


default search action
Computer Communications, Volume 176
Volume 176, August 2021
- Monica Ravishankar, Thompson Stephan

, Thinagaran Perumal
:
Time dependent network resource optimization in cyber-physical systems using game theory. 1-12
- Ali Nauman

, Muhammad Ali Jamshed, Rashid Ali
, Korhan Cengiz
, Zulqarnain, Sung Won Kim:
Reinforcement learning-enabled Intelligent Device-to-Device (I-D2D) communication in Narrowband Internet of Things (NB-IoT). 13-22
- Naiyue Chen

, Yinglong Li, Xuejun Liu, Zhenjiang Zhang:
A mutual information based federated learning framework for edge computing networks. 23-30
- Shuhua Huang

, Weiwei Liu, Guangjie Liu
, Yuewei Dai, Huiwen Bai:
A correlation-based approach to detecting wireless physical covert channels. 31-39
- Han Wang

, Xingwang Li
, Rutvij H. Jhaveri, Thippa Reddy Gadekallu
, Mingfu Zhu, Tariq Ahamed Ahanger
, Sunder Ali Khowaja
:
Sparse Bayesian learning based channel estimation in FBMC/OQAM industrial IoT networks. 40-45
- Jianfeng Guan

, Yinan Wu, Su Yao
, Tianhong Zhang, Xiaokang Su
, Chuanqing Li
:
BSLA: Blockchain-assisted Secure and Lightweight Authentication for SGIN. 46-55
- Ruirui Ning, Siyu Lin

, Hongwei Wang, Weiyang Feng, Bin Sun
, Jianwen Ding, Wenyi Jiang, Zhangdui Zhong:
Data driven interference source localization based on train real-time onboard interference monitoring. 56-65
- Kaveh Kadkhoda Mohammadmosaferi

, Hassan Naderi
:
AFIF: Automatically Finding Important Features in community evolution prediction for dynamic social networks. 66-80
- Qiang Zhang, Guojun Wang, Wenjuan Tang, Karim Alinani

, Qin Liu, Xin Li:
Efficient personalized search over encrypted data for mobile edge-assisted cloud storage. 81-90
- Libing Wu, Rui Zhang, Ruiting Zhou, Dan Wu:

An edge computing based data detection scheme for traffic light at intersections. 91-98
- Vinay Chamola

, Alireza Jolfaei
, Vaibhav Chanana, Prakhar Parashari, Vikas Hassija:
Information security in the post quantum era for 5G and beyond networks: Threats to existing cryptography, and post-quantum cryptography. 99-118
- Bing Hu, Zhixin Sun, Jian Liu:

Distributed time synchronization algorithm based on sequential belief propagation in wireless sensor networks. 119-127
- Han Liu, Xiaotong Zhang, Xianchao Zhang, Qimai Li

, Xiao-Ming Wu
:
RPC: Representative possible world based consistent clustering algorithm for uncertain data. 128-137 - Hongyu Sun, Xining Cui, Zhan Song, Feifei Gu:

Precise grabbing of overlapping objects system based on end-to-end deep neural network. 138-145 - Amiya Kumar Sahu

, Suraj Sharma
, Mohammad Tanveer, Rohit Raja
:
Internet of Things attack detection using hybrid Deep Learning Model. 146-154
- Xiangyang Liu

, Xiangli Liu:
Asymptotically optimal link bit error probability for distributed detection in wireless sensor networks. 155-162 - Qian Liu, Hao Zhang, Gaofeng Shen, Fengtong Mei:

A fast reconstruction of the parity-check matrices of LDPC codes in a noisy environment. 163-172
- Judith Nkechinyere Njoku

, Manuel Eugenio Morocho Cayamcela
, Wansu Lim
:
BLER performance evaluation of an enhanced channel autoencoder. 173-181
- Gang Yao, Zhiyuan Xu:

Trajectory tracking analysis of airborne data link antenna. 182-189
- Gabriel Martins de Oliveira Costa, Sergio Guedes de Souza, Igor Leão dos Santos, Luci Pirmez, Claudio M. de Farias:

On a multisensor knowledge fusion heuristic for the Internet of Things. 190-206
- Arun Kumar, Sharad Sharma

, Nitin Goyal
, Aman Singh
, Xiaochun Cheng
, Parminder Singh
:
Secure and energy-efficient smart building architecture with emerging technology IoT. 207-217
- Marcus de Ree

, Georgios Mantas, Jonathan Rodriguez, Ifiok E. Otung
, Christos V. Verikoukis:
DISTANT: DIStributed Trusted Authority-based key managemeNT for beyond 5G wireless mobile small cells. 218-233
- Saman Fouladi, Mohammad Javad Ebadi

, Ali A. Safaei, Mohd Yazid Bajuri
, Ali Ahmadian
:
Efficient deep neural networks for classification of COVID-19 based on CT images: Virtualization via software defined radio. 234-248
- Jie Yin, Liang Guo

, Wei Jiang, Sheng Hong, Jie Yang:
ShuffleNet-inspired lightweight neural network design for automatic modulation classification methods in ubiquitous IoT cyber-physical systems. 249-257
- Hanane Djeddal

, Liticia Touzari
, Anastasios Giovanidis
, Chi-Dung Phung, Stefano Secci:
Hyperbolic K-means for traffic-aware clustering in cloud and virtualized RANs. 258-271
- Dapeng Man, Qi Lu, Hanbo Wang, Jiafei Guo, Wu Yang, Jiguang Lv

:
On-path caching based on content relevance in Information-Centric Networking. 272-281
- Zhiliang Huang, Hong Ma, Shizhi Wang, Yuan Shen:

Accurate Item Recommendation Algorithm of itemrank based on tag and context information. 282-289

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














