nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A blockchain ledger for securing isolated ambient intelligence deployments using reputation and information theory metrics
|
Bordel, Borja |
|
|
30 |
6 |
p. 5887-5903 |
artikel |
2 |
A comprehensive study on physical fitness of Wushu routine athletes based on video-driven core strength training mechanism in wireless network
|
Li, Long |
|
|
30 |
6 |
p. 4643-4654 |
artikel |
3 |
A fair and verifiable federated learning profit-sharing scheme
|
Li, Xianxian |
|
|
30 |
6 |
p. 4669-4684 |
artikel |
4 |
A geographic routing based on local traffic density and multi-hop intersections in VANETs for intelligent traffic system in smart cities (GRBLTD-MI)
|
Mehdi, Benaicha |
|
|
30 |
6 |
p. 5867-5886 |
artikel |
5 |
A geo-location and trust-based framework with community detection algorithms to filter attackers in 5G social networks
|
Kaur, Davinder |
|
|
30 |
6 |
p. 4841-4849 |
artikel |
6 |
A hierarchical growth method for extracting 3D phenotypic trait of apple tree branch in edge computing
|
Zhang, Yifan |
|
|
30 |
6 |
p. 5951-5966 |
artikel |
7 |
A mathematical analysis about the geo-temporal characterization of the multi-class maliciousness of an IP address
|
DeCastro-García, Noemí |
|
|
30 |
6 |
p. 5033-5048 |
artikel |
8 |
A multiband hook shaped flexible microstrip array antenna with DGS for 5G communication applications
|
Vegesna, Nagavalli |
|
|
30 |
6 |
p. 5145-5155 |
artikel |
9 |
Analysis of electromagnetic force on wireless charging structure
|
Han, Gao |
|
|
30 |
6 |
p. 6115-6124 |
artikel |
10 |
Analysis of security and privacy issues in wearables for minors
|
Fúster, Jaime |
|
|
30 |
6 |
p. 5437-5453 |
artikel |
11 |
Analysis of the application of modern mobile wireless network terminal in the tutoring design of college physical education course teaching
|
Zhang, Zhantao |
|
|
30 |
6 |
p. 5319-5331 |
artikel |
12 |
An automatic unsupervised complex event processing rules generation architecture for real-time IoT attacks detection
|
Roldán-Gómez, José |
|
|
30 |
6 |
p. 5127-5144 |
artikel |
13 |
Anchor-based sparse subspace incomplete multi-view clustering
|
Li, Ao |
|
|
30 |
6 |
p. 5559-5570 |
artikel |
14 |
An edge server deployment approach for delay reduction and reliability enhancement in the industrial internet
|
Wang, Zhongmin |
|
|
30 |
6 |
p. 5743-5757 |
artikel |
15 |
An efficient packet dropping attack detection mechanism in wireless ad-hoc networks using ECC based AODV-ACO protocol
|
Kanthimathi, S. |
|
|
30 |
6 |
p. 4851-4863 |
artikel |
16 |
An efficient privacy-preserving recommender system in wireless networks
|
Luo, Junwei |
|
|
30 |
6 |
p. 4949-4960 |
artikel |
17 |
An energy efficient fuzzy clustering-based congestion control algorithm for cognitive radio sensor networks
|
Jyothi, V. |
|
|
30 |
6 |
p. 4825-4840 |
artikel |
18 |
An enhanced 3D-DV-hop localisation algorithm for 3D wireless sensor networks
|
Reddy, Mandli Rami |
|
|
30 |
6 |
p. 5809-5821 |
artikel |
19 |
A new localization mechanism in IoT using grasshopper optimization algorithm and DVHOP algorithm
|
Janabi, Shakir Mahmood Al |
|
|
30 |
6 |
p. 5465-5485 |
artikel |
20 |
An improved weighted KNN fingerprint positioning algorithm
|
Chen, Bohang |
|
|
30 |
6 |
p. 6011-6022 |
artikel |
21 |
An outlier detection method based on the hidden Markov model and copula for wireless sensor networks
|
Dogmechi, Sina |
|
|
30 |
6 |
p. 4797-4810 |
artikel |
22 |
A novel game theoretic approach for market-driven dynamic spectrum access in cognitive radio networks
|
Igried, Bashar |
|
|
30 |
6 |
p. 5771-5786 |
artikel |
23 |
A novel technique for any-cast transmission scheduling in underwater acoustic sensor networks
|
Ababneh, Ahmad |
|
|
30 |
6 |
p. 5931-5949 |
artikel |
24 |
Anti-sorting signal design for radio frequency stealth radar based on cosine-exponential nonlinear chaotic mapping
|
Jia, Jinwei |
|
|
30 |
6 |
p. 4811-4824 |
artikel |
25 |
Application of image encryption based improved chaotic sequence complexity algorithm in the area of ubiquitous wireless technologies
|
Jaber, Mustafa Musa |
|
|
30 |
6 |
p. 4975-4988 |
artikel |
26 |
Applying machine learning enabled myriad fragment empirical modes in 5G communications to detect profile injection attacks
|
Alzaidi, Mohammed S. |
|
|
30 |
6 |
p. 5533-5546 |
artikel |
27 |
A reputation-based and privacy-preserving incentive scheme for mobile crowd sensing: a deep reinforcement learning approach
|
Zhang, Jialin |
|
|
30 |
6 |
p. 4685-4698 |
artikel |
28 |
A resource pre-allocation method for cognitive analytics-based social media service in edge computing
|
Wang, Ruizhi |
|
|
30 |
6 |
p. 6135-6150 |
artikel |
29 |
Artificial neural networks-based improved Levenberg–Marquardt neural network for energy efficiency and anomaly detection in WSN
|
Revanesh, M. |
|
|
30 |
6 |
p. 5613-5628 |
artikel |
30 |
A secure image evidence management framework using multi-bits watermark and blockchain in IoT environments
|
Yao, Qing |
|
|
30 |
6 |
p. 5157-5169 |
artikel |
31 |
A spatiotemporal and motion information extraction network for action recognition
|
Wang, Wei |
|
|
30 |
6 |
p. 5389-5405 |
artikel |
32 |
BLE-based secure tracking system proposal
|
Hernández-Goya, Candelaria |
|
|
30 |
6 |
p. 5759-5770 |
artikel |
33 |
Blind parameter estimation for co-channel digital communication signals
|
Liu, Mingqian |
|
|
30 |
6 |
p. 5589-5599 |
artikel |
34 |
Can differential privacy practically protect collaborative deep learning inference for IoT?
|
Ryu, Jihyeon |
|
|
30 |
6 |
p. 4713-4733 |
artikel |
35 |
CCSO: a dynamic collaborative scheduling scheme for wireless rechargeable sensor networks with obstacles
|
Zeng, Gang |
|
|
30 |
6 |
p. 6161-6176 |
artikel |
36 |
Channel capacity limit of multi-beam satellite system
|
Yang, Mingchuan |
|
|
30 |
6 |
p. 5279-5287 |
artikel |
37 |
Channel estimation of GFDM system based on pilot frequency in doubly selective channel
|
Tian, Xinxin |
|
|
30 |
6 |
p. 5049-5057 |
artikel |
38 |
Cloud computing-driven resource allocation method for global tennis training: a performance optimization with game theory consideration
|
Wang, Dong |
|
|
30 |
6 |
p. 4903-4912 |
artikel |
39 |
Compressed video quality enhancement algorithm based on 3D-CNNs
|
Chen, Shanji |
|
|
30 |
6 |
p. 6125-6133 |
artikel |
40 |
Construction and implementation of mobile learning system for higher education based on modern wireless network mobile communication terminal technology
|
Zhao, Weihua |
|
|
30 |
6 |
p. 5669-5681 |
artikel |
41 |
Controller placement in software defined FANET
|
Wang, Xi |
|
|
30 |
6 |
p. 5347-5360 |
artikel |
42 |
Data anonymization evaluation against re-identification attacks in edge storage
|
Chen, Minghui |
|
|
30 |
6 |
p. 5263-5277 |
artikel |
43 |
DDQN path planning for unmanned aerial underwater vehicle (UAUV) in underwater acoustic sensor network
|
Cao, Qihang |
|
|
30 |
6 |
p. 5655-5667 |
artikel |
44 |
Deep convolutional neural network with Kalman filter based objected tracking and detection in underwater communications
|
Sreekala, Keshetti |
|
|
30 |
6 |
p. 5571-5588 |
artikel |
45 |
Dependency-aware task offloading based on deep reinforcement learning in mobile edge computing networks
|
Li, Junnan |
|
|
30 |
6 |
p. 5519-5531 |
artikel |
46 |
Design and implementation of mobile e-commerce application built on WAP mobile payment system
|
Zhang, Pengnian |
|
|
30 |
6 |
p. 6089-6104 |
artikel |
47 |
Design systematic wireless inventory trackers with prolonged lifetime and low energy consumption in future 6G network
|
Meenakshi, N. |
|
|
30 |
6 |
p. 5787-5808 |
artikel |
48 |
Distributed determination method of redundant nodes in wireless communication networks based on Bezier function
|
Yu, Wei |
|
|
30 |
6 |
p. 5643-5654 |
artikel |
49 |
Downlink AP coordination based OFDMA and NOMA protocols for the next-generation WLANs
|
Zhenzhen, Yan |
|
|
30 |
6 |
p. 5487-5501 |
artikel |
50 |
Efficient and low SAR dual functional wearable antenna in RFID ISM and GPS L1 bands for positioning applications
|
Pal, Arghyadeep |
|
|
30 |
6 |
p. 5187-5199 |
artikel |
51 |
Energy efficient UAV-assisted communication with joint resource allocation and trajectory optimization in NOMA-based internet of remote things
|
Zhou, Cong |
|
|
30 |
6 |
p. 5361-5374 |
artikel |
52 |
Enhancing data protection with a distributed storage system based on the redundant residue number system
|
Gao, Zhen |
|
|
30 |
6 |
p. 5601-5612 |
artikel |
53 |
FAPDRP: a flooding attacks prevention and detection routing protocol in vehicular ad hoc network using behavior history and nonlinear median filter transformation
|
Luong, Ngoc T. |
|
|
30 |
6 |
p. 4875-4902 |
artikel |
54 |
6G assisted federated learning for continuous monitoring in wireless sensor network using game theory
|
Phani Praveen, S. |
|
|
30 |
6 |
p. 5211-5237 |
artikel |
55 |
Generation of high-order random key matrix for Hill Cipher encryption using the modular multiplicative inverse of triangular matrices
|
Chen, Yuehong |
|
|
30 |
6 |
p. 5697-5707 |
artikel |
56 |
Heterogeneous load balancing improvement on an energy-aware distributed unequal clustering protocol using BBO algorithms
|
Maleki, Maryam |
|
|
30 |
6 |
p. 4913-4933 |
artikel |
57 |
Improved 3D localization algorithm for large scale wireless sensor networks
|
Mani, Rahma |
|
|
30 |
6 |
p. 5503-5518 |
artikel |
58 |
Improved mutimodulus blind equalization algorithm for multi-level QAM signals with impulsive noise
|
Zhang, Xianhong |
|
|
30 |
6 |
p. 6023-6028 |
artikel |
59 |
Improvement and application of information communication technology in wireless routing protocol based on adaptive K-means clustering algorithm
|
Chen, Zili |
|
|
30 |
6 |
p. 5997-6009 |
artikel |
60 |
Improving robustness and efficiency of edge computing models
|
Li, Yilan |
|
|
30 |
6 |
p. 4699-4711 |
artikel |
61 |
Improving the efficiency of the XCS learning classifier system using evolutionary memory
|
Yousefi, Ali |
|
|
30 |
6 |
p. 5171-5186 |
artikel |
62 |
Improving the lightweight implementation of SNOW-V
|
Gil, Jezabel Molina |
|
|
30 |
6 |
p. 5823-5835 |
artikel |
63 |
Inception-Det: large aspect ratio rotating object detector for remote sensing images
|
Li, Ao |
|
|
30 |
6 |
p. 5333-5345 |
artikel |
64 |
Intelligent based hybrid precoder for millimetre wave massive MIMO system
|
Rajarajeswarie, B. |
|
|
30 |
6 |
p. 5239-5246 |
artikel |
65 |
Interference analysis of anti micro and small unmanned aerial vehicles and mobile communication systems uplink
|
Li, Junfang |
|
|
30 |
6 |
p. 6029-6039 |
artikel |
66 |
Inter-satellite link scheduling and power allocation method for satellite networks
|
Wang, Ruisong |
|
|
30 |
6 |
p. 5547-5558 |
artikel |
67 |
Joint activity and channel estimation for asynchronous grant-Free NOMA with chaos sequence
|
Qiu, Mingyi |
|
|
30 |
6 |
p. 6041-6053 |
artikel |
68 |
Joint power allocation and deployment optimization for HAP-assisted NOMA–MEC system
|
Zhang, Yue |
|
|
30 |
6 |
p. 5007-5019 |
artikel |
69 |
Joint waveform design for multi-user maritime integrated sensing and communication
|
Zhang, Jingchun |
|
|
30 |
6 |
p. 5919-5930 |
artikel |
70 |
Low delay network attributes randomization to proactively mitigate reconnaissance attacks in industrial control systems
|
Etxezarreta, Xabier |
|
|
30 |
6 |
p. 5077-5091 |
artikel |
71 |
Low-power secure caching strategy for Internet of vehicles
|
Song, Tao |
|
|
30 |
6 |
p. 5289-5303 |
artikel |
72 |
Millimeter assisted wave technologies in 6G assisted wireless communication systems: a new paradigm for 6G collaborative learning
|
Rao, P. V. Venkateswara |
|
|
30 |
6 |
p. 5723-5742 |
artikel |
73 |
Mobility aware load balancing using Kho–Kho optimization algorithm for hybrid Li-Fi and Wi-Fi network
|
Alharbi, Meshal |
|
|
30 |
6 |
p. 5111-5125 |
artikel |
74 |
Modulation classification with data augmentation based on a semi-supervised generative model
|
Yin, Liyan |
|
|
30 |
6 |
p. 5683-5696 |
artikel |
75 |
Multi-objective fog node placement strategy based on heuristic algorithms for smart factories
|
Xu, Fulong |
|
|
30 |
6 |
p. 5407-5424 |
artikel |
76 |
Network intrusion detection system for DDoS attacks in ICS using deep autoencoders
|
Ortega-Fernandez, Ines |
|
|
30 |
6 |
p. 5059-5075 |
artikel |
77 |
NMal-Droid: network-based android malware detection system using transfer learning and CNN-BiGRU ensemble
|
Ullah, Farhan |
|
|
30 |
6 |
p. 6177-6198 |
artikel |
78 |
OFDM integrated waveform design for joint radar and communication
|
Xiao, Bo |
|
|
30 |
6 |
p. 5425-5436 |
artikel |
79 |
Optimal deployment of vehicular cloud computing systems with remote microclouds
|
Bi, Chongke |
|
|
30 |
6 |
p. 5305-5317 |
artikel |
80 |
Optimal trajectory UAV path design based on bezier curves with multi-hop cluster selection in wireless networks
|
Li, Likun |
|
|
30 |
6 |
p. 5021-5032 |
artikel |
81 |
Optimization of the operational state's routing for mobile wireless sensor networks
|
Almuzaini, Khalid K. |
|
|
30 |
6 |
p. 5247-5261 |
artikel |
82 |
Outage behavior of the downlink reconfigurable intelligent surfaces-aided cooperative non-orthogonal multiple access network over Nakagami-m fading channels
|
Chen, Hsing-Chung |
|
|
30 |
6 |
p. 5093-5110 |
artikel |
83 |
Privacy-enhancing data aggregation and data analytics in wireless networks for a large class of distributed queries
|
Yang, Xuechao |
|
|
30 |
6 |
p. 4749-4759 |
artikel |
84 |
Q-learning based task scheduling and energy-saving MAC protocol for wireless sensor networkss
|
Jaber, Mustafa Musa |
|
|
30 |
6 |
p. 4989-5005 |
artikel |
85 |
Ranked searchable encryption based on differential privacy and blockchain
|
Xu, Chungen |
|
|
30 |
6 |
p. 4735-4748 |
artikel |
86 |
Research and implementation of network communication based on embedded monitoring system
|
Wang, Caifeng |
|
|
30 |
6 |
p. 5629-5641 |
artikel |
87 |
Research on near field sound pressure of circular piston source based on angular spectrum method
|
Yi-shu, Zhang |
|
|
30 |
6 |
p. 4865-4873 |
artikel |
88 |
Research on smart-locks cybersecurity and vulnerabilities
|
Caballero-Gil, Cándido |
|
|
30 |
6 |
p. 5905-5917 |
artikel |
89 |
Research on UAV flight control and communication method based on fuzzy adaptive
|
He, Zhenqi |
|
|
30 |
6 |
p. 6105-6113 |
artikel |
90 |
Resource allocation and offloading decision for secure UAV-based MEC wireless-powered System
|
Lu, Fangwei |
|
|
30 |
6 |
p. 6151-6159 |
artikel |
91 |
Secure and privacy-preserving sharing of personal health records with multi-party pre-authorization verification
|
Tan, Kheng-Leong |
|
|
30 |
6 |
p. 4773-4795 |
artikel |
92 |
Secured wireless sensor networks using hybrid Rivest Shamir Adleman with ant lion optimization algorithm
|
Almuzaini, Khalid K. |
|
|
30 |
6 |
p. 5977-5995 |
artikel |
93 |
Securing FPGAs in IoT: a new run-time monitoring technique against hardware Trojan
|
Cheng, Jian |
|
|
30 |
6 |
p. 5455-5463 |
artikel |
94 |
Security and energy efficient cyber-physical systems using predictive modeling approaches in wireless sensor network
|
Alghamdi, Abdullah |
|
|
30 |
6 |
p. 5851-5866 |
artikel |
95 |
SFSN: smart frame selection network for multi-task human synthesis on mobile devices
|
Zhang, Boqi |
|
|
30 |
6 |
p. 4655-4668 |
artikel |
96 |
SHFW: second-order hybrid fusion weight–median algorithm based on machining learning for advanced IoT data analytics
|
Tu, Tianyi |
|
|
30 |
6 |
p. 6055-6067 |
artikel |
97 |
Similarity measure-based spectrum sensing algorithm under impulsive noise
|
Zhang, Changqing |
|
|
30 |
6 |
p. 5967-5975 |
artikel |
98 |
Smart vision for quality apple classification using SURF–Harris optimizing techniques
|
Li, GuoYan |
|
|
30 |
6 |
p. 5709-5721 |
artikel |
99 |
Support vector machine approach of malicious user identification in cognitive radio networks
|
Arshid, Kaleem |
|
|
30 |
6 |
p. 4761-4772 |
artikel |
100 |
Survelliance monitoring based routing optimization for wireless sensor networks
|
Almuzaini, Khalid K. |
|
|
30 |
6 |
p. 6069-6087 |
artikel |
101 |
Toward intelligent cooperation at the edge: improving the QoS of workflow scheduling with the competitive cooperation of edge servers
|
Zhu, Kaige |
|
|
30 |
6 |
p. 5837-5849 |
artikel |
102 |
User association for EE maximization in uplink HetNets with NOMA
|
Zhang, Shuang |
|
|
30 |
6 |
p. 4961-4973 |
artikel |
103 |
User grouping and power allocation in NOMA-based internet of things
|
He, Jian |
|
|
30 |
6 |
p. 5375-5387 |
artikel |
104 |
Workpiece classification based on transfer component analysis
|
Qiao, Liyong |
|
|
30 |
6 |
p. 4935-4947 |
artikel |
105 |
WS-ICNN algorithm for robust adaptive beamforming
|
Liu, Fulai |
|
|
30 |
6 |
p. 5201-5210 |
artikel |