Pervasive and Mobile Computing

Papers
(The median citation count of Pervasive and Mobile Computing is 3. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-11-01 to 2025-11-01.)
ArticleCitations
Collective victim counting in post-disaster response: A distributed, power-efficient algorithm via BLE spontaneous networks80
Editorial Board61
IoT data encryption and phrase search-based efficient processing using a Fully Homomorphic-based SE (FHSE) scheme56
Bio-inspired recruiting strategies for on-demand connectivity over multi-layer hybrid CubeSat-UAV networks in emergency scenarios41
Distributed fault detection in sparse wireless sensor networks utilizing simultaneous likelihood ratio statistics36
Deep learning based speed bumps detection and characterization using smartphone sensors33
HED-FL: A hierarchical, energy efficient, and dynamic approach for edge Federated Learning32
AR Peephole Interface: Extending the workspace of a mobile device using real-space information31
Enhanced hybrid prototype for few-shot class-incremental gait recognition in multi-activity scenarios using wearable sensors30
Context-aware privacy-preserving access control for mobile computing30
RSS based multistage statistical method for attack detection and localization in IoT networks29
Hybrid and Adaptive Cryptographic-based secure authentication approach in IoT based applications using hybrid encryption27
Spectrum cartography techniques, challenges, opportunities, and applications: A survey27
FastPlan: A three-step framework for accelerating drone-centric search operations in post-disaster relief26
Special Issue on IEEE WoWMoM 202126
Passive Monitoring of Dangerous Driving Behaviors Using mmWave Radar25
Editorial Board25
CIU-L: A class-incremental learning and machine unlearning passive sensing system for human identification25
A single smartwatch-based segmentation approach in human activity recognition24
Wireless power transfer with unmanned aerial vehicles: State of the art and open challenges24
Q-Learning Driven Routing for Aeronautical Ad-Hoc Networks22
A context-aware sensing strategy with deep reinforcement learning for smart healthcare22
ADAM-sense: Anxiety-displaying activities recognition by motion sensors21
Minimizing communication-computing energy consumption for UAV assisted collaborative computing offloading20
TrustMD — A multi-layer framework for domain, edge and D2D caching based on trust dissemination and blockchain20
LTE-LAA cell selection through operator data learning and numerosity reduction20
Probabilistic knowledge infusion through symbolic features for context-aware activity recognition19
Continuous authentication through gait analysis on a wrist-worn device19
Editorial Board18
Enhancing crowdsourcing through skill and willingness-aligned task assignment with workforce composition balance18
Enhancing 5G network slicing for IoT traffic with a novel clustering framework18
Blockchain-Inspired Trust Management in Cognitive Radio Networks with Cooperative Spectrum Sensing18
Sustainable fixed wireless access with blockchain secured software defined network18
Content-centric data and computation offloading in AI-supported fog networks for next generation IoT17
Blockchain-based access control architecture for multi-domain environments17
Editorial Board16
Consent-driven Data Reuse in Multi-tasking Crowdsensing Systems: A Privacy-by-Design Solution16
Editorial Board15
MotionID: Towards practical behavioral biometrics-based implicit user authentication on smartphones15
SmartCert: A Multi-modal framework for automated guided vehicle screening15
Evaluation and comparison of federated learning algorithms for Human Activity Recognition on smartphones15
Design, code generation and simulation of IoT environments with mobility devices by using model-driven development: SimulateIoT-Mobile14
Editorial Board14
Predicting clinically relevant changes in bipolar disorder outside the clinic walls based on pervasive technology interactions via smartphone typing dynamics14
Editorial Board14
ContrasGAN: Unsupervised domain adaptation in Human Activity Recognition via adversarial and contrastive learning14
LiteFlex-YOLO:A lightweight small target detection network for maritime unmanned aerial vehicles14
F-BIDS: Federated-Blending based Intrusion Detection System13
A Transfer Learning and Explainable Solution to Detect mpox from Smartphones images13
AerialDB: A federated peer-to-peer spatio-temporal edge datastore for drone fleets13
Balancing local vs. remote state allocation for micro-services in the cloud–edge continuum13
GTDIM: Grid-based Two-stage Dynamic Incentive Mechanism for Mobile Crowd Sensing13
TDoA localization in wireless sensor networks using constrained total least squares, Newton’s methods, and alternating direction method of multipliers13
Green Bear - A LoRaWAN-based Human-in-the-Loop case-study for sustainable cities13
Editorial Board13
SMARTCOPE: Smartphone Change Of Possession Evaluation for continuous authentication13
Resilient UAVs location sharing service based on information freshness and opportunistic deliveries12
PPSS: A privacy-preserving secure framework using blockchain-enabled federated deep learning for Industrial IoTs12
DA-HAR: Dual adversarial network for environment-independent WiFi human activity recognition12
BmmW: A DNN-based joint BLE and mmWave radar system for accurate 3D localization with goal-oriented communication12
Secure and efficient blockchain-based consensus scheme for MWSNs with clustered architecture12
Online continual learning for human activity recognition11
Would you mind hiding my malware? Building malicious Android apps with StegoPack11
BLUFADER: Blurred face detection & recognition for privacy-friendly continuous authentication11
Mining Wi-Fi Channel State Information for breathing and heart rate classification11
Digital twin oriented architecture for secure and QoS aware intelligent communications in industrial environments11
Efficient semidefinite solutions for TDOA-based source localization under unknown PS10
Role of IoT technologies in big data management systems: A review and Smart Grid case study10
TR-ReFloc: A TR-based Framework for Recovering Missed RSS for WiFi indoor positioning in the offline and online phase10
CitySpec with shield: A secure intelligent assistant for requirement formalization10
Editorial Board10
A neighbor discovery protocol with adaptive collision alleviation for wireless robotic networks10
Prioritization-based delay sensitive task offloading in SDN-integrated mobile IoT network10
Climate smart computing: A perspective10
Qos-aware mobile service optimization in multi-access mobile edge computing environments9
Editorial Board9
OcAPO: Fine-grained occupancy-aware, empirically-driven PDC control in open-plan, shared workspaces9
Editorial Board9
MGA-Net+: Acceleration-based packaging work recognition using motif-guided attention networks9
Feasibility and reliability of peercloud in vehicular networks: A comprehensive study9
Exploring the effects of below-freezing temperatures on smartphone usage9
GANCSA: A novel approach for finding the best path for migration of mobile-agents9
LICAPA: Lightweight collective attestation for physical attacks detection in highly dynamic networks8
Traffic count estimation using crowd-sourced trajectory data in the absence of dedicated infrastructure8
Detecting structural anomalies of quadcopter UAVs based on LSTM autoencoder8
PSO based Amorphous algorithm to reduce localization error in Wireless Sensor Network8
Differentiating presence in virtual reality using physiological signals8
Editorial Board8
Aggregate processes as distributed adaptive services for the Industrial Internet of Things8
A customizable benchmarking tool for evaluating personalized thermal comfort provisioning in smart spaces using Digital Twins8
An artificial pancreas system in android phones: A dual app architecture8
MRILoc: Multiresolution Indoor Localization from crowdsourced samples8
Three-phased clustered topology formation for Aeronautical Ad-Hoc Networks8
Machinery detection by impulsive noise recognition using WiFi sensing8
A toolkit for localisation queries7
Trust-aware and improved density peaks clustering algorithm for fast and secure models in wireless sensor networks7
Cluster Routing Algorithm of 4G Wireless Communication AD Hoc Network Based on LoRa Transmission Technology7
Digital Avatars: A programming framework for personalized human interactions through virtual profiles7
Energy-aware human activity recognition for wearable devices: A comprehensive review7
On the Scheduling of Conflictual Deliveries in a last-mile delivery scenario with truck-carried drones7
Analysis of micro- vs. macro-flows management in QKD-secured edge computing7
Fog-ROCL: A Fog based RSU Optimum Configuration and Localization in VANETs7
On-device indoor place prediction using WiFi-RTT and inertial sensors7
Editorial Board7
LwTool: A data processing toolkit for building a real-time pressure mapping smart textile software system7
Reinforcement learning for autonomous vehicle movements in wireless multimedia applications6
Min–max movement of barrier coverage with sink-based mobile sensors for crowdsensing6
EPCM: Efficient privacy-preserving charging matching scheme with data integrity for electric vehicles6
Special issue on Edge Computing in Pervasive Systems6
An efficient estimator for source localization in WSNs using RSSD and TDOA measurements6
Construction of Wi-Fi fingerprint database based on WGAN-PSO: A method to alleviate signal sparsity and environmental noise6
Editorial Board6
Lightweight accurate trigger to reduce power consumption in sensor-based continuous human activity recognition6
Editorial Board6
A comprehensive systematic review on mobile applications to support dementia patients6
A novel middleware for adaptive and efficient split computing for real-time object detection5
Continual learning in sensor-based human activity recognition with dynamic mixture of experts5
MousePath: Lightweight phone-to-web information sharing via mouse interface5
Security protocol for securing notifications about dangerous events in the agglomeration5
Digital twin-enabled age of information-aware scheduling for Industrial IoT edge networks5
Sensor-based agitation prediction in institutionalized people with dementia A systematic review5
Tracking people across ultra populated indoor spaces by matching unreliable Wi-Fi signals with disconnected video feeds5
Long-term traffic flow prediction using multivariate SSA forecasting in SDN based networks5
Energy–Aware security protocol for IoT devices5
Behavioural patterns discovery for lifestyle analysis from egocentric photo-streams5
Optimization of safety energy efficiency of alternating relay communication systems for UAVs5
Towards efficient device-to-device multicast content delivery with social awareness5
Using mobile devices as scientific measurement instruments: Reliable android task scheduling5
A puf-based three-party authentication key establishment scheme for fog-enabled smart home5
Editorial Board5
A survey of wearable devices to capture human factors for human-robot collaboration5
Unveiling user dynamics in the evolving social debate on climate crisis during the conferences of the parties5
On data minimization and anonymity in pervasive mobile-to-mobile recommender systems5
Perses: A framework for the continuous evaluation of the QoS of distributed mobile applications4
Context-driven encrypted multimedia traffic classification on mobile devices4
Dense Indoor Sensor Networks: Towards passively sensing human presence with LoRaWAN4
WiCAR: A class-incremental system for WiFi activity recognition4
Editorial Board4
Asymptotically efficient ADMM solutions for source localization using RSS measurements4
FogLBS: Utilizing fog computing for providing mobile Location-Based Services to mobile customers4
Computation and communication efficient approach for federated learning based urban sensing applications against inference attacks4
Multi-workflow scheduling and resource provisioning in Mobile Edge Computing using opposition-based Marine-Predator Algorithm4
Blockchain-enhanced efficient and anonymous certificateless signature scheme and its application4
Navigating transient content: PFC caching approach for NDN-based IoT networks4
Editorial Board4
FaaS execution models for edge applications4
VCFL: A verifiable and collusion attack resistant privacy preserving framework for cross-silo federated learning4
Empirical evaluation of nodes and channels of the lightning network4
Studying users’ perception of IoT mobile companion apps4
SEEK+: Securing vehicle GPS via a sequential dashcam-based vehicle localization framework4
Hybrid metaheuristic algorithm for optimal cluster head selection in wireless sensor network4
A framework for offloading and migration of serverless functions in the Edge–Cloud Continuum4
CrowdLBM: A lightweight blockchain-based model for mobile crowdsensing in the Internet of Things4
Editorial Board3
SmAuto: A domain-specific-language for application development in smart environments3
A novel IoT trust model leveraging fully distributed behavioral fingerprinting and secure delegation3
Editorial Board3
Dynamic Partitioning and Popularity based Caching for Optimized Performance in content-centric fog networks: DPPCOP3
Lightweight secure key establishment to create a secure channel between entities in a crowdsourcing environment3
Towards a better indoor positioning system: A location estimation process using artificial neural networks based on a semi-interpolated database3
Passive infrared sensor dataset and deep learning models for device-free indoor localization and tracking3
Investment-driven budget allocation and dynamic pricing strategies in edge cache network3
Efficient community detection in disaster networks using spectral sparsification3
Full-duplex routing with low-complexity sequential-decision for throughput enhancement in dynamic access networks3
A black-box assessment of authentication and reliability in consumer IoT devices3
Contrastive-representation IMU-based fitness activity recognition enhanced by bio-impedance sensing3
Privacy invasion via smart-home hub in personal area networks3
A New Lightweight Routing Protocol for Internet of Mobile Things Based on Low Power and Lossy Network Using a Fuzzy-Logic Method3
Reinforcement learning-based load balancing for heavy traffic Internet of Things3
SmartSPEC: A framework to generate customizable, semantics-based smart space datasets3
Physical activity forecasting with time series data using Android smartphone3
0.11289882659912