default search action
16th WASA 2021: Nanjing, China - Part II
- Zhe Liu, Fan Wu, Sajal K. Das:
Wireless Algorithms, Systems, and Applications - 16th International Conference, WASA 2021, Nanjing, China, June 25-27, 2021, Proceedings, Part II. Lecture Notes in Computer Science 12938, Springer 2021, ISBN 978-3-030-86129-2
Scheduling and Optimization II
- Lanlan Li, Yue Zhao, Haipeng Dai, Xiaoyu Wang, Guihai Chen:
Scheduling of Mobile Charger with Multiple Antennas. 3-17 - Wenchao Wang, Jinghua Zhu, Heran Xi:
Sequential Recommendation via Temporal Self-Attention and Multi-Preference Learning. 18-30 - Yuanyuan Xu, Chen Dai, Lujiu Li:
Multi-connection Based Scalable Video Streaming in UDNs: A Multi-armed Bandit Approach. 31-42
Security
- Yimo Ren, Hong Li, Hongsong Zhu, Limin Sun:
FIUD: A Framework to Identify Users of Devices. 45-57 - Zhaoqian Jia, Wenchao Wang, Shaoqi Hou, Ye Li, Guangqiang Yin:
SAPN: Spatial Attention Pyramid Network for Cross-Domain Person Re-Identification. 58-69 - Shiyuan Xu, Xue Chen, Chao Wang, Yunhua He, Ke Xiao, Yibo Cao:
A Lattice-Based Ring Signature Scheme to Secure Automated Valet Parking. 70-83 - Leiqi Wang, Weiqing Huang, Qiujian Lv, Yan Wang, Haiyan Chen:
AOPL: Attention Enhanced Oversampling and Parallel Deep Learning Model for Attack Detection in Imbalanced Network Traffic. 84-95 - Shu-shu Shao, Hui Xia, Rui Zhang, Xiangguo Cheng:
Greedy-Based Black-Box Adversarial Attack Scheme on Graph Structure. 96-106 - Guang Fan, Fangyu Zheng, Jiankuo Dong, Jingqiang Lin, Lili Gao, Rong Wei, Lipeng Wan:
SECCEG: A Secure and Efficient Cryptographic Co-processor Based on Embedded GPU System. 107-122 - Zhangtan Li, Liang Cheng, Yang Zhang, Dengguo Feng:
Understanding and Mitigating Security Risks of Network on Medical Cyber Physical System. 123-134 - Ningwei Peng, Xuan Liu, Shigeng Zhang:
RF-Ubia: User Biometric Information Authentication Based on RFID. 135-146 - Jianguo Jiang, Chenghao Wang, Min Yu, Chenggang Jia, Gang Li, Chao Liu, Weiqing Huang:
NFDD: A Dynamic Malicious Document Detection Method Without Manual Feature Dictionary. 147-159 - Xu Yu, Fayang Wan, Junwei Du, Feng Jiang, Lantian Guo, Junyu Lin:
Bug Triage Model Considering Cooperative and Sequential Relationship. 160-172 - Yanbin Li, Yuxin Huang, Ming Tang, Shougang Ren, Huanliang Xu:
Adaptive Chosen Plaintext Side-Channel Attacks for Higher-Order Masking Schemes. 173-185 - Zihao Li, Weizhi Meng:
Mind the Amplification: Cracking Content Delivery Networks via DDoS Attacks. 186-197 - Wenhao Mou, Chunlei Fu, Yan Lei, Chunqiang Hu:
A Verifiable Federated Learning Scheme Based on Secure Multi-party Computation. 198-209 - Jiankuo Dong, Guang Fan, Fangyu Zheng, Jingqiang Lin, Fu Xiao:
TX-RSA: A High Performance RSA Implementation Scheme on NVIDIA Tegra X2. 210-222
Data Center Networks and Cloud Computing
- Anqi Liu, Xin Guan, Di Sun, Haiyang Jiang, Chen Cui, Dawei Fang:
Short Term Voltage Stability Assessment with Incomplete Data Based on Deep Reinforcement Learning in the Internet of Energy. 225-236 - Yaofeng Tu, Yinjun Han, Hao Jin, Zhenghua Chen, Yanchao Zhao:
RDMA Based Performance Optimization on Distributed Database Systems: A Case Study with GoldenX. 237-248 - Yunhao Xiao, Xi Xiao, Fang Tian, Guangwu Hu:
A LambdaMart-Based High-Accuracy Approach for Software Automatic Fault Localization. 249-261 - Taiwei Ling, Xin Zhu, Xiaolei Zhou, Shuai Wang:
ParkLSTM: Periodic Parking Behavior Prediction Based on LSTM with Multi-source Data for Contract Parking Spaces. 262-274
Privacy-Aware Computing
- Yangsu Liu, Chaoli Zhang, Zhenzhe Zheng, Guihai Chen:
Cost-Sharing Mechanism Design for Social Cost Minimization in Ridesharing Systems. 277-289 - Con-Gdong Lv, Xiaodong Zhang, Zhoubao Sun:
Privacy Protection Framework for Credit Data in AI. 290-302 - Xiaowu Liu, Wenshuo Ma, Jiguo Yu, Kan Yu, Jiaqi Xiang:
A Secret-Sharing-based Security Data Aggregation Scheme in Wireless Sensor Networks. 303-313 - Xue Liu, Shigeng Zhang, Huihui Li, Weiping Wang:
Fast Application Activity Recognition with Encrypted Traffic. 314-325 - Songwei Li, Zhen Wang, Chi Zhang, Lingbo Wei, Jianqing Liu, Ying Ma, Yuguang Fang:
A Privacy-Preserving Peer-to-Peer Accommodation System Based on a Credit Network. 326-337 - Hang Fu, Wei Yang, Liusheng Huang:
Private Frequent Itemset Mining in the Local Setting. 338-350
Internet of Vehicles
- Yifan Chang, Chao Li, Zhiqiang Li, Zhiguo Wang, Guangqiang Yin:
DAFV: A Unified and Real-Time Framework of Joint Detection and Attributes Recognition for Fast Vehicles. 353-365 - Man Xiong, Changyan Yi, Kun Zhu:
Vehicular Path Planning for Balancing Traffic Congestion Cost and Fog Computing Reward: A Routing Game Approach. 366-377 - Jiawen Liu, Shuaipeng Zhang, Hong Liu, Yan Zhang:
Distributed Collaborative Anomaly Detection for Trusted Digital Twin Vehicular Edge Networks. 378-389 - Xiying Fan, Bin Fu:
Optimal Resource Allocation in Time-Varying Vehicular Networks with Delay Constraints. 390-401 - Hu Xu, Jiequ Ji, Kun Zhu, Ran Wang:
Deep Reinforcement Learning for Resource Allocation in Multi-platoon Vehicular Networks. 402-416 - Biwei Wu, Xiaoxuan Zhu, Xiang Liu, Jiahui Jin, Runqun Xiong, Weiwei Wu:
Revenue Maximization of Electric Vehicle Charging Services with Hierarchical Game. 417-429 - Dong Li, Kai Liu, Feiyu Jin, Weiwei Wu, Xianlong Jiao, Songtao Guo:
Adaptive Uplink/Downlink Bandwidth Allocation for Dual Deadline Information Services in Vehicular Networks. 430-441 - Yue Zhang, Guoping Tan, Siyuan Zhou:
A Local Collaborative Distributed Reinforcement Learning Approach for Resource Allocation in V2X Networks. 442-454
Visual Computing for IoT
- Genji Yuan, Jianbo Li, Zhiqiang Lv, Yinong Li, Zhihao Xu:
DDCAttNet: Road Segmentation Network for Remote Sensing Images. 457-468 - Yusheng Qiu, Xiangmao Chang:
Fine-Grained Measurements of Repetitions on Performance of NB-IoT. 469-480 - Chengling Jiang, Zihui Luo, Liang Liu, Xiaolong Zheng:
Deep Reinforcement Learning Based Intelligent Job Batching in Industrial Internet of Things. 481-493 - Jingxiu Yang, Lu Zhou, Liang Liu, Zuchao Ma:
ORMD: Online Learning Real-Time Malicious Node Detection for the IoT Network. 494-509 - Yuting Wu, Yulei Liu, Liang Liu, Feng Wang, Lihong Fan, Qian Zhou:
TFRA: Trajectory-Based Message Ferry Recognition Attack in UAV Network. 510-522
Mobile Ad-Hoc Networks
- Yunlong Xiang, Zhenzhe Zheng, Yuben Qu, Guihai Chen:
Scaling DCN Models for Indoor White Space Exploration. 525-537 - Feng Liang, Anming Dong, Jiguo Yu, You Zhou:
Deep Learning-Based Power Control for Uplink Cognitive Radio Networks. 538-549 - Fei Tong, Rucong Sui, Yujian Zhang, Wan Tang:
MPDC: A Multi-channel Pipelined Data Collection MAC for Duty-Cycled Linear Sensor Networks. 550-562 - Zhigang Feng, Xiaoqin Song, Lei Lei:
Efficient Concurrent Transmission Scheme for Wireless Ad Hoc Networks: A Joint Optimization Approach. 563-574 - Siyuan Hong, Xiaozhen Lu, Liang Xiao, Guohang Niu, Helin Yang:
Reinforcement Learning Based Sensor Encryption and Power Control for Low-Latency WBANs. 575-586 - Jie Wang, Lei Lei, Shengsuo Cai, Mengfan Yan:
Modeling the Instantaneous Saturation Throughput of UAV Swarm Networks. 587-599 - Jia Yang, Kun Zhu, Xiaojun Zhu, Junhua Wang:
Learning-Based Aerial Charging Scheduling for UAV-Based Data Collection. 600-611 - Bolei Zhang, Junliang Liu, Fu Xiao:
Learning to Communicate for Mobile Sensing with Multi-agent Reinforcement Learning. 612-623 - Wenjuan Li, Weizhi Meng, Yu Wang, Jin Li:
Enhancing Blackslist-Based Packet Filtration Using Blockchain in Wireless Sensor Networks. 624-635
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.