default search action
15th WASA 2020: Qingdao, China - Part I
- Dongxiao Yu, Falko Dressler, Jiguo Yu:
Wireless Algorithms, Systems, and Applications - 15th International Conference, WASA 2020, Qingdao, China, September 13-15, 2020, Proceedings, Part I. Lecture Notes in Computer Science 12384, Springer 2020, ISBN 978-3-030-59015-4
Full Papers
- Chunyu Ai, Wei Zhong, Longjiang Guo:
Reinforcement Learning Based Group Event Invitation Algorithm. 3-14 - Yanhua Cao, Shiyou Qian, Qiushi Wang, Hanwen Hu, Weidong Zhu, Jian Cao, Guangtao Xue, Yanmin Zhu, Minglu Li:
OSCD: An Online Charging Scheduling Algorithm to Optimize Cost and Smoothness. 15-27 - T.-H. Hubert Chan, Li Ning, Yong Zhang:
Maximizing the Expected Influence in Face of the Non-progressive Adversary. 28-39 - Hao Chen, Yourong Chen, Meng Han, Banteng Liu, Qiuxia Chen, Zhenghua Ma:
A Novel Anti-attack Revenue Optimization Algorithm in the Proof-of-Work Based Blockchain. 40-50 - Zheng Chen, Zhaoquan Gu, Yuexuan Wang:
Can the Max-Min Fair Allocation Be Trustful in a Centralized Resource System? 51-64 - Jiancheng Chi, Tie Qiu, Chaokun Zhang, Laiping Zhao:
A Novel Blockchain Network Structure Based on Logical Nodes. 65-76 - Xue-rong Cui, Tong Xu, Juan Li, Meiqi Ji, Qiqi Qi, Shibao Li:
Dynamic Distribution Routing Algorithm Based on Probability for Maritime Delay Tolerant Networks. 77-84 - Xinpeng Duan, Feng Li, Dongxiao Yu, Huan Yang, Hao Sheng:
Learning-Aided Mobile Charging for Rechargeable Sensor Networks. 85-96 - Jingjing Fan, Yan Huo, Qinghe Gao, Tao Jing:
A Social Relationship Enabled Cooperative Jamming Scheme for Wireless Communications. 97-108 - Yuqi Fan, Lunfei Wang, Jie Chen, Zhifeng Jin, Lei Shi, Juan Xu:
Multi-job Associated Task Scheduling Based on Task Duplication and Insertion for Cloud Computing. 109-120 - Xuhui Gong, Qiang-Sheng Hua, Hai Jin:
Communication-Efficient and Privacy-Preserving Protocol for Computing Over-Threshold Set-Union. 121-133 - Xinxin Han, Guichen Gao, Li Ning, Yang Wang, Yong Zhang:
Approximation Algorithm for the Offloading Problem in Edge Computing. 134-144 - Li-Tse Hsieh, Hang Liu, Yang Guo, Robert Gazda:
Quality of Service Optimization in Mobile Edge Computing Networks via Deep Reinforcement Learning. 145-157 - Hantao Hu, Yang Liu, Kai Lv, Yanwei Zheng, Wei Zhang, Wei Ke, Hao Sheng:
Camera Style Guided Feature Generation for Person Re-identification. 158-169 - Qin Hu, Minghui Xu, Shengling Wang, Shaoyong Guo:
Sync or Fork: Node-Level Synchronization Analysis of Blockchain. 170-181 - Wei Jiang, Molin Li, Xiaobo Zhou, Wenyu Qu, Tie Qiu:
Multi-user Cooperative Computation Offloading in Mobile Edge Computing. 182-193 - Wei Jiang, Yuan Wang, Yan Tang:
SDTCNs: A Symmetric Double Temporal Convolutional Network for Chinese NER. 194-205 - Han Li, Hongliang Zhou, Hejiao Huang, Xiaohua Jia:
Verifiable Encrypted Search with Forward Secure Updates for Blockchain-Based System. 206-217 - Pengfei Li, Xin He, Nikolaos M. Freris, Panlong Yang:
Capacity Analysis of Ambient Backscatter System with Bernoulli Distributed Excitation. 218-230 - Shangsen Li, Lailong Luo, Deke Guo, Yawei Zhao:
Multiset Synchronization with Counting Cuckoo Filters. 231-243 - Ting Li, Haitao Liu, Jie Liang, Hangsheng Zhang, Liru Geng, Yinlong Liu:
Privacy-Aware Online Task Offloading for Mobile-Edge Computing. 244-255 - Xue Li, Lanshun Nie, Xiandong Si, De-chen Zhan:
A Class Incremental Temporal-Spatial Model Based on Wireless Sensor Networks for Activity Recognition. 256-271 - Ke Lin, Jianzhong Li:
Sensor Deployment for Composite Event Monitoring in Battery-Free Sensor Networks. 272-284 - Bing Liu, Zhaoyan Shen, Zhiping Jia, Xiaojun Cai:
Optimizing Motion Estimation with an ReRAM-Based PIM Architecture. 285-297 - Chao Liu, Yingbin Li, Ruobing Jiang, Qian Lu, Zhongwen Guo:
Trajectory-Based Data Delivery Algorithm in Maritime Vessel Networks Based on Bi-LSTM. 298-308 - Hong Liu, Peng Li, Yuanru Cui, Qian Liu, Lichen Zhang, Longjiang Guo, Xiaojun Wu, Xiaoming Wang:
Cold Start and Learning Resource Recommendation Mechanism Based on Opportunistic Network in the Context of Campus Collaborative Learning. 309-321 - Suhui Liu, Jiguo Yu, Chunqiang Hu, Mengmeng Li:
Outsourced Multi-authority ABE with White-Box Traceability for Cloud-IoT. 322-332 - Yongxin Liu, Jian Wang, Shuteng Niu, Houbing Song:
Deep Learning Enabled Reliable Identity Verification and Spoofing Detection. 333-345 - Zhengyang Liu, Feng Li, Dongxiao Yu, Holger Karl, Hao Sheng:
On-Line Learning-Based Allocationof Base Stations and Channels in Cognitive Radio Networks. 346-358 - Zhiqiang Lv, Jianbo Li, Chuanhao Dong, Wei Zhao:
A Deep Spatial-Temporal Network for Vehicle Trajectory Prediction. 359-369 - Ruina Mao, Anming Dong, Jiguo Yu:
Beamforming for MISO Cognitive Radio Networks Based on Successive Convex Approximation. 370-380 - Linghang Meng, Xueshu Hong, Yingwen Chen, Yuke Ding, Cheng-Zhuo Zhang:
K-Anonymous Privacy Preserving Scheme Based on Bilinear Pairings over Medical Data. 381-393 - Jiangtian Nie, Jun Luo, Zehui Xiong, Dusit Niyato, Ping Wang, Yang Zhang:
Incentive Mechanism for Socially-Aware Mobile Crowdsensing: A Bayesian Stackelberg Game. 394-406 - Hualing Ren, Kai Liu, Penglin Dai, Yantao Li, Ruitao Xie, Songtao Guo:
Adaptive Task Scheduling via End-Edge-Cloud Cooperation in Vehicular Networks. 407-419 - Xiaoling Tao, Yang Peng, Feng Zhao, Sufang Wang, Ziyi Liu:
An Improved Parallel Network Traffic Anomaly Detection Method Based on Bagging and GRU. 420-431 - Huaqing Tu, Hongli Xu, Liusheng Huang, Xuwei Yang, Da Yao:
Joint Server Selection and SFC Routing for Anycast in NFV-enabled SDNs. 432-443 - Zhitian Tu, Kun Zhu, Changyan Yi, Ran Wang:
Blockchain-Based Privacy-Preserving Dynamic Spectrum Sharing. 444-456 - Chao Wang, Xiaoman Cheng, Jitong Li, Yunhua He, Ke Xiao:
A Survey: Applications of Blockchains in the Internet of Vehicles. 457-468 - Rui Wang, Donglan Liu, Jianfei Chen, Lei Ma, Xin Liu, Hao Zhang:
A Secure Topology Control Mechanism for SDWSNs Using Identity-Based Cryptography. 469-481 - Ying Wang, Conghao Ruan, Chunqiang Hu:
A Blockchain-Based Decentralized Public Auditing Scheme for Cloud Storage. 482-493 - Yukun Wang, Mingqiang Wang:
A New Fully Homomorphic Signatures from Standard Lattices. 494-506 - Xiaocan Wu, Yu-e Sun, Yang Du, Xiaoshuang Xing, Guoju Gao, He Huang:
An Efficient Malicious User Detection Mechanism for Crowdsensing System. 507-519 - Hua Xiao, Ying Wang, Shulong Peng, Bin Lin:
Implementation of Video Transmission over Maritime Ad Hoc Network. 520-528 - Junlei Xiao, Peng Li, Lei Nie:
A Reliable Multi-task Allocation Based on Reverse Auction for Mobile Crowdsensing. 529-541 - Ke Xiao, Ziye Geng, Yunhua He, Gang Xu, Chao Wang, Wei Cheng:
A Blockchain Based Privacy-Preserving Cloud Service Level Agreement Auditing Scheme. 542-554 - Jieyao Xu, Dongmei Zhang, Gaoyuan Xiong, Han Zhang:
CPBA: An Efficient Conditional Privacy-Preserving Batch Authentication Scheme for VANETs. 555-567 - Qiang Xu, Yifei Zou, Dongxiao Yu, Minghui Xu, Shikun Shen, Feng Li:
Consensus in Wireless Blockchain System. 568-579 - Biwei Yan, Jiguo Yu, Yue Wang, Qiang Guo, Baobao Chai, Suhui Liu:
Blockchain-Based Service Recommendation Supporting Data Sharing. 580-589 - Jiaxin Yan, Hua Wang, Xiaole Li, Shanwen Yi, Yao Qin:
Multi-objective Disaster Backup in Inter-datacenter Using Reinforcement Learning. 590-601 - Zhaoteng Yan, Nan Yu, Hui Wen, Zhi Li, Hongsong Zhu, Limin Sun:
Detecting Internet-Scale NATs for IoT Devices Based on Tri-Net. 602-614 - Changsong Yang, Xiaoling Tao, Sufang Wang, Feng Zhao:
Data Integrity Checking Supporting Reliable Data Migration in Cloud Storage. 615-626 - Feihong Yang, Yuwen Pu, Chunqiang Hu, Yan Zhou:
A Blockchain-Based Privacy-Preserving Mechanism for Attribute Matching in Social Networks. 627-639 - Guisong Yang, Yanting Li, Yan Song, Jun Li, Xingyu He, Linghe Kong, Ming Liu:
A Real-Time Recommendation Algorithm for Task Allocation in Mobile Crowd Sensing. 640-652 - Zhen Ye, Yubin Wu, Shuai Wang, Yang Zhang, Yanbing Chen, Wei Ke, Hao Sheng:
A Dual Scale Matching Model for Long-Term Association. 653-665 - Kangning Yin, Shaoqi Hou, Ye Li, Chao Li, Guangqiang Yin:
A Real-Time Vehicle Logo Detection Method Based on Improved YOLOv2. 666-677 - Zepeng Yu, Wenzhong Li, Pinhao Wang, Sanglu Lu:
SEM: APP Usage Prediction with Session-Based Embedding. 678-690 - Jingjing Zhang, Anming Dong, Jiguo Yu:
Intelligent Dynamic Spectrum Access for Uplink Underlay Cognitive Radio Networks Based on Q-Learning. 691-703 - Lu Zhang, Saide Zhu, Fengyin Li, Ruinian Li, Jing Meng, Wei Li:
A Trajectory-Privacy Protection Method Based on Location Similarity of Query Destinations in Continuous LBS Queries. 704-715 - Shuo Zhang, Jinghua Zhu:
Reliable Potential Friends Identification Based on Trust Circuit for Social Recommendation. 716-729 - Yi Zhang, Yue Zheng, Guidong Zhang, Kun Qian, Qian Chen, Zheng Yang:
GaitID: Robust Wi-Fi Based Gait Recognition. 730-742 - Yubin Zhao, Junjian Huang, Xiaofan Li, Cheng-Zhong Xu:
Optimal Node Placement for Magnetic Relay and MIMO Wireless Power Transfer Network. 743-754 - Zhihui Zhao, Weizhong Wang, Hongsong Zhu, Hong Li, Limin Sun, Sen Zhao, Yan Hu:
EdgeCC: An Authentication Framework for the Fast Migration of Edge Services Under Mobile Clients. 755-767 - Chenwang Zheng, Dan Tao:
Attention-Based Dynamic Preference Model for Next Point-of-Interest Recommendation. 768-780 - Jinwen Zhong, Can Ma, Jiang Zhou, Weiping Wang:
From When to Where: A Multi-task Learning Approach for Next Point-of-Interest Recommendation. 781-793 - Ying Zhong, Yiran Zhu, Zhiliang Wang, Xia Yin, Xingang Shi, Keqin Li:
An Adversarial Learning Model for Intrusion Detection in Real Complex Network Environments. 794-806 - Chun-Xuan Zhou, Qiang-Sheng Hua, Hai Jin:
HotDAG: Hybrid Consensus via Sharding in the Permissionless Model. 807-821 - Yifei Zou, Minghui Xu, Yicheng Xu, Yong Zhang, Bei Gong, Xiaoshuang Xing:
Distributed Data Aggregation in Dynamic Sensor Networks. 822-833
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.