


default search action
Transactions on Emerging Telecommunications Technologies, Volume 32
Volume 32, Number 1, January 2021
- Zeeshan Ahmad
, Adnan Shahid Khan, Cheah Wai Shiang, Johari Abdullah, Farhan Ahmad:
Network intrusion detection system: A systematic study of machine learning and deep learning approaches. - Rajesh Gupta
, Aparna Kumari, Sudeep Tanwar
:
Fusion of blockchain and artificial intelligence for secure drone networking underlying 5G communications.
- Xiaoyu Zhang, Marco Centenaro
, Stefano Tomasin
, Nevio Benvenuto, Xiliang Luo, Shaoshi Yang
:
A study on CSI feedback schemes exploiting feedforward information in FDD cellular systems. - Maroua Taghouti
, Tobias Waurick, Máté Tömösközi, Anil Kumar Chorppath, Frank H. P. Fitzek
:
On the joint design of compressed sensing and network coding for wireless communications. - Hamza Khan
, Petri Luoto, Sumudu Samarakoon
, Mehdi Bennis
, Matti Latva-aho:
Network slicing for vehicular communication. - Riccardo Bassoli
, Fabrizio Granelli, Sisay T. Arzo
, Marco Di Renzo:
Toward 5G cloud radio access network: An energy and latency perspective. - Raúl Parada, Hossein Soleimani
, Federico Moretto, Stefano Tomasin
, Michele Zorzi:
Statistical approaches for initial access in mmWave 5G systems. - Lei Yu
, Qingzhi Liu, Rong Hua, You Fu:
A change domain-based model repair method via Petri nets.
- Suzana Miladic-Tesic
, Goran Z. Markovic
, Nikola Nonkovic, Valentina Radojicic
:
A metaheuristic approach for source traffic grooming in elastic optical networks. - Cristiane A. Pendeza Martinez
, Taufik Abrão
:
Spectral and energy efficiency tradeoff in optical code division multiple access networks. - Caio L. M. P. Plazas
, Adelcio M. de Souza
, Daniel R. Celino
, Murilo Araújo Romero
:
Optimization of arrayed waveguide grating-filtering response for efficient analog radio-over-fiber fronthaul over a wavelength-division multiplexing passive optical network.
- Rakesh Kumar Mahendran
, Parthasarathy Velusamy
, Parthasarathy Ramadass
, Shanmugapriyan J, Prakash Pandian:
An efficient priority-based convolutional auto-encoder approach for electrocardiogram signal compression in Internet of Things based healthcare system.
- Mehmet Bilim
:
Different QAM schemes analyses for ARS fading channels. - Mukesh Kumar Maheshwari
, Mamta Agiwal
, Aurangzeb Rashid Masud:
Analytical modeling for signaling-based DRX in 5G communication. - Omer Waqar
, Muhammad Asim Ali, Mahrukh Liaqat, Ayesha Iqbal:
On the ergodic capacities of decode-and-forward MIMO relay network with simultaneous wireless information and power transfer. - Fariba Farahbakhsh, Ali Shahidinejad
, Mostafa Ghobaei-Arani
:
Multiuser context-aware computation offloading in mobile edge computing based on Bayesian learning automata. - D. Kavitha
, S. Ravikumar
:
IOT and context-aware learning-based optimal neural network model for real-time health monitoring. - Grzegorz Cisek
, Tomasz P. Zielinski
:
Validation of cloud-radio access network control unit with intra-PHY architecture: Hardware-in-the-loop framework based on frequency-domain channel models.
- V. Ravi
, Shivendra Singh, S. Sofana Reka
:
Memristor-based 2D1M architecture: Solution to sneak paths in multilevel memory.
- Francisco Ferreira de Mendonça Júnior
, Kelvin Lopes Dias
, Pedro M. d'Orey
, Zafeiris Kokkinogenis
:
FogWise: On the limits of the coexistence of heterogeneous applications on Fog computing and Internet of Vehicles. - Assieh Shahimaeen, Mohammad Javad Dehghani
:
Multistage direction-of-arrival estimation approach for noncoherent and multigroup coherent signals. - Sayed Vahid Mir-Moghtadaei
:
A new UHF/ultra wideband-radio frequency identification system to solve coexistence issues of ultra wideband-radio frequency identification and other in-band narrowband systems. - Jacques Bou Abdo, Rayane El Sibai
, Jacques Demerjian
:
Permissionless proof-of-reputation-X: A hybrid reputation-based consensus algorithm for permissionless blockchains.
- Ali Abdi Seyedkolaei
, Seyed Amin Hosseini Seno
, Ahmad Moradi:
Dynamic controller placement in software-defined networks for reducing costs and improving survivability.
- Armin Farhadi Zavleh, Hamidreza Bakhshi
:
Resource allocation in sparse code multiple access-based systems for cloud-radio access network in 5G networks. - Xuetao Zhou
, Hao Wang
, Qian Cheng, Shilian Wang, Linhua Zheng:
Secure beamforming and power-efficient artificial-noise optimization for multibeam directional modulation. - Xiangdong Jia
, Yaping Lv, Yuwan Chen, Letian Jing, Yuhua Ouyang:
Modeling and analyzing multi-tier massive multiple-input multiple-output-enabled heterogeneous networks with hybrid spectrum allocation for cluster-center and cluster-edge users. - Walaa M. AlShammari, Mohammed J. F. Alenazi:
BL-Hybrid: A graph-theoretic approach to improving software-defined networking-based data center network performance. - Ahmed El-Awamry
:
Lightweight routing protocol for low-tension narrowband powerline systems. - Simon Chege
, Tom Walingo:
Energy efficient resource allocation for uplink hybrid power domain sparse code nonorthogonal multiple access heterogeneous networks with statistical channel estimation. - Adeiza James Onumanyi
, Adnan M. Abu-Mahfouz
, Gerhard P. Hancke:
Generalized self-tuning system for adaptive threshold estimators in cognitive radio systems using swarm and evolutionary-based approaches. - Ghani Ur Rehman
, Anwar Ghani
, Muhammad Zubair
, Shahbaz Ahmad Khan Ghayyure, Shad Muhammad:
Honesty based democratic scheme to improve community cooperation for Internet of Things based vehicular delay tolerant networks. - Hannan Ali, Saif ul Islam
, Houbing Song
, Kashif Munir:
A performance-aware routing mechanism for flying ad hoc networks.
Volume 32, Number 2, February 2021
Editorial
- Amit Kumar Singh
, Xuan Liu
, Haoxiang Wang, Hoon Ko:
Recent advances in multimedia security and information hiding.
- E. Laxmi Lydia
, Joshua Samuel Raj, R. Pandi Selvam, Mohamed Elhoseny
, K. Shankar
:
Application of discrete transforms with selective coefficients for blind image watermarking. - Mohammad Tanveer
, Sweta Sharma, Reshma Rastogi, Pritam Anand:
Sparse support vector machine with pinball loss. - Kirti Kumari
, Jyoti Prakash Singh
:
Identification of cyberbullying on multi-modal social media posts using genetic algorithm. - Priyank Khare
, Vinay Kumar Srivastava
:
A Secured and Robust Medical Image Watermarking Approach for Protecting Integrity of Medical Images. - (Withdrawn) Design of multimedia blockchain privacy protection system based on distributed trusted communication.
- Anshul Sharma
, Sanjay Kumar Singh
:
A novel approach for early malware detection. - Sudipta Kumar Ghosal, Souradeep Mukhopadhyay, S. K. Sabbir Hossain, Ram Sarkar
:
Application of Lah transform for security and privacy of data through information hiding in telecommunication. - Pardeep Kumar, Manoj Diwakar
:
A novel approach for multimodality medical image fusion over secure environment. - Mukul Majhi, Arup Kumar Pal, SK Hafizul Islam
, Muhammad Khurram Khan
:
Secure content-based image retrieval using modified Euclidean distance for encrypted features. - I. Sumaiya Thaseen
, J. Saira Banu, K. Lavanya, Muhammad Rukunuddin Ghalib
, Kumar Abhishek
:
An integrated intrusion detection system using correlation-based attribute selection and artificial neural network. - Sajid Khan
, Lansheng Han, Yekui Qian, Hongwei Lu, Shi Meng Jiao:
Security of multimedia communication with game trick based fast, efficient, and robust color-/gray-scale image encryption algorithm. - Guodong Ye
, Chen Pan, Youxia Dong, Kaixin Jiao, Xiaoling Huang:
A novel multi-image visually meaningful encryption algorithm based on compressive sensing and Schur decomposition.
- Soheil Hashemi, Mani Zarei
:
Internet of Things backdoors: Resource management issues, security challenges, and detection methods.
- Matin Mortaheb
, Aliazam Abbasfar
:
Beamforming-based random access protocol for massive MIMO systems. - Malik Muhammad Saad
, Farrukh Aziz Bhatti, Adnan Zafar
, Sobia Jangsher
, Dongkyun Kim, Moazam Maqsood:
Air-interface virtualization using filter bank multicarrier and orthogonal frequency division multiplexing configurations. - Angeline Beulah Vethanayagam
, Venkateswaran Narasimhan
:
Subspace leakage reduced nonuniform sparse Fibonacci-like planar array to estimate azimuth and elevation angles of both Angle of Arrival and Angle of Departure. - Vankamamidi Srinivasa Naresh
, V. V. L. Divakar Allavarpu
, Sivaranjani Reddi:
Blockchain privacy-preserving smart contract centric multiple multiparty key agreement over large WANETs. - Manjunath G. Asuti
, Prabhugoud I. Basarkod:
An optimal clear channel assessment in IEEE 802.15.4 medium access control protocol for recurrent data transmission and long acknowledgement wait period. - Xiaojiang Wu, Guobing Li
, Guomei Zhang:
User activity detection for massive Internet of things with an improved residual convolutional neural network. - Lianghui Ding, Yiqing Jin
, Feng Tian, Feng Yang, Liang Qian, Cheng Zhi:
Multiobjective ant lion optimizer based network planning for Internet of Things on TV white space. - Dharminder Dharminder
:
LWEDM: Learning with error based secure mobile digital rights management system. - Ikram Ullah
, Munam Ali Shah
, Abid Khan, Gwanggil Jeon:
Privacy-preserving multilevel obfuscation scheme for vehicular network. - Anshu Kumar Dwivedi
, Awadesh K. Sharma:
I-FBECS: Improved fuzzy based energy efficient clustering using biogeography based optimization in wireless sensor network. - Kehinde Oluwasesan Odeyemi
, Pius A. Owolawi, Oladayo Olufemi Olakanmi:
On secure transmission in hybrid satellite-terrestrial cooperative network with untrusted energy harvesting relay and imperfect channel estimation.
Volume 32, Number 3, March 2021
- Teena Sharma
, Abdellah Chehri, Paul Fortier
:
Review of optical and wireless backhaul networks and emerging trends of next generation 5G and 6G technologies. - Juan Antonio Guerrero Ibáñez, Juan Contreras-Castillo
, Sherali Zeadally:
Deep learning support for intelligent transportation systems. - Ahmed Slalmi, Hasna Chaibi, Abdellah Chehri
, Rachid Saadane
, Gwanggil Jeon:
Toward 6G: Understanding network requirements and key performance indicators. - Aliyu Gana Yisa
, Tooska Dargahi
, Sana Belguith
, Mohammad Hammoudeh
:
Security challenges of Internet of Underwater Things: A systematic literature review.
- Yang Chen, Zhongpei Zhang, Binrui Li:
Enhancing physical layer security via a UAV friendly jammer for NOMA-based IoT systems with imperfect CSI. - Ahmad Gomaa, Ayman Elezabi, Mohamed Hussein Eissa
:
Low-complexity subspace method for I/Q imbalance estimation in low-IF receivers with unknown fading. - Shah Khalid Khan
:
Mathematical framework for 5G-UAV relay. - Shibao Li
, Wei Ye
, Lin Guo, Jianhang Liu, Tingpei Huang
, Xue-rong Cui, Yucheng Zhang:
The interference alignment scheme based on subspace differentiation for multicell multiuser multiple-input-multiple-output uplink channels. - Eesa A. Alsolami
:
Replication-aware secure resource administration scheme for Internet of Things-smart city applications. - Sutanu Ghosh
:
On outage analysis of nonlinear radio frequency energy harvesting based cooperative communication in cognitive radio network. - Jimmy Ming-Tai Wu, Gautam Srivastava
, Unil Yun, Shahab Tayeb, Jerry Chun-Wei Lin
:
An evolutionary computation-based privacy-preserving data mining model under a multithreshold constraint. - Mohammad Ammad Uddin
, Muhammad Ayaz
, Ali Mansour
, El-Hadi M. Aggoune, Ahmad Hani El Fawal
, Imran Razzak
:
Ground target finding mechanism for unmanned aerial vehicles to secure crop field data. - Meet Kumari
, Reecha Sharma, Anu Sheetal:
Performance analysis of long-reach 40/40 Gbps mode division multiplexing-based hybrid time and wavelength division multiplexing passive optical network/free-space optics using Gamma-Gamma fading model with pointing error under different weather conditions. - Peter Jung
, Guido Horst Bruck:
Sounding and modeling of the indoor aerial acoustic transmission channel. - Diksha Rangwani
, Dipanwita Sadhukhan
, Sangram Ray
, Muhammad Khurram Khan
, Mou Dasgupta
:
An improved privacy preserving remote user authentication scheme for agricultural wireless sensor network. - Peng Wei
, Shilian Wang, Junshan Luo
:
Adaptive modem and interference suppression based on deep learning. - Changyoung An
, Heung-Gyoon Ryu
:
Multiple-input multiple-output system design of multidimensional orthogonal frequency division multiplexing system with coded direct index modulation. - Temur ul Hassan, Muhammad Asim
, Thar Baker
, Jawad Hassan, Noshina Tariq
:
CTrust-RPL: A control layer-based trust mechanism for supporting secure routing in routing protocol for low power and lossy networks-based Internet of Things applications. - Manal Al-Bzoor
, Esraa Al-Assem, Luay Alawneh
, Yaser Jararweh
:
Autonomous underwater vehicles support for enhanced performance in the Internet of underwater things. - Elavel Visuvanathan Ganesan
, Jaya Thangappan:
CFO and STO estimation and correction in multicarrier communications using linear filter bank multicarrier.
Volume 32, Number 4, April 2021
- Waled Gheth
, Khaled M. Rabie, Bamidele Adebisi
, Muhammad Ijaz, Georgina Harris
:
Communication systems of high-speed railway: A survey. - Haitham Hassan M. Mahmoud
, Amira A. Amer
, Tawfik Ismail
:
6G: A comprehensive survey on technologies, applications, challenges, and research problems.
- Jian Cao
, Xingwei Wang, Min Huang, Bo Yi
, Qiang He:
A security-driven network architecture for routing in industrial Internet of Things. - Hsuan-Fu Wang, Fang-Biau Ueng
, Ye-Shun Shen, Kai-Xiang Lin:
Low-complexity receivers for massive MIMO-GFDM communications. - Mangayarkarasi Ramaiah
, Vanmathi Chandrasekaran
, Vinayakumar Ravi
, Neeraj Kumar
:
An intrusion detection system using optimized deep neural network architecture. - Randhir Kumar
, Rakesh Tripathi:
DBTP2SF: A deep blockchain-based trustworthy privacy-preserving secured framework in industrial internet of things systems. - Gokhan Altan
:
SecureDeepNet-IoT: A deep learning application for invasion detection in industrial Internet of Things sensing systems. - Muddasir Rahim, Shaukat Ali, Ahmad Naseem Alvi, Muhammad Awais Javed
, Muhammad Imran, Muhammad Ajmal Azad
, Dong Chen
:
An intelligent content caching protocol for connected vehicles. - Awais Aziz Shah
, Giuseppe Piro
, Luigi Alfredo Grieco
, Gennaro Boggia
:
A quantitative cross-comparison of container networking technologies for virtualized service infrastructures in local computing environments. - Jaya Singh
, S. Venkatesan:
Blockchain mechanism with Byzantine fault tolerance consensus for Internet of Drones services. - Ehsan Zadkhosh, Hossein Bahramgiri
, Masoud Sabaei
:
Middlebox selection optimization via an intelligent framework in software-defined networking. - Yunyi Fang, Yanqi Zhao, Yong Yu
, Hui Zhu
, Xiaojiang Du, Mohsen Guizani
:
Blockchain-based privacy-preserving valet parking for self-driving vehicles. - Suzan Hajj
, Rayane El Sibai
, Jacques Bou Abdo, Jacques Demerjian
, Abdallah Makhoul, Christophe Guyeux:
Anomaly-based intrusion detection systems: The requirements, methods, measurements, and datasets. - Kambham Jacob Silva Lorraine
, Madhu Ramarakula
:
An efficient interference mitigation approach for NavIC receivers using improved variational mode decomposition and wavelet packet decomposition. - Philippe Fabian, Abderrezak Rachedi
, Cédric Gueguen:
Selection of relays based on the classification of mobility-type and localized network metrics in the Internet of Vehicles.
Volume 32, Number 5, May 2021
Editorial
- Ximeng Liu, Yi Mu, Jianting Ning, Qingchen Zhang:
Securing the Internet-of-Things: Advances, challenges, future trends.
- Junshuai Sun, Qi Jiang
, Jianfeng Ma, Qingfeng Cheng
, Chih-Lin I, Chengguang Yin:
Fuzzy vault-based three-factor authentication and key exchange for 5G-integrated wireless sensor networks. - Pankaj Kumar
, Lokesh Chouhan
:
Design of secure session key using unique addressing and identification scheme for smart home Internet of Things network. - Leki Chom Thungon
, Nurzaman Ahmed
, Subhas Chandra Sahana, Md. Iftekhar Hussain:
A lightweight authentication and key exchange mechanism for IPv6 over low-power wireless personal area networks-based Internet of things. - Yong Gan
, Bingli Wang, Yuan Zhuang, Yuan Gao, Zhigang Li, Qikun Zhang:
An asymmetric group key agreement protocol based on attribute threshold for Internet of Things. - Jing Gong, Yurong Mei
, Feng Xiang, Hanshu Hong, Yibo Sun, Zhixin Sun:
A data privacy protection scheme for Internet of things based on blockchain. - Jinbo Xiong
, Hui Liu, Biao Jin
, Qi Li
, Zhiqiang Yao
:
A lightweight privacy protection scheme based on user preference in mobile crowdsensing. - Gaopan Hou
, Jianfeng Ma, Chen Liang, Jiayi Li:
Efficient audit protocol supporting virtual nodes in cloud storage. - Yun Jiang
, Bowen Zhao, Shaohua Tang, Hao-Tian Wu
:
A verifiable and privacy-preserving multidimensional data aggregation scheme in mobile crowdsensing. - Chin-Ling Chen
, Tsai-Tung Yang, Yong-Yuan Deng
, Chi-Hua Chen
:
A secure Internet of Things medical information sharing and emergency notification system based on nonrepudiation mechanism. - Rongna Xie
, Hui Li, Guozhen Shi, Yunchuan Guo, Ben Niu, Mang Su:
Provenance-based data flow control mechanism for Internet of things. - Fangwei Wang
, Shaojie Yang
, Qingru Li, Changguang Wang:
An internet of things malware classification method based on mixture of experts neural network. - Yichuan Wang, Binbin Bai
, Xinhong Hei, Lei Zhu, Wenjiang Ji:
An unknown protocol syntax analysis method based on convolutional neural network. - Mengfan Xu
, Xinghua Li, Yunwei Wang, Bin Luo, Jingjing Guo:
Privacy-preserving multisource transfer learning in intrusion detection system. - Zuobin Ying
, Yun Zhang, Shuanglong Cao, Shengmin Xu, Maode Ma:
OIDPR: Optimized insulin dosage via privacy-preserving reinforcement learning. - Xudong Dong
, Chen Dong
, Zhenyi Chen
, Ye Cheng
, Bo Chen
:
BotDetector: An extreme learning machine-based Internet of Things botnet detection model. - Zhipeng Yu, Hui Zhu
, Rui Xiao, Chao Song, Jian Dong, Hui Li:
Detection and defense against network isolation attacks in software-defined networks. - Jingjing Wang, Lansheng Han, Man Zhou, Wenkui Qian, Dezhi An:
Adaptive evaluation model of web spam based on link relation. - Yaobo Xia
, Bowen Zhao, Shaohua Tang, Hao-Tian Wu:
Repot: Real-time and privacy-preserving online task assignment for mobile crowdsensing. - Hadjer Benhadj Djilali
, Djamel Tandjaoui, Hamza Khemissa:
Enhanced dynamic team access control for collaborative Internet of Things using context. - Mohammad Ali
, Mohammad-Reza Sadeghi
:
Provable secure lightweight attribute-based keyword search for cloud-based Internet of Things networks. - J. Jithish
, Sriram Sankaran:
A game-theoretic approach for ensuring trustworthiness in cyber-physical systems with applications to multiloop UAV control.
Volume 32, Number 6, June 2021
Editorial
- Honghao Gao, Yuyu Yin
, Guangjie Han
, Wenbing Zhao:
Edge computing: Enabling technologies, applications, and services.
- Junluo Yin, Xiong Luo
, Yueqin Zhu, Weiping Wang, Long Wang, Chao Huang, Jenq-Haur Wang:
An edge computing-based predictive evaluation scheme toward geological drilling data using long short-term memory network. - Jiawei Tan, Wei Liu, Tian Wang
, Ming Zhao
, Anfeng Liu
, Shaobo Zhang
:
A high-accurate content popularity prediction computational modeling for mobile edge computing using matrix completion technology. - Kun Zhao, Xiaoxian Yang, Wei Xi, Zhiping Jiang, Xiaohong Wang, Zhi Wang, Xinyuan Ji, Zhao Yang, Jizhong Zhao:
HCAR: Human continuous activity recognition using latent structure features. - Zhongqin Bi, Yuanyuan Ma
, Xiaoxian Yang, Ping Zhou:
Research on wireless robot path planning under edge computing considering multistep searching and inflection points. - Zhenquan Qin, Xu Xia
, Bingxian Lu, Chen Qian, Lei Wang, Chuan Lin:
Traffic data reconstruction based on compressive sensing with neighbor regularization. - Liang Chen, Yangjun Xu
, Fenfang Xie, Min Huang, Zibin Zheng
:
Data poisoning attacks on neighborhood-based recommender systems. - Muhammad Ahmad Rathore
, Muhammad Usman
, JongWon Kim:
Maintaining SmartX multi-view visibility for OF@TEIN+ distributed cloud-native edge boxes. - Jun Zeng
, Xin He, Haoran Tang, Junhao Wen:
Predicting the next location: A self-attention and recurrent neural network model with temporal context. - Yu Li
, Wenjian Xu:
Utilizing the column imprints to accelerate no-partitioning hash joins in large-scale edge systems. - Saptarshi Ghosh
, Muddesar Iqbal
, Tasos Dagiuklas:
A centralized hybrid routing model for multicontroller SD-WANs.
- Gagangeet Singh Aujla, Neeraj Kumar, Biplab Sikdar
, Kim-Kwang Raymond Choo
:
Security and privacy solutions in edge envisioned connected things environment.
- Vinod Kumar
, Rakesh Kumar Jha
, Sanjeev Jain
:
ANGUISH: Security attack in narrowband-Internet of Things (NB-IoT) using game theory and hardware analysis. - João B. A. Gomes, Joel J. P. C. Rodrigues
, Ricardo A. L. Rabêlo, Sudeep Tanwar
, Jalal Al-Muhtadi, Sergey Kozlov:
A novel Internet of things-based plug-and-play multigas sensor for environmental monitoring. - Arpita Bhargava
, Shekhar Verma:
DEIT: Dempster Shafer Theory-based edge-centric Internet of Things-specific trust model. - Mohit Mittal
, Celestine Iwendi
, Suleman Khan, Abdul Rehman Javed
:
Analysis of security and energy efficiency for shortest route discovery in low-energy adaptive clustering hierarchy protocol using Levenberg-Marquardt neural network and gated recurrent unit for intrusion detection system. - Amanpreet Singh, Maninder Kaur
:
Cuckoo inspired stacking ensemble framework for content-based cybercrime detection in online social networks. - Bhoopesh Singh Bhati
, Garvit Chugh
, Fadi Al-Turjman
, Nitesh Singh Bhati
:
An improved ensemble based intrusion detection technique using XGBoost. - Suleman Khan
, Kashif Kifayat
, Ali Kashif Bashir
, Andrei V. Gurtov
, Mehdi Hassan:
Intelligent intrusion detection system in smart grid using computational intelligence and machine learning. - Ahmed Demirpolat
, Alper Kaan Sarica
, Pelin Angin
:
ProtÉdge: A few-shot ensemble learning approach to software-defined networking-assisted edge security. - Vinay Bhardwaj
, Navdeep Kaur
, Sahil Vashisht
, Sushma Jain:
SecRIP: Secure and reliable intercluster routing protocol for efficient data transmission in flying ad hoc networks. - Anshu Thakur, Ashok Kumar, Nitin Gupta
:
Secrecy analysis of multiple-input multiple-output underlay cognitive radio networks with energy harvesting. - Peiying Zhang
, Fanglin Liu, Sahil Vashisht
, Ravinder Singh Mann:
A robust network measurement and feature selection strategy for software-defined edge computing environment. - Visvam Devadoss Ambeth Kumar
, Abhishek Kumar
, Ranbir Singh Batth
, Mamoon Rashid
, Sachin Kumar Gupta
, Manish Raghuraman
:
Efficient data transfer in edge envisioned environment using artificial intelligence based edge node algorithm. - Xiaoming Yuan
, Zheyu Zhao, Haiyang Wang, Lin Zhang, Amir Taherkordi, Hua Yu:
MDMH: An improved multi-attribute decision-making and highest response ratio next-based computation offloading approach for wireless body area networks. - Sourav Saha
, Durbadal Chattaraj
, Basudeb Bera
, Ashok Kumar Das
:
Consortium blockchain-enabled access control mechanism in edge computing based generic Internet of Things environment. - Shichang Xuan
, Zhiyu Chen, Ilyong Chung, Haowen Tan, Dapeng Man, Xiaojiang Du, Wu Yang, Mohsen Guizani
:
ECBCM: A prestige-based edge computing blockchain security consensus model. - Rajesh Gupta
, Aparna Kumari
, Sudeep Tanwar
:
A taxonomy of blockchain envisioned edge-as-a-connected autonomous vehicles. - Yusuf Muhammad Tukur
, Dhavalkumar Thakker
, Irfan-Ullah Awan:
Edge-based blockchain enabled anomaly detection for insider attack prevention in Internet of Things. - Prabhat Kumar
, Randhir Kumar
, Govind P. Gupta, Rakesh Tripathi:
A Distributed framework for detecting DDoS attacks in smart contract-based Blockchain-IoT Systems by leveraging Fog computing. - Sudip Maitra, Venkata P. Yanambaka, Deepak Puthal, Ahmed Abdelgawad, Kumar Yelamarthi
:
Integration of Internet of Things and blockchain toward portability and low-energy consumption.
Volume 32, Number 7, July 2021
Editorial
- Deepak Gupta
, Victor Hugo C. de Albuquerque, Utku Kose
:
Special issue on deep network based industrial Internet of Things applications.
- Arnab Barua
, Chunxi Dong, Xiaodong Yang
:
A deep learning approach for detecting tic disorder using wireless channel information. - Aditya Khamparia
, Prakash Kumar Singh, Poonam Rani, Debabrata Samanta
, Ashish Khanna
, Bharat Bhushan
:
An internet of health things-driven deep learning framework for detection and classification of skin cancer using transfer learning. - Ben Sujitha
, Velmurugan Subbiah Parvathy
, E. Laxmi Lydia
, Poonam Rani, Zdzislaw Pólkowski, K. Shankar
:
Optimal deep learning based image compression technique for data transmission on industrial Internet of things applications. - Muhammad Shahid Iqbal
, Iftikhar Ahmad
, Luo Bin, Suleman Khan
, Joel J. P. C. Rodrigues
:
Deep learning recognition of diseased and normal cell representation. - Ibrahim M. El-Hasnony, Reham R. Mostafa
, Mohamed Elhoseny
, Sherif I. Barakat:
Leveraging mist and fog for big data analytics in IoT environment. - Jafar Ahmad Abed Alzubi:
Bipolar fully recurrent deep structured neural learning based attack detection for securing industrial sensor networks. - Dukka Karun Kumar Reddy
, Himansu Sekhar Behera, Janmenjoy Nayak, Pandi Vijayakumar, Bighnaraj Naik
, Pradeep Kumar Singh
:
Deep neural network based anomaly detection in Internet of Things network traffic tracking for the applications of future smart cities. - Mehul Sharma, Shrid Pant
, Deepak Kumar Sharma
, Koyel Datta Gupta
, Vidushi Vashishth, Anshuman Chhabra:
Enabling security for the Industrial Internet of Things using deep learning, blockchain, and coalitions. - Deepika Sharma, Gagangeet Singh Aujla
, Rohit Bajaj
:
Deep neuro-fuzzy approach for risk and severity prediction using recommendation systems in connected health care.
- Xuan Liu
, Pascal Lorenz
, Periklis Chatzimisios, Syed Hassan Ahmed
, Safdar Hussain Bouk
, Honghao Gao:
Integration of satellite-aerial-terrestrial networks.
- Shah Khalid Khan
, Usman Naseem, Haris Siraj, Imran Razzak
, Muhammad Imran:
The role of unmanned aerial vehicles and mmWave in 5G: Recent advances and challenges. - Cui-Qin Dai
, Guangyan Liao, Qianbin Chen:
Service-oriented routing with Markov space-time graph in low earth orbit satellite networks. - Najam Ul Hasan
, Waleed Ejaz
, Manaf Zghaibeh, Naveed Ejaz
, Bander A. Alzahrani
:
On seamless and high-bandwidth connectivity for cognitive multi-unmanned aerial vehicle-assisted networks. - Javed Iqbal
, Murad Khan, Muhammad Afaq
, Amjad Ali:
Performance analysis of vertical handover techniques based on IEEE 802.21: Media independent handover standard. - Izwa Altaf, Muhammad Arslan Akram, Khalid Mahmood
, Saru Kumari
, Hu Xiong, Muhammad Khurram Khan
:
A novel authentication and key-agreement scheme for satellite communication network. - Diwankshi Sharma
, Sachin Kumar Gupta
, Aabid Rashid, Sumeet Gupta
, Mamoon Rashid
, Ashutosh Srivastava:
A novel approach for securing data against intrusion attacks in unmanned aerial vehicles integrated heterogeneous network using functional encryption technique. - D. Udaya Suriya Rajkumar
, P. Sunil Gavaskar, Fadi Al-Turjman
, R. Sathiyaraj, Balamurugan Balusamy
:
Artificial bee colony method for identifying eavesdropper in terrestrial cellular networks. - Amrita Mohan
, Amit Kumar Singh
, Basant Kumar, Ramji Dwivedi
:
Review on remote sensing methods for landslide detection using machine and deep learning. - Xiangjuan Liu
:
Analysis in big data of satellite communication network based on machine learning algorithms. - Gowtham Rajmohan, Chandru Vignesh Chinnappan
, John William Alfred Daniel
, Sivaparthipan Chandrakrishan Balakrishnan, Bala Anand Muthu
, Gunasekaran Manogaran:
Revamping land coverage analysis using aerial satellite image mapping. - Ajay Kumar
, Kumar Abhishek
, Amit Kumar Singh
, Pranav Nerurkar
, Madhav Chandane
, Sunil Bhirud, Dhiren R. Patel, Yann Busnel
:
Multilabel classification of remote sensed satellite imagery. - Farheen Syed, Sachin Kumar Gupta
, Saeed Hamood Alsamhi
, Mamoon Rashid
, Xuan Liu
:
A survey on recent optimal techniques for securing unmanned aerial vehicles applications.
Volume 32, Number 8, August 2021
Editorial
- Deze Zeng
, Ruidong Li
, Zhi Zhou, Ruiting Zhou, Rami Langar, Md. Zakirul Alam Bhuiyan:
Editorial for Special Issue on Flexible Cloud and Edge for Internet-of-Things.
- Zhuo Li, Lihan Zhang
, Xin Chen:
Incentive mechanism design for edge-cloud collaboration in mobile crowd sensing. - Junxiao Ge, Bin Liu, Tian Wang
, Qiang Yang, Anfeng Liu, Ang Li:
Q-learning based flexible task scheduling in a global view for the Internet of Things. - Abdullah Aljumah
, Avneet Kaur, Munish Bhatia
, Tariq Ahamed Ahanger
:
Internet of things-fog computing-based framework for smart disaster management. - Wande Chen, Zhenke Chen, Dingding Li
, Hai Liu, Yong Tang:
Low-overhead inline deduplication for persistent memory. - Yang Wang, Kun Yang, Weixiang Wan, Haibo Mei
:
Adaptive energy saving algorithms for Internet of Things devices integrating end and edge strategies. - Weipeng Jing, Qiucheng Miao
, Houbing Song
, Yaqiu Liu:
An energy efficient and resource-constrained scheduling framework for smart city application. - Xiaohui Gu
, Guoan Zhang
, Yujie Cao:
Cooperative mobile edge computing-cloud computing in Internet of vehicle: Architecture and energy-efficient workload allocation. - Samer Khasawneh
, Michel Kadoch:
ECS-CP-ABE: A lightweight elliptic curve signcryption scheme based on ciphertext-policy attribute-based encryption to secure downlink multicast communication in edge envisioned advanced metering infrastructure networks. - Morteza Dadashi Gavaber, Amir Rajabzadeh
:
BADEP: Bandwidth and delay efficient application placement in fog-based IoT systems. - Zengshi Qin
, Fei Xu, Yue Xie, Zhuoya Zhang, Gaojie Li:
An improved Top-K algorithm for edge servers deployment in smart city.
- Alireza Souri
, Saru Kumari, Mohamed Elhoseny
:
Privacy-aware resource management solutions in Internet of Things.
- Tehsin Kanwal, Adeel Anjum, Abid Khan, Alia Asheralieva
, Gwanggil Jeon
:
A formal adversarial perspective: Secure and efficient electronic health records collection scheme for multi-records datasets. - Yingzhe Hou
, Xin Huang, Yanan Chen, Sachin Kumar Gupta
, Hu Xiong:
Heterogeneous Signcryption Scheme Supporting Equality Test from PKI to CLC toward IoT. - Bharti Rana
, Yashwant Singh, Pradeep Kumar Singh
:
A systematic survey on internet of things: Energy efficiency and interoperability perspective. - Sankar Sennan, Ramasubbareddy Somula, Ashish Kumar Luhach
, Ganesh Gopal Deverajan
, Waleed S. Alnumay
, N. Z. Jhanjhi
, Uttam Ghosh
, Pradip Kumar Sharma
:
Energy efficient optimal parent selection based routing protocol for Internet of Things using firefly optimization algorithm. - Chong Ye, Wenting Cao, Shijun Chen:
Security challenges of blockchain in Internet of things: Systematic literature review.
Volume 32, Number 9, September 2021
- Saeed Hamood Alsamhi
, Brian Lee, Mohsen Guizani
, Neeraj Kumar
, Yuansong Qiao
, Xuan Liu
:
Blockchain for decentralized multi-drone to combat COVID-19 and future pandemics: Framework and proposed solutions. - Poonam Yadav, Sandeep Kumar
, Rajesh Kumar
:
A comprehensive survey of physical layer security over fading channels: Classifications, applications, and challenges.
- Chengzhe Lai
, Guanjie Li, Dong Zheng:
SPSC: A secure and privacy-preserving autonomous platoon setup and communication scheme. - Arun Murugesan
, Saminathan Balamurali, Fadi Al-Turjman
, R. Lakshmana Kumar
:
Analysis on homomorphic technique for data security in fog computing. - Munish Bhatia
, Avneet Kaur:
Quantum computing inspired framework of student performance assessment in smart classroom. - Bo Li
, Peng Hou
, Hao Wu
, Rongrong Qian, Hongwei Ding:
Placement of edge server based on task overhead in mobile edge computing environment. - Luying Huang
, Tao Xu, Xueqiang Chen, Yitao Xu, Xiao Zhang, Gui Fang:
Joint relay and channel selection in relay-aided anti-jamming system: A reinforcement learning approach. - Khalil F. Ramadan, Khaled Ramadan, Taha E. Taha, Moawad I. Dessouky, Fathi E. Abd El-Samie:
Performance improvement of data transmission using a hybrid underwater and terrestrial system. - Mohammad Hossein Bahonar
, Mohammad Javad Omidi
:
Distributed pricing-based resource allocation for dense device-to-device communications in beyond 5G networks. - Anuradha Banerjee, Abu Sufian, Ali Safaa Sadiq
, Seyedali Mirjalili
:
Minimum energy transmission forest-based geocast in software-defined wireless sensor networks. - Felipe Kurpiel Jose, Luis Henrique Assumpção Lolis, Samuel Baraldi Mafra, Eduardo Parente Ribeiro
:
Spectral efficiency analysis for massive MIMO orthogonal frequency division multiplexing and filter bank multicarrier in a realistic scenario using signal-to-noise-and-distortion ratio and interpolation for different modulation coding schemes. - M. Revanesh
, Venugopalachar Sridhar:
A trusted distributed routing scheme for wireless sensor networks using blockchain and meta-heuristics-based deep learning technique. - Qingbo Wang
, Gaoqi Dou, Jiali Liu, Jun Gao:
Coordinate interleaved orthogonal frequency division multiplexing with index modulation-based orthogonal cooperative system. - Ting Peng, Haohao Wang, Cangming Liang, Pingping Dong, Yehua Wei, Jianping Yu, Lianming Zhang
:
Value-aware cache replacement in edge networks for Internet of Things. - Ramachandra Reddy Konda
, Narmadha Thirunavvukkarasu Velayudham, Ramesh Venkatesan PG:
Performance analysis of coherent free-space optics transmission link using in-phase quadrature modulator-based polarization multiplexed-256-quadrature amplitude modulation. - Xuejing Li
, Yajuan Qin, Huachun Zhou, Zhewei Zhang:
An intelligent collaborative inference approach of service partitioning and task offloading for deep learning based service in mobile edge computing networks. - Linghui Zeng
, Jianzhao Zhang:
Multi-agent spectrum access with sensing skipping based on reinforcement learning. - Adedoyin Ahmed Hussain
, Fadi Al-Turjman
:
Artificial intelligence and blockchain: A review. - Lei Xiong
, Zhengyu Zhang, Dongpin Yao:
Dynamic Doppler prediction in high-speed rail using long short-term memory neural network. - Yiming Xiao, Liang Liu, Zuchao Ma, Zijie Wang, Weizhi Meng
:
Defending co-resident attack using reputation-based virtual machine deployment policy in cloud computing. - Eshita Rastogi, Mukesh Kumar Maheshwari
, Abhishek Roy, Navrati Saxena, Dong Ryeol Shin:
A novel safety message dissemination framework in LTE-V2X system. - Mohammad Javad Nassiri, Shahram Etemadi Borujeni:
A novel approach on femtocell placement in the commercial buildings using genetic algorithm. - Yuxin Shi
, Xinjin Lu
, Junshan Luo
, Shilian Wang:
Subblock design aided orthogonal frequency division multiplexing with all index modulation using search algorithm. - Pelin Görgel
:
A brain tumor detection system using gradient based watershed marked active contours and curvelet transform.
Volume 32, Number 10, October 2021
- Volkan Özduran
, Nurul Huda Mahmood, Hatim Chergui:
Power-domain non-orthogonal multiple access based full-duplex one-way wireless relaying network. - Ashutosh Mishra
, Manmath Narayan Sahoo
, Anurag Satpathy
:
H3CSA: A makespan aware task scheduling technique for cloud environments. - Hind Bangui
, Mouzhi Ge, Barbora Buhnova
, Le Hong Trang
:
Towards faster big data analytics for anti-jamming applications in vehicular ad-hoc network. - Álisson Assis Cardoso
, Marcus Vinicius Gonzaga Ferreira
, Flávio Henrique Teles Vieira
:
Delay bound estimation for multicarrier 5G systems considering lognormal beta traffic envelope and stochastic service curve. - Swathi Sugumar
, Sakthivel Murugan Santhanam
:
Design of filamentary planar spiral coils with enhanced channel model for magnetic induction based underground communication. - Wilson de Souza Junior, Thiago Augusto Bruza Alves
, Taufik Abrão
:
Antenna selection in nonorthogonal multiple access multiple-input multiple-output systems aided by machine learning. - Rahul Makkar
, Akshita Gupta, Divyang Rawal, Nikhil Sharma
:
Spectrally efficient M-ary QAM based multi-antenna cooperative system over TWDP fading channel. - Khadiga Eltira, Nareeman Jibreel, Abdelhamid Younis
, Raed Mesleh:
Capacity analysis of cooperative amplify and forward multiple-input multiple-output systems. - Sourish Chatterjee
, Deblina Sabui
, Gufran S. Khan, Biswanath Roy:
Signal to interference plus noise ratio improvement of a multi-cell indoor visible light communication system through optimal parameter selection complying lighting constraints. - Xinbin Li, Haihong Zhao, Song Han
, Binghan Wang, Zhixin Liu:
Robust joint resource allocation algorithm for hierarchical underwater acoustic communication networks based on outage probability minimization. - Juno Vitorino Saraiva
, Francisco Rafael Marques Lima
, Alexandre Matos Pessoa
, Tarcisio Ferreira Maciel
, Walter da Cruz Freitas Junior
, Francisco Rodrigo Porto Cavalcanti
:
Energy-efficient radio resource allocation for dual-hop relay-assisted orthogonal frequency division multiple access systems with quality of service provisioning. - Zhenlei Dan, Min Lin, Xiaoyu Liu, Jian Ouyang, Wei-Ping Zhu:
On the ergodic sum rate for multisource multidestination unmanned aerial vehicle relaying. - Lukas Grinewitschus
, Hamza Almujahed, Maria Fresia, Markus Mueck, Guido Bruck, Peter Jung
:
Large device to device communication network including airborne drones for emergency scenarios. - Abdullah Al-Hasanat
, Saud Althunibat
, Mohanad Alhasanat
, Moath Alsafasfeh:
Index modulation based decision gathering schemes for wireless sensor networks. - Osama AlQahtani
, Frederick T. Sheldon:
Validation of VANET message dissemination algorithms otherwise vulnerable to broadcast storms in urban contexts. - Jalil Etminan
, Farahnaz Mohanna
, Ghosheh Abed Hodtani:
Effects of relay and side information at one encoder on the coverage regions in Gaussian multiple-access channel. - Lehlohonolo Edwin Sekokotoana
, Fambirai Takawira, Olutayo Oyeyemi Oyerinde
:
Successive interference cancelation-inspired channel estimation for downlink non-orthogonal multiple access. - Lejun Zhang, Minghui Peng, Weizheng Wang, Zilong Jin, Yansen Su, Huiling Chen
:
Secure and efficient data storage and sharing scheme for blockchain-based mobile-edge computing. - Mili Dhar
, Bidyut K. Bhattacharyya, Mrinal Kanti Debbarma, Swapan Debbarma
:
A new optimization technique to solve the latency aware controller placement problem in software defined networks. - Muhammad Faraz Hyder
, Muhammad Ali Ismail:
Toward Domain Name System privacy enhancement using intent-based Moving Target Defense framework over software defined networks. - Safwan Hafeedh Younus
:
Collaborative Transmitters Management for Multi-user Indoor VLC Systems. - Omer Waqar
:
Performance analysis for IRS-aided communication systems with composite fading/shadowing direct link and discrete phase shifts.
- Zsombor Petho
, Árpád Török
, Zsolt Szalay:
A survey of new orientations in the field of vehicular cybersecurity, applying artificial intelligence based methods. - Aashima Sharma
, Sanmeet Kaur
, Maninder Singh
:
A comprehensive review on blockchain and Internet of Things in healthcare. - Vikas Hassija, Sherali Zeadally, Ishan Jain, Aman Tahiliani, Vinay Chamola
, Shashank Gupta:
Framework for determining the suitability of blockchain: Criteria and issues to consider.
Volume 32, Number 11, November 2021
- Shahid Latif
, Zeba Idrees
, Zil E. Huma
, Jawad Ahmad
:
Blockchain technology for the industrial Internet of Things: A comprehensive survey on security challenges, architectures, applications, and future research directions. - Tunahan Timucin
, Serdar Birogul
:
A survey: Making "Smart Contracts" really smart.
- V. Harini
, Metta Venkata Satya Sairam, R. Madhu:
A wide band log periodic millimeter-wave antenna for 5G femtocells applications. - Binrui Li
, Zhongpei Zhang
, Zhenzhen Hu
:
Channel estimation for reconfigurable intelligent surface-assisted multiuser mmWave MIMO system in the presence of array blockage. - Manjunath G. Asuti
, Prabhugoud I. Basarkod:
Modeling and analysis of priority and range-based-deterministic and synchronous multichannel extension-guaranteed time slot allocation in IEEE 802.15.4e medium access control protocol. - Arshia Hosseini Bidi, Zahra Movahedi
, Zeinab Movahedi
:
A fog-based fault-tolerant and QoE-aware service composition in smart cities. - Amir E. Borakzaei, Hamid Saeedi Sourck
, Saeid Reza Seydnejad:
IQ imbalance estimation and compensation in space-time block code multiple-input/multiple-output systems. - Danesh K.
, S. Vasuhi:
An effective spectrum sensing in cognitive radio networks using improved convolution neural network by glow worm swarm algorithm. - Songyang Zhang
, Weimin Lei, Wei Zhang, Yunchong Guan:
LearningCC: An online learning approach for congestion control. - Farhad Banoori, Jinglun Shi, Jehangir Arshad Meo
, Ruiyan Han, Muhammad Usman
:
Peak to average power ratio alleviation by utilizing swarm intelligence along with machine learning for multiple input multiple output-orthogonal frequency division multiplexing based underwater acoustic communication system. - C. A. Subasini
, S. P. Karuppiah, Adlin Sheeba
, S. Padmakala:
Developing an attack detection framework for wireless sensor network-based healthcare applications using hybrid convolutional neural network. - Syed Waqas Haider Shah
, Rongpeng Li, Muhammad Mahboob Ur Rahman
, Adnan Noor Mian, Waqas Aman
, Jon Crowcroft
:
Statistical QoS guarantees of a device-to-device link assisted by a full-duplex relay. - Rolando Herrero
:
Protocol stack virtualization support in IoT. - Mohammad Faraji Mehmandar
, Sam Jabbehdari
, Hamid Haj Seyyed Javadi
:
A proactive fog service provisioning framework for Internet of Things applications: An autonomic approach. - Rabeea Basir
, Saad B. Qaisar
, Mudassar Ali
, Muhammad Naeem
, Alagan Anpalagan
:
Energy efficient resource allocation in cache-enabled fog networks. - Vijaya Durga Chintala
, Anuradha Sundru:
Quantized precoding and companding schemes for PAPR reduction in UFMC-based massive MIMO downlink systems. - Khushboo Jain
, Anoop Kumar:
A lightweight data transmission reduction method based on a dual prediction technique for sensor networks. - Dharminder Dharminder
, Saru Kumari
, Uddeshaya Kumar:
Post quantum secure conditional privacy preserving authentication for edge based vehicular communication. - Priyank Sharma
, Atul Kumar
, Matadeen Bansal:
Performance analysis for user selection-based downlink non-orthogonal multiple access system over generalized fading channels. - Dauda Ayanda
:
Performance analysis of M-ary amplitude and phase shift keying uncoded space-time labeling diversity with three transmit antennas in nonlinear Rician channels. - Tong Liu, Hui Zhao, Haojun Yang, Kan Zheng
, Periklis Chatzimisios:
Design and implementation of a novel real-time unmanned aerial vehicle localization scheme based on received signal strength. - Lotfi Tamazirt, Farid Alilat, Nazim Agoulmine
:
A novel advanced 3D-IPS based on mmWaves and SOM-MLP neural network. - Muhammed F. Khan, Theo G. Swart
:
Optical modulation using digital image symbol patterns and grating light valve technology in a hybrid multiplexed superchannel. - Sanjeev Kumar, Haider Banka, Baijnath Kaushik, Surbhi Sharma:
A review and analysis of secure and lightweight ECC-based RFID authentication protocol for Internet of Vehicles. - Hao Wang
, Qing Chang, Yong Xu, Xianxu Li:
Anti-jamming beam steering based on strapdown inertial navigation system aid for global satellite navigation system receivers in highly dynamic scenes.
Volume 32, Number 12, December 2021
- Yajing Wang
, Jingsha He, Nafei Zhu, Yuzi Yi, Qingqing Zhang, Hongyu Song, Ruixin Xue:
Security enhancement technologies for smart contracts in the blockchain: A survey. - Neha Agrawal
:
Autonomic cloud computing based management and security solutions: State-of-the-art, challenges, and opportunities.
- Ipek Abasikeles-Turgut
, Gokhan Altan
:
A fully distributed energy-aware multi-level clustering and routing for WSN-based IoT. - Zinan Guo
, Xikui Liu, Jian Cui:
A decision for 5G-UAV to maximize the throughput of emergency indoor-outdoor communication. - Jihao Cai, Youming Sun, Hongxiang Shao, Kailing Yao, Wei Bai, Xingyue Yu:
Coalitional game-based user pairing and power allocation in downlink non-orthogonal multiple access networks. - Mesut Toka
, Oguz Kucur
:
Performance analyses of TAS/Alamouti-MRC NOMA system with channel estimation error, feedback delay, and imperfect SIC. - Omar A. Alzubi
, Jafar Ahmad Abed Alzubi, K. Shankar
, Deepak Gupta
:
Blockchain and artificial intelligence enabled privacy-preserving medical data transmission in Internet of Things. - Abdelrhman Hassan
, Rashad Elhabob
, Nabeil Eltayieb
, Yong Wang:
An authorized equality test on identity-based cryptosystem for mobile social networking applications. - Ponsy R. K. Sathia Bhama
, Chandra Priya Jayabal
:
MetaInfoChain: Bi-layered blockchain consensus for metadata aggregation in IoT and cloud environments. - Adel Ali Ahmed
, Mohammed B. Abazeed
:
Adaptive dynamic duty cycle mechanism for energy efficient medium access control in wireless multimedia sensor networks. - Lígia May Taniguchi, João Henrique Inacio de Souza
, David William Marques Guerra
, Taufik Abrão
:
Resource efficiency and pilot decontamination in XL-MIMO double-scattering correlated channels. - Amr A. Alammari
, Mohd Sharique
:
Spatial channel correlation for local scattering with linear MMSE-based estimator and detector in multi-cell large scale MU-MIMO networks. - Shashank Gavel
, Jyotsana Singh, Namrata Shukla, Ajay Singh Raghuvanshi
, Sudarshan Tiwari:
Feature reduction scheme for anomaly-based intrusion detection in wireless networks: Building of hybrid model. - Meeniga Sri Raghavendra, Priyanka Chawla, Sukhpal Singh Gill
:
DEEDSP: Deadline-aware and energy-efficient dynamic service placement in integrated Internet of Things and fog computing environments. - Amina Khan
, Sumeet Gupta, Sachin Kumar Gupta
:
Unmanned aerial vehicle-enabled layered architecture based solution for disaster management. - Xiaodong Yang
, Xixi Li
, Ting Li, Xiuxiu Wang, Caifen Wang, Baohui Li:
Efficient and anonymous multi-message and multi-receiver electronic health records sharing scheme without secure channel based on blockchain. - Haowei Wu, Lixing Zheng
, Zhe Li, Rui Ma
, Jinglan Ou:
Cooperative jamming in downlink satellite network with hardware impairments. - Jiamei Chen, Xinyue Li, Yao Wang, Yufeng Li, Yupeng Wang:
Mixed mean-field power control solution for layered networks. - Shailendra Singh
, Matadeen Bansal:
Performance analysis of non-orthogonal multiple access assisted cooperative relay system with channel estimation errors and imperfect successive interference cancellation. - Shibao Li
, Mingyu Wang, Xiaoli Wang, Jianhang Liu, Xuerong Cui, Haihua Chen:
An interference alignment scheme based on limited feedback with differentiation in heterogeneous networks.

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.