


default search action
Computer Communications, Volume 173
Volume 173, May 2021
- Jung-Han Han

, Seung-Jae Han:
Hidden terminal-aware access point selection for IEEE 802.11ah networks. 1-13
- Xiaolu Han, Yun Liu, Zhenjiang Zhang, Xin Lü, Yang Li:

Sparse auto-encoder combined with kernel for network attack detection. 14-20 - Xuemei You, Yinghong Ma

, Zhiyuan Liu, Jiacheng Liu, Mingming Zhang:
Representation method of cooperative social network features based on Node2Vec model. 21-26
- Jinhong Zhang

, Xingwei Wang, Qiang He, Min Huang:
TEAP: Traffic Engineering and ALR policy based Power-aware solutions for green routing and planning problems in backbone networks. 27-44
- Qi Jiang

, Xin Zhang, Ning Zhang
, Youliang Tian, Xindi Ma, Jianfeng Ma:
Three-factor authentication protocol using physical unclonable function for IoV. 45-55
- Ning Sun, Xingjie Wang, Guangjie Han, Yan Peng, Jinfang Jiang:

Collision-free and low delay MAC protocol based on multi-level quorum system in underwater wireless sensor networks. 56-69
- Lihua Yin

, Jiyuan Feng
, Sixin Lin, Zhiqiang Cao, Zhe Sun
:
A blockchain-based collaborative training method for multi-party data sharing. 70-78
- Shiva Rahimipour

, Mehdi Ghatee, S. Mehdi Hashemi, Ahmad Nickabadi:
A hybrid of neuro-fuzzy inference system and hidden Markov Model for activity-based mobility modeling of cellphone users. 79-94
- Peiyuan Sun, Qiben Yan, Haoyi Zhou

, Jianxin Li:
Osprey: A fast and accurate patch presence test framework for binaries. 95-106
- Yang Li, Tianying Liu, Jianming Zhu, Xiuli Wang, Meijiao Duan

, Youwei Wang:
Comprehensive study of schedulability tests and optimal design for rate-monotonic scheduling. 107-119
- Ibrahim A. Nemer

, Tarek R. Sheltami, Ansar-Ul-Haque Yasar
:
A Survivable Communication Game based Approach for a network of cooperative UAVs. 120-133
- Mohamad Khattar Awad

, Mohammed W. Baidas
, Ahmad El-Amine:
Resource allocation for downlink non-orthogonal multiple access in joint transmission coordinated multi-point networks. 134-149 - Keming Mao, Gautam Srivastava

, Reza M. Parizi, Mohammad S. Khan
:
Multi-source fusion for weak target images in the Industrial Internet of Things. 150-159
- Shaoqing Liu, Zhenshan Ji, Yong Wang, Zuchao Zhang, Zhanghou Xu, Chaohao Kan, Ke Jin:

Multi-feature fusion for fault diagnosis of rotating machinery based on convolutional neural network. 160-169
- Modhawi Alotaibi, Amiya Nayak

:
Linking handover delay to load balancing in SDN-based heterogeneous networks. 170-182
- Xianwei Li, Liang Zhao

, Keping Yu
, Moayad Aloqaily
, Yaser Jararweh:
A cooperative resource allocation model for IoT applications in mobile edge computing. 183-191
- Mahawaga Arachchige Pathum Chamikara

, Peter Bertók, Ibrahim Khalil
, Dongxi Liu, Seyit Camtepe
:
PPaaS: Privacy Preservation as a Service. 192-205 - Wen Zhou, Xiang-min Kong

, Kaili Li, Xiao-ming Li, Lin-lin Ren, Yong Yan, Yun Sha, Xueying Cao, Xuejun Liu
:
Attack sample generation algorithm based on data association group by GAN in industrial control dataset. 206-213 - Yang Gao, Neng Chang, Kai Shang:

Multi-layer and multi-order fine-grained feature learning for artwork attribute recognition. 214-219

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














