Jianhua Dai:
A Survey of CRF Algorithm Based Knowledge Extraction of Elementary Mathematics in Chinese. 1891-1903 - Guanglu Sun, Lili Liang, Tianlin Li
, Bo Yu, Meng Wu, Bolun Zhang:
Video Question Answering: a Survey of Models and Datasets. 1904-1937 - Zhu Tiejun, Ablaye Camara:
"3 M" Performability Creative Practical Platform Application Research. 1938-1949 - Zhan Zhang, Wenhao Li
, Xiao Qing, Xian Liu, Hongwei Liu:
Research on Optimal Checkpointing-Interval for Flink Stream Processing Applications. 1950-1959 - Hongna Zhang
, Wei Yan, Chunyou Zhang, Lihua Wang:
Research on Image Fusion Algorithm Based on NSST Frequency Division and Improved LSCN. 1960-1970 - Xun Shao, Zhi Liu, Xianfu Chen
, Seng W. Loke, Hwee-Pink Tan
:
Editorial: Recent Advances on Intelligent Mobility and Edge Computing. 1971-1973 - Xiujun Wang
, Yan Gao, Yangzhao Yang, Xiao Zheng, Xuangou Wu, Wei Zhao:
An Efficient Protocol for the Tag-information Sampling Problem in RFID Systems. 1974-1985 - Qiyue Li, Tengfei Cao, Wei Sun
, Weitao Li, Jinjin Ding, Guojun Luo, Jie Li
:
An Optimal Uplink Scheduling in Heterogeneous PLC and LTE Communication for Delay-aware Smart Grid Applications. 1986-1999 - Rui Yin, Zhiqun Zou, Celimuge Wu
, Jiantao Yuan, Xianfu Chen
:
Distributed Spectrum and Power Allocation for D2D-U Networks: a Scheme Based on NN and Federated Learning. 2000-2013 - Hong-an Li
, Min Zhang, Keping Yu
, Xin Qi, Jianfeng Tong:
A Displacement Estimated Method for Real Time Tissue Ultrasound Elastography. 2014-2023 - Pengsong Duan
, Hao Li, Bo Zhang
, Yangjie Cao, Endong Wang:
APFNet: Amplitude-Phase Fusion Network for CSI-Based Action Recognition. 2024-2034 - Fan Wu, Si Hong, Wei Zhao, Xiaoyan Wang, Xun Shao
, Xiujun Wang, Xiao Zheng:
Neural Networks with Improved Extreme Learning Machine for Demand Prediction of Bike-sharing. 2035-2045 - Catia Prandi
, Johann M. Márquez-Barja:
Editorial: Smart Objects and Technologies for Social Good. 2046-2047 - Kiyoshy Nakamura
, Daniel Hernández
, José M. Cecilia, Pietro Manzoni
, Marco Zennaro, Juan-Carlos Cano, Carlos T. Calafate:
LADEA: A Software Infrastructure for Audio Delivery and Analytics. 2048-2054 - Armir Bujari
, Luigi De Giovanni, Claudio E. Palazzi, Daniele Ronzani
:
Location Dynamic Tabu Routing Protocol for MANETs. 2055-2065 - Chiara Ceccarini
, Silvia Mirri
, Paola Salomoni, Catia Prandi
:
On exploiting Data Visualization and IoT for Increasing Sustainability and Safety in a Smart Campus. 2066-2075 - Julien Maitre
, Kevin Bouchard, Sébastien Gaboury:
Alternative Deep Learning Architectures for Feature-Level Fusion in Human Activity Recognition. 2076-2086 - Imre Dániel Báldy, Nikolaj Hansen, Thomas Bjørner
:
An Engaging Serious Game Aiming at Awareness of Therapy Skills Associated with Social Anxiety Disorder. 2087-2098 - Barbara Guidi, Andrea Michienzi
, Laura Ricci:
Analysis of Witnesses in the Steem Blockchain. 2099-2110 - João Paulo de Brito Gonçalves
, Henrique Cesar Carvalho de Resende, Rodolfo da Silva Villaça, Esteban Municio, Cristiano Bonato Both
, Johann M. Márquez-Barja
:
Distributed Network Slicing Management Using Blockchains in E-Health Environments. 2111-2122 - Peng Gao, Jingyi Li, Shuai Liu
:
An Introduction to Key Technology in Artificial Intelligence and big Data Driven e-Learning and e-Education. 2123-2126 - Li-xuan Li, Ying Huo, Jerry Chun-Wei Lin
:
Cross-Dimension Mining Model of Public Opinion Data in Online Education Based on Fuzzy Association Rules. 2127-2140 - Chun-yu Li, Qun Zhao, Norbert Herencsar
, Gautam Srivastava
:
The Design of Mobile Distance Online Education Resource Sharing from the Perspective of Man-Machine Cooperation. 2141-2152 - Jian-Wei Liu, Arun Kumar Sangaiah
:
Research on Adaptive Updating Method of Education Resource Index Based on Mobile Computing. 2153-2162 - Jian-Wei Liu, Arun Kumar Sangaiah
:
Correction to: Research on Adaptive Updating Method of Education Resource Index Based on Mobile Computing. 2163 - Changbo Hou, Lijie Hua, Yun Lin
, Jing Zhang, Guowei Liu
, Yihan Xiao:
Application and Exploration of Artificial Intelligence and Edge Computing in Long-Distance Education on Mobile Network. 2164-2175 - Ya-zhi Yang, Yong Zhong, Marcin Wozniak
:
Improvement of Adaptive Learning Service Recommendation Algorithm Based on Big Data. 2176-2187 - Lei Bao, Ping Yu:
Evaluation Method of Online and Offline Hybrid Teaching Quality of Physical Education Based on Mobile Edge Computing. 2188-2198 - Fei Lang, Lili Liang, Kai Huang, Teng Chen, Suxia Zhu
:
Movie Recommendation System for Educational Purposes Based on Field-Aware Factorization Machine. 2199-2205 - Rafeeq Ahmed
, Tanvir Ahmad, Fadiyah M. Almutairi, Abdulrahman M. Qahtani, Abdulmajeed Alsufyani, Omar Almutiry:
Fuzzy Semantic Classification of Multi-Domain E-Learning Concept. 2206-2215
Volume 26, Number 6, December 2021
- Yueshen Xu, Yuyu Yin
, Li Kuang:
Special Issue on Deep Learning in Mobile and Wireless Networks: Algorithms, Models and Techniques. 2217-2218 - Xiaolong Xu
, Wuyan Liang, Jiahan Zhao, Honghao Gao:
Tiny FCOS: a Lightweight Anchor-Free Object Detection Algorithm for Mobile Scenarios. 2219-2229 - Zhongyi Zhang, Weihua Zhao, Ouhan Huang
, Gangyong Jia, Youhuizi Li, Songzhu Mei, Duan Zhao:
Edge Network Routing Protocol Base on Target Tracking Scenario. 2230-2241 - Wanru Xu, Xiaochen Fan, Tao Wu
, Wei Tao, Yue Xi, Panlong Yang, Chang Tian:
Tolerance-Oriented Wi-Fi Advertisement Scheduling: A Near Optimal Study on Accumulative User Interests. 2242-2257 - Jiaqi Yin, Huibiao Zhu, Yuan Fei:
Formal analysis and automated validation of privacy-preserving AICE protocol in mobile edge computing. 2258-2271 - Honghao Gao
, Yida Zhang, Huaikou Miao, Ramón J. Durán Barroso, Xiaoxian Yang:
SDTIOA: Modeling the Timed Privacy Requirements of IoT Service Composition: A User Interaction Perspective for Automatic Transformation from BPEL to Timed Automata. 2272-2297 - Shuyu Chang
, Rui Wang
, Haiping Huang
, Jian Luo:
TA-BiLSTM: An Interpretable Topic-Aware Model for Misleading Information Detection in Mobile Social Networks. 2298-2314 - Yulei Wu, Fei Hao
, Sambit Bakshi, Haojun Huang:
Editorial: Deep Learning for Big Data Analytics. 2315-2317 - Noushin Jafarpisheh, Effat Jalaeian Zaferani, Mohammad Teshnehlab, Hadis Karimipour, Reza M. Parizi, Gautam Srivastava
:
A Deep Neural Network Combined with Radial Basis Function for Abnormality Classification. 2318-2328 - Qindong Sun, Xingyu Feng, Shanshan Zhao, Han Cao, Shancang Li
, Yufeng Yao:
Deep Learning Based Customer Preferences Analysis in Industry 4.0 Environment. 2329-2340 - Zhen Pang, Xiang Wang, Xulong Wang, Jun Qi
, Zhong Zhao, Yuan Gao, Yun Yang, Po Yang:
A Multi-modal Data Platform for Diagnosis and Prediction of Alzheimer's Disease Using Machine Learning Methods. 2341-2352 - Jiang Zhaoxue
, Tong Li, Zhenguo Zhang, Jingguo Ge, Junling You, Liangxiong Li:
A Survey On Log Research Of AIOps: Methods and Trends. 2353-2364 - Roopali Dogra, Shalli Rani, Sandeep Verma
, Sahil Garg
, Mohammad Mehedi Hassan:
TORM: Tunicate Swarm Algorithm-based Optimized Routing Mechanism in IoT-based Framework. 2365-2373 - Carlos Luis González-Valiente
, Magda León Santos, Ricardo Arencibia Jorge
, Ed C. M. Noyons, Rodrigo Costas
:
Mapping the Evolution of Intellectual Structure in Information Management Using Author Co-citation Analysis. 2374-2388 - Xinheng Wang
, Honghao Gao, Kaizhu Huang
:
Artificial Intelligence in Collaborative Computing. 2389-2391 - Tengfei Li
, Jing Liu, Haiying Sun, Xiaohong Chen, Ling Yin, Xia Mao, Junfeng Sun:
Runtime Verification of Spatio-Temporal Specification Language. 2392-2406 - Guichuan Zhao, Qi Jiang
, Xiaohan Huang, Xindi Ma, Youliang Tian, Jian Feng Ma:
Secure and Usable Handshake Based Pairing for Wrist-Worn Smart Devices on Different Users. 2407-2422 - Fangzheng Liu, Bofeng Lv, Jiwei Huang, Sikandar Ali:
Edge User Allocation in Overlap Areas for Mobile Edge Computing. 2423-2433 - Jun Zeng
, Haoran Tang, Yizhu Zhao, Min Gao
, Junhao Wen
:
PR-RCUC: A POI Recommendation Model Using Region-Based Collaborative Filtering and User-Based Mobile Context. 2434-2444 - Guoming Zhang
, Lianyong Qi, Xuyun Zhang
, Xiaolong Xu
, Wanchun Dou:
Point-of-Interest Recommendation with User's Privacy Preserving in an IoT Environment. 2445-2460 - Zhe Ban, Junyan Hu
, Barry Lennox, Farshad Arvin
:
Self-Organised Collision-Free Flocking Mechanism in Heterogeneous Robot Swarms. 2461-2471 - Rongjun Chen
, Zhijun Zheng
, Junfeng Pan, Yongxing Yu, Huimin Zhao, Jinchang Ren:
Fast Blind Deblurring of QR Code Images Based on Adaptive Scale Control. 2472-2487 - Jin Li, Xiaofeng Liao:
Security and Privacy in New Computing Environments (SPNCE 2016). 2488-2489 - Chengyu Hu, Zhen Li, Pengtao Liu, Rupeng Yang, Shanqing Guo, Hailong Zhang:
Verifiable Public-Key Encryption with Keyword Search Secure against Continual Memory Attacks. 2490-2500 - S. Priya, B. Santhi:
A Novel Visual Medical Image Encryption for Secure Transmission of Authenticated Watermarked Medical Images. 2501-2508 - Hanshu Hong, Ximeng Liu, Zhixin Sun:
A Fine-Grained Attribute Based Data Retrieval with Proxy Re-Encryption Scheme for Data Outsourcing Systems. 2509-2514 - Liangyi Gong, Chundong Wang, Hong Yang, Zhiyuan Li, Zhentang Zhao:
Fine-grained Trust-based Routing Algorithm for Wireless Sensor Networks. 2515-2524 - Kamel Karoui
, Fakher Ben Ftima:
New Engineering Method for the Risk Assessment: Case Study Signal Jamming of the M-Health Networks. 2525-2544 - Hany F. Atlam
, Robert John Walters, Gary B. Wills
, Joshua Daniel:
Fuzzy Logic with Expert Judgment to Implement an Adaptive Risk-Based Access Control Model for IoT. 2545-2557 - Douglas Kunda
, Mumbi Chishimba:
A Survey of Android Mobile Phone Authentication Schemes. 2558-2566 - Hoda Jannati
, Ebrahim Ardeshir-Larijani
, Behnam Bahrak:
Privacy in Cross-User Data Deduplication. 2567-2579

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.