nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A Certificateless Authentication and Key Agreement Scheme for Secure Cloud-assisted Wireless Body Area Network
|
Cheng, Qingfeng |
|
|
27 |
1 |
p. 346-356 |
artikel |
2 |
A Multi-Domain VNE Algorithm Based on Load Balancing in the IoT Networks
|
Zhang, Peiying |
|
|
27 |
1 |
p. 124-138 |
artikel |
3 |
An Adaptive IoT Network Security Situation Prediction Model
|
Yang, Hongyu |
|
|
27 |
1 |
p. 371-381 |
artikel |
4 |
A Reinforcement Learning Based Data Storage and Traffic Management in Information-Centric Data Center Networks
|
Yang, Weihong |
|
|
27 |
1 |
p. 266-275 |
artikel |
5 |
A RFID-Based Infection Prevention and Control Mechanism in Aged Care Living Residences
|
Hung, Lun-Ping |
|
|
27 |
1 |
p. 33-46 |
artikel |
6 |
A Secure Access Control Framework for Cloud Management
|
Zhang, Jiawei |
|
|
27 |
1 |
p. 404-416 |
artikel |
7 |
Batch Auction Design for Cloud Container Services
|
He, Yu |
|
|
27 |
1 |
p. 222-235 |
artikel |
8 |
Challenges of Credit Reference Based on Big Data Technology in China
|
Liu, Cheng-yong |
|
|
27 |
1 |
p. 47-57 |
artikel |
9 |
Computing Cost Optimization for Multi-BS in MEC by Offloading
|
Li, Wenzao |
|
|
27 |
1 |
p. 236-248 |
artikel |
10 |
Data Augmentation for Internet of Things Dialog System
|
Wang, Eric Ke |
|
|
27 |
1 |
p. 158-171 |
artikel |
11 |
DCUS: Evaluating Double-Click-Based Unlocking Scheme on Smartphones
|
Li, Wenjuan |
|
|
27 |
1 |
p. 382-391 |
artikel |
12 |
Developing Smart Home Applications
|
Lin, Yun-Wei |
|
|
27 |
1 |
p. 181-195 |
artikel |
13 |
DTMFTalk: a DTMF-Based Realization of IoT Remote Control for Smart-Home Elderly Care
|
Yang, Shun-Ren |
|
|
27 |
1 |
p. 196-207 |
artikel |
14 |
Editorial: Advances in Mobile, Edge and Cloud Computing
|
Chu, Xiaowen |
|
|
27 |
1 |
p. 219-221 |
artikel |
15 |
Editorial: Innovation and Application of Internet of Things for Smart Cities
|
Deng, Der-Jiunn |
|
|
27 |
1 |
p. 1-2 |
artikel |
16 |
Editorial: Recent Internet of Things Applications in Smart Grid and Various Industries
|
Lin, Chun-Cheng |
|
|
27 |
1 |
p. 139-140 |
artikel |
17 |
Editorial: Security and Privacy Challenges in Internet of Things
|
Wang, Ding |
|
|
27 |
1 |
p. 343-345 |
artikel |
18 |
Effective Mobile Target Searching Using Robots
|
Wong, Wai Kit |
|
|
27 |
1 |
p. 249-265 |
artikel |
19 |
Graph Neural Networks with Information Anchors for Node Representation Learning
|
Liu, Chao |
|
|
27 |
1 |
p. 315-328 |
artikel |
20 |
Identity Authentication with Association Behavior Sequence in Machine-to-Machine Mobile Terminals
|
Shi, Congcong |
|
|
27 |
1 |
p. 96-108 |
artikel |
21 |
Jamming-Resilient Backup Nodes Selection for RPL-based Routing in Smart Grid AMI Networks
|
Zhang, Taimin |
|
|
27 |
1 |
p. 329-342 |
artikel |
22 |
Machine Learning Based Prediction and Modeling in Healthcare Secured Internet of Things
|
Aitzaouiat, Charafeddine E. |
|
|
27 |
1 |
p. 84-95 |
artikel |
23 |
MD2DO: A Channel Selection Method for Device to Device Communication Using the Mobile Edge Computing (MEC) Paradigm
|
Cheng, Rung-Shiang |
|
|
27 |
1 |
p. 15-32 |
artikel |
24 |
MobileNet Based Apple Leaf Diseases Identification
|
Bi, Chongke |
|
|
27 |
1 |
p. 172-180 |
artikel |
25 |
Monitoring Spatial Keyword Queries Based on Resident Domains of Mobile Objects in IoT Environments
|
Shen, Jun-Hong |
|
|
27 |
1 |
p. 208-218 |
artikel |
26 |
Multi-Objective Wireless Sensor Network Deployment Problem with Cooperative Distance-Based Sensing Coverage
|
Wang, Sheng-Chuan |
|
|
27 |
1 |
p. 3-14 |
artikel |
27 |
Neighborhood-aware Mobile Hub: An Edge Gateway with Leader Election Mechanism for Internet of Mobile Things
|
Silva, Marcelino |
|
|
27 |
1 |
p. 276-289 |
artikel |
28 |
Nonnegative Tensor Factorization based on Low-Rank Subspace for Facial Expression Recognition
|
Liu, Xingang |
|
|
27 |
1 |
p. 58-69 |
artikel |
29 |
Privacy-preserving and Utility-aware Participant Selection for Mobile Crowd Sensing
|
Azhar, Shanila |
|
|
27 |
1 |
p. 290-302 |
artikel |
30 |
Raven: Scheduling Virtual Machine Migration During Datacenter Upgrades with Reinforcement Learning
|
Ying, Chen |
|
|
27 |
1 |
p. 303-314 |
artikel |
31 |
Reporting Mechanisms for Internet of Things
|
Chang, Chia-Wei |
|
|
27 |
1 |
p. 118-123 |
artikel |
32 |
Routing and Wavelength Allotment for Exchanged Folded Hypercube Communications Embedded in Bus-Topology WDM Optical Networks
|
Liu, Yu-Liang |
|
|
27 |
1 |
p. 109-117 |
artikel |
33 |
Security Standards and Measures for Massive IoT in the 5G Era
|
Qiu, Qin |
|
|
27 |
1 |
p. 392-403 |
artikel |
34 |
Support Vector Machine Intrusion Detection Scheme Based on Cloud-Fog Collaboration
|
Du, Ruizhong |
|
|
27 |
1 |
p. 431-440 |
artikel |
35 |
Towards a Standard Feature Set for Network Intrusion Detection System Datasets
|
Sarhan, Mohanad |
|
|
27 |
1 |
p. 357-370 |
artikel |
36 |
Towards Multi-user Searchable Encryption Scheme with Support for SQL Queries
|
Li, Mingyue |
|
|
27 |
1 |
p. 417-430 |
artikel |
37 |
Use of Behavior Dynamics to Improve Early Detection of At-risk Students in Online Courses
|
Huang, Huan |
|
|
27 |
1 |
p. 441-452 |
artikel |
38 |
Utility Maximization of Capacity Entropy for Dense IEEE 802.11ax WLANs based on Interference Characteristics
|
Yang, Annan |
|
|
27 |
1 |
p. 141-157 |
artikel |
39 |
Word Embedding Quantization for Personalized Recommendation on Storage-Constrained Edge Devices in a Smart Store
|
Fan, Yao-Chung |
|
|
27 |
1 |
p. 70-83 |
artikel |