For some weeks now, the dblp team has been receiving anexceptionally high number of support and error correction requests from the community. While we are grateful and happy to process all incoming emails, please assume thatit will currently take us several weeks to read and address your request. Most importantly,please refrain from sending your request multiple times. This will not advance your issue and will only complicate and extend the time required to address it. Thank you for your understanding.
Joint Declaration:The freedom of science is at the heart of liberal, democratic societies. Without this freedom, it is impossible for scientific efforts to be geared toward gaining knowledge and facts. It is therefore extremely worrying that the scientific freedom is coming under increasing pressure in various regions of the world.(read more)
Special Issue on AI-Driven Sensing and Computing for Cyber-Physical Systems
Chong Tian,Xiqiu Hu: Mathematical modeling of security impact analysis of communication network based on Monte Carlo algorithm.20-27
Special Issue on Artificially Intelligent Green Communication Networks for 5G and Beyond
Chao Wang,Jilian Guo,Anwei Shen: Sensitivity analysis of censoring data from component failure analysis and reliability evaluation for the aviation internet of things.28-37
Special Issue on Enabling Cognitive Smart Cities:Security and Privacy in IoT applications
Special Issue on Internet of Things and Augmented Reality in the age of 5G
Lei Yu,Babar Nazir,Yinling Wang: Intelligent power monitoring of building equipment based on Internet of Things technology.76-84
Special Issue on Enabling Cognitive Smart Cities:Security and Privacy in IoT applications
Xuesong Zhang: Automatic underground space security monitoring based on BIM.85-91
Regular Articles
Robson D. A. Timoteo,Daniel C. Cunha: A scalable fingerprint-based angle-of-arrival machine learning approach for cellular mobile radio localization.92-101
Special Issue on Enabling Cognitive Smart Cities:Security and Privacy in IoT applications
Fazeel Abid,Chen Li,Muhammad Alam: Multi-source social media data sentiment analysis using bidirectional recurrent convolutional neural networks.102-115
Special Issue on Disaster Management using IoT, Big Data & Cloud Computing
Hanxin Chen,Yongting Chen,Liu Yang: Intelligent early structural health prognosis with nonlinear system identification for RFID signal analysis.150-161
Special Issue on Intelligent Resource Management in Mobile Edge Computing for IIoT applications
Jindong Zhao,Xingzuo Yue: Condition monitoring of power transmission and transformation equipment based on industrial internet of things technology.204-212
Special Issue on Internet of Things and Augmented Reality in the age of 5G
Kai Li,Wei Sun: Presentation and interaction of Internet of Things data based on augmented reality.213-220
Special Issue on AI-Driven Sensing and Computing for Cyber-Physical Systems
Zhe Yao,Kun Gao: User recommendation method based on joint probability matrix decomposition in CPS networks.221-231
Special Issue on Enabling Cognitive Smart Cities:Security and Privacy in IoT applications
Shulei Wu,Huandong Chen: Smart city oriented remote sensing image fusion methods based on convolution sampling and spatial transformation.444-450
Regular Articles
Fangfang Xue,Jumin Zhao,Dengao Li: Precise localization of RFID tags using hyperbolic and hologram composite localization algorithm.451-460
manage site settings
To protect your privacy, all features that rely on external API calls from your browser areturned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more informationsee our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API ofunpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking theUnpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API ofarchive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking theInternet Archive privacy policy.
Reference lists
Add a list of references from,, and to record detail pages.
Privacy notice: By enabling the option above, your browser will contact the APIs ofcrossref.org,opencitations.net, andsemanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking theCrossref privacy policy and theOpenCitations privacy policy, as well as theAI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
Privacy notice: By enabling the option above, your browser will contact the API ofopencitations.net andsemanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking theOpenCitations privacy policy as well as theAI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from.
Privacy notice: By enabling the option above, your browser will contact the API ofopenalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given byOpenAlex.
last updated on 2025-07-18 00:36 CEST by thedblp team