Pervasive and Mobile Computing

Papers
(The median citation count of Pervasive and Mobile Computing is 3. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-05-01 to 2025-05-01.)
ArticleCitations
AR Peephole Interface: Extending the workspace of a mobile device using real-space information72
Collective victim counting in post-disaster response: A distributed, power-efficient algorithm via BLE spontaneous networks65
Special Issue on IoT for Fighting COVID-1954
Editorial Board53
Context-aware privacy-preserving access control for mobile computing46
Distributed fault detection in sparse wireless sensor networks utilizing simultaneous likelihood ratio statistics39
Bio-inspired recruiting strategies for on-demand connectivity over multi-layer hybrid CubeSat-UAV networks in emergency scenarios34
Deep learning based speed bumps detection and characterization using smartphone sensors30
HED-FL: A hierarchical, energy efficient, and dynamic approach for edge Federated Learning28
What makes people install a COVID-19 contact-tracing app? Understanding the influence of app design and individual difference on contact-tracing app adoption intention26
IoT data encryption and phrase search-based efficient processing using a Fully Homomorphic-based SE (FHSE) scheme26
Spectrum cartography techniques, challenges, opportunities, and applications: A survey25
A novel self-healing model using precoding & big-data based approach for 5G networks25
RSS based multistage statistical method for attack detection and localization in IoT networks23
Hybrid and Adaptive Cryptographic-based secure authentication approach in IoT based applications using hybrid encryption23
A comprehensive investigation on range-free localization algorithms with mobile anchors at different altitudes23
Special Issue on IEEE WoWMoM 202123
Secure D2D caching framework inspired on trust management and blockchain for Mobile Edge Caching22
Passive Monitoring of Dangerous Driving Behaviors Using mmWave Radar21
A lightweight authentication protocol for D2D-enabled IoT systems with privacy21
Q-Learning Driven Routing for Aeronautical Ad-Hoc Networks21
A single smartwatch-based segmentation approach in human activity recognition20
A context-aware sensing strategy with deep reinforcement learning for smart healthcare20
ADAM-sense: Anxiety-displaying activities recognition by motion sensors20
Wireless power transfer with unmanned aerial vehicles: State of the art and open challenges19
FastPlan: A three-step framework for accelerating drone-centric search operations in post-disaster relief19
Editorial Board19
CIU-L: A class-incremental learning and machine unlearning passive sensing system for human identification19
An intelligent charging scheme maximizing the utility for rechargeable network in smart city18
Sustainable fixed wireless access with blockchain secured software defined network18
Continuous authentication through gait analysis on a wrist-worn device18
STAC: a spatio-temporal approximate method in data collection applications17
TrustMD — A multi-layer framework for domain, edge and D2D caching based on trust dissemination and blockchain17
LTE-LAA cell selection through operator data learning and numerosity reduction17
Probabilistic knowledge infusion through symbolic features for context-aware activity recognition17
Online policies for throughput maximization of backscatter assisted wireless powered communication via reinforcement learning approaches17
bioMCS 2.0: A distributed, energy-aware fog-based framework for data forwarding in mobile crowdsensing16
Content-centric data and computation offloading in AI-supported fog networks for next generation IoT16
Editorial Board15
Editorial Board15
Editorial Board15
Evaluation and comparison of federated learning algorithms for Human Activity Recognition on smartphones15
Blockchain-Inspired Trust Management in Cognitive Radio Networks with Cooperative Spectrum Sensing15
MotionID: Towards practical behavioral biometrics-based implicit user authentication on smartphones15
Enhancing crowdsourcing through skill and willingness-aligned task assignment with workforce composition balance15
Consent-driven Data Reuse in Multi-tasking Crowdsensing Systems: A Privacy-by-Design Solution15
Blockchain-based access control architecture for multi-domain environments15
Balancing local vs. remote state allocation for micro-services in the cloud–edge continuum14
Enhancing 5G network slicing for IoT traffic with a novel clustering framework14
Editorial Board14
IEEE International Conference on Pervasive Computing and Communications (PerCom) 202013
Editorial Board13
GTDIM: Grid-based Two-stage Dynamic Incentive Mechanism for Mobile Crowd Sensing13
Design, code generation and simulation of IoT environments with mobility devices by using model-driven development: SimulateIoT-Mobile13
Green Bear - A LoRaWAN-based Human-in-the-Loop case-study for sustainable cities12
DA-HAR: Dual adversarial network for environment-independent WiFi human activity recognition12
ContrasGAN: Unsupervised domain adaptation in Human Activity Recognition via adversarial and contrastive learning12
Secure and efficient blockchain-based consensus scheme for MWSNs with clustered architecture12
F-BIDS: Federated-Blending based Intrusion Detection System12
Predicting clinically relevant changes in bipolar disorder outside the clinic walls based on pervasive technology interactions via smartphone typing dynamics12
BmmW: A DNN-based joint BLE and mmWave radar system for accurate 3D localization with goal-oriented communication11
SMARTCOPE: Smartphone Change Of Possession Evaluation for continuous authentication11
PPSS: A privacy-preserving secure framework using blockchain-enabled federated deep learning for Industrial IoTs11
Porting deep neural networks on the edge via dynamic K-means compression: A case study of plant disease detection11
Energy and task completion time trade-off for task offloading in fog-enabled IoT networks11
A Transfer Learning and Explainable Solution to Detect mpox from Smartphones images11
Mining Wi-Fi Channel State Information for breathing and heart rate classification10
Digital twin oriented architecture for secure and QoS aware intelligent communications in industrial environments10
TR-ReFloc: A TR-based Framework for Recovering Missed RSS for WiFi indoor positioning in the offline and online phase10
Online continual learning for human activity recognition10
Qos-aware mobile service optimization in multi-access mobile edge computing environments10
BLUFADER: Blurred face detection & recognition for privacy-friendly continuous authentication10
Guest editorial for the PMC special section on selected papers from ICDCN 20209
Editorial Board9
Climate smart computing: A perspective9
Role of IoT technologies in big data management systems: A review and Smart Grid case study9
Editorial9
A neighbor discovery protocol with adaptive collision alleviation for wireless robotic networks9
Prioritization-based delay sensitive task offloading in SDN-integrated mobile IoT network9
CitySpec with shield: A secure intelligent assistant for requirement formalization9
Detecting structural anomalies of quadcopter UAVs based on LSTM autoencoder8
Editorial Board8
Efficient semidefinite solutions for TDOA-based source localization under unknown PS8
OcAPO: Fine-grained occupancy-aware, empirically-driven PDC control in open-plan, shared workspaces8
MGA-Net+: Acceleration-based packaging work recognition using motif-guided attention networks8
Editorial Board8
AI-driven autonomous vehicles as COVID-19 assessment centers: A novel crowdsensing-enabled strategy8
Feasibility and reliability of peercloud in vehicular networks: A comprehensive study8
Three-phased clustered topology formation for Aeronautical Ad-Hoc Networks8
GANCSA: A novel approach for finding the best path for migration of mobile-agents8
PSO based Amorphous algorithm to reduce localization error in Wireless Sensor Network7
LICAPA: Lightweight collective attestation for physical attacks detection in highly dynamic networks7
An artificial pancreas system in android phones: A dual app architecture7
Exploring the effects of below-freezing temperatures on smartphone usage7
MRILoc: Multiresolution Indoor Localization from crowdsourced samples7
Aggregate processes as distributed adaptive services for the Industrial Internet of Things7
Traffic count estimation using crowd-sourced trajectory data in the absence of dedicated infrastructure7
Editorial Board6
Editorial Board6
Digital Avatars: A programming framework for personalized human interactions through virtual profiles6
Fog-ROCL: A Fog based RSU Optimum Configuration and Localization in VANETs6
LwTool: A data processing toolkit for building a real-time pressure mapping smart textile software system6
A toolkit for localisation queries6
Machinery detection by impulsive noise recognition using WiFi sensing6
Energy-aware human activity recognition for wearable devices: A comprehensive review6
A puf-based three-party authentication key establishment scheme for fog-enabled smart home5
Special issue on Edge Computing in Pervasive Systems5
On the Scheduling of Conflictual Deliveries in a last-mile delivery scenario with truck-carried drones5
Analysis of micro- vs. macro-flows management in QKD-secured edge computing5
Editorial Board5
EPCM: Efficient privacy-preserving charging matching scheme with data integrity for electric vehicles5
A novel middleware for adaptive and efficient split computing for real-time object detection5
Editorial Board5
Min–max movement of barrier coverage with sink-based mobile sensors for crowdsensing5
A comprehensive systematic review on mobile applications to support dementia patients5
WiPass: 1D-CNN-based smartphone keystroke recognition Using WiFi signals5
An efficient estimator for source localization in WSNs using RSSD and TDOA measurements5
Tracking people across ultra populated indoor spaces by matching unreliable Wi-Fi signals with disconnected video feeds5
Trust-aware and improved density peaks clustering algorithm for fast and secure models in wireless sensor networks5
Reinforcement learning for autonomous vehicle movements in wireless multimedia applications5
Lightweight accurate trigger to reduce power consumption in sensor-based continuous human activity recognition5
Editorial Board5
MousePath: Lightweight phone-to-web information sharing via mouse interface4
Health and sleep nursing assistant for real-time, contactless, and non-invasive monitoring4
“I still need my privacy”: Exploring the level of comfort and privacy preferences of German-speaking older adults in the case of mobile assistant robots4
FogLBS: Utilizing fog computing for providing mobile Location-Based Services to mobile customers4
FaaS execution models for edge applications4
A framework for offloading and migration of serverless functions in the Edge–Cloud Continuum4
On data minimization and anonymity in pervasive mobile-to-mobile recommender systems4
Editorial Board4
Happiness recognition from smartphone usage data considering users’ estimated personality traits4
Security protocol for securing notifications about dangerous events in the agglomeration4
Energy–Aware security protocol for IoT devices4
A survey of wearable devices to capture human factors for human-robot collaboration4
CrowdLBM: A lightweight blockchain-based model for mobile crowdsensing in the Internet of Things4
SEEK+: Securing vehicle GPS via a sequential dashcam-based vehicle localization framework4
Editorial Board4
Behavioural patterns discovery for lifestyle analysis from egocentric photo-streams4
Using mobile devices as scientific measurement instruments: Reliable android task scheduling4
Design and evaluation of a fog platform supporting device mobility through container migration4
Long-term traffic flow prediction using multivariate SSA forecasting in SDN based networks4
Continual learning in sensor-based human activity recognition with dynamic mixture of experts4
VCFL: A verifiable and collusion attack resistant privacy preserving framework for cross-silo federated learning4
Hybrid metaheuristic algorithm for optimal cluster head selection in wireless sensor network4
Sensor-based agitation prediction in institutionalized people with dementia A systematic review4
Editorial Board4
On producing energy-efficient and contrast-enhanced images for OLED-based mobile devices4
Towards efficient device-to-device multicast content delivery with social awareness4
Blockchain-enhanced efficient and anonymous certificateless signature scheme and its application3
A New Lightweight Routing Protocol for Internet of Mobile Things Based on Low Power and Lossy Network Using a Fuzzy-Logic Method3
Dense Indoor Sensor Networks: Towards passively sensing human presence with LoRaWAN3
Studying users’ perception of IoT mobile companion apps3
Towards a better indoor positioning system: A location estimation process using artificial neural networks based on a semi-interpolated database3
Passive infrared sensor dataset and deep learning models for device-free indoor localization and tracking3
Investment-driven budget allocation and dynamic pricing strategies in edge cache network3
SmartSPEC: A framework to generate customizable, semantics-based smart space datasets3
Reinforcement learning-based load balancing for heavy traffic Internet of Things3
Editorial Board3
Navigating transient content: PFC caching approach for NDN-based IoT networks3
Privacy invasion via smart-home hub in personal area networks3
A novel IoT trust model leveraging fully distributed behavioral fingerprinting and secure delegation3
Context-driven encrypted multimedia traffic classification on mobile devices3
Multi-workflow scheduling and resource provisioning in Mobile Edge Computing using opposition-based Marine-Predator Algorithm3
Computation and communication efficient approach for federated learning based urban sensing applications against inference attacks3
WiCAR: A class-incremental system for WiFi activity recognition3
SmAuto: A domain-specific-language for application development in smart environments3
Empirical evaluation of nodes and channels of the lightning network3
Contrastive-representation IMU-based fitness activity recognition enhanced by bio-impedance sensing3
Detecting Byzantine attacks in Cognitive Radio Networks : A two-layered approach using Hidden Markov Model and machine learning3
Perses: A framework for the continuous evaluation of the QoS of distributed mobile applications3
0.054471015930176