Pervasive and Mobile Computing

Papers
(The TQCC of Pervasive and Mobile Computing is 8. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-08-01 to 2025-08-01.)
ArticleCitations
AR Peephole Interface: Extending the workspace of a mobile device using real-space information75
Collective victim counting in post-disaster response: A distributed, power-efficient algorithm via BLE spontaneous networks66
Special Issue on IoT for Fighting COVID-1958
Editorial Board54
IoT data encryption and phrase search-based efficient processing using a Fully Homomorphic-based SE (FHSE) scheme41
Distributed fault detection in sparse wireless sensor networks utilizing simultaneous likelihood ratio statistics40
What makes people install a COVID-19 contact-tracing app? Understanding the influence of app design and individual difference on contact-tracing app adoption intention33
HED-FL: A hierarchical, energy efficient, and dynamic approach for edge Federated Learning33
Context-aware privacy-preserving access control for mobile computing33
Deep learning based speed bumps detection and characterization using smartphone sensors30
Bio-inspired recruiting strategies for on-demand connectivity over multi-layer hybrid CubeSat-UAV networks in emergency scenarios30
Special Issue on IEEE WoWMoM 202129
Spectrum cartography techniques, challenges, opportunities, and applications: A survey28
Secure D2D caching framework inspired on trust management and blockchain for Mobile Edge Caching26
Hybrid and Adaptive Cryptographic-based secure authentication approach in IoT based applications using hybrid encryption25
Enhanced hybrid prototype for few-shot class-incremental gait recognition in multi-activity scenarios using wearable sensors25
FastPlan: A three-step framework for accelerating drone-centric search operations in post-disaster relief24
RSS based multistage statistical method for attack detection and localization in IoT networks24
CIU-L: A class-incremental learning and machine unlearning passive sensing system for human identification24
A single smartwatch-based segmentation approach in human activity recognition23
A context-aware sensing strategy with deep reinforcement learning for smart healthcare23
ADAM-sense: Anxiety-displaying activities recognition by motion sensors22
Q-Learning Driven Routing for Aeronautical Ad-Hoc Networks22
Passive Monitoring of Dangerous Driving Behaviors Using mmWave Radar21
An intelligent charging scheme maximizing the utility for rechargeable network in smart city21
Wireless power transfer with unmanned aerial vehicles: State of the art and open challenges21
LTE-LAA cell selection through operator data learning and numerosity reduction20
Online policies for throughput maximization of backscatter assisted wireless powered communication via reinforcement learning approaches19
TrustMD — A multi-layer framework for domain, edge and D2D caching based on trust dissemination and blockchain19
Sustainable fixed wireless access with blockchain secured software defined network19
Continuous authentication through gait analysis on a wrist-worn device19
Editorial Board18
Probabilistic knowledge infusion through symbolic features for context-aware activity recognition18
Blockchain-Inspired Trust Management in Cognitive Radio Networks with Cooperative Spectrum Sensing18
Editorial Board18
Evaluation and comparison of federated learning algorithms for Human Activity Recognition on smartphones17
Editorial Board17
Consent-driven Data Reuse in Multi-tasking Crowdsensing Systems: A Privacy-by-Design Solution17
Enhancing crowdsourcing through skill and willingness-aligned task assignment with workforce composition balance17
MotionID: Towards practical behavioral biometrics-based implicit user authentication on smartphones17
Enhancing 5G network slicing for IoT traffic with a novel clustering framework16
Blockchain-based access control architecture for multi-domain environments16
Content-centric data and computation offloading in AI-supported fog networks for next generation IoT16
Editorial Board15
Balancing local vs. remote state allocation for micro-services in the cloud–edge continuum15
IEEE International Conference on Pervasive Computing and Communications (PerCom) 202015
Editorial Board15
Editorial Board13
ContrasGAN: Unsupervised domain adaptation in Human Activity Recognition via adversarial and contrastive learning13
DA-HAR: Dual adversarial network for environment-independent WiFi human activity recognition13
GTDIM: Grid-based Two-stage Dynamic Incentive Mechanism for Mobile Crowd Sensing13
LiteFlex-YOLO:A lightweight small target detection network for maritime unmanned aerial vehicles13
Green Bear - A LoRaWAN-based Human-in-the-Loop case-study for sustainable cities13
SMARTCOPE: Smartphone Change Of Possession Evaluation for continuous authentication13
Design, code generation and simulation of IoT environments with mobility devices by using model-driven development: SimulateIoT-Mobile13
Predicting clinically relevant changes in bipolar disorder outside the clinic walls based on pervasive technology interactions via smartphone typing dynamics13
Secure and efficient blockchain-based consensus scheme for MWSNs with clustered architecture13
F-BIDS: Federated-Blending based Intrusion Detection System13
A Transfer Learning and Explainable Solution to Detect mpox from Smartphones images12
PPSS: A privacy-preserving secure framework using blockchain-enabled federated deep learning for Industrial IoTs12
Porting deep neural networks on the edge via dynamic K-means compression: A case study of plant disease detection12
BmmW: A DNN-based joint BLE and mmWave radar system for accurate 3D localization with goal-oriented communication11
Mining Wi-Fi Channel State Information for breathing and heart rate classification11
Online continual learning for human activity recognition11
Digital twin oriented architecture for secure and QoS aware intelligent communications in industrial environments11
Would you mind hiding my malware? Building malicious Android apps with StegoPack11
TR-ReFloc: A TR-based Framework for Recovering Missed RSS for WiFi indoor positioning in the offline and online phase11
BLUFADER: Blurred face detection & recognition for privacy-friendly continuous authentication11
Resilient UAVs location sharing service based on information freshness and opportunistic deliveries11
Editorial Board10
Qos-aware mobile service optimization in multi-access mobile edge computing environments10
Guest editorial for the PMC special section on selected papers from ICDCN 202010
Editorial10
Climate smart computing: A perspective10
AI-driven autonomous vehicles as COVID-19 assessment centers: A novel crowdsensing-enabled strategy10
A neighbor discovery protocol with adaptive collision alleviation for wireless robotic networks10
Prioritization-based delay sensitive task offloading in SDN-integrated mobile IoT network9
Editorial Board9
CitySpec with shield: A secure intelligent assistant for requirement formalization9
Role of IoT technologies in big data management systems: A review and Smart Grid case study9
Efficient semidefinite solutions for TDOA-based source localization under unknown PS9
Exploring the effects of below-freezing temperatures on smartphone usage8
Editorial Board8
Detecting structural anomalies of quadcopter UAVs based on LSTM autoencoder8
MGA-Net+: Acceleration-based packaging work recognition using motif-guided attention networks8
Aggregate processes as distributed adaptive services for the Industrial Internet of Things8
OcAPO: Fine-grained occupancy-aware, empirically-driven PDC control in open-plan, shared workspaces8
Three-phased clustered topology formation for Aeronautical Ad-Hoc Networks8
LICAPA: Lightweight collective attestation for physical attacks detection in highly dynamic networks8
Feasibility and reliability of peercloud in vehicular networks: A comprehensive study8
GANCSA: A novel approach for finding the best path for migration of mobile-agents8
PSO based Amorphous algorithm to reduce localization error in Wireless Sensor Network8
MRILoc: Multiresolution Indoor Localization from crowdsourced samples8
0.086807012557983