nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A blockchain-based trustworthy collaborative power trading scheme for 5G-enabled social internet of vehicles
|
Liu, Ziming |
|
|
8 |
6 |
p. 976-983 |
artikel |
2 |
A blockchain-enabled wiki framework based on participatory design
|
Xu, Zheng |
|
|
8 |
6 |
p. 995-1004 |
artikel |
3 |
Ambient BackCom in beyond 5G NOMA networks: A multi-cell resource allocation framework
|
Khan, Wali Ullah |
|
|
8 |
6 |
p. 1005-1013 |
artikel |
4 |
An accurate retransmission timeout estimator for content-centric networking based on the Jacobson algorithm
|
Nikzad, Mortaza |
|
|
8 |
6 |
p. 1085-1093 |
artikel |
5 |
An effective communication and computation model based on a hybridgraph-deeplearning approach for SIoT
|
Mekala, M.S. |
|
|
8 |
6 |
p. 900-910 |
artikel |
6 |
An efficient resource optimization scheme for D2D communication
|
Zafar, Mohammad Haseeb |
|
|
8 |
6 |
p. 1122-1129 |
artikel |
7 |
A notary group-based cross-chain mechanism
|
Xiong, Anping |
|
|
8 |
6 |
p. 1059-1067 |
artikel |
8 |
A novel fault-tolerant scheduling approach for collaborative workflows in an edge-IoT environment
|
Long, Tingyan |
|
|
8 |
6 |
p. 911-922 |
artikel |
9 |
Applying blockchain-based method to smart contract classification for CPS applications
|
Jiang, Zigui |
|
|
8 |
6 |
p. 964-975 |
artikel |
10 |
A robust beam tracking scheme for millimeter wave HetNets
|
Xue, Qing |
|
|
8 |
6 |
p. 1115-1121 |
artikel |
11 |
A survey on communication protocols and performance evaluations for Internet of Things
|
Bayılmış, Cüneyt |
|
|
8 |
6 |
p. 1094-1104 |
artikel |
12 |
Demand-aware mobile bike-sharing service using collaborative computing and information fusion in 5G IoT environment
|
Yang, Xiaoxian |
|
|
8 |
6 |
p. 984-994 |
artikel |
13 |
Design and analysis of intrusion detection systems for wireless mesh networks
|
Al-Anzi, Fawaz S. |
|
|
8 |
6 |
p. 1068-1076 |
artikel |
14 |
DroidEnemy: Battling adversarial example attacks for Android malware detection
|
Bala, Neha |
|
|
8 |
6 |
p. 1040-1047 |
artikel |
15 |
Editorial Board
|
|
|
|
8 |
6 |
p. ii-iii |
artikel |
16 |
Effective short text classification via the fusion of hybrid features for IoT social data
|
Luo, Xiong |
|
|
8 |
6 |
p. 942-954 |
artikel |
17 |
Energy-efficient task offloading strategy in mobile edge computing for resource-intensive mobile applications
|
Mahenge, Michael Pendo John |
|
|
8 |
6 |
p. 1048-1058 |
artikel |
18 |
Enhancing the robustness of object detection via 6G vehicular edge computing
|
Chen, Chen |
|
|
8 |
6 |
p. 923-931 |
artikel |
19 |
Guest Editorial
|
|
|
|
8 |
6 |
p. 865-867 |
artikel |
20 |
Location privacy protection of maritime mobile terminals
|
Su, Xin |
|
|
8 |
6 |
p. 932-941 |
artikel |
21 |
Potential friendship discovery in social networks based on hybrid ensemble multiple collaborative filtering models in a 5G network environment
|
Hu, Hexuan |
|
|
8 |
6 |
p. 868-876 |
artikel |
22 |
Protecting the trust and credibility of data by tracking forgery trace based on GANs
|
Xiao, Shuai |
|
|
8 |
6 |
p. 877-884 |
artikel |
23 |
Resource allocation for sum-rate maximization in NOMA-based generalized spatial modulation
|
Li, Guoquan |
|
|
8 |
6 |
p. 1077-1084 |
artikel |
24 |
Runtime reconfiguration of data services for dealing with out-of-range stream fluctuation in cloud-edge environments
|
Zhang, Shouli |
|
|
8 |
6 |
p. 1014-1026 |
artikel |
25 |
Sum-rate maximization for UAV-enabled two-way relay systems
|
Lu, Keju |
|
|
8 |
6 |
p. 1105-1114 |
artikel |
26 |
Temporal pattern mining from user-generated content
|
Ali, Adnan |
|
|
8 |
6 |
p. 1027-1039 |
artikel |
27 |
Throughput-oriented associated transaction assignment in sharding blockchains for IoT social data storage
|
Tao, Liping |
|
|
8 |
6 |
p. 885-899 |
artikel |
28 |
Users' experience matter: Delay sensitivity-aware computation offloading in mobile edge computing
|
Wang, Mingzhi |
|
|
8 |
6 |
p. 955-963 |
artikel |