Abstract is missing.
- Secure and Scalable Blockchain for IIoT with Dual Compression SchemeTianxi Wang, Jiqiang Liu, Tianhao Liu, Di Zhai, Jian Wang 0071, Tao Zhang. 1-6 [doi]
- A Blockchain Sharding-Based Data Sharing Scheme for Internet of VehiclesKang Ning 0003, Chang Liu, Shihao Lin, Xiaochao Geng, Guojun Han. 7-12 [doi]
- Multi-agent Reinforcement Learning Based Resource Allocation in End-Edge-Cloud Enabled Industrial Internet of ThingsYanmei Chen, Xiaohuan Li, Jin Ye, Xun Wang, Qian Chen. 13-19 [doi]
- Pre-trained Large Model Fine-tuning with Case-based Reasoning Framework for Transportation Risk Scene PreventionWuchang Zhong, Jinglin Huang, Rong Yu. 20-25 [doi]
- Stochastic Geometry Based Modeling and Performance Analysis of Buoy-Assisted Offshore Internet of ThingsXu Hu, Yi Wang, Bin Lin 0001, Haichao Wei. 26-29 [doi]
- Robust Respiration Detection Based on Intelligent Reflecting SurfacesYun Wu, Dongheng Zhang, Ganlin Zhang, Xuecheng Xie, Fengquan Zhan, Yan Chen 0007. 30-37 [doi]
- Multi-Scale Enhanced Depth Knowledge Distillation for Monocular 3D Object Detection with SEFormerHan Zhang, Jun Li, Rui Tang, Zhi-Ping Shi 0001, Aojie Bu. 38-43 [doi]
- Deep Reinforcement Learning for UAV-Assisted Spectrum Sharing: A Minority Game ApproachXinyu Ding, Jie Zhang, Zhe Wang, Xuehe Wang. 44-50 [doi]
- Research on Supply Chain Traceability System Based on Semantic Multi-Blockchain and Pre-OnChain Data VerificationLulu Li, Huan Qu, Wei Wang, Junyu Wang, Zhihui Wang, Bin Nong. 51-58 [doi]
- A Dynamic Service Identity-Based Security Policy Consistency Checking Mechanism in SDNXincheng Yan, Jianhua Wu, Na Zhou, Zhihong Jiang, Junsan Zeng, Jianhui Yin, Ying Liu. 59-64 [doi]
- An Overview of Enabling Artificial Intelligence in 3GPP 5G-Advanced NetworksMiao Qu, Xiaoyong Tang, Yingcheng Zhang, Zhe Chen, Tao Zhang, Yuelin Zhao, Yingchun Li. 65-70 [doi]
- Joint Optimization of Uplink Spectrum Efficiency and UAV Trajectory in Cell-Free UAV NetworksJian He, Chunyu Pan, Qian Chen. 71-76 [doi]
- Age of Energy Harvesting and Energy Efficiency Optimization in SWIPT-Aided Wireless NetworksZhe Wang, Jiekai He, Lina Ge. 77-83 [doi]
- An Anti-fraud Double Auction Model in Vehicle-to-Vehicle Energy Trading with the K-factor ApproachYiming Xu, Lu Zhang, Nazmiye Ozkan, Chao Long. 84-88 [doi]
- Adaptive Data Sampling with Dual-Scale Prediction in Deterministic Edge NetworkLei Li, Yiming Zheng, Jinyi Wang. 89-94 [doi]
- Blockchain-Based Access Control Model for Security Attributes in the Internet of ThingsXincheng Yan, Jianhua Wu, Na Zhou, Zhihong Jiang, Juqin Wu, Jianhui Yin, Ying Liu. 95-101 [doi]
- An End-to-End Deterministic Network Architecture for Electricity-Energy InternetLei Li, Yixuan Zeng, Boning Feng. 102-108 [doi]
- Observability of Friendship NetworksTaoning Dong, Pengchao Lv, SongLu Li, Junjie Huang, Bo Liu. 109-114 [doi]
- A Two-stream Network with Spatial Long-range Modeling for Weakly-supervised Temporal Action LocalizationAojie Bu, Han Zhang, Jun Li 0072, Zhiping Shi 0002. 115-120 [doi]
- A Stable Clustering Method Based on Coalition Game Theory in FANETYimeng Huang, Rongbin Yao, Qian Chen, Yonghua Mo, Xin Tang. 121-128 [doi]
- A Lightweight Secure Data Aggregation Scheme for Heterogeneous Devices in Smart HomeYun Zhao, Shan He, Haolin Wang, Yuming Zhao, Ziwen Cai. 129-136 [doi]
- Discretized Optimal AP Deployment Algorithm for Indoor EnvironmentMeizhu Pan, Xiaofeng Zhong. 137-142 [doi]
- Differentially Private Federated Learning with Heterogeneous Group PrivacyMingna Jiang, Linna Wei, Guoyue Cai, Xuangou Wu. 143-150 [doi]
- Towards Semantic Web of Things: Reference Architecture and Gap AnalysisXiang Su, Ekaterina Gilman, Xiaoli Liu 0005. 151-158 [doi]
- Stackelberg Game-Base Incentive Scheme for Federated Learning in Artificial Intelligence of ThingsShaowen Qin, Jin Ye, Xin Tang, Xiaohuan Li. 159-165 [doi]
- Design and Implementation of Security Enhancement Mechanism for Smart Distribution Transformer Combine Terminal Based on WAPIChao Fan, Jin Qian, Mengjun Du, Xinjia Wang, Xiang Xiang 0002. 166-171 [doi]
- Clustering-Based Federated Learning for Heterogeneous IoT DataShumin Li, Linna Wei, Weidong Zhang, Xuangou Wu. 172-179 [doi]
- Achieving Privacy-preserving Arbitrary Geometric Range Query with Bilateral Access ControlXiaochen Ma, Chenfei Hu, Zhuopeng Li, Haotian Liang, Tong Wu 0011, Taiyuan Zhang. 180-187 [doi]
- Enhancing Security and Privacy in Healthcare: A Conceptual ModelNadeem Yaqub, Jianbiao Zhang, Weiru Wang 0001. 188-195 [doi]
- Verifiable Privacy Preservation Scheme for Outsourcing Medi-cal Image to Cloud Through ROI Based Crypto-WatermarkingChuan Zhou, Yi Zhou, XingHan An, Yan Liu, Min Wang, Xiangzhi Liu. 196-204 [doi]
- A PUF-based Identity Authentication Method for Wireless Sensor Network Devices in Power SystemYing Wang, Weijun Zheng, Jinjiang Tang, Feng Sun, Chen Xu, Bin Du, Chunyan An. 205-210 [doi]
- IMU-Based Reliable Vital Signs Monitoring From Human to DogRina Amano, Walid Brahim, Jianhua Ma 0001. 211-218 [doi]
- Posture-Robust Breath Sensing via Imaging RadarJinli Zhang, Dongheng Zhang, Jinbo Chen, Haoyu Wang, Changwei Wu, Hanqin Gong, Shijie Han, Yan Chen. 219-226 [doi]
- Joint Content and Communication Resource Allocation for Privacy-Preserving Distributed Collaborative Edge CachingQi Chen, Jingjing Wu, Wei Wang 0021, Zhaoyang Zhang. 227-232 [doi]
- A Lightweight IoT Device-friendly Anomaly Sitting Posture Detector for Protecting Adolescent Bone DevelopmentHaowen Ji, Jiacheng Xie, Peng Sun. 233-238 [doi]
- Deep Learning-Based RF Fingerprinting for LoRa with Heterogeneous ReceiversTianshu Cui, Chen Gao, Zhihao Li, Jiabao Han, Ruike Li, Yang Yu. 239-245 [doi]
- Performance Evaluation of RF Fingerprinting via Deep Learning for Satellite Network SecurityTianshu Cui, Yang Yu, Yang Liu, Xinyu Lu, Jiacheng Rao, You Zhang. 246-251 [doi]
- A Vision for Future HVDC Cable Accessories: IoT and BeyondYi Luo, Tobias Fechner, Haitian Wang, Mingyu Zhou, Ruoyu Xu, Yanjie Le. 252-255 [doi]
- Blockchain Identity Authentication-Aided Trustworthy Multicast Routing Strategy for LEO Satellite NetworksJiaxin Song, Ying Ju, Yuqi Wang, Yanlong Zou, Congjian Deng, Xiaoming Yuan, Chen Chen. 256-261 [doi]
- Edge Computing Enabled Real-Time Video Analysis via Adaptive Spatial-Temporal Semantic FilteringXiang Chen, Wenjie Zhu, Jiayuan Chen, Tong Zhang, Changyan Yi, Jun Cai 0001. 262-267 [doi]
- Patch-Based Transformer for Low-Light Image EnhancementYu Zhang, Shan Jiang, Xiangyun Tang. 268-273 [doi]
- Cross-Shard Blockchain-based Asynchronous Federated Learning: Stackelberg Game-based Efficient Resource AllocationZhipeng Gao, Qigeng Lin, Yijing Lin, Yang Yang 0006, Lanlan Rui. 274-280 [doi]
- Multimodal Sentiment Analysis With Image-Text Correlation ModalYuxin Li, Shan Jiang, Chaomurilige. 281-286 [doi]
- Multi-Agent Graphic Reinforcement Learning for Real-Time UAV Video Transmission with Predictive Target TrackingFan Duan, Kun Zhu 0001. 287-293 [doi]
- Differentially Dynamic Pricing for Local Energy Provider with Renewable SourcesLei Wu, Didi Liu, Xiaoming Yuan, Quanjing Zhang, Hui Zhang. 294-299 [doi]
- A comparative study of vibration and energy harvesting in two types of HVDC converter modulesQinwei He, Tian Lan, Hui Huang, Yuanliang Lan, Xuefeng Wu. 300-304 [doi]
- A Construction method of Multilingual Comparable Corpus in the background of Artificial Intelligence and Internet of ThingsShumin Dong, Yu Weng, Chaomurilige. 305-312 [doi]
- MATFL: Defending Against Synergetic Attacks in Federated LearningWen Yang, Luyao Peng, Xiangyun Tang, Yu Weng. 313-319 [doi]
- Joint Security-Reliability Analysis and Optimization for Time Sensitive Mobile Edge Computing Networks in Smart GridJie Wang, Jialin Chen, Zheng Zhou, Dekun Zhou, Moujun Li, Botao Yu, Yu Guan. 320-325 [doi]
- Dynamic Influence Maximization with WoM Sensitivity in Blockchain Online Social NetworkZiying Huang, Li Li. 326-333 [doi]
- Outage Probability Analysis of the Symbiotic Backscatter-NOMA SystemsYuhui Zhou, Gaojian Huang, Xingwang Li, Xilai Wang, Xiaoyao Wang. 334-338 [doi]
- Unmanned Aerial Vehicle Swarm Assisted Sleep Scheduling Algorithm in Wireless Sensor NetworksTing Liao, Hongbin Chen. 339-346 [doi]
- Environmental-Adaptive Trajectory Prediction of Multi-Object for UAV Networks with RGBD CameraYongzhu Zhong, Xiaohuan Li, Peiqin Wu, Xin Tang, Qian Chen. 347-353 [doi]
- IPES: Improved Pre-trained Encoder Stealing Attack in Contrastive LearningChuan Zhang 0003, Zhuopeng Li, Haotian Liang, Jinwen Liang, Ximeng Liu, Liehuang Zhu. 354-361 [doi]
- Decentralized Reputation-based Leader Election for Privacy-preserving Federated Learning on Internet of ThingsLuyao Peng, Xiangyun Tang, Chenxi Li, Yao Xiao, Tao Zhang, Yu Weng. 362-369 [doi]
- An Adapted Mean Teacher Model for Semi-supervised Indoor Positioning using Channel Impulse ResponseYingzhi Liu, Bei Yang, Wei Li, Xiaoming She, Gang Feng. 370-376 [doi]
- Heterogeneous Personalized Privacy Protection for Internet of Medical Things: A Blockchain-based Federated Learning ApproachPeisen Gao, Jingyi Su, Zerui Xu, Xiaoming Yuan, Yuchuan Fu. 377-382 [doi]
- Semantic-driven Performance Optimization for UAV Based Object DetectionJiaxin Guo, Kun Zhu 0001. 383-389 [doi]
- Enabling Vision-and-Language Navigation for Intelligent Connected Vehicles Using Large Pre-Trained ModelsYaqi Hu, Dongyuan Ou, Xiaoxu Wang, Rong Yu. 390-396 [doi]
- Outage Analysis of RSMA Space-Terrestrial Downlink in the Presence of Ground InterferenceHang Deng, Xiaqing Miao, Jinpeng Song, Gaofeng Pan, Shuai Wang 0013, Jianping An. 397-402 [doi]
- Data-Driven Ship Stay Behavior Identification in Maritime Internet of Things SystemShangkun Yin, Huigang Qian, Tao Huang, Xiaojie Huo, Ryan Wen Liu. 403-410 [doi]
- MCMSys: Multimodal Data Closed-Loop Management System for Autonomous DrivingHe Li, Zhaogao Zhou, Pin-Tong Chen, Jinjie Yan, Rong Yu, Ziwei Hu. 411-417 [doi]
- APBAO: Adaptive and Parallel Beetle Antennae OptimizationXuan Liu, Chenyan Wang, Xiangyu Qu, Chang Xu, Zheng Liu, Shan Jiang. 418-423 [doi]
- An Adaptive Scheme for Energy Buffer-Aided Wireless-Powered Cooperative NOMA SystemTing Ning, Guofa Cai, Kengyuan Xie, Jiguang He. 424-430 [doi]
- The Modified Unsupervised Low-Light Image Enhancement Approach Based on the Retinex TheoryYingchun Zhang, Shan Jiang, Xuan Liu. 431-436 [doi]
- Multilevel Classification of Drowsiness States using ECG with Optimized Convolutional Neural NetworkKentaro Taki, Jianhua Ma 0001, Ao Guo, Muxin Ma, Alex Qi. 437-443 [doi]
- A Relation-aware Cloth-Changing Person Re-identification Framework Based on Clothing TemplateChenshuang Su, Mingdong Zou, Yujie Zhou, Xiaoke Zhu, WenJuan Liang, Caihong Yuan. 444-451 [doi]
- Deep Interpretable Component Decoupled Dictionary Neural Network for Image Denoising in Industrial Cyber-Physical SystemLizhen Deng, Yushan Pan, Guoxia Xu, Taiyu Yan, Zhongyang Wang, Hu Zhu. 452-461 [doi]
- Intelligent Resource Allocation for Coexisting eMBB and URLLC Traffic in 5G Industrial NetworksDawei Shen, Ziheng Deng, Minxi Li, Qingxu Deng. 462-470 [doi]
- On Predicting Internal Humidity Missing in Emergency Rooms Using Environmental Data from Korea Meteorological AdministrationBumsik Lee, Gwangrae Yeom, Jongpil Jeong. 471-478 [doi]
- Conflict Management in the Near-RT-RIC of Open RAN: A Game Theoretic ApproachAbdul Wadud, Fatemeh Golpayegani, Nima Afraz. 479-486 [doi]
- TIDE: a Timing-Deterministic and Efficient Executor for micro-ROSZilong Wang, Songran Liu, Xu Jiang, Dong Ji, Yi Wang. 487-494 [doi]
- Semi-supervised Few-shot Network Intrusion Detection based on Meta-learningYao Liu, Le Zhou, Qiao Liu 0003, Tian Lan, Xiaoyu Bai, Tinghao Zhou. 495-502 [doi]
- Multi-party Threshold Private Set Intersection Cardinality Based On Encrypted Bloom FilterJie Zhou, Daizhao Su, Jiao Deng. 503-511 [doi]
- A Privacy-Preserving Federated Learning Framework Based on Homomorphic EncryptionLiangjiang Chen, Junkai Wang, Ling Xiong, Shengke Zeng, Jiazhou Geng. 512-517 [doi]
- Unsupervised Mobile User Behavior Detection Based on Siamese Neural NetworksYao Liu, Lu Liu, Qiao Liu 0003, Tian Lan, Xiaoyu Bai, Le Zhou. 518-523 [doi]
- Improving HDR Rendering with UMTMNet's Multilayer PerceptionPeipei Liu, Weifeng Qin, Chaoxuan Hu. 524-531 [doi]
- Leveraging Relay Nodes to Deploy and Update Services in a CPS with Sleeping NodesAntoine Omond, Hélène Coullon, Issam Raïs, Otto J. Anshus. 532-539 [doi]
- Representing Power Variability of an Idle IoT Edge Node in the Power State ModelSalma Tofaily, Issam Raïs, Otto J. Anshus. 540-546 [doi]
- Simulation of Distributed Systems in Constrained Environments Using ESDS: the Arctic Tundra CaseLoic Guegan, Issam Raïs. 547-554 [doi]
- Collaborative Multi-Task Learning across Internet Edges with Device-to-Device CommunicationsRyusei Higuchi, Hiroshi Esaki, Hideya Ochiai. 555-562 [doi]
- Word Orthography and Relationship-Dominant Engineering (WOR-De) Model for Wordle GameYifei Hu, Xinyao Zhuang, Yuxin Wan, Nanlin Jin, Xiaohui Zhu. 563-569 [doi]
- SMOTE-IF: A Novel Resampling Method Based on SMOTE Using Isolation Forest Variants for Multi-Class Imbalanced DataAng Li, Tingting Ma, Sen Ye, Xunyun Liu. 570-577 [doi]
- Relation Extraction Based on Dual-Path Graph Convolutional NetworksJunkai Wang, Jianbin Wu, Lixin Zhou, Qian Zhang, Xuanyu Zhang. 578-585 [doi]
- FMCW Radar-based Sleep Posture Monitoring Through Logic and Deep Learning MethodsMingyang Fan, Jianhua Ma 0001, Muxin Ma, Alex Qi. 586-591 [doi]
- Deep Learning for Microstructure Segmentation and Defect Detection in Additive Manufacturing SystemsZhaochen Gu, Venkata Mani Krishna Karri, Shashank Sharma, Hang Tran, Aishwarya Manjunath, Donger Chen, Song Fu, Narendra B. Dahotre. 592-599 [doi]
- An Interference-aware Approach for Co-located Container Orchestration with Novel MetricXiang Li, Linfeng Wen, Minxian Xu, Kejiang Ye. 600-607 [doi]
- Microservice Auto-Scaling Algorithm Based on Workload Prediction in Cloud-Edge Collaboration EnvironmentZijun Peng, Bing Tang, Wei Xu, Qing Yang, Ehsanullah Hussaini, Yuqiang Xiao, Haiyan Li. 608-615 [doi]
- Particle Swarm Optimization-Based Task Migration in Mobile-Edge Cloud ComputingQixin Peng, Xinde Chen, Yujing Huang, Songkang Ma, Zhenli He. 616-623 [doi]
- Age of Information Oriented Heterogeneous Transmission Scheduling for Cluster-based Flying Ad-Hoc NetworksLongzhang Wang, Feilong Lin, Liyong Yuan, Zhaolong Hu, Minglu Li 0001. 624-631 [doi]
- Enhancing Marketing Activity Prediction: A Framework for Early and Continuous InsightsRui Zhang, Zhenyu Li, Shutian Zhou, Haiyang Yu, Feng Hong. 632-639 [doi]
- Ranging Error model for IEEE 802.15.4 based UWB IoT devicesZhiyong Ji, Zhuolong Chen, Tao Wu, Yubin Zhao. 640-646 [doi]
- An Adaptive UWB Synchronization Algorithm based on The IEEE 802.15.4-2020 ProtocolTao Wu, Zhiyong Ji, Yubin Zhao. 647-653 [doi]
- A Contextual Bandit Approach for Network Service SelectionZhenyu Li, Rui Zhang, Shutian Zhou, Haiyang Yu, Feng Hong. 654-659 [doi]
- A Task Offloading Algorithm Based on Joint Resource Optimization in Mobile Cloud-Edge ArchitectureYuanRui Yang, Nan Wang, Yuan Chang, Yue Zhang, Wenxiao Tang. 660-666 [doi]
- Credit Default Prediction Model based on Horizontal Federated Neural Network and Improved TrAdaBoost AlgorithmMaoguang Wang, Yuxiao Chen 0010, Jiaqi Yan. 667-674 [doi]
- DLFaaS:Serverless Platform for Data-Intensive Tasks Based on Interval Access PatternsYang Cao, Wenbin Song, Hanqian Wu, Shengchao Yuan. 675-680 [doi]
- Evaluating the energy consumption of adaptation tasks for a CPS in the Arctic TundraAntoine Omond, Issam Raïs, Hélène Coullon. 681-688 [doi]
- Inter-Satellite Resource Balancing Based on Genetic Algorithm in Terrestrial-Satellite NetworksChang-Han, Yaohui Song, Xi Li, Hong Ji 0001, Heli Zhang. 689-694 [doi]
- Blockchain-based Transaction Group Key Management Scheme For Edge DevicesQingyuan Liu, Ting Chen 0002, Xiaoze Ni, Tao Liu, Shuwei Song, Jiahao He. 695-702 [doi]
- Deep Reinforcement Learning-Based Smart Grid Resource Allocation SystemQiong Lang, La Ba Dun Zhu, Mi Ma Ci Ren, Rui Zhang, Yinghen Wu, Wenting He, Mingjia Li. 703-707 [doi]
- ChirpCom: A CSS based Underwater Acoustic Communication for Smart DevicesHengbin Wang, Dan Xia, Zhanchao Yang, Xinrun Du, Peichen Zhao, Xiaolong Zheng 0002, Liang Liu 0001, Huadong Ma. 708-715 [doi]
- Design and Evaluation of Single-Board Computer Based Power Monitoring for IoT and Edge SystemsLoic Guegan, Salma Tofaily, Issam Raïs. 716-723 [doi]
- Retrieval-based Battery Degradation Prediction for Battery Energy Storage System OperationsYixuan Li, Qirui Yang, Hao Wen, Huiwen Zheng, Weimin Liu, Hui Li, Yuanchun Li, Yunxin Liu. 724-731 [doi]
- Anonymous Authentication Scheme for Electric Vehicle Reservations in V2G NetworksXiaohua Yang, Haolin Wang, Jiahao Li, Yun Zhao, Ziyang Yang, Ziwen Cai. 732-739 [doi]
- A low cost weather monitoring, PV and prediction system in East AfricaGeoffrey Mark Kagarura, Ulrich Hilleringmann, Dmitry Petrov. 740-745 [doi]
- High Accuracy Current Comparator Technology based on Solid-state Quantum Precision MeasurementTianfu Huang, Tongyao Lin, Hanbin Huang, Xiaofei Li, Qi Nie, Han Wang. 746-752 [doi]
- Research on DC Current Measurement Method based on Solid-state QuantumMingyang Liu, Changkui Wang, Xiaofei Li, Qi Nie, Han Wang. 753-757 [doi]
- Design of Multifunctional Shock Wave Overpressure Acquisition SystemChuang Hu, Yu Ma, Chao Wang, Ya Zhang, Jun Wang. 758-764 [doi]
- Change Back Meter Carrier Module Intelligent Sorting and Management Techniques Based on ARMHanlu Liu, Fuyong Zhu, Luhao Lin, Limin Liu. 765-770 [doi]
- Low-Carbon Power Grid Economic Assessment Model Based on CNN and LSTMYinghen Wu, Wenting He, Mingjia Li, Rui Zhang, Hongfeng Zhang, Suo Lang Bu Duo Jie, Yuxin Yang. 771-775 [doi]
- Power Grid Security Situation Awareness Method based on Deep LearningHongfeng Zhang, Suo Lang Bu Duo Jie, Yuxin Yang, Rui Zhang, Qiong Lang, La Ba Dun Zhu, Mi Ma Ci Ren. 776-780 [doi]
- FrostOracle: A Novel and Efficient Blockchain Oracle Scheme Based on Threshold SignatureXi Chen, Fang Li, Wenwu Yang, Ting Chen. 781-786 [doi]
- MAGI-NET: Masked Global Information Network for Symbolic Music GenerationDawei Wang, Pengfei Li, Jingcheng Wu. 787-794 [doi]
- Secure URLLC Empowered by UAV in 6G: An Interference Engineering PerspectiveKan Yu, Kaixuan Li, Zhiyong Feng 0001, Xiao Zhao, Chuanwen Luo, Ting Chen, Dong Li. 795-802 [doi]
- Paper Indexing Method and System Based on BlockchainRenkai Jiang, Xi Chen, Wenwu Yang, Ting Chen 0002. 803-809 [doi]
- Proof-of-Pedal - Pedal-Powered Byzantine Green Consensus for BlockchainEranga Bandara, Peter Foytik, Sachin Shetty, Ravi Mukkamala, Abdul-Rahman, Xueping Liang, Wee Keong Ng, D. N. Ranasinghe, Kasun De Zoysa. 810-814 [doi]