no |
title |
author |
magazine |
year |
volume |
issue |
page(s) |
type |
1 |
A blockchain-based audit approach for encrypted data in federated learning
|
Sun, Zhe |
|
|
8 |
5 |
p. 614-624 |
article |
2 |
Achieving reliable and anti-collusive outsourcing computation and verification based on blockchain in 5G-enabled IoT
|
Wang, Linjie |
|
|
8 |
5 |
p. 644-653 |
article |
3 |
An ellipse-guided routing algorithm in wireless sensor networks
|
Yang, Jianjun |
|
|
8 |
5 |
p. 770-777 |
article |
4 |
An intelligent and privacy-enhanced data sharing strategy for blockchain-empowered Internet of Things
|
Miao, Qinyang |
|
|
8 |
5 |
p. 636-643 |
article |
5 |
A potential game-based outsourcing computation framework for multiple calculators
|
Zhang, Duo |
|
|
8 |
5 |
p. 654-663 |
article |
6 |
A statistical approach for enhancing security in VANETs with efficient rogue node detection using fog computing
|
Paranjothi, Anirudh |
|
|
8 |
5 |
p. 814-824 |
article |
7 |
A survey on blockchain-based integrity auditing for cloud data
|
Han, Haoxiang |
|
|
8 |
5 |
p. 591-603 |
article |
8 |
A survey on deep learning for textual emotion analysis in social networks
|
Peng, Sancheng |
|
|
8 |
5 |
p. 745-762 |
article |
9 |
A survey on user-centric cell-free massive MIMO systems
|
Chen, Shuaifei |
|
|
8 |
5 |
p. 695-719 |
article |
10 |
Blockchain-based continuous data integrity checking protocol with zero-knowledge privacy protection
|
Huang, Yiting |
|
|
8 |
5 |
p. 604-613 |
article |
11 |
Blockchain-based fog radio access networks: Architecture, key technologies, and challenges
|
Wang, Zixin |
|
|
8 |
5 |
p. 720-726 |
article |
12 |
Can blockchain link the future?
|
Qiao, Liang |
|
|
8 |
5 |
p. 687-694 |
article |
13 |
Clustering-based adaptive low-power subframe configuration with load-aware offsetting in dense heterogeneous networks
|
Bulti, Dinkisa A. |
|
|
8 |
5 |
p. 843-852 |
article |
14 |
DeepPOSE: Detecting GPS spoofing attack via deep recurrent neural network
|
Jiang, Peng |
|
|
8 |
5 |
p. 791-803 |
article |
15 |
Deep reinforcement learning-based resource allocation for D2D communications in heterogeneous cellular networks
|
Zhi, Yuan |
|
|
8 |
5 |
p. 834-842 |
article |
16 |
Detecting conflict of heterogeneous access control policies
|
Yu, Mingjie |
|
|
8 |
5 |
p. 664-679 |
article |
17 |
Editorial Board
|
|
|
|
8 |
5 |
p. ii-iii |
article |
18 |
Guest editorial: Blockchain-enabled technologies for cyber-physical systems and big data applications
|
Yan, Zheng |
|
|
8 |
5 |
p. 589-590 |
article |
19 |
Improving resource-constrained IoT device lifetimes by mitigating redundant transmissions across heterogeneous wireless multimedia of things
|
Salah ud din, Muhammad |
|
|
8 |
5 |
p. 778-790 |
article |
20 |
Multi-input address incremental clustering for the Bitcoin blockchain based on Petri net model analysis
|
Qin, Fangchi |
|
|
8 |
5 |
p. 680-686 |
article |
21 |
Multi-objective optimization for task offloading based on network calculus in fog environments
|
Ren, Qian |
|
|
8 |
5 |
p. 825-833 |
article |
22 |
Observer-based event-triggered networked multi-drives speed consensus
|
Masroor, Suhaib |
|
|
8 |
5 |
p. 763-769 |
article |
23 |
Performance analysis of legitimate UAV surveillance system with suspicious relay and anti-surveillance technology
|
Shen, Yi |
|
|
8 |
5 |
p. 853-863 |
article |
24 |
Secure and reliable computation offloading in blockchain-assisted cyber-physical IoT systems
|
Wang, Dan |
|
|
8 |
5 |
p. 625-635 |
article |
25 |
Survey on recent advances in IoT application layer protocols and machine learning scope for research directions
|
Donta, Praveen Kumar |
|
|
8 |
5 |
p. 727-744 |
article |
26 |
Using dummy data for RFID tag and reader authentication
|
Alsaify, Baha’ A. |
|
|
8 |
5 |
p. 804-813 |
article |