| Privacy-Aware Multidimensional Mobile Service Quality Prediction and Recommendation in Distributed Fog Environment |
58 |
| An Enhanced PEGASIS Algorithm with Mobile Sink Support for Wireless Sensor Networks |
43 |
| Underwater Wireless Sensor Networks: A Review of Recent Issues and Challenges |
21 |
| Prolonging the Lifetime of Wireless Sensor Networks: A Review of Current Techniques |
18 |
| A Novel Real-Time Image Restoration Algorithm in Edge Computing |
15 |
| A Survey on Vehicular Edge Computing: Architecture, Applications, Technical Issues, and Future Directions |
14 |
| Workflow Scheduling Using Hybrid GA-PSO Algorithm in Cloud Computing |
14 |
| A Tutorial on Nonorthogonal Multiple Access for 5G and Beyond |
13 |
| Tendencies of Technologies and Platforms in Smart Cities: A State-of-the-Art Review |
12 |
| A Survey on Mobile Edge Computing: Focusing on Service Adoption and Provision |
11 |
| On the Use of LoRaWAN for Indoor Industrial IoT Applications |
11 |
| Fog Computing: An Overview of Big IoT Data Analytics |
10 |
| TDoA-Based Outdoor Positioning with Tracking Algorithm in a Public LoRa Network |
10 |
| Towards Secure Network Computing Services for Lightweight Clients Using Blockchain |
10 |
| Dynamic Resource Allocation for Load Balancing in Fog Environment |
10 |
| Re-ADP: Real-Time Data Aggregation with Adaptive omega-Event Differential Privacy for Fog Computing |
9 |
| Internet of Things for Healthcare Using Effects of Mobile Computing: A Systematic Literature Review |
9 |
| Sample Selected Extreme Learning Machine Based Intrusion Detection in Fog Computing and MEC |
9 |
| Web Phishing Detection Using a Deep Learning Framework |
9 |
| Multitask Allocation to Heterogeneous Participants in Mobile Crowd Sensing |
9 |
| Challenges of Future VANET and Cloud-Based Approaches |
8 |
| LoRa Performance under Variable Interference and Heavy-Multipath Conditions |
8 |
| Understanding the Influence of Wireless Communications and Wi-Fi Access on Customer Loyalty: A Behavioral Model System |
8 |
| Past Results, Present Trends, and Future Challenges in Intrabody Communication |
8 |
| Adaptive Energy Harvesting Relaying Protocol for Two-Way Half-Duplex System Network over Rician Fading Channels |
8 |
| Practical Aspects for the Integration of 5G Networks and IoT Applications in Smart Cities Environments |
7 |
| Towards Distributed Data Management in Fog Computing |
7 |
| HuAc: Human Activity Recognition Using Crowdsourced WiFi Signals and Skeleton Data |
7 |
| A Real-Time Patient Monitoring Framework for Fall Detection |
7 |
| Double-Head Clustering for Resilient VANETs |
6 |
| A Simulation-Based Approach of QoS-Aware Service Selection in Mobile Edge Computing |
6 |
| Network Traffic Prediction Based on Deep Belief Network and Spatiotemporal Compressive Sensing in Wireless Mesh Backbone Networks |
6 |
| Uplink Nonorthogonal Multiple Access Technologies Toward 5G: A Survey |
6 |
| A Double Adaptive Approach to Tackle Malicious Users in Cognitive Radio Networks |
6 |
| A Framework for Analyzing Fog-Cloud Computing Cooperation Applied to Information Processing of UAVs |
6 |
| An Adaptive MAC Protocol Based on IEEE802.15.6 for Wireless Body Area Networks |
6 |
| Network Protocols, Schemes, and Mechanisms for Internet of Things (IoT): Features, Open Challenges, and Trends |
6 |
| BaDS: Blockchain-Based Architecture for Data Sharing with ABS and CP-ABE in IoT |
5 |
| Shielding IoT against Cyber-Attacks: An Event-Based Approach Using SIEM |
5 |
| MU-MIMO Downlink Capacity Analysis and Optimum Code Weight Vector Design for 5G Big Data Massive Antenna Millimeter Wave Communication |
5 |
| MQTT Security: A Novel Fuzzing Approach |
5 |
| A Blockchain-Based Contractual Routing Protocol for the Internet of Things Using Smart Contracts |
5 |
| Predicting Wireless MmWave Massive MIMO Channel Characteristics Using Machine Learning Algorithms |
5 |
| A Task Scheduling Algorithm Based on Classification Mining in Fog Computing Environment |
5 |
| One-to-Many Relationship Based Kullback Leibler Divergence against Malicious Users in Cooperative Spectrum Sensing |
5 |
| Performance Evaluation of LoRaWAN Communication Scalability in Large-Scale Wireless Sensor Networks |
5 |
| An Efficient and Provably Secure Anonymous User Authentication and Key Agreement for Mobile Cloud Computing |
5 |
| Deploying a Reliable UAV-Aided Communication Service in Disaster Areas |
4 |
| A Stochastic Geometry Approach to Full-Duplex MIMO Relay Network |
4 |
| EE-MRP: Energy-Efficient Multistage Routing Protocol for Wireless Sensor Networks |
4 |