Pervasive and Mobile Computing

Papers
(The TQCC of Pervasive and Mobile Computing is 8. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-11-01 to 2024-11-01.)
ArticleCitations
Merged glowworm swarm with ant colony optimization for energy efficient clustering and routing in Wireless Sensor Network63
What makes people install a COVID-19 contact-tracing app? Understanding the influence of app design and individual difference on contact-tracing app adoption intention61
Hybrid metaheuristic algorithm for optimal cluster head selection in wireless sensor network61
Energy and task completion time trade-off for task offloading in fog-enabled IoT networks45
ProDroid — An Android malware detection framework based on profile hidden Markov model38
Wavelet transform analytics for RF-based UAV detection and identification system using machine learning38
A blockchain-based trust management method for Internet of Things38
Is blockchain for Internet of Medical Things a panacea for COVID-19 pandemic?35
PoEWAL: A lightweight consensus mechanism for blockchain in IoT35
Mood ratings and digital biomarkers from smartphone and wearable data differentiates and predicts depression status: A longitudinal data analysis32
Accurate indoor positioning using IEEE 802.11mc round trip time25
Device-independent cellular-based indoor location tracking using deep learning25
When phones get personal: Predicting Big Five personality traits from application usage23
Optimal edge server deployment and allocation strategy in 5G ultra-dense networking environments22
Relevant node discovery and selection approach for the Internet of Things based on neural networks and ant colony optimization21
Power consumption analysis of access network in 5G mobile communication infrastructures — An analytical quantification model21
Intelligent decision-making in Smart Food Industry: Quality perspective20
Efficient biometric-based identity management on the Blockchain for smart industrial applications19
PPSS: A privacy-preserving secure framework using blockchain-enabled federated deep learning for Industrial IoTs19
A lightweight authentication protocol for D2D-enabled IoT systems with privacy19
AI-driven autonomous vehicles as COVID-19 assessment centers: A novel crowdsensing-enabled strategy18
Empirical evaluation of nodes and channels of the lightning network18
HED-FL: A hierarchical, energy efficient, and dynamic approach for edge Federated Learning18
ContrasGAN: Unsupervised domain adaptation in Human Activity Recognition via adversarial and contrastive learning18
EMPC: Energy-Minimization Path Construction for data collection and wireless charging in WRSN17
Distributed algorithms based on proximity for self-organizing fog computing systems17
Towards a better indoor positioning system: A location estimation process using artificial neural networks based on a semi-interpolated database16
Health and sleep nursing assistant for real-time, contactless, and non-invasive monitoring16
A survey on privacy issues and solutions for Voice-controlled Digital Assistants16
NeoWear: An IoT-connected e-textile wearable for neonatal medical monitoring16
SPIDERS+: A light-weight, wireless, and low-cost glasses-based wearab16
DeepMTL Pro: Deep Learning Based Multiple Transmitter Localization and Power Estimation15
Predicting clinically relevant changes in bipolar disorder outside the clinic walls based on pervasive technology interactions via smartphone typing dynamics15
Feature selection for proximity estimation in COVID-19 contact tracing apps based on Bluetooth Low Energy (BLE)15
DF-WiSLR: Device-Free Wi-Fi-based Sign Language Recognition15
Joint radio and local resources optimization for tasks offloading with priority in a Mobile Edge Computing network15
An efficient dynamic decision-based task optimization and scheduling approach for microservice-based cost management in mobile cloud computing applications14
Spectrum cartography techniques, challenges, opportunities, and applications: A survey14
F-BIDS: Federated-Blending based Intrusion Detection System14
A holistic approach to a context-aware IoT ecosystem with Adaptive Ubiquitous Middleware14
Application level performance evaluation of wearable devices for stress classification with explainable AI14
DeCoach: Deep Learning-based Coaching for Badminton Player Assessment14
HCALA: Hyperelliptic curve-based anonymous lightweight authentication scheme for Internet of Drones13
ECCbAS: An ECC based authentication scheme for healthcare IoT systems13
An indoor localization dataset and data collection framework with high precision position annotation13
On producing energy-efficient and contrast-enhanced images for OLED-based mobile devices13
ADAM-sense: Anxiety-displaying activities recognition by motion sensors12
On the Scheduling of Conflictual Deliveries in a last-mile delivery scenario with truck-carried drones12
Three-phased clustered topology formation for Aeronautical Ad-Hoc Networks12
GEESE: Edge computing enabled by UAVs12
Multi-density urban hotspots detection in smart cities: A data-driven approach and experiments12
FaaS execution models for edge applications12
WiPass: 1D-CNN-based smartphone keystroke recognition Using WiFi signals12
A survey on solutions to support developers in privacy-preserving IoT development12
SnapAppy: A positive psychology intervention using smartphone photography to improve emotional well-being11
EDCRA-IoT: Edge-based Data Conflict Resolution Approach for Internet of Things11
A priority-aware lightweight secure sensing model for body area networks with clinical healthcare applications in Internet of Things11
Sleep posture recognition based on machine learning: A systematic review11
A lightweight distributed detection algorithm for DDAO attack on RPL routing protocol in Internet of Things11
A novel self-healing model using precoding & big-data based approach for 5G networks11
An energy-efficient adaptive beaconing rate management for pedestrian safety: A fuzzy logic-based approach11
Wireless power transfer with unmanned aerial vehicles: State of the art and open challenges11
Privacy Preserving Biometric Authentication on the blockchain for smart healthcare11
Passive infrared sensor dataset and deep learning models for device-free indoor localization and tracking10
A novel congestion propagation modeling algorithm for smart cities10
Aggregate processes as distributed adaptive services for the Industrial Internet of Things10
Towards the detection of driver–pedestrian eye contact10
Server-side QUIC connection migration to support microservice deployment at the edge10
Design and evaluation of a fog platform supporting device mobility through container migration10
Porting deep neural networks on the edge via dynamic K-means compression: A case study of plant disease detection10
Bandwidth-constrained task throughput maximization in IoT-enabled 5G networks9
“I still need my privacy”: Exploring the level of comfort and privacy preferences of German-speaking older adults in the case of mobile assistant robots9
Reconciling the what, when and how of privacy notifications in fitness tracking scenarios9
Digital twin oriented architecture for secure and QoS aware intelligent communications in industrial environments9
Assessing the impact of unbalanced resources and communications in edge computing9
Memory-aware and context-aware multi-DNN inference on the edge8
Are you talking to me? An Audio Augmented Reality conversational guide for cultural heritage8
A fault tolerant optimal relay node selection algorithm for Wireless Sensor Networks using modified PSO8
STAC: a spatio-temporal approximate method in data collection applications8
Using mobile devices as scientific measurement instruments: Reliable android task scheduling8
edgeTrans - Edge transport mode detection8
Federated Clustering and Semi-Supervised learning: A new partnership for personalized Human Activity Recognition8
Evaluation and comparison of federated learning algorithms for Human Activity Recognition on smartphones8
A comprehensive investigation on range-free localization algorithms with mobile anchors at different altitudes8
Multi-task learning neural networks for breath sound detection and classification in pervasive healthcare8
Detecting Byzantine attacks in Cognitive Radio Networks : A two-layered approach using Hidden Markov Model and machine learning8
0.032663106918335