International Journal of Ad Hoc and Ubiquitous Computing

Papers
(The median citation count of International Journal of Ad Hoc and Ubiquitous Computing is 0. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-04-01 to 2024-04-01.)
ArticleCitations
Performance and communication energy constrained embedded benchmark for fault tolerant core mapping onto NoC architectures17
Recent advances in blockchain technology: a survey on applications and challenges17
An intrusion detection model using improved convolutional deep belief networks for wireless sensor networks14
Performance and communication energy constrained embedded benchmark for fault tolerant core mapping onto NoC architectures9
Auto insurance fraud identification based on a CNN-LSTM fusion deep learning model8
Privacy-preserving smart contracts for fuzzy WordNet-based document representation and clustering using regularised K-means method7
5G network traffic control: a temporal analysis and forecasting of cumulative network activity using machine learning and deep learning technologies7
An adaptive stochastic central force optimisation algorithm for node localisation in wireless sensor networks6
Architecture and routing protocols for internet of vehicles: a review6
Monitoring in fog computing: state-of-the-art and research challenges5
Detecting LDoS in NB-IoTs by using metaheuristic-based CNN5
Enhancing data privacy through a decentralised predictive model with blockchain-based revenue4
Development of internet finance industry with the core of e-commerce platform services optimised by the edge computing of the internet of things based on artificial intelligence4
A compact GBMO applied to modify DV-Hop based on layers in a wireless sensor network4
RCAPChA: RSU controlled AHP-based prioritised channel allocation protocol for hybrid VANETs4
Behaviour-based grey wolf optimiser for a wireless sensor network deployment problem4
Black hole attack prevention scheme using a blockchain-block approach in SDN-enabled WSN4
Provably secure authenticated content key distribution framework for IoT-enabled enterprise digital rights management systems4
AI and machine learning for the analysis of data flow characteristics in industrial network communication security3
Optimal dense convolutional network model for image classification in unmanned aerial vehicles based ad hoc networks3
Energy-efficient fault-tolerant scheduling in a fog-based smart monitoring application3
SHA-AMD: sample-efficient hyper-tuned approach for detection and identification of Android malware family and category3
Design and implementation of a mobility support adaptive trickle algorithm for RPL in vehicular IoT networks3
Time and energy-efficient hybrid job scheduling scheme for mobile cloud computing empowered wireless sensor networks3
RSSI-based node selection using neural network parameterised by particle swarm optimisation3
Efficient hardware architectures of Lilliput lightweight algorithm for image encryption3
Research on spam filtering algorithm based on mutual information and weighted naive Bayesian classification3
Propagation models and their effect on the congestion control in vehicular ad hoc network3
An ICT-based solid waste management system for smart cities: a case of municipality in India3
Optimisation of K-means algorithm based on sample density canopy3
Energy consumption models in VANET simulation tools for electric vehicles: a literature survey2
A survey of intelligent load monitoring in IoT-enabled distributed smart grids2
Secure exchange and effectual verification of educational academic records using hyperledger fabric block chain system2
A simulation study on the necessity of working breakdown in a state dependent bulk arrival queue with disaster and optional re-service2
A hybrid approach for feature selection using SFFS and SBFS with extra-tree and classification using XGBoost2
UAV deployment and channel allocation considering diverse QoS constraints and service importance2
Learning automata and lexical composition method for optimal and load balanced RPL routing in IoT2
A bigraphical approach to model and verify ontology alignment2
Reducing the internet traffic in IoT-based monitoring and control system through a combination of WSN and LoRaWAN networks2
Research on optimisation of energy efficient routing protocol based on LEACH2
A machine learning approach for celebrity profiling2
User participation behaviour in crowdsourcing initiatives: influencing factors, related theories and incentive strategies2
A recommendation algorithm based on modified similarity and text content to optimise aggregate diversity2
Security analysis of image CAPTCHA using a mask R-CNN-based attack model2
Real-time face mask position recognition system using YOLO models for preventing COVID-19 disease spread in public places2
Research on multi-feature fusion entity relation extraction based on deep learning2
Efficiency Evaluation of HRF mechanism on EDoS attacks in Cloud Computing Services2
Optimised routing algorithm in low Earth orbit satellite networks2
A CA-GRU-based model for air quality prediction2
Hybrid meta-heuristic-based inventory management using block chain technology in cloud sector2
Colour image encryption using an improved version of stream cipher and chaos1
Comparative performance of deep learning architectures in classification of diabetic retinopathy1
A feature ranking-based deep learning secure framework for multi-class leaf disease detection1
Identity-based ring signature scheme with multi-designated verifiers1
Mobility modelling for urban traffic surveillance by a team of unmanned aerial vehicles1
Reliability improvement of frame-based equipment for ultra-reliable and low latency communication in unlicensed spectrum1
On fast Fourier transform-based decoding of Reed-Solomon codes1
Computational trust evaluation algorithm for cloud models using fuzzy logic approach1
FETES: a fast, emergency timeslot allocation, and three-tier energy saving-based task execution strategy for wireless body area network1
An optimised Darknet traffic detection system using modified locally connected CNN - BiLSTM network1
Coordinated sensing coverage optimisation in sensor networks using RSSI1
An adaptive stochastic central force optimisation algorithm for node localisation in wireless sensor networks1
A two dimensional Markov chain model for aggregation-enabled 802.11 networks1
Tree reconstruction using energy aware sink mobility to prolong network lifetime in WSN1
A state-of-the-art review on person re-identification with deep learning1
Multi-cluster flying ad-hoc network for disaster monitoring applications1
Evaluation of functional maturity for a network information service - design and case analysis1
A robust guaranteed time slots allotment scheme for real-time and reliable communication in WBANs1
A method for constructing connected dominating set for consensus in ad hoc wireless network1
<i>ERMAP</i>: ECC-based robust mutual authentication protocol for smart grid communication with AVISPA simulations1
Gene expression data classification with robust sparse logistic regression using fused regularisation1
Fuzzy independent circular zones protocol for heterogeneous wireless sensor networks1
Botnet detection used fast-flux technique, based on adaptive dynamic evolving spiking neural network algorithm1
Knowledge-based flexible resource allocation optimisation strategy for multi-tenant radio access network slicing in 5G and B5G1
Time and energy-efficient hybrid job scheduling scheme for mobile cloud computing empowered wireless sensor networks1
Two-stage adaptive weight vector design method for decomposition based many-objective evolutionary algorithm1
A location-based multi-factor authentication scheme for mobile devices1
Efficient multi-receiver signcryption scheme based on ring signature1
Cooperative evolution of SVM-based resource allocation for 5G cloud-radio access network system with D2D communication1
Secured personal health records using pattern-based verification and two-way polynomial protocol in cloud infrastructure1
Reward-based service provisioning scheme for UAV-MEC assisted IoT infrastructures1
Mobility aware and reliable multipath routing protocol for MANETs1
Real-time road object segmentation using improved light-weight convolutional neural network based on 3D LiDAR point cloud1
An ICT-based solid waste management system for smart cities: a case of municipality in India1
An e-healthcare authentication protocol employing cloud computing1
Cuckoo search assisted fuzzy logic algorithm for smart WSN routing system1
F-CHILS maps - a novel encryption scheme for secured medical data transmission using FoG-ban environment1
Forecasting the decision making process of Supreme Court using hierarchical convolutional neural network1
FETES: a fast, emergency timeslot allocation, and three-tier energy saving-based task execution strategy for wireless body area network1
Optimal allocation of renewable distributed generators and shunt capacitors in distribution system using hybrid intelligent approach1
Resource provisioning optimisation for cloud computing systems serving multi-class requests1
Intelligent reflecting surfaces for cognitive radio networks1
Botnet detection used fast-flux technique, based on adaptive dynamic evolving spiking neural network algorithm1
Detection of phishing attacks using probabilistic neural network with a novel training algorithm for reduced Gaussian kernels and optimal smoothing parameter adaptation for mobile web services1
A multi-group dragonfly algorithm for application in wireless sensor network deployment problem1
Identity-based secure data aggregation in big data wireless sensor networks0
Black hole attack prevention scheme using a blockchain-block approach in SDN-enabled WSN0
FOESG: anonymous session key agreement protocol for fog assisted smart grid communication0
Routing techniques for millimetre wave communications0
Energy Efficient Power Allocation with Antenna Selection for Interference Alignment based MIMO-OFDM Cognitive Radio Networks0
Learning stereo disparity with feature consistency and confidence0
Cryptographic Analysis and Construction of Complete Permutations using a Recursive Approach0
An overview of continuous device-to-device authentication techniques for the internet of things0
An intrusion detection model using improved convolutional deep belief networks for wireless sensor networks0
A hybrid approach for feature selection using SFFS and SBFS with extra-tree and classification using XGBoost0
A hybrid channel transmission method for effective spectrum access in cognitive radio networks0
Reconfigurable Intelligent Surfaces with Energy Harvesting From a Water Flow and Adaptive Power0
FC-CACPHS: fog-cloud assisted context-aware framework for cyber-physical healthcare system0
Research on multi-feature fusion entity relation extraction based on deep learning0
5G Network Traffic Control: A Temporal Analysis and Forecasting of Cumulative Network Activity using Machine Learning and Deep Learning technologies0
Disaster evacuation route planning strategy based on traffic prediction0
Ubiquitous monitoring of liver transplantation patients0
DATA SECURITY ENHANCEMENT IN INTERNET OF THINGS USING OPTIMIZED HASHING ALGORITHM0
Tree reconstruction using energy aware sink mobility to prolong network lifetime in WSN0
Quantum simulation scenarios and disease classification behaviour on diabetes data0
Comparative analysis of image classification with retrieval system0
Analysis of sponsoring and caching data: the case of competing ISPs in information-centric networks0
Energy efficient power allocation with antenna selection for interference alignment-based MIMO-OFDM cognitive radio networks0
Provably secure authenticated content key distribution framework for IoT-enabled enterprise digital rights management systems0
A dynamic preserving-based WSN framework for medical disease prediction0
Sliding window assisted mutual redundancy-based feature selection for intrusion detection system0
Secure proof of the sum of all the elements of a matrix of finite field elements in zero-knowledge0
Application of artificial intelligence technology in CNC system0
Decentralised ontology-based access control in internet of things using social context0
Device and method for dynamic image display of financial transaction operation data0
Artificial Intelligence Technology in Internet Finance and Analysis of Security Risk0
An optimised machine learning algorithm for classification of epileptic seizures using EMD-based dynamic features of EEG0
Optimal Hybrid Classifier with Fine-tuned Hyper parameter and Improved Fuzzy C Means Segmentation: Skin Cancer Detection0
Device and method for dynamic image display of financial transaction operation data0
Joint Resource Allocation and Cluster-Head Selection for Energy Aware D2D Multicasting.0
Accurate Identification of Economic Hardship Students: A Data-Driven Approach0
A general and efficient distance bounding protocol with multi-objective optimisation for RFID applications over a noisy channel0
Impact: a mission-driven, human-centric, super-smart service orchestration scheme for Society 5.0 and Industry 4.0 application execution over CPSS enhanced 6G networks0
FORECASTING THE DECISION MAKING PROCESS OF SUPREME COURT USING HIERARCHICAL CONVOLUTIONAL NEURAL NETWORK0
Adolescent Identity Search Algorithm with Video-Based Activity Classification using Hierarchical Auto- Associative Polynomial Convolutional Neural Network optimised0
Research on Optimization of Energy Efficient Routing Protocol Based on LEACH0
Improving QOS in flow controlled CR-ad hoc network with multi criteria routing assisted with cooperative caching and information redundancy0
Lion plus firefly algorithm for ternary-based anomaly detection in semantic graphs in smart cities0
Simultaneously transmitting and reflecting reconfigurable intelligent surfaces with multi-antenna energy harvesting and adaptive power0
Game-based congestion-aware routing algorithm in wireless network on chips0
Detection of phishing attacks using probabilistic neural network with a novel training algorithm for reduced Gaussian kernels and optimal smoothing parameter adaptation for mobile web services0
Development of image-guided puncture robot used in trigeminal neuralgia treatment0
Quantum Simulation Scenarios and Disease Classification Behaviour on Diabetes Data0
Routing techniques for millimetre wave communications0
Graph-based optimal routing in clustered WSNs0
A method for constructing connected dominating set for consensus in ad hoc wireless network0
Intrusion detection system using resampled dataset - a comparative study0
A novel optimised apnea classification with AA-CNN method by utilising the EDR and ECG features0
Architecture and Routing Protocols for Internet of Vehicles: A Review0
Optimal hybrid classifier with fine-tuned hyper parameter and improved fuzzy C means segmentation: skin cancer detection0
Adapting Mobile User Interfaces based on users' application usage behaviours0
An e-healthcare authentication protocol employing cloud computing0
A Comparative Analysis of Elliptic Curve Based Cryptographic Techniques for Internet of Things0
Certificateless Searchable Attribute Based Encryption Approach for Cloud Data Based on Blockchain0
Adolescent identity search algorithm with optimised video-based activity classification using hierarchical auto-associative polynomial convolutional neural network0
Design of Trust Identification System for Cloud Services0
An energy and delay aware routing protocol for wireless sensor network assisted IoT to maximise network lifetime0
A novel reformed normaliser free network with U-Net architecture for semantic segmentation0
Hybrid optimisation enabled deep learning for sentiment rating prediction towards text summarisation and question answering system0
Detection of Deepfake Technology in Images and Videos0
Graph-based optimal routing in clustered WSNs0
Secured Personal Health Records using Pattern Based Verification and 2-Way Polynomial Protocol in Cloud Infrastructure0
Outage probability analysis for relay-based cognitive radio network0
Lightweight and Personalized E-commerce Recommendation based on Collaborative Filtering and LSH0
Accurate identification of economic hardship students: a data-driven approach0
Hierarchical Capacity Management and Load Balancing for HetNets Using Multi-Layer Optimization Methods0
Enhancing Data Privacy through Decentralized Predictive Model with Blockchain-based Revenue0
Design of trust identification system for cloud services0
Insider threat detection and prevention using semantic score and dynamic multi-fuzzy classifier0
Performance Evaluation of Strapdown Inertial Navigation and Beidou Satellite Navigation System Based on Intelligent Image Processing Technology0
A fault tolerant algorithm for integrated coverage and connectivity in wireless sensor networks0
A reliable transmission scheme for 3D point cloud based on partial decode-and-forward relay over burst error fading channel0
Optimal harvesting duration for CDMA systems0
A filter-based machine learning classification framework for cloud-based medical databases0
An approach using heuristic pheromones-based ACO modelling for green vehicle routing optimisation0
Efficacious tuning in energy efficient street lighting0
Transcend: An Ownership Based Resource Allocation Strategy for Service Function Chaining in NFV Empowered 6G Network Using Latency and User Cost-awareness0
Spectrum sensing with energy harvesting from a water flow0
A filter-based machine learning classification framework for cloud-based medical databases0
Modelling and optimisation of high-speed KLEIN architectures on FPGA and ASIC platforms for IoT applications0
Lattice-based lightweight cryptosystem0
Wireless Communications with Hybrid Solar and RF Energy Harvesting0
A two dimensional Markov chain model for aggregation-enabled 802.11 networks0
Uncertainties evaluation and analysis using quantitative technique for a software project0
A state-of-the-art review on person re-identification with deep learning0
Simultaneously Transmitting and Reflecting Reconfigurable Intelligent Surfaces (STAR-RIS) with Multi-antenna Energy Harvesting and Adaptive Power0
Joint resource allocation and cluster-head selection for energy aware D2D multi-casting0
Resource provisioning optimisation for cloud computing systems serving multi-class requests0
Cryptographic analysis and construction of complete permutations using a recursive approach0
Approximation algorithms for profit maximisation in multicast D2D networks0
Auto insurance fraud identification based on a CNN-LSTM fusion deep learning model0
Efficacious tuning in energy efficient street lighting0
Messed up(): a key generator-based image cryptosystem0
Merit: An On-demand IoT Service Delivery and Resource Scheduling Scheme for Federated Learning and Blockchain Empowered 6G Edge Networks With Reduced Time and Energy Cost0
GSFI_SMOTE: a hybrid multiclass classifier for minority attack detection in internet of things network0
Optimal allocation of renewable distributed generators and shunt capacitors in distribution system using hybrid intelligent approach0
Consumer IoT Device Deployment Optimization through Deep Learning: A CNN-LSTM Solution for Traffic Classification and Service Identification0
Detecting LDoS in NB-IoTs by using metaheuristic-based CNN0
Optimisation of K-means algorithm based on sample density canopy0
Privacy-Preserving Double Auction for Resource Allocation in Satellite MEC0
Fitness approximation with RF algorithm dedicated to WSN node deployment for a soil monitoring application0
Coordinated sensing coverage optimisation in sensor networks using RSSI0
Data security enhancement in internet of things using optimised hashing algorithm0
A TDMA protocol with reinforcement learning slot selection for MANETs0
Intercept analysis with threshold-based diversity reception for cognitive network0
Mobility modelling for urban traffic surveillance by a team of unmanned aerial vehicles0
Optimal solar panel placement in mobile edge computing0
Computational offloading in vehicular edge computing using multiple agent-based deterministic policy gradient algorithm and generative adversarial networks0
STARRIS with Hybrid Wind and RF Energy Harvesting0
Intrusion Detection System using Resampled Dataset - A Comparative Study0
Efficiency evaluation of HRF mechanism on EDoS attacks in cloud computing services0
Research on the matching of environmental emergency prediction and emergency rescue resources based on deep learning0
Relay-based spectrum sensing with wind energy harvesting0
Detection of Image Recognition Forgery Technology under Machine Vision0
Comparative Performance of Deep Learning Architectures in Classification of Diabetic Retinopathy0
Recent advances in blockchain technology: a survey on applications and challenges0
Reconfigurable intelligent surfaces with hybrid wind, solar and RF energy harvesting0
A Hybrid Channel Transmission Method for Effective Spectrum Access in Cognitive Radio Networks0
Transcend: an ownership-based resource allocation strategy for service function chaining in NFV empowered 6G network using latency and user cost-awareness0
Modelling and optimisation of high-speed KLEIN architectures on FPGA and ASIC platforms for IoT applications0
Learning stereo disparity with feature consistency and confidence0
Target node selection for data offloading in partially connected vehicular ad hoc networks0
A feature ranking-based deep learning secure framework for multi-class leaf disease detection0
Throughput optimisation with wind energy harvesting0
Optimal harvesting duration for CDMA systems0
WeECG: a low-cost real-time wireless ECG for new born monitoring with error concealment0
A CA-GRU-based model for air quality prediction0
A Trusted and Adaptive Security Mechanism for Wearable E-Healthcare Systems0
Cuckoo search assisted fuzzy logic algorithm for smart WSN routing system0
A survey of intelligent load monitoring in IoT-enabled distributed smart grids0
FOESG: Anonymous session key agreement protocol for fog assisted smart grid communication0
Privacy-preserving double auction for resource allocation in satellite MEC0
Functional feature-aware APP recommendation with personalised PageRank0
Game-based congestion-aware routing algorithm in wireless network on chips0
Messed up(): A Key Generator based image cryptosystem0
An Optimized Darknet Traffic Detection System using Modified Locally Connected CNN - BiLSTM Network0
Secure Exchange and Effectual Verification of Educational Academic Records Using Hyperledger Fabric Block chain System0
Design, implementation, and evaluation of a shared LoRa network application architecture0
A dynamic preserving-based WSN framework for medical disease prediction0
Hop-based void avoidance routing protocol for underwater acoustic sensor networks0
An approach using heuristic pheromones-based ACO modelling for green vehicle routing optimisation0
Insider Threat Detection and Prevention using Semantic Score and Dynamic Multi Fuzzy Classifier0
Comparative analysis of image classification with retrieval system0
Reliability improvement of frame-based equipment for ultra-reliable and low latency communication in unlicensed spectrum0
Computational trust evaluation algorithm for cloud models using fuzzy logic approach0
Adapting mobile user interfaces based on users' application usage behaviours0
Satisfaction-driven cooperative trajectory optimisation for multi-UAV-assisted mobile edge computing0
A TDMA protocol with reinforcement learning slot selection for MANETs0
A reliable transmission scheme for 3D point cloud based on partial decode-and-forward relay over burst error fading channel0
Efficient multi-receiver signcryption scheme based on ring signature0
0.035566091537476