Pervasive and Mobile Computing

Papers
(The TQCC of Pervasive and Mobile Computing is 7. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-02-01 to 2025-02-01.)
ArticleCitations
Vspp: Verifiable, shareable, and privacy-preserving access control scheme for IoV64
The trade-offs between Fog Processing and Communications in latency-sensitive Vehicular Fog Computing61
Advancing user-space networking for DDS message-oriented middleware: Further extensions61
PPSS: A privacy-preserving secure framework using blockchain-enabled federated deep learning for Industrial IoTs45
Editorial Board45
Special Issue on IoT for Fighting COVID-1938
Editorial Board38
Multi-level feature driven storage management of surveillance videos37
DA-HAR: Dual adversarial network for environment-independent WiFi human activity recognition35
Deep learning based speed bumps detection and characterization using smartphone sensors29
Editorial Board27
Editorial Board22
Dynamic Partitioning and Popularity based Caching for Optimized Performance in content-centric fog networks: DPPCOP22
Min–max movement of barrier coverage with sink-based mobile sensors for crowdsensing20
CycleSense: Detecting near miss incidents in bicycle traffic from mobile motion sensors19
Full-duplex routing with low-complexity sequential-decision for throughput enhancement in dynamic access networks19
AR Peephole Interface: Extending the workspace of a mobile device using real-space information19
Physical activity forecasting with time series data using Android smartphone18
Special issue on Edge Computing in Pervasive Systems18
Chirp-Loc: Multi-factor authentication via acoustically-generated location signatures18
Editorial Board18
Editorial for this SI on “Location Based Services and Applications in the era of Internet of Things”18
Editorial Board17
NeoWear: An IoT-connected e-textile wearable for neonatal medical monitoring16
VibeRing: Using vibrations from a smart ring as an out-of-band channel for sharing secret keys16
Secure and efficient blockchain-based consensus scheme for MWSNs with clustered architecture16
SmartSPEC: A framework to generate customizable, semantics-based smart space datasets16
ProDroid — An Android malware detection framework based on profile hidden Markov model16
Are you talking to me? An Audio Augmented Reality conversational guide for cultural heritage16
A Transfer Learning and Explainable Solution to Detect mpox from Smartphones images15
W8-Scope: Fine-grained, practical monitoring of weight stack-based exercises15
Porting deep neural networks on the edge via dynamic K-means compression: A case study of plant disease detection15
IoT data encryption and phrase search-based efficient processing using a Fully Homomorphic-based SE (FHSE) scheme15
A comprehensive systematic review on mobile applications to support dementia patients15
Efficient biometric-based identity management on the Blockchain for smart industrial applications14
What makes people install a COVID-19 contact-tracing app? Understanding the influence of app design and individual difference on contact-tracing app adoption intention14
Online machine learning for auto-scaling in the edge computing14
Editorial Board14
Intelligent decision-making in Smart Food Industry: Quality perspective14
An efficient estimator for source localization in WSNs using RSSD and TDOA measurements13
Editorial Board13
Feature selection for proximity estimation in COVID-19 contact tracing apps based on Bluetooth Low Energy (BLE)13
Analysis of micro- vs. macro-flows management in QKD-secured edge computing13
Joint radio and local resources optimization for tasks offloading with priority in a Mobile Edge Computing network12
WiPass: 1D-CNN-based smartphone keystroke recognition Using WiFi signals12
Reinforcement learning for autonomous vehicle movements in wireless multimedia applications12
SMARTCOPE: Smartphone Change Of Possession Evaluation for continuous authentication12
Power consumption analysis of access network in 5G mobile communication infrastructures — An analytical quantification model12
Context-aware privacy-preserving access control for mobile computing12
Lightweight accurate trigger to reduce power consumption in sensor-based continuous human activity recognition12
Towards the detection of driver–pedestrian eye contact12
Editorial Board11
Collective victim counting in post-disaster response: A distributed, power-efficient algorithm via BLE spontaneous networks11
Privacy Preserving Biometric Authentication on the blockchain for smart healthcare11
Multi-task learning neural networks for breath sound detection and classification in pervasive healthcare11
Can smartphones serve as an instrument for driver behavior of intelligent transportation systems research? A systematic review: Challenges, motivations, and recommendations11
HED-FL: A hierarchical, energy efficient, and dynamic approach for edge Federated Learning11
Service placement strategies in mobile edge computing based on an improved genetic algorithm11
Defending dominant cooperative probabilistic attack in CRNs by JS-divergence-based improved reputation algorithm10
Reliable and adaptive computation offload strategy with load and cost coordination for edge computing10
A puf-based three-party authentication key establishment scheme for fog-enabled smart home10
Federated learning energy saving through client selection10
Accelerating the neural network controller embedded implementation on FPGA with novel dropout techniques for a solar inverter10
A novel congestion propagation modeling algorithm for smart cities10
Mining Wi-Fi Channel State Information for breathing and heart rate classification10
Unobstrusive smartphone-based oxygen saturation measurement using a Meta-Region of interest9
A provably secure and practical end-to-end authentication scheme for tactile Industrial Internet of Things9
Health and sleep nursing assistant for real-time, contactless, and non-invasive monitoring9
An evaluation of heart rate monitoring with in-ear microphones under motion9
RSS based multistage statistical method for attack detection and localization in IoT networks8
Tracking people across ultra populated indoor spaces by matching unreliable Wi-Fi signals with disconnected video feeds8
IWFUCIA: An integrated model for Wi-Fi fingerprints radio map updating and localization on changed impact analysis8
Privacy preservation for spatio-temporal data in Mobile Crowdsensing scenarios8
A comprehensive investigation on range-free localization algorithms with mobile anchors at different altitudes8
Inferring in-air gestures in complex indoor environment with less supervision8
TR-ReFloc: A TR-based Framework for Recovering Missed RSS for WiFi indoor positioning in the offline and online phase8
Secure D2D caching framework inspired on trust management and blockchain for Mobile Edge Caching8
Editorial Board8
Online continual learning for human activity recognition8
Hush now! Context factors behind smartphone ringer mode changes7
Special Issue on IEEE WoWMoM 20217
Spectrum cartography techniques, challenges, opportunities, and applications: A survey7
Traffic aware dynamic load distribution in the Data Plane of SDN using Genetic Algorithm: A case study on NSF network7
Quantifying worker interactions and characterizing worker performance through ubiquitous IoT7
Design and evaluation of a fog platform supporting device mobility through container migration7
0.081984043121338