callback( { "result":{ "query":":facetid:toc:\"db/journals/iotj/iotj6.bht\"", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"295.13" }, "completions":{ "@total":"1", "@computed":"1", "@sent":"1", "c":{ "@sc":"916", "@dc":"916", "@oc":"916", "@id":"43358033", "text":":facetid:toc:db/journals/iotj/iotj6.bht" } }, "hits":{ "@total":"916", "@computed":"916", "@sent":"916", "@first":"0", "hit":[{ "@score":"1", "@id":"1999227", "info":{"authors":{"author":[{"@pid":"119/1689","text":"Fardin Abdi"},{"@pid":"49/7998","text":"Chien-Ying Chen"},{"@pid":"130/9116","text":"Monowar Hasan"},{"@pid":"95/4353","text":"Songran Liu"},{"@pid":"60/5790","text":"Sibin Mohan"},{"@pid":"86/450","text":"Marco Caccamo"}]},"title":"Preserving Physical Safety Under Cyber Attacks.","venue":"IEEE Internet Things J.","volume":"6","number":"4","pages":"6285-6300","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/AbdiCHLMC19","doi":"10.1109/JIOT.2018.2889866","ee":"https://doi.org/10.1109/JIOT.2018.2889866","url":"https://dblp.org/rec/journals/iotj/AbdiCHLMC19"}, "url":"URL#1999227" }, { "@score":"1", "@id":"1999228", "info":{"authors":{"author":[{"@pid":"152/6251","text":"Forough Shirin Abkenar"},{"@pid":"76/4975","text":"Abbas Jamalipour"}]},"title":"EBA: Energy Balancing Algorithm for Fog-IoT Networks.","venue":"IEEE Internet Things J.","volume":"6","number":"4","pages":"6843-6849","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/AbkenarJ19","doi":"10.1109/JIOT.2019.2911953","ee":"https://doi.org/10.1109/JIOT.2019.2911953","url":"https://dblp.org/rec/journals/iotj/AbkenarJ19"}, "url":"URL#1999228" }, { "@score":"1", "@id":"1999229", "info":{"authors":{"author":[{"@pid":"243/6427","text":"Anuoluwapo A. Adewuyi"},{"@pid":"87/3633","text":"Hui Cheng"},{"@pid":"05/4613-1","text":"Qi Shi 0001"},{"@pid":"c/JiannongCao","text":"Jiannong Cao 0001"},{"@pid":"142/9269","text":"Áine MacDermott"},{"@pid":"99/4694-1","text":"Xingwei Wang 0001"}]},"title":"CTRUST: A Dynamic Trust Model for Collaborative Applications in the Internet of Things.","venue":"IEEE Internet Things J.","volume":"6","number":"3","pages":"5432-5445","year":"2019","type":"Journal Articles","access":"open","key":"journals/iotj/AdewuyiCSCMW19","doi":"10.1109/JIOT.2019.2902022","ee":"https://doi.org/10.1109/JIOT.2019.2902022","url":"https://dblp.org/rec/journals/iotj/AdewuyiCSCMW19"}, "url":"URL#1999229" }, { "@score":"1", "@id":"1999230", "info":{"authors":{"author":[{"@pid":"162/9789","text":"Emmanuel Ahene"},{"@pid":"255/2218","text":"Zhangchi Qin"},{"@pid":"255/2306","text":"Akua Konadu Adusei"},{"@pid":"39/3025","text":"Fagen Li"}]},"title":"Efficient Signcryption With Proxy Re-Encryption and its Application in Smart Grid.","venue":"IEEE Internet Things J.","volume":"6","number":"6","pages":"9722-9737","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/AheneQAL19","doi":"10.1109/JIOT.2019.2930742","ee":"https://doi.org/10.1109/JIOT.2019.2930742","url":"https://dblp.org/rec/journals/iotj/AheneQAL19"}, "url":"URL#1999230" }, { "@score":"1", "@id":"1999231", "info":{"authors":{"author":[{"@pid":"225/0813","text":"Muna Al-Hawawreh 0001"},{"@pid":"213/9842","text":"Frank T. H. den Hartog"},{"@pid":"75/4463","text":"Elena Sitnikova"}]},"title":"Targeted Ransomware: A New Cyber Threat to Edge System of Brownfield Industrial Internet of Things.","venue":"IEEE Internet Things J.","volume":"6","number":"4","pages":"7137-7151","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/Al-HawawrehHS19","doi":"10.1109/JIOT.2019.2914390","ee":"https://doi.org/10.1109/JIOT.2019.2914390","url":"https://dblp.org/rec/journals/iotj/Al-HawawrehHS19"}, "url":"URL#1999231" }, { "@score":"1", "@id":"1999232", "info":{"authors":{"author":[{"@pid":"204/6259","text":"Thair A. Al-Janabi"},{"@pid":"93/4418","text":"Hamed S. Al-Raweshidy"}]},"title":"An Energy Efficient Hybrid MAC Protocol With Dynamic Sleep-Based Scheduling for High Density IoT Networks.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"2273-2287","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/Al-JanabiA19","doi":"10.1109/JIOT.2019.2905952","ee":"https://doi.org/10.1109/JIOT.2019.2905952","url":"https://dblp.org/rec/journals/iotj/Al-JanabiA19"}, "url":"URL#1999232" }, { "@score":"1", "@id":"1999233", "info":{"authors":{"author":[{"@pid":"205/7977","text":"Bilal R. Al-Kaseem"},{"@pid":"192/7954","text":"Yousif Al-Dunainawi"},{"@pid":"93/4418","text":"Hamed S. Al-Raweshidy"}]},"title":"End-to-End Delay Enhancement in 6LoWPAN Testbed Using Programmable Network Concepts.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"3070-3086","year":"2019","type":"Journal Articles","access":"open","key":"journals/iotj/Al-KaseemAA19","doi":"10.1109/JIOT.2018.2879111","ee":"https://doi.org/10.1109/JIOT.2018.2879111","url":"https://dblp.org/rec/journals/iotj/Al-KaseemAA19"}, "url":"URL#1999233" }, { "@score":"1", "@id":"1999234", "info":{"authors":{"author":[{"@pid":"54/9607","text":"Saba Al-Rubaye"},{"@pid":"236/4356","text":"Ekhlas Kadhum"},{"@pid":"87/3074","text":"Qiang Ni"},{"@pid":"97/4028","text":"Alagan Anpalagan"}]},"title":"Industrial Internet of Things Driven by SDN Platform for Smart Grid Resiliency.","venue":"IEEE Internet Things J.","volume":"6","number":"1","pages":"267-277","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/Al-RubayeKNA19","doi":"10.1109/JIOT.2017.2734903","ee":"https://doi.org/10.1109/JIOT.2017.2734903","url":"https://dblp.org/rec/journals/iotj/Al-RubayeKNA19"}, "url":"URL#1999234" }, { "@score":"1", "@id":"1999235", "info":{"authors":{"author":[{"@pid":"180/7162","text":"Maha Alaslani"},{"@pid":"55/11299","text":"Faisal Nawab"},{"@pid":"62/5430","text":"Basem Shihada"}]},"title":"Blockchain in IoT Systems: End-to-End Delay Evaluation.","venue":"IEEE Internet Things J.","volume":"6","number":"5","pages":"8332-8344","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/AlaslaniNS19","doi":"10.1109/JIOT.2019.2917226","ee":"https://doi.org/10.1109/JIOT.2019.2917226","url":"https://dblp.org/rec/journals/iotj/AlaslaniNS19"}, "url":"URL#1999235" }, { "@score":"1", "@id":"1999236", "info":{"authors":{"author":[{"@pid":"117/5169","text":"Mohammed Alasli"},{"@pid":"97/6192","text":"Muhammad E. S. Elrabaa"},{"@pid":"55/4669","text":"Marwan H. Abu-Amara"}]},"title":"FPGA-Based Symmetric Re-Encryption Scheme to Secure Data Processing for Cloud-Integrated Internet of Things.","venue":"IEEE Internet Things J.","volume":"6","number":"1","pages":"446-457","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/AlasliEA19","doi":"10.1109/JIOT.2018.2864513","ee":"https://doi.org/10.1109/JIOT.2018.2864513","url":"https://dblp.org/rec/journals/iotj/AlasliEA19"}, "url":"URL#1999236" }, { "@score":"1", "@id":"1999237", "info":{"authors":{"author":[{"@pid":"226/5296","text":"Hisham Alasmary"},{"@pid":"220/2406","text":"Aminollah Khormali"},{"@pid":"220/2422","text":"Afsah Anwar"},{"@pid":"163/7414","text":"Jeman Park 0001"},{"@pid":"231/4844","text":"Jinchun Choi"},{"@pid":"236/5184","text":"Ahmed Abusnaina"},{"@pid":"147/0999","text":"Amro Awad"},{"@pid":"13/3903","text":"DaeHun Nyang"},{"@pid":"70/2832","text":"Aziz Mohaisen"}]},"title":"Analyzing and Detecting Emerging Internet of Things Malware: A Graph-Based Approach.","venue":"IEEE Internet Things J.","volume":"6","number":"5","pages":"8977-8988","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/AlasmaryKAPCAAN19","doi":"10.1109/JIOT.2019.2925929","ee":"https://doi.org/10.1109/JIOT.2019.2925929","url":"https://dblp.org/rec/journals/iotj/AlasmaryKAPCAAN19"}, "url":"URL#1999237" }, { "@score":"1", "@id":"1999238", "info":{"authors":{"author":[{"@pid":"51/4339","text":"Antônio Marcos Alberti"},{"@pid":"232/7275","text":"Gabriel Dias Scarpioni"},{"@pid":"236/4378","text":"Vaner J. Magalhães"},{"@pid":"247/8412","text":"Arismar Cerqueira S. Jr."},{"@pid":"25/3419","text":"Joel J. P. C. Rodrigues"},{"@pid":"33/4917","text":"Rodrigo da Rosa Righi"}]},"title":"Advancing NovaGenesis Architecture Towards Future Internet of Things.","venue":"IEEE Internet Things J.","volume":"6","number":"1","pages":"215-229","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/AlbertiSMSRR19","doi":"10.1109/JIOT.2017.2723953","ee":"https://doi.org/10.1109/JIOT.2017.2723953","url":"https://dblp.org/rec/journals/iotj/AlbertiSMSRR19"}, "url":"URL#1999238" }, { "@score":"1", "@id":"1999239", "info":{"authors":{"author":[{"@pid":"83/4732","text":"Cristina Alcaraz"},{"@pid":"09/6138","text":"Mike Burmester"},{"@pid":"60/5706","text":"Jorge Cuéllar"},{"@pid":"82/4944-1","text":"Xinyi Huang 0001"},{"@pid":"12/5285","text":"Panayiotis Kotzanikolaou"},{"@pid":"80/1382","text":"Mihalis Psarakis"}]},"title":"Guest Editorial Special Issue on Secure Embedded IoT Devices for Resilient Critical Infrastructures.","venue":"IEEE Internet Things J.","volume":"6","number":"5","pages":"7988-7991","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/AlcarazBCHKP19","doi":"10.1109/JIOT.2019.2940394","ee":"https://doi.org/10.1109/JIOT.2019.2940394","url":"https://dblp.org/rec/journals/iotj/AlcarazBCHKP19"}, "url":"URL#1999239" }, { "@score":"1", "@id":"1999240", "info":{"authors":{"author":[{"@pid":"234/3032","text":"Laha Ale"},{"@pid":"181/2597-7","text":"Ning Zhang 0007"},{"@pid":"168/2616","text":"Huici Wu"},{"@pid":"136/5825","text":"Dajiang Chen"},{"@pid":"78/744-2","text":"Tao Han 0002"}]},"title":"Online Proactive Caching in Mobile Edge Computing Using Bidirectional Deep Recurrent Neural Network.","venue":"IEEE Internet Things J.","volume":"6","number":"3","pages":"5520-5530","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/AleZWCH19","doi":"10.1109/JIOT.2019.2903245","ee":"https://doi.org/10.1109/JIOT.2019.2903245","url":"https://dblp.org/rec/journals/iotj/AleZWCH19"}, "url":"URL#1999240" }, { "@score":"1", "@id":"1999241", "info":{"authors":{"author":[{"@pid":"243/6455","text":"Mohammad Alkhawatrah"},{"@pid":"76/3005","text":"Yu Gong"},{"@pid":"115/8601","text":"Gaojie Chen"},{"@pid":"23/5264","text":"Sangarapillai Lambotharan"},{"@pid":"92/4907","text":"Jonathon A. Chambers"}]},"title":"Buffer-Aided Relay Selection for Cooperative NOMA in the Internet of Things.","venue":"IEEE Internet Things J.","volume":"6","number":"3","pages":"5722-5731","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/AlkhawatrahGCLC19","doi":"10.1109/JIOT.2019.2905169","ee":"https://doi.org/10.1109/JIOT.2019.2905169","url":"https://dblp.org/rec/journals/iotj/AlkhawatrahGCLC19"}, "url":"URL#1999241" }, { "@score":"1", "@id":"1999242", "info":{"authors":{"author":[{"@pid":"353/8148","text":"Ali A. Alnoman"},{"@pid":"51/654","text":"Serhat Erküçük"},{"@pid":"97/4028","text":"Alagan Anpalagan"}]},"title":"Sparse Code Multiple Access-Based Edge Computing for IoT Systems.","venue":"IEEE Internet Things J.","volume":"6","number":"4","pages":"7152-7161","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/AlnomanEA19","doi":"10.1109/JIOT.2019.2914570","ee":"https://doi.org/10.1109/JIOT.2019.2914570","url":"https://dblp.org/rec/journals/iotj/AlnomanEA19"}, "url":"URL#1999242" }, { "@score":"1", "@id":"1999243", "info":{"authors":{"author":[{"@pid":"127/2141","text":"Ahmed Salim Alrawahi"},{"@pid":"44/765","text":"Kevin Lee"},{"@pid":"48/3963","text":"Ahmad Lotfi"}]},"title":"A Multiobjective QoS Model for Trading Cloud of Things Resources.","venue":"IEEE Internet Things J.","volume":"6","number":"6","pages":"9447-9463","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/AlrawahiLL19","doi":"10.1109/JIOT.2019.2943284","ee":"https://doi.org/10.1109/JIOT.2019.2943284","url":"https://dblp.org/rec/journals/iotj/AlrawahiLL19"}, "url":"URL#1999243" }, { "@score":"1", "@id":"1999244", "info":{"authors":{"author":[{"@pid":"238/8101","text":"Alaa A. R. Alsaeedy"},{"@pid":"89/2389","text":"Edwin K. P. Chong"}]},"title":"Mobility Management for 5G IoT Devices: Improving Power Consumption With Lightweight Signaling Overhead.","venue":"IEEE Internet Things J.","volume":"6","number":"5","pages":"8237-8247","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/AlsaeedyC19","doi":"10.1109/JIOT.2019.2920628","ee":"https://doi.org/10.1109/JIOT.2019.2920628","url":"https://dblp.org/rec/journals/iotj/AlsaeedyC19"}, "url":"URL#1999244" }, { "@score":"1", "@id":"1999245", "info":{"authors":{"author":[{"@pid":"214/1930","text":"Ahmad Alsharif"},{"@pid":"123/9731","text":"Mahmoud Nabil 0001"},{"@pid":"199/3871","text":"Ahmed B. T. Sherif"},{"@pid":"117/8481","text":"Mohamed Mahmoud 0001"},{"@pid":"99/5721-2","text":"Min Song 0002"}]},"title":"MDMS: Efficient and Privacy-Preserving Multidimension and Multisubset Data Collection for AMI Networks.","venue":"IEEE Internet Things J.","volume":"6","number":"6","pages":"10363-10374","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/AlsharifNSMS19","doi":"10.1109/JIOT.2019.2938776","ee":"https://doi.org/10.1109/JIOT.2019.2938776","url":"https://dblp.org/rec/journals/iotj/AlsharifNSMS19"}, "url":"URL#1999245" }, { "@score":"1", "@id":"1999246", "info":{"authors":{"author":[{"@pid":"214/1930","text":"Ahmad Alsharif"},{"@pid":"123/9731","text":"Mahmoud Nabil 0001"},{"@pid":"157/1157","text":"Samet Tonyali"},{"@pid":"194/6957","text":"Hawzhin Mohammed"},{"@pid":"117/8481","text":"Mohamed Mahmoud 0001"},{"@pid":"88/755","text":"Kemal Akkaya"}]},"title":"EPIC: Efficient Privacy-Preserving Scheme With EtoE Data Integrity and Authenticity for AMI Networks.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"3309-3321","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/AlsharifNTMMA19","doi":"10.1109/JIOT.2018.2882566","ee":"https://doi.org/10.1109/JIOT.2018.2882566","url":"https://dblp.org/rec/journals/iotj/AlsharifNTMMA19"}, "url":"URL#1999246" }, { "@score":"1", "@id":"1999247", "info":{"authors":{"author":[{"@pid":"154/3611","text":"Dogay Altinel"},{"@pid":"39/3095","text":"Gunes Karabulut Kurt"}]},"title":"Modeling of Multiple Energy Sources for Hybrid Energy Harvesting IoT Systems.","venue":"IEEE Internet Things J.","volume":"6","number":"6","pages":"10846-10854","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/AltinelK19","doi":"10.1109/JIOT.2019.2942071","ee":"https://doi.org/10.1109/JIOT.2019.2942071","url":"https://dblp.org/rec/journals/iotj/AltinelK19"}, "url":"URL#1999247" }, { "@score":"1", "@id":"1999248", "info":{"authors":{"author":[{"@pid":"133/4914","text":"Mohab Aly"},{"@pid":"32/147","text":"Foutse Khomh"},{"@pid":"20/6995","text":"Yann-Gaël Guéhéneuc"},{"@pid":"65/3507","text":"Hironori Washizaki"},{"@pid":"21/9101","text":"Soumaya Yacout"}]},"title":"Is Fragmentation a Threat to the Success of the Internet of Things?","venue":"IEEE Internet Things J.","volume":"6","number":"1","pages":"472-487","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/AlyKGWY19","doi":"10.1109/JIOT.2018.2863180","ee":"https://doi.org/10.1109/JIOT.2018.2863180","url":"https://dblp.org/rec/journals/iotj/AlyKGWY19"}, "url":"URL#1999248" }, { "@score":"1", "@id":"1999249", "info":{"authors":{"author":[{"@pid":"71/7910","text":"Muhammad Naveed Aman"},{"@pid":"240/7224","text":"Mohamed Haroon Basheer"},{"@pid":"s/BiplabSikdar","text":"Biplab Sikdar 0001"}]},"title":"Two-Factor Authentication for IoT With Location Information.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"3335-3351","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/AmanBS19","doi":"10.1109/JIOT.2018.2882610","ee":"https://doi.org/10.1109/JIOT.2018.2882610","url":"https://dblp.org/rec/journals/iotj/AmanBS19"}, "url":"URL#1999249" }, { "@score":"1", "@id":"1999250", "info":{"authors":{"author":[{"@pid":"71/7910","text":"Muhammad Naveed Aman"},{"@pid":"240/7224","text":"Mohamed Haroon Basheer"},{"@pid":"s/BiplabSikdar","text":"Biplab Sikdar 0001"}]},"title":"Data Provenance for IoT With Light Weight Authentication and Privacy Preservation.","venue":"IEEE Internet Things J.","volume":"6","number":"6","pages":"10441-10457","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/AmanBS19a","doi":"10.1109/JIOT.2019.2939286","ee":"https://doi.org/10.1109/JIOT.2019.2939286","url":"https://dblp.org/rec/journals/iotj/AmanBS19a"}, "url":"URL#1999250" }, { "@score":"1", "@id":"1999251", "info":{"authors":{"author":[{"@pid":"71/7910","text":"Muhammad Naveed Aman"},{"@pid":"176/0842","text":"Sachin Taneja"},{"@pid":"s/BiplabSikdar","text":"Biplab Sikdar 0001"},{"@pid":"66/5539","text":"Kee Chaing Chua"},{"@pid":"48/4750","text":"Massimo Alioto"}]},"title":"Token-Based Security for the Internet of Things With Dynamic Energy-Quality Tradeoff.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"2843-2859","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/AmanTSCA19","doi":"10.1109/JIOT.2018.2875472","ee":"https://doi.org/10.1109/JIOT.2018.2875472","url":"https://dblp.org/rec/journals/iotj/AmanTSCA19"}, "url":"URL#1999251" }, { "@score":"1", "@id":"1999252", "info":{"authors":{"author":[{"@pid":"49/9668","text":"Dimitrios Amaxilatis"},{"@pid":"142/2934","text":"Dennis Boldt"},{"@pid":"66/4861","text":"Johnny Choque"},{"@pid":"155/7567","text":"Luis Díez 0002"},{"@pid":"116/5023","text":"Etienne Gandrille"},{"@pid":"85/2600","text":"Sokratis Kartakis"},{"@pid":"85/2924","text":"Georgios Mylonas"},{"@pid":"91/10926","text":"Lasse Steenbock Vestergaard"}]},"title":"Advancing Experimentation-as-a-Service Through Urban IoT Experiments.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"2563-2572","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/AmaxilatisBCDGK19","doi":"10.1109/JIOT.2018.2871766","ee":"https://doi.org/10.1109/JIOT.2018.2871766","url":"https://dblp.org/rec/journals/iotj/AmaxilatisBCDGK19"}, "url":"URL#1999252" }, { "@score":"1", "@id":"1999253", "info":{"authors":{"author":[{"@pid":"216/5926","text":"Jonggwan An"},{"@pid":"65/1875","text":"Franck Le Gall"},{"@pid":"14/5753","text":"Jaeho Kim"},{"@pid":"17/319","text":"Jaeseok Yun"},{"@pid":"217/3681","text":"Jaeyoung Hwang"},{"@pid":"60/11171","text":"Martin Bauer 0001"},{"@pid":"145/8777","text":"Mengxuan Zhao"},{"@pid":"137/1341","text":"Jaeseung Song"}]},"title":"Toward Global IoT-Enabled Smart Cities Interworking Using Adaptive Semantic Adapter.","venue":"IEEE Internet Things J.","volume":"6","number":"3","pages":"5753-5765","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/AnGKYHBZS19","doi":"10.1109/JIOT.2019.2905275","ee":"https://doi.org/10.1109/JIOT.2019.2905275","url":"https://dblp.org/rec/journals/iotj/AnGKYHBZS19"}, "url":"URL#1999253" }, { "@score":"1", "@id":"1999254", "info":{"authors":{"author":[{"@pid":"47/3175","text":"Jian An"},{"@pid":"229/2121","text":"Danwei Liang"},{"@pid":"65/1767","text":"Xiaolin Gui"},{"@pid":"01/6647","text":"He Yang"},{"@pid":"229/1946","text":"Ruowei Gui"},{"@pid":"69/1798","text":"Xin He"}]},"title":"Crowdsensing Quality Control and Grading Evaluation Based on a Two-Consensus Blockchain.","venue":"IEEE Internet Things J.","volume":"6","number":"3","pages":"4711-4718","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/AnLGYGH19","doi":"10.1109/JIOT.2018.2883835","ee":"https://doi.org/10.1109/JIOT.2018.2883835","url":"https://dblp.org/rec/journals/iotj/AnLGYGH19"}, "url":"URL#1999254" }, { "@score":"1", "@id":"1999255", "info":{"authors":{"author":[{"@pid":"255/2384","text":"Mohamed G. Anany"},{"@pid":"145/1216","text":"Mahmoud M. Elmesalawy"},{"@pid":"218/5929","text":"Ahmed M. Abd El-Haleem"}]},"title":"Matching Game-Based Cell Association in Multi-RAT HetNet Considering Device Requirements.","venue":"IEEE Internet Things J.","volume":"6","number":"6","pages":"9774-9782","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/AnanyEE19","doi":"10.1109/JIOT.2019.2931448","ee":"https://doi.org/10.1109/JIOT.2019.2931448","url":"https://dblp.org/rec/journals/iotj/AnanyEE19"}, "url":"URL#1999255" }, { "@score":"1", "@id":"1999256", "info":{"authors":{"author":[{"@pid":"173/5087","text":"Pilar Andres-Maldonado"},{"@pid":"70/10609","text":"Mads Lauridsen"},{"@pid":"59/3015","text":"Pablo Ameigeiras"},{"@pid":"44/4135","text":"Juan M. López-Soler"}]},"title":"Analytical Modeling and Experimental Validation of NB-IoT Device Energy Consumption.","venue":"IEEE Internet Things J.","volume":"6","number":"3","pages":"5691-5701","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/Andres-Maldonado19","doi":"10.1109/JIOT.2019.2904802","ee":"https://doi.org/10.1109/JIOT.2019.2904802","url":"https://dblp.org/rec/journals/iotj/Andres-Maldonado19"}, "url":"URL#1999256" }, { "@score":"1", "@id":"1999257", "info":{"authors":{"author":[{"@pid":"173/5087","text":"Pilar Andres-Maldonado"},{"@pid":"59/3015","text":"Pablo Ameigeiras"},{"@pid":"133/4986","text":"Jonathan Prados-Garzon"},{"@pid":"93/8072","text":"Jorge Navarro-Ortiz"},{"@pid":"44/4135","text":"Juan M. López-Soler"}]},"title":"An Analytical Performance Evaluation Framework for NB-IoT.","venue":"IEEE Internet Things J.","volume":"6","number":"4","pages":"7232-7240","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/Andres-Maldonado19a","doi":"10.1109/JIOT.2019.2915349","ee":"https://doi.org/10.1109/JIOT.2019.2915349","url":"https://dblp.org/rec/journals/iotj/Andres-Maldonado19a"}, "url":"URL#1999257" }, { "@score":"1", "@id":"1999258", "info":{"authors":{"author":[{"@pid":"169/2910","text":"Shaik Shabana Anjum"},{"@pid":"93/11067","text":"Rafidah Md Noor"},{"@pid":"33/10425","text":"Mohammad Hossein Anisi"},{"@pid":"182/7695","text":"Ismail Bin Ahmedy"},{"@pid":"202/1024","text":"Fazidah Othman"},{"@pid":"81/6019-2","text":"Muhammad Alam 0002"},{"@pid":"69/821","text":"Muhammad Khurram Khan"}]},"title":"Energy Management in RFID-Sensor Networks: Taxonomy and Challenges.","venue":"IEEE Internet Things J.","volume":"6","number":"1","pages":"250-266","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/AnjumNAAOAK19","doi":"10.1109/JIOT.2017.2728000","ee":"https://doi.org/10.1109/JIOT.2017.2728000","url":"https://dblp.org/rec/journals/iotj/AnjumNAAOAK19"}, "url":"URL#1999258" }, { "@score":"1", "@id":"1999259", "info":{"authors":{"author":[{"@pid":"226/9332","text":"James Adu Ansere"},{"@pid":"32/4821","text":"Guangjie Han"},{"@pid":"w/HaoWang47","text":"Hao Wang 0047"},{"@pid":"61/7024","text":"Chang Choi"},{"@pid":"18/8282","text":"Celimuge Wu"}]},"title":"A Reliable Energy Efficient Dynamic Spectrum Sensing for Cognitive Radio IoT Networks.","venue":"IEEE Internet Things J.","volume":"6","number":"4","pages":"6748-6759","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/AnsereHWCW19","doi":"10.1109/JIOT.2019.2911109","ee":"https://doi.org/10.1109/JIOT.2019.2911109","url":"https://dblp.org/rec/journals/iotj/AnsereHWCW19"}, "url":"URL#1999259" }, { "@score":"1", "@id":"1999260", "info":{"authors":{"author":[{"@pid":"218/8785","text":"Eirini Anthi"},{"@pid":"167/1910","text":"Lowri Williams"},{"@pid":"251/1450","text":"Malgorzata Slowinska"},{"@pid":"47/3584","text":"George Theodorakopoulos 0001"},{"@pid":"80/305","text":"Pete Burnap"}]},"title":"A Supervised Intrusion Detection System for Smart Home IoT Devices.","venue":"IEEE Internet Things J.","volume":"6","number":"5","pages":"9042-9053","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/AnthiWSTB19","doi":"10.1109/JIOT.2019.2926365","ee":"https://doi.org/10.1109/JIOT.2019.2926365","url":"https://dblp.org/rec/journals/iotj/AnthiWSTB19"}, "url":"URL#1999260" }, { "@score":"1", "@id":"1999261", "info":{"authors":{"author":[{"@pid":"207/5646","text":"Francesco Antoniazzi"},{"@pid":"75/8107","text":"Fabio Viola"}]},"title":"Building the Semantic Web of Things Through a Dynamic Ontology.","venue":"IEEE Internet Things J.","volume":"6","number":"6","pages":"10560-10579","year":"2019","type":"Journal Articles","access":"open","key":"journals/iotj/AntoniazziV19","doi":"10.1109/JIOT.2019.2939882","ee":"https://doi.org/10.1109/JIOT.2019.2939882","url":"https://dblp.org/rec/journals/iotj/AntoniazziV19"}, "url":"URL#1999261" }, { "@score":"1", "@id":"1999262", "info":{"authors":{"author":[{"@pid":"156/9492","text":"Muhammad Yeasir Arafat"},{"@pid":"15/3694","text":"Sangman Moh"}]},"title":"Localization and Clustering Based on Swarm Intelligence in UAV Networks for Emergency Communications.","venue":"IEEE Internet Things J.","volume":"6","number":"5","pages":"8958-8976","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/ArafatM19","doi":"10.1109/JIOT.2019.2925567","ee":"https://doi.org/10.1109/JIOT.2019.2925567","url":"https://dblp.org/rec/journals/iotj/ArafatM19"}, "url":"URL#1999262" }, { "@score":"1", "@id":"1999263", "info":{"authors":{"author":[{"@pid":"207/7932","text":"Sobia Arshad"},{"@pid":"22/10812","text":"Muhammad Awais Azam"},{"@pid":"48/8318","text":"Mubashir Husain Rehmani"},{"@pid":"11/9116","text":"Jonathan Loo"}]},"title":"Recent Advances in Information-Centric Networking-Based Internet of Things (ICN-IoT).","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"2128-2158","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/ArshadARL19","doi":"10.1109/JIOT.2018.2873343","ee":"https://doi.org/10.1109/JIOT.2018.2873343","url":"https://dblp.org/rec/journals/iotj/ArshadARL19"}, "url":"URL#1999263" }, { "@score":"1", "@id":"1999264", "info":{"authors":{"author":[{"@pid":"07/10238","text":"Alia Asheralieva"},{"@pid":"76/440","text":"Dusit Niyato"}]},"title":"Hierarchical Game-Theoretic and Reinforcement Learning Framework for Computational Offloading in UAV-Enabled Mobile Edge Computing Networks With Multiple Service Providers.","venue":"IEEE Internet Things J.","volume":"6","number":"5","pages":"8753-8769","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/AsheralievaN19","doi":"10.1109/JIOT.2019.2923702","ee":"https://doi.org/10.1109/JIOT.2019.2923702","url":"https://dblp.org/rec/journals/iotj/AsheralievaN19"}, "url":"URL#1999264" }, { "@score":"1", "@id":"1999265", "info":{"authors":{"author":[{"@pid":"203/8934","text":"Derek Kwaku Pobi Asiedu"},{"@pid":"01/1272","text":"Hoon Lee"},{"@pid":"98/214","text":"Kyoung-Jae Lee"}]},"title":"Simultaneous Wireless Information and Power Transfer for Decode-and-Forward Multihop Relay Systems in Energy-Constrained IoT Networks.","venue":"IEEE Internet Things J.","volume":"6","number":"6","pages":"9413-9426","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/AsieduLL19","doi":"10.1109/JIOT.2019.2937090","ee":"https://doi.org/10.1109/JIOT.2019.2937090","url":"https://dblp.org/rec/journals/iotj/AsieduLL19"}, "url":"URL#1999265" }, { "@score":"1", "@id":"1999266", "info":{"authors":{"author":[{"@pid":"213/7481","text":"Md. Asif-Ur-Rahman"},{"@pid":"213/7677","text":"Fariha Afsana"},{"@pid":"20/10612","text":"Mufti Mahmud"},{"@pid":"80/10014","text":"M. Shamim Kaiser"},{"@pid":"370/3433","text":"Muhammad R. Ahmed"},{"@pid":"137/9941","text":"Omprakash Kaiwartya"},{"@pid":"243/6428","text":"Anne James-Taylor"}]},"title":"Toward a Heterogeneous Mist, Fog, and Cloud-Based Framework for the Internet of Healthcare Things.","venue":"IEEE Internet Things J.","volume":"6","number":"3","pages":"4049-4062","year":"2019","type":"Journal Articles","access":"open","key":"journals/iotj/Asif-Ur-RahmanA19","doi":"10.1109/JIOT.2018.2876088","ee":"https://doi.org/10.1109/JIOT.2018.2876088","url":"https://dblp.org/rec/journals/iotj/Asif-Ur-RahmanA19"}, "url":"URL#1999266" }, { "@score":"1", "@id":"1999267", "info":{"authors":{"author":[{"@pid":"235/1259","text":"Tharindu Athauda"},{"@pid":"24/1691","text":"Nemai Chandra Karmakar"}]},"title":"The Realization of Chipless RFID Resonator for Multiple Physical Parameter Sensing.","venue":"IEEE Internet Things J.","volume":"6","number":"3","pages":"5387-5396","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/AthaudaK19","doi":"10.1109/JIOT.2019.2901470","ee":"https://doi.org/10.1109/JIOT.2019.2901470","url":"https://dblp.org/rec/journals/iotj/AthaudaK19"}, "url":"URL#1999267" }, { "@score":"1", "@id":"1999268", "info":{"authors":{"author":[{"@pid":"42/4582","text":"Luigi Atzori"},{"@pid":"25/642","text":"Claudia Campolo"},{"@pid":"74/4158","text":"Bin Da"},{"@pid":"122/5644","text":"Roberto Girau"},{"@pid":"86/4818","text":"Antonio Iera"},{"@pid":"66/6239","text":"Giacomo Morabito"},{"@pid":"218/9709","text":"Salvatore Quattropani"}]},"title":"Enhancing Identifier/Locator Splitting Through Social Internet of Things.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"2974-2985","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/AtzoriCDGIMQ19","doi":"10.1109/JIOT.2018.2877756","ee":"https://doi.org/10.1109/JIOT.2018.2877756","url":"https://dblp.org/rec/journals/iotj/AtzoriCDGIMQ19"}, "url":"URL#1999268" }, { "@score":"1", "@id":"1999269", "info":{"authors":{"author":[{"@pid":"42/4582","text":"Luigi Atzori"},{"@pid":"122/5644","text":"Roberto Girau"},{"@pid":"92/11051","text":"Virginia Pilloni"},{"@pid":"198/7894","text":"Marco Uras"}]},"title":"Assignment of Sensing Tasks to IoT Devices: Exploitation of a Social Network of Objects.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"2679-2692","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/AtzoriGPU19","doi":"10.1109/JIOT.2018.2873501","ee":"https://doi.org/10.1109/JIOT.2018.2873501","url":"https://dblp.org/rec/journals/iotj/AtzoriGPU19"}, "url":"URL#1999269" }, { "@score":"1", "@id":"1999270", "info":{"authors":{"author":[{"@pid":"18/9965","text":"Muhammad Ajmal Azad"},{"@pid":"13/9586","text":"Samiran Bag"},{"@pid":"03/6831","text":"Simon Parkinson"},{"@pid":"37/2189-1","text":"Feng Hao 0001"}]},"title":"TrustVote: Privacy-Preserving Node Ranking in Vehicular Networks.","venue":"IEEE Internet Things J.","volume":"6","number":"4","pages":"5878-5891","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/AzadBPH19","doi":"10.1109/JIOT.2018.2880839","ee":"https://doi.org/10.1109/JIOT.2018.2880839","url":"https://dblp.org/rec/journals/iotj/AzadBPH19"}, "url":"URL#1999270" }, { "@score":"1", "@id":"1999271", "info":{"authors":{"author":[{"@pid":"80/3639-4","text":"Muhammad Awais 0004"},{"@pid":"26/7757","text":"Ashfaq Ahmed"},{"@pid":"140/0335","text":"Syed Azhar Ali Zaidi"},{"@pid":"52/1095-1","text":"Muhammad Naeem 0001"},{"@pid":"10/7465","text":"Waleed Ejaz"},{"@pid":"97/4028","text":"Alagan Anpalagan"}]},"title":"Resource Management in Multicloud IoT Radio Access Network.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"3014-3023","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/AzamAZNEA19","doi":"10.1109/JIOT.2018.2878511","ee":"https://doi.org/10.1109/JIOT.2018.2878511","url":"https://dblp.org/rec/journals/iotj/AzamAZNEA19"}, "url":"URL#1999271" }, { "@score":"1", "@id":"1999272", "info":{"authors":{"author":[{"@pid":"193/0665","text":"Arif Abdul Aziz"},{"@pid":"193/0669","text":"Lorenz Ginting"},{"@pid":"195/5967","text":"Dedi Setiawan"},{"@pid":"248/1028","text":"Je Hyeon Park"},{"@pid":"224/7539","text":"Nguyen Minh Tran"},{"@pid":"233/0505","text":"Gyu Yang Yeon"},{"@pid":"86/1369","text":"Dong In Kim"},{"@pid":"38/2326","text":"Kae Won Choi"}]},"title":"Battery-Less Location Tracking for Internet of Things: Simultaneous Wireless Power Transfer and Positioning.","venue":"IEEE Internet Things J.","volume":"6","number":"5","pages":"9147-9164","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/AzizGSPTYKC19","doi":"10.1109/JIOT.2019.2928313","ee":"https://doi.org/10.1109/JIOT.2019.2928313","url":"https://dblp.org/rec/journals/iotj/AzizGSPTYKC19"}, "url":"URL#1999272" }, { "@score":"1", "@id":"1999273", "info":{"authors":{"author":[{"@pid":"137/9417","text":"Mohammadreza Baharani"},{"@pid":"188/8751","text":"Mehrdad Biglarbegian"},{"@pid":"119/5550","text":"Babak Parkhideh"},{"@pid":"47/3258","text":"Hamed Tabkhi"}]},"title":"Real-Time Deep Learning at the Edge for Scalable Reliability Modeling of Si-MOSFET Power Electronics Converters.","venue":"IEEE Internet Things J.","volume":"6","number":"5","pages":"7375-7385","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/BaharaniBPT19","doi":"10.1109/JIOT.2019.2896174","ee":"https://doi.org/10.1109/JIOT.2019.2896174","url":"https://dblp.org/rec/journals/iotj/BaharaniBPT19"}, "url":"URL#1999273" }, { "@score":"1", "@id":"1999274", "info":{"authors":{"author":[{"@pid":"71/1535-1","text":"Lin Bai 0001"},{"@pid":"80/6756","text":"Ismail Güvenç"},{"@pid":"47/2918","text":"Quan Yu"},{"@pid":"10/4661-1","text":"Wei Zhang 0001"}]},"title":"Guest Editorial Special Issue on Unmanned Aerial Vehicles Over Internet of Things.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"1636-1639","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/BaiGYZ19","doi":"10.1109/JIOT.2019.2908444","ee":"https://doi.org/10.1109/JIOT.2019.2908444","url":"https://dblp.org/rec/journals/iotj/BaiGYZ19"}, "url":"URL#1999274" }, { "@score":"1", "@id":"1999275", "info":{"authors":{"author":[{"@pid":"213/0983","text":"Fatemeh Banaie"},{"@pid":"m/JVMisic","text":"Jelena V. Misic"},{"@pid":"62/76","text":"Vojislav B. Misic"},{"@pid":"y/MHYaghmaee","text":"Mohammad Hossein Yaghmaee Moghaddam"},{"@pid":"82/8788","text":"Seyed-Amin Hosseini-Seno"}]},"title":"Performance Analysis of Multithreaded IoT Gateway.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"3143-3155","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/BanaieMMMH19","doi":"10.1109/JIOT.2018.2879467","ee":"https://doi.org/10.1109/JIOT.2018.2879467","url":"https://dblp.org/rec/journals/iotj/BanaieMMMH19"}, "url":"URL#1999275" }, { "@score":"1", "@id":"1999276", "info":{"authors":{"author":[{"@pid":"05/5654-1","text":"Soumya Banerjee 0001"},{"@pid":"121/3893","text":"Vanga Odelu"},{"@pid":"39/871","text":"Ashok Kumar Das"},{"@pid":"150/2292","text":"Jangirala Srinivas"},{"@pid":"04/8395","text":"Neeraj Kumar 0001"},{"@pid":"80/4122","text":"Samiran Chattopadhyay"},{"@pid":"c/KimKwangRaymondChoo","text":"Kim-Kwang Raymond Choo"}]},"title":"A Provably Secure and Lightweight Anonymous User Authenticated Session Key Exchange Scheme for Internet of Things Deployment.","venue":"IEEE Internet Things J.","volume":"6","number":"5","pages":"8739-8752","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/BanerjeeODSKCC19","doi":"10.1109/JIOT.2019.2923373","ee":"https://doi.org/10.1109/JIOT.2019.2923373","url":"https://dblp.org/rec/journals/iotj/BanerjeeODSKCC19"}, "url":"URL#1999276" }, { "@score":"1", "@id":"1999277", "info":{"authors":{"author":[{"@pid":"51/7802","text":"Xuecai Bao"},{"@pid":"62/5181-2","text":"Hao Liang 0002"},{"@pid":"87/2948-6","text":"Yuan Liu 0006"},{"@pid":"19/1590","text":"Fenghui Zhang"}]},"title":"A Stochastic Game Approach for Collaborative Beamforming in SDN-Based Energy Harvesting Wireless Sensor Networks.","venue":"IEEE Internet Things J.","volume":"6","number":"6","pages":"9583-9595","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/BaoLLZ19","doi":"10.1109/JIOT.2019.2930073","ee":"https://doi.org/10.1109/JIOT.2019.2930073","url":"https://dblp.org/rec/journals/iotj/BaoLLZ19"}, "url":"URL#1999277" }, { "@score":"1", "@id":"1999278", "info":{"authors":{"author":[{"@pid":"230/0669","text":"Luca Barbierato"},{"@pid":"188/1040","text":"Abouzar Estebsari"},{"@pid":"119/5366","text":"Enrico Pons"},{"@pid":"133/7159","text":"Marco Pau"},{"@pid":"21/8362","text":"Fabio Salassa"},{"@pid":"79/2812","text":"Marco Ghirardi"},{"@pid":"51/11157","text":"Edoardo Patti"}]},"title":"A Distributed IoT Infrastructure to Test and Deploy Real-Time Demand Response in Smart Grids.","venue":"IEEE Internet Things J.","volume":"6","number":"1","pages":"1136-1146","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/BarbieratoEPPSG19","doi":"10.1109/JIOT.2018.2867511","ee":"https://doi.org/10.1109/JIOT.2018.2867511","url":"https://dblp.org/rec/journals/iotj/BarbieratoEPPSG19"}, "url":"URL#1999278" }, { "@score":"1", "@id":"1999279", "info":{"authors":{"author":[{"@pid":"34/10618","text":"Giulio Bartoli"},{"@pid":"51/3942","text":"Romano Fantacci"},{"@pid":"10/2191","text":"Dania Marabissi"}]},"title":"Resource Allocation Approaches for Two-Tiers Machine-to-Machine Communications in an Interference Limited Environment.","venue":"IEEE Internet Things J.","volume":"6","number":"5","pages":"9112-9122","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/BartoliFM19","doi":"10.1109/JIOT.2019.2927812","ee":"https://doi.org/10.1109/JIOT.2019.2927812","url":"https://dblp.org/rec/journals/iotj/BartoliFM19"}, "url":"URL#1999279" }, { "@score":"1", "@id":"1999280", "info":{"authors":{"author":[{"@pid":"246/3221","text":"Thomas Becnel"},{"@pid":"255/2204","text":"Kyle Tingey"},{"@pid":"64/1641","text":"Jonathan Whitaker"},{"@pid":"246/3249","text":"Tofigh Sayahi"},{"@pid":"255/2322","text":"Katrina Lê"},{"@pid":"153/7571","text":"Pascal Goffin"},{"@pid":"70/815","text":"Anthony Butterfield"},{"@pid":"206/7270","text":"Kerry Kelly"},{"@pid":"48/9513","text":"Pierre-Emmanuel Gaillardon"}]},"title":"A Distributed Low-Cost Pollution Monitoring Platform.","venue":"IEEE Internet Things J.","volume":"6","number":"6","pages":"10738-10748","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/BecnelTWSLGBKG19","doi":"10.1109/JIOT.2019.2941374","ee":"https://doi.org/10.1109/JIOT.2019.2941374","url":"https://dblp.org/rec/journals/iotj/BecnelTWSLGBKG19"}, "url":"URL#1999280" }, { "@score":"1", "@id":"1999281", "info":{"authors":{"author":[{"@pid":"227/8707","text":"Trupti Mayee Behera"},{"@pid":"153/5518","text":"Sushanta Kumar Mohapatra"},{"@pid":"227/8676","text":"Umesh Chandra Samal"},{"@pid":"01/3984","text":"Mohammad S. Khan"},{"@pid":"92/4586","text":"Mahmoud Daneshmand"},{"@pid":"43/8647","text":"Amir H. Gandomi"}]},"title":"Residual Energy-Based Cluster-Head Selection in WSNs for IoT Application.","venue":"IEEE Internet Things J.","volume":"6","number":"3","pages":"5132-5139","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/BeheraMSKDG19","doi":"10.1109/JIOT.2019.2897119","ee":"https://doi.org/10.1109/JIOT.2019.2897119","url":"https://dblp.org/rec/journals/iotj/BeheraMSKDG19"}, "url":"URL#1999281" }, { "@score":"1", "@id":"1999282", "info":{"authors":{"author":[{"@pid":"209/1906","text":"Nazli Ahmad Khan Beigi"},{"@pid":"86/1647","text":"Mohammad Reza Soleymani"}]},"title":"Ultra-Reliable Energy-Efficient Cooperative Scheme in Asynchronous NOMA With Correlated Sources.","venue":"IEEE Internet Things J.","volume":"6","number":"5","pages":"7849-7863","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/BeigiS19","doi":"10.1109/JIOT.2019.2911434","ee":"https://doi.org/10.1109/JIOT.2019.2911434","url":"https://dblp.org/rec/journals/iotj/BeigiS19"}, "url":"URL#1999282" }, { "@score":"1", "@id":"1999283", "info":{"authors":{"author":[{"@pid":"89/10398","text":"Jose A. Belloch"},{"@pid":"b/JoseMBadia","text":"José M. Badía"},{"@pid":"88/501","text":"Francisco D. Igual"},{"@pid":"95/7644","text":"Maximo Cobos"}]},"title":"Practical Considerations for Acoustic Source Localization in the IoT Era: Platforms, Energy Efficiency, and Performance.","venue":"IEEE Internet Things J.","volume":"6","number":"3","pages":"5068-5079","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/BellochBIC19","doi":"10.1109/JIOT.2019.2895742","ee":"https://doi.org/10.1109/JIOT.2019.2895742","url":"https://dblp.org/rec/journals/iotj/BellochBIC19"}, "url":"URL#1999283" }, { "@score":"1", "@id":"1999284", "info":{"authors":{"author":[{"@pid":"176/5231","text":"Paul N. Beuchat"},{"@pid":"166/3598","text":"Henrik Hesse"},{"@pid":"82/11044","text":"Alexander Domahidi"},{"@pid":"51/2754","text":"John Lygeros"}]},"title":"Enabling Optimization-Based Localization for IoT Devices.","venue":"IEEE Internet Things J.","volume":"6","number":"3","pages":"5639-5650","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/BeuchatHDL19","doi":"10.1109/JIOT.2019.2904559","ee":"https://doi.org/10.1109/JIOT.2019.2904559","url":"https://dblp.org/rec/journals/iotj/BeuchatHDL19"}, "url":"URL#1999284" }, { "@score":"1", "@id":"1999285", "info":{"authors":{"author":[{"@pid":"240/6994","text":"Sriramya Bhamidipati"},{"@pid":"119/5434","text":"Grace Xingxin Gao"}]},"title":"Locating Multiple GPS Jammers Using Networked UAVs.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"1816-1828","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/BhamidipatiG19","doi":"10.1109/JIOT.2019.2896262","ee":"https://doi.org/10.1109/JIOT.2019.2896262","url":"https://dblp.org/rec/journals/iotj/BhamidipatiG19"}, "url":"URL#1999285" }, { "@score":"1", "@id":"1999286", "info":{"authors":{"author":[{"@pid":"54/7323","text":"Valentina Bianchi"},{"@pid":"209/0101","text":"Marco Bassoli"},{"@pid":"215/8356","text":"Gianfranco Lombardo"},{"@pid":"164/4696","text":"Paolo Fornacciari"},{"@pid":"92/1279","text":"Monica Mordonini"},{"@pid":"73/1503","text":"Ilaria De Munari"}]},"title":"IoT Wearable Sensor and Deep Learning: An Integrated Approach for Personalized Human Activity Recognition in a Smart Home Environment.","venue":"IEEE Internet Things J.","volume":"6","number":"5","pages":"8553-8562","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/BianchiBLFMM19","doi":"10.1109/JIOT.2019.2920283","ee":"https://doi.org/10.1109/JIOT.2019.2920283","url":"https://dblp.org/rec/journals/iotj/BianchiBLFMM19"}, "url":"URL#1999286" }, { "@score":"1", "@id":"1999287", "info":{"authors":{"author":[{"@pid":"96/8870","text":"Laisa Caroline Costa De Biase"},{"@pid":"212/3657","text":"Pablo C. Calcina-Ccori"},{"@pid":"201/3861","text":"Geovane Fedrecheski"},{"@pid":"243/6453","text":"Gabriel M. Duarte"},{"@pid":"243/6471","text":"Phillipe Soares Santos Rangel"},{"@pid":"31/690","text":"Marcelo Knörich Zuffo"}]},"title":"Swarm Economy: A Model for Transactions in a Distributed and Organic IoT Platform.","venue":"IEEE Internet Things J.","volume":"6","number":"3","pages":"4561-4572","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/BiaseCFDRZ19","doi":"10.1109/JIOT.2018.2886069","ee":"https://doi.org/10.1109/JIOT.2018.2886069","url":"https://dblp.org/rec/journals/iotj/BiaseCFDRZ19"}, "url":"URL#1999287" }, { "@score":"1", "@id":"1999288", "info":{"authors":{"author":[{"@pid":"201/1235","text":"Sujit Biswas"},{"@pid":"54/7398","text":"Kashif Sharif"},{"@pid":"73/237-1","text":"Fan Li 0001"},{"@pid":"201/1271","text":"Boubakr Nour"},{"@pid":"w/YuWang3","text":"Yu Wang 0003"}]},"title":"A Scalable Blockchain Framework for Secure Transactions in IoT.","venue":"IEEE Internet Things J.","volume":"6","number":"3","pages":"4650-4659","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/BiswasSLNW19","doi":"10.1109/JIOT.2018.2874095","ee":"https://doi.org/10.1109/JIOT.2018.2874095","url":"https://dblp.org/rec/journals/iotj/BiswasSLNW19"}, "url":"URL#1999288" }, { "@score":"1", "@id":"1999289", "info":{"authors":{"author":[{"@pid":"52/10351","text":"Beatriz Blanco-Filgueira"},{"@pid":"184/4333","text":"Daniel García-Lesta"},{"@pid":"225/4840","text":"Mauro Fernández-Sanjurjo"},{"@pid":"b/VMBrea","text":"Víctor M. Brea 0001"},{"@pid":"17/425","text":"Paula López 0001"}]},"title":"Deep Learning-Based Multiple Object Visual Tracking on Embedded System for IoT and Mobile Edge Computing Applications.","venue":"IEEE Internet Things J.","volume":"6","number":"3","pages":"5423-5431","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/Blanco-Filgueira19","doi":"10.1109/JIOT.2019.2902141","ee":"https://doi.org/10.1109/JIOT.2019.2902141","url":"https://dblp.org/rec/journals/iotj/Blanco-Filgueira19"}, "url":"URL#1999289" }, { "@score":"1", "@id":"1999290", "info":{"authors":{"author":[{"@pid":"190/4211","text":"Kwasi Boakye-Boateng"},{"@pid":"126/1477","text":"Eric Kuada"},{"@pid":"190/3953","text":"Emmanuel Antwi-Boasiako"},{"@pid":"240/7177","text":"Emmanuel Djaba"}]},"title":"Encryption Protocol for Resource-Constrained Devices in Fog-Based IoT Using One-Time Pads.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"3925-3933","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/Boakye-BoatengK19","doi":"10.1109/JIOT.2019.2893172","ee":"https://doi.org/10.1109/JIOT.2019.2893172","url":"https://dblp.org/rec/journals/iotj/Boakye-BoatengK19"}, "url":"URL#1999290" }, { "@score":"1", "@id":"1999291", "info":{"authors":{"author":[{"@pid":"240/7044","text":"Juan S. Botero-Valencia"},{"@pid":"240/6937","text":"Luis Castano-Londono"},{"@pid":"234/0387","text":"David Marquez-Viloria"},{"@pid":"240/7178","text":"Mateo Rico-Garcia"}]},"title":"Data Reduction in a Low-Cost Environmental Monitoring System Based on LoRa for WSN.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"3024-3030","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/Botero-valencia19","doi":"10.1109/JIOT.2018.2878528","ee":"https://doi.org/10.1109/JIOT.2018.2878528","url":"https://dblp.org/rec/journals/iotj/Botero-valencia19"}, "url":"URL#1999291" }, { "@score":"1", "@id":"1999292", "info":{"authors":{"author":[{"@pid":"42/4446","text":"Lorenzo Bracciale"},{"@pid":"55/3809","text":"Pierpaolo Loreti"},{"@pid":"57/3273","text":"Andrea Detti"},{"@pid":"153/1279","text":"Riccardo Paolillo"},{"@pid":"28/6232","text":"Nicola Blefari-Melazzi"}]},"title":"Lightweight Named Object: An ICN-Based Abstraction for IoT Device Programming and Management.","venue":"IEEE Internet Things J.","volume":"6","number":"3","pages":"5029-5039","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/BraccialeLDPB19","doi":"10.1109/JIOT.2019.2894969","ee":"https://doi.org/10.1109/JIOT.2019.2894969","url":"https://dblp.org/rec/journals/iotj/BraccialeLDPB19"}, "url":"URL#1999292" }, { "@score":"1", "@id":"1999293", "info":{"authors":{"author":[{"@pid":"224/4384","text":"Andrei Bytes"},{"@pid":"171/1020","text":"Sridhar Adepu"},{"@pid":"z/JianyingZhou","text":"Jianying Zhou 0001"}]},"title":"Towards Semantic Sensitive Feature Profiling of IoT Devices.","venue":"IEEE Internet Things J.","volume":"6","number":"5","pages":"8056-8064","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/BytesAZ19","doi":"10.1109/JIOT.2019.2903739","ee":"https://doi.org/10.1109/JIOT.2019.2903739","url":"https://dblp.org/rec/journals/iotj/BytesAZ19"}, "url":"URL#1999293" }, { "@score":"1", "@id":"1999294", "info":{"authors":{"author":[{"@pid":"183/5417","text":"Víctor Caballero"},{"@pid":"29/6011","text":"David Vernet"},{"@pid":"11/1632","text":"Agustín Zaballos"}]},"title":"Social Internet of Energy - A New Paradigm for Demand Side Management.","venue":"IEEE Internet Things J.","volume":"6","number":"6","pages":"9853-9867","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/CaballeroVZ19","doi":"10.1109/JIOT.2019.2932508","ee":"https://doi.org/10.1109/JIOT.2019.2932508","url":"https://dblp.org/rec/journals/iotj/CaballeroVZ19"}, "url":"URL#1999294" }, { "@score":"1", "@id":"1999295", "info":{"authors":{"author":[{"@pid":"225/4661","text":"Bill Yang Cai"},{"@pid":"67/4110","text":"Ricardo Alvarez"},{"@pid":"236/4901","text":"Michelle Sit"},{"@pid":"121/4452","text":"Fábio Duarte"},{"@pid":"00/5561","text":"Carlo Ratti"}]},"title":"Deep Learning-Based Video System for Accurate and Real-Time Parking Measurement.","venue":"IEEE Internet Things J.","volume":"6","number":"5","pages":"7693-7701","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/CaiASDR19","doi":"10.1109/JIOT.2019.2902887","ee":"https://doi.org/10.1109/JIOT.2019.2902887","url":"https://dblp.org/rec/journals/iotj/CaiASDR19"}, "url":"URL#1999295" }, { "@score":"1", "@id":"1999296", "info":{"authors":{"author":[{"@pid":"98/6343","text":"Chao Cai"},{"@pid":"20/10116","text":"Menglan Hu"},{"@pid":"243/6476","text":"Doudou Cao"},{"@pid":"75/8969","text":"Xiaoqiang Ma"},{"@pid":"91/5508","text":"Qingxia Li"},{"@pid":"l/JiangchuanLiu","text":"Jiangchuan Liu"}]},"title":"Self-Deployable Indoor Localization With Acoustic-Enabled IoT Devices Exploiting Participatory Sensing.","venue":"IEEE Internet Things J.","volume":"6","number":"3","pages":"5297-5311","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/CaiHCMLL19","doi":"10.1109/JIOT.2019.2900524","ee":"https://doi.org/10.1109/JIOT.2019.2900524","url":"https://dblp.org/rec/journals/iotj/CaiHCMLL19"}, "url":"URL#1999296" }, { "@score":"1", "@id":"1999297", "info":{"authors":{"author":[{"@pid":"98/6343","text":"Chao Cai"},{"@pid":"20/10116","text":"Menglan Hu"},{"@pid":"75/8969","text":"Xiaoqiang Ma"},{"@pid":"41/7760-1","text":"Kai Peng 0001"},{"@pid":"l/JiangchuanLiu","text":"Jiangchuan Liu"}]},"title":"Accurate Ranging on Acoustic-Enabled IoT Devices.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"3164-3174","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/CaiHMPL19","doi":"10.1109/JIOT.2018.2879371","ee":"https://doi.org/10.1109/JIOT.2018.2879371","url":"https://dblp.org/rec/journals/iotj/CaiHMPL19"}, "url":"URL#1999297" }, { "@score":"1", "@id":"1999298", "info":{"authors":{"author":[{"@pid":"177/6734","text":"Songfu Cai"},{"@pid":"68/4401","text":"Vincent K. N. Lau"}]},"title":"Cloud-Assisted Stabilization of Large-Scale Multiagent Systems by Over-the-Air-Fusion of IoT Sensors.","venue":"IEEE Internet Things J.","volume":"6","number":"5","pages":"7748-7759","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/CaiL19","doi":"10.1109/JIOT.2019.2901576","ee":"https://doi.org/10.1109/JIOT.2019.2901576","url":"https://dblp.org/rec/journals/iotj/CaiL19"}, "url":"URL#1999298" }, { "@score":"1", "@id":"1999299", "info":{"authors":{"author":[{"@pid":"207/0589","text":"Ândrei Camponogara"},{"@pid":"p/HVincentPoor","text":"H. Vincent Poor"},{"@pid":"47/3200","text":"Moisés Vidal Ribeiro"}]},"title":"The Complete and Incomplete Low-Bit-Rate Hybrid PLC/Wireless Channel Models: Physical Layer Security Analyses.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"2760-2769","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/CamponogaraPR19","doi":"10.1109/JIOT.2018.2874377","ee":"https://doi.org/10.1109/JIOT.2018.2874377","url":"https://dblp.org/rec/journals/iotj/CamponogaraPR19"}, "url":"URL#1999299" }, { "@score":"1", "@id":"1999300", "info":{"authors":{"author":[{"@pid":"192/6421","text":"Sebastian Canovas-Carrasco"},{"@pid":"188/4539","text":"Ruben Martinez-Sandoval"},{"@pid":"16/1372","text":"Antonio-Javier García-Sánchez"},{"@pid":"19/1519","text":"Joan García-Haro"}]},"title":"Optimal Transmission Policy Derivation for IoNT Flow-Guided Nano-Sensor Networks.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"2288-2298","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/Canovas-Carrasco19","doi":"10.1109/JIOT.2019.2906015","ee":"https://doi.org/10.1109/JIOT.2019.2906015","url":"https://dblp.org/rec/journals/iotj/Canovas-Carrasco19"}, "url":"URL#1999300" }, { "@score":"1", "@id":"1999301", "info":{"authors":{"author":[{"@pid":"74/5570-2","text":"Yue Cao 0002"},{"@pid":"137/9941","text":"Omprakash Kaiwartya"},{"@pid":"19/6445","text":"Sinem Coleri Ergen"},{"@pid":"49/594","text":"Houbing Song"},{"@pid":"l/JaimeLloret","text":"Jaime Lloret 0001"},{"@pid":"82/6843-3","text":"Naveed Ahmad 0003"}]},"title":"Guest Editorial Special Issue on Toward Securing Internet of Connected Vehicles (IoV) From Virtual Vehicle Hijacking.","venue":"IEEE Internet Things J.","volume":"6","number":"4","pages":"5866-5869","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/CaoKESLA19","doi":"10.1109/JIOT.2019.2926608","ee":"https://doi.org/10.1109/JIOT.2019.2926608","url":"https://dblp.org/rec/journals/iotj/CaoKESLA19"}, "url":"URL#1999301" }, { "@score":"1", "@id":"1999302", "info":{"authors":{"author":[{"@pid":"154/5940","text":"Xiaowen Cao"},{"@pid":"90/4225-18","text":"Feng Wang 0018"},{"@pid":"37/5126-2","text":"Jie Xu 0002"},{"@pid":"60/2536-6","text":"Rui Zhang 0006"},{"@pid":"48/4914","text":"Shuguang Cui"}]},"title":"Joint Computation and Communication Cooperation for Energy-Efficient Mobile Edge Computing.","venue":"IEEE Internet Things J.","volume":"6","number":"3","pages":"4188-4200","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/CaoWXZC19","doi":"10.1109/JIOT.2018.2875246","ee":"https://doi.org/10.1109/JIOT.2018.2875246","url":"https://dblp.org/rec/journals/iotj/CaoWXZC19"}, "url":"URL#1999302" }, { "@score":"1", "@id":"1999303", "info":{"authors":{"author":[{"@pid":"40/429","text":"Jin Cao"},{"@pid":"50/2484-24","text":"Lei Yang 0024"},{"@pid":"c/JiannongCao","text":"Jiannong Cao 0001"}]},"title":"Revisiting Computation Partitioning in Future 5G-Based Edge Computing Environments.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"2427-2438","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/CaoYC19","doi":"10.1109/JIOT.2018.2869750","ee":"https://doi.org/10.1109/JIOT.2018.2869750","url":"https://dblp.org/rec/journals/iotj/CaoYC19"}, "url":"URL#1999303" }, { "@score":"1", "@id":"1999304", "info":{"authors":{"author":[{"@pid":"40/429","text":"Jin Cao"},{"@pid":"240/7001","text":"Pu Yu"},{"@pid":"74/1079","text":"Maode Ma"},{"@pid":"76/9788","text":"Weifeng Gao"}]},"title":"Fast Authentication and Data Transfer Scheme for Massive NB-IoT Devices in 3GPP 5G Network.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"1561-1575","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/CaoYMG19","doi":"10.1109/JIOT.2018.2846803","ee":"https://doi.org/10.1109/JIOT.2018.2846803","url":"https://dblp.org/rec/journals/iotj/CaoYMG19"}, "url":"URL#1999304" }, { "@score":"1", "@id":"1999305", "info":{"authors":{"author":[{"@pid":"40/429","text":"Jin Cao"},{"@pid":"240/7001","text":"Pu Yu"},{"@pid":"154/1744","text":"Xinyin Xiang"},{"@pid":"74/1079","text":"Maode Ma"},{"@pid":"l/HuiLi6","text":"Hui Li 0006"}]},"title":"Anti-Quantum Fast Authentication and Data Transmission Scheme for Massive Devices in 5G NB-IoT System.","venue":"IEEE Internet Things J.","volume":"6","number":"6","pages":"9794-9805","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/CaoYXML19","doi":"10.1109/JIOT.2019.2931724","ee":"https://doi.org/10.1109/JIOT.2019.2931724","url":"https://dblp.org/rec/journals/iotj/CaoYXML19"}, "url":"URL#1999305" }, { "@score":"1", "@id":"1999306", "info":{"authors":{"author":[{"@pid":"c/JiannongCao","text":"Jiannong Cao 0001"},{"@pid":"21/7829","text":"Deyu Zhang"},{"@pid":"14/8431","text":"Haibo Zhou"},{"@pid":"90/716","text":"Peng-Jun Wan"}]},"title":"Guest Editorial Emerging Computing Offloading for IoTs: Architectures, Technologies, and Applications.","venue":"IEEE Internet Things J.","volume":"6","number":"3","pages":"3987-3993","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/CaoZZW19","doi":"10.1109/JIOT.2019.2921217","ee":"https://doi.org/10.1109/JIOT.2019.2921217","url":"https://dblp.org/rec/journals/iotj/CaoZZW19"}, "url":"URL#1999306" }, { "@score":"1", "@id":"1999307", "info":{"authors":{"author":[{"@pid":"205/5542","text":"Lorenzo Carnevale"},{"@pid":"229/8465","text":"Rocco Salvatore Calabrò"},{"@pid":"70/8110","text":"Antonio Celesti"},{"@pid":"229/8442","text":"Antonino Leo"},{"@pid":"09/4135","text":"Maria Fazio"},{"@pid":"150/0117","text":"Placido Bramanti"},{"@pid":"70/450","text":"Massimo Villari"}]},"title":"Toward Improving Robotic-Assisted Gait Training: Can Big Data Analysis Help Us?","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"1419-1426","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/CarnevaleCCLFBV19","doi":"10.1109/JIOT.2018.2855937","ee":"https://doi.org/10.1109/JIOT.2018.2855937","url":"https://dblp.org/rec/journals/iotj/CarnevaleCCLFBV19"}, "url":"URL#1999307" }, { "@score":"1", "@id":"1999308", "info":{"authors":{"author":[{"@pid":"26/5203","text":"Encarnación Castillo"},{"@pid":"124/2754","text":"José F. Salmerón"},{"@pid":"184/4491","text":"Aniello Falco"},{"@pid":"184/4528","text":"Florin C. Loghin"},{"@pid":"13/6730","text":"Francisco J. Romero"},{"@pid":"01/4670","text":"Paolo Lugli"},{"@pid":"56/6723","text":"Diego Pedro Morales"},{"@pid":"182/5984","text":"Almudena Rivadeneyra"}]},"title":"An Optimized Measurement Algorithm for Gas Sensors Based on Carbon Nanotubes: Optimizing Sensor Performance and Hardware Resources.","venue":"IEEE Internet Things J.","volume":"6","number":"5","pages":"9140-9146","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/CastilloSFLRLMR19","doi":"10.1109/JIOT.2019.2928231","ee":"https://doi.org/10.1109/JIOT.2019.2928231","url":"https://dblp.org/rec/journals/iotj/CastilloSFLRLMR19"}, "url":"URL#1999308" }, { "@score":"1", "@id":"1999309", "info":{"authors":{"author":[{"@pid":"11/5724-1","text":"Shi-Cho Cha 0001"},{"@pid":"215/2573","text":"Tzu-Yang Hsu"},{"@pid":"50/2192-1","text":"Yang Xiang 0001"},{"@pid":"63/204","text":"Kuo-Hui Yeh"}]},"title":"Privacy Enhancing Technologies in the Internet of Things: Perspectives and Challenges.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"2159-2187","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/ChaHXY19","doi":"10.1109/JIOT.2018.2878658","ee":"https://doi.org/10.1109/JIOT.2018.2878658","url":"https://dblp.org/rec/journals/iotj/ChaHXY19"}, "url":"URL#1999309" }, { "@score":"1", "@id":"1999310", "info":{"authors":{"author":[{"@pid":"156/6924","text":"Rida El Chall"},{"@pid":"82/4450","text":"Samer Lahoud"},{"@pid":"127/4749","text":"Melhem El Helou"}]},"title":"LoRaWAN Network: Radio Propagation Models and Performance Evaluation in Various Environments in Lebanon.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"2366-2378","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/ChallLH19","doi":"10.1109/JIOT.2019.2906838","ee":"https://doi.org/10.1109/JIOT.2019.2906838","url":"https://dblp.org/rec/journals/iotj/ChallLH19"}, "url":"URL#1999310" }, { "@score":"1", "@id":"1999311", "info":{"authors":{"author":[{"@pid":"c/ChinChenChang","text":"Chin-Chen Chang 0001"},{"@pid":"124/4146","text":"Wai-Kong Lee"},{"@pid":"78/7328-2","text":"Yanjun Liu 0002"},{"@pid":"74/2851","text":"Bok-Min Goi"},{"@pid":"p/RCWPhan","text":"Raphael C.-W. Phan"}]},"title":"Signature Gateway: Offloading Signature Generation to IoT Gateway Accelerated by GPU.","venue":"IEEE Internet Things J.","volume":"6","number":"3","pages":"4448-4461","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/ChangLLGP19","doi":"10.1109/JIOT.2018.2881425","ee":"https://doi.org/10.1109/JIOT.2018.2881425","url":"https://dblp.org/rec/journals/iotj/ChangLLGP19"}, "url":"URL#1999311" }, { "@score":"1", "@id":"1999312", "info":{"authors":{"author":[{"@pid":"158/9119","text":"Hao-Hsuan Chang"},{"@pid":"23/1961-1","text":"Hao Song 0001"},{"@pid":"19/1969-2","text":"Yang Yi 0002"},{"@pid":"78/6091-2","text":"Jianzhong Zhang 0002"},{"@pid":"51/4299","text":"Haibo He"},{"@pid":"l/LingjiaLiu","text":"Lingjia Liu 0001"}]},"title":"Distributive Dynamic Spectrum Access Through Deep Reinforcement Learning: A Reservoir Computing-Based Approach.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"1938-1948","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/ChangSYZHL19","doi":"10.1109/JIOT.2018.2872441","ee":"https://doi.org/10.1109/JIOT.2018.2872441","url":"https://dblp.org/rec/journals/iotj/ChangSYZHL19"}, "url":"URL#1999312" }, { "@score":"1", "@id":"1999313", "info":{"authors":{"author":[{"@pid":"166/2948","text":"Baibhab Chatterjee"},{"@pid":"138/1077","text":"Debayan Das"},{"@pid":"87/11142","text":"Shovan Maity"},{"@pid":"33/4921","text":"Shreyas Sen"}]},"title":"RF-PUF: Enhancing IoT Security Through Authentication of Wireless Nodes Using In-Situ Machine Learning.","venue":"IEEE Internet Things J.","volume":"6","number":"1","pages":"388-398","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/ChatterjeeDMS19","doi":"10.1109/JIOT.2018.2849324","ee":"https://doi.org/10.1109/JIOT.2018.2849324","url":"https://dblp.org/rec/journals/iotj/ChatterjeeDMS19"}, "url":"URL#1999313" }, { "@score":"1", "@id":"1999314", "info":{"authors":{"author":[{"@pid":"130/5040","text":"Sid Chi-Kin Chau"},{"@pid":"s/HansPeterSchwefel","text":"Hans-Peter Schwefel"},{"@pid":"54/3080","text":"Vincent W. S. Wong 0001"},{"@pid":"80/3143","text":"Ying-Jun Angela Zhang"}]},"title":"Guest Editorial Special Issue on Internet-of-Things for Smart Energy Systems.","venue":"IEEE Internet Things J.","volume":"6","number":"5","pages":"7334-7336","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/ChauSWZ19","doi":"10.1109/JIOT.2019.2940391","ee":"https://doi.org/10.1109/JIOT.2019.2940391","url":"https://dblp.org/rec/journals/iotj/ChauSWZ19"}, "url":"URL#1999314" }, { "@score":"1", "@id":"1999315", "info":{"authors":{"author":[{"@pid":"204/4950","text":"Rajat Chaudhary"},{"@pid":"194/6963","text":"Gagangeet Singh Aujla"},{"@pid":"04/8395","text":"Neeraj Kumar 0001"},{"@pid":"50/2675","text":"Sherali Zeadally"}]},"title":"Lattice-Based Public Key Cryptosystem for Internet of Things Environment: Challenges and Solutions.","venue":"IEEE Internet Things J.","volume":"6","number":"3","pages":"4897-4909","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/ChaudharyAKZ19","doi":"10.1109/JIOT.2018.2878707","ee":"https://doi.org/10.1109/JIOT.2018.2878707","url":"https://dblp.org/rec/journals/iotj/ChaudharyAKZ19"}, "url":"URL#1999315" }, { "@score":"1", "@id":"1999316", "info":{"authors":{"author":[{"@pid":"145/9455","text":"Diliang Chen"},{"@pid":"214/6132","text":"Huiyi Cao"},{"@pid":"132/8300","text":"Huan Chen"},{"@pid":"246/5496","text":"Zetao Zhu"},{"@pid":"246/5468","text":"Xiaoye Qian"},{"@pid":"11/6689","text":"Wenyao Xu"},{"@pid":"93/10077","text":"Ming-Chun Huang"}]},"title":"Smart Insole-Based Indoor Localization System for Internet of Things Applications.","venue":"IEEE Internet Things J.","volume":"6","number":"4","pages":"7253-7265","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/ChenCCZQXH19","doi":"10.1109/JIOT.2019.2915791","ee":"https://doi.org/10.1109/JIOT.2019.2915791","url":"https://dblp.org/rec/journals/iotj/ChenCCZQXH19"}, "url":"URL#1999316" }, { "@score":"1", "@id":"1999317", "info":{"authors":{"author":[{"@pid":"228/8642","text":"Gongpu Chen"},{"@pid":"28/531","text":"Xianghui Cao"},{"@pid":"31/2088-4","text":"Lu Liu 0004"},{"@pid":"64/221","text":"Changyin Sun"},{"@pid":"96/3060-3","text":"Yu Cheng 0003"}]},"title":"Joint Scheduling and Channel Allocation for End-to-End Delay Minimization in Industrial WirelessHART Networks.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"2829-2842","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/ChenCLSC19","doi":"10.1109/JIOT.2018.2875508","ee":"https://doi.org/10.1109/JIOT.2018.2875508","url":"https://dblp.org/rec/journals/iotj/ChenCLSC19"}, "url":"URL#1999317" }, { "@score":"1", "@id":"1999318", "info":{"authors":{"author":[{"@pid":"115/8601","text":"Gaojie Chen"},{"@pid":"78/2259","text":"Justin P. Coon"},{"@pid":"240/7256","text":"Avishek Mondal"},{"@pid":"254/5756","text":"Ben H. Allen"},{"@pid":"92/4907","text":"Jonathon A. Chambers"}]},"title":"Performance Analysis for Multihop Full-Duplex IoT Networks Subject to Poisson Distributed Interferers.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"3467-3479","year":"2019","type":"Journal Articles","access":"open","key":"journals/iotj/ChenCMAC19","doi":"10.1109/JIOT.2018.2885756","ee":"https://doi.org/10.1109/JIOT.2018.2885756","url":"https://dblp.org/rec/journals/iotj/ChenCMAC19"}, "url":"URL#1999318" }, { "@score":"1", "@id":"1999319", "info":{"authors":{"author":[{"@pid":"10/5680-6","text":"Yun Chen 0006"},{"@pid":"51/8519-1","text":"Da Chen 0001"},{"@pid":"39/5423-15","text":"Yuan Tian 0015"},{"@pid":"j/TaoJiang-2","text":"Tao Jiang 0002"}]},"title":"Spatial Lobes Division-Based Low Complexity Hybrid Precoding and Diversity Combining for mmWave IoT Systems.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"3228-3239","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/ChenCTJ19","doi":"10.1109/JIOT.2018.2881171","ee":"https://doi.org/10.1109/JIOT.2018.2881171","url":"https://dblp.org/rec/journals/iotj/ChenCTJ19"}, "url":"URL#1999319" }, { "@score":"1", "@id":"1999320", "info":{"authors":{"author":[{"@pid":"56/9853","text":"Jienan Chen"},{"@pid":"23/7930","text":"Siyu Chen"},{"@pid":"19/1924-49","text":"Qi Wang 0049"},{"@pid":"17/1169-2","text":"Bin Cao 0002"},{"@pid":"94/3694-4","text":"Gang Feng 0004"},{"@pid":"07/6821","text":"Jianhao Hu"}]},"title":"iRAF: A Deep Reinforcement Learning Approach for Collaborative Mobile Edge Computing IoT Networks.","venue":"IEEE Internet Things J.","volume":"6","number":"4","pages":"7011-7024","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/ChenCWCFH19","doi":"10.1109/JIOT.2019.2913162","ee":"https://doi.org/10.1109/JIOT.2019.2913162","url":"https://dblp.org/rec/journals/iotj/ChenCWCFH19"}, "url":"URL#1999320" }, { "@score":"1", "@id":"1999321", "info":{"authors":{"author":[{"@pid":"93/4437","text":"Tianyi Chen"},{"@pid":"33/4080","text":"Georgios B. Giannakis"}]},"title":"Bandit Convex Optimization for Scalable and Dynamic IoT Management.","venue":"IEEE Internet Things J.","volume":"6","number":"1","pages":"1276-1286","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/ChenG19","doi":"10.1109/JIOT.2018.2839563","ee":"https://doi.org/10.1109/JIOT.2018.2839563","url":"https://dblp.org/rec/journals/iotj/ChenG19"}, "url":"URL#1999321" }, { "@score":"1", "@id":"1999322", "info":{"authors":{"author":[{"@pid":"06/4240","text":"Zhe Chen"},{"@pid":"73/5583","text":"Shize Guo"},{"@pid":"39/449-24","text":"Jian Wang 0024"},{"@pid":"90/3192","text":"Yubai Li"},{"@pid":"57/5135","text":"Zhonghai Lu"}]},"title":"Toward FPGA Security in IoT: A New Detection Technique for Hardware Trojans.","venue":"IEEE Internet Things J.","volume":"6","number":"4","pages":"7061-7068","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/ChenGWLL19","doi":"10.1109/JIOT.2019.2914079","ee":"https://doi.org/10.1109/JIOT.2019.2914079","url":"https://dblp.org/rec/journals/iotj/ChenGWLL19"}, "url":"URL#1999322" }, { "@score":"1", "@id":"1999323", "info":{"authors":{"author":[{"@pid":"139/2735","text":"Huihui Chen"},{"@pid":"86/2663-1","text":"Bin Guo 0001"},{"@pid":"z/YuZhiwen","text":"Zhiwen Yu 0001"},{"@pid":"76/5895-1","text":"Qi Han 0001"}]},"title":"CrowdTracking: Real-Time Vehicle Tracking Through Mobile Crowdsensing.","venue":"IEEE Internet Things J.","volume":"6","number":"5","pages":"7570-7583","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/ChenGYH19","doi":"10.1109/JIOT.2019.2901093","ee":"https://doi.org/10.1109/JIOT.2019.2901093","url":"https://dblp.org/rec/journals/iotj/ChenGYH19"}, "url":"URL#1999323" }, { "@score":"1", "@id":"1999324", "info":{"authors":{"author":[{"@pid":"49/3542","text":"Wen-Liang Chen"},{"@pid":"l/YiBingLin","text":"Yi-Bing Lin"},{"@pid":"63/3041","text":"Yun-Wei Lin"},{"@pid":"35/8919","text":"Robert Chen"},{"@pid":"243/6485","text":"Jyun-Kai Liao"},{"@pid":"243/6433","text":"Fung-Ling Ng"},{"@pid":"243/6437","text":"Yuan-Yao Chan"},{"@pid":"168/3014","text":"You-Cheng Liu"},{"@pid":"243/6430","text":"Chin-Cheng Wang"},{"@pid":"192/4983","text":"Cheng-Hsun Chiu"},{"@pid":"220/8137","text":"Tai-Hsiang Yen"}]},"title":"AgriTalk: IoT for Precision Soil Farming of Turmeric Cultivation.","venue":"IEEE Internet Things J.","volume":"6","number":"3","pages":"5209-5223","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/ChenLLCLNCLWCY19","doi":"10.1109/JIOT.2019.2899128","ee":"https://doi.org/10.1109/JIOT.2019.2899128","url":"https://dblp.org/rec/journals/iotj/ChenLLCLNCLWCY19"}, "url":"URL#1999324" }, { "@score":"1", "@id":"1999325", "info":{"authors":{"author":[{"@pid":"240/7175","text":"Maojian Chen"},{"@pid":"22/1805-26","text":"Ying Li 0026"},{"@pid":"83/7087","text":"Xiong Luo"},{"@pid":"72/4134-7","text":"Weiping Wang 0007"},{"@pid":"68/4459-15","text":"Long Wang 0015"},{"@pid":"z/WenbingZhao1","text":"Wenbing Zhao 0001"}]},"title":"A Novel Human Activity Recognition Scheme for Smart Health Using Multilayer Extreme Learning Machine.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"1410-1418","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/ChenLLWWZ19","doi":"10.1109/JIOT.2018.2856241","ee":"https://doi.org/10.1109/JIOT.2018.2856241","url":"https://dblp.org/rec/journals/iotj/ChenLLWWZ19"}, "url":"URL#1999325" }, { "@score":"1", "@id":"1999326", "info":{"authors":{"author":[{"@pid":"89/5615-17","text":"Bo Chen 0017"},{"@pid":"10/6178-1","text":"Liang Liu 0001"},{"@pid":"227/6722","text":"Mingxin Sun"},{"@pid":"04/6217","text":"Huadong Ma"}]},"title":"IoTCache: Toward Data-Driven Network Caching for Internet of Things.","venue":"IEEE Internet Things J.","volume":"6","number":"6","pages":"10064-10076","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/ChenLSM19","doi":"10.1109/JIOT.2019.2935442","ee":"https://doi.org/10.1109/JIOT.2019.2935442","url":"https://dblp.org/rec/journals/iotj/ChenLSM19"}, "url":"URL#1999326" }, { "@score":"1", "@id":"1999327", "info":{"authors":{"author":[{"@pid":"55/2484-1","text":"Jiming Chen 0001"},{"@pid":"203/9503","text":"Haoyu Liu"},{"@pid":"52/323","text":"Qi Zhang"},{"@pid":"07/7178","text":"Shibo He"}]},"title":"Orientation Optimization for Full-View Coverage Using Rotatable Camera Sensors.","venue":"IEEE Internet Things J.","volume":"6","number":"6","pages":"10508-10518","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/ChenLZH19","doi":"10.1109/JIOT.2019.2939431","ee":"https://doi.org/10.1109/JIOT.2019.2939431","url":"https://dblp.org/rec/journals/iotj/ChenLZH19"}, "url":"URL#1999327" }, { "@score":"1", "@id":"1999328", "info":{"authors":{"author":[{"@pid":"142/9307","text":"Yan-Bin Chen"},{"@pid":"69/2450","text":"Ido Nevat"},{"@pid":"58/4525-1","text":"Pengfei Zhang 0001"},{"@pid":"171/6916","text":"Sai Ganesh Nagarajan"},{"@pid":"09/6598","text":"Hung-Yu Wei"}]},"title":"Query-Based Sensors Selection for Collaborative Wireless Sensor Networks With Stochastic Energy Harvesting.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"3031-3043","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/ChenNZNW19","doi":"10.1109/JIOT.2018.2878588","ee":"https://doi.org/10.1109/JIOT.2018.2878588","url":"https://dblp.org/rec/journals/iotj/ChenNZNW19"}, "url":"URL#1999328" }, { "@score":"1", "@id":"1999329", "info":{"authors":{"author":[{"@pid":"22/5523-6","text":"Bin Chen 0006"},{"@pid":"62/3392","text":"Frans M. J. Willems"}]},"title":"Secret Key Generation Over Biased Physical Unclonable Functions With Polar Codes.","venue":"IEEE Internet Things J.","volume":"6","number":"1","pages":"435-445","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/ChenW19","doi":"10.1109/JIOT.2018.2864594","ee":"https://doi.org/10.1109/JIOT.2018.2864594","url":"https://dblp.org/rec/journals/iotj/ChenW19"}, "url":"URL#1999329" }, { "@score":"1", "@id":"1999330", "info":{"authors":{"author":[{"@pid":"60/10334","text":"Yu-Jia Chen"},{"@pid":"w/LiChunWang","text":"Li-Chun Wang 0001"}]},"title":"Privacy Protection for Internet of Drones: A Network Coding Approach.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"1719-1730","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/ChenW19a","doi":"10.1109/JIOT.2018.2875065","ee":"https://doi.org/10.1109/JIOT.2018.2875065","url":"https://dblp.org/rec/journals/iotj/ChenW19a"}, "url":"URL#1999330" }, { "@score":"1", "@id":"1999331", "info":{"authors":{"author":[{"@pid":"65/4423-2","text":"Chen Chen 0002"},{"@pid":"148/1448","text":"Baoji Wang"},{"@pid":"56/8969","text":"Rongqing Zhang 0001"}]},"title":"Interference Hypergraph-Based Resource Allocation (IHG-RA) for NOMA-Integrated V2X Networks.","venue":"IEEE Internet Things J.","volume":"6","number":"1","pages":"161-170","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/ChenWZ19","doi":"10.1109/JIOT.2018.2875670","ee":"https://doi.org/10.1109/JIOT.2018.2875670","url":"https://dblp.org/rec/journals/iotj/ChenWZ19"}, "url":"URL#1999331" }, { "@score":"1", "@id":"1999332", "info":{"authors":{"author":[{"@pid":"75/248","text":"Haiming Chen"},{"@pid":"166/4509","text":"Kaibin Xie"},{"@pid":"51/5556","text":"Li Cui"},{"@pid":"58/1789","text":"Antonio Pescapè"}]},"title":"A Formal Methodology for Easing Development and Maintenance of Entity Services in Service Oriented Software-Defined Internet of Things.","venue":"IEEE Internet Things J.","volume":"6","number":"6","pages":"9516-9530","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/ChenXCP19","doi":"10.1109/JIOT.2019.2929285","ee":"https://doi.org/10.1109/JIOT.2019.2929285","url":"https://dblp.org/rec/journals/iotj/ChenXCP19"}, "url":"URL#1999332" }, { "@score":"1", "@id":"1999333", "info":{"authors":{"author":[{"@pid":"251/1542","text":"Sifan Chen"},{"@pid":"17/8604","text":"Chungang Yang"},{"@pid":"65/7582-1","text":"Jiandong Li 0001"},{"@pid":"16/6654","text":"F. Richard Yu"}]},"title":"Full Lifecycle Infrastructure Management System for Smart Cities: A Narrow Band IoT-Based Platform.","venue":"IEEE Internet Things J.","volume":"6","number":"5","pages":"8818-8825","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/ChenYLY19","doi":"10.1109/JIOT.2019.2923810","ee":"https://doi.org/10.1109/JIOT.2019.2923810","url":"https://dblp.org/rec/journals/iotj/ChenYLY19"}, "url":"URL#1999333" }, { "@score":"1", "@id":"1999334", "info":{"authors":{"author":[{"@pid":"02/8379","text":"Wuhui Chen"},{"@pid":"19/5112-22","text":"Zhen Zhang 0022"},{"@pid":"239/5523","text":"Zicong Hong"},{"@pid":"03/1359-1","text":"Chuan Chen 0001"},{"@pid":"119/4079","text":"Jiajing Wu"},{"@pid":"92/8861","text":"Sabita Maharjan"},{"@pid":"z/ZibinZheng","text":"Zibin Zheng"},{"@pid":"04/3348-2","text":"Yan Zhang 0002"}]},"title":"Cooperative and Distributed Computation Offloading for Blockchain-Empowered Industrial Internet of Things.","venue":"IEEE Internet Things J.","volume":"6","number":"5","pages":"8433-8446","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/ChenZHCWMZZ19","doi":"10.1109/JIOT.2019.2918296","ee":"https://doi.org/10.1109/JIOT.2019.2918296","url":"https://dblp.org/rec/journals/iotj/ChenZHCWMZZ19"}, "url":"URL#1999334" }, { "@score":"1", "@id":"1999335", "info":{"authors":{"author":[{"@pid":"71/5527","text":"Min-Rong Chen"},{"@pid":"39/8207","text":"Guo-Qiang Zeng"},{"@pid":"145/5170","text":"Kang-Di Lu"},{"@pid":"81/1232-1","text":"Jian Weng 0001"}]},"title":"A Two-Layer Nonlinear Combination Method for Short-Term Wind Speed Prediction Based on ELM, ENN, and LSTM.","venue":"IEEE Internet Things J.","volume":"6","number":"4","pages":"6997-7010","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/ChenZLW19","doi":"10.1109/JIOT.2019.2913176","ee":"https://doi.org/10.1109/JIOT.2019.2913176","url":"https://dblp.org/rec/journals/iotj/ChenZLW19"}, "url":"URL#1999335" }, { "@score":"1", "@id":"1999336", "info":{"authors":{"author":[{"@pid":"13/7773","text":"Xianfu Chen"},{"@pid":"82/1228-1","text":"Honggang Zhang 0001"},{"@pid":"18/8282","text":"Celimuge Wu"},{"@pid":"52/3003","text":"Shiwen Mao"},{"@pid":"53/4376","text":"Yusheng Ji"},{"@pid":"09/3625","text":"Mehdi Bennis"}]},"title":"Optimized Computation Offloading Performance in Virtual Edge Computing Systems Via Deep Reinforcement Learning.","venue":"IEEE Internet Things J.","volume":"6","number":"3","pages":"4005-4018","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/ChenZWMJB19","doi":"10.1109/JIOT.2018.2876279","ee":"https://doi.org/10.1109/JIOT.2018.2876279","url":"https://dblp.org/rec/journals/iotj/ChenZWMJB19"}, "url":"URL#1999336" }, { "@score":"1", "@id":"1999337", "info":{"authors":{"author":[{"@pid":"21/5521-10","text":"Ying Chen 0010"},{"@pid":"181/2597-7","text":"Ning Zhang 0007"},{"@pid":"90/10193-2","text":"Yongchao Zhang 0002"},{"@pid":"24/1518-18","text":"Xin Chen 0018"}]},"title":"Dynamic Computation Offloading in Edge Computing for Internet of Things.","venue":"IEEE Internet Things J.","volume":"6","number":"3","pages":"4242-4251","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/ChenZZC19","doi":"10.1109/JIOT.2018.2875715","ee":"https://doi.org/10.1109/JIOT.2018.2875715","url":"https://dblp.org/rec/journals/iotj/ChenZZC19"}, "url":"URL#1999337" }, { "@score":"1", "@id":"1999338", "info":{"authors":{"author":[{"@pid":"217/7158","text":"Geyao Cheng"},{"@pid":"74/6501","text":"Deke Guo"},{"@pid":"01/7648","text":"Jianmai Shi"},{"@pid":"166/0004","text":"Yudong Qin"}]},"title":"Smart City-Wide Package Distribution Using Crowdsourced Public Transportation Systems.","venue":"IEEE Internet Things J.","volume":"6","number":"5","pages":"7584-7594","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/ChengGSQ19","doi":"10.1109/JIOT.2019.2901116","ee":"https://doi.org/10.1109/JIOT.2019.2901116","url":"https://dblp.org/rec/journals/iotj/ChengGSQ19"}, "url":"URL#1999338" }, { "@score":"1", "@id":"1999339", "info":{"authors":{"author":[{"@pid":"29/1059-1","text":"Xiang Cheng 0001"},{"@pid":"14/9145","text":"Yiran Li"}]},"title":"A 3-D Geometry-Based Stochastic Model for UAV-MIMO Wideband Nonstationary Channels.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"1654-1662","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/ChengL19","doi":"10.1109/JIOT.2018.2874816","ee":"https://doi.org/10.1109/JIOT.2018.2874816","url":"https://dblp.org/rec/journals/iotj/ChengL19"}, "url":"URL#1999339" }, { "@score":"1", "@id":"1999340", "info":{"authors":{"author":[{"@pid":"76/185-1","text":"Peng Cheng 0001"},{"@pid":"243/6450","text":"Congwei Xu"},{"@pid":"99/1797","text":"Pierre R. Lebreton"},{"@pid":"183/0173","text":"Zidong Yang"},{"@pid":"55/2484-1","text":"Jiming Chen 0001"}]},"title":"TERP: Time-Event-Dependent Route Planning in Stochastic Multimodal Transportation Networks With Bike Sharing System.","venue":"IEEE Internet Things J.","volume":"6","number":"3","pages":"4991-5000","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/ChengXLYC19","doi":"10.1109/JIOT.2019.2894511","ee":"https://doi.org/10.1109/JIOT.2019.2894511","url":"https://dblp.org/rec/journals/iotj/ChengXLYC19"}, "url":"URL#1999340" }, { "@score":"1", "@id":"1999341", "info":{"authors":{"author":[{"@pid":"34/6276","text":"Yong Cheng"},{"@pid":"187/3858","text":"Xiangyu Zhou"},{"@pid":"34/7561","text":"Shaohua Wan 0001"},{"@pid":"c/KimKwangRaymondChoo","text":"Kim-Kwang Raymond Choo"}]},"title":"Deep Belief Network for Meteorological Time Series Prediction in the Internet of Things.","venue":"IEEE Internet Things J.","volume":"6","number":"3","pages":"4369-4376","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/ChengZWC19","doi":"10.1109/JIOT.2018.2878477","ee":"https://doi.org/10.1109/JIOT.2018.2878477","url":"https://dblp.org/rec/journals/iotj/ChengZWC19"}, "url":"URL#1999341" }, { "@score":"1", "@id":"1999342", "info":{"authors":{"author":[{"@pid":"29/1059-1","text":"Xiang Cheng 0001"},{"@pid":"56/8969","text":"Rongqing Zhang 0001"},{"@pid":"52/6918-1","text":"Liuqing Yang 0001"}]},"title":"Wireless Toward the Era of Intelligent Vehicles.","venue":"IEEE Internet Things J.","volume":"6","number":"1","pages":"188-202","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/ChengZY19","doi":"10.1109/JIOT.2018.2884200","ee":"https://doi.org/10.1109/JIOT.2018.2884200","url":"https://dblp.org/rec/journals/iotj/ChengZY19"}, "url":"URL#1999342" }, { "@score":"1", "@id":"1999343", "info":{"authors":{"author":[{"@pid":"97/6599","text":"Marco Chiani"},{"@pid":"176/5880","text":"Ahmed Elzanaty"}]},"title":"On the LoRa Modulation for IoT: Waveform Properties and Spectral Analysis.","venue":"IEEE Internet Things J.","volume":"6","number":"5","pages":"8463-8470","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/ChianiE19","doi":"10.1109/JIOT.2019.2919151","ee":"https://doi.org/10.1109/JIOT.2019.2919151","url":"https://dblp.org/rec/journals/iotj/ChianiE19"}, "url":"URL#1999343" }, { "@score":"1", "@id":"1999344", "info":{"authors":{"author":[{"@pid":"65/5429","text":"Wen-Long Chin"},{"@pid":"71/7199","text":"Cheng-Chieh Chang"},{"@pid":"141/7346","text":"Cheng-Lung Tseng"},{"@pid":"243/6423","text":"Ying-Zhe Huang"},{"@pid":"j/TaoJiang-2","text":"Tao Jiang 0002"}]},"title":"Bayesian Real-Time QRS Complex Detector for Healthcare System.","venue":"IEEE Internet Things J.","volume":"6","number":"3","pages":"5540-5549","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/ChinCTHJ19","doi":"10.1109/JIOT.2019.2903530","ee":"https://doi.org/10.1109/JIOT.2019.2903530","url":"https://dblp.org/rec/journals/iotj/ChinCTHJ19"}, "url":"URL#1999344" }, { "@score":"1", "@id":"1999345", "info":{"authors":{"author":{"@pid":"87/47-1","text":"Jinho Choi 0001"}},"title":"Low-Latency Multichannel ALOHA With Fast Retrial for Machine-Type Communications.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"3175-3185","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/Choi19","doi":"10.1109/JIOT.2018.2880159","ee":"https://doi.org/10.1109/JIOT.2018.2880159","url":"https://dblp.org/rec/journals/iotj/Choi19"}, "url":"URL#1999345" }, { "@score":"1", "@id":"1999346", "info":{"authors":{"author":{"@pid":"87/47-1","text":"Jinho Choi 0001"}},"title":"A Cross-Layer Approach to Data-Aided Sensing Using Compressive Random Access.","venue":"IEEE Internet Things J.","volume":"6","number":"4","pages":"7093-7102","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/Choi19a","doi":"10.1109/JIOT.2019.2914314","ee":"https://doi.org/10.1109/JIOT.2019.2914314","url":"https://dblp.org/rec/journals/iotj/Choi19a"}, "url":"URL#1999346" }, { "@score":"1", "@id":"1999347", "info":{"authors":{"author":{"@pid":"87/47-1","text":"Jinho Choi 0001"}},"title":"Matched-Filter-Based Backscatter Communication for IoT Devices Over Ambient OFDM Carrier.","venue":"IEEE Internet Things J.","volume":"6","number":"6","pages":"10229-10239","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/Choi19b","doi":"10.1109/JIOT.2019.2936842","ee":"https://doi.org/10.1109/JIOT.2019.2936842","url":"https://dblp.org/rec/journals/iotj/Choi19b"}, "url":"URL#1999347" }, { "@score":"1", "@id":"1999348", "info":{"authors":{"author":[{"@pid":"20/6792","text":"Dooho Choi"},{"@pid":"36/1273","text":"Seung-Hyun Seo"},{"@pid":"236/4290","text":"Yoon-Seok Oh"},{"@pid":"06/5850","text":"Yousung Kang"}]},"title":"Two-Factor Fuzzy Commitment for Unmanned IoT Devices Security.","venue":"IEEE Internet Things J.","volume":"6","number":"1","pages":"335-348","year":"2019","type":"Journal Articles","access":"open","key":"journals/iotj/ChoiSOK19","doi":"10.1109/JIOT.2018.2837751","ee":"https://doi.org/10.1109/JIOT.2018.2837751","url":"https://dblp.org/rec/journals/iotj/ChoiSOK19"}, "url":"URL#1999348" }, { "@score":"1", "@id":"1999349", "info":{"authors":{"author":[{"@pid":"46/9200","text":"Garima Chopra"},{"@pid":"38/9945","text":"Rakesh Kumar Jha"},{"@pid":"24/2462","text":"Sanjeev Jain"}]},"title":"Novel Beamforming Approach for Secure Communication in UDN to Maximize Secrecy Rate and Fairness Security Assessment.","venue":"IEEE Internet Things J.","volume":"6","number":"4","pages":"5935-5947","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/ChopraJJ19","doi":"10.1109/JIOT.2018.2875518","ee":"https://doi.org/10.1109/JIOT.2018.2875518","url":"https://dblp.org/rec/journals/iotj/ChopraJJ19"}, "url":"URL#1999349" }, { "@score":"1", "@id":"1999350", "info":{"authors":{"author":[{"@pid":"45/8862","text":"Shih-Fan Chou"},{"@pid":"214/2053","text":"Hsiu-Wen Yen"},{"@pid":"73/2927","text":"Ai-Chun Pang"}]},"title":"A REM-Enabled Diagnostic Framework in Cellular-Based IoT Networks.","venue":"IEEE Internet Things J.","volume":"6","number":"3","pages":"5273-5284","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/ChouYP19","doi":"10.1109/JIOT.2019.2900093","ee":"https://doi.org/10.1109/JIOT.2019.2900093","url":"https://dblp.org/rec/journals/iotj/ChouYP19"}, "url":"URL#1999350" }, { "@score":"1", "@id":"1999351", "info":{"authors":{"author":[{"@pid":"175/5899","text":"Nikumani Choudhury"},{"@pid":"66/9552","text":"Rakesh Matam"},{"@pid":"39/8298-1","text":"Mithun Mukherjee 0001"},{"@pid":"l/JaimeLloret","text":"Jaime Lloret 0001"}]},"title":"LBS: A Beacon Synchronization Scheme With Higher Schedulability for IEEE 802.15.4 Cluster-Tree-Based IoT Applications.","venue":"IEEE Internet Things J.","volume":"6","number":"5","pages":"8883-8896","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/ChoudhuryMML19","doi":"10.1109/JIOT.2019.2924317","ee":"https://doi.org/10.1109/JIOT.2019.2924317","url":"https://dblp.org/rec/journals/iotj/ChoudhuryMML19"}, "url":"URL#1999351" }, { "@score":"1", "@id":"1999352", "info":{"authors":{"author":[{"@pid":"220/3074","text":"Gordon Chu"},{"@pid":"200/7871","text":"Noah J. Apthorpe"},{"@pid":"87/840","text":"Nick Feamster"}]},"title":"Security and Privacy Analyses of Internet of Things Children's Toys.","venue":"IEEE Internet Things J.","volume":"6","number":"1","pages":"978-985","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/ChuAF19","doi":"10.1109/JIOT.2018.2866423","ee":"https://doi.org/10.1109/JIOT.2018.2866423","url":"https://dblp.org/rec/journals/iotj/ChuAF19"}, "url":"URL#1999352" }, { "@score":"1", "@id":"1999353", "info":{"authors":{"author":[{"@pid":"178/6466","text":"Man Chu"},{"@pid":"83/5560-3","text":"Hang Li 0003"},{"@pid":"68/4580","text":"Xuewen Liao"},{"@pid":"48/4914","text":"Shuguang Cui"}]},"title":"Reinforcement Learning-Based Multiaccess Control and Battery Prediction With Energy Harvesting in IoT Systems.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"2009-2020","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/ChuLLC19","doi":"10.1109/JIOT.2018.2872440","ee":"https://doi.org/10.1109/JIOT.2018.2872440","url":"https://dblp.org/rec/journals/iotj/ChuLLC19"}, "url":"URL#1999353" }, { "@score":"1", "@id":"1999354", "info":{"authors":{"author":[{"@pid":"178/6466","text":"Man Chu"},{"@pid":"68/4580","text":"Xuewen Liao"},{"@pid":"83/5560-3","text":"Hang Li 0003"},{"@pid":"48/4914","text":"Shuguang Cui"}]},"title":"Power Control in Energy Harvesting Multiple Access System With Reinforcement Learning.","venue":"IEEE Internet Things J.","volume":"6","number":"5","pages":"9175-9186","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/ChuLLC19a","doi":"10.1109/JIOT.2019.2928837","ee":"https://doi.org/10.1109/JIOT.2019.2928837","url":"https://dblp.org/rec/journals/iotj/ChuLLC19a"}, "url":"URL#1999354" }, { "@score":"1", "@id":"1999355", "info":{"authors":{"author":[{"@pid":"202/3763","text":"Simone Ciccia"},{"@pid":"202/3825","text":"Giorgio Giordanengo"},{"@pid":"28/2490","text":"Giuseppe Vecchi"}]},"title":"Energy Efficiency in IoT Networks: Integration of Reconfigurable Antennas in Ultra Low-Power Radio Platforms Based on System-on-Chip.","venue":"IEEE Internet Things J.","volume":"6","number":"4","pages":"6800-6810","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/CicciaGV19","doi":"10.1109/JIOT.2019.2911557","ee":"https://doi.org/10.1109/JIOT.2019.2911557","url":"https://dblp.org/rec/journals/iotj/CicciaGV19"}, "url":"URL#1999355" }, { "@score":"1", "@id":"1999356", "info":{"authors":{"author":[{"@pid":"156/8978","text":"Mehmet Hazar Cintuglu"},{"@pid":"144/6162","text":"Dmitry Ishchenko"}]},"title":"Secure Distributed State Estimation for Networked Microgrids.","venue":"IEEE Internet Things J.","volume":"6","number":"5","pages":"8046-8055","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/CintugluI19","doi":"10.1109/JIOT.2019.2902793","ee":"https://doi.org/10.1109/JIOT.2019.2902793","url":"https://dblp.org/rec/journals/iotj/CintugluI19"}, "url":"URL#1999356" }, { "@score":"1", "@id":"1999357", "info":{"authors":{"author":[{"@pid":"251/1453","text":"Mingming Cui"},{"@pid":"48/1843","text":"Dezhi Han"},{"@pid":"w/JunWang1","text":"Jun Wang 0001"}]},"title":"An Efficient and Safe Road Condition Monitoring Authentication Scheme Based on Fog Computing.","venue":"IEEE Internet Things J.","volume":"6","number":"5","pages":"9076-9084","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/CuiHW19","doi":"10.1109/JIOT.2019.2927497","ee":"https://doi.org/10.1109/JIOT.2019.2927497","url":"https://dblp.org/rec/journals/iotj/CuiHW19"}, "url":"URL#1999357" }, { "@score":"1", "@id":"1999358", "info":{"authors":{"author":[{"@pid":"79/940","text":"Qimei Cui"},{"@pid":"68/7658","text":"Yingze Wang"},{"@pid":"96/2402","text":"Kwang-Cheng Chen"},{"@pid":"31/2597-1","text":"Wei Ni 0001"},{"@pid":"81/6262","text":"I-Cheng Lin"},{"@pid":"96/6496","text":"Xiaofeng Tao"},{"@pid":"77/2428-3","text":"Ping Zhang 0003"}]},"title":"Big Data Analytics and Network Calculus Enabling Intelligent Management of Autonomous Vehicles in a Smart City.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"2021-2034","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/CuiWCNLTZ19","doi":"10.1109/JIOT.2018.2872442","ee":"https://doi.org/10.1109/JIOT.2018.2872442","url":"https://dblp.org/rec/journals/iotj/CuiWCNLTZ19"}, "url":"URL#1999358" }, { "@score":"1", "@id":"1999359", "info":{"authors":{"author":[{"@pid":"86/10615","text":"Laizhong Cui"},{"@pid":"06/4121","text":"Chong Xu"},{"@pid":"18/6739-02","text":"Shu Yang 0002"},{"@pid":"h/JoshuaZhexueHuang","text":"Joshua Zhexue Huang"},{"@pid":"08/2185-1","text":"Jianqiang Li 0001"},{"@pid":"02/4027","text":"Xizhao Wang"},{"@pid":"84/2082","text":"Zhong Ming 0001"},{"@pid":"14/4965","text":"Nan Lu"}]},"title":"Joint Optimization of Energy Consumption and Latency in Mobile Edge Computing for Internet of Things.","venue":"IEEE Internet Things J.","volume":"6","number":"3","pages":"4791-4803","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/CuiXYHLWML19","doi":"10.1109/JIOT.2018.2869226","ee":"https://doi.org/10.1109/JIOT.2018.2869226","url":"https://dblp.org/rec/journals/iotj/CuiXYHLWML19"}, "url":"URL#1999359" }, { "@score":"1", "@id":"1999360", "info":{"authors":{"author":[{"@pid":"55/3002-4","text":"Jie Cui 0004"},{"@pid":"12/5927","text":"Xiaoyu Zhang"},{"@pid":"12/2179-1","text":"Hong Zhong 0001"},{"@pid":"183/5505","text":"Zuobin Ying"},{"@pid":"31/2088-1","text":"Lu Liu 0001"}]},"title":"RSMA: Reputation System-Based Lightweight Message Authentication Framework and Protocol for 5G-Enabled Vehicular Networks.","venue":"IEEE Internet Things J.","volume":"6","number":"4","pages":"6417-6428","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/CuiZZYL19","doi":"10.1109/JIOT.2019.2895136","ee":"https://doi.org/10.1109/JIOT.2019.2895136","url":"https://dblp.org/rec/journals/iotj/CuiZZYL19"}, "url":"URL#1999360" }, { "@score":"1", "@id":"1999361", "info":{"authors":{"author":[{"@pid":"222/2727","text":"Benjamin Cyr"},{"@pid":"240/6970","text":"Jubayer Mahmod"},{"@pid":"13/9680","text":"Ujjwal Guin"}]},"title":"Low-Cost and Secure Firmware Obfuscation Method for Protecting Electronic Systems From Cloning.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"3700-3711","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/CyrMG19","doi":"10.1109/JIOT.2018.2890277","ee":"https://doi.org/10.1109/JIOT.2018.2890277","url":"https://dblp.org/rec/journals/iotj/CyrMG19"}, "url":"URL#1999361" }, { "@score":"1", "@id":"1999362", "info":{"authors":{"author":[{"@pid":"84/11286","text":"Cui-Qin Dai"},{"@pid":"83/789","text":"Linfeng Guo"},{"@pid":"122/5017","text":"Shu Fu"},{"@pid":"07/1671","text":"Qianbin Chen"}]},"title":"Contact Plan Design With Directional Space-Time Graph in Two-Layer Space Communication Networks.","venue":"IEEE Internet Things J.","volume":"6","number":"6","pages":"10862-10874","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/DaiGFC19","doi":"10.1109/JIOT.2019.2942345","ee":"https://doi.org/10.1109/JIOT.2019.2942345","url":"https://dblp.org/rec/journals/iotj/DaiGFC19"}, "url":"URL#1999362" }, { "@score":"1", "@id":"1999363", "info":{"authors":{"author":[{"@pid":"159/6594","text":"Penglin Dai"},{"@pid":"73/4566-1","text":"Kai Liu 0001"},{"@pid":"73/6038-1","text":"Xiao Wu 0001"},{"@pid":"166/0573","text":"Zhaofei Yu"},{"@pid":"17/3284","text":"Huanlai Xing"},{"@pid":"l/VictorCSLee","text":"Victor Chung Sing Lee"}]},"title":"Cooperative Temporal Data Dissemination in SDN-Based Heterogeneous Vehicular Networks.","venue":"IEEE Internet Things J.","volume":"6","number":"1","pages":"72-83","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/DaiLWYXL19","doi":"10.1109/JIOT.2018.2872432","ee":"https://doi.org/10.1109/JIOT.2018.2872432","url":"https://dblp.org/rec/journals/iotj/DaiLWYXL19"}, "url":"URL#1999363" }, { "@score":"1", "@id":"1999364", "info":{"authors":{"author":[{"@pid":"80/1717","text":"Lu Dai"},{"@pid":"18/3872","text":"Bang Wang"},{"@pid":"y/LaurenceTianruoYang","text":"Laurence T. Yang"},{"@pid":"132/8072","text":"Xianjun Deng"},{"@pid":"160/6071","text":"Lingzhi Yi"}]},"title":"A Nature-Inspired Node Deployment Strategy for Connected Confident Information Coverage in Industrial Internet of Things.","venue":"IEEE Internet Things J.","volume":"6","number":"6","pages":"9217-9225","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/DaiWYDY19","doi":"10.1109/JIOT.2019.2896581","ee":"https://doi.org/10.1109/JIOT.2019.2896581","url":"https://dblp.org/rec/journals/iotj/DaiWYDY19"}, "url":"URL#1999364" }, { "@score":"1", "@id":"1999365", "info":{"authors":{"author":[{"@pid":"213/9055","text":"Yueyue Dai"},{"@pid":"65/95","text":"Du Xu"},{"@pid":"92/8861","text":"Sabita Maharjan"},{"@pid":"04/3348-2","text":"Yan Zhang 0002"}]},"title":"Joint Load Balancing and Offloading in Vehicular Edge Computing and Networks.","venue":"IEEE Internet Things J.","volume":"6","number":"3","pages":"4377-4387","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/DaiXMZ19","doi":"10.1109/JIOT.2018.2876298","ee":"https://doi.org/10.1109/JIOT.2018.2876298","url":"https://dblp.org/rec/journals/iotj/DaiXMZ19"}, "url":"URL#1999365" }, { "@score":"1", "@id":"1999366", "info":{"authors":{"author":[{"@pid":"33/5228","text":"Hong-Ning Dai"},{"@pid":"z/ZibinZheng","text":"Zibin Zheng"},{"@pid":"04/3348-2","text":"Yan Zhang 0002"}]},"title":"Blockchain for Internet of Things: A Survey.","venue":"IEEE Internet Things J.","volume":"6","number":"5","pages":"8076-8094","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/DaiZZ19","doi":"10.1109/JIOT.2019.2920987","ee":"https://doi.org/10.1109/JIOT.2019.2920987","url":"https://dblp.org/rec/journals/iotj/DaiZZ19"}, "url":"URL#1999366" }, { "@score":"1", "@id":"1999367", "info":{"authors":{"author":[{"@pid":"128/3965","text":"Shuping Dang"},{"@pid":"19/8378","text":"Guoqing Ma"},{"@pid":"62/5430","text":"Basem Shihada"},{"@pid":"64/6304","text":"Mohamed-Slim Alouini"}]},"title":"Enhanced Orthogonal Frequency-Division Multiplexing With Subcarrier Number Modulation.","venue":"IEEE Internet Things J.","volume":"6","number":"5","pages":"7907-7920","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/DangMSA19","doi":"10.1109/JIOT.2019.2914175","ee":"https://doi.org/10.1109/JIOT.2019.2914175","url":"https://dblp.org/rec/journals/iotj/DangMSA19"}, "url":"URL#1999367" }, { "@score":"1", "@id":"1999368", "info":{"authors":{"author":[{"@pid":"186/8246","text":"Pietro Danzi"},{"@pid":"198/1058","text":"Anders E. Kalør"},{"@pid":"84/6001","text":"Cedomir Stefanovic"},{"@pid":"50/3930","text":"Petar Popovski"}]},"title":"Delay and Communication Tradeoffs for Blockchain Systems With Lightweight IoT Clients.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"2354-2365","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/DanziKSP19","doi":"10.1109/JIOT.2019.2906615","ee":"https://doi.org/10.1109/JIOT.2019.2906615","url":"https://dblp.org/rec/journals/iotj/DanziKSP19"}, "url":"URL#1999368" }, { "@score":"1", "@id":"1999369", "info":{"authors":{"author":[{"@pid":"233/9095","text":"Zhishan Deng"},{"@pid":"36/4657-1","text":"Quanzhong Li 0001"},{"@pid":"52/323-2","text":"Qi Zhang 0002"},{"@pid":"05/3933-1","text":"Liang Yang 0001"},{"@pid":"50/2634","text":"Jiayin Qin"}]},"title":"Beamforming Design for Physical Layer Security in a Two-Way Cognitive Radio IoT Network With SWIPT.","venue":"IEEE Internet Things J.","volume":"6","number":"6","pages":"10786-10798","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/DengLZYQ19","doi":"10.1109/JIOT.2019.2941873","ee":"https://doi.org/10.1109/JIOT.2019.2941873","url":"https://dblp.org/rec/journals/iotj/DengLZYQ19"}, "url":"URL#1999369" }, { "@score":"1", "@id":"1999370", "info":{"authors":{"author":[{"@pid":"132/8072","text":"Xianjun Deng"},{"@pid":"243/6424","text":"Minliang Xu"},{"@pid":"y/LaurenceTianruoYang","text":"Laurence T. Yang"},{"@pid":"78/3592","text":"Man Lin"},{"@pid":"160/6071","text":"Lingzhi Yi"},{"@pid":"50/8713","text":"Minghua Wang"}]},"title":"Energy Balanced Dispatch of Mobile Edge Nodes for Confident Information Coverage Hole Repairing in IoT.","venue":"IEEE Internet Things J.","volume":"6","number":"3","pages":"4782-4790","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/DengXYLYW19","doi":"10.1109/JIOT.2018.2869110","ee":"https://doi.org/10.1109/JIOT.2018.2869110","url":"https://dblp.org/rec/journals/iotj/DengXYLYW19"}, "url":"URL#1999370" }, { "@score":"1", "@id":"1999371", "info":{"authors":{"author":[{"@pid":"08/3786","text":"Fang Deng"},{"@pid":"199/5796","text":"Xianghu Yue"},{"@pid":"161/4633","text":"Xinyu Fan"},{"@pid":"200/0673","text":"Shengpan Guan"},{"@pid":"29/3925","text":"Yue Xu"},{"@pid":"92/6289-3","text":"Jie Chen 0003"}]},"title":"Multisource Energy Harvesting System for a Wireless Sensor Network Node in the Field Environment.","venue":"IEEE Internet Things J.","volume":"6","number":"1","pages":"918-927","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/DengYFGXC19","doi":"10.1109/JIOT.2018.2865431","ee":"https://doi.org/10.1109/JIOT.2018.2865431","url":"https://dblp.org/rec/journals/iotj/DengYFGXC19"}, "url":"URL#1999371" }, { "@score":"1", "@id":"1999372", "info":{"authors":{"author":[{"@pid":"243/6440","text":"Swati Dhingra"},{"@pid":"209/7610","text":"Madda Rajasekhara Babu"},{"@pid":"43/8647","text":"Amir H. Gandomi"},{"@pid":"222/9023","text":"Rizwan Patan"},{"@pid":"92/4586","text":"Mahmoud Daneshmand"}]},"title":"Internet of Things Mobile-Air Pollution Monitoring System (IoT-Mobair).","venue":"IEEE Internet Things J.","volume":"6","number":"3","pages":"5577-5584","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/DhingraMGPD19","doi":"10.1109/JIOT.2019.2903821","ee":"https://doi.org/10.1109/JIOT.2019.2903821","url":"https://dblp.org/rec/journals/iotj/DhingraMGPD19"}, "url":"URL#1999372" }, { "@score":"1", "@id":"1999373", "info":{"authors":{"author":[{"@pid":"204/1733","text":"Khaldoon Dhou"},{"@pid":"255/2341","text":"Christopher Cruzen"}]},"title":"An Innovative Chain Coding Technique for Compression Based on the Concept of Biological Reproduction: An Agent-Based Modeling Approach.","venue":"IEEE Internet Things J.","volume":"6","number":"6","pages":"9308-9315","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/DhouC19","doi":"10.1109/JIOT.2019.2912984","ee":"https://doi.org/10.1109/JIOT.2019.2912984","url":"https://dblp.org/rec/journals/iotj/DhouC19"}, "url":"URL#1999373" }, { "@score":"1", "@id":"1999374", "info":{"authors":{"author":[{"@pid":"198/7180","text":"Chong Di"},{"@pid":"36/2259-63","text":"Bo Zhang 0063"},{"@pid":"52/5208","text":"Qilian Liang"},{"@pid":"47/1217-1","text":"Shenghong Li 0001"},{"@pid":"12/1208","text":"Ying Guo"}]},"title":"Learning Automata-Based Access Class Barring Scheme for Massive Random Access in Machine-to-Machine Communications.","venue":"IEEE Internet Things J.","volume":"6","number":"4","pages":"6007-6017","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/DiZLLG19","doi":"10.1109/JIOT.2018.2867937","ee":"https://doi.org/10.1109/JIOT.2018.2867937","url":"https://dblp.org/rec/journals/iotj/DiZLLG19"}, "url":"URL#1999374" }, { "@score":"1", "@id":"1999375", "info":{"authors":{"author":[{"@pid":"94/1825-1","text":"Jie Ding 0001"},{"@pid":"61/5316","text":"Daiming Qu"},{"@pid":"38/6049","text":"Hao Jiang"},{"@pid":"j/TaoJiang-2","text":"Tao Jiang 0002"}]},"title":"Success Probability of Grant-Free Random Access With Massive MIMO.","venue":"IEEE Internet Things J.","volume":"6","number":"1","pages":"506-516","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/DingQJJ19","doi":"10.1109/JIOT.2018.2869003","ee":"https://doi.org/10.1109/JIOT.2018.2869003","url":"https://dblp.org/rec/journals/iotj/DingQJJ19"}, "url":"URL#1999375" }, { "@score":"1", "@id":"1999376", "info":{"authors":{"author":[{"@pid":"183/0427","text":"Xiaojin Ding"},{"@pid":"43/7418","text":"Yulong Zou"},{"@pid":"51/3939-3","text":"Fei Ding 0003"},{"@pid":"57/33","text":"Dengyin Zhang"},{"@pid":"04/10675","text":"Gengxin Zhang"}]},"title":"Opportunistic Relaying Against Eavesdropping for Internet-of-Things: A Security-Reliability Tradeoff Perspective.","venue":"IEEE Internet Things J.","volume":"6","number":"5","pages":"8727-8738","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/DingZDZZ19","doi":"10.1109/JIOT.2019.2923273","ee":"https://doi.org/10.1109/JIOT.2019.2923273","url":"https://dblp.org/rec/journals/iotj/DingZDZZ19"}, "url":"URL#1999376" }, { "@score":"1", "@id":"1999377", "info":{"authors":{"author":[{"@pid":"63/3787","text":"Ran Ding"},{"@pid":"12/2179-1","text":"Hong Zhong 0001"},{"@pid":"12/6604-1","text":"Jianfeng Ma 0001"},{"@pid":"134/3945","text":"Ximeng Liu"},{"@pid":"09/10764","text":"Jianting Ning"}]},"title":"Lightweight Privacy-Preserving Identity-Based Verifiable IoT-Based Health Storage System.","venue":"IEEE Internet Things J.","volume":"6","number":"5","pages":"8393-8405","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/DingZMLN19","doi":"10.1109/JIOT.2019.2917546","ee":"https://doi.org/10.1109/JIOT.2019.2917546","url":"https://dblp.org/rec/journals/iotj/DingZMLN19"}, "url":"URL#1999377" }, { "@score":"1", "@id":"1999378", "info":{"authors":{"author":[{"@pid":"187/2816","text":"Maria de Fátima Domingues"},{"@pid":"79/2580","text":"Nélia Alberto"},{"@pid":"273/8950","text":"Cátia Sofia Jorge Leitão"},{"@pid":"213/0963","text":"Cátia Tavares"},{"@pid":"00/1988","text":"Eduardo Rocon de Lima"},{"@pid":"50/5718","text":"Ayman Radwan"},{"@pid":"120/7754","text":"Victor Sucasas"},{"@pid":"04/1616","text":"Jonathan Rodriguez 0001"},{"@pid":"18/4894","text":"Paulo Sérgio de Brito André"},{"@pid":"189/2541","text":"Paulo Fernando da Costa Antunes"}]},"title":"Insole Optical Fiber Sensor Architecture for Remote Gait Analysis - An e-Health Solution.","venue":"IEEE Internet Things J.","volume":"6","number":"1","pages":"207-214","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/DominguesALTLRS19","doi":"10.1109/JIOT.2017.2723263","ee":"https://doi.org/10.1109/JIOT.2017.2723263","url":"https://dblp.org/rec/journals/iotj/DominguesALTLRS19"}, "url":"URL#1999378" }, { "@score":"1", "@id":"1999379", "info":{"authors":{"author":[{"@pid":"143/3461","text":"Siwei Dong"},{"@pid":"223/6695","text":"Zhichao Bi"},{"@pid":"86/5857","text":"Yonghong Tian 0001"},{"@pid":"h/TiejunHuang","text":"Tiejun Huang 0001"}]},"title":"Spike Coding for Dynamic Vision Sensor in Intelligent Driving.","venue":"IEEE Internet Things J.","volume":"6","number":"1","pages":"60-71","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/DongBTH19","doi":"10.1109/JIOT.2018.2872984","ee":"https://doi.org/10.1109/JIOT.2018.2872984","url":"https://dblp.org/rec/journals/iotj/DongBTH19"}, "url":"URL#1999379" }, { "@score":"1", "@id":"1999380", "info":{"authors":{"author":[{"@pid":"51/8133","text":"Yifan Dong"},{"@pid":"23/4556","text":"Songtao Guo"},{"@pid":"187/9415","text":"Jiadi Liu"},{"@pid":"10/2031-1","text":"Yuanyuan Yang 0001"}]},"title":"Energy-Efficient Fair Cooperation Fog Computing in Mobile Edge Networks for Smart City.","venue":"IEEE Internet Things J.","volume":"6","number":"5","pages":"7543-7554","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/DongGLY19","doi":"10.1109/JIOT.2019.2901532","ee":"https://doi.org/10.1109/JIOT.2019.2901532","url":"https://dblp.org/rec/journals/iotj/DongGLY19"}, "url":"URL#1999380" }, { "@score":"1", "@id":"1999381", "info":{"authors":{"author":[{"@pid":"199/5014","text":"Shaoyu Dou"},{"@pid":"17/2247-1","text":"Kai Yang 0001"},{"@pid":"p/HVincentPoor","text":"H. Vincent Poor"}]},"title":"PC2A: Predicting Collective Contextual Anomalies via LSTM With Deep Generative Model.","venue":"IEEE Internet Things J.","volume":"6","number":"6","pages":"9645-9655","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/DouYP19","doi":"10.1109/JIOT.2019.2930202","ee":"https://doi.org/10.1109/JIOT.2019.2930202","url":"https://dblp.org/rec/journals/iotj/DouYP19"}, "url":"URL#1999381" }, { "@score":"1", "@id":"1999382", "info":{"authors":{"author":[{"@pid":"97/4461","text":"Jing Du"},{"@pid":"86/2663-1","text":"Bin Guo 0001"},{"@pid":"150/4295-45","text":"Yan Liu 0045"},{"@pid":"56/4499-17","text":"Liang Wang 0017"},{"@pid":"76/5895-1","text":"Qi Han 0001"},{"@pid":"66/3019-4","text":"Chao Chen 0004"},{"@pid":"z/YuZhiwen","text":"Zhiwen Yu 0001"}]},"title":"CrowDNet: Enabling a Crowdsourced Object Delivery Network Based on Modern Portfolio Theory.","venue":"IEEE Internet Things J.","volume":"6","number":"5","pages":"9030-9041","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/DuGLWHCY19","doi":"10.1109/JIOT.2019.2926255","ee":"https://doi.org/10.1109/JIOT.2019.2926255","url":"https://dblp.org/rec/journals/iotj/DuGLWHCY19"}, "url":"URL#1999382" }, { "@score":"1", "@id":"1999383", "info":{"authors":{"author":[{"@pid":"236/2889","text":"Ruiyang Duan"},{"@pid":"62/2631-1","text":"Jingjing Wang 0001"},{"@pid":"00/8334","text":"Chunxiao Jiang"},{"@pid":"59/8489","text":"Haipeng Yao"},{"@pid":"00/440-1","text":"Yong Ren 0001"},{"@pid":"84/4625-1","text":"Yi Qian 0001"}]},"title":"Resource Allocation for Multi-UAV Aided IoT NOMA Uplink Transmission Systems.","venue":"IEEE Internet Things J.","volume":"6","number":"4","pages":"7025-7037","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/DuanWJYRQ19","doi":"10.1109/JIOT.2019.2913473","ee":"https://doi.org/10.1109/JIOT.2019.2913473","url":"https://dblp.org/rec/journals/iotj/DuanWJYRQ19"}, "url":"URL#1999383" }, { "@score":"1", "@id":"1999384", "info":{"authors":{"author":[{"@pid":"191/7808","text":"Huayi Duan"},{"@pid":"60/3312","text":"Yifeng Zheng"},{"@pid":"18/2771-1","text":"Cong Wang 0001"},{"@pid":"21/8884","text":"Xingliang Yuan"}]},"title":"Treasure Collection on Foggy Islands: Building Secure Network Archives for Internet of Things.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"2637-2650","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/DuanZWY19","doi":"10.1109/JIOT.2018.2872461","ee":"https://doi.org/10.1109/JIOT.2018.2872461","url":"https://dblp.org/rec/journals/iotj/DuanZWY19"}, "url":"URL#1999384" }, { "@score":"1", "@id":"1999385", "info":{"authors":{"author":[{"@pid":"95/7023","text":"Dariush Ebrahimi"},{"@pid":"54/906","text":"Sanaa Sharafeddine"},{"@pid":"53/4284","text":"Pin-Han Ho"},{"@pid":"a/ChadiAssi","text":"Chadi Assi"}]},"title":"UAV-Aided Projection-Based Compressive Data Gathering in Wireless Sensor Networks.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"1893-1905","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/EbrahimiSHA19","doi":"10.1109/JIOT.2018.2878834","ee":"https://doi.org/10.1109/JIOT.2018.2878834","url":"https://dblp.org/rec/journals/iotj/EbrahimiSHA19"}, "url":"URL#1999385" }, { "@score":"1", "@id":"1999386", "info":{"authors":{"author":[{"@pid":"160/7653","text":"Shahriar Ebrahimi"},{"@pid":"45/3186","text":"Siavash Bayat Sarmadi"},{"@pid":"224/1107","text":"Hatameh Mosanaei-Boorani"}]},"title":"Post-Quantum Cryptoprocessors Optimized for Edge and Resource-Constrained Devices in IoT.","venue":"IEEE Internet Things J.","volume":"6","number":"3","pages":"5500-5507","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/EbrahimiSM19","doi":"10.1109/JIOT.2019.2903082","ee":"https://doi.org/10.1109/JIOT.2019.2903082","url":"https://dblp.org/rec/journals/iotj/EbrahimiSM19"}, "url":"URL#1999386" }, { "@score":"1", "@id":"1999387", "info":{"authors":{"author":[{"@pid":"136/5062","text":"Mark Eisen"},{"@pid":"48/5520","text":"Mohammad M. Rashid"},{"@pid":"96/8776","text":"Konstantinos Gatsis"},{"@pid":"19/3125","text":"Dave Cavalcanti 0001"},{"@pid":"20/4102","text":"Nageen Himayat"},{"@pid":"32/15","text":"Alejandro Ribeiro"}]},"title":"Control Aware Radio Resource Allocation in Low Latency Wireless Control Systems.","venue":"IEEE Internet Things J.","volume":"6","number":"5","pages":"7878-7890","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/EisenRGCHR19","doi":"10.1109/JIOT.2019.2909198","ee":"https://doi.org/10.1109/JIOT.2019.2909198","url":"https://dblp.org/rec/journals/iotj/EisenRGCHR19"}, "url":"URL#1999387" }, { "@score":"1", "@id":"1999388", "info":{"authors":{"author":[{"@pid":"02/9944","text":"Mohamed Eldefrawy"},{"@pid":"01/4310-1","text":"Nuno Pereira 0001"},{"@pid":"27/4038","text":"Mikael Gidlund"}]},"title":"Key Distribution Protocol for Industrial Internet of Things Without Implicit Certificates.","venue":"IEEE Internet Things J.","volume":"6","number":"1","pages":"906-917","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/EldefrawyPG19","doi":"10.1109/JIOT.2018.2865212","ee":"https://doi.org/10.1109/JIOT.2018.2865212","url":"https://dblp.org/rec/journals/iotj/EldefrawyPG19"}, "url":"URL#1999388" }, { "@score":"1", "@id":"1999389", "info":{"authors":{"author":[{"@pid":"15/1848","text":"Tallal Elshabrawy"},{"@pid":"133/5085","text":"Joerg Robert"}]},"title":"Interleaved Chirp Spreading LoRa-Based Modulation.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"3855-3863","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/ElshabrawyR19","doi":"10.1109/JIOT.2019.2892294","ee":"https://doi.org/10.1109/JIOT.2019.2892294","url":"https://dblp.org/rec/journals/iotj/ElshabrawyR19"}, "url":"URL#1999389" }, { "@score":"1", "@id":"1999390", "info":{"authors":{"author":[{"@pid":"51/3604","text":"Alireza Esfahani"},{"@pid":"48/10015","text":"Georgios Mantas"},{"@pid":"12/8646","text":"Rainer Matischek"},{"@pid":"74/10098","text":"Firooz B. Saghezchi"},{"@pid":"04/1616","text":"Jonathan Rodriguez 0001"},{"@pid":"183/8372","text":"Ani Bicaku"},{"@pid":"170/7686","text":"Silia Maksuti"},{"@pid":"56/8261","text":"Markus Gerhard Tauber"},{"@pid":"150/8079","text":"Christoph Schmittner"},{"@pid":"07/4684","text":"Joaquim Bastos"}]},"title":"A Lightweight Authentication Mechanism for M2M Communications in Industrial IoT Environment.","venue":"IEEE Internet Things J.","volume":"6","number":"1","pages":"288-296","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/EsfahaniMMSRBMT19","doi":"10.1109/JIOT.2017.2737630","ee":"https://doi.org/10.1109/JIOT.2017.2737630","url":"https://dblp.org/rec/journals/iotj/EsfahaniMMSRBMT19"}, "url":"URL#1999390" }, { "@score":"1", "@id":"1999391", "info":{"authors":{"author":[{"@pid":"89/6036","text":"Christian Esposito 0001"},{"@pid":"46/295","text":"Aniello Castiglione"},{"@pid":"79/9641","text":"Flavio Frattini"},{"@pid":"c/MarcelloCinque","text":"Marcello Cinque"},{"@pid":"55/2303","text":"Yanjiang Yang"},{"@pid":"c/KimKwangRaymondChoo","text":"Kim-Kwang Raymond Choo"}]},"title":"On Data Sovereignty in Cloud-Based Computation Offloading for Smart Cities Applications.","venue":"IEEE Internet Things J.","volume":"6","number":"3","pages":"4521-4535","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/EspositoCFCYC19","doi":"10.1109/JIOT.2018.2886410","ee":"https://doi.org/10.1109/JIOT.2018.2886410","url":"https://dblp.org/rec/journals/iotj/EspositoCFCYC19"}, "url":"URL#1999391" }, { "@score":"1", "@id":"1999392", "info":{"authors":{"author":[{"@pid":"213/0973","text":"Omid Esrafilian"},{"@pid":"118/0583","text":"Rajeev Gangula"},{"@pid":"44/3570","text":"David Gesbert"}]},"title":"Learning to Communicate in UAV-Aided Wireless Networks: Map-Based Approaches.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"1791-1802","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/EsrafilianGG19","doi":"10.1109/JIOT.2018.2879682","ee":"https://doi.org/10.1109/JIOT.2018.2879682","url":"https://dblp.org/rec/journals/iotj/EsrafilianGG19"}, "url":"URL#1999392" }, { "@score":"1", "@id":"1999393", "info":{"authors":{"author":[{"@pid":"19/5365","text":"Qiang Fan"},{"@pid":"a/NirwanAnsari","text":"Nirwan Ansari"}]},"title":"Towards Traffic Load Balancing in Drone-Assisted Communications for IoT.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"3633-3640","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/FanA19","doi":"10.1109/JIOT.2018.2889503","ee":"https://doi.org/10.1109/JIOT.2018.2889503","url":"https://dblp.org/rec/journals/iotj/FanA19"}, "url":"URL#1999393" }, { "@score":"1", "@id":"1999394", "info":{"authors":{"author":[{"@pid":"20/3825-1","text":"Kai Fan 0001"},{"@pid":"222/4298","text":"Shangyang Wang"},{"@pid":"158/7576","text":"Yanhui Ren"},{"@pid":"26/6407","text":"Kan Yang 0001"},{"@pid":"43/180-2","text":"Zheng Yan 0002"},{"@pid":"l/HuiLi6","text":"Hui Li 0006"},{"@pid":"50/5329","text":"Yintang Yang"}]},"title":"Blockchain-Based Secure Time Protection Scheme in IoT.","venue":"IEEE Internet Things J.","volume":"6","number":"3","pages":"4671-4679","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/FanWRYYLY19","doi":"10.1109/JIOT.2018.2874222","ee":"https://doi.org/10.1109/JIOT.2018.2874222","url":"https://dblp.org/rec/journals/iotj/FanWRYYLY19"}, "url":"URL#1999394" }, { "@score":"1", "@id":"1999395", "info":{"authors":{"author":[{"@pid":"03/1628","text":"Wen Fang"},{"@pid":"74/1626","text":"Qingqing Zhang"},{"@pid":"174/6491","text":"Mingqing Liu"},{"@pid":"67/4161","text":"Qingwen Liu"},{"@pid":"83/4774","text":"Pengfei Xia"}]},"title":"Earning Maximization With Quality of Charging Service Guarantee for IoT Devices.","venue":"IEEE Internet Things J.","volume":"6","number":"1","pages":"1114-1124","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/FangZLLX19","doi":"10.1109/JIOT.2018.2868226","ee":"https://doi.org/10.1109/JIOT.2018.2868226","url":"https://dblp.org/rec/journals/iotj/FangZLLX19"}, "url":"URL#1999395" }, { "@score":"1", "@id":"1999396", "info":{"authors":{"author":[{"@pid":"03/1628","text":"Wen Fang"},{"@pid":"74/1626","text":"Qingqing Zhang"},{"@pid":"67/4161","text":"Qingwen Liu"},{"@pid":"20/3894-6","text":"Jun Wu 0006"},{"@pid":"83/4774","text":"Pengfei Xia"}]},"title":"Fair Scheduling in Resonant Beam Charging for IoT Devices.","venue":"IEEE Internet Things J.","volume":"6","number":"1","pages":"641-653","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/FangZLWX19","doi":"10.1109/JIOT.2018.2853546","ee":"https://doi.org/10.1109/JIOT.2018.2853546","url":"https://dblp.org/rec/journals/iotj/FangZLWX19"}, "url":"URL#1999396" }, { "@score":"1", "@id":"1999397", "info":{"authors":{"author":[{"@pid":"195/0459","text":"Yasmin Fathy"},{"@pid":"22/4255","text":"Payam M. Barnaghi"}]},"title":"Quality-Based and Energy-Efficient Data Communication for the Internet of Things Networks.","venue":"IEEE Internet Things J.","volume":"6","number":"6","pages":"10318-10331","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/FathyB19","doi":"10.1109/JIOT.2019.2938101","ee":"https://doi.org/10.1109/JIOT.2019.2938101","url":"https://dblp.org/rec/journals/iotj/FathyB19"}, "url":"URL#1999397" }, { "@score":"1", "@id":"1999398", "info":{"authors":{"author":[{"@pid":"162/8391","text":"Chunhai Feng"},{"@pid":"66/7412","text":"Sheheryar Arshad"},{"@pid":"45/2995","text":"Siwang Zhou"},{"@pid":"189/8919","text":"Dun Cao"},{"@pid":"43/5082","text":"Yonghe Liu"}]},"title":"Wi-Multi: A Three-Phase System for Multiple Human Activity Recognition With Commercial WiFi Devices.","venue":"IEEE Internet Things J.","volume":"6","number":"4","pages":"7293-7304","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/FengAZCL19","doi":"10.1109/JIOT.2019.2915989","ee":"https://doi.org/10.1109/JIOT.2019.2915989","url":"https://dblp.org/rec/journals/iotj/FengAZCL19"}, "url":"URL#1999398" }, { "@score":"1", "@id":"1999399", "info":{"authors":{"author":[{"@pid":"95/8789","text":"Jingyu Feng"},{"@pid":"86/4643","text":"Nan Liu"},{"@pid":"39/6191-9","text":"Jie Cao 0009"},{"@pid":"83/6530-1","text":"Yuqing Zhang 0001"},{"@pid":"33/9707","text":"Guangyue Lu"}]},"title":"Securing Traffic-Related Messages Exchange Against Inside-and-Outside Collusive Attack in Vehicular Networks.","venue":"IEEE Internet Things J.","volume":"6","number":"6","pages":"9979-9992","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/FengLCZL19","doi":"10.1109/JIOT.2019.2933632","ee":"https://doi.org/10.1109/JIOT.2019.2933632","url":"https://dblp.org/rec/journals/iotj/FengLCZL19"}, "url":"URL#1999399" }, { "@score":"1", "@id":"1999400", "info":{"authors":{"author":[{"@pid":"17/1152-1","text":"Wei Feng 0001"},{"@pid":"42/634","text":"Jingchao Wang"},{"@pid":"93/4847-1","text":"Yunfei Chen 0001"},{"@pid":"164/6450","text":"Xuanxuan Wang"},{"@pid":"09/2730-1","text":"Ning Ge 0001"},{"@pid":"59/3894","text":"Jianhua Lu"}]},"title":"UAV-Aided MIMO Communications for 5G Internet of Things.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"1731-1740","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/FengWCWGL19","doi":"10.1109/JIOT.2018.2874531","ee":"https://doi.org/10.1109/JIOT.2018.2874531","url":"https://dblp.org/rec/journals/iotj/FengWCWGL19"}, "url":"URL#1999400" }, { "@score":"1", "@id":"1999401", "info":{"authors":{"author":[{"@pid":"79/6534","text":"Bing Feng"},{"@pid":"91/195-1","text":"Chi Zhang 0001"},{"@pid":"59/3415","text":"Jianqing Liu"},{"@pid":"f/YuguangFang","text":"Yuguang Fang"}]},"title":"D2D Communications-Assisted Traffic Offloading in Integrated Cellular-WiFi Networks.","venue":"IEEE Internet Things J.","volume":"6","number":"5","pages":"8670-8680","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/FengZLF19","doi":"10.1109/JIOT.2019.2922550","ee":"https://doi.org/10.1109/JIOT.2019.2922550","url":"https://dblp.org/rec/journals/iotj/FengZLF19"}, "url":"URL#1999401" }, { "@score":"1", "@id":"1999402", "info":{"authors":{"author":[{"@pid":"62/10788","text":"Niroshinie Fernando"},{"@pid":"l/SengWaiLoke","text":"Seng W. Loke"},{"@pid":"78/10233","text":"Iman Avazpour"},{"@pid":"61/7690-1","text":"Feifei Chen 0001"},{"@pid":"208/0229","text":"Amin Bakshandeh Abkenar"},{"@pid":"251/1536","text":"Amani Ibrahim"}]},"title":"Opportunistic Fog for IoT: Challenges and Opportunities.","venue":"IEEE Internet Things J.","volume":"6","number":"5","pages":"8897-8910","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/FernandoLACAI19","doi":"10.1109/JIOT.2019.2924182","ee":"https://doi.org/10.1109/JIOT.2019.2924182","url":"https://dblp.org/rec/journals/iotj/FernandoLACAI19"}, "url":"URL#1999402" }, { "@score":"1", "@id":"1999403", "info":{"authors":{"author":[{"@pid":"142/9937","text":"Mohamed Amine Ferrag"},{"@pid":"62/7581","text":"Makhlouf Derdour"},{"@pid":"39/8298-1","text":"Mithun Mukherjee 0001"},{"@pid":"08/6647","text":"Abdelouahid Derhab"},{"@pid":"06/7838","text":"Leandros A. Maglaras"},{"@pid":"69/1646","text":"Helge Janicke"}]},"title":"Blockchain Technologies for the Internet of Things: Research Issues and Challenges.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"2188-2204","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/FerragDMDMJ19","doi":"10.1109/JIOT.2018.2882794","ee":"https://doi.org/10.1109/JIOT.2018.2882794","url":"https://dblp.org/rec/journals/iotj/FerragDMDMJ19"}, "url":"URL#1999403" }, { "@score":"1", "@id":"1999404", "info":{"authors":{"author":[{"@pid":"243/8482","text":"Pau Ferrer-Cid"},{"@pid":"54/5791","text":"José M. Barceló-Ordinas"},{"@pid":"15/5654","text":"Jorge García-Vidal"},{"@pid":"243/8420","text":"Anna Ripoll"},{"@pid":"243/8832","text":"Mar Viana"}]},"title":"A Comparative Study of Calibration Methods for Low-Cost Ozone Sensors in IoT Platforms.","venue":"IEEE Internet Things J.","volume":"6","number":"6","pages":"9563-9571","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/Ferrer-CidBGRV19","doi":"10.1109/JIOT.2019.2929594","ee":"https://doi.org/10.1109/JIOT.2019.2929594","url":"https://dblp.org/rec/journals/iotj/Ferrer-CidBGRV19"}, "url":"URL#1999404" }, { "@score":"1", "@id":"1999405", "info":{"authors":{"author":[{"@pid":"61/5839","text":"Valerio Freschi"},{"@pid":"59/5217","text":"Emanuele Lattanzi"}]},"title":"A Study on the Impact of Packet Length on Communication in Low Power Wireless Sensor Networks Under Interference.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"3820-3830","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/FreschiL19","doi":"10.1109/JIOT.2019.2891841","ee":"https://doi.org/10.1109/JIOT.2019.2891841","url":"https://dblp.org/rec/journals/iotj/FreschiL19"}, "url":"URL#1999405" }, { "@score":"1", "@id":"1999406", "info":{"authors":{"author":[{"@pid":"43/6521","text":"Antônio Augusto Fröhlich"},{"@pid":"26/2522","text":"Roberto Milton Scheffel"},{"@pid":"170/0240","text":"David Kozhaya"},{"@pid":"v/PauloVerissimo","text":"Paulo Jorge Esteves Veríssimo"}]},"title":"Byzantine Resilient Protocol for the IoT.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"2506-2517","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/FrohlichSKV19","doi":"10.1109/JIOT.2018.2871157","ee":"https://doi.org/10.1109/JIOT.2018.2871157","url":"https://dblp.org/rec/journals/iotj/FrohlichSKV19"}, "url":"URL#1999406" }, { "@score":"1", "@id":"1999407", "info":{"authors":{"author":[{"@pid":"183/5001","text":"Hailing Fu"},{"@pid":"192/6589","text":"Zahra Sharif Khodaei"},{"@pid":"236/4546","text":"M. H. Ferri Aliabadi"}]},"title":"An Event-Triggered Energy-Efficient Wireless Structural Health Monitoring System for Impact Detection in Composite Airframes.","venue":"IEEE Internet Things J.","volume":"6","number":"1","pages":"1183-1192","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/FuKA19","doi":"10.1109/JIOT.2018.2867722","ee":"https://doi.org/10.1109/JIOT.2018.2867722","url":"https://dblp.org/rec/journals/iotj/FuKA19"}, "url":"URL#1999407" }, { "@score":"1", "@id":"1999408", "info":{"authors":{"author":[{"@pid":"122/5017","text":"Shu Fu"},{"@pid":"67/4307","text":"Zhou Su"},{"@pid":"42/6727","text":"Yunjian Jia"},{"@pid":"14/8431","text":"Haibo Zhou"},{"@pid":"38/4674-3","text":"Yi Jin 0003"},{"@pid":"00/468","text":"Ju Ren"},{"@pid":"98/4432-2","text":"Bin Wu 0002"},{"@pid":"54/7413","text":"Kazi Mohammed Saidul Huq"}]},"title":"Interference Cooperation via Distributed Game in 5G Networks.","venue":"IEEE Internet Things J.","volume":"6","number":"1","pages":"311-320","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/FuSJZJRWH19","doi":"10.1109/JIOT.2017.2743116","ee":"https://doi.org/10.1109/JIOT.2017.2743116","url":"https://dblp.org/rec/journals/iotj/FuSJZJRWH19"}, "url":"URL#1999408" }, { "@score":"1", "@id":"1999409", "info":{"authors":{"author":[{"@pid":"240/7184","text":"Sonal Gahlot"},{"@pid":"195/3687","text":"S. R. N. Reddy"},{"@pid":"43/3644","text":"Dinesh Kumar"}]},"title":"Review of Smart Health Monitoring Approaches With Survey Analysis and Proposed Framework.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"2116-2127","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/GahlotRK19","doi":"10.1109/JIOT.2018.2872389","ee":"https://doi.org/10.1109/JIOT.2018.2872389","url":"https://dblp.org/rec/journals/iotj/GahlotRK19"}, "url":"URL#1999409" }, { "@score":"1", "@id":"1999410", "info":{"authors":{"author":[{"@pid":"164/3309","text":"Keke Gai"},{"@pid":"132/9941","text":"Yulu Wu"},{"@pid":"26/2546","text":"Liehuang Zhu"},{"@pid":"19/360-16","text":"Lei Xu 0016"},{"@pid":"04/3348-2","text":"Yan Zhang 0002"}]},"title":"Permissioned Blockchain and Edge Computing Empowered Privacy-Preserving Smart Grid Networks.","venue":"IEEE Internet Things J.","volume":"6","number":"5","pages":"7992-8004","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/GaiWZXZ19","doi":"10.1109/JIOT.2019.2904303","ee":"https://doi.org/10.1109/JIOT.2019.2904303","url":"https://dblp.org/rec/journals/iotj/GaiWZXZ19"}, "url":"URL#1999410" }, { "@score":"1", "@id":"1999411", "info":{"authors":{"author":[{"@pid":"13/29","text":"Xiaoying Gan"},{"@pid":"73/3521","text":"Yuqing Li"},{"@pid":"182/9906","text":"Yixuan Huang"},{"@pid":"44/7207","text":"Luoyi Fu"},{"@pid":"96/1149","text":"Xinbing Wang"}]},"title":"When Crowdsourcing Meets Social IoT: An Efficient Privacy-Preserving Incentive Mechanism.","venue":"IEEE Internet Things J.","volume":"6","number":"6","pages":"9707-9721","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/GanLHFW19","doi":"10.1109/JIOT.2019.2930659","ee":"https://doi.org/10.1109/JIOT.2019.2930659","url":"https://dblp.org/rec/journals/iotj/GanLHFW19"}, "url":"URL#1999411" }, { "@score":"1", "@id":"1999412", "info":{"authors":{"author":[{"@pid":"43/8647","text":"Amir H. Gandomi"},{"@pid":"92/4586","text":"Mahmoud Daneshmand"},{"@pid":"119/3707","text":"Rashmi Jha"},{"@pid":"86/3784-1","text":"Devinder Kaur 0001"},{"@pid":"08/3821","text":"Huansheng Ning"},{"@pid":"255/2367","text":"Calvin Robinson"},{"@pid":"255/2201","text":"Herbert Schilling"}]},"title":"Guest Editorial Nature-Inspired Approaches for IoT and Big Data.","venue":"IEEE Internet Things J.","volume":"6","number":"6","pages":"9213-9216","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/GandomiDJKNRS19","doi":"10.1109/JIOT.2019.2947754","ee":"https://doi.org/10.1109/JIOT.2019.2947754","url":"https://dblp.org/rec/journals/iotj/GandomiDJKNRS19"}, "url":"URL#1999412" }, { "@score":"1", "@id":"1999413", "info":{"authors":{"author":[{"@pid":"197/3375","text":"Xiaozheng Gao"},{"@pid":"199/1893","text":"Shaohan Feng"},{"@pid":"76/440","text":"Dusit Niyato"},{"@pid":"37/1304-1","text":"Ping Wang 0001"},{"@pid":"17/2247-4","text":"Kai Yang 0004"},{"@pid":"98/153","text":"Ying-Chang Liang"}]},"title":"Dynamic Access Point and Service Selection in Backscatter-Assisted RF-Powered Cognitive Networks.","venue":"IEEE Internet Things J.","volume":"6","number":"5","pages":"8270-8283","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/GaoFNWYL19","doi":"10.1109/JIOT.2019.2923566","ee":"https://doi.org/10.1109/JIOT.2019.2923566","url":"https://dblp.org/rec/journals/iotj/GaoFNWYL19"}, "url":"URL#1999413" }, { "@score":"1", "@id":"1999414", "info":{"authors":{"author":[{"@pid":"203/6472","text":"Yunquan Gao"},{"@pid":"46/5404-3","text":"Xiaoyong Li 0003"},{"@pid":"144/6720","text":"Jirui Li"},{"@pid":"27/3228","text":"Yali Gao"}]},"title":"Distributed and Efficient Minimum-Latency Data Aggregation Scheduling for Multichannel Wireless Sensor Networks.","venue":"IEEE Internet Things J.","volume":"6","number":"5","pages":"8482-8495","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/GaoLLG19","doi":"10.1109/JIOT.2019.2919639","ee":"https://doi.org/10.1109/JIOT.2019.2919639","url":"https://dblp.org/rec/journals/iotj/GaoLLG19"}, "url":"URL#1999414" }, { "@score":"1", "@id":"1999415", "info":{"authors":{"author":[{"@pid":"28/435-4","text":"Shang Gao 0004"},{"@pid":"28/10523-1","text":"Gui Yun Tian 0001"},{"@pid":"77/3562","text":"Xuewu Dai"},{"@pid":"144/9645","text":"Mengbao Fan"},{"@pid":"255/2241","text":"Xingjuan Shi"},{"@pid":"255/2344","text":"Jinjie Zhu"},{"@pid":"187/0098","text":"Kongjing Li"}]},"title":"A Novel Distributed Linear-Spatial-Array Sensing System Based on Multichannel LPWAN for Large-Scale Blast Wave Monitoring.","venue":"IEEE Internet Things J.","volume":"6","number":"6","pages":"9679-9688","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/GaoTDFSZL19","doi":"10.1109/JIOT.2019.2930472","ee":"https://doi.org/10.1109/JIOT.2019.2930472","url":"https://dblp.org/rec/journals/iotj/GaoTDFSZL19"}, "url":"URL#1999415" }, { "@score":"1", "@id":"1999416", "info":{"authors":{"author":[{"@pid":"184/7483","text":"Yulan Gao"},{"@pid":"63/5957","text":"Wanbin Tang"},{"@pid":"224/9356","text":"Mingming Wu"},{"@pid":"86/2711-5","text":"Ping Yang 0005"},{"@pid":"61/5135","text":"Lilin Dan"}]},"title":"Dynamic Social-Aware Computation Offloading for Low-Latency Communications in IoT.","venue":"IEEE Internet Things J.","volume":"6","number":"5","pages":"7864-7877","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/GaoTWYD19","doi":"10.1109/JIOT.2019.2909299","ee":"https://doi.org/10.1109/JIOT.2019.2909299","url":"https://dblp.org/rec/journals/iotj/GaoTWYD19"}, "url":"URL#1999416" }, { "@score":"1", "@id":"1999417", "info":{"authors":{"author":[{"@pid":"163/8765","text":"Qinghe Gao"},{"@pid":"45/9014","text":"Yawei Wang"},{"@pid":"c/XiuzhenCheng","text":"Xiuzhen Cheng 0001"},{"@pid":"34/25","text":"Jiguo Yu"},{"@pid":"16/3283","text":"Xi Chen"},{"@pid":"16/2303","text":"Tao Jing"}]},"title":"Identification of Vulnerable Lines in Smart Grid Systems Based on Affinity Propagation Clustering.","venue":"IEEE Internet Things J.","volume":"6","number":"3","pages":"5163-5171","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/GaoWCYCJ19","doi":"10.1109/JIOT.2019.2897434","ee":"https://doi.org/10.1109/JIOT.2019.2897434","url":"https://dblp.org/rec/journals/iotj/GaoWCYCJ19"}, "url":"URL#1999417" }, { "@score":"1", "@id":"1999418", "info":{"authors":{"author":[{"@pid":"02/2658","text":"Zan Gao"},{"@pid":"255/2301","text":"Hai-Zhen Xuan"},{"@pid":"69/2745-3","text":"Hua Zhang 0003"},{"@pid":"34/7561","text":"Shaohua Wan 0001"},{"@pid":"c/KimKwangRaymondChoo","text":"Kim-Kwang Raymond Choo"}]},"title":"Adaptive Fusion and Category-Level Dictionary Learning Model for Multiview Human Action Recognition.","venue":"IEEE Internet Things J.","volume":"6","number":"6","pages":"9280-9293","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/GaoXZWC19","doi":"10.1109/JIOT.2019.2911669","ee":"https://doi.org/10.1109/JIOT.2019.2911669","url":"https://dblp.org/rec/journals/iotj/GaoXZWC19"}, "url":"URL#1999418" }, { "@score":"1", "@id":"1999419", "info":{"authors":{"author":[{"@pid":"81/10735","text":"Xiangchuan Gao"},{"@pid":"94/1861-2","text":"Jian-Kang Zhang 0002"},{"@pid":"137/0264","text":"He Henry Chen"},{"@pid":"94/3077-3","text":"Dong Zheng 0003"},{"@pid":"84/3821","text":"Branka Vucetic"}]},"title":"Energy-Efficient and Low-Latency Massive SIMO Using Noncoherent ML Detection for Industrial IoT Communications.","venue":"IEEE Internet Things J.","volume":"6","number":"4","pages":"6247-6261","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/GaoZCZV19","doi":"10.1109/JIOT.2018.2878716","ee":"https://doi.org/10.1109/JIOT.2018.2878716","url":"https://dblp.org/rec/journals/iotj/GaoZCZV19"}, "url":"URL#1999419" }, { "@score":"1", "@id":"1999420", "info":{"authors":{"author":[{"@pid":"28/435-4","text":"Shang Gao 0004"},{"@pid":"86/7763","text":"Xuehui Zhang"},{"@pid":"243/6441","text":"Cuicui Du"},{"@pid":"208/7806","text":"Qian Ji"}]},"title":"A Multichannel Low-Power Wide-Area Network With High-Accuracy Synchronization Ability for Machine Vibration Monitoring.","venue":"IEEE Internet Things J.","volume":"6","number":"3","pages":"5040-5047","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/GaoZDJ19","doi":"10.1109/JIOT.2019.2895158","ee":"https://doi.org/10.1109/JIOT.2019.2895158","url":"https://dblp.org/rec/journals/iotj/GaoZDJ19"}, "url":"URL#1999420" }, { "@score":"1", "@id":"1999421", "info":{"authors":{"author":[{"@pid":"64/5289","text":"Iván García-Magariño"},{"@pid":"49/7713","text":"Sandra Sendra"},{"@pid":"36/1005","text":"Raquel Lacuesta"},{"@pid":"l/JaimeLloret","text":"Jaime Lloret 0001"}]},"title":"Security in Vehicles With IoT by Prioritization Rules, Vehicle Certificates, and Trust Management.","venue":"IEEE Internet Things J.","volume":"6","number":"4","pages":"5927-5934","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/Garcia-Magarino19","doi":"10.1109/JIOT.2018.2871255","ee":"https://doi.org/10.1109/JIOT.2018.2871255","url":"https://dblp.org/rec/journals/iotj/Garcia-Magarino19"}, "url":"URL#1999421" }, { "@score":"1", "@id":"1999422", "info":{"authors":{"author":[{"@pid":"144/9558","text":"Cristian González García"},{"@pid":"32/3188-1","text":"Liping Zhao 0001"},{"@pid":"33/4151","text":"Vicente García-Díaz"}]},"title":"A User-Oriented Language for Specifying Interconnections Between Heterogeneous Objects in the Internet of Things.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"3806-3819","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/GarciaZG19","doi":"10.1109/JIOT.2019.2891545","ee":"https://doi.org/10.1109/JIOT.2019.2891545","url":"https://dblp.org/rec/journals/iotj/GarciaZG19"}, "url":"URL#1999422" }, { "@score":"1", "@id":"1999423", "info":{"authors":{"author":[{"@pid":"193/1527","text":"Rasha Gargees"},{"@pid":"69/571","text":"Grant J. Scott"}]},"title":"Dynamically Scalable Distributed Virtual Framework Based on Agents and Pub/Sub Pattern for IoT Media Data.","venue":"IEEE Internet Things J.","volume":"6","number":"1","pages":"599-613","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/GargeesS19","doi":"10.1109/JIOT.2018.2849406","ee":"https://doi.org/10.1109/JIOT.2018.2849406","url":"https://dblp.org/rec/journals/iotj/GargeesS19"}, "url":"URL#1999423" }, { "@score":"1", "@id":"1999424", "info":{"authors":{"author":[{"@pid":"185/7914","text":"N. B. Gayathri 0001"},{"@pid":"158/5907","text":"Thumbur Gowri"},{"@pid":"71/941","text":"P. Rajesh Kumar"},{"@pid":"197/6112","text":"Md. Zia Ur Rahman 0001"},{"@pid":"59/10330","text":"Punugu Vasudeva Reddy"},{"@pid":"28/9953","text":"Aimé Lay-Ekuakille"}]},"title":"Efficient and Secure Pairing-Free Certificateless Aggregate Signature Scheme for Healthcare Wireless Medical Sensor Networks.","venue":"IEEE Internet Things J.","volume":"6","number":"5","pages":"9064-9075","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/GayathriGKRRL19","doi":"10.1109/JIOT.2019.2927089","ee":"https://doi.org/10.1109/JIOT.2019.2927089","url":"https://dblp.org/rec/journals/iotj/GayathriGKRRL19"}, "url":"URL#1999424" }, { "@score":"1", "@id":"1999425", "info":{"authors":{"author":[{"@pid":"38/9839","text":"Kayhan Zrar Ghafoor"},{"@pid":"23/7909","text":"Linghe Kong"},{"@pid":"79/2597","text":"Danda B. Rawat"},{"@pid":"212/4460","text":"Eghbal Hosseini"},{"@pid":"137/5184","text":"Ali Safaa Sadiq"}]},"title":"Quality of Service Aware Routing Protocol in Software-Defined Internet of Vehicles.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"2817-2828","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/GhafoorKRHS19","doi":"10.1109/JIOT.2018.2875482","ee":"https://doi.org/10.1109/JIOT.2018.2875482","url":"https://dblp.org/rec/journals/iotj/GhafoorKRHS19"}, "url":"URL#1999425" }, { "@score":"1", "@id":"1999426", "info":{"authors":{"author":[{"@pid":"184/1262","text":"Farshad Ghanei"},{"@pid":"184/1252","text":"Pranav Tipnis"},{"@pid":"149/0343","text":"Kyle Marcus"},{"@pid":"89/1614","text":"Karthik Dantu"},{"@pid":"22/4235","text":"Steven Y. Ko"},{"@pid":"54/645","text":"Lukasz Ziarek"}]},"title":"OS-Based Energy Accounting for Asynchronous Resources in IoT Devices.","venue":"IEEE Internet Things J.","volume":"6","number":"3","pages":"5841-5852","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/GhaneiTMDKZ19","doi":"10.1109/JIOT.2019.2907668","ee":"https://doi.org/10.1109/JIOT.2019.2907668","url":"https://dblp.org/rec/journals/iotj/GhaneiTMDKZ19"}, "url":"URL#1999426" }, { "@score":"1", "@id":"1999427", "info":{"authors":{"author":[{"@pid":"151/6597","text":"Pouya Mollaebrahim Ghari"},{"@pid":"151/6705","text":"Reza Shahbazian"},{"@pid":"96/3387","text":"Seyed Ali Ghorashi"}]},"title":"Maximum Entropy-Based Semi-Definite Programming for Wireless Sensor Network Localization.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"3480-3491","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/GhariSG19","doi":"10.1109/JIOT.2018.2885959","ee":"https://doi.org/10.1109/JIOT.2018.2885959","url":"https://dblp.org/rec/journals/iotj/GhariSG19"}, "url":"URL#1999427" }, { "@score":"1", "@id":"1999428", "info":{"authors":{"author":[{"@pid":"55/7987","text":"Nirnay Ghosh"},{"@pid":"255/2202","text":"Saket Chandra"},{"@pid":"45/2519","text":"Vinay Sachidananda"},{"@pid":"38/4086","text":"Yuval Elovici"}]},"title":"SoftAuthZ: A Context-Aware, Behavior-Based Authorization Framework for Home IoT.","venue":"IEEE Internet Things J.","volume":"6","number":"6","pages":"10773-10785","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/GhoshCSE19","doi":"10.1109/JIOT.2019.2941767","ee":"https://doi.org/10.1109/JIOT.2019.2941767","url":"https://dblp.org/rec/journals/iotj/GhoshCSE19"}, "url":"URL#1999428" }, { "@score":"1", "@id":"1999429", "info":{"authors":{"author":[{"@pid":"149/9570","text":"Munkhjargal Gochoo"},{"@pid":"22/3986","text":"Tan-Hsu Tan"},{"@pid":"26/5079","text":"Shih-Chia Huang"},{"@pid":"234/0944","text":"Tsedevdorj Batjargal"},{"@pid":"83/5722","text":"Jun-Wei Hsieh"},{"@pid":"208/1541","text":"Fady S. Alnajjar"},{"@pid":"93/3590","text":"Yung-Fu Chen"}]},"title":"Novel IoT-Based Privacy-Preserving Yoga Posture Recognition System Using Low-Resolution Infrared Sensors and Deep Learning.","venue":"IEEE Internet Things J.","volume":"6","number":"4","pages":"7192-7200","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/GochooTHBHAC19","doi":"10.1109/JIOT.2019.2915095","ee":"https://doi.org/10.1109/JIOT.2019.2915095","url":"https://dblp.org/rec/journals/iotj/GochooTHBHAC19"}, "url":"URL#1999429" }, { "@score":"1", "@id":"1999430", "info":{"authors":{"author":[{"@pid":"146/8257","text":"Prosanta Gope"},{"@pid":"s/BiplabSikdar","text":"Biplab Sikdar 0001"}]},"title":"Lightweight and Privacy-Preserving Two-Factor Authentication Scheme for IoT Devices.","venue":"IEEE Internet Things J.","volume":"6","number":"1","pages":"580-589","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/GopeS19","doi":"10.1109/JIOT.2018.2846299","ee":"https://doi.org/10.1109/JIOT.2018.2846299","url":"https://dblp.org/rec/journals/iotj/GopeS19"}, "url":"URL#1999430" }, { "@score":"1", "@id":"1999431", "info":{"authors":{"author":[{"@pid":"15/4208-12","text":"Yu Gu 0012"},{"@pid":"79/940","text":"Qimei Cui"},{"@pid":"31/334-2","text":"Qiang Ye 0002"},{"@pid":"z/WeihuaZhuang","text":"Weihua Zhuang"}]},"title":"Game-Theoretic Optimization for Machine-Type Communications Under QoS Guarantee.","venue":"IEEE Internet Things J.","volume":"6","number":"1","pages":"790-800","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/GuCYZ19","doi":"10.1109/JIOT.2018.2856898","ee":"https://doi.org/10.1109/JIOT.2018.2856898","url":"https://dblp.org/rec/journals/iotj/GuCYZ19"}, "url":"URL#1999431" }, { "@score":"1", "@id":"1999432", "info":{"authors":{"author":[{"@pid":"167/3881","text":"Yifan Gu"},{"@pid":"137/0264","text":"He Chen 0001"},{"@pid":"90/5836-6","text":"Yong Zhou 0006"},{"@pid":"59/6828-1","text":"Yonghui Li 0001"},{"@pid":"84/3821","text":"Branka Vucetic"}]},"title":"Timely Status Update in Internet of Things Monitoring Systems: An Age-Energy Tradeoff.","venue":"IEEE Internet Things J.","volume":"6","number":"3","pages":"5324-5335","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/GuCZLV19","doi":"10.1109/JIOT.2019.2900528","ee":"https://doi.org/10.1109/JIOT.2019.2900528","url":"https://dblp.org/rec/journals/iotj/GuCZLV19"}, "url":"URL#1999432" }, { "@score":"1", "@id":"1999433", "info":{"authors":{"author":[{"@pid":"167/3881","text":"Yifan Gu"},{"@pid":"137/0264","text":"He Henry Chen"},{"@pid":"23/7911-1","text":"Chao Zhai 0001"},{"@pid":"59/6828-1","text":"Yonghui Li 0001"},{"@pid":"84/3821","text":"Branka Vucetic"}]},"title":"Minimizing Age of Information in Cognitive Radio-Based IoT Systems: Underlay or Overlay?","venue":"IEEE Internet Things J.","volume":"6","number":"6","pages":"10273-10288","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/GuCZLV19a","doi":"10.1109/JIOT.2019.2937334","ee":"https://doi.org/10.1109/JIOT.2019.2937334","url":"https://dblp.org/rec/journals/iotj/GuCZLV19a"}, "url":"URL#1999433" }, { "@score":"1", "@id":"1999434", "info":{"authors":{"author":[{"@pid":"25/7826","text":"Ke Guan"},{"@pid":"136/7999","text":"Danping He"},{"@pid":"85/6463-1","text":"Bo Ai 0001"},{"@pid":"68/3870","text":"David W. Matolak"},{"@pid":"19/1924-6","text":"Qi Wang 0006"},{"@pid":"23/2071","text":"Zhangdui Zhong"},{"@pid":"64/5604","text":"Thomas Kürner"}]},"title":"5-GHz Obstructed Vehicle-to-Vehicle Channel Characterization for Internet of Intelligent Vehicles.","venue":"IEEE Internet Things J.","volume":"6","number":"1","pages":"100-110","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/GuanHAMWZK19","doi":"10.1109/JIOT.2018.2872437","ee":"https://doi.org/10.1109/JIOT.2018.2872437","url":"https://dblp.org/rec/journals/iotj/GuanHAMWZK19"}, "url":"URL#1999434" }, { "@score":"1", "@id":"1999435", "info":{"authors":{"author":[{"@pid":"46/7206","text":"Quansheng Guan"},{"@pid":"73/3157","text":"Fei Ji"},{"@pid":"50/2482-6","text":"Yun Liu 0006"},{"@pid":"02/2407-1","text":"Hua Yu 0001"},{"@pid":"19/4900","text":"Weiqi Chen"}]},"title":"Distance-Vector-Based Opportunistic Routing for Underwater Acoustic Sensor Networks.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"3831-3839","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/GuanJLYC19","doi":"10.1109/JIOT.2019.2891910","ee":"https://doi.org/10.1109/JIOT.2019.2891910","url":"https://dblp.org/rec/journals/iotj/GuanJLYC19"}, "url":"URL#1999435" }, { "@score":"1", "@id":"1999436", "info":{"authors":{"author":[{"@pid":"49/2335","text":"Lin Guo"},{"@pid":"29/8493-1","text":"Zhi-gang Chen 0001"},{"@pid":"21/7829","text":"Deyu Zhang"},{"@pid":"51/2773-1","text":"Jiaqi Liu 0001"},{"@pid":"p/JianpingPan","text":"Jianping Pan 0001"}]},"title":"Sustainability in Body Sensor Networks With Transmission Scheduling and Energy Harvesting.","venue":"IEEE Internet Things J.","volume":"6","number":"6","pages":"9633-9644","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/GuoCZLP19","doi":"10.1109/JIOT.2019.2930076","ee":"https://doi.org/10.1109/JIOT.2019.2930076","url":"https://dblp.org/rec/journals/iotj/GuoCZLP19"}, "url":"URL#1999436" }, { "@score":"1", "@id":"1999437", "info":{"authors":{"author":[{"@pid":"119/1700","text":"Chunhui Guo"},{"@pid":"122/2613","text":"Zhicheng Fu"},{"@pid":"01/1844-9","text":"Zhenyu Zhang 0009"},{"@pid":"03/6144","text":"Shangping Ren"},{"@pid":"67/5282","text":"Lui Sha"}]},"title":"Design Verifiably Correct Model Patterns to Facilitate Modeling Medical Best Practice Guidelines With Statecharts.","venue":"IEEE Internet Things J.","volume":"6","number":"4","pages":"6276-6284","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/GuoFZRS19","doi":"10.1109/JIOT.2018.2879475","ee":"https://doi.org/10.1109/JIOT.2018.2879475","url":"https://dblp.org/rec/journals/iotj/GuoFZRS19"}, "url":"URL#1999437" }, { "@score":"1", "@id":"1999438", "info":{"authors":{"author":[{"@pid":"166/1938","text":"Hansong Guo"},{"@pid":"75/4947-1","text":"He Huang 0001"},{"@pid":"117/3395","text":"Yu-E Sun"},{"@pid":"41/10435","text":"Youlin Zhang"},{"@pid":"c/ShigangChen","text":"Shigang Chen"},{"@pid":"51/769","text":"Liusheng Huang"}]},"title":"Chaac: Real-Time and Fine-Grained Rain Detection and Measurement Using Smartphones.","venue":"IEEE Internet Things J.","volume":"6","number":"1","pages":"997-1009","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/GuoHSZCH19","doi":"10.1109/JIOT.2018.2866690","ee":"https://doi.org/10.1109/JIOT.2018.2866690","url":"https://dblp.org/rec/journals/iotj/GuoHSZCH19"}, "url":"URL#1999438" }, { "@score":"1", "@id":"1999439", "info":{"authors":{"author":[{"@pid":"142/8822","text":"Xiansheng Guo"},{"@pid":"73/2252-28","text":"Lin Li 0028"},{"@pid":"03/2611","text":"Feng Xu"},{"@pid":"a/NirwanAnsari","text":"Nirwan Ansari"}]},"title":"Expectation Maximization Indoor Localization Utilizing Supporting Set for Internet of Things.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"2573-2582","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/GuoLXA19","doi":"10.1109/JIOT.2018.2871831","ee":"https://doi.org/10.1109/JIOT.2018.2871831","url":"https://dblp.org/rec/journals/iotj/GuoLXA19"}, "url":"URL#1999439" }, { "@score":"1", "@id":"1999440", "info":{"authors":{"author":[{"@pid":"49/5304","text":"Haiyan Guo"},{"@pid":"70/2539-1","text":"Zhen Yang 0001"},{"@pid":"43/7418","text":"Yulong Zou"},{"@pid":"45/2826","text":"Theodoros A. Tsiftsis"},{"@pid":"54/436","text":"Manav R. Bhatnagar"},{"@pid":"98/6670","text":"Rodrigo C. de Lamare"}]},"title":"Secure Beamforming for Cooperative Wireless-Powered Networks With Partial CSI.","venue":"IEEE Internet Things J.","volume":"6","number":"4","pages":"6760-6773","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/GuoYZTBL19","doi":"10.1109/JIOT.2019.2911356","ee":"https://doi.org/10.1109/JIOT.2019.2911356","url":"https://dblp.org/rec/journals/iotj/GuoYZTBL19"}, "url":"URL#1999440" }, { "@score":"1", "@id":"1999441", "info":{"authors":{"author":[{"@pid":"76/5349-1","text":"Cheng Guo 0001"},{"@pid":"170/3479","text":"Ruhan Zhuang"},{"@pid":"187/4537","text":"Yingmo Jie"},{"@pid":"c/KimKwangRaymondChoo","text":"Kim-Kwang Raymond Choo"},{"@pid":"65/5518","text":"Xinyu Tang"}]},"title":"Secure Range Search Over Encrypted Uncertain IoT Outsourced Data.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"1520-1529","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/GuoZJCT19","doi":"10.1109/JIOT.2018.2845106","ee":"https://doi.org/10.1109/JIOT.2018.2845106","url":"https://dblp.org/rec/journals/iotj/GuoZJCT19"}, "url":"URL#1999441" }, { "@score":"1", "@id":"1999442", "info":{"authors":{"author":[{"@pid":"142/8822","text":"Xiansheng Guo"},{"@pid":"118/5807","text":"Shilin Zhu"},{"@pid":"73/2252-28","text":"Lin Li 0028"},{"@pid":"235/0720","text":"Fangzi Hu"},{"@pid":"a/NirwanAnsari","text":"Nirwan Ansari"}]},"title":"Accurate WiFi Localization by Unsupervised Fusion of Extended Candidate Location Set.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"2476-2485","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/GuoZLHA19","doi":"10.1109/JIOT.2018.2870659","ee":"https://doi.org/10.1109/JIOT.2018.2870659","url":"https://dblp.org/rec/journals/iotj/GuoZLHA19"}, "url":"URL#1999442" }, { "@score":"1", "@id":"1999443", "info":{"authors":{"author":[{"@pid":"42/8204","text":"Hongzhi Guo"},{"@pid":"84/6889-52","text":"Jie Zhang 0052"},{"@pid":"40/6246-1","text":"Jiajia Liu 0001"},{"@pid":"22/1887","text":"Haibin Zhang"}]},"title":"Energy-Aware Computation Offloading and Transmit Power Allocation in Ultradense IoT Networks.","venue":"IEEE Internet Things J.","volume":"6","number":"3","pages":"4317-4329","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/GuoZLZ19","doi":"10.1109/JIOT.2018.2875535","ee":"https://doi.org/10.1109/JIOT.2018.2875535","url":"https://dblp.org/rec/journals/iotj/GuoZLZ19"}, "url":"URL#1999443" }, { "@score":"1", "@id":"1999444", "info":{"authors":{"author":[{"@pid":"76/5349-1","text":"Cheng Guo 0001"},{"@pid":"170/3479","text":"Ruhan Zhuang"},{"@pid":"04/4049","text":"Chunhua Su"},{"@pid":"47/9462","text":"Charles Zhechao Liu"},{"@pid":"c/KimKwangRaymondChoo","text":"Kim-Kwang Raymond Choo"}]},"title":"Secure and Efficient K Nearest Neighbor Query Over Encrypted Uncertain Data in Cloud-IoT Ecosystem.","venue":"IEEE Internet Things J.","volume":"6","number":"6","pages":"9868-9879","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/GuoZSLC19","doi":"10.1109/JIOT.2019.2932775","ee":"https://doi.org/10.1109/JIOT.2019.2932775","url":"https://dblp.org/rec/journals/iotj/GuoZSLC19"}, "url":"URL#1999444" }, { "@score":"1", "@id":"1999445", "info":{"authors":{"author":[{"@pid":"167/0667","text":"Huayan Guo"},{"@pid":"19/771-1","text":"Qianqian Zhang 0001"},{"@pid":"175/2475","text":"Sa Xiao"},{"@pid":"98/153","text":"Ying-Chang Liang"}]},"title":"Exploiting Multiple Antennas for Cognitive Ambient Backscatter Communication.","venue":"IEEE Internet Things J.","volume":"6","number":"1","pages":"765-775","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/GuoZXL19","doi":"10.1109/JIOT.2018.2856633","ee":"https://doi.org/10.1109/JIOT.2018.2856633","url":"https://dblp.org/rec/journals/iotj/GuoZXL19"}, "url":"URL#1999445" }, { "@score":"1", "@id":"1999446", "info":{"authors":{"author":[{"@pid":"172/5538","text":"Atrayee Gupta"},{"@pid":"22/4626","text":"Nandini Mukherjee"}]},"title":"A Cloudlet Platform With Virtual Sensors for Smart Edge Computing.","venue":"IEEE Internet Things J.","volume":"6","number":"5","pages":"8455-8462","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/GuptaM19","doi":"10.1109/JIOT.2019.2918405","ee":"https://doi.org/10.1109/JIOT.2019.2918405","url":"https://dblp.org/rec/journals/iotj/GuptaM19"}, "url":"URL#1999446" }, { "@score":"1", "@id":"1999447", "info":{"authors":{"author":[{"@pid":"179/8757","text":"Devendra Singh Gurjar"},{"@pid":"55/1768-1","text":"Ha H. Nguyen 0001"},{"@pid":"51/4580","text":"Hoang Duong Tuan"}]},"title":"Wireless Information and Power Transfer for IoT Applications in Overlay Cognitive Radio Networks.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"3257-3270","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/GurjarNT19","doi":"10.1109/JIOT.2018.2882207","ee":"https://doi.org/10.1109/JIOT.2018.2882207","url":"https://dblp.org/rec/journals/iotj/GurjarNT19"}, "url":"URL#1999447" }, { "@score":"1", "@id":"1999448", "info":{"authors":{"author":[{"@pid":"42/7352","text":"Lorena Gutiérrez-Madronal"},{"@pid":"181/7365","text":"Luigi La Blunda"},{"@pid":"33/4599-3","text":"Matthias F. Wagner"},{"@pid":"07/1524","text":"Inmaculada Medina-Bulo"}]},"title":"Test Event Generation for a Fall-Detection IoT System.","venue":"IEEE Internet Things J.","volume":"6","number":"4","pages":"6642-6651","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/Gutierrez-Madronal19","doi":"10.1109/JIOT.2019.2909434","ee":"https://doi.org/10.1109/JIOT.2019.2909434","url":"https://dblp.org/rec/journals/iotj/Gutierrez-Madronal19"}, "url":"URL#1999448" }, { "@score":"1", "@id":"1999449", "info":{"authors":{"author":[{"@pid":"147/1524","text":"Changhee Hahn"},{"@pid":"147/1530","text":"Hyunsoo Kwon"},{"@pid":"21/1967","text":"Junbeom Hur"}]},"title":"Trustworthy Delegation Toward Securing Mobile Healthcare Cyber-Physical Systems.","venue":"IEEE Internet Things J.","volume":"6","number":"4","pages":"6301-6309","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/HahnKH19","doi":"10.1109/JIOT.2018.2878216","ee":"https://doi.org/10.1109/JIOT.2018.2878216","url":"https://dblp.org/rec/journals/iotj/HahnKH19"}, "url":"URL#1999449" }, { "@score":"1", "@id":"1999450", "info":{"authors":{"author":{"@pid":"25/2698","text":"Rami Halloush"}},"title":"Transmission Early-Stopping Scheme for Anti-Jamming Over Delay-Sensitive IoT Applications.","venue":"IEEE Internet Things J.","volume":"6","number":"5","pages":"7891-7906","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/Halloush19","doi":"10.1109/JIOT.2019.2911683","ee":"https://doi.org/10.1109/JIOT.2019.2911683","url":"https://dblp.org/rec/journals/iotj/Halloush19"}, "url":"URL#1999450" }, { "@score":"1", "@id":"1999451", "info":{"authors":{"author":[{"@pid":"32/4821","text":"Guangjie Han"},{"@pid":"37/10763","text":"Jiawei Wu"},{"@pid":"w/HaoWang47","text":"Hao Wang 0047"},{"@pid":"15/1123","text":"Mohsen Guizani"},{"@pid":"226/9332","text":"James Adu Ansere"},{"@pid":"31/966-1","text":"Wenbo Zhang 0001"}]},"title":"A Multicharger Cooperative Energy Provision Algorithm Based on Density Clustering in the Industrial Internet of Things.","venue":"IEEE Internet Things J.","volume":"6","number":"5","pages":"9165-9174","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/HanWWGAZ19","doi":"10.1109/JIOT.2019.2928557","ee":"https://doi.org/10.1109/JIOT.2019.2928557","url":"https://dblp.org/rec/journals/iotj/HanWWGAZ19"}, "url":"URL#1999451" }, { "@score":"1", "@id":"1999452", "info":{"authors":{"author":[{"@pid":"186/9796","text":"Fengxia Han"},{"@pid":"07/1021-1","text":"Xiaodong Wang 0001"},{"@pid":"47/5183","text":"Shengjie Zhao"}]},"title":"Channel-Aware D2D-Assisted Wireless Distributed Storage Systems.","venue":"IEEE Internet Things J.","volume":"6","number":"6","pages":"10305-10317","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/HanWZ19","doi":"10.1109/JIOT.2019.2937251","ee":"https://doi.org/10.1109/JIOT.2019.2937251","url":"https://dblp.org/rec/journals/iotj/HanWZ19"}, "url":"URL#1999452" }, { "@score":"1", "@id":"1999453", "info":{"authors":{"author":[{"@pid":"85/10585","text":"Shuangshuang Han"},{"@pid":"49/67-2","text":"Xiao Wang 0002"},{"@pid":"45/8759","text":"Jun Jason Zhang"},{"@pid":"141/7805","text":"Dongpu Cao"},{"@pid":"14/374-1","text":"Fei-Yue Wang 0001"}]},"title":"Parallel Vehicular Networks: A CPSS-Based Approach via Multimodal Big Data in IoV.","venue":"IEEE Internet Things J.","volume":"6","number":"1","pages":"1079-1089","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/HanWZCW19","doi":"10.1109/JIOT.2018.2867039","ee":"https://doi.org/10.1109/JIOT.2018.2867039","url":"https://dblp.org/rec/journals/iotj/HanWZCW19"}, "url":"URL#1999453" }, { "@score":"1", "@id":"1999454", "info":{"authors":{"author":[{"@pid":"186/0747","text":"Shujun Han"},{"@pid":"43/2085-1","text":"Xiaodong Xu 0001"},{"@pid":"235/1472","text":"Sisai Fang"},{"@pid":"181/2323-5","text":"Yan Sun 0005"},{"@pid":"74/5570-2","text":"Yue Cao 0002"},{"@pid":"96/6496","text":"Xiaofeng Tao"},{"@pid":"77/2428-3","text":"Ping Zhang 0003"}]},"title":"Energy Efficient Secure Computation Offloading in NOMA-Based mMTC Networks for IoT.","venue":"IEEE Internet Things J.","volume":"6","number":"3","pages":"5674-5690","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/HanXFSCTZ19","doi":"10.1109/JIOT.2019.2904741","ee":"https://doi.org/10.1109/JIOT.2019.2904741","url":"https://dblp.org/rec/journals/iotj/HanXFSCTZ19"}, "url":"URL#1999454" }, { "@score":"1", "@id":"1999455", "info":{"authors":{"author":[{"@pid":"161/6541","text":"Wanming Hao"},{"@pid":"84/10816-1","text":"Zheng Chu 0001"},{"@pid":"155/5190","text":"Fuhui Zhou"},{"@pid":"89/3054","text":"Shouyi Yang"},{"@pid":"129/4049","text":"Gangcan Sun"},{"@pid":"35/5506","text":"Kai-Kit Wong"}]},"title":"Green Communication for NOMA-Based CRAN.","venue":"IEEE Internet Things J.","volume":"6","number":"1","pages":"666-678","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/HaoCZYSW19","doi":"10.1109/JIOT.2018.2852808","ee":"https://doi.org/10.1109/JIOT.2018.2852808","url":"https://dblp.org/rec/journals/iotj/HaoCZYSW19"}, "url":"URL#1999455" }, { "@score":"1", "@id":"1999456", "info":{"authors":{"author":[{"@pid":"92/1696-1","text":"Fei Hao 0001"},{"@pid":"02/598","text":"Doo-Soon Park"},{"@pid":"32/1748","text":"Jungho Kang"},{"@pid":"96/3727","text":"Geyong Min"}]},"title":"2L-MC3: A Two-Layer Multi-Community-Cloud/Cloudlet Social Collaborative Paradigm for Mobile Edge Computing.","venue":"IEEE Internet Things J.","volume":"6","number":"3","pages":"4764-4773","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/HaoPKM19","doi":"10.1109/JIOT.2018.2867351","ee":"https://doi.org/10.1109/JIOT.2018.2867351","url":"https://dblp.org/rec/journals/iotj/HaoPKM19"}, "url":"URL#1999456" }, { "@score":"1", "@id":"1999457", "info":{"authors":{"author":[{"@pid":"137/6243","text":"Ruki Harwahyu"},{"@pid":"86/4686","text":"Ray-Guang Cheng"},{"@pid":"240/6919","text":"Wan-Jung Tsai"},{"@pid":"05/2938","text":"Jeng-Kuang Hwang"},{"@pid":"22/3090-1","text":"Giuseppe Bianchi 0001"}]},"title":"Repetitions Versus Retransmissions: Tradeoff in Configuring NB-IoT Random Access Channels.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"3796-3805","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/HarwahyuCTHB19","doi":"10.1109/JIOT.2019.2891366","ee":"https://doi.org/10.1109/JIOT.2019.2891366","url":"https://dblp.org/rec/journals/iotj/HarwahyuCTHB19"}, "url":"URL#1999457" }, { "@score":"1", "@id":"1999458", "info":{"authors":{"author":[{"@pid":"132/6648","text":"Mohammed Zaki Hasan"},{"@pid":"45/1477","text":"Hussain M. Al-Rizzo"}]},"title":"Optimization of Sensor Deployment for Industrial Internet of Things Using a Multiswarm Algorithm.","venue":"IEEE Internet Things J.","volume":"6","number":"6","pages":"10344-10362","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/HasanA19","doi":"10.1109/JIOT.2019.2938486","ee":"https://doi.org/10.1109/JIOT.2019.2938486","url":"https://dblp.org/rec/journals/iotj/HasanA19"}, "url":"URL#1999458" }, { "@score":"1", "@id":"1999459", "info":{"authors":{"author":[{"@pid":"22/10289","text":"Muhammad Haseeb"},{"@pid":"15/3695","text":"Asad Waqar Malik"},{"@pid":"202/0577","text":"Anis Ur Rahman 0001"},{"@pid":"26/7451","text":"Mian Muhammad Hamayun"}]},"title":"Toward Distributed Heterogeneous Simulation Using Internet of Things.","venue":"IEEE Internet Things J.","volume":"6","number":"6","pages":"10472-10482","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/HaseebMRH19","doi":"10.1109/JIOT.2019.2939361","ee":"https://doi.org/10.1109/JIOT.2019.2939361","url":"https://dblp.org/rec/journals/iotj/HaseebMRH19"}, "url":"URL#1999459" }, { "@score":"1", "@id":"1999460", "info":{"authors":{"author":[{"@pid":"237/7343","text":"Najm Hassan"},{"@pid":"79/812","text":"Chun Tung Chou"},{"@pid":"10/2899","text":"Mahbub Hassan"}]},"title":"eNEUTRAL IoNT: Energy-Neutral Event Monitoring for Internet of Nano Things.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"2379-2389","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/HassanCH19","doi":"10.1109/JIOT.2019.2907046","ee":"https://doi.org/10.1109/JIOT.2019.2907046","url":"https://dblp.org/rec/journals/iotj/HassanCH19"}, "url":"URL#1999460" }, { "@score":"1", "@id":"1999461", "info":{"authors":{"author":[{"@pid":"180/1198","text":"Jetmir Haxhibeqiri"},{"@pid":"77/5355","text":"Ingrid Moerman"},{"@pid":"79/3449","text":"Jeroen Hoebeke"}]},"title":"Low Overhead Scheduling of LoRa Transmissions for Improved Scalability.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"3097-3109","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/HaxhibeqiriMH19","doi":"10.1109/JIOT.2018.2878942","ee":"https://doi.org/10.1109/JIOT.2018.2878942","url":"https://dblp.org/rec/journals/iotj/HaxhibeqiriMH19"}, "url":"URL#1999461" }, { "@score":"1", "@id":"1999462", "info":{"authors":{"author":[{"@pid":"47/3877","text":"Jianping He 0001"},{"@pid":"20/8688-1","text":"Lin Cai 0001"},{"@pid":"76/185-1","text":"Peng Cheng 0001"},{"@pid":"p/JianpingPan","text":"Jianping Pan 0001"},{"@pid":"97/6316","text":"Ling Shi"}]},"title":"Distributed Privacy-Preserving Data Aggregation Against Dishonest Nodes in Network Systems.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"1462-1470","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/HeCCPS19","doi":"10.1109/JIOT.2018.2834544","ee":"https://doi.org/10.1109/JIOT.2018.2834544","url":"https://dblp.org/rec/journals/iotj/HeCCPS19"}, "url":"URL#1999462" }, { "@score":"1", "@id":"1999463", "info":{"authors":{"author":[{"@pid":"56/7434","text":"Jiasheng He"},{"@pid":"35/6761","text":"Cailian Chen"},{"@pid":"37/10038","text":"Shanying Zhu"},{"@pid":"46/999-6","text":"Bo Yang 0006"},{"@pid":"25/3029","text":"Xinping Guan"}]},"title":"Risk-Averse Transmission Path Selection for Secure State Estimation in Power Systems.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"3121-3131","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/HeCZYG19","doi":"10.1109/JIOT.2018.2879110","ee":"https://doi.org/10.1109/JIOT.2018.2879110","url":"https://dblp.org/rec/journals/iotj/HeCZYG19"}, "url":"URL#1999463" }, { "@score":"1", "@id":"1999464", "info":{"authors":{"author":[{"@pid":"91/10454","text":"Xiaofan He"},{"@pid":"194/6950","text":"Richeng Jin"},{"@pid":"09/5360","text":"Huaiyu Dai"}]},"title":"Deep PDS-Learning for Privacy-Aware Offloading in MEC-Enabled IoT.","venue":"IEEE Internet Things J.","volume":"6","number":"3","pages":"4547-4555","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/HeJD19","doi":"10.1109/JIOT.2018.2878718","ee":"https://doi.org/10.1109/JIOT.2018.2878718","url":"https://dblp.org/rec/journals/iotj/HeJD19"}, "url":"URL#1999464" }, { "@score":"1", "@id":"1999465", "info":{"authors":{"author":[{"@pid":"69/1798","text":"Xin He"},{"@pid":"45/3753","text":"Wee Peng Tay"},{"@pid":"18/1763-1","text":"Lei Huang 0001"},{"@pid":"81/1237-4","text":"Meng Sun 0004"},{"@pid":"22/231-1","text":"Yi Gong 0001"}]},"title":"Privacy-Aware Sensor Network Via Multilayer Nonlinear Processing.","venue":"IEEE Internet Things J.","volume":"6","number":"6","pages":"10834-10845","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/HeTHSG19","doi":"10.1109/JIOT.2019.2941979","ee":"https://doi.org/10.1109/JIOT.2019.2941979","url":"https://dblp.org/rec/journals/iotj/HeTHSG19"}, "url":"URL#1999465" }, { "@score":"1", "@id":"1999466", "info":{"authors":{"author":[{"@pid":"221/6024","text":"Jialing He"},{"@pid":"43/6524-1","text":"Zijian Zhang 0001"},{"@pid":"26/2546","text":"Liehuang Zhu"},{"@pid":"251/1554","text":"Zhesi Zhu"},{"@pid":"46/4291","text":"Jiamou Liu"},{"@pid":"164/3309","text":"Keke Gai"}]},"title":"An Efficient and Accurate Nonintrusive Load Monitoring Scheme for Power Consumption.","venue":"IEEE Internet Things J.","volume":"6","number":"5","pages":"9054-9063","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/HeZZZLG19","doi":"10.1109/JIOT.2019.2926815","ee":"https://doi.org/10.1109/JIOT.2019.2926815","url":"https://dblp.org/rec/journals/iotj/HeZZZLG19"}, "url":"URL#1999466" }, { "@score":"1", "@id":"1999467", "info":{"authors":{"author":[{"@pid":"157/1230","text":"Mohammad Heggo"},{"@pid":"46/3348","text":"Sumei Sun"},{"@pid":"65/2899-1","text":"Xu Zhu 0001"},{"@pid":"15/6040-1","text":"Yi Huang 0001"}]},"title":"TV White Space Regulated Broadband Power Line Communication for Point-to-Multipoint Downlink IoT Networks: A Standard Perspective.","venue":"IEEE Internet Things J.","volume":"6","number":"4","pages":"6226-6236","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/HeggoSZH19","doi":"10.1109/JIOT.2018.2876415","ee":"https://doi.org/10.1109/JIOT.2018.2876415","url":"https://dblp.org/rec/journals/iotj/HeggoSZH19"}, "url":"URL#1999467" }, { "@score":"1", "@id":"1999468", "info":{"authors":{"author":{"@pid":"85/11280","text":"Rolando Herrero"}},"title":"Dynamic CoAP Mode Control in Real Time Wireless IoT Networks.","venue":"IEEE Internet Things J.","volume":"6","number":"1","pages":"801-807","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/Herrero19","doi":"10.1109/JIOT.2018.2857701","ee":"https://doi.org/10.1109/JIOT.2018.2857701","url":"https://dblp.org/rec/journals/iotj/Herrero19"}, "url":"URL#1999468" }, { "@score":"1", "@id":"1999469", "info":{"authors":{"author":[{"@pid":"203/3449","text":"Jooncherl Ho"},{"@pid":"21/4301","text":"Minho Jo 0001"}]},"title":"Offloading Wireless Energy Harvesting for IoT Devices on Unlicensed Bands.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"3663-3675","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/HoJ19","doi":"10.1109/JIOT.2018.2890114","ee":"https://doi.org/10.1109/JIOT.2018.2890114","url":"https://dblp.org/rec/journals/iotj/HoJ19"}, "url":"URL#1999469" }, { "@score":"1", "@id":"1999470", "info":{"authors":{"author":[{"@pid":"238/1035","text":"Minh Tu Hoang"},{"@pid":"238/1167","text":"Brosnan Yuen"},{"@pid":"12/6140","text":"Xiaodai Dong"},{"@pid":"03/5189-2","text":"Tao Lu 0002"},{"@pid":"193/0716","text":"Robert Westendorp"},{"@pid":"42/8358","text":"Kishore Reddy"}]},"title":"Recurrent Neural Networks for Accurate RSSI Indoor Localization.","venue":"IEEE Internet Things J.","volume":"6","number":"6","pages":"10639-10651","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/HoangYDLWR19","doi":"10.1109/JIOT.2019.2940368","ee":"https://doi.org/10.1109/JIOT.2019.2940368","url":"https://dblp.org/rec/journals/iotj/HoangYDLWR19"}, "url":"URL#1999470" }, { "@score":"1", "@id":"1999471", "info":{"authors":{"author":[{"@pid":"208/7079-6","text":"Jörg Hoffmann 0006"},{"@pid":"232/1110","text":"Pit Heimes"},{"@pid":"243/6426","text":"Semih Senel"}]},"title":"IoT Platforms for the Internet of Production.","venue":"IEEE Internet Things J.","volume":"6","number":"3","pages":"4098-4105","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/HoffmannHS19","doi":"10.1109/JIOT.2018.2875594","ee":"https://doi.org/10.1109/JIOT.2018.2875594","url":"https://dblp.org/rec/journals/iotj/HoffmannHS19"}, "url":"URL#1999471" }, { "@score":"1", "@id":"1999472", "info":{"authors":{"author":[{"@pid":"27/6170","text":"Christian A. Hofmann"},{"@pid":"79/3050","text":"Andreas Knopp"}]},"title":"Ultranarrowband Waveform for IoT Direct Random Multiple Access to GEO Satellites.","venue":"IEEE Internet Things J.","volume":"6","number":"6","pages":"10134-10149","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/HofmannK19","doi":"10.1109/JIOT.2019.2935909","ee":"https://doi.org/10.1109/JIOT.2019.2935909","url":"https://dblp.org/rec/journals/iotj/HofmannK19"}, "url":"URL#1999472" }, { "@score":"1", "@id":"1999473", "info":{"authors":{"author":[{"@pid":"36/310","text":"Xuemin Hong"},{"@pid":"211/3612","text":"Jiping Jiao"},{"@pid":"181/4433","text":"Ao Peng"},{"@pid":"35/8607","text":"Jianghong Shi"},{"@pid":"75/2596","text":"Cheng-Xiang Wang 0001"}]},"title":"Cost Optimization for On-Demand Content Streaming in IoV Networks With Two Service Tiers.","venue":"IEEE Internet Things J.","volume":"6","number":"1","pages":"38-49","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/HongJPSW19","doi":"10.1109/JIOT.2018.2873085","ee":"https://doi.org/10.1109/JIOT.2018.2873085","url":"https://dblp.org/rec/journals/iotj/HongJPSW19"}, "url":"URL#1999473" }, { "@score":"1", "@id":"1999474", "info":{"authors":{"author":[{"@pid":"44/1954","text":"Mohammad Belayet Hossain"},{"@pid":"89/7910","text":"Iynkaran Natgunanathan"},{"@pid":"98/2912-1","text":"Yong Xiang 0001"},{"@pid":"59/10736","text":"Lu-Xing Yang"},{"@pid":"00/1198","text":"Guangyan Huang"}]},"title":"Enhanced Smart Meter Privacy Protection Using Rechargeable Batteries.","venue":"IEEE Internet Things J.","volume":"6","number":"4","pages":"7079-7092","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/HossainNXYH19","doi":"10.1109/JIOT.2019.2914135","ee":"https://doi.org/10.1109/JIOT.2019.2914135","url":"https://dblp.org/rec/journals/iotj/HossainNXYH19"}, "url":"URL#1999474" }, { "@score":"1", "@id":"1999475", "info":{"authors":{"author":[{"@pid":"166/9840","text":"Lu Hou"},{"@pid":"09/471-4","text":"Lei Lei 0004"},{"@pid":"77/6893","text":"Kan Zheng"},{"@pid":"87/6482-1","text":"Xianbin Wang 0001"}]},"title":"A $Q$ -Learning-Based Proactive Caching Strategy for Non-Safety Related Services in Vehicular Networks.","venue":"IEEE Internet Things J.","volume":"6","number":"3","pages":"4512-4520","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/HouLZW19","doi":"10.1109/JIOT.2018.2883762","ee":"https://doi.org/10.1109/JIOT.2018.2883762","url":"https://dblp.org/rec/journals/iotj/HouLZW19"}, "url":"URL#1999475" }, { "@score":"1", "@id":"1999476", "info":{"authors":{"author":[{"@pid":"213/0982","text":"Jernej Hribar"},{"@pid":"143/5794","text":"Maice Costa"},{"@pid":"119/9514","text":"Nicholas J. Kaminski"},{"@pid":"87/1848","text":"Luiz A. DaSilva"}]},"title":"Using Correlated Information to Extend Device Lifetime.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"2439-2448","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/HribarCKD19","doi":"10.1109/JIOT.2018.2869986","ee":"https://doi.org/10.1109/JIOT.2018.2869986","url":"https://dblp.org/rec/journals/iotj/HribarCKD19"}, "url":"URL#1999476" }, { "@score":"1", "@id":"1999477", "info":{"authors":{"author":[{"@pid":"25/7828","text":"Zhiwen Hu"},{"@pid":"222/8038","text":"Zixuan Bai"},{"@pid":"87/2334","text":"Kaigui Bian"},{"@pid":"12/5838-4","text":"Tao Wang 0004"},{"@pid":"02/2683","text":"Lingyang Song"}]},"title":"Real-Time Fine-Grained Air Quality Sensing Networks in Smart City: Design, Implementation, and Optimization.","venue":"IEEE Internet Things J.","volume":"6","number":"5","pages":"7526-7542","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/HuBBWS19","doi":"10.1109/JIOT.2019.2900751","ee":"https://doi.org/10.1109/JIOT.2019.2900751","url":"https://dblp.org/rec/journals/iotj/HuBBWS19"}, "url":"URL#1999477" }, { "@score":"1", "@id":"1999478", "info":{"authors":{"author":[{"@pid":"142/3511","text":"Yuying Hu"},{"@pid":"35/6761","text":"Cailian Chen"},{"@pid":"47/3877","text":"Jianping He 0001"},{"@pid":"46/999-6","text":"Bo Yang 0006"},{"@pid":"25/3029","text":"Xinping Guan"}]},"title":"IoT-Based Proactive Energy Supply Control for Connected Electric Vehicles.","venue":"IEEE Internet Things J.","volume":"6","number":"5","pages":"7395-7405","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/HuCHYG19","doi":"10.1109/JIOT.2019.2899928","ee":"https://doi.org/10.1109/JIOT.2019.2899928","url":"https://dblp.org/rec/journals/iotj/HuCHYG19"}, "url":"URL#1999478" }, { "@score":"1", "@id":"1999479", "info":{"authors":{"author":[{"@pid":"240/7048","text":"Qiyu Hu"},{"@pid":"03/7051","text":"Yunlong Cai"},{"@pid":"83/3855","text":"Guanding Yu"},{"@pid":"157/9149","text":"Zhijin Qin"},{"@pid":"213/8217","text":"Minjian Zhao 0001"},{"@pid":"89/5914","text":"Geoffrey Ye Li"}]},"title":"Joint Offloading and Trajectory Design for UAV-Enabled Mobile Edge Computing Systems.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"1879-1892","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/HuCYQZL19","doi":"10.1109/JIOT.2018.2878876","ee":"https://doi.org/10.1109/JIOT.2018.2878876","url":"https://dblp.org/rec/journals/iotj/HuCYQZL19"}, "url":"URL#1999479" }, { "@score":"1", "@id":"1999480", "info":{"authors":{"author":[{"@pid":"20/10116","text":"Menglan Hu"},{"@pid":"92/9611-9","text":"Weidong Liu 0009"},{"@pid":"41/7760-1","text":"Kai Peng 0001"},{"@pid":"75/8969","text":"Xiaoqiang Ma"},{"@pid":"31/1966","text":"Wenqing Cheng"},{"@pid":"l/JiangchuanLiu","text":"Jiangchuan Liu"},{"@pid":"50/3402-1","text":"Bo Li 0001"}]},"title":"Joint Routing and Scheduling for Vehicle-Assisted Multidrone Surveillance.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"1781-1790","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/HuLPMCLL19","doi":"10.1109/JIOT.2018.2878602","ee":"https://doi.org/10.1109/JIOT.2018.2878602","url":"https://dblp.org/rec/journals/iotj/HuLPMCLL19"}, "url":"URL#1999480" }, { "@score":"1", "@id":"1999481", "info":{"authors":{"author":[{"@pid":"224/0985","text":"Jiusong Hu"},{"@pid":"57/1575-1","text":"Dawei Liu 0001"},{"@pid":"52/7209-2","text":"Zhi Yan 0002"},{"@pid":"33/7760-1","text":"Hongli Liu 0001"}]},"title":"Experimental Analysis on Weight K -Nearest Neighbor Indoor Fingerprint Positioning.","venue":"IEEE Internet Things J.","volume":"6","number":"1","pages":"891-897","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/HuLYL19","doi":"10.1109/JIOT.2018.2864607","ee":"https://doi.org/10.1109/JIOT.2018.2864607","url":"https://dblp.org/rec/journals/iotj/HuLYL19"}, "url":"URL#1999481" }, { "@score":"1", "@id":"1999482", "info":{"authors":{"author":[{"@pid":"71/9969-3","text":"Pengfei Hu 0003"},{"@pid":"08/3821","text":"Huansheng Ning"},{"@pid":"32/7029-1","text":"Liming Chen 0001"},{"@pid":"92/4586","text":"Mahmoud Daneshmand"}]},"title":"An Open Internet of Things System Architecture Based on Software-Defined Device.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"2583-2592","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/HuNCD19","doi":"10.1109/JIOT.2018.2872028","ee":"https://doi.org/10.1109/JIOT.2018.2872028","url":"https://dblp.org/rec/journals/iotj/HuNCD19"}, "url":"URL#1999482" }, { "@score":"1", "@id":"1999483", "info":{"authors":{"author":[{"@pid":"29/9167","text":"Ye Hu"},{"@pid":"177/6682","text":"Anibal Sanjab"},{"@pid":"41/6237","text":"Walid Saad"}]},"title":"Dynamic Psychological Game Theory for Secure Internet of Battlefield Things (IoBT) Systems.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"3712-3726","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/HuSS19","doi":"10.1109/JIOT.2018.2890431","ee":"https://doi.org/10.1109/JIOT.2018.2890431","url":"https://dblp.org/rec/journals/iotj/HuSS19"}, "url":"URL#1999483" }, { "@score":"1", "@id":"1999484", "info":{"authors":{"author":[{"@pid":"246/5394","text":"Yuanzhou Hu"},{"@pid":"88/898-15","text":"Fan Wang 0015"},{"@pid":"50/6964","text":"Jianmin Lu"}]},"title":"Low PAPR Filter Bank Single Carrier for 5G mMTC.","venue":"IEEE Internet Things J.","volume":"6","number":"4","pages":"6887-6895","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/HuWL19","doi":"10.1109/JIOT.2019.2912635","ee":"https://doi.org/10.1109/JIOT.2019.2912635","url":"https://dblp.org/rec/journals/iotj/HuWL19"}, "url":"URL#1999484" }, { "@score":"1", "@id":"1999485", "info":{"authors":{"author":[{"@pid":"174/3780","text":"Jingzhi Hu"},{"@pid":"77/10205-1","text":"Hongliang Zhang 0001"},{"@pid":"02/2683","text":"Lingyang Song"}]},"title":"Reinforcement Learning for Decentralized Trajectory Design in Cellular UAV Networks With Sense-and-Send Protocol.","venue":"IEEE Internet Things J.","volume":"6","number":"4","pages":"6177-6189","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/HuZS19","doi":"10.1109/JIOT.2018.2876513","ee":"https://doi.org/10.1109/JIOT.2018.2876513","url":"https://dblp.org/rec/journals/iotj/HuZS19"}, "url":"URL#1999485" }, { "@score":"1", "@id":"1999486", "info":{"authors":{"author":[{"@pid":"183/1847","text":"Jiafeng Hua"},{"@pid":"85/2110-1","text":"Hui Zhu 0001"},{"@pid":"150/0832","text":"Fengwei Wang"},{"@pid":"134/3945","text":"Ximeng Liu"},{"@pid":"88/3562","text":"Rongxing Lu"},{"@pid":"17/5705-38","text":"Hao Li 0038"},{"@pid":"153/9206","text":"Yeping Zhang"}]},"title":"CINEMA: Efficient and Privacy-Preserving Online Medical Primary Diagnosis With Skyline Query.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"1450-1461","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/HuaZWLLLZ19","doi":"10.1109/JIOT.2018.2834156","ee":"https://doi.org/10.1109/JIOT.2018.2834156","url":"https://dblp.org/rec/journals/iotj/HuaZWLLLZ19"}, "url":"URL#1999486" }, { "@score":"1", "@id":"1999487", "info":{"authors":{"author":[{"@pid":"124/7717","text":"Jingchang Huang"},{"@pid":"149/1135","text":"Ning Duan"},{"@pid":"25/1781","text":"Peng Ji"},{"@pid":"86/9883","text":"Chunyang Ma"},{"@pid":"74/6975","text":"Feng Hu"},{"@pid":"93/3020","text":"Yuanyuan Ding"},{"@pid":"129/5062","text":"Yipeng Yu"},{"@pid":"118/9314","text":"Qianwei Zhou"},{"@pid":"09/5042","text":"Wei Sun"}]},"title":"A Crowdsource-Based Sensing System for Monitoring Fine-Grained Air Quality in Urban Environments.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"3240-3247","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/HuangDJMhDYZS19","doi":"10.1109/JIOT.2018.2881240","ee":"https://doi.org/10.1109/JIOT.2018.2881240","url":"https://dblp.org/rec/journals/iotj/HuangDJMhDYZS19"}, "url":"URL#1999487" }, { "@score":"1", "@id":"1999488", "info":{"authors":{"author":[{"@pid":"59/1856-5","text":"Pei Huang 0005"},{"@pid":"00/10800","text":"Linke Guo"},{"@pid":"l/MingLi6","text":"Ming Li 0006"},{"@pid":"f/YuguangFang","text":"Yuguang Fang"}]},"title":"Practical Privacy-Preserving ECG-Based Authentication for IoT-Based Healthcare.","venue":"IEEE Internet Things J.","volume":"6","number":"5","pages":"9200-9210","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/HuangGLF19","doi":"10.1109/JIOT.2019.2929087","ee":"https://doi.org/10.1109/JIOT.2019.2929087","url":"https://dblp.org/rec/journals/iotj/HuangGLF19"}, "url":"URL#1999488" }, { "@score":"1", "@id":"1999489", "info":{"authors":{"author":[{"@pid":"226/3811","text":"Shaohua Huang"},{"@pid":"53/382","text":"Yu Guo"},{"@pid":"255/2223","text":"Daoyuan Liu"},{"@pid":"233/8875","text":"Shanshan Zha"},{"@pid":"255/2313","text":"Weiguang Fang"}]},"title":"A Two-Stage Transfer Learning-Based Deep Learning Approach for Production Progress Prediction in IoT-Enabled Manufacturing.","venue":"IEEE Internet Things J.","volume":"6","number":"6","pages":"10627-10638","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/HuangGLZF19","doi":"10.1109/JIOT.2019.2940131","ee":"https://doi.org/10.1109/JIOT.2019.2940131","url":"https://dblp.org/rec/journals/iotj/HuangGLZF19"}, "url":"URL#1999489" }, { "@score":"1", "@id":"1999490", "info":{"authors":{"author":[{"@pid":"87/4277","text":"Pingmu Huang"},{"@pid":"221/0415","text":"Yunqin Hao"},{"@pid":"77/4591","text":"Tiejun Lv"},{"@pid":"246/5549","text":"Jintao Xing"},{"@pid":"12/1198-23","text":"Jie Yang 0023"},{"@pid":"96/1515","text":"P. Takis Mathiopoulos"}]},"title":"Secure Beamforming Design in Relay-Assisted Internet of Things.","venue":"IEEE Internet Things J.","volume":"6","number":"4","pages":"6453-6464","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/HuangHLXYM19","doi":"10.1109/JIOT.2019.2908821","ee":"https://doi.org/10.1109/JIOT.2019.2908821","url":"https://dblp.org/rec/journals/iotj/HuangHLXYM19"}, "url":"URL#1999490" }, { "@score":"1", "@id":"1999491", "info":{"authors":{"author":[{"@pid":"41/5697-1","text":"Zhenhua Huang 0001"},{"@pid":"251/1562","text":"Jinyi Tang"},{"@pid":"203/2773","text":"Guangxu Shan"},{"@pid":"46/10177","text":"Juan Ni"},{"@pid":"221/5813","text":"Yunwen Chen"},{"@pid":"54/2062-1","text":"Cheng Wang 0001"}]},"title":"An Efficient Passenger-Hunting Recommendation Framework With Multitask Deep Learning.","venue":"IEEE Internet Things J.","volume":"6","number":"5","pages":"7713-7721","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/HuangTSNCW19","doi":"10.1109/JIOT.2019.2901759","ee":"https://doi.org/10.1109/JIOT.2019.2901759","url":"https://dblp.org/rec/journals/iotj/HuangTSNCW19"}, "url":"URL#1999491" }, { "@score":"1", "@id":"1999492", "info":{"authors":{"author":[{"@pid":"77/5794","text":"Baoqi Huang"},{"@pid":"07/2618","text":"Zhendong Xu"},{"@pid":"56/8392","text":"Bing Jia"},{"@pid":"48/314","text":"Guoqiang Mao"}]},"title":"An Online Radio Map Update Scheme for WiFi Fingerprint-Based Localization.","venue":"IEEE Internet Things J.","volume":"6","number":"4","pages":"6909-6918","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/HuangXJM19","doi":"10.1109/JIOT.2019.2912808","ee":"https://doi.org/10.1109/JIOT.2019.2912808","url":"https://dblp.org/rec/journals/iotj/HuangXJM19"}, "url":"URL#1999492" }, { "@score":"1", "@id":"1999493", "info":{"authors":{"author":[{"@pid":"41/5697-1","text":"Zhenhua Huang 0001"},{"@pid":"66/3874","text":"Xin Xu"},{"@pid":"46/10177","text":"Juan Ni"},{"@pid":"155/6635","text":"Honghao Zhu"},{"@pid":"54/2062-1","text":"Cheng Wang 0001"}]},"title":"Multimodal Representation Learning for Recommendation in Internet of Things.","venue":"IEEE Internet Things J.","volume":"6","number":"6","pages":"10675-10685","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/HuangXNZW19","doi":"10.1109/JIOT.2019.2940709","ee":"https://doi.org/10.1109/JIOT.2019.2940709","url":"https://dblp.org/rec/journals/iotj/HuangXNZW19"}, "url":"URL#1999493" }, { "@score":"1", "@id":"1999494", "info":{"authors":{"author":[{"@pid":"30/8505","text":"Yanqiu Huang"},{"@pid":"143/0197","text":"Wanli Yu"},{"@pid":"64/5260","text":"Enjie Ding"},{"@pid":"80/3384","text":"Alberto García Ortiz"}]},"title":"EPKF: Energy Efficient Communication Schemes Based on Kalman Filter for IoT.","venue":"IEEE Internet Things J.","volume":"6","number":"4","pages":"6201-6211","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/HuangYDO19","doi":"10.1109/JIOT.2019.2900853","ee":"https://doi.org/10.1109/JIOT.2019.2900853","url":"https://dblp.org/rec/journals/iotj/HuangYDO19"}, "url":"URL#1999494" }, { "@score":"1", "@id":"1999495", "info":{"authors":{"author":[{"@pid":"04/3004-2","text":"Wen Huang 0002"},{"@pid":"06/3625","text":"Shijie Zhou"},{"@pid":"12/7834","text":"Yongjian Liao"},{"@pid":"80/4761","text":"Hongjie Chen"}]},"title":"An Efficient Differential Privacy Logistic Classification Mechanism.","venue":"IEEE Internet Things J.","volume":"6","number":"6","pages":"10620-10626","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/HuangZLC19","doi":"10.1109/JIOT.2019.2940103","ee":"https://doi.org/10.1109/JIOT.2019.2940103","url":"https://dblp.org/rec/journals/iotj/HuangZLC19"}, "url":"URL#1999495" }, { "@score":"1", "@id":"1999496", "info":{"authors":{"author":[{"@pid":"75/6434-23","text":"Yan Huang 0023"},{"@pid":"60/2931-2","text":"Yi Zhong 0002"},{"@pid":"87/2533-1","text":"Qiang Wu 0001"},{"@pid":"71/2764","text":"Eryk Dutkiewicz"},{"@pid":"55/1756","text":"Ting Jiang"}]},"title":"Cost-Effective Foliage Penetration Human Detection Under Severe Weather Conditions Based on Auto-Encoder/Decoder Neural Network.","venue":"IEEE Internet Things J.","volume":"6","number":"4","pages":"6190-6200","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/HuangZWDJ19","doi":"10.1109/JIOT.2018.2878880","ee":"https://doi.org/10.1109/JIOT.2018.2878880","url":"https://dblp.org/rec/journals/iotj/HuangZWDJ19"}, "url":"URL#1999496" }, { "@score":"1", "@id":"1999497", "info":{"authors":{"author":[{"@pid":"199/1952","text":"Yiming Huo"},{"@pid":"12/6140","text":"Xiaodai Dong"},{"@pid":"03/5189-2","text":"Tao Lu 0002"},{"@pid":"32/1213-1","text":"Wei Xu 0001"},{"@pid":"229/3246","text":"Marvin Yuen"}]},"title":"Distributed and Multilayer UAV Networks for Next-Generation Wireless Communication and Power Transfer: A Feasibility Study.","venue":"IEEE Internet Things J.","volume":"6","number":"4","pages":"7103-7115","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/HuoDLXY19","doi":"10.1109/JIOT.2019.2914414","ee":"https://doi.org/10.1109/JIOT.2019.2914414","url":"https://dblp.org/rec/journals/iotj/HuoDLXY19"}, "url":"URL#1999497" }, { "@score":"1", "@id":"1999498", "info":{"authors":{"author":[{"@pid":"93/6826","text":"Sajid Hussain"},{"@pid":"32/11473","text":"Shehzad Ashraf Chaudhry"}]},"title":"Comments on "Biometrics-Based Privacy-Preserving User Authentication Scheme for Cloud-Based Industrial Internet of Things Deployment".","venue":"IEEE Internet Things J.","volume":"6","number":"6","pages":"10936-10940","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/HussainC19","doi":"10.1109/JIOT.2019.2934947","ee":"https://doi.org/10.1109/JIOT.2019.2934947","url":"https://dblp.org/rec/journals/iotj/HussainC19"}, "url":"URL#1999498" }, { "@score":"1", "@id":"1999499", "info":{"authors":{"author":[{"@pid":"05/2938","text":"Jeng-Kuang Hwang"},{"@pid":"24/10113","text":"Cheng-Feng Li"},{"@pid":"68/10834","text":"Chingwo Ma"}]},"title":"Efficient Detection and Synchronization of Superimposed NB-IoT NPRACH Preambles.","venue":"IEEE Internet Things J.","volume":"6","number":"1","pages":"1173-1182","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/HwangLM19","doi":"10.1109/JIOT.2018.2867876","ee":"https://doi.org/10.1109/JIOT.2018.2867876","url":"https://dblp.org/rec/journals/iotj/HwangLM19"}, "url":"URL#1999499" }, { "@score":"1", "@id":"1999500", "info":{"authors":{"author":[{"@pid":"167/9542","text":"Hazem Ibrahim"},{"@pid":"72/3664","text":"Wei Bao"},{"@pid":"51/635","text":"Uyen Trang Nguyen"}]},"title":"Data Rate Utility Analysis for Uplink Two-Hop Internet of Things Networks.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"3601-3619","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/IbrahimBN19","doi":"10.1109/JIOT.2018.2889455","ee":"https://doi.org/10.1109/JIOT.2018.2889455","url":"https://dblp.org/rec/journals/iotj/IbrahimBN19"}, "url":"URL#1999500" }, { "@score":"1", "@id":"1999501", "info":{"authors":{"author":[{"@pid":"206/1390","text":"Markel Iglesias-Urkia"},{"@pid":"70/11024","text":"Diego Casado-Mansilla"},{"@pid":"16/9863","text":"Simon Mayer"},{"@pid":"90/10369","text":"Josu Bilbao"},{"@pid":"63/4658","text":"Aitor Urbieta"}]},"title":"Integrating Electrical Substations Within the IoT Using IEC 61850, CoAP, and CBOR.","venue":"IEEE Internet Things J.","volume":"6","number":"5","pages":"7437-7449","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/Iglesias-UrkiaC19","doi":"10.1109/JIOT.2019.2903344","ee":"https://doi.org/10.1109/JIOT.2019.2903344","url":"https://dblp.org/rec/journals/iotj/Iglesias-UrkiaC19"}, "url":"URL#1999501" }, { "@score":"1", "@id":"1999502", "info":{"authors":{"author":[{"@pid":"234/8989","text":"Ullah Ihsan 0001"},{"@pid":"19/11269","text":"Shihao Yan"},{"@pid":"51/3128","text":"Robert A. Malaney"}]},"title":"Location Verification for Emerging Wireless Vehicular Networks.","venue":"IEEE Internet Things J.","volume":"6","number":"6","pages":"10261-10272","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/IhsanYM19","doi":"10.1109/JIOT.2019.2937315","ee":"https://doi.org/10.1109/JIOT.2019.2937315","url":"https://dblp.org/rec/journals/iotj/IhsanYM19"}, "url":"URL#1999502" }, { "@score":"1", "@id":"1999503", "info":{"authors":{"author":[{"@pid":"152/9600","text":"Augustine Ikpehai"},{"@pid":"39/8080","text":"Bamidele Adebisi"},{"@pid":"137/6304","text":"Khaled M. Rabie"},{"@pid":"154/4132","text":"Kelvin O. O. Anoh"},{"@pid":"225/7119","text":"Ruth Ande"},{"@pid":"39/1032","text":"Mohammad Hammoudeh"},{"@pid":"10/988","text":"Haris Gacanin"},{"@pid":"90/4537","text":"Uche M. Mbanaso"}]},"title":"Low-Power Wide Area Network Technologies for Internet-of-Things: A Comparative Review.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"2225-2240","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/IkpehaiARAAHGM19","doi":"10.1109/JIOT.2018.2883728","ee":"https://doi.org/10.1109/JIOT.2018.2883728","url":"https://dblp.org/rec/journals/iotj/IkpehaiARAAHGM19"}, "url":"URL#1999503" }, { "@score":"1", "@id":"1999504", "info":{"authors":{"author":[{"@pid":"130/2606","text":"Mian Ahmad Jan"},{"@pid":"20/241-15","text":"Muhammad Usman 0015"},{"@pid":"75/2122","text":"Xiangjian He"},{"@pid":"164/8802-1","text":"Ateeq Ur Rehman 0001"}]},"title":"SAMS: A Seamless and Authorized Multimedia Streaming Framework for WMSN-Based IoMT.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"1576-1583","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/JanUHR19","doi":"10.1109/JIOT.2018.2848284","ee":"https://doi.org/10.1109/JIOT.2018.2848284","url":"https://dblp.org/rec/journals/iotj/JanUHR19"}, "url":"URL#1999504" }, { "@score":"1", "@id":"1999505", "info":{"authors":{"author":[{"@pid":"246/5520","text":"Heegyun Jeon"},{"@pid":"84/8134","text":"Yongsoon Eun"}]},"title":"A Stealthy Sensor Attack for Uncertain Cyber-Physical Systems.","venue":"IEEE Internet Things J.","volume":"6","number":"4","pages":"6345-6352","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/JeonE19","doi":"10.1109/JIOT.2019.2905878","ee":"https://doi.org/10.1109/JIOT.2019.2905878","url":"https://dblp.org/rec/journals/iotj/JeonE19"}, "url":"URL#1999505" }, { "@score":"1", "@id":"1999506", "info":{"authors":{"author":[{"@pid":"185/5694","text":"Kang Eun Jeon"},{"@pid":"98/4279","text":"James She"},{"@pid":"x/ChunJasonXue","text":"Jason Xue"},{"@pid":"36/3997","text":"Sang-Ha Kim 0001"},{"@pid":"59/3389","text":"Soochang Park"}]},"title":"luXbeacon - A Batteryless Beacon for Green IoT: Design, Modeling, and Field Tests.","venue":"IEEE Internet Things J.","volume":"6","number":"3","pages":"5001-5012","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/JeonSXKP19","doi":"10.1109/JIOT.2019.2894798","ee":"https://doi.org/10.1109/JIOT.2019.2894798","url":"https://dblp.org/rec/journals/iotj/JeonSXKP19"}, "url":"URL#1999506" }, { "@score":"1", "@id":"1999507", "info":{"authors":{"author":[{"@pid":"206/5759","text":"Luyue Ji"},{"@pid":"23/4556","text":"Songtao Guo"}]},"title":"Energy-Efficient Cooperative Resource Allocation in Wireless Powered Mobile Edge Computing.","venue":"IEEE Internet Things J.","volume":"6","number":"3","pages":"4744-4754","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/JiG19","doi":"10.1109/JIOT.2018.2880812","ee":"https://doi.org/10.1109/JIOT.2018.2880812","url":"https://dblp.org/rec/journals/iotj/JiG19"}, "url":"URL#1999507" }, { "@score":"1", "@id":"1999508", "info":{"authors":{"author":[{"@pid":"57/8298","text":"Gangyong Jia"},{"@pid":"32/4821","text":"Guangjie Han"},{"@pid":"121/9058","text":"Jiaxin Du"},{"@pid":"68/4423","text":"Sammy Chan"}]},"title":"A Maximum Cache Value Policy in Hybrid Memory-Based Edge Computing for Mobile Devices.","venue":"IEEE Internet Things J.","volume":"6","number":"3","pages":"4401-4410","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/JiaHDC19","doi":"10.1109/JIOT.2018.2878872","ee":"https://doi.org/10.1109/JIOT.2018.2878872","url":"https://dblp.org/rec/journals/iotj/JiaHDC19"}, "url":"URL#1999508" }, { "@score":"1", "@id":"1999509", "info":{"authors":{"author":[{"@pid":"57/8298","text":"Gangyong Jia"},{"@pid":"32/4821","text":"Guangjie Han"},{"@pid":"212/7701","text":"Hongtianchen Xie"},{"@pid":"121/9058","text":"Jiaxin Du"}]},"title":"Hybrid-LRU Caching for Optimizing Data Storage and Retrieval in Edge Computing-Based Wearable Sensors.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"1342-1351","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/JiaHXD19","doi":"10.1109/JIOT.2018.2834533","ee":"https://doi.org/10.1109/JIOT.2018.2834533","url":"https://dblp.org/rec/journals/iotj/JiaHXD19"}, "url":"URL#1999509" }, { "@score":"1", "@id":"1999510", "info":{"authors":{"author":[{"@pid":"90/4627","text":"Min Jia"},{"@pid":"30/7317","text":"Dongbo Li"},{"@pid":"180/7315","text":"Zhisheng Yin"},{"@pid":"25/3038-1","text":"Qing Guo 0001"},{"@pid":"38/113","text":"Xuemai Gu"}]},"title":"High Spectral Efficiency Secure Communications With Nonorthogonal Physical and Multiple Access Layers.","venue":"IEEE Internet Things J.","volume":"6","number":"4","pages":"5954-5961","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/JiaLYGG19","doi":"10.1109/JIOT.2018.2851069","ee":"https://doi.org/10.1109/JIOT.2018.2851069","url":"https://dblp.org/rec/journals/iotj/JiaLYGG19"}, "url":"URL#1999510" }, { "@score":"1", "@id":"1999511", "info":{"authors":{"author":[{"@pid":"90/4627","text":"Min Jia"},{"@pid":"180/7315","text":"Zhisheng Yin"},{"@pid":"30/7317","text":"Dongbo Li"},{"@pid":"25/3038-1","text":"Qing Guo 0001"},{"@pid":"38/113","text":"Xuemai Gu"}]},"title":"Toward Improved Offloading Efficiency of Data Transmission in the IoT-Cloud by Leveraging Secure Truncating OFDM.","venue":"IEEE Internet Things J.","volume":"6","number":"3","pages":"4252-4261","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/JiaYLGG19","doi":"10.1109/JIOT.2018.2875743","ee":"https://doi.org/10.1109/JIOT.2018.2875743","url":"https://dblp.org/rec/journals/iotj/JiaYLGG19"}, "url":"URL#1999511" }, { "@score":"1", "@id":"1999512", "info":{"authors":{"author":[{"@pid":"90/4627","text":"Min Jia"},{"@pid":"219/7824","text":"Ximu Zhang"},{"@pid":"38/113","text":"Xuemai Gu"},{"@pid":"25/3038-1","text":"Qing Guo 0001"},{"@pid":"191/9576","text":"Yaqiu Li"},{"@pid":"58/3873","text":"Ping Lin"}]},"title":"Interbeam Interference Constrained Resource Allocation for Shared Spectrum Multibeam Satellite Communication Systems.","venue":"IEEE Internet Things J.","volume":"6","number":"4","pages":"6052-6059","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/JiaZGGLL19","doi":"10.1109/JIOT.2018.2870878","ee":"https://doi.org/10.1109/JIOT.2018.2870878","url":"https://dblp.org/rec/journals/iotj/JiaZGGLL19"}, "url":"URL#1999512" }, { "@score":"1", "@id":"1999513", "info":{"authors":{"author":[{"@pid":"75/7384","text":"Jun Jia"},{"@pid":"19/3230","text":"Guangtao Zhai"},{"@pid":"180/9777","text":"Jiahe Zhang"},{"@pid":"149/4942","text":"Zhongpai Gao"},{"@pid":"247/4146","text":"Zehao Zhu"},{"@pid":"139/6983","text":"Xiongkuo Min"},{"@pid":"06/3071","text":"Xiaokang Yang"},{"@pid":"92/4520","text":"Guodong Guo"}]},"title":"EMBDN: An Efficient Multiclass Barcode Detection Network for Complicated Environments.","venue":"IEEE Internet Things J.","volume":"6","number":"6","pages":"9919-9933","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/JiaZZGZMYG19","doi":"10.1109/JIOT.2019.2933254","ee":"https://doi.org/10.1109/JIOT.2019.2933254","url":"https://dblp.org/rec/journals/iotj/JiaZZGZMYG19"}, "url":"URL#1999513" }, { "@score":"1", "@id":"1999514", "info":{"authors":{"author":[{"@pid":"172/2798","text":"Linzhi Jiang"},{"@pid":"22/150-2","text":"Liqun Chen 0002"},{"@pid":"96/1667","text":"Thanassis Giannetsos"},{"@pid":"71/2890","text":"Bo Luo"},{"@pid":"126/6037","text":"Kaitai Liang"},{"@pid":"77/9673","text":"Jinguang Han"}]},"title":"Toward Practical Privacy-Preserving Processing Over Encrypted Data in IoT: An Assistive Healthcare Use Case.","venue":"IEEE Internet Things J.","volume":"6","number":"6","pages":"10177-10190","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/JiangCGLLH19","doi":"10.1109/JIOT.2019.2936532","ee":"https://doi.org/10.1109/JIOT.2019.2936532","url":"https://dblp.org/rec/journals/iotj/JiangCGLLH19"}, "url":"URL#1999514" }, { "@score":"1", "@id":"1999515", "info":{"authors":{"author":[{"@pid":"73/5292","text":"Tigang Jiang"},{"@pid":"10/966-1","text":"Hua Fang 0001"},{"@pid":"70/5417-1","text":"Honggang Wang 0001"}]},"title":"Blockchain-Based Internet of Vehicles: Distributed Network Architecture and Performance Analysis.","venue":"IEEE Internet Things J.","volume":"6","number":"3","pages":"4640-4649","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/JiangFW19","doi":"10.1109/JIOT.2018.2874398","ee":"https://doi.org/10.1109/JIOT.2018.2874398","url":"https://dblp.org/rec/journals/iotj/JiangFW19"}, "url":"URL#1999515" }, { "@score":"1", "@id":"1999516", "info":{"authors":{"author":[{"@pid":"217/3737","text":"Jiaojiao Jiang"},{"@pid":"44/7500","text":"Longxiang Gao"},{"@pid":"20/4460","text":"Jiong Jin"},{"@pid":"31/8333","text":"Tom H. Luan"},{"@pid":"90/3575-1","text":"Shui Yu 0001"},{"@pid":"98/2912-1","text":"Yong Xiang 0001"},{"@pid":"04/883","text":"Saurabh Kumar Garg 0001"}]},"title":"Sustainability Analysis for Fog Nodes With Renewable Energy Supplies.","venue":"IEEE Internet Things J.","volume":"6","number":"4","pages":"6725-6735","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/JiangGJLYXG19","doi":"10.1109/JIOT.2019.2910875","ee":"https://doi.org/10.1109/JIOT.2019.2910875","url":"https://dblp.org/rec/journals/iotj/JiangGJLYXG19"}, "url":"URL#1999516" }, { "@score":"1", "@id":"1999517", "info":{"authors":{"author":[{"@pid":"247/9560","text":"Yuna Jiang"},{"@pid":"76/3232","text":"Xiaohu Ge"},{"@pid":"60/2931-1","text":"Yi Zhong 0001"},{"@pid":"48/314","text":"Guoqiang Mao"},{"@pid":"59/6828-1","text":"Yonghui Li 0001"}]},"title":"A New Small-World IoT Routing Mechanism Based on Cayley Graphs.","venue":"IEEE Internet Things J.","volume":"6","number":"6","pages":"10384-10395","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/JiangGZML19","doi":"10.1109/JIOT.2019.2938800","ee":"https://doi.org/10.1109/JIOT.2019.2938800","url":"https://dblp.org/rec/journals/iotj/JiangGZML19"}, "url":"URL#1999517" }, { "@score":"1", "@id":"1999518", "info":{"authors":{"author":[{"@pid":"48/5579-1","text":"Qi Jiang 0001"},{"@pid":"17/4248","text":"Xiaohan Huang"},{"@pid":"181/2597-7","text":"Ning Zhang 0007"},{"@pid":"50/7188-1","text":"Kuan Zhang 0001"},{"@pid":"172/8609","text":"XinDi Ma"},{"@pid":"12/6604-1","text":"Jianfeng Ma 0001"}]},"title":"Shake to Communicate: Secure Handshake Acceleration-Based Pairing Mechanism for Wrist Worn Devices.","venue":"IEEE Internet Things J.","volume":"6","number":"3","pages":"5618-5630","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/JiangHZZMM19","doi":"10.1109/JIOT.2019.2904177","ee":"https://doi.org/10.1109/JIOT.2019.2904177","url":"https://dblp.org/rec/journals/iotj/JiangHZZMM19"}, "url":"URL#1999518" }, { "@score":"1", "@id":"1999519", "info":{"authors":{"author":[{"@pid":"129/1178","text":"Zhiyuan Jiang"},{"@pid":"87/2250","text":"Bhaskar Krishnamachari"},{"@pid":"30/338-2","text":"Xi Zheng 0002"},{"@pid":"34/4858-1","text":"Sheng Zhou 0001"},{"@pid":"51/2196","text":"Zhisheng Niu"}]},"title":"Timely Status Update in Wireless Uplinks: Analytical Solutions With Asymptotic Optimality.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"3885-3898","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/JiangKZZN19","doi":"10.1109/JIOT.2019.2893319","ee":"https://doi.org/10.1109/JIOT.2019.2893319","url":"https://dblp.org/rec/journals/iotj/JiangKZZN19"}, "url":"URL#1999519" }, { "@score":"1", "@id":"1999520", "info":{"authors":{"author":[{"@pid":"118/4227","text":"Liang Jiang"},{"@pid":"205/7519","text":"Lei-Lei Shi"},{"@pid":"31/2088-1","text":"Lu Liu 0001"},{"@pid":"150/5542","text":"Jingjing Yao"},{"@pid":"41/1662-4","text":"Bo Yuan 0004"},{"@pid":"93/3304","text":"Yongjun Zheng"}]},"title":"An Efficient Evolutionary User Interest Community Discovery Model in Dynamic Social Networks for Internet of People.","venue":"IEEE Internet Things J.","volume":"6","number":"6","pages":"9226-9236","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/JiangSLYYZ19","doi":"10.1109/JIOT.2019.2893625","ee":"https://doi.org/10.1109/JIOT.2019.2893625","url":"https://dblp.org/rec/journals/iotj/JiangSLYYZ19"}, "url":"URL#1999520" }, { "@score":"1", "@id":"1999521", "info":{"authors":{"author":[{"@pid":"j/TaoJiang-16","text":"Tao Jiang 0016"},{"@pid":"129/1008","text":"Yuanming Shi"},{"@pid":"z/JunZhang4","text":"Jun Zhang 0004"},{"@pid":"95/5358","text":"Khaled Ben Letaief"}]},"title":"Joint Activity Detection and Channel Estimation for IoT Networks: Phase Transition and Computation-Estimation Tradeoff.","venue":"IEEE Internet Things J.","volume":"6","number":"4","pages":"6212-6225","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/JiangSZL19","doi":"10.1109/JIOT.2018.2881486","ee":"https://doi.org/10.1109/JIOT.2018.2881486","url":"https://dblp.org/rec/journals/iotj/JiangSZL19"}, "url":"URL#1999521" }, { "@score":"1", "@id":"1999522", "info":{"authors":{"author":[{"@pid":"175/6887","text":"Ruihong Jiang"},{"@pid":"32/3424","text":"Ke Xiong 0001"},{"@pid":"44/2936","text":"Pingyi Fan"},{"@pid":"50/671-42","text":"Yu Zhang 0042"},{"@pid":"23/2071","text":"Zhangdui Zhong"}]},"title":"Power Minimization in SWIPT Networks With Coexisting Power-Splitting and Time-Switching Users Under Nonlinear EH Model.","venue":"IEEE Internet Things J.","volume":"6","number":"5","pages":"8853-8869","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/JiangXFZZ19","doi":"10.1109/JIOT.2019.2923977","ee":"https://doi.org/10.1109/JIOT.2019.2923977","url":"https://dblp.org/rec/journals/iotj/JiangXFZZ19"}, "url":"URL#1999522" }, { "@score":"1", "@id":"1999523", "info":{"authors":{"author":[{"@pid":"18/4625-3","text":"Bin Jiang 0003"},{"@pid":"120/3255","text":"Jiachen Yang"},{"@pid":"21/9114","text":"Zhihan Lv"},{"@pid":"49/594","text":"Houbing Song"}]},"title":"Wearable Vision Assistance System Based on Binocular Sensors for Visually Impaired Users.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"1375-1383","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/JiangYLS19","doi":"10.1109/JIOT.2018.2842229","ee":"https://doi.org/10.1109/JIOT.2018.2842229","url":"https://dblp.org/rec/journals/iotj/JiangYLS19"}, "url":"URL#1999523" }, { "@score":"1", "@id":"1999524", "info":{"authors":{"author":[{"@pid":"18/4625-3","text":"Bin Jiang 0003"},{"@pid":"120/3255","text":"Jiachen Yang"},{"@pid":"191/7319","text":"Huifang Xu"},{"@pid":"49/594","text":"Houbing Song"},{"@pid":"74/6653","text":"Gan Zheng"}]},"title":"Multimedia Data Throughput Maximization in Internet-of-Things System Based on Optimization of Cache-Enabled UAV.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"3525-3532","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/JiangYXSZ19","doi":"10.1109/JIOT.2018.2886964","ee":"https://doi.org/10.1109/JIOT.2018.2886964","url":"https://dblp.org/rec/journals/iotj/JiangYXSZ19"}, "url":"URL#1999524" }, { "@score":"1", "@id":"1999525", "info":{"authors":{"author":[{"@pid":"34/3870-1","text":"Ming Jin 0001"},{"@pid":"18/5331-1","text":"Qinghua Guo 0001"},{"@pid":"14/6496","text":"Youming Li"},{"@pid":"06/4004","text":"Jiangtao Xi"},{"@pid":"88/3271","text":"Defeng Huang"}]},"title":"Spectrum Sensing Using Multiple Large Eigenvalues and Its Performance Analysis.","venue":"IEEE Internet Things J.","volume":"6","number":"1","pages":"776-789","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/JinGLXH19","doi":"10.1109/JIOT.2018.2856754","ee":"https://doi.org/10.1109/JIOT.2018.2856754","url":"https://dblp.org/rec/journals/iotj/JinGLXH19"}, "url":"URL#1999525" }, { "@score":"1", "@id":"1999526", "info":{"authors":{"author":[{"@pid":"162/1616","text":"Qianao Ju"},{"@pid":"31/3668-1","text":"Geng Sun 0001"},{"@pid":"27/7402-2","text":"Hongsheng Li 0002"},{"@pid":"13/6769-7","text":"Ying Zhang 0007"}]},"title":"Collaborative In-Network Processing for Internet of Battery-Less Things.","venue":"IEEE Internet Things J.","volume":"6","number":"3","pages":"5184-5195","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/JuSLZ19","doi":"10.1109/JIOT.2019.2899022","ee":"https://doi.org/10.1109/JIOT.2019.2899022","url":"https://dblp.org/rec/journals/iotj/JuSLZ19"}, "url":"URL#1999526" }, { "@score":"1", "@id":"1999527", "info":{"authors":{"author":[{"@pid":"86/11275","text":"Yong-An Jung"},{"@pid":"89/2272-1","text":"Moo Young Kim 0001"},{"@pid":"40/6514","text":"Hyoung-Kyu Song"},{"@pid":"91/7006","text":"Young-Hwan You"}]},"title":"Blind Weighted Least-Squares Frequency Offset Estimation Method for LTE Machine-Type Communications.","venue":"IEEE Internet Things J.","volume":"6","number":"6","pages":"9806-9815","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/JungKSY19","doi":"10.1109/JIOT.2019.2932089","ee":"https://doi.org/10.1109/JIOT.2019.2932089","url":"https://dblp.org/rec/journals/iotj/JungKSY19"}, "url":"URL#1999527" }, { "@score":"1", "@id":"1999528", "info":{"authors":{"author":[{"@pid":"86/4711","text":"Kyungtae Kang"},{"@pid":"l/InsupLee","text":"Insup Lee 0001"},{"@pid":"73/4566","text":"Kai Liu"},{"@pid":"25/2975","text":"Man-Ki Yoon"},{"@pid":"88/4960","text":"Kyung-Joon Park"}]},"title":"Guest Editorial Special Issue on RRCPS: Reliable and Resilient Cyber-Physical Systems.","venue":"IEEE Internet Things J.","volume":"6","number":"4","pages":"6271-6275","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/KangLLYP19","doi":"10.1109/JIOT.2019.2926610","ee":"https://doi.org/10.1109/JIOT.2019.2926610","url":"https://dblp.org/rec/journals/iotj/KangLLYP19"}, "url":"URL#1999528" }, { "@score":"1", "@id":"1999529", "info":{"authors":{"author":[{"@pid":"145/4239","text":"Jiawen Kang"},{"@pid":"174/9863","text":"Zehui Xiong"},{"@pid":"76/440","text":"Dusit Niyato"},{"@pid":"32/6230","text":"Shengli Xie"},{"@pid":"59/1232","text":"Junshan Zhang"}]},"title":"Incentive Mechanism for Reliable Federated Learning: A Joint Optimization Approach to Combining Reputation and Contract Theory.","venue":"IEEE Internet Things J.","volume":"6","number":"6","pages":"10700-10714","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/KangXNXZ19","doi":"10.1109/JIOT.2019.2940820","ee":"https://doi.org/10.1109/JIOT.2019.2940820","url":"https://dblp.org/rec/journals/iotj/KangXNXZ19"}, "url":"URL#1999529" }, { "@score":"1", "@id":"1999530", "info":{"authors":{"author":[{"@pid":"145/4239","text":"Jiawen Kang"},{"@pid":"91/1334","text":"Rong Yu"},{"@pid":"166/6851","text":"Xumin Huang"},{"@pid":"182/7362","text":"Maoqiang Wu"},{"@pid":"92/8861","text":"Sabita Maharjan"},{"@pid":"32/6230","text":"Shengli Xie"},{"@pid":"04/3348-2","text":"Yan Zhang 0002"}]},"title":"Blockchain for Secure and Efficient Data Sharing in Vehicular Edge Computing and Networks.","venue":"IEEE Internet Things J.","volume":"6","number":"3","pages":"4660-4670","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/KangYHWMXZ19","doi":"10.1109/JIOT.2018.2875542","ee":"https://doi.org/10.1109/JIOT.2018.2875542","url":"https://dblp.org/rec/journals/iotj/KangYHWMXZ19"}, "url":"URL#1999530" }, { "@score":"1", "@id":"1999531", "info":{"authors":{"author":[{"@pid":"201/4394","text":"Sai Nithin R. Kantareddy"},{"@pid":"160/1494","text":"Ian Mathews"},{"@pid":"122/4092","text":"Rahul Bhattacharyya"},{"@pid":"246/5477","text":"Ian Marius Peters"},{"@pid":"217/3702","text":"Tonio Buonassisi"},{"@pid":"90/3360","text":"Sanjay E. Sarma"}]},"title":"Long Range Battery-Less PV-Powered RFID Tag Sensors.","venue":"IEEE Internet Things J.","volume":"6","number":"4","pages":"6989-6996","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/KantareddyMBPBS19","doi":"10.1109/JIOT.2019.2913403","ee":"https://doi.org/10.1109/JIOT.2019.2913403","url":"https://dblp.org/rec/journals/iotj/KantareddyMBPBS19"}, "url":"URL#1999531" }, { "@score":"1", "@id":"1999532", "info":{"authors":{"author":[{"@pid":"177/7510","text":"Arijit Karati"},{"@pid":"34/1432","text":"Chun-I Fan"},{"@pid":"89/936","text":"Ruei-Hau Hsu"}]},"title":"Provably Secure and Generalized Signcryption With Public Verifiability for Secure Data Transmission Between Resource-Constrained IoT Devices.","venue":"IEEE Internet Things J.","volume":"6","number":"6","pages":"10431-10440","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/KaratiFH19","doi":"10.1109/JIOT.2019.2939204","ee":"https://doi.org/10.1109/JIOT.2019.2939204","url":"https://dblp.org/rec/journals/iotj/KaratiFH19"}, "url":"URL#1999532" }, { "@score":"1", "@id":"1999533", "info":{"authors":{"author":[{"@pid":"115/6386","text":"Yuichi Kawamoto"},{"@pid":"214/4867","text":"Ryota Sasazawa"},{"@pid":"202/2936","text":"Bomin Mao"},{"@pid":"19/3059","text":"Nei Kato"}]},"title":"Multilayer Virtual Cell-Based Resource Allocation in Low-Power Wide-Area Networks.","venue":"IEEE Internet Things J.","volume":"6","number":"6","pages":"10665-10674","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/KawamotoSMK19","doi":"10.1109/JIOT.2019.2940600","ee":"https://doi.org/10.1109/JIOT.2019.2940600","url":"https://dblp.org/rec/journals/iotj/KawamotoSMK19"}, "url":"URL#1999533" }, { "@score":"1", "@id":"1999534", "info":{"authors":{"author":[{"@pid":"154/4059","text":"Chaker Abdelaziz Kerrache"},{"@pid":"133/4898","text":"Nasreddine Lagraa"},{"@pid":"68/7630","text":"Rasheed Hussain"},{"@pid":"78/10960","text":"Syed Hassan Ahmed"},{"@pid":"85/964","text":"Abderrahim Benslimane"},{"@pid":"93/2912","text":"Carlos T. Calafate"},{"@pid":"03/697","text":"Juan-Carlos Cano"},{"@pid":"22/4664","text":"Anna Maria Vegni"}]},"title":"TACASHI: Trust-Aware Communication Architecture for Social Internet of Vehicles.","venue":"IEEE Internet Things J.","volume":"6","number":"4","pages":"5870-5877","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/KerracheLHABCCV19","doi":"10.1109/JIOT.2018.2880332","ee":"https://doi.org/10.1109/JIOT.2018.2880332","url":"https://dblp.org/rec/journals/iotj/KerracheLHABCCV19"}, "url":"URL#1999534" }, { "@score":"1", "@id":"1999535", "info":{"authors":{"author":[{"@pid":"194/6995","text":"Sami Khairy"},{"@pid":"194/7004","text":"Mengqi Han"},{"@pid":"c/LinXCai","text":"Lin X. Cai"},{"@pid":"96/3060-3","text":"Yu Cheng 0003"}]},"title":"Sustainable Wireless IoT Networks With RF Energy Charging Over Wi-Fi (CoWiFi).","venue":"IEEE Internet Things J.","volume":"6","number":"6","pages":"10205-10218","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/KhairyHCC19","doi":"10.1109/JIOT.2019.2936837","ee":"https://doi.org/10.1109/JIOT.2019.2936837","url":"https://dblp.org/rec/journals/iotj/KhairyHCC19"}, "url":"URL#1999535" }, { "@score":"1", "@id":"1999536", "info":{"authors":{"author":[{"@pid":"59/10798","text":"Enan A. Khalil"},{"@pid":"70/6467","text":"Suat Ozdemir"},{"@pid":"56/10798","text":"Bara'a Ali Attea"}]},"title":"A New Task Allocation Protocol for Extending Stability and Operational Periods in Internet of Things.","venue":"IEEE Internet Things J.","volume":"6","number":"4","pages":"7225-7231","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/KhalilOA19","doi":"10.1109/JIOT.2019.2915558","ee":"https://doi.org/10.1109/JIOT.2019.2915558","url":"https://dblp.org/rec/journals/iotj/KhalilOA19"}, "url":"URL#1999536" }, { "@score":"1", "@id":"1999537", "info":{"authors":{"author":[{"@pid":"01/5245","text":"Osama Khan"},{"@pid":"185/4079","text":"David C. Burnett"},{"@pid":"187/9721","text":"Filip Maksimovic"},{"@pid":"62/8271","text":"Brad Wheeler"},{"@pid":"159/7345","text":"Sahar M. Mesri"},{"@pid":"40/1908","text":"Arvind Sundararajan"},{"@pid":"240/7097","text":"Bob L. Zhou"},{"@pid":"20/4071","text":"Ali M. Niknejad"},{"@pid":"50/6450","text":"Kristofer S. J. Pister"}]},"title":"Time Keeping Ability of Crystal-Free Radios.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"2390-2399","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/KhanBMWMSZNP19","doi":"10.1109/JIOT.2018.2869143","ee":"https://doi.org/10.1109/JIOT.2018.2869143","url":"https://dblp.org/rec/journals/iotj/KhanBMWMSZNP19"}, "url":"URL#1999537" }, { "@score":"1", "@id":"1999538", "info":{"authors":{"author":[{"@pid":"32/6735-4","text":"Salman Khan 0004"},{"@pid":"159/2187","text":"Khan Muhammad 0001"},{"@pid":"33/6012","text":"Shahid Mumtaz"},{"@pid":"b/SungWookBaik","text":"Sung Wook Baik"},{"@pid":"47/8013","text":"Victor Hugo C. de Albuquerque"}]},"title":"Energy-Efficient Deep CNN for Smoke Detection in Foggy IoT Environment.","venue":"IEEE Internet Things J.","volume":"6","number":"6","pages":"9237-9245","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/KhanMMBA19","doi":"10.1109/JIOT.2019.2896120","ee":"https://doi.org/10.1109/JIOT.2019.2896120","url":"https://dblp.org/rec/journals/iotj/KhanMMBA19"}, "url":"URL#1999538" }, { "@score":"1", "@id":"1999539", "info":{"authors":{"author":[{"@pid":"236/4203","text":"Mohamed Kheir"},{"@pid":"86/2610","text":"Manos M. Tentzeris"},{"@pid":"24/9196","text":"Ahmed Abdelgawad 0001"},{"@pid":"75/3854","text":"Ilsun You"}]},"title":"Guest Editorial Special Issue on Intrinsic Hardware Security for Internet of Things Infrastructure.","venue":"IEEE Internet Things J.","volume":"6","number":"1","pages":"321-324","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/KheirTAY19","doi":"10.1109/JIOT.2019.2896751","ee":"https://doi.org/10.1109/JIOT.2019.2896751","url":"https://dblp.org/rec/journals/iotj/KheirTAY19"}, "url":"URL#1999539" }, { "@score":"1", "@id":"1999540", "info":{"authors":{"author":[{"@pid":"225/1993","text":"Geonwoo Kim"},{"@pid":"231/4645","text":"Seongju Kang"},{"@pid":"138/5778","text":"Jiwoo Park"},{"@pid":"73/3481","text":"Kwangsue Chung"}]},"title":"An MQTT-Based Context-Aware Autonomous System in oneM2M Architecture.","venue":"IEEE Internet Things J.","volume":"6","number":"5","pages":"8519-8528","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/KimKPC19","doi":"10.1109/JIOT.2019.2919971","ee":"https://doi.org/10.1109/JIOT.2019.2919971","url":"https://dblp.org/rec/journals/iotj/KimKPC19"}, "url":"URL#1999540" }, { "@score":"1", "@id":"1999541", "info":{"authors":{"author":[{"@pid":"231/4992","text":"Youhyun Kim"},{"@pid":"255/2193","text":"Minwoo Sim"},{"@pid":"68/8345","text":"Inkyu Moon"},{"@pid":"30/4913","text":"Bahram Javidi"}]},"title":"Secure Random Phase Key Exchange Schemes for Image Cryptography.","venue":"IEEE Internet Things J.","volume":"6","number":"6","pages":"10855-10861","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/KimSMJ19","doi":"10.1109/JIOT.2019.2942048","ee":"https://doi.org/10.1109/JIOT.2019.2942048","url":"https://dblp.org/rec/journals/iotj/KimSMJ19"}, "url":"URL#1999541" }, { "@score":"1", "@id":"1999542", "info":{"authors":{"author":[{"@pid":"78/6861","text":"Sangjun Kim"},{"@pid":"218/2885","text":"Yuchang Won"},{"@pid":"170/9121","text":"In-Hee Park"},{"@pid":"84/8134","text":"Yongsoon Eun"},{"@pid":"88/4960","text":"Kyung-Joon Park"}]},"title":"Cyber-Physical Vulnerability Analysis of Communication-Based Train Control.","venue":"IEEE Internet Things J.","volume":"6","number":"4","pages":"6353-6362","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/KimWPEP19","doi":"10.1109/JIOT.2019.2919066","ee":"https://doi.org/10.1109/JIOT.2019.2919066","url":"https://dblp.org/rec/journals/iotj/KimWPEP19"}, "url":"URL#1999542" }, { "@score":"1", "@id":"1999543", "info":{"authors":{"author":[{"@pid":"123/1953","text":"Haneul Ko"},{"@pid":"51/16","text":"Sangheon Pack"}]},"title":"Neighbor-Aware Energy-Efficient Monitoring System for Energy Harvesting Internet of Things.","venue":"IEEE Internet Things J.","volume":"6","number":"3","pages":"5745-5752","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/KoP19","doi":"10.1109/JIOT.2019.2905573","ee":"https://doi.org/10.1109/JIOT.2019.2905573","url":"https://dblp.org/rec/journals/iotj/KoP19"}, "url":"URL#1999543" }, { "@score":"1", "@id":"1999544", "info":{"authors":{"author":[{"@pid":"123/1953","text":"Haneul Ko"},{"@pid":"51/16","text":"Sangheon Pack"},{"@pid":"36/4847","text":"Victor C. M. Leung"}]},"title":"Coverage-Guaranteed and Energy-Efficient Participant Selection Strategy in Mobile Crowdsensing.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"3202-3211","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/KoPL19","doi":"10.1109/JIOT.2018.2880463","ee":"https://doi.org/10.1109/JIOT.2018.2880463","url":"https://dblp.org/rec/journals/iotj/KoPL19"}, "url":"URL#1999544" }, { "@score":"1", "@id":"1999545", "info":{"authors":{"author":[{"@pid":"123/1953","text":"Haneul Ko"},{"@pid":"51/16","text":"Sangheon Pack"},{"@pid":"36/4847","text":"Victor C. M. Leung"}]},"title":"Energy Utilization-Aware Operation Control Algorithm in Energy Harvesting Base Stations.","venue":"IEEE Internet Things J.","volume":"6","number":"6","pages":"10824-10833","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/KoPL19a","doi":"10.1109/JIOT.2019.2942037","ee":"https://doi.org/10.1109/JIOT.2019.2942037","url":"https://dblp.org/rec/journals/iotj/KoPL19a"}, "url":"URL#1999545" }, { "@score":"1", "@id":"1999546", "info":{"authors":{"author":[{"@pid":"39/9955","text":"Sefki Kolozali"},{"@pid":"06/3683","text":"María Bermúdez-Edo"},{"@pid":"18/10782","text":"Nazli FarajiDavar"},{"@pid":"22/4255","text":"Payam M. Barnaghi"},{"@pid":"10/2674-3","text":"Feng Gao 0003"},{"@pid":"24/5908","text":"Muhammad Intizar Ali"},{"@pid":"53/280","text":"Alessandra Mileo"},{"@pid":"128/0929","text":"Marten Fischer"},{"@pid":"178/8227","text":"Thorben Iggena"},{"@pid":"129/7877","text":"Daniel Kuemper"},{"@pid":"08/4580","text":"Ralf Tönjes"}]},"title":"Observing the Pulse of a City: A Smart City Framework for Real-Time Discovery, Federation, and Aggregation of Data Streams.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"2651-2668","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/KolozaliBFBGAMF19","doi":"10.1109/JIOT.2018.2872606","ee":"https://doi.org/10.1109/JIOT.2018.2872606","url":"https://dblp.org/rec/journals/iotj/KolozaliBFBGAMF19"}, "url":"URL#1999546" }, { "@score":"1", "@id":"1999547", "info":{"authors":{"author":[{"@pid":"74/8773","text":"Xiangjie Kong 0001"},{"@pid":"251/1538","text":"Xiaoteng Liu"},{"@pid":"05/7993","text":"Behrouz Jedari"},{"@pid":"89/9881","text":"Menglin Li"},{"@pid":"138/6914","text":"Liangtian Wan"},{"@pid":"62/3147","text":"Feng Xia 0001"}]},"title":"Mobile Crowdsourcing in Smart Cities: Technologies, Applications, and Future Challenges.","venue":"IEEE Internet Things J.","volume":"6","number":"5","pages":"8095-8113","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/KongLJLWX19","doi":"10.1109/JIOT.2019.2921879","ee":"https://doi.org/10.1109/JIOT.2019.2921879","url":"https://dblp.org/rec/journals/iotj/KongLJLWX19"}, "url":"URL#1999547" }, { "@score":"1", "@id":"1999548", "info":{"authors":{"author":[{"@pid":"33/9881","text":"Anton Kos"},{"@pid":"122/6540","text":"Anton Umek"}]},"title":"Wearable Sensor Devices for Prevention and Rehabilitation in Healthcare: Swimming Exercise With Real-Time Therapist Feedback.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"1331-1341","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/KosU19","doi":"10.1109/JIOT.2018.2850664","ee":"https://doi.org/10.1109/JIOT.2018.2850664","url":"https://dblp.org/rec/journals/iotj/KosU19"}, "url":"URL#1999548" }, { "@score":"1", "@id":"1999549", "info":{"authors":{"author":[{"@pid":"167/5201","text":"Vasileios Kotsiou"},{"@pid":"137/6695","text":"Georgios Z. Papadopoulos"},{"@pid":"45/1358","text":"Periklis Chatzimisios"},{"@pid":"64/4022","text":"Fabrice Theoleyre"}]},"title":"Whitelisting Without Collisions for Centralized Scheduling in Wireless Industrial Networks.","venue":"IEEE Internet Things J.","volume":"6","number":"3","pages":"5713-5721","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/KotsiouPCT19","doi":"10.1109/JIOT.2019.2905217","ee":"https://doi.org/10.1109/JIOT.2019.2905217","url":"https://dblp.org/rec/journals/iotj/KotsiouPCT19"}, "url":"URL#1999549" }, { "@score":"1", "@id":"1999550", "info":{"authors":{"author":[{"@pid":"229/5654","text":"Boyu Kuang"},{"@pid":"88/9558","text":"Anmin Fu"},{"@pid":"90/3575-1","text":"Shui Yu 0001"},{"@pid":"78/2235","text":"Guomin Yang"},{"@pid":"171/5826","text":"Mang Su"},{"@pid":"83/6530-1","text":"Yuqing Zhang 0001"}]},"title":"ESDRA: An Efficient and Secure Distributed Remote Attestation Scheme for IoT Swarms.","venue":"IEEE Internet Things J.","volume":"6","number":"5","pages":"8372-8383","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/KuangFYYSZ19","doi":"10.1109/JIOT.2019.2917223","ee":"https://doi.org/10.1109/JIOT.2019.2917223","url":"https://dblp.org/rec/journals/iotj/KuangFYYSZ19"}, "url":"URL#1999550" }, { "@score":"1", "@id":"1999551", "info":{"authors":{"author":[{"@pid":"24/10137","text":"Zhufang Kuang"},{"@pid":"24/514","text":"Linfeng Li"},{"@pid":"181/2794-2","text":"Jie Gao 0002"},{"@pid":"82/4593","text":"Lian Zhao"},{"@pid":"28/3062","text":"Anfeng Liu"}]},"title":"Partial Offloading Scheduling and Power Allocation for Mobile Edge Computing Systems.","venue":"IEEE Internet Things J.","volume":"6","number":"4","pages":"6774-6785","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/KuangLGZL19","doi":"10.1109/JIOT.2019.2911455","ee":"https://doi.org/10.1109/JIOT.2019.2911455","url":"https://dblp.org/rec/journals/iotj/KuangLGZL19"}, "url":"URL#1999551" }, { "@score":"1", "@id":"1999552", "info":{"authors":{"author":[{"@pid":"24/10137","text":"Zhufang Kuang"},{"@pid":"37/2109","text":"Gang Liu"},{"@pid":"121/0981","text":"Gongqiang Li"},{"@pid":"22/2465","text":"Xiaoheng Deng"}]},"title":"Energy Efficient Resource Allocation Algorithm in Energy Harvesting-Based D2D Heterogeneous Networks.","venue":"IEEE Internet Things J.","volume":"6","number":"1","pages":"557-567","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/KuangLLD19","doi":"10.1109/JIOT.2018.2842738","ee":"https://doi.org/10.1109/JIOT.2018.2842738","url":"https://dblp.org/rec/journals/iotj/KuangLLD19"}, "url":"URL#1999552" }, { "@score":"1", "@id":"1999553", "info":{"authors":{"author":[{"@pid":"228/3098","text":"Shreyas Kulkarni"},{"@pid":"218/8800","text":"Qinchen Gu"},{"@pid":"246/8675","text":"Eric Myers"},{"@pid":"99/9872","text":"Lalith Polepeddi"},{"@pid":"172/4807","text":"Szilárd Lipták"},{"@pid":"12/6354","text":"Raheem Beyah"},{"@pid":"10/8581","text":"Deepak Divan"}]},"title":"Enabling a Decentralized Smart Grid Using Autonomous Edge Control Devices.","venue":"IEEE Internet Things J.","volume":"6","number":"5","pages":"7406-7419","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/KulkarniGMPLBD19","doi":"10.1109/JIOT.2019.2898837","ee":"https://doi.org/10.1109/JIOT.2019.2898837","url":"https://dblp.org/rec/journals/iotj/KulkarniGMPLBD19"}, "url":"URL#1999553" }, { "@score":"1", "@id":"1999554", "info":{"authors":{"author":[{"@pid":"203/5174","text":"Nitish Kumar"},{"@pid":"232/8018","text":"Jialuo Chen"},{"@pid":"149/4005","text":"Monodeep Kar"},{"@pid":"16/1649","text":"Suresh K. Sitaraman"},{"@pid":"66/1210","text":"Saibal Mukhopadhyay"},{"@pid":"32/2367","text":"Satish Kumar"}]},"title":"Multigated Carbon Nanotube Field Effect Transistors-Based Physically Unclonable Functions As Security Keys.","venue":"IEEE Internet Things J.","volume":"6","number":"1","pages":"325-334","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/KumarCKSMK19","doi":"10.1109/JIOT.2018.2838580","ee":"https://doi.org/10.1109/JIOT.2018.2838580","url":"https://dblp.org/rec/journals/iotj/KumarCKSMK19"}, "url":"URL#1999554" }, { "@score":"1", "@id":"1999555", "info":{"authors":{"author":[{"@pid":"46/2681-1","text":"Sushil Kumar 0001"},{"@pid":"149/6544","text":"Upasana Dohare"},{"@pid":"246/5435","text":"Kirshna Kumar"},{"@pid":"246/5449","text":"Durga Prasad Dora"},{"@pid":"157/3802","text":"Kashif Naseer Qureshi"},{"@pid":"11/8135","text":"Rupak Kharel"}]},"title":"Cybersecurity Measures for Geocasting in Vehicular Cyber Physical System Environments.","venue":"IEEE Internet Things J.","volume":"6","number":"4","pages":"5916-5926","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/KumarDKDQK19","doi":"10.1109/JIOT.2018.2872474","ee":"https://doi.org/10.1109/JIOT.2018.2872474","url":"https://dblp.org/rec/journals/iotj/KumarDKDQK19"}, "url":"URL#1999555" }, { "@score":"1", "@id":"1999556", "info":{"authors":{"author":[{"@pid":"64/8717","text":"Gulshan Kumar"},{"@pid":"34/10357","text":"Rahul Saha"},{"@pid":"03/10358","text":"Mritunjay Kumar Rai"},{"@pid":"210/4802","text":"Reji Thomas"},{"@pid":"k/TaiHoonKim","text":"Tai-Hoon Kim"}]},"title":"Proof-of-Work Consensus Approach in Blockchain Technology for Cloud and Fog Computing Using Maximization-Factorization Statistics.","venue":"IEEE Internet Things J.","volume":"6","number":"4","pages":"6835-6842","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/KumarSRTK19","doi":"10.1109/JIOT.2019.2911969","ee":"https://doi.org/10.1109/JIOT.2019.2911969","url":"https://dblp.org/rec/journals/iotj/KumarSRTK19"}, "url":"URL#1999556" }, { "@score":"1", "@id":"1999557", "info":{"authors":{"author":[{"@pid":"218/1302","text":"Endre Hegland Hjort Kure"},{"@pid":"e/PaalEngelstad","text":"Paal Engelstad"},{"@pid":"92/8861","text":"Sabita Maharjan"},{"@pid":"97/4581","text":"Stein Gjessing"},{"@pid":"04/3348-2","text":"Yan Zhang 0002"}]},"title":"Distributed Uplink Offloading for IoT in 5G Heterogeneous Networks Under Private Information Constraints.","venue":"IEEE Internet Things J.","volume":"6","number":"4","pages":"6151-6164","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/KureEMGZ19","doi":"10.1109/JIOT.2018.2886703","ee":"https://doi.org/10.1109/JIOT.2018.2886703","url":"https://dblp.org/rec/journals/iotj/KureEMGZ19"}, "url":"URL#1999557" }, { "@score":"1", "@id":"1999558", "info":{"authors":{"author":[{"@pid":"177/3590","text":"Carson Labrado"},{"@pid":"t/HimanshuThapliyal","text":"Himanshu Thapliyal"}]},"title":"Design of a Piezoelectric-Based Physically Unclonable Function for IoT Security.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"2770-2777","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/LabradoT19","doi":"10.1109/JIOT.2018.2874626","ee":"https://doi.org/10.1109/JIOT.2018.2874626","url":"https://dblp.org/rec/journals/iotj/LabradoT19"}, "url":"URL#1999558" }, { "@score":"1", "@id":"1999559", "info":{"authors":{"author":[{"@pid":"132/3842","text":"Chuan-Chi Lai"},{"@pid":"197/0907","text":"Zulhaydar Fairozal Akbar"},{"@pid":"58/2882","text":"Chuan-Ming Liu"},{"@pid":"167/0557","text":"Van-Dai Ta"},{"@pid":"w/LiChunWang","text":"Li-Chun Wang 0001"}]},"title":"Distributed Continuous Range-Skyline Query Monitoring Over the Internet of Mobile Things.","venue":"IEEE Internet Things J.","volume":"6","number":"4","pages":"6652-6667","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/LaiALTW19","doi":"10.1109/JIOT.2019.2909393","ee":"https://doi.org/10.1109/JIOT.2019.2909393","url":"https://dblp.org/rec/journals/iotj/LaiALTW19"}, "url":"URL#1999559" }, { "@score":"1", "@id":"1999560", "info":{"authors":{"author":[{"@pid":"48/4678","text":"Kuan-Ting Lai"},{"@pid":"61/4897","text":"Fu-Chiung Cheng"},{"@pid":"72/220","text":"Seng-cho Timothy Chou"},{"@pid":"71/2831","text":"Yi-Chun Chang"},{"@pid":"255/2375","text":"Guo-Wei Wu"},{"@pid":"255/2395","text":"Jung-Cheng Tsai"}]},"title":"AnyCharge: An IoT-Based Wireless Charging Service for the Public.","venue":"IEEE Internet Things J.","volume":"6","number":"6","pages":"10888-10901","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/LaiCCCWT19","doi":"10.1109/JIOT.2019.2943030","ee":"https://doi.org/10.1109/JIOT.2019.2943030","url":"https://dblp.org/rec/journals/iotj/LaiCCCWT19"}, "url":"URL#1999560" }, { "@score":"1", "@id":"1999561", "info":{"authors":{"author":[{"@pid":"132/3842","text":"Chuan-Chi Lai"},{"@pid":"221/0223","text":"Tien-Chun Wang"},{"@pid":"58/2882","text":"Chuan-Ming Liu"},{"@pid":"w/LiChunWang","text":"Li-Chun Wang 0001"}]},"title":"Probabilistic Top-k Dominating Query Monitoring Over Multiple Uncertain IoT Data Streams in Edge Computing Environments.","venue":"IEEE Internet Things J.","volume":"6","number":"5","pages":"8563-8576","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/LaiWLW19","doi":"10.1109/JIOT.2019.2920908","ee":"https://doi.org/10.1109/JIOT.2019.2920908","url":"https://dblp.org/rec/journals/iotj/LaiWLW19"}, "url":"URL#1999561" }, { "@score":"1", "@id":"1999562", "info":{"authors":{"author":[{"@pid":"43/4636","text":"Yue Lang"},{"@pid":"97/6505-15","text":"Qing Wang 0015"},{"@pid":"48/450-45","text":"Yang Yang 0045"},{"@pid":"72/4265","text":"Chunping Hou"},{"@pid":"77/3604","text":"Haiping Liu"},{"@pid":"11/1735-9","text":"Yuan He 0009"}]},"title":"Joint Motion Classification and Person Identification via Multitask Learning for Smart Homes.","venue":"IEEE Internet Things J.","volume":"6","number":"6","pages":"9596-9605","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/LangWYHLH19","doi":"10.1109/JIOT.2019.2929833","ee":"https://doi.org/10.1109/JIOT.2019.2929833","url":"https://dblp.org/rec/journals/iotj/LangWYHLH19"}, "url":"URL#1999562" }, { "@score":"1", "@id":"1999563", "info":{"authors":{"author":{"@pid":"78/6080-3","text":"Jaeho Lee 0003"}},"title":"Broadcast Audio Transmission for Bluetooth LE on an Interfered ISM Band.","venue":"IEEE Internet Things J.","volume":"6","number":"4","pages":"6140-6150","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/Lee19","doi":"10.1109/JIOT.2018.2875773","ee":"https://doi.org/10.1109/JIOT.2018.2875773","url":"https://dblp.org/rec/journals/iotj/Lee19"}, "url":"URL#1999563" }, { "@score":"1", "@id":"1999564", "info":{"authors":{"author":[{"@pid":"32/10300","text":"Kilho Lee"},{"@pid":"25/6052","text":"Minsu Kim"},{"@pid":"227/9040","text":"Hayeon Kim"},{"@pid":"46/11077","text":"Hoon Sung Chwa"},{"@pid":"89/2271","text":"Jaewoo Lee"},{"@pid":"39/1801-1","text":"Jinkyu Lee 0001"},{"@pid":"45/4154","text":"Insik Shin"}]},"title":"JMC: Jitter-Based Mixed-Criticality Scheduling for Distributed Real-Time Systems.","venue":"IEEE Internet Things J.","volume":"6","number":"4","pages":"6310-6324","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/LeeKKCLLS19","doi":"10.1109/JIOT.2019.2915790","ee":"https://doi.org/10.1109/JIOT.2019.2915790","url":"https://dblp.org/rec/journals/iotj/LeeKKCLLS19"}, "url":"URL#1999564" }, { "@score":"1", "@id":"1999565", "info":{"authors":{"author":[{"@pid":"32/10300","text":"Kilho Lee"},{"@pid":"25/6052","text":"Minsu Kim"},{"@pid":"164/1709","text":"Taejune Park"},{"@pid":"46/11077","text":"Hoon Sung Chwa"},{"@pid":"39/1801-1","text":"Jinkyu Lee 0001"},{"@pid":"84/3319","text":"Seungwon Shin"},{"@pid":"45/4154","text":"Insik Shin"}]},"title":"MC-SDN: Supporting Mixed-Criticality Real-Time Communication Using Software-Defined Networking.","venue":"IEEE Internet Things J.","volume":"6","number":"4","pages":"6325-6344","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/LeeKPCLSS19","doi":"10.1109/JIOT.2019.2915921","ee":"https://doi.org/10.1109/JIOT.2019.2915921","url":"https://dblp.org/rec/journals/iotj/LeeKPCLSS19"}, "url":"URL#1999565" }, { "@score":"1", "@id":"1999566", "info":{"authors":{"author":[{"@pid":"175/2507","text":"Hyun-Suk Lee"},{"@pid":"52/4915-1","text":"Jang-Won Lee 0001"}]},"title":"Resource and Task Scheduling for SWIPT IoT Systems With Renewable Energy Sources.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"2729-2748","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/LeeL19","doi":"10.1109/JIOT.2018.2873658","ee":"https://doi.org/10.1109/JIOT.2018.2873658","url":"https://dblp.org/rec/journals/iotj/LeeL19"}, "url":"URL#1999566" }, { "@score":"1", "@id":"1999567", "info":{"authors":{"author":[{"@pid":"175/2507","text":"Hyun-Suk Lee"},{"@pid":"52/4915-1","text":"Jang-Won Lee 0001"}]},"title":"Contextual Learning-Based Wireless Power Transfer Beam Scheduling for IoT Devices.","venue":"IEEE Internet Things J.","volume":"6","number":"6","pages":"9606-9620","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/LeeL19a","doi":"10.1109/JIOT.2019.2930061","ee":"https://doi.org/10.1109/JIOT.2019.2930061","url":"https://dblp.org/rec/journals/iotj/LeeL19a"}, "url":"URL#1999567" }, { "@score":"1", "@id":"1999568", "info":{"authors":{"author":[{"@pid":"91/8024","text":"Tao Lei"},{"@pid":"148/4477","text":"Zhan Qin"},{"@pid":"31/5772-1","text":"Zhibo Wang 0001"},{"@pid":"181/2688-2","text":"Qi Li 0002"},{"@pid":"39/9365","text":"Dengpan Ye"}]},"title":"EveDroid: Event-Aware Android Malware Detection Against Model Degrading for IoT Devices.","venue":"IEEE Internet Things J.","volume":"6","number":"4","pages":"6668-6680","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/LeiQWLY19","doi":"10.1109/JIOT.2019.2909745","ee":"https://doi.org/10.1109/JIOT.2019.2909745","url":"https://dblp.org/rec/journals/iotj/LeiQWLY19"}, "url":"URL#1999568" }, { "@score":"1", "@id":"1999569", "info":{"authors":{"author":[{"@pid":"09/471-4","text":"Lei Lei 0004"},{"@pid":"129/9444-3","text":"Huijuan Xu 0003"},{"@pid":"21/3218","text":"Xiong Xiong"},{"@pid":"77/6893","text":"Kan Zheng"},{"@pid":"37/1682-1","text":"Wei Xiang 0001"}]},"title":"Joint Computation Offloading and Multiuser Scheduling Using Approximate Dynamic Programming in NB-IoT Edge Computing System.","venue":"IEEE Internet Things J.","volume":"6","number":"3","pages":"5345-5362","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/LeiXXZX19","doi":"10.1109/JIOT.2019.2900550","ee":"https://doi.org/10.1109/JIOT.2019.2900550","url":"https://dblp.org/rec/journals/iotj/LeiXXZX19"}, "url":"URL#1999569" }, { "@score":"1", "@id":"1999570", "info":{"authors":{"author":[{"@pid":"09/471-4","text":"Lei Lei 0004"},{"@pid":"129/9444-3","text":"Huijuan Xu 0003"},{"@pid":"21/3218","text":"Xiong Xiong"},{"@pid":"77/6893","text":"Kan Zheng"},{"@pid":"37/1682-1","text":"Wei Xiang 0001"},{"@pid":"87/6482-1","text":"Xianbin Wang 0001"}]},"title":"Multiuser Resource Control With Deep Reinforcement Learning in IoT Edge Computing.","venue":"IEEE Internet Things J.","volume":"6","number":"6","pages":"10119-10133","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/LeiXXZXW19","doi":"10.1109/JIOT.2019.2935543","ee":"https://doi.org/10.1109/JIOT.2019.2935543","url":"https://dblp.org/rec/journals/iotj/LeiXXZXW19"}, "url":"URL#1999570" }, { "@score":"1", "@id":"1999571", "info":{"authors":{"author":[{"@pid":"118/9640","text":"Johann Leithon"},{"@pid":"47/671-1","text":"Stefan Werner 0001"},{"@pid":"k/VisaKoivunen","text":"Visa Koivunen"}]},"title":"Storage Management in a Shared Solar Environment With Time-Varying Electricity Prices.","venue":"IEEE Internet Things J.","volume":"6","number":"5","pages":"7420-7436","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/LeithonWK19","doi":"10.1109/JIOT.2019.2894804","ee":"https://doi.org/10.1109/JIOT.2019.2894804","url":"https://dblp.org/rec/journals/iotj/LeithonWK19"}, "url":"URL#1999571" }, { "@score":"1", "@id":"1999572", "info":{"authors":{"author":[{"@pid":"159/2662","text":"Filip Lemic"},{"@pid":"97/7718","text":"Arash Behboodi"},{"@pid":"01/6700","text":"Jeroen Famaey"},{"@pid":"m/RMathar","text":"Rudolf Mathar"}]},"title":"Location-Based Discovery and Vertical Handover in Heterogeneous Low-Power Wide-Area Networks.","venue":"IEEE Internet Things J.","volume":"6","number":"6","pages":"10150-10165","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/LemicBFM19","doi":"10.1109/JIOT.2019.2935804","ee":"https://doi.org/10.1109/JIOT.2019.2935804","url":"https://dblp.org/rec/journals/iotj/LemicBFM19"}, "url":"URL#1999572" }, { "@score":"1", "@id":"1999573", "info":{"authors":{"author":[{"@pid":"78/1367","text":"Luca Leonardi"},{"@pid":"120/9133","text":"Filippo Battaglia"},{"@pid":"l/LuciaLoBello","text":"Lucia Lo Bello"}]},"title":"RT-LoRa: A Medium Access Strategy to Support Real-Time Flows Over LoRa-Based Networks for Industrial IoT Applications.","venue":"IEEE Internet Things J.","volume":"6","number":"6","pages":"10812-10823","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/LeonardiBB19","doi":"10.1109/JIOT.2019.2942776","ee":"https://doi.org/10.1109/JIOT.2019.2942776","url":"https://dblp.org/rec/journals/iotj/LeonardiBB19"}, "url":"URL#1999573" }, { "@score":"1", "@id":"1999574", "info":{"authors":{"author":[{"@pid":"53/3569","text":"Isaac Lera"},{"@pid":"32/2275","text":"Carlos Guerrero"},{"@pid":"81/2443","text":"Carlos Juiz"}]},"title":"Availability-Aware Service Placement Policy in Fog Computing Based on Graph Partitions.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"3641-3651","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/LeraGJ19","doi":"10.1109/JIOT.2018.2889511","ee":"https://doi.org/10.1109/JIOT.2018.2889511","url":"https://dblp.org/rec/journals/iotj/LeraGJ19"}, "url":"URL#1999574" }, { "@score":"1", "@id":"1999575", "info":{"authors":{"author":{"@pid":"l/MingLi41","text":"Ming Li 0041"}},"title":"Orbital-Angular-Momentum Multiplexing Optical Wireless Communications With Adaptive Modes Adjustment in Internet-of-Things Networks.","venue":"IEEE Internet Things J.","volume":"6","number":"4","pages":"6134-6139","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/Li19","doi":"10.1109/JIOT.2018.2873714","ee":"https://doi.org/10.1109/JIOT.2018.2873714","url":"https://dblp.org/rec/journals/iotj/Li19"}, "url":"URL#1999575" }, { "@score":"1", "@id":"1999576", "info":{"authors":{"author":[{"@pid":"74/2853-4","text":"Yanjun Li 0004"},{"@pid":"232/1287","text":"Yuzhe Chen"},{"@pid":"30/1446","text":"Chung Shue Chen"},{"@pid":"31/5772-1","text":"Zhibo Wang 0001"},{"@pid":"00/4408-1","text":"Yi-hua Zhu 0001"}]},"title":"Simultaneous Sensor Placement and Scheduling for Fusion-Based Detection in RF-Powered Sensor Networks.","venue":"IEEE Internet Things J.","volume":"6","number":"3","pages":"5595-5606","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/LiCCWZ19","doi":"10.1109/JIOT.2019.2903847","ee":"https://doi.org/10.1109/JIOT.2019.2903847","url":"https://dblp.org/rec/journals/iotj/LiCCWZ19"}, "url":"URL#1999576" }, { "@score":"1", "@id":"1999577", "info":{"authors":{"author":[{"@pid":"75/5928-1","text":"Wenjun Li 0001"},{"@pid":"86/541-3","text":"Zhenyu Chen 0003"},{"@pid":"32/4831-1","text":"Xingyu Gao 0001"},{"@pid":"49/3283","text":"Wei Liu"},{"@pid":"92/1375-1","text":"Jin Wang 0001"}]},"title":"Multimodel Framework for Indoor Localization Under Mobile Edge Computing Environment.","venue":"IEEE Internet Things J.","volume":"6","number":"3","pages":"4844-4853","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/LiCGLW19","doi":"10.1109/JIOT.2018.2872133","ee":"https://doi.org/10.1109/JIOT.2018.2872133","url":"https://dblp.org/rec/journals/iotj/LiCGLW19"}, "url":"URL#1999577" }, { "@score":"1", "@id":"1999578", "info":{"authors":{"author":[{"@pid":"08/2185-1","text":"Jianqiang Li 0001"},{"@pid":"224/1766","text":"Zhuangzhuang Chen"},{"@pid":"204/1457","text":"Luxiang Huang"},{"@pid":"96/3907","text":"Min Fang"},{"@pid":"13/2692","text":"Bing Li"},{"@pid":"24/1387","text":"Xianghua Fu"},{"@pid":"04/10735","text":"Huihui Wang 0001"},{"@pid":"30/6081","text":"Qingguo Zhao"}]},"title":"Automatic Classification of Fetal Heart Rate Based on Convolutional Neural Network.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"1394-1401","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/LiCHFLFWZ19","doi":"10.1109/JIOT.2018.2845128","ee":"https://doi.org/10.1109/JIOT.2018.2845128","url":"https://dblp.org/rec/journals/iotj/LiCHFLFWZ19"}, "url":"URL#1999578" }, { "@score":"1", "@id":"1999579", "info":{"authors":{"author":[{"@pid":"57/3194","text":"Mingyan Li"},{"@pid":"35/6761","text":"Cailian Chen"},{"@pid":"29/5709","text":"Cunqing Hua"},{"@pid":"25/3029","text":"Xinping Guan"}]},"title":"Intelligent Latency-Aware Virtual Network Embedding for Industrial Wireless Networks.","venue":"IEEE Internet Things J.","volume":"6","number":"5","pages":"7484-7496","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/LiCHG19","doi":"10.1109/JIOT.2019.2900855","ee":"https://doi.org/10.1109/JIOT.2019.2900855","url":"https://dblp.org/rec/journals/iotj/LiCHG19"}, "url":"URL#1999579" }, { "@score":"1", "@id":"1999580", "info":{"authors":{"author":[{"@pid":"02/1430","text":"Shancang Li"},{"@pid":"c/KimKwangRaymondChoo","text":"Kim-Kwang Raymond Choo"},{"@pid":"33/625","text":"Qindong Sun"},{"@pid":"04/5266","text":"William J. Buchanan"},{"@pid":"20/2389","text":"Jiuxin Cao"}]},"title":"IoT Forensics: Amazon Echo as a Use Case.","venue":"IEEE Internet Things J.","volume":"6","number":"4","pages":"6487-6497","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/LiCSBC19","doi":"10.1109/JIOT.2019.2906946","ee":"https://doi.org/10.1109/JIOT.2019.2906946","url":"https://dblp.org/rec/journals/iotj/LiCSBC19"}, "url":"URL#1999580" }, { "@score":"1", "@id":"1999581", "info":{"authors":{"author":[{"@pid":"133/3266","text":"Yumeng Li"},{"@pid":"35/7086","text":"Wenbo Du"},{"@pid":"57/5443-9","text":"Peng Yang 0009"},{"@pid":"221/7947","text":"Tianhang Wu"},{"@pid":"z/JunZhang7","text":"Jun Zhang 0007"},{"@pid":"88/1600","text":"Dapeng Oliver Wu"},{"@pid":"79/5040","text":"Matjaz Perc"}]},"title":"A Satisficing Conflict Resolution Approach for Multiple UAVs.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"1866-1878","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/LiDYWZWP19","doi":"10.1109/JIOT.2018.2885147","ee":"https://doi.org/10.1109/JIOT.2018.2885147","url":"https://dblp.org/rec/journals/iotj/LiDYWZWP19"}, "url":"URL#1999581" }, { "@score":"1", "@id":"1999582", "info":{"authors":{"author":[{"@pid":"89/6764-10","text":"Bin Li 0010"},{"@pid":"27/6389","text":"Zesong Fei"},{"@pid":"04/3348-2","text":"Yan Zhang 0002"}]},"title":"UAV Communications for 5G and Beyond: Recent Advances and Future Trends.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"2241-2263","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/LiFZ19","doi":"10.1109/JIOT.2018.2887086","ee":"https://doi.org/10.1109/JIOT.2018.2887086","url":"https://dblp.org/rec/journals/iotj/LiFZ19"}, "url":"URL#1999582" }, { "@score":"1", "@id":"1999583", "info":{"authors":{"author":[{"@pid":"53/2189-9","text":"Li Li 0009"},{"@pid":"09/4067","text":"Amir Ghasemi"}]},"title":"IoT-Enabled Machine Learning for an Algorithmic Spectrum Decision Process.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"1911-1919","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/LiG19","doi":"10.1109/JIOT.2018.2883490","ee":"https://doi.org/10.1109/JIOT.2018.2883490","url":"https://dblp.org/rec/journals/iotj/LiG19"}, "url":"URL#1999583" }, { "@score":"1", "@id":"1999584", "info":{"authors":{"author":[{"@pid":"73/2252-28","text":"Lin Li 0028"},{"@pid":"142/8822","text":"Xiansheng Guo"},{"@pid":"a/NirwanAnsari","text":"Nirwan Ansari"},{"@pid":"48/8327","text":"Huiyong Li"}]},"title":"A Hybrid Fingerprint Quality Evaluation Model for WiFi Localization.","venue":"IEEE Internet Things J.","volume":"6","number":"6","pages":"9829-9840","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/LiGAL19","doi":"10.1109/JIOT.2019.2932464","ee":"https://doi.org/10.1109/JIOT.2019.2932464","url":"https://dblp.org/rec/journals/iotj/LiGAL19"}, "url":"URL#1999584" }, { "@score":"1", "@id":"1999585", "info":{"authors":{"author":[{"@pid":"41/4214-1","text":"You Li 0001"},{"@pid":"95/9649-2","text":"Zhe He 0002"},{"@pid":"186/8618","text":"Zhouzheng Gao"},{"@pid":"15/6840-1","text":"Yuan Zhuang 0001"},{"@pid":"49/11146","text":"Chuang Shi"},{"@pid":"88/5402","text":"Naser El-Sheimy"}]},"title":"Toward Robust Crowdsourcing-Based Localization: A Fingerprinting Accuracy Indicator Enhanced Wireless/Magnetic/Inertial Integration Approach.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"3585-3600","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/LiHGZSE19","doi":"10.1109/JIOT.2018.2889303","ee":"https://doi.org/10.1109/JIOT.2018.2889303","url":"https://dblp.org/rec/journals/iotj/LiHGZSE19"}, "url":"URL#1999585" }, { "@score":"1", "@id":"1999586", "info":{"authors":{"author":[{"@pid":"15/6932","text":"Guorui Li"},{"@pid":"21/6810","text":"Jingsha He"},{"@pid":"97/1246","text":"Sancheng Peng"},{"@pid":"57/1667-1","text":"Weijia Jia 0001"},{"@pid":"18/2771-9","text":"Cong Wang 0009"},{"@pid":"25/4653-2","text":"Jianwei Niu 0002"},{"@pid":"90/3575-1","text":"Shui Yu 0001"}]},"title":"Energy Efficient Data Collection in Large-Scale Internet of Things via Computation Offloading.","venue":"IEEE Internet Things J.","volume":"6","number":"3","pages":"4176-4187","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/LiHPJWNY19","doi":"10.1109/JIOT.2018.2875244","ee":"https://doi.org/10.1109/JIOT.2018.2875244","url":"https://dblp.org/rec/journals/iotj/LiHPJWNY19"}, "url":"URL#1999586" }, { "@score":"1", "@id":"1999587", "info":{"authors":{"author":[{"@pid":"92/2954-2","text":"Feng Li 0002"},{"@pid":"80/4735","text":"Jie Hao"},{"@pid":"92/1375-18","text":"Jin Wang 0018"},{"@pid":"42/2501-1","text":"Jun Luo 0001"},{"@pid":"h/YingHe1","text":"Ying He 0001"},{"@pid":"44/7265","text":"Dongxiao Yu"},{"@pid":"c/XiuzhenCheng","text":"Xiuzhen Cheng 0001"}]},"title":"VisioMap: Lightweight 3-D Scene Reconstruction Toward Natural Indoor Localization.","venue":"IEEE Internet Things J.","volume":"6","number":"5","pages":"8870-8882","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/LiHWLHYC19","doi":"10.1109/JIOT.2019.2924244","ee":"https://doi.org/10.1109/JIOT.2019.2924244","url":"https://dblp.org/rec/journals/iotj/LiHWLHYC19"}, "url":"URL#1999587" }, { "@score":"1", "@id":"1999588", "info":{"authors":{"author":[{"@pid":"19/9058","text":"Yantao Li"},{"@pid":"26/8498","text":"Hailong Hu"},{"@pid":"67/4904","text":"Gang Zhou"}]},"title":"Using Data Augmentation in Continuous Authentication on Smartphones.","venue":"IEEE Internet Things J.","volume":"6","number":"1","pages":"628-640","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/LiHZ19","doi":"10.1109/JIOT.2018.2851185","ee":"https://doi.org/10.1109/JIOT.2018.2851185","url":"https://dblp.org/rec/journals/iotj/LiHZ19"}, "url":"URL#1999588" }, { "@score":"1", "@id":"1999589", "info":{"authors":{"author":[{"@pid":"01/4503","text":"Jiliang Li"},{"@pid":"53/4376","text":"Yusheng Ji"},{"@pid":"c/KimKwangRaymondChoo","text":"Kim-Kwang Raymond Choo"},{"@pid":"h/DieterHogrefe","text":"Dieter Hogrefe"}]},"title":"CL-CPPA: Certificate-Less Conditional Privacy-Preserving Authentication Protocol for the Internet of Vehicles.","venue":"IEEE Internet Things J.","volume":"6","number":"6","pages":"10332-10343","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/LiJCH19","doi":"10.1109/JIOT.2019.2938008","ee":"https://doi.org/10.1109/JIOT.2019.2938008","url":"https://dblp.org/rec/journals/iotj/LiJCH19"}, "url":"URL#1999589" }, { "@score":"1", "@id":"1999590", "info":{"authors":{"author":[{"@pid":"45/10335","text":"Jinglin Li"},{"@pid":"187/6958","text":"Guiyang Luo"},{"@pid":"73/8540","text":"Nan Cheng"},{"@pid":"29/5782-4","text":"Quan Yuan 0004"},{"@pid":"154/0125","text":"Zhiheng Wu"},{"@pid":"28/435","text":"Shang Gao"},{"@pid":"62/2764","text":"Zhihan Liu"}]},"title":"An End-to-End Load Balancer Based on Deep Learning for Vehicular Network Traffic Control.","venue":"IEEE Internet Things J.","volume":"6","number":"1","pages":"953-966","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/LiLCYWGL19","doi":"10.1109/JIOT.2018.2866435","ee":"https://doi.org/10.1109/JIOT.2018.2866435","url":"https://dblp.org/rec/journals/iotj/LiLCYWGL19"}, "url":"URL#1999590" }, { "@score":"1", "@id":"1999591", "info":{"authors":{"author":[{"@pid":"20/8277","text":"Fenghua Li"},{"@pid":"131/9842","text":"Zifu Li"},{"@pid":"42/179","text":"Weili Han"},{"@pid":"24/41-1","text":"Ting Wu 0001"},{"@pid":"23/4357","text":"Lihua Chen"},{"@pid":"22/7487","text":"Yunchuan Guo"},{"@pid":"06/2379","text":"Jinjun Chen"}]},"title":"Cyberspace-Oriented Access Control: A Cyberspace Characteristics-Based Model and its Policies.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"1471-1483","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/LiLHWCGC19","doi":"10.1109/JIOT.2018.2839065","ee":"https://doi.org/10.1109/JIOT.2018.2839065","url":"https://dblp.org/rec/journals/iotj/LiLHWCGC19"}, "url":"URL#1999591" }, { "@score":"1", "@id":"1999592", "info":{"authors":{"author":[{"@pid":"181/4238","text":"Songfan Li"},{"@pid":"49/2793-1","text":"Li Lu 0001"},{"@pid":"162/0938","text":"Muhammad Jawad Hussain"},{"@pid":"02/2052","text":"Yalan Ye"},{"@pid":"29/5901","text":"Hongzi Zhu"}]},"title":"Sentinel: Breaking the Bottleneck of Energy Utilization Efficiency in RF-Powered Devices.","venue":"IEEE Internet Things J.","volume":"6","number":"1","pages":"705-717","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/LiLHYZ19","doi":"10.1109/JIOT.2018.2854374","ee":"https://doi.org/10.1109/JIOT.2018.2854374","url":"https://dblp.org/rec/journals/iotj/LiLHYZ19"}, "url":"URL#1999592" }, { "@score":"1", "@id":"1999593", "info":{"authors":{"author":[{"@pid":"l/JunLi4","text":"Jun Li 0004"},{"@pid":"60/6348","text":"Miao Liu"},{"@pid":"25/8858","text":"Jinhui Lu"},{"@pid":"29/1639-2","text":"Feng Shu 0002"},{"@pid":"92/8779","text":"Yijin Zhang"},{"@pid":"80/10261","text":"Siavash Bayat"},{"@pid":"132/7952","text":"Dushantha Nalin K. Jayakody"}]},"title":"On Social-Aware Content Caching for D2D-Enabled Cellular Networks With Matching Theory.","venue":"IEEE Internet Things J.","volume":"6","number":"1","pages":"297-310","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/LiLLSZBJ19","doi":"10.1109/JIOT.2017.2749320","ee":"https://doi.org/10.1109/JIOT.2017.2749320","url":"https://dblp.org/rec/journals/iotj/LiLLSZBJ19"}, "url":"URL#1999593" }, { "@score":"1", "@id":"1999594", "info":{"authors":{"author":[{"@pid":"14/3894","text":"Weixian Li"},{"@pid":"73/10085","text":"Thillainathan Logenthiran"},{"@pid":"190/2759","text":"Van-Tung Phan"},{"@pid":"87/143","text":"Wai Lok Woo"}]},"title":"A Novel Smart Energy Theft System (SETS) for IoT-Based Smart Home.","venue":"IEEE Internet Things J.","volume":"6","number":"3","pages":"5531-5539","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/LiLPW19","doi":"10.1109/JIOT.2019.2903281","ee":"https://doi.org/10.1109/JIOT.2019.2903281","url":"https://dblp.org/rec/journals/iotj/LiLPW19"}, "url":"URL#1999594" }, { "@score":"1", "@id":"1999595", "info":{"authors":{"author":[{"@pid":"73/6284","text":"Lixiang Li 0001"},{"@pid":"155/0104","text":"Lifei Liu"},{"@pid":"40/1762","text":"Haipeng Peng"},{"@pid":"33/5774","text":"Yixian Yang"},{"@pid":"240/7214","text":"Shizhuo Cheng"}]},"title":"Flexible and Secure Data Transmission System Based on Semitensor Compressive Sensing in Wireless Body Area Networks.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"3212-3227","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/LiLPYC19","doi":"10.1109/JIOT.2018.2881129","ee":"https://doi.org/10.1109/JIOT.2018.2881129","url":"https://dblp.org/rec/journals/iotj/LiLPYC19"}, "url":"URL#1999595" }, { "@score":"1", "@id":"1999596", "info":{"authors":{"author":[{"@pid":"l/ZhaoLi-5","text":"Zhao Li 0005"},{"@pid":"211/7719","text":"Yinghou Liu"},{"@pid":"s/KangGShin","text":"Kang G. Shin"},{"@pid":"49/1245-9","text":"Jia Liu 0009"},{"@pid":"43/180-2","text":"Zheng Yan 0002"}]},"title":"Interference Steering to Manage Interference in IoT.","venue":"IEEE Internet Things J.","volume":"6","number":"6","pages":"10458-10471","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/LiLSLY19","doi":"10.1109/JIOT.2019.2939255","ee":"https://doi.org/10.1109/JIOT.2019.2939255","url":"https://dblp.org/rec/journals/iotj/LiLSLY19"}, "url":"URL#1999596" }, { "@score":"1", "@id":"1999597", "info":{"authors":{"author":[{"@pid":"63/6031-2","text":"Xiong Li 0002"},{"@pid":"243/6431","text":"Shanpeng Liu"},{"@pid":"07/6378-3","text":"Fan Wu 0003"},{"@pid":"06/10193","text":"Saru Kumari"},{"@pid":"25/3419","text":"Joel J. P. C. Rodrigues"}]},"title":"Privacy Preserving Data Aggregation Scheme for Mobile Edge Computing Assisted IoT Applications.","venue":"IEEE Internet Things J.","volume":"6","number":"3","pages":"4755-4763","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/LiLWKR19","doi":"10.1109/JIOT.2018.2874473","ee":"https://doi.org/10.1109/JIOT.2018.2874473","url":"https://dblp.org/rec/journals/iotj/LiLWKR19"}, "url":"URL#1999597" }, { "@score":"1", "@id":"1999598", "info":{"authors":{"author":[{"@pid":"20/8277","text":"Fenghua Li"},{"@pid":"l/HuiLi6","text":"Hui Li 0006"},{"@pid":"18/2771-1","text":"Cong Wang 0001"},{"@pid":"20/6179-1","text":"Kui Ren 0001"},{"@pid":"b/ElisaBertino","text":"Elisa Bertino"}]},"title":"Guest Editorial Special Issue on Security and Privacy Protection for Big Data and IoT.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"1446-1449","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/LiLWRB19","doi":"10.1109/JIOT.2019.2908460","ee":"https://doi.org/10.1109/JIOT.2019.2908460","url":"https://dblp.org/rec/journals/iotj/LiLWRB19"}, "url":"URL#1999598" }, { "@score":"1", "@id":"1999599", "info":{"authors":{"author":[{"@pid":"144/6720","text":"Jirui Li"},{"@pid":"46/5404-3","text":"Xiaoyong Li 0003"},{"@pid":"10/1593-1","text":"Jie Yuan 0001"},{"@pid":"60/2536","text":"Rui Zhang"},{"@pid":"87/254","text":"Binxing Fang"}]},"title":"Fog Computing-Assisted Trustworthy Forwarding Scheme in Mobile Internet of Things.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"2778-2796","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/LiLYZF19","doi":"10.1109/JIOT.2018.2874808","ee":"https://doi.org/10.1109/JIOT.2018.2874808","url":"https://dblp.org/rec/journals/iotj/LiLYZF19"}, "url":"URL#1999599" }, { "@score":"1", "@id":"1999600", "info":{"authors":{"author":[{"@pid":"61/500-8","text":"Yue Li 0008"},{"@pid":"67/6954","text":"Ranjan K. Mallik"},{"@pid":"m/RossDMurch","text":"Ross D. Murch"}]},"title":"Channel Magnitude-Based MIMO With Energy Detection for Internet of Things Applications.","venue":"IEEE Internet Things J.","volume":"6","number":"6","pages":"9893-9907","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/LiMM19","doi":"10.1109/JIOT.2019.2933216","ee":"https://doi.org/10.1109/JIOT.2019.2933216","url":"https://dblp.org/rec/journals/iotj/LiMM19"}, "url":"URL#1999600" }, { "@score":"1", "@id":"1999601", "info":{"authors":{"author":[{"@pid":"66/190-23","text":"Chao Li 0023"},{"@pid":"59/1592","text":"Balaji Palanisamy"}]},"title":"Privacy in Internet of Things: From Principles to Technologies.","venue":"IEEE Internet Things J.","volume":"6","number":"1","pages":"488-505","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/LiP19","doi":"10.1109/JIOT.2018.2864168","ee":"https://doi.org/10.1109/JIOT.2018.2864168","url":"https://dblp.org/rec/journals/iotj/LiP19"}, "url":"URL#1999601" }, { "@score":"1", "@id":"1999602", "info":{"authors":{"author":[{"@pid":"57/2281-12","text":"Shuai Li 0012"},{"@pid":"94/4377","text":"Ashish Pandharipande"},{"@pid":"208/4579","text":"Beatrice Masini"},{"@pid":"123/2665","text":"David Caicedo"}]},"title":"Automated Detection of Commissioning Changes in Connected Lighting Systems.","venue":"IEEE Internet Things J.","volume":"6","number":"1","pages":"898-905","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/LiPMC19","doi":"10.1109/JIOT.2018.2865315","ee":"https://doi.org/10.1109/JIOT.2018.2865315","url":"https://dblp.org/rec/journals/iotj/LiPMC19"}, "url":"URL#1999602" }, { "@score":"1", "@id":"1999603", "info":{"authors":{"author":[{"@pid":"52/1767","text":"Fangyu Li"},{"@pid":"240/6808","text":"Aditya Shinde"},{"@pid":"15/5233-4","text":"Yang Shi 0004"},{"@pid":"33/2058","text":"Jin Ye"},{"@pid":"l/XiangYangLi","text":"Xiang-Yang Li 0001"},{"@pid":"63/4299","text":"Wen-Zhan Song 0001"}]},"title":"System Statistics Learning-Based IoT Security: Feasibility and Suitability.","venue":"IEEE Internet Things J.","volume":"6","number":"4","pages":"6396-6403","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/LiSSYLS19","doi":"10.1109/JIOT.2019.2897063","ee":"https://doi.org/10.1109/JIOT.2019.2897063","url":"https://dblp.org/rec/journals/iotj/LiSSYLS19"}, "url":"URL#1999603" }, { "@score":"1", "@id":"1999604", "info":{"authors":{"author":[{"@pid":"52/1767","text":"Fangyu Li"},{"@pid":"15/5233-4","text":"Yang Shi 0004"},{"@pid":"240/6808","text":"Aditya Shinde"},{"@pid":"33/2058","text":"Jin Ye"},{"@pid":"63/4299","text":"Wen-Zhan Song 0001"}]},"title":"Enhanced Cyber-Physical Security in Internet of Things Through Energy Auditing.","venue":"IEEE Internet Things J.","volume":"6","number":"3","pages":"5224-5231","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/LiSSYS19","doi":"10.1109/JIOT.2019.2899492","ee":"https://doi.org/10.1109/JIOT.2019.2899492","url":"https://dblp.org/rec/journals/iotj/LiSSYS19"}, "url":"URL#1999604" }, { "@score":"1", "@id":"1999605", "info":{"authors":{"author":[{"@pid":"166/1812","text":"Ruinian Li"},{"@pid":"04/1324","text":"Carl Sturtivant"},{"@pid":"34/25","text":"Jiguo Yu"},{"@pid":"c/XiuzhenCheng","text":"Xiuzhen Cheng 0001"}]},"title":"A Novel Secure and Efficient Data Aggregation Scheme for IoT.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"1551-1560","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/LiSYC19","doi":"10.1109/JIOT.2018.2848962","ee":"https://doi.org/10.1109/JIOT.2018.2848962","url":"https://dblp.org/rec/journals/iotj/LiSYC19"}, "url":"URL#1999605" }, { "@score":"1", "@id":"1999606", "info":{"authors":{"author":[{"@pid":"59/3654","text":"Xuefeng Li"},{"@pid":"19/642","text":"Liansheng Tan"},{"@pid":"204/3365","text":"Feifei Li"}]},"title":"Optimal Cloud Resource Allocation With Cost Performance Tradeoff Based on Internet of Things.","venue":"IEEE Internet Things J.","volume":"6","number":"4","pages":"6876-6886","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/LiTL19","doi":"10.1109/JIOT.2019.2911978","ee":"https://doi.org/10.1109/JIOT.2019.2911978","url":"https://dblp.org/rec/journals/iotj/LiTL19"}, "url":"URL#1999606" }, { "@score":"1", "@id":"1999607", "info":{"authors":{"author":[{"@pid":"236/9222","text":"Chunhai Li"},{"@pid":"190/4980","text":"Siming Wang"},{"@pid":"166/6851","text":"Xumin Huang"},{"@pid":"90/3684","text":"Xiaohuan Li"},{"@pid":"91/1334","text":"Rong Yu"},{"@pid":"181/2734-2","text":"Feng Zhao 0002"}]},"title":"Parked Vehicular Computing for Energy-Efficient Internet of Vehicles: A Contract Theoretic Approach.","venue":"IEEE Internet Things J.","volume":"6","number":"4","pages":"6079-6088","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/LiWHLYZ19","doi":"10.1109/JIOT.2018.2869892","ee":"https://doi.org/10.1109/JIOT.2018.2869892","url":"https://dblp.org/rec/journals/iotj/LiWHLYZ19"}, "url":"URL#1999607" }, { "@score":"1", "@id":"1999608", "info":{"authors":{"author":[{"@pid":"32/1121","text":"Deng Li"},{"@pid":"251/1541","text":"Sihui Wang"},{"@pid":"51/2773-1","text":"Jiaqi Liu 0001"},{"@pid":"93/4010-8","text":"Hui Liu 0008"},{"@pid":"41/3095","text":"Sheng Wen"}]},"title":"Crowdsensing From the Perspective of Behavioral Economics: An Incentive Mechanism Based on Mental Accounting.","venue":"IEEE Internet Things J.","volume":"6","number":"5","pages":"9123-9139","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/LiWLLW19","doi":"10.1109/JIOT.2019.2928035","ee":"https://doi.org/10.1109/JIOT.2019.2928035","url":"https://dblp.org/rec/journals/iotj/LiWLLW19"}, "url":"URL#1999608" }, { "@score":"1", "@id":"1999609", "info":{"authors":{"author":[{"@pid":"116/1011-65","text":"Jun Li 0065"},{"@pid":"15/7829","text":"Xiumin Wang"},{"@pid":"75/1747","text":"Zhengquan Li"},{"@pid":"181/2812","text":"Hao Wang"},{"@pid":"13/7007","text":"Lei Li"}]},"title":"Energy Efficiency Optimization Based on eICIC for Wireless Heterogeneous Networks.","venue":"IEEE Internet Things J.","volume":"6","number":"6","pages":"10166-10176","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/LiWLWL19","doi":"10.1109/JIOT.2019.2936499","ee":"https://doi.org/10.1109/JIOT.2019.2936499","url":"https://dblp.org/rec/journals/iotj/LiWLWL19"}, "url":"URL#1999609" }, { "@score":"1", "@id":"1999610", "info":{"authors":{"author":[{"@pid":"72/872-20","text":"Qiang Li 0020"},{"@pid":"82/9805","text":"Miaowen Wen"},{"@pid":"191/5931","text":"Yuekai Zhang"},{"@pid":"116/1011-36","text":"Jun Li 0036"},{"@pid":"99/2217","text":"Fangjiong Chen"},{"@pid":"73/3157","text":"Fei Ji"}]},"title":"Information-Guided Pilot Insertion for OFDM-Based Vehicular Communications Systems.","venue":"IEEE Internet Things J.","volume":"6","number":"1","pages":"26-37","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/LiWZLCJ19","doi":"10.1109/JIOT.2018.2872438","ee":"https://doi.org/10.1109/JIOT.2018.2872438","url":"https://dblp.org/rec/journals/iotj/LiWZLCJ19"}, "url":"URL#1999610" }, { "@score":"1", "@id":"1999611", "info":{"authors":{"author":[{"@pid":"48/1097-26","text":"Jin Li 0026"},{"@pid":"00/6716-2","text":"Yu Xiang 0002"},{"@pid":"52/5134","text":"Jiancheng Fang"},{"@pid":"62/4407","text":"Wenyong Wang"},{"@pid":"96/5811","text":"Yiming Pi"}]},"title":"Research on Multiple Sensors Vehicle Detection With EMD-Based Denoising.","venue":"IEEE Internet Things J.","volume":"6","number":"4","pages":"6262-6270","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/LiXFWP19","doi":"10.1109/JIOT.2018.2890541","ee":"https://doi.org/10.1109/JIOT.2018.2890541","url":"https://dblp.org/rec/journals/iotj/LiXFWP19"}, "url":"URL#1999611" }, { "@score":"1", "@id":"1999612", "info":{"authors":{"author":[{"@pid":"84/3795-11","text":"Nan Li 0011"},{"@pid":"79/5620-1","text":"Ming Xiao 0001"},{"@pid":"12/5461","text":"Lars Kildehoj Rasmussen"}]},"title":"Spectrum Sharing With Network Coding for Multiple Cognitive Users.","venue":"IEEE Internet Things J.","volume":"6","number":"1","pages":"230-238","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/LiXR19","doi":"10.1109/JIOT.2017.2728626","ee":"https://doi.org/10.1109/JIOT.2017.2728626","url":"https://dblp.org/rec/journals/iotj/LiXR19"}, "url":"URL#1999612" }, { "@score":"1", "@id":"1999613", "info":{"authors":{"author":[{"@pid":"213/0675","text":"Donghe Li"},{"@pid":"01/2404","text":"Qingyu Yang"},{"@pid":"142/1098","text":"Dou An"},{"@pid":"82/2790-2","text":"Wei Yu 0002"},{"@pid":"89/473","text":"Xinyu Yang"},{"@pid":"49/2189","text":"Xinwen Fu"}]},"title":"On Location Privacy-Preserving Online Double Auction for Electric Vehicles in Microgrids.","venue":"IEEE Internet Things J.","volume":"6","number":"4","pages":"5902-5915","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/LiYAYYF19","doi":"10.1109/JIOT.2018.2872444","ee":"https://doi.org/10.1109/JIOT.2018.2872444","url":"https://dblp.org/rec/journals/iotj/LiYAYYF19"}, "url":"URL#1999613" }, { "@score":"1", "@id":"1999614", "info":{"authors":{"author":[{"@pid":"32/1121","text":"Deng Li"},{"@pid":"251/1477","text":"Luan Yang"},{"@pid":"51/2773-1","text":"Jiaqi Liu 0001"},{"@pid":"93/4010-8","text":"Hui Liu 0008"}]},"title":"Considering Decoy Effect and Fairness Preference: An Incentive Mechanism for Crowdsensing.","venue":"IEEE Internet Things J.","volume":"6","number":"5","pages":"8835-8852","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/LiYLL19","doi":"10.1109/JIOT.2019.2923805","ee":"https://doi.org/10.1109/JIOT.2019.2923805","url":"https://dblp.org/rec/journals/iotj/LiYLL19"}, "url":"URL#1999614" }, { "@score":"1", "@id":"1999615", "info":{"authors":{"author":[{"@pid":"57/3372","text":"Longjiang Li"},{"@pid":"22/456","text":"Jianjun Yang"},{"@pid":"02/463","text":"Yuming Mao"}]},"title":"Shared Context-Based Compression Paradigm for Ubiquitous Local Transmissions.","venue":"IEEE Internet Things J.","volume":"6","number":"4","pages":"6706-6714","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/LiYM19","doi":"10.1109/JIOT.2019.2910600","ee":"https://doi.org/10.1109/JIOT.2019.2910600","url":"https://dblp.org/rec/journals/iotj/LiYM19"}, "url":"URL#1999615" }, { "@score":"1", "@id":"1999616", "info":{"authors":{"author":[{"@pid":"84/8012","text":"Shenglin Li"},{"@pid":"41/3461","text":"Junjie Yang"},{"@pid":"63/4299","text":"Wen-Zhan Song 0001"},{"@pid":"48/4487","text":"An Chen"}]},"title":"A Real-Time Electricity Scheduling for Residential Home Energy Management.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"2602-2611","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/LiYSC19","doi":"10.1109/JIOT.2018.2872463","ee":"https://doi.org/10.1109/JIOT.2018.2872463","url":"https://dblp.org/rec/journals/iotj/LiYSC19"}, "url":"URL#1999616" }, { "@score":"1", "@id":"1999617", "info":{"authors":{"author":[{"@pid":"129/0971","text":"Xiaowei Li"},{"@pid":"59/8489","text":"Haipeng Yao"},{"@pid":"62/2631-1","text":"Jingjing Wang 0001"},{"@pid":"46/2252-1","text":"Sheng Wu 0001"},{"@pid":"00/8334","text":"Chunxiao Jiang"},{"@pid":"84/4625-1","text":"Yi Qian 0001"}]},"title":"Rechargeable Multi-UAV Aided Seamless Coverage for QoS-Guaranteed IoT Networks.","venue":"IEEE Internet Things J.","volume":"6","number":"6","pages":"10902-10914","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/LiYWWJQ19","doi":"10.1109/JIOT.2019.2943147","ee":"https://doi.org/10.1109/JIOT.2019.2943147","url":"https://dblp.org/rec/journals/iotj/LiYWWJQ19"}, "url":"URL#1999617" }, { "@score":"1", "@id":"1999618", "info":{"authors":{"author":[{"@pid":"116/8552","text":"Zhenni Li"},{"@pid":"49/4517","text":"Zuyuan Yang"},{"@pid":"32/6230","text":"Shengli Xie"},{"@pid":"02/8379","text":"Wuhui Chen"},{"@pid":"228/1231","text":"Kang Liu"}]},"title":"Credit-Based Payments for Fast Computing Resource Trading in Edge-Assisted Internet of Things.","venue":"IEEE Internet Things J.","volume":"6","number":"4","pages":"6606-6617","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/LiYXCL19","doi":"10.1109/JIOT.2019.2908861","ee":"https://doi.org/10.1109/JIOT.2019.2908861","url":"https://dblp.org/rec/journals/iotj/LiYXCL19"}, "url":"URL#1999618" }, { "@score":"1", "@id":"1999619", "info":{"authors":{"author":[{"@pid":"133/7864","text":"Jiaxun Li"},{"@pid":"00/3855-1","text":"Haitao Zhao 0001"},{"@pid":"73/2285","text":"Abdelhakim Senhaji Hafid"},{"@pid":"48/2647","text":"Jibo Wei"},{"@pid":"21/760","text":"Hao Yin"},{"@pid":"164/5192","text":"Baoquan Ren"}]},"title":"A Bio-Inspired Solution to Cluster-Based Distributed Spectrum Allocation in High-Density Cognitive Internet of Things.","venue":"IEEE Internet Things J.","volume":"6","number":"6","pages":"9294-9307","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/LiZHWYR19","doi":"10.1109/JIOT.2019.2911542","ee":"https://doi.org/10.1109/JIOT.2019.2911542","url":"https://dblp.org/rec/journals/iotj/LiZHWYR19"}, "url":"URL#1999619" }, { "@score":"1", "@id":"1999620", "info":{"authors":{"author":[{"@pid":"11/3140-2","text":"Zan Li 0002"},{"@pid":"67/2674-4","text":"Xiaohui Zhao 0004"},{"@pid":"128/2481","text":"Fengye Hu"},{"@pid":"123/3334","text":"Zhongliang Zhao"},{"@pid":"251/1492","text":"José Luis Carrera Villacrés"},{"@pid":"b/TorstenBraun","text":"Torsten Braun"}]},"title":"SoiCP: A Seamless Outdoor-Indoor Crowdsensing Positioning System.","venue":"IEEE Internet Things J.","volume":"6","number":"5","pages":"8626-8644","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/LiZHZVB19","doi":"10.1109/JIOT.2019.2921561","ee":"https://doi.org/10.1109/JIOT.2019.2921561","url":"https://dblp.org/rec/journals/iotj/LiZHZVB19"}, "url":"URL#1999620" }, { "@score":"1", "@id":"1999621", "info":{"authors":{"author":[{"@pid":"70/1726-6","text":"Meng Li 0006"},{"@pid":"26/2546","text":"Liehuang Zhu"},{"@pid":"59/554","text":"Xiaodong Lin 0001"}]},"title":"Efficient and Privacy-Preserving Carpooling Using Blockchain-Assisted Vehicular Fog Computing.","venue":"IEEE Internet Things J.","volume":"6","number":"3","pages":"4573-4584","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/LiZL19","doi":"10.1109/JIOT.2018.2868076","ee":"https://doi.org/10.1109/JIOT.2018.2868076","url":"https://dblp.org/rec/journals/iotj/LiZL19"}, "url":"URL#1999621" }, { "@score":"1", "@id":"1999622", "info":{"authors":{"author":[{"@pid":"118/4502-3","text":"Jiaqi Li 0003"},{"@pid":"66/175","text":"Zhifeng Zhao"},{"@pid":"122/3088","text":"Rongpeng Li"},{"@pid":"82/1228-1","text":"Honggang Zhang 0001"}]},"title":"AI-Based Two-Stage Intrusion Detection for Software Defined IoT Networks.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"2093-2102","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/LiZLZ19","doi":"10.1109/JIOT.2018.2883344","ee":"https://doi.org/10.1109/JIOT.2018.2883344","url":"https://dblp.org/rec/journals/iotj/LiZLZ19"}, "url":"URL#1999622" }, { "@score":"1", "@id":"1999623", "info":{"authors":{"author":[{"@pid":"02/1430","text":"Shancang Li"},{"@pid":"02/7781-2","text":"Shanshan Zhao 0002"},{"@pid":"88/5343-1","text":"Po Yang 0001"},{"@pid":"124/8353","text":"Panagiotis Andriotis"},{"@pid":"70/2433","text":"Lida Xu"},{"@pid":"33/625","text":"Qindong Sun"}]},"title":"Distributed Consensus Algorithm for Events Detection in Cyber-Physical Systems.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"2299-2308","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/LiZYAXS19","doi":"10.1109/JIOT.2019.2906157","ee":"https://doi.org/10.1109/JIOT.2019.2906157","url":"https://dblp.org/rec/journals/iotj/LiZYAXS19"}, "url":"URL#1999623" }, { "@score":"1", "@id":"1999624", "info":{"authors":{"author":{"@pid":"180/0235","text":"Stephen D. Liang"}},"title":"Smart and Fast Data Processing for Deep Learning in Internet of Things: Less is More.","venue":"IEEE Internet Things J.","volume":"6","number":"4","pages":"5981-5989","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/Liang19","doi":"10.1109/JIOT.2018.2864579","ee":"https://doi.org/10.1109/JIOT.2018.2864579","url":"https://dblp.org/rec/journals/iotj/Liang19"}, "url":"URL#1999624" }, { "@score":"1", "@id":"1999625", "info":{"authors":{"author":[{"@pid":"52/5208","text":"Qilian Liang"},{"@pid":"64/782","text":"Tariq S. Durrani"},{"@pid":"38/113","text":"Xuemai Gu"},{"@pid":"58/2493","text":"Jinhwan Koh"},{"@pid":"59/6828-1","text":"Yonghui Li 0001"},{"@pid":"10/5630-71","text":"Xin Wang 0071"}]},"title":"Guest Editorial Special Issue on Spectrum and Energy Efficient Communications for Internet of Things.","venue":"IEEE Internet Things J.","volume":"6","number":"4","pages":"5948-5953","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/LiangDGKLW19","doi":"10.1109/JIOT.2019.2926609","ee":"https://doi.org/10.1109/JIOT.2019.2926609","url":"https://dblp.org/rec/journals/iotj/LiangDGKLW19"}, "url":"URL#1999625" }, { "@score":"1", "@id":"1999626", "info":{"authors":{"author":[{"@pid":"08/2359","text":"Yan Liang"},{"@pid":"00/9492","text":"Wenzheng Xu"},{"@pid":"31/1277","text":"Weifa Liang"},{"@pid":"29/4181-2","text":"Jian Peng 0002"},{"@pid":"j/XiaohuaJia","text":"Xiaohua Jia"},{"@pid":"41/1572","text":"Yingjie Zhou"},{"@pid":"04/545","text":"Lei Duan"}]},"title":"Nonredundant Information Collection in Rescue Applications via an Energy-Constrained UAV.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"2945-2958","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/LiangXLPJZD19","doi":"10.1109/JIOT.2018.2877409","ee":"https://doi.org/10.1109/JIOT.2018.2877409","url":"https://dblp.org/rec/journals/iotj/LiangXLPJZD19"}, "url":"URL#1999626" }, { "@score":"1", "@id":"1999627", "info":{"authors":{"author":[{"@pid":"122/5651","text":"Le Liang"},{"@pid":"58/5775","text":"Hao Ye"},{"@pid":"89/5914","text":"Geoffrey Ye Li"}]},"title":"Toward Intelligent Vehicular Networks: A Machine Learning Framework.","venue":"IEEE Internet Things J.","volume":"6","number":"1","pages":"124-135","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/LiangYL19","doi":"10.1109/JIOT.2018.2872122","ee":"https://doi.org/10.1109/JIOT.2018.2872122","url":"https://dblp.org/rec/journals/iotj/LiangYL19"}, "url":"URL#1999627" }, { "@score":"1", "@id":"1999628", "info":{"authors":{"author":[{"@pid":"95/3243-2","text":"Jing Liang 0002"},{"@pid":"47/6399","text":"Xiaofeng Yu"},{"@pid":"48/8327","text":"Huiyong Li"}]},"title":"Collaborative Energy-Efficient Moving in Internet of Things: Genetic Fuzzy Tree Versus Neural Networks.","venue":"IEEE Internet Things J.","volume":"6","number":"4","pages":"6070-6078","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/LiangYL19a","doi":"10.1109/JIOT.2018.2869910","ee":"https://doi.org/10.1109/JIOT.2018.2869910","url":"https://dblp.org/rec/journals/iotj/LiangYL19a"}, "url":"URL#1999628" }, { "@score":"1", "@id":"1999629", "info":{"authors":{"author":[{"@pid":"146/8032","text":"Chen-Hung Liao"},{"@pid":"86/10294","text":"Hong-Han Shuai"},{"@pid":"w/LiChunWang","text":"Li-Chun Wang 0001"}]},"title":"RNN-Assisted Network Coding for Secure Heterogeneous Internet of Things With Unreliable Storage.","venue":"IEEE Internet Things J.","volume":"6","number":"5","pages":"7608-7622","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/LiaoSW19","doi":"10.1109/JIOT.2019.2902376","ee":"https://doi.org/10.1109/JIOT.2019.2902376","url":"https://dblp.org/rec/journals/iotj/LiaoSW19"}, "url":"URL#1999629" }, { "@score":"1", "@id":"1999630", "info":{"authors":{"author":[{"@pid":"84/3178","text":"Shao-Yu Lien"},{"@pid":"137/6242","text":"Shao-Chou Hung"},{"@pid":"30/4028","text":"Der-Jiunn Deng"},{"@pid":"177/5440","text":"Chia-Lin Lai"},{"@pid":"124/1923","text":"Hua-Lung Tsai"}]},"title":"Low Latency Radio Access in 3GPP Local Area Data Networks for V2X: Stochastic Optimization and Learning.","venue":"IEEE Internet Things J.","volume":"6","number":"3","pages":"4867-4879","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/LienHDLT19","doi":"10.1109/JIOT.2018.2874883","ee":"https://doi.org/10.1109/JIOT.2018.2874883","url":"https://dblp.org/rec/journals/iotj/LienHDLT19"}, "url":"URL#1999630" }, { "@score":"1", "@id":"1999631", "info":{"authors":{"author":[{"@pid":"l/XiaohuiLin","text":"Xiaohui Lin 0001"},{"@pid":"163/7910","text":"Gongchao Su"},{"@pid":"22/5523-16","text":"Bin Chen 0016"},{"@pid":"39/721-22","text":"Hui Wang 0022"},{"@pid":"73/8822","text":"Mingjun Dai"}]},"title":"Striking a Balance Between System Throughput and Energy Efficiency for UAV-IoT Systems.","venue":"IEEE Internet Things J.","volume":"6","number":"6","pages":"10519-10533","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/LinSCWD19","doi":"10.1109/JIOT.2019.2939823","ee":"https://doi.org/10.1109/JIOT.2019.2939823","url":"https://dblp.org/rec/journals/iotj/LinSCWD19"}, "url":"URL#1999631" }, { "@score":"1", "@id":"1999632", "info":{"authors":{"author":[{"@pid":"l/YiBingLin","text":"Yi-Bing Lin"},{"@pid":"232/1010","text":"Hung-Chun Tseng"},{"@pid":"63/3041","text":"Yun-Wei Lin"},{"@pid":"34/6553","text":"Ling-Jyh Chen"}]},"title":"NB-IoTtalk: A Service Platform for Fast Development of NB-IoT Applications.","venue":"IEEE Internet Things J.","volume":"6","number":"1","pages":"928-939","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/LinTLC19","doi":"10.1109/JIOT.2018.2865583","ee":"https://doi.org/10.1109/JIOT.2018.2865583","url":"https://dblp.org/rec/journals/iotj/LinTLC19"}, "url":"URL#1999632" }, { "@score":"1", "@id":"1999633", "info":{"authors":{"author":[{"@pid":"148/1927","text":"Qiongzheng Lin"},{"@pid":"50/2484-25","text":"Lei Yang 0025"},{"@pid":"24/3508","text":"Yi Guo"}]},"title":"Proactive Batch Authentication: Fishing Counterfeit RFID Tags in Muddy Waters.","venue":"IEEE Internet Things J.","volume":"6","number":"1","pages":"568-579","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/LinYG19","doi":"10.1109/JIOT.2018.2843529","ee":"https://doi.org/10.1109/JIOT.2018.2843529","url":"https://dblp.org/rec/journals/iotj/LinYG19"}, "url":"URL#1999633" }, { "@score":"1", "@id":"1999634", "info":{"authors":{"author":[{"@pid":"33/4528-22","text":"Li Liu 0022"},{"@pid":"68/4423","text":"Sammy Chan"},{"@pid":"32/4821","text":"Guangjie Han"},{"@pid":"15/1123","text":"Mohsen Guizani"},{"@pid":"10/5292","text":"Masaki Bandai"}]},"title":"Performance Modeling of Representative Load Sharing Schemes for Clustered Servers in Multiaccess Edge Computing.","venue":"IEEE Internet Things J.","volume":"6","number":"3","pages":"4880-4888","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/LiuCHGB19","doi":"10.1109/JIOT.2018.2879513","ee":"https://doi.org/10.1109/JIOT.2018.2879513","url":"https://dblp.org/rec/journals/iotj/LiuCHGB19"}, "url":"URL#1999634" }, { "@score":"1", "@id":"1999635", "info":{"authors":{"author":[{"@pid":"29/4366","text":"Jingwei Liu"},{"@pid":"64/10877","text":"Huijuan Cao"},{"@pid":"253/9287","text":"Qingqing Li"},{"@pid":"213/0930","text":"Fanghui Cai"},{"@pid":"22/5535","text":"Xiaojiang Du"},{"@pid":"15/1123","text":"Mohsen Guizani"}]},"title":"A Large-Scale Concurrent Data Anonymous Batch Verification Scheme for Mobile Healthcare Crowd Sensing.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"1321-1330","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/LiuCLCDG19","doi":"10.1109/JIOT.2018.2828463","ee":"https://doi.org/10.1109/JIOT.2018.2828463","url":"https://dblp.org/rec/journals/iotj/LiuCLCDG19"}, "url":"URL#1999635" }, { "@score":"1", "@id":"1999636", "info":{"authors":{"author":[{"@pid":"228/1231","text":"Kang Liu"},{"@pid":"02/8379","text":"Wuhui Chen"},{"@pid":"z/ZibinZheng","text":"Zibin Zheng"},{"@pid":"116/8552","text":"Zhenni Li"},{"@pid":"22/849-5","text":"Wei Liang 0005"}]},"title":"A Novel Debt-Credit Mechanism for Blockchain-Based Data-Trading in Internet of Vehicles.","venue":"IEEE Internet Things J.","volume":"6","number":"5","pages":"9098-9111","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/LiuCZLL19","doi":"10.1109/JIOT.2019.2927682","ee":"https://doi.org/10.1109/JIOT.2019.2927682","url":"https://dblp.org/rec/journals/iotj/LiuCZLL19"}, "url":"URL#1999636" }, { "@score":"1", "@id":"1999637", "info":{"authors":{"author":[{"@pid":"30/3008-5","text":"Jingjing Liu 0005"},{"@pid":"57/5452","text":"Grahame E. Faulkner"},{"@pid":"08/1423","text":"Bhaskar Choubey"},{"@pid":"60/1800","text":"Steve Collins"},{"@pid":"137/9944","text":"Dominic C. O'Brien"}]},"title":"An Optical Transceiver Powered by On-Chip Solar Cells for IoT Smart Dusts With Optical Wireless Communications.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"3248-3256","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/LiuFCCO19","doi":"10.1109/JIOT.2018.2881424","ee":"https://doi.org/10.1109/JIOT.2018.2881424","url":"https://dblp.org/rec/journals/iotj/LiuFCCO19"}, "url":"URL#1999637" }, { "@score":"1", "@id":"1999638", "info":{"authors":{"author":[{"@pid":"97/6143","text":"Xiaolan Liu"},{"@pid":"33/3099-1","text":"Yue Gao 0001"},{"@pid":"128/2481","text":"Fengye Hu"}]},"title":"Optimal Time Scheduling Scheme for Wireless Powered Ambient Backscatter Communications in IoT Networks.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"2264-2272","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/LiuGH19","doi":"10.1109/JIOT.2018.2889700","ee":"https://doi.org/10.1109/JIOT.2018.2889700","url":"https://dblp.org/rec/journals/iotj/LiuGH19"}, "url":"URL#1999638" }, { "@score":"1", "@id":"1999639", "info":{"authors":{"author":[{"@pid":"51/2773-1","text":"Jiaqi Liu 0001"},{"@pid":"243/6481","text":"Wen Gao 0012"},{"@pid":"32/1121","text":"Deng Li"},{"@pid":"243/6422","text":"Shiyue Huang"},{"@pid":"93/4010-8","text":"Hui Liu 0008"}]},"title":"An Incentive Mechanism Combined With Anchoring Effect and Loss Aversion to Stimulate Data Offloading in IoT.","venue":"IEEE Internet Things J.","volume":"6","number":"3","pages":"4491-4511","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/LiuGLHL19","doi":"10.1109/JIOT.2018.2883452","ee":"https://doi.org/10.1109/JIOT.2018.2883452","url":"https://dblp.org/rec/journals/iotj/LiuGLHL19"}, "url":"URL#1999639" }, { "@score":"1", "@id":"1999640", "info":{"authors":{"author":[{"@pid":"150/4295-45","text":"Yan Liu 0045"},{"@pid":"86/2663-1","text":"Bin Guo 0001"},{"@pid":"84/5925","text":"Nuo Li"},{"@pid":"05/3499-49","text":"Jing Zhang 0049"},{"@pid":"150/0989","text":"Jingmin Chen"},{"@pid":"83/1359-1","text":"Daqing Zhang 0001"},{"@pid":"54/8526","text":"Yinxiao Liu"},{"@pid":"z/YuZhiwen","text":"Zhiwen Yu 0001"},{"@pid":"195/6380","text":"Sizhe Zhang"},{"@pid":"56/6651-1","text":"Lina Yao 0001"}]},"title":"DeepStore: An Interaction-Aware Wide&Deep Model for Store Site Recommendation With Attentional Spatial Embeddings.","venue":"IEEE Internet Things J.","volume":"6","number":"4","pages":"7319-7333","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/LiuGLZCZLYZY19","doi":"10.1109/JIOT.2019.2916143","ee":"https://doi.org/10.1109/JIOT.2019.2916143","url":"https://dblp.org/rec/journals/iotj/LiuGLZCZLYZY19"}, "url":"URL#1999640" }, { "@score":"1", "@id":"1999641", "info":{"authors":{"author":[{"@pid":"243/6452","text":"Dongzhuo Liu"},{"@pid":"23/4556","text":"Songtao Guo"},{"@pid":"10/2031-1","text":"Yuanyuan Yang 0001"},{"@pid":"184/8689","text":"Yawei Shi"},{"@pid":"243/6487","text":"Menggang Chen"}]},"title":"Geomagnetism-Based Indoor Navigation by Offloading Strategy in NB-IoT.","venue":"IEEE Internet Things J.","volume":"6","number":"3","pages":"4074-4084","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/LiuGYSC19","doi":"10.1109/JIOT.2018.2875018","ee":"https://doi.org/10.1109/JIOT.2018.2875018","url":"https://dblp.org/rec/journals/iotj/LiuGYSC19"}, "url":"URL#1999641" }, { "@score":"1", "@id":"1999642", "info":{"authors":{"author":[{"@pid":"41/1105","text":"He Liu"},{"@pid":"128/2481","text":"Fengye Hu"},{"@pid":"246/5419","text":"Shengguan Qu"},{"@pid":"11/3140-2","text":"Zan Li 0002"},{"@pid":"47/4826-9","text":"Dong Li 0009"}]},"title":"Multipoint Wireless Information and Power Transfer to Maximize Sum-Throughput in WBAN With Energy Harvesting.","venue":"IEEE Internet Things J.","volume":"6","number":"4","pages":"7069-7078","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/LiuHQLL19","doi":"10.1109/JIOT.2019.2914147","ee":"https://doi.org/10.1109/JIOT.2019.2914147","url":"https://dblp.org/rec/journals/iotj/LiuHQLL19"}, "url":"URL#1999642" }, { "@score":"1", "@id":"1999643", "info":{"authors":{"author":[{"@pid":"76/1820-9","text":"Xin Liu 0009"},{"@pid":"90/4627","text":"Min Jia"},{"@pid":"24/744","text":"Xueyan Zhang"},{"@pid":"132/8062","text":"Weidang Lu"}]},"title":"A Novel Multichannel Internet of Things Based on Dynamic Spectrum Sharing in 5G Communication.","venue":"IEEE Internet Things J.","volume":"6","number":"4","pages":"5962-5970","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/LiuJZL19","doi":"10.1109/JIOT.2018.2847731","ee":"https://doi.org/10.1109/JIOT.2018.2847731","url":"https://dblp.org/rec/journals/iotj/LiuJZL19"}, "url":"URL#1999643" }, { "@score":"1", "@id":"1999644", "info":{"authors":{"author":[{"@pid":"97/4626","text":"Yi Liu"},{"@pid":"187/7349","text":"Xiaoyan Kuai"},{"@pid":"70/4725-2","text":"Xiaojun Yuan 0002"},{"@pid":"98/153","text":"Ying-Chang Liang"},{"@pid":"81/4761-3","text":"Liang Zhou 0003"}]},"title":"Learning-Based Iterative Interference Cancellation for Cognitive Internet of Things.","venue":"IEEE Internet Things J.","volume":"6","number":"4","pages":"7213-7224","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/LiuKYLZ19","doi":"10.1109/JIOT.2019.2915598","ee":"https://doi.org/10.1109/JIOT.2019.2915598","url":"https://dblp.org/rec/journals/iotj/LiuKYLZ19"}, "url":"URL#1999644" }, { "@score":"1", "@id":"1999645", "info":{"authors":{"author":[{"@pid":"58/6609-1","text":"Shuang Liu 0001"},{"@pid":"06/1233","text":"Mei Li"}]},"title":"Multimodal GAN for Energy Efficiency and Cloud Classification in Internet of Things.","venue":"IEEE Internet Things J.","volume":"6","number":"4","pages":"6034-6041","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/LiuL19","doi":"10.1109/JIOT.2018.2866328","ee":"https://doi.org/10.1109/JIOT.2018.2866328","url":"https://dblp.org/rec/journals/iotj/LiuL19"}, "url":"URL#1999645" }, { "@score":"1", "@id":"1999646", "info":{"authors":{"author":[{"@pid":"124/2048","text":"Zhidan Liu 0001"},{"@pid":"35/203","text":"Zhenjiang Li"},{"@pid":"34/4445","text":"Kaishun Wu"}]},"title":"UniTask: A Unified Task Assignment Design for Mobile Crowdsourcing-Based Urban Sensing.","venue":"IEEE Internet Things J.","volume":"6","number":"4","pages":"6629-6641","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/LiuLW19","doi":"10.1109/JIOT.2019.2909296","ee":"https://doi.org/10.1109/JIOT.2019.2909296","url":"https://dblp.org/rec/journals/iotj/LiuLW19"}, "url":"URL#1999646" }, { "@score":"1", "@id":"1999647", "info":{"authors":{"author":[{"@pid":"160/6249","text":"Mingliu Liu"},{"@pid":"01/787","text":"Deshi Li"},{"@pid":"167/8355","text":"Chan Xu"},{"@pid":"223/7060","text":"Jixuan Zhou"},{"@pid":"81/6685-23","text":"Wei Huang 0023"}]},"title":"Discovery of Multimodal Sensor Data Through Webpage Exploration.","venue":"IEEE Internet Things J.","volume":"6","number":"3","pages":"5232-5245","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/LiuLXZH19","doi":"10.1109/JIOT.2019.2899612","ee":"https://doi.org/10.1109/JIOT.2019.2899612","url":"https://dblp.org/rec/journals/iotj/LiuLXZH19"}, "url":"URL#1999647" }, { "@score":"1", "@id":"1999648", "info":{"authors":{"author":[{"@pid":"195/7875","text":"Junkai Liu"},{"@pid":"86/2296","text":"Ke Luo"},{"@pid":"04/2090-6","text":"Zhi Zhou 0006"},{"@pid":"83/6331-4","text":"Xu Chen 0004"}]},"title":"ERP: Edge Resource Pooling for Data Stream Mobile Computing.","venue":"IEEE Internet Things J.","volume":"6","number":"3","pages":"4355-4368","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/LiuLZC19","doi":"10.1109/JIOT.2018.2882588","ee":"https://doi.org/10.1109/JIOT.2018.2882588","url":"https://dblp.org/rec/journals/iotj/LiuLZC19"}, "url":"URL#1999648" }, { "@score":"1", "@id":"1999649", "info":{"authors":{"author":[{"@pid":"81/4214","text":"Xiaonan Liu"},{"@pid":"11/3140-1","text":"Zan Li 0001"},{"@pid":"84/4581-1","text":"Nan Zhao 0001"},{"@pid":"11/7195-1","text":"Weixiao Meng 0001"},{"@pid":"16/8146","text":"Guan Gui 0001"},{"@pid":"93/4847-1","text":"Yunfei Chen 0001"},{"@pid":"18/4890","text":"Fumiyuki Adachi"}]},"title":"Transceiver Design and Multihop D2D for UAV IoT Coverage in Disasters.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"1803-1815","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/LiuLZMGCA19","doi":"10.1109/JIOT.2018.2877504","ee":"https://doi.org/10.1109/JIOT.2018.2877504","url":"https://dblp.org/rec/journals/iotj/LiuLZMGCA19"}, "url":"URL#1999649" }, { "@score":"1", "@id":"1999650", "info":{"authors":{"author":[{"@pid":"82/1364-7","text":"Xiao Liu 0007"},{"@pid":"11/5624-1","text":"Yuxin Liu 0001"},{"@pid":"181/2597-7","text":"Ning Zhang 0007"},{"@pid":"92/382-3","text":"Wen Wu 0003"},{"@pid":"28/3062","text":"Anfeng Liu"}]},"title":"Optimizing Trajectory of Unmanned Aerial Vehicles for Efficient Data Acquisition: A Matrix Completion Approach.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"1829-1840","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/LiuLZWL19","doi":"10.1109/JIOT.2019.2894257","ee":"https://doi.org/10.1109/JIOT.2019.2894257","url":"https://dblp.org/rec/journals/iotj/LiuLZWL19"}, "url":"URL#1999650" }, { "@score":"1", "@id":"1999651", "info":{"authors":{"author":[{"@pid":"172/4715","text":"Boxi Liu"},{"@pid":"119/2595","text":"Konstantinos Poularakis"},{"@pid":"03/3843","text":"Leandros Tassiulas"},{"@pid":"j/TaoJiang-2","text":"Tao Jiang 0002"}]},"title":"Joint Caching and Routing in Congestible Networks of Arbitrary Topology.","venue":"IEEE Internet Things J.","volume":"6","number":"6","pages":"10105-10118","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/LiuPTJ19","doi":"10.1109/JIOT.2019.2935742","ee":"https://doi.org/10.1109/JIOT.2019.2935742","url":"https://dblp.org/rec/journals/iotj/LiuPTJ19"}, "url":"URL#1999651" }, { "@score":"1", "@id":"1999652", "info":{"authors":{"author":[{"@pid":"228/1231","text":"Kang Liu"},{"@pid":"21/10243","text":"Xiaoyu Qiu"},{"@pid":"02/8379","text":"Wuhui Chen"},{"@pid":"83/6331-4","text":"Xu Chen 0004"},{"@pid":"z/ZibinZheng","text":"Zibin Zheng"}]},"title":"Optimal Pricing Mechanism for Data Market in Blockchain-Enhanced Internet of Things.","venue":"IEEE Internet Things J.","volume":"6","number":"6","pages":"9748-9761","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/LiuQCCZ19","doi":"10.1109/JIOT.2019.2931370","ee":"https://doi.org/10.1109/JIOT.2019.2931370","url":"https://dblp.org/rec/journals/iotj/LiuQCCZ19"}, "url":"URL#1999652" }, { "@score":"1", "@id":"1999653", "info":{"authors":{"author":[{"@pid":"97/6143","text":"Xiaolan Liu"},{"@pid":"157/9149","text":"Zhijin Qin"},{"@pid":"33/3099-1","text":"Yue Gao 0001"},{"@pid":"m/JulieAMcCann","text":"Julie A. McCann"}]},"title":"Resource Allocation in Wireless Powered IoT Networks.","venue":"IEEE Internet Things J.","volume":"6","number":"3","pages":"4935-4945","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/LiuQGM19","doi":"10.1109/JIOT.2019.2895417","ee":"https://doi.org/10.1109/JIOT.2019.2895417","url":"https://dblp.org/rec/journals/iotj/LiuQGM19"}, "url":"URL#1999653" }, { "@score":"1", "@id":"1999654", "info":{"authors":{"author":[{"@pid":"120/1631-1","text":"Xuxun Liu 0001"},{"@pid":"53/9359","text":"Tie Qiu 0001"},{"@pid":"25/3246-1","text":"Tian Wang 0001"}]},"title":"Load-Balanced Data Dissemination for Wireless Sensor Networks: A Nature-Inspired Approach.","venue":"IEEE Internet Things J.","volume":"6","number":"6","pages":"9256-9265","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/LiuQW19","doi":"10.1109/JIOT.2019.2900763","ee":"https://doi.org/10.1109/JIOT.2019.2900763","url":"https://dblp.org/rec/journals/iotj/LiuQW19"}, "url":"URL#1999654" }, { "@score":"1", "@id":"1999655", "info":{"authors":{"author":[{"@pid":"24/3947","text":"Kecheng Liu"},{"@pid":"151/6658","text":"Wenlong Shen"},{"@pid":"96/3060-3","text":"Yu Cheng 0003"},{"@pid":"c/LinXCai","text":"Lin X. Cai"},{"@pid":"181/2689-63","text":"Qing Li 0063"},{"@pid":"34/4858-1","text":"Sheng Zhou 0001"},{"@pid":"51/2196","text":"Zhisheng Niu"}]},"title":"Security Analysis of Mobile Device-to-Device Network Applications.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"2922-2932","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/LiuSCCLZN19","doi":"10.1109/JIOT.2018.2877174","ee":"https://doi.org/10.1109/JIOT.2018.2877174","url":"https://dblp.org/rec/journals/iotj/LiuSCCLZN19"}, "url":"URL#1999655" }, { "@score":"1", "@id":"1999656", "info":{"authors":{"author":[{"@pid":"60/6348-2","text":"Miao Liu 0002"},{"@pid":"28/8968","text":"Tiecheng Song"},{"@pid":"16/8146","text":"Guan Gui 0001"}]},"title":"Deep Cognitive Perspective: Resource Allocation for NOMA-Based Heterogeneous IoT With Imperfect SIC.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"2885-2894","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/LiuSG19","doi":"10.1109/JIOT.2018.2876152","ee":"https://doi.org/10.1109/JIOT.2018.2876152","url":"https://dblp.org/rec/journals/iotj/LiuSG19"}, "url":"URL#1999656" }, { "@score":"1", "@id":"1999657", "info":{"authors":{"author":[{"@pid":"61/2115-18","text":"Lin Liu 0018"},{"@pid":"15/2098","text":"Jinshu Su"},{"@pid":"134/3945","text":"Ximeng Liu"},{"@pid":"164/2718","text":"Rongmao Chen"},{"@pid":"86/489","text":"Kai Huang"},{"@pid":"d/RobertHDeng","text":"Robert H. Deng"},{"@pid":"99/2479-2","text":"Xiaofeng Wang 0002"}]},"title":"Toward Highly Secure Yet Efficient KNN Classification Scheme on Outsourced Cloud Data.","venue":"IEEE Internet Things J.","volume":"6","number":"6","pages":"9841-9852","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/LiuSLCHDW19","doi":"10.1109/JIOT.2019.2932444","ee":"https://doi.org/10.1109/JIOT.2019.2932444","url":"https://dblp.org/rec/journals/iotj/LiuSLCHDW19"}, "url":"URL#1999657" }, { "@score":"1", "@id":"1999658", "info":{"authors":{"author":[{"@pid":"96/7401","text":"Junyu Liu"},{"@pid":"39/4119","text":"Min Sheng"},{"@pid":"236/2795","text":"Ruiling Lyu"},{"@pid":"65/7582-1","text":"Jiandong Li 0001"}]},"title":"Performance Analysis and Optimization of UAV Integrated Terrestrial Cellular Network.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"1841-1855","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/LiuSLL19","doi":"10.1109/JIOT.2018.2878802","ee":"https://doi.org/10.1109/JIOT.2018.2878802","url":"https://dblp.org/rec/journals/iotj/LiuSLL19"}, "url":"URL#1999658" }, { "@score":"1", "@id":"1999659", "info":{"authors":{"author":[{"@pid":"96/2615-4","text":"Ye Liu 0004"},{"@pid":"46/5016","text":"Thiemo Voigt"},{"@pid":"48/2564","text":"Niklas Wirström"},{"@pid":"08/7636","text":"Joel Höglund"}]},"title":"EcoVibe: On-Demand Sensing for Railway Bridge Structural Health Monitoring.","venue":"IEEE Internet Things J.","volume":"6","number":"1","pages":"1068-1078","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/LiuVWH19","doi":"10.1109/JIOT.2018.2867086","ee":"https://doi.org/10.1109/JIOT.2018.2867086","url":"https://dblp.org/rec/journals/iotj/LiuVWH19"}, "url":"URL#1999659" }, { "@score":"1", "@id":"1999660", "info":{"authors":{"author":[{"@pid":"45/63","text":"Xiangyu Liu"},{"@pid":"09/5916","text":"Xuetao Wei"},{"@pid":"64/1967-5","text":"Lei Guo 0005"}]},"title":"DIMLOC: Enabling High-Precision Visible Light Localization Under Dimmable LEDs in Smart Buildings.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"3912-3924","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/LiuWG19","doi":"10.1109/JIOT.2019.2893251","ee":"https://doi.org/10.1109/JIOT.2019.2893251","url":"https://dblp.org/rec/journals/iotj/LiuWG19"}, "url":"URL#1999660" }, { "@score":"1", "@id":"1999661", "info":{"authors":{"author":[{"@pid":"37/2109-7","text":"Gang Liu 0007"},{"@pid":"180/4535","text":"Zhiqing Wang"},{"@pid":"238/2408","text":"Jiewen Hu"},{"@pid":"64/361-1","text":"Zhiguo Ding 0001"},{"@pid":"f/PingzhiFan","text":"Pingzhi Fan"}]},"title":"Cooperative NOMA Broadcasting/Multicasting for Low-Latency and High-Reliability 5G Cellular V2X Communications.","venue":"IEEE Internet Things J.","volume":"6","number":"5","pages":"7828-7838","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/LiuWHDF19","doi":"10.1109/JIOT.2019.2908415","ee":"https://doi.org/10.1109/JIOT.2019.2908415","url":"https://dblp.org/rec/journals/iotj/LiuWHDF19"}, "url":"URL#1999661" }, { "@score":"1", "@id":"1999662", "info":{"authors":{"author":[{"@pid":"51/2773-1","text":"Jiaqi Liu 0001"},{"@pid":"35/7092-343","text":"Wei Wang 0343"},{"@pid":"32/1121","text":"Deng Li"},{"@pid":"34/7561","text":"Shaohua Wan 0001"},{"@pid":"93/4010-8","text":"Hui Liu 0008"}]},"title":"Role of Gifts in Decision Making: An Endowment Effect Incentive Mechanism for Offloading in the IoV.","venue":"IEEE Internet Things J.","volume":"6","number":"4","pages":"6933-6951","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/LiuWLWL19","doi":"10.1109/JIOT.2019.2913000","ee":"https://doi.org/10.1109/JIOT.2019.2913000","url":"https://dblp.org/rec/journals/iotj/LiuWLWL19"}, "url":"URL#1999662" }, { "@score":"1", "@id":"1999663", "info":{"authors":{"author":[{"@pid":"44/9804-2","text":"Sicong Liu 0002"},{"@pid":"x/LiangXiao3","text":"Liang Xiao 0003"},{"@pid":"83/514","text":"Zhu Han 0001"},{"@pid":"67/7206","text":"Yuliang Tang"}]},"title":"Eliminating NB-IoT Interference to LTE System: A Sparse Machine Learning-Based Approach.","venue":"IEEE Internet Things J.","volume":"6","number":"4","pages":"6919-6932","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/LiuXHT19","doi":"10.1109/JIOT.2019.2912850","ee":"https://doi.org/10.1109/JIOT.2019.2912850","url":"https://dblp.org/rec/journals/iotj/LiuXHT19"}, "url":"URL#1999663" }, { "@score":"1", "@id":"1999664", "info":{"authors":{"author":[{"@pid":"16/1272","text":"Chun-Chi Liu"},{"@pid":"208/0865","text":"Yinhao Xiao"},{"@pid":"243/6462","text":"Vishesh Javangula"},{"@pid":"53/9131-1","text":"Qin Hu 0001"},{"@pid":"79/5305-1","text":"Shengling Wang 0001"},{"@pid":"c/XiuzhenCheng","text":"Xiuzhen Cheng 0001"}]},"title":"NormaChain: A Blockchain-Based Normalized Autonomous Transaction Settlement System for IoT-Based E-Commerce.","venue":"IEEE Internet Things J.","volume":"6","number":"3","pages":"4680-4693","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/LiuXJHWC19","doi":"10.1109/JIOT.2018.2877634","ee":"https://doi.org/10.1109/JIOT.2018.2877634","url":"https://dblp.org/rec/journals/iotj/LiuXJHWC19"}, "url":"URL#1999664" }, { "@score":"1", "@id":"1999665", "info":{"authors":{"author":[{"@pid":"03/1467","text":"Dan Liu"},{"@pid":"43/180-2","text":"Zheng Yan 0002"},{"@pid":"162/5813","text":"Wenxiu Ding"},{"@pid":"a/MAtiquzzaman","text":"Mohammed Atiquzzaman"}]},"title":"A Survey on Secure Data Analytics in Edge Computing.","venue":"IEEE Internet Things J.","volume":"6","number":"3","pages":"4946-4967","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/LiuYDA19","doi":"10.1109/JIOT.2019.2897619","ee":"https://doi.org/10.1109/JIOT.2019.2897619","url":"https://dblp.org/rec/journals/iotj/LiuYDA19"}, "url":"URL#1999665" }, { "@score":"1", "@id":"1999666", "info":{"authors":{"author":[{"@pid":"60/6348-2","text":"Miao Liu 0002"},{"@pid":"12/1198-27","text":"Jie Yang 0027"},{"@pid":"16/8146","text":"Guan Gui 0001"}]},"title":"DSF-NOMA: UAV-Assisted Emergency Communication Technology in a Heterogeneous Internet of Things.","venue":"IEEE Internet Things J.","volume":"6","number":"3","pages":"5508-5519","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/LiuYG19","doi":"10.1109/JIOT.2019.2903165","ee":"https://doi.org/10.1109/JIOT.2019.2903165","url":"https://dblp.org/rec/journals/iotj/LiuYG19"}, "url":"URL#1999666" }, { "@score":"1", "@id":"1999667", "info":{"authors":{"author":[{"@pid":"13/5407-1","text":"Xuan Liu 0001"},{"@pid":"65/9712","text":"Quan Yang"},{"@pid":"53/1330","text":"Juan Luo"},{"@pid":"37/516","text":"Bo Ding"},{"@pid":"94/689","text":"Shigeng Zhang"}]},"title":"An Energy-Aware Offloading Framework for Edge-Augmented Mobile RFID Systems.","venue":"IEEE Internet Things J.","volume":"6","number":"3","pages":"3994-4004","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/LiuYLDZ19","doi":"10.1109/JIOT.2018.2881295","ee":"https://doi.org/10.1109/JIOT.2018.2881295","url":"https://dblp.org/rec/journals/iotj/LiuYLDZ19"}, "url":"URL#1999667" }, { "@score":"1", "@id":"1999668", "info":{"authors":{"author":[{"@pid":"29/5010-6","text":"Hong Liu 0006"},{"@pid":"04/612","text":"Xuanxia Yao"},{"@pid":"67/1120","text":"Tao Yang"},{"@pid":"08/3821","text":"Huansheng Ning"}]},"title":"Cooperative Privacy Preservation for Wearable Devices in Hybrid Computing-Based Smart Health.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"1352-1362","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/LiuYYN19","doi":"10.1109/JIOT.2018.2843561","ee":"https://doi.org/10.1109/JIOT.2018.2843561","url":"https://dblp.org/rec/journals/iotj/LiuYYN19"}, "url":"URL#1999668" }, { "@score":"1", "@id":"1999669", "info":{"authors":{"author":[{"@pid":"224/0906","text":"Zening Liu"},{"@pid":"41/125","text":"Xiumei Yang"},{"@pid":"48/450-1","text":"Yang Yang 0001"},{"@pid":"37/11533","text":"Kunlun Wang 0001"},{"@pid":"48/314","text":"Guoqiang Mao"}]},"title":"DATS: Dispersive Stable Task Scheduling in Heterogeneous Fog Networks.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"3423-3436","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/LiuYYWM19","doi":"10.1109/JIOT.2018.2884720","ee":"https://doi.org/10.1109/JIOT.2018.2884720","url":"https://dblp.org/rec/journals/iotj/LiuYYWM19"}, "url":"URL#1999669" }, { "@score":"1", "@id":"1999670", "info":{"authors":{"author":[{"@pid":"13/5407-1","text":"Xuan Liu 0001"},{"@pid":"227/1772","text":"Jiangjin Yin"},{"@pid":"94/689","text":"Shigeng Zhang"},{"@pid":"37/516","text":"Bo Ding"},{"@pid":"01/267-1","text":"Song Guo 0001"},{"@pid":"05/1958-5","text":"Kun Wang 0005"}]},"title":"Range-Based Localization for Sparse 3-D Sensor Networks.","venue":"IEEE Internet Things J.","volume":"6","number":"1","pages":"753-764","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/LiuYZDGW19","doi":"10.1109/JIOT.2018.2856267","ee":"https://doi.org/10.1109/JIOT.2018.2856267","url":"https://dblp.org/rec/journals/iotj/LiuYZDGW19"}, "url":"URL#1999670" }, { "@score":"1", "@id":"1999671", "info":{"authors":{"author":[{"@pid":"76/1820-9","text":"Xin Liu 0009"},{"@pid":"24/744","text":"Xueyan Zhang"}]},"title":"Rate and Energy Efficiency Improvements for 5G-Based IoT With Simultaneous Transfer.","venue":"IEEE Internet Things J.","volume":"6","number":"4","pages":"5971-5980","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/LiuZ19","doi":"10.1109/JIOT.2018.2863267","ee":"https://doi.org/10.1109/JIOT.2018.2863267","url":"https://dblp.org/rec/journals/iotj/LiuZ19"}, "url":"URL#1999671" }, { "@score":"1", "@id":"1999672", "info":{"authors":{"author":[{"@pid":"51/3710-47","text":"Yang Liu 0047"},{"@pid":"86/8332","text":"Wuxiong Zhang"},{"@pid":"48/450-1","text":"Yang Yang 0001"},{"@pid":"57/3702","text":"Weidong Fang"},{"@pid":"75/7742","text":"Fei Qin"},{"@pid":"77/3562","text":"Xuewu Dai"}]},"title":"RAMTEL: Robust Acoustic Motion Tracking Using Extreme Learning Machine for Smart Cities.","venue":"IEEE Internet Things J.","volume":"6","number":"5","pages":"7555-7569","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/LiuZYFQD19","doi":"10.1109/JIOT.2019.2903211","ee":"https://doi.org/10.1109/JIOT.2019.2903211","url":"https://dblp.org/rec/journals/iotj/LiuZYFQD19"}, "url":"URL#1999672" }, { "@score":"1", "@id":"1999673", "info":{"authors":{"author":[{"@pid":"36/5558-1","text":"Tong Liu 0001"},{"@pid":"02/6595","text":"Yanmin Zhu"},{"@pid":"10/2031-1","text":"Yuanyuan Yang 0001"},{"@pid":"41/4923-3","text":"Fan Ye 0003"}]},"title":"ALC2: When Active Learning Meets Compressive Crowdsensing for Urban Air Pollution Monitoring.","venue":"IEEE Internet Things J.","volume":"6","number":"6","pages":"9427-9438","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/LiuZYY19","doi":"10.1109/JIOT.2019.2939552","ee":"https://doi.org/10.1109/JIOT.2019.2939552","url":"https://dblp.org/rec/journals/iotj/LiuZYY19"}, "url":"URL#1999673" }, { "@score":"1", "@id":"1999674", "info":{"authors":{"author":[{"@pid":"36/7955-1","text":"Chengyu Liu 0001"},{"@pid":"95/3760-8","text":"Xiangyu Zhang 0008"},{"@pid":"63/5874","text":"Lina Zhao"},{"@pid":"44/7649","text":"Feifei Liu"},{"@pid":"10/10208","text":"Xingwen Chen"},{"@pid":"240/6875","text":"Yingjia Yao"},{"@pid":"46/6317-2","text":"Jianqing Li 0002"}]},"title":"Signal Quality Assessment and Lightweight QRS Detection for Wearable ECG SmartVest System.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"1363-1374","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/LiuZZLCYL19","doi":"10.1109/JIOT.2018.2844090","ee":"https://doi.org/10.1109/JIOT.2018.2844090","url":"https://dblp.org/rec/journals/iotj/LiuZZLCYL19"}, "url":"URL#1999674" }, { "@score":"1", "@id":"1999675", "info":{"authors":{"author":[{"@pid":"149/0004","text":"Minghui Liwang"},{"@pid":"17/3466","text":"Shijie Dai"},{"@pid":"71/7672","text":"Zhibin Gao"},{"@pid":"67/7206","text":"Yuliang Tang"},{"@pid":"09/5360","text":"Huaiyu Dai"}]},"title":"A Truthful Reverse-Auction Mechanism for Computation Offloading in Cloud-Enabled Vehicular Network.","venue":"IEEE Internet Things J.","volume":"6","number":"3","pages":"4214-4227","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/LiwangDGTD19","doi":"10.1109/JIOT.2018.2875507","ee":"https://doi.org/10.1109/JIOT.2018.2875507","url":"https://dblp.org/rec/journals/iotj/LiwangDGTD19"}, "url":"URL#1999675" }, { "@score":"1", "@id":"1999676", "info":{"authors":{"author":[{"@pid":"55/3809","text":"Pierpaolo Loreti"},{"@pid":"42/4446","text":"Lorenzo Bracciale"},{"@pid":"22/3090-1","text":"Giuseppe Bianchi 0001"}]},"title":"StableSENS: Sampling Time Decision Algorithm for IoT Energy Harvesting Devices.","venue":"IEEE Internet Things J.","volume":"6","number":"6","pages":"9908-9918","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/LoretiBB19","doi":"10.1109/JIOT.2019.2933335","ee":"https://doi.org/10.1109/JIOT.2019.2933335","url":"https://dblp.org/rec/journals/iotj/LoretiBB19"}, "url":"URL#1999676" }, { "@score":"1", "@id":"1999677", "info":{"authors":{"author":{"@pid":"88/3562","text":"Rongxing Lu"}},"title":"A New Communication-Efficient Privacy-Preserving Range Query Scheme in Fog-Enhanced IoT.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"2497-2505","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/Lu19","doi":"10.1109/JIOT.2018.2871204","ee":"https://doi.org/10.1109/JIOT.2018.2871204","url":"https://dblp.org/rec/journals/iotj/Lu19"}, "url":"URL#1999677" }, { "@score":"1", "@id":"1999678", "info":{"authors":{"author":[{"@pid":"98/6613-26","text":"Wei Lu 0026"},{"@pid":"240/7267","text":"Fugui Fan"},{"@pid":"46/4768","text":"Jinghui Chu"},{"@pid":"04/10628","text":"Peiguang Jing"},{"@pid":"10/7033-1","text":"Yuting Su 0001"}]},"title":"Wearable Computing for Internet of Things: A Discriminant Approach for Human Activity Recognition.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"2749-2759","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/LuFCJS19","doi":"10.1109/JIOT.2018.2873594","ee":"https://doi.org/10.1109/JIOT.2018.2873594","url":"https://dblp.org/rec/journals/iotj/LuFCJS19"}, "url":"URL#1999678" }, { "@score":"1", "@id":"1999679", "info":{"authors":{"author":[{"@pid":"98/6613-10","text":"Wei Lu 0010"},{"@pid":"30/6387","text":"Xianyu Meng"},{"@pid":"75/7632","text":"Guanfei Guo"}]},"title":"Fast Service Migration Method Based on Virtual Machine Technology for MEC.","venue":"IEEE Internet Things J.","volume":"6","number":"3","pages":"4344-4354","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/LuMG19","doi":"10.1109/JIOT.2018.2884519","ee":"https://doi.org/10.1109/JIOT.2018.2884519","url":"https://dblp.org/rec/journals/iotj/LuMG19"}, "url":"URL#1999679" }, { "@score":"1", "@id":"1999680", "info":{"authors":{"author":[{"@pid":"16/6317-14","text":"Yang Lu 0014"},{"@pid":"70/2433","text":"Li Da Xu"}]},"title":"Internet of Things (IoT) Cybersecurity Research: A Review of Current Research Topics.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"2103-2115","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/LuX19","doi":"10.1109/JIOT.2018.2869847","ee":"https://doi.org/10.1109/JIOT.2018.2869847","url":"https://dblp.org/rec/journals/iotj/LuX19"}, "url":"URL#1999680" }, { "@score":"1", "@id":"1999681", "info":{"authors":{"author":[{"@pid":"213/1011","text":"Xiaozhen Lu"},{"@pid":"205/9465","text":"Xingyu Xiao"},{"@pid":"x/LiangXiao3","text":"Liang Xiao 0003"},{"@pid":"205/9451","text":"Canhuang Dai"},{"@pid":"75/6927","text":"Mugen Peng"},{"@pid":"p/HVincentPoor","text":"H. Vincent Poor"}]},"title":"Reinforcement Learning-Based Microgrid Energy Trading With a Reduced Power Plant Schedule.","venue":"IEEE Internet Things J.","volume":"6","number":"6","pages":"10728-10737","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/LuXXDPP19","doi":"10.1109/JIOT.2019.2941498","ee":"https://doi.org/10.1109/JIOT.2019.2941498","url":"https://dblp.org/rec/journals/iotj/LuXXDPP19"}, "url":"URL#1999681" }, { "@score":"1", "@id":"1999682", "info":{"authors":{"author":[{"@pid":"154/4313","text":"Chris Xiaoxuan Lu"},{"@pid":"186/4450","text":"Yuanbo Xiangli"},{"@pid":"166/6002","text":"Peijun Zhao"},{"@pid":"215/3933","text":"Changhao Chen"},{"@pid":"t/NikiTrigoni","text":"Niki Trigoni"},{"@pid":"83/7169","text":"Andrew Markham"}]},"title":"Autonomous Learning of Speaker Identity and WiFi Geofence From Noisy Sensor Data.","venue":"IEEE Internet Things J.","volume":"6","number":"5","pages":"8284-8295","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/LuXZCTM19","doi":"10.1109/JIOT.2019.2926645","ee":"https://doi.org/10.1109/JIOT.2019.2926645","url":"https://dblp.org/rec/journals/iotj/LuXZCTM19"}, "url":"URL#1999682" }, { "@score":"1", "@id":"1999683", "info":{"authors":{"author":[{"@pid":"29/2864-1","text":"Ning Lu 0001"},{"@pid":"01/1901-4","text":"Yi Zhou 0004"},{"@pid":"213/0961","text":"Chenhao Shi"},{"@pid":"73/8540","text":"Nan Cheng"},{"@pid":"20/8688-1","text":"Lin Cai 0001"},{"@pid":"89/6764-14","text":"Bin Li 0014"}]},"title":"Planning While Flying: A Measurement-Aided Dynamic Planning of Drone Small Cells.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"2693-2705","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/LuZSCCL19","doi":"10.1109/JIOT.2018.2873772","ee":"https://doi.org/10.1109/JIOT.2018.2873772","url":"https://dblp.org/rec/journals/iotj/LuZSCCL19"}, "url":"URL#1999683" }, { "@score":"1", "@id":"1999684", "info":{"authors":{"author":[{"@pid":"77/2007","text":"Tie Luo"},{"@pid":"77/623-1","text":"Jianwei Huang 0001"},{"@pid":"42/840","text":"Salil S. Kanhere"},{"@pid":"84/6889-2","text":"Jie Zhang 0002"},{"@pid":"d/SajalKDas","text":"Sajal K. Das 0001"}]},"title":"Improving IoT Data Quality in Mobile Crowd Sensing: A Cross Validation Approach.","venue":"IEEE Internet Things J.","volume":"6","number":"3","pages":"5651-5664","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/LuoHKZD19","doi":"10.1109/JIOT.2019.2904704","ee":"https://doi.org/10.1109/JIOT.2019.2904704","url":"https://dblp.org/rec/journals/iotj/LuoHKZD19"}, "url":"URL#1999684" }, { "@score":"1", "@id":"1999685", "info":{"authors":{"author":[{"@pid":"63/4607","text":"Qin Luo"},{"@pid":"15/885-3","text":"Junfeng Wang 0003"},{"@pid":"22/2080","text":"Shengli Liu"}]},"title":"AeroMRP: A Multipath Reliable Transport Protocol for Aeronautical Ad Hoc Networks.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"3399-3410","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/LuoWL19","doi":"10.1109/JIOT.2018.2883736","ee":"https://doi.org/10.1109/JIOT.2018.2883736","url":"https://dblp.org/rec/journals/iotj/LuoWL19"}, "url":"URL#1999685" }, { "@score":"1", "@id":"1999686", "info":{"authors":{"author":[{"@pid":"212/4630","text":"Hanguang Luo"},{"@pid":"39/1617","text":"Guangjun Wen"},{"@pid":"91/1388","text":"Jian Su"},{"@pid":"21/5338","text":"Zhong Huang"},{"@pid":"24/8606","text":"Daniele Inserra"}]},"title":"Multihop Distance-Bounding for Improving Security and Efficiency of Ad-Hoc Networks.","venue":"IEEE Internet Things J.","volume":"6","number":"3","pages":"5312-5323","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/LuoWSHI19","doi":"10.1109/JIOT.2019.2900707","ee":"https://doi.org/10.1109/JIOT.2019.2900707","url":"https://dblp.org/rec/journals/iotj/LuoWSHI19"}, "url":"URL#1999686" }, { "@score":"1", "@id":"1999687", "info":{"authors":{"author":[{"@pid":"26/69-2","text":"Ying Luo 0002"},{"@pid":"71/425","text":"Min Zeng"},{"@pid":"16/3631","text":"Hong Jiang"}]},"title":"Learning to Tradeoff Between Energy Efficiency and Delay in Energy Harvesting-Powered D2D Communication: A Distributed Experience-Sharing Algorithm.","venue":"IEEE Internet Things J.","volume":"6","number":"3","pages":"5585-5594","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/LuoZJ19","doi":"10.1109/JIOT.2019.2903873","ee":"https://doi.org/10.1109/JIOT.2019.2903873","url":"https://dblp.org/rec/journals/iotj/LuoZJ19"}, "url":"URL#1999687" }, { "@score":"1", "@id":"1999688", "info":{"authors":{"author":[{"@pid":"214/2000-1","text":"Feng Lyu 0001"},{"@pid":"45/705","text":"Liang Fang"},{"@pid":"79/1810","text":"Guangtao Xue"},{"@pid":"20/6608","text":"Hua Xue"},{"@pid":"l/MingluLi","text":"Minglu Li 0001"}]},"title":"Large-Scale Full WiFi Coverage: Deployment and Management Strategy Based on User Spatio-Temporal Association Analytics.","venue":"IEEE Internet Things J.","volume":"6","number":"6","pages":"9386-9398","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/LyuFXXL19","doi":"10.1109/JIOT.2019.2933266","ee":"https://doi.org/10.1109/JIOT.2019.2933266","url":"https://dblp.org/rec/journals/iotj/LyuFXXL19"}, "url":"URL#1999688" }, { "@score":"1", "@id":"1999689", "info":{"authors":{"author":[{"@pid":"192/6723","text":"Bin Lyu"},{"@pid":"70/2539-1","text":"Zhen Yang 0001"},{"@pid":"49/5304","text":"Haiyan Guo"},{"@pid":"78/3204-7","text":"Feng Tian 0007"},{"@pid":"16/8146","text":"Guan Gui 0001"}]},"title":"Relay Cooperation Enhanced Backscatter Communication for Internet-of-Things.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"2860-2871","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/LyuYGTG19","doi":"10.1109/JIOT.2018.2875719","ee":"https://doi.org/10.1109/JIOT.2018.2875719","url":"https://dblp.org/rec/journals/iotj/LyuYGTG19"}, "url":"URL#1999689" }, { "@score":"1", "@id":"1999690", "info":{"authors":{"author":[{"@pid":"129/1363","text":"Jiangbin Lyu"},{"@pid":"60/2536-6","text":"Rui Zhang 0006"}]},"title":"Network-Connected UAV: 3-D System Modeling and Coverage Performance Analysis.","venue":"IEEE Internet Things J.","volume":"6","number":"4","pages":"7048-7060","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/LyuZ19","doi":"10.1109/JIOT.2019.2913887","ee":"https://doi.org/10.1109/JIOT.2019.2913887","url":"https://dblp.org/rec/journals/iotj/LyuZ19"}, "url":"URL#1999690" }, { "@score":"1", "@id":"1999691", "info":{"authors":{"author":[{"@pid":"126/9026","text":"Wenhong Ma"},{"@pid":"63/2762","text":"Lijun Cai"},{"@pid":"180/6138","text":"Tingqin He"},{"@pid":"09/3666-45","text":"Lei Chen 0045"},{"@pid":"202/1523","text":"Zehong Cao"},{"@pid":"l/RenfaLi","text":"Renfa Li"}]},"title":"Local Expansion and Optimization for Higher-Order Graph Clustering.","venue":"IEEE Internet Things J.","volume":"6","number":"5","pages":"8702-8713","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/MaCHCCL19","doi":"10.1109/JIOT.2019.2923228","ee":"https://doi.org/10.1109/JIOT.2019.2923228","url":"https://dblp.org/rec/journals/iotj/MaCHCCL19"}, "url":"URL#1999691" }, { "@score":"1", "@id":"1999692", "info":{"authors":{"author":[{"@pid":"255/2194","text":"Rongkuan Ma"},{"@pid":"76/185-1","text":"Peng Cheng 0001"},{"@pid":"89/6855","text":"Zhenyong Zhang"},{"@pid":"82/9747","text":"Wenwen Liu"},{"@pid":"07/408","text":"Qingxian Wang"},{"@pid":"50/5190","text":"Qiang Wei"}]},"title":"Stealthy Attack Against Redundant Controller Architecture of Industrial Cyber-Physical System.","venue":"IEEE Internet Things J.","volume":"6","number":"6","pages":"9783-9793","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/MaCZLWW19","doi":"10.1109/JIOT.2019.2931349","ee":"https://doi.org/10.1109/JIOT.2019.2931349","url":"https://dblp.org/rec/journals/iotj/MaCZLWW19"}, "url":"URL#1999692" }, { "@score":"1", "@id":"1999693", "info":{"authors":{"author":[{"@pid":"168/6035","text":"Zhijie Ma"},{"@pid":"39/456-1","text":"Li Feng 0001"},{"@pid":"186/0948","text":"Fangxin Xu"}]},"title":"Design and Analysis of a Distributed and Demand-Based Backscatter MAC Protocol for Internet of Things Networks.","venue":"IEEE Internet Things J.","volume":"6","number":"1","pages":"1246-1256","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/MaFX19","doi":"10.1109/JIOT.2018.2869015","ee":"https://doi.org/10.1109/JIOT.2018.2869015","url":"https://dblp.org/rec/journals/iotj/MaFX19"}, "url":"URL#1999693" }, { "@score":"1", "@id":"1999694", "info":{"authors":{"author":[{"@pid":"214/1196","text":"Mimi Ma"},{"@pid":"87/7765","text":"Debiao He"},{"@pid":"73/4432","text":"Huaqun Wang"},{"@pid":"04/8395","text":"Neeraj Kumar 0001"},{"@pid":"c/KimKwangRaymondChoo","text":"Kim-Kwang Raymond Choo"}]},"title":"An Efficient and Provably Secure Authenticated Key Agreement Protocol for Fog-Based Vehicular Ad-Hoc Networks.","venue":"IEEE Internet Things J.","volume":"6","number":"5","pages":"8065-8075","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/MaHWKC19","doi":"10.1109/JIOT.2019.2902840","ee":"https://doi.org/10.1109/JIOT.2019.2902840","url":"https://dblp.org/rec/journals/iotj/MaHWKC19"}, "url":"URL#1999694" }, { "@score":"1", "@id":"1999695", "info":{"authors":{"author":[{"@pid":"91/7448","text":"Zhuo Ma"},{"@pid":"51/3710-118","text":"Yang Liu 0118"},{"@pid":"134/3945","text":"Ximeng Liu"},{"@pid":"12/6604-1","text":"Jianfeng Ma 0001"},{"@pid":"l/FeifeiLi","text":"Feifei Li 0001"}]},"title":"Privacy-Preserving Outsourced Speech Recognition for Smart IoT Devices.","venue":"IEEE Internet Things J.","volume":"6","number":"5","pages":"8406-8420","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/MaLLML19","doi":"10.1109/JIOT.2019.2917933","ee":"https://doi.org/10.1109/JIOT.2019.2917933","url":"https://dblp.org/rec/journals/iotj/MaLLML19"}, "url":"URL#1999695" }, { "@score":"1", "@id":"1999696", "info":{"authors":{"author":[{"@pid":"91/7448","text":"Zhuo Ma"},{"@pid":"51/3710-118","text":"Yang Liu 0118"},{"@pid":"134/3945","text":"Ximeng Liu"},{"@pid":"12/6604-1","text":"Jianfeng Ma 0001"},{"@pid":"20/6179-1","text":"Kui Ren 0001"}]},"title":"Lightweight Privacy-Preserving Ensemble Classification for Face Recognition.","venue":"IEEE Internet Things J.","volume":"6","number":"3","pages":"5778-5790","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/MaLLMR19","doi":"10.1109/JIOT.2019.2905555","ee":"https://doi.org/10.1109/JIOT.2019.2905555","url":"https://dblp.org/rec/journals/iotj/MaLLMR19"}, "url":"URL#1999696" }, { "@score":"1", "@id":"1999697", "info":{"authors":{"author":[{"@pid":"123/7165","text":"Xingpo Ma"},{"@pid":"49/2010","text":"Junbin Liang"},{"@pid":"212/7594","text":"Sijia Yang"},{"@pid":"63/1571","text":"Yanling Li"},{"@pid":"49/5981-1","text":"Yin Li 0001"},{"@pid":"206/7546","text":"Wenpeng Ma"},{"@pid":"25/3246-1","text":"Tian Wang 0001"}]},"title":"SLS-STQ: A Novel Scheme for Securing Spatial-Temporal Top-k Queries in TWSNs-Based Edge Computing Systems.","venue":"IEEE Internet Things J.","volume":"6","number":"6","pages":"10093-10104","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/MaLYLLMW19","doi":"10.1109/JIOT.2019.2935738","ee":"https://doi.org/10.1109/JIOT.2019.2935738","url":"https://dblp.org/rec/journals/iotj/MaLYLLMW19"}, "url":"URL#1999697" }, { "@score":"1", "@id":"1999698", "info":{"authors":{"author":[{"@pid":"76/268","text":"Yongtao Ma"},{"@pid":"246/5407","text":"Chenglong Tian"},{"@pid":"89/6600","text":"Yue Jiang"}]},"title":"A Multitag Cooperative Localization Algorithm Based on Weighted Multidimensional Scaling for Passive UHF RFID.","venue":"IEEE Internet Things J.","volume":"6","number":"4","pages":"6548-6555","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/MaTJ19","doi":"10.1109/JIOT.2019.2907771","ee":"https://doi.org/10.1109/JIOT.2019.2907771","url":"https://dblp.org/rec/journals/iotj/MaTJ19"}, "url":"URL#1999698" }, { "@score":"1", "@id":"1999699", "info":{"authors":{"author":[{"@pid":"17/2672-1","text":"Zheng Ma 0001"},{"@pid":"79/5620-1","text":"Ming Xiao 0001"},{"@pid":"80/6791-1","text":"Yue Xiao 0001"},{"@pid":"75/9776","text":"Zhibo Pang"},{"@pid":"p/HVincentPoor","text":"H. Vincent Poor"},{"@pid":"84/3821","text":"Branka Vucetic"}]},"title":"Guest Editorial Special Issue on Low-Latency High-Reliability Communications for the IoT.","venue":"IEEE Internet Things J.","volume":"6","number":"5","pages":"7811-7815","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/MaXXPPV19","doi":"10.1109/JIOT.2019.2940392","ee":"https://doi.org/10.1109/JIOT.2019.2940392","url":"https://dblp.org/rec/journals/iotj/MaXXPPV19"}, "url":"URL#1999699" }, { "@score":"1", "@id":"1999700", "info":{"authors":{"author":[{"@pid":"17/2672-1","text":"Zheng Ma 0001"},{"@pid":"79/5620-1","text":"Ming Xiao 0001"},{"@pid":"80/6791-1","text":"Yue Xiao 0001"},{"@pid":"75/9776","text":"Zhibo Pang"},{"@pid":"p/HVincentPoor","text":"H. Vincent Poor"},{"@pid":"84/3821","text":"Branka Vucetic"}]},"title":"High-Reliability and Low-Latency Wireless Communication for Internet of Things: Challenges, Fundamentals, and Enabling Technologies.","venue":"IEEE Internet Things J.","volume":"6","number":"5","pages":"7946-7970","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/MaXXPPV19a","doi":"10.1109/JIOT.2019.2907245","ee":"https://doi.org/10.1109/JIOT.2019.2907245","url":"https://dblp.org/rec/journals/iotj/MaXXPPV19a"}, "url":"URL#1999700" }, { "@score":"1", "@id":"1999701", "info":{"authors":{"author":[{"@pid":"33/9196","text":"Aamir Mahmood"},{"@pid":"132/8022","text":"M. M. Aftab Hossain"},{"@pid":"80/67","text":"Cicek Cavdar"},{"@pid":"27/4038","text":"Mikael Gidlund"}]},"title":"Energy-Reliability Aware Link Optimization for Battery-Powered IoT Devices With Nonideal Power Amplifiers.","venue":"IEEE Internet Things J.","volume":"6","number":"3","pages":"5058-5067","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/MahmoodHCG19","doi":"10.1109/JIOT.2019.2895228","ee":"https://doi.org/10.1109/JIOT.2019.2895228","url":"https://dblp.org/rec/journals/iotj/MahmoodHCG19"}, "url":"URL#1999701" }, { "@score":"1", "@id":"1999702", "info":{"authors":{"author":[{"@pid":"169/6806","text":"Md Shaad Mahmud"},{"@pid":"10/966-1","text":"Hua Fang 0001"},{"@pid":"70/5417-1","text":"Honggang Wang 0001"}]},"title":"An Integrated Wearable Sensor for Unobtrusive Continuous Measurement of Autonomic Nervous System.","venue":"IEEE Internet Things J.","volume":"6","number":"1","pages":"1104-1113","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/MahmudFW19","doi":"10.1109/JIOT.2018.2868235","ee":"https://doi.org/10.1109/JIOT.2018.2868235","url":"https://dblp.org/rec/journals/iotj/MahmudFW19"}, "url":"URL#1999702" }, { "@score":"1", "@id":"1999703", "info":{"authors":{"author":[{"@pid":"255/2366","text":"Saurav Malani"},{"@pid":"150/2292","text":"Jangirala Srinivas"},{"@pid":"39/871","text":"Ashok Kumar Das"},{"@pid":"s/KSrinathan","text":"Kannan Srinathan"},{"@pid":"21/4301","text":"Minho Jo 0001"}]},"title":"Certificate-Based Anonymous Device Access Control Scheme for IoT Environment.","venue":"IEEE Internet Things J.","volume":"6","number":"6","pages":"9762-9773","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/MalaniSDSJ19","doi":"10.1109/JIOT.2019.2931372","ee":"https://doi.org/10.1109/JIOT.2019.2931372","url":"https://dblp.org/rec/journals/iotj/MalaniSDSJ19"}, "url":"URL#1999703" }, { "@score":"1", "@id":"1999704", "info":{"authors":{"author":[{"@pid":"40/8577","text":"Alireza Manashty"},{"@pid":"87/1450","text":"Janet V. Light-Thompson"},{"@pid":"27/11472","text":"Hamid Soleimani"}]},"title":"A Concise Temporal Data Representation Model for Prediction in Biomedical Wearable Devices.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"1438-1445","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/ManashtyLS19","doi":"10.1109/JIOT.2018.2863039","ee":"https://doi.org/10.1109/JIOT.2018.2863039","url":"https://dblp.org/rec/journals/iotj/ManashtyLS19"}, "url":"URL#1999704" }, { "@score":"1", "@id":"1999705", "info":{"authors":{"author":[{"@pid":"92/9429","text":"Mauro Mangia"},{"@pid":"224/1365","text":"Alex Marchioni"},{"@pid":"06/756","text":"Fabio Pareschi"},{"@pid":"10/5406","text":"Riccardo Rovatti"},{"@pid":"99/4986","text":"Gianluca Setti"}]},"title":"Chained Compressed Sensing: A Blockchain-Inspired Approach for Low-Cost Security in IoT Sensing.","venue":"IEEE Internet Things J.","volume":"6","number":"4","pages":"6465-6475","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/MangiaMPRS19","doi":"10.1109/JIOT.2019.2910402","ee":"https://doi.org/10.1109/JIOT.2019.2910402","url":"https://dblp.org/rec/journals/iotj/MangiaMPRS19"}, "url":"URL#1999705" }, { "@score":"1", "@id":"1999706", "info":{"authors":{"author":[{"@pid":"159/1534","text":"Xianghui Mao"},{"@pid":"97/6292","text":"Yuantao Gu"},{"@pid":"76/2265","text":"Wotao Yin"}]},"title":"Walk Proximal Gradient: An Energy-Efficient Algorithm for Consensus Optimization.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"2048-2060","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/MaoGY19","doi":"10.1109/JIOT.2018.2875057","ee":"https://doi.org/10.1109/JIOT.2018.2875057","url":"https://dblp.org/rec/journals/iotj/MaoGY19"}, "url":"URL#1999706" }, { "@score":"1", "@id":"1999707", "info":{"authors":{"author":[{"@pid":"26/2454","text":"Borja Martínez"},{"@pid":"38/6827","text":"Ferran Adelantado"},{"@pid":"04/10042","text":"Andrea Bartoli"},{"@pid":"75/2244","text":"Xavier Vilajosana"}]},"title":"Exploring the Performance Boundaries of NB-IoT.","venue":"IEEE Internet Things J.","volume":"6","number":"3","pages":"5702-5712","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/MartinezABV19","doi":"10.1109/JIOT.2019.2904799","ee":"https://doi.org/10.1109/JIOT.2019.2904799","url":"https://dblp.org/rec/journals/iotj/MartinezABV19"}, "url":"URL#1999707" }, { "@score":"1", "@id":"1999708", "info":{"authors":{"author":[{"@pid":"192/2275","text":"Silvia Marzal"},{"@pid":"126/1655","text":"Raúl González-Medina"},{"@pid":"219/1005","text":"Robert Salas-Puente"},{"@pid":"122/6790","text":"Gabriel Garcerá"},{"@pid":"122/6722","text":"Emilio Figueres"}]},"title":"An Embedded Internet of Energy Communication Platform for the Future Smart Microgrids Management.","venue":"IEEE Internet Things J.","volume":"6","number":"4","pages":"7241-7252","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/MarzalGSGF19","doi":"10.1109/JIOT.2019.2915389","ee":"https://doi.org/10.1109/JIOT.2019.2915389","url":"https://dblp.org/rec/journals/iotj/MarzalGSGF19"}, "url":"URL#1999708" }, { "@score":"1", "@id":"1999709", "info":{"authors":{"author":[{"@pid":"79/5259","text":"Gaia Maselli"},{"@pid":"186/4398","text":"Mauro Piva"},{"@pid":"s/JohnAStankovic","text":"John A. Stankovic"}]},"title":"Adaptive Communication for Battery-Free Devices in Smart Homes.","venue":"IEEE Internet Things J.","volume":"6","number":"4","pages":"6977-6988","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/MaselliPS19","doi":"10.1109/JIOT.2019.2913231","ee":"https://doi.org/10.1109/JIOT.2019.2913231","url":"https://dblp.org/rec/journals/iotj/MaselliPS19"}, "url":"URL#1999709" }, { "@score":"1", "@id":"1999710", "info":{"authors":{"author":[{"@pid":"242/4400","text":"Jason M. McGinthy"},{"@pid":"09/9853","text":"Alan J. Michaels"}]},"title":"Secure Industrial Internet of Things Critical Infrastructure Node Design.","venue":"IEEE Internet Things J.","volume":"6","number":"5","pages":"8021-8037","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/McGinthyM19","doi":"10.1109/JIOT.2019.2903242","ee":"https://doi.org/10.1109/JIOT.2019.2903242","url":"https://dblp.org/rec/journals/iotj/McGinthyM19"}, "url":"URL#1999710" }, { "@score":"1", "@id":"1999711", "info":{"authors":{"author":[{"@pid":"242/4400","text":"Jason M. McGinthy"},{"@pid":"233/3323","text":"Lauren J. Wong"},{"@pid":"09/9853","text":"Alan J. Michaels"}]},"title":"Groundwork for Neural Network-Based Specific Emitter Identification Authentication for IoT.","venue":"IEEE Internet Things J.","volume":"6","number":"4","pages":"6429-6440","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/McGinthyWM19","doi":"10.1109/JIOT.2019.2908759","ee":"https://doi.org/10.1109/JIOT.2019.2908759","url":"https://dblp.org/rec/journals/iotj/McGinthyWM19"}, "url":"URL#1999711" }, { "@score":"1", "@id":"1999712", "info":{"authors":{"author":[{"@pid":"243/6434","text":"Tamer F. Megahed"},{"@pid":"243/6459","text":"Sobhy M. Abdelkader"},{"@pid":"231/2498","text":"Ahmad Zakaria"}]},"title":"Energy Management in Zero-Energy Building Using Neural Network Predictive Control.","venue":"IEEE Internet Things J.","volume":"6","number":"3","pages":"5336-5344","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/MegahedAZ19","doi":"10.1109/JIOT.2019.2900558","ee":"https://doi.org/10.1109/JIOT.2019.2900558","url":"https://dblp.org/rec/journals/iotj/MegahedAZ19"}, "url":"URL#1999712" }, { "@score":"1", "@id":"1999713", "info":{"authors":{"author":[{"@pid":"73/8780","text":"Irfan Mehmood"},{"@pid":"214/5936","text":"Amin Ullah"},{"@pid":"159/2187","text":"Khan Muhammad 0001"},{"@pid":"30/4028","text":"Der-Jiunn Deng"},{"@pid":"146/1188","text":"Weizhi Meng 0001"},{"@pid":"18/3784","text":"Fadi Al-Turjman 0001"},{"@pid":"28/582","text":"Muhammad Sajjad"},{"@pid":"47/8013","text":"Victor Hugo C. de Albuquerque"}]},"title":"Efficient Image Recognition and Retrieval on IoT-Assisted Energy-Constrained Platforms From Big Data Repositories.","venue":"IEEE Internet Things J.","volume":"6","number":"6","pages":"9246-9255","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/MehmoodUMDMASA19","doi":"10.1109/JIOT.2019.2896151","ee":"https://doi.org/10.1109/JIOT.2019.2896151","url":"https://dblp.org/rec/journals/iotj/MehmoodUMDMASA19"}, "url":"URL#1999713" }, { "@score":"1", "@id":"1999714", "info":{"authors":{"author":[{"@pid":"221/0380","text":"Reem Melki"},{"@pid":"220/6938","text":"Hassan N. Noura"},{"@pid":"59/3642","text":"Mohammad M. Mansour"},{"@pid":"88/5173","text":"Ali Chehab"}]},"title":"An Efficient OFDM-Based Encryption Scheme Using a Dynamic Key Approach.","venue":"IEEE Internet Things J.","volume":"6","number":"1","pages":"361-378","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/MelkiNMC19","doi":"10.1109/JIOT.2018.2846578","ee":"https://doi.org/10.1109/JIOT.2018.2846578","url":"https://dblp.org/rec/journals/iotj/MelkiNMC19"}, "url":"URL#1999714" }, { "@score":"1", "@id":"1999715", "info":{"authors":{"author":[{"@pid":"20/8267","text":"Francesca Meneghello"},{"@pid":"251/1525","text":"Matteo Calore"},{"@pid":"161/2107","text":"Daniel Zucchetto"},{"@pid":"175/1389","text":"Michele Polese"},{"@pid":"40/5059","text":"Andrea Zanella"}]},"title":"IoT: Internet of Threats? A Survey of Practical Security Vulnerabilities in Real IoT Devices.","venue":"IEEE Internet Things J.","volume":"6","number":"5","pages":"8182-8201","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/MeneghelloCZPZ19","doi":"10.1109/JIOT.2019.2935189","ee":"https://doi.org/10.1109/JIOT.2019.2935189","url":"https://dblp.org/rec/journals/iotj/MeneghelloCZPZ19"}, "url":"URL#1999715" }, { "@score":"1", "@id":"1999716", "info":{"authors":{"author":[{"@pid":"78/8376","text":"Zhaozong Meng"},{"@pid":"87/7457","text":"Zhipeng Wu"},{"@pid":"92/1904","text":"John Gray"}]},"title":"RFID-Based Object-Centric Data Management Framework for Smart Manufacturing Applications.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"2706-2716","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/MengWG19","doi":"10.1109/JIOT.2018.2873426","ee":"https://doi.org/10.1109/JIOT.2018.2873426","url":"https://dblp.org/rec/journals/iotj/MengWG19"}, "url":"URL#1999716" }, { "@score":"1", "@id":"1999717", "info":{"authors":{"author":[{"@pid":"216/6806","text":"Ammar K. Al Mhdawi"},{"@pid":"93/4418","text":"Hamed S. Al-Raweshidy"}]},"title":"SDQIM: Software-Defined Quadcopter Interdomain Management Protocol With Decentralized Inductive Power Transfer (DIPT) Platform.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"3386-3398","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/MhdawiA19","doi":"10.1109/JIOT.2018.2882897","ee":"https://doi.org/10.1109/JIOT.2018.2882897","url":"https://dblp.org/rec/journals/iotj/MhdawiA19"}, "url":"URL#1999717" }, { "@score":"1", "@id":"1999718", "info":{"authors":{"author":[{"@pid":"166/1798","text":"Yinbin Miao"},{"@pid":"134/3945","text":"Ximeng Liu"},{"@pid":"c/KimKwangRaymondChoo","text":"Kim-Kwang Raymond Choo"},{"@pid":"d/RobertHDeng","text":"Robert H. Deng"},{"@pid":"91/5936-1","text":"Hongjun Wu 0001"},{"@pid":"39/5544-1","text":"Hongwei Li 0001"}]},"title":"Fair and Dynamic Data Sharing Framework in Cloud-Assisted Internet of Everything.","venue":"IEEE Internet Things J.","volume":"6","number":"4","pages":"7201-7212","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/MiaoLCDWL19","doi":"10.1109/JIOT.2019.2915123","ee":"https://doi.org/10.1109/JIOT.2019.2915123","url":"https://dblp.org/rec/journals/iotj/MiaoLCDWL19"}, "url":"URL#1999718" }, { "@score":"1", "@id":"1999719", "info":{"authors":{"author":[{"@pid":"166/1798","text":"Yinbin Miao"},{"@pid":"251/1440","text":"Qiuyun Tong"},{"@pid":"c/KimKwangRaymondChoo","text":"Kim-Kwang Raymond Choo"},{"@pid":"134/3945","text":"Ximeng Liu"},{"@pid":"d/RobertHDeng","text":"Robert H. Deng"},{"@pid":"39/5544-1","text":"Hongwei Li 0001"}]},"title":"Secure Online/Offline Data Sharing Framework for Cloud-Assisted Industrial Internet of Things.","venue":"IEEE Internet Things J.","volume":"6","number":"5","pages":"8681-8691","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/MiaoTCLDL19","doi":"10.1109/JIOT.2019.2923068","ee":"https://doi.org/10.1109/JIOT.2019.2923068","url":"https://dblp.org/rec/journals/iotj/MiaoTCLDL19"}, "url":"URL#1999719" }, { "@score":"1", "@id":"1999720", "info":{"authors":{"author":[{"@pid":"160/7857","text":"Yanan Miao"},{"@pid":"16/1093","text":"Xiaoming Tao"},{"@pid":"15/1040","text":"Xiaolin Xu"},{"@pid":"59/3894","text":"Jianhua Lu"}]},"title":"Joint 3-D Shape Estimation and Landmark Localization From Monocular Cameras of Intelligent Vehicles.","venue":"IEEE Internet Things J.","volume":"6","number":"1","pages":"15-25","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/MiaoTXL19","doi":"10.1109/JIOT.2018.2872435","ee":"https://doi.org/10.1109/JIOT.2018.2872435","url":"https://dblp.org/rec/journals/iotj/MiaoTXL19"}, "url":"URL#1999720" }, { "@score":"1", "@id":"1999721", "info":{"authors":{"author":[{"@pid":"134/0159","text":"Georgios M. Milis"},{"@pid":"p/ChristoforosPanayiotou","text":"Christos G. Panayiotou"},{"@pid":"56/3707","text":"Marios M. Polycarpou"}]},"title":"SEMIoTICS: Semantically Enhanced IoT-Enabled Intelligent Control Systems.","venue":"IEEE Internet Things J.","volume":"6","number":"1","pages":"1257-1266","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/MilisPP19","doi":"10.1109/JIOT.2017.2773200","ee":"https://doi.org/10.1109/JIOT.2017.2773200","url":"https://dblp.org/rec/journals/iotj/MilisPP19"}, "url":"URL#1999721" }, { "@score":"1", "@id":"1999722", "info":{"authors":{"author":[{"@pid":"203/9662","text":"Minghui Min"},{"@pid":"203/9576","text":"Xiaoyue Wan"},{"@pid":"x/LiangXiao3","text":"Liang Xiao 0003"},{"@pid":"14/3310","text":"Ye Chen"},{"@pid":"78/480","text":"Minghua Xia"},{"@pid":"52/328-1","text":"Di Wu 0001"},{"@pid":"09/5360","text":"Huaiyu Dai"}]},"title":"Learning-Based Privacy-Aware Offloading for Healthcare IoT With Energy Harvesting.","venue":"IEEE Internet Things J.","volume":"6","number":"3","pages":"4307-4316","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/MinWXCXWD19","doi":"10.1109/JIOT.2018.2875926","ee":"https://doi.org/10.1109/JIOT.2018.2875926","url":"https://dblp.org/rec/journals/iotj/MinWXCXWD19"}, "url":"URL#1999722" }, { "@score":"1", "@id":"1999723", "info":{"authors":{"author":[{"@pid":"127/4952","text":"Alekha Kumar Mishra"},{"@pid":"161/6873","text":"Asis Kumar Tripathy"},{"@pid":"154/0895","text":"Deepak Puthal"},{"@pid":"y/LaurenceTianruoYang","text":"Laurence T. Yang"}]},"title":"Analytical Model for Sybil Attack Phases in Internet of Things.","venue":"IEEE Internet Things J.","volume":"6","number":"1","pages":"379-387","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/MishraTPY19","doi":"10.1109/JIOT.2018.2843769","ee":"https://doi.org/10.1109/JIOT.2018.2843769","url":"https://dblp.org/rec/journals/iotj/MishraTPY19"}, "url":"URL#1999723" }, { "@score":"1", "@id":"1999724", "info":{"authors":{"author":[{"@pid":"155/5173","text":"Keisuke Miyanabe"},{"@pid":"194/7021","text":"Tiago Gama Rodrigues"},{"@pid":"144/8351","text":"Yunseong Lee"},{"@pid":"04/5689","text":"Hiroki Nishiyama 0001"},{"@pid":"19/3059","text":"Nei Kato"}]},"title":"An Internet of Things Traffic-Based Power Saving Scheme in Cloud-Radio Access Network.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"3087-3096","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/MiyanabeRLNK19","doi":"10.1109/JIOT.2018.2878884","ee":"https://doi.org/10.1109/JIOT.2018.2878884","url":"https://dblp.org/rec/journals/iotj/MiyanabeRLNK19"}, "url":"URL#1999724" }, { "@score":"1", "@id":"1999725", "info":{"authors":{"author":[{"@pid":"119/5982","text":"Lei Mo"},{"@pid":"77/8933","text":"Angeliki Kritikakou"},{"@pid":"07/7178","text":"Shibo He"}]},"title":"Energy-Aware Multiple Mobile Chargers Coordination for Wireless Rechargeable Sensor Networks.","venue":"IEEE Internet Things J.","volume":"6","number":"5","pages":"8202-8214","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/MoKH19","doi":"10.1109/JIOT.2019.2918837","ee":"https://doi.org/10.1109/JIOT.2019.2918837","url":"https://dblp.org/rec/journals/iotj/MoKH19"}, "url":"URL#1999725" }, { "@score":"1", "@id":"1999726", "info":{"authors":{"author":[{"@pid":"183/1796","text":"Sulagna Mohapatra"},{"@pid":"98/6549","text":"Prasan Kumar Sahoo"},{"@pid":"63/6304","text":"Jang-Ping Sheu"}]},"title":"Spectrum Allocation With Guaranteed Rendezvous in Asynchronous Cognitive Radio Networks for Internet of Things.","venue":"IEEE Internet Things J.","volume":"6","number":"4","pages":"6104-6116","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/MohapatraSS19","doi":"10.1109/JIOT.2018.2872459","ee":"https://doi.org/10.1109/JIOT.2018.2872459","url":"https://dblp.org/rec/journals/iotj/MohapatraSS19"}, "url":"URL#1999726" }, { "@score":"1", "@id":"1999727", "info":{"authors":{"author":[{"@pid":"50/5725","text":"Dmitri Moltchanov"},{"@pid":"166/7673","text":"Roman Kovalchukov"},{"@pid":"117/9028","text":"Mikhail Gerasimenko"},{"@pid":"66/6334","text":"Sergey Andreev 0001"},{"@pid":"10/5061","text":"Yevgeni Koucheryavy"},{"@pid":"g/MarioGerla","text":"Mario Gerla"}]},"title":"Socially Inspired Relaying and Proactive Mode Selection in mmWave Vehicular Communications.","venue":"IEEE Internet Things J.","volume":"6","number":"3","pages":"5172-5183","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/MoltchanovKGAKG19","doi":"10.1109/JIOT.2019.2898420","ee":"https://doi.org/10.1109/JIOT.2019.2898420","url":"https://dblp.org/rec/journals/iotj/MoltchanovKGAKG19"}, "url":"URL#1999727" }, { "@score":"1", "@id":"1999728", "info":{"authors":{"author":[{"@pid":"192/3920","text":"Saikat Mondal"},{"@pid":"243/6460","text":"Kanishka P. Wijewardena"},{"@pid":"216/1425","text":"Saranraj Karuppuswami"},{"@pid":"243/6469","text":"Nitya Kriti"},{"@pid":"66/3984","text":"Deepak Kumar"},{"@pid":"166/3179","text":"Premjeet Chahal"}]},"title":"Blockchain Inspired RFID-Based Information Architecture for Food Supply Chain.","venue":"IEEE Internet Things J.","volume":"6","number":"3","pages":"5803-5813","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/MondalWKKKC19","doi":"10.1109/JIOT.2019.2907658","ee":"https://doi.org/10.1109/JIOT.2019.2907658","url":"https://dblp.org/rec/journals/iotj/MondalWKKKC19"}, "url":"URL#1999728" }, { "@score":"1", "@id":"1999729", "info":{"authors":{"author":[{"@pid":"133/4772","text":"Riccardo Monica"},{"@pid":"151/8338","text":"Luca Davoli"},{"@pid":"45/5951","text":"Gianluigi Ferrari 0001"}]},"title":"A Wave-Based Request-Response Protocol for Latency Minimization in WSNs.","venue":"IEEE Internet Things J.","volume":"6","number":"5","pages":"7971-7979","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/MonicaDF19","doi":"10.1109/JIOT.2019.2914578","ee":"https://doi.org/10.1109/JIOT.2019.2914578","url":"https://dblp.org/rec/journals/iotj/MonicaDF19"}, "url":"URL#1999729" }, { "@score":"1", "@id":"1999730", "info":{"authors":{"author":[{"@pid":"70/10405","text":"Naser Hossein Motlagh"},{"@pid":"00/2807","text":"Miloud Bagaa"},{"@pid":"09/3053","text":"Tarik Taleb"}]},"title":"Energy and Delay Aware Task Assignment Mechanism for UAV-Based IoT Platform.","venue":"IEEE Internet Things J.","volume":"6","number":"4","pages":"6523-6536","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/MotlaghBT19","doi":"10.1109/JIOT.2019.2907873","ee":"https://doi.org/10.1109/JIOT.2019.2907873","url":"https://dblp.org/rec/journals/iotj/MotlaghBT19"}, "url":"URL#1999730" }, { "@score":"1", "@id":"1999731", "info":{"authors":{"author":[{"@pid":"240/6825","text":"Hesham G. Moussa"},{"@pid":"z/WeihuaZhuang","text":"Weihua Zhuang"}]},"title":"RACH Performance Analysis for Large-Scale Cellular IoT Applications.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"3364-3372","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/MoussaZ19","doi":"10.1109/JIOT.2018.2883101","ee":"https://doi.org/10.1109/JIOT.2018.2883101","url":"https://dblp.org/rec/journals/iotj/MoussaZ19"}, "url":"URL#1999731" }, { "@score":"1", "@id":"1999732", "info":{"authors":{"author":[{"@pid":"172/9981","text":"Nour Moustafa"},{"@pid":"83/6246","text":"Benjamin P. Turnbull"},{"@pid":"c/KimKwangRaymondChoo","text":"Kim-Kwang Raymond Choo"}]},"title":"An Ensemble Intrusion Detection Technique Based on Proposed Statistical Flow Features for Protecting Network Traffic of Internet of Things.","venue":"IEEE Internet Things J.","volume":"6","number":"3","pages":"4815-4830","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/MoustafaTC19","doi":"10.1109/JIOT.2018.2871719","ee":"https://doi.org/10.1109/JIOT.2018.2871719","url":"https://dblp.org/rec/journals/iotj/MoustafaTC19"}, "url":"URL#1999732" }, { "@score":"1", "@id":"1999733", "info":{"authors":{"author":[{"@pid":"154/8145","text":"Amina Mseddi"},{"@pid":"49/7825","text":"Wael Jaafar"},{"@pid":"53/815","text":"Halima Elbiaze"},{"@pid":"56/4552","text":"Wessam Ajib"}]},"title":"Joint Container Placement and Task Provisioning in Dynamic Fog Computing.","venue":"IEEE Internet Things J.","volume":"6","number":"6","pages":"10028-10040","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/MseddiJEA19","doi":"10.1109/JIOT.2019.2935056","ee":"https://doi.org/10.1109/JIOT.2019.2935056","url":"https://dblp.org/rec/journals/iotj/MseddiJEA19"}, "url":"URL#1999733" }, { "@score":"1", "@id":"1999734", "info":{"authors":{"author":[{"@pid":"67/10013","text":"Jiasong Mu"},{"@pid":"35/6473","text":"Robert W. Stewart"},{"@pid":"12/514","text":"Liang Han"},{"@pid":"95/11234","text":"David H. Crawford"}]},"title":"A Self-Organized Dynamic Clustering Method and Its Multiple Access Mechanism for Multiple WBANs.","venue":"IEEE Internet Things J.","volume":"6","number":"4","pages":"6042-6051","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/MuSHC19","doi":"10.1109/JIOT.2018.2869829","ee":"https://doi.org/10.1109/JIOT.2018.2869829","url":"https://dblp.org/rec/journals/iotj/MuSHC19"}, "url":"URL#1999734" }, { "@score":"1", "@id":"1999735", "info":{"authors":{"author":[{"@pid":"214/2161","text":"Siqi Mu"},{"@pid":"23/2071","text":"Zhangdui Zhong"},{"@pid":"04/4784","text":"Dongmei Zhao"},{"@pid":"90/8333","text":"Minming Ni"}]},"title":"Joint Job Partitioning and Collaborative Computation Offloading for Internet of Things.","venue":"IEEE Internet Things J.","volume":"6","number":"1","pages":"1046-1059","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/MuZZN19","doi":"10.1109/JIOT.2018.2866945","ee":"https://doi.org/10.1109/JIOT.2018.2866945","url":"https://dblp.org/rec/journals/iotj/MuZZN19"}, "url":"URL#1999735" }, { "@score":"1", "@id":"1999736", "info":{"authors":{"author":[{"@pid":"160/3215","text":"Anandarup Mukherjee"},{"@pid":"36/1023","text":"Sudip Misra"},{"@pid":"243/6477","text":"Vadde Santosha Pradeep Chandra"},{"@pid":"91/2882","text":"Mohammad S. Obaidat"}]},"title":"Resource-Optimized Multiarmed Bandit-Based Offload Path Selection in Edge UAV Swarms.","venue":"IEEE Internet Things J.","volume":"6","number":"3","pages":"4889-4896","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/MukherjeeMCO19","doi":"10.1109/JIOT.2018.2879459","ee":"https://doi.org/10.1109/JIOT.2018.2879459","url":"https://dblp.org/rec/journals/iotj/MukherjeeMCO19"}, "url":"URL#1999736" }, { "@score":"1", "@id":"1999737", "info":{"authors":{"author":[{"@pid":"160/3215","text":"Anandarup Mukherjee"},{"@pid":"36/1023","text":"Sudip Misra"},{"@pid":"158/5242","text":"Narendra Singh Raghuwanshi"},{"@pid":"07/6170","text":"Sushmita Mitra"}]},"title":"Blind Entity Identification for Agricultural IoT Deployments.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"3156-3163","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/MukherjeeMRM19","doi":"10.1109/JIOT.2018.2879454","ee":"https://doi.org/10.1109/JIOT.2018.2879454","url":"https://dblp.org/rec/journals/iotj/MukherjeeMRM19"}, "url":"URL#1999737" }, { "@score":"1", "@id":"1999738", "info":{"authors":{"author":[{"@pid":"33/6012","text":"Shahid Mumtaz"},{"@pid":"92/7742","text":"Anwer Al-Dulaimi"},{"@pid":"33/4569","text":"Valerio Frascolla"},{"@pid":"29/7910","text":"Syed Ali Hassan 0001"},{"@pid":"32/6803","text":"Octavia A. Dobre"}]},"title":"Guest Editorial Special Issue on 5G and Beyond - Mobile Technologies and Applications for IoT.","venue":"IEEE Internet Things J.","volume":"6","number":"1","pages":"203-206","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/MumtazAFHD19","doi":"10.1109/JIOT.2019.2896749","ee":"https://doi.org/10.1109/JIOT.2019.2896749","url":"https://dblp.org/rec/journals/iotj/MumtazAFHD19"}, "url":"URL#1999738" }, { "@score":"1", "@id":"1999739", "info":{"authors":{"author":[{"@pid":"165/3401","text":"Esteban Municio"},{"@pid":"123/3351","text":"Glenn Daneels"},{"@pid":"218/0305","text":"Mathias De Brouwer"},{"@pid":"62/738","text":"Femke Ongenae"},{"@pid":"30/888","text":"Filip De Turck"},{"@pid":"46/2498","text":"Bart Braem"},{"@pid":"01/6700","text":"Jeroen Famaey"},{"@pid":"23/2276","text":"Steven Latré"}]},"title":"Continuous Athlete Monitoring in Challenging Cycling Environments Using IoT Technologies.","venue":"IEEE Internet Things J.","volume":"6","number":"6","pages":"10875-10887","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/MunicioDBOTBFL19","doi":"10.1109/JIOT.2019.2942761","ee":"https://doi.org/10.1109/JIOT.2019.2942761","url":"https://dblp.org/rec/journals/iotj/MunicioDBOTBFL19"}, "url":"URL#1999739" }, { "@score":"1", "@id":"1999740", "info":{"authors":{"author":[{"@pid":"179/0096","text":"Md. Shirajum Munir"},{"@pid":"160/2508","text":"Sarder Fakhrul Abedin"},{"@pid":"03/1312","text":"Nguyen Hoang Tran"},{"@pid":"73/1778","text":"Choong Seon Hong"}]},"title":"When Edge Computing Meets Microgrid: A Deep Reinforcement Learning Approach.","venue":"IEEE Internet Things J.","volume":"6","number":"5","pages":"7360-7374","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/MunirATH19","doi":"10.1109/JIOT.2019.2899673","ee":"https://doi.org/10.1109/JIOT.2019.2899673","url":"https://dblp.org/rec/journals/iotj/MunirATH19"}, "url":"URL#1999740" }, { "@score":"1", "@id":"1999741", "info":{"authors":{"author":[{"@pid":"38/2797","text":"Rubén Muñiz"},{"@pid":"119/5414","text":"Juan Díaz 0001"},{"@pid":"115/8141","text":"Fernando Nuño 0001"},{"@pid":"119/5485","text":"Miguel J. Prieto"},{"@pid":"126/1506","text":"Alberto M. Pernia"}]},"title":"A Smart Power Meter to Recharge Electric Vehicles in Communal Parking Areas.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"3448-3454","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/MunizGGPP19","doi":"10.1109/JIOT.2018.2885171","ee":"https://doi.org/10.1109/JIOT.2018.2885171","url":"https://dblp.org/rec/journals/iotj/MunizGGPP19"}, "url":"URL#1999741" }, { "@score":"1", "@id":"1999742", "info":{"authors":{"author":[{"@pid":"240/7028","text":"Sarumathi Murali"},{"@pid":"76/4975","text":"Abbas Jamalipour"}]},"title":"Mobility-Aware Energy-Efficient Parent Selection Algorithm for Low Power and Lossy Networks.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"2593-2601","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/MuraliJ19","doi":"10.1109/JIOT.2018.2872443","ee":"https://doi.org/10.1109/JIOT.2018.2872443","url":"https://dblp.org/rec/journals/iotj/MuraliJ19"}, "url":"URL#1999742" }, { "@score":"1", "@id":"1999743", "info":{"authors":{"author":[{"@pid":"24/10381","text":"Woongsoo Na"},{"@pid":"187/0635","text":"Seonmin Jang"},{"@pid":"243/6463","text":"Yoonseong Lee"},{"@pid":"95/10850","text":"Laihyuk Park"},{"@pid":"160/2661","text":"Nhu-Ngoc Dao"},{"@pid":"39/3158","text":"Sungrae Cho"}]},"title":"Frequency Resource Allocation and Interference Management in Mobile Edge Computing for an Internet of Things System.","venue":"IEEE Internet Things J.","volume":"6","number":"3","pages":"4910-4920","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/NaJLPDC19","doi":"10.1109/JIOT.2018.2885348","ee":"https://doi.org/10.1109/JIOT.2018.2885348","url":"https://dblp.org/rec/journals/iotj/NaJLPDC19"}, "url":"URL#1999743" }, { "@score":"1", "@id":"1999744", "info":{"authors":{"author":[{"@pid":"162/3727","text":"Zhenyu Na"},{"@pid":"191/9417","text":"Jiaqi Lv"},{"@pid":"58/3794-2","text":"Fan Jiang 0002"},{"@pid":"46/6196","text":"Mudi Xiong"},{"@pid":"84/4581-1","text":"Nan Zhao 0001"}]},"title":"Joint Subcarrier and Subsymbol Allocation-Based Simultaneous Wireless Information and Power Transfer for Multiuser GFDM in IoT.","venue":"IEEE Internet Things J.","volume":"6","number":"4","pages":"5999-6006","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/NaLJXZ19","doi":"10.1109/JIOT.2018.2865248","ee":"https://doi.org/10.1109/JIOT.2018.2865248","url":"https://dblp.org/rec/journals/iotj/NaLJXZ19"}, "url":"URL#1999744" }, { "@score":"1", "@id":"1999745", "info":{"authors":{"author":[{"@pid":"162/3727","text":"Zhenyu Na"},{"@pid":"57/6739","text":"Zheng Pan"},{"@pid":"46/6196","text":"Mudi Xiong"},{"@pid":"216/4733","text":"Junjuan Xia"},{"@pid":"132/8062","text":"Weidang Lu"}]},"title":"Soft Decision Control Iterative Channel Estimation for the Internet of Things in 5G Networks.","venue":"IEEE Internet Things J.","volume":"6","number":"4","pages":"5990-5998","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/NaPXXL19","doi":"10.1109/JIOT.2018.2864213","ee":"https://doi.org/10.1109/JIOT.2018.2864213","url":"https://dblp.org/rec/journals/iotj/NaPXXL19"}, "url":"URL#1999745" }, { "@score":"1", "@id":"1999746", "info":{"authors":{"author":[{"@pid":"89/7910","text":"Iynkaran Natgunanathan"},{"@pid":"44/1954","text":"Mohammad Belayet Hossain"},{"@pid":"98/2912-1","text":"Yong Xiang 0001"},{"@pid":"44/7500","text":"Longxiang Gao"},{"@pid":"17/6253","text":"Dezhong Peng"},{"@pid":"l/JianxinLi","text":"Jianxin Li 0001"}]},"title":"Progressive Average-Based Smart Meter Privacy Enhancement Using Rechargeable Batteries.","venue":"IEEE Internet Things J.","volume":"6","number":"6","pages":"9816-9828","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/NatgunanathanHX19","doi":"10.1109/JIOT.2019.2932085","ee":"https://doi.org/10.1109/JIOT.2019.2932085","url":"https://dblp.org/rec/journals/iotj/NatgunanathanHX19"}, "url":"URL#1999746" }, { "@score":"1", "@id":"1999747", "info":{"authors":{"author":[{"@pid":"89/7910","text":"Iynkaran Natgunanathan"},{"@pid":"122/3956","text":"Abid Mehmood"},{"@pid":"98/2912-1","text":"Yong Xiang 0001"},{"@pid":"44/7500","text":"Longxiang Gao"},{"@pid":"90/3575-1","text":"Shui Yu 0001"}]},"title":"Location Privacy Protection in Smart Health Care System.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"3055-3069","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/NatgunanathanMX19","doi":"10.1109/JIOT.2018.2878917","ee":"https://doi.org/10.1109/JIOT.2018.2878917","url":"https://dblp.org/rec/journals/iotj/NatgunanathanMX19"}, "url":"URL#1999747" }, { "@score":"1", "@id":"1999748", "info":{"authors":{"author":[{"@pid":"251/1494","text":"Divya Negi"},{"@pid":"19/5099","text":"Suprio Ray"},{"@pid":"88/3562","text":"Rongxing Lu"}]},"title":"Pystin: Enabling Secure LBS in Smart Cities With Privacy-Preserving Top-k Spatial-Textual Query.","venue":"IEEE Internet Things J.","volume":"6","number":"5","pages":"7788-7799","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/NegiRL19","doi":"10.1109/JIOT.2019.2902483","ee":"https://doi.org/10.1109/JIOT.2019.2902483","url":"https://dblp.org/rec/journals/iotj/NegiRL19"}, "url":"URL#1999748" }, { "@score":"1", "@id":"1999749", "info":{"authors":{"author":[{"@pid":"140/7986","text":"Alexander Nelson"},{"@pid":"199/4517","text":"Greg Toth"},{"@pid":"63/9167","text":"Dennis Linders"},{"@pid":"00/6661-4","text":"Cuong Nguyen 0004"},{"@pid":"41/678","text":"Sokwoo Rhee"}]},"title":"Replication of Smart-City Internet of Things Assets in a Municipal Deployment.","venue":"IEEE Internet Things J.","volume":"6","number":"4","pages":"6715-6724","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/NelsonTLNR19","doi":"10.1109/JIOT.2019.2911010","ee":"https://doi.org/10.1109/JIOT.2019.2911010","url":"https://dblp.org/rec/journals/iotj/NelsonTLNR19"}, "url":"URL#1999749" }, { "@score":"1", "@id":"1999750", "info":{"authors":{"author":[{"@pid":"206/9862","text":"Nashreen Nesa"},{"@pid":"48/8740","text":"Indrajit Banerjee"}]},"title":"SensorRank: An Energy Efficient Sensor Activation Algorithm for Sensor Data Fusion in Wireless Networks.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"2532-2539","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/NesaB19","doi":"10.1109/JIOT.2018.2871469","ee":"https://doi.org/10.1109/JIOT.2018.2871469","url":"https://dblp.org/rec/journals/iotj/NesaB19"}, "url":"URL#1999750" }, { "@score":"1", "@id":"1999751", "info":{"authors":{"author":[{"@pid":"184/6373","text":"Pai Chet Ng"},{"@pid":"98/4279","text":"James She"}]},"title":"Denoising-Contractive Autoencoder for Robust Device-Free Occupancy Detection.","venue":"IEEE Internet Things J.","volume":"6","number":"6","pages":"9572-9582","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/NgS19","doi":"10.1109/JIOT.2019.2929822","ee":"https://doi.org/10.1109/JIOT.2019.2929822","url":"https://dblp.org/rec/journals/iotj/NgS19"}, "url":"URL#1999751" }, { "@score":"1", "@id":"1999752", "info":{"authors":{"author":[{"@pid":"184/6373","text":"Pai Chet Ng"},{"@pid":"98/4279","text":"James She"},{"@pid":"43/2493","text":"Rong Ran"}]},"title":"A Compressive Sensing Approach to Detect the Proximity Between Smartphones and BLE Beacons.","venue":"IEEE Internet Things J.","volume":"6","number":"4","pages":"7162-7174","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/NgSR19","doi":"10.1109/JIOT.2019.2914733","ee":"https://doi.org/10.1109/JIOT.2019.2914733","url":"https://dblp.org/rec/journals/iotj/NgSR19"}, "url":"URL#1999752" }, { "@score":"1", "@id":"1999753", "info":{"authors":{"author":[{"@pid":"151/8638-1","text":"Tien-Dung Nguyen 0001"},{"@pid":"05/1693","text":"Eui-Nam Huh"},{"@pid":"21/4301","text":"Minho Jo 0001"}]},"title":"Decentralized and Revised Content-Centric Networking-Based Service Deployment and Discovery Platform in Mobile Edge Computing for IoT Devices.","venue":"IEEE Internet Things J.","volume":"6","number":"3","pages":"4162-4175","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/NguyenHJ19","doi":"10.1109/JIOT.2018.2875489","ee":"https://doi.org/10.1109/JIOT.2018.2875489","url":"https://dblp.org/rec/journals/iotj/NguyenHJ19"}, "url":"URL#1999753" }, { "@score":"1", "@id":"1999754", "info":{"authors":{"author":[{"@pid":"39/8248","text":"Tung T. Nguyen"},{"@pid":"55/1768-1","text":"Ha H. Nguyen 0001"},{"@pid":"81/5580","text":"Robert Barton"},{"@pid":"88/7293","text":"Patrick Grossetete"}]},"title":"Efficient Design of Chirp Spread Spectrum Modulation for Low-Power Wide-Area Networks.","venue":"IEEE Internet Things J.","volume":"6","number":"6","pages":"9503-9515","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/NguyenNBG19","doi":"10.1109/JIOT.2019.2929496","ee":"https://doi.org/10.1109/JIOT.2019.2929496","url":"https://dblp.org/rec/journals/iotj/NguyenNBG19"}, "url":"URL#1999754" }, { "@score":"1", "@id":"1999755", "info":{"authors":{"author":[{"@pid":"194/7016","text":"Yuanzhi Ni"},{"@pid":"47/3877","text":"Jianping He 0001"},{"@pid":"20/8688-1","text":"Lin Cai 0001"},{"@pid":"p/JianpingPan","text":"Jianping Pan 0001"},{"@pid":"29/3883","text":"Yuming Bo"}]},"title":"Joint Roadside Unit Deployment and Service Task Assignment for Internet of Vehicles (IoV).","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"3271-3283","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/NiHCPB19","doi":"10.1109/JIOT.2018.2882436","ee":"https://doi.org/10.1109/JIOT.2018.2882436","url":"https://dblp.org/rec/journals/iotj/NiHCPB19"}, "url":"URL#1999755" }, { "@score":"1", "@id":"1999756", "info":{"authors":{"author":[{"@pid":"169/3095","text":"Aiden Nibali"},{"@pid":"23/3891","text":"Robert Ross"},{"@pid":"246/5501","text":"Lyle Parsons"}]},"title":"Remote Monitoring of Rodenticide Depletion.","venue":"IEEE Internet Things J.","volume":"6","number":"4","pages":"7116-7121","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/NibaliRP19","doi":"10.1109/JIOT.2019.2914237","ee":"https://doi.org/10.1109/JIOT.2019.2914237","url":"https://dblp.org/rec/journals/iotj/NibaliRP19"}, "url":"URL#1999756" }, { "@score":"1", "@id":"1999757", "info":{"authors":{"author":[{"@pid":"09/8234","text":"Zhaolong Ning"},{"@pid":"243/6454","text":"Peiran Dong"},{"@pid":"74/8773","text":"Xiangjie Kong 0001"},{"@pid":"62/3147","text":"Feng Xia 0001"}]},"title":"A Cooperative Partial Computation Offloading Scheme for Mobile Edge Computing Enabled Internet of Things.","venue":"IEEE Internet Things J.","volume":"6","number":"3","pages":"4804-4814","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/NingDKX19","doi":"10.1109/JIOT.2018.2868616","ee":"https://doi.org/10.1109/JIOT.2018.2868616","url":"https://dblp.org/rec/journals/iotj/NingDKX19"}, "url":"URL#1999757" }, { "@score":"1", "@id":"1999758", "info":{"authors":{"author":[{"@pid":"08/3821","text":"Huansheng Ning"},{"@pid":"17/558","text":"Xuesong Liu"},{"@pid":"174/0992","text":"Xiaozhen Ye"},{"@pid":"28/4019","text":"Jie He"},{"@pid":"z/WeishanZhang","text":"Weishan Zhang"},{"@pid":"92/4586","text":"Mahmoud Daneshmand"}]},"title":"Edge Computing-Based ID and nID Combined Identification and Resolution Scheme in IoT.","venue":"IEEE Internet Things J.","volume":"6","number":"4","pages":"6811-6821","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/NingLYHZD19","doi":"10.1109/JIOT.2019.2911564","ee":"https://doi.org/10.1109/JIOT.2019.2911564","url":"https://dblp.org/rec/journals/iotj/NingLYHZD19"}, "url":"URL#1999758" }, { "@score":"1", "@id":"1999759", "info":{"authors":{"author":[{"@pid":"08/3821","text":"Huansheng Ning"},{"@pid":"174/0992","text":"Xiaozhen Ye"},{"@pid":"252/4900","text":"Abdelkarim Ben Sada"},{"@pid":"90/241-1","text":"Lingfeng Mao 0001"},{"@pid":"92/4586","text":"Mahmoud Daneshmand"}]},"title":"An Attention Mechanism Inspired Selective Sensing Framework for Physical-Cyber Mapping in Internet of Things.","venue":"IEEE Internet Things J.","volume":"6","number":"6","pages":"9531-9544","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/NingYSMD19","doi":"10.1109/JIOT.2019.2929552","ee":"https://doi.org/10.1109/JIOT.2019.2929552","url":"https://dblp.org/rec/journals/iotj/NingYSMD19"}, "url":"URL#1999759" }, { "@score":"1", "@id":"1999760", "info":{"authors":{"author":[{"@pid":"67/229-3","text":"Kai Niu 0003"},{"@pid":"68/10002","text":"Fusang Zhang"},{"@pid":"239/4567","text":"Yuhang Jiang"},{"@pid":"75/198-1","text":"Jie Xiong 0001"},{"@pid":"11/808","text":"Qin Lv"},{"@pid":"228/5425","text":"Youwei Zeng"},{"@pid":"83/1359-1","text":"Daqing Zhang 0001"}]},"title":"WiMorse: A Contactless Morse Code Text Input System Using Ambient WiFi Signals.","venue":"IEEE Internet Things J.","volume":"6","number":"6","pages":"9993-10008","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/NiuZJXLZZ19","doi":"10.1109/JIOT.2019.2934904","ee":"https://doi.org/10.1109/JIOT.2019.2934904","url":"https://dblp.org/rec/journals/iotj/NiuZJXLZZ19"}, "url":"URL#1999760" }, { "@score":"1", "@id":"1999761", "info":{"authors":{"author":[{"@pid":"203/9363","text":"Francesca Nizzi"},{"@pid":"36/6792","text":"Tommaso Pecorella"},{"@pid":"78/1529","text":"Flavio Esposito"},{"@pid":"74/3210","text":"Laura Pierucci"},{"@pid":"51/3942","text":"Romano Fantacci"}]},"title":"IoT Security via Address Shuffling: The Easy Way.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"3764-3774","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/NizziPEPF19","doi":"10.1109/JIOT.2019.2892003","ee":"https://doi.org/10.1109/JIOT.2019.2892003","url":"https://dblp.org/rec/journals/iotj/NizziPEPF19"}, "url":"URL#1999761" }, { "@score":"1", "@id":"1999762", "info":{"authors":{"author":[{"@pid":"09/4268","text":"Moslem Noori"},{"@pid":"180/5616","text":"Samira Rahimian"},{"@pid":"84/2499","text":"Masoud Ardakani"}]},"title":"Capacity Region of ALOHA Protocol for Heterogeneous IoT Networks.","venue":"IEEE Internet Things J.","volume":"6","number":"5","pages":"8228-8236","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/NooriRA19","doi":"10.1109/JIOT.2019.2920161","ee":"https://doi.org/10.1109/JIOT.2019.2920161","url":"https://dblp.org/rec/journals/iotj/NooriRA19"}, "url":"URL#1999762" }, { "@score":"1", "@id":"1999763", "info":{"authors":{"author":[{"@pid":"205/0435","text":"Mahda Noura"},{"@pid":"35/10352","text":"Amelie Gyrard"},{"@pid":"132/0295","text":"Sebastian Heil"},{"@pid":"11/4107","text":"Martin Gaedke"}]},"title":"Automatic Knowledge Extraction to Build Semantic Web of Things Applications.","venue":"IEEE Internet Things J.","volume":"6","number":"5","pages":"8447-8454","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/NouraGHG19","doi":"10.1109/JIOT.2019.2918327","ee":"https://doi.org/10.1109/JIOT.2019.2918327","url":"https://dblp.org/rec/journals/iotj/NouraGHG19"}, "url":"URL#1999763" }, { "@score":"1", "@id":"1999764", "info":{"authors":{"author":[{"@pid":"133/3882","text":"Ed Novak"},{"@pid":"236/4614","text":"Zhuofan Tang"},{"@pid":"42/6066-1","text":"Qun Li 0001"}]},"title":"Ultrasound Proximity Networking on Smart Mobile Devices for IoT Applications.","venue":"IEEE Internet Things J.","volume":"6","number":"1","pages":"399-409","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/NovakTL19","doi":"10.1109/JIOT.2018.2848099","ee":"https://doi.org/10.1109/JIOT.2018.2848099","url":"https://dblp.org/rec/journals/iotj/NovakTL19"}, "url":"URL#1999764" }, { "@score":"1", "@id":"1999765", "info":{"authors":{"author":{"@pid":"173/0674","text":"Oscar Novo"}},"title":"Scalable Access Management in IoT Using Blockchain: A Performance Evaluation.","venue":"IEEE Internet Things J.","volume":"6","number":"3","pages":"4694-4701","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/Novo19","doi":"10.1109/JIOT.2018.2879679","ee":"https://doi.org/10.1109/JIOT.2018.2879679","url":"https://dblp.org/rec/journals/iotj/Novo19"}, "url":"URL#1999765" }, { "@score":"1", "@id":"1999766", "info":{"authors":{"author":[{"@pid":"251/1480","text":"Aditya Nugur"},{"@pid":"33/10728","text":"Manisa Pipattanasomporn"},{"@pid":"123/6436","text":"Murat Kuzlu"},{"@pid":"09/6367","text":"Saifur Rahman 0001"}]},"title":"Design and Development of an IoT Gateway for Smart Building Applications.","venue":"IEEE Internet Things J.","volume":"6","number":"5","pages":"9020-9029","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/NugurPKR19","doi":"10.1109/JIOT.2019.2926099","ee":"https://doi.org/10.1109/JIOT.2019.2926099","url":"https://dblp.org/rec/journals/iotj/NugurPKR19"}, "url":"URL#1999766" }, { "@score":"1", "@id":"1999767", "info":{"authors":{"author":[{"@pid":"132/0039","text":"Tamoghna Ojha"},{"@pid":"36/1023","text":"Sudip Misra"},{"@pid":"158/5242","text":"Narendra Singh Raghuwanshi"},{"@pid":"243/6456","text":"Hitesh Poddar"}]},"title":"DVSP: Dynamic Virtual Sensor Provisioning in Sensor-Cloud-Based Internet of Things.","venue":"IEEE Internet Things J.","volume":"6","number":"3","pages":"5265-5272","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/OjhaMRP19","doi":"10.1109/JIOT.2019.2899949","ee":"https://doi.org/10.1109/JIOT.2019.2899949","url":"https://dblp.org/rec/journals/iotj/OjhaMRP19"}, "url":"URL#1999767" }, { "@score":"1", "@id":"1999768", "info":{"authors":{"author":[{"@pid":"219/2786","text":"Richard Olaniyan"},{"@pid":"m/MuthucumaruMaheswaran","text":"Muthucumaru Maheswaran"}]},"title":"Multipoint Synchronization for Fog-Controlled Internet of Things.","venue":"IEEE Internet Things J.","volume":"6","number":"6","pages":"9656-9667","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/OlaniyanM19","doi":"10.1109/JIOT.2019.2930367","ee":"https://doi.org/10.1109/JIOT.2019.2930367","url":"https://dblp.org/rec/journals/iotj/OlaniyanM19"}, "url":"URL#1999768" }, { "@score":"1", "@id":"1999769", "info":{"authors":{"author":[{"@pid":"156/0318","text":"Babatunji Omoniwa"},{"@pid":"116/0844","text":"Riaz Hussain"},{"@pid":"70/2762-3","text":"Muhammad Adil 0003"},{"@pid":"203/3425","text":"Atif Shakeel"},{"@pid":"240/6856","text":"Ahmed Kamal Tahir"},{"@pid":"217/3361","text":"Qadeer Ul Hasan"},{"@pid":"122/4663","text":"Shahzad Ali Malik"}]},"title":"An Optimal Relay Scheme for Outage Minimization in Fog-Based Internet-of-Things (IoT) Networks.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"3044-3054","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/OmoniwaHASTHM19","doi":"10.1109/JIOT.2018.2878609","ee":"https://doi.org/10.1109/JIOT.2018.2878609","url":"https://dblp.org/rec/journals/iotj/OmoniwaHASTHM19"}, "url":"URL#1999769" }, { "@score":"1", "@id":"1999770", "info":{"authors":{"author":[{"@pid":"156/0318","text":"Babatunji Omoniwa"},{"@pid":"116/0844","text":"Riaz Hussain"},{"@pid":"180/3000","text":"Muhammad Awais Javed"},{"@pid":"31/3968","text":"Safdar Hussain Bouk"},{"@pid":"122/4663","text":"Shahzad Ali Malik"}]},"title":"Fog/Edge Computing-Based IoT (FECIoT): Architecture, Applications, and Research Issues.","venue":"IEEE Internet Things J.","volume":"6","number":"3","pages":"4118-4149","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/OmoniwaHJBM19","doi":"10.1109/JIOT.2018.2875544","ee":"https://doi.org/10.1109/JIOT.2018.2875544","url":"https://dblp.org/rec/journals/iotj/OmoniwaHJBM19"}, "url":"URL#1999770" }, { "@score":"1", "@id":"1999771", "info":{"authors":{"author":[{"@pid":"22/4296","text":"Jose Antonio Onieva"},{"@pid":"21/11139","text":"Ruben Rios"},{"@pid":"63/6414","text":"Rodrigo Roman"},{"@pid":"02/3236-1","text":"Javier López 0001"}]},"title":"Edge-Assisted Vehicular Networks Security.","venue":"IEEE Internet Things J.","volume":"6","number":"5","pages":"8038-8045","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/OnievaRRL19","doi":"10.1109/JIOT.2019.2904323","ee":"https://doi.org/10.1109/JIOT.2019.2904323","url":"https://dblp.org/rec/journals/iotj/OnievaRRL19"}, "url":"URL#1999771" }, { "@score":"1", "@id":"1999772", "info":{"authors":{"author":[{"@pid":"232/6776","text":"I-Che Ou"},{"@pid":"232/6771","text":"Jia-Ping Yang"},{"@pid":"63/2830","text":"Chia-Hung Liu"},{"@pid":"232/6773","text":"Kai-Jie Huang"},{"@pid":"180/3795","text":"Kun-Ju Tsai"},{"@pid":"88/5094","text":"Yu Lee"},{"@pid":"50/6180","text":"Yuan-Hua Chu"},{"@pid":"51/2473","text":"Yu-Te Liao"}]},"title":"A Sustainable Soil Energy Harvesting System With Wide-Range Power-Tracking Architecture.","venue":"IEEE Internet Things J.","volume":"6","number":"5","pages":"8384-8392","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/OuYLHTLCL19","doi":"10.1109/JIOT.2019.2917593","ee":"https://doi.org/10.1109/JIOT.2019.2917593","url":"https://dblp.org/rec/journals/iotj/OuYLHTLCL19"}, "url":"URL#1999772" }, { "@score":"1", "@id":"1999773", "info":{"authors":{"author":[{"@pid":"219/2564","text":"Murat Ozatay"},{"@pid":"90/2252","text":"Naveen Verma"}]},"title":"Exploiting Emerging Sensing Technologies Toward Structure in Data for Enhancing Perception in Human-Centric Applications.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"3411-3422","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/OzatayV19","doi":"10.1109/JIOT.2018.2883905","ee":"https://doi.org/10.1109/JIOT.2018.2883905","url":"https://dblp.org/rec/journals/iotj/OzatayV19"}, "url":"URL#1999773" }, { "@score":"1", "@id":"1999774", "info":{"authors":{"author":[{"@pid":"141/1284","text":"Daniele Palossi"},{"@pid":"203/5131","text":"Antonio Loquercio"},{"@pid":"50/8932-1","text":"Francesco Conti 0001"},{"@pid":"35/7358","text":"Eric Flamand"},{"@pid":"62/3318","text":"Davide Scaramuzza 0001"},{"@pid":"b/LucaBenini","text":"Luca Benini"}]},"title":"A 64-mW DNN-Based Visual Navigation Engine for Autonomous Nano-Drones.","venue":"IEEE Internet Things J.","volume":"6","number":"5","pages":"8357-8371","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/PalossiLCFSB19","doi":"10.1109/JIOT.2019.2917066","ee":"https://doi.org/10.1109/JIOT.2019.2917066","url":"https://dblp.org/rec/journals/iotj/PalossiLCFSB19"}, "url":"URL#1999774" }, { "@score":"1", "@id":"1999775", "info":{"authors":{"author":[{"@pid":"126/5636-1","text":"Shengli Pan 0001"},{"@pid":"83/6353-17","text":"Peng Li 0017"},{"@pid":"08/5937","text":"Deze Zeng"},{"@pid":"01/267-1","text":"Song Guo 0001"},{"@pid":"06/1031","text":"Guangmin Hu"}]},"title":"A Q-Learning Based Framework for Congested Link Identification.","venue":"IEEE Internet Things J.","volume":"6","number":"6","pages":"9668-9678","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/PanLZGH19","doi":"10.1109/JIOT.2019.2930459","ee":"https://doi.org/10.1109/JIOT.2019.2930459","url":"https://dblp.org/rec/journals/iotj/PanLZGH19"}, "url":"URL#1999775" }, { "@score":"1", "@id":"1999776", "info":{"authors":{"author":[{"@pid":"15/6904","text":"Jianli Pan"},{"@pid":"98/6805","text":"Jianyu Wang"},{"@pid":"222/3021","text":"Austin Hester"},{"@pid":"136/3452","text":"Ismail AlQerm"},{"@pid":"142/9018","text":"Yuanni Liu"},{"@pid":"00/4089","text":"Ying Zhao"}]},"title":"EdgeChain: An Edge-IoT Framework and Prototype Based on Blockchain and Smart Contracts.","venue":"IEEE Internet Things J.","volume":"6","number":"3","pages":"4719-4732","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/PanWHALZ19","doi":"10.1109/JIOT.2018.2878154","ee":"https://doi.org/10.1109/JIOT.2018.2878154","url":"https://dblp.org/rec/journals/iotj/PanWHALZ19"}, "url":"URL#1999776" }, { "@score":"1", "@id":"1999777", "info":{"authors":{"author":[{"@pid":"95/10850","text":"Laihyuk Park"},{"@pid":"219/7793","text":"Chunghyun Lee"},{"@pid":"69/4977","text":"Joongheon Kim"},{"@pid":"70/2832","text":"Aziz Mohaisen"},{"@pid":"39/3158","text":"Sungrae Cho"}]},"title":"Two-Stage IoT Device Scheduling With Dynamic Programming for Energy Internet Systems.","venue":"IEEE Internet Things J.","volume":"6","number":"5","pages":"8782-8791","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/ParkLKMC19","doi":"10.1109/JIOT.2019.2923432","ee":"https://doi.org/10.1109/JIOT.2019.2923432","url":"https://dblp.org/rec/journals/iotj/ParkLKMC19"}, "url":"URL#1999777" }, { "@score":"1", "@id":"1999778", "info":{"authors":{"author":[{"@pid":"p/JongHyukPark","text":"Jong Hyuk Park"},{"@pid":"62/577","text":"Vincenzo Piuri"},{"@pid":"41/2526","text":"Hsiao-Hwa Chen"},{"@pid":"46/7028-1","text":"Yi Pan 0001"}]},"title":"Guest Editorial Special Issue on Advanced Computational Technologies in Mobile Edge Computing for the Internet of Things.","venue":"IEEE Internet Things J.","volume":"6","number":"3","pages":"4742-4743","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/ParkPCP19","doi":"10.1109/JIOT.2019.2921237","ee":"https://doi.org/10.1109/JIOT.2019.2921237","url":"https://dblp.org/rec/journals/iotj/ParkPCP19"}, "url":"URL#1999778" }, { "@score":"1", "@id":"1999779", "info":{"authors":{"author":[{"@pid":"165/5483","text":"Taehyeun Park"},{"@pid":"41/6237","text":"Walid Saad"}]},"title":"Distributed Learning for Low Latency Machine Type Communication in a Massive Internet of Things.","venue":"IEEE Internet Things J.","volume":"6","number":"3","pages":"5562-5576","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/ParkS19","doi":"10.1109/JIOT.2019.2903832","ee":"https://doi.org/10.1109/JIOT.2019.2903832","url":"https://dblp.org/rec/journals/iotj/ParkS19"}, "url":"URL#1999779" }, { "@score":"1", "@id":"1999780", "info":{"authors":{"author":[{"@pid":"178/9895","text":"Rahul Krishnan Pathinarupothi"},{"@pid":"212/0566","text":"P. Durga"},{"@pid":"185/5237","text":"Ekanath Srihari Rangan"}]},"title":"IoT-Based Smart Edge for Global Health: Remote Monitoring With Severity Detection and Alerts Transmission.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"2449-2462","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/PathinarupothiD19","doi":"10.1109/JIOT.2018.2870068","ee":"https://doi.org/10.1109/JIOT.2018.2870068","url":"https://dblp.org/rec/journals/iotj/PathinarupothiD19"}, "url":"URL#1999780" }, { "@score":"1", "@id":"1999781", "info":{"authors":{"author":[{"@pid":"240/7074","text":"Carlos Gonzalo Peces"},{"@pid":"06/6831","text":"Joakim Eriksson"},{"@pid":"92/2319","text":"Nicolas Tsiftes"}]},"title":"Sleepy Devices Versus Radio Duty Cycling: The Case of Lightweight M2M.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"2550-2562","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/PecesET19","doi":"10.1109/JIOT.2018.2871721","ee":"https://doi.org/10.1109/JIOT.2018.2871721","url":"https://dblp.org/rec/journals/iotj/PecesET19"}, "url":"URL#1999781" }, { "@score":"1", "@id":"1999782", "info":{"authors":{"author":[{"@pid":"214/6617","text":"Sasi Vinay Pechetti"},{"@pid":"91/7721","text":"Abhishek Jindal"},{"@pid":"83/4862","text":"Ranjan Bose"}]},"title":"Exploiting Mapping Diversity for Enhancing Security at Physical Layer in the Internet of Things.","venue":"IEEE Internet Things J.","volume":"6","number":"1","pages":"532-544","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/PechettiJB19","doi":"10.1109/JIOT.2018.2842056","ee":"https://doi.org/10.1109/JIOT.2018.2842056","url":"https://dblp.org/rec/journals/iotj/PechettiJB19"}, "url":"URL#1999782" }, { "@score":"1", "@id":"1999783", "info":{"authors":{"author":[{"@pid":"16/5560-3","text":"Wei Peng 0003"},{"@pid":"28/2073","text":"Wei Gao"},{"@pid":"40/6246-1","text":"Jiajia Liu 0001"}]},"title":"AI-Enabled Massive Devices Multiple Access for Smart City.","venue":"IEEE Internet Things J.","volume":"6","number":"5","pages":"7623-7634","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/PengGL19","doi":"10.1109/JIOT.2019.2902448","ee":"https://doi.org/10.1109/JIOT.2019.2902448","url":"https://dblp.org/rec/journals/iotj/PengGL19"}, "url":"URL#1999783" }, { "@score":"1", "@id":"1999784", "info":{"authors":{"author":[{"@pid":"118/5837","text":"Linning Peng"},{"@pid":"55/4757","text":"Aiqun Hu"},{"@pid":"121/9031","text":"Junqing Zhang"},{"@pid":"21/4633","text":"Yu Jiang"},{"@pid":"191/6530","text":"Jiabao Yu"},{"@pid":"13/3953","text":"Yan Yan"}]},"title":"Design of a Hybrid RF Fingerprint Extraction and Device Classification Scheme.","venue":"IEEE Internet Things J.","volume":"6","number":"1","pages":"349-360","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/PengHZJYY19","doi":"10.1109/JIOT.2018.2838071","ee":"https://doi.org/10.1109/JIOT.2018.2838071","url":"https://dblp.org/rec/journals/iotj/PengHZJYY19"}, "url":"URL#1999784" }, { "@score":"1", "@id":"1999785", "info":{"authors":{"author":[{"@pid":"40/1762","text":"Haipeng Peng"},{"@pid":"240/7217","text":"Yaqi Mi"},{"@pid":"73/6284","text":"Lixiang Li 0001"},{"@pid":"24/5927","text":"Harry Eugene Stanley"},{"@pid":"33/5774","text":"Yixian Yang"}]},"title":"P-Tensor Product in Compressed Sensing.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"3492-3511","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/PengMLSY19","doi":"10.1109/JIOT.2018.2886841","ee":"https://doi.org/10.1109/JIOT.2018.2886841","url":"https://dblp.org/rec/journals/iotj/PengMLSY19"}, "url":"URL#1999785" }, { "@score":"1", "@id":"1999786", "info":{"authors":{"author":[{"@pid":"246/5471","text":"Eric E. Petrosky"},{"@pid":"09/9853","text":"Alan J. Michaels"},{"@pid":"246/5473","text":"Devin B. Ridge"}]},"title":"Network Scalability Comparison of IEEE 802.15.4 and Receiver-Assigned CDMA.","venue":"IEEE Internet Things J.","volume":"6","number":"4","pages":"6060-6069","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/PetroskyMR19","doi":"10.1109/JIOT.2018.2884455","ee":"https://doi.org/10.1109/JIOT.2018.2884455","url":"https://dblp.org/rec/journals/iotj/PetroskyMR19"}, "url":"URL#1999786" }, { "@score":"1", "@id":"1999787", "info":{"authors":{"author":[{"@pid":"236/4714","text":"Zhuying Piao"},{"@pid":"75/6927","text":"Mugen Peng"},{"@pid":"60/8967","text":"Yaqiong Liu"},{"@pid":"92/4586","text":"Mahmoud Daneshmand"}]},"title":"Recent Advances of Edge Cache in Radio Access Networks for Internet of Things: Techniques, Performances, and Challenges.","venue":"IEEE Internet Things J.","volume":"6","number":"1","pages":"1010-1028","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/PiaoPLD19","doi":"10.1109/JIOT.2018.2866709","ee":"https://doi.org/10.1109/JIOT.2018.2866709","url":"https://dblp.org/rec/journals/iotj/PiaoPLD19"}, "url":"URL#1999787" }, { "@score":"1", "@id":"1999788", "info":{"authors":{"author":[{"@pid":"207/4259","text":"Behrouz Pourghebleh"},{"@pid":"173/8854","text":"Karzan Wakil"},{"@pid":"48/7665","text":"Nima Jafari Navimipour"}]},"title":"A Comprehensive Study on the Trust Management Techniques in the Internet of Things.","venue":"IEEE Internet Things J.","volume":"6","number":"6","pages":"9326-9337","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/PourgheblehWN19","doi":"10.1109/JIOT.2019.2933518","ee":"https://doi.org/10.1109/JIOT.2019.2933518","url":"https://dblp.org/rec/journals/iotj/PourgheblehWN19"}, "url":"URL#1999788" }, { "@score":"1", "@id":"1999789", "info":{"authors":{"author":[{"@pid":"119/2673","text":"Lingjun Pu"},{"@pid":"83/6331-4","text":"Xu Chen 0004"},{"@pid":"48/314","text":"Guoqiang Mao"},{"@pid":"220/1598","text":"Qinyi Xie"},{"@pid":"82/1193","text":"Jingdong Xu"}]},"title":"Chimera: An Energy-Efficient and Deadline-Aware Hybrid Edge Computing Framework for Vehicular Crowdsensing Applications.","venue":"IEEE Internet Things J.","volume":"6","number":"1","pages":"84-99","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/PuCMXX19","doi":"10.1109/JIOT.2018.2872436","ee":"https://doi.org/10.1109/JIOT.2018.2872436","url":"https://dblp.org/rec/journals/iotj/PuCMXX19"}, "url":"URL#1999789" }, { "@score":"1", "@id":"1999790", "info":{"authors":{"author":[{"@pid":"23/3287","text":"Yi-Fei Pu"},{"@pid":"19/1166","text":"Ni Zhang"},{"@pid":"80/2875","text":"Huai Wang"}]},"title":"Fractional-Order Spatial Steganography and Blind Steganalysis for Printed Matter: Anti-Counterfeiting for Product External Packing in Internet-of-Things.","venue":"IEEE Internet Things J.","volume":"6","number":"4","pages":"6368-6383","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/PuZW19","doi":"10.1109/JIOT.2018.2886996","ee":"https://doi.org/10.1109/JIOT.2018.2886996","url":"https://dblp.org/rec/journals/iotj/PuZW19"}, "url":"URL#1999790" }, { "@score":"1", "@id":"1999791", "info":{"authors":{"author":[{"@pid":"245/8402","text":"Jakub Pullmann"},{"@pid":"26/9782","text":"Dominik Macko"}]},"title":"A New Planning-Based Collision-Prevention Mechanism in Long-Range IoT Networks.","venue":"IEEE Internet Things J.","volume":"6","number":"6","pages":"9439-9446","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/PullmannM19","doi":"10.1109/JIOT.2019.2940994","ee":"https://doi.org/10.1109/JIOT.2019.2940994","url":"https://dblp.org/rec/journals/iotj/PullmannM19"}, "url":"URL#1999791" }, { "@score":"1", "@id":"1999792", "info":{"authors":{"author":{"@pid":"154/0895","text":"Deepak Puthal"}},"title":"Lattice-Modeled Information Flow Control of Big Sensing Data Streams for Smart Health Application.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"1312-1320","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/Puthal19","doi":"10.1109/JIOT.2018.2805896","ee":"https://doi.org/10.1109/JIOT.2018.2805896","url":"https://dblp.org/rec/journals/iotj/Puthal19"}, "url":"URL#1999792" }, { "@score":"1", "@id":"1999793", "info":{"authors":{"author":[{"@pid":"243/6429","text":"Seno Adi Putra"},{"@pid":"75/2930","text":"Bambang Riyanto Trilaksono"},{"@pid":"243/6449","text":"Muhammad Riyansyah"},{"@pid":"77/3529","text":"Dina Shona Laila"},{"@pid":"02/4930","text":"Agung Harsoyo"},{"@pid":"72/4278","text":"Achmad Imam Kistijantoro"}]},"title":"Intelligent Sensing in Multiagent-Based Wireless Sensor Network for Bridge Condition Monitoring System.","venue":"IEEE Internet Things J.","volume":"6","number":"3","pages":"5397-5410","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/PutraTRLHK19","doi":"10.1109/JIOT.2019.2901796","ee":"https://doi.org/10.1109/JIOT.2019.2901796","url":"https://dblp.org/rec/journals/iotj/PutraTRLHK19"}, "url":"URL#1999793" }, { "@score":"1", "@id":"1999794", "info":{"authors":{"author":[{"@pid":"240/6901","text":"Qiao Qi"},{"@pid":"72/2676-1","text":"Xiaoming Chen 0001"}]},"title":"Wireless Powered Massive Access for Cellular Internet of Things With Imperfect SIC and Nonlinear EH.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"3110-3120","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/QiC19","doi":"10.1109/JIOT.2018.2878860","ee":"https://doi.org/10.1109/JIOT.2018.2878860","url":"https://dblp.org/rec/journals/iotj/QiC19"}, "url":"URL#1999794" }, { "@score":"1", "@id":"1999795", "info":{"authors":{"author":[{"@pid":"133/4051-1","text":"Jun Qi 0001"},{"@pid":"88/5343-1","text":"Po Yang 0001"},{"@pid":"87/2504","text":"Martin Hanneghan"},{"@pid":"41/3231-1","text":"Stephen Tang 0001"},{"@pid":"65/3628-1","text":"Bo Zhou 0001"}]},"title":"A Hybrid Hierarchical Framework for Gym Physical Activity Recognition and Measurement Using Wearable Sensors.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"1384-1393","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/QiYHTZ19","doi":"10.1109/JIOT.2018.2846359","ee":"https://doi.org/10.1109/JIOT.2018.2846359","url":"https://dblp.org/rec/journals/iotj/QiYHTZ19"}, "url":"URL#1999795" }, { "@score":"1", "@id":"1999796", "info":{"authors":{"author":[{"@pid":"132/6446","text":"Li Ping Qian 0001"},{"@pid":"227/4454","text":"Anqi Feng"},{"@pid":"227/4474","text":"Yupin Huang"},{"@pid":"41/5176-1","text":"Yuan Wu 0001"},{"@pid":"67/8454-1","text":"Bo Ji 0001"},{"@pid":"34/520-1","text":"Zhiguo Shi 0001"}]},"title":"Optimal SIC Ordering and Computation Resource Allocation in MEC-Aware NOMA NB-IoT Networks.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"2806-2816","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/QianFHWJS19","doi":"10.1109/JIOT.2018.2875046","ee":"https://doi.org/10.1109/JIOT.2018.2875046","url":"https://dblp.org/rec/journals/iotj/QianFHWJS19"}, "url":"URL#1999796" }, { "@score":"1", "@id":"1999797", "info":{"authors":{"author":[{"@pid":"71/944","text":"Jing Qian"},{"@pid":"128/1577","text":"Aaron N. Parks"},{"@pid":"s/JoshuaRSmith","text":"Joshua R. Smith 0001"},{"@pid":"20/6898","text":"Feifei Gao"},{"@pid":"49/5340-2","text":"Shi Jin 0002"}]},"title":"IoT Communications With $M$ -PSK Modulated Ambient Backscatter: Algorithm, Analysis, and Implementation.","venue":"IEEE Internet Things J.","volume":"6","number":"1","pages":"844-855","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/QianPSGJ19","doi":"10.1109/JIOT.2018.2861401","ee":"https://doi.org/10.1109/JIOT.2018.2861401","url":"https://dblp.org/rec/journals/iotj/QianPSGJ19"}, "url":"URL#1999797" }, { "@score":"1", "@id":"1999798", "info":{"authors":{"author":[{"@pid":"133/5246","text":"Yuwen Qian"},{"@pid":"236/4528","text":"Jiahui Yan"},{"@pid":"96/5680","text":"Haibing Guan"},{"@pid":"l/JunLi4","text":"Jun Li 0004"},{"@pid":"20/4512","text":"Xiangwei Zhou"},{"@pid":"157/9360","text":"Shengjie Guo"},{"@pid":"132/7952","text":"Dushantha Nalin K. Jayakody"}]},"title":"Design of Hybrid Wireless and Power Line Sensor Networks With Dual-Interface Relay in IoT.","venue":"IEEE Internet Things J.","volume":"6","number":"1","pages":"239-249","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/QianYGLZGJ19","doi":"10.1109/JIOT.2017.2725451","ee":"https://doi.org/10.1109/JIOT.2017.2725451","url":"https://dblp.org/rec/journals/iotj/QianYGLZGJ19"}, "url":"URL#1999798" }, { "@score":"1", "@id":"1999799", "info":{"authors":{"author":[{"@pid":"04/6584-1","text":"Bo Qian 0001"},{"@pid":"14/8431","text":"Haibo Zhou"},{"@pid":"214/2000-1","text":"Feng Lyu 0001"},{"@pid":"45/10335","text":"Jinglin Li"},{"@pid":"30/4463-4","text":"Ting Ma 0004"},{"@pid":"50/2156","text":"Fen Hou"}]},"title":"Toward Collision-Free and Efficient Coordination for Automated Vehicles at Unsignalized Intersection.","venue":"IEEE Internet Things J.","volume":"6","number":"6","pages":"10408-10420","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/QianZLLMH19","doi":"10.1109/JIOT.2019.2939180","ee":"https://doi.org/10.1109/JIOT.2019.2939180","url":"https://dblp.org/rec/journals/iotj/QianZLLMH19"}, "url":"URL#1999799" }, { "@score":"1", "@id":"1999800", "info":{"authors":{"author":[{"@pid":"177/7977","text":"Yuan Qin"},{"@pid":"08/1254","text":"David E. Boyle"},{"@pid":"61/5921","text":"Eric M. Yeatman"}]},"title":"Efficient and Reliable Aerial Communication With Wireless Sensors.","venue":"IEEE Internet Things J.","volume":"6","number":"5","pages":"9000-9011","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/QinBY19","doi":"10.1109/JIOT.2019.2926249","ee":"https://doi.org/10.1109/JIOT.2019.2926249","url":"https://dblp.org/rec/journals/iotj/QinBY19"}, "url":"URL#1999800" }, { "@score":"1", "@id":"1999801", "info":{"authors":{"author":[{"@pid":"98/2482","text":"Hua Qin"},{"@pid":"32/4331","text":"Weihong Chen"},{"@pid":"172/2950","text":"Buwen Cao"},{"@pid":"71/425","text":"Min Zeng"},{"@pid":"88/11407","text":"Jessica Li"},{"@pid":"58/2119","text":"Yang Peng"}]},"title":"DIPS: Dual-Interface Dual-Pipeline Scheduling for Energy-Efficient Multihop Communications in IoT.","venue":"IEEE Internet Things J.","volume":"6","number":"1","pages":"718-733","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/QinCCZLP19","doi":"10.1109/JIOT.2018.2855695","ee":"https://doi.org/10.1109/JIOT.2018.2855695","url":"https://dblp.org/rec/journals/iotj/QinCCZLP19"}, "url":"URL#1999801" }, { "@score":"1", "@id":"1999802", "info":{"authors":{"author":[{"@pid":"12/4594","text":"Min Qin"},{"@pid":"c/LiChen15","text":"Li Chen 0015"},{"@pid":"84/4581-1","text":"Nan Zhao 0001"},{"@pid":"93/4847-1","text":"Yunfei Chen 0001"},{"@pid":"16/6654","text":"F. Richard Yu"},{"@pid":"64/5216-1","text":"Guo Wei 0001"}]},"title":"Power-Constrained Edge Computing With Maximum Processing Capacity for IoT Networks.","venue":"IEEE Internet Things J.","volume":"6","number":"3","pages":"4330-4343","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/QinCZCYW19","doi":"10.1109/JIOT.2018.2875218","ee":"https://doi.org/10.1109/JIOT.2018.2875218","url":"https://dblp.org/rec/journals/iotj/QinCZCYW19"}, "url":"URL#1999802" }, { "@score":"1", "@id":"1999803", "info":{"authors":{"author":[{"@pid":"06/864-0002","text":"Zhen Qin 0002"},{"@pid":"251/1433","text":"Lingzhou Hu"},{"@pid":"181/2597-7","text":"Ning Zhang 0007"},{"@pid":"136/5825","text":"Dajiang Chen"},{"@pid":"50/7188-1","text":"Kuan Zhang 0001"},{"@pid":"52/1374","text":"Zhiguang Qin"},{"@pid":"c/KimKwangRaymondChoo","text":"Kim-Kwang Raymond Choo"}]},"title":"Learning-Aided User Identification Using Smartphone Sensors for Smart Homes.","venue":"IEEE Internet Things J.","volume":"6","number":"5","pages":"7760-7772","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/QinHZCZQC19","doi":"10.1109/JIOT.2019.2900862","ee":"https://doi.org/10.1109/JIOT.2019.2900862","url":"https://dblp.org/rec/journals/iotj/QinHZCZQC19"}, "url":"URL#1999803" }, { "@score":"1", "@id":"1999804", "info":{"authors":{"author":[{"@pid":"217/7213","text":"Chengrun Qiu"},{"@pid":"43/4685-6","text":"Yang Hu 0006"},{"@pid":"88/2827-7","text":"Yan Chen 0007"},{"@pid":"26/3636","text":"Bing Zeng"}]},"title":"Deep Deterministic Policy Gradient (DDPG)-Based Energy Harvesting Wireless Communications.","venue":"IEEE Internet Things J.","volume":"6","number":"5","pages":"8577-8588","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/QiuHCZ19","doi":"10.1109/JIOT.2019.2921159","ee":"https://doi.org/10.1109/JIOT.2019.2921159","url":"https://dblp.org/rec/journals/iotj/QiuHCZ19"}, "url":"URL#1999804" }, { "@score":"1", "@id":"1999805", "info":{"authors":{"author":[{"@pid":"119/0910","text":"Chao Qiu"},{"@pid":"16/6654","text":"F. Richard Yu"},{"@pid":"59/8489","text":"Haipeng Yao"},{"@pid":"00/8334","text":"Chunxiao Jiang"},{"@pid":"05/3630","text":"Fangmin Xu"},{"@pid":"44/9410","text":"Chenglin Zhao"}]},"title":"Blockchain-Based Software-Defined Industrial Internet of Things: A Dueling Deep ${Q}$ -Learning Approach.","venue":"IEEE Internet Things J.","volume":"6","number":"3","pages":"4627-4639","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/QiuYYJXZ19","doi":"10.1109/JIOT.2018.2871394","ee":"https://doi.org/10.1109/JIOT.2018.2871394","url":"https://dblp.org/rec/journals/iotj/QiuYYJXZ19"}, "url":"URL#1999805" }, { "@score":"1", "@id":"1999806", "info":{"authors":{"author":[{"@pid":"202/9003","text":"Md Masoom Rabbani"},{"@pid":"35/8122","text":"Jo Vliegen"},{"@pid":"186/8774","text":"Jori Winderickx"},{"@pid":"82/4386","text":"Mauro Conti"},{"@pid":"23/3870","text":"Nele Mentens"}]},"title":"SHeLA: Scalable Heterogeneous Layered Attestation.","venue":"IEEE Internet Things J.","volume":"6","number":"6","pages":"10240-10250","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/RabbaniVWCM19","doi":"10.1109/JIOT.2019.2936988","ee":"https://doi.org/10.1109/JIOT.2019.2936988","url":"https://dblp.org/rec/journals/iotj/RabbaniVWCM19"}, "url":"URL#1999806" }, { "@score":"1", "@id":"1999807", "info":{"authors":{"author":[{"@pid":"243/6438","text":"Mina Rady"},{"@pid":"45/1910","text":"Maryam Hafeez"},{"@pid":"26/9611","text":"Syed Ali Raza Zaidi"}]},"title":"Computational Methods for Network-Aware and Network-Agnostic IoT Low Power Wide Area Networks (LPWANs).","venue":"IEEE Internet Things J.","volume":"6","number":"3","pages":"5732-5744","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/RadyHZ19","doi":"10.1109/JIOT.2019.2905134","ee":"https://doi.org/10.1109/JIOT.2019.2905134","url":"https://dblp.org/rec/journals/iotj/RadyHZ19"}, "url":"URL#1999807" }, { "@score":"1", "@id":"1999808", "info":{"authors":{"author":[{"@pid":"172/4448","text":"Parisa Ramezani"},{"@pid":"01/6205-1","text":"Yong Zeng 0001"},{"@pid":"76/4975","text":"Abbas Jamalipour"}]},"title":"Optimal Resource Allocation for Multiuser Internet of Things Network With Single Wireless-Powered Relay.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"3132-3142","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/RamezaniZJ19","doi":"10.1109/JIOT.2018.2879373","ee":"https://doi.org/10.1109/JIOT.2018.2879373","url":"https://dblp.org/rec/journals/iotj/RamezaniZJ19"}, "url":"URL#1999808" }, { "@score":"1", "@id":"1999809", "info":{"authors":{"author":[{"@pid":"186/2496","text":"Alex Ramos"},{"@pid":"199/0665","text":"Ronaldo T. P. Milfont"},{"@pid":"96/3717","text":"Raimir Holanda Filho"},{"@pid":"25/3419","text":"Joel J. P. C. Rodrigues"}]},"title":"Enabling Online Quantitative Security Analysis in 6LoWPAN Networks.","venue":"IEEE Internet Things J.","volume":"6","number":"3","pages":"5631-5638","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/RamosMFR19","doi":"10.1109/JIOT.2019.2904302","ee":"https://doi.org/10.1109/JIOT.2019.2904302","url":"https://dblp.org/rec/journals/iotj/RamosMFR19"}, "url":"URL#1999809" }, { "@score":"1", "@id":"1999810", "info":{"authors":{"author":[{"@pid":"167/5664","text":"Md. Masud Rana 0001"},{"@pid":"142/1015","text":"Rui Bo"}]},"title":"IoT-Based Improved Human Motion Estimations Method Under Cyber Attacks.","venue":"IEEE Internet Things J.","volume":"6","number":"6","pages":"10934-10935","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/RanaB19","doi":"10.1109/JIOT.2019.2932980","ee":"https://doi.org/10.1109/JIOT.2019.2932980","url":"https://dblp.org/rec/journals/iotj/RanaB19"}, "url":"URL#1999810" }, { "@score":"1", "@id":"1999811", "info":{"authors":{"author":[{"@pid":"171/5993","text":"Shalli Rani"},{"@pid":"78/10960","text":"Syed Hassan Ahmed"},{"@pid":"62/2006","text":"Sayed Chhattan Shah"}]},"title":"Smart Health: A Novel Paradigm to Control the Chickungunya Virus.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"1306-1311","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/RaniAS19","doi":"10.1109/JIOT.2018.2802898","ee":"https://doi.org/10.1109/JIOT.2018.2802898","url":"https://dblp.org/rec/journals/iotj/RaniAS19"}, "url":"URL#1999811" }, { "@score":"1", "@id":"1999812", "info":{"authors":{"author":[{"@pid":"251/1533","text":"Rinki Rani"},{"@pid":"46/2681-1","text":"Sushil Kumar 0001"},{"@pid":"149/6544","text":"Upasana Dohare"}]},"title":"Trust Evaluation for Light Weight Security in Sensor Enabled Internet of Things: Game Theory Oriented Approach.","venue":"IEEE Internet Things J.","volume":"6","number":"5","pages":"8421-8432","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/RaniKD19","doi":"10.1109/JIOT.2019.2917763","ee":"https://doi.org/10.1109/JIOT.2019.2917763","url":"https://dblp.org/rec/journals/iotj/RaniKD19"}, "url":"URL#1999812" }, { "@score":"1", "@id":"1999813", "info":{"authors":{"author":[{"@pid":"79/2597","text":"Danda B. Rawat"},{"@pid":"221/4943","text":"Amani Alshaikhi"},{"@pid":"211/1480","text":"Abdullah Alshammari"},{"@pid":"163/5497","text":"Chandra Bajracharya"},{"@pid":"99/5721-2","text":"Min Song 0002"}]},"title":"Payoff Optimization Through Wireless Network Virtualization for IoT Applications: A Three Layer Game Approach.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"2797-2805","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/RawatAABS19","doi":"10.1109/JIOT.2018.2874884","ee":"https://doi.org/10.1109/JIOT.2018.2874884","url":"https://dblp.org/rec/journals/iotj/RawatAABS19"}, "url":"URL#1999813" }, { "@score":"1", "@id":"1999814", "info":{"authors":{"author":[{"@pid":"83/9341","text":"Shahid Raza"},{"@pid":"236/4371","text":"Runar Mar Magnusson"}]},"title":"TinyIKE: Lightweight IKEv2 for Internet of Things.","venue":"IEEE Internet Things J.","volume":"6","number":"1","pages":"856-866","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/RazaM19","doi":"10.1109/JIOT.2018.2862942","ee":"https://doi.org/10.1109/JIOT.2018.2862942","url":"https://dblp.org/rec/journals/iotj/RazaM19"}, "url":"URL#1999814" }, { "@score":"1", "@id":"1999815", "info":{"authors":{"author":[{"@pid":"181/4809","text":"Chenshan Ren"},{"@pid":"179/9891","text":"Xinchen Lyu"},{"@pid":"31/2597-1","text":"Wei Ni 0001"},{"@pid":"57/1592-3","text":"Hui Tian 0003"},{"@pid":"70/4241","text":"Ren Ping Liu"}]},"title":"Distributed Online Learning of Fog Computing Under Nonuniform Device Cardinality.","venue":"IEEE Internet Things J.","volume":"6","number":"1","pages":"1147-1159","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/RenLNTL19","doi":"10.1109/JIOT.2018.2867481","ee":"https://doi.org/10.1109/JIOT.2018.2867481","url":"https://dblp.org/rec/journals/iotj/RenLNTL19"}, "url":"URL#1999815" }, { "@score":"1", "@id":"1999816", "info":{"authors":{"author":[{"@pid":"92/5008-5","text":"Wei Ren 0005"},{"@pid":"181/2323-4","text":"Yan Sun 0004"},{"@pid":"67/876-1","text":"Hong Luo 0001"},{"@pid":"15/1123","text":"Mohsen Guizani"}]},"title":"BLLC: A Batch-Level Update Mechanism With Low Cost for SDN-IoT Networks.","venue":"IEEE Internet Things J.","volume":"6","number":"1","pages":"1210-1222","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/RenSLG19","doi":"10.1109/JIOT.2018.2868708","ee":"https://doi.org/10.1109/JIOT.2018.2868708","url":"https://dblp.org/rec/journals/iotj/RenSLG19"}, "url":"URL#1999816" }, { "@score":"1", "@id":"1999817", "info":{"authors":{"author":[{"@pid":"92/5008-5","text":"Wei Ren 0005"},{"@pid":"181/2323-4","text":"Yan Sun 0004"},{"@pid":"67/876-1","text":"Hong Luo 0001"},{"@pid":"15/1123","text":"Mohsen Guizani"}]},"title":"A Novel Control Plane Optimization Strategy for Important Nodes in SDN-IoT Networks.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"3558-3571","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/RenSLG19a","doi":"10.1109/JIOT.2018.2888504","ee":"https://doi.org/10.1109/JIOT.2018.2888504","url":"https://dblp.org/rec/journals/iotj/RenSLG19a"}, "url":"URL#1999817" }, { "@score":"1", "@id":"1999818", "info":{"authors":{"author":[{"@pid":"34/8334","text":"Yanzhi Ren"},{"@pid":"82/4206-9","text":"Chen Wang 0009"},{"@pid":"18/2343-1","text":"Yingying Chen 0001"},{"@pid":"12/1198-3","text":"Jie Yang 0003"},{"@pid":"39/5544-1","text":"Hongwei Li 0001"}]},"title":"Noninvasive Fine-Grained Sleep Monitoring Leveraging Smartphones.","venue":"IEEE Internet Things J.","volume":"6","number":"5","pages":"8248-8261","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/RenWCYL19","doi":"10.1109/JIOT.2019.2922283","ee":"https://doi.org/10.1109/JIOT.2019.2922283","url":"https://dblp.org/rec/journals/iotj/RenWCYL19"}, "url":"URL#1999818" }, { "@score":"1", "@id":"1999819", "info":{"authors":{"author":[{"@pid":"178/7893","text":"Roohollah Rezaei"},{"@pid":"46/3348","text":"Sumei Sun"},{"@pid":"20/1696-1","text":"Xin Kang 0001"},{"@pid":"19/5809-1","text":"Yong Liang Guan 0001"},{"@pid":"59/1337","text":"Mohammad Reza Pakravan"}]},"title":"Secrecy Throughput Maximization for Full-Duplex Wireless Powered IoT Networks Under Fairness Constraints.","venue":"IEEE Internet Things J.","volume":"6","number":"4","pages":"6964-6976","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/RezaeiSKGP19","doi":"10.1109/JIOT.2019.2913219","ee":"https://doi.org/10.1109/JIOT.2019.2913219","url":"https://dblp.org/rec/journals/iotj/RezaeiSKGP19"}, "url":"URL#1999819" }, { "@score":"1", "@id":"1999820", "info":{"authors":{"author":[{"@pid":"67/1235","text":"Diego Rivera"},{"@pid":"00/2186-3","text":"Antonio García 0003"},{"@pid":"122/4669","text":"María Luisa Martín Ruiz"},{"@pid":"71/3407","text":"Bernardo Alarcos"},{"@pid":"73/377","text":"Juan-Ramón Velasco"},{"@pid":"44/4956","text":"Ana Gómez Oliva"}]},"title":"Secure Communications and Protected Data for a Internet of Things Smart Toy Platform.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"3785-3795","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/RiveraGRAVO19","doi":"10.1109/JIOT.2019.2891103","ee":"https://doi.org/10.1109/JIOT.2019.2891103","url":"https://dblp.org/rec/journals/iotj/RiveraGRAVO19"}, "url":"URL#1999820" }, { "@score":"1", "@id":"1999821", "info":{"authors":{"author":[{"@pid":"63/6414","text":"Rodrigo Roman"},{"@pid":"21/11139","text":"Ruben Rios"},{"@pid":"22/4296","text":"Jose Antonio Onieva"},{"@pid":"02/3236-1","text":"Javier López 0001"}]},"title":"Immune System for the Internet of Things Using Edge Technologies.","venue":"IEEE Internet Things J.","volume":"6","number":"3","pages":"4774-4781","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/RomanROL19","doi":"10.1109/JIOT.2018.2867613","ee":"https://doi.org/10.1109/JIOT.2018.2867613","url":"https://dblp.org/rec/journals/iotj/RomanROL19"}, "url":"URL#1999821" }, { "@score":"1", "@id":"1999822", "info":{"authors":{"author":[{"@pid":"71/4189","text":"Huigui Rong"},{"@pid":"52/2879","text":"Zhenqian Wang"},{"@pid":"25/4108-1","text":"Hongbo Jiang 0001"},{"@pid":"18/7081","text":"Zhu Xiao"},{"@pid":"81/655","text":"Fanzi Zeng"}]},"title":"Energy-Aware Clustering and Routing in Infrastructure Failure Areas With D2D Communication.","venue":"IEEE Internet Things J.","volume":"6","number":"5","pages":"8645-8657","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/RongWJXZ19","doi":"10.1109/JIOT.2019.2922202","ee":"https://doi.org/10.1109/JIOT.2019.2922202","url":"https://dblp.org/rec/journals/iotj/RongWJXZ19"}, "url":"URL#1999822" }, { "@score":"1", "@id":"1999823", "info":{"authors":{"author":[{"@pid":"205/8903","text":"Annie Gilda Roselin"},{"@pid":"92/5218","text":"Priyadarsi Nanda"},{"@pid":"22/3939","text":"Surya Nepal"},{"@pid":"75/2122","text":"Xiangjian He"},{"@pid":"224/9310","text":"Jarod Wright"}]},"title":"Exploiting the Remote Server Access Support of CoAP Protocol.","venue":"IEEE Internet Things J.","volume":"6","number":"6","pages":"9338-9349","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/RoselinNNHW19","doi":"10.1109/JIOT.2019.2942085","ee":"https://doi.org/10.1109/JIOT.2019.2942085","url":"https://dblp.org/rec/journals/iotj/RoselinNNHW19"}, "url":"URL#1999823" }, { "@score":"1", "@id":"1999824", "info":{"authors":{"author":[{"@pid":"30/10604","text":"Diptendu Sinha Roy"},{"@pid":"240/6893","text":"Ranjit Kumar Behera"},{"@pid":"158/4516","text":"K. Hemant Kumar Reddy"},{"@pid":"b/RajkumarBuyya","text":"Rajkumar Buyya"}]},"title":"A Context-Aware Fog Enabled Scheme for Real-Time Cross-Vertical IoT Applications.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"2400-2412","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/RoyBRB19","doi":"10.1109/JIOT.2018.2869323","ee":"https://doi.org/10.1109/JIOT.2018.2869323","url":"https://dblp.org/rec/journals/iotj/RoyBRB19"}, "url":"URL#1999824" }, { "@score":"1", "@id":"1999825", "info":{"authors":{"author":[{"@pid":"72/2012","text":"Lihua Ruan"},{"@pid":"158/4720","text":"Maluge Pubuduni Imali Dias"},{"@pid":"93/3575-1","text":"Elaine Wong 0001"}]},"title":"Machine Learning-Based Bandwidth Prediction for Low-Latency H2M Applications.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"3743-3752","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/RuanDW19","doi":"10.1109/JIOT.2018.2890563","ee":"https://doi.org/10.1109/JIOT.2018.2890563","url":"https://dblp.org/rec/journals/iotj/RuanDW19"}, "url":"URL#1999825" }, { "@score":"1", "@id":"1999826", "info":{"authors":{"author":[{"@pid":"03/4227","text":"Lanlan Rui"},{"@pid":"255/2198","text":"Yingtai Yang"},{"@pid":"25/2165","text":"Zhipeng Gao"},{"@pid":"13/342","text":"Xuesong Qiu 0001"}]},"title":"Computation Offloading in a Mobile Edge Communication Network: A Joint Transmission Delay and Energy Consumption Dynamic Awareness Mechanism.","venue":"IEEE Internet Things J.","volume":"6","number":"6","pages":"10546-10559","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/RuiYGQ19","doi":"10.1109/JIOT.2019.2939874","ee":"https://doi.org/10.1109/JIOT.2019.2939874","url":"https://dblp.org/rec/journals/iotj/RuiYGQ19"}, "url":"URL#1999826" }, { "@score":"1", "@id":"1999827", "info":{"authors":{"author":[{"@pid":"180/3051","text":"Yuvraj Sahni"},{"@pid":"c/JiannongCao","text":"Jiannong Cao 0001"},{"@pid":"50/2484-24","text":"Lei Yang 0024"}]},"title":"Data-Aware Task Allocation for Achieving Low Latency in Collaborative Edge Computing.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"3512-3524","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/SahniCY19","doi":"10.1109/JIOT.2018.2886757","ee":"https://doi.org/10.1109/JIOT.2018.2886757","url":"https://dblp.org/rec/journals/iotj/SahniCY19"}, "url":"URL#1999827" }, { "@score":"1", "@id":"1999828", "info":{"authors":{"author":[{"@pid":"198/1186","text":"Hazem Sallouha"},{"@pid":"00/10806","text":"Alessandro Chiumento"},{"@pid":"190/5495","text":"Sreeraj Rajendran"},{"@pid":"72/4438","text":"Sofie Pollin"}]},"title":"Localization in Ultra Narrow Band IoT Networks: Design Guidelines and Tradeoffs.","venue":"IEEE Internet Things J.","volume":"6","number":"6","pages":"9375-9385","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/SallouhaCRP19","doi":"10.1109/JIOT.2019.2931628","ee":"https://doi.org/10.1109/JIOT.2019.2931628","url":"https://dblp.org/rec/journals/iotj/SallouhaCRP19"}, "url":"URL#1999828" }, { "@score":"1", "@id":"1999829", "info":{"authors":{"author":[{"@pid":"150/7968","text":"Mattia Salvaro"},{"@pid":"151/0028","text":"Simone Benatti"},{"@pid":"207/6408","text":"Victor Javier Kartsch"},{"@pid":"38/10353","text":"Marco Guermandi"},{"@pid":"b/LucaBenini","text":"Luca Benini"}]},"title":"A Minimally Invasive Low-Power Platform for Real-Time Brain Computer Interaction Based on Canonical Correlation Analysis.","venue":"IEEE Internet Things J.","volume":"6","number":"1","pages":"967-977","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/SalvaroBKGB19","doi":"10.1109/JIOT.2018.2866341","ee":"https://doi.org/10.1109/JIOT.2018.2866341","url":"https://dblp.org/rec/journals/iotj/SalvaroBKGB19"}, "url":"URL#1999829" }, { "@score":"1", "@id":"1999830", "info":{"authors":{"author":[{"@pid":"167/9231","text":"Amit Samanta 0001"},{"@pid":"54/2780-1","text":"Zheng Chang 0001"}]},"title":"Adaptive Service Offloading for Revenue Maximization in Mobile Edge Computing With Delay-Constraint.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"3864-3872","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/SamantaC19","doi":"10.1109/JIOT.2019.2892398","ee":"https://doi.org/10.1109/JIOT.2019.2892398","url":"https://dblp.org/rec/journals/iotj/SamantaC19"}, "url":"URL#1999830" }, { "@score":"1", "@id":"1999831", "info":{"authors":{"author":[{"@pid":"120/2778","text":"Farzad Samie"},{"@pid":"55/2100","text":"Lars Bauer"},{"@pid":"h/JorgHenkel","text":"Jörg Henkel"}]},"title":"From Cloud Down to Things: An Overview of Machine Learning in Internet of Things.","venue":"IEEE Internet Things J.","volume":"6","number":"3","pages":"4921-4934","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/SamieBH19","doi":"10.1109/JIOT.2019.2893866","ee":"https://doi.org/10.1109/JIOT.2019.2893866","url":"https://dblp.org/rec/journals/iotj/SamieBH19"}, "url":"URL#1999831" }, { "@score":"1", "@id":"1999832", "info":{"authors":{"author":[{"@pid":"183/5530","text":"Sujan Sarker"},{"@pid":"63/4382","text":"Md. Abdur Razzaque"},{"@pid":"84/4762","text":"Mohammad Mehedi Hassan"},{"@pid":"63/1919","text":"Ahmad Almogren"},{"@pid":"f/GiancarloFortino","text":"Giancarlo Fortino"},{"@pid":"73/1446","text":"Mengchu Zhou"}]},"title":"Optimal Selection of Crowdsourcing Workers Balancing Their Utilities and Platform Profit.","venue":"IEEE Internet Things J.","volume":"6","number":"5","pages":"8602-8614","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/SarkerRHAFZ19","doi":"10.1109/JIOT.2019.2921234","ee":"https://doi.org/10.1109/JIOT.2019.2921234","url":"https://dblp.org/rec/journals/iotj/SarkerRHAFZ19"}, "url":"URL#1999832" }, { "@score":"1", "@id":"1999833", "info":{"authors":{"author":[{"@pid":"246/5452","text":"D. Jonathan Sebastian"},{"@pid":"172/9009","text":"Utkarsh Agrawal"},{"@pid":"181/6565","text":"Ali Tamimi"},{"@pid":"44/10653","text":"Adam Hahn"}]},"title":"DER-TEE: Secure Distributed Energy Resource Operations Through Trusted Execution Environments.","venue":"IEEE Internet Things J.","volume":"6","number":"4","pages":"6476-6486","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/SebastianATH19","doi":"10.1109/JIOT.2019.2909768","ee":"https://doi.org/10.1109/JIOT.2019.2909768","url":"https://dblp.org/rec/journals/iotj/SebastianATH19"}, "url":"URL#1999833" }, { "@score":"1", "@id":"1999834", "info":{"authors":{"author":[{"@pid":"251/1489","text":"Amina Seferagic"},{"@pid":"77/5355","text":"Ingrid Moerman"},{"@pid":"34/1837","text":"Eli De Poorter"},{"@pid":"79/3449","text":"Jeroen Hoebeke"}]},"title":"Evaluating the Suitability of IEEE 802.11ah for Low-Latency Time-Critical Control Loops.","venue":"IEEE Internet Things J.","volume":"6","number":"5","pages":"7839-7848","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/SeferagicMPH19","doi":"10.1109/JIOT.2019.2916579","ee":"https://doi.org/10.1109/JIOT.2019.2916579","url":"https://dblp.org/rec/journals/iotj/SeferagicMPH19"}, "url":"URL#1999834" }, { "@score":"1", "@id":"1999835", "info":{"authors":{"author":[{"@pid":"221/0422","text":"Hyowoon Seo"},{"@pid":"67/8198","text":"Jun-Pyo Hong"},{"@pid":"91/4197","text":"Wan Choi 0001"}]},"title":"Low Latency Random Access for Sporadic MTC Devices in Internet of Things.","venue":"IEEE Internet Things J.","volume":"6","number":"3","pages":"5108-5118","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/SeoHC19","doi":"10.1109/JIOT.2019.2896620","ee":"https://doi.org/10.1109/JIOT.2019.2896620","url":"https://dblp.org/rec/journals/iotj/SeoHC19"}, "url":"URL#1999835" }, { "@score":"1", "@id":"1999836", "info":{"authors":{"author":[{"@pid":"229/0333","text":"Chunkyun Seok"},{"@pid":"229/0905","text":"Marzana Mantasha Mahmud"},{"@pid":"14/1342","text":"Mohit Kumar"},{"@pid":"236/4517","text":"Oluwafemi Joel Adelegan"},{"@pid":"229/0172","text":"Feysel Yalcin Yamaner"},{"@pid":"33/940","text":"Ömer Oralkan"}]},"title":"A Low-Power Wireless Multichannel Gas Sensing System Based on a Capacitive Micromachined Ultrasonic Transducer (CMUT) Array.","venue":"IEEE Internet Things J.","volume":"6","number":"1","pages":"831-843","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/SeokMKAYO19","doi":"10.1109/JIOT.2018.2861330","ee":"https://doi.org/10.1109/JIOT.2018.2861330","url":"https://dblp.org/rec/journals/iotj/SeokMKAYO19"}, "url":"URL#1999836" }, { "@score":"1", "@id":"1999837", "info":{"authors":{"author":[{"@pid":"195/0149","text":"Ali Shahini"},{"@pid":"a/NirwanAnsari","text":"Nirwan Ansari"}]},"title":"NOMA Aided Narrowband IoT for Machine Type Communications With User Clustering.","venue":"IEEE Internet Things J.","volume":"6","number":"4","pages":"7183-7191","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/ShahiniA19","doi":"10.1109/JIOT.2019.2914947","ee":"https://doi.org/10.1109/JIOT.2019.2914947","url":"https://dblp.org/rec/journals/iotj/ShahiniA19"}, "url":"URL#1999837" }, { "@score":"1", "@id":"1999838", "info":{"authors":{"author":[{"@pid":"195/0149","text":"Ali Shahini"},{"@pid":"83/8037","text":"Abbas Kiani"},{"@pid":"a/NirwanAnsari","text":"Nirwan Ansari"}]},"title":"Energy Efficient Resource Allocation in EH-Enabled CR Networks for IoT.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"3186-3193","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/ShahiniKA19","doi":"10.1109/JIOT.2018.2880190","ee":"https://doi.org/10.1109/JIOT.2018.2880190","url":"https://dblp.org/rec/journals/iotj/ShahiniKA19"}, "url":"URL#1999838" }, { "@score":"1", "@id":"1999839", "info":{"authors":{"author":[{"@pid":"01/6377","text":"Feng Shan"},{"@pid":"l/JunzhouLuo","text":"Junzhou Luo"},{"@pid":"06/8559","text":"Jiahui Jin"},{"@pid":"10/2312-1","text":"Weiwei Wu 0001"}]},"title":"Offloading Delay Constrained Transparent Computing Tasks With Energy-Efficient Transmission Power Scheduling in Wireless IoT Environment.","venue":"IEEE Internet Things J.","volume":"6","number":"3","pages":"4411-4422","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/ShanLJW19","doi":"10.1109/JIOT.2018.2883903","ee":"https://doi.org/10.1109/JIOT.2018.2883903","url":"https://dblp.org/rec/journals/iotj/ShanLJW19"}, "url":"URL#1999839" }, { "@score":"1", "@id":"1999840", "info":{"authors":{"author":[{"@pid":"193/3444","text":"Xiaodan Shao"},{"@pid":"72/2676-1","text":"Xiaoming Chen 0001"},{"@pid":"14/139","text":"Caijun Zhong"},{"@pid":"96/5668-1","text":"Junhui Zhao 0001"},{"@pid":"81/6236-1","text":"Zhaoyang Zhang 0001"}]},"title":"A Unified Design of Massive Access for Cellular Internet of Things.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"3934-3947","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/ShaoCZZZ19","doi":"10.1109/JIOT.2019.2893376","ee":"https://doi.org/10.1109/JIOT.2019.2893376","url":"https://dblp.org/rec/journals/iotj/ShaoCZZZ19"}, "url":"URL#1999840" }, { "@score":"1", "@id":"1999841", "info":{"authors":{"author":[{"@pid":"246/5475","text":"Wenhao Shao"},{"@pid":"88/1889","text":"Ruliang Xiao"},{"@pid":"49/2488","text":"Jin Huang"},{"@pid":"191/5186","text":"Huakun Liu"},{"@pid":"18/4833","text":"Xin Du"}]},"title":"FJLT-FLSH: More Efficient Fly Locality-Sensitive Hashing Algorithm via FJLT for WMSN IoT Search.","venue":"IEEE Internet Things J.","volume":"6","number":"4","pages":"7122-7136","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/ShaoXHLD19","doi":"10.1109/JIOT.2019.2914344","ee":"https://doi.org/10.1109/JIOT.2019.2914344","url":"https://dblp.org/rec/journals/iotj/ShaoXHLD19"}, "url":"URL#1999841" }, { "@score":"1", "@id":"1999842", "info":{"authors":{"author":[{"@pid":"136/2680","text":"Yaman Sharaf-Dabbagh"},{"@pid":"41/6237","text":"Walid Saad"}]},"title":"Authentication of Wireless Devices in the Internet of Things: Learning and Environmental Effects.","venue":"IEEE Internet Things J.","volume":"6","number":"4","pages":"6692-6705","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/Sharaf-DabbaghS19","doi":"10.1109/JIOT.2019.2910233","ee":"https://doi.org/10.1109/JIOT.2019.2910233","url":"https://dblp.org/rec/journals/iotj/Sharaf-DabbaghS19"}, "url":"URL#1999842" }, { "@score":"1", "@id":"1999843", "info":{"authors":{"author":[{"@pid":"219/6015","text":"Abubakar Sharif"},{"@pid":"162/4907","text":"Jun Ouyang"},{"@pid":"22/4613","text":"Feng Yang"},{"@pid":"218/7138","text":"Hassan Tariq Chattha"},{"@pid":"25/1002","text":"Muhammad Ali Imran 0001"},{"@pid":"75/10077","text":"Akram Alomainy"},{"@pid":"42/10077","text":"Qammer H. Abbasi"}]},"title":"Low-Cost Inkjet-Printed UHF RFID Tag-Based System for Internet of Things Applications Using Characteristic Modes.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"3962-3975","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/SharifOYCIAA19","doi":"10.1109/JIOT.2019.2893677","ee":"https://doi.org/10.1109/JIOT.2019.2893677","url":"https://dblp.org/rec/journals/iotj/SharifOYCIAA19"}, "url":"URL#1999843" }, { "@score":"1", "@id":"1999844", "info":{"authors":{"author":[{"@pid":"92/10249","text":"Lokesh Sharma"},{"@pid":"234/3372","text":"Bikram Kumar"},{"@pid":"80/1371","text":"Shih-Lin Wu"}]},"title":"Performance Analysis and Adaptive DRX Scheme for Dual Connectivity.","venue":"IEEE Internet Things J.","volume":"6","number":"6","pages":"10289-10304","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/SharmaKW19","doi":"10.1109/JIOT.2019.2937345","ee":"https://doi.org/10.1109/JIOT.2019.2937345","url":"https://dblp.org/rec/journals/iotj/SharmaKW19"}, "url":"URL#1999844" }, { "@score":"1", "@id":"1999845", "info":{"authors":{"author":[{"@pid":"227/2085","text":"Sharon Shasha"},{"@pid":"227/3076","text":"Moustafa Mahmoud"},{"@pid":"m/MohammadMannan","text":"Mohammad Mannan"},{"@pid":"05/4817","text":"Amr M. Youssef"}]},"title":"Playing With Danger: A Taxonomy and Evaluation of Threats to Smart Toys.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"2986-3002","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/ShashaMMY19","doi":"10.1109/JIOT.2018.2877749","ee":"https://doi.org/10.1109/JIOT.2018.2877749","url":"https://dblp.org/rec/journals/iotj/ShashaMMY19"}, "url":"URL#1999845" }, { "@score":"1", "@id":"1999846", "info":{"authors":{"author":[{"@pid":"122/5700","text":"Changyang She"},{"@pid":"231/3980","text":"Yifan Duan"},{"@pid":"25/5898-1","text":"Guodong Zhao 0001"},{"@pid":"65/1128","text":"Tony Q. S. Quek"},{"@pid":"59/6828-1","text":"Yonghui Li 0001"},{"@pid":"84/3821","text":"Branka Vucetic"}]},"title":"Cross-Layer Design for Mission-Critical IoT in Mobile Edge Computing Systems.","venue":"IEEE Internet Things J.","volume":"6","number":"6","pages":"9360-9374","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/SheDZQLV19","doi":"10.1109/JIOT.2019.2930983","ee":"https://doi.org/10.1109/JIOT.2019.2930983","url":"https://dblp.org/rec/journals/iotj/SheDZQLV19"}, "url":"URL#1999846" }, { "@score":"1", "@id":"1999847", "info":{"authors":{"author":[{"@pid":"03/8774-1","text":"Meng Shen 0001"},{"@pid":"76/3925","text":"Baoli Ma"},{"@pid":"26/2546","text":"Liehuang Zhu"},{"@pid":"22/5535","text":"Xiaojiang Du"},{"@pid":"181/2626-2","text":"Ke Xu 0002"}]},"title":"Secure Phrase Search for Intelligent Processing of Encrypted Data in Cloud-Based IoT.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"1998-2008","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/ShenMZDX19","doi":"10.1109/JIOT.2018.2871607","ee":"https://doi.org/10.1109/JIOT.2018.2871607","url":"https://dblp.org/rec/journals/iotj/ShenMZDX19"}, "url":"URL#1999847" }, { "@score":"1", "@id":"1999848", "info":{"authors":{"author":[{"@pid":"226/9421","text":"Penghui Shen"},{"@pid":"35/1826","text":"Yihong Qi"},{"@pid":"82/2790","text":"Wei Yu"},{"@pid":"23/5241-1","text":"Jun Fan 0001"},{"@pid":"36/3924","text":"Fuhai Li"}]},"title":"OTA Measurement for IoT Wireless Device Performance Evaluation: Challenges and Solutions.","venue":"IEEE Internet Things J.","volume":"6","number":"1","pages":"1223-1237","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/ShenQYFL19","doi":"10.1109/JIOT.2018.2868787","ee":"https://doi.org/10.1109/JIOT.2018.2868787","url":"https://dblp.org/rec/journals/iotj/ShenQYFL19"}, "url":"URL#1999848" }, { "@score":"1", "@id":"1999849", "info":{"authors":{"author":[{"@pid":"03/8774-1","text":"Meng Shen 0001"},{"@pid":"220/2887","text":"Xiangyun Tang"},{"@pid":"26/2546","text":"Liehuang Zhu"},{"@pid":"22/5535","text":"Xiaojiang Du"},{"@pid":"15/1123","text":"Mohsen Guizani"}]},"title":"Privacy-Preserving Support Vector Machine Training Over Blockchain-Based Encrypted IoT Data in Smart Cities.","venue":"IEEE Internet Things J.","volume":"6","number":"5","pages":"7702-7712","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/ShenTZDG19","doi":"10.1109/JIOT.2019.2901840","ee":"https://doi.org/10.1109/JIOT.2019.2901840","url":"https://dblp.org/rec/journals/iotj/ShenTZDG19"}, "url":"URL#1999849" }, { "@score":"1", "@id":"1999850", "info":{"authors":{"author":[{"@pid":"227/3357","text":"Jaykumar Sheth"},{"@pid":"34/8395","text":"Behnam Dezfouli"}]},"title":"Enhancing the Energy-Efficiency and Timeliness of IoT Communication in WiFi Networks.","venue":"IEEE Internet Things J.","volume":"6","number":"5","pages":"9085-9097","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/ShethD19","doi":"10.1109/JIOT.2019.2927588","ee":"https://doi.org/10.1109/JIOT.2019.2927588","url":"https://dblp.org/rec/journals/iotj/ShethD19"}, "url":"URL#1999850" }, { "@score":"1", "@id":"1999851", "info":{"authors":{"author":[{"@pid":"236/3133","text":"Dian Shi"},{"@pid":"234/6210","text":"Jiahao Ding"},{"@pid":"194/7011","text":"Sai Mounika Errapotu"},{"@pid":"37/7488","text":"Hao Yue"},{"@pid":"14/2062-1","text":"Wenjun Xu 0001"},{"@pid":"20/4512","text":"Xiangwei Zhou"},{"@pid":"16/1033","text":"Miao Pan"}]},"title":"Deep Q-Network-Based Route Scheduling for TNC Vehicles With Passengers' Location Differential Privacy.","venue":"IEEE Internet Things J.","volume":"6","number":"5","pages":"7681-7692","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/ShiDEYXZP19","doi":"10.1109/JIOT.2019.2902815","ee":"https://doi.org/10.1109/JIOT.2019.2902815","url":"https://dblp.org/rec/journals/iotj/ShiDEYXZP19"}, "url":"URL#1999851" }, { "@score":"1", "@id":"1999852", "info":{"authors":{"author":{"@pid":"30/1632","text":"Kyung-Ah Shim"}},"title":"Universal Forgery Attacks on Remote Authentication Schemes for Wireless Body Area Networks Based on Internet of Things.","venue":"IEEE Internet Things J.","volume":"6","number":"5","pages":"9211-9212","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/Shim19","doi":"10.1109/JIOT.2019.2922701","ee":"https://doi.org/10.1109/JIOT.2019.2922701","url":"https://dblp.org/rec/journals/iotj/Shim19"}, "url":"URL#1999852" }, { "@score":"1", "@id":"1999853", "info":{"authors":{"author":[{"@pid":"210/1531","text":"Tongxin Shu"},{"@pid":"205/8477","text":"Jiahong Chen"},{"@pid":"75/1870","text":"Vijay K. Bhargava"},{"@pid":"62/2928","text":"Clarence W. de Silva"}]},"title":"An Energy-Efficient Dual Prediction Scheme Using LMS Filter and LSTM in Wireless Sensor Networks for Environment Monitoring.","venue":"IEEE Internet Things J.","volume":"6","number":"4","pages":"6736-6747","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/ShuCBS19","doi":"10.1109/JIOT.2019.2911295","ee":"https://doi.org/10.1109/JIOT.2019.2911295","url":"https://dblp.org/rec/journals/iotj/ShuCBS19"}, "url":"URL#1999853" }, { "@score":"1", "@id":"1999854", "info":{"authors":{"author":[{"@pid":"143/0117","text":"Jiangang Shu"},{"@pid":"134/3945","text":"Ximeng Liu"},{"@pid":"26/6407","text":"Kan Yang 0001"},{"@pid":"31/3845-2","text":"Yinghui Zhang 0002"},{"@pid":"j/XiaohuaJia","text":"Xiaohua Jia"},{"@pid":"d/RobertHDeng","text":"Robert H. Deng"}]},"title":"SybSub: Privacy-Preserving Expressive Task Subscription With Sybil Detection in Crowdsourcing.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"3003-3013","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/ShuLYZJD19","doi":"10.1109/JIOT.2018.2877780","ee":"https://doi.org/10.1109/JIOT.2018.2877780","url":"https://dblp.org/rec/journals/iotj/ShuLYZJD19"}, "url":"URL#1999854" }, { "@score":"1", "@id":"1999855", "info":{"authors":{"author":[{"@pid":"08/1230","text":"Miguel Silva"},{"@pid":"255/2388","text":"David Cerdeira"},{"@pid":"170/0331","text":"Sandro Pinto 0001"},{"@pid":"128/0790","text":"Tiago Gomes"}]},"title":"Operating Systems for Internet of Things Low-End Devices: Analysis and Benchmarking.","venue":"IEEE Internet Things J.","volume":"6","number":"6","pages":"10375-10383","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/SilvaCPG19","doi":"10.1109/JIOT.2019.2939008","ee":"https://doi.org/10.1109/JIOT.2019.2939008","url":"https://dblp.org/rec/journals/iotj/SilvaCPG19"}, "url":"URL#1999855" }, { "@score":"1", "@id":"1999856", "info":{"authors":{"author":[{"@pid":"42/2642","text":"Ricardo Silva"},{"@pid":"59/10093","text":"Razi Iqbal"}]},"title":"Ethical Implications of Social Internet of Vehicles Systems.","venue":"IEEE Internet Things J.","volume":"6","number":"1","pages":"517-531","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/SilvaI19","doi":"10.1109/JIOT.2018.2841969","ee":"https://doi.org/10.1109/JIOT.2018.2841969","url":"https://dblp.org/rec/journals/iotj/SilvaI19"}, "url":"URL#1999856" }, { "@score":"1", "@id":"1999857", "info":{"authors":{"author":[{"@pid":"08/1230","text":"Miguel Silva"},{"@pid":"41/5045","text":"Adriano Tavares"},{"@pid":"128/0790","text":"Tiago Gomes"},{"@pid":"170/0331","text":"Sandro Pinto 0001"}]},"title":"ChamelIoT: An Agnostic Operating System Framework for Reconfigurable IoT Devices.","venue":"IEEE Internet Things J.","volume":"6","number":"1","pages":"1291-1292","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/SilvaTGP19","doi":"10.1109/JIOT.2018.2863545","ee":"https://doi.org/10.1109/JIOT.2018.2863545","url":"https://dblp.org/rec/journals/iotj/SilvaTGP19"}, "url":"URL#1999857" }, { "@score":"1", "@id":"1999858", "info":{"authors":{"author":[{"@pid":"90/4842","text":"Arvind Singh"},{"@pid":"221/1528","text":"Nikhil Chawla"},{"@pid":"168/6308","text":"Jong Hwan Ko"},{"@pid":"149/4005","text":"Monodeep Kar"},{"@pid":"66/1210","text":"Saibal Mukhopadhyay"}]},"title":"Energy Efficient and Side-Channel Secure Cryptographic Hardware for IoT-Edge Nodes.","venue":"IEEE Internet Things J.","volume":"6","number":"1","pages":"421-434","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/SinghCKKM19","doi":"10.1109/JIOT.2018.2861324","ee":"https://doi.org/10.1109/JIOT.2018.2861324","url":"https://dblp.org/rec/journals/iotj/SinghCKKM19"}, "url":"URL#1999858" }, { "@score":"1", "@id":"1999859", "info":{"authors":{"author":{"@pid":"15/3878","text":"Karen R. Sollins"}},"title":"IoT Big Data Security and Privacy Versus Innovation.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"1628-1635","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/Sollins19","doi":"10.1109/JIOT.2019.2898113","ee":"https://doi.org/10.1109/JIOT.2019.2898113","url":"https://dblp.org/rec/journals/iotj/Sollins19"}, "url":"URL#1999859" }, { "@score":"1", "@id":"1999860", "info":{"authors":{"author":[{"@pid":"72/7850","text":"Sandeep K. Sood"},{"@pid":"202/9930","text":"Isha Mahajan"}]},"title":"IoT-Fog-Based Healthcare Framework to Identify and Control Hypertension Attack.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"1920-1927","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/SoodM19","doi":"10.1109/JIOT.2018.2871630","ee":"https://doi.org/10.1109/JIOT.2018.2871630","url":"https://dblp.org/rec/journals/iotj/SoodM19"}, "url":"URL#1999860" }, { "@score":"1", "@id":"1999861", "info":{"authors":{"author":[{"@pid":"205/5523","text":"Srinikethan Madapuzi Srinivasan"},{"@pid":"34/7684","text":"Tram Truong Huu"},{"@pid":"m/GMohan","text":"Mohan Gurusamy"}]},"title":"Machine Learning-Based Link Fault Identification and Localization in Complex Networks.","venue":"IEEE Internet Things J.","volume":"6","number":"4","pages":"6556-6566","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/SrinivasanHG19","doi":"10.1109/JIOT.2019.2908019","ee":"https://doi.org/10.1109/JIOT.2019.2908019","url":"https://dblp.org/rec/journals/iotj/SrinivasanHG19"}, "url":"URL#1999861" }, { "@score":"1", "@id":"1999862", "info":{"authors":{"author":[{"@pid":"232/5242","text":"Tonny Ssettumba"},{"@pid":"150/5724","text":"Ahmed H. Abd El-Malek"},{"@pid":"68/5461","text":"Maha Elsabrouty"},{"@pid":"82/3660","text":"Mohammed Abo-Zahhad"}]},"title":"Physical Layer Security Enhancement for Internet of Things in the Presence of Co-Channel Interference and Multiple Eavesdroppers.","venue":"IEEE Internet Things J.","volume":"6","number":"4","pages":"6441-6452","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/SsettumbaEEA19","doi":"10.1109/JIOT.2019.2907574","ee":"https://doi.org/10.1109/JIOT.2019.2907574","url":"https://dblp.org/rec/journals/iotj/SsettumbaEEA19"}, "url":"URL#1999862" }, { "@score":"1", "@id":"1999863", "info":{"authors":{"author":[{"@pid":"67/4307","text":"Zhou Su"},{"@pid":"52/4107-4","text":"Yuntao Wang 0004"},{"@pid":"159/4497","text":"Qichao Xu"},{"@pid":"01/6319","text":"Minrui Fei"},{"@pid":"19/5832","text":"Yu-Chu Tian"},{"@pid":"181/2597-7","text":"Ning Zhang 0007"}]},"title":"A Secure Charging Scheme for Electric Vehicles With Smart Communities in Energy Blockchain.","venue":"IEEE Internet Things J.","volume":"6","number":"3","pages":"4601-4613","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/SuWXFTZ19","doi":"10.1109/JIOT.2018.2869297","ee":"https://doi.org/10.1109/JIOT.2018.2869297","url":"https://dblp.org/rec/journals/iotj/SuWXFTZ19"}, "url":"URL#1999863" }, { "@score":"1", "@id":"1999864", "info":{"authors":{"author":[{"@pid":"132/5449","text":"Yuxia Sun"},{"@pid":"c/SCCheung","text":"Shing-Chi Cheung"},{"@pid":"01/267-1","text":"Song Guo 0001"},{"@pid":"82/104","text":"Ming Cheng"}]},"title":"Disclosing and Locating Concurrency Bugs of Interrupt-Driven IoT Programs.","venue":"IEEE Internet Things J.","volume":"6","number":"5","pages":"8945-8957","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/SunCGC19","doi":"10.1109/JIOT.2019.2925291","ee":"https://doi.org/10.1109/JIOT.2019.2925291","url":"https://dblp.org/rec/journals/iotj/SunCGC19"}, "url":"URL#1999864" }, { "@score":"1", "@id":"1999865", "info":{"authors":{"author":[{"@pid":"132/5449","text":"Yuxia Sun"},{"@pid":"01/267-1","text":"Song Guo 0001"},{"@pid":"c/SCCheung","text":"Shing-Chi Cheung"},{"@pid":"01/2880-1","text":"Yong Tang 0001"}]},"title":"Analyzing and Disentangling Interleaved Interrupt-Driven IoT Programs.","venue":"IEEE Internet Things J.","volume":"6","number":"3","pages":"5376-5386","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/SunGCT19","doi":"10.1109/JIOT.2019.2900769","ee":"https://doi.org/10.1109/JIOT.2019.2900769","url":"https://dblp.org/rec/journals/iotj/SunGCT19"}, "url":"URL#1999865" }, { "@score":"1", "@id":"1999866", "info":{"authors":{"author":[{"@pid":"50/10332","text":"Xiaochuan Sun"},{"@pid":"16/8146","text":"Guan Gui 0001"},{"@pid":"61/9533","text":"Yingqi Li"},{"@pid":"70/4241","text":"Ren Ping Liu"},{"@pid":"81/3542","text":"Yongli An"}]},"title":"ResInNet: A Novel Deep Neural Network With Feature Reuse for Internet of Things.","venue":"IEEE Internet Things J.","volume":"6","number":"1","pages":"679-691","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/SunGLLA19","doi":"10.1109/JIOT.2018.2853663","ee":"https://doi.org/10.1109/JIOT.2018.2853663","url":"https://dblp.org/rec/journals/iotj/SunGLLA19"}, "url":"URL#1999866" }, { "@score":"1", "@id":"1999867", "info":{"authors":{"author":[{"@pid":"117/3395","text":"Yu-E Sun"},{"@pid":"75/4947-1","text":"He Huang 0001"},{"@pid":"c/ShigangChen","text":"Shigang Chen"},{"@pid":"20/2165-3","text":"You Zhou 0003"},{"@pid":"51/4757-3","text":"Kai Han 0003"},{"@pid":"72/7123","text":"Wenjian Yang"}]},"title":"Privacy-Preserving Estimation of k-Persistent Traffic in Vehicular Cyber-Physical Systems.","venue":"IEEE Internet Things J.","volume":"6","number":"5","pages":"8296-8309","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/SunHCZHY19","doi":"10.1109/JIOT.2019.2916349","ee":"https://doi.org/10.1109/JIOT.2019.2916349","url":"https://dblp.org/rec/journals/iotj/SunHCZHY19"}, "url":"URL#1999867" }, { "@score":"1", "@id":"1999868", "info":{"authors":{"author":[{"@pid":"145/9219","text":"Fangmin Sun"},{"@pid":"235/0716","text":"Chenfei Mao"},{"@pid":"123/5536","text":"Xiaomao Fan"},{"@pid":"55/6910-2","text":"Ye Li 0002"}]},"title":"Accelerometer-Based Speed-Adaptive Gait Authentication Method for Wearable IoT Devices.","venue":"IEEE Internet Things J.","volume":"6","number":"1","pages":"820-830","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/SunMFL19","doi":"10.1109/JIOT.2018.2860592","ee":"https://doi.org/10.1109/JIOT.2018.2860592","url":"https://dblp.org/rec/journals/iotj/SunMFL19"}, "url":"URL#1999868" }, { "@score":"1", "@id":"1999869", "info":{"authors":{"author":[{"@pid":"09/5779","text":"Yaohua Sun"},{"@pid":"75/6927","text":"Mugen Peng"},{"@pid":"52/3003","text":"Shiwen Mao"}]},"title":"Deep Reinforcement Learning-Based Mode Selection and Resource Management for Green Fog Radio Access Networks.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"1960-1971","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/SunPM19","doi":"10.1109/JIOT.2018.2871020","ee":"https://doi.org/10.1109/JIOT.2018.2871020","url":"https://dblp.org/rec/journals/iotj/SunPM19"}, "url":"URL#1999869" }, { "@score":"1", "@id":"1999870", "info":{"authors":{"author":[{"@pid":"88/619-3","text":"Peng Sun 0003"},{"@pid":"09/864","text":"Zhi Tian"},{"@pid":"31/5772-1","text":"Zhibo Wang 0001"},{"@pid":"95/6543-3","text":"Zhi Wang 0003"}]},"title":"PRSS: A Prejudiced Random Sensing Strategy for Energy-Efficient Information Collection in the Internet of Things.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"2717-2728","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/SunTWW19","doi":"10.1109/JIOT.2018.2873756","ee":"https://doi.org/10.1109/JIOT.2018.2873756","url":"https://dblp.org/rec/journals/iotj/SunTWW19"}, "url":"URL#1999870" }, { "@score":"1", "@id":"1999871", "info":{"authors":{"author":[{"@pid":"11/383-1","text":"Gang Sun 0001"},{"@pid":"78/2022-32","text":"Kai Wang 0032"},{"@pid":"94/60","text":"Hongfang Yu"},{"@pid":"22/5535","text":"Xiaojiang Du"},{"@pid":"15/1123","text":"Mohsen Guizani"}]},"title":"Priority-Based Medium Access Control for Wireless Body Area Networks With High-Performance Design.","venue":"IEEE Internet Things J.","volume":"6","number":"3","pages":"5363-5375","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/SunWYDG19","doi":"10.1109/JIOT.2019.2900661","ee":"https://doi.org/10.1109/JIOT.2019.2900661","url":"https://dblp.org/rec/journals/iotj/SunWYDG19"}, "url":"URL#1999871" }, { "@score":"1", "@id":"1999872", "info":{"authors":{"author":[{"@pid":"62/6846-2","text":"Yao Sun 0002"},{"@pid":"64/5666-35","text":"Lei Zhang 0035"},{"@pid":"94/3694-4","text":"Gang Feng 0004"},{"@pid":"176/3974","text":"Bowen Yang"},{"@pid":"17/1169-2","text":"Bin Cao 0002"},{"@pid":"25/1002","text":"Muhammad Ali Imran 0001"}]},"title":"Blockchain-Enabled Wireless Internet of Things: Performance Analysis and Optimal Communication Node Deployment.","venue":"IEEE Internet Things J.","volume":"6","number":"3","pages":"5791-5802","year":"2019","type":"Journal Articles","access":"open","key":"journals/iotj/SunZFYCI19","doi":"10.1109/JIOT.2019.2905743","ee":"https://doi.org/10.1109/JIOT.2019.2905743","url":"https://dblp.org/rec/journals/iotj/SunZFYCI19"}, "url":"URL#1999872" }, { "@score":"1", "@id":"1999873", "info":{"authors":{"author":[{"@pid":"11/383-1","text":"Gang Sun 0001"},{"@pid":"48/1294","text":"Feng Zhang"},{"@pid":"82/7699","text":"Dan Liao"},{"@pid":"94/60","text":"Hongfang Yu"},{"@pid":"22/5535","text":"Xiaojiang Du"},{"@pid":"15/1123","text":"Mohsen Guizani"}]},"title":"Optimal Energy Trading for Plug-In Hybrid Electric Vehicles Based on Fog Computing.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"2309-2324","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/SunZLYDG19","doi":"10.1109/JIOT.2019.2906186","ee":"https://doi.org/10.1109/JIOT.2019.2906186","url":"https://dblp.org/rec/journals/iotj/SunZLYDG19"}, "url":"URL#1999873" }, { "@score":"1", "@id":"1999874", "info":{"authors":{"author":[{"@pid":"217/5066","text":"Thanchanok Sutjarittham"},{"@pid":"139/2729","text":"Hassan Habibi Gharakheili"},{"@pid":"42/840","text":"Salil S. Kanhere"},{"@pid":"63/6049","text":"Vijay Sivaraman"}]},"title":"Experiences With IoT and AI in a Smart Campus for Optimizing Classroom Usage.","venue":"IEEE Internet Things J.","volume":"6","number":"5","pages":"7595-7607","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/SutjaritthamGKS19","doi":"10.1109/JIOT.2019.2902410","ee":"https://doi.org/10.1109/JIOT.2019.2902410","url":"https://dblp.org/rec/journals/iotj/SutjaritthamGKS19"}, "url":"URL#1999874" }, { "@score":"1", "@id":"1999875", "info":{"authors":{"author":[{"@pid":"91/10661","text":"Qingfeng Tan"},{"@pid":"33/3099-3","text":"Yue Gao 0003"},{"@pid":"53/10661","text":"Jinqiao Shi"},{"@pid":"46/7821","text":"Xuebin Wang"},{"@pid":"87/254","text":"Binxing Fang"},{"@pid":"73/5444","text":"Zhihong Tian"}]},"title":"Toward a Comprehensive Insight Into the Eclipse Attacks of Tor Hidden Services.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"1584-1593","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/TanGSWFT19","doi":"10.1109/JIOT.2018.2846624","ee":"https://doi.org/10.1109/JIOT.2018.2846624","url":"https://dblp.org/rec/journals/iotj/TanGSWFT19"}, "url":"URL#1999875" }, { "@score":"1", "@id":"1999876", "info":{"authors":{"author":[{"@pid":"55/4194","text":"Bin Tan"},{"@pid":"20/3894-6","text":"Jun Wu 0006"},{"@pid":"w/RuiWang1","text":"Rui Wang 0001"},{"@pid":"24/8126","text":"Wenlang Luo"},{"@pid":"95/3736","text":"Jun Liu"}]},"title":"An Optimal Resource Allocation for Hybrid Digital-Analog With Combined Multiplexing.","venue":"IEEE Internet Things J.","volume":"6","number":"1","pages":"1125-1135","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/TanWWLL19","doi":"10.1109/JIOT.2018.2867524","ee":"https://doi.org/10.1109/JIOT.2018.2867524","url":"https://dblp.org/rec/journals/iotj/TanWWLL19"}, "url":"URL#1999876" }, { "@score":"1", "@id":"1999877", "info":{"authors":{"author":[{"@pid":"37/7974","text":"Syh-Yuan Tan"},{"@pid":"176/7638","text":"Kin-Woon Yeow"},{"@pid":"00/6588","text":"Seong Oun Hwang"}]},"title":"Enhancement of a Lightweight Attribute-Based Encryption Scheme for the Internet of Things.","venue":"IEEE Internet Things J.","volume":"6","number":"4","pages":"6384-6395","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/TanYH19","doi":"10.1109/JIOT.2019.2900631","ee":"https://doi.org/10.1109/JIOT.2019.2900631","url":"https://dblp.org/rec/journals/iotj/TanYH19"}, "url":"URL#1999877" }, { "@score":"1", "@id":"1999878", "info":{"authors":{"author":[{"@pid":"176/5788","text":"Manal El Tanab"},{"@pid":"43/4366","text":"Walaa Hamouda"}]},"title":"Machine-to-Machine Communications With Massive Access: Congestion Control.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"3545-3557","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/TanabH19","doi":"10.1109/JIOT.2018.2888502","ee":"https://doi.org/10.1109/JIOT.2018.2888502","url":"https://dblp.org/rec/journals/iotj/TanabH19"}, "url":"URL#1999878" }, { "@score":"1", "@id":"1999879", "info":{"authors":{"author":[{"@pid":"134/9714-2","text":"Xiaoying Tang 0002"},{"@pid":"79/8966","text":"Suzhi Bi"},{"@pid":"80/3143","text":"Ying-Jun Angela Zhang"}]},"title":"Distributed Routing and Charging Scheduling Optimization for Internet of Electric Vehicles.","venue":"IEEE Internet Things J.","volume":"6","number":"1","pages":"136-148","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/TangBZ19","doi":"10.1109/JIOT.2018.2876004","ee":"https://doi.org/10.1109/JIOT.2018.2876004","url":"https://dblp.org/rec/journals/iotj/TangBZ19"}, "url":"URL#1999879" }, { "@score":"1", "@id":"1999880", "info":{"authors":{"author":[{"@pid":"53/4045","text":"Changbing Tang"},{"@pid":"40/1491-10","text":"Xiang Li 0010"},{"@pid":"251/1416","text":"Mengwen Cao"},{"@pid":"87/6853-2","text":"Zhao Zhang 0002"},{"@pid":"78/4802","text":"Xinghuo Yu 0001"}]},"title":"Incentive Mechanism for Macrotasking Crowdsourcing: A Zero-Determinant Strategy Approach.","venue":"IEEE Internet Things J.","volume":"6","number":"5","pages":"8589-8601","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/TangLCZY19","doi":"10.1109/JIOT.2019.2921348","ee":"https://doi.org/10.1109/JIOT.2019.2921348","url":"https://dblp.org/rec/journals/iotj/TangLCZY19"}, "url":"URL#1999880" }, { "@score":"1", "@id":"1999881", "info":{"authors":{"author":[{"@pid":"235/0650","text":"Yiqiao Tang"},{"@pid":"251/1484","text":"Yanxian Lin"},{"@pid":"66/10873","text":"Yi-Qiao Song"},{"@pid":"97/10873","text":"Martin D. Hurlimann"}]},"title":"Elastic Regression-Tree Learning in a Heterogeneous Computing Environment.","venue":"IEEE Internet Things J.","volume":"6","number":"5","pages":"8826-8834","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/TangLSH19","doi":"10.1109/JIOT.2019.2923884","ee":"https://doi.org/10.1109/JIOT.2019.2923884","url":"https://dblp.org/rec/journals/iotj/TangLSH19"}, "url":"URL#1999881" }, { "@score":"1", "@id":"1999882", "info":{"authors":{"author":[{"@pid":"171/0982","text":"Wenjuan Tang"},{"@pid":"00/468","text":"Ju Ren"},{"@pid":"03/777","text":"Kun Deng"},{"@pid":"99/4094","text":"Yaoxue Zhang"}]},"title":"Secure Data Aggregation of Lightweight E-Healthcare IoT Devices With Fair Incentives.","venue":"IEEE Internet Things J.","volume":"6","number":"5","pages":"8714-8726","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/TangRDZ19","doi":"10.1109/JIOT.2019.2923261","ee":"https://doi.org/10.1109/JIOT.2019.2923261","url":"https://dblp.org/rec/journals/iotj/TangRDZ19"}, "url":"URL#1999882" }, { "@score":"1", "@id":"1999883", "info":{"authors":{"author":[{"@pid":"25/1710","text":"Hai Tao"},{"@pid":"88/7649","text":"Md. Zakirul Alam Bhuiyan"},{"@pid":"131/1105","text":"Ahmed N. Abdalla"},{"@pid":"84/4762","text":"Mohammad Mehedi Hassan"},{"@pid":"03/6420","text":"Jasni Mohamad Zain"},{"@pid":"83/7380","text":"Thaier Hayajneh"}]},"title":"Secured Data Collection With Hardware-Based Ciphers for IoT-Based Healthcare.","venue":"IEEE Internet Things J.","volume":"6","number":"1","pages":"410-420","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/TaoBAHZH19","doi":"10.1109/JIOT.2018.2854714","ee":"https://doi.org/10.1109/JIOT.2018.2854714","url":"https://dblp.org/rec/journals/iotj/TaoBAHZH19"}, "url":"URL#1999883" }, { "@score":"1", "@id":"1999884", "info":{"authors":{"author":[{"@pid":"133/3684","text":"Xi Tao"},{"@pid":"62/1539-1","text":"Wei Song 0001"}]},"title":"Location-Dependent Task Allocation for Mobile Crowdsensing With Clustering Effect.","venue":"IEEE Internet Things J.","volume":"6","number":"1","pages":"1029-1045","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/TaoS19","doi":"10.1109/JIOT.2018.2866973","ee":"https://doi.org/10.1109/JIOT.2018.2866973","url":"https://dblp.org/rec/journals/iotj/TaoS19"}, "url":"URL#1999884" }, { "@score":"1", "@id":"1999885", "info":{"authors":{"author":[{"@pid":"220/5686","text":"Vijayanand Thangavelu"},{"@pid":"87/2495","text":"Dinil Mon Divakaran"},{"@pid":"220/5372","text":"Rishi Sairam"},{"@pid":"91/9553","text":"Suman Sankar Bhunia"},{"@pid":"m/GMohan","text":"Mohan Gurusamy"}]},"title":"DEFT: A Distributed IoT Fingerprinting Technique.","venue":"IEEE Internet Things J.","volume":"6","number":"1","pages":"940-952","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/ThangaveluDSBG19","doi":"10.1109/JIOT.2018.2865604","ee":"https://doi.org/10.1109/JIOT.2018.2865604","url":"https://dblp.org/rec/journals/iotj/ThangaveluDSBG19"}, "url":"URL#1999885" }, { "@score":"1", "@id":"1999886", "info":{"authors":{"author":[{"@pid":"89/1428","text":"Xiaohua Tian"},{"@pid":"96/3060-3","text":"Yu Cheng 0003"},{"@pid":"00/5146","text":"Devu Manikantan Shila"},{"@pid":"w/AdamWolisz","text":"Adam Wolisz"}]},"title":"Guest Editorial Special Issue on Enabling a Smart City: Internet of Things Meets AI.","venue":"IEEE Internet Things J.","volume":"6","number":"5","pages":"7469-7472","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/TianCSW19","doi":"10.1109/JIOT.2019.2940393","ee":"https://doi.org/10.1109/JIOT.2019.2940393","url":"https://dblp.org/rec/journals/iotj/TianCSW19"}, "url":"URL#1999886" }, { "@score":"1", "@id":"1999887", "info":{"authors":{"author":[{"@pid":"89/1428","text":"Xiaohua Tian"},{"@pid":"203/8441","text":"Wenguang Huang"},{"@pid":"251/1520","text":"Ziao Yu"},{"@pid":"96/1149","text":"Xinbing Wang"}]},"title":"Data Driven Resource Allocation for NFV-Based Internet of Things.","venue":"IEEE Internet Things J.","volume":"6","number":"5","pages":"8310-8322","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/TianHYW19","doi":"10.1109/JIOT.2019.2916865","ee":"https://doi.org/10.1109/JIOT.2019.2916865","url":"https://dblp.org/rec/journals/iotj/TianHYW19"}, "url":"URL#1999887" }, { "@score":"1", "@id":"1999888", "info":{"authors":{"author":[{"@pid":"206/9465","text":"Qiao Tian"},{"@pid":"77/1513-5","text":"Yun Lin 0005"},{"@pid":"231/5006","text":"Xinghao Guo"},{"@pid":"36/8492","text":"Jinming Wen"},{"@pid":"96/361-5","text":"Yi Fang 0005"},{"@pid":"04/1616","text":"Jonathan Rodriguez 0001"},{"@pid":"33/6012","text":"Shahid Mumtaz"}]},"title":"New Security Mechanisms of High-Reliability IoT Communication Based on Radio Frequency Fingerprint.","venue":"IEEE Internet Things J.","volume":"6","number":"5","pages":"7980-7987","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/TianLGWFRM19","doi":"10.1109/JIOT.2019.2913627","ee":"https://doi.org/10.1109/JIOT.2019.2913627","url":"https://dblp.org/rec/journals/iotj/TianLGWFRM19"}, "url":"URL#1999888" }, { "@score":"1", "@id":"1999889", "info":{"authors":{"author":[{"@pid":"59/4435","text":"Ling Tian"},{"@pid":"69/327","text":"Jiaxin Li"},{"@pid":"64/6025-59","text":"Wei Li 0059"},{"@pid":"08/3239","text":"Balasubramaniam Ramesh"},{"@pid":"14/5155-1","text":"Zhipeng Cai 0001"}]},"title":"Optimal Contract-Based Mechanisms for Online Data Trading Markets.","venue":"IEEE Internet Things J.","volume":"6","number":"5","pages":"7800-7810","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/TianLLRC19","doi":"10.1109/JIOT.2019.2902528","ee":"https://doi.org/10.1109/JIOT.2019.2902528","url":"https://dblp.org/rec/journals/iotj/TianLLRC19"}, "url":"URL#1999889" }, { "@score":"1", "@id":"1999890", "info":{"authors":{"author":[{"@pid":"19/5319","text":"Le Tian"},{"@pid":"66/5997","text":"Elena López-Aguilera"},{"@pid":"65/1234","text":"Eduard Garcia Villegas"},{"@pid":"134/6899","text":"Michael Tetemke Mehari"},{"@pid":"34/1837","text":"Eli De Poorter"},{"@pid":"23/2276","text":"Steven Latré"},{"@pid":"01/6700","text":"Jeroen Famaey"}]},"title":"Optimization-Oriented RAW Modeling of IEEE 802.11ah Heterogeneous Networks.","venue":"IEEE Internet Things J.","volume":"6","number":"6","pages":"10597-10609","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/TianLVMPLF19","doi":"10.1109/JIOT.2019.2940251","ee":"https://doi.org/10.1109/JIOT.2019.2940251","url":"https://dblp.org/rec/journals/iotj/TianLVMPLF19"}, "url":"URL#1999890" }, { "@score":"1", "@id":"1999891", "info":{"authors":{"author":[{"@pid":"230/4801","text":"Rijo Jackson Tom"},{"@pid":"01/4965","text":"Suresh Sankaranarayanan"},{"@pid":"25/3419","text":"Joel J. P. C. Rodrigues"}]},"title":"Smart Energy Management and Demand Reduction by Consumers and Utilities in an IoT-Fog-Based Power Distribution System.","venue":"IEEE Internet Things J.","volume":"6","number":"5","pages":"7386-7394","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/TomSR19","doi":"10.1109/JIOT.2019.2894326","ee":"https://doi.org/10.1109/JIOT.2019.2894326","url":"https://dblp.org/rec/journals/iotj/TomSR19"}, "url":"URL#1999891" }, { "@score":"1", "@id":"1999892", "info":{"authors":{"author":[{"@pid":"00/6750","text":"Fei Tong"},{"@pid":"07/7178","text":"Shibo He"},{"@pid":"p/JianpingPan","text":"Jianping Pan 0001"}]},"title":"Modeling and Analysis for Data Collection in Duty-Cycled Linear Sensor Networks With Pipelined-Forwarding Feature.","venue":"IEEE Internet Things J.","volume":"6","number":"6","pages":"9489-9502","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/TongHP19","doi":"10.1109/JIOT.2019.2929308","ee":"https://doi.org/10.1109/JIOT.2019.2929308","url":"https://dblp.org/rec/journals/iotj/TongHP19"}, "url":"URL#1999892" }, { "@score":"1", "@id":"1999893", "info":{"authors":{"author":[{"@pid":"15/8135","text":"Sebastian Trimpe"},{"@pid":"215/4492","text":"Dominik Baumann"}]},"title":"Resource-Aware IoT Control: Saving Communication Through Predictive Triggering.","venue":"IEEE Internet Things J.","volume":"6","number":"3","pages":"5013-5028","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/TrimpeB19","doi":"10.1109/JIOT.2019.2894628","ee":"https://doi.org/10.1109/JIOT.2019.2894628","url":"https://dblp.org/rec/journals/iotj/TrimpeB19"}, "url":"URL#1999893" }, { "@score":"1", "@id":"1999894", "info":{"authors":{"author":[{"@pid":"08/7130","text":"Hamza Turabieh"},{"@pid":"202/6216","text":"Majdi M. Mafarja"},{"@pid":"144/0554","text":"Seyedali Mirjalili"}]},"title":"Dynamic Adaptive Network-Based Fuzzy Inference System (D-ANFIS) for the Imputation of Missing Data for Internet of Medical Things Applications.","venue":"IEEE Internet Things J.","volume":"6","number":"6","pages":"9316-9325","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/TurabiehMM19","doi":"10.1109/JIOT.2019.2926321","ee":"https://doi.org/10.1109/JIOT.2019.2926321","url":"https://dblp.org/rec/journals/iotj/TurabiehMM19"}, "url":"URL#1999894" }, { "@score":"1", "@id":"1999895", "info":{"authors":{"author":[{"@pid":"175/4670","text":"Marcelo Urbina"},{"@pid":"246/5461","text":"Tatiana Acosta"},{"@pid":"53/2972","text":"Jesús Lázaro 0001"},{"@pid":"29/4391","text":"Armando Astarloa"},{"@pid":"33/5249","text":"Unai Bidarte"}]},"title":"Smart Sensor: SoC Architecture for the Industrial Internet of Things.","venue":"IEEE Internet Things J.","volume":"6","number":"4","pages":"6567-6577","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/UrbinaALAB19","doi":"10.1109/JIOT.2019.2908264","ee":"https://doi.org/10.1109/JIOT.2019.2908264","url":"https://dblp.org/rec/journals/iotj/UrbinaALAB19"}, "url":"URL#1999895" }, { "@score":"1", "@id":"1999896", "info":{"authors":{"author":[{"@pid":"255/2351","text":"Luis M. Vela"},{"@pid":"128/5527","text":"Hyeuknam Kwon"},{"@pid":"116/3419","text":"Seward B. Rutkove"},{"@pid":"00/10560","text":"Benjamin Sanchez"}]},"title":"Standalone IoT Bioimpedance Device Supporting Real-Time Online Data Access.","venue":"IEEE Internet Things J.","volume":"6","number":"6","pages":"9545-9554","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/VelaKRS19","doi":"10.1109/JIOT.2019.2929459","ee":"https://doi.org/10.1109/JIOT.2019.2929459","url":"https://dblp.org/rec/journals/iotj/VelaKRS19"}, "url":"URL#1999896" }, { "@score":"1", "@id":"1999897", "info":{"authors":{"author":[{"@pid":"173/0840","text":"Shikhar Verma"},{"@pid":"115/6386","text":"Yuichi Kawamoto"},{"@pid":"19/3059","text":"Nei Kato"}]},"title":"Energy-Efficient Group Paging Mechanism for QoS Constrained Mobile IoT Devices Over LTE-A Pro Networks Under 5G.","venue":"IEEE Internet Things J.","volume":"6","number":"5","pages":"9187-9199","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/VermaKK19","doi":"10.1109/JIOT.2019.2928589","ee":"https://doi.org/10.1109/JIOT.2019.2928589","url":"https://dblp.org/rec/journals/iotj/VermaKK19"}, "url":"URL#1999897" }, { "@score":"1", "@id":"1999898", "info":{"authors":{"author":[{"@pid":"154/3641","text":"Mikhail Vilgelm"},{"@pid":"214/6556","text":"Sergio Rueda Liñares"},{"@pid":"32/3203","text":"Wolfgang Kellerer"}]},"title":"Dynamic Binary Countdown for Massive IoT Random Access in Dense 5G Networks.","venue":"IEEE Internet Things J.","volume":"6","number":"4","pages":"6896-6908","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/VilgelmLK19","doi":"10.1109/JIOT.2019.2912424","ee":"https://doi.org/10.1109/JIOT.2019.2912424","url":"https://dblp.org/rec/journals/iotj/VilgelmLK19"}, "url":"URL#1999898" }, { "@score":"1", "@id":"1999899", "info":{"authors":{"author":[{"@pid":"245/4599","text":"Giulia Violatto"},{"@pid":"94/4377","text":"Ashish Pandharipande"},{"@pid":"57/2281-12","text":"Shuai Li 0012"},{"@pid":"99/3728","text":"Luca Schenato 0001"}]},"title":"Classification of Occupancy Sensor Anomalies in Connected Indoor Lighting Systems.","venue":"IEEE Internet Things J.","volume":"6","number":"4","pages":"7175-7182","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/ViolattoPLS19","doi":"10.1109/JIOT.2019.2914937","ee":"https://doi.org/10.1109/JIOT.2019.2914937","url":"https://dblp.org/rec/journals/iotj/ViolattoPLS19"}, "url":"URL#1999899" }, { "@score":"1", "@id":"1999900", "info":{"authors":{"author":[{"@pid":"52/7637","text":"Wattana Viriyasitavat"},{"@pid":"70/2433","text":"Li Da Xu"},{"@pid":"59/5102","text":"Zhuming Bi"},{"@pid":"251/1588","text":"Danupol Hoonsopon"}]},"title":"Blockchain Technology for Applications in Internet of Things - Mapping From System Design Perspective.","venue":"IEEE Internet Things J.","volume":"6","number":"5","pages":"8155-8168","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/ViriyasitavatXB19","doi":"10.1109/JIOT.2019.2925825","ee":"https://doi.org/10.1109/JIOT.2019.2925825","url":"https://dblp.org/rec/journals/iotj/ViriyasitavatXB19"}, "url":"URL#1999900" }, { "@score":"1", "@id":"1999901", "info":{"authors":{"author":[{"@pid":"51/2311","text":"Arun Vishwanath"},{"@pid":"133/3583","text":"Vikas Chandan"},{"@pid":"41/7719","text":"Kumar Saurav"}]},"title":"An IoT-Based Data Driven Precooling Solution for Electricity Cost Savings in Commercial Buildings.","venue":"IEEE Internet Things J.","volume":"6","number":"5","pages":"7337-7347","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/VishwanathCS19","doi":"10.1109/JIOT.2019.2897988","ee":"https://doi.org/10.1109/JIOT.2019.2897988","url":"https://dblp.org/rec/journals/iotj/VishwanathCS19"}, "url":"URL#1999901" }, { "@score":"1", "@id":"1999902", "info":{"authors":{"author":[{"@pid":"218/7999","text":"Minjie Wan"},{"@pid":"74/973","text":"Guohua Gu"},{"@pid":"182/0477","text":"Weixian Qian"},{"@pid":"28/7458","text":"Kan Ren"},{"@pid":"67/4027","text":"Xavier Maldague"},{"@pid":"11/1394-2","text":"Qian Chen 0002"}]},"title":"Unmanned Aerial Vehicle Video-Based Target Tracking Algorithm Using Sparse Representation.","venue":"IEEE Internet Things J.","volume":"6","number":"6","pages":"9689-9706","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/WanGQRMC19","doi":"10.1109/JIOT.2019.2930656","ee":"https://doi.org/10.1109/JIOT.2019.2930656","url":"https://dblp.org/rec/journals/iotj/WanGQRMC19"}, "url":"URL#1999902" }, { "@score":"1", "@id":"1999903", "info":{"authors":{"author":{"@pid":"10/293","text":"Zhiwei Wang"}},"title":"Blind Batch Encryption-Based Protocol for Secure and Privacy-Preserving Medical Services in Smart Connected Health.","venue":"IEEE Internet Things J.","volume":"6","number":"6","pages":"9555-9562","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/Wang19","doi":"10.1109/JIOT.2019.2929803","ee":"https://doi.org/10.1109/JIOT.2019.2929803","url":"https://dblp.org/rec/journals/iotj/Wang19"}, "url":"URL#1999903" }, { "@score":"1", "@id":"1999904", "info":{"authors":{"author":[{"@pid":"58/6810-39","text":"Li Wang 0039"},{"@pid":"210/6246","text":"Yutong Ai"},{"@pid":"55/6111","text":"Ningning Liu"},{"@pid":"56/2","text":"Aiguo Fei"}]},"title":"User Association and Resource Allocation in Full-Duplex Relay Aided NOMA Systems.","venue":"IEEE Internet Things J.","volume":"6","number":"6","pages":"10580-10596","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/WangALF19","doi":"10.1109/JIOT.2019.2939875","ee":"https://doi.org/10.1109/JIOT.2019.2939875","url":"https://dblp.org/rec/journals/iotj/WangALF19"}, "url":"URL#1999904" }, { "@score":"1", "@id":"1999905", "info":{"authors":{"author":[{"@pid":"35/8397-1","text":"Tianyu Wang 0001"},{"@pid":"78/7658","text":"Xun Cao"},{"@pid":"49/6937-1","text":"Shaowei Wang 0001"}]},"title":"Self-Adaptive Clustering and Load-Bandwidth Management for Uplink Enhancement in Heterogeneous Vehicular Networks.","venue":"IEEE Internet Things J.","volume":"6","number":"3","pages":"5607-5617","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/WangCW19","doi":"10.1109/JIOT.2019.2904036","ee":"https://doi.org/10.1109/JIOT.2019.2904036","url":"https://dblp.org/rec/journals/iotj/WangCW19"}, "url":"URL#1999905" }, { "@score":"1", "@id":"1999906", "info":{"authors":{"author":[{"@pid":"59/3767-6","text":"Hai Wang 0006"},{"@pid":"f/AOFapojuwo","text":"Abraham O. Fapojuwo"}]},"title":"Design and Performance Evaluation of Successive Interference Cancellation-Based Pure Aloha for Internet-of-Things Networks.","venue":"IEEE Internet Things J.","volume":"6","number":"4","pages":"6578-6592","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/WangF19","doi":"10.1109/JIOT.2019.2908598","ee":"https://doi.org/10.1109/JIOT.2019.2908598","url":"https://dblp.org/rec/journals/iotj/WangF19"}, "url":"URL#1999906" }, { "@score":"1", "@id":"1999907", "info":{"authors":{"author":[{"@pid":"142/0351","text":"Fangxin Wang 0001"},{"@pid":"11/3249-1","text":"Wei Gong 0001"},{"@pid":"l/JiangchuanLiu","text":"Jiangchuan Liu"}]},"title":"On Spatial Diversity in WiFi-Based Human Activity Recognition: A Deep Learning-Based Approach.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"2035-2047","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/WangGL19","doi":"10.1109/JIOT.2018.2871445","ee":"https://doi.org/10.1109/JIOT.2018.2871445","url":"https://dblp.org/rec/journals/iotj/WangGL19"}, "url":"URL#1999907" }, { "@score":"1", "@id":"1999908", "info":{"authors":{"author":[{"@pid":"19/1084-1","text":"Desheng Wang 0001"},{"@pid":"11/6278","text":"Peng Hu"},{"@pid":"239/8911","text":"Jingxuan Du"},{"@pid":"84/6614","text":"Pan Zhou"},{"@pid":"133/0321","text":"Tianping Deng"},{"@pid":"20/10116","text":"Menglan Hu"}]},"title":"Routing and Scheduling for Hybrid Truck-Drone Collaborative Parcel Delivery With Independent and Truck-Carried Drones.","venue":"IEEE Internet Things J.","volume":"6","number":"6","pages":"10483-10495","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/WangHDZDH19","doi":"10.1109/JIOT.2019.2939397","ee":"https://doi.org/10.1109/JIOT.2019.2939397","url":"https://dblp.org/rec/journals/iotj/WangHDZDH19"}, "url":"URL#1999908" }, { "@score":"1", "@id":"1999909", "info":{"authors":{"author":[{"@pid":"62/2631-1","text":"Jingjing Wang 0001"},{"@pid":"00/8334","text":"Chunxiao Jiang"},{"@pid":"137/9869","text":"Zhongxiang Wei"},{"@pid":"132/8058","text":"Cunhua Pan"},{"@pid":"70/2140-1","text":"Haijun Zhang 0001"},{"@pid":"00/440-1","text":"Yong Ren 0001"}]},"title":"Joint UAV Hovering Altitude and Power Control for Space-Air-Ground IoT Networks.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"1741-1753","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/WangJWPZR19","doi":"10.1109/JIOT.2018.2875493","ee":"https://doi.org/10.1109/JIOT.2018.2875493","url":"https://dblp.org/rec/journals/iotj/WangJWPZR19"}, "url":"URL#1999909" }, { "@score":"1", "@id":"1999910", "info":{"authors":{"author":[{"@pid":"52/3194-37","text":"Fei Wang 0037"},{"@pid":"35/203","text":"Zhenjiang Li"},{"@pid":"96/6606","text":"Jinsong Han"}]},"title":"Continuous User Authentication by Contactless Wireless Sensing.","venue":"IEEE Internet Things J.","volume":"6","number":"5","pages":"8323-8331","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/WangLH19","doi":"10.1109/JIOT.2019.2916777","ee":"https://doi.org/10.1109/JIOT.2019.2916777","url":"https://dblp.org/rec/journals/iotj/WangLH19"}, "url":"URL#1999910" }, { "@score":"1", "@id":"1999911", "info":{"authors":{"author":[{"@pid":"31/5772-1","text":"Zhibo Wang 0001"},{"@pid":"54/8054","text":"Yijie Li"},{"@pid":"198/8754","text":"Bonan Jin"},{"@pid":"75/5723-2","text":"Qian Wang 0002"},{"@pid":"206/7646","text":"Yunhe Feng"},{"@pid":"74/2853-4","text":"Yanjun Li 0004"},{"@pid":"179/4173","text":"Huajie Shao"}]},"title":"AirMouse: Turning a Pair of Glasses Into a Mouse in the Air.","venue":"IEEE Internet Things J.","volume":"6","number":"5","pages":"7473-7483","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/WangLJWFLS19","doi":"10.1109/JIOT.2019.2900887","ee":"https://doi.org/10.1109/JIOT.2019.2900887","url":"https://dblp.org/rec/journals/iotj/WangLJWFLS19"}, "url":"URL#1999911" }, { "@score":"1", "@id":"1999912", "info":{"authors":{"author":[{"@pid":"54/2170","text":"Licheng Wang"},{"@pid":"73/6284","text":"Lixiang Li 0001"},{"@pid":"48/1097-2","text":"Jin Li 0002"},{"@pid":"l/JingLi-45","text":"Jing Li 0045"},{"@pid":"185/9576","text":"Brij B. Gupta"},{"@pid":"88/4295","text":"Xia Liu"}]},"title":"Compressive Sensing of Medical Images With Confidentially Homomorphic Aggregations.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"1402-1409","year":"2019","type":"Journal Articles","access":"open","key":"journals/iotj/WangLLLGL19","doi":"10.1109/JIOT.2018.2844727","ee":"https://doi.org/10.1109/JIOT.2018.2844727","url":"https://dblp.org/rec/journals/iotj/WangLLLGL19"}, "url":"URL#1999912" }, { "@score":"1", "@id":"1999913", "info":{"authors":{"author":[{"@pid":"58/6299-8","text":"Jia Wang 0008"},{"@pid":"08/2185-1","text":"Jianqiang Li 0001"},{"@pid":"04/10735","text":"Huihui Wang 0001"},{"@pid":"117/3526","text":"Leo Yu Zhang"},{"@pid":"35/4723","text":"Lee-Ming Cheng"},{"@pid":"22/8016","text":"Qiuzhen Lin"}]},"title":"Dynamic Scalable Elliptic Curve Cryptographic Scheme and Its Application to In-Vehicle Security.","venue":"IEEE Internet Things J.","volume":"6","number":"4","pages":"5892-5901","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/WangLWZCL19","doi":"10.1109/JIOT.2018.2869872","ee":"https://doi.org/10.1109/JIOT.2018.2869872","url":"https://dblp.org/rec/journals/iotj/WangLWZCL19"}, "url":"URL#1999913" }, { "@score":"1", "@id":"1999914", "info":{"authors":{"author":[{"@pid":"68/1277","text":"Xinyu Wang"},{"@pid":"75/8016","text":"Xiaoyuan Luo"},{"@pid":"26/10039","text":"Yuyan Zhang"},{"@pid":"25/3029","text":"Xinping Guan"}]},"title":"Detection and Isolation of False Data Injection Attacks in Smart Grids via Nonlinear Interval Observer.","venue":"IEEE Internet Things J.","volume":"6","number":"4","pages":"6498-6512","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/WangLZG19","doi":"10.1109/JIOT.2019.2916670","ee":"https://doi.org/10.1109/JIOT.2019.2916670","url":"https://dblp.org/rec/journals/iotj/WangLZG19"}, "url":"URL#1999914" }, { "@score":"1", "@id":"1999915", "info":{"authors":{"author":[{"@pid":"54/2170","text":"Licheng Wang"},{"@pid":"43/1032-1","text":"Yan Meng 0001"},{"@pid":"22/5702","text":"Haojin Zhu"},{"@pid":"214/0411","text":"Minxing Tang"},{"@pid":"18/4822","text":"Kaoru Ota"}]},"title":"Edge-Assisted Stream Scheduling Scheme for the Green-Communication-Based IoT.","venue":"IEEE Internet Things J.","volume":"6","number":"4","pages":"7282-7292","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/WangMZTO19","doi":"10.1109/JIOT.2019.2915793","ee":"https://doi.org/10.1109/JIOT.2019.2915793","url":"https://dblp.org/rec/journals/iotj/WangMZTO19"}, "url":"URL#1999915" }, { "@score":"1", "@id":"1999916", "info":{"authors":{"author":[{"@pid":"29/5259-16","text":"Jie Wang 0016"},{"@pid":"17/11202","text":"Sigit Aryo Pambudi"},{"@pid":"52/7033","text":"Wenye Wang"},{"@pid":"99/5721-2","text":"Min Song 0002"}]},"title":"Resilience of IoT Systems Against Edge-Induced Cascade-of-Failures: A Networking Perspective.","venue":"IEEE Internet Things J.","volume":"6","number":"4","pages":"6952-6963","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/WangPWS19","doi":"10.1109/JIOT.2019.2913140","ee":"https://doi.org/10.1109/JIOT.2019.2913140","url":"https://dblp.org/rec/journals/iotj/WangPWS19"}, "url":"URL#1999916" }, { "@score":"1", "@id":"1999917", "info":{"authors":{"author":[{"@pid":"44/2323-3","text":"Guanghui Wang 0003"},{"@pid":"142/1160","text":"Xiufang Shi"},{"@pid":"47/3877","text":"Jianping He 0001"},{"@pid":"p/JianpingPan","text":"Jianping Pan 0001"},{"@pid":"42/5472","text":"Subin Shen"}]},"title":"Location Region Estimation for Internet of Things: A Distance Distribution-Based Approach.","venue":"IEEE Internet Things J.","volume":"6","number":"1","pages":"654-665","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/WangSHPS19","doi":"10.1109/JIOT.2018.2853149","ee":"https://doi.org/10.1109/JIOT.2018.2853149","url":"https://dblp.org/rec/journals/iotj/WangSHPS19"}, "url":"URL#1999917" }, { "@score":"1", "@id":"1999918", "info":{"authors":{"author":[{"@pid":"64/4732","text":"Bowen Wang"},{"@pid":"75/10403","text":"Yanjing Sun"},{"@pid":"67/2580-1","text":"Song Li 0001"},{"@pid":"40/5905-1","text":"Qi Cao 0001"}]},"title":"Hierarchical Matching With Peer Effect for Low-Latency and High-Reliable Caching in Social IoT.","venue":"IEEE Internet Things J.","volume":"6","number":"1","pages":"1193-1209","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/WangSLC19","doi":"10.1109/JIOT.2018.2867617","ee":"https://doi.org/10.1109/JIOT.2018.2867617","url":"https://dblp.org/rec/journals/iotj/WangSLC19"}, "url":"URL#1999918" }, { "@score":"1", "@id":"1999919", "info":{"authors":{"author":[{"@pid":"02/5889-51","text":"Yu Wang 0051"},{"@pid":"217/1190","text":"Yinxing Shen"},{"@pid":"52/3003","text":"Shiwen Mao"},{"@pid":"24/1518","text":"Xin Chen"},{"@pid":"240/6927","text":"Hualei Zou"}]},"title":"LASSO and LSTM Integrated Temporal Model for Short-Term Solar Intensity Forecasting.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"2933-2944","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/WangSMCZ19","doi":"10.1109/JIOT.2018.2877510","ee":"https://doi.org/10.1109/JIOT.2018.2877510","url":"https://dblp.org/rec/journals/iotj/WangSMCZ19"}, "url":"URL#1999919" }, { "@score":"1", "@id":"1999920", "info":{"authors":{"author":[{"@pid":"46/2005-3","text":"Ning Wang 0003"},{"@pid":"15/4476-3","text":"Pu Wang 0003"},{"@pid":"194/7058","text":"Amir Alipour-Fanid"},{"@pid":"67/1608","text":"Long Jiao"},{"@pid":"80/1651-1","text":"Kai Zeng 0001"}]},"title":"Physical-Layer Security of 5G Wireless Networks for IoT: Challenges and Opportunities.","venue":"IEEE Internet Things J.","volume":"6","number":"5","pages":"8169-8181","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/WangWAJZ19","doi":"10.1109/JIOT.2019.2927379","ee":"https://doi.org/10.1109/JIOT.2019.2927379","url":"https://dblp.org/rec/journals/iotj/WangWAJZ19"}, "url":"URL#1999920" }, { "@score":"1", "@id":"1999921", "info":{"authors":{"author":[{"@pid":"227/7723","text":"Huafei Wang"},{"@pid":"138/6914","text":"Liangtian Wan"},{"@pid":"62/6234","text":"Mianxiong Dong"},{"@pid":"18/4822","text":"Kaoru Ota"},{"@pid":"73/5579-1","text":"Xianpeng Wang 0001"}]},"title":"Assistant Vehicle Localization Based on Three Collaborative Base Stations via SBL-Based Robust DOA Estimation.","venue":"IEEE Internet Things J.","volume":"6","number":"3","pages":"5766-5777","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/WangWDOW19","doi":"10.1109/JIOT.2019.2905788","ee":"https://doi.org/10.1109/JIOT.2019.2905788","url":"https://dblp.org/rec/journals/iotj/WangWDOW19"}, "url":"URL#1999921" }, { "@score":"1", "@id":"1999922", "info":{"authors":{"author":[{"@pid":"73/4432","text":"Huaqun Wang"},{"@pid":"06/1263","text":"Qihua Wang"},{"@pid":"87/7765","text":"Debiao He"},{"@pid":"181/2688-11","text":"Qi Li 0011"},{"@pid":"70/1220-1","text":"Zhe Liu 0001"}]},"title":"BBARS: Blockchain-Based Anonymous Rewarding Scheme for V2G Networks.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"3676-3687","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/WangWHLL19","doi":"10.1109/JIOT.2018.2890213","ee":"https://doi.org/10.1109/JIOT.2018.2890213","url":"https://dblp.org/rec/journals/iotj/WangWHLL19"}, "url":"URL#1999922" }, { "@score":"1", "@id":"1999923", "info":{"authors":{"author":[{"@pid":"94/4375","text":"Mu Wang"},{"@pid":"51/4906","text":"Changqiao Xu"},{"@pid":"211/5842","text":"Xingyan Chen"},{"@pid":"96/10637","text":"Hao Hao"},{"@pid":"124/8701","text":"Lujie Zhong"},{"@pid":"88/1600","text":"Dapeng Oliver Wu"}]},"title":"Design of Multipath Transmission Control for Information-Centric Internet of Things: A Distributed Stochastic Optimization Framework.","venue":"IEEE Internet Things J.","volume":"6","number":"6","pages":"9475-9488","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/WangXCHZW19","doi":"10.1109/JIOT.2019.2929263","ee":"https://doi.org/10.1109/JIOT.2019.2929263","url":"https://dblp.org/rec/journals/iotj/WangXCHZW19"}, "url":"URL#1999923" }, { "@score":"1", "@id":"1999924", "info":{"authors":{"author":[{"@pid":"64/10471","text":"Mengdi Wang"},{"@pid":"43/5467-1","text":"Di Xiao 0001"},{"@pid":"21/6849","text":"Yanping Xiang"},{"@pid":"39/721-50","text":"Hui Wang 0050"}]},"title":"Privacy-Aware Controllable Compressed Data Publishing Against Sparse Estimation Attack in IoT.","venue":"IEEE Internet Things J.","volume":"6","number":"4","pages":"7305-7318","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/WangXXW19","doi":"10.1109/JIOT.2019.2916109","ee":"https://doi.org/10.1109/JIOT.2019.2916109","url":"https://dblp.org/rec/journals/iotj/WangXXW19"}, "url":"URL#1999924" }, { "@score":"1", "@id":"1999925", "info":{"authors":{"author":[{"@pid":"52/3194-14","text":"Fei Wang 0014"},{"@pid":"55/6835","text":"Yongjun Xu"},{"@pid":"26/2546","text":"Liehuang Zhu"},{"@pid":"22/5535","text":"Xiaojiang Du"},{"@pid":"15/1123","text":"Mohsen Guizani"}]},"title":"LAMANCO: A Lightweight Anonymous Mutual Authentication Scheme for $N$ -Times Computing Offloading in IoT.","venue":"IEEE Internet Things J.","volume":"6","number":"3","pages":"4462-4471","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/WangXZDG19","doi":"10.1109/JIOT.2018.2888636","ee":"https://doi.org/10.1109/JIOT.2018.2888636","url":"https://dblp.org/rec/journals/iotj/WangXZDG19"}, "url":"URL#1999925" }, { "@score":"1", "@id":"1999926", "info":{"authors":{"author":[{"@pid":"49/3800-2","text":"Lu Wang 0002"},{"@pid":"88/3509","text":"Hailiang Yang"},{"@pid":"118/9618","text":"Xiaoke Qi"},{"@pid":"90/514-23","text":"Jun Xu 0023"},{"@pid":"34/4445","text":"Kaishun Wu"}]},"title":"iCast: Fine-Grained Wireless Video Streaming Over Internet of Intelligent Vehicles.","venue":"IEEE Internet Things J.","volume":"6","number":"1","pages":"111-123","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/WangYQXW19","doi":"10.1109/JIOT.2018.2872518","ee":"https://doi.org/10.1109/JIOT.2018.2872518","url":"https://dblp.org/rec/journals/iotj/WangYQXW19"}, "url":"URL#1999926" }, { "@score":"1", "@id":"1999927", "info":{"authors":{"author":[{"@pid":"90/4693-5","text":"Pengfei Wang 0005"},{"@pid":"99/6747","text":"Chao Yao"},{"@pid":"148/4458","text":"Zijie Zheng"},{"@pid":"29/6473-3","text":"Guangyu Sun 0003"},{"@pid":"02/2683","text":"Lingyang Song"}]},"title":"Joint Task Assignment, Transmission, and Computing Resource Allocation in Multilayer Mobile Edge Computing Systems.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"2872-2884","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/WangYZSS19","doi":"10.1109/JIOT.2018.2876198","ee":"https://doi.org/10.1109/JIOT.2018.2876198","url":"https://dblp.org/rec/journals/iotj/WangYZSS19"}, "url":"URL#1999927" }, { "@score":"1", "@id":"1999928", "info":{"authors":{"author":[{"@pid":"71/4292-7","text":"Gang Wang 0007"},{"@pid":"251/1475","text":"Weichen Zhu"},{"@pid":"a/NirwanAnsari","text":"Nirwan Ansari"}]},"title":"Robust TDOA-Based Localization for IoT via Joint Source Position and NLOS Error Estimation.","venue":"IEEE Internet Things J.","volume":"6","number":"5","pages":"8529-8541","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/WangZA19","doi":"10.1109/JIOT.2019.2920081","ee":"https://doi.org/10.1109/JIOT.2019.2920081","url":"https://dblp.org/rec/journals/iotj/WangZA19"}, "url":"URL#1999928" }, { "@score":"1", "@id":"1999929", "info":{"authors":{"author":[{"@pid":"18/2771-4","text":"Cong Wang 0004"},{"@pid":"64/3770-4","text":"Yiying Zhang 0004"},{"@pid":"16/3283-14","text":"Xi Chen 0014"},{"@pid":"74/10673-2","text":"Kun Liang 0002"},{"@pid":"10/293","text":"Zhiwei Wang"}]},"title":"SDN-Based Handover Authentication Scheme for Mobile Edge Computing in Cyber-Physical Systems.","venue":"IEEE Internet Things J.","volume":"6","number":"5","pages":"8692-8701","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/WangZCLW19","doi":"10.1109/JIOT.2019.2922979","ee":"https://doi.org/10.1109/JIOT.2019.2922979","url":"https://dblp.org/rec/journals/iotj/WangZCLW19"}, "url":"URL#1999929" }, { "@score":"1", "@id":"1999930", "info":{"authors":{"author":[{"@pid":"25/3246-1","text":"Tian Wang 0001"},{"@pid":"221/4666","text":"Guangxue Zhang"},{"@pid":"28/3062","text":"Anfeng Liu"},{"@pid":"88/7649","text":"Md. Zakirul Alam Bhuiyan"},{"@pid":"54/2551","text":"Qun Jin"}]},"title":"A Secure IoT Service Architecture With an Efficient Balance Dynamics Based on Cloud and Edge Computing.","venue":"IEEE Internet Things J.","volume":"6","number":"3","pages":"4831-4843","year":"2019","type":"Journal Articles","access":"open","key":"journals/iotj/WangZLBJ19","doi":"10.1109/JIOT.2018.2870288","ee":"https://doi.org/10.1109/JIOT.2018.2870288","url":"https://dblp.org/rec/journals/iotj/WangZLBJ19"}, "url":"URL#1999930" }, { "@score":"1", "@id":"1999931", "info":{"authors":{"author":[{"@pid":"25/3246-1","text":"Tian Wang 0001"},{"@pid":"213/3241","text":"Jiyuan Zhou"},{"@pid":"28/3062","text":"Anfeng Liu"},{"@pid":"88/7649","text":"Md. Zakirul Alam Bhuiyan"},{"@pid":"81/3285-1","text":"Guojun Wang 0001"},{"@pid":"57/1667-1","text":"Weijia Jia 0001"}]},"title":"Fog-Based Computing and Storage Offloading for Data Synchronization in IoT.","venue":"IEEE Internet Things J.","volume":"6","number":"3","pages":"4272-4282","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/WangZLBWJ19","doi":"10.1109/JIOT.2018.2875915","ee":"https://doi.org/10.1109/JIOT.2018.2875915","url":"https://dblp.org/rec/journals/iotj/WangZLBWJ19"}, "url":"URL#1999931" }, { "@score":"1", "@id":"1999932", "info":{"authors":{"author":[{"@pid":"35/7092-199","text":"Wei Wang 0199"},{"@pid":"74/1626","text":"Qingqing Zhang"},{"@pid":"29/756","text":"Hua Lin"},{"@pid":"174/6491","text":"Mingqing Liu"},{"@pid":"31/1079","text":"Xiaoyan Liang"},{"@pid":"67/4161","text":"Qingwen Liu"}]},"title":"Wireless Energy Transmission Channel Modeling in Resonant Beam Charging for IoT Devices.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"3976-3986","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/WangZLLLL19","doi":"10.1109/JIOT.2019.2894008","ee":"https://doi.org/10.1109/JIOT.2019.2894008","url":"https://dblp.org/rec/journals/iotj/WangZLLLL19"}, "url":"URL#1999932" }, { "@score":"1", "@id":"1999933", "info":{"authors":{"author":[{"@pid":"92/1375","text":"Jin Wang"},{"@pid":"57/7071","text":"Yingfeng Zhang"},{"@pid":"51/3710-34","text":"Yang Liu 0034"},{"@pid":"76/1703","text":"Naiqi Wu"}]},"title":"Multiagent and Bargaining-Game-Based Real-Time Scheduling for Internet of Things-Enabled Flexible Job Shop.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"2518-2531","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/WangZLW19","doi":"10.1109/JIOT.2018.2871346","ee":"https://doi.org/10.1109/JIOT.2018.2871346","url":"https://dblp.org/rec/journals/iotj/WangZLW19"}, "url":"URL#1999933" }, { "@score":"1", "@id":"1999934", "info":{"authors":{"author":[{"@pid":"25/4764","text":"Yibo Wang"},{"@pid":"251/1478","text":"Jinju Zhang"},{"@pid":"07/1266","text":"Fang Peng"},{"@pid":"157/5736","text":"Shuyue Wu"}]},"title":"A Glasses Frame Antenna for the Applications in Internet of Things.","venue":"IEEE Internet Things J.","volume":"6","number":"5","pages":"8911-8918","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/WangZPW19","doi":"10.1109/JIOT.2019.2924236","ee":"https://doi.org/10.1109/JIOT.2019.2924236","url":"https://dblp.org/rec/journals/iotj/WangZPW19"}, "url":"URL#1999934" }, { "@score":"1", "@id":"1999935", "info":{"authors":{"author":[{"@pid":"46/1165","text":"Haijun Wang"},{"@pid":"00/3855-1","text":"Haitao Zhao 0001"},{"@pid":"98/4547","text":"Weiyu Wu"},{"@pid":"45/9946-2","text":"Jun Xiong 0002"},{"@pid":"16/5407","text":"Dongtang Ma"},{"@pid":"48/2647","text":"Jibo Wei"}]},"title":"Deployment Algorithms of Flying Base Stations: 5G and Beyond With UAVs.","venue":"IEEE Internet Things J.","volume":"6","number":"6","pages":"10009-10027","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/WangZWXMW19","doi":"10.1109/JIOT.2019.2935105","ee":"https://doi.org/10.1109/JIOT.2019.2935105","url":"https://dblp.org/rec/journals/iotj/WangZWXMW19"}, "url":"URL#1999935" }, { "@score":"1", "@id":"1999936", "info":{"authors":{"author":[{"@pid":"171/9762","text":"Tianben Wang"},{"@pid":"83/1359-1","text":"Daqing Zhang 0001"},{"@pid":"07/8764","text":"Leye Wang"},{"@pid":"08/9937","text":"Yuanqing Zheng"},{"@pid":"65/4916","text":"Tao Gu"},{"@pid":"29/4128","text":"Bernadette Dorizzi"},{"@pid":"88/20-1","text":"Xingshe Zhou 0001"}]},"title":"Contactless Respiration Monitoring Using Ultrasound Signal With Off-the-Shelf Audio Devices.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"2959-2973","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/WangZWZGDZ19","doi":"10.1109/JIOT.2018.2877607","ee":"https://doi.org/10.1109/JIOT.2018.2877607","url":"https://dblp.org/rec/journals/iotj/WangZWZGDZ19"}, "url":"URL#1999936" }, { "@score":"1", "@id":"1999937", "info":{"authors":{"author":[{"@pid":"38/8493","text":"Zinan Wang"},{"@pid":"13/5236","text":"Bin Zhang"},{"@pid":"71/8959","text":"Ji Xiong"},{"@pid":"00/5815","text":"Yun Fu"},{"@pid":"235/8045","text":"Shengtao Lin"},{"@pid":"218/2808","text":"Jialin Jiang"},{"@pid":"235/8360","text":"Yongxiang Chen"},{"@pid":"41/5979","text":"Yue Wu"},{"@pid":"19/7695","text":"Qingyang Meng"},{"@pid":"187/8028","text":"Yunjiang Rao"}]},"title":"Distributed Acoustic Sensing Based on Pulse-Coding Phase-Sensitive OTDR.","venue":"IEEE Internet Things J.","volume":"6","number":"4","pages":"6117-6124","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/WangZXFLJCWMR19","doi":"10.1109/JIOT.2018.2869474","ee":"https://doi.org/10.1109/JIOT.2018.2869474","url":"https://dblp.org/rec/journals/iotj/WangZXFLJCWMR19"}, "url":"URL#1999937" }, { "@score":"1", "@id":"1999938", "info":{"authors":{"author":[{"@pid":"50/8713","text":"Minghua Wang"},{"@pid":"07/1592","text":"Lihua Zhu"},{"@pid":"y/LaurenceTianruoYang","text":"Laurence T. Yang"},{"@pid":"78/3592","text":"Man Lin"},{"@pid":"132/8072","text":"Xianjun Deng"},{"@pid":"160/6071","text":"Lingzhi Yi"}]},"title":"Offloading-Assisted Energy-Balanced IoT Edge Node Relocation for Confident Information Coverage.","venue":"IEEE Internet Things J.","volume":"6","number":"3","pages":"4482-4490","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/WangZYLDY19","doi":"10.1109/JIOT.2018.2876409","ee":"https://doi.org/10.1109/JIOT.2018.2876409","url":"https://dblp.org/rec/journals/iotj/WangZYLDY19"}, "url":"URL#1999938" }, { "@score":"1", "@id":"1999939", "info":{"authors":{"author":[{"@pid":"02/6128-11","text":"Xiangyu Wang 0011"},{"@pid":"07/314-28","text":"Jian Zhang 0028"},{"@pid":"151/0631","text":"Zhitao Yu"},{"@pid":"52/3003","text":"Shiwen Mao"},{"@pid":"53/2227","text":"Senthilkumar Chinnappa Gounder Periaswamy"},{"@pid":"220/6662","text":"Justin Patton"}]},"title":"On Remote Temperature Sensing Using Commercial UHF RFID Tags.","venue":"IEEE Internet Things J.","volume":"6","number":"6","pages":"10715-10727","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/WangZYMPP19","doi":"10.1109/JIOT.2019.2941023","ee":"https://doi.org/10.1109/JIOT.2019.2941023","url":"https://dblp.org/rec/journals/iotj/WangZYMPP19"}, "url":"URL#1999939" }, { "@score":"1", "@id":"1999940", "info":{"authors":{"author":[{"@pid":"63/1591-4","text":"Shuo Wang 0004"},{"@pid":"52/5264-1","text":"Xing Zhang 0001"},{"@pid":"52/7209-2","text":"Zhi Yan 0002"},{"@pid":"28/4847","text":"Wenbo Wang 0007"}]},"title":"Cooperative Edge Computing With Sleep Control Under Nonuniform Traffic in Mobile Edge Networks.","venue":"IEEE Internet Things J.","volume":"6","number":"3","pages":"4295-4306","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/WangZYW19","doi":"10.1109/JIOT.2018.2875939","ee":"https://doi.org/10.1109/JIOT.2018.2875939","url":"https://dblp.org/rec/journals/iotj/WangZYW19"}, "url":"URL#1999940" }, { "@score":"1", "@id":"1999941", "info":{"authors":{"author":[{"@pid":"35/7092-180","text":"Wei Wang 0180"},{"@pid":"83/5342-17","text":"Min Zhang 0017"},{"@pid":"89/5992-42","text":"Li Zhang 0042"}]},"title":"Classification of Data Stream in Sensor Network With Small Samples.","venue":"IEEE Internet Things J.","volume":"6","number":"4","pages":"6018-6025","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/WangZZ19","doi":"10.1109/JIOT.2018.2867649","ee":"https://doi.org/10.1109/JIOT.2018.2867649","url":"https://dblp.org/rec/journals/iotj/WangZZ19"}, "url":"URL#1999941" }, { "@score":"1", "@id":"1999942", "info":{"authors":{"author":[{"@pid":"122/2287","text":"Mohammad Wazid"},{"@pid":"251/1499","text":"Palak Bagga"},{"@pid":"39/871","text":"Ashok Kumar Das"},{"@pid":"82/2803","text":"Sachin Shetty"},{"@pid":"25/3419","text":"Joel J. P. C. Rodrigues"},{"@pid":"40/8858","text":"Youngho Park 0005"}]},"title":"AKM-IoV: Authenticated Key Management Protocol in Fog Computing-Based Internet of Vehicles Deployment.","venue":"IEEE Internet Things J.","volume":"6","number":"5","pages":"8804-8817","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/WazidBDSRP19","doi":"10.1109/JIOT.2019.2923611","ee":"https://doi.org/10.1109/JIOT.2019.2923611","url":"https://dblp.org/rec/journals/iotj/WazidBDSRP19"}, "url":"URL#1999942" }, { "@score":"1", "@id":"1999943", "info":{"authors":{"author":[{"@pid":"122/2287","text":"Mohammad Wazid"},{"@pid":"39/871","text":"Ashok Kumar Das"},{"@pid":"04/8395","text":"Neeraj Kumar 0001"},{"@pid":"40/4747","text":"Athanasios V. Vasilakos"},{"@pid":"25/3419","text":"Joel J. P. C. Rodrigues"}]},"title":"Design and Analysis of Secure Lightweight Remote User Authentication and Key Agreement Scheme in Internet of Drones Deployment.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"3572-3584","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/WazidDKVR19","doi":"10.1109/JIOT.2018.2888821","ee":"https://doi.org/10.1109/JIOT.2018.2888821","url":"https://dblp.org/rec/journals/iotj/WazidDKVR19"}, "url":"URL#1999943" }, { "@score":"1", "@id":"1999944", "info":{"authors":{"author":[{"@pid":"179/9886","text":"Liangxiong Wei"},{"@pid":"137/7342","text":"Yanru Chen"},{"@pid":"237/1388","text":"Lunyue Chen"},{"@pid":"82/4593","text":"Lian Zhao"},{"@pid":"95/2661","text":"Liangyin Chen"}]},"title":"A Neighbor Discovery Method Based on Probabilistic Neighborship Model for IoT.","venue":"IEEE Internet Things J.","volume":"6","number":"6","pages":"9350-9359","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/WeiCCZC19","doi":"10.1109/JIOT.2019.2929076","ee":"https://doi.org/10.1109/JIOT.2019.2929076","url":"https://dblp.org/rec/journals/iotj/WeiCCZC19"}, "url":"URL#1999944" }, { "@score":"1", "@id":"1999945", "info":{"authors":{"author":[{"@pid":"25/11052","text":"Zhiqing Wei"},{"@pid":"48/195-1","text":"Zhiyong Feng 0001"},{"@pid":"14/8431","text":"Haibo Zhou"},{"@pid":"58/6810-39","text":"Li Wang 0039"},{"@pid":"168/2616","text":"Huici Wu"}]},"title":"Capacity and Delay of Unmanned Aerial Vehicle Networks With Mobility.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"1640-1653","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/WeiFZWW19","doi":"10.1109/JIOT.2018.2871024","ee":"https://doi.org/10.1109/JIOT.2018.2871024","url":"https://dblp.org/rec/journals/iotj/WeiFZWW19"}, "url":"URL#1999945" }, { "@score":"1", "@id":"1999946", "info":{"authors":{"author":[{"@pid":"184/0126","text":"Wenting Wei"},{"@pid":"49/1366","text":"Huaxi Gu"},{"@pid":"05/1958-1","text":"Kun Wang 0001"},{"@pid":"129/4851","text":"Xiaoshan Yu"},{"@pid":"184/0493","text":"Xuanzhang Liu"}]},"title":"Improving Cloud-Based IoT Services Through Virtual Network Embedding in Elastic Optical Inter-DC Networks.","venue":"IEEE Internet Things J.","volume":"6","number":"1","pages":"986-996","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/WeiGWYL19","doi":"10.1109/JIOT.2018.2866504","ee":"https://doi.org/10.1109/JIOT.2018.2866504","url":"https://dblp.org/rec/journals/iotj/WeiGWYL19"}, "url":"URL#1999946" }, { "@score":"1", "@id":"1999947", "info":{"authors":{"author":[{"@pid":"90/1629","text":"Xianglin Wei"},{"@pid":"07/9079","text":"Chaogang Tang"},{"@pid":"46/1459","text":"Jianhua Fan"},{"@pid":"10/4014","text":"Suresh Subramaniam 0001"}]},"title":"Joint Optimization of Energy Consumption and Delay in Cloud-to-Thing Continuum.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"2325-2337","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/WeiTFS19","doi":"10.1109/JIOT.2019.2906287","ee":"https://doi.org/10.1109/JIOT.2019.2906287","url":"https://dblp.org/rec/journals/iotj/WeiTFS19"}, "url":"URL#1999947" }, { "@score":"1", "@id":"1999948", "info":{"authors":{"author":[{"@pid":"77/7911","text":"Yifei Wei"},{"@pid":"16/6654","text":"F. Richard Yu"},{"@pid":"05/2978","text":"Mei Song"},{"@pid":"83/514","text":"Zhu Han 0001"}]},"title":"Joint Optimization of Caching, Computing, and Radio Resources for Fog-Enabled IoT Using Natural Actor-Critic Deep Reinforcement Learning.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"2061-2073","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/WeiYSH19","doi":"10.1109/JIOT.2018.2878435","ee":"https://doi.org/10.1109/JIOT.2018.2878435","url":"https://dblp.org/rec/journals/iotj/WeiYSH19"}, "url":"URL#1999948" }, { "@score":"1", "@id":"1999949", "info":{"authors":{"author":[{"@pid":"75/10312","text":"Ziling Wei"},{"@pid":"88/8117","text":"Baokang Zhao"},{"@pid":"15/2098","text":"Jinshu Su"},{"@pid":"07/2551","text":"Xicheng Lu"}]},"title":"Dynamic Edge Computation Offloading for Internet of Things With Energy Harvesting: A Learning Method.","venue":"IEEE Internet Things J.","volume":"6","number":"3","pages":"4436-4447","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/WeiZSL19","doi":"10.1109/JIOT.2018.2882783","ee":"https://doi.org/10.1109/JIOT.2018.2882783","url":"https://dblp.org/rec/journals/iotj/WeiZSL19"}, "url":"URL#1999949" }, { "@score":"1", "@id":"1999950", "info":{"authors":{"author":[{"@pid":"54/4158-9","text":"Qiong Wu 0009"},{"@pid":"83/6331-4","text":"Xu Chen 0004"},{"@pid":"04/2090-6","text":"Zhi Zhou 0006"},{"@pid":"01/5394-9","text":"Liang Chen 0009"}]},"title":"Mobile Social Data Learning for User-Centric Location Prediction With Application in Mobile Edge Service Migration.","venue":"IEEE Internet Things J.","volume":"6","number":"5","pages":"7737-7747","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/WuCZC19","doi":"10.1109/JIOT.2019.2903120","ee":"https://doi.org/10.1109/JIOT.2019.2903120","url":"https://dblp.org/rec/journals/iotj/WuCZC19"}, "url":"URL#1999950" }, { "@score":"1", "@id":"1999951", "info":{"authors":{"author":[{"@pid":"38/4472","text":"Hejun Wu"},{"@pid":"175/8954","text":"Zhimin Ding"},{"@pid":"c/JiannongCao","text":"Jiannong Cao 0001"}]},"title":"GROLO: Realistic Range-Based Localization for Mobile IoTs Through Global Rigidity.","venue":"IEEE Internet Things J.","volume":"6","number":"3","pages":"5048-5057","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/WuDC19","doi":"10.1109/JIOT.2019.2895127","ee":"https://doi.org/10.1109/JIOT.2019.2895127","url":"https://dblp.org/rec/journals/iotj/WuDC19"}, "url":"URL#1999951" }, { "@score":"1", "@id":"1999952", "info":{"authors":{"author":[{"@pid":"251/1566","text":"Minyue Wu"},{"@pid":"47/2141","text":"Xiaoya Hu"},{"@pid":"56/8969","text":"Rongqing Zhang 0001"},{"@pid":"52/6918-1","text":"Liuqing Yang 0001"}]},"title":"Collision Recognition in Multihop IEEE 802.15.4-Compliant Wireless Sensor Networks.","venue":"IEEE Internet Things J.","volume":"6","number":"5","pages":"8542-8552","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/WuHZY19","doi":"10.1109/JIOT.2019.2920022","ee":"https://doi.org/10.1109/JIOT.2019.2920022","url":"https://dblp.org/rec/journals/iotj/WuHZY19"}, "url":"URL#1999952" }, { "@score":"1", "@id":"1999953", "info":{"authors":{"author":[{"@pid":"96/2744-16","text":"Jian Wu 0016"},{"@pid":"03/3147","text":"Roozbeh Jafari"}]},"title":"Orientation Independent Activity/Gesture Recognition Using Wearable Motion Sensors.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"1427-1437","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/WuJ19","doi":"10.1109/JIOT.2018.2856119","ee":"https://doi.org/10.1109/JIOT.2018.2856119","url":"https://dblp.org/rec/journals/iotj/WuJ19"}, "url":"URL#1999953" }, { "@score":"1", "@id":"1999954", "info":{"authors":{"author":[{"@pid":"41/5979","text":"Yue Wu"},{"@pid":"73/237-1","text":"Fan Li 0001"},{"@pid":"04/2089","text":"Liran Ma"},{"@pid":"243/3386","text":"Yadong Xie"},{"@pid":"63/1303-10","text":"Ting Li 0010"},{"@pid":"w/YuWang3","text":"Yu Wang 0003"}]},"title":"A Context-Aware Multiarmed Bandit Incentive Mechanism for Mobile Crowd Sensing Systems.","venue":"IEEE Internet Things J.","volume":"6","number":"5","pages":"7648-7658","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/WuLMXLW19","doi":"10.1109/JIOT.2019.2903197","ee":"https://doi.org/10.1109/JIOT.2019.2903197","url":"https://dblp.org/rec/journals/iotj/WuLMXLW19"}, "url":"URL#1999954" }, { "@score":"1", "@id":"1999955", "info":{"authors":{"author":[{"@pid":"72/4250-25","text":"Hao Wu 0025"},{"@pid":"179/9891","text":"Xinchen Lyu"},{"@pid":"57/1592-3","text":"Hui Tian 0003"}]},"title":"Online Optimization of Wireless Powered Mobile-Edge Computing for Heterogeneous Industrial Internet of Things.","venue":"IEEE Internet Things J.","volume":"6","number":"6","pages":"9880-9892","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/WuLT19","doi":"10.1109/JIOT.2019.2932995","ee":"https://doi.org/10.1109/JIOT.2019.2932995","url":"https://dblp.org/rec/journals/iotj/WuLT19"}, "url":"URL#1999955" }, { "@score":"1", "@id":"1999956", "info":{"authors":{"author":[{"@pid":"130/9482-4","text":"Keyu Wu 0004"},{"@pid":"28/10652-2","text":"Fudong Li 0002"},{"@pid":"t/ChinthaTellambura","text":"Chintha Tellambura"},{"@pid":"15/5983-1","text":"Hai Jiang 0001"}]},"title":"Optimal Selective Transmission Policy for Energy-Harvesting Wireless Sensors via Monotone Neural Networks.","venue":"IEEE Internet Things J.","volume":"6","number":"6","pages":"9963-9978","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/WuLTJ19","doi":"10.1109/JIOT.2019.2933579","ee":"https://doi.org/10.1109/JIOT.2019.2933579","url":"https://dblp.org/rec/journals/iotj/WuLTJ19"}, "url":"URL#1999956" }, { "@score":"1", "@id":"1999957", "info":{"authors":{"author":[{"@pid":"20/3894-1","text":"Jun Wu 0001"},{"@pid":"170/3490","text":"Shibo Luo"},{"@pid":"80/920-2","text":"Shen Wang 0002"},{"@pid":"02/4890","text":"Hongkai Wang"}]},"title":"NLES: A Novel Lifetime Extension Scheme for Safety-Critical Cyber-Physical Systems Using SDN and NFV.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"2463-2475","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/WuLWW19","doi":"10.1109/JIOT.2018.2870294","ee":"https://doi.org/10.1109/JIOT.2018.2870294","url":"https://dblp.org/rec/journals/iotj/WuLWW19"}, "url":"URL#1999957" }, { "@score":"1", "@id":"1999958", "info":{"authors":{"author":[{"@pid":"41/5176-1","text":"Yuan Wu 0001"},{"@pid":"144/7396","text":"Jiajun Shi"},{"@pid":"226/7979","text":"Kejie Ni"},{"@pid":"132/6446","text":"Liping Qian 0001"},{"@pid":"83/4805-6","text":"Wei Zhu 0006"},{"@pid":"34/520-1","text":"Zhiguo Shi 0001"},{"@pid":"29/7201","text":"Limin Meng"}]},"title":"Secrecy-Based Delay-Aware Computation Offloading via Mobile Edge Computing for Internet of Things.","venue":"IEEE Internet Things J.","volume":"6","number":"3","pages":"4201-4213","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/WuSNQZSM19","doi":"10.1109/JIOT.2018.2875241","ee":"https://doi.org/10.1109/JIOT.2018.2875241","url":"https://dblp.org/rec/journals/iotj/WuSNQZSM19"}, "url":"URL#1999958" }, { "@score":"1", "@id":"1999959", "info":{"authors":{"author":[{"@pid":"44/3928","text":"Dapeng Wu 0002"},{"@pid":"83/2089","text":"Hang Shi"},{"@pid":"70/5417-1","text":"Honggang Wang 0001"},{"@pid":"92/1227","text":"Ruyan Wang"},{"@pid":"10/966-1","text":"Hua Fang 0001"}]},"title":"A Feature-Based Learning System for Internet of Things Applications.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"1928-1937","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/WuSWWF19","doi":"10.1109/JIOT.2018.2884485","ee":"https://doi.org/10.1109/JIOT.2018.2884485","url":"https://dblp.org/rec/journals/iotj/WuSWWF19"}, "url":"URL#1999959" }, { "@score":"1", "@id":"1999960", "info":{"authors":{"author":[{"@pid":"239/5504","text":"Boqiang Wu"},{"@pid":"31/3465","text":"Nianxiong Tan"}]},"title":"An Energy Metering and Measurement SoC With a Novel Low-Power DSP Architecture.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"3298-3308","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/WuT19","doi":"10.1109/JIOT.2018.2882494","ee":"https://doi.org/10.1109/JIOT.2018.2882494","url":"https://dblp.org/rec/journals/iotj/WuT19"}, "url":"URL#1999960" }, { "@score":"1", "@id":"1999961", "info":{"authors":{"author":[{"@pid":"96/2744-21","text":"Jian Wu 0021"},{"@pid":"55/4194","text":"Bin Tan"},{"@pid":"20/3894-6","text":"Jun Wu 0006"},{"@pid":"w/RuiWang1","text":"Rui Wang 0001"}]},"title":"Efficient Soft Video MIMO Design to Combine Diversity and Spatial Multiplexing Gain.","venue":"IEEE Internet Things J.","volume":"6","number":"3","pages":"5461-5472","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/WuTWW19","doi":"10.1109/JIOT.2019.2902269","ee":"https://doi.org/10.1109/JIOT.2019.2902269","url":"https://dblp.org/rec/journals/iotj/WuTWW19"}, "url":"URL#1999961" }, { "@score":"1", "@id":"1999962", "info":{"authors":{"author":[{"@pid":"22/1911","text":"Mingli Wu"},{"@pid":"05/1958-5","text":"Kun Wang 0005"},{"@pid":"251/1574","text":"Xiaoqin Cai"},{"@pid":"01/267-1","text":"Song Guo 0001"},{"@pid":"99/6797","text":"Minyi Guo"},{"@pid":"50/320","text":"Chunming Rong"}]},"title":"A Comprehensive Survey of Blockchain: From Theory to IoT Applications and Beyond.","venue":"IEEE Internet Things J.","volume":"6","number":"5","pages":"8114-8154","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/WuWCGGR19","doi":"10.1109/JIOT.2019.2922538","ee":"https://doi.org/10.1109/JIOT.2019.2922538","url":"https://dblp.org/rec/journals/iotj/WuWCGGR19"}, "url":"URL#1999962" }, { "@score":"1", "@id":"1999963", "info":{"authors":{"author":[{"@pid":"255/2274","text":"Liangguang Wu"},{"@pid":"92/3758","text":"Yonghua Xiong"},{"@pid":"16/0-2","text":"Min Wu 0002"},{"@pid":"15/2841-3","text":"Yong He 0003"},{"@pid":"49/5166","text":"Jinhua She"}]},"title":"A Task Assignment Method for Sweep Coverage Optimization Based on Crowdsensing.","venue":"IEEE Internet Things J.","volume":"6","number":"6","pages":"10686-10699","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/WuXWHS19","doi":"10.1109/JIOT.2019.2940717","ee":"https://doi.org/10.1109/JIOT.2019.2940717","url":"https://dblp.org/rec/journals/iotj/WuXWHS19"}, "url":"URL#1999963" }, { "@score":"1", "@id":"1999964", "info":{"authors":{"author":[{"@pid":"22/0","text":"Yu Wu"},{"@pid":"71/7028-2","text":"Li Yan 0002"},{"@pid":"28/520","text":"Xuming Fang"}]},"title":"A Low-Latency Content Dissemination Scheme for mmWave Vehicular Networks.","venue":"IEEE Internet Things J.","volume":"6","number":"5","pages":"7921-7933","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/WuYF19","doi":"10.1109/JIOT.2019.2907119","ee":"https://doi.org/10.1109/JIOT.2019.2907119","url":"https://dblp.org/rec/journals/iotj/WuYF19"}, "url":"URL#1999964" }, { "@score":"1", "@id":"1999965", "info":{"authors":{"author":[{"@pid":"79/4033","text":"Yongdong Wu"},{"@pid":"39/9365","text":"Dengpan Ye"},{"@pid":"12/10479","text":"Zhuo Wei"},{"@pid":"75/5723-2","text":"Qian Wang 0002"},{"@pid":"40/2144","text":"William Tan"},{"@pid":"d/RobertHDeng","text":"Robert H. Deng"}]},"title":"Situation-Aware Authenticated Video Broadcasting Over Train-Trackside WiFi Networks.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"1617-1627","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/WuYWWTD19","doi":"10.1109/JIOT.2018.2859185","ee":"https://doi.org/10.1109/JIOT.2018.2859185","url":"https://dblp.org/rec/journals/iotj/WuYWWTD19"}, "url":"URL#1999965" }, { "@score":"1", "@id":"1999966", "info":{"authors":{"author":[{"@pid":"45/3158-2","text":"Chao Wu 0002"},{"@pid":"99/4094","text":"Yaoxue Zhang"}]},"title":"Toward Efficient Transparent Computing for IoT Apps by On-Chip Kernel Offload.","venue":"IEEE Internet Things J.","volume":"6","number":"3","pages":"4085-4097","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/WuZ19","doi":"10.1109/JIOT.2018.2875050","ee":"https://doi.org/10.1109/JIOT.2018.2875050","url":"https://dblp.org/rec/journals/iotj/WuZ19"}, "url":"URL#1999966" }, { "@score":"1", "@id":"1999967", "info":{"authors":{"author":[{"@pid":"45/3158-2","text":"Chao Wu 0002"},{"@pid":"99/4094","text":"Yaoxue Zhang"},{"@pid":"251/2735","text":"Yongheng Deng"}]},"title":"Toward Fast and Distributed Computation Migration System for Edge Computing in IoT.","venue":"IEEE Internet Things J.","volume":"6","number":"6","pages":"10041-10052","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/WuZD19","doi":"10.1109/JIOT.2019.2935120","ee":"https://doi.org/10.1109/JIOT.2019.2935120","url":"https://dblp.org/rec/journals/iotj/WuZD19"}, "url":"URL#1999967" }, { "@score":"1", "@id":"1999968", "info":{"authors":{"author":[{"@pid":"17/995","text":"Hui Wu"},{"@pid":"81/6236-1","text":"Zhaoyang Zhang 0001"},{"@pid":"143/7109","text":"Chunxu Jiao"},{"@pid":"02/4391-1","text":"Chunguang Li 0001"},{"@pid":"65/1128","text":"Tony Q. S. Quek"}]},"title":"Learn to Sense: A Meta-Learning-Based Sensing and Fusion Framework for Wireless Sensor Networks.","venue":"IEEE Internet Things J.","volume":"6","number":"5","pages":"8215-8227","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/WuZJLQ19","doi":"10.1109/JIOT.2019.2919225","ee":"https://doi.org/10.1109/JIOT.2019.2919225","url":"https://dblp.org/rec/journals/iotj/WuZJLQ19"}, "url":"URL#1999968" }, { "@score":"1", "@id":"1999969", "info":{"authors":{"author":[{"@pid":"44/3928","text":"Dapeng Wu 0002"},{"@pid":"91/5464","text":"Zhihao Zhang"},{"@pid":"05/3879","text":"Shaoen Wu"},{"@pid":"62/5839-29","text":"Jing Yang 0029"},{"@pid":"92/1227","text":"Ruyan Wang"}]},"title":"Biologically Inspired Resource Allocation for Network Slices in 5G-Enabled Internet of Things.","venue":"IEEE Internet Things J.","volume":"6","number":"6","pages":"9266-9279","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/WuZWYW19","doi":"10.1109/JIOT.2018.2888543","ee":"https://doi.org/10.1109/JIOT.2018.2888543","url":"https://dblp.org/rec/journals/iotj/WuZWYW19"}, "url":"URL#1999969" }, { "@score":"1", "@id":"1999970", "info":{"authors":{"author":[{"@pid":"188/9399","text":"Stephen Xia"},{"@pid":"188/9237","text":"Daniel de Godoy"},{"@pid":"188/6243","text":"Bashima Islam"},{"@pid":"188/5947","text":"Md Tamzeed Islam"},{"@pid":"162/5547","text":"Shahriar Nirjon"},{"@pid":"k/PeterRKinget","text":"Peter R. Kinget"},{"@pid":"j/XiaofanJiang","text":"Xiaofan Jiang 0001"}]},"title":"Improving Pedestrian Safety in Cities Using Intelligent Wearable Systems.","venue":"IEEE Internet Things J.","volume":"6","number":"5","pages":"7497-7514","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/XiaGIINKJ19","doi":"10.1109/JIOT.2019.2903519","ee":"https://doi.org/10.1109/JIOT.2019.2903519","url":"https://dblp.org/rec/journals/iotj/XiaGIINKJ19"}, "url":"URL#1999970" }, { "@score":"1", "@id":"1999971", "info":{"authors":{"author":[{"@pid":"88/5697","text":"Qi Xia"},{"@pid":"202/6932","text":"Emmanuel Boateng Sifah"},{"@pid":"227/7788","text":"Kwame Opuni-Boachie Obour Agyekum"},{"@pid":"130/4585","text":"Hu Xia"},{"@pid":"242/4446","text":"Kingsley Nketia Acheampong"},{"@pid":"202/7478","text":"Abla Smahi"},{"@pid":"12/9764","text":"Jianbin Gao"},{"@pid":"22/5535","text":"Xiaojiang Du"},{"@pid":"15/1123","text":"Mohsen Guizani"}]},"title":"Secured Fine-Grained Selective Access to Outsourced Cloud Data in IoT Environments.","venue":"IEEE Internet Things J.","volume":"6","number":"6","pages":"10749-10762","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/XiaSAXASGDG19","doi":"10.1109/JIOT.2019.2941638","ee":"https://doi.org/10.1109/JIOT.2019.2941638","url":"https://dblp.org/rec/journals/iotj/XiaSAXASGDG19"}, "url":"URL#1999971" }, { "@score":"1", "@id":"1999972", "info":{"authors":{"author":[{"@pid":"129/9670","text":"Chunjing Xiao"},{"@pid":"217/7376","text":"Daojun Han"},{"@pid":"139/4724","text":"Yongsen Ma"},{"@pid":"52/1374","text":"Zhiguang Qin"}]},"title":"CsiGAN: Robust Channel State Information-Based Activity Recognition With GANs.","venue":"IEEE Internet Things J.","volume":"6","number":"6","pages":"10191-10204","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/XiaoHMQ19","doi":"10.1109/JIOT.2019.2936580","ee":"https://doi.org/10.1109/JIOT.2019.2936580","url":"https://dblp.org/rec/journals/iotj/XiaoHMQ19"}, "url":"URL#1999972" }, { "@score":"1", "@id":"1999973", "info":{"authors":{"author":[{"@pid":"208/0865","text":"Yinhao Xiao"},{"@pid":"51/8333","text":"Yizhen Jia"},{"@pid":"c/XiuzhenCheng","text":"Xiuzhen Cheng 0001"},{"@pid":"34/25","text":"Jiguo Yu"},{"@pid":"99/4951","text":"Zhenkai Liang"},{"@pid":"09/864","text":"Zhi Tian"}]},"title":"I Can See Your Brain: Investigating Home-Use Electroencephalography System Security.","venue":"IEEE Internet Things J.","volume":"6","number":"4","pages":"6681-6691","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/XiaoJCYLT19","doi":"10.1109/JIOT.2019.2910115","ee":"https://doi.org/10.1109/JIOT.2019.2910115","url":"https://dblp.org/rec/journals/iotj/XiaoJCYLT19"}, "url":"URL#1999973" }, { "@score":"1", "@id":"1999974", "info":{"authors":{"author":[{"@pid":"18/7081","text":"Zhu Xiao"},{"@pid":"255/2382","text":"Dapeng Xiao"},{"@pid":"172/4426","text":"Vincent Havyarimana"},{"@pid":"25/4108-1","text":"Hongbo Jiang 0001"},{"@pid":"141/1957","text":"Daibo Liu"},{"@pid":"40/3934-16","text":"Dong Wang 0016"},{"@pid":"81/655","text":"Fanzi Zeng"}]},"title":"Toward Accurate Vehicle State Estimation Under Non-Gaussian Noises.","venue":"IEEE Internet Things J.","volume":"6","number":"6","pages":"10652-10664","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/XiaoXHJLWZ19","doi":"10.1109/JIOT.2019.2940412","ee":"https://doi.org/10.1109/JIOT.2019.2940412","url":"https://dblp.org/rec/journals/iotj/XiaoXHJLWZ19"}, "url":"URL#1999974" }, { "@score":"1", "@id":"1999975", "info":{"authors":{"author":[{"@pid":"213/7479","text":"Lifeng Xie"},{"@pid":"37/5126-2","text":"Jie Xu 0002"},{"@pid":"60/2536-6","text":"Rui Zhang 0006"}]},"title":"Throughput Maximization for UAV-Enabled Wireless Powered Communication Networks.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"1690-1703","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/XieXZ19","doi":"10.1109/JIOT.2018.2875446","ee":"https://doi.org/10.1109/JIOT.2018.2875446","url":"https://dblp.org/rec/journals/iotj/XieXZ19"}, "url":"URL#1999975" }, { "@score":"1", "@id":"1999976", "info":{"authors":{"author":[{"@pid":"200/0016","text":"Haomeng Xie"},{"@pid":"43/180-2","text":"Zheng Yan 0002"},{"@pid":"42/4018","text":"Zhen Yao"},{"@pid":"a/MAtiquzzaman","text":"Mohammed Atiquzzaman"}]},"title":"Data Collection for Security Measurement in Wireless Sensor Networks: A Survey.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"2205-2224","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/XieYYA19","doi":"10.1109/JIOT.2018.2883403","ee":"https://doi.org/10.1109/JIOT.2018.2883403","url":"https://dblp.org/rec/journals/iotj/XieYYA19"}, "url":"URL#1999976" }, { "@score":"1", "@id":"1999977", "info":{"authors":{"author":[{"@pid":"174/9863","text":"Zehui Xiong"},{"@pid":"199/1893","text":"Shaohan Feng"},{"@pid":"28/4847-4","text":"Wenbo Wang 0004"},{"@pid":"76/440","text":"Dusit Niyato"},{"@pid":"37/1304-1","text":"Ping Wang 0001"},{"@pid":"83/514","text":"Zhu Han 0001"}]},"title":"Cloud/Fog Computing Resource Management and Pricing for Blockchain Networks.","venue":"IEEE Internet Things J.","volume":"6","number":"3","pages":"4585-4600","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/XiongFWNWH19","doi":"10.1109/JIOT.2018.2871706","ee":"https://doi.org/10.1109/JIOT.2018.2871706","url":"https://dblp.org/rec/journals/iotj/XiongFWNWH19"}, "url":"URL#1999977" }, { "@score":"1", "@id":"1999978", "info":{"authors":{"author":[{"@pid":"187/9876","text":"Mingliang Xiong"},{"@pid":"174/6491","text":"Mingqing Liu"},{"@pid":"74/1626","text":"Qingqing Zhang"},{"@pid":"67/4161","text":"Qingwen Liu"},{"@pid":"20/3894-6","text":"Jun Wu 0006"},{"@pid":"83/4774","text":"Pengfei Xia"}]},"title":"TDMA in Adaptive Resonant Beam Charging for IoT Devices.","venue":"IEEE Internet Things J.","volume":"6","number":"1","pages":"867-877","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/XiongLZLWX19","doi":"10.1109/JIOT.2018.2863232","ee":"https://doi.org/10.1109/JIOT.2018.2863232","url":"https://dblp.org/rec/journals/iotj/XiongLZLWX19"}, "url":"URL#1999978" }, { "@score":"1", "@id":"1999979", "info":{"authors":{"author":[{"@pid":"31/7623","text":"Jinbo Xiong"},{"@pid":"24/2694","text":"Jun Ren"},{"@pid":"09/3666-29","text":"Lei Chen 0029"},{"@pid":"34/121","text":"Zhiqiang Yao"},{"@pid":"120/9149","text":"Mingwei Lin"},{"@pid":"44/3928","text":"Dapeng Wu 0002"},{"@pid":"90/4149-1","text":"Ben Niu 0001"}]},"title":"Enhancing Privacy and Availability for Data Clustering in Intelligent Electrical Service of IoT.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"1530-1540","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/XiongRCYLWN19","doi":"10.1109/JIOT.2018.2842773","ee":"https://doi.org/10.1109/JIOT.2018.2842773","url":"https://dblp.org/rec/journals/iotj/XiongRCYLWN19"}, "url":"URL#1999979" }, { "@score":"1", "@id":"1999980", "info":{"authors":{"author":[{"@pid":"18/1034","text":"Sendren Sheng-Dong Xu"},{"@pid":"255/2195","text":"Chun-Huang Chen"},{"@pid":"154/0823","text":"Teng-Chang Chang"}]},"title":"Design of oneM2M-Based Fog Computing Architecture.","venue":"IEEE Internet Things J.","volume":"6","number":"6","pages":"9464-9474","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/XuCC19","doi":"10.1109/JIOT.2019.2929118","ee":"https://doi.org/10.1109/JIOT.2019.2929118","url":"https://dblp.org/rec/journals/iotj/XuCC19"}, "url":"URL#1999980" }, { "@score":"1", "@id":"1999981", "info":{"authors":{"author":[{"@pid":"262/0620-2","text":"Zhiwei Xu 0002"},{"@pid":"11/3352","text":"Lu Chao"},{"@pid":"06/8456-2","text":"Xiaohui Peng 0002"}]},"title":"T-REST: An Open-Enabled Architectural Style for the Internet of Things.","venue":"IEEE Internet Things J.","volume":"6","number":"3","pages":"4019-4034","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/XuCP19","doi":"10.1109/JIOT.2018.2875912","ee":"https://doi.org/10.1109/JIOT.2018.2875912","url":"https://dblp.org/rec/journals/iotj/XuCP19"}, "url":"URL#1999981" }, { "@score":"1", "@id":"1999982", "info":{"authors":{"author":[{"@pid":"54/1474-2","text":"Chen Xu 0002"},{"@pid":"210/3589","text":"Junhao Feng"},{"@pid":"65/3277","text":"Zhenyu Zhou"},{"@pid":"20/3894-1","text":"Jun Wu 0001"},{"@pid":"115/6940","text":"Charith Perera"}]},"title":"Cross-Layer Optimization for Cooperative Content Distribution in Multihop Device-to-Device Networks.","venue":"IEEE Internet Things J.","volume":"6","number":"1","pages":"278-287","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/XuFZWP19","doi":"10.1109/JIOT.2017.2741718","ee":"https://doi.org/10.1109/JIOT.2017.2741718","url":"https://dblp.org/rec/journals/iotj/XuFZWP19"}, "url":"URL#1999982" }, { "@score":"1", "@id":"1999983", "info":{"authors":{"author":[{"@pid":"159/5475","text":"Qinyi Xu"},{"@pid":"27/4390-2","text":"Yi Han 0002"},{"@pid":"20/3346-1","text":"Beibei Wang 0001"},{"@pid":"16/0-1","text":"Min Wu 0001"},{"@pid":"68/3163","text":"K. J. Ray Liu"}]},"title":"Indoor Events Monitoring Using Channel State Information Time Series.","venue":"IEEE Internet Things J.","volume":"6","number":"3","pages":"4977-4990","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/XuHWWL19","doi":"10.1109/JIOT.2019.2894332","ee":"https://doi.org/10.1109/JIOT.2019.2894332","url":"https://dblp.org/rec/journals/iotj/XuHWWL19"}, "url":"URL#1999983" }, { "@score":"1", "@id":"1999984", "info":{"authors":{"author":[{"@pid":"98/7731","text":"Weitao Xu"},{"@pid":"j/SanjayJha","text":"Sanjay Jha 0001"},{"@pid":"01/6410","text":"Wen Hu"}]},"title":"LoRa-Key: Secure Key Generation System for LoRa-Based Network.","venue":"IEEE Internet Things J.","volume":"6","number":"4","pages":"6404-6416","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/XuJH19","doi":"10.1109/JIOT.2018.2888553","ee":"https://doi.org/10.1109/JIOT.2018.2888553","url":"https://dblp.org/rec/journals/iotj/XuJH19"}, "url":"URL#1999984" }, { "@score":"1", "@id":"1999985", "info":{"authors":{"author":[{"@pid":"07/1951-5","text":"Jing Xu 0005"},{"@pid":"137/8316","text":"Jiachen Li"},{"@pid":"92/3836","text":"Shimin Gong"},{"@pid":"95/1161-1","text":"Kun Zhu 0001"},{"@pid":"76/440","text":"Dusit Niyato"}]},"title":"Passive Relaying Game for Wireless Powered Internet of Things in Backscatter-Aided Hybrid Radio Networks.","venue":"IEEE Internet Things J.","volume":"6","number":"5","pages":"8933-8944","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/XuLGZN19","doi":"10.1109/JIOT.2019.2924977","ee":"https://doi.org/10.1109/JIOT.2019.2924977","url":"https://dblp.org/rec/journals/iotj/XuLGZN19"}, "url":"URL#1999985" }, { "@score":"1", "@id":"1999986", "info":{"authors":{"author":[{"@pid":"55/6835","text":"Yongjun Xu"},{"@pid":"76/3791","text":"Guoquan Li"},{"@pid":"48/450-81","text":"Yang Yang 0081"},{"@pid":"60/6348-2","text":"Miao Liu 0002"},{"@pid":"16/8146","text":"Guan Gui 0001"}]},"title":"Robust Resource Allocation and Power Splitting in SWIPT Enabled Heterogeneous Networks: A Robust Minimax Approach.","venue":"IEEE Internet Things J.","volume":"6","number":"6","pages":"10799-10811","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/XuLYLG19","doi":"10.1109/JIOT.2019.2941897","ee":"https://doi.org/10.1109/JIOT.2019.2941897","url":"https://dblp.org/rec/journals/iotj/XuLYLG19"}, "url":"URL#1999986" }, { "@score":"1", "@id":"1999987", "info":{"authors":{"author":[{"@pid":"139/9927","text":"Tongyang Xu"},{"@pid":"82/5581","text":"Christos Masouros"},{"@pid":"66/5161","text":"Izzat Darwazeh"}]},"title":"Waveform and Space Precoding for Next Generation Downlink Narrowband IoT.","venue":"IEEE Internet Things J.","volume":"6","number":"3","pages":"5097-5107","year":"2019","type":"Journal Articles","access":"open","key":"journals/iotj/XuMD19","doi":"10.1109/JIOT.2019.2896724","ee":"https://doi.org/10.1109/JIOT.2019.2896724","url":"https://dblp.org/rec/journals/iotj/XuMD19"}, "url":"URL#1999987" }, { "@score":"1", "@id":"1999988", "info":{"authors":{"author":[{"@pid":"76/10775","text":"Dongyang Xu"},{"@pid":"28/2359","text":"Pinyi Ren"},{"@pid":"33/4999","text":"James A. Ritcey"}]},"title":"PHY-Layer Cover-Free Coding for Wireless Pilot Authentication in IoV Communications: Protocol Design and Ultra-Security Proof.","venue":"IEEE Internet Things J.","volume":"6","number":"1","pages":"171-187","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/XuRR19","doi":"10.1109/JIOT.2018.2878333","ee":"https://doi.org/10.1109/JIOT.2018.2878333","url":"https://dblp.org/rec/journals/iotj/XuRR19"}, "url":"URL#1999988" }, { "@score":"1", "@id":"1999989", "info":{"authors":{"author":[{"@pid":"206/8406","text":"Chugui Xu"},{"@pid":"00/468","text":"Ju Ren"},{"@pid":"210/5181","text":"Liang She"},{"@pid":"99/4094","text":"Yaoxue Zhang"},{"@pid":"148/4477","text":"Zhan Qin"},{"@pid":"20/6179-1","text":"Kui Ren 0001"}]},"title":"EdgeSanitizer: Locally Differentially Private Deep Inference at the Edge for Mobile Data Analytics.","venue":"IEEE Internet Things J.","volume":"6","number":"3","pages":"5140-5151","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/XuRSZQR19","doi":"10.1109/JIOT.2019.2897005","ee":"https://doi.org/10.1109/JIOT.2019.2897005","url":"https://dblp.org/rec/journals/iotj/XuRSZQR19"}, "url":"URL#1999989" }, { "@score":"1", "@id":"1999990", "info":{"authors":{"author":[{"@pid":"159/4497","text":"Qichao Xu"},{"@pid":"67/4307","text":"Zhou Su"},{"@pid":"32/1858","text":"Qinghua Zheng"},{"@pid":"99/10051","text":"Minnan Luo"},{"@pid":"45/5631-1","text":"Bo Dong 0001"},{"@pid":"50/7188-1","text":"Kuan Zhang 0001"}]},"title":"Game Theoretical Secure Caching Scheme in Multihoming Edge Computing-Enabled Heterogeneous Networks.","venue":"IEEE Internet Things J.","volume":"6","number":"3","pages":"4536-4546","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/XuSZLDZ19","doi":"10.1109/JIOT.2018.2876417","ee":"https://doi.org/10.1109/JIOT.2018.2876417","url":"https://dblp.org/rec/journals/iotj/XuSZLDZ19"}, "url":"URL#1999990" }, { "@score":"1", "@id":"1999991", "info":{"authors":{"author":[{"@pid":"97/2966-4","text":"Chang Xu 0004"},{"@pid":"255/2304","text":"Yayun Si"},{"@pid":"26/2546","text":"Liehuang Zhu"},{"@pid":"23/1788-3","text":"Chuan Zhang 0003"},{"@pid":"54/7398","text":"Kashif Sharif"},{"@pid":"35/1714-2","text":"Can Zhang 0002"}]},"title":"Pay as How You Behave: A Truthful Incentive Mechanism for Mobile Crowdsensing.","venue":"IEEE Internet Things J.","volume":"6","number":"6","pages":"10053-10063","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/XuSZZSZ19","doi":"10.1109/JIOT.2019.2935145","ee":"https://doi.org/10.1109/JIOT.2019.2935145","url":"https://dblp.org/rec/journals/iotj/XuSZZSZ19"}, "url":"URL#1999991" }, { "@score":"1", "@id":"1999992", "info":{"authors":{"author":[{"@pid":"81/4590-5","text":"Wenbo Xu 0005"},{"@pid":"32/5536","text":"Shu Wang"},{"@pid":"44/5507","text":"Shu Yan"},{"@pid":"40/3669","text":"Jianhua He"}]},"title":"An Efficient Wideband Spectrum Sensing Algorithm for Unmanned Aerial Vehicle Communication Networks.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"1768-1780","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/XuWYH19","doi":"10.1109/JIOT.2018.2882532","ee":"https://doi.org/10.1109/JIOT.2018.2882532","url":"https://dblp.org/rec/journals/iotj/XuWYH19"}, "url":"URL#1999992" }, { "@score":"1", "@id":"1999993", "info":{"authors":{"author":[{"@pid":"97/2966-4","text":"Chang Xu 0004"},{"@pid":"125/7669","text":"Ningning Wang"},{"@pid":"26/2546","text":"Liehuang Zhu"},{"@pid":"54/7398","text":"Kashif Sharif"},{"@pid":"23/1788-3","text":"Chuan Zhang 0003"}]},"title":"Achieving Searchable and Privacy-Preserving Data Sharing for Cloud-Assisted E-Healthcare System.","venue":"IEEE Internet Things J.","volume":"6","number":"5","pages":"8345-8356","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/XuWZSZ19","doi":"10.1109/JIOT.2019.2917186","ee":"https://doi.org/10.1109/JIOT.2019.2917186","url":"https://dblp.org/rec/journals/iotj/XuWZSZ19"}, "url":"URL#1999993" }, { "@score":"1", "@id":"1999994", "info":{"authors":{"author":[{"@pid":"97/2966-4","text":"Chang Xu 0004"},{"@pid":"145/6290","text":"Jiachen Wang"},{"@pid":"26/2546","text":"Liehuang Zhu"},{"@pid":"23/1788-3","text":"Chuan Zhang 0003"},{"@pid":"54/7398","text":"Kashif Sharif"}]},"title":"PPMR: A Privacy-Preserving Online Medical Service Recommendation Scheme in eHealthcare System.","venue":"IEEE Internet Things J.","volume":"6","number":"3","pages":"5665-5673","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/XuWZZS19","doi":"10.1109/JIOT.2019.2904728","ee":"https://doi.org/10.1109/JIOT.2019.2904728","url":"https://dblp.org/rec/journals/iotj/XuWZZS19"}, "url":"URL#1999994" }, { "@score":"1", "@id":"1999995", "info":{"authors":{"author":[{"@pid":"37/5126-31","text":"Jie Xu 0031"},{"@pid":"94/5600","text":"Kaiping Xue"},{"@pid":"83/1926-2","text":"Shaohua Li 0002"},{"@pid":"251/1443","text":"Hangyu Tian"},{"@pid":"178/4910","text":"Jianan Hong"},{"@pid":"15/2421","text":"Peilin Hong"},{"@pid":"96/5144","text":"Nenghai Yu"}]},"title":"Healthchain: A Blockchain-Based Privacy Preserving Scheme for Large-Scale Health Data.","venue":"IEEE Internet Things J.","volume":"6","number":"5","pages":"8770-8781","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/XuXLTHHY19","doi":"10.1109/JIOT.2019.2923525","ee":"https://doi.org/10.1109/JIOT.2019.2923525","url":"https://dblp.org/rec/journals/iotj/XuXLTHHY19"}, "url":"URL#1999995" }, { "@score":"1", "@id":"1999996", "info":{"authors":{"author":[{"@pid":"29/3925","text":"Yue Xu"},{"@pid":"14/2062-1","text":"Wenjun Xu 0001"},{"@pid":"95/6543-10","text":"Zhi Wang 0010"},{"@pid":"32/2368","text":"Jiaru Lin"},{"@pid":"48/4914","text":"Shuguang Cui"}]},"title":"Load Balancing for Ultradense Networks: A Deep Reinforcement Learning-Based Approach.","venue":"IEEE Internet Things J.","volume":"6","number":"6","pages":"9399-9412","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/XuXWLC19","doi":"10.1109/JIOT.2019.2935010","ee":"https://doi.org/10.1109/JIOT.2019.2935010","url":"https://dblp.org/rec/journals/iotj/XuXWLC19"}, "url":"URL#1999996" }, { "@score":"1", "@id":"1999997", "info":{"authors":{"author":[{"@pid":"94/7001-1","text":"Ding Xu 0001"},{"@pid":"70/2173-2","text":"Hongbo Zhu 0002"}]},"title":"Secure Transmission for SWIPT IoT Systems With Full-Duplex IoT Devices.","venue":"IEEE Internet Things J.","volume":"6","number":"6","pages":"10915-10933","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/XuZ19","doi":"10.1109/JIOT.2019.2943377","ee":"https://doi.org/10.1109/JIOT.2019.2943377","url":"https://dblp.org/rec/journals/iotj/XuZ19"}, "url":"URL#1999997" }, { "@score":"1", "@id":"1999998", "info":{"authors":{"author":[{"@pid":"98/7731","text":"Weitao Xu"},{"@pid":"43/6657-13","text":"Jin Zhang 0013"},{"@pid":"170/2540","text":"Jun Young Kim"},{"@pid":"95/5574","text":"Walter Huang"},{"@pid":"42/840","text":"Salil S. Kanhere"},{"@pid":"j/SanjayJha","text":"Sanjay K. Jha"},{"@pid":"01/6410","text":"Wen Hu"}]},"title":"The Design, Implementation, and Deployment of a Smart Lighting System for Smart Buildings.","venue":"IEEE Internet Things J.","volume":"6","number":"4","pages":"7266-7281","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/XuZKHKJH19","doi":"10.1109/JIOT.2019.2915952","ee":"https://doi.org/10.1109/JIOT.2019.2915952","url":"https://dblp.org/rec/journals/iotj/XuZKHKJH19"}, "url":"URL#1999998" }, { "@score":"1", "@id":"1999999", "info":{"authors":{"author":[{"@pid":"94/5600","text":"Kaiping Xue"},{"@pid":"05/3920","text":"Wei Meng"},{"@pid":"83/1926-2","text":"Shaohua Li 0002"},{"@pid":"65/4599","text":"David S. L. Wei"},{"@pid":"243/6488","text":"Huancheng Zhou"},{"@pid":"96/5144","text":"Nenghai Yu"}]},"title":"A Secure and Efficient Access and Handover Authentication Protocol for Internet of Things in Space Information Networks.","venue":"IEEE Internet Things J.","volume":"6","number":"3","pages":"5485-5499","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/XueMLWZY19","doi":"10.1109/JIOT.2019.2902907","ee":"https://doi.org/10.1109/JIOT.2019.2902907","url":"https://dblp.org/rec/journals/iotj/XueMLWZY19"}, "url":"URL#1999999" }, { "@score":"1", "@id":"2000000", "info":{"authors":{"author":[{"@pid":"55/5045","text":"Min Xue"},{"@pid":"09/5042-28","text":"Wei Sun 0028"},{"@pid":"04/4793","text":"Hongshan Yu"},{"@pid":"74/3259","text":"Hongwei Tang"},{"@pid":"199/5651","text":"Anping Lin"},{"@pid":"52/5264","text":"Xing Zhang"},{"@pid":"79/1490","text":"Roger Zimmermann"}]},"title":"Locate the Mobile Device by Enhancing the WiFi-Based Indoor Localization Model.","venue":"IEEE Internet Things J.","volume":"6","number":"5","pages":"8792-8803","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/XueSYTLZZ19","doi":"10.1109/JIOT.2019.2923433","ee":"https://doi.org/10.1109/JIOT.2019.2923433","url":"https://dblp.org/rec/journals/iotj/XueSYTLZZ19"}, "url":"URL#2000000" }, { "@score":"1", "@id":"2000001", "info":{"authors":{"author":[{"@pid":"94/5600","text":"Kaiping Xue"},{"@pid":"203/9647","text":"Qingyou Yang"},{"@pid":"83/1926-2","text":"Shaohua Li 0002"},{"@pid":"65/4599","text":"David S. L. Wei"},{"@pid":"57/495-1","text":"Min Peng 0001"},{"@pid":"152/7785","text":"Imran Memon"},{"@pid":"15/2421","text":"Peilin Hong"}]},"title":"PPSO: A Privacy-Preserving Service Outsourcing Scheme for Real-Time Pricing Demand Response in Smart Grid.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"2486-2496","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/XueYLWPMH19","doi":"10.1109/JIOT.2018.2870873","ee":"https://doi.org/10.1109/JIOT.2018.2870873","url":"https://dblp.org/rec/journals/iotj/XueYLWPMH19"}, "url":"URL#2000001" }, { "@score":"1", "@id":"2000002", "info":{"authors":{"author":[{"@pid":"69/3580","text":"Yoji Yamato"},{"@pid":"210/2010","text":"Tatsuya Demizu"},{"@pid":"195/0314","text":"Hirofumi Noguchi"},{"@pid":"61/10780","text":"Misao Kataoka"}]},"title":"Automatic GPU Offloading Technology for Open IoT Environment.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"2669-2678","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/YamatoDNK19","doi":"10.1109/JIOT.2018.2872545","ee":"https://doi.org/10.1109/JIOT.2018.2872545","url":"https://dblp.org/rec/journals/iotj/YamatoDNK19"}, "url":"URL#2000002" }, { "@score":"1", "@id":"2000003", "info":{"authors":{"author":[{"@pid":"87/4073","text":"Weizhong Yan"},{"@pid":"97/8105","text":"Lalit K. Mestha"},{"@pid":"69/225","text":"Masoud Abbaszadeh"}]},"title":"Attack Detection for Securing Cyber Physical Systems.","venue":"IEEE Internet Things J.","volume":"6","number":"5","pages":"8471-8481","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/YanMA19","doi":"10.1109/JIOT.2019.2919635","ee":"https://doi.org/10.1109/JIOT.2019.2919635","url":"https://dblp.org/rec/journals/iotj/YanMA19"}, "url":"URL#2000003" }, { "@score":"1", "@id":"2000004", "info":{"authors":{"author":[{"@pid":"67/2601-2","text":"Yan Shi 0002"},{"@pid":"75/6927","text":"Mugen Peng"},{"@pid":"238/5528","text":"Xueyan Cao"}]},"title":"A Game Theory Approach for Joint Access Selection and Resource Allocation in UAV Assisted IoT Communication Networks.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"1663-1674","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/YanPC19","doi":"10.1109/JIOT.2018.2873308","ee":"https://doi.org/10.1109/JIOT.2018.2873308","url":"https://dblp.org/rec/journals/iotj/YanPC19"}, "url":"URL#2000004" }, { "@score":"1", "@id":"2000005", "info":{"authors":{"author":[{"@pid":"87/5735-1","text":"Jing Yan 0001"},{"@pid":"23/2644","text":"Haiyan Zhao"},{"@pid":"75/8016","text":"Xiaoyuan Luo"},{"@pid":"35/6761","text":"Cailian Chen"},{"@pid":"25/3029","text":"Xinping Guan"}]},"title":"RSSI-Based Heading Control for Robust Long-Range Aerial Communication in UAV Networks.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"1675-1689","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/YanZLCG19","doi":"10.1109/JIOT.2018.2875428","ee":"https://doi.org/10.1109/JIOT.2018.2875428","url":"https://dblp.org/rec/journals/iotj/YanZLCG19"}, "url":"URL#2000005" }, { "@score":"1", "@id":"2000006", "info":{"authors":{"author":[{"@pid":"52/6918-1","text":"Liuqing Yang 0001"},{"@pid":"29/1059-1","text":"Xiang Cheng 0001"},{"@pid":"51/2718","text":"Mounir Ghogho"},{"@pid":"06/5722","text":"Ender Ayanoglu"},{"@pid":"h/TiejunHuang","text":"Tiejun Huang 0001"},{"@pid":"07/256-1","text":"Nanning Zheng 0001"}]},"title":"Guest Editorial Special Issue on IoT on the Move: Enabling Technologies and Driving Applications for Internet of Intelligent Vehicles (IoIV).","venue":"IEEE Internet Things J.","volume":"6","number":"1","pages":"1-5","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/YangCGAHZ19","doi":"10.1109/JIOT.2019.2896750","ee":"https://doi.org/10.1109/JIOT.2019.2896750","url":"https://dblp.org/rec/journals/iotj/YangCGAHZ19"}, "url":"URL#2000006" }, { "@score":"1", "@id":"2000007", "info":{"authors":{"author":[{"@pid":"37/1091-5","text":"Yan Yang 0005"},{"@pid":"128/3965","text":"Shuping Dang"},{"@pid":"06/868","text":"Yejun He"},{"@pid":"15/1123","text":"Mohsen Guizani"}]},"title":"Markov Decision-Based Pilot Optimization for 5G V2X Vehicular Communications.","venue":"IEEE Internet Things J.","volume":"6","number":"1","pages":"1090-1103","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/YangDHG19","doi":"10.1109/JIOT.2018.2867334","ee":"https://doi.org/10.1109/JIOT.2018.2867334","url":"https://dblp.org/rec/journals/iotj/YangDHG19"}, "url":"URL#2000007" }, { "@score":"1", "@id":"2000008", "info":{"authors":{"author":[{"@pid":"57/10428-1","text":"Tingting Yang 0001"},{"@pid":"166/1832","text":"Hailong Feng"},{"@pid":"141/7734","text":"Chengming Yang"},{"@pid":"94/3104-2","text":"Ying Wang 0002"},{"@pid":"73/3764","text":"Jie Dong"},{"@pid":"78/480","text":"Minghua Xia"}]},"title":"Multivessel Computation Offloading in Maritime Mobile Edge Computing Network.","venue":"IEEE Internet Things J.","volume":"6","number":"3","pages":"4063-4073","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/YangFYWDX19","doi":"10.1109/JIOT.2018.2876151","ee":"https://doi.org/10.1109/JIOT.2018.2876151","url":"https://dblp.org/rec/journals/iotj/YangFYWDX19"}, "url":"URL#2000008" }, { "@score":"1", "@id":"2000009", "info":{"authors":{"author":[{"@pid":"240/7123","text":"Sihao Yang"},{"@pid":"181/2330-3","text":"Bin Gao 0003"},{"@pid":"23/3056","text":"Long Jiang"},{"@pid":"240/7042","text":"Jikun Jin"},{"@pid":"176/1396","text":"Zhao Gao"},{"@pid":"211/5042","text":"Xiaole Ma"},{"@pid":"87/143","text":"Wai Lok Woo"}]},"title":"IoT Structured Long-Term Wearable Social Sensing for Mental Wellbeing.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"3652-3662","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/YangGJJGMW19","doi":"10.1109/JIOT.2018.2889966","ee":"https://doi.org/10.1109/JIOT.2018.2889966","url":"https://dblp.org/rec/journals/iotj/YangGJJGMW19"}, "url":"URL#2000009" }, { "@score":"1", "@id":"2000010", "info":{"authors":{"author":[{"@pid":"17/2247-1","text":"Kai Yang 0001"},{"@pid":"128/6972-1","text":"Sijia Liu 0001"},{"@pid":"20/8688-1","text":"Lin Cai 0001"},{"@pid":"75/5077","text":"Yasin Yilmaz"},{"@pid":"39/8969","text":"Pin-Yu Chen"},{"@pid":"75/6446","text":"Anwar Walid"}]},"title":"Guest Editorial Special Issue on AI Enabled Cognitive Communication and Networking for IoT.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"1906-1910","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/YangLCYCW19","doi":"10.1109/JIOT.2019.2908443","ee":"https://doi.org/10.1109/JIOT.2019.2908443","url":"https://dblp.org/rec/journals/iotj/YangLCYCW19"}, "url":"URL#2000010" }, { "@score":"1", "@id":"2000011", "info":{"authors":{"author":[{"@pid":"36/8388","text":"Guisong Yang"},{"@pid":"34/8558","text":"Tingting Liang"},{"@pid":"05/8388","text":"Xingyu He"},{"@pid":"x/NaixueXiong","text":"Naixue Xiong"}]},"title":"Global and Local Reliability-Based Routing Protocol for Wireless Sensor Networks.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"3620-3632","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/YangLHX19","doi":"10.1109/JIOT.2018.2889379","ee":"https://doi.org/10.1109/JIOT.2018.2889379","url":"https://dblp.org/rec/journals/iotj/YangLHX19"}, "url":"URL#2000011" }, { "@score":"1", "@id":"2000012", "info":{"authors":{"author":[{"@pid":"47/3749-3","text":"Qing Yang 0003"},{"@pid":"88/3562","text":"Rongxing Lu"},{"@pid":"50/320","text":"Chunming Rong"},{"@pid":"88/2323","text":"Yacine Challal"},{"@pid":"04/1082","text":"Maryline Laurent"},{"@pid":"79/5305-1","text":"Shengling Wang 0001"}]},"title":"Guest Editorial The Convergence of Blockchain and IoT: Opportunities, Challenges and Solutions.","venue":"IEEE Internet Things J.","volume":"6","number":"3","pages":"4556-4560","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/YangLRCLW19","doi":"10.1109/JIOT.2019.2921235","ee":"https://doi.org/10.1109/JIOT.2019.2921235","url":"https://dblp.org/rec/journals/iotj/YangLRCLW19"}, "url":"URL#2000012" }, { "@score":"1", "@id":"2000013", "info":{"authors":{"author":[{"@pid":"64/2155-2","text":"Song Yang 0002"},{"@pid":"73/237-1","text":"Fan Li 0001"},{"@pid":"03/8774-1","text":"Meng Shen 0001"},{"@pid":"83/6331-4","text":"Xu Chen 0004"},{"@pid":"33/4231","text":"Xiaoming Fu 0001"},{"@pid":"w/YuWang3","text":"Yu Wang 0003"}]},"title":"Cloudlet Placement and Task Allocation in Mobile Edge Computing.","venue":"IEEE Internet Things J.","volume":"6","number":"3","pages":"5853-5863","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/YangLSCFW19","doi":"10.1109/JIOT.2019.2907605","ee":"https://doi.org/10.1109/JIOT.2019.2907605","url":"https://dblp.org/rec/journals/iotj/YangLSCFW19"}, "url":"URL#2000013" }, { "@score":"1", "@id":"2000014", "info":{"authors":{"author":[{"@pid":"13/1779-3","text":"Xue Yang 0003"},{"@pid":"88/3562","text":"Rongxing Lu"},{"@pid":"09/5442-1","text":"Jun Shao 0001"},{"@pid":"70/2644","text":"Xiaohu Tang"},{"@pid":"25/7558","text":"Haomiao Yang"}]},"title":"An Efficient and Privacy-Preserving Disease Risk Prediction Scheme for E-Healthcare.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"3284-3297","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/YangLSTY19","doi":"10.1109/JIOT.2018.2882224","ee":"https://doi.org/10.1109/JIOT.2018.2882224","url":"https://dblp.org/rec/journals/iotj/YangLSTY19"}, "url":"URL#2000014" }, { "@score":"1", "@id":"2000015", "info":{"authors":{"author":[{"@pid":"48/450-1","text":"Yang Yang 0001"},{"@pid":"224/0906","text":"Zening Liu"},{"@pid":"41/125","text":"Xiumei Yang"},{"@pid":"37/11533","text":"Kunlun Wang 0001"},{"@pid":"36/310","text":"Xuemin Hong"},{"@pid":"76/3232","text":"Xiaohu Ge"}]},"title":"POMT: Paired Offloading of Multiple Tasks in Heterogeneous Fog Networks.","venue":"IEEE Internet Things J.","volume":"6","number":"5","pages":"8658-8669","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/YangLYWHG19","doi":"10.1109/JIOT.2019.2922324","ee":"https://doi.org/10.1109/JIOT.2019.2922324","url":"https://dblp.org/rec/journals/iotj/YangLYWHG19"}, "url":"URL#2000015" }, { "@score":"1", "@id":"2000016", "info":{"authors":{"author":[{"@pid":"152/4206","text":"Zhuolin Yang"},{"@pid":"14/5979-1","text":"Chen Song 0001"},{"@pid":"75/2611-4","text":"Feng Lin 0004"},{"@pid":"191/7955","text":"Jeanne Langan"},{"@pid":"11/6689","text":"Wenyao Xu"}]},"title":"A Smart Environment-Adapting Timed-Up-and-Go System Powered by Sensor-Embedded Insoles.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"1298-1305","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/YangSLLX19","doi":"10.1109/JIOT.2018.2844837","ee":"https://doi.org/10.1109/JIOT.2018.2844837","url":"https://dblp.org/rec/journals/iotj/YangSLLX19"}, "url":"URL#2000016" }, { "@score":"1", "@id":"2000017", "info":{"authors":{"author":[{"@pid":"78/1102","text":"Shuo Yang"},{"@pid":"92/2461","text":"Ran Wei"}]},"title":"Tabdoc Approach: An Information Fusion Method to Implement Semantic Interoperability Between IoT Devices and Users.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"1972-1986","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/YangW19","doi":"10.1109/JIOT.2018.2871274","ee":"https://doi.org/10.1109/JIOT.2018.2871274","url":"https://dblp.org/rec/journals/iotj/YangW19"}, "url":"URL#2000017" }, { "@score":"1", "@id":"2000018", "info":{"authors":{"author":[{"@pid":"78/10624","text":"Shujie Yang"},{"@pid":"51/4906","text":"Changqiao Xu"},{"@pid":"13/342","text":"Xuesong Qiu 0001"},{"@pid":"88/1600","text":"Dapeng Oliver Wu"}]},"title":"Diffusion Kalman Filter With Quantized Information Exchange in Distributed Mobile Crowdsensing.","venue":"IEEE Internet Things J.","volume":"6","number":"3","pages":"4423-4435","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/YangXQW19","doi":"10.1109/JIOT.2018.2881542","ee":"https://doi.org/10.1109/JIOT.2018.2881542","url":"https://dblp.org/rec/journals/iotj/YangXQW19"}, "url":"URL#2000018" }, { "@score":"1", "@id":"2000019", "info":{"authors":{"author":[{"@pid":"y/ZheYang-6","text":"Zhe Yang 0006"},{"@pid":"26/6407","text":"Kan Yang 0001"},{"@pid":"09/471-4","text":"Lei Lei 0004"},{"@pid":"77/6893","text":"Kan Zheng"},{"@pid":"36/4847","text":"Victor C. M. Leung"}]},"title":"Blockchain-Based Decentralized Trust Management in Vehicular Networks.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"1495-1505","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/YangYLZL19","doi":"10.1109/JIOT.2018.2836144","ee":"https://doi.org/10.1109/JIOT.2018.2836144","url":"https://dblp.org/rec/journals/iotj/YangYLZL19"}, "url":"URL#2000019" }, { "@score":"1", "@id":"2000020", "info":{"authors":{"author":[{"@pid":"36/4658-5","text":"Gang Yang 0005"},{"@pid":"220/3269","text":"Dongdong Yuan"},{"@pid":"98/153","text":"Ying-Chang Liang"},{"@pid":"60/2536-6","text":"Rui Zhang 0006"},{"@pid":"36/4847","text":"Victor C. M. Leung"}]},"title":"Optimal Resource Allocation in Full-Duplex Ambient Backscatter Communication Networks for Wireless-Powered IoT.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"2612-2625","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/YangYLZL19a","doi":"10.1109/JIOT.2018.2872515","ee":"https://doi.org/10.1109/JIOT.2018.2872515","url":"https://dblp.org/rec/journals/iotj/YangYLZL19a"}, "url":"URL#2000020" }, { "@score":"1", "@id":"2000021", "info":{"authors":{"author":[{"@pid":"y/ZheYang-6","text":"Zhe Yang 0006"},{"@pid":"50/7188","text":"Kuan Zhang"},{"@pid":"09/471-4","text":"Lei Lei 0004"},{"@pid":"77/6893","text":"Kan Zheng"}]},"title":"A Novel Classifier Exploiting Mobility Behaviors for Sybil Detection in Connected Vehicle Systems.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"2626-2636","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/YangZLZ19","doi":"10.1109/JIOT.2018.2872456","ee":"https://doi.org/10.1109/JIOT.2018.2872456","url":"https://dblp.org/rec/journals/iotj/YangZLZ19"}, "url":"URL#2000021" }, { "@score":"1", "@id":"2000022", "info":{"authors":{"author":[{"@pid":"25/7558","text":"Haomiao Yang"},{"@pid":"225/4551","text":"Qixian Zhou"},{"@pid":"210/4952","text":"Mingxuan Yao"},{"@pid":"88/3562","text":"Rongxing Lu"},{"@pid":"39/5544-1","text":"Hongwei Li 0001"},{"@pid":"26/3075-1","text":"Xiaosong Zhang 0001"}]},"title":"A Practical and Compatible Cryptographic Solution to ADS-B Security.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"3322-3334","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/YangZYLLZ19","doi":"10.1109/JIOT.2018.2882633","ee":"https://doi.org/10.1109/JIOT.2018.2882633","url":"https://dblp.org/rec/journals/iotj/YangZYLLZ19"}, "url":"URL#2000022" }, { "@score":"1", "@id":"2000023", "info":{"authors":{"author":[{"@pid":"06/5852","text":"Jianfei Yang"},{"@pid":"147/5139","text":"Han Zou"},{"@pid":"136/9852","text":"Yuxun Zhou"},{"@pid":"40/2499","text":"Lihua Xie"}]},"title":"Learning Gestures From WiFi: A Siamese Recurrent Convolutional Architecture.","venue":"IEEE Internet Things J.","volume":"6","number":"6","pages":"10763-10772","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/YangZZX19","doi":"10.1109/JIOT.2019.2941527","ee":"https://doi.org/10.1109/JIOT.2019.2941527","url":"https://dblp.org/rec/journals/iotj/YangZZX19"}, "url":"URL#2000023" }, { "@score":"1", "@id":"2000024", "info":{"authors":{"author":[{"@pid":"150/5542","text":"Jingjing Yao"},{"@pid":"a/NirwanAnsari","text":"Nirwan Ansari"}]},"title":"Joint Content Placement and Storage Allocation in C-RANs for IoT Sensing Service.","venue":"IEEE Internet Things J.","volume":"6","number":"1","pages":"1060-1067","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/YaoA19","doi":"10.1109/JIOT.2018.2866947","ee":"https://doi.org/10.1109/JIOT.2018.2866947","url":"https://dblp.org/rec/journals/iotj/YaoA19"}, "url":"URL#2000024" }, { "@score":"1", "@id":"2000025", "info":{"authors":{"author":[{"@pid":"150/5542","text":"Jingjing Yao"},{"@pid":"a/NirwanAnsari","text":"Nirwan Ansari"}]},"title":"Caching in Energy Harvesting Aided Internet of Things: A Game-Theoretic Approach.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"3194-3201","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/YaoA19a","doi":"10.1109/JIOT.2018.2880483","ee":"https://doi.org/10.1109/JIOT.2018.2880483","url":"https://dblp.org/rec/journals/iotj/YaoA19a"}, "url":"URL#2000025" }, { "@score":"1", "@id":"2000026", "info":{"authors":{"author":[{"@pid":"150/5542","text":"Jingjing Yao"},{"@pid":"a/NirwanAnsari","text":"Nirwan Ansari"}]},"title":"Fog Resource Provisioning in Reliability-Aware IoT Networks.","venue":"IEEE Internet Things J.","volume":"6","number":"5","pages":"8262-8269","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/YaoA19b","doi":"10.1109/JIOT.2019.2922585","ee":"https://doi.org/10.1109/JIOT.2019.2922585","url":"https://dblp.org/rec/journals/iotj/YaoA19b"}, "url":"URL#2000026" }, { "@score":"1", "@id":"2000027", "info":{"authors":{"author":[{"@pid":"82/7657","text":"Yingying Yao"},{"@pid":"22/6882","text":"Xiaolin Chang"},{"@pid":"m/JVMisic","text":"Jelena V. Misic"},{"@pid":"62/76","text":"Vojislav B. Misic"}]},"title":"Reliable and Secure Vehicular Fog Service Provision.","venue":"IEEE Internet Things J.","volume":"6","number":"1","pages":"734-743","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/YaoCMM19","doi":"10.1109/JIOT.2018.2855718","ee":"https://doi.org/10.1109/JIOT.2018.2855718","url":"https://dblp.org/rec/journals/iotj/YaoCMM19"}, "url":"URL#2000027" }, { "@score":"1", "@id":"2000028", "info":{"authors":{"author":[{"@pid":"82/7657","text":"Yingying Yao"},{"@pid":"22/6882","text":"Xiaolin Chang"},{"@pid":"m/JVMisic","text":"Jelena V. Misic"},{"@pid":"62/76","text":"Vojislav B. Misic"},{"@pid":"73/2252-41","text":"Lin Li 0041"}]},"title":"BLA: Blockchain-Assisted Lightweight Anonymous Authentication for Distributed Vehicular Fog Services.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"3775-3784","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/YaoCMML19","doi":"10.1109/JIOT.2019.2892009","ee":"https://doi.org/10.1109/JIOT.2019.2892009","url":"https://dblp.org/rec/journals/iotj/YaoCMML19"}, "url":"URL#2000028" }, { "@score":"1", "@id":"2000029", "info":{"authors":{"author":[{"@pid":"59/8489","text":"Haipeng Yao"},{"@pid":"240/6854","text":"Danyang Fu"},{"@pid":"24/9047","text":"Peiying Zhang"},{"@pid":"l/MaozhenLi","text":"Maozhen Li 0001"},{"@pid":"15/10015-1","text":"Yunjie Liu 0001"}]},"title":"MSML: A Novel Multilevel Semi-Supervised Machine Learning Framework for Intrusion Detection System.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"1949-1959","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/YaoFZLL19","doi":"10.1109/JIOT.2018.2873125","ee":"https://doi.org/10.1109/JIOT.2018.2873125","url":"https://dblp.org/rec/journals/iotj/YaoFZLL19"}, "url":"URL#2000029" }, { "@score":"1", "@id":"2000030", "info":{"authors":{"author":[{"@pid":"59/8489","text":"Haipeng Yao"},{"@pid":"41/11514","text":"Pengcheng Gao"},{"@pid":"62/2631-1","text":"Jingjing Wang 0001"},{"@pid":"24/9047","text":"Peiying Zhang"},{"@pid":"00/8334","text":"Chunxiao Jiang"},{"@pid":"83/514","text":"Zhu Han 0001"}]},"title":"Capsule Network Assisted IoT Traffic Classification Mechanism for Smart Cities.","venue":"IEEE Internet Things J.","volume":"6","number":"5","pages":"7515-7525","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/YaoGWZJH19","doi":"10.1109/JIOT.2019.2901348","ee":"https://doi.org/10.1109/JIOT.2019.2901348","url":"https://dblp.org/rec/journals/iotj/YaoGWZJH19"}, "url":"URL#2000030" }, { "@score":"1", "@id":"2000031", "info":{"authors":{"author":[{"@pid":"221/3901","text":"Junteng Yao"},{"@pid":"34/3870-1","text":"Ming Jin 0001"},{"@pid":"18/5331-1","text":"Qinghua Guo 0001"},{"@pid":"59/6828-1","text":"Yonghui Li 0001"},{"@pid":"06/4004","text":"Jiangtao Xi"}]},"title":"Effective Energy Detection for IoT Systems Against Noise Uncertainty at Low SNR.","venue":"IEEE Internet Things J.","volume":"6","number":"4","pages":"6165-6176","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/YaoJGLX19","doi":"10.1109/JIOT.2018.2877698","ee":"https://doi.org/10.1109/JIOT.2018.2877698","url":"https://dblp.org/rec/journals/iotj/YaoJGLX19"}, "url":"URL#2000031" }, { "@score":"1", "@id":"2000032", "info":{"authors":{"author":[{"@pid":"04/612","text":"Xuanxia Yao"},{"@pid":"255/2192","text":"Wanyou Liao"},{"@pid":"22/5535","text":"Xiaojiang Du"},{"@pid":"255/2373","text":"Xuepeng Cheng"},{"@pid":"15/1123","text":"Mohsen Guizani"}]},"title":"Using Bloom Filter to Generate a Physiological Signal-Based Key for Wireless Body Area Networks.","venue":"IEEE Internet Things J.","volume":"6","number":"6","pages":"10396-10407","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/YaoLDCG19","doi":"10.1109/JIOT.2019.2939144","ee":"https://doi.org/10.1109/JIOT.2019.2939144","url":"https://dblp.org/rec/journals/iotj/YaoLDCG19"}, "url":"URL#2000032" }, { "@score":"1", "@id":"2000033", "info":{"authors":{"author":[{"@pid":"16/5793","text":"Yuhui Yao"},{"@pid":"181/2323-5","text":"Yan Sun 0005"},{"@pid":"03/2277-1","text":"Chris Phillips 0001"},{"@pid":"74/5570-2","text":"Yue Cao 0002"},{"@pid":"13/1440-2","text":"Jichun Li 0002"}]},"title":"Exploiting Delay Budget Flexibility for Efficient Group Delivery in the Internet of Things.","venue":"IEEE Internet Things J.","volume":"6","number":"4","pages":"6593-6605","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/YaoSPCL19","doi":"10.1109/JIOT.2019.2908892","ee":"https://doi.org/10.1109/JIOT.2019.2908892","url":"https://dblp.org/rec/journals/iotj/YaoSPCL19"}, "url":"URL#2000033" }, { "@score":"1", "@id":"2000034", "info":{"authors":{"author":[{"@pid":"224/0780","text":"Donghuan Yao"},{"@pid":"93/6953","text":"Mi Wen"},{"@pid":"92/3528","text":"Xiaohui Liang"},{"@pid":"245/1504","text":"Zipeng Fu"},{"@pid":"55/957-16","text":"Kai Zhang 0016"},{"@pid":"251/1459","text":"Baojia Yang"}]},"title":"Energy Theft Detection With Energy Privacy Preservation in the Smart Grid.","venue":"IEEE Internet Things J.","volume":"6","number":"5","pages":"7659-7669","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/YaoWLFZY19","doi":"10.1109/JIOT.2019.2903312","ee":"https://doi.org/10.1109/JIOT.2019.2903312","url":"https://dblp.org/rec/journals/iotj/YaoWLFZY19"}, "url":"URL#2000034" }, { "@score":"1", "@id":"2000035", "info":{"authors":{"author":[{"@pid":"31/334-2","text":"Qiang Ye 0002"},{"@pid":"z/WeihuaZhuang","text":"Weihua Zhuang"},{"@pid":"25/3528-1","text":"Xu Li 0001"},{"@pid":"40/11298","text":"Jaya Rao"}]},"title":"End-to-End Delay Modeling for Embedded VNF Chains in 5G Core Networks.","venue":"IEEE Internet Things J.","volume":"6","number":"1","pages":"692-704","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/YeZLR19","doi":"10.1109/JIOT.2018.2853708","ee":"https://doi.org/10.1109/JIOT.2018.2853708","url":"https://dblp.org/rec/journals/iotj/YeZLR19"}, "url":"URL#2000035" }, { "@score":"1", "@id":"2000036", "info":{"authors":{"author":[{"@pid":"128/5339","text":"Kasim Sinan Yildirim"},{"@pid":"42/3417","text":"Ruggero Carli"},{"@pid":"99/3728","text":"Luca Schenato 0001"}]},"title":"Safe Distributed Control of Wireless Power Transfer Networks.","venue":"IEEE Internet Things J.","volume":"6","number":"1","pages":"1267-1275","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/YildirimCS19","doi":"10.1109/JIOT.2018.2813420","ee":"https://doi.org/10.1109/JIOT.2018.2813420","url":"https://dblp.org/rec/journals/iotj/YildirimCS19"}, "url":"URL#2000036" }, { "@score":"1", "@id":"2000037", "info":{"authors":{"author":[{"@pid":"98/3612-4","text":"Bo Yin 0004"},{"@pid":"09/5916","text":"Xuetao Wei"}]},"title":"Communication-Efficient Data Aggregation Tree Construction for Complex Queries in IoT Applications.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"3352-3363","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/YinW19","doi":"10.1109/JIOT.2018.2882820","ee":"https://doi.org/10.1109/JIOT.2018.2882820","url":"https://dblp.org/rec/journals/iotj/YinW19"}, "url":"URL#2000037" }, { "@score":"1", "@id":"2000038", "info":{"authors":{"author":[{"@pid":"163/0491","text":"Huanpu Yin"},{"@pid":"32/5505","text":"Anfu Zhou"},{"@pid":"10/6178-1","text":"Liang Liu 0001"},{"@pid":"46/2005","text":"Ning Wang"},{"@pid":"04/6217","text":"Huadong Ma"}]},"title":"Ubiquitous Writer: Robust Text Input for Small Mobile Devices via Acoustic Sensing.","venue":"IEEE Internet Things J.","volume":"6","number":"3","pages":"5285-5296","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/YinZLWM19","doi":"10.1109/JIOT.2019.2900355","ee":"https://doi.org/10.1109/JIOT.2019.2900355","url":"https://dblp.org/rec/journals/iotj/YinZLWM19"}, "url":"URL#2000038" }, { "@score":"1", "@id":"2000039", "info":{"authors":{"author":[{"@pid":"143/8502","text":"Linlin You"},{"@pid":"172/4387","text":"Bige Tunçer"},{"@pid":"72/1974","text":"Rui Zhu"},{"@pid":"205/7565","text":"Hexu Xing"},{"@pid":"01/753","text":"Chau Yuen"}]},"title":"A Synergetic Orchestration of Objects, Data, and Services to Enable Smart Cities.","venue":"IEEE Internet Things J.","volume":"6","number":"6","pages":"10496-10507","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/YouTZXY19","doi":"10.1109/JIOT.2019.2939496","ee":"https://doi.org/10.1109/JIOT.2019.2939496","url":"https://dblp.org/rec/journals/iotj/YouTZXY19"}, "url":"URL#2000039" }, { "@score":"1", "@id":"2000040", "info":{"authors":{"author":[{"@pid":"194/6896","text":"Ashkan Yousefpour"},{"@pid":"70/410","text":"Ashish Patil"},{"@pid":"158/9042","text":"Genya Ishigaki"},{"@pid":"148/8455","text":"Inwoong Kim"},{"@pid":"08/5760-1","text":"Xi Wang 0001"},{"@pid":"07/3777","text":"Hakki C. Cankaya"},{"@pid":"06/3351","text":"Qiong Zhang"},{"@pid":"84/11508","text":"Weisheng Xie"},{"@pid":"28/4351","text":"Jason P. Jue"}]},"title":"FOGPLAN: A Lightweight QoS-Aware Dynamic Fog Service Provisioning Framework.","venue":"IEEE Internet Things J.","volume":"6","number":"3","pages":"5080-5096","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/YousefpourPIKWC19","doi":"10.1109/JIOT.2019.2896311","ee":"https://doi.org/10.1109/JIOT.2019.2896311","url":"https://dblp.org/rec/journals/iotj/YousefpourPIKWC19"}, "url":"URL#2000040" }, { "@score":"1", "@id":"2000041", "info":{"authors":{"author":[{"@pid":"37/5423-2","text":"Ye Yu 0002"},{"@pid":"91/7083","text":"Xiangyuan Bu"},{"@pid":"17/2247-4","text":"Kai Yang 0004"},{"@pid":"179/8827","text":"Zhikun Wu"},{"@pid":"83/514","text":"Zhu Han 0001"}]},"title":"Green Large-Scale Fog Computing Resource Allocation Using Joint Benders Decomposition, Dinkelbach Algorithm, ADMM, and Branch-and-Bound.","venue":"IEEE Internet Things J.","volume":"6","number":"3","pages":"4106-4117","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/YuBYWH19","doi":"10.1109/JIOT.2018.2875587","ee":"https://doi.org/10.1109/JIOT.2018.2875587","url":"https://dblp.org/rec/journals/iotj/YuBYWH19"}, "url":"URL#2000041" }, { "@score":"1", "@id":"2000042", "info":{"authors":{"author":[{"@pid":"43/5685-2","text":"Yong Yu 0002"},{"@pid":"168/4714","text":"Yujie Ding"},{"@pid":"155/6632","text":"Yanqi Zhao"},{"@pid":"136/0901","text":"Yannan Li"},{"@pid":"51/4138","text":"Yi Zhao"},{"@pid":"22/5535","text":"Xiaojiang Du"},{"@pid":"15/1123","text":"Mohsen Guizani"}]},"title":"LRCoin: Leakage-Resilient Cryptocurrency Based on Bitcoin for Data Trading in IoT.","venue":"IEEE Internet Things J.","volume":"6","number":"3","pages":"4702-4710","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/YuDZLZDG19","doi":"10.1109/JIOT.2018.2878406","ee":"https://doi.org/10.1109/JIOT.2018.2878406","url":"https://dblp.org/rec/journals/iotj/YuDZLZDG19"}, "url":"URL#2000042" }, { "@score":"1", "@id":"2000043", "info":{"authors":{"author":[{"@pid":"55/10087","text":"James Jian Qiao Yu"},{"@pid":"14/5150-1","text":"David J. Hill 0001"},{"@pid":"74/571","text":"Victor O. K. Li"},{"@pid":"30/7904","text":"Yunhe Hou"}]},"title":"Synchrophasor Recovery and Prediction: A Graph-Based Deep Learning Approach.","venue":"IEEE Internet Things J.","volume":"6","number":"5","pages":"7348-7359","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/YuHLH19","doi":"10.1109/JIOT.2019.2899395","ee":"https://doi.org/10.1109/JIOT.2019.2899395","url":"https://dblp.org/rec/journals/iotj/YuHLH19"}, "url":"URL#2000043" }, { "@score":"1", "@id":"2000044", "info":{"authors":{"author":[{"@pid":"191/6530","text":"Jiabao Yu"},{"@pid":"55/4757","text":"Aiqun Hu"},{"@pid":"147/7757","text":"Guyue Li"},{"@pid":"118/5837","text":"Linning Peng"}]},"title":"A Robust RF Fingerprinting Approach Using Multisampling Convolutional Neural Network.","venue":"IEEE Internet Things J.","volume":"6","number":"4","pages":"6786-6799","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/YuHLP19","doi":"10.1109/JIOT.2019.2911347","ee":"https://doi.org/10.1109/JIOT.2019.2911347","url":"https://dblp.org/rec/journals/iotj/YuHLP19"}, "url":"URL#2000044" }, { "@score":"1", "@id":"2000045", "info":{"authors":{"author":[{"@pid":"47/178","text":"Cunqian Yu"},{"@pid":"11/1186-1","text":"Bin Lin 0001"},{"@pid":"33/5440","text":"Ping Guo"},{"@pid":"10/4661","text":"Wei Zhang"},{"@pid":"76/5965","text":"Sen Li"},{"@pid":"51/4706","text":"Rongxi He"}]},"title":"Deployment and Dimensioning of Fog Computing-Based Internet of Vehicle Infrastructure for Autonomous Driving.","venue":"IEEE Internet Things J.","volume":"6","number":"1","pages":"149-160","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/YuLGZLH19","doi":"10.1109/JIOT.2018.2875750","ee":"https://doi.org/10.1109/JIOT.2018.2875750","url":"https://dblp.org/rec/journals/iotj/YuLGZLH19"}, "url":"URL#2000045" }, { "@score":"1", "@id":"2000046", "info":{"authors":{"author":[{"@pid":"174/9757","text":"Lisu Yu"},{"@pid":"19/6608","text":"Jingxian Wu 0001"},{"@pid":"f/PingzhiFan","text":"Pingzhi Fan"}]},"title":"Energy Efficient Designs of Ultra-Dense IoT Networks With Nonideal Optical Front-Hauls.","venue":"IEEE Internet Things J.","volume":"6","number":"5","pages":"7934-7945","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/YuWF19","doi":"10.1109/JIOT.2019.2907871","ee":"https://doi.org/10.1109/JIOT.2019.2907871","url":"https://dblp.org/rec/journals/iotj/YuWF19"}, "url":"URL#2000046" }, { "@score":"1", "@id":"2000047", "info":{"authors":{"author":[{"@pid":"164/3710","text":"Tianqi Yu"},{"@pid":"87/6482-1","text":"Xianbin Wang 0001"},{"@pid":"26/704","text":"Abdallah Shami"}]},"title":"UAV-Enabled Spatial Data Sampling in Large-Scale IoT Systems Using Denoising Autoencoder Neural Network.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"1856-1865","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/YuWS19","doi":"10.1109/JIOT.2018.2876695","ee":"https://doi.org/10.1109/JIOT.2018.2876695","url":"https://dblp.org/rec/journals/iotj/YuWS19"}, "url":"URL#2000047" }, { "@score":"1", "@id":"2000048", "info":{"authors":{"author":[{"@pid":"z/YuZhiwen","text":"Zhiwen Yu 0001"},{"@pid":"222/6151","text":"En Xu"},{"@pid":"60/667","text":"He Du"},{"@pid":"86/2663-1","text":"Bin Guo 0001"},{"@pid":"56/6651-1","text":"Lina Yao 0001"}]},"title":"Inferring User Profile Attributes From Multidimensional Mobile Phone Sensory Data.","venue":"IEEE Internet Things J.","volume":"6","number":"3","pages":"5152-5162","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/YuXDGY19","doi":"10.1109/JIOT.2019.2897334","ee":"https://doi.org/10.1109/JIOT.2019.2897334","url":"https://dblp.org/rec/journals/iotj/YuXDGY19"}, "url":"URL#2000048" }, { "@score":"1", "@id":"2000049", "info":{"authors":{"author":[{"@pid":"72/906","text":"Peiyan Yuan"},{"@pid":"255/2319","text":"Yunyun Cai"},{"@pid":"48/2425","text":"Xiaoyan Huang"},{"@pid":"68/3428-1","text":"Shaojie Tang 0001"},{"@pid":"99/576-1","text":"Xiaoyan Zhao 0001"}]},"title":"Collaboration Improves the Capacity of Mobile Edge Computing.","venue":"IEEE Internet Things J.","volume":"6","number":"6","pages":"10610-10619","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/YuanCHTZ19","doi":"10.1109/JIOT.2019.2940067","ee":"https://doi.org/10.1109/JIOT.2019.2940067","url":"https://dblp.org/rec/journals/iotj/YuanCHTZ19"}, "url":"URL#2000049" }, { "@score":"1", "@id":"2000050", "info":{"authors":{"author":[{"@pid":"24/6114-1","text":"Xu Yuan 0001"},{"@pid":"21/8884","text":"Xingliang Yuan"},{"@pid":"l/BaochunLi","text":"Baochun Li"},{"@pid":"18/2771-1","text":"Cong Wang 0001"}]},"title":"Toward Secure and Scalable Computation in Internet of Things Data Applications.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"3753-3763","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/YuanYLW19","doi":"10.1109/JIOT.2018.2890728","ee":"https://doi.org/10.1109/JIOT.2018.2890728","url":"https://dblp.org/rec/journals/iotj/YuanYLW19"}, "url":"URL#2000050" }, { "@score":"1", "@id":"2000051", "info":{"authors":{"author":[{"@pid":"226/9251","text":"Alejandro Molina Zarca"},{"@pid":"77/3800","text":"Jorge Bernal Bernabé"},{"@pid":"09/1382","text":"Rubén Trapero"},{"@pid":"67/1235","text":"Diego Rivera"},{"@pid":"251/1535","text":"Jesus Villalobos"},{"@pid":"g/AFGomezSkarmeta","text":"Antonio F. Skarmeta"},{"@pid":"86/3324","text":"Stefano Bianchi"},{"@pid":"43/7283","text":"Anastasios Zafeiropoulos"},{"@pid":"67/4413","text":"Panagiotis Gouvas"}]},"title":"Security Management Architecture for NFV/SDN-Aware IoT Systems.","venue":"IEEE Internet Things J.","volume":"6","number":"5","pages":"8005-8020","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/ZarcaBTRVSBZG19","doi":"10.1109/JIOT.2019.2904123","ee":"https://doi.org/10.1109/JIOT.2019.2904123","url":"https://dblp.org/rec/journals/iotj/ZarcaBTRVSBZG19"}, "url":"URL#2000051" }, { "@score":"1", "@id":"2000052", "info":{"authors":{"author":[{"@pid":"215/7413","text":"Xianjiao Zeng"},{"@pid":"46/241","text":"Guangquan Xu"},{"@pid":"224/0761","text":"Xi Zheng 0001"},{"@pid":"50/2192-1","text":"Yang Xiang 0001"},{"@pid":"92/2939","text":"Wanlei Zhou 0001"}]},"title":"E-AUA: An Efficient Anonymous User Authentication Protocol for Mobile IoT.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"1506-1519","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/ZengXZXZ19","doi":"10.1109/JIOT.2018.2847447","ee":"https://doi.org/10.1109/JIOT.2018.2847447","url":"https://dblp.org/rec/journals/iotj/ZengXZXZ19"}, "url":"URL#2000052" }, { "@score":"1", "@id":"2000053", "info":{"authors":{"author":[{"@pid":"52/2761-2","text":"Ming Zeng 0002"},{"@pid":"98/8335","text":"Animesh Yadav"},{"@pid":"32/6803","text":"Octavia A. Dobre"},{"@pid":"p/HVincentPoor","text":"H. Vincent Poor"}]},"title":"Energy-Efficient Joint User-RB Association and Power Allocation for Uplink Hybrid NOMA-OMA.","venue":"IEEE Internet Things J.","volume":"6","number":"3","pages":"5119-5131","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/ZengYDP19","doi":"10.1109/JIOT.2019.2896946","ee":"https://doi.org/10.1109/JIOT.2019.2896946","url":"https://dblp.org/rec/journals/iotj/ZengYDP19"}, "url":"URL#2000053" }, { "@score":"1", "@id":"2000054", "info":{"authors":{"author":[{"@pid":"132/7767","text":"Daosen Zhai"},{"@pid":"55/725","text":"Ruonan Zhang"},{"@pid":"90/3631","text":"Yutong Wang"},{"@pid":"251/1575","text":"Huakui Sun"},{"@pid":"20/8688-1","text":"Lin Cai 0001"},{"@pid":"64/361-1","text":"Zhiguo Ding 0001"}]},"title":"Joint User Pairing, Mode Selection, and Power Control for D2D-Capable Cellular Networks Enhanced by Nonorthogonal Multiple Access.","venue":"IEEE Internet Things J.","volume":"6","number":"5","pages":"8919-8932","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/ZhaiZWSCD19","doi":"10.1109/JIOT.2019.2924513","ee":"https://doi.org/10.1109/JIOT.2019.2924513","url":"https://dblp.org/rec/journals/iotj/ZhaiZWSCD19"}, "url":"URL#2000054" }, { "@score":"1", "@id":"2000055", "info":{"authors":{"author":[{"@pid":"158/4889","text":"Wen Zhan"},{"@pid":"20/687","text":"Xinghua Sun"},{"@pid":"127/0252","text":"Yitong Li"},{"@pid":"78/3204-7","text":"Feng Tian 0007"},{"@pid":"83/5522-11","text":"Hong Wang 0011"}]},"title":"Optimal Group Paging Frequency for Machine-to-Machine Communications in LTE Networks With Contention Resolution.","venue":"IEEE Internet Things J.","volume":"6","number":"6","pages":"10534-10545","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/ZhanSLTW19","doi":"10.1109/JIOT.2019.2939667","ee":"https://doi.org/10.1109/JIOT.2019.2939667","url":"https://dblp.org/rec/journals/iotj/ZhanSLTW19"}, "url":"URL#2000055" }, { "@score":"1", "@id":"2000056", "info":{"authors":{"author":[{"@pid":"48/5176","text":"Xiaolu Zhang"},{"@pid":"c/KimKwangRaymondChoo","text":"Kim-Kwang Raymond Choo"},{"@pid":"35/4103","text":"Nicole Lang Beebe"}]},"title":"How Do I Share My IoT Forensic Experience With the Broader Community? An Automated Knowledge Sharing IoT Forensic Platform.","venue":"IEEE Internet Things J.","volume":"6","number":"4","pages":"6850-6861","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/ZhangCB19","doi":"10.1109/JIOT.2019.2912118","ee":"https://doi.org/10.1109/JIOT.2019.2912118","url":"https://dblp.org/rec/journals/iotj/ZhangCB19"}, "url":"URL#2000056" }, { "@score":"1", "@id":"2000057", "info":{"authors":{"author":[{"@pid":"04/8707","text":"Guanglin Zhang"},{"@pid":"88/2827-30","text":"Yan Chen 0030"},{"@pid":"20/2488","text":"Zhirong Shen"},{"@pid":"17/6729-22","text":"Lin Wang 0022"}]},"title":"Distributed Energy Management for Multiuser Mobile-Edge Computing Systems With Energy Harvesting Devices and QoS Constraints.","venue":"IEEE Internet Things J.","volume":"6","number":"3","pages":"4035-4048","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/ZhangCSW19","doi":"10.1109/JIOT.2018.2875909","ee":"https://doi.org/10.1109/JIOT.2018.2875909","url":"https://dblp.org/rec/journals/iotj/ZhangCSW19"}, "url":"URL#2000057" }, { "@score":"1", "@id":"2000058", "info":{"authors":{"author":[{"@pid":"41/10435","text":"Youlin Zhang"},{"@pid":"c/ShigangChen","text":"Shigang Chen"},{"@pid":"20/2165-3","text":"You Zhou 0003"},{"@pid":"f/YuguangFang","text":"Yuguang Fang"},{"@pid":"70/3604-1","text":"Chen Qian 0001"}]},"title":"Monitoring Bodily Oscillation With RFID Tags.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"3840-3854","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/ZhangCZFQ19","doi":"10.1109/JIOT.2019.2892000","ee":"https://doi.org/10.1109/JIOT.2019.2892000","url":"https://dblp.org/rec/journals/iotj/ZhangCZFQ19"}, "url":"URL#2000058" }, { "@score":"1", "@id":"2000059", "info":{"authors":{"author":[{"@pid":"23/6370","text":"Yuming Zhang"},{"@pid":"152/6426","text":"Bohao Feng"},{"@pid":"67/5376-1","text":"Wei Quan 0001"},{"@pid":"26/7938","text":"Guanglei Li"},{"@pid":"95/796","text":"Huachun Zhou"},{"@pid":"09/5441","text":"Hongke Zhang"}]},"title":"Theoretical Analysis on Edge Computation Offloading Policies for IoT Devices.","venue":"IEEE Internet Things J.","volume":"6","number":"3","pages":"4228-4241","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/ZhangFQLZZ19","doi":"10.1109/JIOT.2018.2875599","ee":"https://doi.org/10.1109/JIOT.2018.2875599","url":"https://dblp.org/rec/journals/iotj/ZhangFQLZZ19"}, "url":"URL#2000059" }, { "@score":"1", "@id":"2000060", "info":{"authors":{"author":[{"@pid":"74/1626","text":"Qingqing Zhang"},{"@pid":"03/1628","text":"Wen Fang"},{"@pid":"187/9876","text":"Mingliang Xiong"},{"@pid":"67/4161","text":"Qingwen Liu"},{"@pid":"20/3894-6","text":"Jun Wu 0006"},{"@pid":"83/4774","text":"Pengfei Xia"}]},"title":"Adaptive Resonant Beam Charging for Intelligent Wireless Power Transfer.","venue":"IEEE Internet Things J.","volume":"6","number":"1","pages":"1160-1172","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/ZhangFXLWX19","doi":"10.1109/JIOT.2018.2867457","ee":"https://doi.org/10.1109/JIOT.2018.2867457","url":"https://dblp.org/rec/journals/iotj/ZhangFXLWX19"}, "url":"URL#2000060" }, { "@score":"1", "@id":"2000061", "info":{"authors":{"author":[{"@pid":"224/9885","text":"Dongheng Zhang"},{"@pid":"43/4685-6","text":"Yang Hu 0006"},{"@pid":"88/2827-7","text":"Yan Chen 0007"},{"@pid":"26/3636","text":"Bing Zeng"}]},"title":"BreathTrack: Tracking Indoor Human Breath Status via Commodity WiFi.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"3899-3911","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/ZhangHCZ19","doi":"10.1109/JIOT.2019.2893330","ee":"https://doi.org/10.1109/JIOT.2019.2893330","url":"https://dblp.org/rec/journals/iotj/ZhangHCZ19"}, "url":"URL#2000061" }, { "@score":"1", "@id":"2000062", "info":{"authors":{"author":[{"@pid":"19/5112-22","text":"Zhen Zhang 0022"},{"@pid":"239/5523","text":"Zicong Hong"},{"@pid":"02/8379","text":"Wuhui Chen"},{"@pid":"z/ZibinZheng","text":"Zibin Zheng"},{"@pid":"83/6331-4","text":"Xu Chen 0004"}]},"title":"Joint Computation Offloading and Coin Loaning for Blockchain-Empowered Mobile-Edge Computing.","venue":"IEEE Internet Things J.","volume":"6","number":"6","pages":"9934-9950","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/ZhangHCZC19","doi":"10.1109/JIOT.2019.2933445","ee":"https://doi.org/10.1109/JIOT.2019.2933445","url":"https://dblp.org/rec/journals/iotj/ZhangHCZC19"}, "url":"URL#2000062" }, { "@score":"1", "@id":"2000063", "info":{"authors":{"author":[{"@pid":"04/527-1","text":"Jiao Zhang 0001"},{"@pid":"81/10098","text":"Xiping Hu 0001"},{"@pid":"09/8234","text":"Zhaolong Ning"},{"@pid":"25/5713","text":"Edith C. H. Ngai"},{"@pid":"54/40-2","text":"Li Zhou 0002"},{"@pid":"48/2647","text":"Jibo Wei"},{"@pid":"78/5816-2","text":"Jun Cheng 0002"},{"@pid":"00/6381-1","text":"Bin Hu 0001"},{"@pid":"36/4847","text":"Victor C. M. Leung"}]},"title":"Joint Resource Allocation for Latency-Sensitive Services Over Mobile Edge Computing Networks With Caching.","venue":"IEEE Internet Things J.","volume":"6","number":"3","pages":"4283-4294","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/ZhangHNNZWCHL19","doi":"10.1109/JIOT.2018.2875917","ee":"https://doi.org/10.1109/JIOT.2018.2875917","url":"https://dblp.org/rec/journals/iotj/ZhangHNNZWCHL19"}, "url":"URL#2000063" }, { "@score":"1", "@id":"2000064", "info":{"authors":{"author":[{"@pid":"229/9490","text":"Decheng Zhang"},{"@pid":"240/6867","text":"Faisal Haider"},{"@pid":"57/4385","text":"Marc St-Hilaire"},{"@pid":"62/6656","text":"Christian Makaya"}]},"title":"Model and Algorithms for the Planning of Fog Computing Networks.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"3873-3884","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/ZhangHSM19","doi":"10.1109/JIOT.2019.2892940","ee":"https://doi.org/10.1109/JIOT.2019.2892940","url":"https://dblp.org/rec/journals/iotj/ZhangHSM19"}, "url":"URL#2000064" }, { "@score":"1", "@id":"2000065", "info":{"authors":{"author":[{"@pid":"10/4661-82","text":"Wei Zhang 0082"},{"@pid":"168/0937","text":"Weizheng Hu"},{"@pid":"33/885","text":"Yonggang Wen 0001"}]},"title":"Thermal Comfort Modeling for Smart Buildings: A Fine-Grained Deep Learning Approach.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"2540-2549","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/ZhangHW19","doi":"10.1109/JIOT.2018.2871461","ee":"https://doi.org/10.1109/JIOT.2018.2871461","url":"https://dblp.org/rec/journals/iotj/ZhangHW19"}, "url":"URL#2000065" }, { "@score":"1", "@id":"2000066", "info":{"authors":{"author":[{"@pid":"84/6889-30","text":"Jie Zhang 0030"},{"@pid":"98/5766-5","text":"Xin Huang 0005"},{"@pid":"35/7092-42","text":"Wei Wang 0042"},{"@pid":"172/3742","text":"Yong Yue 0001"}]},"title":"Unbalancing Pairing-Free Identity-Based Authenticated Key Exchange Protocols for Disaster Scenarios.","venue":"IEEE Internet Things J.","volume":"6","number":"1","pages":"878-890","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/ZhangHWY19","doi":"10.1109/JIOT.2018.2864219","ee":"https://doi.org/10.1109/JIOT.2018.2864219","url":"https://dblp.org/rec/journals/iotj/ZhangHWY19"}, "url":"URL#2000066" }, { "@score":"1", "@id":"2000067", "info":{"authors":{"author":[{"@pid":"98/5660-6","text":"Xu Zhang 0006"},{"@pid":"48/3258","text":"Haojun Huang"},{"@pid":"21/760","text":"Hao Yin"},{"@pid":"88/1600","text":"Dapeng Oliver Wu"},{"@pid":"96/3727","text":"Geyong Min"},{"@pid":"09/2949","text":"Zhan Ma"}]},"title":"Resource Provisioning in the Edge for IoT Applications With Multilevel Services.","venue":"IEEE Internet Things J.","volume":"6","number":"3","pages":"4262-4271","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/ZhangHYWMM19","doi":"10.1109/JIOT.2018.2875753","ee":"https://doi.org/10.1109/JIOT.2018.2875753","url":"https://dblp.org/rec/journals/iotj/ZhangHYWMM19"}, "url":"URL#2000067" }, { "@score":"1", "@id":"2000068", "info":{"authors":{"author":[{"@pid":"58/5815","text":"Qixun Zhang"},{"@pid":"215/7178","text":"Menglei Jiang"},{"@pid":"48/195-1","text":"Zhiyong Feng 0001"},{"@pid":"64/6025-7","text":"Wei Li 0007"},{"@pid":"10/4661-1","text":"Wei Zhang 0001"},{"@pid":"16/1033","text":"Miao Pan"}]},"title":"IoT Enabled UAV: Network Architecture and Routing Algorithm.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"3727-3742","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/ZhangJFLZP19","doi":"10.1109/JIOT.2018.2890428","ee":"https://doi.org/10.1109/JIOT.2018.2890428","url":"https://dblp.org/rec/journals/iotj/ZhangJFLZP19"}, "url":"URL#2000068" }, { "@score":"1", "@id":"2000069", "info":{"authors":{"author":[{"@pid":"219/7824","text":"Ximu Zhang"},{"@pid":"90/4627","text":"Min Jia"},{"@pid":"38/113","text":"Xuemai Gu"},{"@pid":"25/3038-1","text":"Qing Guo 0001"}]},"title":"An Energy Efficient Resource Allocation Scheme Based on Cloud-Computing in H-CRAN.","venue":"IEEE Internet Things J.","volume":"6","number":"3","pages":"4968-4976","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/ZhangJGG19","doi":"10.1109/JIOT.2019.2894000","ee":"https://doi.org/10.1109/JIOT.2019.2894000","url":"https://dblp.org/rec/journals/iotj/ZhangJGG19"}, "url":"URL#2000069" }, { "@score":"1", "@id":"2000070", "info":{"authors":{"author":[{"@pid":"139/0771","text":"Yuanyu Zhang"},{"@pid":"10/608","text":"Shoji Kasahara"},{"@pid":"74/2768","text":"Yulong Shen"},{"@pid":"67/5160-1","text":"Xiaohong Jiang 0001"},{"@pid":"45/6915","text":"Jianxiong Wan"}]},"title":"Smart Contract-Based Access Control for the Internet of Things.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"1594-1605","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/ZhangKSJW19","doi":"10.1109/JIOT.2018.2847705","ee":"https://doi.org/10.1109/JIOT.2018.2847705","url":"https://dblp.org/rec/journals/iotj/ZhangKSJW19"}, "url":"URL#2000070" }, { "@score":"1", "@id":"2000071", "info":{"authors":{"author":[{"@pid":"28/1568-1","text":"Zhong Zhang 0001"},{"@pid":"40/3783","text":"Donghong Li"}]},"title":"Hybrid Cross Deep Network for Domain Adaptation and Energy Saving in Visual Internet of Things.","venue":"IEEE Internet Things J.","volume":"6","number":"4","pages":"6026-6033","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/ZhangL19","doi":"10.1109/JIOT.2018.2867083","ee":"https://doi.org/10.1109/JIOT.2018.2867083","url":"https://dblp.org/rec/journals/iotj/ZhangL19"}, "url":"URL#2000071" }, { "@score":"1", "@id":"2000072", "info":{"authors":{"author":[{"@pid":"37/1629-22","text":"Lin Zhang 0022"},{"@pid":"98/153","text":"Ying-Chang Liang"}]},"title":"Joint Spectrum Sensing and Packet Error Rate Optimization in Cognitive IoT.","venue":"IEEE Internet Things J.","volume":"6","number":"5","pages":"7816-7827","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/ZhangL19a","doi":"10.1109/JIOT.2019.2907993","ee":"https://doi.org/10.1109/JIOT.2019.2907993","url":"https://dblp.org/rec/journals/iotj/ZhangL19a"}, "url":"URL#2000072" }, { "@score":"1", "@id":"2000073", "info":{"authors":{"author":[{"@pid":"49/4478-23","text":"Xiao Zhang 0023"},{"@pid":"27/4749","text":"Jiqiang Liu"},{"@pid":"93/5439","text":"Si Chen"},{"@pid":"236/4366","text":"Yongjun Kong"},{"@pid":"20/6179-1","text":"Kui Ren 0001"}]},"title":"PriWhisper+: An Enhanced Acoustic Short-Range Communication System for Smartphones.","venue":"IEEE Internet Things J.","volume":"6","number":"1","pages":"614-627","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/ZhangLCKR19","doi":"10.1109/JIOT.2018.2850524","ee":"https://doi.org/10.1109/JIOT.2018.2850524","url":"https://dblp.org/rec/journals/iotj/ZhangLCKR19"}, "url":"URL#2000073" }, { "@score":"1", "@id":"2000074", "info":{"authors":{"author":[{"@pid":"50/671-47","text":"Yu Zhang 0047"},{"@pid":"89/6764-5","text":"Bin Li 0005"},{"@pid":"20/6898","text":"Feifei Gao"},{"@pid":"83/514","text":"Zhu Han 0001"}]},"title":"A Robust Design for Ultra Reliable Ambient Backscatter Communication Systems.","venue":"IEEE Internet Things J.","volume":"6","number":"5","pages":"8989-8999","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/ZhangLGH19","doi":"10.1109/JIOT.2019.2925843","ee":"https://doi.org/10.1109/JIOT.2019.2925843","url":"https://dblp.org/rec/journals/iotj/ZhangLGH19"}, "url":"URL#2000074" }, { "@score":"1", "@id":"2000075", "info":{"authors":{"author":[{"@pid":"60/4061","text":"Yongmin Zhang"},{"@pid":"195/8082","text":"Xiaolong Lan"},{"@pid":"61/500-7","text":"Yue Li 0007"},{"@pid":"20/8688-1","text":"Lin Cai 0001"},{"@pid":"p/JianpingPan","text":"Jianping Pan 0001"}]},"title":"Efficient Computation Resource Management in Mobile Edge-Cloud Computing.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"3455-3466","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/ZhangLLCP19","doi":"10.1109/JIOT.2018.2885453","ee":"https://doi.org/10.1109/JIOT.2018.2885453","url":"https://dblp.org/rec/journals/iotj/ZhangLLCP19"}, "url":"URL#2000075" }, { "@score":"1", "@id":"2000076", "info":{"authors":{"author":[{"@pid":"74/1626","text":"Qingqing Zhang"},{"@pid":"174/6491","text":"Mingqing Liu"},{"@pid":"17/418","text":"Xing Lin"},{"@pid":"67/4161","text":"Qingwen Liu"},{"@pid":"20/3894-6","text":"Jun Wu 0006"},{"@pid":"83/4774","text":"Pengfei Xia"}]},"title":"Optimal Resonant Beam Charging for Electronic Vehicles in Internet of Intelligent Vehicles.","venue":"IEEE Internet Things J.","volume":"6","number":"1","pages":"6-14","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/ZhangLLLWX19","doi":"10.1109/JIOT.2018.2872431","ee":"https://doi.org/10.1109/JIOT.2018.2872431","url":"https://dblp.org/rec/journals/iotj/ZhangLLLWX19"}, "url":"URL#2000076" }, { "@score":"1", "@id":"2000077", "info":{"authors":{"author":[{"@pid":"20/4152-8","text":"Ke Zhang 0008"},{"@pid":"98/4623","text":"Supeng Leng"},{"@pid":"14/6370-2","text":"Xin Peng 0002"},{"@pid":"26/4737","text":"Li Pan"},{"@pid":"92/8861","text":"Sabita Maharjan"},{"@pid":"04/3348-2","text":"Yan Zhang 0002"}]},"title":"Artificial Intelligence Inspired Transmission Scheduling in Cognitive Vehicular Communications and Networks.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"1987-1997","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/ZhangLPPMZ19","doi":"10.1109/JIOT.2018.2872013","ee":"https://doi.org/10.1109/JIOT.2018.2872013","url":"https://dblp.org/rec/journals/iotj/ZhangLPPMZ19"}, "url":"URL#2000077" }, { "@score":"1", "@id":"2000078", "info":{"authors":{"author":[{"@pid":"165/9149","text":"Shangwei Zhang"},{"@pid":"40/6246-1","text":"Jiajia Liu 0001"},{"@pid":"69/1010-4","text":"Wen Sun 0004"}]},"title":"Stochastic Geometric Analysis of Multiple Unmanned Aerial Vehicle-Assisted Communications Over Internet of Things.","venue":"IEEE Internet Things J.","volume":"6","number":"3","pages":"5446-5460","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/ZhangLS19","doi":"10.1109/JIOT.2019.2902162","ee":"https://doi.org/10.1109/JIOT.2019.2902162","url":"https://dblp.org/rec/journals/iotj/ZhangLS19"}, "url":"URL#2000078" }, { "@score":"1", "@id":"2000079", "info":{"authors":{"author":[{"@pid":"173/9377","text":"Yunlei Zhang"},{"@pid":"76/268","text":"Yongtao Ma"},{"@pid":"236/4240","text":"Xinlong Miao"},{"@pid":"71/208-17","text":"Shuai Zhang 0017"},{"@pid":"133/8721","text":"Bobo Wang"}]},"title":"Multipath Mitigation Algorithm for Multifrequency-Based Ranging via Convex Relaxation in Passive UHF RFID.","venue":"IEEE Internet Things J.","volume":"6","number":"1","pages":"744-752","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/ZhangMMZW19","doi":"10.1109/JIOT.2018.2856242","ee":"https://doi.org/10.1109/JIOT.2018.2856242","url":"https://dblp.org/rec/journals/iotj/ZhangMMZW19"}, "url":"URL#2000079" }, { "@score":"1", "@id":"2000080", "info":{"authors":{"author":[{"@pid":"196/6861","text":"Yaqiang Zhang"},{"@pid":"67/3925","text":"Lin Meng"},{"@pid":"82/2187-1","text":"Xiao Xue 0001"},{"@pid":"07/10127","text":"Zhangbing Zhou"},{"@pid":"68/1314","text":"Hiroyuki Tomiyama"}]},"title":"QoE-Constrained Concurrent Request Optimization Through Collaboration of Edge Servers.","venue":"IEEE Internet Things J.","volume":"6","number":"6","pages":"9951-9962","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/ZhangMXZT19","doi":"10.1109/JIOT.2019.2933587","ee":"https://doi.org/10.1109/JIOT.2019.2933587","url":"https://dblp.org/rec/journals/iotj/ZhangMXZT19"}, "url":"URL#2000080" }, { "@score":"1", "@id":"2000081", "info":{"authors":{"author":[{"@pid":"03/5201","text":"Rongrong Zhang"},{"@pid":"00/6922","text":"Amiya Nayak"},{"@pid":"74/10296","text":"Shurong Zhang"},{"@pid":"41/5200","text":"Jihong Yu"}]},"title":"Energy-Efficient Sleep Scheduling in WBANs: From the Perspective of Minimum Dominating Set.","venue":"IEEE Internet Things J.","volume":"6","number":"4","pages":"6237-6246","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/ZhangNZY19","doi":"10.1109/JIOT.2018.2877762","ee":"https://doi.org/10.1109/JIOT.2018.2877762","url":"https://dblp.org/rec/journals/iotj/ZhangNZY19"}, "url":"URL#2000081" }, { "@score":"1", "@id":"2000082", "info":{"authors":{"author":[{"@pid":"03/5201","text":"Rongrong Zhang"},{"@pid":"29/4181-2","text":"Jian Peng 0002"},{"@pid":"00/9492","text":"Wenzheng Xu"},{"@pid":"31/1277","text":"Weifa Liang"},{"@pid":"10/1143","text":"Zheng Li"},{"@pid":"25/3246-1","text":"Tian Wang 0001"}]},"title":"Utility Maximization of Temporally Correlated Sensing Data in Energy Harvesting Sensor Networks.","venue":"IEEE Internet Things J.","volume":"6","number":"3","pages":"5411-5422","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/ZhangPXLLW19","doi":"10.1109/JIOT.2019.2901758","ee":"https://doi.org/10.1109/JIOT.2019.2901758","url":"https://dblp.org/rec/journals/iotj/ZhangPXLLW19"}, "url":"URL#2000082" }, { "@score":"1", "@id":"2000083", "info":{"authors":{"author":[{"@pid":"04/1262-2","text":"Jiliang Zhang 0002"},{"@pid":"213/7852","text":"Binhang Qi"},{"@pid":"95/6861-1","text":"Zheng Qin 0001"},{"@pid":"04/3130","text":"Gang Qu 0001"}]},"title":"HCIC: Hardware-Assisted Control-Flow Integrity Checking.","venue":"IEEE Internet Things J.","volume":"6","number":"1","pages":"458-471","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/ZhangQQQ19","doi":"10.1109/JIOT.2018.2866164","ee":"https://doi.org/10.1109/JIOT.2018.2866164","url":"https://dblp.org/rec/journals/iotj/ZhangQQQ19"}, "url":"URL#2000083" }, { "@score":"1", "@id":"2000084", "info":{"authors":{"author":[{"@pid":"21/7829","text":"Deyu Zhang"},{"@pid":"28/1673","text":"Ying Qiao"},{"@pid":"210/5181","text":"Liang She"},{"@pid":"225/1775","text":"Ruyin Shen"},{"@pid":"00/468","text":"Ju Ren"},{"@pid":"99/4094","text":"Yaoxue Zhang"}]},"title":"Two Time-Scale Resource Management for Green Internet of Things Networks.","venue":"IEEE Internet Things J.","volume":"6","number":"1","pages":"545-556","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/ZhangQSSRZ19","doi":"10.1109/JIOT.2018.2842766","ee":"https://doi.org/10.1109/JIOT.2018.2842766","url":"https://dblp.org/rec/journals/iotj/ZhangQSSRZ19"}, "url":"URL#2000084" }, { "@score":"1", "@id":"2000085", "info":{"authors":{"author":[{"@pid":"48/2168-7","text":"Yuan Zhang 0007"},{"@pid":"25/3419","text":"Joel J. P. C. Rodrigues"},{"@pid":"s/WKGSeah","text":"Winston K. G. Seah"},{"@pid":"84/1733-1","text":"Jinsong Wu 0001"},{"@pid":"11/5931","text":"Yunchuan Sun"},{"@pid":"03/3147","text":"Roozbeh Jafari"}]},"title":"Guest Editorial Special Issue on Wearable Sensor-Based Big Data Analysis for Smart Health.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"1293-1297","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/ZhangRSWSJ19","doi":"10.1109/JIOT.2019.2908461","ee":"https://doi.org/10.1109/JIOT.2019.2908461","url":"https://dblp.org/rec/journals/iotj/ZhangRSWSJ19"}, "url":"URL#2000085" }, { "@score":"1", "@id":"2000086", "info":{"authors":{"author":[{"@pid":"70/6271-3","text":"Guowei Zhang 0003"},{"@pid":"99/6100-1","text":"Fei Shen 0001"},{"@pid":"56/10144","text":"Nanxi Chen"},{"@pid":"37/5521-1","text":"Pengcheng Zhu 0001"},{"@pid":"77/3562","text":"Xuewu Dai"},{"@pid":"48/450-1","text":"Yang Yang 0001"}]},"title":"DOTS: Delay-Optimal Task Scheduling Among Voluntary Nodes in Fog Networks.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"3533-3544","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/ZhangSCZDY19","doi":"10.1109/JIOT.2018.2887264","ee":"https://doi.org/10.1109/JIOT.2018.2887264","url":"https://dblp.org/rec/journals/iotj/ZhangSCZDY19"}, "url":"URL#2000086" }, { "@score":"1", "@id":"2000087", "info":{"authors":{"author":[{"@pid":"31/3845-2","text":"Yinghui Zhang 0002"},{"@pid":"143/0117","text":"Jiangang Shu"},{"@pid":"134/3945","text":"Ximeng Liu"},{"@pid":"48/1097-2","text":"Jin Li 0002"},{"@pid":"94/3077-1","text":"Dong Zheng 0001"}]},"title":"Comments on "A Large-Scale Concurrent Data Anonymous Batch Verification Scheme for Mobile Healthcare Crowd Sensing".","venue":"IEEE Internet Things J.","volume":"6","number":"1","pages":"1287-1290","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/ZhangSLLZ19","doi":"10.1109/JIOT.2018.2862381","ee":"https://doi.org/10.1109/JIOT.2018.2862381","url":"https://dblp.org/rec/journals/iotj/ZhangSLLZ19"}, "url":"URL#2000087" }, { "@score":"1", "@id":"2000088", "info":{"authors":{"author":[{"@pid":"04/8707","text":"Guanglin Zhang"},{"@pid":"20/2488","text":"Zhirong Shen"},{"@pid":"24/1320","text":"Zongpeng Li"},{"@pid":"17/6729-22","text":"Lin Wang 0022"}]},"title":"Energy Scheduling for Networked Microgrids With Co-Generation and Energy Storage.","venue":"IEEE Internet Things J.","volume":"6","number":"5","pages":"7722-7736","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/ZhangSLW19","doi":"10.1109/JIOT.2019.2901766","ee":"https://doi.org/10.1109/JIOT.2019.2901766","url":"https://dblp.org/rec/journals/iotj/ZhangSLW19"}, "url":"URL#2000088" }, { "@score":"1", "@id":"2000089", "info":{"authors":{"author":[{"@pid":"70/6271-3","text":"Guowei Zhang 0003"},{"@pid":"99/6100-1","text":"Fei Shen 0001"},{"@pid":"224/0906","text":"Zening Liu"},{"@pid":"48/450-1","text":"Yang Yang 0001"},{"@pid":"37/11533","text":"Kunlun Wang 0001"},{"@pid":"86/3380","text":"Ming-Tuo Zhou"}]},"title":"FEMTO: Fair and Energy-Minimized Task Offloading for Fog-Enabled IoT Networks.","venue":"IEEE Internet Things J.","volume":"6","number":"3","pages":"4388-4400","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/ZhangSLYWZ19","doi":"10.1109/JIOT.2018.2887229","ee":"https://doi.org/10.1109/JIOT.2018.2887229","url":"https://dblp.org/rec/journals/iotj/ZhangSLYWZ19"}, "url":"URL#2000089" }, { "@score":"1", "@id":"2000090", "info":{"authors":{"author":[{"@pid":"146/5594","text":"Changwei Zhang"},{"@pid":"20/687","text":"Xinghua Sun"},{"@pid":"29/4190-23","text":"Jun Zhang 0023"},{"@pid":"87/6482-1","text":"Xianbin Wang 0001"},{"@pid":"49/5340-2","text":"Shi Jin 0002"},{"@pid":"70/2173-2","text":"Hongbo Zhu 0002"}]},"title":"Throughput Optimization With Delay Guarantee for Massive Random Access of M2M Communications in Industrial IoT.","venue":"IEEE Internet Things J.","volume":"6","number":"6","pages":"10077-10092","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/ZhangSZWJZ19","doi":"10.1109/JIOT.2019.2935548","ee":"https://doi.org/10.1109/JIOT.2019.2935548","url":"https://dblp.org/rec/journals/iotj/ZhangSZWJZ19"}, "url":"URL#2000090" }, { "@score":"1", "@id":"2000091", "info":{"authors":{"author":[{"@pid":"57/4707-8","text":"Yi-Fan Zhang 0008"},{"@pid":"156/6101","text":"Peter J. Thorburn"},{"@pid":"37/1682-1","text":"Wei Xiang 0001"},{"@pid":"246/5526","text":"Peter Fitch"}]},"title":"SSIM - A Deep Learning Approach for Recovering Missing Time Series Sensor Data.","venue":"IEEE Internet Things J.","volume":"6","number":"4","pages":"6618-6628","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/ZhangTXF19","doi":"10.1109/JIOT.2019.2909038","ee":"https://doi.org/10.1109/JIOT.2019.2909038","url":"https://dblp.org/rec/journals/iotj/ZhangTXF19"}, "url":"URL#2000091" }, { "@score":"1", "@id":"2000092", "info":{"authors":{"author":[{"@pid":"87/8200","text":"Chunkai Zhang"},{"@pid":"205/7577","text":"Panbo Tian"},{"@pid":"58/6205","text":"Xudong Zhang"},{"@pid":"19/105","text":"Zoe Lin Jiang"},{"@pid":"37/752","text":"Lin Yao"},{"@pid":"34/4799-2","text":"Xuan Wang 0002"}]},"title":"Fast Eclat Algorithms Based on Minwise Hashing for Large Scale Transactions.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"3948-3961","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/ZhangTZJYW19","doi":"10.1109/JIOT.2018.2885851","ee":"https://doi.org/10.1109/JIOT.2018.2885851","url":"https://dblp.org/rec/journals/iotj/ZhangTZJYW19"}, "url":"URL#2000092" }, { "@score":"1", "@id":"2000093", "info":{"authors":{"author":[{"@pid":"74/1626","text":"Qingqing Zhang"},{"@pid":"71/4292-14","text":"Gang Wang 0014"},{"@pid":"92/6289-3","text":"Jie Chen 0003"},{"@pid":"33/4080","text":"Georgios B. Giannakis"},{"@pid":"67/4161","text":"Qingwen Liu"}]},"title":"Mobile Energy Transfer in Internet of Things.","venue":"IEEE Internet Things J.","volume":"6","number":"5","pages":"9012-9019","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/ZhangWCGL19","doi":"10.1109/JIOT.2019.2926333","ee":"https://doi.org/10.1109/JIOT.2019.2926333","url":"https://dblp.org/rec/journals/iotj/ZhangWCGL19"}, "url":"URL#2000093" }, { "@score":"1", "@id":"2000094", "info":{"authors":{"author":[{"@pid":"181/2597-7","text":"Ning Zhang 0007"},{"@pid":"87/1414","text":"Renyong Wu"},{"@pid":"60/3635","text":"Shenglan Yuan"},{"@pid":"22/6365","text":"Chao Yuan"},{"@pid":"136/5825","text":"Dajiang Chen"}]},"title":"RAV: Relay Aided Vectorized Secure Transmission in Physical Layer Security for Internet of Things Under Active Attacks.","venue":"IEEE Internet Things J.","volume":"6","number":"5","pages":"8496-8506","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/ZhangWYYC19","doi":"10.1109/JIOT.2019.2919743","ee":"https://doi.org/10.1109/JIOT.2019.2919743","url":"https://dblp.org/rec/journals/iotj/ZhangWYYC19"}, "url":"URL#2000094" }, { "@score":"1", "@id":"2000095", "info":{"authors":{"author":[{"@pid":"94/689","text":"Shigeng Zhang"},{"@pid":"89/8178","text":"Chengwei Yang"},{"@pid":"201/8136","text":"Danming Jiang"},{"@pid":"122/5217","text":"Xiaoyan Kui"},{"@pid":"01/267-1","text":"Song Guo 0001"},{"@pid":"z/AlbertYZomaya","text":"Albert Y. Zomaya"},{"@pid":"75/2669-1","text":"Jianxin Wang 0001"}]},"title":"Nothing Blocks Me: Precise and Real-Time LOS/NLOS Path Recognition in RFID Systems.","venue":"IEEE Internet Things J.","volume":"6","number":"3","pages":"5814-5824","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/ZhangYJKGZW19","doi":"10.1109/JIOT.2019.2907555","ee":"https://doi.org/10.1109/JIOT.2019.2907555","url":"https://dblp.org/rec/journals/iotj/ZhangYJKGZW19"}, "url":"URL#2000095" }, { "@score":"1", "@id":"2000096", "info":{"authors":{"author":[{"@pid":"06/6785","text":"Yang Zhang"},{"@pid":"01/2404","text":"Qingyu Yang"},{"@pid":"82/2790-2","text":"Wei Yu 0002"},{"@pid":"142/1098","text":"Dou An"},{"@pid":"213/0675","text":"Donghe Li"},{"@pid":"z/WeiZhao-1","text":"Wei Zhao 0001"}]},"title":"An Online Continuous Progressive Second Price Auction for Electric Vehicle Charging.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"2907-2921","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/ZhangYYALZ19","doi":"10.1109/JIOT.2018.2876422","ee":"https://doi.org/10.1109/JIOT.2018.2876422","url":"https://dblp.org/rec/journals/iotj/ZhangYYALZ19"}, "url":"URL#2000096" }, { "@score":"1", "@id":"2000097", "info":{"authors":{"author":[{"@pid":"91/4353-12","text":"Xiang Zhang 0012"},{"@pid":"56/6651-1","text":"Lina Yao 0001"},{"@pid":"71/208-7","text":"Shuai Zhang 0007"},{"@pid":"42/840","text":"Salil S. Kanhere"},{"@pid":"s/QuanZSheng","text":"Michael Sheng 0001"},{"@pid":"27/2403","text":"Yunhao Liu 0001"}]},"title":"Internet of Things Meets Brain-Computer Interface: A Unified Deep Learning Framework for Enabling Human-Thing Cognitive Interactivity.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"2084-2092","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/ZhangYZKSL19","doi":"10.1109/JIOT.2018.2877786","ee":"https://doi.org/10.1109/JIOT.2018.2877786","url":"https://dblp.org/rec/journals/iotj/ZhangYZKSL19"}, "url":"URL#2000097" }, { "@score":"1", "@id":"2000098", "info":{"authors":{"author":[{"@pid":"09/1338","text":"Xiaoning Zhang"},{"@pid":"90/3575-1","text":"Shui Yu 0001"},{"@pid":"86/1953","text":"Ji Zhang"},{"@pid":"146/0697","text":"Zhichao Xu"}]},"title":"Forwarding Rule Multiplexing for Scalable SDN-Based Internet of Things.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"3373-3385","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/ZhangYZX19","doi":"10.1109/JIOT.2018.2882855","ee":"https://doi.org/10.1109/JIOT.2018.2882855","url":"https://dblp.org/rec/journals/iotj/ZhangYZX19"}, "url":"URL#2000098" }, { "@score":"1", "@id":"2000099", "info":{"authors":{"author":[{"@pid":"50/9073","text":"Dalong Zhang"},{"@pid":"63/7912","text":"Liming Zheng"},{"@pid":"236/4669","text":"Qixiao Chen"},{"@pid":"84/5433","text":"Baodian Wei"},{"@pid":"35/573-1","text":"Xiao Ma 0001"}]},"title":"A Power Allocation-Based Overlapping Transmission Scheme in Internet of Vehicles.","venue":"IEEE Internet Things J.","volume":"6","number":"1","pages":"50-59","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/ZhangZCWM19","doi":"10.1109/JIOT.2018.2873480","ee":"https://doi.org/10.1109/JIOT.2018.2873480","url":"https://dblp.org/rec/journals/iotj/ZhangZCWM19"}, "url":"URL#2000099" }, { "@score":"1", "@id":"2000100", "info":{"authors":{"author":[{"@pid":"163/7328","text":"Shuhang Zhang"},{"@pid":"77/10205-1","text":"Hongliang Zhang 0001"},{"@pid":"146/8046","text":"Boya Di"},{"@pid":"02/2683","text":"Lingyang Song"}]},"title":"Cellular Cooperative Unmanned Aerial Vehicle Networks With Sense-and-Send Protocol.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"1754-1767","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/ZhangZDS19","doi":"10.1109/JIOT.2018.2875140","ee":"https://doi.org/10.1109/JIOT.2018.2875140","url":"https://dblp.org/rec/journals/iotj/ZhangZDS19"}, "url":"URL#2000100" }, { "@score":"1", "@id":"2000101", "info":{"authors":{"author":[{"@pid":"20/4152-8","text":"Ke Zhang 0008"},{"@pid":"137/6123","text":"Yongxu Zhu"},{"@pid":"98/4623","text":"Supeng Leng"},{"@pid":"06/868","text":"Yejun He"},{"@pid":"92/8861","text":"Sabita Maharjan"},{"@pid":"04/3348-2","text":"Yan Zhang 0002"}]},"title":"Deep Learning Empowered Task Offloading for Mobile Edge Computing in Urban Informatics.","venue":"IEEE Internet Things J.","volume":"6","number":"5","pages":"7635-7647","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/ZhangZLHMZ19","doi":"10.1109/JIOT.2019.2903191","ee":"https://doi.org/10.1109/JIOT.2019.2903191","url":"https://dblp.org/rec/journals/iotj/ZhangZLHMZ19"}, "url":"URL#2000101" }, { "@score":"1", "@id":"2000102", "info":{"authors":{"author":[{"@pid":"69/8118","text":"Xihai Zhang"},{"@pid":"29/3959-5","text":"Mingming Zhang 0005"},{"@pid":"181/3574","text":"Fanfeng Meng"},{"@pid":"33/3932","text":"Yue Qiao"},{"@pid":"218/8267","text":"Suijia Xu"},{"@pid":"236/4505","text":"Senghout Hour"}]},"title":"A Low-Power Wide-Area Network Information Monitoring System by Combining NB-IoT and LoRa.","venue":"IEEE Internet Things J.","volume":"6","number":"1","pages":"590-598","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/ZhangZMQXH19","doi":"10.1109/JIOT.2018.2847702","ee":"https://doi.org/10.1109/JIOT.2018.2847702","url":"https://dblp.org/rec/journals/iotj/ZhangZMQXH19"}, "url":"URL#2000102" }, { "@score":"1", "@id":"2000103", "info":{"authors":{"author":[{"@pid":"04/527-1","text":"Jiao Zhang 0001"},{"@pid":"54/40-2","text":"Li Zhou 0002"},{"@pid":"40/4498-2","text":"Qi Tang 0002"},{"@pid":"25/5713","text":"Edith C. H. Ngai"},{"@pid":"81/10098","text":"Xiping Hu 0001"},{"@pid":"00/3855-1","text":"Haitao Zhao 0001"},{"@pid":"48/2647","text":"Jibo Wei"}]},"title":"Stochastic Computation Offloading and Trajectory Scheduling for UAV-Assisted Mobile Edge Computing.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"3688-3699","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/ZhangZTNHZW19","doi":"10.1109/JIOT.2018.2890133","ee":"https://doi.org/10.1109/JIOT.2018.2890133","url":"https://dblp.org/rec/journals/iotj/ZhangZTNHZW19"}, "url":"URL#2000103" }, { "@score":"1", "@id":"2000104", "info":{"authors":{"author":[{"@pid":"120/8325","text":"Yuexin Zhang"},{"@pid":"72/4751","text":"Hong Zhao"},{"@pid":"50/2192-1","text":"Yang Xiang 0001"},{"@pid":"82/4944-1","text":"Xinyi Huang 0001"},{"@pid":"c/XiaofengChen1","text":"Xiaofeng Chen 0001"}]},"title":"A Key Agreement Scheme for Smart Homes Using the Secret Mismatch Problem.","venue":"IEEE Internet Things J.","volume":"6","number":"6","pages":"10251-10260","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/ZhangZXHC19","doi":"10.1109/JIOT.2019.2936884","ee":"https://doi.org/10.1109/JIOT.2019.2936884","url":"https://dblp.org/rec/journals/iotj/ZhangZXHC19"}, "url":"URL#2000104" }, { "@score":"1", "@id":"2000105", "info":{"authors":{"author":[{"@pid":"77/349","text":"Lingjun Zhao"},{"@pid":"229/8111","text":"Huakun Huang"},{"@pid":"40/1491-5","text":"Xiang Li 0005"},{"@pid":"05/2091","text":"Shuxue Ding"},{"@pid":"195/9273","text":"Haoli Zhao"},{"@pid":"237/6014","text":"Zhaoyang Han"}]},"title":"An Accurate and Robust Approach of Device-Free Localization With Convolutional Autoencoder.","venue":"IEEE Internet Things J.","volume":"6","number":"3","pages":"5825-5840","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/ZhaoHLDZH19","doi":"10.1109/JIOT.2019.2907580","ee":"https://doi.org/10.1109/JIOT.2019.2907580","url":"https://dblp.org/rec/journals/iotj/ZhaoHLDZH19"}, "url":"URL#2000105" }, { "@score":"1", "@id":"2000106", "info":{"authors":{"author":[{"@pid":"12/4358-1","text":"Ping Zhao 0001"},{"@pid":"25/4108-1","text":"Hongbo Jiang 0001"},{"@pid":"82/4206-11","text":"Chen Wang 0011"},{"@pid":"48/3258","text":"Haojun Huang"},{"@pid":"133/3350","text":"Gaoyang Liu"},{"@pid":"48/450-60","text":"Yang Yang 0060"}]},"title":"On the Performance of $k$ -Anonymity Against Inference Attacks With Background Information.","venue":"IEEE Internet Things J.","volume":"6","number":"1","pages":"808-819","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/ZhaoJWHLY19","doi":"10.1109/JIOT.2018.2858240","ee":"https://doi.org/10.1109/JIOT.2018.2858240","url":"https://dblp.org/rec/journals/iotj/ZhaoJWHLY19"}, "url":"URL#2000106" }, { "@score":"1", "@id":"2000107", "info":{"authors":{"author":[{"@pid":"181/9354","text":"Huapeng Zhao"},{"@pid":"20/8073","text":"Chaofeng Li"},{"@pid":"c/ZhizhangChen","text":"Zhizhang Chen"},{"@pid":"28/441","text":"Jun Hu"}]},"title":"Fast Simulation of Vehicular Antennas for V2X Communication Using the Sparse Equivalent Source Model.","venue":"IEEE Internet Things J.","volume":"6","number":"4","pages":"7038-7047","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/ZhaoLCH19","doi":"10.1109/JIOT.2019.2913659","ee":"https://doi.org/10.1109/JIOT.2019.2913659","url":"https://dblp.org/rec/journals/iotj/ZhaoLCH19"}, "url":"URL#2000107" }, { "@score":"1", "@id":"2000108", "info":{"authors":{"author":[{"@pid":"181/9354","text":"Huapeng Zhao"},{"@pid":"07/9305","text":"Xinzhi Li"},{"@pid":"c/ZhizhangChen","text":"Zhizhang Chen"},{"@pid":"28/441","text":"Jun Hu"}]},"title":"Skeletonization-Scheme-Based Adaptive Near Field Sampling for Radio Frequency Source Reconstruction.","venue":"IEEE Internet Things J.","volume":"6","number":"6","pages":"10219-10228","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/ZhaoLCH19a","doi":"10.1109/JIOT.2019.2936819","ee":"https://doi.org/10.1109/JIOT.2019.2936819","url":"https://dblp.org/rec/journals/iotj/ZhaoLCH19a"}, "url":"URL#2000108" }, { "@score":"1", "@id":"2000109", "info":{"authors":{"author":[{"@pid":"118/7603","text":"Yubin Zhao"},{"@pid":"50/3937-1","text":"Xiaofan Li 0001"},{"@pid":"82/383","text":"Yuefeng Ji"},{"@pid":"x/ChengZhongXu","text":"Cheng-Zhong Xu 0001"}]},"title":"Wireless Power-Driven Positioning System: Fundamental Analysis and Resource Allocation.","venue":"IEEE Internet Things J.","volume":"6","number":"6","pages":"10421-10430","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/ZhaoLJX19","doi":"10.1109/JIOT.2019.2939215","ee":"https://doi.org/10.1109/JIOT.2019.2939215","url":"https://dblp.org/rec/journals/iotj/ZhaoLJX19"}, "url":"URL#2000109" }, { "@score":"1", "@id":"2000110", "info":{"authors":{"author":[{"@pid":"42/653","text":"Ning Zhao"},{"@pid":"72/4250-5","text":"Hao Wu 0005"},{"@pid":"138/4343","text":"Yali Chen"}]},"title":"Coalition Game-Based Computation Resource Allocation for Wireless Blockchain Networks.","venue":"IEEE Internet Things J.","volume":"6","number":"5","pages":"8507-8518","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/ZhaoWC19","doi":"10.1109/JIOT.2019.2919781","ee":"https://doi.org/10.1109/JIOT.2019.2919781","url":"https://dblp.org/rec/journals/iotj/ZhaoWC19"}, "url":"URL#2000110" }, { "@score":"1", "@id":"2000111", "info":{"authors":{"author":[{"@pid":"63/5422-15","text":"Liang Zhao 0015"},{"@pid":"57/1381","text":"Wenyan Wu 0002"},{"@pid":"66/9084","text":"Shengming Li"}]},"title":"Design and Implementation of an IoT-Based Indoor Air Quality Detector With Multiple Communication Interfaces.","venue":"IEEE Internet Things J.","volume":"6","number":"6","pages":"9621-9632","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/ZhaoWL19","doi":"10.1109/JIOT.2019.2930191","ee":"https://doi.org/10.1109/JIOT.2019.2930191","url":"https://dblp.org/rec/journals/iotj/ZhaoWL19"}, "url":"URL#2000111" }, { "@score":"1", "@id":"2000112", "info":{"authors":{"author":[{"@pid":"31/7910-1","text":"Meng Zheng 0001"},{"@pid":"93/5439","text":"Si Chen"},{"@pid":"22/849-1","text":"Wei Liang 0001"},{"@pid":"99/5721","text":"Min Song"}]},"title":"NSAC: A Novel Clustering Protocol in Cognitive Radio Sensor Networks for Internet of Things.","venue":"IEEE Internet Things J.","volume":"6","number":"3","pages":"5864-5865","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/ZhengCLS19","doi":"10.1109/JIOT.2019.2898166","ee":"https://doi.org/10.1109/JIOT.2019.2898166","url":"https://dblp.org/rec/journals/iotj/ZhengCLS19"}, "url":"URL#2000112" }, { "@score":"1", "@id":"2000113", "info":{"authors":{"author":[{"@pid":"99/3982","text":"Haifeng Zheng"},{"@pid":"45/1016","text":"Min Gao"},{"@pid":"c/ZhizhangChen","text":"Zhizhang Chen"},{"@pid":"125/9849","text":"Xiao-Yang Liu"},{"@pid":"91/10799","text":"Xinxin Feng"}]},"title":"An Adaptive Sampling Scheme via Approximate Volume Sampling for Fingerprint-Based Indoor Localization.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"2338-2353","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/ZhengGCLF19","doi":"10.1109/JIOT.2019.2906489","ee":"https://doi.org/10.1109/JIOT.2019.2906489","url":"https://dblp.org/rec/journals/iotj/ZhengGCLF19"}, "url":"URL#2000113" }, { "@score":"1", "@id":"2000114", "info":{"authors":{"author":[{"@pid":"222/8119","text":"Haina Zheng"},{"@pid":"32/3424","text":"Ke Xiong 0001"},{"@pid":"44/2936","text":"Pingyi Fan"},{"@pid":"23/2071","text":"Zhangdui Zhong"},{"@pid":"95/5358","text":"Khaled Ben Letaief"}]},"title":"Fog-Assisted Multiuser SWIPT Networks: Local Computing or Offloading.","venue":"IEEE Internet Things J.","volume":"6","number":"3","pages":"5246-5264","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/ZhengXFZL19","doi":"10.1109/JIOT.2019.2899458","ee":"https://doi.org/10.1109/JIOT.2019.2899458","url":"https://dblp.org/rec/journals/iotj/ZhengXFZL19"}, "url":"URL#2000114" }, { "@score":"1", "@id":"2000115", "info":{"authors":{"author":[{"@pid":"84/6614","text":"Pan Zhou"},{"@pid":"80/1502-1","text":"Wenbo Chen 0001"},{"@pid":"07/8388","text":"Shouling Ji"},{"@pid":"38/6049-10","text":"Hao Jiang 0010"},{"@pid":"70/5913-3","text":"Li Yu 0003"},{"@pid":"88/1600","text":"Dapeng Oliver Wu"}]},"title":"Privacy-Preserving Online Task Allocation in Edge-Computing-Enabled Massive Crowdsensing.","venue":"IEEE Internet Things J.","volume":"6","number":"5","pages":"7773-7787","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/ZhouCJJYW19","doi":"10.1109/JIOT.2019.2903515","ee":"https://doi.org/10.1109/JIOT.2019.2903515","url":"https://dblp.org/rec/journals/iotj/ZhouCJJYW19"}, "url":"URL#2000115" }, { "@score":"1", "@id":"2000116", "info":{"authors":{"author":[{"@pid":"07/552","text":"Xiaohui Zhou"},{"@pid":"77/6860","text":"Salman Durrani"},{"@pid":"95/5907-3","text":"Jing Guo 0003"},{"@pid":"30/1545","text":"Halim Yanikomeroglu"}]},"title":"Underlay Drone Cell for Temporary Events: Impact of Drone Height and Aerial Channel Environments.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"1704-1718","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/ZhouDGY19","doi":"10.1109/JIOT.2018.2875166","ee":"https://doi.org/10.1109/JIOT.2018.2875166","url":"https://dblp.org/rec/journals/iotj/ZhouDGY19"}, "url":"URL#2000116" }, { "@score":"1", "@id":"2000117", "info":{"authors":{"author":[{"@pid":"70/2180","text":"Jianhong Zhou"},{"@pid":"94/3694-4","text":"Gang Feng 0004"},{"@pid":"47/6795","text":"Tak-Shing Peter Yum"},{"@pid":"200/0781","text":"Mu Yan"},{"@pid":"28/8080","text":"Shuang Qin"}]},"title":"Online Learning-Based Discontinuous Reception (DRX) for Machine-Type Communications.","venue":"IEEE Internet Things J.","volume":"6","number":"3","pages":"5550-5561","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/ZhouFYYQ19","doi":"10.1109/JIOT.2019.2903347","ee":"https://doi.org/10.1109/JIOT.2019.2903347","url":"https://dblp.org/rec/journals/iotj/ZhouFYYQ19"}, "url":"URL#2000117" }, { "@score":"1", "@id":"2000118", "info":{"authors":{"author":[{"@pid":"69/5011-26","text":"Wei Zhou 0026"},{"@pid":"230/3262","text":"Yan Jia"},{"@pid":"209/3889","text":"Anni Peng"},{"@pid":"83/6530-1","text":"Yuqing Zhang 0001"},{"@pid":"21/6121-5","text":"Peng Liu 0005"}]},"title":"The Effect of IoT New Features on Security and Privacy: New Threats, Existing Solutions, and Challenges Yet to Be Solved.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"1606-1616","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/ZhouJPZL19","doi":"10.1109/JIOT.2018.2847733","ee":"https://doi.org/10.1109/JIOT.2018.2847733","url":"https://dblp.org/rec/journals/iotj/ZhouJPZL19"}, "url":"URL#2000118" }, { "@score":"1", "@id":"2000119", "info":{"authors":{"author":[{"@pid":"81/4761-4","text":"Liang Zhou 0004"},{"@pid":"203/8228","text":"Sri Harsha Kondapalli"},{"@pid":"126/1723","text":"Kenji Aono"},{"@pid":"39/1540","text":"Shantanu Chakrabartty"}]},"title":"Desynchronization of Self-Powered FN Tunneling Timers for Trust Verification of IoT Supply Chain.","venue":"IEEE Internet Things J.","volume":"6","number":"4","pages":"6537-6547","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/ZhouKAC19","doi":"10.1109/JIOT.2019.2907930","ee":"https://doi.org/10.1109/JIOT.2019.2907930","url":"https://dblp.org/rec/journals/iotj/ZhouKAC19"}, "url":"URL#2000119" }, { "@score":"1", "@id":"2000120", "info":{"authors":{"author":[{"@pid":"98/1574","text":"Boqing Zhou"},{"@pid":"42/5038","text":"Sujun Li"},{"@pid":"72/4134-3","text":"Weiping Wang 0003"},{"@pid":"75/2669-1","text":"Jianxin Wang 0001"},{"@pid":"58/4223","text":"Yun Cheng"},{"@pid":"w/JieWu1","text":"Jie Wu 0001"}]},"title":"An Efficient Authentication Scheme Based on Deployment Knowledge Against Mobile Sink Replication Attack in UWSNs.","venue":"IEEE Internet Things J.","volume":"6","number":"6","pages":"9738-9747","year":"2019","type":"Journal Articles","access":"open","key":"journals/iotj/ZhouLWWCW19","doi":"10.1109/JIOT.2019.2930823","ee":"https://doi.org/10.1109/JIOT.2019.2930823","url":"https://dblp.org/rec/journals/iotj/ZhouLWWCW19"}, "url":"URL#2000120" }, { "@score":"1", "@id":"2000121", "info":{"authors":{"author":[{"@pid":"62/8453","text":"Mu Zhou"},{"@pid":"174/2756","text":"Yanmeng Wang"},{"@pid":"03/1375","text":"Zengshan Tian"},{"@pid":"240/7867","text":"Yinghui Lian"},{"@pid":"84/2694-4","text":"Yong Wang 0004"},{"@pid":"18/3872","text":"Bang Wang"}]},"title":"Calibrated Data Simplification for Energy-Efficient Location Sensing in Internet of Things.","venue":"IEEE Internet Things J.","volume":"6","number":"4","pages":"6125-6133","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/ZhouWTLWW19","doi":"10.1109/JIOT.2018.2869671","ee":"https://doi.org/10.1109/JIOT.2018.2869671","url":"https://dblp.org/rec/journals/iotj/ZhouWTLWW19"}, "url":"URL#2000121" }, { "@score":"1", "@id":"2000122", "info":{"authors":{"author":[{"@pid":"39/10084","text":"Yuchen Zhou"},{"@pid":"16/6654","text":"Fei Richard Yu"},{"@pid":"49/6002-2","text":"Jian Chen 0002"},{"@pid":"22/345","text":"Yonghong Kuo"}]},"title":"Robust Energy-Efficient Resource Allocation for IoT-Powered Cyber-Physical-Social Smart Systems With Virtualization.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"2413-2426","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/ZhouYCK19","doi":"10.1109/JIOT.2018.2869774","ee":"https://doi.org/10.1109/JIOT.2018.2869774","url":"https://dblp.org/rec/journals/iotj/ZhouYCK19"}, "url":"URL#2000122" }, { "@score":"1", "@id":"2000123", "info":{"authors":{"author":[{"@pid":"56/6786","text":"Lu Zhou"},{"@pid":"23/7122","text":"Le Yu"},{"@pid":"82/10060","text":"Suguo Du"},{"@pid":"22/5702","text":"Haojin Zhu"},{"@pid":"35/6761","text":"Cailian Chen"}]},"title":"Achieving Differentially Private Location Privacy in Edge-Assistant Connected Vehicles.","venue":"IEEE Internet Things J.","volume":"6","number":"3","pages":"4472-4481","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/ZhouYDZC19","doi":"10.1109/JIOT.2018.2876419","ee":"https://doi.org/10.1109/JIOT.2018.2876419","url":"https://dblp.org/rec/journals/iotj/ZhouYDZC19"}, "url":"URL#2000123" }, { "@score":"1", "@id":"2000124", "info":{"authors":{"author":[{"@pid":"84/6614","text":"Pan Zhou"},{"@pid":"89/8514","text":"Guohui Zhong"},{"@pid":"20/10116","text":"Menglan Hu"},{"@pid":"60/4429","text":"Ruixuan Li 0001"},{"@pid":"86/10809","text":"Qiben Yan"},{"@pid":"05/1958-5","text":"Kun Wang 0005"},{"@pid":"07/8388","text":"Shouling Ji"},{"@pid":"88/1600","text":"Dapeng Oliver Wu"}]},"title":"Privacy-Preserving and Residential Context-Aware Online Learning for IoT-Enabled Energy Saving With Big Data Support in Smart Home Environment.","venue":"IEEE Internet Things J.","volume":"6","number":"5","pages":"7450-7468","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/ZhouZHLYWJW19","doi":"10.1109/JIOT.2019.2903341","ee":"https://doi.org/10.1109/JIOT.2019.2903341","url":"https://dblp.org/rec/journals/iotj/ZhouZHLYWJW19"}, "url":"URL#2000124" }, { "@score":"1", "@id":"2000125", "info":{"authors":{"author":[{"@pid":"17/4932","text":"Zheng Zhou"},{"@pid":"20/612-1","text":"Weiming Zhang 0001"},{"@pid":"209/9937","text":"Zichong Yang"},{"@pid":"96/5144","text":"Nenghai Yu"}]},"title":"Optical Exfiltration of Data via Keyboard LED Status Indicators to IP Cameras.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"1541-1550","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/ZhouZYY19","doi":"10.1109/JIOT.2018.2842116","ee":"https://doi.org/10.1109/JIOT.2018.2842116","url":"https://dblp.org/rec/journals/iotj/ZhouZYY19"}, "url":"URL#2000125" }, { "@score":"1", "@id":"2000126", "info":{"authors":{"author":[{"@pid":"10/3520","text":"Hao Zhu"},{"@pid":"25/7045-2","text":"Yang Cao 0002"},{"@pid":"181/2867","text":"Xiao Wei"},{"@pid":"35/7092-50","text":"Wei Wang 0050"},{"@pid":"j/TaoJiang-2","text":"Tao Jiang 0002"},{"@pid":"49/5340-2","text":"Shi Jin 0002"}]},"title":"Caching Transient Data for Internet of Things: A Deep Reinforcement Learning Approach.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"2074-2083","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/ZhuCWWJJ19","doi":"10.1109/JIOT.2018.2882583","ee":"https://doi.org/10.1109/JIOT.2018.2882583","url":"https://dblp.org/rec/journals/iotj/ZhuCWWJJ19"}, "url":"URL#2000126" }, { "@score":"1", "@id":"2000127", "info":{"authors":{"author":[{"@pid":"45/10585","text":"Konglin Zhu"},{"@pid":"08/4167","text":"Zhicheng Chen"},{"@pid":"203/0954","text":"Wenke Yan"},{"@pid":"37/1629-13","text":"Lin Zhang 0013"}]},"title":"Security Attacks in Named Data Networking of Things and a Blockchain Solution.","venue":"IEEE Internet Things J.","volume":"6","number":"3","pages":"4733-4741","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/ZhuCYZ19","doi":"10.1109/JIOT.2018.2877647","ee":"https://doi.org/10.1109/JIOT.2018.2877647","url":"https://dblp.org/rec/journals/iotj/ZhuCYZ19"}, "url":"URL#2000127" }, { "@score":"1", "@id":"2000128", "info":{"authors":{"author":[{"@pid":"117/7168","text":"Anqi Zhu"},{"@pid":"23/4556","text":"Songtao Guo"},{"@pid":"39/3711-2","text":"Bei Liu 0002"},{"@pid":"246/2449","text":"Mingfang Ma"},{"@pid":"24/5678","text":"Jing Yao"},{"@pid":"54/3643-1","text":"Xin Su 0001"}]},"title":"Adaptive Multiservice Heterogeneous Network Selection Scheme in Mobile Edge Computing.","venue":"IEEE Internet Things J.","volume":"6","number":"4","pages":"6862-6875","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/ZhuGLMYS19","doi":"10.1109/JIOT.2019.2912155","ee":"https://doi.org/10.1109/JIOT.2019.2912155","url":"https://dblp.org/rec/journals/iotj/ZhuGLMYS19"}, "url":"URL#2000128" }, { "@score":"1", "@id":"2000129", "info":{"authors":{"author":[{"@pid":"140/7624","text":"Guangxu Zhu"},{"@pid":"21/506","text":"Kaibin Huang"}]},"title":"MIMO Over-the-Air Computation for High-Mobility Multimodal Sensing.","venue":"IEEE Internet Things J.","volume":"6","number":"4","pages":"6089-6103","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/ZhuH19","doi":"10.1109/JIOT.2018.2871070","ee":"https://doi.org/10.1109/JIOT.2018.2871070","url":"https://dblp.org/rec/journals/iotj/ZhuH19"}, "url":"URL#2000129" }, { "@score":"1", "@id":"2000130", "info":{"authors":{"author":[{"@pid":"241/2569","text":"Saide Zhu"},{"@pid":"64/6025-59","text":"Wei Li 0059"},{"@pid":"93/6234-4","text":"Hong Li 0004"},{"@pid":"59/4435","text":"Ling Tian"},{"@pid":"65/8410","text":"Guangchun Luo"},{"@pid":"14/5155-1","text":"Zhipeng Cai 0001"}]},"title":"Coin Hopping Attack in Blockchain-Based IoT.","venue":"IEEE Internet Things J.","volume":"6","number":"3","pages":"4614-4626","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/ZhuLLTLC19","doi":"10.1109/JIOT.2018.2872458","ee":"https://doi.org/10.1109/JIOT.2018.2872458","url":"https://dblp.org/rec/journals/iotj/ZhuLLTLC19"}, "url":"URL#2000130" }, { "@score":"1", "@id":"2000131", "info":{"authors":{"author":[{"@pid":"145/6347","text":"Xiaojian Zhu"},{"@pid":"l/JunLi11","text":"Jun Li 0011"},{"@pid":"73/1446","text":"Mengchu Zhou"}]},"title":"Target Coverage-Oriented Deployment of Rechargeable Directional Sensor Networks With a Mobile Charger.","venue":"IEEE Internet Things J.","volume":"6","number":"3","pages":"5196-5208","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/ZhuLZ19","doi":"10.1109/JIOT.2019.2899155","ee":"https://doi.org/10.1109/JIOT.2019.2899155","url":"https://dblp.org/rec/journals/iotj/ZhuLZ19"}, "url":"URL#2000131" }, { "@score":"1", "@id":"2000132", "info":{"authors":{"author":[{"@pid":"26/2546","text":"Liehuang Zhu"},{"@pid":"70/1726-6","text":"Meng Li 0006"},{"@pid":"43/6524-1","text":"Zijian Zhang 0001"}]},"title":"Secure Fog-Assisted Crowdsensing With Collusion Resistance: From Data Reporting to Data Requesting.","venue":"IEEE Internet Things J.","volume":"6","number":"3","pages":"5473-5484","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/ZhuLZ19a","doi":"10.1109/JIOT.2019.2902459","ee":"https://doi.org/10.1109/JIOT.2019.2902459","url":"https://dblp.org/rec/journals/iotj/ZhuLZ19a"}, "url":"URL#2000132" }, { "@score":"1", "@id":"2000133", "info":{"authors":{"author":[{"@pid":"156/5718","text":"Tongxin Zhu"},{"@pid":"23/4850","text":"Tuo Shi"},{"@pid":"18/6870-1","text":"Jianzhong Li 0001"},{"@pid":"14/5155-1","text":"Zhipeng Cai 0001"},{"@pid":"16/1951","text":"Xun Zhou"}]},"title":"Task Scheduling in Deadline-Aware Mobile Edge Computing Systems.","venue":"IEEE Internet Things J.","volume":"6","number":"3","pages":"4854-4866","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/ZhuSLCZ19","doi":"10.1109/JIOT.2018.2874954","ee":"https://doi.org/10.1109/JIOT.2018.2874954","url":"https://dblp.org/rec/journals/iotj/ZhuSLCZ19"}, "url":"URL#2000133" }, { "@score":"1", "@id":"2000134", "info":{"authors":{"author":[{"@pid":"76/445-2","text":"Chao Zhu 0002"},{"@pid":"130/6597","text":"Jin Tao"},{"@pid":"121/2541","text":"Giancarlo Pastor"},{"@pid":"54/5385-1","text":"Yu Xiao 0001"},{"@pid":"53/4376","text":"Yusheng Ji"},{"@pid":"29/5849-1","text":"Quan Zhou 0001"},{"@pid":"93/2334-8","text":"Yong Li 0008"},{"@pid":"63/5415","text":"Antti Ylä-Jääski"}]},"title":"Folo: Latency and Quality Optimized Task Allocation in Vehicular Fog Computing.","venue":"IEEE Internet Things J.","volume":"6","number":"3","pages":"4150-4161","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/ZhuTPXJZLY19","doi":"10.1109/JIOT.2018.2875520","ee":"https://doi.org/10.1109/JIOT.2018.2875520","url":"https://dblp.org/rec/journals/iotj/ZhuTPXJZLY19"}, "url":"URL#2000134" }, { "@score":"1", "@id":"2000135", "info":{"authors":{"author":[{"@pid":"15/6840-1","text":"Yuan Zhuang 0001"},{"@pid":"35/1647","text":"Qin Wang"},{"@pid":"03/1086-1","text":"Min Shi 0001"},{"@pid":"07/10963","text":"Pan Cao"},{"@pid":"186/8943","text":"Longning Qi"},{"@pid":"y/JunYang6","text":"Jun Yang 0006"}]},"title":"Low-Power Centimeter-Level Localization for Indoor Mobile Robots Based on Ensemble Kalman Smoother Using Received Signal Strength.","venue":"IEEE Internet Things J.","volume":"6","number":"4","pages":"6513-6522","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/ZhuangWSCQY19","doi":"10.1109/JIOT.2019.2907707","ee":"https://doi.org/10.1109/JIOT.2019.2907707","url":"https://dblp.org/rec/journals/iotj/ZhuangWSCQY19"}, "url":"URL#2000135" }, { "@score":"1", "@id":"2000136", "info":{"authors":{"author":[{"@pid":"158/4699","text":"Ran Zi"},{"@pid":"49/1245-17","text":"Jia Liu 0017"},{"@pid":"41/219","text":"Liang Gu"},{"@pid":"76/3232","text":"Xiaohu Ge"}]},"title":"Enabling Security and High Energy Efficiency in the Internet of Things With Massive MIMO Hybrid Precoding.","venue":"IEEE Internet Things J.","volume":"6","number":"5","pages":"8615-8625","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/ZiLGG19","doi":"10.1109/JIOT.2019.2921630","ee":"https://doi.org/10.1109/JIOT.2019.2921630","url":"https://dblp.org/rec/journals/iotj/ZiLGG19"}, "url":"URL#2000136" }, { "@score":"1", "@id":"2000137", "info":{"authors":{"author":[{"@pid":"205/1779","text":"Maede Zolanvari"},{"@pid":"02/4437","text":"Marcio Andrey Teixeira"},{"@pid":"161/8015","text":"Lav Gupta"},{"@pid":"57/3323","text":"Khaled M. Khan"},{"@pid":"j/RajJain","text":"Raj Jain"}]},"title":"Machine Learning-Based Network Vulnerability Analysis of Industrial Internet of Things.","venue":"IEEE Internet Things J.","volume":"6","number":"4","pages":"6822-6834","year":"2019","type":"Journal Articles","access":"open","key":"journals/iotj/ZolanvariTGKJ19","doi":"10.1109/JIOT.2019.2912022","ee":"https://doi.org/10.1109/JIOT.2019.2912022","url":"https://dblp.org/rec/journals/iotj/ZolanvariTGKJ19"}, "url":"URL#2000137" }, { "@score":"1", "@id":"2000138", "info":{"authors":{"author":[{"@pid":"240/6927","text":"Hualei Zou"},{"@pid":"02/5889-51","text":"Yu Wang 0051"},{"@pid":"52/3003","text":"Shiwen Mao"},{"@pid":"125/6892","text":"Fanghua Zhang"},{"@pid":"24/1518","text":"Xin Chen"}]},"title":"Online Energy Management in Microgids Considering Reactive Power.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"2895-2906","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/ZouWMZC19","doi":"10.1109/JIOT.2018.2876245","ee":"https://doi.org/10.1109/JIOT.2018.2876245","url":"https://dblp.org/rec/journals/iotj/ZouWMZC19"}, "url":"URL#2000138" }, { "@score":"1", "@id":"2000139", "info":{"authors":{"author":[{"@pid":"147/5139","text":"Han Zou"},{"@pid":"136/9852","text":"Yuxun Zhou"},{"@pid":"145/6522","text":"Reza Arghandeh"},{"@pid":"95/1846","text":"Costas J. Spanos"}]},"title":"Multiple Kernel Semi-Representation Learning With Its Application to Device-Free Human Activity Recognition.","venue":"IEEE Internet Things J.","volume":"6","number":"5","pages":"7670-7680","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/ZouZAS19","doi":"10.1109/JIOT.2019.2901927","ee":"https://doi.org/10.1109/JIOT.2019.2901927","url":"https://dblp.org/rec/journals/iotj/ZouZAS19"}, "url":"URL#2000139" }, { "@score":"1", "@id":"2000140", "info":{"authors":{"author":[{"@pid":"z/DeqingZou","text":"Deqing Zou"},{"@pid":"70/2932-12","text":"Jian Zhao 0012"},{"@pid":"59/100","text":"Weiming Li"},{"@pid":"77/8060","text":"Yueming Wu"},{"@pid":"q/WeizhongQiang","text":"Weizhong Qiang"},{"@pid":"98/4156","text":"Hai Jin 0001"},{"@pid":"50/3141","text":"Ye Wu"},{"@pid":"133/7657","text":"Yifei Yang"}]},"title":"A Multigranularity Forensics and Analysis Method on Privacy Leakage in Cloud Environment.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"1484-1494","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/ZouZLWQJWY19","doi":"10.1109/JIOT.2018.2838569","ee":"https://doi.org/10.1109/JIOT.2018.2838569","url":"https://dblp.org/rec/journals/iotj/ZouZLWQJWY19"}, "url":"URL#2000140" }, { "@score":"1", "@id":"2000141", "info":{"authors":{"author":[{"@pid":"147/5139","text":"Han Zou"},{"@pid":"136/9852","text":"Yuxun Zhou"},{"@pid":"06/5852","text":"Jianfei Yang"},{"@pid":"95/1846","text":"Costas J. Spanos"}]},"title":"Unsupervised WiFi-Enabled IoT Device-User Association for Personalized Location-Based Service.","venue":"IEEE Internet Things J.","volume":"6","number":"1","pages":"1238-1245","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/ZouZYS19","doi":"10.1109/JIOT.2018.2868648","ee":"https://doi.org/10.1109/JIOT.2018.2868648","url":"https://dblp.org/rec/journals/iotj/ZouZYS19"}, "url":"URL#2000141" }, { "@score":"1", "@id":"2000142", "info":{"authors":{"author":[{"@pid":"175/0119","text":"Mohammed Abdullah Zubair"},{"@pid":"195/0326","text":"Ajay Kumar Nain"},{"@pid":"157/4728","text":"Jagadish Bandaru"},{"@pid":"85/4670","text":"Ajay Kumar"},{"@pid":"228/9548","text":"D. Santhosh Reddy"},{"@pid":"28/5457","text":"Pachamuthu Rajalakshmi"}]},"title":"A Residual Phase Noise Compensation Method for IEEE 802.15.4 Compliant Dual-Mode Receiver for Diverse Low Power IoT Applications.","venue":"IEEE Internet Things J.","volume":"6","number":"2","pages":"3437-3447","year":"2019","type":"Journal Articles","access":"closed","key":"journals/iotj/ZubairNBKRR19","doi":"10.1109/JIOT.2018.2884654","ee":"https://doi.org/10.1109/JIOT.2018.2884654","url":"https://dblp.org/rec/journals/iotj/ZubairNBKRR19"}, "url":"URL#2000142" } ] } } } )