default search action
iThings/GreenCom/CPSCom/SmartData/Cybermatics 2024: Copenhagen, Denmark
- 2024 IEEE International Conferences on Internet of Things (iThings) and IEEE Green Computing & Communications (GreenCom) and IEEE Cyber, Physical & Social Computing (CPSCom) and IEEE Smart Data (SmartData) and IEEE Congress on Cybermatics, Copenhagen, Denmark, August 19-22, 2024. IEEE 2024, ISBN 979-8-3503-5163-7
- Tanjina Islam, Ana Oprescu, Zoltán Ádám Mann, Sander Klous:
A Framework to Optimize the Energy Cost of Securing Neural Network Inference. 1-8 - Ruihao Chen, Chengcheng Lyu, Wenzhao Wang, Hui Lin, Qingxin Lin:
A Containerized IoT Simulation Environment for Network Warfare Training. 1-8 - Jiapeng Wang, Zhihan Zheng, Kefan Qiu, Yu-an Tan, Chen Liang, Wenjuan Li:
A Framework for BMC Firmware Vulnerability Analysis and Exploitation. 9-16 - Minhao Zhu, Huanhuan Gu, Xun Che, Jingfei Chen, Qian Zhao, Fan Liu, Yu Zheng:
A Novel Diversified API Recommendation for Power System Sensors. 17-22 - Huanhuan Gu, Jing Shang, Xun Che, Qian Zhao, Pengchuan Wang, Jingfei Chen, Fan Liu:
A Secure Ethernet Passive Optical Network Protocol for Industrial Internet of Things. 23-30 - Sheng Wang, Chun Chen, Bing Han, Jun Zhu:
A Trusted and Decentralized Federated Learning Framework for IoT devices in Smart City. 31-37 - Yanmei Jiao, Kiminori Sato, Bo Wu:
A Walk-through Type Authentication System using Real-Time Gaze & Motion Detection. 38-43 - Zakaria Benomar, Marco Garofalo, Nikolaos Georgantas, Francesco Longo, Giovanni Merlino, Antonio Puliafito:
Bridging IoT Protocols with the Web of Things: A Path to Enhanced Interoperability. 44-51 - Weiheng Fu, Rongzhong Chen, Kaiwen Chen, Xiaojun Xie:
Civil Engineering Design in IoT: Leveraging Improved Swarm Intelligence Optimization. 52-59 - Chunling Dong, Yu Feng:
Cubic-DUCAG: A New Modeling and Probabilistic Computing Approach for Cyclic Network Attacks. 60-66 - Hugo Hadjur, Doreid Ammar, Laurent Lefèvre:
Deep Reinforcement Learning for Energy-efficient Selection of Embedded Services at the Edge. 67-74 - Bochun Du, Long Qu:
Deep Reinforcement Learning-Based AoI Minimization in UAV-Assisted Multi-Platoon Vehicular Networks. 75-81 - Zhongliao Yang, Zhengye Xie, Chen Dong, Xinmin Fan, Zhenyi Chen:
Digital Microfluidic Biochips Test Path Planning Based on Swarm Intelligence Optimization and Internet of Things Technology. 82-89 - Chengyu Lin, Xiaoding Wang, Hui Lin:
Elevating Smart Contract Defenses: A Coordinated NLP-Based Strategy for Vulnerability Detection. 90-97 - Shuang Fu, Xiangping Bryce Zhai, Changyan Yi, Lei Pang, Chee Wei Tan:
Energy Efficient and Low Latency Computation Offloading via Truly PPO in Mobile Edge Computing Networks with Multi-UAV. 98-104 - Jun Tang, Jingpeng Sun, Bing Guo, Yan Shen, Shengxin Dai, Peng Wang:
Enhancing Sales Forecasting Accuracy in the Presence of Missing Data. 105-111 - Raoof Doorshi, Hajira Saleem, Reza Malekian:
Enhancing Visual Inertial Odometry Performance using Deep Learning-based Sensor Fusion. 112-117 - Junling Wang, Dongyang Wu, Yupeng Wang:
IoT Meets Computer Vision: An Improved Detection of Tomato Pests and Diseases. 118-123 - Huixia Lai, Fan Zhou, Bo Wang, Hongrui Chen, Shi Zhang:
Local-GAN: An Anomaly Detection Method Based on Local Key Features and GAN for IoT. 124-132 - Jingjing Lin, Jingsong Lin, Chenxi Lyu, Xinmin Fan, Chen Dong:
malDetect: Malware Classification Using API Sequence and Comparison with Transformer Encoder. 133-140 - Jiali Hu, Long Qu, Qinglin Song, Ran Zhu:
Minimizing Data Transmission Delay in Vehicular Networks through Network Coding-based Broadcasting. 141-148 - Keito Inoshita, Xiaokang Zhou, Shohei Shimizu:
Multi-Domain and Multi-View Oriented Deep Neural Network for Sentiment Analysis in Large Language Models. 149-156 - Shiyu Chen, Qianmu Li:
Prediction of Social Influence in Social Networks. 157-162 - Chung-Ming Huang, Chia-Hsiang Chen, Jianhua Ma:
Priority-Considered Channel Access for Registration-Backoff-Time (RBT) -based IEEE 802.11ah IOT Network. 163-170 - Alireza Famili, Amin Tabrizian, Tolga O. Atalay, Angelos Stavrou:
RADIO: Reinforcement Learning-Aided Deployment of Wi-Fi Routers in 5G Networks for Indoor Drone Orchestrating. 171-178 - Xin Jin, Shiyu Chen:
Recommendation Algorithm Based on Social Influence Diffusion. 179-184 - Yifei Wang, Mengzhu Pan, Qianmu Li:
TGIEN: An Interpretable Image Editing Method for IoT Applications Based on Text Guidance. 185-192 - Honglei Fu, Pan Wang, Xuejiao Chen:
The Pipeline of VAE base Network Traffic Anomaly Detection Algorithm. 193-199 - Olha Boiko, Anton Komin, Vira Shendryk, Reza Malekian, Paul Davidsson:
TinyML on Mobile Devices for Hybrid Energy Management Systems. 200-207 - Pan Wang, Minyao Liu, Zeyi Li, Zixuan Wang, Xuejiao Chen:
Unsupervised Real-Time Flow Data Drift Detection Based on Model Logits for Internet of Things Network Traffic Classification. 208-215 - Ravindi de Silva, Arkady B. Zaslavsky, Seng W. Loke, Prem Prakash Jayaraman:
A Comparative Analysis of Query Generation Methods for IoT Middleware Evaluation. 216-223 - Xun Che, Yu Zheng, Minhao Zhu, Qianmu Li, Xu Dong:
A Domain-Adaptive Large Language Model With Refinement Framework For IoT Cybersecurity. 224-229 - Jing Song, Changkai Zhang, Xun Che:
The integrated monitoring system for rail transit and the switching method for the main and backup control centers. 230-234 - Difeng Zhu, Hang Zhou, Anchen Lin, Binbin Zhou:
A Dynamic Risk-aware Routing Recommendation Using Deep Reinforcement Learning. 235-240 - Jianxiang Cao, Xing Song, Wenqian Shang:
A Framework for Privacy-Preserving Efficient Collaborative Learning. 241-245 - Samson Otieno Ooko, Charles Theuri Kagwi:
A Machine Learning Model for Prediction of Malaria from Microscopic Blood Cell Images. 246-251 - Raúl Gómez Ramos, Jaime Duque Domingo, Eduardo Zalama, Jaime Gómez García-Bermejo:
Ambient Intelligence Ecosystem for Elderly Pattern Detection and Care Using Social Robots. 252-259 - Dominik Grüdl, Thomas Wieland, Daniela Nicklas:
An Architectural Reference Model for IoT Device Management. 260-267 - Franc Pouhela, Maryam Arabshahi, Hans D. Schotten:
Analyzing and Predicting the Power Consumption of a Publish/Subscribe IoT-Broker. 268-275 - Frédéric Lassabe, Dominique Dhoutaut, Benoît Piranda, Olga Kouchnarenko, Julien Bourgeois:
Building a First Prototype of a Multi-scale Modular Distributed Display. 276-281 - Jintao Cao, Allie Null, Marissa Stewart, Suman Bhunia, Mohammad Salman:
Combatting the TrickBot Threat: Analysis, Impact, and Defensive Strategies in Cybersecurity. 282-287 - Pushpendu Kar, Puttipatt Ingkasit:
Development of a User-Friendly and Efficient Control System for Smart Home. 288-293 - Hussah Albinali, Farag Azzedin, Muhammad Riaz:
DEVS-RPL: Design Formal Discrete Event Model of Routing Protocol over LLN. 294-299 - Faiga Alawad, Peter Herrmann, Vajira Thambawita:
Integrating Synthetic Data Modelling into an Adaptive Sampling Framework for IoT Devices. 300-307 - Severin Pang, Justas Katkus, Stefan Hild:
Inverse-PID: A Mathematical Approach Towards Detecting Real-World Wear and Tear in Industrial Machines. 308-313 - Franc Pouhela, Sogo Pierre Sanon, Dennis Krummacker, Hans D. Schotten:
MMQP: A Lightweight, Secure and Scalable IoT Communication Protocol. 314-323 - Hassan Hammoud, Frédéric Weis, Christophe Langrume, Melen Leclerc, Jean-Marie Bonnin:
Monitoring of in-field risk of infection events by foliar pathogens using smart IoT nodes. 324-330 - Adel Elzemity, Budi Arief:
Privacy Threats and Countermeasures in Federated Learning for Internet of Things: A Systematic Review. 331-338 - Mohammad Ali Nemer, Joseph Azar, Abdallah Makhoul, Julien Bourgeois:
A Review of Early Time Series Classification Methods on Machinery Dataset. 347-352 - Omer Melih Gul:
Achieving Asymptotically Optimal Throughput and Fairness for Energy Harvesting Sensors in IoT Network Systems. 353-360 - Raffaele Bolla, Roberto Bruschi, Franco Davoli, Paolo Ghiorzo, Lorenzo Ivaldi, Chiara Lombardo, Beatrice Siccardi:
Comparison of the Performance and Energy Efficiency Evaluation of 5G User-Plane Functions. 361-368 - Alejandro Muñiz, Pablo Armingol, Luis M. Contreras, Óscar González:
Creation of Topological Maps of Energy Consumption for IP Networks. 369-376 - Hamza Saadaoui, Hajer Rabii, Zeynep Tulumen:
Design and Development of a Real-Time IoT Infrastructure for a future workspace - Energy efficiency and sustainability. 377-385 - Ashkan Tashk, M. A. Alavianmehr:
Enhanced Pedestrian Detection and Tracking Using Multi-Person Pose Extraction and Deep Convolutional LSTM Network. 386-391 - Federico Librino, Francesca Martelli, Giovanni Resta, Glauco Cecchi, Andrea Motroni, Andrea Ria:
How much RF Energy can be Harvested from V2X Communications? An Experimental Assessment. 392-399 - Mohammad N. Patwary, Samiya Khan, Syed Junaid Nawaz:
Low-Cost Green Computing-as-a-Service Testbed for SMEs: Leveraging AI and 6G for Enhanced Productivity. 400-407 - Antoine Bossard:
On three fundamental graph enumeration problems and the corresponding graph generation algorithms. 408-414 - Maxime Agusti, Eddy Caron, Benjamin Fichel, Laurent Lefèvre, Olivier Nicol, Anne-Cécile Orgerie:
PowerHeat: A non-intrusive approach for estimating the power consumption of bare metal water-cooled servers. 415-421 - Hung-Ming Sung, You-Shin Tsai, Timothy Chen, Ju-Chun Ko, Yi-Ping Hung:
Rivercare: Shaping the Decentralized Identity of Mother Nature on Blockchain through Care Activities of Stewards. 422-429 - Riham Elsaadany, Guy Bégin:
A Number of Conceptual Scalable Node-Organizing Multi-Tiered Blockchain Architectures for IoT. 430-437 - Matteo Vaccargiu, Roberto Tonelli:
An Ethereum Oracle-based solution for P2P Energy Trading Market. 438-445 - Eddie Zhang, Daniel Wu, Jeffrey Boman:
Carbon-Aware Workload Shifting for Mitigating Environmental Impact of Generative AI Models. 446-453 - Shinnosuke Masuda, Tsuyoshi Hasegawa, Taishi Nakai, Akira Sakurai, Kazuyuki Shudo:
High-Bandwidth Node Selection in Compact Block Relay. 454-458 - Ahmed Burhan Mohammed, Lamia Chaari Fourati, Ahmed M. Fakhrudeen:
Isolation Forest Algorithm Against UAV's GPS Spoofing Attack. 459-463 - Guorui Chen, Jiyan Liu, Chaoliang Li, Chen Zhang, Sirui Jiang, Bin Zhang, Entao Luo:
Research on Recognition and Feature Extraction of SQL Attack Action. 464-470 - Vladimir Marbukh:
Poster: Green Network Optimization with Multi-Agent Reinforcement Learning: Work in Progress. 471-472 - Zhuotao Lian, Weiyu Wang, Chunhua Su, Kouichi Sakurai:
AggreMark: Efficient Watermarking in Federated Learning via Weighted Averaging. 473-478 - Cecilia Delgado Solorzano, Manuel Delaflor, Carlos Toxtli:
Assessing the Syllogistic Logic and Fact-Checking Capabilities of Large Language Models. 479-488 - Yuquan Zhou, Hejin Huang, Wenyu Liao, Jiyan Liu, Xiangdong Ying, Chen Zhang, Entao Luo:
CRT-Paillier Homomorphic Privacy Protection Scheme Based on BLS Signatures in Mobile Vehicular Networks. 489-496 - Le Hong, Ran Yan, Ruihan Wang, Hao Chen, Weicheng Cui:
Data-driven ship inspection planning based on evolutionary game. 497-504 - Weihao Guo, Xiaoji Ma, Pingyuan Ge, Ying Chen, Qiuling Yue, Yuqing Zhang:
Defense Contrastive Poisoning: An Application of JPEG to Self-Supervised Contrastive Learning Indiscriminate Poisoning Attacks. 505-510 - Jie Kang, Shixuan Liu, Kuihua Huang, Changjun Fan, Hua He, Chao Chen:
Graph-CoRe: Graph Representation Learning with Contrastive Subgraph Replacement. 511-518 - John Dian:
IoT-based Visual Crack Detection Based on Multi-scale Self-Attention Neural Network. 519-526 - Haoxiang Cheng, Shixuan Liu, Changjun Fan, Kuihua Huang, Hua He, Xianghan Wang, Zhong Liu:
LLM4HIN: Discovering Meta-path with Large Language Model for Reasoning on Complex Heterogeneous Information Networks. 527-534 - Long Meng, Liqun Chen:
Long-Term Time-Stamping Schemes Based on MACs, Archives, and Transient Keys. 535-542 - Luis Ruhländer, Emilian Popp, Maria Stylidou, Sajjad Khan, Davor Svetinovic:
On the Security and Privacy Implications of Large Language Models: In-Depth Threat Analysis. 543-550 - Yunfei Wang, Shixuan Liu, Wenhao Wang, Cheng Zhu, Changjun Fan, Kuihua Huang, Chao Chen:
PentraFormer: Learning Agents for Automated Penetration Testing via Sequence Modeling. 551-558 - Zhijing Hu, Hao Yan, Yuhao Zheng, Hua He, Chao Chen, Changjun Fan, Kuihua Huang:
STIOS: A Novel Self-supervised Diffusion Model for Trajectory Imputation in Open Environment Scenarios. 559-566 - Xiaoji Ma, Weihao Guo, Pingyuan Ge, Ying Chen, Qiuling Yue, Yuqing Zhang:
Enhancing Data-Free Robustness Stealing Attack via Boundary Data Generation. 567-572 - Jiayu Zhang, Canyao Lu, Juan Xu, Xiangping Bryce Zhai:
TimesInformer: An Approach to Predicting Urban Water Supply with Multi-Periodic Features. 573-578 - Shahid Abbas, Sana Amjad, Stefan Craß, Seyed Amid Moeinzadeh Mirhosseini:
Analysis of Blockchain-IoT Connection Patterns based on Clients Type. 579-586 - Michael Hofmeier, Wolfgang Hommel:
Application for Electronic Signatures Using Blockchain Technology to Support Trust, Sovereignty and Privacy. 587-594 - Azadeh Sarkheyli, Elnaz Sarkheyli:
Social Media Integration in Public Transportation: A Case Study of Sweden. 595-600 - Cecilia Delgado Solorzano, Carlos Toxtli:
The Use of AI-powered Language Tools in Crowdsourcing to reduce Language Barriers. 601-608 - Monu Chaudhary, Suman Bhunia:
Understanding Blockchain Trilemma, Causes and Solutions. 609-616
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.