default search action
12th WASA 2017: Guilin, China
- Liran Ma, Abdallah Khreishah, Yan Zhang, Mingyuan Yan:
Wireless Algorithms, Systems, and Applications - 12th International Conference, WASA 2017, Guilin, China, June 19-21, 2017, Proceedings. Lecture Notes in Computer Science 10251, Springer 2017, ISBN 978-3-319-60032-1 - Shiming He, Kun Xie, Weiwei Chen, Dafang Zhang, Jigang Wen:
Simultaneous Wireless Information and Power Transfer for Multi-hop Energy-Constrained Wireless Network. 1-12 - Tingting Yang, Zhengqi Cui, Rui Wang, Zhou Su, Ying Wang:
Leveraging Scheduling to Minimize the Tardiness of Video Packets Transmission in Maritime Wideband Communication. 13-22 - Chaonong Xu, Kaichi Ma, Yida Xu, Yongjun Xu:
Optimal Power Scheduling for SIC-Based Uplink Wireless Networks with Guaranteed Real-Time Performance. 23-36 - Yu Zeng, Qinglin Zhao:
A Novel Collision Analysis for Multiple-Subcarrier Frequency-Domain Contention. 37-46 - Qizhen Zhou, Chenshu Wu, Jianchun Xing, Juelong Li, Zheng Yang, Qiliang Yang:
Wi-Dog: Monitoring School Violence with Commodity WiFi Devices. 47-59 - Yueyue Dou, Feng Zeng, Wenjia Li:
Energy-Efficient Contact Detection Model in Mobile Opportunistic Networks. 60-70 - Yuhong Sun, Tianyi Song, Honglu Jiang, Jianchao Zheng:
Modeling of Random Dense CSMA Networks. 71-82 - Lei Lu, Wei Li, Shengling Wang, Rongfang Bie, Bowu Zhang:
Throughput Maximization in Multi-User Cooperative Cognitive Radio Networks. 83-95 - Gongming Zhao, Liusheng Huang, Ziqiang Li, Hongli Xu:
Load-Balancing Software-Defined Networking Through Hybrid Routing. 96-108 - Chuanwen Luo, Yongcai Wang, Jiguo Yu, Wenping Chen, Deying Li:
A New Greedy Algorithm for Constructing the Minimum Size Connected Dominating Sets in Wireless Networks. 109-114 - Xue-rong Cui, Juan Li:
Study on the Impulse Radio mmWave for 5G-Based Vehicle Position. 115-123 - Mingli Wu, Na Ruan, Shiheng Ma, Haojin Zhu, Weijia Jia, Qingshui Xue, Songyang Wu:
Detect SIP Flooding Attacks in VoLTE by Utilizing and Compressing Counting Bloom Filter. 124-135 - Zhu Xiao, Shuangchun Li, Tong Li, Dong Wang:
On Enhancing Energy Efficiency via Elastic Cell-Zooming Algorithm in Three-Tier Heterogeneous Wireless Networks. 136-150 - Yuan Gao, Hong Ao, Quan Zhou, Weigui Zhou, Xiangyang Li, Yunchuan Sun, Su Hu, Yi Li:
Cooperative Downlink Resource Allocation in 5G Wireless Backhaul Network. 151-160 - Jianji Hu, Songtao Guo, Defang Liu, Yuanyuan Yang:
Spectral Partitioning and Fuzzy C-Means Based Clustering Algorithm for Wireless Sensor Networks. 161-174 - Hao Yang, Hua Xu, Xiwei Wang:
Regionalization Compressive Sensing for Optimizing Lifetime of Sensor Networks. 175-184 - Yang Zhang, Hong Gao, Siyao Cheng, Zhipeng Cai, Jianzhong Li:
IEA: An Intermittent Energy Aware Platform for Ultra-Low Powered Energy Harvesting WSN. 185-197 - Changqing Xia, Xi Jin, Jintao Wang, Linghe Kong, Peng Zeng:
Scheduling for MU-MIMO Wireless Industrial Sensor Networks. 198-209 - Kai Zhang, Lifei Wei, Xiangxue Li, Haifeng Qian:
Provably Secure Dual-Mode Publicly Verifiable Computation Protocol in Marine Wireless Sensor Networks. 210-219 - Yaqiang Zhang, Zhangbing Zhou, Deng Zhao, Yunchuan Sun, Xiao Xue:
A Genetic Algorithm Based Mechanism for Scheduling Mobile Sensors in Hybrid WSNs Applications. 220-231 - Pengpeng Chen, Yuqing Yin, Shouwan Gao, Qiang Niu:
SSD: Signal-Based Signature Distance Estimation and Localization for Sensor Networks. 232-243 - Ping Zhong, Yiwen Zhang, Shuaihua Ma, Jianliang Gao, Yingwen Chen:
An Adaptive MAC Protocol for Wireless Rechargeable Sensor Networks. 244-252 - Ying Yu, Jinglan Jia, Deying Li, Yuqing Zhu:
Fair Multi-influence Maximization in Competitive Social Networks. 253-265 - Ruiguo Yu, Jianrong Wang, Tianyi Xu, Jie Gao, Kunyu Cao, Mei Yu:
Communities Mining and Recommendation for Large-Scale Mobile Social Networks. 266-277 - Feng Wang, Ken Orton:
Community Verification with Topic Modeling. 278-288 - Boubakr Nour, Kashif Sharif, Fan Li, Hassine Moungla, Yang Liu:
M2HAV: A Standardized ICN Naming Scheme for Wireless Devices in Internet of Things. 289-301 - Fangyu Gai, Jiexin Zhang, Peidong Zhu, Xinwen Jiang:
Multidimensional Trust-Based Anomaly Detection System in Internet of Things. 302-313 - Junjie Yan, Dapeng Wu, Honggang Wang, Dalei Wu, Ruyan Wang:
Social D2D Communications Based on Fog Computing for IoT Applications. 314-325 - Qing Hu, Shichao Lv, Zhiqiang Shi, Limin Sun, Liang Xiao:
Defense Against Advanced Persistent Threats with Expert System for Internet of Things. 326-337 - Nan Ding, Shuaihang Nie, Huaiwei Si, Huanbo Gao:
QoE Enhancement of Task Scheduling Algorithm for VANET Applications. 338-343 - Fangyu Gai, Jiexin Zhang, Peidong Zhu, Xinwen Jiang:
Ratee-Based Trust Management System for Internet of Vehicles. 344-355 - Chengzhe Lai, Rongxing Lu, Dong Zheng:
Achieving Secure and Seamless IP Communications for Group-Oriented Software Defined Vehicular Networks. 356-368 - Junyu Zhu, Chuanhe Huang, Xiying Fan, Bin Fu:
An Efficient Distributed Randomized Data Replication Algorithm in VANETs. 369-380 - Chenyang Liu, Dan Yin, Hao Li, Wei Wang, Wu Yang:
Preserving Privacy in Social Networks Against Label Pair Attacks. 381-392 - Tianchong Gao, Feng Li, Yu Chen, Xukai Zou:
Preserving Local Differential Privacy in Online Social Networks. 393-405 - Fenghua Li, Jiawen Liu, Liang Fang, Ben Niu, Kui Geng, Hui Li:
Pricing Privacy Leakage in Location-Based Services. 406-418 - Chunhai Feng, Sheheryar Ali Arshad, Yonghe Liu:
MAIS: Multiple Activity Identification System Using Channel State Information of WiFi Signals. 419-432 - Xinyuan Zhang, Liusheng Huang, Peng Fang, Shaowei Wang, Zhenyu Zhu, Hongli Xu:
Differentially Private Frequent Itemset Mining from Smart Devices in Local Setting. 433-444 - Sujit Biswas, Kashif Sharif, Fan Li, Yang Liu:
3P Framework: Customizable Permission Architecture for Mobile Applications. 445-456 - Yunhua He, Hong Li, Xiuzhen Cheng, Yan Liu, Limin Sun:
A Bitcoin Based Incentive Mechanism for Distributed P2P Applications. 457-468 - Chunqiang Hu, Yan Huo, Liran Ma, Hang Liu, Shaojiang Deng, Liping Feng:
An Attribute-Based Secure and Scalable Scheme for Data Communications in Smart Grids. 469-482 - Xin Fan, Liang Huang, Yan Huo, Chunqiang Hu, Yuqi Tian, Jin Qian:
Space Power Synthesis-Based Cooperative Jamming for Unknown Channel State Information. 483-495 - Tianyi Pan, Md Abdul Alim, Xiang Li, My T. Thai:
Breakdown by Rumors: Vulnerability of D2D Communications from Online Social Networks. 496-508 - Qinghe Du, Wanyu Li, Houbing Song:
Security Enhancement via Dynamic Fountain Code for Wireless Multicast. 509-521 - Yalong Xiao, Jianxin Wang, Shigeng Zhang, Haodong Wang, Jiannong Cao:
Accurate Indoor Localization with Multiple Feature Fusion. 522-533 - Kang Yao, Hongwei Du, Qiang Ye, Wen Xu:
A Power-Efficient Scheme for Outdoor Localization. 534-545 - Weiqing Huang, Chang Ding, Siye Wang, Junyu Lin, Shao-yi Zhu, Yue Cui:
Design and Realization of an Indoor Positioning Algorithm Based on Differential Positioning Method. 546-558 - Changfang Chen, Minglei Shu, Yinglong Wang, Nuo Wei:
A Study on the Second Order Statistics of \kappa κ - \mu μ Fading Channels. 559-571 - Jiaxing Shang, Hongchun Wu, Shangbo Zhou, Lianchen Liu, Hongbin Tang:
Effective Influence Maximization Based on the Combination of Multiple Selectors. 572-583 - Zhao Zhang, Xiaohui Huang, Lina Chen:
A Simpler Method to Obtain a PTAS for Connected k-Path Vertex Cover in Unit Disk Graph. 584-592 - Peng-Jun Wan, Huaqiang Yuan, XuFei Mao, Jiliang Wang, Zhu Wang:
Maximum-Weighted λ-Colorable Subgraph: Revisiting and Applications. 593-604 - Shuan He, Wei Wang:
Wireless Image Relay: Prioritized QoE Scheduling with Simplified Space-Time Coding Mode Selection. 605-616 - Xianming Gao, Baosheng Wang, Wenping Deng:
Software Defined Routing System. 617-628 - Peng Liu, Yue Ding, Jia Xu, Tingting Fu:
Towards Efficient Multimedia Data Disseminating in Mobile Opportunistic Networks. 629-640 - Qiuyuan Huang, Jing Zhao, Haohua Du, Jiahui Hou, Xiang-Yang Li:
Job Scheduling Under Differential Pricing: Hardness and Approximation Algorithms. 641-652 - Baohua Huang, Wei Cheng:
Distributing Negative Messages in VANET Based on Meet-Table and Cloud Computing. 653-664 - Weijuan Zhang, Xiaoqi Jia, Jianwei Tai, Mingsheng Wang:
CacheRascal: Defending the Flush-Reload Side-Channel Attack in PaaS Clouds. 665-677 - Daoyuan Wu, Ximing Liu, Jiayun Xu, David Lo, Debin Gao:
Measuring the Declared SDK Versions and Their Consistency with API Calls in Android Apps. 678-690 - Bing Chang, Ximing Liu, Yingjiu Li, Pingjian Wang, Wen Tao Zhu, Zhan Wang:
Employing Smartwatch for Enhanced Password Authentication. 691-703 - Xing Zhou, Liusheng Huang, Yang Xu, Wei Yang:
AIS: An Inaudible Guider in Your Smartphone. 704-715 - Zhen Ling, Melanie Borgeest, Chuta Sano, Sirong Lin, Mogahid Fadl, Wei Yu, Xinwen Fu, Wei Zhao:
A Case Study of Usable Security: Usability Testing of Android Privacy Enhancing Keyboard. 716-728 - Degang Sun, Kun Yang, Zhixin Shi, Yan Wang:
Detecting Flooding DDoS Under Flash Crowds Based on Mondrian Forest. 729-740 - Gang Ren, Pan Deng, Chao Yang:
A 3-Layer Method for Analysis of Cooperative Behaviors of Physical Devices in Cyber-Physical Systems. 741-754 - Xinyu Yang, Cong Zhao, Wei Yu, Xianghua Yao, Xinwen Fu:
A User Incentive-Based Scheme Against Dishonest Reporting in Privacy-Preserving Mobile Crowdsensing Systems. 755-767 - Xunpeng Rao, Panlong Yang, Yubo Yan:
You Can Charge over the Road: Optimizing Charging Tour in Urban Area. 768-779 - Hao Yang, Licai Zhu, Weipeng Lv:
A HCI Motion Recognition System Based on Channel State Information with Fine Granularity. 780-790 - Fan Wu, Yang Wang, Runtong Chen, Xinfang Xie:
Broadband Communications for High Speed Trains via NDN Wireless Mesh Network. 791-803 - Jian Mao, Wenqian Tian, Pei Li, Tao Wei, Zhenkai Liang:
Phishing Website Detection Based on Effective CSS Features of Web Pages. 804-815 - Jiaqi Liang, Wenwen Du, Kai Xing, Chunlin Zhong:
A Neural Network Model Based Adaptive Flight Control System. 816-828 - Di Liu, Chuanhe Huang, Xi Chen, Xiaohua Jia:
Supporting Producer Mobility via Named Data Networking in Space-Terrestrial Integrated Networks. 829-841 - Su Hu, Yixuan Huang, Chuanxue Jin, Qu Luo, Jin Zhang, Yuan Gao, Xiangyang Li:
Development and Performance Evaluation of Filterbank Multicarrier Systems. 842-853 - Yuqi Tian, Yan Huo, Chunqiang Hu, Qinghe Gao, Tao Jing:
A Location Prediction-based Physical Layer Security Scheme for Suspicious Eavesdroppers. 854-859 - Jinghua Zhu, Xuming Yin, Yake Wang, Jinbao Li, Yingli Zhong, Yingshu Li:
Structural Holes Theory-Based Influence Maximization in Social Network. 860-864 - Jintao Wang, Xi Jin, Peng Zeng, Zhaowei Wang, Changqing Xia:
Layout Optimization for a Long Distance Wireless Mesh Network: An Industrial Case Study. 865-870 - Feng Yi, Hong Li, Hongtao Wang, Hui Wen, Limin Sun:
Mobility Intention-Based Relationship Inference from Spatiotemporal Data. 871-876 - Gangqiang Zhou, Jigang Wu, Long Chen:
TACD: A Three-Stage Auction Scheme for Cloudlet Deployment in Wireless Access Network. 877-882 - Shanjing Yang, Jianlin Hu, Weiqing Huang:
Recognition of Electro-Magnetic Information Leakage of Computer Based on Multi-image Blind Deconvolution. 883-889 - Liang Sun, Lei Wang, Zhenquan Qin, Zehao Ma, Zhuxiu Yuan:
A Novel On-Line Association Algorithm in Multiple-AP Wireless LAN. 890-902 - Sen Li, Bin Lin, Bing Li, Rongxi He:
Near-Field Localization Algorithm Based on Sparse Reconstruction of the Fractional Lower Order Correlation Vector. 903-908
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.