Pervasive and Mobile Computing

Papers
(The TQCC of Pervasive and Mobile Computing is 8. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-05-01 to 2025-05-01.)
ArticleCitations
AR Peephole Interface: Extending the workspace of a mobile device using real-space information72
Collective victim counting in post-disaster response: A distributed, power-efficient algorithm via BLE spontaneous networks65
Special Issue on IoT for Fighting COVID-1954
Editorial Board53
Context-aware privacy-preserving access control for mobile computing46
Distributed fault detection in sparse wireless sensor networks utilizing simultaneous likelihood ratio statistics39
Bio-inspired recruiting strategies for on-demand connectivity over multi-layer hybrid CubeSat-UAV networks in emergency scenarios34
Deep learning based speed bumps detection and characterization using smartphone sensors30
HED-FL: A hierarchical, energy efficient, and dynamic approach for edge Federated Learning28
IoT data encryption and phrase search-based efficient processing using a Fully Homomorphic-based SE (FHSE) scheme26
What makes people install a COVID-19 contact-tracing app? Understanding the influence of app design and individual difference on contact-tracing app adoption intention26
A novel self-healing model using precoding & big-data based approach for 5G networks25
Spectrum cartography techniques, challenges, opportunities, and applications: A survey25
RSS based multistage statistical method for attack detection and localization in IoT networks23
Hybrid and Adaptive Cryptographic-based secure authentication approach in IoT based applications using hybrid encryption23
A comprehensive investigation on range-free localization algorithms with mobile anchors at different altitudes23
Special Issue on IEEE WoWMoM 202123
Secure D2D caching framework inspired on trust management and blockchain for Mobile Edge Caching22
A lightweight authentication protocol for D2D-enabled IoT systems with privacy21
Q-Learning Driven Routing for Aeronautical Ad-Hoc Networks21
Passive Monitoring of Dangerous Driving Behaviors Using mmWave Radar21
A context-aware sensing strategy with deep reinforcement learning for smart healthcare20
ADAM-sense: Anxiety-displaying activities recognition by motion sensors20
A single smartwatch-based segmentation approach in human activity recognition20
FastPlan: A three-step framework for accelerating drone-centric search operations in post-disaster relief19
Editorial Board19
CIU-L: A class-incremental learning and machine unlearning passive sensing system for human identification19
Wireless power transfer with unmanned aerial vehicles: State of the art and open challenges19
Sustainable fixed wireless access with blockchain secured software defined network18
Continuous authentication through gait analysis on a wrist-worn device18
An intelligent charging scheme maximizing the utility for rechargeable network in smart city18
LTE-LAA cell selection through operator data learning and numerosity reduction17
Probabilistic knowledge infusion through symbolic features for context-aware activity recognition17
Online policies for throughput maximization of backscatter assisted wireless powered communication via reinforcement learning approaches17
STAC: a spatio-temporal approximate method in data collection applications17
TrustMD — A multi-layer framework for domain, edge and D2D caching based on trust dissemination and blockchain17
bioMCS 2.0: A distributed, energy-aware fog-based framework for data forwarding in mobile crowdsensing16
Content-centric data and computation offloading in AI-supported fog networks for next generation IoT16
Evaluation and comparison of federated learning algorithms for Human Activity Recognition on smartphones15
Blockchain-Inspired Trust Management in Cognitive Radio Networks with Cooperative Spectrum Sensing15
MotionID: Towards practical behavioral biometrics-based implicit user authentication on smartphones15
Enhancing crowdsourcing through skill and willingness-aligned task assignment with workforce composition balance15
Consent-driven Data Reuse in Multi-tasking Crowdsensing Systems: A Privacy-by-Design Solution15
Blockchain-based access control architecture for multi-domain environments15
Editorial Board15
Editorial Board15
Editorial Board15
Enhancing 5G network slicing for IoT traffic with a novel clustering framework14
Editorial Board14
Balancing local vs. remote state allocation for micro-services in the cloud–edge continuum14
Editorial Board13
GTDIM: Grid-based Two-stage Dynamic Incentive Mechanism for Mobile Crowd Sensing13
Design, code generation and simulation of IoT environments with mobility devices by using model-driven development: SimulateIoT-Mobile13
IEEE International Conference on Pervasive Computing and Communications (PerCom) 202013
ContrasGAN: Unsupervised domain adaptation in Human Activity Recognition via adversarial and contrastive learning12
Secure and efficient blockchain-based consensus scheme for MWSNs with clustered architecture12
F-BIDS: Federated-Blending based Intrusion Detection System12
Predicting clinically relevant changes in bipolar disorder outside the clinic walls based on pervasive technology interactions via smartphone typing dynamics12
Green Bear - A LoRaWAN-based Human-in-the-Loop case-study for sustainable cities12
DA-HAR: Dual adversarial network for environment-independent WiFi human activity recognition12
PPSS: A privacy-preserving secure framework using blockchain-enabled federated deep learning for Industrial IoTs11
Porting deep neural networks on the edge via dynamic K-means compression: A case study of plant disease detection11
Energy and task completion time trade-off for task offloading in fog-enabled IoT networks11
A Transfer Learning and Explainable Solution to Detect mpox from Smartphones images11
BmmW: A DNN-based joint BLE and mmWave radar system for accurate 3D localization with goal-oriented communication11
SMARTCOPE: Smartphone Change Of Possession Evaluation for continuous authentication11
TR-ReFloc: A TR-based Framework for Recovering Missed RSS for WiFi indoor positioning in the offline and online phase10
Online continual learning for human activity recognition10
Qos-aware mobile service optimization in multi-access mobile edge computing environments10
BLUFADER: Blurred face detection & recognition for privacy-friendly continuous authentication10
Mining Wi-Fi Channel State Information for breathing and heart rate classification10
Digital twin oriented architecture for secure and QoS aware intelligent communications in industrial environments10
Climate smart computing: A perspective9
Role of IoT technologies in big data management systems: A review and Smart Grid case study9
Editorial9
A neighbor discovery protocol with adaptive collision alleviation for wireless robotic networks9
Prioritization-based delay sensitive task offloading in SDN-integrated mobile IoT network9
CitySpec with shield: A secure intelligent assistant for requirement formalization9
Guest editorial for the PMC special section on selected papers from ICDCN 20209
Editorial Board9
MGA-Net+: Acceleration-based packaging work recognition using motif-guided attention networks8
Editorial Board8
AI-driven autonomous vehicles as COVID-19 assessment centers: A novel crowdsensing-enabled strategy8
OcAPO: Fine-grained occupancy-aware, empirically-driven PDC control in open-plan, shared workspaces8
Three-phased clustered topology formation for Aeronautical Ad-Hoc Networks8
GANCSA: A novel approach for finding the best path for migration of mobile-agents8
Feasibility and reliability of peercloud in vehicular networks: A comprehensive study8
Detecting structural anomalies of quadcopter UAVs based on LSTM autoencoder8
Editorial Board8
Efficient semidefinite solutions for TDOA-based source localization under unknown PS8
0.059553861618042