nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A geometric approach to analysing the effects of time delays on stability of vehicular platoons with ring interconnections
|
Zhang, Junying |
|
|
15 |
6 |
p. 2542-2556 |
artikel |
2 |
A greedy energy efficient clustering scheme based reinforcement learning for WSNs
|
Bourebia, Nour El Houda |
|
|
15 |
6 |
p. 2572-2588 |
artikel |
3 |
A regional interest-aware caching placement scheme for reducing latency in the LEO satellite networks
|
Liu, Zhiguo |
|
|
15 |
6 |
p. 2474-2487 |
artikel |
4 |
B-VANET: A blockchain-based vehicular ad-hoc network for data validation
|
Gaba, Priyanka |
|
|
15 |
6 |
p. 2650-2669 |
artikel |
5 |
Data transmission scheme based on node model training and time division multiple access with IoT in opportunistic social networks
|
WU, Jia |
|
|
15 |
6 |
p. 2719-2743 |
artikel |
6 |
Deep reinforcement learning-based fountain coding for concurrent multipath transfer in high-speed railway networks
|
Yu, Chengxiao |
|
|
15 |
6 |
p. 2744-2756 |
artikel |
7 |
Enhancing RPL using E-MOF: a fuzzy-based mobility model for IoV
|
Garg, Sakshi |
|
|
15 |
6 |
p. 2557-2571 |
artikel |
8 |
EPDL: An efficient and privacy-preserving deep learning for crowdsensing
|
Xu, Chang |
|
|
15 |
6 |
p. 2529-2541 |
artikel |
9 |
HPLB: High precision load balancing based on in-band network telemetry in data center networks
|
Gao, Weimin |
|
|
15 |
6 |
p. 2503-2515 |
artikel |
10 |
Improved bio-inspired security scheme for privacy-preserving in the internet of things
|
Harbi, Yasmine |
|
|
15 |
6 |
p. 2488-2502 |
artikel |
11 |
Intelligent edge content caching: A deep recurrent reinforcement learning method
|
Xu, Haitao |
|
|
15 |
6 |
p. 2619-2632 |
artikel |
12 |
MP-BADNet+: Secure and effective backdoor attack detection and mitigation protocols among multi-participants in private DNNs
|
Chen, Congcong |
|
|
15 |
6 |
p. 2457-2473 |
artikel |
13 |
Multi-attributes based energy efficient clustering for enhancing network lifetime in WSN’s
|
Srivastava, Ankita |
|
|
15 |
6 |
p. 2670-2693 |
artikel |
14 |
Optimum deployment of sensor nodes in wireless sensor network using hybrid fruit fly optimization algorithm and bat optimization algorithm for 3D Environment
|
Mohar, Satinder Singh |
|
|
15 |
6 |
p. 2694-2718 |
artikel |
15 |
Power level aware charging schedule in wireless rechargeable sensor network
|
Wang, Yanlin |
|
|
15 |
6 |
p. 2589-2602 |
artikel |
16 |
ReliefChain: A blockchain leveraged post disaster relief allocation system over smartphone-based DTN
|
Das, Nabanita |
|
|
15 |
6 |
p. 2603-2618 |
artikel |
17 |
Scaling proof-of-authority protocol to improve performance and security
|
Wu, Xiaohua |
|
|
15 |
6 |
p. 2633-2649 |
artikel |
18 |
Stochastic performance modeling for practical byzantine fault tolerance consensus in the blockchain
|
Ma, Fan-Qi |
|
|
15 |
6 |
p. 2516-2528 |
artikel |