首页 > 最新文献

Pervasive and Mobile Computing最新文献

英文 中文
A blockchain-assisted privacy-preserving framework for Mobile CrowdSensing 一个区块链辅助的移动众测隐私保护框架
IF 3.5 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-11-05 DOI: 10.1016/j.pmcj.2025.102125
Nitish Andola , Vijay Kumar Yadav
Mobile Crowdsensing (MCS) has emerged as a powerful paradigm for large-scale data collection using mobile devices. However, traditional MCS frameworks pose significant privacy risks, particularly concerning worker identity and location disclosure during task execution and payment processing. Existing privacy-preserving approaches, such as dummy location insertion, k-anonymity, and differential privacy, either compromise efficiency or fail to address all privacy leakage vectors. To overcome these challenges, we propose a Zero-Knowledge Proof (ZKP)-based blockchain framework that ensures robust privacy protection while maintaining system efficiency. Our protocol leverages zk-SNARKs to protect worker identity and location during task submission and payment transactions. By integrating Ethereum smart contracts, we eliminate reliance on a centralized Crowdsensing Service Provider (CSP), mitigating single point of failure and Denial-of-Service (DoS) risks. We have provided formal security proofs for the transaction privacy. Through detailed experimentation on the Sepolia test network, we analyze gas costs and transaction finalization times, demonstrating that proof verification, despite its computational complexity, remains practical due to off-chain proof generation. The proposed framework optimizes on-chain and off-chain interactions, enhancing scalability while preserving user privacy. A comparative analysis against existing frameworks highlights our model’s superior privacy guarantees and computational efficiency.
移动群体感知(MCS)已经成为使用移动设备进行大规模数据收集的一个强大范例。然而,传统的MCS框架带来了重大的隐私风险,特别是在任务执行和支付处理期间工人身份和位置的披露。现有的隐私保护方法,如虚拟位置插入、k-匿名和差分隐私,要么降低效率,要么无法解决所有隐私泄露向量。为了克服这些挑战,我们提出了一个基于零知识证明(ZKP)的区块链框架,在保持系统效率的同时确保强大的隐私保护。我们的协议利用zk- snark在任务提交和支付交易期间保护工人的身份和位置。通过集成以太坊智能合约,我们消除了对集中式众感服务提供商(CSP)的依赖,减轻了单点故障和拒绝服务(DoS)风险。我们为交易隐私提供了形式化的安全证明。通过在Sepolia测试网络上进行详细的实验,我们分析了gas成本和交易完成时间,表明尽管计算复杂,但由于链下证明生成,证明验证仍然是实用的。该框架优化了链上和链下交互,增强了可扩展性,同时保护了用户隐私。与现有框架的比较分析表明,我们的模型具有更好的隐私保证和计算效率。
{"title":"A blockchain-assisted privacy-preserving framework for Mobile CrowdSensing","authors":"Nitish Andola ,&nbsp;Vijay Kumar Yadav","doi":"10.1016/j.pmcj.2025.102125","DOIUrl":"10.1016/j.pmcj.2025.102125","url":null,"abstract":"<div><div>Mobile Crowdsensing (MCS) has emerged as a powerful paradigm for large-scale data collection using mobile devices. However, traditional MCS frameworks pose significant privacy risks, particularly concerning worker identity and location disclosure during task execution and payment processing. Existing privacy-preserving approaches, such as dummy location insertion, k-anonymity, and differential privacy, either compromise efficiency or fail to address all privacy leakage vectors. To overcome these challenges, we propose a Zero-Knowledge Proof (ZKP)-based blockchain framework that ensures robust privacy protection while maintaining system efficiency. Our protocol leverages zk-SNARKs to protect worker identity and location during task submission and payment transactions. By integrating Ethereum smart contracts, we eliminate reliance on a centralized Crowdsensing Service Provider (CSP), mitigating single point of failure and Denial-of-Service (DoS) risks. We have provided formal security proofs for the transaction privacy. Through detailed experimentation on the Sepolia test network, we analyze gas costs and transaction finalization times, demonstrating that proof verification, despite its computational complexity, remains practical due to off-chain proof generation. The proposed framework optimizes on-chain and off-chain interactions, enhancing scalability while preserving user privacy. A comparative analysis against existing frameworks highlights our model’s superior privacy guarantees and computational efficiency.</div></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":"115 ","pages":"Article 102125"},"PeriodicalIF":3.5,"publicationDate":"2025-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145468153","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Blockchain-enabled dynamic formation control and reorganization for intelligent UAV swarms 基于区块链的智能无人机群动态编队控制与重组
IF 3.5 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-11-04 DOI: 10.1016/j.pmcj.2025.102129
Huayu Li , Peiyan Li , Wei Zhang , Huiling Shi , Lizhuang Tan , Peiying Zhang
The rapid advancement of unmanned aerial vehicle (UAV) swarm technology has led to growing demands for secure, autonomous, and adaptive coordination mechanisms. However, conventional centralized swarm control systems suffer from single points of failure and limited adaptability in dynamic environments. To address these challenges, this paper presents a blockchain-based decentralized architecture for dynamic formation control and reorganization of intelligent UAV swarms. The proposed system utilizes smart contracts to handle UAV registration, task configuration, data submission, slot allocation, and leader election. An event-driven mechanism is incorporated, allowing UAVs to react in real time to blockchain-triggered events such as leader changes and formation updates. Moreover, UAVs continuously monitor QGroundControl (QGC) heartbeat signals to detect disconnections and autonomously initiate reorganization via on-chain logic. Experimental results demonstrate that the proposed architecture enhances swarm flexibility, reduces control latency, and ensures reliable coordination under dynamic and fault-prone conditions. These findings highlight the potential of blockchain technology in enabling secure and autonomous swarm management within future space-air-ground integrated network.
随着无人机(UAV)群技术的快速发展,对安全、自主和自适应协调机制的需求日益增长。然而,传统的集中式群控制系统在动态环境中存在单点故障和适应性有限的问题。为了解决这些挑战,本文提出了一种基于区块链的分布式架构,用于智能无人机群的动态编队控制和重组。该系统利用智能合约来处理无人机注册、任务配置、数据提交、插槽分配和领导者选举。集成了事件驱动机制,允许无人机实时响应区块链触发的事件,如领导者变化和编队更新。此外,无人机持续监测QGroundControl (QGC)心跳信号,以检测断开并通过链上逻辑自主启动重组。实验结果表明,该架构提高了集群的灵活性,降低了控制延迟,保证了动态和易发故障条件下的可靠协调。这些发现突出了区块链技术在未来空间-空气-地面综合网络中实现安全和自主群管理的潜力。
{"title":"Blockchain-enabled dynamic formation control and reorganization for intelligent UAV swarms","authors":"Huayu Li ,&nbsp;Peiyan Li ,&nbsp;Wei Zhang ,&nbsp;Huiling Shi ,&nbsp;Lizhuang Tan ,&nbsp;Peiying Zhang","doi":"10.1016/j.pmcj.2025.102129","DOIUrl":"10.1016/j.pmcj.2025.102129","url":null,"abstract":"<div><div>The rapid advancement of unmanned aerial vehicle (UAV) swarm technology has led to growing demands for secure, autonomous, and adaptive coordination mechanisms. However, conventional centralized swarm control systems suffer from single points of failure and limited adaptability in dynamic environments. To address these challenges, this paper presents a blockchain-based decentralized architecture for dynamic formation control and reorganization of intelligent UAV swarms. The proposed system utilizes smart contracts to handle UAV registration, task configuration, data submission, slot allocation, and leader election. An event-driven mechanism is incorporated, allowing UAVs to react in real time to blockchain-triggered events such as leader changes and formation updates. Moreover, UAVs continuously monitor QGroundControl (QGC) heartbeat signals to detect disconnections and autonomously initiate reorganization via on-chain logic. Experimental results demonstrate that the proposed architecture enhances swarm flexibility, reduces control latency, and ensures reliable coordination under dynamic and fault-prone conditions. These findings highlight the potential of blockchain technology in enabling secure and autonomous swarm management within future space-air-ground integrated network.</div></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":"115 ","pages":"Article 102129"},"PeriodicalIF":3.5,"publicationDate":"2025-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145468154","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SecureWearTrade: A comprehensive blockchain-enabled IoT framework for secure personal data trading from wearable devices SecureWearTrade:一个全面的支持区块链的物联网框架,用于可穿戴设备的安全个人数据交易
IF 3.5 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-11-04 DOI: 10.1016/j.pmcj.2025.102130
Phat T. Tran-Truong , Trung D. Mai , Ha X. Son , Phien N. Nguyen , Tuan T. Le , Triet M. Nguyen , Khanh H. Vo , Bang K. Le , Ngan T.K. Nguyen , Minh N. Nguyen , Anh T. Nguyen , Tung Q. Nguyen
This article introduces SecureWearTrade, a comprehensive blockchain-enabled IoT framework designed to advance secure personal data trading from wearable devices in healthcare. Addressing critical challenges related to security, privacy, and efficiency in resource-constrained environments, our work makes three key contributions: (1) an enhanced hierarchical identity-based encryption (HIBE) scheme with wildcard support, enabling fine-grained and flexible access control tailored to the dynamic needs of healthcare data management; (2) a novel integration of blockchain with IPFS, providing immutable transaction records and efficient key management; and (3) an optimized batch processing mechanism for effectively handling multiple data streams. By comprehensive evaluation with real-world settings with devices and dataset, SecureWearTrade demonstrates superior performance in encryption and decryption efficiency, resource utilization, and scalability compared to existing solutions. Additionally, the framework maintains robust security under the Bilinear Diffie–Hellman Exponent (BDHE) assumption. By ensuring privacy-preserving data trading, SecureWearTrade offers a scalable and trustworthy solution for the IoT-Cloud continuum.
本文介绍了SecureWearTrade,这是一个全面的支持区块链的物联网框架,旨在推进医疗保健领域可穿戴设备的安全个人数据交易。为了解决资源受限环境中与安全、隐私和效率相关的关键挑战,我们的工作做出了三个关键贡献:(1)增强了具有通配符支持的分层基于身份的加密(HIBE)方案,实现了针对医疗数据管理动态需求量身定制的细粒度和灵活的访问控制;(2)区块链与IPFS的新颖集成,提供不可变的交易记录和高效的密钥管理;(3)用于有效处理多个数据流的优化批处理机制。通过对设备和数据集的实际设置进行综合评估,与现有解决方案相比,SecureWearTrade在加密和解密效率、资源利用率和可扩展性方面表现出卓越的性能。此外,该框架在双线性Diffie-Hellman指数(BDHE)假设下保持了鲁棒安全性。通过确保保护隐私的数据交易,SecureWearTrade为物联网云连续体提供了可扩展且值得信赖的解决方案。
{"title":"SecureWearTrade: A comprehensive blockchain-enabled IoT framework for secure personal data trading from wearable devices","authors":"Phat T. Tran-Truong ,&nbsp;Trung D. Mai ,&nbsp;Ha X. Son ,&nbsp;Phien N. Nguyen ,&nbsp;Tuan T. Le ,&nbsp;Triet M. Nguyen ,&nbsp;Khanh H. Vo ,&nbsp;Bang K. Le ,&nbsp;Ngan T.K. Nguyen ,&nbsp;Minh N. Nguyen ,&nbsp;Anh T. Nguyen ,&nbsp;Tung Q. Nguyen","doi":"10.1016/j.pmcj.2025.102130","DOIUrl":"10.1016/j.pmcj.2025.102130","url":null,"abstract":"<div><div>This article introduces SecureWearTrade, a comprehensive blockchain-enabled IoT framework designed to advance secure personal data trading from wearable devices in healthcare. Addressing critical challenges related to security, privacy, and efficiency in resource-constrained environments, our work makes three key contributions: (1) an enhanced hierarchical identity-based encryption (HIBE) scheme with wildcard support, enabling fine-grained and flexible access control tailored to the dynamic needs of healthcare data management; (2) a novel integration of blockchain with IPFS, providing immutable transaction records and efficient key management; and (3) an optimized batch processing mechanism for effectively handling multiple data streams. By comprehensive evaluation with real-world settings with devices and dataset, SecureWearTrade demonstrates superior performance in encryption and decryption efficiency, resource utilization, and scalability compared to existing solutions. Additionally, the framework maintains robust security under the Bilinear Diffie–Hellman Exponent (BDHE) assumption. By ensuring privacy-preserving data trading, SecureWearTrade offers a scalable and trustworthy solution for the IoT-Cloud continuum.</div></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":"115 ","pages":"Article 102130"},"PeriodicalIF":3.5,"publicationDate":"2025-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145468152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cluster routing algorithm of 4 G wireless communication AD Hoc network based on LoRa transmission technology 基于LoRa传输技术的4g无线通信AD Hoc网络集群路由算法
IF 3.5 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-11-01 DOI: 10.1016/j.pmcj.2025.102128
Guofan Sun , Jing Guo , Han Wu , Fei Qi
In complex terrains, underground pipe galleries, and dense building clusters, 4 G wireless communication at power distribution sites often suffers from interruption or delay due to signal obstruction or heavy base station loads. This problem not only hinders real-time data acquisition and emergency response, but also causes load imbalance, reduced throughput, and frequent changes in node states in the clustering structure of ad hoc networks. To address these challenges, this study proposes a clustering routing algorithm for 4 G wireless communication ad hoc networks in power distribution work sites, leveraging LoRa transmission technology. By utilizing the high-speed transmission capability of 4 G networks to handle large-scale real-time data and integrating WaveMesh wireless ad hoc network technology, the proposed solution enables remote control of power distribution field equipment. The IK-means algorithm is employed for clustering, while a clustered network architecture facilitates large-scale networking. Based on received reverse label information, multiple paths are established, and clustering routing for ad hoc networks is achieved using LoRa transmission technology. Experimental results demonstrate that the proposed algorithm generates clusters with strong load balancing, achieving a packet loss rate of 4.5 %, high throughput performance, and the lowest node state change rate, all remaining below 4.
在复杂地形、地下管廊、密集建筑群等环境中,配电点4g无线通信往往会因信号阻塞或基站负荷过大而出现中断或延迟。这个问题不仅阻碍了实时数据采集和应急响应,而且在ad hoc网络的集群结构中造成负载不平衡、吞吐量降低和节点状态频繁变化。为了应对这些挑战,本研究提出了一种利用LoRa传输技术的4g无线通信自组织网络的聚类路由算法。通过利用4g网络的高速传输能力来处理大规模实时数据,并集成WaveMesh无线自组织网络技术,提出的解决方案可以远程控制配电现场设备。聚类采用IK-means算法,聚类网络架构有利于大规模组网。基于接收到的反向标签信息,建立多条路径,采用LoRa传输技术实现ad hoc网络的聚类路由。实验结果表明,该算法生成的集群具有较强的负载均衡性,丢包率为4.5%,吞吐量性能较高,节点状态变化率最低,均保持在4以下。
{"title":"Cluster routing algorithm of 4 G wireless communication AD Hoc network based on LoRa transmission technology","authors":"Guofan Sun ,&nbsp;Jing Guo ,&nbsp;Han Wu ,&nbsp;Fei Qi","doi":"10.1016/j.pmcj.2025.102128","DOIUrl":"10.1016/j.pmcj.2025.102128","url":null,"abstract":"<div><div>In complex terrains, underground pipe galleries, and dense building clusters, 4 G wireless communication at power distribution sites often suffers from interruption or delay due to signal obstruction or heavy base station loads. This problem not only hinders real-time data acquisition and emergency response, but also causes load imbalance, reduced throughput, and frequent changes in node states in the clustering structure of ad hoc networks. To address these challenges, this study proposes a clustering routing algorithm for 4 G wireless communication ad hoc networks in power distribution work sites, leveraging LoRa transmission technology. By utilizing the high-speed transmission capability of 4 G networks to handle large-scale real-time data and integrating WaveMesh wireless ad hoc network technology, the proposed solution enables remote control of power distribution field equipment. The IK-means algorithm is employed for clustering, while a clustered network architecture facilitates large-scale networking. Based on received reverse label information, multiple paths are established, and clustering routing for ad hoc networks is achieved using LoRa transmission technology. Experimental results demonstrate that the proposed algorithm generates clusters with strong load balancing, achieving a packet loss rate of 4.5 %, high throughput performance, and the lowest node state change rate, all remaining below 4.</div></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":"115 ","pages":"Article 102128"},"PeriodicalIF":3.5,"publicationDate":"2025-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145520650","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Lyapunov-based queue stability optimization for task offloading in UAV-assisted VEC 基于lyapunov的无人机辅助VEC任务卸载队列稳定性优化
IF 3.5 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-10-30 DOI: 10.1016/j.pmcj.2025.102126
Xin He, Yuanzhi Ni, Hongfeng Tao
Due to the presence of increasing computation demands in telematics, RSUs are proposed to play a critical role in Vehicular Edge Computing (VEC). However, how to simultaneously improve the communication quality and reduce the service latency becomes a severe challenge due to the resource shortage. To tackle these issues, we explore how to utilize Unmanned Aerial Vehicles (UAVs) in VEC to facilitate the task offloading performance, i.e., the latency of the service and the stability of the task queues. A Genetic Algorithm (GA)-based Lyapunov optimization framework is proposed for task scheduling optimization. It aims to minimize system cost and stabilize edge server task queues by obtaining the optimal decision. The proposed algorithm optimizes the Lyapunov drift plus penalty function in each time slot. Finally, simulations verify that proposed LyGA scheme is able to achieve the trade-off between minimizing the system cost and maintaining queue stability compared with the benchmark methods.
由于远程信息处理对计算量的需求越来越大,rsu在车辆边缘计算(VEC)中发挥着至关重要的作用。然而,由于资源短缺,如何在提高通信质量的同时降低业务延迟成为一个严峻的挑战。为了解决这些问题,我们探索了如何在VEC中利用无人机来促进任务卸载性能,即服务的延迟和任务队列的稳定性。针对任务调度优化问题,提出了一种基于遗传算法的Lyapunov优化框架。它的目标是通过获得最优决策来最小化系统成本和稳定边缘服务器任务队列。该算法对每个时隙的李雅普诺夫漂移加惩罚函数进行了优化。最后,通过仿真验证了与基准方法相比,所提出的LyGA方案能够在最小化系统成本和保持队列稳定性之间实现折衷。
{"title":"Lyapunov-based queue stability optimization for task offloading in UAV-assisted VEC","authors":"Xin He,&nbsp;Yuanzhi Ni,&nbsp;Hongfeng Tao","doi":"10.1016/j.pmcj.2025.102126","DOIUrl":"10.1016/j.pmcj.2025.102126","url":null,"abstract":"<div><div>Due to the presence of increasing computation demands in telematics, RSUs are proposed to play a critical role in Vehicular Edge Computing (VEC). However, how to simultaneously improve the communication quality and reduce the service latency becomes a severe challenge due to the resource shortage. To tackle these issues, we explore how to utilize Unmanned Aerial Vehicles (UAVs) in VEC to facilitate the task offloading performance, i.e., the latency of the service and the stability of the task queues. A Genetic Algorithm (GA)-based Lyapunov optimization framework is proposed for task scheduling optimization. It aims to minimize system cost and stabilize edge server task queues by obtaining the optimal decision. The proposed algorithm optimizes the Lyapunov drift plus penalty function in each time slot. Finally, simulations verify that proposed LyGA scheme is able to achieve the trade-off between minimizing the system cost and maintaining queue stability compared with the benchmark methods.</div></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":"115 ","pages":"Article 102126"},"PeriodicalIF":3.5,"publicationDate":"2025-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145420337","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SmartCert: A Multi-modal framework for automated guided vehicle screening SmartCert:用于自动引导车辆筛选的多模式框架
IF 3.5 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-10-28 DOI: 10.1016/j.pmcj.2025.102127
Xu Chen , Sandeep Kanta , Vincent Koc , Santhi Bharath Punati , Arif Hussain , Sunny Katyara
Global used vehicle market is undergoing rapid transformation with proliferating demand for scalable, efficient and trustworthy inspection systems that is capable of meeting stringent requirements of online marketplaces and regulatory standards. This paper introduces SmartCert, a multi-modal inspection framework engineered for robust, scalable and pervasive vehicle screening. The novelty of SmartCert lies in synergistic integration of tailored multi-modal transformer architecture with fine-grained temporal diagnostics and optimized edge deployment. An embedded cross-attention mechanism fosters seamless fusion of visual data with on-board diagnostic signals to simultaneously detect exterior damages and internal performance anomalies. To ensure reliable evaluation, SmartCert incorporates reinforcement learning agent with human-in-the-loop reward scheme for adaptive certification thresholding that reduces false positive rates by 6.8% and false negative rates by 4.2% compared to optimally tuned static thresholds. Rigorously evaluated on large-scale dataset of 10240 vehicles with edge deployment validated exclusively on 240 vehicles (2.3%) collected from diverse mobile inspection locations, SmartCert achieves F1-score of 95% for damage classification and 92% anomaly detection rate. These results demonstrate statistically significant improvements over same-dataset baseline implementations by average of 7.4% in classification accuracy and 9.6% in anomaly detection (p<0.001). Furthermore in ablation study, SmartCert improves processing efficiency by 40%, reduces certification-to-sale by 30% and decreases post-sale complaints by 25% compared to traditional manual methods. By integrating explainable AI with optimized edge deployment achieve 18 FPS inference on resource-constrained hardware, SmartCert articulates end-to-end solution for next generation of trustworthy and efficient vehicle certification ecosystem.
全球二手车市场正在经历快速转型,对可扩展、高效和值得信赖的检测系统的需求激增,这些系统能够满足在线市场和监管标准的严格要求。本文介绍了SmartCert,这是一种多模态检查框架,用于强大,可扩展和普遍的车辆筛选。SmartCert的新颖之处在于将定制的多模态变压器架构与细粒度的时间诊断和优化的边缘部署协同集成。嵌入式交叉关注机制促进视觉数据与车载诊断信号的无缝融合,同时检测外部损伤和内部性能异常。为了确保可靠的评估,SmartCert将强化学习代理与人在环奖励方案结合起来,用于自适应认证阈值,与优化的静态阈值相比,可将假阳性率降低6.8%,假阴性率降低4.2%。在10240辆车的大规模数据集上进行严格评估,仅对来自不同移动检测地点的240辆车(2.3%)进行边缘部署验证,SmartCert的损伤分类得分为f1 - 95%,异常检测率为92%。这些结果表明,与相同数据集基线实现相比,分类准确率平均提高了7.4%,异常检测平均提高了9.6% (p<0.001)。此外,在消融研究中,与传统的手工方法相比,SmartCert将处理效率提高了40%,将认证到销售的时间缩短了30%,将售后投诉减少了25%。通过集成可解释的人工智能和优化的边缘部署,在资源受限的硬件上实现18 FPS推理,SmartCert为下一代值得信赖和高效的车辆认证生态系统提供了端到端解决方案。
{"title":"SmartCert: A Multi-modal framework for automated guided vehicle screening","authors":"Xu Chen ,&nbsp;Sandeep Kanta ,&nbsp;Vincent Koc ,&nbsp;Santhi Bharath Punati ,&nbsp;Arif Hussain ,&nbsp;Sunny Katyara","doi":"10.1016/j.pmcj.2025.102127","DOIUrl":"10.1016/j.pmcj.2025.102127","url":null,"abstract":"<div><div>Global used vehicle market is undergoing rapid transformation with proliferating demand for scalable, efficient and trustworthy inspection systems that is capable of meeting stringent requirements of online marketplaces and regulatory standards. This paper introduces SmartCert, a multi-modal inspection framework engineered for robust, scalable and pervasive vehicle screening. The novelty of SmartCert lies in synergistic integration of tailored multi-modal transformer architecture with fine-grained temporal diagnostics and optimized edge deployment. An embedded cross-attention mechanism fosters seamless fusion of visual data with on-board diagnostic signals to simultaneously detect exterior damages and internal performance anomalies. To ensure reliable evaluation, SmartCert incorporates reinforcement learning agent with human-in-the-loop reward scheme for adaptive certification thresholding that reduces false positive rates by 6.8% and false negative rates by 4.2% compared to optimally tuned static thresholds. Rigorously evaluated on large-scale dataset of 10240 vehicles with edge deployment validated exclusively on 240 vehicles (2.3%) collected from diverse mobile inspection locations, SmartCert achieves F1-score of 95% for damage classification and 92% anomaly detection rate. These results demonstrate statistically significant improvements over same-dataset baseline implementations by average of 7.4% in classification accuracy and 9.6% in anomaly detection (<span><math><mrow><mi>p</mi><mo>&lt;</mo><mn>0</mn><mo>.</mo><mn>001</mn></mrow></math></span>). Furthermore in ablation study, SmartCert improves processing efficiency by 40%, reduces certification-to-sale by 30% and decreases post-sale complaints by 25% compared to traditional manual methods. By integrating explainable AI with optimized edge deployment achieve 18 FPS inference on resource-constrained hardware, SmartCert articulates end-to-end solution for next generation of trustworthy and efficient vehicle certification ecosystem.</div></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":"115 ","pages":"Article 102127"},"PeriodicalIF":3.5,"publicationDate":"2025-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145468155","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DeSIST: Emergent security in IoT through Decentralized Strategic Interactions — A game-theoretic Zero Trust framework DeSIST:通过分散战略交互的物联网应急安全——博弈论零信任框架
IF 3.5 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-10-28 DOI: 10.1016/j.pmcj.2025.102124
Seyed Hossein Ahmadpanah , Meghdad Mirabi , Sanaz Sobhanloo , Pania Afsharfarnia , Donya Fallah
Numerous Internet of Things (IoT) devices are connecting our world, but they also introduce new security risks—particularly in large, power-constrained networks where traditional security techniques often fail. This paper proposes a new framework for IoT security, called DeSIST (Decentralized Strategic Interaction for Secure IoT), which is grounded in game theory and Zero Trust principles. Unlike approaches that rely on centralized watchdogs or explicit trust scores, DeSIST models interactions between IoT nodes as a sequence of strategic games. Treating nodes as rational agents, each maximizes its own expected utility when making decisions. Security emerges naturally because these games are designed with reward systems that encourage cooperation among trustworthy nodes while strategically isolating malicious or non-compliant actors. DeSIST employs a lightweight Local Information Assessor (LIA) to collect immediate, local, and contextually relevant information about ongoing or anticipated interactions, and a Strategic Decision Unit (SDU) to evaluate possible strategies and select the one that maximizes expected utility. Through theoretical analysis and extensive simulations, we show that DeSIST can decentralize and resource-efficiently uphold Zero Trust principles while significantly enhancing network resilience against common IoT attacks. Compared to existing approaches, the simulation results demonstrate notable improvements in both security and performance across different attack scenarios. DeSIST provides a promising path toward strong, incentive-driven, and emergent security in the evolving IoT landscape.
许多物联网(IoT)设备正在连接我们的世界,但它们也带来了新的安全风险——特别是在传统安全技术经常失效的大型、功率受限的网络中。本文提出了一个基于博弈论和零信任原则的物联网安全新框架,称为DeSIST (Decentralized Strategic Interaction for Secure IoT)。与依赖集中监管机构或明确信任评分的方法不同,DeSIST将物联网节点之间的交互建模为一系列战略博弈。将节点视为理性代理,每个节点在做出决策时都最大化自己的预期效用。安全性自然出现,因为这些游戏设计了奖励系统,鼓励可信节点之间的合作,同时战略性地隔离恶意或不合规的参与者。DeSIST使用轻量级的本地信息评估器(Local Information Assessor, LIA)来收集有关正在进行的或预期的交互的即时、本地和上下文相关的信息,并使用战略决策单元(Strategic Decision Unit, SDU)来评估可能的策略并选择最大化预期效用的策略。通过理论分析和广泛的模拟,我们表明DeSIST可以去中心化和资源高效地维护零信任原则,同时显着增强网络抵御常见物联网攻击的弹性。与现有方法相比,仿真结果表明该方法在不同攻击场景下的安全性和性能都有显著提高。在不断发展的物联网环境中,DeSIST为实现强大、激励驱动和紧急安全提供了一条有希望的道路。
{"title":"DeSIST: Emergent security in IoT through Decentralized Strategic Interactions — A game-theoretic Zero Trust framework","authors":"Seyed Hossein Ahmadpanah ,&nbsp;Meghdad Mirabi ,&nbsp;Sanaz Sobhanloo ,&nbsp;Pania Afsharfarnia ,&nbsp;Donya Fallah","doi":"10.1016/j.pmcj.2025.102124","DOIUrl":"10.1016/j.pmcj.2025.102124","url":null,"abstract":"<div><div>Numerous Internet of Things (IoT) devices are connecting our world, but they also introduce new security risks—particularly in large, power-constrained networks where traditional security techniques often fail. This paper proposes a new framework for IoT security, called DeSIST (Decentralized Strategic Interaction for Secure IoT), which is grounded in game theory and Zero Trust principles. Unlike approaches that rely on centralized watchdogs or explicit trust scores, DeSIST models interactions between IoT nodes as a sequence of strategic games. Treating nodes as rational agents, each maximizes its own expected utility when making decisions. Security emerges naturally because these games are designed with reward systems that encourage cooperation among trustworthy nodes while strategically isolating malicious or non-compliant actors. DeSIST employs a lightweight Local Information Assessor (LIA) to collect immediate, local, and contextually relevant information about ongoing or anticipated interactions, and a Strategic Decision Unit (SDU) to evaluate possible strategies and select the one that maximizes expected utility. Through theoretical analysis and extensive simulations, we show that DeSIST can decentralize and resource-efficiently uphold Zero Trust principles while significantly enhancing network resilience against common IoT attacks. Compared to existing approaches, the simulation results demonstrate notable improvements in both security and performance across different attack scenarios. DeSIST provides a promising path toward strong, incentive-driven, and emergent security in the evolving IoT landscape.</div></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":"115 ","pages":"Article 102124"},"PeriodicalIF":3.5,"publicationDate":"2025-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145420338","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
XAI-driven multi-attention DeepCRNN for enhanced cyberattack detection in internet of medical things environments xai驱动的多关注深度神经网络用于增强医疗物联网环境下的网络攻击检测
IF 3.5 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-10-16 DOI: 10.1016/j.pmcj.2025.102123
Prashant Giridhar Shambharkar , Nikhil Sharma
The rapid proliferation of Internet of Medical Things (IoMT) devices has transformed healthcare by enabling continuous monitoring and intelligent data exchange, but it has also broadened the attack surface for cyber intrusions. Conventional intrusion detection systems (IDS) face critical challenges such as high-dimensional and imbalanced traffic patterns, dynamic data distributions, and limited adaptability in real-world IoMT settings. To overcome these limitations, we propose MA-DeepCRNN, a hybrid deep learning framework that integrates Convolutional Neural Networks (CNNs), Bidirectional LSTMs (Bi-LSTMs), and a multi-attention mechanism for robust binary and multiclass intrusion detection. The model employs a four-stage preprocessing pipeline incorporating feature augmentation, Gaussian noise injection, and categorical randomization to improve data balance and resilience. The Performance is further enhanced through epoch and batch size tuning, while an ablation study and statistical significance tests validate architectural effectiveness. Moreover, computational complexity analysis ensures suitability for resource-constrained IoMT environments, and a dual-layer explainable AI approach offers interpretability for security analysts. The Extensive experiments on the WUSTL-HDRL-2024 dataset demonstrate superior outcomes, achieving 0.9979 accuracy and 0.9966 F1-score in binary classification and 0.9823 accuracy and 0.9812 F1-score in multiclass detection. Compared with state-of-the-art, MA-DeepCRNN delivers 6–12% higher accuracy and 7–10% higher F1-score, with an overall improvement of 6.17% accuracy and 7.91% F1-score. These results establish MA-DeepCRNN as a statistically validated, interpretable, and computationally efficient IDS for real-time IoMT cybersecurity.
医疗物联网(IoMT)设备的快速普及通过实现持续监控和智能数据交换,改变了医疗保健行业,但它也扩大了网络入侵的攻击面。传统的入侵检测系统(IDS)面临着严峻的挑战,如高维和不平衡的流量模式、动态数据分布以及在实际IoMT环境中的有限适应性。为了克服这些限制,我们提出了MA-DeepCRNN,这是一种混合深度学习框架,它集成了卷积神经网络(cnn)、双向LSTMs (Bi-LSTMs)和多注意机制,用于鲁棒的二进制和多类入侵检测。该模型采用四阶段预处理流程,包括特征增强、高斯噪声注入和分类随机化,以改善数据平衡和弹性。性能通过epoch和批大小调优得到进一步增强,同时消融研究和统计显著性测试验证了体系结构的有效性。此外,计算复杂性分析确保了资源受限的IoMT环境的适用性,双层可解释的AI方法为安全分析师提供了可解释性。在WUSTL-HDRL-2024数据集上进行的大量实验显示了较好的结果,二分类准确率为0.9979,f1分数为0.9966;多类检测准确率为0.9823,f1分数为0.9812。与最先进的技术相比,MA-DeepCRNN的准确率提高了6-12%,f1分数提高了7-10%,总体准确率提高了6.17%,f1分数提高了7.91%。这些结果表明,MA-DeepCRNN是一种经过统计验证的、可解释的、计算效率高的实时IoMT网络安全IDS。
{"title":"XAI-driven multi-attention DeepCRNN for enhanced cyberattack detection in internet of medical things environments","authors":"Prashant Giridhar Shambharkar ,&nbsp;Nikhil Sharma","doi":"10.1016/j.pmcj.2025.102123","DOIUrl":"10.1016/j.pmcj.2025.102123","url":null,"abstract":"<div><div>The rapid proliferation of Internet of Medical Things (IoMT) devices has transformed healthcare by enabling continuous monitoring and intelligent data exchange, but it has also broadened the attack surface for cyber intrusions. Conventional intrusion detection systems (IDS) face critical challenges such as high-dimensional and imbalanced traffic patterns, dynamic data distributions, and limited adaptability in real-world IoMT settings. To overcome these limitations, we propose MA-DeepCRNN, a hybrid deep learning framework that integrates Convolutional Neural Networks (CNNs), Bidirectional LSTMs (Bi-LSTMs), and a multi-attention mechanism for robust binary and multiclass intrusion detection. The model employs a four-stage preprocessing pipeline incorporating feature augmentation, Gaussian noise injection, and categorical randomization to improve data balance and resilience. The Performance is further enhanced through epoch and batch size tuning, while an ablation study and statistical significance tests validate architectural effectiveness. Moreover, computational complexity analysis ensures suitability for resource-constrained IoMT environments, and a dual-layer explainable AI approach offers interpretability for security analysts. The Extensive experiments on the WUSTL-HDRL-2024 dataset demonstrate superior outcomes, achieving 0.9979 accuracy and 0.9966 F1-score in binary classification and 0.9823 accuracy and 0.9812 F1-score in multiclass detection. Compared with state-of-the-art, MA-DeepCRNN delivers 6–12% higher accuracy and 7–10% higher F1-score, with an overall improvement of 6.17% accuracy and 7.91% F1-score. These results establish MA-DeepCRNN as a statistically validated, interpretable, and computationally efficient IDS for real-time IoMT cybersecurity.</div></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":"114 ","pages":"Article 102123"},"PeriodicalIF":3.5,"publicationDate":"2025-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145362446","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Asymptotically efficient ADMM solutions for source localization using RSS measurements 使用RSS测量进行源定位的渐近有效ADMM解决方案
IF 3.5 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-10-14 DOI: 10.1016/j.pmcj.2025.102122
Xiaoping Wu , Xiang Wang , Lingfang Kong, Keqi Zhou
Received Signal Strength (RSS) measurements are widely applied in wireless localization. In this paper, standard form of Alternating Direction Method of Multipliers (ADMM) is designed for source localization using RSS. The Maximum Likelihood (ML) estimation problem of RSS-based localization is equivalent to the standard ADMM form by defining the intermediate variables. Following this, we develop the solutions to the subproblems in the ADMM structure. The convergence of the proposed ADMM solution is discussed based on the convexity analysis of the subproblems, providing the evidence for its stable performance. The simulated results show that the ADMM solution performs efficiently, especially with a small number of sensors or in the presence of high noise levels. In addition, we also verify the bias performance in the source position estimation.
接收信号强度(RSS)测量在无线定位中有着广泛的应用。本文设计了一种标准形式的交替方向乘法器(ADMM),用于RSS源定位。通过定义中间变量,将基于rss的定位的最大似然估计问题等效为标准的ADMM形式。在此基础上,给出了ADMM结构中子问题的求解方法。基于子问题的凸性分析,讨论了所提ADMM解的收敛性,为其稳定性提供了证据。仿真结果表明,在传感器数量较少或存在高噪声水平的情况下,ADMM方案具有良好的性能。此外,我们还验证了在源位置估计中的偏差性能。
{"title":"Asymptotically efficient ADMM solutions for source localization using RSS measurements","authors":"Xiaoping Wu ,&nbsp;Xiang Wang ,&nbsp;Lingfang Kong,&nbsp;Keqi Zhou","doi":"10.1016/j.pmcj.2025.102122","DOIUrl":"10.1016/j.pmcj.2025.102122","url":null,"abstract":"<div><div>Received Signal Strength (RSS) measurements are widely applied in wireless localization. In this paper, standard form of Alternating Direction Method of Multipliers (ADMM) is designed for source localization using RSS. The Maximum Likelihood (ML) estimation problem of RSS-based localization is equivalent to the standard ADMM form by defining the intermediate variables. Following this, we develop the solutions to the subproblems in the ADMM structure. The convergence of the proposed ADMM solution is discussed based on the convexity analysis of the subproblems, providing the evidence for its stable performance. The simulated results show that the ADMM solution performs efficiently, especially with a small number of sensors or in the presence of high noise levels. In addition, we also verify the bias performance in the source position estimation.</div></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":"114 ","pages":"Article 102122"},"PeriodicalIF":3.5,"publicationDate":"2025-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145333339","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
WiKAN: Lightweight Kolmogorov–Arnold Networks for accurate indoor WiFi localization WiKAN:轻量级Kolmogorov-Arnold网络,用于精确的室内WiFi定位
IF 3.5 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-10-04 DOI: 10.1016/j.pmcj.2025.102121
Yunlong Gu , Meng Xu , Jiguang Li , Qilei Li , Zhao Huang , Mengshan Li , Lixin Guan , Mikko Valkama
With the growing demand for location-based services, WiFi localization plays a critical role in indoor environments. While most existing methods rely on Multi-Layer Perceptrons (MLPs), these models often suffer from limited accuracy and poor generalization across diverse deployment conditions. Kolmogorov–Arnold Networks (KANs), with their B-spline-based basis functions, better capture complex nonlinear relationships while reducing overfitting risks. However, original KANs still incur high computational costs. To address this, we propose WiKAN(WiFi KAN), a lightweight KAN-based model for indoor WiFi localization. WiKAN reduces computational complexity by simplifying the network structure to just two KANLinear layers and replacing parameter-intensive operations with optimized matrix multiplications using reconstructed basis functions. Compared to conventional computation of basis coefficients, matrix operations enable faster inference on modern hardware and improve scalability. Furthermore, WiKAN integrates SiLU and B-spline activations through a learnable linear combination, balancing smooth approximation and nonlinear representation. Experiments on three benchmark datasets (UJIIndoorLoc, Tampere, and JARIL) demonstrate that WiKAN achieves superior performance to both MLP and standard KAN models: over 99.9% building accuracy, up to 100% floor classification, and average positioning error reduced to 5.91 meters. Additionally, runtime analysis and parameter count comparisons confirm the model’s computational efficiency. Code is publicly available at: https://github.com/gyl555666/WiKAN.
随着定位服务需求的不断增长,WiFi定位在室内环境中发挥着至关重要的作用。虽然大多数现有的方法依赖于多层感知器(mlp),但这些模型在不同的部署条件下往往存在精度有限和泛化能力差的问题。Kolmogorov-Arnold网络(KANs),其基于b样条的基函数,更好地捕捉复杂的非线性关系,同时降低过拟合风险。然而,原始的KANs仍然会产生很高的计算成本。为了解决这个问题,我们提出了WiKAN(WiFi KAN),这是一种轻量级的基于KAN的室内WiFi定位模型。WiKAN通过将网络结构简化为两个KANLinear层,并用重构基函数优化矩阵乘法取代参数密集型操作,从而降低了计算复杂度。与传统的基系数计算相比,矩阵运算可以在现代硬件上更快地进行推理并提高可扩展性。此外,WiKAN通过可学习的线性组合集成了SiLU和b样条激活,平衡了光滑逼近和非线性表示。在UJIIndoorLoc、Tampere和JARIL三个基准数据集上的实验表明,WiKAN在MLP和标准KAN模型上都取得了卓越的性能:超过99.9%的建筑精度,高达100%的楼层分类,平均定位误差降低到5.91米。此外,运行时分析和参数计数比较证实了模型的计算效率。代码可在https://github.com/gyl555666/WiKAN公开获取。
{"title":"WiKAN: Lightweight Kolmogorov–Arnold Networks for accurate indoor WiFi localization","authors":"Yunlong Gu ,&nbsp;Meng Xu ,&nbsp;Jiguang Li ,&nbsp;Qilei Li ,&nbsp;Zhao Huang ,&nbsp;Mengshan Li ,&nbsp;Lixin Guan ,&nbsp;Mikko Valkama","doi":"10.1016/j.pmcj.2025.102121","DOIUrl":"10.1016/j.pmcj.2025.102121","url":null,"abstract":"<div><div>With the growing demand for location-based services, WiFi localization plays a critical role in indoor environments. While most existing methods rely on Multi-Layer Perceptrons (MLPs), these models often suffer from limited accuracy and poor generalization across diverse deployment conditions. Kolmogorov–Arnold Networks (KANs), with their B-spline-based basis functions, better capture complex nonlinear relationships while reducing overfitting risks. However, original KANs still incur high computational costs. To address this, we propose WiKAN(WiFi KAN), a lightweight KAN-based model for indoor WiFi localization. WiKAN reduces computational complexity by simplifying the network structure to just two KANLinear layers and replacing parameter-intensive operations with optimized matrix multiplications using reconstructed basis functions. Compared to conventional computation of basis coefficients, matrix operations enable faster inference on modern hardware and improve scalability. Furthermore, WiKAN integrates SiLU and B-spline activations through a learnable linear combination, balancing smooth approximation and nonlinear representation. Experiments on three benchmark datasets (UJIIndoorLoc, Tampere, and JARIL) demonstrate that WiKAN achieves superior performance to both MLP and standard KAN models: over 99.9% building accuracy, up to 100% floor classification, and average positioning error reduced to 5.91 meters. Additionally, runtime analysis and parameter count comparisons confirm the model’s computational efficiency. Code is publicly available at: <span><span>https://github.com/gyl555666/WiKAN</span><svg><path></path></svg></span>.</div></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":"114 ","pages":"Article 102121"},"PeriodicalIF":3.5,"publicationDate":"2025-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145268085","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Pervasive and Mobile Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1