Pervasive and Mobile Computing

Papers
(The median citation count of Pervasive and Mobile Computing is 3. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-06-01 to 2025-06-01.)
ArticleCitations
AR Peephole Interface: Extending the workspace of a mobile device using real-space information73
Collective victim counting in post-disaster response: A distributed, power-efficient algorithm via BLE spontaneous networks66
Special Issue on IoT for Fighting COVID-1954
Editorial Board53
Context-aware privacy-preserving access control for mobile computing51
Bio-inspired recruiting strategies for on-demand connectivity over multi-layer hybrid CubeSat-UAV networks in emergency scenarios40
IoT data encryption and phrase search-based efficient processing using a Fully Homomorphic-based SE (FHSE) scheme35
What makes people install a COVID-19 contact-tracing app? Understanding the influence of app design and individual difference on contact-tracing app adoption intention30
Deep learning based speed bumps detection and characterization using smartphone sensors29
Distributed fault detection in sparse wireless sensor networks utilizing simultaneous likelihood ratio statistics28
HED-FL: A hierarchical, energy efficient, and dynamic approach for edge Federated Learning28
A lightweight authentication protocol for D2D-enabled IoT systems with privacy27
RSS based multistage statistical method for attack detection and localization in IoT networks26
A comprehensive investigation on range-free localization algorithms with mobile anchors at different altitudes26
Special Issue on IEEE WoWMoM 202124
A novel self-healing model using precoding & big-data based approach for 5G networks23
Hybrid and Adaptive Cryptographic-based secure authentication approach in IoT based applications using hybrid encryption23
Secure D2D caching framework inspired on trust management and blockchain for Mobile Edge Caching23
Spectrum cartography techniques, challenges, opportunities, and applications: A survey23
FastPlan: A three-step framework for accelerating drone-centric search operations in post-disaster relief23
CIU-L: A class-incremental learning and machine unlearning passive sensing system for human identification21
A single smartwatch-based segmentation approach in human activity recognition21
A context-aware sensing strategy with deep reinforcement learning for smart healthcare21
Wireless power transfer with unmanned aerial vehicles: State of the art and open challenges21
ADAM-sense: Anxiety-displaying activities recognition by motion sensors21
Editorial Board19
Continuous authentication through gait analysis on a wrist-worn device19
Passive Monitoring of Dangerous Driving Behaviors Using mmWave Radar19
An intelligent charging scheme maximizing the utility for rechargeable network in smart city19
Q-Learning Driven Routing for Aeronautical Ad-Hoc Networks19
TrustMD — A multi-layer framework for domain, edge and D2D caching based on trust dissemination and blockchain18
Online policies for throughput maximization of backscatter assisted wireless powered communication via reinforcement learning approaches18
Probabilistic knowledge infusion through symbolic features for context-aware activity recognition18
STAC: a spatio-temporal approximate method in data collection applications17
bioMCS 2.0: A distributed, energy-aware fog-based framework for data forwarding in mobile crowdsensing17
LTE-LAA cell selection through operator data learning and numerosity reduction17
Sustainable fixed wireless access with blockchain secured software defined network17
Content-centric data and computation offloading in AI-supported fog networks for next generation IoT17
Enhancing crowdsourcing through skill and willingness-aligned task assignment with workforce composition balance16
Editorial Board16
Editorial Board16
Editorial Board16
Evaluation and comparison of federated learning algorithms for Human Activity Recognition on smartphones16
Blockchain-Inspired Trust Management in Cognitive Radio Networks with Cooperative Spectrum Sensing16
Blockchain-based access control architecture for multi-domain environments15
Editorial Board15
MotionID: Towards practical behavioral biometrics-based implicit user authentication on smartphones15
Editorial Board15
Enhancing 5G network slicing for IoT traffic with a novel clustering framework15
Consent-driven Data Reuse in Multi-tasking Crowdsensing Systems: A Privacy-by-Design Solution15
IEEE International Conference on Pervasive Computing and Communications (PerCom) 202014
Design, code generation and simulation of IoT environments with mobility devices by using model-driven development: SimulateIoT-Mobile14
ContrasGAN: Unsupervised domain adaptation in Human Activity Recognition via adversarial and contrastive learning14
LiteFlex-YOLO:A lightweight small target detection network for maritime unmanned aerial vehicles13
Balancing local vs. remote state allocation for micro-services in the cloud–edge continuum13
GTDIM: Grid-based Two-stage Dynamic Incentive Mechanism for Mobile Crowd Sensing13
Predicting clinically relevant changes in bipolar disorder outside the clinic walls based on pervasive technology interactions via smartphone typing dynamics13
DA-HAR: Dual adversarial network for environment-independent WiFi human activity recognition12
PPSS: A privacy-preserving secure framework using blockchain-enabled federated deep learning for Industrial IoTs12
Green Bear - A LoRaWAN-based Human-in-the-Loop case-study for sustainable cities12
SMARTCOPE: Smartphone Change Of Possession Evaluation for continuous authentication12
F-BIDS: Federated-Blending based Intrusion Detection System12
Secure and efficient blockchain-based consensus scheme for MWSNs with clustered architecture11
Mining Wi-Fi Channel State Information for breathing and heart rate classification11
Energy and task completion time trade-off for task offloading in fog-enabled IoT networks11
Porting deep neural networks on the edge via dynamic K-means compression: A case study of plant disease detection11
Digital twin oriented architecture for secure and QoS aware intelligent communications in industrial environments11
A Transfer Learning and Explainable Solution to Detect mpox from Smartphones images11
BmmW: A DNN-based joint BLE and mmWave radar system for accurate 3D localization with goal-oriented communication11
TR-ReFloc: A TR-based Framework for Recovering Missed RSS for WiFi indoor positioning in the offline and online phase11
Qos-aware mobile service optimization in multi-access mobile edge computing environments10
BLUFADER: Blurred face detection & recognition for privacy-friendly continuous authentication10
Resilient UAVs location sharing service based on information freshness and opportunistic deliveries10
Would you mind hiding my malware? Building malicious Android apps with StegoPack10
Climate smart computing: A perspective10
Online continual learning for human activity recognition10
Prioritization-based delay sensitive task offloading in SDN-integrated mobile IoT network9
CitySpec with shield: A secure intelligent assistant for requirement formalization9
Guest editorial for the PMC special section on selected papers from ICDCN 20209
A neighbor discovery protocol with adaptive collision alleviation for wireless robotic networks9
Editorial Board9
Editorial9
AI-driven autonomous vehicles as COVID-19 assessment centers: A novel crowdsensing-enabled strategy9
Efficient semidefinite solutions for TDOA-based source localization under unknown PS8
Feasibility and reliability of peercloud in vehicular networks: A comprehensive study8
OcAPO: Fine-grained occupancy-aware, empirically-driven PDC control in open-plan, shared workspaces8
MGA-Net+: Acceleration-based packaging work recognition using motif-guided attention networks8
Editorial Board8
Detecting structural anomalies of quadcopter UAVs based on LSTM autoencoder8
Editorial Board8
Role of IoT technologies in big data management systems: A review and Smart Grid case study8
Three-phased clustered topology formation for Aeronautical Ad-Hoc Networks8
Exploring the effects of below-freezing temperatures on smartphone usage8
Differentiating presence in virtual reality using physiological signals7
Digital Avatars: A programming framework for personalized human interactions through virtual profiles7
MRILoc: Multiresolution Indoor Localization from crowdsourced samples7
GANCSA: A novel approach for finding the best path for migration of mobile-agents7
Machinery detection by impulsive noise recognition using WiFi sensing7
Traffic count estimation using crowd-sourced trajectory data in the absence of dedicated infrastructure7
LICAPA: Lightweight collective attestation for physical attacks detection in highly dynamic networks7
A toolkit for localisation queries7
Aggregate processes as distributed adaptive services for the Industrial Internet of Things7
Editorial Board7
An artificial pancreas system in android phones: A dual app architecture7
PSO based Amorphous algorithm to reduce localization error in Wireless Sensor Network7
On the Scheduling of Conflictual Deliveries in a last-mile delivery scenario with truck-carried drones6
Analysis of micro- vs. macro-flows management in QKD-secured edge computing6
LwTool: A data processing toolkit for building a real-time pressure mapping smart textile software system6
Editorial Board6
Min–max movement of barrier coverage with sink-based mobile sensors for crowdsensing6
Reinforcement learning for autonomous vehicle movements in wireless multimedia applications6
A comprehensive systematic review on mobile applications to support dementia patients6
Trust-aware and improved density peaks clustering algorithm for fast and secure models in wireless sensor networks6
Fog-ROCL: A Fog based RSU Optimum Configuration and Localization in VANETs6
Editorial Board6
Energy-aware human activity recognition for wearable devices: A comprehensive review6
WiPass: 1D-CNN-based smartphone keystroke recognition Using WiFi signals5
A novel middleware for adaptive and efficient split computing for real-time object detection5
Editorial Board5
Tracking people across ultra populated indoor spaces by matching unreliable Wi-Fi signals with disconnected video feeds5
Using mobile devices as scientific measurement instruments: Reliable android task scheduling5
Energy–Aware security protocol for IoT devices5
EPCM: Efficient privacy-preserving charging matching scheme with data integrity for electric vehicles5
Special issue on Edge Computing in Pervasive Systems5
Health and sleep nursing assistant for real-time, contactless, and non-invasive monitoring5
Design and evaluation of a fog platform supporting device mobility through container migration5
Towards efficient device-to-device multicast content delivery with social awareness5
A puf-based three-party authentication key establishment scheme for fog-enabled smart home5
An efficient estimator for source localization in WSNs using RSSD and TDOA measurements5
Lightweight accurate trigger to reduce power consumption in sensor-based continuous human activity recognition5
Editorial Board5
Happiness recognition from smartphone usage data considering users’ estimated personality traits5
Editorial Board5
MousePath: Lightweight phone-to-web information sharing via mouse interface5
Editorial Board4
Navigating transient content: PFC caching approach for NDN-based IoT networks4
Studying users’ perception of IoT mobile companion apps4
A framework for offloading and migration of serverless functions in the Edge–Cloud Continuum4
Editorial Board4
“I still need my privacy”: Exploring the level of comfort and privacy preferences of German-speaking older adults in the case of mobile assistant robots4
Behavioural patterns discovery for lifestyle analysis from egocentric photo-streams4
Sensor-based agitation prediction in institutionalized people with dementia A systematic review4
VCFL: A verifiable and collusion attack resistant privacy preserving framework for cross-silo federated learning4
Dense Indoor Sensor Networks: Towards passively sensing human presence with LoRaWAN4
SEEK+: Securing vehicle GPS via a sequential dashcam-based vehicle localization framework4
A New Lightweight Routing Protocol for Internet of Mobile Things Based on Low Power and Lossy Network Using a Fuzzy-Logic Method4
On data minimization and anonymity in pervasive mobile-to-mobile recommender systems4
Long-term traffic flow prediction using multivariate SSA forecasting in SDN based networks4
On producing energy-efficient and contrast-enhanced images for OLED-based mobile devices4
FaaS execution models for edge applications4
Hybrid metaheuristic algorithm for optimal cluster head selection in wireless sensor network4
WiCAR: A class-incremental system for WiFi activity recognition4
CrowdLBM: A lightweight blockchain-based model for mobile crowdsensing in the Internet of Things4
FogLBS: Utilizing fog computing for providing mobile Location-Based Services to mobile customers4
Editorial Board4
Continual learning in sensor-based human activity recognition with dynamic mixture of experts4
Security protocol for securing notifications about dangerous events in the agglomeration4
A survey of wearable devices to capture human factors for human-robot collaboration4
Detecting Byzantine attacks in Cognitive Radio Networks : A two-layered approach using Hidden Markov Model and machine learning3
Privacy invasion via smart-home hub in personal area networks3
Investment-driven budget allocation and dynamic pricing strategies in edge cache network3
Contrastive-representation IMU-based fitness activity recognition enhanced by bio-impedance sensing3
Passive infrared sensor dataset and deep learning models for device-free indoor localization and tracking3
Editorial Board3
Physical activity forecasting with time series data using Android smartphone3
Quantifying worker interactions and characterizing worker performance through ubiquitous IoT3
Blockchain-enhanced efficient and anonymous certificateless signature scheme and its application3
Empirical evaluation of nodes and channels of the lightning network3
Computation and communication efficient approach for federated learning based urban sensing applications against inference attacks3
A novel IoT trust model leveraging fully distributed behavioral fingerprinting and secure delegation3
Reinforcement learning-based load balancing for heavy traffic Internet of Things3
SmAuto: A domain-specific-language for application development in smart environments3
VibeRing: Using vibrations from a smart ring as an out-of-band channel for sharing secret keys3
Dynamic Partitioning and Popularity based Caching for Optimized Performance in content-centric fog networks: DPPCOP3
Context-driven encrypted multimedia traffic classification on mobile devices3
Multi-workflow scheduling and resource provisioning in Mobile Edge Computing using opposition-based Marine-Predator Algorithm3
Towards a better indoor positioning system: A location estimation process using artificial neural networks based on a semi-interpolated database3
Perses: A framework for the continuous evaluation of the QoS of distributed mobile applications3
SmartSPEC: A framework to generate customizable, semantics-based smart space datasets3
Full-duplex routing with low-complexity sequential-decision for throughput enhancement in dynamic access networks3
A black-box assessment of authentication and reliability in consumer IoT devices3
0.11864185333252