Abstract is missing.
- A Centralized Controller for Reliable and Available Wireless Schedules in Industrial NetworksRemous-Aris Koutsiamanis, Georgios Z. Papadopoulos, Bruno Quoitin, Nicolas Montavont. 1-9 [doi]
- A FAIR Extension for the MQTT ProtocolDariush Salami, Olga Streibel, Marcus Rhenius, Stephan Sigg. 10-16 [doi]
- A Game Theoretical Pricing Scheme for Vehicles in Vehicular Edge ComputingChaogang Tang, Chunsheng Zhu, Huaming Wu, Xianglin Wei, Qing Li, Joel J. P. C. Rodrigues. 17-22 [doi]
- A Global Brain fuelled by Local intelligence: Optimizing Mobile Services and Networks with AISi-Ahmed Naas, Thaha Mohammed, Stephan Sigg. 23-32 [doi]
- A Near-optimal Protocol for the Subset Selection Problem in RFID SystemsXiujun Wang, Zhi Liu, Susumu Ishihara, Zhe Dang, Jie Li 0002. 33-42 [doi]
- A Priority Task Scheduling Algorithm based on Residual Energy in EH-WSNsWuyungerile Li, Haode Gao, Yingcong Liu, Bing Jia, Baoqi Huang. 43-48 [doi]
- ° Video Adaptive Bitrate Delivery and Caching Scheme for C-RANShunyi Wang, Xiaobin Tan, Simin Li, Xiang Xu, Jian Yang, Quan Zheng 0002. 49-56 [doi]
- Adaptive Machine learning: A Framework for Active Malware DetectionMuhammad Aslam, Dengpan Ye, Muhammad Hanif, Muhammad Asad. 57-64 [doi]
- AirQ: A Privacy-Preserving Truth Discovery Framework for Vehicular Air Quality MonitoringRui Liu, Jianping Pan 0001. 65-72 [doi]
- An Efficient Data Aggregation Scheme with Local Differential Privacy in Smart GridNa Gai, Kaiping Xue, Peixuan He, Bin Zhu, Jianqing Liu, Debiao He. 73-80 [doi]
- An Online Pricing Strategy of EV Charging and Data Caching in Highway Service StationsZhou Su, Tianxin Lin, Qichao Xu, Nan Chen, Shui Yu, Song Guo. 81-85 [doi]
- Analysing Ballistocardiography for Pervasive HealthcareRoni Hytonen, Alison Tshala, Jan Schreier, Melissa Holopainen, Aada Forsman, Minna Oksanen, Rainhard Dieter Findling, Le Ngu Nguyen, Stephan Sigg, Nico Jähne-Raden. 86-91 [doi]
- BDTF: A Blockchain-Based Data Trading Framework with Trusted Execution EnvironmentGuoxiong Su, Wenyuan Yang, Zhengding Luo, Yinghong Zhang, Zhiqiang Bai, Yuesheng Zhu. 92-97 [doi]
- BIA: A Blockchain-based Identity Authorization MechanismXiaodong Ren, Feilong Lin, Zhongyu Chen, Changbing Tang, Zhonglong Zheng, Minglu Li. 98-105 [doi]
- Compressed Multivariate Kernel Density Estimation for WiFi Fingerprint-based LocalizationZhendong Xu, Baoqi Huang, Bing Jia, Wuyungerile Li. 106-112 [doi]
- CoOMO: Cost-efficient Computation Outsourcing with Multi-site Offloading for Mobile-Edge ServicesTianhui Meng, Huaming Wu, Zhihao Shang, Yubin Zhao, Cheng-Zhong Xu 0001. 113-120 [doi]
- COPSS-lite: A Lightweight ICN based Pub/Sub System for IoT EnvironmentsSripriya Srikant Adhatarao, Haitao Wang, Mayutan Arumaithurai, Xiaoming Fu 0001. 121-128 [doi]
- Data Collection Strategy Based on Drone Technology in Wireless Sensor NetworksBo Yang, Xiangyu Bai. 129-136 [doi]
- Deep Reinforcement Learning for Optimal Resource Allocation in Blockchain-based IoV Secure SystemsHongzhi Xiao, Chen Qiu, Qinglin Yang, Huakun Huang, Junbo Wang, Chunhua Su. 137-144 [doi]
- Detection of malicious nodes in drone ad-hoc network based on supervised learning and clustering algorithmsShanshan Sun, Zuchao Ma, Liang Liu 0006, Hang Gao, Jianfei Peng. 145-152 [doi]
- Dynamic Resource Allocation for Hierarchical Federated LearningWei Yang Bryan Lim, Jer Shyuan Ng, Zehui Xiong, Dusit Niyato, Song Guo, Cyril Leung, Chunyan Miao. 153-160 [doi]
- Dynamic Spectrum Allocation Enabled Multi-user Latency Minimization in Mobile Edge ComputingYang Li 0049, Yuan Wu 0001, Weijia Jia 0001. 161-168 [doi]
- Efficient Algorithm for Multi-Constrained Opportunistic Wireless SchedulingXiaoHua Xu, Lixin Wang. 169-173 [doi]
- Efficient Distributed Training in Heterogeneous Mobile Networks with Active SamplingYunhui Guo, Xiaofan Yu, Kamalika Chaudhuri, Tajana Rosing. 174-181 [doi]
- Efficient Service Entity Chain Placement in Mobile Edge ComputingYu Liang 0001, JiDong Ge, Sheng Zhang 0001, Changan Niu, Wei Song 0003, Bin Luo 0003. 182-189 [doi]
- Energy-efficient Trajectory Planning and Speed Scheduling for UAV-assisted Data CollectionWeidu Ye, Wenjia Wu, Feng Shan, Ming Yang 0001, Junzhou Luo. 190-197 [doi]
- Energy-saving Strategy for Edge Computing by Collaborative Processing Tasks on Base StationsZhongjun Ma, Zhenchun Wei, Wenjie Zhang, Zengwei Lyu, Junyi Xu, Benhong Zhang. 198-205 [doi]
- Enhancing IoT Anomaly Detection Performance for Federated LearningBrett Weinger, Jinoh Kim, Alex Sim, Makiya Nakashima, Nour Moustafa, K. John Wu. 206-213 [doi]
- Evaluation environment using edge computing for artificial intelligence-based irrigation systemTakaaki Kawai, Hiroshi Mineno. 214-219 [doi]
- FD-Band: A Ubiquitous Fall Detection System Using Low-Cost COTS Smart BandKaiwen Guo, Yingling Quan, Hao Zhou 0001, Zhi Liu, Panlong Yang, Xiang-Yang Li 0001. 220-227 [doi]
- Federated Deep Payload Classification for Industrial Internet with Cloud-Edge ArchitecturePeng Zhou. 228-235 [doi]
- Fine-grained Device and Data Access Control of Community Medical Internet of ThingsCheng Huang, Ziyang Zhang, Jing Huang, Fulong Chen. 236-243 [doi]
- Joint Service Caching and Computation Offloading to Maximize System Profits in Mobile Edge-Cloud ComputingQingyang Fan, Junyu Lin, Guangsheng Feng, Zihan Gao, Huiqiang Wang, Yafei Li. 244-251 [doi]
- Jointly Video Bitrate Adaptation and Multicast Resource Allocation in Mobile Edge NetworksSimin Li, Xiaobin Tan, Shunyi Wang, Jian Yang, Quan Zheng. 252-259 [doi]
- Lifetime Improvements of Smart Sensors Maintenance Protocol in Prospect of IoT-based Rampal Power PlantSyed Bilal Hussain Shah, Lei Wang, Md. Ershadul Haque, Md Jahirul Islam, Anil Carie, Neeraj Kumar. 260-267 [doi]
- Load balancing and resource management in distributed B5G networksLu Ma, Weiling Chang, Chao Li, Shanjin Ni, Jia Cui, Ming Liu. 268-274 [doi]
- Magic Wand: Towards Plug-and-Play Gesture Recognition on SmartwatchZhipeng Song, Zhichao Cao, Zhenjiang Li, Jiliang Wang. 275-282 [doi]
- Markov Probability Fingerprints: A Method for Identifying Encrypted Video TrafficLuMing Yang, Shaojing Fu, Yuchuan Luo, Jiangyong Shi. 283-290 [doi]
- MEC-Assisted FoV-Aware and QoE-Driven Adaptive 360° Video Streaming for Virtual RealityChih-Ho Hsu. 291-298 [doi]
- MobiFit: Contactless Fitness Assistant for Freehand Exercises Using Just One Cellular Signal ReceiverGuanlong Teng, Feng Hong 0001, Yue Xu, Jianbo Qi, Ruobing Jiang, Chao Liu, Zhongwen Guo. 299-306 [doi]
- Multivariate and Multi-frequency LSTM based Fine-grained Productivity Forecasting for Industrial IoTYan Zhang, Xiaolong Zheng, Liang Liu, Huadong Ma. 307-314 [doi]
- Online Distributed Job Dispatching with Outdated and Partially-Observable InformationYuncong Hong, Bojie Lv, Rui Wang, Haisheng Tan, Zhenhua Han, Hao Zhou, Francis C. M. Lau 0001. 315-322 [doi]
- Optimal Defense Strategy against Evasion AttacksJiachen Wu, Jipeng Li, Yan Wang, Yanru Zhang, Yingjie Zhou. 323-329 [doi]
- Optimizing functional split of baseband processing on TWDM-PON based fronthaul networkGo Hasegawa, Masayuki Murata, Yoshihiro Nakahira, Masayuki Kashima, Shingo Ata. 330-336 [doi]
- Privacy-Protecting Reputation Management Scheme in IoV-based Mobile CrowdsensingZhifei Wang, Luning Liu, Luhan Wang, Xiangming Wen, Wenpeng Jing. 337-343 [doi]
- QoS Optimization of DNN Serving Systems Based on Per-Request Latency CharacteristicsJianfeng Zhang, Wensheng Zhang, Lingjun Pu, Jingdong Xu. 344-351 [doi]
- Real-Time Survivor Detection in UAV Thermal Imagery Based on Deep LearningJiong Dong, Kaoru Ota, Mianxiong Dong. 352-359 [doi]
- Real-time Task Offloading for Data and Computation Intensive Services in Vehicular Fog Computing EnvironmentsChunhui Liu, Kai Liu 0001, Xincao Xu, HuaLing Ren, Feiyu Jin, Songtao Guo. 360-366 [doi]
- Reinforcement Learning based Joint Channel/Subframe Selection Scheme for Fair LTE-WiFi CoexistenceYuki Kishimoto, Xiaoyan Wang 0003, Masahiro Umehira. 367-372 [doi]
- Research on D2D Data Transmission Protocol in NDNBo Cui, Xinmiao Jian, Qi Chen. 373-380 [doi]
- RF-WTI: Wood Types Identification based on Commodity RFID DevicesXiangmao Chang, Xianghui Zhang, Muhammad Waqas Isa, Weiwei Wu, Yan Li. 381-386 [doi]
- SASAK: Shrinking the Attack Surface for Android Kernel with Stricter "seccomp" RestrictionsYingjiao Niu, Lingguang Lei, Yuewu Wang, Jiang Chang, Shijie Jia, Chunjing Kou. 387-394 [doi]
- Scheduling mix-flow in SD-DCN based on Deep Reinforcement Learning with Private LinkJinjie Lu, Waixi Liu, Yinghao Zhu, Sen Ling, Zhitao Chen, Jiaqi Zeng. 395-401 [doi]
- SDN Based Computation Offloading for Industrial Internet of ThingsGen Li, Shutian Hua, Liang Liu, Xiaolong Zheng, Huadong Ma. 402-409 [doi]
- Simultaneous Multi-face Zoom Tracking for 3-D People-Flow Analysis with Face IdentificationLiheng Shen, Shaopeng Hu, Kohei Shimasaki, Taku Senoo, Idaku Ishii. 410-417 [doi]
- SSR: Joint Optimization of Recommendation and Adaptive Bitrate Streaming for Short-form Video FeedDezhi Ran, Yuanxing Zhang, Wenhan Zhang, Kaigui Bian. 418-426 [doi]
- Terminal-Edge-Cloud Collaboration: An Enabling Technology for Robust Multimedia StreamingDapeng Wu 0002, Jin Yang, Honggang Wang, Boran Yang, Ruyan Wang. 427-434 [doi]
- Throughput Maximization for UAV-Enabled Data CollectionJunchao Gong, Xiaojun Zhu 0001, Lijie Xu. 435-440 [doi]
- Tile-based Multi-source Adaptive Streaming for 360-degree Ultra-High-Definition VideosXinjing Yuan, Lingjun Pu, Ruilin Yun, Jingdong Xu. 441-448 [doi]
- TL-IDPS: Two Level Intrusion Detection and Prevention System using Probabilistic Optimal Feature Set EstimationErnest Ntizikira, Lei Wang, Bingxian Lu, Xinxin Lu. 449-456 [doi]
- Towards mmWave Localization with Controllable Reflectors in NLoS ScenariosShan Wang, Zengyu Song, Hao Zhou, Xing Guo, Jun Xu, Zhi Liu. 457-464 [doi]
- Training Machine Learning Models Through Preserved DecentralizationGoodlet Akwasi Kusi, Qi Xia, Christian Nii Aflah Cobblah, Jianbin Gao, Hu Xia. 465-472 [doi]
- Urban Mobility Prediction based on LSTM and Discrete Position Relationship ModelMing Tao, Geng Sun, Tian Wang. 473-478 [doi]
- Weighted Local Outlier Factor for Detecting Anomaly on In-Vehicle NetworkYuan Linghu, Ming Xu, Xiangxue Li, Haifeng Qian. 479-487 [doi]
- Wireless Information and Energy Provision with Practical Modulation in Energy Self-Sustainable Wireless NetworksJie Hu, Li Zhang, Qin Yu, Kun Yang. 488-495 [doi]
- A Geometry-based Non-stationary Wideband MIMO Channel Model and Correlation Analysis for Vehicular Communication SystemsSuqin Pang, Fan Bai, Di Zhang, Zheng Wen, Takuro Sato. 496-501 [doi]
- Analyzing Eye-movements of Drivers with Different Experiences When Making a TurnBo Wu 0007, Shoji Nishimura, Qun Jin, Yishui Zhu. 502-507 [doi]
- Autonomous Security Analysis and Penetration TestingAnkur Chowdhary, Dijiang Huang, Jayasurya Sevalur Mahendran, Daniel Romo, Yuli Deng, Abdulhakim Sabur. 508-515 [doi]
- Early Botnet Detection for the Internet and the Internet of Things by Autonomous Machine LearningAnderson Bergamini de Neira, Alex Medeiros Araujo, Michele Nogueira. 516-523 [doi]
- Identifying unfamiliar callers' professions from privacy-preserving mobile phone dataJiaquan Zhang, Xiaoming Yao, Xiaoming Fu 0001. 524-530 [doi]
- Length Matters: Fast Internet Encrypted Traffic Service Classification based on Multi-PDU LengthsZihan Chen, Guang Cheng, Bomiao Jiang, Shuye Tang, Shuyi Guo, Yuyang Zhou. 531-538 [doi]
- [Invited] LoRaCTP: a LoRa based Content Transfer Protocol for sustainable edge computingKiyoshy Nakamura, Pietro Manzoni, Marco Zennaro, Juan-Carlos Cano, Carlos T. Calafate. 539-545 [doi]
- Machine Learning Enabled Secure Collection of Phasor Data in Smart Power Grid NetworksWassila Lalouani, Mohamed F. Younis. 546-553 [doi]
- Mobility-Aware Offloading and Resource Allocation in MEC-Enabled IoT NetworksHan Hu, Weiwei Song, Qun Wang, Fuhui Zhou, Rose Qingyang Hu. 554-560 [doi]
- Multi-dimensional Impact Detection and Diagnosis in Cellular NetworksMubashir Adnan Qureshi, Lili Qiu, Ajay Mahimkar, Jian He, Ghufran Baig. 561-568 [doi]
- [Invited] NDN Based Participatory Crowdsensing Framework with Area-focused Interest ForwardingHideki Tode, Ashish Man Singh Pradhan, Daishi Kondo, Yosuke Tanigawa. 569-575 [doi]
- NoPTPeer: Protecting Android Devices from Stealthy Spoofing and Stealing in WLANs without PrivilegeShuying Wei, Xiaoliang Wang 0004, Ke Xu 0002. 576-583 [doi]
- Real-time Emotion Recognition for SalesSi-Ahmed Naas, Stephan Sigg. 584-591 [doi]
- Resilient Caching in Information-Centric NetworkingNoriaki Kamiyama, Rin Hamada. 592-598 [doi]
- Subject-adaptive Skeleton Tracking with RFIDChao Yang 0025, Xuyu Wang, Shiwen Mao. 599-606 [doi]
- Trapdoor Assignment of PEKS-based NDN Strategy in Two-Tier NetworksKyi Thar Ko, Masahiro Mambo. 607-613 [doi]
- User Interest Communities Influence Maximization in a Competitive EnvironmentJie-Ming Chen, Lei Lei Shi, Lu Liu 0001, Ayodeji Ayorinde, Rongbo Zhu, John Panneerselvam. 614-621 [doi]
- A Study on MQTT Node SelectionFu Chen, Yujia Huo, Kun Liu, Wenying Tang, Jianming Zhu, Zhiyuan Sui. 622-623 [doi]
- Impact of Mode Selection on the Performance of D2D-Unlicensed CommunicationsGanggui Wang, Celimuge Wu, Yoshinaga Tsutomu, Rui Yin. 624-625 [doi]
- UAV-empowered Protocol for Information Sharing in VDTNZhaoyang Du, Celimuge Wu, Yoshinaga Tsutomu. 626-627 [doi]
- Demo Abstract: Vision-aided 3D Human Pose Estimation with RFIDChao Yang 0025, Xuyu Wang, Shiwen Mao. 628-629 [doi]
- Verifiable Blockchain-Based Searchable Encryption with forward and backward privacyRuizhong Du, Yi Wang. 630-635 [doi]
- A Traffic Engineering Technology Based on Segment Routing in SDNYuantao Teng, ZhengYou Xia. 636-641 [doi]
- An Ensemble Learning Approach for Extracting Concept Prerequisite Relations from WikipediaYang Zhou, Kui Xiao, Yan Zhang. 642-647 [doi]
- Boosting Cooperative Game with Complete Information in Multi-UAV Mesh Router NetworksWei Zhao, Taoyang Zhou, Xuangou Wu, Xiujun Wang, Ruilin Pan, Xun Shao. 648-653 [doi]
- Community Preference-Based Information-Centric Networking CacheXiao Yang, Chaofeng Zhang, Caijuan Chen, Haozhe Liang. 654-658 [doi]
- Design and Analysis of Decentralized Interactive Cyber Defense Approach based on Multi-agent CoordinationMing Liu, Lu Ma, Chao Li, Weiling Chang, Yuanjie Wang, Jianming Cui, Yingying Ji. 659-664 [doi]
- Improving the Response Time of SDN Controllers Based on Vertical HandoverModhawi Alotaibi, Dandan Liu, Amiya Nayak. 665-670 [doi]
- A Collision-free MAC protocol based on quorum system for underwater acoustic sensor networksGuangjie Han, Xingjie Wang, Ning Sun 0003, Li Liu 0022. 671-676 [doi]
- A Privacy-preserving and Collusion-resisting Top-k Query Processing in WSNsJianguo Zhou, Hua Dai 0003, Jie Zhu, Rongqi Qi, Geng Yang, Jian Xu. 677-682 [doi]
- AcousticThermo: Temperature Monitoring Using Acoustic Pulse SignalFusang Zhang, Kai Niu 0003, Xiaolai Fu, Beihong Jin. 683-687 [doi]
- Gesture Recognition System Based on Neural Networks by Using COTS RFID Tag ArrayJiaying Wu, Chuyu Wang, Lei Xie 0004. 688-693 [doi]
- Real-time and Accurate RFID Tag Localization based on Multiple Feature FusionShupo Fu, Shigeng Zhang, Danming Jiang, Xuan Liu. 694-699 [doi]
- Coding based Distributed Data Shuffling for Low Communication Cost in Data Center NetworksJunpeng Liang, Lei Yang, Zhenyu Wang, Xuxun Liu 0001, Weigang Wu. 700-705 [doi]
- Improving Analysis of Automatic Distribution Changes for Power GridMeile Shi, Zhen Wang, Pengfei Yu, Qi Du. 706-710 [doi]
- Privacy-Preserving Techniques for Protecting Large-Scale Data of Cyber-Physical SystemsMarwa Keshk, Nour Moustafa, Elena Sitnikova, Benjamin Turnbull, Dinusha Vatsalan. 711-717 [doi]
- Research on load forecasting model on power sensor netKai Huang, Jing Zhang, Jiakun An, Jinglin Han, Yunjie Lei. 718-722 [doi]
- Research on visualization planning method of distribution network based on graphical model integrationHuang He, Zhou Xian, Guo Liang, Chang Hao, Ma Ning. 723-728 [doi]
- Researches on Intelligent Traffic Signal Control Based on Deep Reinforcement LearningJuan Luo, Xinyu Li, Yanliu Zheng. 729-734 [doi]
- WSAD: An Unsupervised Web Session Anomaly Detection MethodYizhen Sun, Yiman Xie, Weiping Wang 0003, Shigeng Zhang, Jun Gao, Yating Chen. 735-739 [doi]
- A Method to Construct Vulnerability Knowledge Graph based on Heterogeneous DataYizhen Sun, Dandan Lin, Hong Song, Minjia Yan, Linjing Cao. 740-745 [doi]
- ECDT: Exploiting Correlation Diversity for Knowledge Transfer in Partial Domain AdaptationShichang He, Xuan Liu, Xinning Chen, Ying Huang. 746-751 [doi]
- Study on Location and Sizing Programming of Regional SubstationXiaolin Tan, Shiyao Hu, Chunguang He, Pengfei Sun, Jing Zhang, Ying Ma. 752-755 [doi]
- A Game-Theoretical Approach for Task Offloading in Edge ComputingJuan Luo, Qian Qian, Luxiu Yin, Ying Qiao. 756-761 [doi]
- A Low Cost Edge Computing and LoRaWAN Real Time Video Analytics for Road Traffic MonitoringSalahadin Seid, Marco Zennaro, Mulugeta Libsie, Ermanno Pietrosemoli, Pietro Manzoni. 762-767 [doi]
- A Novel Service Composition Approach for Offloading in Mobile Edge ComputingDandan Liu, Nitesh Krishna, Amiya Nayak. 768-773 [doi]
- Accurate IoT Device Identification from Merely Packet LengthYizhen Sun, Shupo Fu, Shigeng Zhang, Hongyu Zhu, Yongfa Li. 774-778 [doi]
- An Optimal Wireless Transmission Strategy based on Coherent Beamforming and Successive Interference Cancellation for Edge ComputingZhehao Li, Lei Shi 0011, Yi Shi, Yuqi Fan, Zhenchun Wei, Liaoyuan Wu. 779-784 [doi]
- Dependency-Aware Dynamic Task Scheduling in Mobile-Edge ComputingMingzhi Wang, Tao Ma, Tao Wu, Chao Chang, Fang Yang, Huaixi Wang. 785-790 [doi]
- Game Theory based Joint Task Offloading and Resource Allocation Algorithm for Mobile Edge ComputingNing Li, Jianen Yan, Zhaoxin Zhang, José-Fernán Martínez, Xin Yuan 0003. 791-796 [doi]
- Load Balancing Mechanisms of Unmanned Surface Vehicle Cluster Based on Marine Vehicular Fog ComputingKuntao Cui, Wenli Sun, Bin Lin, Wenqiang Sun. 797-802 [doi]
- Virtual Machine Security Migration Strategy Based on the Edge Computing EnvironmentRuizhong Du, Wangkai He, Junfeng Tian. 803-808 [doi]