default search action
13th WASA 2018: Guilin, China
- Sriram Chellappan, Wei Cheng, Wei Li:
Wireless Algorithms, Systems, and Applications - 13th International Conference, WASA 2018, Tianjin, China, June 20-22, 2018, Proceedings. Lecture Notes in Computer Science 10874, Springer 2018, ISBN 978-3-319-94267-4 - Xingshuo An, Fuhong Lin:
Hypergraph Based Radio Resource Management in 5G Fog Cell. 1-13 - Yigitcan Celik, Cong Pu:
A Novel Energy Harvesting Aware IEEE 802.11 Power Saving Mechanism. 14-26 - Ming Chen, Wenzhong Li, Lin Qian, Sanglu Lu, Daoxu Chen:
Interest-Aware Next POI Recommendation for Mobile Social Networks. 27-39 - Quan Chen, Tianbai Le, Lianglun Cheng, Zhipeng Cai, Hong Gao:
Approximate Minimum-Transmission Broadcasting in Duty-Cycled WSNs. 40-52 - Yu Chen, Hong Li, Yuan Ma, Zhiqiang Shi, Limin Sun:
Robust Network-Based Binary-to-Vector Encoding for Scalable IoT Binary File Retrieval. 53-65 - Haosu Cheng, Jianwei Liu, Jian Mao, Mengmeng Wang, Jie Chen:
OSCO: An Open Security-Enhanced Compatible OpenFlow Platform. 66-77 - Xingjian Ding, Guodong Sun, Deying Li, Yongcai Wang, Wenping Chen:
Hop-Constrained Relay Node Placement in Wireless Sensor Networks. 78-89 - Yifan Dong, Peidong Zhu, Qiang Liu, Yingwen Chen, Peng Xun:
Degrading Detection Performance of Wireless IDSs Through Poisoning Feature Selection. 90-102 - Jingjing Fan, Yan Huo, Xin Fan, Chunqiang Hu, Guanlin Jing:
A Cooperative Jamming Based Secure Uplink Transmission Scheme for Heterogeneous Networks Supporting D2D Communications. 103-114 - Xiying Fan, Chuanhe Huang, Xi Chen, Shaojie Wen, Bin Fu:
Delay-Constrained Throughput Maximization in UAV-Assisted VANETs. 115-126 - Peng Fang, Liusheng Huang, Hongli Xu, Qijian He:
Smart Device Fingerprinting Based on Webpage Loading. 127-139 - Shuai Guo, Chao Liu, Zhongwen Guo, Yuan Feng, Feng Hong, Haiguang Huang:
Trajectory Prediction for Ocean Vessels Base on K-order Multivariate Markov Chain. 140-150 - Li-Tse Hsieh, Hang Liu, Cheng-Yu Cheng, Xavier De Foy, Robert Gazda:
Experimental Study on Deployment of Mobile Edge Computing to Improve Wireless Video Streaming Quality. 151-163 - Chunqiang Hu, Jin Luo, Yuwen Pu, Jiguo Yu, Ruifeng Zhao, Hongyu Huang, Tao Xiang:
An Efficient Privacy-Preserving Data Aggregation Scheme for IoT. 164-176 - Baohua Huang, Jiawei Mo, Xiaolu Cheng:
Improving Security and Stability of AODV with Fuzzy Neural Network in VANET. 177-188 - Shanshan Huang, Zhen Wang, Chi Zhang, Yuguang Fang:
Exploiting Aerial Heterogeneous Network for Implementing Wireless Flight Recorder. 189-200 - Yuanfa Ji, Jianguo Song, Xiyan Sun, Suqing Yan, Zhengquan Yang:
TOA Estimation Algorithm Based on Noncoherent Detection in IR-UWB System. 201-210 - Ming Lei, Xingjun Zhang, Bocheng Yu:
Max-Min Fairness Scheme in Wireless Powered Communication Networks with Multi-user Cooperation. 211-222 - Chuyang Li, Guangzhi Zhang, Rongfang Bie, Hao Wu, Yuqi Yang, Jiguo Yu, Xianlin Ma:
Cancer-Drug Interaction Network Construction and Drug Target Prediction Based on Multi-source Data. 223-235 - Hongwei Li, Guowen Xu, Qiang Tang, Xiaodong Lin, Xuemin (Sherman) Shen:
Enabling Efficient and Fine-Grained DNA Similarity Search with Access Control over Encrypted Cloud Data. 236-248 - Ji Li, Madhuri Siddula, Xiuzhen Cheng, Wei Cheng, Zhi Tian, Yingshu Li:
Sampling Based \delta δ -Approximate Data Aggregation in Sensor Equipped IoT Networks. 249-260 - Pan Li, Wentao Zhao, Qiang Liu, Xiao Liu, Linyuan Yu:
Poisoning Machine Learning Based Wireless IDSs via Stealing Learning Model. 261-273 - Sen Li, Bin Lin, Yabo Ding, Rongxi He:
Signal-Selective Time Difference of Arrival Estimation Based on Generalized Cyclic Correntropy in Impulsive Noise Environments. 274-283 - Ke Lin, Jinbao Wang, Jianzhong Li, Siyao Cheng, Hong Gao:
iKey: An Intelligent Key System Based on Efficient Inclination Angle Sensing Techniques. 284-295 - Hang Liu, Chinh Tran, Jan Lasota, Son Dinh, Xianfu Chen, Feng Ouyang:
Massive MIMO Power Allocation in Millimeter Wave Networks. 296-307 - Jianhua Liu, Wei Yang, Liusheng Huang, Wuji Chen:
A Detection-Resistant Covert Timing Channel Based on Geometric Huffman Coding. 308-320 - Blake Lucas, Liran Ma:
Spark: A Smart Parking Lot Monitoring System. 321-332 - Bin Lv, Dan Wang, Yan Wang, Qiujian Lv, Dan Lu:
A Hybrid Model Based on Multi-dimensional Features for Insider Threat Detection. 333-344 - Honghao Ma, Tao Jing, Fan Zhang, Xin Fan, Yanfei Lu, Yan Huo:
Throughput Analysis for Energy Harvesting Cognitive Radio Networks with Unslotted Users. 345-356 - Xiaoguang Niu, Chun Zhang, Ankang Wang, Jingbin Liu, Zhen Wang:
A Crowdsourcing-Based Wi-Fi Fingerprinting Mechanism Using Un-supervised Learning. 357-373 - Shiran Pan, Qiongxiao Wang, Fangyu Zheng, Jiankuo Dong:
Secure and Efficient Outsourcing of Large-Scale Matrix Inverse Computation. 374-386 - Zhengrui Qin, Qun Li:
Household Electrical Load Scheduling Algorithms with Renewable Energy. 387-399 - Kaili Qiu, Qixu Liu, Jingqiang Liu, Lei Yu, Yiwen Wang:
An Empirical Study of OAuth-Based SSO System on Web. 400-411 - Chuta Sano, Chao Gao, Zupei Li, Zhen Ling, Xinwen Fu:
Turning Legacy IR Devices into Smart IoT Devices. 412-424 - Korn Sooksatra, Wei Li, Bo Mei, Arwa Alrawais, Shengling Wang, Jiguo Yu:
Solving Data Trading Dilemma with Asymmetric Incomplete Information Using Zero-Determinant Strategy. 425-437 - Gaofei Sun, Xiaoshuang Xing, Xiangping Qin:
Data Uploading Mechanism for Internet of Things with Energy Harvesting. 438-449 - Yingxiao Sun, Zhenquan Qin, Junyu Hu, Lei Wang, Jiaxin Du, Yan Ren:
Enabling ZigBee Link Performance Robust Under Cross-Technology Interference. 450-461 - Nazish Tahir, Md. Monjurul Karim, Kashif Sharif, Fan Li, Nadeem Ahmed:
Quadrant-Based Weighted Centroid Algorithm for Localization in Underground Mines. 462-472 - Yiqi Wang, En Zhu, Qiang Liu, Yingwen Chen, Jianping Yin:
Exploration of Human Activities Using Sensing Data via Deep Embedded Determination. 473-484 - Zhenchun Wei, Fei Liu, Zengwei Lyu, Xu Ding, Lei Shi, Chengkai Xia:
Reinforcement Learning for a Novel Mobile Charging Strategy in Wireless Rechargeable Sensor Networks. 485-496 - Zhenchun Wei, Liangliang Wang, Zengwei Lyu, Lei Shi, Meng Li, Xing Wei:
A Multi-objective Algorithm for Joint Energy Replenishment and Data Collection in Wireless Rechargeable Sensor Networks. 497-508 - Ke Xu, Kai Han, Hang Ye, Feng Gao, Chaoting Xu:
Privacy-Preserving Personal Sensitive Data in Crowdsourcing. 509-520 - Kuai Xu, Feng Wang, Haiyan Wang, Bo Yang:
A First Step Towards Combating Fake News over Online Social Media. 521-531 - Shijian Xu, Wenzhong Li, Xiao Zhang, Songcheng Gao, Tong Zhan, Yongzhu Zhao, Wei-wei Zhu, Tianzi Sun:
Predicting Smartphone App Usage with Recurrent Neural Networks. 532-544 - Yiwei Xu, Panlong Yang, Jian Gong, Kan Niu:
A Self-organizing Base Station Sleeping Strategy in Small Cell Networks Using Local Stable Matching Games. 545-556 - Zhonghu Xu, Shuo Zhang, Jing Xu, Kai Xing:
Dealing with Dynamic-Scale of Events: Matrix Recovery Based Compressive Data Gathering for Sensor Networks. 557-569 - Jiachen Yang, Huifang Xu, Bin Jiang, Gan Zheng, Houbing Song:
Proactive Caching for Transmission Performance in Cooperative Cognitive Radio Networks. 570-579 - Siyan Yao, Yuwei Xu, Shuai Tong, Jianzhong Zhang, Jingdong Xu:
N-Guide: Achieving Efficient Named Data Transmission in Smart Buildings. 580-592 - Hang Ye, Kai Han, Ke Xu, Feng Gao, Chaoting Xu:
Privacy-Preserving Task Assignment in Skill-Aware Spatial Crowdsourcing. 593-605 - Xi Yin, Weiqing Huang, Mohsen Guizani:
HEVC Lossless Compression Coding Based on Hadamard Butterfly Transformation. 606-621 - Bowen Yu, Lingjun Pu, Qinyi Xie, Jingdong Xu, Jianzhong Zhang:
U-MEC: Energy-Efficient Mobile Edge Computing for IoT Applications in Ultra Dense Networks. 622-634 - Ruiguo Yu, Kai Liu, Xi Wei, Jialin Zhu, Xuewei Li, Jianrong Wang, Xiang Ying, Zhihui Yu:
Localization of Thyroid Nodules in Ultrasonic Images. 635-646 - Guanglin Zhang, Kaijiang Yi, Wenqian Zhang, Demin Li:
Cost Reduction for Micro-Grid Powered Data Center Networks with Energy Storage Devices. 647-659 - Jumin Zhao, Haizhu Yang, Wenjing Li, Dengao Li, Ruijuan Yan:
An Information Classification Collection Protocol for Large-Scale RFID System. 660-670 - Ruonan Zhao, Lichen Zhang, Xiaoming Wang, Chunyu Ai, Fei Hao, Yaguang Lin:
An Efficient Energy-Aware Probabilistic Routing Approach for Mobile Opportunistic Networks. 671-682 - Jingyi Zheng, Mingli Liang, Arne D. Ekstrom, Linqiang Ge, Wei Yu, Fushing Hsieh:
On Association Study of Scalp EEG Data Channels Under Different Circumstances. 683-695 - Hengyu Zhou, Yukun Niu, Jianqing Liu, Chi Zhang, Lingbo Wei, Yuguang Fang:
A Privacy-Preserving Networked Hospitality Service with the Bitcoin Blockchain. 696-708 - Jinghua Zhu, Qian Ming, Yong Liu:
Trust-Distrust-Aware Point-of-Interest Recommendation in Location-Based Social Network. 709-719 - Tongxin Zhu, Jinbao Wang, Siyao Cheng, Yingshu Li, Jianzhong Li:
Retrieving the Relative Kernel Dataset from Big Sensory Data for Continuous Query. 720-732 - Tommy Chin, Kaiqi Xiong:
KrackCover: A Wireless Security Framework for Covering KRACK Attacks. 733-739 - Jianli Duan, Yuxiang Liu, Bin Lin, Yuan Jiang, Fen Hou:
Node Deployment of High Altitude Platform Based Ocean Monitoring Sensor Networks. 740-747 - Liangyi Gong, Chundong Wang, Likun Zhu, Jian Zhang, Wu Yang, Yiyang Zhao, Chaocan Xiang:
LAMP: Lightweight and Accurate Malicious Access Points Localization via Channel Phase Information. 748-753 - Jiaxi Gu, Kele Shen, Jiliang Wang, Zhiwen Yu:
NASR: NonAuditory Speech Recognition with Motion Sensors in Head-Mounted Displays. 754-759 - Juan Xu, Jiaolong Jiang, Zhiyu Wang, Yakun Zhao:
Energy Harvesting Based Opportunistic Routing for Mobile Wireless Nanosensor Networks. 760-766 - Can Liu, Feng Zeng, Wenjia Li:
Synergistic Based Social Incentive Mechanism in Mobile Crowdsensing. 767-772 - Miao Lu, Ying Wu, Yuwei Xu, Yijie Yang, Jingjing Wang:
SACP: A Signcryption-Based Authentication Scheme with Conditional Privacy Preservation for VANET. 773-779 - Yingqi Luo, Pengfei Wang, Xu Zhou, Kai Lu:
DFTinker: Detecting and Fixing Double-Fetch Bugs in an Automated Way. 780-785 - Xingyou Xia, Lin Xue, Jie Li, Ruiyun Yu:
A Quality-Validation Task Assignment Mechanism in Mobile Crowdsensing Systems. 786-792 - Fangxin Xu, Qinglin Zhao, Shumin Yao, Hong Liang, Guangcheng Li:
A Novel Capacity-Aware SIC-Based Protocol for Wireless Networks. 793-798 - Shuai Xu, Kai Han, Naiting Xu:
A Supervised Learning Approach to Link Prediction in Dynamic Networks. 799-805 - Fan Yan, Yunpeng Ding, Wenzhong Li:
Mining Mobile Users' Interests Through Cellular Network Browsing Profiles. 806-812 - Lan Yang, Junqi Guo, Yazhu Dai, Di Lu, Rongfang Bie:
A Gradient-Boosting-Regression Based Physical Health Evaluation Model for Running Monitoring by Using a Wearable Smartband System. 813-819 - Mei Yu, Jie Zhang, Jianrong Wang, Jie Gao, Tianyi Xu, Ruiguo Yu:
The Research of Spam Web Page Detection Method Based on Web Page Differentiation and Concrete Cluster Centers. 820-826 - Weiqi Zhang, Baosheng Wang, Wenping Deng, Hao Zeng:
Network Control for Large-Scale Container Clusters. 827-833 - Zhipeng Zhao, Bin Wu, Jie Xiao, Zhenyu Hu:
Joint Optimization of Flow Entry Aggregation and Routing Selection in Software Defined Wireless Access Networks. 834-839 - Jiaxi Zhou, Zhonghu Xu, Shuo Zhang, Jing Xu:
Loc-Knock: Remotely Locating Survivors in Mine Disasters Using Acoustic Signals. 840-845 - Weiping Zhu, Jiaojiao Chen, Lin Xu, Yan Gu:
A Recognition Approach for Groups with Interactions. 846-852 - Akshay Chawan, Weiqing Sun, Ahmad Y. Javaid, Umesh Gurav:
Security Enhancement of Over-the-Air Update for Connected Vehicles. 853-864 - Kamran Naseem Kalokhe, Younghee Park, Sang-Yoon Chang:
Resilient SDN-Based Communication in Vehicular Network. 865-873 - C. Pavan Kumar, R. Selvakumar:
Authentication Protocol Using Error Correcting Codes and Cyclic Redundancy Check. 874-882 - Liyuan Liu, Meng Han, Yan Wang, Yiyun Zhou:
Understanding Data Breach: A Visualization Aspect. 883-892 - Hui Xia, Benxia Li, Sanshun Zhang, Shiwen Wang, Xiangguo Cheng:
A Novel Recommendation-Based Trust Inference Model for MANETs. 893-906
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.