Pervasive and Mobile Computing

Papers
(The H4-Index of Pervasive and Mobile Computing is 21. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-06-01 to 2025-06-01.)
ArticleCitations
AR Peephole Interface: Extending the workspace of a mobile device using real-space information73
Collective victim counting in post-disaster response: A distributed, power-efficient algorithm via BLE spontaneous networks66
Special Issue on IoT for Fighting COVID-1954
Editorial Board53
Context-aware privacy-preserving access control for mobile computing51
Bio-inspired recruiting strategies for on-demand connectivity over multi-layer hybrid CubeSat-UAV networks in emergency scenarios40
IoT data encryption and phrase search-based efficient processing using a Fully Homomorphic-based SE (FHSE) scheme35
What makes people install a COVID-19 contact-tracing app? Understanding the influence of app design and individual difference on contact-tracing app adoption intention30
Deep learning based speed bumps detection and characterization using smartphone sensors29
Distributed fault detection in sparse wireless sensor networks utilizing simultaneous likelihood ratio statistics28
HED-FL: A hierarchical, energy efficient, and dynamic approach for edge Federated Learning28
A lightweight authentication protocol for D2D-enabled IoT systems with privacy27
RSS based multistage statistical method for attack detection and localization in IoT networks26
A comprehensive investigation on range-free localization algorithms with mobile anchors at different altitudes26
Special Issue on IEEE WoWMoM 202124
Spectrum cartography techniques, challenges, opportunities, and applications: A survey23
FastPlan: A three-step framework for accelerating drone-centric search operations in post-disaster relief23
A novel self-healing model using precoding & big-data based approach for 5G networks23
Hybrid and Adaptive Cryptographic-based secure authentication approach in IoT based applications using hybrid encryption23
Secure D2D caching framework inspired on trust management and blockchain for Mobile Edge Caching23
Wireless power transfer with unmanned aerial vehicles: State of the art and open challenges21
ADAM-sense: Anxiety-displaying activities recognition by motion sensors21
CIU-L: A class-incremental learning and machine unlearning passive sensing system for human identification21
A single smartwatch-based segmentation approach in human activity recognition21
A context-aware sensing strategy with deep reinforcement learning for smart healthcare21
0.0725998878479