default search action
14th WASA 2019: Honolulu, HI, USA
- Edoardo S. Biagioni, Yao Zheng, Siyao Cheng:
Wireless Algorithms, Systems, and Applications - 14th International Conference, WASA 2019, Honolulu, HI, USA, June 24-26, 2019, Proceedings. Lecture Notes in Computer Science 11604, Springer 2019, ISBN 978-3-030-23596-3
Full Papers
- Qianwen An, Tao Jing, Yingkun Wen, Zhuojun Duan, Yan Huo:
Decomposable Atomic Norm Minimization Channel Estimation for Millimeter Wave MIMO-OFDM Systems. 3-15 - Ran Bi, Jiankang Ren, Hao Wang, Qian Liu, Shan Huang:
Model Based Adaptive Data Acquisition for Internet of Things. 16-28 - Di Cao, Jing-run Jia, Min-jie Xie, Yanjing Lei, Wei Lee:
Hybrid Low Frequency Electromagnetic Field and Solar Energy Harvesting Architecture for Self-Powered Wireless Sensor System. 29-42 - Cheng Chang, Huaxin Li, Yichi Zhang, Suguo Du, Hui Cao, Haojin Zhu:
Automated and Personalized Privacy Policy Extraction Under GDPR Consideration. 43-54 - Lin Chen, Xiaoshuang Xing, Gaofei Sun, Jin Qian, Xin Guan:
Cooperative BSM Dissemination in DSRC/WAVE Based Vehicular Networks. 55-66 - Na Dang, Xiaowu Liu, Jiguo Yu, Xiaowei Zhang:
TIDS: Trust Intrusion Detection System Based on Double Cluster Heads for WSNs. 67-83 - Ningzhi Deng, Shaojiang Deng, Chunqiang Hu, Kaiwen Lei:
An Efficient Revocable Attribute-Based Signcryption Scheme with Outsourced Designcryption in Cloud Computing. 84-97 - Son Dinh, Hang Liu, Feng Ouyang:
Massive MIMO Cognitive Cooperative Relaying. 98-110 - Zhaoquan Gu, Yuexuan Wang, Yijie Wu, Yongcai Wang, Yueming Wang:
Minimum Control Cost of Weighted Linear Dynamic Networks. 111-123 - Yan Huang, Zhipeng Cai, Anu G. Bourgeois:
Privacy Protection for Context-Aware Services: A Two-Layer Three-Party Game Model. 124-136 - Qiwei Jia, Lu Zhou, Huaxin Li, Ruoxu Yang, Suguo Du, Haojin Zhu:
Who Leaks My Privacy: Towards Automatic and Association Detection with GDPR Compliance. 137-148 - Chunlei Li, Qian Wu, Hewu Li, Jun Liu:
Trustroam: A Novel Blockchain-Based Cross-Domain Authentication Scheme for Wi-Fi Access. 149-161 - Feng Li, Huan Yang, Yifei Zou, Dongxiao Yu, Jiguo Yu:
Joint Optimization of Routing and Storage Node Deployment in Heterogeneous Wireless Sensor Networks Towards Reliable Data Storage. 162-174 - Min Li, Yao Chen, Yanfang Zhang, Jian Yang, Hong Du:
Fusing RFID and Computer Vision for Occlusion-Aware Object Identifying and Tracking. 175-187 - Ye Li, Guangqiang Yin, Shaoqi Hou, Jianhai Cui, Zicheng Huang:
Spatiotemporal Feature Extraction for Pedestrian Re-identification. 188-200 - Qixiao Lin, Jian Mao, Futian Shi, Shishi Zhu, Zhenkai Liang:
Detecting Android Side Channel Probing Attacks Based on System States. 201-212 - Liuyan Liu, Haoqiang Huang, Haisheng Tan, Wanli Cao, Panlong Yang, Xiang-Yang Li:
Online DAG Scheduling with On-Demand Function Configuration in Edge Computing. 213-224 - Bin Ma, Yubin Zhao, Xiaofan Li, Yuefeng Ji, Cheng-Zhong Xu:
Magnetic Beamforming Algorithm for Hybrid Relay and MIMO Wireless Power Transfer. 225-234 - Shengchao Ma, Jinghua Zhu:
Self-attention Based Collaborative Neural Network for Recommendation. 235-246 - Yuwen Pu, Ying Wang, Feihong Yang, Jin Luo, Chunqiang Hu, Haibo Hu:
An Efficient and Recoverable Data Sharing Mechanism for Edge Storage. 247-259 - Letu Qingge, Peng Zou, Lihui Dai, Qing Yang, Binhai Zhu:
Trajectory Comparison in a Vehicular Network II: Eliminating the Redundancy. 260-271 - Xuebin Ren, Shuyang Wang, Xianghua Yao, Chia-Mu Yu, Wei Yu, Xinyu Yang:
Differentially Private Event Sequences over Infinite Streams with Relaxed Privacy Guarantee. 272-284 - Mohammed Sarkhi, Abdulsahib Albehadili, Osama Hussein, Ahmad Y. Javaid, Vijay Kumar Devabhaktuni:
Performance Investigation of Polar Codes over Nakagami-M Fading and Real Wireless Channel Measurements. 285-296 - Dian Shi, Xuanheng Li, Ming Li, Jie Wang, Pan Li, Miao Pan:
Optimal Transportation Network Company Vehicle Dispatching via Deep Deterministic Policy Gradient. 297-309 - Korn Sooksatra, Ruinian Li, Yingshu Li, Xin Guan, Wei Li:
Fairness-Aware Auction Mechanism for Sustainable Mobile Crowdsensing. 310-321 - Hao Wang:
Evolutionary Game Based Gateway Selection Algorithm in Cyber-Physical System. 322-334 - Yawei Wang, Donghui Chen, Cheng Zhang, Xi Chen, Baogui Huang, Xiuzhen Cheng:
Wide and Recurrent Neural Networks for Detection of False Data Injection in Smart Grids. 335-345 - Yucheng Wang, Xu Wang, Hongsong Zhu, Hai Zhao, Hong Li, Limin Sun:
ONE-Geo: Client-Independent IP Geolocation Based on Owner Name Extraction. 346-357 - Qianwen Wei, Shujun Li, Wei Li, Hong Li, Mingsheng Wang:
Decentralized Hierarchical Authorized Payment with Online Wallet for Blockchain. 358-369 - Ke Xiao, Chaofei Li, Yunhua He, Chao Wang, Wei Cheng:
A Location Predictive Model Based on 2D Angle Data for HAPS Using LSTM. 370-381 - Juan Xu, Xingxin Xu, Xu Ding, Lei Shi, Yang Lu:
Cross-Layer Optimization on Charging Strategy for Wireless Sensor Networks Based on Successive Interference Cancellation. 382-394 - Linyan Xu, Zhangjie Fu, Liran Ma:
An Integrated UAV Platform for Real-Time and Efficient Environmental Monitoring. 395-406 - Shuaijing Xu, Guangzhi Zhang, Rongfang Bie, Anton Kos:
CXNet-m2: A Deep Model with Visual and Clinical Contexts for Image-Based Detection of Multiple Lesions. 407-418 - Xiaohua Xu, Yuanfang Chen, Shuibing He, Patrick Otoo Bobbie:
OWLS: Opportunistic Wireless Link Scheduling with SINR Constraints. 419-431 - Xiaohua Xu, Yi Zhao, Dongfang Zhao, Lei Yang, Spiridon Bakiras:
Distributed Real-Time Data Aggregation Scheduling in Duty-Cycled Multi-hop Sensor Networks. 432-444 - Biao Yu, Yingwen Chen, Shaojing Fu, Wanrong Yu, Xiaoli Guo:
Building Trustful Crowdsensing Service on the Edge. 445-457 - Cheng Zhang, Honglu Jiang, Yawei Wang, Qin Hu, Jiguo Yu, Xiuzhen Cheng:
User Identity De-anonymization Based on Attributes. 458-469 - Di Zhang, Qiang Niu, Xingbao Qiu:
Detecting Anomalies in Communication Packet Streams Based on Generative Adversarial Networks. 470-481 - Peng Zhang, Xu Ding, Jing Wang, Juan Xu:
Multi-hop Wireless Recharging Sensor Networks Optimization with Successive Interference Cancellation. 482-494 - Jinghua Zhu, Xu Guo:
Deep Neural Model for Point-of-Interest Recommendation Fused with Graph Embedding Representation. 495-506 - Weiping Zhu, Hang Gao, Zongjian He, Jiangbo Qin, Bo Han:
A Hybrid Approach for Recognizing Web Crawlers. 507-519 - Zhenyu Zhu, Liusheng Huang, Hongli Xu:
Contextual Combinatorial Cascading Thompson Sampling. 520-532 - Peng Zou, Letu Qingge, Qing Yang, Binhai Zhu:
Trajectory Comparison in a Vehicular Network I: Computing a Consensus Trajectory. 533-544
Short Papers
- Ran Bi, Jiankang Ren, Hao Wang, Qian Liu, Xiuyuan Yang:
Utility Aware Task Offloading for Mobile Edge Computing. 547-555 - Shasha Chen, Shengling Wang, Jianghui Huang:
Analysis of Best Network Routing Structure for IoT. 556-563 - Yuqi Fan, Liming Wang, Lei Shi, Ding-Zhu Du:
Parallel Multicast Information Propagation Based on Social Influence. 564-572 - Weiqing Huang, Yan Li, Dong Wei, Qiaoyu Zhang:
Research on Physical Layer Security Scheme Based on OAM - Modulation for Wireless Communications. 573-586 - Liu Hui, Shengling Wang:
Optimal Routing of Tight Optimal Bidirectional Double-Loop Networks. 587-595 - Li Li, Hui Xia, Rui Zhang, Ye Li:
DDSEIR: A Dynamic Rumor Spreading Model in Online Social Networks. 596-604 - Zhenchun Wei, Jie Pan, Kangkang Wang, Lei Shi, Zengwei Lyu, Lin Feng:
Data Forwarding and Caching Strategy for RSU Aided V-NDN. 605-612 - Hui Wen, Weidong Zhang, Yan Hu, Qing Hu, Hongsong Zhu, Limin Sun:
Lightweight IoT Malware Visualization Analysis via Two-Bits Networks. 613-621 - Yunpeng Wu, Shukui Zhang, Yuren Yang, Yang Zhang, Li Zhang, Hao Long:
Privacy Protection Sensing Data Aggregation for Crowd Sensing. 622-630 - Changsong Yang, Xiaoling Tao, Feng Zhao, Yong Wang:
A New Outsourced Data Deletion Scheme with Public Verifiability. 631-638 - Xueling Zhou, Lingbo Wei, Yukun Niu, Chi Zhang, Yuguang Fang:
DPSR: A Differentially Private Social Recommender System for Mobile Users. 639-646
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.