1297 | -- | 1311 | Maryam Zare, Seyed Hossein Khasteh, Saeid Ghafouri. Automatic ICA detection in online social networks with PageRank |
1312 | -- | 1326 | Baowen Xie, Guosheng Zhao, Mianxing Chao, Jian Wang. A prediction model of cloud security situation based on evolutionary functional network |
1327 | -- | 1339 | Zhixin Liu 0001, Xiaopin Li, Yazhou Yuan, Xinping Guan. Power control of D2D communication based on quality of service assurance under imperfect channel information |
1340 | -- | 1356 | SungJin Yu, Kisung Park, YoHan Park, HyungPyo Kim, Youngho Park 0005. A lightweight three-factor authentication protocol for digital rights management system |
1357 | -- | 1374 | Samayveer Singh. An energy aware clustering and data gathering technique based on nature inspired optimization in WSNs |
1375 | -- | 1393 | Ankita Srivastava, Arun Prakash, Rajeev Tripathi. An adaptive intersection selection mechanism using ant Colony optimization for efficient data dissemination in urban VANET |
1394 | -- | 1405 | Ilker Ćnal. Integration of ZigBee based GPS receiver to CAN network for precision farming applications |
1406 | -- | 1422 | Ahmad Karami, Nahideh Derakhshanfard. RPRTD: Routing protocol based on remaining time to encounter nodes with destination node in delay tolerant network using artificial neural network |
1423 | -- | 1441 | Amir Hassani Karbasi, Siyamak Shahpasand. A post-quantum end-to-end encryption over smart contract-based blockchain for defeating man-in-the-middle and interception attacks |
1442 | -- | 1456 | Yunhai Guo, Rui Lv, Zhengxiang Li. A realized on-demand cross-layer connection strategy for wireless self-organization link based on WLAN |
1457 | -- | 1473 | Rui Wang, Faezeh Hajiaghajani, Subir Biswas. Device-to-device streaming video caching for cellular download cost reduction |
1474 | -- | 1485 | Zibin Ren, Ting Lu, Xin Wang, Wenjing Guo, Guohua Liu, Shan Chang. Resource scheduling for delay-sensitive application in three-layer fog-to-cloud architecture |
1486 | -- | 1504 | Yuqi Fan, JingLin Zou, Siyu Liu, Qiran Yin, Xin Guan, Xiaohui Yuan 0001, Weili Wu, Ding-Zhu Du. A blockchain-based data storage framework: A rotating multiple random masters and error-correcting approach |
1505 | -- | 1525 | Henry Nunoo-Mensah, Kwame Osei Boateng, James Dzisi Gadze. PSTRM: Privacy-aware sociopsychological trust and reputation model for wireless sensor networks |
1526 | -- | 1538 | Farooque Hassan Kumbhar, Navrati Saxena, Abhishek Roy 0001. Social Reliable D2D Relay for Trustworthy Paradigm in 5G Wireless Networks |
1539 | -- | 1566 | Zainab Hassan Ali, Mahmoud Mohammed Badawy, Hesham A. Ali. A novel geographically distributed architecture based on fog technology for improving Vehicular Ad hoc Network (VANET) performance |
1567 | -- | 1576 | Jiale Wu, Mi Wen, Rongxing Lu, Beibei Li, Jinguo Li. Toward efficient and effective bullying detection in online social network |
1577 | -- | 1599 | Micael Pedrosa, AndrĆ© ZĆŗquete, Carlos Costa. RAIAP: renewable authentication on isolated anonymous profiles |
1600 | -- | 1615 | Shibin Wang, Kele Mao, Furui Zhan, Dong Liu. Hybrid conditional privacy-preserving authentication scheme for VANETs |
1616 | -- | 1628 | Mahdi Tahavori, Farokhlagha Moazami. Lightweight and secure PUF-based authenticated key agreement scheme for smart grid |
1629 | -- | 1642 | Haseeb Ur Rahman, Madjid Merabti, David Llewellyn-Jones, Sud Sudirman, Anwar Ghani. Structuring communities for sharing human digital memories in a social P2P network |
1643 | -- | 1655 | Hui Zheng, Jun Shao, Guiyi Wei. Attribute-based encryption with outsourced decryption in blockchain |
1656 | -- | 1671 | Kamlesh Kumar Rana, Sachin Tripathi, Ram Shringar Raw. Link reliability-based multi-hop directional location routing in vehicular ad hoc network |
1672 | -- | 1687 | Oluwafolake Ojo, Cyril O. Iyadi, Ayodeji Oluwatope, Adio T. Akinwale. AyoPeer: The adapted ayo-game for minimizing free riding in peer-assisted network |
1688 | -- | 1703 | Yohei Nishi, Masahiro Sasabe, Shoji Kasahara. Optimality analysis of locality-aware tit-for-tat-based P2P file distribution |
1704 | -- | 1705 | Deyu Zhang, Mianxiong Dong, Geyong Min. Editorial: Emerging Trends on Data Analytics at the Network Edge |
1706 | -- | 1719 | Jian Li, Daqian Shi, Piyaporn Tumnark, Hao Xu. A system for real-time intervention in negative emotional contagion in a smart classroom deployed under edge computing service infrastructure |
1720 | -- | 1743 | Haojun Teng, Kaoru Ota, Anfeng Liu, Tian Wang 0001, Shaobo Zhang. Vehicles joint UAVs to acquire and analyze data for topology discovery in large-scale IoT systems |
1744 | -- | 1755 | Xiaoheng Deng, Jin Liu, LeiLei Wang, Zhihui Zhao. A trust evaluation system based on reputation data in Mobile edge computing network |
1756 | -- | 1766 | Ying Chen 0010, Shuang Chen, Xin Chen 0018. Efficient caching strategy in wireless networks with mobile edge computing |
1767 | -- | 1775 | Hongran Li, Weiwei Xu, Heng Zhang 0001, Jian Zhang, Yi Liu. Polynomial regressors based data-driven control for autonomous underwater vehicles |
1776 | -- | 1787 | Jiwei Huang, Songyuan Li, Ying Chen. Revenue-optimal task scheduling and resource management for IoT batch jobs in mobile edge computing |
1788 | -- | 1798 | Jiajia Xie, Jun Luo 0006, Yan Peng, Shaorong Xie, Huayan Pu, Xiaomao Li, Zhou Su, Yuan Liu, Rui Zhou. Data driven hybrid edge computing-based hierarchical task guidance for efficient maritime escorting with multiple unmanned surface vehicles |
1799 | -- | 1813 | Guangsheng Feng, Yue Wang, Bingyang Li, Yafei Li, Hongwu Lv, Chengbo Wang, Zihan Gao, Huiqiang Wang. A near-optimal content placement in D2D underlaid cellular networks |
1814 | -- | 1829 | Zhufang Kuang, Gongqiang Li, Libang Zhang, Huibin Zhou, Changyun Li, Anfeng Liu. Energy Efficient Mode Selection, Base Station Selection and Resource Allocation Algorithm in D2D Heterogeneous Networks |
1830 | -- | 1838 | Yanjun Peng, Peng Liu 0027, Tingting Fu. Performance analysis of edge-PLCs enabled industrial Internet of things |
1839 | -- | 1852 | Genghua Yu, Jia Wu 0002. Content caching based on mobility prediction and joint user Prefetch in Mobile edge networks |