Abstract is missing.
- Hypergraph Based Radio Resource Management in 5G Fog CellXingshuo An, Fuhong Lin. 1-13 [doi]
- A Novel Energy Harvesting Aware IEEE 802.11 Power Saving MechanismYigitcan Celik, Cong Pu. 14-26 [doi]
- Interest-Aware Next POI Recommendation for Mobile Social NetworksMing Chen, Wenzhong Li, Lin Qian, Sanglu Lu, Daoxu Chen. 27-39 [doi]
- Approximate Minimum-Transmission Broadcasting in Duty-Cycled WSNsQuan Chen 0003, Tianbai Le, Lianglun Cheng, Zhipeng Cai, Hong Gao. 40-52 [doi]
- Robust Network-Based Binary-to-Vector Encoding for Scalable IoT Binary File RetrievalYu Chen, Hong Li, Yuan Ma, Zhiqiang Shi, Limin Sun. 53-65 [doi]
- OSCO: An Open Security-Enhanced Compatible OpenFlow PlatformHaosu Cheng, Jianwei Liu, Jian Mao, Mengmeng Wang, Jie Chen 0009. 66-77 [doi]
- Hop-Constrained Relay Node Placement in Wireless Sensor NetworksXingjian Ding, Guodong Sun, Deying Li, Yongcai Wang, Wenping Chen. 78-89 [doi]
- Degrading Detection Performance of Wireless IDSs Through Poisoning Feature SelectionYifan Dong, Peidong Zhu, Qiang Liu, Yingwen Chen, Peng Xun. 90-102 [doi]
- A Cooperative Jamming Based Secure Uplink Transmission Scheme for Heterogeneous Networks Supporting D2D CommunicationsJingjing Fan, Yan Huo, Xin Fan, Chunqiang Hu, Guanlin Jing. 103-114 [doi]
- Delay-Constrained Throughput Maximization in UAV-Assisted VANETsXiying Fan, Chuanhe Huang, Xi Chen, Shaojie Wen, Bin Fu. 115-126 [doi]
- Smart Device Fingerprinting Based on Webpage LoadingPeng Fang, Liusheng Huang, Hongli Xu, Qijian He. 127-139 [doi]
- Trajectory Prediction for Ocean Vessels Base on K-order Multivariate Markov ChainShuai Guo, Chao Liu 0008, Zhongwen Guo, Yuan Feng, Feng Hong, Haiguang Huang. 140-150 [doi]
- Experimental Study on Deployment of Mobile Edge Computing to Improve Wireless Video Streaming QualityLi-Tse Hsieh, Hang Liu, Cheng-Yu Cheng, Xavier De Foy, Robert Gazda. 151-163 [doi]
- An Efficient Privacy-Preserving Data Aggregation Scheme for IoTChunqiang Hu, Jin Luo, Yuwen Pu, Jiguo Yu, Ruifeng Zhao, Hongyu Huang, Tao Xiang. 164-176 [doi]
- Improving Security and Stability of AODV with Fuzzy Neural Network in VANETBaohua Huang, Jiawei Mo, Xiaolu Cheng. 177-188 [doi]
- Exploiting Aerial Heterogeneous Network for Implementing Wireless Flight RecorderShanshan Huang, Zhen Wang, Chi Zhang, Yuguang Fang. 189-200 [doi]
- TOA Estimation Algorithm Based on Noncoherent Detection in IR-UWB SystemYuanfa Ji, Jianguo Song, Xiyan Sun, Suqing Yan, Zhengquan Yang. 201-210 [doi]
- Max-Min Fairness Scheme in Wireless Powered Communication Networks with Multi-user CooperationMing Lei, Xingjun Zhang, Bocheng Yu. 211-222 [doi]
- Cancer-Drug Interaction Network Construction and Drug Target Prediction Based on Multi-source DataChuyang Li, Guangzhi Zhang, Rongfang Bie, Hao Wu, Yuqi Yang, Jiguo Yu, Xianlin Ma. 223-235 [doi]
- Enabling Efficient and Fine-Grained DNA Similarity Search with Access Control over Encrypted Cloud DataHongwei Li, Guowen Xu, Qiang Tang 0005, Xiaodong Lin, Xuemin (Sherman) Shen. 236-248 [doi]
- Sampling Based \delta δ -Approximate Data Aggregation in Sensor Equipped IoT NetworksJi Li, Madhuri Siddula, Xiuzhen Cheng, Wei Cheng, Zhi Tian, Yingshu Li. 249-260 [doi]
- Poisoning Machine Learning Based Wireless IDSs via Stealing Learning ModelPan Li, Wentao Zhao, Qiang Liu, Xiao Liu, Linyuan Yu. 261-273 [doi]
- Signal-Selective Time Difference of Arrival Estimation Based on Generalized Cyclic Correntropy in Impulsive Noise EnvironmentsSen Li, Bin Lin, Yabo Ding, Rongxi He. 274-283 [doi]
- iKey: An Intelligent Key System Based on Efficient Inclination Angle Sensing TechniquesKe Lin, Jinbao Wang, Jianzhong Li, Siyao Cheng, Hong Gao. 284-295 [doi]
- Massive MIMO Power Allocation in Millimeter Wave NetworksHang Liu, Chinh Tran, Jan Lasota, Son Dinh, Xianfu Chen, Feng Ouyang. 296-307 [doi]
- A Detection-Resistant Covert Timing Channel Based on Geometric Huffman CodingJianhua Liu, Wei Yang 0011, Liusheng Huang, Wuji Chen. 308-320 [doi]
- Spark: A Smart Parking Lot Monitoring SystemBlake Lucas, Liran Ma. 321-332 [doi]
- A Hybrid Model Based on Multi-dimensional Features for Insider Threat DetectionBin Lv, Dan Wang, Yan Wang, Qiujian Lv, Dan Lu. 333-344 [doi]
- Throughput Analysis for Energy Harvesting Cognitive Radio Networks with Unslotted UsersHonghao Ma, Tao Jing, Fan Zhang, Xin Fan, Yanfei Lu, Yan Huo. 345-356 [doi]
- A Crowdsourcing-Based Wi-Fi Fingerprinting Mechanism Using Un-supervised LearningXiaoguang Niu, Chun Zhang, Ankang Wang, Jingbin Liu, Zhen Wang. 357-373 [doi]
- Secure and Efficient Outsourcing of Large-Scale Matrix Inverse ComputationShiran Pan, Qiongxiao Wang, Fangyu Zheng, Jiankuo Dong. 374-386 [doi]
- Household Electrical Load Scheduling Algorithms with Renewable EnergyZhengrui Qin, Qun Li. 387-399 [doi]
- An Empirical Study of OAuth-Based SSO System on WebKaili Qiu, Qixu Liu, Jingqiang Liu, Lei Yu, Yiwen Wang. 400-411 [doi]
- Turning Legacy IR Devices into Smart IoT DevicesChuta Sano, Chao Gao, Zupei Li, Zhen Ling, Xinwen Fu. 412-424 [doi]
- Solving Data Trading Dilemma with Asymmetric Incomplete Information Using Zero-Determinant StrategyKorn Sooksatra, Wei Li, Bo Mei, Arwa Alrawais, Shengling Wang 0001, Jiguo Yu. 425-437 [doi]
- Data Uploading Mechanism for Internet of Things with Energy HarvestingGaofei Sun, Xiaoshuang Xing, Xiangping Qin. 438-449 [doi]
- Enabling ZigBee Link Performance Robust Under Cross-Technology InterferenceYingxiao Sun, Zhenquan Qin, Junyu Hu, Lei Wang, Jiaxin Du, Yan Ren. 450-461 [doi]
- Quadrant-Based Weighted Centroid Algorithm for Localization in Underground MinesNazish Tahir, Md. Monjurul Karim, Kashif Sharif, Fan Li, Nadeem Ahmed. 462-472 [doi]
- Exploration of Human Activities Using Sensing Data via Deep Embedded DeterminationYiqi Wang, En Zhu, Qiang Liu, Yingwen Chen, Jianping Yin. 473-484 [doi]
- Reinforcement Learning for a Novel Mobile Charging Strategy in Wireless Rechargeable Sensor NetworksZhenchun Wei, Fei Liu, Zengwei Lyu, Xu Ding, Lei Shi, Chengkai Xia. 485-496 [doi]
- A Multi-objective Algorithm for Joint Energy Replenishment and Data Collection in Wireless Rechargeable Sensor NetworksZhenchun Wei, Liangliang Wang, Zengwei Lyu, Lei Shi, Meng Li, Xing Wei. 497-508 [doi]
- Privacy-Preserving Personal Sensitive Data in CrowdsourcingKe Xu, Kai Han, Hang Ye, Feng Gao, Chaoting Xu. 509-520 [doi]
- A First Step Towards Combating Fake News over Online Social MediaKuai Xu, Feng Wang 0002, Haiyan Wang, Bo Yang. 521-531 [doi]
- Predicting Smartphone App Usage with Recurrent Neural NetworksShijian Xu, Wenzhong Li, Xiao Zhang, Songcheng Gao, Tong Zhan, Yongzhu Zhao, Wei-wei Zhu, Tianzi Sun. 532-544 [doi]
- A Self-organizing Base Station Sleeping Strategy in Small Cell Networks Using Local Stable Matching GamesYiwei Xu, Panlong Yang, Jian Gong, Kan Niu. 545-556 [doi]
- Dealing with Dynamic-Scale of Events: Matrix Recovery Based Compressive Data Gathering for Sensor NetworksZhonghu Xu, Shuo Zhang, Jing Xu 0007, Kai Xing. 557-569 [doi]
- Proactive Caching for Transmission Performance in Cooperative Cognitive Radio NetworksJiachen Yang, Huifang Xu, Bin Jiang 0003, Gan Zheng, Houbing Song. 570-579 [doi]
- N-Guide: Achieving Efficient Named Data Transmission in Smart BuildingsSiyan Yao, Yuwei Xu, Shuai Tong, Jianzhong Zhang 0003, Jingdong Xu. 580-592 [doi]
- Privacy-Preserving Task Assignment in Skill-Aware Spatial CrowdsourcingHang Ye, Kai Han, Ke Xu, Feng Gao, Chaoting Xu. 593-605 [doi]
- HEVC Lossless Compression Coding Based on Hadamard Butterfly TransformationXi Yin 0005, Weiqing Huang, Mohsen Guizani. 606-621 [doi]
- U-MEC: Energy-Efficient Mobile Edge Computing for IoT Applications in Ultra Dense NetworksBowen Yu, Lingjun Pu, Qinyi Xie, Jingdong Xu, Jianzhong Zhang. 622-634 [doi]
- Localization of Thyroid Nodules in Ultrasonic ImagesRuiguo Yu, Kai Liu, Xi Wei, Jialin Zhu, Xuewei Li, Jianrong Wang, Xiang Ying, Zhihui Yu. 635-646 [doi]
- Cost Reduction for Micro-Grid Powered Data Center Networks with Energy Storage DevicesGuanglin Zhang, Kaijiang Yi, Wenqian Zhang, Demin Li. 647-659 [doi]
- An Information Classification Collection Protocol for Large-Scale RFID SystemJuMin Zhao, HaiZhu Yang, Wenjing Li, Dengao Li, Ruijuan Yan. 660-670 [doi]
- An Efficient Energy-Aware Probabilistic Routing Approach for Mobile Opportunistic NetworksRuonan Zhao, Lichen Zhang 0001, Xiaoming Wang 0001, Chunyu Ai, Fei Hao, Yaguang Lin. 671-682 [doi]
- On Association Study of Scalp EEG Data Channels Under Different CircumstancesJingyi Zheng, Mingli Liang, Arne D. Ekstrom, Linqiang Ge, Wei Yu, Fushing Hsieh. 683-695 [doi]
- A Privacy-Preserving Networked Hospitality Service with the Bitcoin BlockchainHengyu Zhou, Yukun Niu, Jianqing Liu, Chi Zhang, Lingbo Wei, Yuguang Fang. 696-708 [doi]
- Trust-Distrust-Aware Point-of-Interest Recommendation in Location-Based Social NetworkJinghua Zhu, Qian Ming, Yong Liu. 709-719 [doi]
- Retrieving the Relative Kernel Dataset from Big Sensory Data for Continuous QueryTongxin Zhu, Jinbao Wang, Siyao Cheng, Yingshu Li, Jianzhong Li. 720-732 [doi]
- KrackCover: A Wireless Security Framework for Covering KRACK AttacksTommy Chin, Kaiqi Xiong. 733-739 [doi]
- Node Deployment of High Altitude Platform Based Ocean Monitoring Sensor NetworksJianli Duan, Yuxiang Liu, Bin Lin 0001, Yuan Jiang, Fen Hou. 740-747 [doi]
- LAMP: Lightweight and Accurate Malicious Access Points Localization via Channel Phase InformationLiangyi Gong, Chundong Wang 0002, Likun Zhu, Jian Zhang, Wu Yang 0001, Yiyang Zhao, Chaocan Xiang. 748-753 [doi]
- NASR: NonAuditory Speech Recognition with Motion Sensors in Head-Mounted DisplaysJiaxi Gu, Kele Shen, Jiliang Wang, Zhiwen Yu. 754-759 [doi]
- Energy Harvesting Based Opportunistic Routing for Mobile Wireless Nanosensor NetworksJuan Xu, Jiaolong Jiang, Zhiyu Wang, Yakun Zhao. 760-766 [doi]
- Synergistic Based Social Incentive Mechanism in Mobile CrowdsensingCan Liu, Feng Zeng, Wenjia Li. 767-772 [doi]
- SACP: A Signcryption-Based Authentication Scheme with Conditional Privacy Preservation for VANETMiao Lu, Ying Wu, Yuwei Xu, Yijie Yang, Jingjing Wang. 773-779 [doi]
- DFTinker: Detecting and Fixing Double-Fetch Bugs in an Automated WayYingqi Luo, Pengfei Wang, Xu Zhou, Kai Lu. 780-785 [doi]
- A Quality-Validation Task Assignment Mechanism in Mobile Crowdsensing SystemsXingyou Xia, Lin Xue, Jie Li, Ruiyun Yu. 786-792 [doi]
- A Novel Capacity-Aware SIC-Based Protocol for Wireless NetworksFangxin Xu, Qinglin Zhao, Shumin Yao, Hong Liang, Guangcheng Li. 793-798 [doi]
- A Supervised Learning Approach to Link Prediction in Dynamic NetworksShuai Xu, Kai Han, Naiting Xu. 799-805 [doi]
- Mining Mobile Users' Interests Through Cellular Network Browsing ProfilesFan Yan, Yunpeng Ding, Wenzhong Li. 806-812 [doi]
- A Gradient-Boosting-Regression Based Physical Health Evaluation Model for Running Monitoring by Using a Wearable Smartband SystemLan Yang, Junqi Guo, Yazhu Dai, Di Lu, Rongfang Bie. 813-819 [doi]
- The Research of Spam Web Page Detection Method Based on Web Page Differentiation and Concrete Cluster CentersMei Yu, Jie Zhang, Jianrong Wang, Jie Gao, Tianyi Xu, Ruiguo Yu. 820-826 [doi]
- Network Control for Large-Scale Container ClustersWeiqi Zhang, Baosheng Wang, Wenping Deng, Hao Zeng. 827-833 [doi]
- Joint Optimization of Flow Entry Aggregation and Routing Selection in Software Defined Wireless Access NetworksZhipeng Zhao, Bin Wu, Jie Xiao, ZhenYu Hu. 834-839 [doi]
- Loc-Knock: Remotely Locating Survivors in Mine Disasters Using Acoustic SignalsJiaxi Zhou, Zhonghu Xu, Shuo Zhang, Jing Xu 0007. 840-845 [doi]
- A Recognition Approach for Groups with InteractionsWeiping Zhu, Jiaojiao Chen, Lin Xu, Yan Gu. 846-852 [doi]
- Security Enhancement of Over-the-Air Update for Connected VehiclesAkshay Chawan, Weiqing Sun, Ahmad Y. Javaid, Umesh Gurav. 853-864 [doi]
- Resilient SDN-Based Communication in Vehicular NetworkKamran Naseem Kalokhe, Younghee Park, Sang-Yoon Chang. 865-873 [doi]
- Authentication Protocol Using Error Correcting Codes and Cyclic Redundancy CheckC. Pavan Kumar, R. Selvakumar. 874-882 [doi]
- Understanding Data Breach: A Visualization AspectLiyuan Liu, Meng Han, Yan Wang, Yiyun Zhou. 883-892 [doi]
- A Novel Recommendation-Based Trust Inference Model for MANETsHui Xia, Benxia Li, Sanshun Zhang, Shiwen Wang, Xiangguo Cheng. 893-906 [doi]