1 | -- | 14 | Jagdeep Singh, Sanjay Kumar Dhurandher, Isaac Woungang, Leonard Barolli. Double Q-learning based routing protocol for opportunistic networks |
15 | -- | 25 | Yujie Xie, Xintong Liang, Yifan Huang, Jian Hou, Yubo Jia. An anti-consensus strategy based on continuous perturbation updates in opposite directions |
27 | -- | 39 | Sichao Chen, Yuanchao Hu, Liejiang Huang, Dilong Shen, Yuanjun Pan, Ligang Pan. Energy-aware resource management in Internet of vehicles using machine learning algorithms |
41 | -- | 56 | Yunxuan Su, Xu an Wang, Weidong Du, Yu Ge, Kaiyang Zhao, Ming Lv. A secure data fitting scheme based on CKKS homomorphic encryption for medical IoT |
57 | -- | 73 | Makoto Ikeda. Performance evaluation of contact-time based and adaptive-timer based message suppression methods for inter-vehicle communication in vehicular DTN |
75 | -- | 83 | Guangsi Xiong, Ping Li, Hanlin Zeng, Hong Xiao, Wenchao Jiang. Fault diagnosis model of multi-axis industrial robot based on triplet network |