For some weeks now, the dblp team has been receiving anexceptionally high number of support and error correction requests from the community. While we are grateful and happy to process all incoming emails, please assume thatit will currently take us several weeks to read and address your request. Most importantly,please refrain from sending your request multiple times. This will not advance your issue and will only complicate and extend the time required to address it. Thank you for your understanding.
Joint Declaration:The freedom of science is at the heart of liberal, democratic societies. Without this freedom, it is impossible for scientific efforts to be geared toward gaining knowledge and facts. It is therefore extremely worrying that the scientific freedom is coming under increasing pressure in various regions of the world.(read more)
Jeonghyun Yun,Taejung Park: An Analysis of University Students' Needs for Learning Support Functions of Learning Management System Augmented with Artificial Intelligence Technology.1-15
Wen Chen,Lang Li,Ying Guo: DABC: A dynamic ARX-based lightweight block cipher with high diffusion.165-184
Wireless Communication
Yingying Fang,Qi Zhang: Grant-Free Random Access in Multicell Massive MIMO Systems with Mixed-Type Devices: Backoff Mechanism Optimizations under Delay Constraints.185-201
Guosheng Li: Optimal Power Allocation for NOMA-based Cellular Two-Way Relaying.202-215
Ashok J,Sowmia K. R,Jayashree K,Priya Vijay: A Novel Grasshopper Optimization-based Particle Swarm Algorithm for Effective Spectrum Sensing in Cognitive Radio Networks.520-541
YeJin Wee,OnSeok Lee: Proposal for a Sensory Integration Self-system based on an Artificial Intelligence Speaker for Children with Developmental Disabilities: Pilot Study.1216-1233
Pan Wu,Zhen Hua,Jinjiang Li: PATN: Polarized Attention based Transformer Network for Multi-focus image fusion.1234-1257
Security & Privacy
Muthakshi S,Mahesh K: Long-Term Container Allocation via Optimized Task Scheduling Through Deep Learning (OTS-DL) And High-Level Security.1258-1275
Wireless Communication
J. Samuel Manoharan: A Metaheuristic Approach Towards Enhancement of Network Lifetime in Wireless Sensor Networks.1276-1295
Thi-Linh Ho,Anh-Cuong Le,Dinh-Hong Vu: Enhancing Recommender Systems by Fusing Diverse Information Sources through Data Transformation and Feature Selection.1413-1432
Damodharan Kuttiyappan,V. Rajasekar: Improving the Cyber Security over Banking Sector by Detecting the Malicious Attacks Using the Wrapper Stepwise Resnet Classifier.1657-1673
Fangmin Xu,Jinzhao Fu,Haiyan Cao,Zhirui Hu: RIS Selection and Energy Efficiency Optimization for Irregular Distributed RIS-assisted Communication Systems.1823-1840
S. Velmurugan,P. Ezhumalai,E. A. Mary Anita: Artificial Neural Network with Firefly Algorithm-Based Collaborative Spectrum Sensing in Cognitive Radio Networks.1951-1975
Volume 17, Number 8, August 2023
Artificial Intelligence & Big Data
Yuantian Xia,Shuhan Lu,Longhe Wang,Lin Li: Center point prediction using Gaussian elliptic and size component regression using small solution space for object detection.1976-1995
Bharathiraja S,S. Selvamuthukumaran,V. Balaji: Energy Efficient Cluster Head Selection and Routing Algorithm using Hybrid Firefly Glow-Worm Swarm Optimization in WSN.2140-2156
Daofu Liu,Rui Guo: Minimum Row Weight and Polar Spectrum Based Puncture Polar Codes Construction Algorithm.2157-2169
Jianxiong Li,Hailong Jiang: Research on The SWIPT System Throughput Based on Interference Signal Energy Collecting.2170-2187
Ha Sung Hwang,Liucun Zhu,Qin Cui: Development and Validation of a Digital Literacy Scale in the Artificial Intelligence Era for College Students.2241-2258
Weijian Zhou,Azharul Islam,KyungHi Chang: Real-time RL-based 5G Network Slicing Design and Traffic Model Distribution: Implementation for V2X and eMBB Services.2573-2589
Qiannan Guo,Jinzhe Yan: The Impact of Online Reviews on Hotel Ratings through the Lens of Elaboration Likelihood Model: A Text Mining Approach.2609-2626
Bonghyun Kim: Implementation of Falling Accident Monitoring and Prediction System using Real-time Integrated Sensing Data.2987-3002
IoT & Application
Emre Karakoç,Celal Çeken: Secure SLA Management Using Smart Contracts for SDN-Enabled WSN.3003-3029
Internet Services & Management
Ning Wang,Huiqing Wang,Xiaoting Wang: Service Deployment Strategy for Customer Experience and Cost Optimization under Hybrid Network Computing Environment.3030-3049
Long Cheng,Jiayin Guan: An Indoor Localization Algorithm based on Improved Particle Filter and Directional Probabilistic Data Association for Wireless Sensor Network.3145-3162
Leiruo Zhou,Yunlong Duan,Wei Wei: Research on the Financial Data Fraud Detection of Chinese Listed Enterprises by Integrating Audit Opinions.3218-3241
Hung-Cuong Trinh,Van-Huy Pham,Anh Hoang Vo: Remaining Useful Life Estimation based on Noise Injection and a Kalman Filter Ensemble of modified Bagging Predictors.3242-3265
To protect your privacy, all features that rely on external API calls from your browser areturned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more informationsee our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API ofunpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking theUnpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API ofarchive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking theInternet Archive privacy policy.
Reference lists
Add a list of references from,, and to record detail pages.
Privacy notice: By enabling the option above, your browser will contact the APIs ofcrossref.org,opencitations.net, andsemanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking theCrossref privacy policy and theOpenCitations privacy policy, as well as theAI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
Privacy notice: By enabling the option above, your browser will contact the API ofopencitations.net andsemanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking theOpenCitations privacy policy as well as theAI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from.
Privacy notice: By enabling the option above, your browser will contact the API ofopenalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given byOpenAlex.
last updated on 2025-07-02 19:10 CEST by thedblp team