Issue Date | Title | Author(s) |
2020-02-15 | PGFIT: Static permission analysis of health and fitness apps in IoT programming frameworks | Nobakht, M; Sui, Y; Seneviratne, A; Hu, W |
2018-02-15 | DIPOR: An IDA-based dynamic proof of retrievability scheme for cloud storage systems | Fu, A; Li, Y; Yu, S; Yu, Y; Zhang, G |
2019-09-01 | Cache-Based Popular Services Pushing on High-Speed Train by Using Converged Broadcasting and Cellular Networks | Li, B; Xiong, J; Liu, B; Gui, L; Qiu, M; Shi, Z |
2021-03-01 | Plug-in over Plug-in Evaluation in Heterogeneous 5G Enabled Networks and beyond | Sood, K; Karmakar, KK; Varadharajen, V; Kumar, N; Xiang, Y; Yu, S |
2018-03-15 | Influence analysis in social networks: A survey | Peng, S; Zhou, Y; Cao, L; Yu, S; Niu, J; Jia, W |
2019-01-01 | A hybrid of fuzzy theory and quadratic function for estimating and refining transmission map | Jhang, JY; Lin, CJ; Young, KY; Lin, CT |
2021-01-01 | On-Demand Dynamic Controller Placement in Software Defined Satellite-Terrestrial Networking | Han, Z; Xu, C; Xiong, Z; Zhao, G; Yu, S |
2021 | Non-Line-of-Sight Localization of Passive UHF RFID Tags in Smart Storage Systems | Gui, L; Xu, S; Xiao, F; Shu, F; Yu, S |
2020-07-01 | Security, usability, and biometric authentication scheme for electronic voting using multiple keys | Ahmad, M; Rehman, AU; Ayub, N; Alshehri, MD; Khan, MA; Hameed, A; Yetgin, H |
2020-01-01 | Prediction optimization of diffusion paths in social networks using integration of ant colony and densest subgraph algorithms | Majbouri Yazdi, K; Majbouri Yazdi, A; Khodayi, S; Hou, J; Zhou, W; Saedy, S; Rostami, M |