| 1721 | -- | 1738 | Yongfeng Kong, Zhenhui Huang, Wanjie Xiong. Parallelism of the finite-time dynamics method based on GPU |
| 1739 | -- | 1751 | Jianghui Liu, Shengxiang Wang. All-dummy k-anonymous privacy protection algorithm based on location offset |
| 1753 | -- | 1774 | Taha Shojarazavi, Hamid Barati, Ali Barati. A wrapper method based on a modified two-step league championship algorithm for detecting botnets in IoT environments |
| 1775 | -- | 1837 | Salim el Khediri. Wireless sensor networks: a survey, categorization, main issues, and future orientations for clustering protocols |
| 1839 | -- | 1865 | Mohamed A. El-Zawawy, Parvez Faruki, Mauro Conti. Formal model for inter-component communication and its security in android |
| 1867 | -- | 1889 | LaƩrcio Pioli, Carina F. Dorneles, Douglas D. J. de Macedo, Mario A. R. Dantas. An overview of data reduction solutions at the edge of IoT systems: a systematic mapping of the literature |
| 1891 | -- | 1922 | Lynda Alkama, Louiza Bouallouche-Medjkoune, Mouloud Atmani, Lina Bachiri. Performance analysis of the unslotted IEEE 802.15.4k MAC protocols under saturated traffic and fading channel conditions |
| 1923 | -- | 1947 | Somayeh Bahramnejad, Naser Movahhedinia. A reliability estimation framework for cognitive radio V2V communications and an ANN-based model for automating estimations |