


default search action
Computer Communications, Volume 173
Volume 173, May 2021
- Jung-Han Han
, Seung-Jae Han:
Hidden terminal-aware access point selection for IEEE 802.11ah networks. 1-13
- Xiaolu Han, Yun Liu, Zhenjiang Zhang, Xin Lü, Yang Li:
Sparse auto-encoder combined with kernel for network attack detection. 14-20 - Xuemei You, Yinghong Ma
, Zhiyuan Liu, Jiacheng Liu, Mingming Zhang:
Representation method of cooperative social network features based on Node2Vec model. 21-26
- Jinhong Zhang
, Xingwei Wang, Qiang He, Min Huang:
TEAP: Traffic Engineering and ALR policy based Power-aware solutions for green routing and planning problems in backbone networks. 27-44
- Qi Jiang
, Xin Zhang, Ning Zhang
, Youliang Tian, Xindi Ma, Jianfeng Ma:
Three-factor authentication protocol using physical unclonable function for IoV. 45-55
- Ning Sun, Xingjie Wang, Guangjie Han, Yan Peng, Jinfang Jiang:
Collision-free and low delay MAC protocol based on multi-level quorum system in underwater wireless sensor networks. 56-69
- Lihua Yin, Jiyuan Feng
, Sixin Lin, Zhiqiang Cao, Zhe Sun
:
A blockchain-based collaborative training method for multi-party data sharing. 70-78
- Shiva Rahimipour
, Mehdi Ghatee, S. Mehdi Hashemi, Ahmad Nickabadi:
A hybrid of neuro-fuzzy inference system and hidden Markov Model for activity-based mobility modeling of cellphone users. 79-94
- Peiyuan Sun, Qiben Yan, Haoyi Zhou
, Jianxin Li:
Osprey: A fast and accurate patch presence test framework for binaries. 95-106
- Yang Li, Tianying Liu, Jianming Zhu, Xiuli Wang, Meijiao Duan
, Youwei Wang:
Comprehensive study of schedulability tests and optimal design for rate-monotonic scheduling. 107-119
- Ibrahim A. Nemer
, Tarek R. Sheltami, Ansar-Ul-Haque Yasar
:
A Survivable Communication Game based Approach for a network of cooperative UAVs. 120-133
- Mohamad Khattar Awad
, Mohammed W. Baidas
, Ahmad El-Amine:
Resource allocation for downlink non-orthogonal multiple access in joint transmission coordinated multi-point networks. 134-149 - Keming Mao, Gautam Srivastava
, Reza M. Parizi, Mohammad S. Khan
:
Multi-source fusion for weak target images in the Industrial Internet of Things. 150-159
- Shaoqing Liu, Zhenshan Ji, Yong Wang, Zuchao Zhang, Zhanghou Xu, Chaohao Kan, Ke Jin:
Multi-feature fusion for fault diagnosis of rotating machinery based on convolutional neural network. 160-169
- Modhawi Alotaibi, Amiya Nayak
:
Linking handover delay to load balancing in SDN-based heterogeneous networks. 170-182
- Xianwei Li, Liang Zhao
, Keping Yu
, Moayad Aloqaily
, Yaser Jararweh:
A cooperative resource allocation model for IoT applications in mobile edge computing. 183-191
- Mahawaga Arachchige Pathum Chamikara
, Peter Bertók, Ibrahim Khalil
, Dongxi Liu, Seyit Camtepe
:
PPaaS: Privacy Preservation as a Service. 192-205 - Wen Zhou, Xiang-min Kong
, Kai-li Li, Xiao-ming Li, Lin-lin Ren, Yong Yan, Yun Sha, Xueying Cao, Xue-jun Liu
:
Attack sample generation algorithm based on data association group by GAN in industrial control dataset. 206-213 - Yang Gao, Neng Chang, Kai Shang:
Multi-layer and multi-order fine-grained feature learning for artwork attribute recognition. 214-219

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.