Skip to main content
Top

Journal

Mobile Networks and Applications 4/2021
Mobile Networks and Applications

Issue 4/2021

Special Issue: Security and Privacy Challenges in Real World Situations

share
SHARE
insite
SEARCH

Table of Contents (36 Articles)

11-11-2020

Editorial: Security and Privacy in Computing and Communications
Zheli Liu, Jin Li, Ilsun You, Siu-Ming Yiu

09-01-2020

A Revocable Group Signatures Scheme to Provide Privacy-Preserving Authentications
Xiaohan Yue, Mengzhe Xi, Bing Chen, Mingchao Gao, Yuan He, Jian Xu

26-12-2019

Privacy-Preserving Top-k Location-based Services Retrieval in Mobile Internet
Na Wang, Jian Li, Junsong Fu, Yan Zheng

21-12-2019

Throughput Analysis of Smart Buildings-oriented Wireless Networks under Jamming Attacks
Xianglin Wei, Tongxiang Wang, Chaogang Tang

17-01-2020

Cognitive Radio Based System for Best Effort Communications in Sound-based Covert Channel for IoT Environments
Jorge E. Coyac-Torres, Mario E. Rivero-Angeles, Eleazar Aguirre-Anaya

15-01-2020

Intrusion Detection System for IoT Heterogeneous Perceptual Network
Man Zhou, Lansheng Han, Hongwei Lu, Cai Fu

11-01-2020

Role-Based Access Control Model for Cloud Storage Using Identity-Based Cryptosystem
Jian Xu, Yanbo Yu, Qingyu Meng, Qiyu Wu, Fucai Zhou

21-12-2019

A Timestamp-Regulating VoLTE Covert Channel against Statistical Analysis
Zhang Quanxin, Zhu Mengyan, Liang Chen, Wang Kunqing, Yang Kai, Li Yuanzhang

18-01-2020

An Efficient Bounded Model Checking Approach for Web Service Composition
Yuanzhang Li, Dongyan Ma, Chen Liu, Wencong Han, Hongwei Jiang, Jingjing Hu

06-01-2020

PRIA: a Multi-source Recognition Method Based on Partial Observation in SIR Model
Yong Ding, Xiaoqing Cui, Huiyong Wang, Kun Zhang

01-02-2020

A Privacy-sensitive Service Selection Method Based on Artificial Fish Swarm Algorithm in the Internet of Things
Bing Jia, Lifei Hao, Chuxuan Zhang, Baoqi Huang

16-12-2019

Security Assessment for Interdependent Heterogeneous Cyber Physical Systems
Hao Peng, Zhe Kan, Dandan Zhao, Jianmin Han

19-12-2019

Identity-based Multi-Recipient Public Key Encryption Scheme and Its Application in IoT
Jing Li, Xiangyan Tang, Zhijun Wei, Yu Wang, Wenbin Chen, Yu-an Tan

20-01-2020 | Correction

Correction to: Identity-based Multi-Recipient Public Key Encryption Scheme and Its Application in IoT
Jing Li, Xiangyan Tang, Zhijun Wei, Yu Wang, Wenbin Chen, Yu-an Tan

21-12-2019

A Graded Reversible Watermarking Scheme for Relational Data
Ruitao Hou, Hequn Xian

06-01-2020

A Novel Algorithm for Improving Malicious Node Detection Effect in Wireless Sensor Networks
Hongyu Yang, Xugao Zhang, Fang Cheng

04-01-2020

A Privacy-preserving Fuzzy Search Scheme Supporting Logic Query over Encrypted Cloud Data
Shaojing Fu, Qi Zhang, Nan Jia, Ming Xu

02-01-2020

Quadratic Poly Certificateless Inductive Signcryption for Network Security
A. Sumithra

Open Access 06-01-2020

An Efficient Scheme of Cloud Data Assured Deletion
Yuechi Tian, Tong Shao, Zhen Li

27-01-2020

Cryptanalysis of a Public Key Cryptosystem Based on Data Complexity under Quantum Environment
Zhengjun Jing, Chunsheng Gu, Chunpeng Ge, Peizhong Shi

20-01-2020

An Evolutionary-Based Black-Box Attack to Deep Neural Network Classifiers
Yutian Zhou, Yu-an Tan, Quanxin Zhang, Xiaohui Kuang, Yahong Han, Jingjing Hu

Open Access 06-02-2020

Network Risk Assessment Based on Baum Welch Algorithm and HMM
Chundong Wang, Kongbo Li, Xiaonan He

14-01-2020

A Confidence-Guided Evaluation for Log Parsers Inner Quality
Xueshuo Xie, Zhi Wang, Xuhang Xiao, Ye Lu, Shenwei Huang, Tao Li

20-01-2020

A Fault Tolerant Mechanism for UE Authentication in 5G Networks
Fang-Yie Leu, Kun-Lin Tsai, Heru Susanto, Cheng-Yan Gu, Ilsun You

08-01-2020

Malware Detection Based on Multi-level and Dynamic Multi-feature Using Ensemble Learning at Hypervisor
Jian Zhang, Cheng Gao, Liangyi Gong, Zhaojun Gu, Dapeng Man, Wu Yang, Wenzhen Li

07-01-2020

Secure Encrypted Data Deduplication Based on Data Popularity
Yunlong He, Hequn Xian, Liming Wang, Shuguang Zhang

02-01-2020

Accurate and Cognitive Intrusion Detection System (ACIDS): a Novel Black Hole Detection Mechanism in Mobile Ad Hoc Networks
S. Sivanesh, V. R. Sarma Dhulipala

11-01-2020

MF-CNN: a New Approach for LDoS Attack Detection Based on Multi-feature Fusion and CNN
Dan Tang, Liu Tang, Wei Shi, Sijia Zhan, Qiuwei Yang

06-01-2020

Research on Intelligent Detection of Command Level Stack Pollution for Binary Program Analysis
Hui Lu, Chengjie Jin, Xiaohan Helu, Man Zhang, Yanbin Sun, Yi Han, Zhihong Tian

22-02-2020

ShadowFPE: New Encrypted Web Application Solution Based on Shadow DOM
Xiaojie Guo, Yanyu Huang, Jinhui Ye, Sijie Yin, Min Li, Zhaohui Li, Siu-Ming Yiu, Xiaochun Cheng

11-05-2021

Convergence of 5G Technologies, Artificial Intelligence and Cybersecurity of Networked Societies for the Cities of Tomorrow
Trung Q. Duong, Van-Phuc Hoang, Cong-Kha Pham

28-04-2021

Energy efficiency of full-duplex cognitive radio in low-power regimes under imperfect spectrum sensing
M. Ranjbar, H. L. Nguyen, N. H. Tran, T. Karacolak, S. Sastry, L. D. Nguyen

30-04-2021

ClusTi: Clustering Method for Table Structure Recognition in Scanned Images
Arthur Zucker, Younes Belkada, Hanh Vu, Van Nam Nguyen

01-05-2021

Evaluating the Performance of Full-Duplex Energy Harvesting Vehicle-to-Vehicle Communication System over Double Rayleigh Fading Channels
Ba Cao Nguyen, Tran Manh Hoang, Xuan Nam Tran, Xuan Nghia Pham, Le The Dung

17-05-2021

Meteorological and Hydrological Drought Assessment for Dong Nai River Basin, Vietnam under Climate Change
Vu Thuy Linh, Vo Ngoc Quynh Tram, Ho Minh Dung, Dang Nguyen Dong Phuong, Nguyen Duy Liem, Long D. Nguyen, Cheng Yin, Ayse Kortun, Nguyen Kim Loi

29-05-2021

A Reliable Link-Adaptive Position-Based Routing Protocol for Flying ad hoc Network
Qamar Usman, Omer Chughtai, Nadia Nawaz, Zeeshan Kaleem, Kishwer Abdul Khaliq, Long D. Nguyen

Current Publications