nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A blockchain-empowered AAA scheme in the large-scale HetNet
|
Shi, Na |
|
|
7 |
3 |
p. 308-316 |
artikel |
2 |
A physical layer security scheme for full-duplex communication systems with residual self-interference and non-eavesdropping CSI
|
Lei, Weijia |
|
|
7 |
3 |
p. 352-361 |
artikel |
3 |
A synchronous duty-cycled reservation based MAC protocol for underwater wireless sensor networks
|
Roy, Alak |
|
|
7 |
3 |
p. 385-398 |
artikel |
4 |
Blockchain-based data transmission control for Tactical Data Link
|
Feng, Wei |
|
|
7 |
3 |
p. 285-294 |
artikel |
5 |
Editorial Board
|
|
|
|
7 |
3 |
p. ii-iii |
artikel |
6 |
Fooling intrusion detection systems using adversarially autoencoder
|
Chen, Junjun |
|
|
7 |
3 |
p. 453-460 |
artikel |
7 |
Game theory-based attack and defense analysis in virtual wireless networks with jammers and eavesdroppers
|
Alsulami, Bassma S. |
|
|
7 |
3 |
p. 327-334 |
artikel |
8 |
Green indoor optical wireless communication systems: Pathway towards pervasive deployment
|
Jenila, C. |
|
|
7 |
3 |
p. 410-444 |
artikel |
9 |
iPAS: A deep Monte Carlo Tree Search-based intelligent pilot-power allocation scheme for massive MIMO system
|
Chen, Jienan |
|
|
7 |
3 |
p. 362-372 |
artikel |
10 |
Massive MIMO system lower bound spectral efficiency analysis with precoding and perfect CSI
|
Sheikh, Tasher Ali |
|
|
7 |
3 |
p. 342-351 |
artikel |
11 |
Performance analysis of diffusion-based decode-and-forward relay with depleted molecule shift keying
|
Wang, Jiaxing |
|
|
7 |
3 |
p. 399-409 |
artikel |
12 |
Privacy preservation in permissionless blockchain: A survey
|
Peng, Li |
|
|
7 |
3 |
p. 295-307 |
artikel |
13 |
Security and privacy issues of physical objects in the IoT: Challenges and opportunities
|
Yao, Xuanxia |
|
|
7 |
3 |
p. 373-384 |
artikel |
14 |
Towards asynchronous federated learning for heterogeneous edge-powered internet of things
|
Chen, Zheyi |
|
|
7 |
3 |
p. 317-326 |
artikel |
15 |
Unintentional forking analysis in wireless blockchain networks
|
Liu, Qilie |
|
|
7 |
3 |
p. 335-341 |
artikel |
16 |
UTM: A trajectory privacy evaluating model for online health monitoring
|
Yang, Zhigang |
|
|
7 |
3 |
p. 445-452 |
artikel |