nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Adjustable random linear network coding (ARLNC): A solution for data transmission in dynamic IoT computational environments
|
Dilanchian, Raffi |
|
|
11 |
2 |
p. 574-586 |
artikel |
2 |
A framework for locating multiple RFID tags using RF hologram tensors
|
Wang, Xiangyu |
|
|
11 |
2 |
p. 337-348 |
artikel |
3 |
Algorithms for online fault tolerance server consolidation
|
Li, Boyu |
|
|
11 |
2 |
p. 514-523 |
artikel |
4 |
APFed: Adaptive personalized federated learning for intrusion detection in maritime meteorological sensor networks
|
Su, Xin |
|
|
11 |
2 |
p. 401-411 |
artikel |
5 |
A reconstruction and recovery network-based channel estimation in high-speed railway wireless communications
|
Zhang, Qingmiao |
|
|
11 |
2 |
p. 505-513 |
artikel |
6 |
A survey on textual emotion cause extraction in social networks
|
Peng, Sancheng |
|
|
11 |
2 |
p. 524-536 |
artikel |
7 |
Automatic collaborative water surface coverage and cleaning strategy of UAV and USVs
|
Deng, Tianping |
|
|
11 |
2 |
p. 365-376 |
artikel |
8 |
A verifiable EVM-based cross-language smart contract implementation scheme for matrix calculation
|
He, Yunhua |
|
|
11 |
2 |
p. 432-441 |
artikel |
9 |
Blockchain and signcryption enabled asynchronous federated learning framework in fog computing
|
Zhou, Zhou |
|
|
11 |
2 |
p. 442-454 |
artikel |
10 |
Blockchain-based knowledge-aware semantic communications for remote driving image transmission
|
Lin, Yangfei |
|
|
11 |
2 |
p. 317-325 |
artikel |
11 |
C-privacy: A social relationship-driven image customization sharing method in cyber-physical networks
|
Wu, Dapeng |
|
|
11 |
2 |
p. 563-573 |
artikel |
12 |
Demand side management with wireless channel impact in IoT-enabled smart grid system
|
Hossain, Md. Farhad |
|
|
11 |
2 |
p. 493-504 |
artikel |
13 |
Device-edge collaborative occluded face recognition method based on cross-domain feature fusion
|
Zhang, Puning |
|
|
11 |
2 |
p. 482-492 |
artikel |
14 |
Editorial Board
|
|
|
|
11 |
2 |
p. ii-iii |
artikel |
15 |
Efficient and fine-grained access control with fully-hidden policies for cloud-enabled IoT
|
Li, Qi |
|
|
11 |
2 |
p. 473-481 |
artikel |
16 |
Fuzzy clustering for electric field characterization and its application to thunderstorm interpretability
|
Yang, Xu |
|
|
11 |
2 |
p. 299-307 |
artikel |
17 |
Handover management in beyond 5G HetNet topologies with unbalanced user distribution
|
Hatipoglu, Abdussamet |
|
|
11 |
2 |
p. 465-472 |
artikel |
18 |
Hierarchical detection and tracking for moving targets in underwater wireless sensor networks
|
Li, Yudong |
|
|
11 |
2 |
p. 556-562 |
artikel |
19 |
High-speed encrypted traffic classification by using payload features
|
Yan, Xinge |
|
|
11 |
2 |
p. 412-423 |
artikel |
20 |
Integration of data science with the intelligent IoT (IIoT): Current challenges and future perspectives
|
Ullah, Inam |
|
|
11 |
2 |
p. 280-298 |
artikel |
21 |
Learned distributed image compression with decoder side information
|
Yin, Yankai |
|
|
11 |
2 |
p. 349-358 |
artikel |
22 |
Nondestructive detection and classification of impurities-containing seed cotton based on hyperspectral imaging and one-dimensional convolutional neural network
|
Fei, Yeqi |
|
|
11 |
2 |
p. 308-316 |
artikel |
23 |
Performance optimization and parameters estimation for MIMO-OFDM dual-functional communication-radar systems
|
Zhong, Chen |
|
|
11 |
2 |
p. 387-400 |
artikel |
24 |
Physical-layer security in MU-MISO downlink networks against potential eavesdroppers
|
Son, Woong |
|
|
11 |
2 |
p. 424-431 |
artikel |
25 |
RS-DRL-based offloading policy and UAV trajectory design in F-MEC systems
|
Yang, Yulu |
|
|
11 |
2 |
p. 377-386 |
artikel |
26 |
Sparse graph neural network aided efficient decoder for polar codes under bursty interference
|
Zhang, Shengyu |
|
|
11 |
2 |
p. 359-364 |
artikel |
27 |
Task offloading delay minimization in vehicular edge computing based on vehicle trajectory prediction
|
Zeng, Feng |
|
|
11 |
2 |
p. 537-546 |
artikel |
28 |
Toward next-generation networks: A blockchain-based approach for core network architecture and roaming identity verification
|
Gong, Yi |
|
|
11 |
2 |
p. 326-336 |
artikel |
29 |
Toward zero trust in 5G Industrial Internet collaboration systems
|
Zhang, Han |
|
|
11 |
2 |
p. 547-555 |
artikel |
30 |
TRE-DSP: A traceable and revocable CP-ABE based data sharing scheme for IoV with partially hidden policy
|
Zhou, Yousheng |
|
|
11 |
2 |
p. 455-464 |
artikel |
31 |
YOLO-SDLUWD: YOLOv7-based small target detection network for infrared images in complex backgrounds
|
Zhu, Jinxiu |
|
|
11 |
2 |
p. 269-279 |
artikel |