| 1 | Two-Stage Deep Energy Optimization in IRS-Assisted UAV-Based Edge Computing Systems | 6.9 | 10 | Citations (PDF) |
| 2 | Authorized Keyword Search on Mobile Devices in Secure Data Outsourcing | 6.9 | 15 | Citations (PDF) |
| 3 | Spatiotemporal-Aware Privacy-Preserving Task Matching in Mobile Crowdsensing | 7.0 | 26 | Citations (PDF) |
| 4 | MARS: Enabling Verifiable Range-Aggregate Queries in Multi-Source Environments | 5.0 | 24 | Citations (PDF) |
| 5 | Privacy-Enhanced Cooperative Storage Scheme for Contact-Free Sensory Data in AIoT with Efficient Synchronization | 3.1 | 4 | Citations (PDF) |
| 6 | Critical Density for <i>K</i>-Coverage Under Border Effects in Camera Sensor Networks With Irregular Obstacles Existence | 7.0 | 31 | Citations (PDF) |
| 7 | veffChain: Enabling Freshness Authentication of Rich Queries Over Blockchain Databases | 6.9 | 7 | Citations (PDF) |
| 8 | An Online Multi-Item Auction With Differential Privacy in Edge-Assisted Blockchains | 7.0 | 3 | Citations (PDF) |
| 9 | SD-SRF: An Intelligent Service Deployment Scheme for Serverless-operated Cloud-Edge Computing in 6G Networks | 5.9 | 21 | Citations (PDF) |
| 10 | Protecting Inference Privacy With Accuracy Improvement in Mobile-Cloud Deep Learning | 6.9 | 16 | Citations (PDF) |
| 11 | BTV-CMAB: A Bi-Directional Trust Verification-Based Combinatorial Multiarmed Bandit Scheme for Mobile Crowdsourcing | 7.0 | 26 | Citations (PDF) |
| 12 | Privacy-preserving multiobjective task assignment scheme with differential obfuscation in mobile crowdsensing | 7.1 | 20 | Citations (PDF) |
| 13 | MPV: Enabling Fine-Grained Query Authentication in Hybrid-Storage Blockchain | 6.9 | 9 | Citations (PDF) |
| 14 | Adversarial Bandits With Multi-User Delayed Feedback: Theory and Application | 6.9 | 1 | Citations (PDF) |
| 15 | A trust active and Trace back based trust Management system about effective data collection for mobile IoT services | 6.5 | 7 | Citations (PDF) |
| 16 | Medical long-tailed learning for imbalanced data: Bibliometric analysis | 4.7 | 26 | Citations (PDF) |
| 17 | Edge-Intelligence-Based Computation Offloading Technology for Distributed Internet of Unmanned Aerial Vehicles | 7.0 | 9 | Citations (PDF) |
| 18 | Heterogeneous Device Collaboration Based Federated Learning for Big Data Applications | 4.0 | 3 | Citations (PDF) |
| 19 | Cost-Effective Dynamic Alliance Pricing Mechanism Based on Distributed Edge Intelligence | 7.0 | 2 | Citations (PDF) |
| 20 | TANTO: An Effective Trust-Based Unmanned Aerial Vehicle Computing System for the Internet of Things | 7.0 | 37 | Citations (PDF) |
| 21 | Towards Robust Task Assignment in Mobile Crowdsensing Systems | 6.9 | 31 | Citations (PDF) |
| 22 | Differential privacy protection method for trip‐oriented shared data | 1.5 | 1 | Citations (PDF) |
| 23 | SlimBox: Lightweight Packet Inspection over Encrypted Traffic | 5.0 | 13 | Citations (PDF) |
| 24 | Edge Computing and Sensor-Cloud: Overview, Solutions, and Directions | 20.1 | 168 | Citations (PDF) |
| 25 | EIDLS: An Edge-Intelligence-Based Distributed Learning System Over Internet of Things | 7.3 | 21 | Citations (PDF) |
| 26 | Grouping Reduces Energy Cost in Directionally Rechargeable Wireless Vehicular and Sensor Networks | 5.8 | 24 | Citations (PDF) |
| 27 | DLFTI: A deep learning based fast truth inference mechanism for distributed spatiotemporal data in mobile crowd sensing | 6.5 | 33 | Citations (PDF) |
| 28 | Credit and quality intelligent learning based multi-armed bandit scheme for unknown worker selection in multimedia MCS | 6.5 | 35 | Citations (PDF) |
| 29 | TSPR: A Trusted Service Prerequest System for Efficient Data Processing in C-ITS | 7.3 | 8 | Citations (PDF) |
| 30 | A Comprehensive Trustworthy Data Collection Approach in Sensor-Cloud Systems | 4.0 | 34 | Citations (PDF) |
| 31 | An Effective Edge-Intelligent Service Placement Technology for 5G-and-Beyond Industrial IoT | 9.5 | 38 | Citations (PDF) |
| 32 | AntiConcealer: Reliable Detection of Adversary Concealed Behaviors in EdgeAI-Assisted IoT | 7.0 | 42 | Citations (PDF) |
| 33 | Edge-Learning-Based Hierarchical Prefetching for Collaborative Information Streaming in Social IoT Systems | 4.8 | 8 | Citations (PDF) |
| 34 | A Natural Scene Recognition Learning Based on Label Correlation | 5.4 | 11 | Citations (PDF) |
| 35 | A Privacy-Enhanced Retrieval Technology for the Cloud-Assisted Internet of Things | 9.5 | 66 | Citations (PDF) |
| 36 | A privacy-protected intelligent crowdsourcing application of IoT based on the reinforcement learning | 5.9 | 66 | Citations (PDF) |
| 37 | Edge-Based Communication Optimization for Distributed Federated Learning | 6.3 | 90 | Citations (PDF) |
| 38 | An Intelligent Game-Based Offloading Scheme for Maximizing Benefits of IoT-Edge-Cloud Ecosystems | 7.0 | 67 | Citations (PDF) |
| 39 | LIAA: A listen interval adaptive adjustment scheme for green communication in event-sparse IoT systems | 6.5 | 18 | Citations (PDF) |
| 40 | Missing Value Filling Based on the Collaboration of Cloud and Edge in Artificial Intelligence of Things | 9.5 | 19 | Citations (PDF) |
| 41 | Throughput Maximization of UAV Networks | 2.9 | 52 | Citations (PDF) |
| 42 | Attention-based Local Mean <mml:math xmlns:mml="http://www.w3.org/1998/Math/MathML" display="inline" id="d1e1490" altimg="si25.svg"><mml:mi>K</mml:mi></mml:math>-Nearest Centroid Neighbor Classifier | 7.5 | 15 | Citations (PDF) |
| 43 | Trust-Based Multi-Agent Imitation Learning for Green Edge Computing in Smart Cities | 5.4 | 25 | Citations (PDF) |
| 44 | MIDP: An MDP-based intelligent big data processing scheme for vehicular edge computing | 3.4 | 10 | Citations (PDF) |
| 45 | Combinatorial resources auction in decentralized edge-thing systems using blockchain and differential privacy | 6.5 | 33 | Citations (PDF) |
| 46 | Frequency Feature Pyramid Network With Global-Local Consistency Loss for Crowd-and-Vehicle Counting in Congested Scenes | 7.9 | 23 | Citations (PDF) |
| 47 | Diversified and Scalable Service Recommendation With Accuracy Guarantee | 4.8 | 39 | Citations (PDF) |
| 48 | BD-VTE: A Novel Baseline Data Based Verifiable Trust Evaluation Scheme for Smart Network Systems | 6.3 | 130 | Citations (PDF) |
| 49 | Mobility Based Trust Evaluation for Heterogeneous Electric Vehicles Network in Smart Cities | 7.9 | 99 | Citations (PDF) |
| 50 | Detection of hidden data attacks combined fog computing and trust evaluation method in sensor‐cloud system | 1.5 | 65 | Citations (PDF) |
| 51 | Solving Coupling Security Problem for Sustainable Sensor-Cloud Systems Based on Fog Computing | 3.1 | 14 | Citations (PDF) |
| 52 | A trustworthiness-based vehicular recruitment scheme for information collections in Distributed Networked Systems | 6.5 | 62 | Citations (PDF) |
| 53 | Privacy-Aware Data Fusion and Prediction With Spatial-Temporal Context for Smart City Industrial Environment | 9.5 | 227 | Citations (PDF) |
| 54 | Edge-based auditing method for data security in resource-constrained Internet of Things | 3.5 | 67 | Citations (PDF) |
| 55 | An Intelligent Collaboration Trust Interconnections System for Mobile Information Control in Ubiquitous 5G Networks | 6.3 | 91 | Citations (PDF) |
| 56 | An Intelligent Video Analysis Method for Abnormal Event Detection in Intelligent Transportation Systems | 7.9 | 139 | Citations (PDF) |
| 57 | Quick Convex Hull-Based Rendezvous Planning for Delay-Harsh Mobile Data Gathering in Disjoint Sensor Networks | 7.3 | 46 | Citations (PDF) |
| 58 | An Effective Early Message Ahead Join Adaptive Data Aggregation Scheme for Sustainable IoT | 6.3 | 34 | Citations (PDF) |
| 59 | A Class of Differential Data Processing-Based Data Gathering Schemes in Internet of Things | 6.3 | 8 | Citations (PDF) |
| 60 | Parameter analysis and optimization of polling-based medium access control protocol for multi-sensor communication | 2.1 | 4 | Citations (PDF) |
| 61 | Secure Multi-keyword Fuzzy Searches With Enhanced Service Quality in Cloud Computing | 4.2 | 64 | Citations (PDF) |
| 62 | Deep reinforcement learning for computation offloading in mobile edge computing environment | 3.8 | 81 | Citations (PDF) |
| 63 | EIHDP: Edge-Intelligent Hierarchical Dynamic Pricing Based on Cloud-Edge-Client Collaboration for IoT Systems | 2.6 | 140 | Citations (PDF) |
| 64 | A verifiable trust evaluation mechanism for ultra-reliable applications in 5G and beyond networks | 4.6 | 26 | Citations (PDF) |
| 65 | STMTO: A smart and trust multi-UAV task offloading system | 6.5 | 59 | Citations (PDF) |
| 66 | Mobile edge-enabled trust evaluation for the Internet of Things | 16.2 | 54 | Citations (PDF) |
| 67 | Event Detection Through Differential Pattern Mining in Cyber-Physical Systems | 4.0 | 13 | Citations (PDF) |
| 68 | Latency-Aware Path Planning for Disconnected Sensor Networks With Mobile Sinks | 9.5 | 56 | Citations (PDF) |
| 69 | Energy-Efficient and Trustworthy Data Collection Protocol Based on Mobile Fog Computing in Internet of Things | 9.5 | 98 | Citations (PDF) |
| 70 | A novel trust mechanism based on Fog Computing in Sensor–Cloud System | 5.9 | 112 | Citations (PDF) |
| 71 | An incentive-based protection and recovery strategy for secure big data in social networks | 6.5 | 69 | Citations (PDF) |
| 72 | MTES: An Intelligent Trust Evaluation Scheme in Sensor-Cloud-Enabled Industrial Internet of Things | 9.5 | 167 | Citations (PDF) |
| 73 | Big Data Cleaning Based on Mobile Edge Computing in Industrial Sensor-Cloud | 9.5 | 183 | Citations (PDF) |
| 74 | TrustData: Trustworthy and Secured Data Collection for Event Detection in Industrial Cyber-Physical System | 9.5 | 66 | Citations (PDF) |
| 75 | Bidirectional Prediction-Based Underwater Data Collection Protocol for End-Edge-Cloud Orchestrated System | 9.5 | 96 | Citations (PDF) |
| 76 | DUAPM: An Effective Dynamic Micro-Blogging User Activity Prediction Model Towards Cyber-Physical-Social Systems | 9.5 | 12 | Citations (PDF) |
| 77 | Relay Selection Joint Consecutive Packet Routing Scheme to Improve Performance for Wake-Up Radio-Enabled WSNs | 0.9 | 43 | Citations (PDF) |
| 78 | Preserving Balance Between Privacy and Data Integrity in Edge-Assisted Internet of Things | 7.0 | 110 | Citations (PDF) |
| 79 | Privacy-Enhanced Data Collection Based on Deep Learning for Internet of Vehicles | 9.5 | 103 | Citations (PDF) |
| 80 | A Cloud–MEC Collaborative Task Offloading Scheme With Service Orchestration | 7.0 | 139 | Citations (PDF) |
| 81 | A Unified Trustworthy Environment Establishment Based on Edge Computing in Industrial IoT | 9.5 | 82 | Citations (PDF) |
| 82 | A Top-K Query Scheme With Privacy Preservation for Intelligent Vehicle Network in Mobile IoT | 3.1 | 5 | Citations (PDF) |
| 83 | Joint mobile vehicle–UAV scheme for secure data collection in a smart city | 1.6 | 26 | Citations (PDF) |
| 84 | Quick and Accurate False Data Detection in Mobile Crowd Sensing | 2.9 | 26 | Citations (PDF) |
| 85 | A trust-based minimum cost and quality aware data collection scheme in P2P network | 2.1 | 59 | Citations (PDF) |
| 86 | An online and real-time adaptive operational modal parameter identification method based on fog computing in Internet of Things | 2.1 | 8 | Citations (PDF) |
| 87 | CSR-IM: Compressed Sensing Routing-Control- Method With Intelligent Migration-Mechanism Based on Sensing Cloud-Computing | 3.1 | 7 | Citations (PDF) |
| 88 | Intelligent resource allocation management for vehicles network: An A3C learning approach | 3.8 | 111 | Citations (PDF) |
| 89 | Edge-Computing-Based Trustworthy Data Collection Model in the Internet of Things | 7.0 | 115 | Citations (PDF) |
| 90 | Vehicles joint UAVs to acquire and analyze data for topology discovery in large-scale IoT systems | 2.1 | 33 | Citations (PDF) |
| 91 | An AUV-Assisted Data Gathering Scheme Based on Clustering and Matrix Completion for Smart Ocean | 7.0 | 134 | Citations (PDF) |
| 92 | Edge Computing in Internet of Things: A Novel Sensing-Data Reconstruction Algorithm Under Intelligent-Migratoin Stragegy | 3.1 | 12 | Citations (PDF) |
| 93 | An Intelligent Dynamic Offloading From Cloud to Edge for Smart IoT Systems With Big Data | 6.3 | 65 | Citations (PDF) |
| 94 | Energy-aware MAC protocol for data differentiated services in sensor-cloud computing | 3.5 | 22 | Citations (PDF) |
| 95 | A Low-Latency Communication Scheme for Mobile Wireless Sensor Control Systems | 7.3 | 84 | Citations (PDF) |
| 96 | Pipeline slot based fast rerouting scheme for delay optimization in duty cycle based M2M communications | 2.1 | 48 | Citations (PDF) |
| 97 | Data Collection in Underwater Sensor Networks based on Mobile Edge Computing | 3.1 | 85 | Citations (PDF) |
| 98 | UAVs joint vehicles as data mules for fast codes dissemination for edge networking in Smart City | 2.1 | 65 | Citations (PDF) |
| 99 | A Distributed Intelligent Hungarian Algorithm for Workload Balance in Sensor-Cloud Systems Based on Urban Fog Computing | 3.1 | 21 | Citations (PDF) |
| 100 | Crowdsourcing Mechanism for Trust Evaluation in CPCS Based on Intelligent Mobile Edge Computing | 4.0 | 180 | Citations (PDF) |
| 101 | An Energy-Efficient Cross-Layer-Sensing Clustering Method Based on Intelligent Fog Computing in WSNs | 3.1 | 39 | Citations (PDF) |
| 102 | SLS-STQ: A Novel Scheme for Securing Spatial–Temporal Top-$k$ Queries in TWSNs-Based Edge Computing Systems | 7.0 | 7 | Citations (PDF) |
| 103 | Utility Maximization of Temporally Correlated Sensing Data in Energy Harvesting Sensor Networks | 7.0 | 9 | Citations (PDF) |
| 104 | An Optimized Clustering Communication Protocol Based on Intelligent Computing in Information-Centric Internet of Things | 3.1 | 33 | Citations (PDF) |
| 105 | Content Propagation for Content-Centric Networking Systems From Location-Based Social Networks | 7.3 | 43 | Citations (PDF) |
| 106 | Coupling resource management based on fog computing in smart city systems | 7.1 | 108 | Citations (PDF) |
| 107 | Load-Balanced Data Dissemination for Wireless Sensor Networks: A Nature-Inspired Approach | 7.0 | 63 | Citations (PDF) |
| 108 | When Sensor-Cloud Meets Mobile Edge Computing | 3.1 | 28 | Citations (PDF) |
| 109 | A Secure IoT Service Architecture With an Efficient Balance Dynamics Based on Cloud and Edge Computing | 7.0 | 218 | Citations (PDF) |
| 110 | A Survey on the Progress of Testing Techniques and Methods for Wireless Sensor Networks | 3.1 | 12 | Citations (PDF) |
| 111 | Fog-Based Computing and Storage Offloading for Data Synchronization in IoT | 7.0 | 147 | Citations (PDF) |
| 112 | Efficient data request answering in vehicular Ad-hoc networks based on fog nodes and filters | 5.9 | 13 | Citations (PDF) |
| 113 | Sustainable and Efficient Data Collection from WSNs to Cloud | 3.1 | 50 | Citations (PDF) |
| 114 | A Three-Layer Privacy Preserving Cloud Storage Scheme Based on Computational Intelligence in Fog Computing | 5.4 | 101 | Citations (PDF) |
| 115 | Energy-efficient relay tracking with multiple mobile camera sensors | 3.8 | 18 | Citations (PDF) |
| 116 | High-accuracy localization for indoor group users based on extended Kalman filter | 2.1 | 9 | Citations (PDF) |
| 117 | Optimising order selection algorithm based on online taxi-hailing applications | 0.1 | 2 | Citations (PDF) |
| 118 | A Secure Resource Optimization Strategy Based on Utility Dominant in Vehicular Networks | 3.1 | 0 | Citations (PDF) |
| 119 | Using Mobile Nodes to Control Rumors in Big Data Based on a New Rumor Propagation Model in Vehicular Social Networks | 3.1 | 16 | Citations (PDF) |
| 120 | Fog-Based Two-Phase Event Monitoring and Data Gathering in Vehicular Sensor Networks | 3.1 | 29 | Citations (PDF) |
| 121 | Adaptive Transmission Range Based Topology Control Scheme for Fast and Reliable Data Collection | 0.9 | 18 | Citations (PDF) |
| 122 | Adaptive Transmission Power Control for Reliable Data Forwarding in Sensor Based Networks | 0.9 | 25 | Citations (PDF) |
| 123 | An Aggregate Signature Based Trust Routing for Data Gathering in Sensor Networks | 0.9 | 58 | Citations (PDF) |
| 124 | Quality Utilization Aware Based Data Gathering for Vehicular Communication Networks | 0.9 | 13 | Citations (PDF) |
| 125 | A Time and Location Correlation Incentive Scheme for Deep Data Gathering in Crowdsourcing Networks | 0.9 | 34 | Citations (PDF) |
| 126 | Green Data Gathering under Delay Differentiated Services Constraint for Internet of Things | 0.9 | 55 | Citations (PDF) |
| 127 | Delay-Constrained Utility Maximization for Video Ads Push in Mobile Opportunistic D2D Networks | 7.0 | 25 | Citations (PDF) |
| 128 | Multi working sets alternate covering scheme for continuous partial coverage in WSNs | 2.1 | 45 | Citations (PDF) |
| 129 | Dependable Structural Health Monitoring Using Wireless Sensor Networks | 5.0 | 193 | Citations (PDF) |
| 130 | Quality-Guaranteed Event-Sensitive Data Collection and Monitoring in Vibration Sensor Networks | 9.5 | 40 | Citations (PDF) |
| 131 | Trajectory Privacy Preservation Based on a Fog Structure for Cloud Location Services | 3.1 | 93 | Citations (PDF) |
| 132 | e-Sampling | 1.6 | 79 | Citations (PDF) |
| 133 | Neighborhood-adaptive differential evolution for global numerical optimization | 6.2 | 34 | Citations (PDF) |
| 134 | Interoperable localization for mobile group users | 3.8 | 3 | Citations (PDF) |
| 135 | Steganalysis of adaptive multi-rate speech using statistical characteristics of pulse pairs | 3.3 | 34 | Citations (PDF) |
| 136 | Fog-Based Evaluation Approach for Trustworthy Communication in Sensor-Cloud System | 3.5 | 20 | Citations (PDF) |
| 137 | Cascading Target Tracking Control in Wireless Camera Sensor and Actuator Networks | 2.4 | 5 | Citations (PDF) |
| 138 | Improving charging capacity for wireless sensor networks by deploying one mobile vehicle with multiple removable chargers | 4.6 | 26 | Citations (PDF) |
| 139 | Reliable wireless connections for fast-moving rail users based on a chained fog structure | 6.5 | 16 | Citations (PDF) |
| 140 | Integrated collaborative filtering recommendation in social cyber-physical systems | 2.1 | 32 | Citations (PDF) |
| 141 | Propagation Modeling and Defending of a Mobile Sensor Worm in Wireless Sensor and Actuator Networks | 3.1 | 55 | Citations (PDF) |
| 142 | Intelligent Aggregation Based on Content Routing Scheme for Cloud Computing | 2.0 | 16 | Citations (PDF) |
| 143 | Detecting Steganography of Adaptive Multirate Speech with Unknown Embedding Rate | 0.8 | 5 | Citations (PDF) |
| 144 | Uncorrelated multi-source random dynamic load identification based on minimization maximum relative errors and genetic algorithm | 0.5 | 3 | Citations (PDF) |
| 145 | Operational modal analysis for linear time-varying continuous dynamic structure based on LMPCA | 0.5 | 3 | Citations (PDF) |
| 146 | Convolutional Deep Belief Networks for Single-Cell/Object Tracking in Computational Biology and Computer Vision | 2.5 | 3 | Citations (PDF) |
| 147 | Robust Individual-Cell/Object Tracking via PCANet Deep Network in Biomedicine and Computer Vision | 2.5 | 4 | Citations (PDF) |
| 148 | A Novel Connection Correlation Scheme Based on Threshold Secret Sharing | 3.5 | 4 | Citations (PDF) |
| 149 | Following Targets for Mobile Tracking in Wireless Sensor Networks | 3.1 | 51 | Citations (PDF) |
| 150 | Higher order partial least squares for object tracking: A 4D-tracking method | 5.9 | 0 | Citations (PDF) |
| 151 | Steganalysis of analysis‐by‐synthesis speech exploiting pulse‐position distribution characteristics | 0.9 | 10 | Citations (PDF) |
| 152 | Neighborhood guided differential evolution | 2.5 | 25 | Citations (PDF) |
| 153 | Enabling public auditability for operation behaviors in cloud storage | 2.5 | 19 | Citations (PDF) |
| 154 | Extracting Target Detection Knowledge Based on Spatiotemporal Information in Wireless Sensor Networks | 2.1 | 16 | Citations (PDF) |
| 155 | Adaptive Data Gathering in Mobile Sensor Networks Using Speedy Mobile Elements | 3.1 | 21 | Citations (PDF) |
| 156 | Optimal matrix embedding for Voice-over-IP steganography | 3.3 | 23 | Citations (PDF) |
| 157 | Improved adaptive partial-matching steganography for Voice over IP | 3.8 | 13 | Citations (PDF) |
| 158 | Maximizing real-time streaming services based on a multi-servers networking framework | 3.8 | 14 | Citations (PDF) |
| 159 | Online learning 3D context for robust visual tracking | 5.9 | 10 | Citations (PDF) |
| 160 | Cellular direction information based differential evolution for numerical optimization: an empirical study | 2.5 | 32 | Citations (PDF) |
| 161 | Improving differential evolution with a new selection method of parents for mutation | 2.6 | 15 | Citations (PDF) |
| 162 | Distributed steganalysis of compressed speech | 2.5 | 10 | Citations (PDF) |
| 163 | Structured partial least squares for simultaneous object tracking and segmentation | 5.9 | 15 | Citations (PDF) |
| 164 | A Generalized Visual Aid System for Teleoperation Applied to Satellite Servicing | 1.7 | 3 | Citations (PDF) |
| 165 | Adaptive direction information in differential evolution for numerical optimization | 2.5 | 26 | Citations (PDF) |
| 166 | Exploiting Statistical Mobility Models for Efficient Wi-Fi Deployment | 5.8 | 50 | Citations (PDF) |
| 167 | Efficient Rendezvous Algorithms for Mobility-Enabled Wireless Sensor Networks | 6.9 | 93 | Citations (PDF) |
| 168 | Hash-area-based data dissemination protocol in wireless sensor networks | 0.6 | 3 | Citations (PDF) |
| 169 | Rendezvous Planning in Wireless Sensor Networks with Mobile Elements | 6.9 | 167 | Citations (PDF) |
| 170 | Adaptive location updates for mobile sinks in wireless sensor networks | 2.3 | 87 | Citations (PDF) |
| 171 | Latency Reduction in Immersive Systems through Request Scheduling with Digital Twin Networks in Collaborative Edge Computing | 3.1 | 12 | Citations (PDF) |