


default search action
Digital Communications and Networks, Volume 7
Volume 7, Number 1, February 2021
- Yu Wang, Ticao Zhang

, Shiwen Mao
, Theodore Ted S. Rappaport:
Directional neighbor discovery in mmWave wireless networks. 1-15 - Dandan Liu, Liangqi Gui, Ke Chen, Liang Lang, Zixiao Zhang, Han Chen, Lixing Liu, Tao Jiang:

Theoretical analysis and comparison of OAM waves generated by three kinds of antenna array. 16-28 - Xiang Sun

, Liangkun Yu
, Yin Yang:
Jointly optimizing user clustering, power management, and wireless channel allocation for NOMA-based Internet of Things. 29-36 - Sunhee Baek, Donghwoon Kwon, Sang C. Suh, Hyunjoo Kim, Ikkyun Kim, Jinoh Kim:

Clustering-based label estimation for network anomaly detection. 37-44 - Tien-Tung Nguyen

, Pham Minh Nam
, Phu Tran Tin
:
Performance evaluation of a two-way relay network with energy harvesting and hardware noises. 45-54 - Kamayani Shrivastav, Rajendra Prasad Yadav, Kamal Chand Jain:

Joint MAP channel estimation and data detection for OFDM in presence of phase noise from free running and phase locked loop oscillator. 55-61 - J. S. Rauthan, Kunwar Singh Vaisla

:
VRS-DB: preserve confidentiality of users' data using encryption approach. 62-71 - Mengyang Huang, Menggang Zhu, Yunpeng Xiao, Yanbing Liu:

Bayonet-corpus: a trajectory prediction method based on bayonet context and bidirectional GRU. 72-81 - Jing Yang, Yuhua Cheng, Yupeng Yuan, Xiaofei Li, Zuwei Zhang, Ming Xu

, Dengpan Wang, Jiangdong Mu, Yong Mei, Yuzhe Zhang:
Design and optimization of an integrated MEMS gas chamber with high transmissivity. 82-91 - Tasher Ali Sheikh, Joyatri Bora, Md. Anwar Hussain:

Capacity maximizing in massive MIMO with linear precoding for SSF and LSF channel with perfect CSI. 92-99 - Wiparat Busyatras, Chanon Warisarn, Santi Koonkarnkhai

, Piya Kovintavewat:
A simple 2D modulation code in single-reader two-track reading BPMR systems. 100-106 - Santi Koonkarnkhai

, Piya Kovintavewat:
An iterative ITI cancellation method for multi-head multi-track bit-patterned magnetic recording systems. 107-112 - Moad Mowafi

, Eyad Taqieddin, Hiba Al-Dahoud:
Energy efficient fuzzy-based DASH adaptation algorithm. 113-119 - Jing Wu, Yun Li, Hongcheng Zhuang, Zhiwen Pan, Guoyin Wang, Yongju Xian:

SMDP-based sleep policy for base stations in heterogeneous cellular networks. 120-130 - Zufan Zhang, Xieliang Li, Chenquan Gan:

Identifying influential nodes in social networks via community structure and influence distribution difference. 131-139 - Inam ul Haq

, Jian Wang, Youwen Zhu, Saad Maqbool:
An efficient hash-based authenticated key agreement scheme for multi-server architecture resilient to key compromise impersonation. 140-150 - Naif Alsowaidi, Tawfig Eltaif, Mohd Ridzuan Mokhtar:

Performance analysis of a hybrid optical CDMA/DWDM system against inter-symbol interference and four wave mixing. 151-156 - Peiyuan Ni, Shilei Lv, Xiaoxiao Zhu, Qixin Cao, Wenguang Zhang:

A light-weight on-line action detection with hand trajectories for industrial surveillance. 157-166
Volume 7, Number 2, May 2021
- Xu Yang

, Hongyan Xing:
A data complementary method for thunderstorm point charge localization based on atmospheric electric field apparatus array group. 170-177 - Jinxiu Zhu, Leilei Meng

, Wenxia Wu, Dongmin Choi, Jianjun Ni:
Generative adversarial network-based atmospheric scattering model for image dehazing. 178-186 - Inam Ullah

, Siyu Qian, Zhixiang Deng, Jong-Hyouk Lee:
Extended Kalman Filter-based localization algorithm by edge computing in Wireless Sensor Networks. 187-195 - Liguo Weng, Yanghui Zhang, Yong Yang, Min Fang, Zelong Yu:

A mobility compensation method for drones in SG-eIoT. 196-200 - Yuan Gao, Haixia He, Rongjun Tan, Junho Choi:

Combined spatial-temporal energy harvesting and relay selection for cognitive wireless powered networks. 201-213 - Chengming Zou, Xiaoxiao Li, Xing Liu, Mengya Zhang:

3D placement of unmanned aerial vehicles and partially overlapped channel assignment for throughput maximization. 214-222 - Jiaqi Wang, Ning Lu, Qingfeng Cheng, Lu Zhou, Wenbo Shi:

A secure spectrum auction scheme without the trusted party based on the smart contract. 223-234 - Minahil Rana, Muhammad Faizan Ayub

, Khalid Mahmood, Saru Kumari
, Arun Kumar Sangaiah
:
Lightweight authentication protocol for e-health clouds in IoT-based applications through 5G technology. 235-244 - Weizhi Meng

, Daniel Xiapu Luo, Chunhua Su, Debiao He, Marios Anagnostopoulos
, Qian Chen
:
Editorial for special issue on "security and privacy protection in the era of IoT devices". 245-246 - Lihong Fan, Liang Liu, Hang Gao, Zuchao Ma, Yuting Wu:

Secure K-Nearest neighbor queries in two-tiered mobile wireless sensor networks. 247-256 - Wenjuan Li

, Yu Wang, Zhiping Jin
, Keping Yu
, Jin Li, Yang Xiang
:
Challenge-based collaborative intrusion detection in software-defined networking: an evaluation. 257-263 - Yan He, Jiageng Chen

:
User location privacy protection mechanism for location-based services. 264-276 - Xi Sun, Hao Wang, Xiu Fu, Hong Qin, Mei Jiang, Likun Xue, Xiaochao Wei:

Substring-searchable attribute-based encryption and its application for IoT devices. 277-283
Volume 7, Number 3, August 2021
- Wei Feng

, Yafeng Li, Xuetao Yang, Zheng Yan
, Liang Chen:
Blockchain-based data transmission control for Tactical Data Link. 285-294 - Li Peng, Wei Feng, Zheng Yan

, Yafeng Li, Xiaokang Zhou, Shohei Shimizu
:
Privacy preservation in permissionless blockchain: A survey. 295-307 - Na Shi

, Liang Tan, Wenjuan Li
, Xin Qi, Keping Yu
:
A blockchain-empowered AAA scheme in the large-scale HetNet. 308-316 - Zheyi Chen, Weixian Liao

, Kun Hua
, Chao Lu, Wei Yu
:
Towards asynchronous federated learning for heterogeneous edge-powered internet of things. 317-326 - Bassma Saleh Alsulami, Chandra Bajracharya, Danda B. Rawat

:
Game theory-based attack and defense analysis in virtual wireless networks with jammers and eavesdroppers. 327-334 - Qilie Liu, Yinyi Xu, Bin Cao, Lei Zhang, Mugen Peng:

Unintentional forking analysis in wireless blockchain networks. 335-341 - Tasher Ali Sheikh, Joyatri Bora, Md. Anwar Hussain:

Massive MIMO system lower bound spectral efficiency analysis with precoding and perfect CSI. 342-351 - Weijia Lei, Yang Zhou, Xiuzhen Lin:

A physical layer security scheme for full-duplex communication systems with residual self-interference and non-eavesdropping CSI. 352-361 - Jienan Chen, Siyu Luo, Lin Zhang, Cong Zhang, Bin Cao:

iPAS: A deep Monte Carlo Tree Search-based intelligent pilot-power allocation scheme for massive MIMO system. 362-372 - Xuanxia Yao, Fadi Farha

, Rongyang Li, Ismini Psychoula
, Liming Chen
, Huansheng Ning
:
Security and privacy issues of physical objects in the IoT: Challenges and opportunities. 373-384 - Alak Roy

, Nityananda Sarma:
A synchronous duty-cycled reservation based MAC protocol for underwater wireless sensor networks. 385-398 - Jiaxing Wang, Mugen Peng, Yaqiong Liu:

Performance analysis of diffusion-based decode-and-forward relay with depleted molecule shift keying. 399-409 - C. Jenila

, Ramasamy Kandasamy Jeyachitra:
Green indoor optical wireless communication systems: Pathway towards pervasive deployment. 410-444 - Zhigang Yang, Ruyan Wang, Dapeng Wu

, Daizhong Luo:
UTM: A trajectory privacy evaluating model for online health monitoring. 445-452 - Junjun Chen, Di Wu

, Ying Zhao, Nabin Sharma, Michael Blumenstein, Shui Yu
:
Fooling intrusion detection systems using adversarially autoencoder. 453-460
Volume 7, Number 4, November 2021
- Yue Liu

, Qinghua Lu, Shiping Chen
, Qiang Qu
, Hugo O'Connor, Kim-Kwang Raymond Choo, He Zhang:
Capability-based IoT access control using blockchain. 463-469 - Weidong Fang, Wuxiong Zhang, Wei Yang, Zhannan Li, Weiwei Gao, Yinxuan Yang:

Trust management-based and energy efficient hierarchical routing protocol in wireless sensor networks. 470-478 - Chen Chen, Huan Li, Xiang Li, Jianlong Zhang, Hong Wei, Hao Wang:

A geographic routing protocol based on trunk line in VANETs. 479-491 - Nyothiri Aung

, Weidong Zhang, Kashif Sultan, Sahraoui Dhelim
, Yibo Ai:
Dynamic traffic congestion pricing and electric vehicle charging management system for the internet of vehicles in smart cities. 492-504 - Xiaofeng Cai, Huansheng Ning

, Sahraoui Dhelim
, Rongjuan Zhou, Tao Zhang, Yang Xu, Yueliang Wan:
Robot and its living space: A roadmap for robot development based on the view of living space. 505-517 - Peiying Zhang, Xingzhe Huang, Lei Zhang:

Information mining and similarity computation for semi- / un-structured sentences from the social data. 518-525 - Tausifa Jan Saleem

, Mohammad Ahsan Chishti:
Deep learning for the internet of things: Potential benefits and use-cases. 526-542 - Yatong Jiang

, Tao Shang, Jianwei Liu:
SM algorithms-based encryption scheme for large genomic data files. 543-550 - Le Zhang, Zhichen Wang, Lei Wang, Zhe Zhang

, Xu Chen, Lin Meng
:
Machine learning-based real-time visible fatigue crack growth detection. 551-558 - Xiang Sun, Lu Liu

, Ayodeji Ayorinde, John Panneerselvam:
ED-SWE: Event detection based on scoring and word embedding in online social networks for the internet of people. 559-569 - Xiong Luo, Jianyuan Li, Weiping Wang, Yang Gao, Wenbing Zhao:

Towards improving detection performance for malware with a correntropy-based deep learning method. 570-579 - Guangfu Wu, Wenyi Zheng, Wei Xiong, Yun Li, Hongcheng Zhuang, Xin Tan:

A novel low-complexity power allocation algorithm based on the NOMA system in a low-speed environment. 580-588 - Siqi Liu

, Tianyu Wang, Shaowei Wang:
Toward intelligent wireless communications: Deep learning - based physical layer technologies. 589-597 - Guanyu Gao, Yonggang Wen:

Video transcoding for adaptive bitrate streaming over edge-cloud continuum. 598-604 - Zhengyuan Xu, Weijie Liu, Zhaocheng Wang, Lajos Hanzo

:
Petahertz communication: Harmonizing optical spectra for wireless communications. 605-614

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














