Pervasive and Mobile Computing

Papers
(The median citation count of Pervasive and Mobile Computing is 3. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-09-01 to 2025-09-01.)
ArticleCitations
AR Peephole Interface: Extending the workspace of a mobile device using real-space information75
Collective victim counting in post-disaster response: A distributed, power-efficient algorithm via BLE spontaneous networks58
Special Issue on IoT for Fighting COVID-1955
Editorial Board36
IoT data encryption and phrase search-based efficient processing using a Fully Homomorphic-based SE (FHSE) scheme34
Bio-inspired recruiting strategies for on-demand connectivity over multi-layer hybrid CubeSat-UAV networks in emergency scenarios33
Context-aware privacy-preserving access control for mobile computing30
Distributed fault detection in sparse wireless sensor networks utilizing simultaneous likelihood ratio statistics30
Deep learning based speed bumps detection and characterization using smartphone sensors29
HED-FL: A hierarchical, energy efficient, and dynamic approach for edge Federated Learning28
RSS based multistage statistical method for attack detection and localization in IoT networks26
Enhanced hybrid prototype for few-shot class-incremental gait recognition in multi-activity scenarios using wearable sensors25
Spectrum cartography techniques, challenges, opportunities, and applications: A survey25
Hybrid and Adaptive Cryptographic-based secure authentication approach in IoT based applications using hybrid encryption25
Special Issue on IEEE WoWMoM 202125
FastPlan: A three-step framework for accelerating drone-centric search operations in post-disaster relief24
Secure D2D caching framework inspired on trust management and blockchain for Mobile Edge Caching24
A context-aware sensing strategy with deep reinforcement learning for smart healthcare23
ADAM-sense: Anxiety-displaying activities recognition by motion sensors23
A single smartwatch-based segmentation approach in human activity recognition22
Wireless power transfer with unmanned aerial vehicles: State of the art and open challenges21
Passive Monitoring of Dangerous Driving Behaviors Using mmWave Radar20
CIU-L: A class-incremental learning and machine unlearning passive sensing system for human identification20
LTE-LAA cell selection through operator data learning and numerosity reduction19
Q-Learning Driven Routing for Aeronautical Ad-Hoc Networks19
An intelligent charging scheme maximizing the utility for rechargeable network in smart city19
Editorial Board19
TrustMD — A multi-layer framework for domain, edge and D2D caching based on trust dissemination and blockchain18
Continuous authentication through gait analysis on a wrist-worn device18
Probabilistic knowledge infusion through symbolic features for context-aware activity recognition17
Sustainable fixed wireless access with blockchain secured software defined network17
Online policies for throughput maximization of backscatter assisted wireless powered communication via reinforcement learning approaches17
Editorial Board16
Editorial Board16
Consent-driven Data Reuse in Multi-tasking Crowdsensing Systems: A Privacy-by-Design Solution15
Blockchain-Inspired Trust Management in Cognitive Radio Networks with Cooperative Spectrum Sensing15
MotionID: Towards practical behavioral biometrics-based implicit user authentication on smartphones15
Editorial Board15
Evaluation and comparison of federated learning algorithms for Human Activity Recognition on smartphones14
Enhancing crowdsourcing through skill and willingness-aligned task assignment with workforce composition balance14
Content-centric data and computation offloading in AI-supported fog networks for next generation IoT14
GTDIM: Grid-based Two-stage Dynamic Incentive Mechanism for Mobile Crowd Sensing13
Editorial Board13
Editorial Board13
Design, code generation and simulation of IoT environments with mobility devices by using model-driven development: SimulateIoT-Mobile13
IEEE International Conference on Pervasive Computing and Communications (PerCom) 202013
Enhancing 5G network slicing for IoT traffic with a novel clustering framework13
LiteFlex-YOLO:A lightweight small target detection network for maritime unmanned aerial vehicles13
Editorial Board13
Blockchain-based access control architecture for multi-domain environments13
ContrasGAN: Unsupervised domain adaptation in Human Activity Recognition via adversarial and contrastive learning12
Green Bear - A LoRaWAN-based Human-in-the-Loop case-study for sustainable cities12
Predicting clinically relevant changes in bipolar disorder outside the clinic walls based on pervasive technology interactions via smartphone typing dynamics12
Balancing local vs. remote state allocation for micro-services in the cloud–edge continuum12
F-BIDS: Federated-Blending based Intrusion Detection System12
PPSS: A privacy-preserving secure framework using blockchain-enabled federated deep learning for Industrial IoTs11
BmmW: A DNN-based joint BLE and mmWave radar system for accurate 3D localization with goal-oriented communication11
SMARTCOPE: Smartphone Change Of Possession Evaluation for continuous authentication11
Secure and efficient blockchain-based consensus scheme for MWSNs with clustered architecture11
DA-HAR: Dual adversarial network for environment-independent WiFi human activity recognition11
A Transfer Learning and Explainable Solution to Detect mpox from Smartphones images11
Would you mind hiding my malware? Building malicious Android apps with StegoPack10
Mining Wi-Fi Channel State Information for breathing and heart rate classification10
Online continual learning for human activity recognition10
TR-ReFloc: A TR-based Framework for Recovering Missed RSS for WiFi indoor positioning in the offline and online phase10
BLUFADER: Blurred face detection & recognition for privacy-friendly continuous authentication10
Resilient UAVs location sharing service based on information freshness and opportunistic deliveries10
Digital twin oriented architecture for secure and QoS aware intelligent communications in industrial environments10
Qos-aware mobile service optimization in multi-access mobile edge computing environments10
Editorial9
Climate smart computing: A perspective9
Prioritization-based delay sensitive task offloading in SDN-integrated mobile IoT network9
Guest editorial for the PMC special section on selected papers from ICDCN 20209
Editorial Board9
A neighbor discovery protocol with adaptive collision alleviation for wireless robotic networks9
Efficient semidefinite solutions for TDOA-based source localization under unknown PS8
Editorial Board8
Three-phased clustered topology formation for Aeronautical Ad-Hoc Networks8
PSO based Amorphous algorithm to reduce localization error in Wireless Sensor Network8
CitySpec with shield: A secure intelligent assistant for requirement formalization8
Editorial Board8
Exploring the effects of below-freezing temperatures on smartphone usage8
Role of IoT technologies in big data management systems: A review and Smart Grid case study8
Feasibility and reliability of peercloud in vehicular networks: A comprehensive study8
MGA-Net+: Acceleration-based packaging work recognition using motif-guided attention networks8
Aggregate processes as distributed adaptive services for the Industrial Internet of Things7
OcAPO: Fine-grained occupancy-aware, empirically-driven PDC control in open-plan, shared workspaces7
Fog-ROCL: A Fog based RSU Optimum Configuration and Localization in VANETs7
Traffic count estimation using crowd-sourced trajectory data in the absence of dedicated infrastructure7
Machinery detection by impulsive noise recognition using WiFi sensing7
GANCSA: A novel approach for finding the best path for migration of mobile-agents7
MRILoc: Multiresolution Indoor Localization from crowdsourced samples7
Digital Avatars: A programming framework for personalized human interactions through virtual profiles7
A toolkit for localisation queries7
Detecting structural anomalies of quadcopter UAVs based on LSTM autoencoder7
An artificial pancreas system in android phones: A dual app architecture7
Editorial Board7
A customizable benchmarking tool for evaluating personalized thermal comfort provisioning in smart spaces using Digital Twins7
Special issue on Edge Computing in Pervasive Systems6
Energy-aware human activity recognition for wearable devices: A comprehensive review6
Editorial Board6
LwTool: A data processing toolkit for building a real-time pressure mapping smart textile software system6
Editorial Board6
Editorial Board6
Differentiating presence in virtual reality using physiological signals6
Trust-aware and improved density peaks clustering algorithm for fast and secure models in wireless sensor networks6
Analysis of micro- vs. macro-flows management in QKD-secured edge computing6
Editorial Board6
Reinforcement learning for autonomous vehicle movements in wireless multimedia applications6
On the Scheduling of Conflictual Deliveries in a last-mile delivery scenario with truck-carried drones6
LICAPA: Lightweight collective attestation for physical attacks detection in highly dynamic networks6
Min–max movement of barrier coverage with sink-based mobile sensors for crowdsensing6
A comprehensive systematic review on mobile applications to support dementia patients6
Energy–Aware security protocol for IoT devices5
A puf-based three-party authentication key establishment scheme for fog-enabled smart home5
Tracking people across ultra populated indoor spaces by matching unreliable Wi-Fi signals with disconnected video feeds5
A survey of wearable devices to capture human factors for human-robot collaboration5
Unveiling user dynamics in the evolving social debate on climate crisis during the conferences of the parties5
Digital twin-enabled age of information-aware scheduling for Industrial IoT edge networks5
Long-term traffic flow prediction using multivariate SSA forecasting in SDN based networks5
Using mobile devices as scientific measurement instruments: Reliable android task scheduling5
MousePath: Lightweight phone-to-web information sharing via mouse interface5
A novel middleware for adaptive and efficient split computing for real-time object detection5
Behavioural patterns discovery for lifestyle analysis from egocentric photo-streams5
Security protocol for securing notifications about dangerous events in the agglomeration5
On data minimization and anonymity in pervasive mobile-to-mobile recommender systems5
Editorial Board5
Editorial Board5
EPCM: Efficient privacy-preserving charging matching scheme with data integrity for electric vehicles5
Lightweight accurate trigger to reduce power consumption in sensor-based continuous human activity recognition5
An efficient estimator for source localization in WSNs using RSSD and TDOA measurements5
Towards efficient device-to-device multicast content delivery with social awareness5
A framework for offloading and migration of serverless functions in the Edge–Cloud Continuum5
FaaS execution models for edge applications5
Continual learning in sensor-based human activity recognition with dynamic mixture of experts5
Editorial Board5
FogLBS: Utilizing fog computing for providing mobile Location-Based Services to mobile customers4
Sensor-based agitation prediction in institutionalized people with dementia A systematic review4
Navigating transient content: PFC caching approach for NDN-based IoT networks4
A novel IoT trust model leveraging fully distributed behavioral fingerprinting and secure delegation4
Reinforcement learning-based load balancing for heavy traffic Internet of Things4
Towards a better indoor positioning system: A location estimation process using artificial neural networks based on a semi-interpolated database4
Studying users’ perception of IoT mobile companion apps4
VCFL: A verifiable and collusion attack resistant privacy preserving framework for cross-silo federated learning4
CrowdLBM: A lightweight blockchain-based model for mobile crowdsensing in the Internet of Things4
Dense Indoor Sensor Networks: Towards passively sensing human presence with LoRaWAN4
Context-driven encrypted multimedia traffic classification on mobile devices4
Contrastive-representation IMU-based fitness activity recognition enhanced by bio-impedance sensing4
Editorial Board4
WiCAR: A class-incremental system for WiFi activity recognition4
Hybrid metaheuristic algorithm for optimal cluster head selection in wireless sensor network4
SEEK+: Securing vehicle GPS via a sequential dashcam-based vehicle localization framework4
Privacy invasion via smart-home hub in personal area networks4
Detecting Byzantine attacks in Cognitive Radio Networks : A two-layered approach using Hidden Markov Model and machine learning4
SmAuto: A domain-specific-language for application development in smart environments4
Editorial Board3
Dynamic Partitioning and Popularity based Caching for Optimized Performance in content-centric fog networks: DPPCOP3
SmartSPEC: A framework to generate customizable, semantics-based smart space datasets3
Quantifying worker interactions and characterizing worker performance through ubiquitous IoT3
Perses: A framework for the continuous evaluation of the QoS of distributed mobile applications3
A New Lightweight Routing Protocol for Internet of Mobile Things Based on Low Power and Lossy Network Using a Fuzzy-Logic Method3
Empirical evaluation of nodes and channels of the lightning network3
Full-duplex routing with low-complexity sequential-decision for throughput enhancement in dynamic access networks3
VibeRing: Using vibrations from a smart ring as an out-of-band channel for sharing secret keys3
Multi-workflow scheduling and resource provisioning in Mobile Edge Computing using opposition-based Marine-Predator Algorithm3
Computation and communication efficient approach for federated learning based urban sensing applications against inference attacks3
Blockchain-enhanced efficient and anonymous certificateless signature scheme and its application3
Physical activity forecasting with time series data using Android smartphone3
A black-box assessment of authentication and reliability in consumer IoT devices3
Lightweight secure key establishment to create a secure channel between entities in a crowdsourcing environment3
Investment-driven budget allocation and dynamic pricing strategies in edge cache network3
Passive infrared sensor dataset and deep learning models for device-free indoor localization and tracking3
0.071699142456055