


default search action
Computer Communications, Volume 205
Volume 205, May 2023
- Lorenzo Ghiro, Marco Cominelli
, Francesco Gringoli, Renato Lo Cigno
:
Wi-Fi Localization Obfuscation: An implementation in openwifi. 1-13
- Yancheng Sun, Yuling Chen, Peng Wu, Xuewei Wang, Qi Wang:
DRL: Dynamic rebalance learning for adversarial robustness of UAV with long-tailed distribution. 14-23
- Xianjing Wu, Shengjie Zhao
, Hao Deng:
Joint task assignment and resource allocation in VFC based on mobility prediction information. 24-34
- Yifei Zou
, Haofei Yin
, Yanwei Zheng, Falko Dressler:
Multi-agent reinforcement learning enabled link scheduling for next generation Internet of Things. 35-44
- Saira Bano
, Nicola Tonellotto, Pietro Cassarà
, Alberto Gotta
:
Artificial intelligence of things at the edge: Scalable and efficient distributed learning for massive scenarios. 45-57
- Xianbin Xu
, Yajun Guo, Yimin Guo:
Fog-enabled private blockchain-based identity authentication scheme for smart home. 58-68
- Rui Zhang, Xiaojie Li, Yifan Zhuo, Kezhong Liu, Xian Zhong
, Shaohua Wan
:
Generating live commentary for marine traffic scenarios based on multi-model learning. 69-78
- Tao Wang, Li Kang, Jiang Duan:
A secure access control scheme with batch verification for VANETs. 79-86
- Constantine Ayimba
, Valerio Cislaghi, Christian Quadri
, Paolo Casari
, Vincenzo Mancuso
:
Copy-CAV: V2X-enabled wireless towing for emergency transport. 87-96
- Ahmet-Serdar Karakaya
, Ioan-Alexandru Stef, Konstantin Köhler, Julian Heinovski, Falko Dressler, David Bermbach:
Achieving realistic cyclist behavior in SUMO using the SimRa dataset. 97-107
- Yanxia Gong
, Xianxian Li, Li-e Wang
:
FedMBC: Personalized federated learning via mutually beneficial collaboration. 108-117
- Fan Zhao, Changgen Peng, Dequan Xu, Yicen Liu, Kun Niu, Hanlin Tang:
Attribute-based multi-user collaborative searchable encryption in COVID-19. 118-126
- Achyut Shankar, Carsten Maple:
Securing the Internet of Things-enabled smart city infrastructure using a hybrid framework. 127-135
- Tao Zhang
, Bingyu Li, Yan Zhu, Tianxu Han, Qianhong Wu:
Covert channels in blockchain and blockchain based covert communication: Overview, state-of-the-art, and future directions. 136-146
- Anand Kumar, Karan Singh, Mohd Shariq
, Chhagan Lal, Mauro Conti
, Ruhul Amin
, Shehzad Ashraf Chaudhry
:
An efficient and reliable ultralightweight RFID authentication scheme for healthcare systems. 147-157
- Abdulaziz Aldaej
, Mohammed Atiquzzaman, Tariq Ahamed Ahanger, Piyush Kumar Shukla:
Multidomain blockchain-based intelligent routing in UAV-IoT networks. 158-169
- Keyan Ren
, Shuai Yuan
, Chun Zhang, Yu Shi, Zhiqing Huang:
CANET: A hierarchical CNN-Attention model for Network Intrusion Detection. 170-181

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
