default search action
Digital Communications and Networks, Volume 7
Volume 7, Number 1, February 2021
- Yu Wang, Ticao Zhang, Shiwen Mao, Theodore Ted S. Rappaport:
Directional neighbor discovery in mmWave wireless networks. 1-15 - Dandan Liu, Liangqi Gui, Ke Chen, Liang Lang, Zixiao Zhang, Han Chen, Lixing Liu, Tao Jiang:
Theoretical analysis and comparison of OAM waves generated by three kinds of antenna array. 16-28 - Xiang Sun, Liangkun Yu, Yin Yang:
Jointly optimizing user clustering, power management, and wireless channel allocation for NOMA-based Internet of Things. 29-36 - Sunhee Baek, Donghwoon Kwon, Sang C. Suh, Hyunjoo Kim, Ikkyun Kim, Jinoh Kim:
Clustering-based label estimation for network anomaly detection. 37-44 - Tien-Tung Nguyen, Pham Minh Nam, Phu Tran Tin:
Performance evaluation of a two-way relay network with energy harvesting and hardware noises. 45-54 - Kamayani Shrivastav, Rajendra Prasad Yadav, Kamal Chand Jain:
Joint MAP channel estimation and data detection for OFDM in presence of phase noise from free running and phase locked loop oscillator. 55-61 - J. S. Rauthan, Kunwar Singh Vaisla:
VRS-DB: preserve confidentiality of users' data using encryption approach. 62-71 - Mengyang Huang, Menggang Zhu, Yunpeng Xiao, Yanbing Liu:
Bayonet-corpus: a trajectory prediction method based on bayonet context and bidirectional GRU. 72-81 - Jing Yang, Yuhua Cheng, Yupeng Yuan, Xiaofei Li, Zuwei Zhang, Ming Xu, Dengpan Wang, Jiangdong Mu, Yong Mei, Yuzhe Zhang:
Design and optimization of an integrated MEMS gas chamber with high transmissivity. 82-91 - Tasher Ali Sheikh, Joyatri Bora, Md. Anwar Hussain:
Capacity maximizing in massive MIMO with linear precoding for SSF and LSF channel with perfect CSI. 92-99 - Wiparat Busyatras, Chanon Warisarn, Santi Koonkarnkhai, Piya Kovintavewat:
A simple 2D modulation code in single-reader two-track reading BPMR systems. 100-106 - Santi Koonkarnkhai, Piya Kovintavewat:
An iterative ITI cancellation method for multi-head multi-track bit-patterned magnetic recording systems. 107-112 - Moad Mowafi, Eyad Taqieddin, Hiba Al-Dahoud:
Energy efficient fuzzy-based DASH adaptation algorithm. 113-119 - Jing Wu, Yun Li, Hongcheng Zhuang, Zhiwen Pan, Guoyin Wang, Yongju Xian:
SMDP-based sleep policy for base stations in heterogeneous cellular networks. 120-130 - Zufan Zhang, Xieliang Li, Chenquan Gan:
Identifying influential nodes in social networks via community structure and influence distribution difference. 131-139 - Inam ul Haq, Jian Wang, Youwen Zhu, Saad Maqbool:
An efficient hash-based authenticated key agreement scheme for multi-server architecture resilient to key compromise impersonation. 140-150 - Naif Alsowaidi, Tawfig Eltaif, Mohd Ridzuan Mokhtar:
Performance analysis of a hybrid optical CDMA/DWDM system against inter-symbol interference and four wave mixing. 151-156 - Peiyuan Ni, Shilei Lv, Xiaoxiao Zhu, Qixin Cao, Wenguang Zhang:
A light-weight on-line action detection with hand trajectories for industrial surveillance. 157-166
Volume 7, Number 2, May 2021
- Xu Yang, Hongyan Xing:
A data complementary method for thunderstorm point charge localization based on atmospheric electric field apparatus array group. 170-177 - Jinxiu Zhu, Leilei Meng, Wenxia Wu, Dongmin Choi, Jianjun Ni:
Generative adversarial network-based atmospheric scattering model for image dehazing. 178-186 - Inam Ullah, Siyu Qian, Zhixiang Deng, Jong-Hyouk Lee:
Extended Kalman Filter-based localization algorithm by edge computing in Wireless Sensor Networks. 187-195 - Liguo Weng, Yanghui Zhang, Yong Yang, Min Fang, Zelong Yu:
A mobility compensation method for drones in SG-eIoT. 196-200 - Yuan Gao, Haixia He, Rongjun Tan, Junho Choi:
Combined spatial-temporal energy harvesting and relay selection for cognitive wireless powered networks. 201-213 - Chengming Zou, Xiaoxiao Li, Xing Liu, Mengya Zhang:
3D placement of unmanned aerial vehicles and partially overlapped channel assignment for throughput maximization. 214-222 - Jiaqi Wang, Ning Lu, Qingfeng Cheng, Lu Zhou, Wenbo Shi:
A secure spectrum auction scheme without the trusted party based on the smart contract. 223-234 - Minahil Rana, Muhammad Faizan Ayub, Khalid Mahmood, Saru Kumari, Arun Kumar Sangaiah:
Lightweight authentication protocol for e-health clouds in IoT-based applications through 5G technology. 235-244 - Weizhi Meng, Daniel Xiapu Luo, Chunhua Su, Debiao He, Marios Anagnostopoulos, Qian Chen:
Editorial for special issue on "security and privacy protection in the era of IoT devices". 245-246 - Lihong Fan, Liang Liu, Hang Gao, Zuchao Ma, Yuting Wu:
Secure K-Nearest neighbor queries in two-tiered mobile wireless sensor networks. 247-256 - Wenjuan Li, Yu Wang, Zhiping Jin, Keping Yu, Jin Li, Yang Xiang:
Challenge-based collaborative intrusion detection in software-defined networking: an evaluation. 257-263 - Yan He, Jiageng Chen:
User location privacy protection mechanism for location-based services. 264-276 - Xi Sun, Hao Wang, Xiu Fu, Hong Qin, Mei Jiang, Likun Xue, Xiaochao Wei:
Substring-searchable attribute-based encryption and its application for IoT devices. 277-283
Volume 7, Number 3, August 2021
- Wei Feng, Yafeng Li, Xuetao Yang, Zheng Yan, Liang Chen:
Blockchain-based data transmission control for Tactical Data Link. 285-294 - Li Peng, Wei Feng, Zheng Yan, Yafeng Li, Xiaokang Zhou, Shohei Shimizu:
Privacy preservation in permissionless blockchain: A survey. 295-307 - Na Shi, Liang Tan, Wenjuan Li, Xin Qi, Keping Yu:
A blockchain-empowered AAA scheme in the large-scale HetNet. 308-316 - Zheyi Chen, Weixian Liao, Kun Hua, Chao Lu, Wei Yu:
Towards asynchronous federated learning for heterogeneous edge-powered internet of things. 317-326 - Bassma Saleh Alsulami, Chandra Bajracharya, Danda B. Rawat:
Game theory-based attack and defense analysis in virtual wireless networks with jammers and eavesdroppers. 327-334 - Qilie Liu, Yinyi Xu, Bin Cao, Lei Zhang, Mugen Peng:
Unintentional forking analysis in wireless blockchain networks. 335-341 - Tasher Ali Sheikh, Joyatri Bora, Md. Anwar Hussain:
Massive MIMO system lower bound spectral efficiency analysis with precoding and perfect CSI. 342-351 - Weijia Lei, Yang Zhou, Xiuzhen Lin:
A physical layer security scheme for full-duplex communication systems with residual self-interference and non-eavesdropping CSI. 352-361 - Jienan Chen, Siyu Luo, Lin Zhang, Cong Zhang, Bin Cao:
iPAS: A deep Monte Carlo Tree Search-based intelligent pilot-power allocation scheme for massive MIMO system. 362-372 - Xuanxia Yao, Fadi Farha, Rongyang Li, Ismini Psychoula, Liming Chen, Huansheng Ning:
Security and privacy issues of physical objects in the IoT: Challenges and opportunities. 373-384 - Alak Roy, Nityananda Sarma:
A synchronous duty-cycled reservation based MAC protocol for underwater wireless sensor networks. 385-398 - Jiaxing Wang, Mugen Peng, Yaqiong Liu:
Performance analysis of diffusion-based decode-and-forward relay with depleted molecule shift keying. 399-409 - C. Jenila, Ramasamy Kandasamy Jeyachitra:
Green indoor optical wireless communication systems: Pathway towards pervasive deployment. 410-444 - Zhigang Yang, Ruyan Wang, Dapeng Wu, Daizhong Luo:
UTM: A trajectory privacy evaluating model for online health monitoring. 445-452 - Junjun Chen, Di Wu, Ying Zhao, Nabin Sharma, Michael Blumenstein, Shui Yu:
Fooling intrusion detection systems using adversarially autoencoder. 453-460
Volume 7, Number 4, November 2021
- Yue Liu, Qinghua Lu, Shiping Chen, Qiang Qu, Hugo O'Connor, Kim-Kwang Raymond Choo, He Zhang:
Capability-based IoT access control using blockchain. 463-469 - Weidong Fang, Wuxiong Zhang, Wei Yang, Zhannan Li, Weiwei Gao, Yinxuan Yang:
Trust management-based and energy efficient hierarchical routing protocol in wireless sensor networks. 470-478 - Chen Chen, Huan Li, Xiang Li, Jianlong Zhang, Hong Wei, Hao Wang:
A geographic routing protocol based on trunk line in VANETs. 479-491 - Nyothiri Aung, Weidong Zhang, Kashif Sultan, Sahraoui Dhelim, Yibo Ai:
Dynamic traffic congestion pricing and electric vehicle charging management system for the internet of vehicles in smart cities. 492-504 - Xiaofeng Cai, Huansheng Ning, Sahraoui Dhelim, Rongjuan Zhou, Tao Zhang, Yang Xu, Yueliang Wan:
Robot and its living space: A roadmap for robot development based on the view of living space. 505-517 - Peiying Zhang, Xingzhe Huang, Lei Zhang:
Information mining and similarity computation for semi- / un-structured sentences from the social data. 518-525 - Tausifa Jan Saleem, Mohammad Ahsan Chishti:
Deep learning for the internet of things: Potential benefits and use-cases. 526-542 - Yatong Jiang, Tao Shang, Jianwei Liu:
SM algorithms-based encryption scheme for large genomic data files. 543-550 - Le Zhang, Zhichen Wang, Lei Wang, Zhe Zhang, Xu Chen, Lin Meng:
Machine learning-based real-time visible fatigue crack growth detection. 551-558 - Xiang Sun, Lu Liu, Ayodeji Ayorinde, John Panneerselvam:
ED-SWE: Event detection based on scoring and word embedding in online social networks for the internet of people. 559-569 - Xiong Luo, Jianyuan Li, Weiping Wang, Yang Gao, Wenbing Zhao:
Towards improving detection performance for malware with a correntropy-based deep learning method. 570-579 - Guangfu Wu, Wenyi Zheng, Wei Xiong, Yun Li, Hongcheng Zhuang, Xin Tan:
A novel low-complexity power allocation algorithm based on the NOMA system in a low-speed environment. 580-588 - Siqi Liu, Tianyu Wang, Shaowei Wang:
Toward intelligent wireless communications: Deep learning - based physical layer technologies. 589-597 - Guanyu Gao, Yonggang Wen:
Video transcoding for adaptive bitrate streaming over edge-cloud continuum. 598-604 - Zhengyuan Xu, Weijie Liu, Zhaocheng Wang, Lajos Hanzo:
Petahertz communication: Harmonizing optical spectra for wireless communications. 605-614
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.