Security and Communication Networks

Table of Contents

Table of Contents

  • Security and Communication Networks -
  • Special Issue
  • - Volume 2022
  • - Article ID 1987933
  • - Research Article

Service-Oriented Modeling for Blockchain-Enabled Supply Chain Quality Information Systems

Yani Shi | Jiji Ying | ... | Jiaqi Yan
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2022
  • - Article ID 7378801
  • - Research Article

[Retracted] A Dynamic Density Peak Clustering Algorithm Based on K-Nearest Neighbor

Hui Du | Qiaofeng Zhai | ... | Manjie Zhang
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2022
  • - Article ID 3224674
  • - Research Article

[Retracted] The Integration Mechanism of Music Intangible Cultural Heritage and Tourism Industry in the Internet of Things Environment

Lu Chen | ZhongLai Zhang
  • Security and Communication Networks -
  • Special Issue
  • Volume 2022
  • - Article ID 8080301
  • - Research Article

An Efficient Multiscale Pyramid Attention Network for Face Detection in Surveillance Images

Ming Liu | Ruijie Cai | ... | Qichao Yang
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2022
  • - Article ID 6498468
  • - Research Article

[Retracted] Copyright Protection and Data Reliability of AI-Written Literary Creations in Smart City

Chenlin Wei
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2022
  • - Article ID 7864665
  • - Research Article

[Retracted] Analysis of Risk Assessment of Overseas Infrastructure Projects Integrating BP-ANN Algorithm

Chengni Li | Jian Zhou
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2022
  • - Article ID 6540710
  • - Research Article

[Retracted] Value Assessment for a Theory-Oriented Flipped Classroom of Physical Education Based on Multi-Source Data Analysis

Na Li
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2022
  • - Article ID 3985519
  • - Research Article

[Retracted] Algorithm Model Design of the Aging Transformation Scheme of Computer Intelligent Aided Technology under the Background of Rural Revitalization

Yan Pan
  • Security and Communication Networks -
  • Special Issue
  • Volume 2022
  • - Article ID 3116682
  • - Research Article

An Authentication and Key Agreement Scheme Based on Roadside Unit Cache for VANET

Sun Mei | Guo Yuyan | ... | Jiang Mingming
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2022
  • - Article ID 3025374
  • - Research Article

[Retracted] An Intelligent Assessment Method of English Teaching Ability Based on Improved Machine Learning Algorithm

Liu Narengerile | Li Di
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2022
  • - Article ID 2815078
  • - Research Article

[Retracted] Water Quality Substance Detection System Based on Internet of Things

Jing Zhang
  • Security and Communication Networks -
  • Special Issue
  • Volume 2022
  • - Article ID 1330251
  • - Research Article

Key-Value Data Collection with Distribution Estimation under Local Differential Privacy

Xiaoguang Li | Haonan Yan | ... | Fenghua Li
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2022
  • - Article ID 9116484
  • - Research Article

[Retracted] Optimization of Economic Development Path in Western Region under Background of “the Belt and Road Initiative” Based on Intelligent Internet of Things

Jianqiu Jiao
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2022
  • - Article ID 6322570
  • - Research Article

[Retracted] Quality Evaluation and Satisfaction Analysis of Online Learning of College Students Based on Artificial Intelligence

Shangzi Yun | Yongfeng Bai | Baek Jongnam
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2022
  • - Article ID 5053726
  • - Research Article

[Retracted] On English Courses and Teaching Strategies in Compound Application-Oriented Talents Training Based on the Education Ideas of CDIO in the Construction of Smart Cities

Zhengyan Xie
Security and Communication Networks
Publishing Collaboration
More info
Wiley Hindawi logo
 Journal metrics
See full report
Acceptance rate10%
Submission to final decision143 days
Acceptance to publication35 days
CiteScore2.600
Journal Citation Indicator-
Impact Factor-
 Submit Evaluate your manuscript with the free Manuscript Language Checker

We have begun to integrate the 200+ Hindawi journals into Wiley’s journal portfolio. You can find out more about how this benefits our journal communities on our FAQ.