


default search action
Computer Communications, Volume 205
Volume 205, May 2023
- Lorenzo Ghiro, Marco Cominelli

, Francesco Gringoli, Renato Lo Cigno
:
Wi-Fi Localization Obfuscation: An implementation in openwifi. 1-13
- Yancheng Sun, Yuling Chen, Peng Wu, Xuewei Wang

, Qi Wang:
DRL: Dynamic rebalance learning for adversarial robustness of UAV with long-tailed distribution. 14-23
- Xianjing Wu, Shengjie Zhao

, Hao Deng:
Joint task assignment and resource allocation in VFC based on mobility prediction information. 24-34
- Yifei Zou

, Haofei Yin
, Yanwei Zheng, Falko Dressler:
Multi-agent reinforcement learning enabled link scheduling for next generation Internet of Things. 35-44
- Saira Bano

, Nicola Tonellotto, Pietro Cassarà
, Alberto Gotta
:
Artificial intelligence of things at the edge: Scalable and efficient distributed learning for massive scenarios. 45-57
- Xianbin Xu

, Yajun Guo, Yimin Guo:
Fog-enabled private blockchain-based identity authentication scheme for smart home. 58-68
- Rui Zhang, Xiaojie Li, Yifan Zhuo, Kezhong Liu, Xian Zhong

, Shaohua Wan
:
Generating live commentary for marine traffic scenarios based on multi-model learning. 69-78
- Tao Wang, Li Kang, Jiang Duan:

A secure access control scheme with batch verification for VANETs. 79-86
- Constantine Ayimba

, Valerio Cislaghi, Christian Quadri
, Paolo Casari
, Vincenzo Mancuso
:
Copy-CAV: V2X-enabled wireless towing for emergency transport. 87-96
- Ahmet-Serdar Karakaya

, Ioan-Alexandru Stef, Konstantin Köhler, Julian Heinovski, Falko Dressler, David Bermbach:
Achieving realistic cyclist behavior in SUMO using the SimRa dataset. 97-107
- Yanxia Gong

, Xianxian Li, Li-e Wang
:
FedMBC: Personalized federated learning via mutually beneficial collaboration. 108-117
- Fan Zhao, Changgen Peng, Dequan Xu, Yicen Liu, Kun Niu, Hanlin Tang:

Attribute-based multi-user collaborative searchable encryption in COVID-19. 118-126
- Achyut Shankar, Carsten Maple:

Securing the Internet of Things-enabled smart city infrastructure using a hybrid framework. 127-135
- Tao Zhang

, Bingyu Li, Yan Zhu, Tianxu Han, Qianhong Wu:
Covert channels in blockchain and blockchain based covert communication: Overview, state-of-the-art, and future directions. 136-146
- Anand Kumar, Karan Singh, Mohd Shariq

, Chhagan Lal, Mauro Conti
, Ruhul Amin
, Shehzad Ashraf Chaudhry
:
An efficient and reliable ultralightweight RFID authentication scheme for healthcare systems. 147-157
- Abdulaziz Aldaej

, Mohammed Atiquzzaman, Tariq Ahamed Ahanger, Piyush Kumar Shukla:
Multidomain blockchain-based intelligent routing in UAV-IoT networks. 158-169
- Keyan Ren

, Shuai Yuan
, Chun Zhang, Yu Shi, Zhiqing Huang:
CANET: A hierarchical CNN-Attention model for Network Intrusion Detection. 170-181

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














