default search action
17th MSN 2021: Exeter, UK
- 17th International Conference on Mobility, Sensing and Networking, MSN 2021, Exeter, United Kingdom, December 13-15, 2021. IEEE 2021, ISBN 978-1-6654-0668-0
- Luming Yang, Shaojing Fu, Yuchuan Luo, Yongjun Wang, Wentao Zhao:
A Clustering Method of Encrypted Video Traffic Based on Levenshtein Distance. 1-8 - Jing'an Xue, Haibo Wang, Jilong Wang, Zhe Chen, Tong Li:
A Distributed Hybrid Load Management Model for Anycast CDNs. 9-16 - Jer Shyuan Ng, Wei Yang Bryan Lim, Zehui Xiong, Xianjun Deng, Yang Zhang, Dusit Niyato, Cyril Leung:
A Hierarchical Incentive Mechanism for Coded Federated Learning. 17-24 - Dongkun Huo, Qiang Liu, Yantao Sun, Huiling Li:
A Large Inter-satellite Non-dependent Routing Technology - IS-OLSR. 25-31 - Qian Chen, Xian Zhao, Wenyue Sun, Changda Wang:
A Node Importance Ranking Method Based on the Rate of Network Entropy Changes. 32-39 - Di Wu, Juan Xu, Jiabin Yuan, Xiangping Zhai:
A Novel Deployment Method for UAV-mounted Mobile Base Stations. 40-47 - Lingling Hu, Liang Liu, Yulei Liu, Wenbin Zhai, Xinmeng Wang:
A robust fixed path-based routing scheme for protecting the source location privacy in WSNs. 48-55 - Tingting Lu, Fanping Zeng, Jingfei Shen, Guozhu Chen, Wenjuan Shu, Weikang Zhang:
A Scheduling Scheme in a Container-Based Edge Computing Environment Using Deep Reinforcement Learning Approach. 56-65 - Liu Tao, Xiang Wang, Xiyang Peng, Po Yang, Jun Qi, Yun Yang:
Activity Selection to Distinguish Healthy People from Parkinson's Disease Patients Using I-DA. 66-73 - Zhihong Sun, Jun Chen, Mithun Mukherjee, Haihui Wang, Dang Zhang:
An Improved Online Multiple Pedestrian Tracking Based on Head and Body Detection. 74-80 - Fidan Mehmeti, Thomas F. La Porta:
Analyzing a 5G Dataset and Modeling Metrics of Interest. 81-88 - Weiqing Huang, Bingyang Li, Wen Wang, Meng Zhang, Sixue Lu, Yushan Han:
AWGAN: Unsupervised Spectrum Anomaly Detection with Wasserstein Generative Adversarial Network along with Random Reverse Mapping. 89-96 - Mohamad Muwfak Hlal, Weizhi Meng:
BALSAPro: Towards A Security Protocol for Bluetooth Low Energy. 97-104 - Quanwen He, Hui Lin, Fu Xiao, Jia Hu, Xiaoding Wang:
Blockchain-based Access Control Model to Preserve Privacy for Students' Credit Information. 105-111 - Margarita Vitoropoulou, Konstantinos Tsitseklis, Vasileios Karyotis, Symeon Papavassiliou:
Caching, Recommendations and Opportunistic Offloading at the Network Edge. 112-119 - Yutong Ye, Min Zhang, Dengguo Feng:
Collecting Spatial Data Under Local Differential Privacy. 120-127 - Pengmiao Li, Yuchao Zhang, Huahai Zhang, Wendong Wang, Ke Xu, Zhili Zhang:
CRATES: A Cache Replacement Algorithm for Low Access Frequency Period in Edge Server. 128-135 - Ahmed Almutairi, Suresh Srinivasan, Alireza Keshavarz-Haddad, Ehsan Aryafar:
Deep Transfer Learning for Cross-Device Channel Classification in mmWave Wireless. 136-144 - Qi Xia, Zeyi Tao, Qun Li:
Defending Against Byzantine Attacks in Quantum Federated Learning. 145-152 - Yuanyuan Xie, Bing Chen, Jiale Zhang, Di Wu:
Defending against Membership Inference Attacks in Federated learning via Adversarial Example. 153-160 - Ludovico Poli, Sangeet Saha, Xiaojun Zhai, Klaus D. McDonald-Maier:
Design and Implementation of a RISC V Processor on FPGA. 161-166 - Md Tamjid Hossain, Shafkat Islam, Shahriar Badsha, Haoting Shen:
DeSMP: Differential Privacy-exploited Stealthy Model Poisoning Attacks in Federated Learning. 167-174 - Fengyu Zhou, Hao Zhou, Shan Wang, Wangqiu Zhou, Zhi Liu, Xiang-Yang Li:
Distributed Routing Protocol for Large-Scale Backscatter-enabled Wireless Sensor Network. 175-182 - Xiangyu Li, Zhenfu Cao, Jiachen Shen, Xiaolei Dong:
DPFDT: Decentralized Privacy-preserving Fair Data Trading System. 183-190 - Jindi Wu, Qi Xia, Qun Li:
Efficient Privacy-Preserving Federated Learning for Resource-Constrained Edge Devices. 191-198 - Jacky Cao, Xiang Su, Benjamin Finley, Antti Pauanne, Mostafa H. Ammar, Pan Hui:
Evaluating Multimedia Protocols on 5G Edge for Mobile Augmented Reality. 199-206 - Chan Yun Hin, Edith C. H. Ngai:
FedHe: Heterogeneous Models and Communication-Efficient Federated Learning. 207-214 - Parya Haji Mirzaee, Mohammad Shojafar, Zahra Pooranian, Pedram Asef, Haitham S. Cruickshank, Rahim Tafazolli:
FIDS: A Federated Intrusion Detection System for 5G Smart Metering Network. 215-222 - Ruijie Zhao, Yiteng Huang, Xianwen Deng, Zhi Xue, Jiabin Li, Zijing Huang, Yijun Wang:
Flow Transformer: A Novel Anonymity Network Traffic Classifier with Attention Mechanism. 223-230 - Rushi Babaria, Sharat Chandra Madanapalli, Himal Kumar, Vijay Sivaraman:
FlowFormers: Transformer-based Models for Real-time Network Flow Classification. 231-238 - Tian Qin, Guang Cheng, Wenchao Chen, Xuan Lei:
FNEL: An Evolving Intrusion Detection System Based on Federated Never-Ending Learning. 239-246 - Liang Wang, Haixing Xu, Zhiwen Yu, Rujun Guan, Bin Guo, Zhuo Sun:
Friendship Understanding by Smartphone-based Interactions: A Cross-space Perspective. 247-254 - Fabian A. Rincon Vija, Samuel Cregut, Georgios Z. Papadopoulos, Nicolas Montavont:
From Wired to Wireless BMS in Electric Vehicles. 255-262 - Sen Ling, Waixi Liu, Yinghao Zhu, Miaoquan Tan, Jieming Huang, Zhenzheng Guo, Wen-Hong Lin:
FullSight: Towards Scalable, High-Coverage, and Fine-grained Network Telemetry. 263-270 - Bo Wang, Zunfu Huang, Dongming Zhao, Kun Huang, Meixian Song, Qinxue Jiang, Naixue Xiong:
IDS: An Intelligent Data Semantics System for Communication Link Prediction in SIoT. 271-278 - Zengyu Song, Hao Zhou, Shan Wang, Jinmeng Fan, Kaiwen Guo, Wangqiu Zhou, Xiaoyan Wang, Xiang-Yang Li:
IMFi: IMU-WiFi based Cross-modal Gait Recognition System with Hot-Deployment. 279-286 - Rukhsana Ruby, Basem M. ElHalawany, Kaishun Wu:
Impact of UAV Mobility on Physical Layer Security. 287-295 - Xiyu Chen, Yangzhe Liao, Qingsong Ai, Ke Zhang:
Joint Task Offloading and Resource Allocation for MEC Networks Considering UAV Trajectory. 296-302 - Ryan Hosler, Tyler Phillips, Xiaoyuan Yu, Agnideven Palanisamy Sundar, Xukai Zou, Feng Li:
Learning Discriminative Features for Adversarial Robustness. 303-310 - Le Lai, Tongqing Zhou, Zhiping Cai, Jiaping Yu, Hao Bai, Jinhua Cui:
Leveraging blockchain for cross-institution data sharing and authentication in mobile healthcare. 311-318 - Hongrui Chen, Yuan Xiong, Jingru Wang, Zhong Zhou:
Long-Term Visual Localization with Semantic Enhanced Global Retrieval. 319-326 - Min Yan, Li Wang, Xuanyuan Wang, Liang Li, Lianming Xu, Aiguo Fei:
Matching Theory Aided Federated Learning Method for Load Forecasting of Virtual Power Plant. 327-333 - Bo Liu, Yanyun Xu, Weiqing Huang, Shaoying Guo:
Method for Detecting and Analyzing the Compromising Emanations of USB Storage Devices. 334-340 - Bingyang Guo, Fan Shi, Chengxi Xu, Min Zhang, Yang Li:
Mining Centralization of Internet Service Infrastructure in the Wild. 341-349 - Qi Wu, Guolin Chen, Xiaoxia Huang:
Mobility-Aware Efficient Task Offloading with Dependency Guarantee in Mobile Edge Computing Networks. 350-357 - WangYang Yu, Menghan Jia, Bo Yuan:
Modeling and Analysis of Medical Resource Sharing and Scheduling for Public Health Emergencies based on Petri Nets. 358-365 - Menghui Zhou, Xulong Wang, Yun Yang, Fengtao Nan, Yu Zhang, Jun Qi, Po Yang:
Modeling Disease Progression Flexibly with Nonlinear Disease Structure via Multi-task Learning. 366-373 - Zhiyuan Zhou, Xiaolei Zhou, Yao Lu, Hua Yan, Baoshen Guo, Shuai Wang:
Multi-Source Data-Driven Route Prediction for Instant Delivery. 374-381 - Bonan Shen, Chenhong Cao, Tong Liu, Jiangtao Li, Yufeng Li:
Neural Adaptive IoT Streaming Analytics with RL-Adapt. 382-389 - Dan Zhang, Yiwen Liang, Zhihong Sun, Mithun Mukherjee:
One-Class Support Vector Machine with Particle Swarm Optimization for Geo-Acoustic Anomaly Detection. 390-395 - Bing Wang, Yuchun Guo, Yishuai Chen:
Personalized Path Recommendation with Specified Way-points Based on Trajectory Representations. 396-403 - Hanzheng Lyu, Jianyu Niu, Fangyu Gai, Chen Feng:
Publish or Perish: Defending Withholding Attack in Dfinity Consensus. 404-411 - Rutao Yu, Jiangang Shu, Dekai Yan, Xiaohua Jia:
ReDetect: Reentrancy Vulnerability Detection in Smart Contracts with High Accuracy. 412-419 - Jian Wang, Yongxin Liu, Shuteng Niu, Houbing Song:
Reinforcement Learning based Scheduling for Heterogeneous UAV Networking. 420-427 - Wenjuan Shu, Fanping Zeng, Zhen Ling, Junyi Liu, Tingting Lu, Guozhu Chen:
Resource Demand Prediction of Cloud Workloads Using an Attention-based GRU Model. 428-437 - Biaokai Zhu, Liyun Tian, Die Wu, Meiya Dong, Sheng Gao, Lu Zhang, Sanman Liu, Deng-Ao Li:
RF-Vsensing: RFID-based Single Tag Contactless Vibration Sensing and Recognition. 438-445 - Qiong Wu, Zhenming Liu:
Rosella: A Self-Driving Distributed Scheduler for Heterogeneous Clusters. 446-453 - Aishah Aseeri, Rui Zhang:
SecQSA: Secure Sampling-Based Quantile Summary Aggregation in Wireless Sensor Networks. 454-461 - Xiaosong Gao, Jiaxin Zeng, Xiaobo Zhou, Tie Qiu, Keqiu Li:
Soft Actor-Critic Algorithm for 360-Degree Video Streaming with Long-Term Viewport Prediction. 462-469 - Mingxing Liu, Ying Liu, Ke Xu, Lin He, Xiaoliang Wang, Yangfei Guo, Weiyu Jiang:
TAP: A Traffic-Aware Probabilistic Packet Marking for Collaborative DDoS Mitigation. 470-478 - Feng Wang, Dingde Jiang, Yingjie Chen, Houbing Song, Zhihan Lv:
Time-varying Contact Management with Dynamic Programming for LEO Satellite Networks. 479-485 - Li Wang, Weizhi Meng, Wenjuan Li:
Towards DTW-based Unlock Scheme using Handwritten Graphics on Smartphones. 486-493 - Xiaoyan Hu, Xiaoyi Song, Guang Cheng, Jian Gong, Lu Yang, Honggang Chen, Zhichao Liang:
Towards Efficient Co-audit of Privacy-Preserving Data on Consortium Blockchain via Group Key Agreement. 494-501 - Wenzhi Wang, Meng Fan, Aimin Yu, Dan Meng:
Towards Heap-Based Memory Corruption Discovery. 502-511 - Yang Cai, Biao Han, Jinshu Su, Xiaoyan Wang:
TraceModel: An Automatic Anomaly Detection and Root Cause Localization Framework for Microservice Systems. 512-519 - Jinfeng Ma, Mengxuan Du, Haifeng Zheng, Xinxin Feng:
Unsupervised Federated Adversarial Domain Adaptation for Heterogeneous Internet of Things. 520-527 - Yuanjun Xia, Shi Dong, Tao Peng, Tao Wang:
Wireless Network Abnormal Traffic Detection Method Based on Deep Transfer Reinforcement Learning. 528-535 - Agon Memedi, Falko Dressler:
A Location-Aware Cross-Layer MAC Protocol for Vehicular Visible Light Communications. 536-542 - Zai Shi, Atilla Eryilmaz:
Communication-efficient Subspace Methods for High-dimensional Federated Learning. 543-550 - Felix O. Olowononi, Ahmed H. Anwar, Danda B. Rawat, Jaime C. Acosta, Charles A. Kamhoua:
Deep Learning for Cyber Deception in Wireless Networks. 551-558 - Guillem Reus Muns, Batool Salehi, Debashri Roy, Tong Jian, Zifeng Wang, Jennifer G. Dy, Stratis Ioannidis, Kaushik R. Chowdhury:
Deep Learning on Visual and Location Data for V2I mmWave Beamforming. 559-566 - Teng Ma, Xin Chen, Libo Jiao, Ying Chen:
Deep Reinforcement Learning-based Edge Caching and Multi-link Cooperative Communication in Internet-of-Vehicles. 567-574 - Shucheng Hu, Tao Ren, Jianwei Niu, Zheyuan Hu, Guoliang Xing:
Distributed Task Offloading based on Multi-Agent Deep Reinforcement Learning. 575-583 - Yunhuai Liu, Yonggui Huang, Sheng Gu:
DVC: An Deductable Video Coding for Video Broadcast in Highly Dynamic Networks. 584-591 - Xuezheng Liu, Ke Liu, Guoqiao Ye, Miao Hu, Yipeng Zhou, Di Wu:
Gaming at the Edge: A Weighted Congestion Game Approach for Latency-Sensitive Scheduling. 592-599 - Fabian Wölk, Tingting Yuan, Krisztina Kis-Katos, Xiaoming Fu:
Measuring Consumption Changes in Rural Villages based on Satellite Image Data - A Case Study for Thailand and Vietnam. 600-607 - Wenjun Yang, Shengjie Shu, Lin Cai, Jianping Pan:
MM-QUIC: Mobility-aware Multipath QUIC for Satellite Networks. 608-615 - Andreas Andreou, Constandinos X. Mavromoustakis, George Mastorakis, Jordi Mongay Batalla:
Network Security by Merging two Robust Tools from the Mathematical Firmament. 616-621 - Htet Htet Hlaing, Yuki Funamoto, Masahiro Mambo:
Performance Comparison of Hybrid Encryption-based Access Control Schemes in NDN. 622-627 - Richard Li, Lijun Dong, Cédric Westphal, Kiran Makhijani:
Qualitative Communication for Emerging Network Applications with New IP. 628-637 - Yang Liu, Lei Liu, Zhongmin Yan, Jia Hu:
The Algorithm of Multi-source to Multi-sink Traffic scheduling. 638-644 - Thi Ha Ly Dinh, Megumi Kaneko, Keisuke Wakao, Kenichi Kawamura, Takatsune Moriyama, Yasushi Takatori:
Towards an Energy-Efficient DQN-based User Association in Sub6GHz/mmWave Integrated Networks. 645-652 - You Luo, Feng Wang, Jiangchuan Liu:
Towards High Accuracy Low Latency Real-Time Road Information Collection: An Edge-Assisted Sensor Fusion Approach. 653-660 - Tutomu Murase:
User Cooperative Mobility for Higher QoS in Ad Hoc Network: Framework and Evaluation. 661-670 - Hantao Mei, Guang Cheng, Wei Gao, Junqiang Chen:
Website Fingerprinting on Access network and Core Gateway. 671-678 - Felix Beierle, Hai Dinh-Tuan, Yong Wu:
Demonstrator Game Showcasing Indoor Positioning via BLE Signal Strength. 679-680 - Bo Hui, Chen Jiang, Pavani Ankireddy, Wenlu Wang, Wei-Shinn Ku:
Indoor Navigation for Users with Mobility Aids Using Smartphones and Neighborhood Networks. 681-682 - Jinfu Chen, Shang Yin, Saihua Cai, Lingling Zhao, Shengran Wang:
L-KPCA: an efficient feature extraction method for network intrusion detection. 683-684 - Hai Dinh-Tuan, Katerina Katsarou, Patrick Herbke:
Optimizing microservices with hyperparameter optimization. 685-686 - Shunbao Li, Po Yang, Vitaveska Lanfranchi:
Examing and Evaluating Dimension Reduction Algorithms for Classifying Alzheimer's Diseases using Gene Expression Data. 687-693 - Mustapha Khiati, Djamel Djenouri, Jianguo Ding, Youcef Djenouri:
LSTM for Periodic Broadcasting in Green IoT Applications over Energy Harvesting Enabled Wireless Networks: Case Study on ADAPCAST. 694-699 - Ziying Song, Peiliang Wu, Kuihe Yang, Yu Zhang, Yi Liu:
MsfNet: a novel small object detection based on multi-scale feature fusion. 700-704 - Liu Yang, Junjie Yang, Yi Guo:
Under-determined Blind Speech Separation via the Convolutive Transfer Function and lp Regularization. 705-709 - Sen Yuan, Geming Xia, Jian Chen, Chaodong Yu:
Toward Dispersed Computing: Cases and State-of-The-Art. 710-717 - Chaodong Yu, Geming Xia, Zhaohang Wang:
Trust Evaluation of Computing Power Network Based on Improved Particle Swarm Neural Network. 718-725 - Yipeng Wang, Tongqing Zhou, Changsheng Hou, Bingnan Hou, Zhiping Cai:
2prong: Adaptive Video Streaming with DNN and MPC. 726-731 - Jing Wang, Weiping Zhu, Jianqiao Lai, Zhu Wang:
FDataCollector: A Blockchain Based Friendly Web Data Collection System. 732-739 - Nicola Zingirian, Federico Botti:
Mobile Unattended-Operation Detector for Bulk Dangerous Goods Handling. 740-745 - Lusha Mo, Gaofeng Lv, Baosheng Wang, Guanjie Qiao, Jing Tan:
The Design and Implementation of an Efficient Quaternary Network Flow Watermark Technology. 746-751 - Tao Liu, Qinshu Chen, Hui Li, Bohui Wang, Xin Yang:
TSCF: An Efficient Two-Stage Cuckoo Filter for Data Deduplication. 752-757 - Yiwei Yu, Guang Cheng, Zihan Chen, Haoxuan Ding:
A DDoS protection method based on traffic scheduling and scrubbing in SDN. 758-765 - Mahboubeh Mohammadi, Ali Balador, Zaloa Fernández, Iñaki Val:
Adaptive Distributed Beacon Congestion Control with Machine Learning in VANETs. 766-771 - Di Han, Yifan Huang, Xiaotian Jing, Junmin Liu:
AND: Effective Coupling of Accuracy, Novelty and Diversity in the Recommender System. 772-777 - Cheng Shen, Kai Han, Tianyuan Bi:
Attention-based Bicomponent Synchronous Graph Convolutional Network for traffic flow prediction. 778-785 - Mikhail Zolotukhin, Pyry Kotilainen, Timo Hämäläinen:
Intelligent IDS Chaining for Network Attack Mitigation in SDN. 786-791 - Rongman Hong, Hao He:
Interference and Consultation in Virtual Public Space: The Practice of Intermedia Art in Metaverse. 792-797 - Tao Liu, Shengli Pan, Peng Li:
Large-Area Human Behavior Recognition with Commercial Wi-Fi Devices. 798-805 - Hongtao Li, Hao Cheng, Lei Yang:
Reliable Routing and Scheduling in Time-Sensitive Networks. 806-811 - Lin Wang, Lehao Lin, Xiao Wu, Rongman Hong:
Seshat: Decentralizing Oral History Text Analysis. 812-817 - Wenfei Qian, Pingjian Wang, Lingguang Lei, Tianyu Chen, Bikuan Zhang:
A Secure And High Concurrency SM2 Cooperative Signature Algorithm For Mobile Network. 818-824 - Guido Dietl:
On Firefly Synchronization of Sleep Phases in Energy Efficient Meshed Networks. 825-830 - Xiazhe Tu, Chao Xun, Xiangyu Wu, Jinbo Li, Lingyi Yang:
Power information integrated display system based on interconnection technology. 831-836 - Zhe Wang, Hongda Zhao, Mingxia Zhu:
Research and Application of Intelligent Distribution Network Planning for Multi-source Data Fusion. 837-842 - Hongda Zhao, Mingxia Zhu, Zhe Wang:
Research on Visual Engine of Smart Planning System Based on Internet of Things. 843-848 - Kun Wang, Jiaxing Che, Zhejun Shen:
Sequence-Based Indoor Relocalization for Mobile Augmented Reality. 1-5
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.