170(top 100%)
PR articles
5.8K(top 5%)
PR citations
46(top 100%)
PR h-index
50(top 100%)
h-index
215
documents
8.2K
doc citations
836
citing journals
100
times ranked

Publications

171 PR articles • 6,159 PR citations • Sorted by year • Download PDF (PDF by citations)
#ArticleIFPR CitationsLinks
1Two-Stage Deep Energy Optimization in IRS-Assisted UAV-Based Edge Computing Systems6.910Citations (PDF)
2Authorized Keyword Search on Mobile Devices in Secure Data Outsourcing6.915Citations (PDF)
3Spatiotemporal-Aware Privacy-Preserving Task Matching in Mobile Crowdsensing
IEEE Internet of Things Journal, 2024, 11, 2394-2406
7.026Citations (PDF)
4MARS: Enabling Verifiable Range-Aggregate Queries in Multi-Source Environments5.024Citations (PDF)
5Privacy-Enhanced Cooperative Storage Scheme for Contact-Free Sensory Data in AIoT with Efficient Synchronization3.14Citations (PDF)
6Critical Density for <i>K</i>-Coverage Under Border Effects in Camera Sensor Networks With Irregular Obstacles Existence
IEEE Internet of Things Journal, 2024, 11, 6426-6437
7.031Citations (PDF)
7veffChain: Enabling Freshness Authentication of Rich Queries Over Blockchain Databases6.97Citations (PDF)
8An Online Multi-Item Auction With Differential Privacy in Edge-Assisted Blockchains
IEEE Internet of Things Journal, 2024, 11, 8133-8145
7.03Citations (PDF)
9SD-SRF: An Intelligent Service Deployment Scheme for Serverless-operated Cloud-Edge Computing in 6G Networks5.921Citations (PDF)
10Protecting Inference Privacy With Accuracy Improvement in Mobile-Cloud Deep Learning6.916Citations (PDF)
11BTV-CMAB: A Bi-Directional Trust Verification-Based Combinatorial Multiarmed Bandit Scheme for Mobile Crowdsourcing
IEEE Internet of Things Journal, 2024, 11, 1925-1938
7.026Citations (PDF)
12Privacy-preserving multiobjective task assignment scheme with differential obfuscation in mobile crowdsensing7.120Citations (PDF)
13MPV: Enabling Fine-Grained Query Authentication in Hybrid-Storage Blockchain6.99Citations (PDF)
14Adversarial Bandits With Multi-User Delayed Feedback: Theory and Application6.91Citations (PDF)
15A trust active and Trace back based trust Management system about effective data collection for mobile IoT services
Information Sciences, 2024, 664, 120329
6.57Citations (PDF)
16Medical long-tailed learning for imbalanced data: Bibliometric analysis4.726Citations (PDF)
17Edge-Intelligence-Based Computation Offloading Technology for Distributed Internet of Unmanned Aerial Vehicles
IEEE Internet of Things Journal, 2024, 11, 20948-20957
7.09Citations (PDF)
18Heterogeneous Device Collaboration Based Federated Learning for Big Data Applications4.03Citations (PDF)
19Cost-Effective Dynamic Alliance Pricing Mechanism Based on Distributed Edge Intelligence
IEEE Internet of Things Journal, 2024, 11, 34471-34481
7.02Citations (PDF)
20TANTO: An Effective Trust-Based Unmanned Aerial Vehicle Computing System for the Internet of Things
IEEE Internet of Things Journal, 2023, 10, 5644-5661
7.037Citations (PDF)
21Towards Robust Task Assignment in Mobile Crowdsensing Systems6.931Citations (PDF)
22Differential privacy protection method for trip‐oriented shared data1.51Citations (PDF)
23SlimBox: Lightweight Packet Inspection over Encrypted Traffic5.013Citations (PDF)
24Edge Computing and Sensor-Cloud: Overview, Solutions, and Directions
ACM Computing Surveys, 2023, 55, 1-37
20.1168Citations (PDF)
25EIDLS: An Edge-Intelligence-Based Distributed Learning System Over Internet of Things7.321Citations (PDF)
26Grouping Reduces Energy Cost in Directionally Rechargeable Wireless Vehicular and Sensor Networks5.824Citations (PDF)
27DLFTI: A deep learning based fast truth inference mechanism for distributed spatiotemporal data in mobile crowd sensing
Information Sciences, 2023, 644, 119245
6.533Citations (PDF)
28Credit and quality intelligent learning based multi-armed bandit scheme for unknown worker selection in multimedia MCS
Information Sciences, 2023, 647, 119444
6.535Citations (PDF)
29TSPR: A Trusted Service Prerequest System for Efficient Data Processing in C-ITS7.38Citations (PDF)
30A Comprehensive Trustworthy Data Collection Approach in Sensor-Cloud Systems4.034Citations (PDF)
31An Effective Edge-Intelligent Service Placement Technology for 5G-and-Beyond Industrial IoT9.538Citations (PDF)
32AntiConcealer: Reliable Detection of Adversary Concealed Behaviors in EdgeAI-Assisted IoT
IEEE Internet of Things Journal, 2022, 9, 22184-22193
7.042Citations (PDF)
33Edge-Learning-Based Hierarchical Prefetching for Collaborative Information Streaming in Social IoT Systems4.88Citations (PDF)
34A Natural Scene Recognition Learning Based on Label Correlation5.411Citations (PDF)
35A Privacy-Enhanced Retrieval Technology for the Cloud-Assisted Internet of Things9.566Citations (PDF)
36A privacy-protected intelligent crowdsourcing application of IoT based on the reinforcement learning5.966Citations (PDF)
37Edge-Based Communication Optimization for Distributed Federated Learning6.390Citations (PDF)
38An Intelligent Game-Based Offloading Scheme for Maximizing Benefits of IoT-Edge-Cloud Ecosystems7.067Citations (PDF)
39LIAA: A listen interval adaptive adjustment scheme for green communication in event-sparse IoT systems
Information Sciences, 2022, 584, 235-268
6.518Citations (PDF)
40Missing Value Filling Based on the Collaboration of Cloud and Edge in Artificial Intelligence of Things9.519Citations (PDF)
41Throughput Maximization of UAV Networks2.952Citations (PDF)
42Attention-based Local Mean <mml:math xmlns:mml="http://www.w3.org/1998/Math/MathML" display="inline" id="d1e1490" altimg="si25.svg"><mml:mi>K</mml:mi></mml:math>-Nearest Centroid Neighbor Classifier7.515Citations (PDF)
43Trust-Based Multi-Agent Imitation Learning for Green Edge Computing in Smart Cities5.425Citations (PDF)
44MIDP: An MDP-based intelligent big data processing scheme for vehicular edge computing3.410Citations (PDF)
45Combinatorial resources auction in decentralized edge-thing systems using blockchain and differential privacy
Information Sciences, 2022, 607, 211-229
6.533Citations (PDF)
46Frequency Feature Pyramid Network With Global-Local Consistency Loss for Crowd-and-Vehicle Counting in Congested Scenes7.923Citations (PDF)
47Diversified and Scalable Service Recommendation With Accuracy Guarantee4.839Citations (PDF)
48BD-VTE: A Novel Baseline Data Based Verifiable Trust Evaluation Scheme for Smart Network Systems6.3130Citations (PDF)
49Mobility Based Trust Evaluation for Heterogeneous Electric Vehicles Network in Smart Cities7.999Citations (PDF)
50Detection of hidden data attacks combined fog computing and trust evaluation method in sensor‐cloud system1.565Citations (PDF)
51Solving Coupling Security Problem for Sustainable Sensor-Cloud Systems Based on Fog Computing3.114Citations (PDF)
52A trustworthiness-based vehicular recruitment scheme for information collections in Distributed Networked Systems
Information Sciences, 2021, 545, 65-81
6.562Citations (PDF)
53Privacy-Aware Data Fusion and Prediction With Spatial-Temporal Context for Smart City Industrial Environment9.5227Citations (PDF)
54Edge-based auditing method for data security in resource-constrained Internet of Things3.567Citations (PDF)
55An Intelligent Collaboration Trust Interconnections System for Mobile Information Control in Ubiquitous 5G Networks6.391Citations (PDF)
56An Intelligent Video Analysis Method for Abnormal Event Detection in Intelligent Transportation Systems7.9139Citations (PDF)
57Quick Convex Hull-Based Rendezvous Planning for Delay-Harsh Mobile Data Gathering in Disjoint Sensor Networks7.346Citations (PDF)
58An Effective Early Message Ahead Join Adaptive Data Aggregation Scheme for Sustainable IoT6.334Citations (PDF)
59A Class of Differential Data Processing-Based Data Gathering Schemes in Internet of Things6.38Citations (PDF)
60Parameter analysis and optimization of polling-based medium access control protocol for multi-sensor communication2.14Citations (PDF)
61Secure Multi-keyword Fuzzy Searches With Enhanced Service Quality in Cloud Computing4.264Citations (PDF)
62Deep reinforcement learning for computation offloading in mobile edge computing environment
Computer Communications, 2021, 175, 1-12
3.881Citations (PDF)
63EIHDP: Edge-Intelligent Hierarchical Dynamic Pricing Based on Cloud-Edge-Client Collaboration for IoT Systems
IEEE Transactions on Computers, 2021, 70, 1285-1298
2.6140Citations (PDF)
64A verifiable trust evaluation mechanism for ultra-reliable applications in 5G and beyond networks4.626Citations (PDF)
65STMTO: A smart and trust multi-UAV task offloading system
Information Sciences, 2021, 573, 519-540
6.559Citations (PDF)
66Mobile edge-enabled trust evaluation for the Internet of Things
Information Fusion, 2021, 75, 90-100
16.254Citations (PDF)
67Event Detection Through Differential Pattern Mining in Cyber-Physical Systems4.013Citations (PDF)
68Latency-Aware Path Planning for Disconnected Sensor Networks With Mobile Sinks9.556Citations (PDF)
69Energy-Efficient and Trustworthy Data Collection Protocol Based on Mobile Fog Computing in Internet of Things9.598Citations (PDF)
70A novel trust mechanism based on Fog Computing in Sensor–Cloud System5.9112Citations (PDF)
71An incentive-based protection and recovery strategy for secure big data in social networks
Information Sciences, 2020, 508, 79-91
6.569Citations (PDF)
72MTES: An Intelligent Trust Evaluation Scheme in Sensor-Cloud-Enabled Industrial Internet of Things9.5167Citations (PDF)
73Big Data Cleaning Based on Mobile Edge Computing in Industrial Sensor-Cloud9.5183Citations (PDF)
74TrustData: Trustworthy and Secured Data Collection for Event Detection in Industrial Cyber-Physical System9.566Citations (PDF)
75Bidirectional Prediction-Based Underwater Data Collection Protocol for End-Edge-Cloud Orchestrated System9.596Citations (PDF)
76DUAPM: An Effective Dynamic Micro-Blogging User Activity Prediction Model Towards Cyber-Physical-Social Systems9.512Citations (PDF)
77Relay Selection Joint Consecutive Packet Routing Scheme to Improve Performance for Wake-Up Radio-Enabled WSNs0.943Citations (PDF)
78Preserving Balance Between Privacy and Data Integrity in Edge-Assisted Internet of Things7.0110Citations (PDF)
79Privacy-Enhanced Data Collection Based on Deep Learning for Internet of Vehicles9.5103Citations (PDF)
80A Cloud–MEC Collaborative Task Offloading Scheme With Service Orchestration7.0139Citations (PDF)
81A Unified Trustworthy Environment Establishment Based on Edge Computing in Industrial IoT9.582Citations (PDF)
82A Top-K Query Scheme With Privacy Preservation for Intelligent Vehicle Network in Mobile IoT
IEEE Access, 2020, 8, 81698-81710
3.15Citations (PDF)
83Joint mobile vehicle–UAV scheme for secure data collection in a smart city1.626Citations (PDF)
84Quick and Accurate False Data Detection in Mobile Crowd Sensing2.926Citations (PDF)
85A trust-based minimum cost and quality aware data collection scheme in P2P network2.159Citations (PDF)
86An online and real-time adaptive operational modal parameter identification method based on fog computing in Internet of Things2.18Citations (PDF)
87CSR-IM: Compressed Sensing Routing-Control- Method With Intelligent Migration-Mechanism Based on Sensing Cloud-Computing
IEEE Access, 2020, 8, 28437-28449
3.17Citations (PDF)
88Intelligent resource allocation management for vehicles network: An A3C learning approach
Computer Communications, 2020, 151, 485-494
3.8111Citations (PDF)
89Edge-Computing-Based Trustworthy Data Collection Model in the Internet of Things7.0115Citations (PDF)
90Vehicles joint UAVs to acquire and analyze data for topology discovery in large-scale IoT systems2.133Citations (PDF)
91An AUV-Assisted Data Gathering Scheme Based on Clustering and Matrix Completion for Smart Ocean7.0134Citations (PDF)
92Edge Computing in Internet of Things: A Novel Sensing-Data Reconstruction Algorithm Under Intelligent-Migratoin Stragegy
IEEE Access, 2020, 8, 50696-50708
3.112Citations (PDF)
93An Intelligent Dynamic Offloading From Cloud to Edge for Smart IoT Systems With Big Data6.365Citations (PDF)
94Energy-aware MAC protocol for data differentiated services in sensor-cloud computing3.522Citations (PDF)
95A Low-Latency Communication Scheme for Mobile Wireless Sensor Control Systems7.384Citations (PDF)
96Pipeline slot based fast rerouting scheme for delay optimization in duty cycle based M2M communications2.148Citations (PDF)
97Data Collection in Underwater Sensor Networks based on Mobile Edge Computing
IEEE Access, 2019, 7, 65357-65367
3.185Citations (PDF)
98UAVs joint vehicles as data mules for fast codes dissemination for edge networking in Smart City2.165Citations (PDF)
99A Distributed Intelligent Hungarian Algorithm for Workload Balance in Sensor-Cloud Systems Based on Urban Fog Computing
IEEE Access, 2019, 7, 77649-77658
3.121Citations (PDF)
100Crowdsourcing Mechanism for Trust Evaluation in CPCS Based on Intelligent Mobile Edge Computing4.0180Citations (PDF)
101An Energy-Efficient Cross-Layer-Sensing Clustering Method Based on Intelligent Fog Computing in WSNs
IEEE Access, 2019, 7, 144165-144177
3.139Citations (PDF)
102SLS-STQ: A Novel Scheme for Securing Spatial–Temporal Top-$k$ Queries in TWSNs-Based Edge Computing Systems
IEEE Internet of Things Journal, 2019, 6, 10093-10104
7.07Citations (PDF)
103Utility Maximization of Temporally Correlated Sensing Data in Energy Harvesting Sensor Networks7.09Citations (PDF)
104An Optimized Clustering Communication Protocol Based on Intelligent Computing in Information-Centric Internet of Things
IEEE Access, 2019, 7, 28238-28249
3.133Citations (PDF)
105Content Propagation for Content-Centric Networking Systems From Location-Based Social Networks7.343Citations (PDF)
106Coupling resource management based on fog computing in smart city systems7.1108Citations (PDF)
107Load-Balanced Data Dissemination for Wireless Sensor Networks: A Nature-Inspired Approach7.063Citations (PDF)
108When Sensor-Cloud Meets Mobile Edge Computing
Sensors, 2019, 19, 5324
3.128Citations (PDF)
109A Secure IoT Service Architecture With an Efficient Balance Dynamics Based on Cloud and Edge Computing7.0218Citations (PDF)
110A Survey on the Progress of Testing Techniques and Methods for Wireless Sensor Networks
IEEE Access, 2019, 7, 4302-4316
3.112Citations (PDF)
111Fog-Based Computing and Storage Offloading for Data Synchronization in IoT7.0147Citations (PDF)
112Efficient data request answering in vehicular Ad-hoc networks based on fog nodes and filters5.913Citations (PDF)
113Sustainable and Efficient Data Collection from WSNs to Cloud3.150Citations (PDF)
114A Three-Layer Privacy Preserving Cloud Storage Scheme Based on Computational Intelligence in Fog Computing5.4101Citations (PDF)
115Energy-efficient relay tracking with multiple mobile camera sensors
Computer Networks, 2018, 133, 130-140
3.818Citations (PDF)
116High-accuracy localization for indoor group users based on extended Kalman filter2.19Citations (PDF)
117Optimising order selection algorithm based on online taxi-hailing applications0.12Citations (PDF)
118A Secure Resource Optimization Strategy Based on Utility Dominant in Vehicular Networks
IEEE Access, 2018, 6, 55334-55344
3.10Citations (PDF)
119Using Mobile Nodes to Control Rumors in Big Data Based on a New Rumor Propagation Model in Vehicular Social Networks
IEEE Access, 2018, 6, 62612-62621
3.116Citations (PDF)
120Fog-Based Two-Phase Event Monitoring and Data Gathering in Vehicular Sensor Networks
Sensors, 2018, 18, 82
3.129Citations (PDF)
121Adaptive Transmission Range Based Topology Control Scheme for Fast and Reliable Data Collection0.918Citations (PDF)
122Adaptive Transmission Power Control for Reliable Data Forwarding in Sensor Based Networks0.925Citations (PDF)
123An Aggregate Signature Based Trust Routing for Data Gathering in Sensor Networks0.958Citations (PDF)
124Quality Utilization Aware Based Data Gathering for Vehicular Communication Networks0.913Citations (PDF)
125A Time and Location Correlation Incentive Scheme for Deep Data Gathering in Crowdsourcing Networks0.934Citations (PDF)
126Green Data Gathering under Delay Differentiated Services Constraint for Internet of Things0.955Citations (PDF)
127Delay-Constrained Utility Maximization for Video Ads Push in Mobile Opportunistic D2D Networks7.025Citations (PDF)
128Multi working sets alternate covering scheme for continuous partial coverage in WSNs2.145Citations (PDF)
129Dependable Structural Health Monitoring Using Wireless Sensor Networks5.0193Citations (PDF)
130Quality-Guaranteed Event-Sensitive Data Collection and Monitoring in Vibration Sensor Networks9.540Citations (PDF)
131Trajectory Privacy Preservation Based on a Fog Structure for Cloud Location Services
IEEE Access, 2017, 5, 7692-7701
3.193Citations (PDF)
132e-Sampling1.679Citations (PDF)
133Neighborhood-adaptive differential evolution for global numerical optimization6.234Citations (PDF)
134Interoperable localization for mobile group users
Computer Communications, 2017, 105, 53-65
3.83Citations (PDF)
135Steganalysis of adaptive multi-rate speech using statistical characteristics of pulse pairs
Signal Processing, 2017, 134, 9-22
3.334Citations (PDF)
136Fog-Based Evaluation Approach for Trustworthy Communication in Sensor-Cloud System
IEEE Communications Letters, 2017, 21, 2532-2535
3.520Citations (PDF)
137Cascading Target Tracking Control in Wireless Camera Sensor and Actuator Networks
Asian Journal of Control, 2017, 19, 1350-1364
2.45Citations (PDF)
138Improving charging capacity for wireless sensor networks by deploying one mobile vehicle with multiple removable chargers
Ad Hoc Networks, 2017, 63, 79-90
4.626Citations (PDF)
139Reliable wireless connections for fast-moving rail users based on a chained fog structure
Information Sciences, 2017, 379, 160-176
6.516Citations (PDF)
140Integrated collaborative filtering recommendation in social cyber-physical systems2.132Citations (PDF)
141Propagation Modeling and Defending of a Mobile Sensor Worm in Wireless Sensor and Actuator Networks
Sensors, 2017, 17, 139
3.155Citations (PDF)
142Intelligent Aggregation Based on Content Routing Scheme for Cloud Computing
Symmetry, 2017, 9, 221
2.016Citations (PDF)
143Detecting Steganography of Adaptive Multirate Speech with Unknown Embedding Rate
Mobile Information Systems, 2017, 2017, 1-18
0.85Citations (PDF)
144Uncorrelated multi-source random dynamic load identification based on minimization maximum relative errors and genetic algorithm0.53Citations (PDF)
145Operational modal analysis for linear time-varying continuous dynamic structure based on LMPCA0.53Citations (PDF)
146Convolutional Deep Belief Networks for Single-Cell/Object Tracking in Computational Biology and Computer Vision2.53Citations (PDF)
147Robust Individual-Cell/Object Tracking via PCANet Deep Network in Biomedicine and Computer Vision2.54Citations (PDF)
148A Novel Connection Correlation Scheme Based on Threshold Secret Sharing
IEEE Communications Letters, 2016, 20, 2414-2417
3.54Citations (PDF)
149Following Targets for Mobile Tracking in Wireless Sensor Networks3.151Citations (PDF)
150Higher order partial least squares for object tracking: A 4D-tracking method
Neurocomputing, 2016, 215, 118-127
5.90Citations (PDF)
151Steganalysis of analysis‐by‐synthesis speech exploiting pulse‐position distribution characteristics0.910Citations (PDF)
152Neighborhood guided differential evolution
Soft Computing, 2016, 21, 4769-4812
2.525Citations (PDF)
153Enabling public auditability for operation behaviors in cloud storage
Soft Computing, 2016, 21, 2175-2187
2.519Citations (PDF)
154Extracting Target Detection Knowledge Based on Spatiotemporal Information in Wireless Sensor Networks2.116Citations (PDF)
155Adaptive Data Gathering in Mobile Sensor Networks Using Speedy Mobile Elements
Sensors, 2015, 15, 23218-23248
3.121Citations (PDF)
156Optimal matrix embedding for Voice-over-IP steganography
Signal Processing, 2015, 117, 33-43
3.323Citations (PDF)
157Improved adaptive partial-matching steganography for Voice over IP
Computer Communications, 2015, 70, 95-108
3.813Citations (PDF)
158Maximizing real-time streaming services based on a multi-servers networking framework
Computer Networks, 2015, 93, 199-212
3.814Citations (PDF)
159Online learning 3D context for robust visual tracking
Neurocomputing, 2015, 151, 710-718
5.910Citations (PDF)
160Cellular direction information based differential evolution for numerical optimization: an empirical study
Soft Computing, 2015, 20, 2801-2827
2.532Citations (PDF)
161Improving differential evolution with a new selection method of parents for mutation2.615Citations (PDF)
162Distributed steganalysis of compressed speech
Soft Computing, 2015, 21, 795-804
2.510Citations (PDF)
163Structured partial least squares for simultaneous object tracking and segmentation
Neurocomputing, 2014, 133, 317-327
5.915Citations (PDF)
164A Generalized Visual Aid System for Teleoperation Applied to Satellite Servicing1.73Citations (PDF)
165Adaptive direction information in differential evolution for numerical optimization
Soft Computing, 2014, 20, 465-494
2.526Citations (PDF)
166Exploiting Statistical Mobility Models for Efficient Wi-Fi Deployment5.850Citations (PDF)
167Efficient Rendezvous Algorithms for Mobility-Enabled Wireless Sensor Networks6.993Citations (PDF)
168Hash-area-based data dissemination protocol in wireless sensor networks
Central South University, 2008, 15, 392-398
0.63Citations (PDF)
169Rendezvous Planning in Wireless Sensor Networks with Mobile Elements6.9167Citations (PDF)
170Adaptive location updates for mobile sinks in wireless sensor networks
Journal of Supercomputing, 2008, 47, 127-145
2.387Citations (PDF)
171Latency Reduction in Immersive Systems through Request Scheduling with Digital Twin Networks in Collaborative Edge Computing3.112Citations (PDF)