Pervasive and Mobile Computing

Papers
(The TQCC of Pervasive and Mobile Computing is 8. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-03-01 to 2025-03-01.)
ArticleCitations
The trade-offs between Fog Processing and Communications in latency-sensitive Vehicular Fog Computing63
PPSS: A privacy-preserving secure framework using blockchain-enabled federated deep learning for Industrial IoTs61
Editorial Board49
Special Issue on IoT for Fighting COVID-1945
Editorial Board42
DA-HAR: Dual adversarial network for environment-independent WiFi human activity recognition41
Deep learning based speed bumps detection and characterization using smartphone sensors38
Editorial Board36
Editorial Board33
Dynamic Partitioning and Popularity based Caching for Optimized Performance in content-centric fog networks: DPPCOP27
CycleSense: Detecting near miss incidents in bicycle traffic from mobile motion sensors26
Full-duplex routing with low-complexity sequential-decision for throughput enhancement in dynamic access networks24
Physical activity forecasting with time series data using Android smartphone21
VibeRing: Using vibrations from a smart ring as an out-of-band channel for sharing secret keys20
Special issue on Edge Computing in Pervasive Systems20
NeoWear: An IoT-connected e-textile wearable for neonatal medical monitoring20
Editorial Board20
ProDroid — An Android malware detection framework based on profile hidden Markov model19
Intelligent decision-making in Smart Food Industry: Quality perspective18
Advancing user-space networking for DDS message-oriented middleware: Further extensions18
IoT data encryption and phrase search-based efficient processing using a Fully Homomorphic-based SE (FHSE) scheme18
Secure and efficient blockchain-based consensus scheme for MWSNs with clustered architecture18
Editorial Board17
Editorial Board17
What makes people install a COVID-19 contact-tracing app? Understanding the influence of app design and individual difference on contact-tracing app adoption intention16
Power consumption analysis of access network in 5G mobile communication infrastructures — An analytical quantification model16
Multi-level feature driven storage management of surveillance videos16
Feature selection for proximity estimation in COVID-19 contact tracing apps based on Bluetooth Low Energy (BLE)16
WiPass: 1D-CNN-based smartphone keystroke recognition Using WiFi signals16
An efficient estimator for source localization in WSNs using RSSD and TDOA measurements16
AR Peephole Interface: Extending the workspace of a mobile device using real-space information15
Min–max movement of barrier coverage with sink-based mobile sensors for crowdsensing15
W8-Scope: Fine-grained, practical monitoring of weight stack-based exercises15
Multi-task learning neural networks for breath sound detection and classification in pervasive healthcare15
Porting deep neural networks on the edge via dynamic K-means compression: A case study of plant disease detection15
Reinforcement learning for autonomous vehicle movements in wireless multimedia applications14
Context-aware privacy-preserving access control for mobile computing14
Towards the detection of driver–pedestrian eye contact14
Chirp-Loc: Multi-factor authentication via acoustically-generated location signatures14
Online machine learning for auto-scaling in the edge computing14
Are you talking to me? An Audio Augmented Reality conversational guide for cultural heritage13
A Transfer Learning and Explainable Solution to Detect mpox from Smartphones images13
Joint radio and local resources optimization for tasks offloading with priority in a Mobile Edge Computing network13
SmartSPEC: A framework to generate customizable, semantics-based smart space datasets13
SMARTCOPE: Smartphone Change Of Possession Evaluation for continuous authentication13
Collective victim counting in post-disaster response: A distributed, power-efficient algorithm via BLE spontaneous networks13
A comprehensive systematic review on mobile applications to support dementia patients13
Analysis of micro- vs. macro-flows management in QKD-secured edge computing13
Lightweight accurate trigger to reduce power consumption in sensor-based continuous human activity recognition13
HED-FL: A hierarchical, energy efficient, and dynamic approach for edge Federated Learning12
Can smartphones serve as an instrument for driver behavior of intelligent transportation systems research? A systematic review: Challenges, motivations, and recommendations12
Privacy Preserving Biometric Authentication on the blockchain for smart healthcare12
Vspp: Verifiable, shareable, and privacy-preserving access control scheme for IoV12
Editorial Board12
Service placement strategies in mobile edge computing based on an improved genetic algorithm12
A provably secure and practical end-to-end authentication scheme for tactile Industrial Internet of Things11
An efficient heterogeneous signcryption scheme for internet of things11
The geodesic mutual visibility problem: Oblivious robots on grids and trees11
Hybrid and Adaptive Cryptographic-based secure authentication approach in IoT based applications using hybrid encryption11
A novel self-healing model using precoding & big-data based approach for 5G networks11
An energy-aware secure routing scheme in internet of things networks via two-way trust evaluation11
Inferring in-air gestures in complex indoor environment with less supervision11
HearDrinking: Drunkenness detection and BACs predictions based on acoustic signal10
Privacy preservation for spatio-temporal data in Mobile Crowdsensing scenarios10
Secure D2D caching framework inspired on trust management and blockchain for Mobile Edge Caching10
Traffic aware dynamic load distribution in the Data Plane of SDN using Genetic Algorithm: A case study on NSF network10
Editorial Board10
Special Issue on IEEE WoWMoM 202110
Energy and task completion time trade-off for task offloading in fog-enabled IoT networks9
A novel congestion propagation modeling algorithm for smart cities9
Design and evaluation of a fog platform supporting device mobility through container migration9
A puf-based three-party authentication key establishment scheme for fog-enabled smart home9
Mining Wi-Fi Channel State Information for breathing and heart rate classification9
Wavelet transform analytics for RF-based UAV detection and identification system using machine learning8
DeCoach: Deep Learning-based Coaching for Badminton Player Assessment8
Spectrum cartography techniques, challenges, opportunities, and applications: A survey8
A blockchain-based trust management method for Internet of Things8
Health and sleep nursing assistant for real-time, contactless, and non-invasive monitoring8
A lightweight authentication protocol for D2D-enabled IoT systems with privacy8
RSS based multistage statistical method for attack detection and localization in IoT networks8
A comprehensive investigation on range-free localization algorithms with mobile anchors at different altitudes8
IWFUCIA: An integrated model for Wi-Fi fingerprints radio map updating and localization on changed impact analysis8
Digital twin oriented architecture for secure and QoS aware intelligent communications in industrial environments8
0.10927295684814