nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A bandwidth-efficient lightweight authentication scheme for 5G HetNets
|
Batra, Indu |
|
|
31 |
6 |
p. 4377-4395 |
artikel |
2 |
A high-performance dual-element slotted THz antenna with enhanced MIMO metrics for 5G/6G applications
|
Rajarajeshwari, K. C. |
|
|
31 |
6 |
p. 4215-4226 |
artikel |
3 |
An adaptive channel reservation MAC protocol based on forwarding traffic of key nodes
|
Liu, Ze |
|
|
31 |
6 |
p. 3967-3980 |
artikel |
4 |
An approach to make handover efficient in 5G and beyond using deep hybrid learning
|
Hassan, Kazi Md. Abir |
|
|
31 |
6 |
p. 4397-4411 |
artikel |
5 |
An efficient ring signcryption scheme for wireless sensor networks
|
Jin, Chunhua |
|
|
31 |
6 |
p. 3931-3942 |
artikel |
6 |
An entropy weight-non dominated sorting genetic algorithm for QoS resource optimization in 5G driven IoV networks
|
Sahoo, Satyabrat |
|
|
31 |
6 |
p. 4321-4337 |
artikel |
7 |
An integrable high isolation MIMO antenna for wireless and ISM band applications: design and evaluation
|
Himaja, Makkapati |
|
|
31 |
6 |
p. 4363-4376 |
artikel |
8 |
A note on “an efficient and provably secure authenticated key agreement scheme for mobile edge computing”
|
Cao, Zhengjun |
|
|
31 |
6 |
p. 3993-3998 |
artikel |
9 |
Automatic modulation recognition using vision transformers with cross-layer feature fusion and Kolmogorov–Arnold representation
|
Wu, Tieming |
|
|
31 |
6 |
p. 3981-3992 |
artikel |
10 |
Batched split learning: a novel framework for low-latency and energy-efficient split learning with optimized task scheduling
|
Li, Zhuo |
|
|
31 |
6 |
p. 4245-4263 |
artikel |
11 |
Channel access in multi-rate wireless LANs: a peak age of information perspective
|
Erdem, Umut Utku |
|
|
31 |
6 |
p. 4163-4177 |
artikel |
12 |
Collaborative vessel clustering for improved satellite communication in maritime systems
|
Karabulut, Candar |
|
|
31 |
6 |
p. 4339-4362 |
artikel |
13 |
Compact low-profile multiple-input multiple-output (MIMO) antenna for portable devices in next-generation 5G wireless networks
|
Sheriff, Nathirulla |
|
|
31 |
6 |
p. 4147-4161 |
artikel |
14 |
Congestion control and enhancing efficiency in wireless sensor networks through optimization techniques
|
Jadhav, Savita Sandeep |
|
|
31 |
6 |
p. 3999-4013 |
artikel |
15 |
Correction: Securing and optimizing IoT offloading with blockchain and deep reinforcement learning in multi-user environments
|
Heidari, Arash |
|
|
31 |
6 |
p. 4413 |
artikel |
16 |
DCPMK: a difference-of-convex programming-based approach for deploying m-connected k-covering wireless sensor networks
|
Ghasemi, Vahid |
|
|
31 |
6 |
p. 3943-3965 |
artikel |
17 |
Deep learning detector for downlink IM-NOMA
|
Gian, Toan |
|
|
31 |
6 |
p. 4135-4146 |
artikel |
18 |
Design and analysis of CPW-fed multiband antenna for bluetooth and X-band applications with SAR analysis on human head phantom
|
Malhotra, Shivani |
|
|
31 |
6 |
p. 4033-4045 |
artikel |
19 |
Efficient anonymous authentication in fog-assisted smart factories with resistance to physical device capture attacks
|
Wang, Ziwen |
|
|
31 |
6 |
p. 4087-4109 |
artikel |
20 |
Enhanced random access throughput for fixed-location machine-type communications devices: a collision resolution scheme
|
Alavikia, Zahra |
|
|
31 |
6 |
p. 4227-4243 |
artikel |
21 |
Mobile sink based efficient data gathering and routing using clustering based hybrid models
|
Ramanan, K. |
|
|
31 |
6 |
p. 3907-3930 |
artikel |
22 |
Optimal computation offloading, dynamic pricing and admission control for mobile edge computing-enabled blockchain
|
Chen, Liming |
|
|
31 |
6 |
p. 4015-4031 |
artikel |
23 |
Performance analysis of fully generalized spatial modulation aided C-NOMA system for B5G applications
|
Srikamu, C. |
|
|
31 |
6 |
p. 4275-4288 |
artikel |
24 |
Physical layer security perspective resource allocation for D2D underlay communications against multiple eavesdroppers
|
Liang, Yao-Jen |
|
|
31 |
6 |
p. 4047-4055 |
artikel |
25 |
Relate: latency-based reliable controller placement using wisdom of artificial crowds in SDN-WAN
|
Thalapala, Vidya Sagar |
|
|
31 |
6 |
p. 4303-4320 |
artikel |
26 |
Retraction Note: Towards an efficient model for network intrusion detection system (IDS): systematic literature review
|
Abdulganiyu, Oluwadamilare Harazeem |
|
|
31 |
6 |
p. 4415 |
artikel |
27 |
SAPACS: scenario-adaptive pseudonym authentication and change scheme for enabling security and privacy in VANETs
|
Deng, Yukang |
|
|
31 |
6 |
p. 4057-4086 |
artikel |
28 |
Shuffle-F-ZFNet: ShuffleNet Fuzzy Zeiler and Fergus network for data aggregation in WSN data communication
|
Dhanabal, S. |
|
|
31 |
6 |
p. 4111-4134 |
artikel |
29 |
Social resource consumption-based message forwarding in delay tolerant network for Urban areas
|
Ayub, Qaisar |
|
|
31 |
6 |
p. 4199-4213 |
artikel |
30 |
Spectrum analysis: assessing interference risks for Ku-band satellite services resulting from 5G/6G systems operating in X-band
|
Alexandre, Luciano Camilo |
|
|
31 |
6 |
p. 4265-4274 |
artikel |
31 |
TEAD: trust-enhanced anomaly detection framework for intrusion detection in IoT-enabled wireless sensor networks (WSNs)
|
Anwer, Raja Waseem |
|
|
31 |
6 |
p. 4179-4197 |
artikel |
32 |
User pairing and location planning in multi-UAV assisted downlink NOMA for emergency communications
|
Devipriya, S. |
|
|
31 |
6 |
p. 4289-4302 |
artikel |