Pervasive and Mobile Computing

Papers
(The median citation count of Pervasive and Mobile Computing is 3. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-11-01 to 2024-11-01.)
ArticleCitations
Merged glowworm swarm with ant colony optimization for energy efficient clustering and routing in Wireless Sensor Network63
Hybrid metaheuristic algorithm for optimal cluster head selection in wireless sensor network61
What makes people install a COVID-19 contact-tracing app? Understanding the influence of app design and individual difference on contact-tracing app adoption intention61
Energy and task completion time trade-off for task offloading in fog-enabled IoT networks45
A blockchain-based trust management method for Internet of Things38
ProDroid — An Android malware detection framework based on profile hidden Markov model38
Wavelet transform analytics for RF-based UAV detection and identification system using machine learning38
PoEWAL: A lightweight consensus mechanism for blockchain in IoT35
Is blockchain for Internet of Medical Things a panacea for COVID-19 pandemic?35
Mood ratings and digital biomarkers from smartphone and wearable data differentiates and predicts depression status: A longitudinal data analysis32
Device-independent cellular-based indoor location tracking using deep learning25
Accurate indoor positioning using IEEE 802.11mc round trip time25
When phones get personal: Predicting Big Five personality traits from application usage23
Optimal edge server deployment and allocation strategy in 5G ultra-dense networking environments22
Power consumption analysis of access network in 5G mobile communication infrastructures — An analytical quantification model21
Relevant node discovery and selection approach for the Internet of Things based on neural networks and ant colony optimization21
Intelligent decision-making in Smart Food Industry: Quality perspective20
PPSS: A privacy-preserving secure framework using blockchain-enabled federated deep learning for Industrial IoTs19
A lightweight authentication protocol for D2D-enabled IoT systems with privacy19
Efficient biometric-based identity management on the Blockchain for smart industrial applications19
HED-FL: A hierarchical, energy efficient, and dynamic approach for edge Federated Learning18
ContrasGAN: Unsupervised domain adaptation in Human Activity Recognition via adversarial and contrastive learning18
AI-driven autonomous vehicles as COVID-19 assessment centers: A novel crowdsensing-enabled strategy18
Empirical evaluation of nodes and channels of the lightning network18
Distributed algorithms based on proximity for self-organizing fog computing systems17
EMPC: Energy-Minimization Path Construction for data collection and wireless charging in WRSN17
SPIDERS+: A light-weight, wireless, and low-cost glasses-based wearab16
Towards a better indoor positioning system: A location estimation process using artificial neural networks based on a semi-interpolated database16
Health and sleep nursing assistant for real-time, contactless, and non-invasive monitoring16
A survey on privacy issues and solutions for Voice-controlled Digital Assistants16
NeoWear: An IoT-connected e-textile wearable for neonatal medical monitoring16
DF-WiSLR: Device-Free Wi-Fi-based Sign Language Recognition15
Joint radio and local resources optimization for tasks offloading with priority in a Mobile Edge Computing network15
DeepMTL Pro: Deep Learning Based Multiple Transmitter Localization and Power Estimation15
Predicting clinically relevant changes in bipolar disorder outside the clinic walls based on pervasive technology interactions via smartphone typing dynamics15
Feature selection for proximity estimation in COVID-19 contact tracing apps based on Bluetooth Low Energy (BLE)15
Application level performance evaluation of wearable devices for stress classification with explainable AI14
DeCoach: Deep Learning-based Coaching for Badminton Player Assessment14
An efficient dynamic decision-based task optimization and scheduling approach for microservice-based cost management in mobile cloud computing applications14
Spectrum cartography techniques, challenges, opportunities, and applications: A survey14
F-BIDS: Federated-Blending based Intrusion Detection System14
A holistic approach to a context-aware IoT ecosystem with Adaptive Ubiquitous Middleware14
On producing energy-efficient and contrast-enhanced images for OLED-based mobile devices13
HCALA: Hyperelliptic curve-based anonymous lightweight authentication scheme for Internet of Drones13
ECCbAS: An ECC based authentication scheme for healthcare IoT systems13
An indoor localization dataset and data collection framework with high precision position annotation13
Multi-density urban hotspots detection in smart cities: A data-driven approach and experiments12
FaaS execution models for edge applications12
WiPass: 1D-CNN-based smartphone keystroke recognition Using WiFi signals12
A survey on solutions to support developers in privacy-preserving IoT development12
ADAM-sense: Anxiety-displaying activities recognition by motion sensors12
On the Scheduling of Conflictual Deliveries in a last-mile delivery scenario with truck-carried drones12
Three-phased clustered topology formation for Aeronautical Ad-Hoc Networks12
GEESE: Edge computing enabled by UAVs12
An energy-efficient adaptive beaconing rate management for pedestrian safety: A fuzzy logic-based approach11
Wireless power transfer with unmanned aerial vehicles: State of the art and open challenges11
Privacy Preserving Biometric Authentication on the blockchain for smart healthcare11
SnapAppy: A positive psychology intervention using smartphone photography to improve emotional well-being11
EDCRA-IoT: Edge-based Data Conflict Resolution Approach for Internet of Things11
A priority-aware lightweight secure sensing model for body area networks with clinical healthcare applications in Internet of Things11
Sleep posture recognition based on machine learning: A systematic review11
A lightweight distributed detection algorithm for DDAO attack on RPL routing protocol in Internet of Things11
A novel self-healing model using precoding & big-data based approach for 5G networks11
Server-side QUIC connection migration to support microservice deployment at the edge10
Design and evaluation of a fog platform supporting device mobility through container migration10
Porting deep neural networks on the edge via dynamic K-means compression: A case study of plant disease detection10
Passive infrared sensor dataset and deep learning models for device-free indoor localization and tracking10
A novel congestion propagation modeling algorithm for smart cities10
Aggregate processes as distributed adaptive services for the Industrial Internet of Things10
Towards the detection of driver–pedestrian eye contact10
Assessing the impact of unbalanced resources and communications in edge computing9
Bandwidth-constrained task throughput maximization in IoT-enabled 5G networks9
“I still need my privacy”: Exploring the level of comfort and privacy preferences of German-speaking older adults in the case of mobile assistant robots9
Reconciling the what, when and how of privacy notifications in fitness tracking scenarios9
Digital twin oriented architecture for secure and QoS aware intelligent communications in industrial environments9
Federated Clustering and Semi-Supervised learning: A new partnership for personalized Human Activity Recognition8
Evaluation and comparison of federated learning algorithms for Human Activity Recognition on smartphones8
A comprehensive investigation on range-free localization algorithms with mobile anchors at different altitudes8
Multi-task learning neural networks for breath sound detection and classification in pervasive healthcare8
Detecting Byzantine attacks in Cognitive Radio Networks : A two-layered approach using Hidden Markov Model and machine learning8
Memory-aware and context-aware multi-DNN inference on the edge8
Are you talking to me? An Audio Augmented Reality conversational guide for cultural heritage8
A fault tolerant optimal relay node selection algorithm for Wireless Sensor Networks using modified PSO8
STAC: a spatio-temporal approximate method in data collection applications8
Using mobile devices as scientific measurement instruments: Reliable android task scheduling8
edgeTrans - Edge transport mode detection8
Continuous authentication through gait analysis on a wrist-worn device7
Online machine learning for auto-scaling in the edge computing7
A holistic approach to power efficiency in a clock offset based Intrusion Detection Systems for Controller Area Networks7
Spatio-temporal AI inference engine for estimating hard disk reliability7
Transfer learning for the efficient detection of COVID-19 from smartphone audio data7
Long-term traffic flow prediction using multivariate SSA forecasting in SDN based networks7
PF-EdgeCache: Popularity and freshness aware edge caching scheme for NDN/IoT networks7
Edge-to-cloud sensing and actuation semantics in the industrial Internet of Things6
bioMCS 2.0: A distributed, energy-aware fog-based framework for data forwarding in mobile crowdsensing6
TOTP Moving Target Defense for sensitive network services6
The trade-offs between Fog Processing and Communications in latency-sensitive Vehicular Fog Computing6
Multi-workflow scheduling and resource provisioning in Mobile Edge Computing using opposition-based Marine-Predator Algorithm6
Dense Indoor Sensor Networks: Towards passively sensing human presence with LoRaWAN6
App usage on-the-move: Context- and commute-aware next app prediction6
Hybrid and Adaptive Cryptographic-based secure authentication approach in IoT based applications using hybrid encryption6
Perses: A framework for the continuous evaluation of the QoS of distributed mobile applications6
CrowdLBM: A lightweight blockchain-based model for mobile crowdsensing in the Internet of Things6
Human activity recognition via wearable devices using enhanced ternary weight convolutional neural network6
Secure D2D caching framework inspired on trust management and blockchain for Mobile Edge Caching6
Online policies for throughput maximization of backscatter assisted wireless powered communication via reinforcement learning approaches5
Role of IoT technologies in big data management systems: A review and Smart Grid case study5
Identifying users from the interaction with a door handle5
CycleSense: Detecting near miss incidents in bicycle traffic from mobile motion sensors5
Green Bear - A LoRaWAN-based Human-in-the-Loop case-study for sustainable cities5
Content-centric data and computation offloading in AI-supported fog networks for next generation IoT5
An intelligent charging scheme maximizing the utility for rechargeable network in smart city5
A low-cost communication security scheme of UAV based on multi-round reverse auction model5
A puf-based three-party authentication key establishment scheme for fog-enabled smart home5
A novel IoT trust model leveraging fully distributed behavioral fingerprinting and secure delegation5
Hybrid machine learning model for malware analysis in android apps5
A genetic programming approach to WiFi fingerprint meta-distance learning5
LTE-LAA cell selection through operator data learning and numerosity reduction5
Energy–Aware security protocol for IoT devices5
A comprehensive systematic review on mobile applications to support dementia patients5
LwTool: A data processing toolkit for building a real-time pressure mapping smart textile software system5
Future indoor network with a sixth sense: Requirements, challenges and enabling technologies5
Design, code generation and simulation of IoT environments with mobility devices by using model-driven development: SimulateIoT-Mobile4
Exploring the effects of below-freezing temperatures on smartphone usage4
A context-aware sensing strategy with deep reinforcement learning for smart healthcare4
Secure and efficient blockchain-based consensus scheme for MWSNs with clustered architecture4
Context-aware privacy-preserving access control for mobile computing4
Balancing local vs. remote state allocation for micro-services in the cloud–edge continuum4
CoAN: A system framework correlating the air and noise pollution sensor data4
A single smartwatch-based segmentation approach in human activity recognition4
Lightweight accurate trigger to reduce power consumption in sensor-based continuous human activity recognition4
Modeling and performance analysis of smart map application in the Multi-access Edge Computing paradigm4
Automated construction of Wi-Fi-based indoor logical location predictor using crowd-sourced photos with Wi-Fi signals4
Detecting structural anomalies of quadcopter UAVs based on LSTM autoencoder4
Privacy preservation for spatio-temporal data in Mobile Crowdsensing scenarios4
W8-Scope: Fine-grained, practical monitoring of weight stack-based exercises4
Efficient semidefinite solutions for TDOA-based source localization under unknown PS3
B2auth: A contextual fine-grained behavioral biometric authentication framework for real-world deployment3
VibeRing: Using vibrations from a smart ring as an out-of-band channel for sharing secret keys3
Physical activity forecasting with time series data using Android smartphone3
CrowdWaterSens: An uncertainty-aware crowdsensing approach to groundwater contamination estimation3
A fog-assisted system to defend against Sybils in vehicular crowdsourcing3
Transposition of Location-based Games: Using Procedural Content Generation to deploy balanced game maps to multiple locations3
Happiness recognition from smartphone usage data considering users’ estimated personality traits3
Qos-aware mobile service optimization in multi-access mobile edge computing environments3
Traffic aware dynamic load distribution in the Data Plane of SDN using Genetic Algorithm: A case study on NSF network3
SmartSPEC: A framework to generate customizable, semantics-based smart space datasets3
Full-duplex routing with low-complexity sequential-decision for throughput enhancement in dynamic access networks3
Blockchain-based access control architecture for multi-domain environments3
Privacy-preserving pedestrian tracking with path image inpainting and 3D point cloud features3
ARMAND: Anti-Repackaging through Multi-pattern Anti-tampering based on Native Detection3
Q-Learning Driven Routing for Aeronautical Ad-Hoc Networks3
Transferrable contextual feature clusters for parking occupancy prediction3
The geodesic mutual visibility problem: Oblivious robots on grids and trees3
SMARTCOPE: Smartphone Change Of Possession Evaluation for continuous authentication3
Efficient concept drift handling for batch android malware detection models3
Deadline-aware multi-objective IoT services placement optimization in fog environment using parallel FFD-genetic algorithm3
Online charging coordination of electric vehicles to optimize cost and smoothness3
MobIntel: Sensing and analytics infrastructure for urban mobility intelligence3
0.061144828796387