default search action
Computer Communications, Volume 162
Volume 162, October 2020
- Xinghan Wang, Xiaoxiong Zhong, Li Li, Sheng Zhang, Renhao Lu, Tingting Yang:
TOT: Trust aware opportunistic transmission in cognitive radio Social Internet of Things. 1-11 - Farhan Musanna, Sanjeev Kumar:
Generating visually coherent encrypted images with reversible data hiding in wavelet domain by fusing chaos and pairing function. 12-30
- Omer Deperlioglu, Utku Kose, Deepak Gupta, Ashish Khanna, Arun Kumar Sangaiah:
Diagnosis of heart diseases by a secure Internet of Health Things system based on Autoencoder Deep Neural Network. 31-50
- Haiping Zhou, Shigen Shen, Jianhua Liu:
Malware propagation model in wireless sensor networks under attack-defense confrontation. 51-58
- Zizhao Wang, Wei Bao, Dong Yuan, Liming Ge, Nguyen Hoang Tran, Albert Y. Zomaya:
Accelerating on-device DNN inference during service outage through scheduling early exit. 69-82
- Inès Hilali-Jaghdam, Anis Ben Ishak, Sayed Abdel-Khalek, Amani Tariq Jamal:
Quantum and classical genetic algorithms for multilevel segmentation of medical images: A comparative study. 83-93
- Xidi Qu, Qin Hu, Shengling Wang:
Privacy-preserving model training architecture for intelligent edge computing. 94-101
- Bakkiam David Deebak, Fadi Al-Turjman:
A smart lightweight privacy preservation scheme for IoT-based UAV communication systems. 102-117
- Viet-Hoang Tran, Olivier Bonaventure:
Beyond socket options: Towards fully extensible Linux transport stacks. 118-138
- Xiaotong Wu, Mohammad Reza Khosravi, Lianyong Qi, Genlin Ji, Wanchun Dou, Xiaolong Xu:
Locally private frequency estimation of physical symptoms for infectious disease analysis in Internet of Medical Things. 139-151
- Abid Hussain, Muddesar Iqbal, Sohail Sarwar, Muhammad Safyan, Zia Ul-Qayyum, Honghao Gao, Xinheng Wang:
Servicing delay sensitive pervasive communication through adaptable width channelization for supporting mobile edge computing. 152-159
- Ying Hu, Guang Cheng, Yongning Tang, Feng Wang:
A practical design of hash functions for IPv6 using multi-objective genetic programming. 160-168
- Xiaoguang Liu, Ziqing Wang, Yalan Ye, Fagen Li:
An efficient and practical certificateless signcryption scheme for wireless body area networks. 169-178
- Wei Tong, Xuewen Dong, Yulong Shen, Jiawei Zheng:
BC-RAN: Cloud radio access network enabled by blockchain for 5G. 179-186
- Qi Liu, Francis Mawuli Nakoty, Xueyan Wu, Raphael Anaadumba, Xiaodong Liu, Yonghong Zhang, Lianyong Qi:
A secure edge monitoring approach to unsupervised energy disaggregation using mean shift algorithm in residential buildings. 187-195
- Cheng Xu, Ming Xu, Chanjuan Yin:
Optimized multi-UAV cooperative path planning under the complex confrontation environment. 196-203
- Xiang Chen:
A security integration model for private data of intelligent mobile communication based on edge computing. 204-211
- Abdullah Al-Noman Patwary, Anmin Fu, Sudheer Kumar Battula, Ranesh Kumar Naha, Saurabh Garg, Aniket Mahanti:
FogAuthChain: A secure location-based authentication scheme in fog computing environments using Blockchain. 212-224
- Wei Wei, Jinsong Wu, Chunsheng Zhu:
Special issue on wearable medical devices for healthcare measurements. 225-226 - S. Kalaivani, C. Tharini:
Corrigendum to "Analysis and implementation of novel Rice Golomb coding algorithm for wireless sensor networks" [Comput. Commun. 150 (2020) 463-471]. 227
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.