Abstract is missing.
- Decomposable Atomic Norm Minimization Channel Estimation for Millimeter Wave MIMO-OFDM SystemsQianwen An, Tao Jing, Yingkun Wen, Zhuojun Duan, Yan Huo. 3-15 [doi]
- Model Based Adaptive Data Acquisition for Internet of ThingsRan Bi, Jiankang Ren, Hao Wang, Qian Liu, Shan Huang. 16-28 [doi]
- Hybrid Low Frequency Electromagnetic Field and Solar Energy Harvesting Architecture for Self-Powered Wireless Sensor SystemDi Cao, Jing-run Jia, Min-jie Xie, Yanjing Lei, Wei Li. 29-42 [doi]
- Automated and Personalized Privacy Policy Extraction Under GDPR ConsiderationCheng Chang, Huaxin Li, Yichi Zhang, Suguo Du, Hui Cao, Haojin Zhu. 43-54 [doi]
- Cooperative BSM Dissemination in DSRC/WAVE Based Vehicular NetworksLin Chen, Xiaoshuang Xing, Gaofei Sun, Jin Qian, Xin Guan. 55-66 [doi]
- TIDS: Trust Intrusion Detection System Based on Double Cluster Heads for WSNsNa Dang, Xiaowu Liu, Jiguo Yu, Xiaowei Zhang. 67-83 [doi]
- An Efficient Revocable Attribute-Based Signcryption Scheme with Outsourced Designcryption in Cloud ComputingNingzhi Deng, Shaojiang Deng, Chunqiang Hu, Kaiwen Lei. 84-97 [doi]
- Massive MIMO Cognitive Cooperative RelayingSon Dinh, Hang Liu, Feng Ouyang. 98-110 [doi]
- Minimum Control Cost of Weighted Linear Dynamic NetworksZhaoquan Gu, Yuexuan Wang, Yijie Wu, Yongcai Wang, Yueming Wang. 111-123 [doi]
- Privacy Protection for Context-Aware Services: A Two-Layer Three-Party Game ModelYan Huang, Zhipeng Cai, Anu G. Bourgeois. 124-136 [doi]
- Who Leaks My Privacy: Towards Automatic and Association Detection with GDPR ComplianceQiwei Jia, Lu Zhou, Huaxin Li, Ruoxu Yang, Suguo Du, Haojin Zhu. 137-148 [doi]
- Trustroam: A Novel Blockchain-Based Cross-Domain Authentication Scheme for Wi-Fi AccessChunlei Li, Qian Wu, Hewu Li, Jun Liu. 149-161 [doi]
- Joint Optimization of Routing and Storage Node Deployment in Heterogeneous Wireless Sensor Networks Towards Reliable Data StorageFeng Li, Huan Yang, Yifei Zou, Dongxiao Yu, Jiguo Yu. 162-174 [doi]
- Fusing RFID and Computer Vision for Occlusion-Aware Object Identifying and TrackingMin Li, Yao Chen, Yanfang Zhang, Jian Yang, Hong Du. 175-187 [doi]
- Spatiotemporal Feature Extraction for Pedestrian Re-identificationYe Li, Guangqiang Yin, Shaoqi Hou, Jianhai Cui, Zicheng Huang. 188-200 [doi]
- Detecting Android Side Channel Probing Attacks Based on System StatesQixiao Lin, Jian Mao, Futian Shi, Shishi Zhu, Zhenkai Liang. 201-212 [doi]
- Online DAG Scheduling with On-Demand Function Configuration in Edge ComputingLiuyan Liu, Haoqiang Huang, Haisheng Tan, Wanli Cao, Panlong Yang, Xiang-Yang Li. 213-224 [doi]
- Magnetic Beamforming Algorithm for Hybrid Relay and MIMO Wireless Power TransferBin Ma, Yubin Zhao, Xiaofan Li, Yuefeng Ji, Cheng-Zhong Xu 0001. 225-234 [doi]
- Self-attention Based Collaborative Neural Network for RecommendationShengchao Ma, Jinghua Zhu. 235-246 [doi]
- An Efficient and Recoverable Data Sharing Mechanism for Edge StorageYuwen Pu, Ying Wang, Feihong Yang, Jin Luo, Chunqiang Hu, Haibo Hu. 247-259 [doi]
- Trajectory Comparison in a Vehicular Network II: Eliminating the RedundancyQingge Letu, Peng Zou, Lihui Dai, Qing Yang, Binhai Zhu. 260-271 [doi]
- Differentially Private Event Sequences over Infinite Streams with Relaxed Privacy GuaranteeXuebin Ren, Shuyang Wang, Xianghua Yao, Chia-Mu Yu, Wei Yu, Xinyu Yang. 272-284 [doi]
- Performance Investigation of Polar Codes over Nakagami-M Fading and Real Wireless Channel MeasurementsMohammed Sarkhi, Abdulsahib Albehadili, Osama Hussein, Ahmad Y. Javaid, Vijay Devabhaktuni. 285-296 [doi]
- Optimal Transportation Network Company Vehicle Dispatching via Deep Deterministic Policy GradientDian Shi, Xuanheng Li, Ming Li, Jie Wang, Pan Li, Miao Pan. 297-309 [doi]
- Fairness-Aware Auction Mechanism for Sustainable Mobile CrowdsensingKorn Sooksatra, Ruinian Li, Yingshu Li, Xin Guan, Wei Li. 310-321 [doi]
- Evolutionary Game Based Gateway Selection Algorithm in Cyber-Physical SystemHao Wang. 322-334 [doi]
- Wide and Recurrent Neural Networks for Detection of False Data Injection in Smart GridsYawei Wang, Donghui Chen, Cheng Zhang, Xi Chen, Baogui Huang, Xiuzhen Cheng. 335-345 [doi]
- ONE-Geo: Client-Independent IP Geolocation Based on Owner Name ExtractionYucheng Wang, Xu Wang, Hongsong Zhu, Hai Zhao, Hong Li, Limin Sun. 346-357 [doi]
- Decentralized Hierarchical Authorized Payment with Online Wallet for BlockchainQianwen Wei, Shujun Li, Wei Li, Hong Li, Mingsheng Wang. 358-369 [doi]
- A Location Predictive Model Based on 2D Angle Data for HAPS Using LSTMKe Xiao, Chaofei Li, Yunhua He, Chao Wang, Wei Cheng. 370-381 [doi]
- Cross-Layer Optimization on Charging Strategy for Wireless Sensor Networks Based on Successive Interference CancellationJuan Xu, Xingxin Xu, Xu Ding, Lei Shi, Yang Lu. 382-394 [doi]
- An Integrated UAV Platform for Real-Time and Efficient Environmental MonitoringLinyan Xu, Zhangjie Fu, Liran Ma. 395-406 [doi]
- CXNet-m2: A Deep Model with Visual and Clinical Contexts for Image-Based Detection of Multiple LesionsShuaijing Xu, Guangzhi Zhang, Rongfang Bie, Anton Kos. 407-418 [doi]
- OWLS: Opportunistic Wireless Link Scheduling with SINR ConstraintsXiaoHua Xu, Yuanfang Chen, Shuibing He, Patrick Otoo Bobbie. 419-431 [doi]
- Distributed Real-Time Data Aggregation Scheduling in Duty-Cycled Multi-hop Sensor NetworksXiaoHua Xu, Yi Zhao, Dongfang Zhao, Lei Yang, Spiridon Bakiras. 432-444 [doi]
- Building Trustful Crowdsensing Service on the EdgeBiao Yu, Yingwen Chen, Shaojing Fu, Wanrong Yu, Xiaoli Guo. 445-457 [doi]
- User Identity De-anonymization Based on AttributesCheng Zhang, Honglu Jiang, Yawei Wang, Qin Hu, Jiguo Yu, Xiuzhen Cheng. 458-469 [doi]
- Detecting Anomalies in Communication Packet Streams Based on Generative Adversarial NetworksDi Zhang, Qiang Niu, Xingbao Qiu. 470-481 [doi]
- Multi-hop Wireless Recharging Sensor Networks Optimization with Successive Interference CancellationPeng Zhang, Xu Ding, Jing Wang, Juan Xu. 482-494 [doi]
- Deep Neural Model for Point-of-Interest Recommendation Fused with Graph Embedding RepresentationJinghua Zhu, Xu Guo. 495-506 [doi]
- A Hybrid Approach for Recognizing Web CrawlersWeiping Zhu, Hang Gao, Zongjian He, Jiangbo Qin, Bo Han. 507-519 [doi]
- Contextual Combinatorial Cascading Thompson SamplingZhenyu Zhu, Liusheng Huang, Hongli Xu. 520-532 [doi]
- Trajectory Comparison in a Vehicular Network I: Computing a Consensus TrajectoryPeng Zou, Letu Qingge, Qing Yang, Binhai Zhu. 533-544 [doi]
- Utility Aware Task Offloading for Mobile Edge ComputingRan Bi, Jiankang Ren, Hao Wang, Qian Liu, Xiuyuan Yang. 547-555 [doi]
- Analysis of Best Network Routing Structure for IoTShasha Chen, Shengling Wang 0001, Jianghui Huang. 556-563 [doi]
- Parallel Multicast Information Propagation Based on Social InfluenceYuqi Fan, Liming Wang, Lei Shi, Dingzhu Du. 564-572 [doi]
- Research on Physical Layer Security Scheme Based on OAM - Modulation for Wireless CommunicationsWeiqing Huang, Yan Li, Dong Wei, Qiaoyu Zhang. 573-586 [doi]
- Optimal Routing of Tight Optimal Bidirectional Double-Loop NetworksLiu Hui, Shengling Wang 0001. 587-595 [doi]
- DDSEIR: A Dynamic Rumor Spreading Model in Online Social NetworksLi Li, Hui Xia, Rui Zhang, Ye Li. 596-604 [doi]
- Data Forwarding and Caching Strategy for RSU Aided V-NDNZhenchun Wei, Jie Pan, Kangkang Wang, Lei Shi, Zengwei Lyu, Lin Feng. 605-612 [doi]
- Lightweight IoT Malware Visualization Analysis via Two-Bits NetworksHui-Wen, Weidong Zhang, Yan Hu, Qing Hu, Hongsong Zhu, Limin Sun. 613-621 [doi]
- Privacy Protection Sensing Data Aggregation for Crowd SensingYunpeng Wu, Shukui Zhang, Yuren Yang, Yang Zhang, Li Zhang, Hao Long. 622-630 [doi]
- A New Outsourced Data Deletion Scheme with Public VerifiabilityChangsong Yang, Xiaoling Tao, Feng Zhao, Yong Wang. 631-638 [doi]
- DPSR: A Differentially Private Social Recommender System for Mobile UsersXueling Zhou, Lingbo Wei, Yukun Niu, Chi Zhang, Yuguang Fang. 639-646 [doi]