default search action
17th WASA 2022: Dalian, China - Part I
- Lei Wang, Michael Segal, Jenhui Chen, Tie Qiu:
Wireless Algorithms, Systems, and Applications - 17th International Conference, WASA 2022, Dalian, China, November 24-26, 2022, Proceedings, Part I. Lecture Notes in Computer Science 13471, Springer 2022, ISBN 978-3-031-19207-4
Cyber-Physical Systems Including Intelligent Transportation Systems and Smart Healthcare Systems
- Chen Gu, Xuande Cui, Donghui Hu:
An Efficient Privacy-Preserving Scheme for Traffic Monitoring Services in Vehicular Networks. 3-14 - Xiuli Liu, Wanshu Fan, Dongsheng Zhou:
Skin Lesion Segmentation via Intensive Atrous Spatial Transformer. 15-26 - Xing Wei, Shang Yao, Chong Zhao, Di Hu, Hui Luo, Yang Lu:
Graph Convolutional Networks (GCN)-Based Lightweight Detection Model for Dangerous Driving Behavior. 27-39 - Junhua Wu, Huiru Zhang, Guangshun Li, Kan Yu:
Increasing the Accuracy of Secure Model for Medical Data Sharing in the Internet of Things. 40-51 - Wenyue Wang, Xiang Tian, Xiaolu Cheng, Yuan Yuan, Biwei Yan, Jiguo Yu:
A Smart Contract-Based Intelligent Traffic Adaptive Signal Control Scheme. 52-63 - Mengjie Sun, Ke Li, Yaowen Zheng, Weidong Zhang, Hong Li, Limin Sun:
Inferring Device Interactions for Attack Path Discovery in Smart Home IoT. 64-75 - Yanbing Chen, Wei Ke, Hao Sheng, Zhang Xiong:
A Local Rotation Transformation Model for Vehicle Re-Identification. 76-87 - Kaixiang Hou, Tianyi Xu, Chao Xu, Xiaobo Zhou, Tie Qiu, Fengbiao Zan:
A Prototype System for Blockchain Performance Evaluation. 88-100 - Yang Lv, Zesheng Cheng, Zhiqiang Lv, Jianbo Li:
A Spatial-Temporal Convolutional Model with Improved Graph Representation. 101-112 - Fang Ouyang, Zheng Bao, Lixiao Zhou, Feilong Lin, Zhaolong Hu, Changbing Tang, Minglu Li:
A Proof-of-Weighted-Planned-Behavior Consensus for Efficient and Reliable Cyber-Physical Systems. 113-125 - Yizong Wang, Haoyu Wang, Dong Zhao, Fuyu Yang, Huadong Ma:
E2M: Evolving Mobility Modeling in Metropolitan-Scale Electric Taxi Systems. 126-138 - Xiang Ying, Zhen Liu, Jie Gao, Ruixuan Zhang, Han Jiang, Xi Wei:
Multi-task Class Feature Space Fusion Domain Adaptation Network for Thyroid Ultrasound Images: Research on Generalization of Smart Healthcare Systems. 139-152 - Haowei Wang, Rui Xu, Xiaoqiang Di, Jing Chen, Dejun Zhu, Juping Sun, Yuchen Zhu:
A Caching Strategy Based on Spreading Influence in Information-Centric Satellite Networks. 153-164 - Hao Yu, Chong Zhao, Xing Wei, Yan Zhai, Zhen Chen, Guangling Sun, Yang Lu:
Posture and Appearance Fusion Network for Driver Distraction Recognition. 165-174 - Jiujun Cheng, Yonghong Xiong, Shuai Feng, Guiyuan Yuan, Qichao Mao, Bo Lu:
A Behavior Decision Method for Autonomous Vehicles in an Urban Scene. 175-184 - Fuyong Sun, Ruipeng Gao, Weiwei Xing, Yaoxue Zhang, Wei Lu, Jun Fang, Shui Liu, Nan Ma, Hua Chai:
TimeBird: Context-Aware Graph Convolution Network for Traffic Incident Duration Prediction. 185-195 - Bixun Zhang, Xu Ding, Hang Zheng, Xiang Zheng, Pengfei Xu:
The Link Awareness Driven Resource Allocation Algorithm Based on Scenario Marking and Vehicle Clustering in VANETs. 196-205 - Rongkun Ye, Zhiqiang Lv, Aite Zhao, Jianbo Li:
Socially Acceptable Trajectory Prediction for Scene Pedestrian Gathering Area. 206-215 - Xiaochao Dang, Yanhong Bai, Daiyang Zhang, Gaoyuan Liu, Zhanjun Hao:
Wi-KF: A Rehabilitation Motion Recognition in Commercial Wireless Devices. 216-228
Security and Privacy
- Xiaoling Tao, Runrong Liu, Lianyou Fu, Qiqi Qiu, Yuelin Yu, Haijing Zhang:
An Effective Insider Threat Detection Apporoach Based on BPNN. 231-243 - Shiyuan Xu, Xue Chen, Yunhua He, Yibo Cao, Shang Gao:
VMT: Secure VANETs Message Transmission Scheme with Encryption and Blockchain. 244-257 - Hongniu Zhang, Mohan Li, Yanbin Sun, Guanqun Qu:
Robust Truth Discovery Against Multi-round Data Poisoning Attacks. 258-270 - Chenguang Zhu, Gewangzi Du, Tongshuai Wu, Ningning Cui, Liwei Chen, Gang Shi:
BERT-Based Vulnerability Type Identification with Effective Program Representation. 271-282 - Xufeng Jiang, Lu Li:
Privacy-Preserving and Truthful Auction for Task Assignment in Outsourced Cloud Environments. 283-295 - Da Teng, Yanqing Yao, Yingdong Wang, Lei Zhou, Chao Huang:
An SM2-based Traceable Ring Signature Scheme for Smart Grid Privacy Protection. 296-313 - Liyuan Cao, Yingwen Chen, Kaiyu Cai, Dongsheng Wang, Yuchuan Luo, Guangtao Xue:
Collusion-Tolerant Data Aggregation Method for Smart Grid. 314-325 - Ning Huang, Xue-cai Feng, Rui Zhang, Xiugui Yang, Hui Xia:
Network Defense Resource Allocation Scheme with Multi-armed Bandits. 326-337 - Han Sun, Yan Zhang, Mingxuan Li, Zhen Xu:
FLFHNN: An Efficient and Flexible Vertical Federated Learning Framework for Heterogeneous Neural Network. 338-350 - Xincheng Duan, Biwei Yan, Anming Dong, Li Zhang, Jiguo Yu:
Phishing Frauds Detection Based on Graph Neural Network on Ethereum. 351-363 - Jiaxu Ding, Biwei Yan, Guijuan Wang, Li Zhang, Yubing Han, Jiguo Yu, Yan Yao:
Blockchain-Aided Hierarchical Attribute-Based Encryption for Data Sharing. 364-376 - Yan Jin, Chunxiao Ye, Mengqing Yang, Chunming Ye:
Efficient Certificateless Ring Signcryption Scheme with Constant Ciphertext Length on Blockchain. 377-388 - Sinian Luo, Weibin Wu, Yanbin Li, Ruyun Zhang, Zhe Liu:
An Efficient Soft Analytical Side-Channel Attack on Ascon. 389-400 - Xu Yang, Yuchuan Luo, Ming Xu, Shaojing Fu, Yingwen Chen:
Privacy-preserving WiFi Fingerprint Localization Based on Spatial Linear Correlation. 401-412 - Qihang Zhang, Jiuwu Zhang, Xiulong Liu, Xinyu Tong, Keqiu Li:
Secure RFID Handwriting Recognition-Attacker Can Hear but Cannot Understand. 413-426 - Fengyuan Qiu, Hao Yang, Lu Zhou, Chuan Ma, Liming Fang:
Privacy Preserving Federated Learning Using CKKS Homomorphic Encryption. 427-440 - Shiyu Xu, Shi Yu, Liang Xiao, Zefang Lv:
Reinforcement Learning Based Vulnerability Analysis for Smart Grids Against False Data Injection Attacks. 441-452 - Jianrong Wang, Haoran Sun, Tianyi Xu:
Blockchain-Based Secure and Efficient Federated Learning with Three-phase Consensus and Unknown Device Selection. 453-465 - Yueqing Wu, Hao Fu, Guoming Zhang, Bin Zhao, Minghui Xu, Yifei Zou, Xiaotao Feng, Pengfei Hu:
TraceDroid: Detecting Android Malware by Trace of Privacy Leakage. 466-478 - Yijie Yan, Shiyuan Xu:
CA-Free Real-Time Fuzzy Digital Signature Scheme. 479-490 - Lidong Xu, Mingqiang Wang:
Efficient Post Quantum Random Oblivious Transfer Based on Lattice. 491-499 - Baolin Wang, Chunqiang Hu, Zewei Liu:
A Secure Aggregation Scheme for Model Update in Federated Learning. 500-512 - Jing Zhang, Zhixin Shi, Hao Wu, Mengyan Xing:
A Novel Self-supervised Few-shot Network Intrusion Detection Method. 513-525 - Zhaowei Li, Na Dang, Wenshuo Ma, Xiaowu Liu:
A Trust Secure Data Aggregation Model with Multiple Attributes for WSNs. 526-534 - Xiaolei Wang, Yang Wang, Mingqiang Wang:
Lattice-Based Revocable Identity-Based Proxy Re-encryption with Re-encryption Verifiability. 535-544 - Cheng Hu, Fangfang Yuan, Yanbing Liu, Cong Cao, Chunyan Zhang, Jianlong Tan:
Malicious Domain Detection with Heterogeneous Graph Propagation Network. 545-556 - Hongjuan Li, Da Wei, Geng Sun, Jian Wang, Jiahui Li, Hui Kang:
Interference Mitigation via Collaborative Beamforming in UAV-Enabled Data Collections: A Multi-objective Optimization Method. 557-566 - Ruizhong Du, Lin Zhen, Yan Liu:
Authentication Mechanism Based on Physical Layer Security in Industrial Wireless Sensor Networks. 567-578 - Pingchuan Wang, Lupeng Zhang, Jinhao Pan, Fengqi Li:
A Practical Data Authentication Scheme for Unattended Wireless Sensor Networks Using Physically Unclonable Functions. 579-590 - Degang Sun, Yue Cui, Siye Wang, Yanfang Zhang:
On Eliminating Blocking Interference of RFID Unauthorized Reader Detection. 591-602 - Jiapeng Zhao, Zhongjin Liu, Xiaoling Zhang, Jintao Huang, Zhiqiang Shi, Shichao Lv, Hong Li, Limin Sun:
Gradient-Based Adversarial Attacks Against Malware Detection by Instruction Replacement. 603-612
Topology Control and Coverage
- Gang Xu, Qi Tang, Zhifei Wang, Baoqi Huang:
Opportunistic Network Routing Algorithm Based on Ferry Node Cluster Active Motion and Collaborative Computing. 615-626 - Zhenxian Ma, Ran Wang, Changyan Yi, Kun Zhu:
Optimal Deployment and Scheduling of a Mobile Charging Station in the Internet of Electric Vehicles. 627-639
Energy-Efficient Algorithms, Systems and Protocol Design
- Caina Gao, Jia Zhang, Linlin Guo, Lili Meng, Hui Ji, Jiande Sun:
Energy Efficiency Optimization for RIS Assisted RSMA System over Estimated Channel. 643-654
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.