


default search action
Computer Communications, Volume 162
Volume 162, October 2020
- Xinghan Wang, Xiaoxiong Zhong, Li Li, Sheng Zhang, Renhao Lu, Tingting Yang: 
 TOT: Trust aware opportunistic transmission in cognitive radio Social Internet of Things. 1-11
- Farhan Musanna, Sanjeev Kumar  : :
 Generating visually coherent encrypted images with reversible data hiding in wavelet domain by fusing chaos and pairing function. 12-30
- Omer Deperlioglu  , Utku Kose , Utku Kose , Deepak Gupta , Deepak Gupta , Ashish Khanna , Ashish Khanna , Arun Kumar Sangaiah , Arun Kumar Sangaiah : :
 Diagnosis of heart diseases by a secure Internet of Health Things system based on Autoencoder Deep Neural Network. 31-50
- Haiping Zhou, Shigen Shen  , Jianhua Liu , Jianhua Liu : :
 Malware propagation model in wireless sensor networks under attack-defense confrontation. 51-58
- Zizhao Wang, Wei Bao, Dong Yuan, Liming Ge, Nguyen Hoang Tran, Albert Y. Zomaya  : :
 Accelerating on-device DNN inference during service outage through scheduling early exit. 69-82
- Inès Hilali-Jaghdam, Anis Ben Ishak, Sayed Abdel-Khalek, Amani Tariq Jamal  : :
 Quantum and classical genetic algorithms for multilevel segmentation of medical images: A comparative study. 83-93
- Xidi Qu, Qin Hu, Shengling Wang: 
 Privacy-preserving model training architecture for intelligent edge computing. 94-101
- Bakkiam David Deebak, Fadi Al-Turjman  : :
 A smart lightweight privacy preservation scheme for IoT-based UAV communication systems. 102-117
- Viet-Hoang Tran, Olivier Bonaventure: 
 Beyond socket options: Towards fully extensible Linux transport stacks. 118-138
- Xiaotong Wu  , Mohammad Reza Khosravi, Lianyong Qi, Genlin Ji, Wanchun Dou, Xiaolong Xu: , Mohammad Reza Khosravi, Lianyong Qi, Genlin Ji, Wanchun Dou, Xiaolong Xu:
 Locally private frequency estimation of physical symptoms for infectious disease analysis in Internet of Medical Things. 139-151
- Abid Hussain, Muddesar Iqbal  , Sohail Sarwar , Sohail Sarwar , Muhammad Safyan, Zia Ul-Qayyum, Honghao Gao, Xinheng Wang , Muhammad Safyan, Zia Ul-Qayyum, Honghao Gao, Xinheng Wang : :
 Servicing delay sensitive pervasive communication through adaptable width channelization for supporting mobile edge computing. 152-159
- Ying Hu, Guang Cheng, Yongning Tang, Feng Wang  : :
 A practical design of hash functions for IPv6 using multi-objective genetic programming. 160-168
- Xiaoguang Liu, Ziqing Wang, Yalan Ye  , Fagen Li: , Fagen Li:
 An efficient and practical certificateless signcryption scheme for wireless body area networks. 169-178
- Wei Tong  , Xuewen Dong, Yulong Shen, Jiawei Zheng: , Xuewen Dong, Yulong Shen, Jiawei Zheng:
 BC-RAN: Cloud radio access network enabled by blockchain for 5G. 179-186
- Qi Liu  , Francis Mawuli Nakoty , Francis Mawuli Nakoty , Xueyan Wu, Raphael Anaadumba , Xueyan Wu, Raphael Anaadumba , Xiaodong Liu, Yonghong Zhang, Lianyong Qi: , Xiaodong Liu, Yonghong Zhang, Lianyong Qi:
 A secure edge monitoring approach to unsupervised energy disaggregation using mean shift algorithm in residential buildings. 187-195
- Cheng Xu, Ming Xu, Chanjuan Yin: 
 Optimized multi-UAV cooperative path planning under the complex confrontation environment. 196-203
- Xiang Chen: 
 A security integration model for private data of intelligent mobile communication based on edge computing. 204-211
- Abdullah Al-Noman Patwary, Anmin Fu  , Sudheer Kumar Battula , Sudheer Kumar Battula , Ranesh Kumar Naha , Ranesh Kumar Naha , Saurabh Garg , Saurabh Garg , Aniket Mahanti , Aniket Mahanti : :
 FogAuthChain: A secure location-based authentication scheme in fog computing environments using Blockchain. 212-224
- Wei Wei, Jinsong Wu, Chunsheng Zhu: 
 Special issue on wearable medical devices for healthcare measurements. 225-226
- S. Kalaivani, C. Tharini: 
 Corrigendum to "Analysis and implementation of novel Rice Golomb coding algorithm for wireless sensor networks" [Comput. Commun. 150 (2020) 463-471]. 227

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


 Google
Google Google Scholar
Google Scholar Semantic Scholar
Semantic Scholar Internet Archive Scholar
Internet Archive Scholar CiteSeerX
CiteSeerX ORCID
ORCID














