default search action
MASS Workshops 2019: Monterey, CA, USA
- 16th IEEE International Conference on Mobile Ad Hoc and Sensor Systems Workshops, MASS Workshops 2019, Monterey, CA, USA, November 4-7, 2019. IEEE 2019, ISBN 978-1-7281-4121-3
- Huhua Li, Dongyang Zhan, Tianrui Liu, Lin Ye:
Using Deep-Learning-Based Memory Analysis for Malware Detection in Cloud. 1-6 - Han Wang, Luis Barriga, Arash Vahidi, Shahid Raza:
Machine Learning for Security at the IoT Edge - A Feasibility Study. 7-12 - Hui Shang, Zaobo He:
Kin Genomic Data Inference Attacks Through Factor Graph. 13-18 - Yiyun Zhou, Meng Han, Liyuan Liu, Jing He, Xi Gao:
The Adversarial Attacks Threats on Computer Vision: A Survey. 25-30 - Zhifeng He, Meng Han, Bing Han:
Pattern-Adaptive Time Series Prediction via Online Learning and Paralleled Processing using CUDA. 31-36 - Yonghua Yu, Changyang Li, Mainuddin Ahmad Jonas, Chuanhao Ma, Faysal Hossain Shezan, Siyuan Shen, Peng Gao, Yuan Tian:
Detecting Abnormal Behaviors in Smart Home. 37-42 - Joshua Brockschmidt, Jiacheng Shang, Jie Wu:
On the Generality of Facial Forgery Detection. 43-47 - Dominik Danko, Suat Mercan, Mumin Cebe, Kemal Akkaya:
Assuring the Integrity of Videos from Wireless-Based IoT Devices using Blockchain. 48-52 - Andrew Quijano, Kemal Akkaya:
Server-Side Fingerprint-Based Indoor Localization Using Encrypted Sorting. 53-57 - Nathaniel Redden, Ben Bernard, Jeremy Straub:
Creating Simple Adversarial Examples for Speech Recognition Deep Neural Networks. 58-62 - Ralph Castro, N. Sertac Artan:
Adaptive Sampling for Low-Power Wearable and Implantable Devices. 63-66 - Charles Kinzel, Jacob Marchio, Saad Biaz, Richard Chapman:
Multiplatform Stereoscopic 3D Terrain Mapping for UAV Localization. 67-71 - Celina Zhou, Clara Luisa Bryan, Evan Wang, N. Sertac Artan, Ziqian Dong:
Cognitive Distraction to Improve Cybersickness in Virtual Reality Environment. 72-76 - Kameron Carr, Jacob Rojas, Xiao Chen:
Autonomous Refueling Strategies using Vehicle-to-Infrastructure Communication in Smart Cities. 77-81 - Sara Pohland, Sylvia L. Herbert, Claire J. Tomlin:
Efficient Safe Learning for Robotic Systems in Unstructured Environments. 82-86 - Luke Baird, Zhiyong Shan, Vinod Namboodiri:
Automated Dynamic Detection of Self-Hiding Behavior. 87-91 - Derek Roberts, Ying Zhu:
Motion Tracking for Volumetric Motion Capture Data. 92-96 - Kevin Kerliu, Alexandra Ross, Gong Tao, Zelin Yun, Zhijie Shi, Song Han, Shengli Zhou:
Secure Over-The-Air Firmware Updates for Sensor Networks. 97-100 - Charmaine Beluso, Anfeng Xu, Eamon Patamasing, Brian Sebastian, Eric Lo, Curt Schurgers, Ryan Kastner, Liren Chen, Xuanyi Yu, Dan Sturm, Robert Barlow:
D-SEA: The Underwater Depth Sensing Device for Standalone Time-Averaged Measurements. 101-105 - Lillian Le, Abu Nadim M. H. Kabir, Chunyan Ji, Sunitha Basodi, Yi Pan:
Using Transfer Learning, SVM, and Ensemble Classification to Classify Baby Cries Based on Their Spectrogram Images. 106-110 - Ryan Mower, Ben Bernard, Jeremy Straub:
Graphics Card Based Fuzzing. 111-115 - Ahmed Yago, Nathan Eli Solórzano, Omar N. Nezamuddin, Euzeli Cipriano dos Santos:
Dual Output Isolated DC-DC Full-Bridge Converter with Six Power Switches. 116-120 - Vinayak Tanksale:
Intrusion Detection For Controller Area Network Using Support Vector Machines. 121-126 - Carl Cheng, Yu Shen, Patrick Liu:
Optimizing Traditional Transforms for Vehicular Network Sign Classification. 127-132 - Emad A. Felemban, Adil Amjad Sheikh:
HYLOC - A Hybrid Localization and Communication System for Vehicles in Mixed Terrain Environments. 133-139 - Preston Porter, Shuhui Yang, Xuefeng Xi:
The Design and Implementation of a RESTful IoT Service Using the MERN Stack. 140-145 - Shenghui Chen, Zhiming Fan, Haiying Shen, Lu Feng:
Performance Modeling and Verification of Load Balancing in Cloud Systems Using Formal Methods. 146-151 - Karen H. Thurston, Daniel Conte de Leon:
MACH-2K Architecture: Building Mobile Device Trust and Utility for Emergency Response Networks. 152-157 - Beomsu Kim, Daniel Godfrey Majengo, Ki-Il Kim, Bongsoo Roh, Jae-Hyun Ham:
Dynamic Timer Based on Expected Link Duration in Mobile Ad Hoc Networks. 158-159 - Sangwoo Jung, Beomsu Kim, Ki-Il Kim, Bongsoo Roh, Jae-Hyun Ham:
Implementation of AODV-UU on Linux 4.15 Kernel. 160-161 - Takamasa Higuchi, Seyhan Ucar, Onur Altintas:
Offloading Tasks to Vehicular Virtual Edge Servers. 162-163 - Seyhan Ucar, Takamasa Higuchi, Onur Altintas:
Lane Change Advisory by Vehicular Micro Clouds. 164-165 - Ce Pang, Chenxi Qiu, Ning Wang:
A Geo-Obfuscation Approach to Protect Worker Location Privacy in Spatial Crowdsourcing Systems. 166-167 - Chanjun Chun, Kwang Myung Jeon, Taewoon Kim, Wooyeol Choi:
Drone Noise Reduction using Deep Convolutional Autoencoder for UAV Acoustic Sensor Networks. 168-169 - Seunghyn Hwang, Heeseok Choi, Heon-Chang Yu:
Implementation of Low-Latency Message Delivery for Serverless Based Workflow. 170-171 - Abdur R. Shahid, Niki Pissinou, Laurent Njilla, Edwin Aguilar, Eric Perez:
Demo: Towards the Development of a Differentially Private Lightweight and Scalable Blockchain for IoT. 172-173 - Jeffrey Wang, Ning Wang:
An Experimental Study of Cellular Data Offloading in Urban and University Scenarios. 174-175 - Arie Haenel, Yoram Haddad, Zonghua Zhang:
Performance Evaluation of Sensors Lightweight Security Mechanism. 176-177 - Carlos Pupiales, Walter Nitzold, Clemens Felber, Ilker Demirkol:
Software-Based Implementation of Dual Connectivity for LTE. 178-179 - Phillip Smith, Anh Luong, Shamik Sarkar, Harsimran Singh, Neal Patwari, Sneha Kumar Kasera, Kurt Derr, Samuel Ramirez:
Demo Abstract: Cost-Effective Crowdsensing: Spectrum Monitoring with Sitara. 180-181 - Mingyu Park, Jeongyeup Paek:
SCoRe: Scheduling Commands and Responses for Multihop Low-Power Wireless Network. 182-183 - Klement Streit, Raphael Labaca Castro, Nils Rodday, Gabi Dreo Rodosek:
Topology Update Algorithm for Wireless Networks. 184-185
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.