default search action
19th SECON 2022: Stockholm, Sweden
- 19th Annual IEEE International Conference on Sensing, Communication, and Networking, SECON 2022, Stockholm, Sweden, September 20-23, 2022. IEEE 2022, ISBN 978-1-6654-8643-9
- Kun Yang, Xiaolong Zheng, Jie Xiong, Liang Liu, Huadong Ma:
WiImg: Pushing the Limit of WiFi Sensing with Low Transmission Rates. 1-9 - Leiyang Xu, Xiaolong Zheng, Xiangyuan Li, Yucheng Zhang, Liang Liu, Huadong Ma:
WiCAM: Imperceptible Adversarial Attack on Deep Learning based WiFi Sensing. 10-18 - Bryan Bo Cao, Abrar Alali, Hansi Liu, Nicholas Meegan, Marco Gruteser, Kristin J. Dana, Ashwin Ashok, Shubham Jain:
ViTag: Online WiFi Fine Time Measurements Aided Vision-Motion Identity Association in Multi-person Environments. 19-27 - Hao Pan, Feitong Tan, Wenhao Li, Yi-Chao Chen, Lanqing Yang, Guangtao Xue, Xiaoyu Ji:
MagDefender: Detecting Eavesdropping on Mobile Devices using the Built-in Magnetometer. 28-36 - Ting Wang, Peng Yang, Zhihao Wang, Haibin Cai:
Blocking Island Paradigm Enhanced Intelligent Coordinated Virtual Network Embedding Based on Deep Reinforcement Learning. 37-45 - James Mariani, Yongqi Han, Li Xiao:
Co-Cache: Inertial-Driven Infrastructure-less Collaborative Approximate Caching. 46-54 - Xiaoying Lei:
Online Bayesian Learning for Rate Adaptation in Non-stationary Wireless Channels. 55-63 - Yao Wang, Tao Gu, Tom H. Luan, Yong Yu:
Your Breath Doesn't Lie: Multi-user Authentication by Sensing Respiration Using mmWave Radar. 64-72 - Xiao Zhang, James Mariani, Li Xiao, Matt W. Mutka:
LiFOD: Lighting Extra Data via Fine-grained OWC Dimming. 73-81 - Yi Zhong, Lei Jiao, Ruiting Zhou, Liujing Song:
On-Demand or On-Premises: Online Mitigation of DDoS Attacks via Cloud-Edge Coordination. 82-90 - Khaled Alkiek, Khaled A. Harras, Moustafa Youssef:
EarGest: Hand Gesture Recognition with Earables. 91-99 - Orlando E. Martínez-Durive, Theo Couturieux, Cezary Ziemlicki, Marco Fiore:
VoronoiBoost: Data-driven Probabilistic Spatial Mapping of Mobile Network Metadata. 100-108 - Eranga Bandara, Xueping Liang, Sachin Shetty, Ravi Mukkamala, Abdul Rahman, Wee Keong Ng:
Skunk - A Blockchain and Zero Trust Security Enabled Federated Learning Platform for 5G/6G Network Slicing. 109-117 - Zhirong Tang, Lizhao You, Haipeng Dai, Liqun Fu:
Quick and Reliable Physical-layer Data Aggregation in LoRa through Multi-Packet Reception. 118-126 - Xiaolin Gu, Wenjia Wu, Naixuan Guo, Wei He, Aibo Song, Ming Yang, Zhen Ling, Junzhou Luo:
TeRFF: Temperature-aware Radio Frequency Fingerprinting for Smartphones. 127-135 - Georg Meller, Michael Methfessel, Bastian Lindner, Jens Wagner, Rolf Kraemer, Frank Ellinger:
Wakeup Receiver Using Passive Amplification by Means of a Switched SAW Resonator. 136-144 - Zeyu Wang, Xiaoxi He, Zimu Zhou, Xu Wang, Qiang Ma, Xin Miao, Zhuo Liu, Lothar Thiele, Zheng Yang:
Stitching Weight-Shared Deep Neural Networks for Efficient Multitask Inference on GPU. 145-153 - Zhiyao Sheng, Huatao Xu, Qian Zhang, Dong Wang:
Facilitating Radar-Based Gesture Recognition With Self-Supervised Learning. 154-162 - Shuai Wang, Jianlin Guo, Pu Wang, Kieran Parsons, Philip V. Orlik, Yukimasa Nagai, Takenori Sumi, Parth Pathak:
X-Disco: Cross-technology Neighbor Discovery. 163-171 - Chenning Li, Li Liu, Zhichao Cao, Mi Zhang:
WiVelo: Fine-grained Walking Velocity Estimation for Wi-Fi Passive Tracking. 172-180 - Xieyang Sun, Wei Xi, Zhiping Jiang, Zuhao Chen, Han Hao:
ScreenInformer: Whispering Secret Information via an LCD Screen. 181-189 - Suwei Xu, Yibo Jin, Zhuzhong Qian, Sheng Zhang, Ming Zhao, Zhenjie Lin, Qiang Lin, Liming Wang:
Energy-efficient Federated Learning via Stabilization-aware On-device Update Scaling. 190-198 - Jing Zhao, Ruwu Wang:
FedMix: A Sybil Attack Detection System Considering Cross-layer Information Fusion and Privacy Protection. 199-207 - Rong Cong, Zhiwei Zhao, Linyuanqi Zhang, Geyong Min:
CoopEdge: Cost-effective Server Deployment for Cooperative Multi-Access Edge Computing. 208-216 - Wenchao Jiang, Feng Li, Luoyu Mei, Ruofeng Liu, Shuai Wang:
VisBLE: Vision-Enhanced BLE Device Tracking. 217-225 - Tushar Routh, Nurani Saoda, Md Fazlay Rabbi Masum Billah, Brad Campbell:
Low Cost Light Source Identification in Real World Settings. 226-234 - Niloofar Yazdani, Nikolaos Kouvelas, Daniel E. Lucani, R. Venkatesha Prasad:
Divide and Code: Efficient and Real-time Data Recovery from Corrupted LoRa Frames. 235-243 - Haofan Cai, Ge Wang, Josue Leyva, Ian Pham, Jinsong Han, Shigang Chen, Chen Qian:
ChopTags: An Accurate and Low-cost Interface to Identify User/Item Interactions. 244-252 - Youmei Song, Lei Jiao, Renyu Yang, Tianyu Wo, Jie Xu:
Incentivizing Online Edge Caching via Auction - Based Subsidization. 253-261 - Hao Li, Ruofeng Liu, Shuai Wang, Wenchao Jiang, Chris Xiaoxuan Lu:
Pedestrian Liveness Detection Based on mmWave Radar and Camera Fusion. 262-270 - Yuting Yan, Yibo Jin, Sheng Zhang, Fangwen Cheng, Zhuzhong Qian, Sanglu Lu:
Focus! Provisioning Attention-aware Detection for Real-time On-device Video Analytics. 271-279 - Xiaolin Guo, Fang Dong, Dian Shen, Zhaowu Huang, Zhenyang Ni, Yulong Jiang, Daheng Yin:
Exploiting the Computational Path Diversity with In-network Computing for MEC. 280-288 - Yunzhong Chen, Jiadi Yu, Linghe Kong, Yanmin Zhu, Feilong Tang:
RFPass: Towards Environment-Independent Gait-based User Authentication Leveraging RFID. 289-297 - Haipeng Dai, Xuzhen Lin, Jiaqi Zheng, Yuben Qu, Weijun Wang, Shuyu Shi, Chi Lin, Wanchun Dou:
DARPA: Deployment of UAVs for Polygonal Sizable Object Surveillance. 298-306 - Kai Zhang, Jiuwu Zhang, Xin Xie, Xinyu Tong, Xiulong Liu, Keqiu Li:
Frequency- and Orientation-related Phase Fingerprints for RFID Tag Authentication. 307-315 - Chi Lin, Chuanying Ji, Fenglong Ma, Lei Wang, Wei Zhong, Guowei Wu:
WiLCA: Accelerating Contactless Authentication with Limited Data. 316-324 - Zijian Li, Zihan Chen, Xiaohui Wei, Shang Gao, Chenghao Ren, Tony Q. S. Quek:
HPFL-CN: Communication-Efficient Hierarchical Personalized Federated Edge Learning via Complex Network Feature Clustering. 325-333 - Adeel Nasrullah, Momin Ahmad Khan, Fatima Muhammad Anwar:
Universal Timestamping with Ambient Sensing. 334-342 - Jianqi Du, Fenghao Xu, Chennan Zhang, Zidong Zhang, Xiaoyin Liu, Pengcheng Ren, Wenrui Diao, Shanqing Guo, Kehuan Zhang:
Identifying the BLE Misconfigurations of IoT Devices through Companion Mobile Apps. 343-351 - Yinan Zhu, Chunhui Duan, Xuan Ding, Zheng Yang:
ReaderPrint: A Universal Method for RFID Readers Authentication Based on Impedance Mismatch. 352-360 - Shan Chang, Xinggang Hu, Hongzi Zhu, Wei Liu, Lei Yang:
VOGUE: Secure User Voice Authentication on Wearable Devices using Gyroscope. 361-369 - Simone Soderi, Alessandro Brighente, Federico Turrin, Mauro Conti:
VLC Physical Layer Security through RIS-aided Jamming Receiver for 6G Wireless Networks. 370-378 - Yukun Yuan, Yue Zhao, Lin Chen, Shan Lin:
Game Theoretic Analysis of Urban E-Taxi Systems: Equilibria and Efficiency. 379-387 - Shuai Nie, Mohammad Mosiur Lunar, Geng Bai, Yufeng Ge, Santosh K. Pitla, Can Emre Koksal, Mehmet C. Vuran:
mmWave on a Farm: Channel Modeling for Wireless Agricultural Networks at Broadband Millimeter-Wave Frequency. 388-396 - Mert D. Pesé, Dongyao Chen, C. Andrés Campos, Alice Ying, Troy Stacer, Kang G. Shin:
DETROIT: Data Collection, Translation and Sharing for Rapid Vehicular App Development. 397-406 - Jeong-A Lim, Yeongjin Kim:
Real-time DNN Model Partitioning for QoE Enhancement in Mobile Vision Applications. 407-415 - Tian Liu, Xueyang Hu, Tao Shu:
Assisting Backdoor Federated Learning with Whole Population Knowledge Alignment in Mobile Edge Computing. 416-424 - Xiangling Ding, Wenjie Zhu, Dengyong Zhang:
DeepFake Videos Detection via Spatiotemporal Inconsistency Learning and Interactive Fusion. 425-433 - Ce Shang, Yan Sun, Hong Luo:
A Hybrid Deep Reinforcement Learning Approach for Dynamic Task Offloading in NOMA-MEC System. 434-442 - Hao Feng, Songtao Guo, Chao Chen, Xianlong Jiao:
Distributed Caching Control Strategy in Mobile Edge Computing: A Mean Field Game Approach. 443-451 - Ju Wang, Liqiong Chang, Omid Abari, Srinivasan Keshav:
How Manufacturers Can Easily Improve Working Range of Passive RFIDs. 452-460 - Xingpeng Fan, Gongming Zhao, Huaqing Tu, Hongli Xu, He Huang:
MASCOT: Mobility-Aware Service Function Chain Routing in Mobile Edge Computing. 461-469 - Qi Zhang, Yang Zhang, Shukui Zhang, Hao Long:
Task Scheduling Algorithm Based on Computing-Aware in Mobile Ad Hoc Cloud. 470-478 - Haipeng Dai, Yue Zhao, Weijun Wang, Rong Gu, Yuben Qu, Chi Lin, Lijie Xu, Wanchun Dou:
Placing Wireless Chargers with Multiple Antennas. 479-487 - Mingqian Shao, Yifan Liu, Bin Duo, Jin Ning, Junsong Luo, Xing Zhu, Mingzhe Liu, Zhengqiang Wang:
Joint Passive Beamforming and Elevation Angle-Dependent Trajectory Design for RIS-aided UAV-enabled Wireless Sensor Networks. 488-496 - Aleksandar Ichkov, Simon Häger, Petri Mähönen, Ljiljana Simic:
Comparative Evaluation of Millimeter-Wave Beamsteering Algorithms Using Outdoor Phased Antenna Array Measurements. 497-505 - Punyasha Chatterjee, Pratham Majumder, Arpita Debnath, Sajal K. Das:
Distributed Decision Making for V2V Charge Sharing in Intelligent Transportation Systems. 506-514
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.