nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Accelerating on-device DNN inference during service outage through scheduling early exit
|
Wang, Zizhao |
|
|
162 |
C |
p. 69-82 |
artikel |
2 |
An efficient and practical certificateless signcryption scheme for wireless body area networks
|
Liu, Xiaoguang |
|
|
162 |
C |
p. 169-178 |
artikel |
3 |
A practical design of hash functions for IPv6 using multi-objective genetic programming
|
Hu, Ying |
|
|
162 |
C |
p. 160-168 |
artikel |
4 |
A secure edge monitoring approach to unsupervised energy disaggregation using mean shift algorithm in residential buildings
|
Liu, Qi |
|
|
162 |
C |
p. 187-195 |
artikel |
5 |
A security integration model for private data of intelligent mobile communication based on edge computing
|
Chen, Xiang |
|
|
162 |
C |
p. 204-211 |
artikel |
6 |
A smart lightweight privacy preservation scheme for IoT-based UAV communication systems
|
Deebak, B.D. |
|
|
162 |
C |
p. 102-117 |
artikel |
7 |
BC-RAN: Cloud radio access network enabled by blockchain for 5G
|
Tong, Wei |
|
|
162 |
C |
p. 179-186 |
artikel |
8 |
Beyond socket options: Towards fully extensible Linux transport stacks
|
Tran, Viet-Hoang |
|
|
162 |
C |
p. 118-138 |
artikel |
9 |
COLiDeR: A cross-layer protocol for two-path relaying
|
Naves, Raphaël |
|
|
162 |
C |
p. 59-68 |
artikel |
10 |
Corrigendum to “Analysis and implementation of novel Rice Golomb coding algorithm for wireless sensor networks” [Comput. Commun. 150 (2020) 463–471]
|
Kalaivani, S. |
|
|
162 |
C |
p. 227 |
artikel |
11 |
Diagnosis of heart diseases by a secure Internet of Health Things system based on Autoencoder Deep Neural Network
|
Deperlioglu, Omer |
|
|
162 |
C |
p. 31-50 |
artikel |
12 |
Editorial Board
|
|
|
|
162 |
C |
p. ii-iii |
artikel |
13 |
FogAuthChain: A secure location-based authentication scheme in fog computing environments using Blockchain
|
Patwary, Abdullah Al-Noman |
|
|
162 |
C |
p. 212-224 |
artikel |
14 |
Generating visually coherent encrypted images with reversible data hiding in wavelet domain by fusing chaos and pairing function
|
Musanna, Farhan |
|
|
162 |
C |
p. 12-30 |
artikel |
15 |
Locally private frequency estimation of physical symptoms for infectious disease analysis in Internet of Medical Things
|
Wu, Xiaotong |
|
|
162 |
C |
p. 139-151 |
artikel |
16 |
Malware propagation model in wireless sensor networks under attack–defense confrontation
|
Zhou, Haiping |
|
|
162 |
C |
p. 51-58 |
artikel |
17 |
Optimized multi-UAV cooperative path planning under the complex confrontation environment
|
Xu, Cheng |
|
|
162 |
C |
p. 196-203 |
artikel |
18 |
Privacy-preserving model training architecture for intelligent edge computing
|
Qu, Xidi |
|
|
162 |
C |
p. 94-101 |
artikel |
19 |
Quantum and classical genetic algorithms for multilevel segmentation of medical images: A comparative study
|
Hilali-Jaghdam, Inès |
|
|
162 |
C |
p. 83-93 |
artikel |
20 |
Servicing delay sensitive pervasive communication through adaptable width channelization for supporting mobile edge computing
|
Hussain, Abid |
|
|
162 |
C |
p. 152-159 |
artikel |
21 |
Special issue on wearable medical devices for healthcare measurements
|
Wei, Wei |
|
|
162 |
C |
p. 225-226 |
artikel |
22 |
TOT: Trust aware opportunistic transmission in cognitive radio Social Internet of Things
|
Wang, Xinghan |
|
|
162 |
C |
p. 1-11 |
artikel |