


default search action
Mobile Networks and Applications, Volume 26
Volume 26, Number 1, February 2021
- Yujie Li:

Editorial: Cognitive Computing for Internet of Multimedia Things. 1-2 - Ruijun Liu

, Xiangshang Wang, Huimin Lu, Zhaohui Wu, Qian Fan, Shanxi Li, Xin Jin:
SCCGAN: Style and Characters Inpainting Based on CGAN. 3-12 - Jialiang Shen

, Yucheng Wang, Jian Zhang
:
ASDN: A Deep Convolutional Network for Arbitrary Scale Image Super-Resolution. 13-26 - Qianyu Liu

, Chiew Foong Kwong
, Sun Wei, Lincan Li, Sibo Zhang:
Intelligent Handover Triggering Mechanism in 5G Ultra-Dense Networks Via Clustering-Based Reinforcement Learning. 27-39 - Wenyi Zhao

, Huihua Yang, Jie Wang, Xipeng Pan, Zhiwei Cao:
Region- and Pixel-Level Multi-Focus Image Fusion through Convolutional Neural Networks. 40-56 - Lizhen Deng, Guoxia Xu, Hu Zhu, Bing-Kun Bao:

RoDeRain: Rotational Video Derain via Nonconvex and Nonsmooth Optimization. 57-66 - Junxing Zhang, Lijun Chen, Chunjuan Bo, Shuo Yang:

Multi-Scale Vehicle Logo Detector. 67-76 - Quan Zhou

, Jie Wang, Jia Liu, Shenghua Li, Weihua Ou, Xin Jin:
RSANet: Towards Real-Time Object Detection with Residual Semantic-Guided Attention Feature Pyramid Network. 77-87 - Shengping Zhang, Dianhui Chu, Yanxiao Zhao, Dalei Wu

, Qing Yang:
Editorial: Recent Advances on the Mobile Multimedia Services and Applications. 88-90 - Yuejun Li, Fangxin Wang, Shuwu Zhang, Xiaofei Niu:

Detection of Fake Reviews Using Group Model. 91-103 - Chunshan Li, Qing Du, Xiaofei Xu, Jin-Hui Zhu, Dianhui Chu

:
Bit-Quantized-Net: An Effective Method for Compressing Deep Neural Networks. 104-113 - Hongcheng Huang

, Tingting Wang, Min Hu, Mengyuan Dong, Licheng Lai:
Node Attitude Aware Information Dissemination Model Based on Evolutionary Game in Social Networks. 114-129 - Xue Li, Lanshun Nie

, Xiandong Si, Renjie Ding, De-chen Zhan:
Enhancing Representation of Deep Features for Sensor-Based Activity Recognition. 130-145 - Xue-rong Cui

, Mengyan Wang, Juan Li, Meiqi Ji, Jin Yang, Jianhang Liu, Tingpei Huang, Haihua Chen:
Indoor Wi-Fi Positioning Algorithm Based on Location Fingerprint. 146-155 - Mian Ahmad Jan

, Xiangjian He
, Houbing Song
, Muhammad Babar
:
Editorial: Machine Learning and Big Data Analytics for IoT-Enabled Smart Cities. 156-158 - Zahid Mumtaz

, Peter Whiteford
:
Machine Learning Based Approach for Sustainable Social Protection Policies in Developing Societies. 159-173 - Yushou Tang, Jianhuan Su, Muazzam Ali Khan:

Research on Sentiment Analysis of Network Forum Based on BP Neural Network. 174-183 - Sen Xu, Ryan Alturki, Ateeq Ur Rehman

, Muhammad Usman Tariq
:
BP Neural Network Combination Prediction for Big Data Enterprise Energy Management System. 184-190 - Wei Xu, Vinh Truong Hoang:

MapReduce-Based Improved Random Forest Model for Massive Educational Data Processing and Classification. 191-199 - Muhammad Alam, Jian-Feng Wang, Guangpei Cong, Yunrong Lv, Yuanfang Chen:

Convolutional Neural Network for the Semantic Segmentation of Remote Sensing Images. 200-215 - Jimmy Ming-Tai Wu, Gautam Srivastava, Jerry Chun-Wei Lin

, Youcef Djenouri
, Min Wei, Reza M. Parizi, Mohammad S. Khan
:
Mining of High-Utility Patterns in Big IoT-based Databases. 216-233 - Wei Li, Yuanbo Chai, Fazlullah Khan

, Syed Rooh Ullah Jan
, Sahil Verma
, Varun G. Menon
, Kavita
, Xingwang Li:
A Comprehensive Survey on Machine Learning-Based Big Data Analytics for IoT-Enabled Smart Healthcare System. 234-252 - Edgar Bisset Alvarez:

Editorial: Smart Data Management and Applications. 253-255 - Felipe Affonso

, Thiago Magela Rodrigues Dias
, Adilson Luiz Pinto
:
Financial Times Series Forecasting of Clustered Stocks. 256-265 - Gislaine Parra Freund

, Priscila Basto Fagundes
, Douglas Dyllon Jeronimo de Macedo:
An Analysis of Blockchain and GDPR under the Data Lifecycle Perspective. 266-276 - Augusto R. C. Bedin, Miriam A. M. Capretz

, Syed Mir:
Blockchain for Collaborative Businesses. 277-284 - Iqbal H. Sarker

, Mohammed Moshiul Hoque
, Md Kafil Uddin, Tawfeeq Alsanoosy:
Mobile Data Science and Intelligent Apps: Concepts, AI-Based Modeling and Research Directions. 285-303 - Márcio José Sembay

, Douglas Dyllon Jeronimo de Macedo
, Moisés Lima Dutra
:
A Proposed Approach for Provenance Data Gathering. 304-318 - Rogerio de Aquino Silva

, Luana da Silva Sousa
, Moisés Lima Dutra
, Gustavo Medeiros de Araújo
:
An Improved NER Methodology to the Portuguese Language. 319-325 - Hager Saleh

, Eman M. G. Younis, Radhya Sahal, Abdelmgeid A. Ali:
Predicting Systolic Blood Pressure in Real-Time Using Streaming Data and Deep Learning. 326-335 - Carlos Luis González-Valiente

, Rodrigo Costas
, Ed C. M. Noyons
, Jela Steinerová
, Jaroslav Susol:
Terminological (di) Similarities between Information Management and Knowledge Management: a Term Co-Occurrence Analysis. 336-346 - Liyun Xia, Shuai Liu

:
An Introduction to Multimedia Technology and Enhanced Learning. 347-350 - Jian Wang, Hengde Zhu

, Shui-Hua Wang, Yu-Dong Zhang
:
A Review of Deep Learning on Medical Image Analysis. 351-380 - Wei Li, Qian Huang, Gautam Srivastava

:
Contour Feature Extraction of Medical Image Based on Multi-Threshold Optimization. 381-389 - Ling-Li Guo, Marcin Wozniak

:
An Image Super-Resolution Reconstruction Method with Single Frame Character Based on Wavelet Neural Network in Internet of Things. 390-403 - Qi Nie, Yebing Zou, Jerry Chun-Wei Lin

:
Feature Extraction for Medical CT Images of Sports Tear Injury. 404-414 - Huan Yang, Xianling Lu, Shui-Hua Wang, Zhihai Lu, Jian Yao, Yizhang Jiang, Pengjiang Qian

:
Synthesizing Multi-Contrast MR Images Via Novel 3D Conditional Variational Auto-Encoding GAN. 415-424 - Zhaoyue Zhang

, An Zhang, Cong Sun, Shuaida Xiang, Jichen Guan, Xuedong Huang:
Research on Air Traffic Flow Forecast Based on ELM Non-Iterative Algorithm. 425-439 - Yuan Xu

, Yuriy S. Shmaliy, Wanfeng Ma, Xianwei Jiang, Tao Shen, Shuhui Bi, Hang Guo:
Improving Tightly LiDAR/Compass/Encoder-Integrated Mobile Robot Localization with Uncertain Sampling Period Utilizing EFIR Filter. 440-448 - Jing Zhu, Jing Gao:

Dynamic Fusion Algorithm of Building Surface Data in Heterogeneous Environment. 449-458 - Hao-Peng Chan, Liang Xu, Hui-Hui Liu, Run-Tian Zhang, Arun Kumar Sangaiah

:
System Design of Cloud Search Engine Based on Rich Text Content. 459-472 - Honggang Wang, Weina Fu

:
Personalized Learning Resource Recommendation Method Based on Dynamic Collaborative Filtering. 473-487
Volume 26, Number 2, April 2021
- Ju Bin Song, Husheng Li, Marceau Coupechoux:

Editorial: Game Theory for Networks. 489-490 - Leon A. Petrosyan, Maria A. Bulgakova, Artem A. Sedakov

:
Time-Consistent Solutions for Two-Stage Network Games with Pairwise Interactions. 491-500 - Abylay Satybaldy, Changhee Joo

:
Pricing and Revenue Sharing Between ISPs Under Content Sponsoring. 501-511 - Angel Sanchis-Cano

, Luis Guijarro
, Vicent Pla, José R. Vidal:
Duopoly Provision of Services Based on Wireless Sensor-supplied Data: a Differential Game Model. 512-522 - De-gan Zhang, Chen Chen, Yu-ya Cui, Ting Zhang:

New Method of Energy Efficient Subcarrier Allocation Based on Evolutionary Game Theory. 523-536 - Carlos Saavedra Arancibia, Ju Bin Song:

Low-Complexity Channel Estimation and Cooperative Channel Allocation in Millimeter-Wave Small Cell Networks. 537-547 - Pavlos Athanasios Apostolopoulos, Eirini-Eleni Tsiropoulou

, Symeon Papavassiliou
:
Demand Response Management in Smart Grid Networks: a Two-Stage Game-Theoretic Learning-Based Approach. 548-561 - Haitao Xu, Hung Khanh Nguyen, Xianwei Zhou, Zhu Han:

Charging Control of Electric Vehicles in Smart Grid: a Stackelberg Differential Game Based Approach. 562-570 - Dingde Jiang, Houbing Song

, Haijun Rong, Huihui Wang
:
Editorial: Simulation Tools and Techniques for Communications and Networking. 571-574 - Liuwei Huo, Dingde Jiang, Sheng Qi, Houbing Song

, Lei Miao:
An AI-Based Adaptive Cognitive Modeling and Measurement Method of Network Traffic for EIS. 575-585 - Liuwei Huo, Dingde Jiang, Sheng Qi, Lei Miao:

A Blockchain-Based Security Traffic Measurement Approach to Software Defined Networking. 586-596 - Feng Wang, Dingde Jiang, Sheng Qi, Chen Qiao, Lei Shi:

A Dynamic Resource Scheduling Scheme in Edge Computing Satellite Networks. 597-608 - Kai Yang, Xiao Yan

, Qian Wang, Dingde Jiang, Kaiyu Qin
:
DSWIPT Scheme for Cooperative Transmission in Downlink NOMA System. 609-619 - Jian Li, Hengji Li

, Na Wang, Chaoyang Li
, Yanyan Hou, Xiubo Chen, Yu-Guang Yang:
A Quantum Key Distribution Protocol Based on the EPR Pairs and its Simulation. 620-628 - Jiping Xiong

, Lingfeng Ye, Dingde Jiang, Tong Ye, Fei Wang, Lingyun Zhu:
Efficient Traffic Sign Recognition Using Cross-Connected Convolution Neural Networks Under Compressive Sensing Domain. 629-637 - Guofeng Zhang, Askar Hamdulla

:
Adaptive Morphological Contrast Enhancement Based on Quantum Genetic Algorithm for Point Target Detection. 638-648 - Pengyu Huang

, Haojie Zhao, Wei Liu, Dingde Jiang:
MAPS: Indoor Localization Algorithm Based on Multiple AP Selection. 649-656 - Zhuoran Liu, Dingde Jiang, Changsheng Zhang, Haitong Zhao, Qidong Zhao, Bin Zhang:

A Novel Fireworks Algorithm for the Protein-Ligand Docking on the AutoDock. 657-668 - Feng Wang, Dingde Jiang, Sheng Qi, Chen Qiao:

An Adaboost Based Link Planning Scheme in Space-Air-Ground Integrated Networks. 669-680 - Yuanqi Yang:

A New Network Traffic Prediction Approach in Software Defined Networks. 681-690 - Lei Chen

, Lu Zhang:
Spectral Efficiency Analysis for Massive MIMO System Under QoS Constraint: an Effective Capacity Perspective. 691-699 - Kailiang Zhang, Lei Chen

, Yuan An, Ping Cui:
A QoE Test System for Vehicular Voice Cloud Services. 700-715 - Yuqing Wang, Dingde Jiang, Liuwei Huo, Yong Zhao:

A New Traffic Prediction Algorithm to Software Defined Networking. 716-725 - Sheng Qi, Dingde Jiang, Liuwei Huo:

A Prediction Approach to End-to-End Traffic in Space Information Networks. 726-735 - Dahai Liu

, Xiaoqing Deng:
Investigating the Strategy on Path Planning on Aircraft Evacuation Process Using Discrete Event Simulation. 736-744 - Li-Tao Zhang

, Dingde Jiang, Xianyu Zuo, Ying-Chao Zhao, Yifan Zhang:
Relaxed Modulus-Based Synchronous Multisplitting Multi-Parameter Methods for Linear Complementarity Problems. 745-754 - Li-Tao Zhang

, Dingde Jiang, Xianyu Zuo, Ying-Chao Zhao:
Weaker Convergence of Global Relaxed Multisplitting USAOR Methods for an H-matrix. 755-765 - Junyu Lai, Jiaqi Tian, Ke Zhang, Zheng Yang, Dingde Jiang:

Network Emulation as a Service (NEaaS): Towards a Cloud-Based Network Emulation Platform. 766-780 - Junyu Lai, Jiaqi Tian, Rui Liu, Zheng Yang, Dingde Jiang:

A Hybrid Virtualization Approach to Emulate Network Nodes of Heterogeneous Architectures. 781-793 - Zhangbing Zhou, Takahiro Hara, Deze Zeng, Yu Zhang, Chunsheng Zhu:

Editorial: Collaborative Next Generation Networking. 794-796 - Baowei Wang

, Wei Li, Neal N. Xiong
:
Time-Based Access Control for Multi-attribute Data in Internet of Things. 797-807 - Xiaofei Qu, Lin Yang, Kai Guo, Linru Ma, Meng Sun, Mingxing Ke, Mu Li:

A Survey on the Development of Self-Organizing Maps for Unsupervised Intrusion Detection. 808-829 - Yiqi Shi, Jianguo Sun, Duo Liu, Liang Kou, Boquan Li, Qing Yang, Liguo Zhang:

Cloud-Based Data Offloading for Multi-focus and Multi-views Image Fusion in Mobile Applications. 830-841 - Zhen Yang

, Wenyu Wang, Yongfeng Huang
, Xing Li:
A Multi-grained Log Auditing Scheme for Cloud Data Confidentiality. 842-850 - Kun Zhao, Wei Xi, Zhiping Jiang, Zhi Wang, Hui He, Tao Li, Xiaobin Zhang, Jizhong Zhao:

Indoor Geofencing Based on Sensorless Motion Sensing and Fingerprint Self-Updating. 851-869 - Zhiping Jiang, Chen Qian, Kun Zhao, Shuaiyu Chen, Rui Li

, Xu Wang, Chen He, Junzhao Du:
VariSecure: Facial Appearance Variance based Secure Device Pairing. 870-883 - Yang Li, Yunlong Zhao, Bin Guo

, Zhenhua Zhang, Qian Geng, Ran Wang:
An Extendable Layered Architecture for Collective Computing to Support Concurrent Multi-sourced Heterogeneous Tasks. 884-898 - Haixiang Hou, Hai Jin, Xiaofei Liao:

Cost Efficient Edge Service Placement for Crowdsensing via Bus Passengers. 899-908 - Tianqing Zhou

, Junhui Zhao, Dong Qin, Xuan Li, Chunguo Li, Luxi Yang:
Joint User Association and Time Partitioning for Load Balancing in Ultra-Dense Heterogeneous Networks. 909-922 - Shangwei Zhang, Jiajia Liu:

Ergodic Capacity Analysis on MIMO Communications in Internet of Vehicles. 923-939 - Yanbin Sun, Mohan Li, Shen Su, Zhihong Tian

, Wei Shi
, Meng Han:
Secure Data Sharing Framework via Hierarchical Greedy Embedding in Darknets. 940-948
Volume 26, Number 3, June 2021
- Fadi Al-Turjman

:
Editorial: Potential Sensors for the Forthcoming 6G/IoE - Electronics and Physical Communication Aspects. 949-951 - Wail Mardini, Shadi A. Aljawarneh

, Amnah Al-Abdi:
Using Multiple RPL Instances to Enhance the Performance of New 6G and Internet of Everything (6G/IoE)-Based Healthcare Monitoring Systems. 952-968 - P. Mohamed Shakeel, S. Baskar, Hassan Fouad

, Gunasekaran Manogaran, Vijayalakshmi Saravanan, Qin Xin:
Creating Collision-Free Communication in IoT with 6G Using Multiple Machine Access Learning Collision Avoidance Protocol. 969-980 - Linkai Chen

, Yaduan Ruan, Honghui Fan, Hongjin Zhu, XiangJun Chen, Qimei Chen:
Occlusion-Aware Detection for Internet of Vehicles in Urban Traffic Sensing Systems. 981-987 - Peng Yin, Liang Yang

, Shaofeng Du, Shengguan Qu, Bochen Jia
, Ning Zhao:
The Effect of Mobile Wearable Waist Assist Robot on Lower Back Pain during Lifting and Handling Tasks. 988-996 - Juan Wang, Zhi-Chao Liu, Jinhua Yang:

Fiber Bragg Grating Sensor Based on Refractive Index Segment Code of Mobile Modulation. 997-1007 - Huiqian Song, Dongmei Zhao, Chunyang Yuan:

Network Security Situation Prediction of Improved Lanchester Equation Based on Time Action Factor. 1008-1023 - Mu Zhou, Yaoping Li, Hui Yuan, Jiacheng Wang

, Qiaolin Pu:
Indoor WLAN Personnel Intrusion Detection Using Transfer Learning-Aided Generative Adversarial Network with Light-Loaded Database. 1024-1042 - Amrita Dahiya, Brij B. Gupta

:
A QoS Ensuring Two-Layered Multi-Attribute Auction Mechanism to Mitigate DDoS Attack. 1043-1058 - M. Vasim Babu

, Jafar Ahmad Abed Alzubi
, Ramesh Sekaran
, Rizwan Patan, Manikandan Ramachandran
, Deepak Gupta
:
An Improved IDAF-FIT Clustering Based ASLPP-RR Routing with Secure Data Aggregation in Wireless Sensor Network. 1059-1067 - Der-Jiunn Deng, Xun Yang, Mohammed Atiquzzaman

:
Editorial: Recent Advances in Wireless Internet. 1068-1069 - Endah Kristiani

, Chao-Tung Yang
, Chin-Yin Huang
, Yuan-Ting Wang, Po-Cheng Ko:
The Implementation of a Cloud-Edge Computing Architecture Using OpenStack and Kubernetes for Air Quality Monitoring Application. 1070-1092 - Chih-Cheng Tseng, Hwang-Cheng Wang, Kuo-Chang Ting, Shih-Han Lo, Fang-Chang Kuo

:
Co-Tier Uplink Power Control in Small Cell Networks by Stackelberg Game with Two-Way Pricing Mechanism. 1093-1106 - Wenbo Zhang, Guangjie Han

, Yue Liu, Jing Wang:
A Coverage Vulnerability Repair Algorithm Based on Clustering in Underwater Wireless Sensor Networks. 1107-1121 - Mao Yang

, Bo Li, Zhongjiang Yan
:
MAC Technology of IEEE 802.11ax: Progress and Tutorial. 1122-1136 - Chia-Ming Hsu, Muhammad Zulfan Azhari, He-Yen Hsieh, Setya Widyawan Prakosa

, Jenq-Shiou Leu
:
Robust Network Intrusion Detection Scheme Using Long-Short Term Memory Based Convolutional Neural Networks. 1137-1144 - Lei Liu, Chen Chen, Qingqi Pei, Sabita Maharjan, Yan Zhang:

Vehicular Edge Computing and Networking: A Survey. 1145-1168 - Song Guo, Baoliu Ye:

Editorial: 5G Wireless Communication Systems and Advanced Image Processing. 1169-1171 - Muzhou Xiong, Lin Gu

, Haixin Liu, Deze Zeng, Hong Yao, Zhuzhong Qian:
A Network Calculus Based Delay and Backlog Analysis for Cloud Radio Access Networks. 1172-1181 - Shengcheng Ma, Xin Chen, Zhuo Li, Ying Chen:

Performance Evaluation of URLLC in 5G Based on Stochastic Network Calculus. 1182-1194 - Guomin Wu, Guoping Tan, Defu Jiang, Fei Feng, Hanfu Xun, Qi Wang, Xinyu Shen, Ziming Sheng:

User-Centered Interference Coordination in the Ultra-Dense Network: a Cluster and Priority Perspective. 1195-1205 - Jingyu Hua

, Jiangang Wen
, Anding Wang, Zhijiang Xu, Feng Li:
Optimization of FBMC Waveform by Designing NPR Prototype Filter with Improved Stopband Suppression. 1206-1216 - Cuimei Cui

, Dezhi Yang, Shi Jin:
Robust Spectrum-Energy Efficiency for Green Cognitive Communications. 1217-1224 - Guangying Wang

, Xiangbin Yu
, Tao Teng:
Energy-Efficient Power Allocation Scheme for Uplink Distributed Antenna System with D2D Communication. 1225-1232 - Lihua Yang, Junhui Zhao, Feifei Gao, Yi Gong

:
Cluster-Based Joint Resource Allocation with Successive Interference Cancellation for Ultra-Dense Networks. 1233-1242 - Qinglin Yang, Xiaofei Luo, Peng Li

, Toshiaki Miyazaki, Wenfeng Shen, Weiqin Tong:
Cooperation of Mobile Devices for Fast Inference of Deep Learning Applications. 1243-1249 - Xin Wang, Xin Zhang, Hangcheng Zhu, Qiong Wang, Chen Ning:

An Effective Algorithm for Single Image Fog Removal. 1250-1258 - Chen Ning, Wenbo Liu

, Gong Zhang, Xin Wang:
An Object Recognition Approach for Synthetic Aperture Radar Images. 1259-1266 - Phan Cong Vinh:

Context-Aware Computing and Nature-Inspired Computing. 1267-1269 - Prince Sharma

, Shailendra Shukla, Amol Vasudeva
:
Data Offloading via Optimal Target Set Selection in Opportunistic Networks. 1270-1280 - Seyyed Mohammad Safi, Ali Movaghar, Komeil Safikhani Mahmoodzadeh:

A Framework for Protecting Privacy on Mobile Social Networks. 1281-1299 - Vo Thi Hong Tuyet

, Thanh Binh Nguyen
, Nguyen Kim Quoc, Ashish Khare
:
Content Based Medical Image Retrieval Based on Salient Regions Combined with Deep Learning. 1300-1310 - Hiep Xuan Huynh

, Nga My Lam Phan, Huong Hoang Luong
, Linh My Thi Ong, Hai Thanh Nguyen
, Bernard Pottier:
Brown Planthopper Sensor Network Optimization Based on Climate and Geographical Factors using Cellular Automata Technique. 1311-1328 - Hong Anh Le

:
Analyzing Energy Leaks of Android Applications Using Event-B. 1329-1338 - Nguyen Van Han, Phan Cong Vinh

:
Toward Modeling Fuzzy Dynamic System Based on Linguistic Values. 1339-1343 - Yifan Chen, Tadashi Nakano, Lin Lin, Weisi Guo, Mohammad Upal Mahfuz:

Editorial: Biologically Inspired Computing and Networking. 1344-1346 - Peng He

, Ming Liu, Chunhui Lan, Mengnan Su, Linhai Wang, Zhidu Li, Tong Tang:
Distributed Power Controller of Massive Wireless Body Area Networks based on Deep Reinforcement Learning. 1347-1358 - Jianguo Wang, Hui-Min Shao

, Yuan Yao, Jian-Long Liu, Shi-Wei Ma:
A Personalized Feature Extraction and Classification Method for Motor Imagery Recognition. 1359-1371 - Jingyi Liu

, Hengyu Li
, Jun Liu, Shaorong Xie, Jun Luo:
Real-Time Monocular Obstacle Detection Based on Horizon Line and Saliency Estimation for Unmanned Surface Vehicles. 1372-1385 - Min-Yan Tsai, Hsin-Hung Cho

:
A High Security Symmetric Key Generation by Using Genetic Algorithm Based on a Novel Similarity Model. 1386-1396 - Hsin-Te Wu

:
Developing an Intelligent Agricultural System Based on Long Short-Term Memory. 1397-1406
Volume 26, Number 4, August 2021
- Zheli Liu, Jin Li, Ilsun You, Siu-Ming Yiu:

Editorial: Security and Privacy in Computing and Communications. 1407-1411 - Xiaohan Yue, Mengzhe Xi, Bing Chen, Mingchao Gao, Yuan He

, Jian Xu
:
A Revocable Group Signatures Scheme to Provide Privacy-Preserving Authentications. 1412-1429 - Na Wang, Jian Li, Junsong Fu, Yan Zheng:

Privacy-Preserving Top-k Location-based Services Retrieval in Mobile Internet. 1430-1439 - Xianglin Wei, Tongxiang Wang, Chaogang Tang

:
Throughput Analysis of Smart Buildings-oriented Wireless Networks under Jamming Attacks. 1440-1448 - Jorge Enrique Coyac-Torres

, Mario E. Rivero-Angeles
, Eleazar Aguirre Anaya:
Cognitive Radio Based System for Best Effort Communications in Sound-based Covert Channel for IoT Environments. 1449-1460 - Man Zhou, Lansheng Han

, Hongwei Lu, Cai Fu:
Intrusion Detection System for IoT Heterogeneous Perceptual Network. 1461-1474 - Jian Xu

, Yanbo Yu, Qingyu Meng, Qiyu Wu, Fucai Zhou:
Role-Based Access Control Model for Cloud Storage Using Identity-Based Cryptosystem. 1475-1492 - Quanxin Zhang, Mengyan Zhu, Chen Liang, Kunqing Wang, Kai Yang, Yuanzhang Li:

A Timestamp-Regulating VoLTE Covert Channel against Statistical Analysis. 1493-1502 - Yuanzhang Li, Dongyan Ma, Chen Liu, Wencong Han, Hongwei Jiang, Jingjing Hu

:
An Efficient Bounded Model Checking Approach for Web Service Composition. 1503-1513 - Yong Ding

, Xiaoqing Cui, Huiyong Wang, Kun Zhang:
PRIA: a Multi-source Recognition Method Based on Partial Observation in SIR Model. 1514-1522 - Bing Jia, Lifei Hao, Chuxuan Zhang, Baoqi Huang

:
A Privacy-sensitive Service Selection Method Based on Artificial Fish Swarm Algorithm in the Internet of Things. 1523-1531 - Hao Peng, Zhe Kan, Dandan Zhao, Jianmin Han:

Security Assessment for Interdependent Heterogeneous Cyber Physical Systems. 1532-1542 - Jing Li, Xiangyan Tang, Zhijun Wei, Yu Wang, Wenbin Chen

, Yu-an Tan:
Identity-based Multi-Recipient Public Key Encryption Scheme and Its Application in IoT. 1543-1550 - Jing Li, Xiangyan Tang, Zhijun Wei, Yu Wang, Wenbin Chen

, Yu-an Tan:
Correction to: Identity-based Multi-Recipient Public Key Encryption Scheme and Its Application in IoT. 1551 - Ruitao Hou, Hequn Xian

:
A Graded Reversible Watermarking Scheme for Relational Data. 1552-1563 - Hongyu Yang

, Xugao Zhang, Fang Cheng:
A Novel Algorithm for Improving Malicious Node Detection Effect in Wireless Sensor Networks. 1564-1573 - Shaojing Fu

, Qi Zhang, Nan Jia, Ming Xu:
A Privacy-preserving Fuzzy Search Scheme Supporting Logic Query over Encrypted Cloud Data. 1574-1585 - Alagarsamy Sumithra

:
Quadratic Poly Certificateless Inductive Signcryption for Network Security. 1586-1596 - Yuechi Tian, Tong Shao

, Zhen Li:
An Efficient Scheme of Cloud Data Assured Deletion. 1597-1608 - Zhengjun Jing

, Chunsheng Gu, Chunpeng Ge, Peizhong Shi:
Cryptanalysis of a Public Key Cryptosystem Based on Data Complexity under Quantum Environment. 1609-1615 - Yutian Zhou, Yu-an Tan, Quanxin Zhang, Xiaohui Kuang, Yahong Han, Jingjing Hu:

An Evolutionary-Based Black-Box Attack to Deep Neural Network Classifiers. 1616-1629 - Chundong Wang

, Kongbo Li
, Xiaonan He:
Network Risk Assessment Based on Baum Welch Algorithm and HMM. 1630-1637 - Xueshuo Xie, Zhi Wang

, Xuhang Xiao, Ye Lu, Shenwei Huang, Tao Li:
A Confidence-Guided Evaluation for Log Parsers Inner Quality. 1638-1649 - Fang-Yie Leu, Kun-Lin Tsai

, Heru Susanto
, Cheng-Yan Gu, Ilsun You
:
A Fault Tolerant Mechanism for UE Authentication in 5G Networks. 1650-1667 - Jian Zhang

, Cheng Gao, Liangyi Gong, Zhaojun Gu, Dapeng Man, Wu Yang, Wenzhen Li:
Malware Detection Based on Multi-level and Dynamic Multi-feature Using Ensemble Learning at Hypervisor. 1668-1685 - Yunlong He, Hequn Xian

, Liming Wang, Shuguang Zhang:
Secure Encrypted Data Deduplication Based on Data Popularity. 1686-1695 - S. Sivanesh

, V. R. Sarma Dhulipala
:
Accurate and Cognitive Intrusion Detection System (ACIDS): a Novel Black Hole Detection Mechanism in Mobile Ad Hoc Networks. 1696-1704 - Dan Tang, Liu Tang

, Wei Shi, Sijia Zhan, Qiuwei Yang:
MF-CNN: a New Approach for LDoS Attack Detection Based on Multi-feature Fusion and CNN. 1705-1722 - Hui Lu, Chengjie Jin, Xiaohan Helu, Man Zhang, Yanbin Sun

, Yi Han, Zhihong Tian:
Research on Intelligent Detection of Command Level Stack Pollution for Binary Program Analysis. 1723-1732 - Xiaojie Guo, Yanyu Huang, Jinhui Ye, Sijie Yin, Min Li, Zhaohui Li

, Siu-Ming Yiu, Xiaochun Cheng
:
ShadowFPE: New Encrypted Web Application Solution Based on Shadow DOM. 1733-1746 - Trung Q. Duong, Van-Phuc Hoang

, Cong-Kha Pham
:
Convergence of 5G Technologies, Artificial Intelligence and Cybersecurity of Networked Societies for the Cities of Tomorrow. 1747-1749 - Mohammad Ranjbar, H. L. Nguyen, Nghi H. Tran

, Tutku Karacolak, Shivakumar Sastry, L. D. Nguyen:
Energy efficiency of full-duplex cognitive radio in low-power regimes under imperfect spectrum sensing. 1750-1764 - Arthur Zucker, Younes Belkada, Hanh Vu, Nam Van Nguyen

:
ClusTi: Clustering Method for Table Structure Recognition in Scanned Images. 1765-1776 - Ba Cao Nguyen

, Tran Manh Hoang
, Xuan Nam Tran, Xuan Nghia Pham, Le The Dung
:
Evaluating the Performance of Full-Duplex Energy Harvesting Vehicle-to-Vehicle Communication System over Double Rayleigh Fading Channels. 1777-1787 - Vu Thuy Linh, Vo Ngoc Quynh Tram

, Ho Minh Dung
, Dang Nguyen Dong Phuong
, Liem D. Nguyen, Long Dinh Nguyen, Cheng Yin, Ayse Kortun, Nguyen Kim Loi
:
Meteorological and Hydrological Drought Assessment for Dong Nai River Basin, Vietnam under Climate Change. 1788-1800 - Qamar Usman, Omer Chughtai

, Nadia Nawaz, Zeeshan Kaleem, Kishwer Abdul Khaliq
, Long Dinh Nguyen:
A Reliable Link-Adaptive Position-Based Routing Protocol for Flying ad hoc Network. 1801-1820
Volume 26, Number 5, October 2021
- Fan-Yi Meng

:
Editorial: Recent Advances on Communication Signal Processing and Networking. 1821-1822 - Zhuyun Fan, Jiyu Jin, Guiyue Jin

, Jun Mou
:
A Carrier Selection Method Based on Single RF Chain SM-OFDM Systems. 1823-1830 - Guiyue Jin

, Chaoyue Zhao, Zhuyun Fan, Jiyu Jin:
Antenna Selection in TDD Massive MIMO Systems. 1831-1837 - Guiyue Jin, Chaoyue Zhao, Zhuyun Fan, Jiyu Jin:

Correction to: Antenna Selection in TDD Massive MIMO Systems. 1838 - Xin Liu

, Yuyao Wang, Zhenyu Na, Mudi Xiong:
A Novel Relay-Assisted DCO-OFDM Green VLC System Based on NOMA. 1839-1848 - Jun Mou

, Feifei Yang
, Ran Chu, Yinghong Cao:
Image Compression and Encryption Algorithm Based on Hyper-chaotic Map. 1849-1861 - Feifei Yang

, Peng Li
:
Characteristics Analysis of the Fractional-Order Chaotic Memristive Circuit Based on Chua's Circuit. 1862-1870 - Peng Li, Lu Guo, Fang Wang:

A Multipath Routing Protocol with Load Balancing and Energy Constraining Based on AOMDV in Ad Hoc Network. 1871-1880 - Chengyan Li, Xin Gao

, Qingquan Sun:
Introduction of Progress in Education under Recent Technology Revolution. 1881-1883 - Zhijun Yang, Yang Wang, Jianhou Gan, Hang Li, Ning Lei:

Design and Research of Intelligent Question-Answering(Q&A) System Based on High School Course Knowledge Graph. 1884-1890 - Shuai Liu

, Tenghui He, Jianhua Dai:
A Survey of CRF Algorithm Based Knowledge Extraction of Elementary Mathematics in Chinese. 1891-1903 - Guanglu Sun, Lili Liang, Tianlin Li

, Bo Yu, Meng Wu, Bolun Zhang:
Video Question Answering: a Survey of Models and Datasets. 1904-1937 - Zhu Tiejun, Ablaye Camara:

"3 M" Performability Creative Practical Platform Application Research. 1938-1949 - Zhan Zhang, Wenhao Li

, Xiao Qing, Xian Liu, Hongwei Liu:
Research on Optimal Checkpointing-Interval for Flink Stream Processing Applications. 1950-1959 - Hongna Zhang

, Wei Yan, Chunyou Zhang, Lihua Wang:
Research on Image Fusion Algorithm Based on NSST Frequency Division and Improved LSCN. 1960-1970 - Xun Shao, Zhi Liu, Xianfu Chen

, Seng W. Loke, Hwee-Pink Tan
:
Editorial: Recent Advances on Intelligent Mobility and Edge Computing. 1971-1973 - Xiujun Wang

, Yan Gao, Yangzhao Yang, Xiao Zheng, Xuangou Wu, Wei Zhao:
An Efficient Protocol for the Tag-information Sampling Problem in RFID Systems. 1974-1985 - Qiyue Li

, Tengfei Cao, Wei Sun
, Weitao Li, Jinjin Ding, Guojun Luo, Jie Li
:
An Optimal Uplink Scheduling in Heterogeneous PLC and LTE Communication for Delay-aware Smart Grid Applications. 1986-1999 - Rui Yin, Zhiqun Zou, Celimuge Wu

, Jiantao Yuan, Xianfu Chen
:
Distributed Spectrum and Power Allocation for D2D-U Networks: a Scheme Based on NN and Federated Learning. 2000-2013 - Hong-an Li

, Min Zhang, Keping Yu
, Xin Qi, Jianfeng Tong:
A Displacement Estimated Method for Real Time Tissue Ultrasound Elastography. 2014-2023 - Pengsong Duan

, Hao Li, Bo Zhang
, Yangjie Cao, Endong Wang:
APFNet: Amplitude-Phase Fusion Network for CSI-Based Action Recognition. 2024-2034 - Fan Wu, Si Hong, Wei Zhao, Xiaoyan Wang, Xun Shao

, Xiujun Wang, Xiao Zheng:
Neural Networks with Improved Extreme Learning Machine for Demand Prediction of Bike-sharing. 2035-2045 - Catia Prandi

, Johann M. Márquez-Barja
:
Editorial: Smart Objects and Technologies for Social Good. 2046-2047 - Kiyoshy Nakamura

, Daniel Hernández
, José M. Cecilia, Pietro Manzoni
, Marco Zennaro, Juan-Carlos Cano, Carlos T. Calafate:
LADEA: A Software Infrastructure for Audio Delivery and Analytics. 2048-2054 - Armir Bujari

, Luigi De Giovanni, Claudio E. Palazzi, Daniele Ronzani
:
Location Dynamic Tabu Routing Protocol for MANETs. 2055-2065 - Chiara Ceccarini

, Silvia Mirri
, Paola Salomoni, Catia Prandi
:
On exploiting Data Visualization and IoT for Increasing Sustainability and Safety in a Smart Campus. 2066-2075 - Julien Maitre

, Kevin Bouchard, Sébastien Gaboury
:
Alternative Deep Learning Architectures for Feature-Level Fusion in Human Activity Recognition. 2076-2086 - Imre Dániel Báldy, Nikolaj Hansen, Thomas Bjørner

:
An Engaging Serious Game Aiming at Awareness of Therapy Skills Associated with Social Anxiety Disorder. 2087-2098 - Barbara Guidi, Andrea Michienzi

, Laura Ricci:
Analysis of Witnesses in the Steem Blockchain. 2099-2110 - João Paulo de Brito Gonçalves

, Henrique Cesar Carvalho de Resende, Rodolfo da Silva Villaça, Esteban Municio, Cristiano Bonato Both
, Johann M. Márquez-Barja
:
Distributed Network Slicing Management Using Blockchains in E-Health Environments. 2111-2122 - Peng Gao, Jingyi Li, Shuai Liu

:
An Introduction to Key Technology in Artificial Intelligence and big Data Driven e-Learning and e-Education. 2123-2126 - Li-xuan Li, Ying Huo, Jerry Chun-Wei Lin

:
Cross-Dimension Mining Model of Public Opinion Data in Online Education Based on Fuzzy Association Rules. 2127-2140 - Chun-yu Li, Qun Zhao, Norbert Herencsar

, Gautam Srivastava
:
The Design of Mobile Distance Online Education Resource Sharing from the Perspective of Man-Machine Cooperation. 2141-2152 - Jian-Wei Liu, Arun Kumar Sangaiah

:
Research on Adaptive Updating Method of Education Resource Index Based on Mobile Computing. 2153-2162 - Jian-Wei Liu, Arun Kumar Sangaiah

:
Correction to: Research on Adaptive Updating Method of Education Resource Index Based on Mobile Computing. 2163 - Changbo Hou, Lijie Hua, Yun Lin

, Jing Zhang, Guowei Liu
, Yihan Xiao:
Application and Exploration of Artificial Intelligence and Edge Computing in Long-Distance Education on Mobile Network. 2164-2175 - Ya-zhi Yang, Yong Zhong, Marcin Wozniak

:
Improvement of Adaptive Learning Service Recommendation Algorithm Based on Big Data. 2176-2187 - Lei Bao, Ping Yu:

Evaluation Method of Online and Offline Hybrid Teaching Quality of Physical Education Based on Mobile Edge Computing. 2188-2198 - Fei Lang, Lili Liang, Kai Huang, Teng Chen, Suxia Zhu

:
Movie Recommendation System for Educational Purposes Based on Field-Aware Factorization Machine. 2199-2205 - Rafeeq Ahmed

, Tanvir Ahmad, Fadiyah M. Almutairi, Abdulrahman M. Qahtani, Abdulmajeed Alsufyani, Omar Almutiry:
Fuzzy Semantic Classification of Multi-Domain E-Learning Concept. 2206-2215
Volume 26, Number 6, December 2021
- Yueshen Xu

, Yuyu Yin
, Li Kuang:
Special Issue on Deep Learning in Mobile and Wireless Networks: Algorithms, Models and Techniques. 2217-2218 - Xiaolong Xu

, Wuyan Liang, Jiahan Zhao, Honghao Gao:
Tiny FCOS: a Lightweight Anchor-Free Object Detection Algorithm for Mobile Scenarios. 2219-2229 - Zhongyi Zhang, Weihua Zhao, Ouhan Huang

, Gangyong Jia, Youhuizi Li, Songzhu Mei, Duan Zhao:
Edge Network Routing Protocol Base on Target Tracking Scenario. 2230-2241 - Wanru Xu, Xiaochen Fan, Tao Wu

, Wei Tao, Yue Xi, Panlong Yang, Chang Tian:
Tolerance-Oriented Wi-Fi Advertisement Scheduling: A Near Optimal Study on Accumulative User Interests. 2242-2257 - Jiaqi Yin, Huibiao Zhu, Yuan Fei:

Formal analysis and automated validation of privacy-preserving AICE protocol in mobile edge computing. 2258-2271 - Honghao Gao

, Yida Zhang, Huaikou Miao, Ramón J. Durán Barroso, Xiaoxian Yang:
SDTIOA: Modeling the Timed Privacy Requirements of IoT Service Composition: A User Interaction Perspective for Automatic Transformation from BPEL to Timed Automata. 2272-2297 - Shuyu Chang

, Rui Wang
, Haiping Huang
, Jian Luo:
TA-BiLSTM: An Interpretable Topic-Aware Model for Misleading Information Detection in Mobile Social Networks. 2298-2314 - Yulei Wu, Fei Hao

, Sambit Bakshi, Haojun Huang:
Editorial: Deep Learning for Big Data Analytics. 2315-2317 - Noushin Jafarpisheh, Effat Jalaeian Zaferani, Mohammad Teshnehlab, Hadis Karimipour, Reza M. Parizi, Gautam Srivastava

:
A Deep Neural Network Combined with Radial Basis Function for Abnormality Classification. 2318-2328 - Qindong Sun, Xingyu Feng, Shanshan Zhao, Han Cao, Shancang Li

, Yufeng Yao:
Deep Learning Based Customer Preferences Analysis in Industry 4.0 Environment. 2329-2340 - Zhen Pang, Xiang Wang, Xulong Wang, Jun Qi

, Zhong Zhao, Yuan Gao, Yun Yang, Po Yang:
A Multi-modal Data Platform for Diagnosis and Prediction of Alzheimer's Disease Using Machine Learning Methods. 2341-2352 - Jiang Zhaoxue

, Tong Li, Zhenguo Zhang, Jingguo Ge, Junling You, Liangxiong Li:
A Survey On Log Research Of AIOps: Methods and Trends. 2353-2364 - Roopali Dogra, Shalli Rani

, Sandeep Verma
, Sahil Garg
, Mohammad Mehedi Hassan:
TORM: Tunicate Swarm Algorithm-based Optimized Routing Mechanism in IoT-based Framework. 2365-2373 - Carlos Luis González-Valiente

, Magda León Santos, Ricardo Arencibia Jorge
, Ed C. M. Noyons, Rodrigo Costas
:
Mapping the Evolution of Intellectual Structure in Information Management Using Author Co-citation Analysis. 2374-2388 - Xinheng Wang

, Honghao Gao, Kaizhu Huang
:
Artificial Intelligence in Collaborative Computing. 2389-2391 - Tengfei Li

, Jing Liu, Haiying Sun, Xiaohong Chen, Ling Yin, Xia Mao, Junfeng Sun:
Runtime Verification of Spatio-Temporal Specification Language. 2392-2406 - Guichuan Zhao, Qi Jiang

, Xiaohan Huang, Xindi Ma, Youliang Tian, Jian Feng Ma:
Secure and Usable Handshake Based Pairing for Wrist-Worn Smart Devices on Different Users. 2407-2422 - Fangzheng Liu, Bofeng Lv, Jiwei Huang, Sikandar Ali

:
Edge User Allocation in Overlap Areas for Mobile Edge Computing. 2423-2433 - Jun Zeng

, Haoran Tang, Yizhu Zhao, Min Gao
, Junhao Wen
:
PR-RCUC: A POI Recommendation Model Using Region-Based Collaborative Filtering and User-Based Mobile Context. 2434-2444 - Guoming Zhang

, Lianyong Qi, Xuyun Zhang
, Xiaolong Xu
, Wanchun Dou:
Point-of-Interest Recommendation with User's Privacy Preserving in an IoT Environment. 2445-2460 - Zhe Ban, Junyan Hu

, Barry Lennox
, Farshad Arvin
:
Self-Organised Collision-Free Flocking Mechanism in Heterogeneous Robot Swarms. 2461-2471 - Rongjun Chen

, Zhijun Zheng
, Junfeng Pan, Yongxing Yu, Huimin Zhao, Jinchang Ren:
Fast Blind Deblurring of QR Code Images Based on Adaptive Scale Control. 2472-2487 - Jin Li, Xiaofeng Liao:

Security and Privacy in New Computing Environments (SPNCE 2016). 2488-2489 - Chengyu Hu, Zhen Li, Pengtao Liu, Rupeng Yang, Shanqing Guo, Hailong Zhang:

Verifiable Public-Key Encryption with Keyword Search Secure against Continual Memory Attacks. 2490-2500 - S. Priya, B. Santhi:

A Novel Visual Medical Image Encryption for Secure Transmission of Authenticated Watermarked Medical Images. 2501-2508 - Hanshu Hong, Ximeng Liu, Zhixin Sun:

A Fine-Grained Attribute Based Data Retrieval with Proxy Re-Encryption Scheme for Data Outsourcing Systems. 2509-2514 - Liangyi Gong, Chundong Wang, Hong Yang, Zhiyuan Li, Zhentang Zhao:

Fine-grained Trust-based Routing Algorithm for Wireless Sensor Networks. 2515-2524 - Kamel Karoui

, Fakher Ben Ftima:
New Engineering Method for the Risk Assessment: Case Study Signal Jamming of the M-Health Networks. 2525-2544 - Hany F. Atlam

, Robert John Walters, Gary B. Wills
, Joshua Daniel:
Fuzzy Logic with Expert Judgment to Implement an Adaptive Risk-Based Access Control Model for IoT. 2545-2557 - Douglas Kunda

, Mumbi Chishimba:
A Survey of Android Mobile Phone Authentication Schemes. 2558-2566 - Hoda Jannati

, Ebrahim Ardeshir-Larijani
, Behnam Bahrak:
Privacy in Cross-User Data Deduplication. 2567-2579

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














