default search action
IEEE Internet of Things Journal, Volume 8
Volume 8, Number 1, January 2021
- Sabah Suhail, Rasheed Hussain, Abid Khan, Choong Seon Hong:
On the Role of Hash-Based Signatures in Quantum-Safe Internet of Things: Current Solutions and Future Directions. 1-17 - Muhammad Baqer Mollah, Jun Zhao, Dusit Niyato, Kwok-Yan Lam, Xin Zhang, Amer M. Y. M. Ghias, Leong Hai Koh, Lei Yang:
Blockchain for Future Smart Grid: A Comprehensive Survey. 18-43 - Liudong Xing:
Cascading Failures in Internet of Things: Review and Perspectives on Reliability and Resilience. 44-64 - Mohammed Abuhamad, Ahmed Abusnaina, Daehun Nyang, David Mohaisen:
Sensor-Based Continuous Authentication of Smartphones' Users Using Behavioral Biometrics: A Contemporary Survey. 65-84 - Yawen Chen, Yu Liu, Ming Zeng, Umber Saleem, Zhaoming Lu, Xiangming Wen, Depeng Jin, Zhu Han, Tao Jiang, Yong Li:
Reinforcement Learning Meets Wireless Networks: A Layering Perspective. 85-111 - Yong Liu, Xuehan Chen, Lin X. Cai, Qingchun Chen, Ran Zhang:
Nonorthogonal Multiple Access for Wireless-Powered IoT Networks. 112-128 - Hyowoon Seo, Jihong Park, Mehdi Bennis, Wan Choi:
Communication and Consensus Co-Design for Distributed, Low-Latency, and Reliable Wireless Systems. 129-143 - Yongliang Cheng, Yan Xu, Hong Zhong, Yi Liu:
Leveraging Semisupervised Hierarchical Stacking Temporal Convolutional Network for Anomaly Detection in IoT Communication. 144-155 - Leyou Zhang, Yadi Ye, Yi Mu:
Multiauthority Access Control With Anonymous Authentication for Personal Health Record. 156-167 - Nikumani Choudhury, Rakesh Matam, Mithun Mukherjee, Jaime Lloret, Ezhil Kalaimannan:
NCHR: A Nonthreshold-Based Cluster-Head Rotation Scheme for IEEE 802.15.4 Cluster-Tree Networks. 168-178 - Mertkan Koca, Gökhan Görbilek, Burak Soner, Sinem Coleri:
Empirical Feasibility Analysis for Energy Harvesting Intravehicular Wireless Sensor Networks. 179-186 - Ang Li, Jingqi Fu, Huaming Shen, Sizhou Sun:
A Cluster-Principal-Component-Analysis-Based Indoor Positioning Algorithm. 187-196 - Huayan Guo, An Liu, Vincent K. N. Lau:
Analog Gradient Aggregation for Federated Learning Over Wireless Networks: Customized Design and Convergence Analysis. 197-210 - Muhammad Hanif, Ha H. Nguyen:
Slope-Shift Keying LoRa-Based Modulation. 211-221 - Anthony S. Deese, Joe Jesson, Thomas Brennan, Steven Hollain, Patrick Stefanacci, Emily Driscoll, Connor Dick, Keith Garcia, Ryan Mosher, Brian Rentsch, Andrew Bechtel, Efrain Rodriguez:
Long-Term Monitoring of Smart City Assets via Internet of Things and Low-Power Wide-Area Networks. 222-231 - Ibrahim Kök, Suat Özdemir:
DeepMDP: A Novel Deep-Learning-Based Missing Data Prediction Protocol for IoT. 232-243 - Jinglin Zhang, Wenjun Xu, Hui Gao, Miao Pan, Zhu Han, Ping Zhang:
Codebook-Based Beam Tracking for Conformal Array-Enabled UAV mmWave Networks. 244-261 - Chengcheng Zhao, Lin Cai, Peng Cheng:
Stability Analysis of Vehicle Platooning With Limited Communication Range and Random Packet Losses. 262-277 - Onel L. Alcaraz López, Samuel Montejo Sanchez, Richard D. Souza, Constantinos B. Papadias, Hirley Alves:
On CSI-Free Multiantenna Schemes for Massive RF Wireless Energy Transfer. 278-296 - Mingjing Cai, Wei-Hsin Liao:
High-Power Density Inertial Energy Harvester Without Additional Proof Mass for Wearables. 297-308 - Endah Kristiani, Chao-Tung Yang, Chin-Yin Huang, Po-Cheng Ko, Halim Fathoni:
On Construction of Sensors, Edge, and Cloud (iSEC) Framework for Smart System Integration and Applications. 309-319 - Jie Zhang, Wendong Xiao, Yanjiao Li:
Data and Knowledge Twin Driven Integration for Large-Scale Device-Free Localization. 320-331 - Xinhua Wang, Xiaodong Wang, Alexei Ashikhmin:
Long-Term Scheduling and Power Control for Wirelessly Powered Cell-Free IoT. 332-344 - Renchao Xie, Qinqin Tang, Chenghao Liang, Fei Richard Yu, Tao Huang:
Dynamic Computation Offloading in IoT Fog Systems With Imperfect Channel-State Information: A POMDP Approach. 345-356 - Guyue Li, Zheying Zhang, Junqing Zhang, Aiqun Hu:
Encrypting Wireless Communications on the Fly Using One-Time Pad and Key Generation. 357-369 - Meiyi Yang, Nianbo Liu, Lin Zuo, Yong Feng, Minghui Liu, Haigang Gong, Ming Liu:
Dynamic Charging Scheme Problem With Actor-Critic Reinforcement Learning. 370-380 - Huaguang Shi, Meng Zheng, Wei Liang, Jialin Zhang, Ke Wang, Shuai Liu:
Transmission Scheduling With Order Constraints in WIA-FA-Based AGV Systems. 381-392 - Yonghao Zhao, Zhixiang Zhang, Tianyi Feng, Wai-Choong Wong, Hari Krishna Garg:
GraphIPS: Calibration-Free and Map-Free Indoor Positioning Using Smartphone Crowdsourced Data. 393-406 - Bala Krishna Maddali, Pascal Lorenz:
Location, Context, and Social Objectives Using Knowledge-Based Rules and Conflict Resolution for Security in Internet of Things. 407-417 - Zhanghua Cai, Yantao Zhou, Yihong Qi, Weihua Zhuang, Lei Deng:
A Millimeter Wave Dual-Lens Antenna for IoT-Based Smart Parking Radar System. 418-427 - Jiahao Gao, Zhiwen Hu, Kaigui Bian, Xinyu Mao, Lingyang Song:
AQ360: UAV-Aided Air Quality Monitoring by 360-Degree Aerial Panoramic Images in Urban Areas. 428-442 - Abubakar U. Makarfi, Khaled M. Rabie, Omprakash Kaiwartya, Kabita Adhikari, Galymzhan Nauryzbayev, Xingwang Li, Rupak Kharel:
Toward Physical-Layer Security for Internet of Vehicles: Interference-Aware Modeling. 443-457 - Jing Wang, Libing Wu, Huaqun Wang, Kim-Kwang Raymond Choo, Debiao He:
An Efficient and Privacy-Preserving Outsourced Support Vector Machine Training for Internet of Medical Things. 458-473 - Ziyuan Pu, Meixin Zhu, Wenxiang Li, Zhiyong Cui, Xiaoyu Guo, Yinhai Wang:
Monitoring Public Transit Ridership Flow by Passively Sensing Wi-Fi and Bluetooth Mobile Devices. 474-486 - Shun-Chi Wu, Pei-Lun Hung, A. Lee Swindlehurst:
ECG Biometric Recognition: Unlinkability, Irreversibility, and Security. 487-500 - Weichao Chen, Shengjie Zhao, Rongqing Zhang, Yi Chen, Liuqing Yang:
UAV-Assisted Data Collection With Nonorthogonal Multiple Access. 501-511 - Zhenjie Guo, Jian Peng, Wenzheng Xu, Weifa Liang, Weigang Wu, Zichuan Xu, Bing Guo, Yue Ivan Wu:
Minimizing Redundant Sensing Data Transmissions in Energy-Harvesting Sensor Networks via Exploring Spatial Data Correlations. 512-527 - Xiaoli Sun, Weiwei Yang, Yueming Cai, Meng Wang:
Secure mmWave UAV-Enabled SWIPT Networks Based on Random Frequency Diverse Arrays. 528-540 - Jeongsik Choi, Yang-Seok Choi:
Calibration-Free Positioning Technique Using Wi-Fi Ranging and Built-In Sensors of Mobile Devices. 541-554 - Md. Mahmud Hossain, Ragib Hasan:
P-HIP: A Lightweight and Privacy-Aware Host Identity Protocol for Internet of Things. 555-571 - Shixiong Wang, Yuxin Che, Huangjie Zhao, Andrew Lim:
Accurate Tracking, Collision Detection, and Optimal Scheduling of Airport Ground Support Equipment. 572-584 - Dajian Huang, Xiufang Shi, Wen-an Zhang:
False Data Injection Attack Detection for Industrial Control Systems Based on Both Time- and Frequency-Domain Analysis of Sensor Data. 585-595 - Nabeel Khan, Khurram Iqbal, Maria G. Martini:
Time-Aggregation-Based Lossless Video Encoding for Neuromorphic Vision Sensor Data. 596-609 - Xinquan Huang, Aijun Liu, Haibo Zhou, Kai Yu, Wei Wang, Xuemin Shen:
FMAC: A Self-Adaptive MAC Protocol for Flocking of Flying Ad Hoc Network. 610-625 - Lihua Ruan, Maluge Pubuduni Imali Dias, Elaine Wong:
Achieving Low-Latency Human-to-Machine (H2M) Applications: An Understanding of H2M Traffic for AI-Facilitated Bandwidth Allocation. 626-635 - Xu Kang, Liang Liu, Huadong Ma:
ESR-GAN: Environmental Signal Reconstruction Learning With Generative Adversarial Network. 636-646 - Ying Cai, Hao Zhang, Yuguang Fang:
A Conditional Privacy Protection Scheme Based on Ring Signcryption for Vehicular Ad Hoc Networks. 647-656
Volume 8, Number 2, January 2021
- Xiaoyuan Luo, Yating Li, Xinyu Wang, Xinping Guan:
Interval Observer-Based Detection and Localization Against False Data Injection Attack in Smart Grids. 657-671 - Yu Nakayama, Kazuki Maruta:
Age-of-Information-Based Host Selection for Mobile User Provided Networks. 672-683 - Guangjie Han, Hao Wang, Haofei Guan, Mohsen Guizani:
A Mobile Charging Algorithm Based on Multicharger Cooperation in Internet of Things. 684-694 - Wenjing You, Chao Dong, Xiao Cheng, Xiaojun Zhu, Qihui Wu, Guihai Chen:
Joint Optimization of Area Coverage and Mobile-Edge Computing With Clustering for FANETs. 695-707 - Jusik Yun, Yunyeong Goh, Jong-Moon Chung:
DQN-Based Optimization Framework for Secure Sharded Blockchain Systems. 708-722 - Wanchun Liu, Girish N. Nair, Yonghui Li, Dragan Nesic, Branka Vucetic, H. Vincent Poor:
On the Latency, Rate, and Reliability Tradeoff in Wireless Networked Control Systems for IIoT. 723-733 - Jing Li, Yujian Ye, Dimitrios Papadaskalopoulos, Goran Strbac:
Computationally Efficient Pricing and Benefit Distribution Mechanisms for Incentivizing Stable Peer-to-Peer Energy Trading. 734-749 - Weikun Zhang, Zicong Hong, Wuhui Chen:
Hierarchical Pricing Mechanism With Financial Stability for Decentralized Crowdsourcing: A Smart Contract Approach. 750-765 - Tien-Dung Nguyen, Duc-Tai Le, Van Vi Vo, Moonseong Kim, Hyunseung Choo:
Fast Sensory Data Aggregation in IoT Networks: Collision-Resistant Dynamic Approach. 766-777 - Fenghui Zhang, Michael Mao Wang:
Stochastic Congestion Game for Load Balancing in Mobile-Edge Computing. 778-790 - Yuhan Su, Minghui Liwang, Zhibin Gao, Lianfen Huang, Xiaojiang Du, Mohsen Guizani:
Optimal Cooperative Relaying and Power Control for IoUT Networks With Reinforcement Learning. 791-801 - Xuyang Ding, Shuai Zhang, Mengkai Song, Xiaocong Ding, Fagen Li:
Toward Invisible Adversarial Examples Against DNN-Based Privacy Leakage for Internet of Things. 802-812 - Dezhi Chen, Qi Qi, Zirui Zhuang, Jingyu Wang, Jianxin Liao, Zhu Han:
Mean Field Deep Reinforcement Learning for Fair and Efficient UAV Control. 813-828 - Azzam Mourad, Hanine Tout, Omar Abdel Wahab, Hadi Otrok, Toufic Dbouk:
Ad Hoc Vehicular Fog Enabling Cooperative Low-Latency Intrusion Detection. 829-843 - Zengpeng Li, Zheng Yang, Pawel Szalachowski, Jianying Zhou:
Building Low-Interactivity Multifactor Authenticated Key Exchange for Industrial Internet of Things. 844-859 - Nafiul Rashid, Manik Dautta, Peter Tseng, Mohammad Abdullah Al Faruque:
HEAR: Fog-Enabled Energy-Aware Online Human Eating Activity Recognition. 860-868 - Nikhil Kumar, Debopam Acharya, Divya Lohani:
An IoT-Based Vehicle Accident Detection and Classification System Using Sensor Fusion. 869-880 - Bhabendu Kumar Mohanta, Debasish Jena, Somula Ramasubbareddy, Mahmoud Daneshmand, Amir H. Gandomi:
Addressing Security and Privacy Issues of IoT Using Blockchain Technology. 881-888 - Adnan Sharif, Guangtao Zhai, Jun Jia, Xiongkuo Min, Xiangyang Zhu, Jiahe Zhang:
An Accurate and Efficient 1-D Barcode Detector for Medium of Deployment in IoT Systems. 889-900 - Xiaofan Jiang, Heng Zhang, Edgardo Alberto Barsallo Yi, Nithin Raghunathan, Charilaos Mousoulis, Somali Chaterji, Dimitrios Peroulis, Ali Shakouri, Saurabh Bagchi:
Hybrid Low-Power Wide-Area Mesh Network for IoT Applications. 901-915 - Roland Katona, Victor Cionca, Donna O'Shea, Dirk Pesch:
Virtual Network Embedding for Wireless Sensor Networks Time-Efficient QoS/QoI-Aware Approach. 916-926 - Juan Wang, Shirong Hao, Ru Wen, Boxian Zhang, Liqiang Zhang, Hongxin Hu, Rongxing Lu:
IoT-Praetor: Undesired Behaviors Detection for IoT Devices. 927-940 - Chia-Cheng Hu:
Profit-Based Algorithm of Joint Real-Time Task Scheduling and Resource Allocation in C-RANs. 941-950 - Jun Gao, Luyun Gan, Fabiola Buschendorf, Liao Zhang, Hua Liu, Peixue Li, Xiaodai Dong, Tao Lu:
Omni SCADA Intrusion Detection Using Deep Learning Algorithms. 951-961 - Ya-Ju Yu:
NPDCCH Period Adaptation and Downlink Scheduling for NB-IoT Networks. 962-975 - Shidrokh Goudarzi, Mohammad Hossein Anisi, Hamed Ahmadi, Leila Musavian:
Dynamic Resource Allocation Model for Distribution Operations Using SDN. 976-988 - Shuang Li, Fengye Hu, Zhuo Xu, Zhi Mao, Zhuang Ling, He Liu:
Joint Power Allocation in Classified WBANs With Wireless Information and Power Transfer. 989-1000 - Jiwei Tian, Buhong Wang, Tengyao Li, Fute Shang, Kunrui Cao, Rongxiao Guo:
TOTAL: Optimal Protection Strategy Against Perfect and Imperfect False Data Injection Attacks on Power Grid Cyber-Physical Systems. 1001-1015 - Wei Kuang Lai, You-Chiun Wang, Sih-Yu Lin:
Efficient Scheduling, Caching, and Merging of Notifications to Save Message Costs in IoT Networks Using CoAP. 1016-1029 - Aaqib Saeed, Flora D. Salim, Tanir Ozcelebi, Johan Lukkien:
Federated Self-Supervised Learning of Multisensor Representations for Embedded Intelligence. 1030-1040 - Jungyeon Baek, Georges Kaddoum:
Heterogeneous Task Offloading and Resource Allocations via Deep Recurrent Reinforcement Learning in Partial Observable Multifog Networks. 1041-1056 - Guijuan Zhang, Dianjie Lu, Hong Liu:
IoT-Based Positive Emotional Contagion for Crowd Evacuation. 1057-1070 - Yuyi Sun, Jiming Chen, Shibo He, Zhiguo Shi:
High-Confidence Gateway Planning and Performance Evaluation of a Hybrid LoRa Network. 1071-1081 - Sihao Zhao, Xiao-Ping Zhang, Xiaowei Cui, Mingquan Lu:
A Closed-Form Localization Method Utilizing Pseudorange Measurements From Two Nonsynchronized Positioning Systems. 1082-1094 - Song Yang, Nan He, Fan Li, Stojan Trajanovski, Xu Chen, Yu Wang, Xiaoming Fu:
Survivable Task Allocation in Cloud Radio Access Networks With Mobile-Edge Computing. 1095-1108 - Zheng-Yi Chai, Shun-Shun Fang, Ya-Lun Li:
An Improved Decomposition-Based Multiobjective Evolutionary Algorithm for IoT Service. 1109-1122 - Muhammad Naveed Aman, Uzair Javaid, Biplab Sikdar:
A Privacy-Preserving and Scalable Authentication Protocol for the Internet of Vehicles. 1123-1139 - Jindi Zhang, Yifan Zhang, Kejie Lu, Jianping Wang, Kui Wu, Xiaohua Jia, Bin Liu:
Detecting and Identifying Optical Signal Attacks on Autonomous Driving Systems. 1140-1153 - Sanaz Kianoush, Stefano Savazzi, Manuel Beschi, Stephan Sigg, Vittorio Rampa:
A Multisensory Edge-Cloud Platform for Opportunistic Radio Sensing in Cobot Environments. 1154-1168 - Bardia Safaei, Amir Mahdi Hosseini Monazzah, Alireza Ejlali:
ELITE: An Elaborated Cross-Layer RPL Objective Function to Achieve Energy Efficiency in Internet-of-Things Devices. 1169-1182 - Yuan Yue, Xiaohui Zhao, Zan Li:
Enhanced and Facilitated Indoor Positioning by Visible-Light GraphSLAM Technique. 1183-1196 - Yuyi Sun, Swarun Kumar, Shibo He, Jiming Chen, Zhiguo Shi:
You Foot the Bill! Attacking NFC With Passive Relays. 1197-1210 - Huimin Hu, Ke Xiong, Gang Qu, Qiang Ni, Pingyi Fan, Khaled Ben Letaief:
AoI-Minimal Trajectory Planning and Data Collection in UAV-Assisted Wireless Powered IoT Networks. 1211-1223 - Foivos Michelinakis, Anas Saeed Al-Selwi, Martina Capuzzo, Andrea Zanella, Kashif Mahmood, Ahmed Elmokashfi:
Dissecting Energy Consumption of NB-IoT Devices Empirically. 1224-1242 - Mohamed I. Ibrahem, Mahmoud Nabil, Mostafa M. Fouda, Mohamed M. E. A. Mahmoud, Waleed Alasmary, Fawaz Alsolami:
Efficient Privacy-Preserving Electricity Theft Detection With Dynamic Billing and Load Monitoring for AMI Networks. 1243-1258
Volume 8, Number 3, February 2021
- Fang Yu, Li Cui, Pengcheng Wang, Chuanqi Han, Ruoran Huang, Xi Huang:
EasiEdge: A Novel Global Deep Neural Networks Pruning Method for Efficient Edge Computing. 1259-1271 - Batyr Charyyev, Mehmet Hadi Gunes:
Locality-Sensitive IoT Network Traffic Fingerprinting for Device Identification. 1272-1281 - Xiaoyan Bi, Tie Qiu, Wenyu Qu, Laiping Zhao, Xiaobo Zhou, Dapeng Oliver Wu:
Dynamically Transient Social Community Detection for Mobile Social Networks. 1282-1293 - Fengyu Wang, Feng Zhang, Chenshu Wu, Beibei Wang, K. J. Ray Liu:
ViMo: Multiperson Vital Sign Monitoring Using Commodity Millimeter-Wave Radio. 1294-1307 - Fang Fu, Yunpeng Kang, Zhicai Zhang, F. Richard Yu, Tuan Wu:
Soft Actor-Critic DRL for Live Transcoding and Streaming in Vehicular Fog-Computing-Enabled IoV. 1308-1321 - Yanming Liu, Kai Liu, Jinglin Han, Lipeng Zhu, Zhenyu Xiao, Xiang-Gen Xia:
Resource Allocation and 3-D Placement for UAV-Enabled Energy-Efficient IoT Communications. 1322-1333 - Yueqian Zhang, Murat Simsek, Burak Kantarci:
Empowering Self-Organized Feature Maps for AI-Enabled Modeling of Fake Task Submissions to Mobile Crowdsensing Platforms. 1334-1346 - Kecheng Zhang, Mugen Peng, Yaohua Sun:
Delay-Optimized Resource Allocation in Fog-Based Vehicular Networks. 1347-1357 - Sihua Wang, Mingzhe Chen, Xuanlin Liu, Changchuan Yin, Shuguang Cui, H. Vincent Poor:
A Machine Learning Approach for Task and Resource Allocation in Mobile-Edge Computing-Based Networks. 1358-1372 - Xiaozhen Ye, Huansheng Ning, Per Backlund, Jianguo Ding:
Flow Experience Detection and Analysis for Game Users by Wearable-Devices-Based Physiological Responses Capture. 1373-1387 - Bizhu Wang, Yan Sun, Xiaodong Xu:
A Scalable and Energy-Efficient Anomaly Detection Scheme in Wireless SDN-Based mMTC Networks for IoT. 1388-1405 - Wei Zhang, Kegen Yu, Weixi Wang, Xiaoming Li:
A Self-Adaptive AP Selection Algorithm Based on Multiobjective Optimization for Indoor WiFi Positioning. 1406-1416 - Yogachandran Rahulamathavan, Safak Dogan, Xiyu Shi, Rongxing Lu, Muttukrishnan Rajarajan, Ahmet M. Kondoz:
Scalar Product Lattice Computation for Efficient Privacy-Preserving Systems. 1417-1427 - Jinho Choi:
On Fast Retrial for Two-Step Random Access in MTC. 1428-1436 - Jong Ho Moon, Jong Jin Park, Kang-Yoon Lee, Dong In Kim:
Heterogeneously Reconfigurable Energy Harvester: An Algorithm for Optimal Reconfiguration. 1437-1452 - Qiqi Ren, Jian Chen, Omid Abbasi, Gunes Karabulut-Kurt, Halim Yanikomeroglu, F. Richard Yu:
An Application-Driven Nonorthogonal-Multiple-Access-Enabled Computation Offloading Scheme. 1453-1466 - Kisong Lee, Junseong Bang, Hyun-Ho Choi:
Secrecy Outage Minimization for Wireless-Powered Relay Networks With Destination-Assisted Cooperative Jamming. 1467-1476