


Остановите войну!
for scientists:


default search action
IEEE Internet of Things Journal, Volume 8
Volume 8, Number 1, January 2021
- Sabah Suhail
, Rasheed Hussain
, Abid Khan
, Choong Seon Hong
:
On the Role of Hash-Based Signatures in Quantum-Safe Internet of Things: Current Solutions and Future Directions. 1-17 - Muhammad Baqer Mollah
, Jun Zhao
, Dusit Niyato
, Kwok-Yan Lam
, Xin Zhang
, Amer M. Y. M. Ghias
, Leong Hai Koh
, Lei Yang
:
Blockchain for Future Smart Grid: A Comprehensive Survey. 18-43 - Liudong Xing
:
Cascading Failures in Internet of Things: Review and Perspectives on Reliability and Resilience. 44-64 - Mohammed Abuhamad
, Ahmed Abusnaina
, Daehun Nyang
, David Mohaisen
:
Sensor-Based Continuous Authentication of Smartphones' Users Using Behavioral Biometrics: A Contemporary Survey. 65-84 - Yawen Chen
, Yu Liu
, Ming Zeng
, Umber Saleem
, Zhaoming Lu, Xiangming Wen
, Depeng Jin, Zhu Han
, Tao Jiang
, Yong Li
:
Reinforcement Learning Meets Wireless Networks: A Layering Perspective. 85-111 - Yong Liu
, Xuehan Chen, Lin X. Cai
, Qingchun Chen
, Ran Zhang
:
Nonorthogonal Multiple Access for Wireless-Powered IoT Networks. 112-128 - Hyowoon Seo
, Jihong Park
, Mehdi Bennis
, Wan Choi
:
Communication and Consensus Co-Design for Distributed, Low-Latency, and Reliable Wireless Systems. 129-143 - Yongliang Cheng, Yan Xu
, Hong Zhong
, Yi Liu:
Leveraging Semisupervised Hierarchical Stacking Temporal Convolutional Network for Anomaly Detection in IoT Communication. 144-155 - Leyou Zhang
, Yadi Ye
, Yi Mu
:
Multiauthority Access Control With Anonymous Authentication for Personal Health Record. 156-167 - Nikumani Choudhury
, Rakesh Matam
, Mithun Mukherjee
, Jaime Lloret
, Ezhil Kalaimannan
:
NCHR: A Nonthreshold-Based Cluster-Head Rotation Scheme for IEEE 802.15.4 Cluster-Tree Networks. 168-178 - Mertkan Koca
, Gokhan Gurbilek
, Burak Soner
, Sinem Coleri
:
Empirical Feasibility Analysis for Energy Harvesting Intravehicular Wireless Sensor Networks. 179-186 - Ang Li
, Jingqi Fu
, Huaming Shen
, Sizhou Sun
:
A Cluster-Principal-Component-Analysis-Based Indoor Positioning Algorithm. 187-196 - Huayan Guo
, An Liu
, Vincent K. N. Lau:
Analog Gradient Aggregation for Federated Learning Over Wireless Networks: Customized Design and Convergence Analysis. 197-210 - Muhammad Hanif
, Ha H. Nguyen
:
Slope-Shift Keying LoRa-Based Modulation. 211-221 - Anthony S. Deese
, Joe Jesson, Thomas Brennan
, Steven Hollain, Patrick Stefanacci, Emily Driscoll, Connor Dick, Keith Garcia, Ryan Mosher, Brian Rentsch
, Andrew Bechtel, Efrain Rodriguez:
Long-Term Monitoring of Smart City Assets via Internet of Things and Low-Power Wide-Area Networks. 222-231 - Ibrahim Kök
, Suat Özdemir
:
DeepMDP: A Novel Deep-Learning-Based Missing Data Prediction Protocol for IoT. 232-243 - Jinglin Zhang
, Wenjun Xu
, Hui Gao
, Miao Pan
, Zhu Han
, Ping Zhang
:
Codebook-Based Beam Tracking for Conformal Array-Enabled UAV mmWave Networks. 244-261 - Chengcheng Zhao
, Lin Cai
, Peng Cheng
:
Stability Analysis of Vehicle Platooning With Limited Communication Range and Random Packet Losses. 262-277 - Onel L. Alcaraz López, Samuel Montejo Sanchez
, Richard D. Souza
, Constantinos B. Papadias, Hirley Alves
:
On CSI-Free Multiantenna Schemes for Massive RF Wireless Energy Transfer. 278-296 - Mingjing Cai
, Wei-Hsin Liao
:
High-Power Density Inertial Energy Harvester Without Additional Proof Mass for Wearables. 297-308 - Endah Kristiani
, Chao-Tung Yang
, Chin-Yin Huang
, Po-Cheng Ko, Halim Fathoni
:
On Construction of Sensors, Edge, and Cloud (iSEC) Framework for Smart System Integration and Applications. 309-319 - Jie Zhang
, Wendong Xiao
, Yanjiao Li
:
Data and Knowledge Twin Driven Integration for Large-Scale Device-Free Localization. 320-331 - Xinhua Wang
, Xiaodong Wang
, Alexei Ashikhmin
:
Long-Term Scheduling and Power Control for Wirelessly Powered Cell-Free IoT. 332-344 - Renchao Xie
, Qinqin Tang
, Chenghao Liang, Fei Richard Yu, Tao Huang
:
Dynamic Computation Offloading in IoT Fog Systems With Imperfect Channel-State Information: A POMDP Approach. 345-356 - Guyue Li
, Zheying Zhang, Junqing Zhang
, Aiqun Hu
:
Encrypting Wireless Communications on the Fly Using One-Time Pad and Key Generation. 357-369 - Meiyi Yang
, Nianbo Liu
, Lin Zuo
, Yong Feng
, Minghui Liu
, Haigang Gong
, Ming Liu
:
Dynamic Charging Scheme Problem With Actor-Critic Reinforcement Learning. 370-380 - Huaguang Shi
, Meng Zheng
, Wei Liang
, Jialin Zhang
, Ke Wang
, Shuai Liu
:
Transmission Scheduling With Order Constraints in WIA-FA-Based AGV Systems. 381-392 - Yonghao Zhao
, Zhixiang Zhang
, Tianyi Feng, Wai-Choong Wong
, Hari Krishna Garg
:
GraphIPS: Calibration-Free and Map-Free Indoor Positioning Using Smartphone Crowdsourced Data. 393-406 - Bala Krishna Maddali, Pascal Lorenz
:
Location, Context, and Social Objectives Using Knowledge-Based Rules and Conflict Resolution for Security in Internet of Things. 407-417 - Zhanghua Cai
, Yantao Zhou
, Yihong Qi
, Weihua Zhuang
, Lei Deng
:
A Millimeter Wave Dual-Lens Antenna for IoT-Based Smart Parking Radar System. 418-427 - Jiahao Gao
, Zhiwen Hu
, Kaigui Bian
, Xinyu Mao, Lingyang Song
:
AQ360: UAV-Aided Air Quality Monitoring by 360-Degree Aerial Panoramic Images in Urban Areas. 428-442 - Abubakar U. Makarfi, Khaled M. Rabie
, Omprakash Kaiwartya
, Kabita Adhikari
, Galymzhan Nauryzbayev
, Xingwang Li
, Rupak Kharel
:
Toward Physical-Layer Security for Internet of Vehicles: Interference-Aware Modeling. 443-457 - Jing Wang, Libing Wu
, Huaqun Wang
, Kim-Kwang Raymond Choo
, Debiao He
:
An Efficient and Privacy-Preserving Outsourced Support Vector Machine Training for Internet of Medical Things. 458-473 - Ziyuan Pu
, Meixin Zhu
, Wenxiang Li
, Zhiyong Cui
, Xiaoyu Guo
, Yinhai Wang
:
Monitoring Public Transit Ridership Flow by Passively Sensing Wi-Fi and Bluetooth Mobile Devices. 474-486 - Shun-Chi Wu
, Pei-Lun Hung, A. Lee Swindlehurst
:
ECG Biometric Recognition: Unlinkability, Irreversibility, and Security. 487-500 - Weichao Chen
, Shengjie Zhao
, Rongqing Zhang
, Yi Chen, Liuqing Yang
:
UAV-Assisted Data Collection With Nonorthogonal Multiple Access. 501-511 - Zhenjie Guo
, Jian Peng, Wenzheng Xu
, Weifa Liang
, Weigang Wu, Zichuan Xu
, Bing Guo, Yue Ivan Wu
:
Minimizing Redundant Sensing Data Transmissions in Energy-Harvesting Sensor Networks via Exploring Spatial Data Correlations. 512-527 - Xiaoli Sun
, Weiwei Yang
, Yueming Cai
, Meng Wang:
Secure mmWave UAV-Enabled SWIPT Networks Based on Random Frequency Diverse Arrays. 528-540 - Jeongsik Choi
, Yang-Seok Choi
:
Calibration-Free Positioning Technique Using Wi-Fi Ranging and Built-In Sensors of Mobile Devices. 541-554 - Md. Mahmud Hossain
, Ragib Hasan
:
P-HIP: A Lightweight and Privacy-Aware Host Identity Protocol for Internet of Things. 555-571 - Shixiong Wang
, Yuxin Che
, Huangjie Zhao
, Andrew Lim
:
Accurate Tracking, Collision Detection, and Optimal Scheduling of Airport Ground Support Equipment. 572-584 - Dajian Huang
, Xiufang Shi
, Wen-an Zhang
:
False Data Injection Attack Detection for Industrial Control Systems Based on Both Time- and Frequency-Domain Analysis of Sensor Data. 585-595 - Nabeel Khan
, Khurram Iqbal, Maria G. Martini
:
Time-Aggregation-Based Lossless Video Encoding for Neuromorphic Vision Sensor Data. 596-609 - Xinquan Huang
, Aijun Liu
, Haibo Zhou
, Kai Yu
, Wei Wang
, Xuemin Shen
:
FMAC: A Self-Adaptive MAC Protocol for Flocking of Flying Ad Hoc Network. 610-625 - Lihua Ruan
, Maluge Pubuduni Imali Dias, Elaine Wong
:
Achieving Low-Latency Human-to-Machine (H2M) Applications: An Understanding of H2M Traffic for AI-Facilitated Bandwidth Allocation. 626-635 - Xu Kang
, Liang Liu
, Huadong Ma
:
ESR-GAN: Environmental Signal Reconstruction Learning With Generative Adversarial Network. 636-646 - Ying Cai
, Hao Zhang, Yuguang Fang
:
A Conditional Privacy Protection Scheme Based on Ring Signcryption for Vehicular Ad Hoc Networks. 647-656
Volume 8, Number 2, January 2021
- Xiaoyuan Luo
, Yating Li, Xinyu Wang, Xinping Guan
:
Interval Observer-Based Detection and Localization Against False Data Injection Attack in Smart Grids. 657-671 - Yu Nakayama
, Kazuki Maruta
:
Age-of-Information-Based Host Selection for Mobile User Provided Networks. 672-683 - Guangjie Han
, Hao Wang
, Haofei Guan, Mohsen Guizani
:
A Mobile Charging Algorithm Based on Multicharger Cooperation in Internet of Things. 684-694 - Wenjing You, Chao Dong
, Xiao Cheng
, Xiaojun Zhu
, Qihui Wu, Guihai Chen
:
Joint Optimization of Area Coverage and Mobile-Edge Computing With Clustering for FANETs. 695-707 - Jusik Yun
, Yunyeong Goh
, Jong-Moon Chung
:
DQN-Based Optimization Framework for Secure Sharded Blockchain Systems. 708-722 - Wanchun Liu
, Girish N. Nair
, Yonghui Li
, Dragan Nesic
, Branka Vucetic
, H. Vincent Poor
:
On the Latency, Rate, and Reliability Tradeoff in Wireless Networked Control Systems for IIoT. 723-733 - Jing Li
, Yujian Ye
, Dimitrios Papadaskalopoulos
, Goran Strbac
:
Computationally Efficient Pricing and Benefit Distribution Mechanisms for Incentivizing Stable Peer-to-Peer Energy Trading. 734-749 - Weikun Zhang
, Zicong Hong
, Wuhui Chen
:
Hierarchical Pricing Mechanism With Financial Stability for Decentralized Crowdsourcing: A Smart Contract Approach. 750-765 - Tien-Dung Nguyen
, Duc Tai Le, Van Vi Vo, Moonseong Kim, Hyunseung Choo
:
Fast Sensory Data Aggregation in IoT Networks: Collision-Resistant Dynamic Approach. 766-777 - Fenghui Zhang
, Michael Mao Wang
:
Stochastic Congestion Game for Load Balancing in Mobile-Edge Computing. 778-790 - Yuhan Su
, Minghui Liwang
, Zhibin Gao
, Lianfen Huang, Xiaojiang Du
, Mohsen Guizani
:
Optimal Cooperative Relaying and Power Control for IoUT Networks With Reinforcement Learning. 791-801 - Xuyang Ding
, Shuai Zhang, Mengkai Song
, Xiaocong Ding, Fagen Li
:
Toward Invisible Adversarial Examples Against DNN-Based Privacy Leakage for Internet of Things. 802-812 - Dezhi Chen
, Qi Qi
, Zirui Zhuang
, Jingyu Wang
, Jianxin Liao
, Zhu Han
:
Mean Field Deep Reinforcement Learning for Fair and Efficient UAV Control. 813-828 - Azzam Mourad
, Hanine Tout
, Omar Abdel Wahab, Hadi Otrok
, Toufic Dbouk:
Ad Hoc Vehicular Fog Enabling Cooperative Low-Latency Intrusion Detection. 829-843 - Zengpeng Li
, Zheng Yang
, Pawel Szalachowski
, Jianying Zhou:
Building Low-Interactivity Multifactor Authenticated Key Exchange for Industrial Internet of Things. 844-859 - Nafiul Rashid
, Manik Dautta
, Peter Tseng
, Mohammad Abdullah Al Faruque
:
HEAR: Fog-Enabled Energy-Aware Online Human Eating Activity Recognition. 860-868 - Nikhil Kumar
, Debopam Acharya
, Divya Lohani
:
An IoT-Based Vehicle Accident Detection and Classification System Using Sensor Fusion. 869-880 - Bhabendu Kumar Mohanta
, Debasish Jena, Somula Ramasubbareddy
, Mahmoud Daneshmand
, Amir H. Gandomi
:
Addressing Security and Privacy Issues of IoT Using Blockchain Technology. 881-888 - Adnan Sharif
, Guangtao Zhai
, Jun Jia
, Xiongkuo Min
, Xiangyang Zhu, Jiahe Zhang
:
An Accurate and Efficient 1-D Barcode Detector for Medium of Deployment in IoT Systems. 889-900 - Xiaofan Jiang
, Heng Zhang
, Edgardo Alberto Barsallo Yi, Nithin Raghunathan
, Charilaos Mousoulis
, Somali Chaterji, Dimitrios Peroulis, Ali Shakouri, Saurabh Bagchi
:
Hybrid Low-Power Wide-Area Mesh Network for IoT Applications. 901-915 - Roland Katona
, Victor Cionca
, Donna O'Shea
, Dirk Pesch
:
Virtual Network Embedding for Wireless Sensor Networks Time-Efficient QoS/QoI-Aware Approach. 916-926 - Juan Wang
, Shirong Hao
, Ru Wen
, Boxian Zhang
, Liqiang Zhang, Hongxin Hu
, Rongxing Lu
:
IoT-Praetor: Undesired Behaviors Detection for IoT Devices. 927-940 - Chia-Cheng Hu
:
Profit-Based Algorithm of Joint Real-Time Task Scheduling and Resource Allocation in C-RANs. 941-950 - Jun Gao
, Luyun Gan, Fabiola Buschendorf
, Liao Zhang, Hua Liu
, Peixue Li
, Xiaodai Dong
, Tao Lu
:
Omni SCADA Intrusion Detection Using Deep Learning Algorithms. 951-961 - Ya-Ju Yu
:
NPDCCH Period Adaptation and Downlink Scheduling for NB-IoT Networks. 962-975 - Shidrokh Goudarzi
, Mohammad Hossein Anisi
, Hamed Ahmadi
, Leila Musavian
:
Dynamic Resource Allocation Model for Distribution Operations Using SDN. 976-988 - Shuang Li
, Fengye Hu
, Zhuo Xu
, Zhi Mao
, Zhuang Ling
, He Liu
:
Joint Power Allocation in Classified WBANs With Wireless Information and Power Transfer. 989-1000 - Jiwei Tian
, Buhong Wang, Tengyao Li
, Fute Shang
, Kunrui Cao
, Rongxiao Guo:
TOTAL: Optimal Protection Strategy Against Perfect and Imperfect False Data Injection Attacks on Power Grid Cyber-Physical Systems. 1001-1015 - Wei Kuang Lai
, You-Chiun Wang
, Sih-Yu Lin:
Efficient Scheduling, Caching, and Merging of Notifications to Save Message Costs in IoT Networks Using CoAP. 1016-1029 - Aaqib Saeed
, Flora D. Salim
, Tanir Ozcelebi
, Johan Lukkien:
Federated Self-Supervised Learning of Multisensor Representations for Embedded Intelligence. 1030-1040 - Jungyeon Baek
, Georges Kaddoum
:
Heterogeneous Task Offloading and Resource Allocations via Deep Recurrent Reinforcement Learning in Partial Observable Multifog Networks. 1041-1056 - Guijuan Zhang
, Dianjie Lu
, Hong Liu
:
IoT-Based Positive Emotional Contagion for Crowd Evacuation. 1057-1070 - Yuyi Sun
, Jiming Chen
, Shibo He
, Zhiguo Shi
:
High-Confidence Gateway Planning and Performance Evaluation of a Hybrid LoRa Network. 1071-1081 - Sihao Zhao
, Xiao-Ping Zhang
, Xiaowei Cui
, Mingquan Lu:
A Closed-Form Localization Method Utilizing Pseudorange Measurements From Two Nonsynchronized Positioning Systems. 1082-1094 - Song Yang
, Nan He, Fan Li
, Stojan Trajanovski
, Xu Chen
, Yu Wang
, Xiaoming Fu
:
Survivable Task Allocation in Cloud Radio Access Networks With Mobile-Edge Computing. 1095-1108 - Zheng-Yi Chai
, Shun-Shun Fang
, Ya-Lun Li
:
An Improved Decomposition-Based Multiobjective Evolutionary Algorithm for IoT Service. 1109-1122 - Muhammad Naveed Aman
, Uzair Javaid
, Biplab Sikdar
:
A Privacy-Preserving and Scalable Authentication Protocol for the Internet of Vehicles. 1123-1139 - Jindi Zhang
, Yifan Zhang
, Kejie Lu
, Jianping Wang
, Kui Wu
, Xiaohua Jia
, Bin Liu:
Detecting and Identifying Optical Signal Attacks on Autonomous Driving Systems. 1140-1153 - Sanaz Kianoush
, Stefano Savazzi
, Manuel Beschi
, Stephan Sigg
, Vittorio Rampa
:
A Multisensory Edge-Cloud Platform for Opportunistic Radio Sensing in Cobot Environments. 1154-1168 - Bardia Safaei
, Amir Mahdi Hosseini Monazzah
, Alireza Ejlali
:
ELITE: An Elaborated Cross-Layer RPL Objective Function to Achieve Energy Efficiency in Internet-of-Things Devices. 1169-1182 - Yuan Yue, Xiaohui Zhao
, Zan Li
:
Enhanced and Facilitated Indoor Positioning by Visible-Light GraphSLAM Technique. 1183-1196 - Yuyi Sun
, Swarun Kumar
, Shibo He
, Jiming Chen
, Zhiguo Shi
:
You Foot the Bill! Attacking NFC With Passive Relays. 1197-1210 - Huimin Hu
, Ke Xiong
, Gang Qu
, Qiang Ni
, Pingyi Fan
, Khaled Ben Letaief:
AoI-Minimal Trajectory Planning and Data Collection in UAV-Assisted Wireless Powered IoT Networks. 1211-1223 - Foivos Michelinakis
, Anas Saeed Al-Selwi, Martina Capuzzo
, Andrea Zanella
, Kashif Mahmood, Ahmed Elmokashfi
:
Dissecting Energy Consumption of NB-IoT Devices Empirically. 1224-1242 - Mohamed I. Ibrahem
, Mahmoud Nabil
, Mostafa M. Fouda
, Mohamed M. E. A. Mahmoud
, Waleed Alasmary
, Fawaz Alsolami
:
Efficient Privacy-Preserving Electricity Theft Detection With Dynamic Billing and Load Monitoring for AMI Networks. 1243-1258
Volume 8, Number 3, February 2021
- Fang Yu
, Li Cui, Pengcheng Wang
, Chuanqi Han
, Ruoran Huang, Xi Huang:
EasiEdge: A Novel Global Deep Neural Networks Pruning Method for Efficient Edge Computing. 1259-1271 - Batyr Charyyev
, Mehmet Hadi Gunes
:
Locality-Sensitive IoT Network Traffic Fingerprinting for Device Identification. 1272-1281 - Xiaoyan Bi, Tie Qiu
, Wenyu Qu
, Laiping Zhao
, Xiaobo Zhou
, Dapeng Oliver Wu
:
Dynamically Transient Social Community Detection for Mobile Social Networks. 1282-1293 - Fengyu Wang
, Feng Zhang, Chenshu Wu, Beibei Wang, K. J. Ray Liu
:
ViMo: Multiperson Vital Sign Monitoring Using Commodity Millimeter-Wave Radio. 1294-1307 - Fang Fu
, Yunpeng Kang
, Zhicai Zhang
, F. Richard Yu, Tuan Wu
:
Soft Actor-Critic DRL for Live Transcoding and Streaming in Vehicular Fog-Computing-Enabled IoV. 1308-1321 - Yanming Liu
, Kai Liu
, Jinglin Han
, Lipeng Zhu
, Zhenyu Xiao
, Xiang-Gen Xia:
Resource Allocation and 3-D Placement for UAV-Enabled Energy-Efficient IoT Communications. 1322-1333 - Yueqian Zhang
, Murat Simsek
, Burak Kantarci
:
Empowering Self-Organized Feature Maps for AI-Enabled Modeling of Fake Task Submissions to Mobile Crowdsensing Platforms. 1334-1346 - Kecheng Zhang, Mugen Peng
, Yaohua Sun
:
Delay-Optimized Resource Allocation in Fog-Based Vehicular Networks. 1347-1357 - Sihua Wang
, Mingzhe Chen
, Xuanlin Liu
, Changchuan Yin
, Shuguang Cui
, H. Vincent Poor
:
A Machine Learning Approach for Task and Resource Allocation in Mobile-Edge Computing-Based Networks. 1358-1372 - Xiaozhen Ye
, Huansheng Ning
, Per Backlund
, Jianguo Ding
:
Flow Experience Detection and Analysis for Game Users by Wearable-Devices-Based Physiological Responses Capture. 1373-1387 - Bizhu Wang
, Yan Sun
, Xiaodong Xu
:
A Scalable and Energy-Efficient Anomaly Detection Scheme in Wireless SDN-Based mMTC Networks for IoT. 1388-1405 - Wei Zhang
, Kegen Yu
, Weixi Wang
, Xiaoming Li:
A Self-Adaptive AP Selection Algorithm Based on Multiobjective Optimization for Indoor WiFi Positioning. 1406-1416 - Yogachandran Rahulamathavan
, Safak Dogan, Xiyu Shi, Rongxing Lu
, Muttukrishnan Rajarajan, Ahmet M. Kondoz:
Scalar Product Lattice Computation for Efficient Privacy-Preserving Systems. 1417-1427 - Jinho Choi
:
On Fast Retrial for Two-Step Random Access in MTC. 1428-1436 - Jong Ho Moon, Jong Jin Park
, Kang-Yoon Lee
, Dong In Kim
:
Heterogeneously Reconfigurable Energy Harvester: An Algorithm for Optimal Reconfiguration. 1437-1452 - Qiqi Ren
, Jian Chen
, Omid Abbasi
, Gunes Karabulut Kurt
, Halim Yanikomeroglu
, F. Richard Yu
:
An Application-Driven Nonorthogonal-Multiple-Access-Enabled Computation Offloading Scheme. 1453-1466 - Kisong Lee
, Junseong Bang
, Hyun-Ho Choi
:
Secrecy Outage Minimization for Wireless-Powered Relay Networks With Destination-Assisted Cooperative Jamming. 1467-1476 - Mustafa Emara
, Hesham ElSawy
, Gerhard Bauch
:
Prioritized Multistream Traffic in Uplink IoT Networks: Spatially Interacting Vacation Queues. 1477-1491 - Junchao Ma
, Lingjia Liu
, Hao Song
, Pingzhi Fan:
On the Fundamental Tradeoffs Between Video Freshness and Video Quality in Real-Time Applications. 1492-1503 - Yi Ding
, Guozheng Wu, Dajiang Chen
, Ning Zhang
, Linpeng Gong, Mingsheng Cao
, Zhiguang Qin
:
DeepEDN: A Deep-Learning-Based Image Encryption and Decryption Network for Internet of Medical Things. 1504-1518 - Dan Xu
, Xiaojiang Chen
, Nannan Zhang, Nana Ding, Jing Zhang, Dingyi Fang, Tao Gu
:
Cantor: Improving Goodput in LoRa Concurrent Transmission. 1519-1532 - Thien Huynh-The
, Cam-Hao Hua
, Nguyen Anh Tu
, Dong-Seong Kim
:
Physical Activity Recognition With Statistical-Deep Fusion Model Using Multiple Sensory Data for Smart Health. 1533-1543 - Yida Zhu
, Haiyong Luo
, Fang Zhao
, Runze Chen