Abstract is missing.
- CleverTrash: an IoT system for waste sorting with deep learningSwann Puig, Noria Foukia. 1-8 [doi]
- Privacy-aware Data Fusion and Prediction for Smart City Services in Edge Computing EnvironmentLianyong Qi, Xiaoxiao Chi, Xiaokang Zhou, Qi Liu 0001, Fei Dai 0002, Xiaolong Xu 0001, Xuyun Zhang. 9-16 [doi]
- Distributed MQTT Brokers at Network Edges: A Study on Message DisseminationLuoyao Hao, Xiao Yu, Tingrui Zhang, Henning Schulzrinne. 17-24 [doi]
- Multi-stage Low Error Localization Based on Krill Herd Optimization Algorithm in WSNsChang Huang, Minghua Wang. 25-32 [doi]
- A Decentralized Framework with Dynamic and Event-Driven Container Orchestration at the EdgeUmut Can Özyar, Arda Yurdakul. 33-40 [doi]
- A Novel Harmony Search Cat Swarm Optimization Algorithm for Optimal Bridge Sensor PlacementBin Luo, Lingzhi Yi, Hengshan Wu, Yun Qiu, Xiangguang Li, Feilong Tang, Yuan Zhang. 41-47 [doi]
- Reinforcement Learning Based Full Duplex Multi-user MIMO MAC Protocol (RL-MUFD)Zheng Guan, Shengqian Yu, Ya Li, Min He. 48-55 [doi]
- On-Ramp Merging for Connected Autonomous Vehicles using Deep Reinforcement LearningChinmay Mahabal, Hua Fang 0001, Honggang Wang. 56-61 [doi]
- On-Device Training of Deep Learning Models on Edge MicrocontrollersFabrizio De Vita, Giorgio Nocera, Dario Bruneo, Valeria Tomaselli, Mirko Falchetto. 62-69 [doi]
- User Position-Based Wireless Sensor Network Deployment AlgorithmFan Liang, Fang Yuan, Xing Liu. 70-76 [doi]
- Edge-Cloud Cooperation for DNN Inference via Reinforcement Learning and Supervised LearningTinghao Zhang, Zhijun Li, Yongrui Chen 0002, Kwok-Yan Lam, Jun Zhao. 77-84 [doi]
- Visual Cybersecurity Collaboration and Incident Exchange in Multi-Stakeholder IoT EnvironmentsHanning Zhao, Bilhanan Silverajan. 85-92 [doi]
- Reinforcement learning-based IoT sensor scheduling strategy for bridge structure health monitoringYuan Zhang, Hengshan Wu, Lingzhi Yi, Bin Luo, Yun Qiu, Feilong Tang. 93-100 [doi]
- Node Deployment and Confident Information Coverage for WSN-based Air Quality MonitoringYuan Tian, Yihui Sun, Yong Tang. 101-106 [doi]
- IoT Droplocks: Wireless Fingerprint Theft Using Hacked Smart LocksSteve Kerrison. 107-112 [doi]
- Identifying Channel Related Vulnerabilities in Zephyr FirmwareDevansh Rajgarhia, Peng Liu, Shamik Sural. 113-118 [doi]
- Things Data Interoperability Through Annotating oneM2M resources for NGSI-LD EntitiesSunil Kumar, Seungmyeong Jeong, Il-Yeop Ahn, Muhammad Aslam Jarwar. 119-124 [doi]
- Demand-Oriented Allocation with Fairness in Multi-Operator Dynamic Spectrum Sharing SystemsMengying Wang, Wei Wang, Wenjing Xu, Jiameng Bi, Qiang Ye. 125-130 [doi]
- Edge-assisted Puncturable Fine-grained Task Distribution for the IoT-oriented CrowdsensingLiquan Jiang, Zhiguang Qin. 131-138 [doi]
- Achieving Privacy-preserving Data Sharing for Dual CloudsXingqi Luo, Haotian Wang, Jinyang Dong, Chuan Zhang, Tong Wu. 139-146 [doi]
- Research on ultra-wideband (UWB) indoor accurate positioning technology under signal interferenceMingming Gong, Zhiyang Li, Wuyungerile Li. 147-154 [doi]
- Efficient and Secure Collaborative Processing in Mobile Edge Computing via BlockchainYuwei Le, Yiheng Jiang, Xintong Ling, Jiaheng Wang. 155-160 [doi]
- Energy Consumption Models for UAV Communications: A Brief SurveyHua Yan, Shuang-Hua Yang, Yulong Ding, Yunfei Chen 0001. 161-167 [doi]
- Adaptive Federated Learning via Mean Field ApproachKaifei Tu, Shensheng Zheng, Xuehe Wang, Xiping Hu 0001. 168-175 [doi]
- Adaptive Sampling for Efficient Acoustic Noise Monitoring: An Incremental Learning ApproachFaiga Alawad. 176-184 [doi]
- Energy analysts need a standard that interprets the Metro Area Global Information InfrastructureEtienne Victor Depasquale, Saviour Zammit, Franco Davoli, Raffaele Bolla. 185-194 [doi]
- On the Benefits of Transfer Learning and Reinforcement Learning for Electric Short-term Load ForecastingYuwei Fu, Di Wu, Benoit Boulet. 195-203 [doi]
- A Blockchain-Based Cloud Edge Fusion Computing Platform for the Smart GridYing Gao, Sijie Su, Yandan Chen, Qiaofeng Pan, Xiping Hu 0001. 204-211 [doi]
- Influence of Communication Technologies in Smart Grid Power Congestion ManagementAdrien Gougeon, François Lemercier, Anne Blavette, Anne-Cécile Orgerie. 212-221 [doi]
- Energy-Efficient Monitoring of Potential Side Effects from COVID-19 VaccinesWeipeng Deng, Edith C. H. Ngai, Vera van Zoest. 222-227 [doi]
- Making Smart Contract Classification Easier and More EffectiveZhirong Zhu, Jianzhong Su, Zigui Jiang, Mingxi Ye, Zibin Zheng. 228-230 [doi]
- Delay-Outage Probability of Capacity Achieving-Based Task Offloading for Mobile Edge ComputingAigerim Ospanova, Behrouz Maham. 236-242 [doi]
- Effective task offloading heuristics for minimizing energy consumption in edge computingGuichang Yin, Runze Chen, Yi Zhang. 243-249 [doi]
- A Distributed Privacy-Preserving Framework for Deep Learning with Edge-Cloud ComputingFei Dai 0002, Guozhi Liu, Bi Huang, Xiaolong Xu 0001, Chaochao Chen, ZhangBing Zhou, Xiaokang Zhou. 250-257 [doi]
- Edge Computing with Relaying for Task Offloading under Nakagami-m Fading ChannelsAigerim Ospanova, Behrouz Maham. 258-263 [doi]
- Securing uRLLC in UAV-assisted NOMA Wireless NetworkShanchao Zheng, Kan Yu, Guangshun Li, Xiaowu Liu. 264-271 [doi]
- Investigating Low-Battery Anxiety of Mobile UsersYu Zhang, Guoming Tang, Qianyi Huang, Kui Wu 0001, Yangjing Wu, Yi Wang. 272-279 [doi]
- A Multipath Source Location Privacy Protection Scheme in Wireless Sensor Networks via Proxy NodeJing Sun, Yuling Chen, Xiao Lv, Xiaobin Qian. 280-286 [doi]
- A Density-based Controller Placement Algorithm for Software Defined NetworksJue Chen, Yujie Xiong, Dun He. 287-291 [doi]
- More Behind Your Electricity Bill: a Dual-DNN Approach to Non-Intrusive Load MonitoringYu Zhang, Guoming Tang, Qianyi Huang, Yi Wang, Hong Xu, Xudong Wang. 292-299 [doi]
- Construct Digital Twin Models in Cyber Space for Physical Objects of Intelligent Optical NetworkLiwei Kuang, Jun Wu, Shan Yin. 300-305 [doi]
- Prediction of water quality factors for sea cucumber farming based on Dual-Assisted prediction modelXiaomei Li, Huan Liu, Rongli Gai, Zumin Wang. 306-313 [doi]
- A Combined Model for Cherry Greenhouse Temperature Prediction Based on LMD and Attention MechanismZu-Min Wang, Tian-Yu Li, Min Xu, Wei Xu, Yan Liu, Lingyan Hu, Rong-Li Gai. 314-319 [doi]
- A Survey on Data Security in Network Storage SystemsHongke Zhang, Zheng Yan, Xueqin Liang. 320-327 [doi]
- A Security Transaction Model Based on HTLCXiaoChuan He, Chaoyue Tan, Yongtang Wu, Yuling Chen. 328-331 [doi]
- A Secure Comparison Protocol in the Malicious ModelJunhong Tao, Yongtang Wu, Yuling Chen. 332-337 [doi]
- A Secure Multiparty Computation Round Optimization Scheme Based on Standard AssumptionYun Luo, Yuling Chen, Tao Li, Yilei Wang. 338-342 [doi]
- A Blockchain-based Scalable Electronic Contract Signing SystemKaicheng Yang, Yongtang Wu, Yuling Chen. 343-348 [doi]
- Data Availability Optimization for Cyber-Physical SystemsLiying Li, Peijin Cong, Junlong Zhou, Zonghua Gu 0001, Keqin Li 0001. 349-356 [doi]
- A K-anonymity Optimization Algorithm Under Attack ModelManxiang Yang, Yongtang Wu, Yuling Chen. 357-362 [doi]
- The optimal attack-defense scheme for secret sharingJuan Ma, Yuling Chen, Xiao Lv, Xiaobin Qian. 363-367 [doi]
- Embedded Fault Diagnosis Expert System: Framework, Development Platform, Algorithms and ExperimentsDapeng Tan, Tong Wang, Cheng-Yan Wang. 368-373 [doi]
- An effective model-free Gaussian Process based online social media recommendationJiawei Xu, Yufeng Wang, Jianhua Ma, Qun Jin. 374-378 [doi]
- Fruit and Vegetable Picking Robot Movement Planning: A ReviewRongli Gai, Xiaohong Wang, Zhiyuan Chang, Yitong Guo. 379-384 [doi]
- Bayesian network based on dynamic risk assessment for petrochemical sites - A case study of oil tankYanzhi Li, Yuqiao Li, Kaifeng Wang, Yan Zhang, Zumin Wang, Shuxue Zhao. 385-390 [doi]
- Incremental Prediction Method of Optical Performance Degradation Trend Based on Deep LearningShan Yin, Liwei Kuang, Fei Zou. 391-396 [doi]
- A Combined Network for Tomato Leaf Disease Recognization Based on the Improved EfficientNetXiao-Mei Li, Min Xu, Tian-Yu Li, Wei Xu, Rong-Li Gai, Ling-Yan Hu, Zu-Min Wang. 395-400 [doi]
- TSHML: Token Shuffling under Haircut Policy Based on Machine LearningYilei Wang, Ming Liu, Tao Li, Chunmei Li, Hui Wang. 401-405 [doi]
- Research on rolling bearing fault diagnosis method based on hybrid deep learning network modelZhang Zhihao, Zumin Wang. 406-411 [doi]
- Contactless Elevator Button Action Recognition Based on Passive RFIDChengtian Wang, Taochun Wang, Peng Hu, Qing Qiu, Chuanxin Zhao, Fulong Chen 0002. 412-419 [doi]
- Beyond 100 Ethical Concerns in the Development of Robot-to-Robot CooperationRebekah Rousi, Ville Vakkuri, Paulius Daubaris, Simo Linkola, Hooman Samani, Niko Mäkitalo, Erika Halme, Mamia Agbese, Rahul Mohanani, Tommi Mikkonen, Pekka Abrahamsson. 420-426 [doi]
- Investigation on Application of Target Detection in AgricultureRongli Gai, Kai Wei, Huatian Zhang, Xiangzhou Kong. 427-432 [doi]
- Safety Helmet Wearing Detection Based on A Lightweight YOLOv4 AlgorithmJunhua Chen, Sihao Deng, Xueda Huang, Xinrui Yang, Dong Yan. 433-438 [doi]
- Data Confirmation Scheme based on Auditable CP-ABELingyun Zhang, Yuling Chen, Xiaobin Qian. 439-443 [doi]
- Mining Composite Spatio-Temporal Lifestyle Patterns from Geotagged Social DataSuparna De, Usamah Jassat, Alex Grace, Wei Wang 0042, Klaus Moessner. 444-451 [doi]
- Fixed-time Control for Liquid-filled Flexible SpacecraftZhihao Zhu, Zhi Gao, Yu Guo, Hanli Zhou, Zhixu Lu, Wei Li. 452-455 [doi]
- Improved Secure Provable Data Possession Scheme for Cloud StorageXu an Wang, Ruifeng Li. 456-460 [doi]
- Cyber-Physical Contracts in Offline RegionsLars Creutz, Kevin Wagner, Guido Dartmann. 461-469 [doi]
- Overview of Interactive Visualization MethodsRongli Gai, Zhibin Guo, Mengke Li. 470-475 [doi]
- Practical Implementation of an OPC UA Multi-Server Aggregation and Management Architecture for IIoTChenggen Pu, Xiwu Ding, Ping Wang, Yifu Yang. 476-481 [doi]
- Image Augmentation based on Cross Domain Image Style TransferWenshu Li, Haijun Mao, Hao Wang. 482-487 [doi]
- Agricultural Few-Shot Selection by Model Confidences for Multimedia Internet of Things Acquisition DatasetJiachen Yang, Zhuo Zhang, Yang Li. 488-494 [doi]
- UA-HGAT: Uncertainty-aware Heterogeneous Graph Attention Network for Short Text ClassificationDeyan Kong, Zhenyan Ji, Yanjuan Sang, Wei Dong, Yanyan Yang. 495-500 [doi]
- A Self-Supervised Purification Mechanism for Adversarial SamplesBingyi Xie, Honghui Xu, Zuobin Xiong, Yingshu Li, Zhipeng Cai 0001. 501-509 [doi]
- Performance Assessment of Deep Neural Network on Activity Recognition in WiFi SensingJianchao Song, Cheng Qian, Xing Liu 0013, Hengshuo Liang, Chao Lu, Wei Yu 0002. 510-517 [doi]
- Information Extraction and Analysis of Chinese Traffic NewsXiaoxian Dong, Xiaoxiong Weng, Yancheng Ling. 518-524 [doi]
- IoT Device Friendly Leveled Homomorphic Encryption ProtocolsMarin Matsumoto, Masato Oguchi. 525-532 [doi]
- High Precision Method of Federated Learning Based on Cosine Similarity and Differential PrivacyJia Wang, Yazheng Li, Ronghang Ye, JianQiang Li. 533-540 [doi]
- Theoretical analysis of QBER for Quantum Key Distribution in 5G multi-site networksJordi Mongay Batalla, Slawomir Sujecki, Houbing Song, Constandinos X. Mavromoustakis, Tomasz Wichary. 541-548 [doi]
- CNN-Based Emotional Stress Classification using Smart Learning DatasetAndreas Andreou, Constandinos X. Mavromoustakis, Houbing Song, Jordi Mongay Batalla. 549-554 [doi]
- Semi-supervised Algorithms in Resource-constrained Edge Devices: An Overview and Experimental ComparisonMahdi Barhoush, Ahmed Ayad, Anke Schmeink. 555-559 [doi]
- Business Process Modeling and Structure Optimization of Resource Coupling in Edge ComputingXiao-bo Cai, Li-jiao Chen, Xiao-Jing Shen, Qi Wu, Wen-dou Wu, Baijuan Wang. 560-565 [doi]
- Smart Detection of Social Distance Violations using Gaussian Lens Model and Deep LearningJenny Liu. 566-569 [doi]
- The data mining between the asphalt properties and asphalt mixtures propertiesXing Long. 570-575 [doi]
- QoS-Aware Joint User Scheduling and Power Allocation for Energy Harvesting Wireless NetworksJun Li, Qinghe Du. 576-581 [doi]
- A Survey of Machine Learning Algorithms and Techniques for Air Mobility Under Emergency SituationsYujing Zhou, Dahai Liu, Houbing Song. 582-588 [doi]
- EvoSense: Towards Self-evolving WiFi-based User Gait RecognitionYao Yao, Chengwen Luo 0001, Xingyu Feng, Yijing Huang, Jin Zhang, Jian-Qiang Li 0001. 589-596 [doi]
- A Taxonomy of Security and Defense Mechanisms in Digital Twins-based Cyber-Physical SystemsAdamu Hussaini, Cheng Qian, Weixian Liao, Wei Yu 0002. 597-604 [doi]
- How do Programmers Use the Internet? Discovering Domain Knowledge from Browsing and Coding BehaviorsKo Watanabe, Yuki Matsuda 0001, Yugo Nakamura, Yutaka Arakawa, Shoya Ishimaru. 605-610 [doi]
- Reliability Analysis and Optimization for Sensing Data Collection and Processing in New Energy Internet SystemsHuanjun Hu, Jie Wang, Jing Wang, Shengwei Wang, Yixi Wang, Yuxuan Ye, Rongtao Liao. 611-616 [doi]
- 3D Human Pose and Shape Estimation from VideoXun-Yu Liu, Lei Wang, Xiaoliang Ma, Gongbin Chen, Cheng He, Jun Cheng. 617-624 [doi]
- Resource Allocation and Computation Offloading in Ultra-reliable Low-latency Communication Systems via Deep Reinforcement LearningJiahui Li, JiaXin Yan, Baolin Yin, Liang Zhao, Ran Wei. 625-630 [doi]
- MMC Online Thermal Simulation and Life Prediction based on Digital Twin TechnologyTianlong Xiong, Min Luo, Chao Yang, Qing Cheng, Yawen Liu. 631-635 [doi]
- LigNet: Lightweight Hand Tracking for Edge IntelligenceYijing Huang, Chengwen Luo 0001, Xingyu Feng, Zhongru Yang, Jin Zhang 0013, Jian-Qiang Li 0001. 636-642 [doi]
- Age Upon Decisions for Low-latency Services in Internet of Energy SystemsWeiqing Yao, Zhiwei Bao, Xian Luo, Jing Wang, Jie Wang. 643-647 [doi]
- Short-Dataset-Driven Prediction on Area Electricity Consumption with Adaptive Training Window SelectionJie Wang, Shengwei Wang, Jing Wang, Huanjun Hu, Yixi Wang, Yuxuan Ye, Rongtao Liao. 648-653 [doi]