Abstract is missing.
- Reinforcement Learning Based Group Event Invitation AlgorithmChunyu Ai, Wei Zhong, Longjiang Guo. 3-14 [doi]
- OSCD: An Online Charging Scheduling Algorithm to Optimize Cost and SmoothnessYanhua Cao, Shiyou Qian, Qiushi Wang, Hanwen Hu, Weidong Zhu, Jian Cao, Guangtao Xue, Yanmin Zhu, Minglu Li 0001. 15-27 [doi]
- Maximizing the Expected Influence in Face of the Non-progressive AdversaryT.-H. Hubert Chan, Li Ning, Yong Zhang 0001. 28-39 [doi]
- A Novel Anti-attack Revenue Optimization Algorithm in the Proof-of-Work Based BlockchainHao Chen, Yourong Chen, Meng Han, Banteng Liu, Qiuxia Chen, Zhenghua Ma. 40-50 [doi]
- Can the Max-Min Fair Allocation Be Trustful in a Centralized Resource System?Zheng Chen, Zhaoquan Gu, Yuexuan Wang. 51-64 [doi]
- A Novel Blockchain Network Structure Based on Logical NodesJiancheng Chi, Tie Qiu, Chaokun Zhang, Laiping Zhao. 65-76 [doi]
- Dynamic Distribution Routing Algorithm Based on Probability for Maritime Delay Tolerant NetworksXue-rong Cui, Tong Xu, Juan Li, Meiqi Ji, Qiqi Qi, Shibao Li. 77-84 [doi]
- Learning-Aided Mobile Charging for Rechargeable Sensor NetworksXinpeng Duan, Feng Li 0002, Dongxiao Yu, Huan Yang, Hao Sheng. 85-96 [doi]
- A Social Relationship Enabled Cooperative Jamming Scheme for Wireless CommunicationsJingjing Fan, Yan Huo, Qinghe Gao, Tao Jing. 97-108 [doi]
- Multi-job Associated Task Scheduling Based on Task Duplication and Insertion for Cloud ComputingYuqi Fan, Lunfei Wang, Jie Chen, Zhifeng Jin, Lei Shi 0011, Juan Xu. 109-120 [doi]
- Communication-Efficient and Privacy-Preserving Protocol for Computing Over-Threshold Set-UnionXuhui Gong, Qiang-Sheng Hua, Hai Jin 0001. 121-133 [doi]
- Approximation Algorithm for the Offloading Problem in Edge ComputingXinxin Han, Guichen Gao, Li Ning, Yang Wang, Yong Zhang 0001. 134-144 [doi]
- Quality of Service Optimization in Mobile Edge Computing Networks via Deep Reinforcement LearningLi-Tse Hsieh, Hang Liu 0003, Yang Guo, Robert Gazda. 145-157 [doi]
- Camera Style Guided Feature Generation for Person Re-identificationHantao Hu, Yang Liu, Kai Lv, Yanwei Zheng, Wei Zhang, Wei Ke, Hao Sheng. 158-169 [doi]
- Sync or Fork: Node-Level Synchronization Analysis of BlockchainQin Hu, Minghui Xu, Shengling Wang 0001, Shaoyong Guo. 170-181 [doi]
- Multi-user Cooperative Computation Offloading in Mobile Edge ComputingWei Jiang, Molin Li, Xiaobo Zhou 0003, Wenyu Qu, Tie Qiu. 182-193 [doi]
- SDTCNs: A Symmetric Double Temporal Convolutional Network for Chinese NERWei Jiang, Yuan Wang, Yan Tang. 194-205 [doi]
- Verifiable Encrypted Search with Forward Secure Updates for Blockchain-Based SystemHan Li, Hongliang Zhou, Hejiao Huang, Xiaohua Jia. 206-217 [doi]
- Capacity Analysis of Ambient Backscatter System with Bernoulli Distributed ExcitationPengfei Li, Xin He, Nikolaos M. Freris, Panlong Yang. 218-230 [doi]
- Multiset Synchronization with Counting Cuckoo FiltersShangsen Li, Lailong Luo, Deke Guo, Yawei Zhao. 231-243 [doi]
- Privacy-Aware Online Task Offloading for Mobile-Edge ComputingTing Li, Haitao Liu, Jie Liang, Hangsheng Zhang, Liru Geng, YinLong Liu. 244-255 [doi]
- A Class Incremental Temporal-Spatial Model Based on Wireless Sensor Networks for Activity RecognitionXue Li, Lanshun Nie, Xiandong Si, De-chen Zhan. 256-271 [doi]
- Sensor Deployment for Composite Event Monitoring in Battery-Free Sensor NetworksKe Lin, Jianzhong Li. 272-284 [doi]
- Optimizing Motion Estimation with an ReRAM-Based PIM ArchitectureBing Liu, Zhaoyan Shen, Zhiping Jia, Xiaojun Cai. 285-297 [doi]
- Trajectory-Based Data Delivery Algorithm in Maritime Vessel Networks Based on Bi-LSTMChao Liu, Yingbin Li, Ruobing Jiang, Qian Lu, Zhongwen Guo. 298-308 [doi]
- Cold Start and Learning Resource Recommendation Mechanism Based on Opportunistic Network in the Context of Campus Collaborative LearningHong Liu, Peng Li, Yuanru Cui, Qian Liu, Lichen Zhang, Longjiang Guo, Xiaojun Wu, Xiaoming Wang 0001. 309-321 [doi]
- Outsourced Multi-authority ABE with White-Box Traceability for Cloud-IoTSuhui Liu, Jiguo Yu, Chunqiang Hu, Mengmeng Li. 322-332 [doi]
- Deep Learning Enabled Reliable Identity Verification and Spoofing DetectionYongxin Liu, Jian Wang, Shuteng Niu, Houbing Song. 333-345 [doi]
- On-Line Learning-Based Allocationof Base Stations and Channels in Cognitive Radio NetworksZhengyang Liu, Feng Li 0002, Dongxiao Yu, Holger Karl, Hao Sheng. 346-358 [doi]
- A Deep Spatial-Temporal Network for Vehicle Trajectory PredictionZhiqiang Lv, Jianbo Li, Chuanhao Dong, Wei Zhao. 359-369 [doi]
- Beamforming for MISO Cognitive Radio Networks Based on Successive Convex ApproximationRuina Mao, Anming Dong, Jiguo Yu. 370-380 [doi]
- K-Anonymous Privacy Preserving Scheme Based on Bilinear Pairings over Medical DataLinghang Meng, Xueshu Hong, Yingwen Chen, Yuke Ding, Cheng-Zhuo Zhang. 381-393 [doi]
- Incentive Mechanism for Socially-Aware Mobile Crowdsensing: A Bayesian Stackelberg GameJiangtian Nie, Jun Luo, Zehui Xiong, Dusit Niyato, Ping Wang 0001, Yang Zhang. 394-406 [doi]
- Adaptive Task Scheduling via End-Edge-Cloud Cooperation in Vehicular NetworksHuaLing Ren, Kai Liu 0001, Penglin Dai, Yantao Li, Ruitao Xie, Songtao Guo. 407-419 [doi]
- An Improved Parallel Network Traffic Anomaly Detection Method Based on Bagging and GRUXiaoling Tao, Yang Peng, Feng Zhao 0002, Sufang Wang, Ziyi Liu. 420-431 [doi]
- Joint Server Selection and SFC Routing for Anycast in NFV-enabled SDNsHuaqing Tu, Hongli Xu, Liusheng Huang, Xuwei Yang, Da Yao. 432-443 [doi]
- Blockchain-Based Privacy-Preserving Dynamic Spectrum SharingZhitian Tu, Kun Zhu 0001, Changyan Yi, Ran Wang. 444-456 [doi]
- A Survey: Applications of Blockchains in the Internet of VehiclesChao Wang, Xiaoman Cheng, Jitong Li, Yunhua He, Ke Xiao. 457-468 [doi]
- A Secure Topology Control Mechanism for SDWSNs Using Identity-Based CryptographyRui Wang, Donglan Liu, Jianfei Chen, Lei Ma, Xin Liu, Hao Zhang. 469-481 [doi]
- A Blockchain-Based Decentralized Public Auditing Scheme for Cloud StorageYing Wang, Conghao Ruan, Chunqiang Hu. 482-493 [doi]
- A New Fully Homomorphic Signatures from Standard LatticesYukun Wang, Mingqiang Wang. 494-506 [doi]
- An Efficient Malicious User Detection Mechanism for Crowdsensing SystemXiaocan Wu, Yu-e Sun, Yang Du 0006, Xiaoshuang Xing, Guoju Gao, He Huang 0001. 507-519 [doi]
- Implementation of Video Transmission over Maritime Ad Hoc NetworkHua Xiao, Ying Wang, Shulong Peng, Bin Lin. 520-528 [doi]
- A Reliable Multi-task Allocation Based on Reverse Auction for Mobile CrowdsensingJunlei Xiao, Peng Li, Lei Nie. 529-541 [doi]
- A Blockchain Based Privacy-Preserving Cloud Service Level Agreement Auditing SchemeKe Xiao, Ziye Geng, Yunhua He, Gang Xu, Chao Wang, Wei Cheng. 542-554 [doi]
- CPBA: An Efficient Conditional Privacy-Preserving Batch Authentication Scheme for VANETsJieyao Xu, Dongmei Zhang, Gaoyuan Xiong, Han Zhang. 555-567 [doi]
- Consensus in Wireless Blockchain SystemQiang Xu, Yifei Zou, Dongxiao Yu, Minghui Xu, Shikun Shen, Feng Li. 568-579 [doi]
- Blockchain-Based Service Recommendation Supporting Data SharingBiwei Yan, Jiguo Yu, Yue Wang, Qiang Guo, Baobao Chai, Suhui Liu. 580-589 [doi]
- Multi-objective Disaster Backup in Inter-datacenter Using Reinforcement LearningJiaXin Yan, Hua Wang, Xiaole Li, Shanwen Yi, Yao Qin. 590-601 [doi]
- Detecting Internet-Scale NATs for IoT Devices Based on Tri-NetZhaoteng Yan, Nan Yu, Hui-Wen, Zhi Li 0018, Hongsong Zhu, Limin Sun. 602-614 [doi]
- Data Integrity Checking Supporting Reliable Data Migration in Cloud StorageChangsong Yang, Xiaoling Tao, Sufang Wang, Feng Zhao 0002. 615-626 [doi]
- A Blockchain-Based Privacy-Preserving Mechanism for Attribute Matching in Social NetworksFeihong Yang, Yuwen Pu, Chunqiang Hu, Yan Zhou. 627-639 [doi]
- A Real-Time Recommendation Algorithm for Task Allocation in Mobile Crowd SensingGuisong Yang, Yanting Li, Yan Song, Jun Li, Xingyu He, Linghe Kong, Ming Liu. 640-652 [doi]
- A Dual Scale Matching Model for Long-Term AssociationZhen Ye, Yubin Wu, Shuai Wang, Yang Zhang 0032, Yanbing Chen, Wei Ke, Hao Sheng. 653-665 [doi]
- A Real-Time Vehicle Logo Detection Method Based on Improved YOLOv2Kangning Yin, Shaoqi Hou, Ye Li, Chao Li, Guangqiang Yin. 666-677 [doi]
- SEM: APP Usage Prediction with Session-Based EmbeddingZepeng Yu, Wenzhong Li, Pinhao Wang, Sanglu Lu. 678-690 [doi]
- Intelligent Dynamic Spectrum Access for Uplink Underlay Cognitive Radio Networks Based on Q-LearningJingjing Zhang, Anming Dong, Jiguo Yu. 691-703 [doi]
- A Trajectory-Privacy Protection Method Based on Location Similarity of Query Destinations in Continuous LBS QueriesLu Zhang, Saide Zhu, Fengyin Li, Ruinian Li, Jing Meng, Wei Li. 704-715 [doi]
- Reliable Potential Friends Identification Based on Trust Circuit for Social RecommendationShuo Zhang, Jinghua Zhu. 716-729 [doi]
- GaitID: Robust Wi-Fi Based Gait RecognitionYi Zhang, Yue Zheng, Guidong Zhang, Kun Qian 0004, Qian Chen, Zheng Yang 0002. 730-742 [doi]
- Optimal Node Placement for Magnetic Relay and MIMO Wireless Power Transfer NetworkYubin Zhao, Junjian Huang, Xiaofan Li, Cheng-Zhong Xu 0001. 743-754 [doi]
- EdgeCC: An Authentication Framework for the Fast Migration of Edge Services Under Mobile ClientsZhihui Zhao, Weizhong Wang, Hongsong Zhu, Hong Li, Limin Sun, Sen Zhao, Yan Hu. 755-767 [doi]
- Attention-Based Dynamic Preference Model for Next Point-of-Interest RecommendationChenwang Zheng, Dan Tao. 768-780 [doi]
- From When to Where: A Multi-task Learning Approach for Next Point-of-Interest RecommendationJinwen Zhong, Can Ma, Jiang Zhou, Weiping Wang 0005. 781-793 [doi]
- An Adversarial Learning Model for Intrusion Detection in Real Complex Network EnvironmentsYing Zhong, Yiran Zhu, Zhiliang Wang, Xia Yin, Xingang Shi, Keqin Li 0001. 794-806 [doi]
- HotDAG: Hybrid Consensus via Sharding in the Permissionless ModelChun-Xuan Zhou, Qiang-Sheng Hua, Hai Jin 0001. 807-821 [doi]
- Distributed Data Aggregation in Dynamic Sensor NetworksYifei Zou, Minghui Xu, Yicheng Xu, Yong Zhang 0001, Bei Gong, Xiaoshuang Xing. 822-833 [doi]