Abstract is missing.
- Privacy Enabled Noise Free Data Collection in Vehicular NetworksAnuj Dimri, Harsimran Singh, Shamik Sarkar, Sneha Kumar Kasera, Neal Patwari, Aditya Bhaskara, Kurt Derr, Samuel Ramirez. 1-9 [doi]
- Efficient and Privacy-Preserving Ad Conversion for V2X-Assisted Proximity MarketingDongxiao Liu, Jianbing Ni, Hongwei Li, Xiaodong Lin, Xuemin Shen. 10-18 [doi]
- WDMTI: Wireless Device Manufacturer and Type Identification Using Hierarchical Dirichlet ProcessLingjing Yu, Tao Liu, Zhaoyu Zhou, Yujia Zhu, Qingyun Liu, Jianlong Tan. 19-27 [doi]
- Defending Against Voice Spoofing: A Robust Software-Based Liveness Detection SystemJiacheng Shang, Si Chen, Jie Wu 0001. 28-36 [doi]
- Multi-person Sleeping Respiration Monitoring with COTS WiFi DevicesYanni Yang, Jiannong Cao, Xuefeng Liu, Kai Xing. 37-45 [doi]
- SecT: A Lightweight Secure Thing-Centered IoT Communication SystemChao Gao, Zhen Ling, Biao Chen, Xinwen Fu, Wei Zhao. 46-54 [doi]
- Q-Learning Based Edge Caching Optimization for D2D Enabled Hierarchical Wireless NetworksChenyang Wang, Shanjia Wang, Ding Li, Xiaofei Wang, Xiuhua Li, Victor C. M. Leung. 55-63 [doi]
- MRDroid: A Multi-act Classification Model for Android Malware Risk AssessmentJianguo Jiang, Song Li, Min Yu, Kai Chen, Chao Liu, Weiqing Huang, Gang Li. 64-72 [doi]
- Dynamic Service Caching in Mobile Edge NetworksQingyuan Xie, Qiuyun Wang, Nuo Yu, Hejiao Huang, Xiaohua Jia. 73-79 [doi]
- Placement of Highly Available Virtual Network Functions Through Local ReroutingXiaojun Shang, Zhenhua Li 0002, Yuanyuan Yang. 80-88 [doi]
- A Dynamic Resource Overbooking Mechanism in Fog ComputingFuming Zhang, Zhiqing Tang, Mingcheng Chen, Xiaojie Zhou, Weijia Jia. 89-97 [doi]
- LPDA-EC: A Lightweight Privacy-Preserving Data Aggregation Scheme for Edge ComputingJiale Zhang, Yanchao Zhao, Jie Wu, Bing Chen. 98-106 [doi]
- Performance Evaluation of Rate Adaptation Algorithms in IEEE802.11p Heterogeneous Vehicular NetworksAbdennour Zekri, Weijia Jia. 107-115 [doi]
- Cloud-Based Collision-Aware Energy-Minimization Vehicle Velocity OptimizationChenxi Qiu, Haiying Shen. 116-124 [doi]
- Achieving Stable and Optimal Passenger-Driver Matching in Ride-Sharing SystemYixuan Zhong, Lin Gao, Tong Wang, Shimin Gong, Baitao Zou, Deliang Yu. 125-133 [doi]
- inLaneCom: Enabling In-lane Vehicular Communication Using on-Board SmartphonesAbdulla Alasaadi, Tamer Nadeem, Ahmed Salem. 134-142 [doi]
- The Energy Replenishment Problem in Mobile WRSNsChien-Fu Cheng, Chen-Chuan Wang. 143-144 [doi]
- Multi-node Mobile Charging Scheduling with Deadline ConstraintsXunpeng Rao, Panlong Yang, Haipeng Dai, Hao Zhou, Tao Wu, Xiaoyu Wang. 145-146 [doi]
- Enhancing Smartphone-Based Multi-modal Indoor Localization with Camera and WiFi SignalJing Xu, Yanchao Zhao, Jie Wu, Hongyan Qian. 147-148 [doi]
- Content-Aware Caching in SDN-Enabled Virtualized Wireless D2D Networks to Reduce Visiting LatencyGuolin Sun, Hisham Al-Ward, Gordon Owusu Boateng, Wei Jiang. 149-150 [doi]
- A Spectrum Aware Routing Protocol in Cognitive Radio Ad Hoc NetworksBeomsu Kim, Ki-Il Kim, Bongsoo Roh, Hyungseok Choi. 151-152 [doi]
- Hierarchical Routing for Unmanned Aerial Vehicle Relayed Tactical Ad Hoc NetworksBeomsu Kim, Ki-Il Kim, Bongsoo Roh, Hyungseok Choi. 153-154 [doi]
- Deep Learning Based Urban Post-Accidental Congestion PredictionMingming Lu, Kunfang Zhang, Junyan Wu, Dingwu Tan. 155-156 [doi]
- Design and Implementation of an Integrated Visible Light Communication and WiFi SystemAimin Tang, Chao Xu, Bangzhao Zhai, Xudong Wang 0001. 157-165 [doi]
- Top-Down Indoor Localization with Wi-Fi Fingerprints Using Deep Q-NetworkFei Dou, Jin Lu, Zigeng Wang, Xia Xiao, Jinbo Bi, Chun-Hsi Huang. 166-174 [doi]
- Achieving Energy Efficiency Through Dynamic Computing Offloading in Mobile Edge-CloudsZeyu Meng, Hongli Xu, Liusheng Huang, Peng Xi, Shuang Yang. 175-183 [doi]
- Randomized Single-Path Flow Routing on SDN-Aware Wi-Fi Mesh NetworksDawood Sajjadi, Zehui Zheng, Rukhsana Ruby, Jianping Pan 0001. 184-192 [doi]
- Cloud Control to Optimize Real-Time Video Transmission in Dense IEEE 802.11aa/ax NetworksEvgeny M. Khorov, Alexander S. Ivanov, Andrey I. Lyakhov, Ian F. Akyildiz. 193-201 [doi]
- Improving Neighbor Discovery by Operating at the Quantum ScaleXiangyun Meng, Daniel Lin-Kit Wong, Ben Leong, Zixiao Wang, Yabo Dong, Dongming Lu. 202-210 [doi]
- Using Wireless Tags to Monitor Bodily OscillationYoulin Zhang, Shigang Chen, You Zhou 0003, Yuguang Fang. 211-219 [doi]
- Evaluation of Suitable Radio Frequencies for Data Transmission in Potato WarehousesBjörn Gernert, Fabian Schwartau, Sebastian Raabe, Joerg Schoebel, Karsten Schubert, Stephan Rottmann, Lars C. Wolf. 220-227 [doi]
- Enabling Edge Intelligence for Activity Recognition in Smart HomesShaojun Zhang, Wei Li, Yongwei Wu, Paul Watson 0001, Albert Y. Zomaya. 228-236 [doi]
- Low-Latency Authentication Against Satellite Compromising for Space Information NetworkWei Meng, Kaiping Xue, Jie Xu, Jianan Hong, Nenghai Yu. 237-244 [doi]
- Voiceprint-Based Access Control for Wireless Insulin Pump SystemsBin Hao, Xiali Hei, Yazhou Tu, Xiaojiang Du, Jie Wu. 245-253 [doi]
- BF-IoT: Securing the IoT Networks via Fingerprinting-Based Device AuthenticationTianbo Gu, Prasant Mohapatra. 254-262 [doi]
- Minimum Cost Seed Selection for Multiple Influences Diffusion in CommunitiesGuoju Gao, Mingjun Xiao, Jie Wu 0001, He Huang 0001, Guoliang Chen 0001. 263-271 [doi]
- Leveraging Smart Lights for Passive LocalizationWeizheng Wang, Junwei Zhang, Qing Wang, Marco Zuniga. 272-280 [doi]
- Embracing Spatial Awareness for Reliable WiFi-Based Indoor Location SystemsJingao Xu, Zheng Yang 0002, Hengjie Chen, Yunhao Liu, Xiancun Zhou, Jianbo Li, Nicholas D. Lane. 281-289 [doi]
- RF-Brush: 3D Human-Computer Interaction via Linear Tag ArrayYinyin Gong, Lei Xie, Chuyu Wang, Yanling Bu, Sanglu Lu. 290-298 [doi]
- Low-Cost Mapping of RFID Tags Using Reader-Equipped SmartphonesYuki Sato, Marius Noreikis, Yu Xiao. 299-307 [doi]
- SmartRetro: Blockchain-Based Incentives for Distributed IoT Retrospective DetectionBo Wu, Qi Li, Ke Xu, Ruoyu Li, Zhuotao Liu. 308-316 [doi]
- Space-Efficient and Dynamic Caching for D2D Networks of Heterogeneous UsersVictoria G. Crawford, Alan Kuhnle, Md Abdul Alim, My T. Thai. 317-325 [doi]
- Delay Efficient Data Aggregation Scheduling in Multi-channel Duty-Cycled WSNsXianlong Jiao, Wei Lou, Xinxi Feng, Xiaodong Wang, Libin Yang, Guirong Chen. 326-334 [doi]
- Theoretical Round Modification Fault Analysis on AEGIS-128 with Algebraic TechniquesFan Zhang 0010, Xiaofei Dong, Xinjie Zhao 0001, Yidi Wang, Samiya Qureshi, Yiran Zhang, Xiaoxuan Lou, Yongkang Tang. 335-343 [doi]
- Fast Interference-Aware Scheduling of Multiple Wireless ChargersZhi Ma, Jie Wu, Sheng Zhang, Sanglu Lu. 344-352 [doi]
- Alano: An Efficient Neighbor Discovery Algorithm in an Energy-Restricted Large-Scale NetworkTong Shen, Yuexuan Wang, Zhaoquan Gu, Dongda Li, Zhen Cao, Heming Cui, Francis C. M. Lau 0001. 353-361 [doi]
- Multi-hop Deflection Routing Algorithm Based on Q-Learning for Energy-Harvesting NanonetworksChaochao Wang Wang, Qin Xia, Xin-Wei Yao, Wanliang Wang, Josep Miquel Jornet. 362-370 [doi]
- Cloud Assisted Traffic Redundancy Elimination for Power Efficiency in SmartphonesShenghua He, Haiying Shen, Vivekgautham Soundararaj, Lei Yu 0002. 371-379 [doi]
- WSN Scheduling for Energy-Efficient Correction of Environmental ModellingAhmed Boubrima, Azzedine Boukerche, Walid Bechkit, Hervé Rivano. 380-387 [doi]
- A Hint-Based Random Access Protocol for mMTC in 5G Mobile NetworkYining Xu, Yi Ren 0001, Kate Ching-Ju Lin, Yu-Chee Tseng. 388-396 [doi]
- Sense and Deploy: Blockage-Aware Deployment of Reliable 60 GHz mmWave WLANsZhicheng Yang, Parth H. Pathak, Jianli Pan, Mo Sha 0001, Prasant Mohapatra. 397-405 [doi]
- CREAM: Unauthorized Secondary User Detection in Fading EnvironmentsXiaonan Zhang, Pei Huang, Qi Jia, Linke Guo. 406-414 [doi]
- CORTEN: A Real-Time Accurate Indoor White Space Prediction MechanismHejun Xiao, Dongxin Liu, Fan Wu 0006, Linghe Kong, Guihai Chen. 415-423 [doi]
- Holmes: Tackling Data Sparsity for Truth Discovery in Location-Aware Mobile CrowdsensingZhuoqian Li, Shuo Yang, Fan Wu, Xiaofeng Gao, Guihai Chen. 424-432 [doi]
- Multi-expertise Aware Participant Selection in Mobile Crowd Sensing via Online LearningHanshang Li, Ting Li, Fan Li, Song Yang, Yu Wang. 433-441 [doi]
- Privacy Preserving and Cost Optimal Mobile Crowdsensing Using Smart Contracts on BlockchainDimitris Chatzopoulos, Sujit Gujar, Boi Faltings, Pan Hui. 442-450 [doi]
- GreenMap: Approximated Filtering Towards Energy-Aware Crowdsensing for Indoor MappingJohannes Kassinger, Mohamed Abdelaal 0001, Frank Dürr, Kurt Rothermel. 451-459 [doi]
- Robust State Prediction with Incomplete and Noisy Measurements in Collaborative SensingDaniel Zhang, Yang Zhang, Qi Li, Nathan Vance, Dong Wang 0002. 460-468 [doi]
- Error Analysis on RSS Range-Based Localization Based on General Log-Distance Path Loss ModelWei Li, Zimu Yuan, Shuhui Yang, Wei Zhao. 469-474 [doi]
- Joint Optimization of Traffic and Computation Offloading in UAV-Assisted Wireless NetworksXianlang Hu, Xiaoxiao Zhuang, Guangsheng Feng, Haibin Lv, Huiqiang Wang, Junyu Lin. 475-480 [doi]
- A Privacy-User-Friendly Scheme for Wearable Smart Sensing Devices Based on BlockchainGuishan Dong, Yuxiang Chen, Jia-Fan, Dijun Liu, Yao Hao, Zhen Wang. 481-486 [doi]
- Distributed Kalman Filter with Consensus Strategies for Internet of Things NetworkYee Ming Chen, Chu-Kai Wang, Yu-Meng Chen. 487-490 [doi]
- An Improved Characters Recognition Approach Using Fast Determinant RecursionXiaoxia Zheng, Haomiao Yang, Bin Tang. 491-494 [doi]
- A Method of Linear Regression Model Building for Healthy Pupae Number Based on Common Characters IndicatorsQiang Pu, Tao Tao, Dagang Gong, Yuerong Xian, Hong Du. 495-499 [doi]
- A Fusion Method of Multiple Sensors Data on Panorama Video for Airport Surface SurveillanceHui Yao, Honggang Wu, DongLin He, Min Wu. 500-504 [doi]
- Physical Intrusion Detection System Based on Behavioral Sign RecognitionShaopeng Liang, Ziqing Wang, Wenwen Chen, Yehan Ren, Qitian Wang. 505-510 [doi]
- Quantifying the Reversibility of Protocol FormatZhengguo Xu, Ling You, Hui Zheng. 511-519 [doi]
- Five Important Attack in Round Function Using SIMECK AlgorithmSofu Risqi. 520-525 [doi]
- A Web Attack Detection Technology Based on Bag of Words and Hidden Markov ModelXin Ren, Yupeng Hu, Wenxin Kuang, Mohamadou Ballo Souleymanou. 526-531 [doi]
- A Framework to Data Delivery Security for Big Data Annotation Delivery SystemYanhong Yang, Hongling He, Daliang Wang, Zhongxiang Ding. 532-536 [doi]
- Data Scheduling Based on Data Label in Hybrid Storage ArchitectureLiangyuan Wang, Xuan Chen, Xin Li. 537-542 [doi]
- A Comparison of Moving Target Defense StrategiesJingzhe Zhang, Dongxia Wang, Xuewei Feng. 543-547 [doi]
- Iterative Anomaly Detection Algorithm Based on Time Series AnalysisJingxiang Qi, Yanjie Chu, Liang He. 548-552 [doi]
- A Solution for Mobility Management in Software Defined VANETZhenqian He, Bin Fu, Ao Cao, Jian Yu. 553-558 [doi]
- Scalable and Privacy Preserving Routing in Mobile Social NetworksCong Liu 0001, Mingjun Xiao, Yaxiong Zhao. 559-564 [doi]