nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A blockchain-empowered AAA scheme in the large-scale HetNet
|
Shi, Na |
|
|
|
3 |
p. 308-316 |
artikel |
2 |
A blockchain future for internet of things security: a position paper
|
Banerjee, Mandrita |
|
2018 |
|
3 |
p. 149-160 |
artikel |
3 |
A comprehensive layered approach for implementing internet of things-enabled smart grid: A survey
|
Alavikia, Zahra |
|
|
|
3 |
p. 388-410 |
artikel |
4 |
Adaptive FEC coding and cooperative relayed wireless image transmission
|
Xu, Hansong |
|
2015 |
|
3 |
p. 213-221 9 p. |
artikel |
5 |
A LoRa-based protocol for connecting IoT edge computing nodes to provide small-data-based services
|
Nakamura, Kiyoshy |
|
|
|
3 |
p. 257-266 |
artikel |
6 |
Analysis of identifiers in IoT platforms
|
Aftab, Haris |
|
|
|
3 |
p. 333-340 |
artikel |
7 |
An efficient data aggregation scheme with local differential privacy in smart grid
|
Gai, Na |
|
|
|
3 |
p. 333-342 |
artikel |
8 |
A network security situation prediction model based on wavelet neural network with optimized parameters
|
Zhang, Haibo |
|
2016 |
|
3 |
p. 139-144 6 p. |
artikel |
9 |
A new protocol for concurrently allocating licensed spectrum to underlay cognitive users
|
Chatterjee, Sabyasachi |
|
2018 |
|
3 |
p. 200-208 |
artikel |
10 |
A novel proactive soft load balancing framework for ultra dense network
|
Huang, Miaona |
|
|
|
3 |
p. 788-796 |
artikel |
11 |
A novel slot scheduling technique for duty-cycle based data transmission for wireless sensor network
|
Tripathi, Yogesh |
|
|
|
3 |
p. 351-358 |
artikel |
12 |
A physical layer security scheme for full-duplex communication systems with residual self-interference and non-eavesdropping CSI
|
Lei, Weijia |
|
|
|
3 |
p. 352-361 |
artikel |
13 |
A robust symbol timing strategy for cellular systems
|
Dan, Yangpeng |
|
|
|
3 |
p. 757-768 |
artikel |
14 |
A routing protocol for urban vehicular ad hoc networks to support non-safety applications
|
Bhoi, S.K. |
|
2018 |
|
3 |
p. 189-199 |
artikel |
15 |
A synchronous duty-cycled reservation based MAC protocol for underwater wireless sensor networks
|
Roy, Alak |
|
|
|
3 |
p. 385-398 |
artikel |
16 |
A time-aware query-focused summarization of an evolving microblogging stream via sentence extraction
|
Geng, Fei |
|
|
|
3 |
p. 389-397 |
artikel |
17 |
A time-aware searchable encryption scheme for EHRs
|
Zhou, Yousheng |
|
2019 |
|
3 |
p. 170-175 |
artikel |
18 |
Attention-based spatio-temporal graph convolutional network considering external factors for multi-step traffic flow prediction
|
Ye, Jihua |
|
|
|
3 |
p. 343-350 |
artikel |
19 |
Beam interference suppression in multi-cell millimeter wave communications
|
Zhang, Zufan |
|
2019 |
|
3 |
p. 196-202 |
artikel |
20 |
Big data-enabled multiscale serviceability analysis for aging bridges☆
|
Liang, Yu |
|
2016 |
|
3 |
p. 97-107 11 p. |
artikel |
21 |
Bilayer expurgated LDPC codes with uncoded relaying
|
Noor-A-Rahim, Md. |
|
2017 |
|
3 |
p. 176-179 4 p. |
artikel |
22 |
Blockchain-based data transmission control for Tactical Data Link
|
Feng, Wei |
|
|
|
3 |
p. 285-294 |
artikel |
23 |
Blockchain-enabled resource management and sharing for 6G communications
|
Xu, Hao |
|
|
|
3 |
p. 261-269 |
artikel |
24 |
Combining neural network-based method with heuristic policy for optimal task scheduling in hierarchical edge cloud
|
Chen, Zhuo |
|
|
|
3 |
p. 688-697 |
artikel |
25 |
CPFinder: Finding an unknown caller's profession from anonymized mobile phone data
|
Zhang, Jiaquan |
|
|
|
3 |
p. 324-332 |
artikel |
26 |
Design of a USIM and ECC based handover authentication scheme for 5G-WLAN heterogeneous networks
|
Kumar, Amit |
|
|
|
3 |
p. 341-353 |
artikel |
27 |
Design of multi-antenna relaying for OFDM in impulsive noise environment
|
El-Mahdy, Ahmed |
|
2019 |
|
3 |
p. 189-195 |
artikel |
28 |
Developing a platform to evaluate and assess the security of wearable devices
|
Hale, Matthew L. |
|
2019 |
|
3 |
p. 147-159 |
artikel |
29 |
Distributed robust power control in two-tier vehicle networks under uncertain channel environments
|
Liu, Zhixin |
|
|
|
3 |
p. 734-742 |
artikel |
30 |
Distributionally robust optimization based chance-constrained energy management for hybrid energy powered cellular networks
|
Du, Pengfei |
|
|
|
3 |
p. 797-808 |
artikel |
31 |
DRAM: A DRL-based resource allocation scheme for MAR in MEC
|
Song, Tongyu |
|
|
|
3 |
p. 723-733 |
artikel |
32 |
Dynamic scheduling and analysis of real time systems with multiprocessors
|
Nashid Anjum, M.D. |
|
2016 |
|
3 |
p. 130-138 9 p. |
artikel |
33 |
EA-DFPSO: An intelligent energy-efficient scheduling algorithm for mobile edge networks
|
Lu, Yao |
|
|
|
3 |
p. 237-246 |
artikel |
34 |
Editorial Board
|
|
|
|
|
3 |
p. ii-iii |
artikel |
35 |
Editorial Board
|
|
|
2019 |
|
3 |
p. ii |
artikel |
36 |
Editorial Board
|
|
|
|
|
3 |
p. ii-iii |
artikel |
37 |
Editorial Board
|
|
|
|
|
3 |
p. ii |
artikel |
38 |
Editorial Board
|
|
|
|
|
3 |
p. ii-iii |
artikel |
39 |
Effective link quality estimation as a means to improved end-to-end packet delivery in high traffic mobile ad hoc networks ☆
|
Afzal, Syed Rehan |
|
2017 |
|
3 |
p. 150-163 14 p. |
artikel |
40 |
Electromagnetic spectrum chipless radio frequency identification: A review
|
Li, Qingjuan |
|
|
|
3 |
p. 377-388 |
artikel |
41 |
Enhancing IoT anomaly detection performance for federated learning
|
Weinger, Brett |
|
|
|
3 |
p. 314-323 |
artikel |
42 |
Field trial measurement and channel modeling for reconfigurable intelligent surface
|
Zheng, Peng |
|
|
|
3 |
p. 603-612 |
artikel |
43 |
Fooling intrusion detection systems using adversarially autoencoder
|
Chen, Junjun |
|
|
|
3 |
p. 453-460 |
artikel |
44 |
Game theory-based attack and defense analysis in virtual wireless networks with jammers and eavesdroppers
|
Alsulami, Bassma S. |
|
|
|
3 |
p. 327-334 |
artikel |
45 |
Gaussian broadcast channel with lossy state reconstruction
|
Ramachandran, Viswanathan |
|
2019 |
|
3 |
p. 176-182 |
artikel |
46 |
352-Gbit/s single line rate THz wired transmission based on PS-4096QAM employing hollow-core fiber
|
Ding, Junjie |
|
|
|
3 |
p. 717-722 |
artikel |
47 |
Green indoor optical wireless communication systems: Pathway towards pervasive deployment
|
Jenila, C. |
|
|
|
3 |
p. 410-444 |
artikel |
48 |
Guest editorial
|
Li, Ruidong |
|
|
|
3 |
p. 235-236 |
artikel |
49 |
Guest editorial
|
Jiang, Tao |
|
|
|
3 |
p. 239-240 |
artikel |
50 |
Improving routing efficiency through intermediate target based geographic routing
|
Fei, Zongming |
|
2015 |
|
3 |
p. 204-212 9 p. |
artikel |
51 |
Improving signature quality for network application identification
|
Tharp, Justin |
|
2019 |
|
3 |
p. 139-146 |
artikel |
52 |
Intelligent reflecting surface-assisted cognitive radio-inspired rate-splitting multiple access systems
|
Liu, Peixu |
|
|
|
3 |
p. 655-666 |
artikel |
53 |
Intelligent reflecting surface-assisted federated learning in multi-platoon collaborative networks
|
Ma, Xiaoting |
|
|
|
3 |
p. 628-637 |
artikel |
54 |
Intent-based networks for 6G: Insights and challenges
|
Wei, Yiming |
|
|
|
3 |
p. 270-280 |
artikel |
55 |
Internet of things: Conceptual network structure, main challenges and future directions
|
Furstenau, Leonardo B. |
|
|
|
3 |
p. 677-687 |
artikel |
56 |
IoTFLiP: IoT-based flipped learning platform for medical education
|
Ali, Maqbool |
|
2017 |
|
3 |
p. 188-194 7 p. |
artikel |
57 |
iPAS: A deep Monte Carlo Tree Search-based intelligent pilot-power allocation scheme for massive MIMO system
|
Chen, Jienan |
|
|
|
3 |
p. 362-372 |
artikel |
58 |
Joint multiple resource allocation for offloading cost minimization in IRS-assisted MEC networks with NOMA
|
Chen, Guang |
|
|
|
3 |
p. 613-627 |
artikel |
59 |
Joint optimization of spectrum and energy efficiency in cognitive radio networks
|
Wang, Shaowei |
|
2015 |
|
3 |
p. 161-170 10 p. |
artikel |
60 |
Joint resource allocation for hybrid NOMA-assisted MEC in 6G networks
|
Li, Haodong |
|
|
|
3 |
p. 241-252 |
artikel |
61 |
Length matters: Scalable fast encrypted internet traffic service classification based on multiple protocol data unit length sequence with composite deep learning
|
Chen, Zihan |
|
|
|
3 |
p. 289-302 |
artikel |
62 |
Machine learning for internet of things data analysis: a survey
|
Mahdavinejad, Mohammad Saeid |
|
2018 |
|
3 |
p. 161-175 |
artikel |
63 |
Massive MIMO system lower bound spectral efficiency analysis with precoding and perfect CSI
|
Sheikh, Tasher Ali |
|
|
|
3 |
p. 342-351 |
artikel |
64 |
Middleware technologies for cloud of things: a survey
|
Farahzadi, Amirhossein |
|
2018 |
|
3 |
p. 176-188 |
artikel |
65 |
ML-SLD: A message-level stateless design for cloud-native 5G core network
|
Du, Keliang |
|
|
|
3 |
p. 743-756 |
artikel |
66 |
Modeling and performance analysis for composite network–compute service provisioning in software-defined cloud environments
|
Duan, Qiang |
|
2015 |
|
3 |
p. 181-190 10 p. |
artikel |
67 |
Monte-Carlo based random passive energy beamforming for reconfigurable intelligent surface assisted wireless power transfer
|
Lu, Ziyang |
|
|
|
3 |
p. 667-676 |
artikel |
68 |
Moving target defense of routing randomization with deep reinforcement learning against eavesdropping attack
|
Xu, Xiaoyu |
|
|
|
3 |
p. 373-387 |
artikel |
69 |
Multi-agent reinforcement learning for edge information sharing in vehicular networks
|
Wang, Ruyan |
|
|
|
3 |
p. 267-277 |
artikel |
70 |
Nonbinary ldpc-coded probabilistic shaping scheme for MIMO systems based on signal space diversity
|
Kang, Weimin |
|
|
|
3 |
p. 779-787 |
artikel |
71 |
On recommendation-aware content caching for 6G: An artificial intelligence and optimization empowered paradigm
|
Fu, Yaru |
|
|
|
3 |
p. 304-311 |
artikel |
72 |
Optical power allocation for adaptive transmissions in wavelength-division multiplexing free space optical networks
|
Zhou, Hui |
|
2015 |
|
3 |
p. 171-180 10 p. |
artikel |
73 |
Optimal dynamic spectrum allocation-assisted latency minimization for multiuser mobile edge computing
|
Li, Yang |
|
|
|
3 |
p. 247-256 |
artikel |
74 |
Performance analysis of diffusion-based decode-and-forward relay with depleted molecule shift keying
|
Wang, Jiaxing |
|
|
|
3 |
p. 399-409 |
artikel |
75 |
Pervasive intelligent endogenous 6G wireless systems: Prospects, theories and key technologies
|
Chen, Yun |
|
|
|
3 |
p. 312-320 |
artikel |
76 |
Pheromone based alternative route planning
|
Feng, Liangbing |
|
2016 |
|
3 |
p. 151-158 8 p. |
artikel |
77 |
Power consumption model of sector breathing based congestion control in mobile network
|
Mukherjee, Anwesha |
|
2018 |
|
3 |
p. 217-233 |
artikel |
78 |
Privacy preservation in permissionless blockchain: A survey
|
Peng, Li |
|
|
|
3 |
p. 295-307 |
artikel |
79 |
Private membership test protocol with low communication complexity
|
Ramezanian, Sara |
|
|
|
3 |
p. 321-332 |
artikel |
80 |
Providing healthcare services on-the-fly using multi-player cooperation game theory in Internet of Vehicles (IoV) environment
|
Kumar, Neeraj |
|
2015 |
|
3 |
p. 191-203 13 p. |
artikel |
81 |
QSM-IDM – A novel quadrature spatial modulation based on interleaving division multiplexing for multiple antenna system
|
El Dyasti, Sherif K. |
|
2019 |
|
3 |
p. 183-188 |
artikel |
82 |
Real traffic-data based evaluation of vehicular traffic environment and state-of-the-art with future issues in location-centric data dissemination for VANETs
|
Abdul Hanan, Abdul Hafidz |
|
2017 |
|
3 |
p. 195-210 16 p. |
artikel |
83 |
Research on encoding and decoding of non-binary polar codes over GF(2 m )
|
Li, Shufeng |
|
|
|
3 |
p. 359-372 |
artikel |
84 |
Resilient parallel similarity-based reasoning for classifying heterogeneous medical cases in MapReduce
|
Yu, Haiyan |
|
2016 |
|
3 |
p. 145-150 6 p. |
artikel |
85 |
RFID-based 3D human pose tracking: A subject generalization approach
|
Yang, Chao |
|
|
|
3 |
p. 278-288 |
artikel |
86 |
RIS-assisted MIMO secure communications with Bob's statistical CSI and without Eve's CSI
|
Xu, Wenwan |
|
|
|
3 |
p. 638-644 |
artikel |
87 |
Robust beamforming for IRS-aided SWIPT in cognitive radio networks
|
Wang, Zining |
|
|
|
3 |
p. 645-654 |
artikel |
88 |
Sarcastic sentiment detection in tweets streamed in real time: a big data approach
|
Bharti, S.K. |
|
2016 |
|
3 |
p. 108-121 14 p. |
artikel |
89 |
Scalable privacy-preserving big data aggregation mechanism
|
Wu, Dapeng |
|
2016 |
|
3 |
p. 122-129 8 p. |
artikel |
90 |
Secure ticket-based authentication method for IoT applications
|
Alizadeh, Mojtaba |
|
|
|
3 |
p. 710-716 |
artikel |
91 |
Security and privacy in 6G networks: New areas and new challenges
|
Wang, Minghao |
|
|
|
3 |
p. 281-291 |
artikel |
92 |
Security and privacy issues of physical objects in the IoT: Challenges and opportunities
|
Yao, Xuanxia |
|
|
|
3 |
p. 373-384 |
artikel |
93 |
Self-healing and SDN: bridging the gap
|
Ochoa-Aday, Leonardo |
|
|
|
3 |
p. 354-368 |
artikel |
94 |
Service-aware 6G: An intelligent and open network based on the convergence of communication, computing and caching
|
Zhou, Yiqing |
|
|
|
3 |
p. 253-260 |
artikel |
95 |
Simultaneous wireless information and power transfer with fixed and adaptive modulation
|
Hu, Jie |
|
|
|
3 |
p. 303-313 |
artikel |
96 |
Soft transmission of 3D video for low power and low complexity scenario
|
Li, Ao |
|
|
|
3 |
p. 769-778 |
artikel |
97 |
Sparse array of sub-surface aided blockage-free multi-user mmWave communication systems
|
Chen, Weicong |
|
|
|
3 |
p. 292-303 |
artikel |
98 |
Spectrum handoff scheme with multiple attributes decision making for optimal network selection in cognitive radio networks
|
Kumar, Krishan |
|
2017 |
|
3 |
p. 164-175 12 p. |
artikel |
99 |
S-transformation based integrated approach for spectrum estimation, storage, and sensing in cognitive radio
|
Pradhan, Pyari Mohan |
|
2019 |
|
3 |
p. 160-169 |
artikel |
100 |
Symbol detection based on Voronoi surfaces with emphasis on superposition modulation
|
Damrath, Martin |
|
2017 |
|
3 |
p. 141-149 9 p. |
artikel |
101 |
Theoretical and numerical characterization of a 40Gbps long-haul multi-channel transmission system with dispersion compensation
|
Xu, Kaikai |
|
2015 |
|
3 |
p. 222-228 7 p. |
artikel |
102 |
Towards asynchronous federated learning for heterogeneous edge-powered internet of things
|
Chen, Zheyi |
|
|
|
3 |
p. 317-326 |
artikel |
103 |
Towards Yo-Yo attack mitigation in cloud auto-scaling mechanism
|
Xu, Xiaoqiong |
|
|
|
3 |
p. 369-376 |
artikel |
104 |
Unintentional forking analysis in wireless blockchain networks
|
Liu, Qilie |
|
|
|
3 |
p. 335-341 |
artikel |
105 |
Using discriminant analysis to detect intrusions in external communication for self-driving vehicles
|
Alheeti, Khattab M.Ali |
|
2017 |
|
3 |
p. 180-187 8 p. |
artikel |
106 |
UTM: A trajectory privacy evaluating model for online health monitoring
|
Yang, Zhigang |
|
|
|
3 |
p. 445-452 |
artikel |
107 |
Windowed overlapped frequency domain block filtering approach for direct sequence signal acquisition
|
Karami, Ebrahim |
|
2018 |
|
3 |
p. 209-216 |
artikel |
108 |
Wi-Wheat+: Contact-free wheat moisture sensing with commodity WiFi based on entropy
|
Yang, Weidong |
|
|
|
3 |
p. 698-709 |
artikel |