Abstract is missing.
- Message from the General Chairs: MSN 2022Michel Raynal, Jie Wu. [doi]
- Message from the Technical Program Chairs: MSN 2022Giuseppe Anastasi, Weigang Wu. [doi]
- The First International Workshop on Cryptographic Security and Information Hiding Technology for IoT System (CSIHTIS 2022): PrefaceXiaoliang Wang 0002, Frank Jiang 0001, Robin Doss. 1 [doi]
- Human Occlusion in Ultra-wideband Ranging: What Can the Radio Do for You?Vu Anh Minh Le, Matteo Trobinger, Davide Vecchia, Gian Pietro Picco. 1-10 [doi]
- 2OT 2022): PrefaceXuan Liu, Honglong Chen. 1 [doi]
- rd International Workshop on Ubiquitous Electric Internet of Things (UEIoT 2022): PrefaceYing Ma, FuYong Zhang, Shi Dong. 1 [doi]
- The 4th International Workshop on Network Meets Intelligent Computations (NMIC 2022): PrefaceLei Yang, Wei Cai 0002. 1-2 [doi]
- th International Workshop on Edge Computing and Artificial Intelligence based Sensor-Cloud System (ECAISS 2022): PrefaceChi Lin, Haipeng Dai, Pengfei Wang. 1 [doi]
- Deep Reinforcement Learning Based Radio Resource Selection Approach for C- V2X Mode 4 in Cooperative Perception ScenarioChenhua Wei, Xiaojun Tan, Hui Zhang. 11-19 [doi]
- A Quality-Aware Rendezvous Framework for Cognitive Radio NetworksHai Liu 0001, Lu Yu 0007, Chung Keung Poon, Zhiyong Lin, Yiu-Wing Leung, Xiaowen Chu 0001. 20-27 [doi]
- Rendezvous Delay-Aware Multi-Hop Routing Protocol for Cognitive Radio NetworksZengqi Zhang, Sheng Sun, Min Liu 0001, Zhongcheng Li, Qiuping Zhang. 28-35 [doi]
- Sample-based Prophet for Online Ride-sharing with FairnessBaoju Li, En Wang, Funing Yang, Yongjian Yang, Wenbin Liu, Zijie Tian, Junyu Liu, Wanbo Zheng. 36-43 [doi]
- Traffic Light Routing Based on Node State Awareness in Delay Tolerant NetworksTong Wang, Jianqun Cui, Yanan Chang, Feng Huang, Yi Yang. 44-52 [doi]
- Optimized Sustainable Strategy in Aerial Terrestrial IoT NetworkTiantian Wang, Lei Liu 0003, Tong Ding. 53-58 [doi]
- Crowdsourcing Mobile Data for A Passive Indoor Positioning System - The MAA Case StudyRan Guan, Robert Harle. 59-67 [doi]
- Crowdsourced Image Driven PM2.5 Estimation based on Hybrid 3-Channel Feature MapJiaxuan Wang, Muyan Yao, Ruipeng Gao, Dan Tao. 68-75 [doi]
- An Energy-equilibrium Opportunity network routing algorithm based on Game theory and Historical similarity rateGang Xu, Ming Song, Hongzhi Fu, Baoqi Huang, Fengqi Wei, Qinfu Si. 76-83 [doi]
- Opportunistic Network Routing Strategy Based on Relay Node CollaborationGang Xu, Xiaoying Yang, Ruijie Hang, Baoqi Huang, Fengqi Wei, Qinfu Si. 84-91 [doi]
- Characterizing Energy Sources in Outdoor Wireless Sensor NetworksRobert Hartung, Jan Käberich, Christian Bunzeck, Lars C. Wolf. 92-96 [doi]
- Proactive Handover Mechanism for Blockage Avoidance in Indoor VLC NetworksAnna Maria Vegni, Panagiotis D. Diamantoulakis. 97-104 [doi]
- Task Offloading for Post-disaster Rescue in Vehicular Fog Computing-assisted UAV NetworksGeng Sun 0001, Long He, Zemin Sun, Jiayun Zhang, Jiahui Li 0002. 105-112 [doi]
- Anomaly Detection for Reoccurring Concept Drift in Smart EnvironmentsVincenzo Agate, Salvatore Drago, Pierluca Ferraro, Giuseppe Lo Re. 113-120 [doi]
- A Novel Data Aggregation Scheme for Wireless Sensor Networks Based on Robust Chinese Remainder TheoremJinxin Zhang, Fuyou Miao. 121-125 [doi]
- User-Perceived QoE Adaptation for Accelerated Playback in Mobile Video StreamingXiongfeng Hu, Yibo Jin 0001, Kefeng Wu, Zhuzhong Qian, Sanglu Lu. 126-133 [doi]
- K-Means Based Grouping of Stations with Dynamic AID Assignment in IEEE 802.11ah NetworksEduardo C. Oliveira, Stephanie M. Soares, Marcelo M. Carvalho. 134-141 [doi]
- RLRBM: A Reinforcement Learning-based RAN Buffer Management SchemeHuihui Ma, Du Xu. 142-149 [doi]
- MilliFit: Millimeter-Wave Wireless Sensing Based At-Home Exercise ClassificationEdward M. Sitar, Sanjib Sur. 150-154 [doi]
- Fine-grained Cloud Edge Collaborative Dynamic Task Scheduling Based on DNN Layer-PartitioningXilong Wang, Xin Li, Ning Wang, Xiaolin Qin. 155-162 [doi]
- Edge-assisted Federated Learning in Vehicular NetworksG. La Bruna, Carlos Mateo Risma Carletti, Riccardo Rusca, Claudio Casetti, Carla-Fabiana Chiasserini, Marina Giordanino, Roberto Tola. 163-170 [doi]
- CFedPer: Clustered Federated Learning with Two-Stages Optimization for PersonalizationZhipeng Gao, Yan Yang, Chen Zhao, Zijia Mo. 171-177 [doi]
- Shielding Federated Learning: Mitigating Byzantine Attacks with Less ConstraintsMinghui Li, Wei Wan, Jianrong Lu, Shengshan Hu, Junyu Shi, Leo Yu Zhang, Man Zhou, Yifeng Zheng. 178-185 [doi]
- Incremental Unsupervised Adversarial Domain Adaptation for Federated Learning in IoT NetworksYan Huang, Mengxuan Du, Haifeng Zheng, Xinxin Feng. 186-190 [doi]
- Joint Task Partition and Computation Offloading for Latency-Sensitive Services in Mobile Edge NetworksYujie Peng, Xiaoqin Song, Fang Liu, Guoliang Xing, Tiecheng Song. 191-196 [doi]
- Enabling Heterogeneous Domain Adaptation in Multi-inhabitants Smart Home Activity LearningMd Mahmudur Rahman 0005, Mahta Mousavi, Peri Tari, Mohammad Arif UI Alam. 197-204 [doi]
- Priority-Aware Task Offloading and Resource Allocation in Vehicular Edge Computing NetworksYe Wang, Yanheng Liu, Zemin Sun, Lingling Liu, Jiahui Li 0002, Geng Sun 0001. 205-212 [doi]
- Task Offloading in Fog: A Matching-driven Multi-User Multi-Armed Bandit ApproachQing Zhang, Mingjun Xiao, Yin Xu. 213-217 [doi]
- MACC: MEC-Assisted Collaborative Caching for Adaptive Bitrate Videos in Dense Cell NetworksHaojia He, Songtao Guo, Lu Yang, Ying Wang. 218-222 [doi]
- Leakage Detection via Edge Processing in LoRaWAN-based Smart Water Distribution NetworksDomenico Garlisi, Gabriele Restuccia, Ilenia Tinnirello, Francesca Cuomo, Ioannis Chatzigiannakis. 223-230 [doi]
- EdgeMan: Ensuring Real-Time Service for Containerized Edge SystemsWenzhao Zhang, Wei Dong 0001, Geng Ren, Yi Gao 0001. 231-238 [doi]
- LoRaDrone: Enabling Low-Power LoRa Data Transmission via a Mobile ApproachCiyuan Chen, Junzhou Luo, Zhuqing Xu, RunQun Xiong, Zhimeng Yin 0001, Jingkai Lin, Dian Shen. 239-246 [doi]
- Online Service Provisioning and Updating in QoS-aware Mobile Edge ComputingShuaibing Lu, Jie Wu 0001, Pengfan Lu, Jiamei Shi, Ning Wang 0018, Juan Fang. 247-254 [doi]
- T2C: A Multi-User System for Deploying DNNs in a Thing-to-Cloud ContinuumChia-Ying Hsieh, Praveen Venkateswaran, Nalini Venkatasubramanian, Cheng-Hsin Hsu. 255-262 [doi]
- Dynamic Vehicle Aware Task Offloading Based on Reinforcement Learning in a Vehicular Edge Computing NetworkLingling Wang, Xiumin Zhu, Nianxin Li, Yumei Li 0008, Shuyue Ma, Linbo Zhai. 263-270 [doi]
- VSLink: A Fast and Pervasive Approach to Physical Cyber Space Interaction via Visual SLAMHan Zhou, Jiaming Huang, Hongchang Fan, Geng Ren, Yi Gao 0001, Wei Dong 0001. 271-278 [doi]
- BACO: A Bi-Ant-Colony-Based Strategy for UAV Trajectory Planning with Obstacle AvoidanceZhiyang Liu, Ximin Yang, Wan Tang, Xiao Zhang, Zhen Yang. 279-286 [doi]
- Approximate Shortest Distance Queries with Advanced Graph Analytics over Large-scale Encrypted GraphsYuchuan Luo, Dongsheng Wang, Shaojing Fu, Ming Xu 0002, Yingwen Chen, Kai Huang. 287-294 [doi]
- Tangless: Optimizing Cost and Transaction Rate in IOTA by Using Lyapunov Optimization TheoryYinfeng Chen, Yu Guo, Rongfang Bie. 295-303 [doi]
- Cloud-assisted Road Condition Monitoring with Privacy Protection in VANETsLemei Da, Yujue Wang, Yong Ding 0005, Bo Qin, Xiaochun Zhou, Hai Liang, Huiyong Wang. 304-311 [doi]
- Towards Event-driven Misbehavior Detection Mechanism in Social Internet of VehiclesChenchen Lv, Yue Cao 0002, Lexi Xu, Shitao Zou, Yongdong Zhu, Zhili Sun. 312-319 [doi]
- RDP-WGAN: Image Data Privacy Protection Based on Rényi Differential PrivacyXuebin Ma, Ren Yang, Maobo Zheng. 320-324 [doi]
- Accelerating Adversarial Attack using Process-in-Memory ArchitectureShiyi Liu, Sathwika Bavikadi, Tanmoy Sen, Haiying Shen, Purab Ranjan Sutradhar, Amlan Ganguly, Sai Manoj Pudukotai Dinakarrao, Brian L. Smith. 325-330 [doi]
- PhysioGait: Context-Aware Physiological Context Modeling for Person Re-identification Attack on Wearable SensingJames O. Sullivan, Mohammad Arif Ul Alam. 331-338 [doi]
- Secure Deduplication Against Frequency Analysis AttacksHang Chen, Guanxiong Ha, Yuchen Chen, Haoyu Ma, Chunfu Jia. 339-346 [doi]
- Breaking Distributed Backdoor Defenses for Federated Learning in Non-IID SettingsJiJia Yang, Jiangang Shu, Xiaohua Jia. 347-354 [doi]
- Blockchain-based Secure Outsourcing Data Integrity Auditing for Internet of Things in Cloud-edge EnvironmentYangfei Lin, Celimuge Wu, Yusheng Ji, Jie Li 0002, Zhi Liu 0002. 355-362 [doi]
- Trusted-Committee- Based Secure and Scalable BFT Consensus for Consortium BlockchainLiaoliao Feng, Yan Ding, Yusong Tan, Xiang Fu, Keming Wang, Junsheng Chang. 363-370 [doi]
- An Efficient and Secure Node-sampling Consensus Mechanism for Blockchain SystemsZhelin Liang, Hao Xu, Xiulong Liu, Shan Jiang, Keqiu Li. 371-378 [doi]
- An atomic member addition mechanism for permissioned blockchain based on autonomous rollbackQihui Zhou, Xianglin Dang, Yazhe Wang, Zhen Xu, Penghui Lv. 379-385 [doi]
- CDTP: A Copyright-preserving Decentralized Data Trading Platform Based on BlockchainHeng Tian, Mingjun Xiao. 386-390 [doi]
- *Hongce Zhao, Shunliang Zhang, Xianjin Huang, Zhuang Qiao, Xiaohui Zhang, Guanglei Wu. 391-397 [doi]
- Web Attack Payload Identification and Interpretability Analysis Based on Graph Convolutional NetworkYijia Xu, Yong Fang 0002, Zhonglin Liu. 398-407 [doi]
- A Mitmproxy-based Dynamic Vulnerability Detection System For Android ApplicationsXinghang Lv, Tao Peng 0006, Junwei Tang, Ruhan He, Xinrong Hu, Minghua Jiang, Zaihui Deng, Wenli Cao. 408-416 [doi]
- Detection of DoH Tunnels with Dual-Tier ClassifierYuqi Qiu, Baiyang Li, Liang Jiao, Yujia Zhu, Qingyun Liu. 417-421 [doi]
- QP-LDP for better global model performance in federated learningQian Chen, Zheng Chai, Zilong Wang 0001, Jiawei Chen 0001, Haonan Yan, Xiaodong Lin 0001. 422-426 [doi]
- Truthful Auction Mechanism for Data Trading with Share-Averse Data ConsumersZhenni Feng, Qiyuan Wang, Yanmin Zhu. 427-434 [doi]
- Efficient Semantic Segmentation Backbone Evaluation for Unmanned Surface Vehicles based on Likelihood Distribution EstimationYulong Zhang, Jingtao Sun, Mingkang Chen, Qiang Wang. 435-442 [doi]
- Scene Classification Through Knowledge Distillation Enabled Parameter-Free Attention Model for Remote Sensing ImagesYuBing Han, Zongyin Liu, Jiguo Yu, Anming Dong, HuiHui Zhang. 443-450 [doi]
- Adapitch: Adaption Multi-Speaker Text-to-Speech Conditioned on Pitch Disentangling with Untranscribed DataXulong Zhang 0001, Jianzong Wang, Ning Cheng, Jing Xiao 0006. 456-460 [doi]
- MSJAD: Multi-Source Joint Anomaly Detection of Web Application AccessXinxin Chen, Jing Wang, Xingyu Wang, Chengsen Wang, Guosong Lv, Jiankun Li, Dewei Chen, Bo Wu, Lianyuan Li, Wei Yu. 461-468 [doi]
- ResNect: An Accurate and Efficient Backbone Network for Text Detection ModelBowei Zhang, Weifeng Sun, Minghui Ji, Kelong Meng. 469-476 [doi]
- Multi-timescale History Modeling for Temporal Knowledge Graph CompletionChen Chen Peng, Xiaochuan Shi, Rongwei Yu, Chao Ma 0008, Libing Wu, Dian Zhang. 477-484 [doi]
- Improving Speech Representation Learning via Speech-level and Phoneme-level Masking ApproachXulong Zhang 0001, Jianzong Wang, Ning Cheng, Kexin Zhu, Jing Xiao 0006. 485-489 [doi]
- Attention Based End-to-End Network for Short Video ClassificationHui Zhu, Chao Zou, Zhenyu Wang, Kai Xu, Zihao Huang. 490-494 [doi]
- Anomaly Detection Through Unsupervised Federated LearningMirko Nardi, Lorenzo Valerio, Andrea Passarella. 495-501 [doi]
- PPFM: An Adaptive and Hierarchical Peer-to-Peer Federated Meta-Learning FrameworkZhengxin Yu, Yang Lu, Plamen Angelov 0001, Neeraj Suri. 502-509 [doi]
- DPFed: Toward Fair Personalized Federated Learning with Fast ConvergenceJiang Wu, Xuezheng Liu, Jiahao Liu, Miao Hu, Di Wu 0001. 510-517 [doi]
- Dynamic Unknown Worker Recruitment for Heterogeneous Contextual Labeling Tasks Using Adversarial Multi-Armed BanditWucheng Xiao, Mingjun Xiao, Yin Xu. 518-525 [doi]
- An Opponent-Aware Reinforcement Learning Method for Team-to-Team Multi-Vehicle Pursuit via Maximizing Mutual Information IndicatorQinwen Wang, Xinhang Li, Zheng Yuan, Yiying Yang, Chen Xu, Lin Zhang. 526-533 [doi]
- Graded-Q Reinforcement Learning with Information-Enhanced State Encoder for Hierarchical Collaborative Multi-Vehicle PursuitYiying Yang, Xinhang Li, Zheng Yuan, Qinwen Wang, Chen Xu, Lin Zhang. 534-541 [doi]
- Learning-based Dwell Time Prediction for Vehicular Micro CloudsMax Schettler, Gurjashan Singh Pannu, Seyhan Ucar, Takamasa Higuchi, Onur Altintas, Falko Dressler. 542-549 [doi]
- A Motion Propagation Prediction based Sim2Real Strategy Migration for Clutter RemovalJiaxin Zhang, Ping Zhang. 550-554 [doi]
- Speeding Up IPv4 Connections via IPv6 InfrastructureRuiyu Fang, Guoliang Han, Xin Wang 0002, CongXiao Bao, Xing Li 0001, Yang Chen 0001. 555-562 [doi]
- Lattice-Based Fine-grained Data Access Control and Sharing Scheme in Fog and Cloud Computing Environments for the 6G SystemsBei Pei, Xianbin Zhou, Rui Jiang. 563-570 [doi]
- Towards adaptive quality-aware Complex Event Processing in the Internet of ThingsMajid Lotfian Delouee, Boris Koldehofe, Viktoriya Degeler. 571-575 [doi]
- DDF-GAN: A Generative Adversarial Network with Dual-Discriminator for Multi-Focus Image FusionShiyu Chen, Xin Jin 0005, Qian Jiang, Jie Yang, Ting Cao, Xiuliang Xi, Yunyun Dong. 576-580 [doi]
- Personalized News Headline Generation System with Fine-grained User ModelingJiaohong Yao. 581-585 [doi]
- DiNS: Nature Disaster in Network SimulationsNisal Hemadasa, Wanli Yu, Yanqiu Huang, Leonardo Sarmiento, Amila Wickramasinghe, Alberto García Ortiz. 586-593 [doi]
- UAV Swarm Trajectory and Cooperative Beamforming Design in Double-IRS Assisted Wireless CommunicationsYangzhe Liao, Shuang Xia, Ke Zhang, Xiaojun Zhai. 594-600 [doi]
- Towards Energy-efficient Container Data Center: An Online Migratability-aware OrchestratorShengjie Wei, Jiayi Li, Tuo Cao, Sheng Zhang 0001, Zhuzhong Qian. 601-608 [doi]
- InstaVarjoLive: An Edge-Assisted 360 Degree Video Live Streaming for Virtual Reality TestbedPengyu Li, Feifei Chen, Rui Wang, Thuong Hoang, Lei Pan. 609-613 [doi]
- Mobile6TiSCH: a Simulator for 6TiSCH-based Industrial IoT Networks with Mobile NodesMarco Pettorali, Francesca Righetti, Carlo Vallati. 614-618 [doi]
- Surface Recognition from Wheelchair-induced Noisy Vibration Data: A Tale of Many CitiesRochishnu Banerjee, Md Fourkanul Islam, Shaswati Saha, Vaskar Raychoudhury, Md. Osman Gani. 619-626 [doi]
- Face Recognition Based Beauty Algorithm in Smart City ApplicationsMing Tao, Kaiyan Lin. 627-632 [doi]
- Traffic Event Augmentation via Vehicular Edge Computing: A Vehicle ReID based SolutionHao Jiang, Penglin Dai, Kai Liu 0001, Feiyu Jin, HuaLing Ren, Songtao Guo. 633-640 [doi]
- Real-time Simulation and Testing of a Neural Network-based Autonomous Vehicle Trajectory Prediction ModelCheng Wei, Fei Hui, Xiangmo Zhao, Shan Fang. 641-648 [doi]
- Transfer Learning based City Similarity Measurement MethodsChenxin Qu, Xiaoping Che, Ganghua Zhang. 649-653 [doi]
- Alz-Sense+: An Auto Time-synchronized Multi-class Algorithm for Dementia DetectionS. M. Shovan, Sajal K. Das 0001. 654-662 [doi]
- Accurately Identify and Localize Commodity Devices from Encrypted Smart Home TrafficXing Guo, Jie Quan, Jiahui Hou, Hao Zhou 0001, Xin He, Tao He. 663-670 [doi]
- Towards Socially Acceptable Food Type RecognitionJunjie Wang, Jiexiong Guan, Y. Alicia Hong, Hong Xue, Shuangquan Wang, Zhenming Liu, Bin Ren, Gang Zhou. 671-678 [doi]
- Multiuser Collaborative Localization based on Inter-user Distance Estimation using Wi-Fi RSS FingerprintsTinghao Qi, Chanxin Zhou, Guang Ouyang, Bang Wang. 679-686 [doi]
- Analytic Correlation Penalty with Variable Window in Multi-task Learning Disease Progression ModelXiangchao Chang, Menghui Zhou, Fengtao Nan, Yun Yang 0003, Po Yang 0001. 687-691 [doi]
- IMRG: Impedance Matching Oriented Receiver Grouping for MIMO WPT SystemLulu Tang, Hao Zhou 0001, Weiming Guo, Wangqiu Zhou, Xing Guo, Xiaoyan Wang. 692-699 [doi]
- Compact Unknown Tag Identification for Large-Scale RFID SystemsKai Lin, Honglong Chen, Na Yan, Zhichen Ni, Zhe Li. 700-707 [doi]
- Analytic Hierarchy Process Based Compatibility Measurement for RFID ProtocolsWeiping Zhu 0004, Changyu Huang, Chao Ma 0008. 708-712 [doi]
- Trajectory Optimization Model of Connected and Autonomous Vehicle at Unsignalized IntersectionsYu Kong, Chen Mu, Xinvu Chen. 713-717 [doi]
- Node Selection Strategy Design Based on Reputation Mechanism for Hierarchical Federated LearningXin Shen, Zhuo Li 0003, Xin Chen 0018. 718-722 [doi]
- AttachSFC: Optimizing SFC Initialization Process through Request PropertiesKaiwen Ning, Hao Wang, Zhiheng Zhang, Zhou Xu, Xiaowei Shu. 723-727 [doi]
- Throughput Prediction-Enhanced RL for Low-Delay Video ApplicationYong Liu, Chaokun Zhang, Jingshun Du, Tie Qiu 0001. 728-735 [doi]
- Towards Reliable AI Applications via Algorithm-Based Fault Tolerance on NVDLAMustafa Tarik Sanic, Cong Guo 0003, Jingwen Leng, Minyi Guo, Weiyin Ma. 736-743 [doi]
- Adaptive Progressive Image Enhancement for Edge-Assisted Mobile VisionDaipeng Feng, Liekang Zeng, Lingjun Pu, Xu Chen 0004. 744-751 [doi]
- PeTrack: Smartphone-based Pedestrian Tracking in Underground Parking LotXiaotong Ren, Shuli Zhu, Chuize Meng, Shan Jiang, Xuan Xiao, Dan Tao, Ruipeng Gao. 752-756 [doi]
- Joint Convolutional and Self-Attention Network for Occluded Person Re-IdentificationChuxia Yang, Wanshu Fan, Dongsheng Zhou, Qiang Zhang 0008. 757-764 [doi]
- A DMA-based Swap Mechanism of Hybrid Memory SystemWeijie Zhang, Lidang Xu, Dingding Li, Haoyu Luo. 765-772 [doi]
- CUE: Compound Uniform Encoding for Writer RetrievalJiakai Luo, Hongwei Lu, Xin Nie, Shenghao Liu, Xianjun Deng, Chenlu Zhu. 773-780 [doi]
- A Temperature Prediction-Assisted Approach for Evaluating Propagation Delay and Channel Loss of Underwater Acoustic NetworksRui Gao, Jun Iiu, Shanshan Song, En Wang, Yu Gou, Tong Zhang, Jun-Hong Cui. 781-785 [doi]
- A Hybrid Link Connectivity Model for Opportunistic Routing in IoV Networks under Viaduct ScenariosXing Tang 0001, Yongbiao Tao, Wei Liu, Bing Shi, Jing Wang. 786-790 [doi]
- Semantic Image Synthesis via Location Aware Generative Adversarial NetworkJiawei Xu, Rui Liu 0015, Jing Dong, Pengfei Yi, Wanshu Fan, Dongsheng Zhou. 791-796 [doi]
- Low-Complexity Code Clone Detection using Graph-based Neural NetworksHu Liu, Hui Zhao, Changhao Han, Lu Hou. 797-802 [doi]
- Publishing Weighted Graph with Node Differential PrivacyXuebin Ma, Ganghong Liu, Aixin Lin. 803-808 [doi]
- SSA and BPNN Based Efficient Situation Prediction Model for Cyber SecurityMinglong Cheng, Guoqing Jia, Weidong Fang, Zhiwei Gao, Wuxiong Zhang. 809-813 [doi]
- IA-DD: An SDN Topological Poisoning Attack Defense Scheme Based on BlockchainBin Gu, Xingwei Wang, Kaiqi Yang, Yu Wang, Qiang He. 814-820 [doi]
- Low-power Robustness Learning Framework for Adversarial Attack on EdgesBingbing Song, Haiyang Chen, Jiashun Suo, Wei Zhou. 821-828 [doi]
- Image Classification of Alzheimer's Disease based on Residual Bilinear and Attentive ModelsXue Lin, Yushui Geng, Jing Zhao, Wenfeng Jiang, Zhen Yan. 829-834 [doi]
- Analysing and Evaluating Complementarity of Multi-Modal Data Fusion in AD DiagnosisZhaodong Chen, Fengtao Nan, Yun Yang 0003, Jiayu Wang, Po Yang 0001. 835-840 [doi]
- MetaSpeech: Speech Effects Switch Along with Environment for MetaverseXulong Zhang 0001, Jianzong Wang, Ning Cheng, Jing Xiao 0006. 841-846 [doi]
- Potential Game Based Connectivity Preservation for UAV-Assisted Public Safety RescueJingjing Wang, Yanjing Sun, Bowen Wang, Toshimitsu Ushio. 847-852 [doi]
- Three-dimensional Key Distribution Scheme in Wireless Sensor NetworksWanqing Wu, Ziyang Zhang, Yahua Dong, Caixia Ma. 853-858 [doi]
- Application Identification under Multi-Service Integration PlatformZiyang Wu, Yi Xie. 859-864 [doi]
- UAV Visual Navigation System based on Digital TwinJingsi Miao, Ping Zhang. 865-870 [doi]
- Applications of Reinforcement Learning in Virtual Network Function Placement: A SurveyCong Zhou, BaoKang Zhao, Jing Tao, Baosheng Wang. 871-876 [doi]
- An Adaptive Data Rate-Based Task Offloading Scheme in Vehicular NetworksChaofan Chen, Wendi Nie, Yaoxin Duan, Victor C. S. Lee, Kai Liu 0001, Huamin Li. 877-884 [doi]
- HCA Operator: A Hybrid Cloud Auto-scaling Tooling for Microservice WorkloadsYuyang Wang, Fan Zhang, Samee U. Khan. 885-890 [doi]
- Multi-UAV Joint Observation, Communication, and Policy in MECShuai Liu, Yuebin Bai. 891-896 [doi]
- Federated Learning for Heterogeneous Mobile Edge Device: A Client Selection GameTongfei Liu, Hui Wang, Maode Ma. 897-902 [doi]
- Learning-based Computation Offloading in LEO Satellite NetworksJuan Luo, Quanwei Fu, Fan Li, Ying Qiao, Ruoyu Xiao. 903-908 [doi]
- The Short-Term Passenger Flow Prediction Method of Urban Rail Transit Based on CNN-LSTM with Attention MechanismYang Liu, Chen Mu, Pingping Zhou. 909-914 [doi]
- Linguistic-Enhanced Transformer with CTC Embedding for Speech RecognitionXulong Zhang 0001, Jianzong Wang, Ning Cheng, Mengyuan Zhao, Zhiyong Zhang, Jing Xiao 0006. 915-920 [doi]
- Viewing Flowers at their Most Beautiful Moments: A Crowd Sensing ApplicationWeifeng Xiong, Fangwan Huang, Zhiyong Yu 0001, Xianwei Guo, Binwei Lin, Qiquan Cai. 921-926 [doi]
- A Mitmproxy-based Dynamic Vulnerability Detection System For Android ApplicationsXinghang Lv, Tao Peng 0006, Junwei Tang, Ruhan He, Xinrong Hu, Minghua Jiang, Zaihui Deng, Wenli Cao. 927-935 [doi]
- Anti-jamming Channel Allocation in DAV-Enabled Edge Computing: A Stackelberg Game ApproachXinwang Yuan, Zhidong Xie, Xin Tan. 936-941 [doi]
- Interval Matching Algorithm for Task Scheduling with Time Varying Resource ConstraintsWeiguan Li, Jialun Li, Yujie Long, Weigang Wu. 942-947 [doi]
- Privacy protection scheme based on certificateless in VSN s environmentYanfei Lu, Suzhen Cao, Yi Guo, Qizhi He, Zixuan Fang, Junjian Yan. 948-953 [doi]
- Measurement and Analysis: Does QUIC Outperform TCP?Xiang Qin, Xiaochou Chen, Wenju Huang, Yi Xie, Yixi Zhang. 954-959 [doi]
- Binary Neural Network with P4 on Programmable Data PlaneJunming Luo, Waixi Liu, Miaoquan Tan, Haosen Chen. 960-965 [doi]
- Semi-Supervised Learning Based on Reference Model for Low-resource TTSXulong Zhang 0001, Jianzong Wang, Ning Cheng, Jing Xiao 0006. 966-971 [doi]
- RTSS: Robust Tuple Space Search for Packet ClassificationJiayao Wang, Ziling Wei, Baosheng Wang, Shuhui Chen, Jincheng Zhong. 972-977 [doi]
- A Novel Reliability Evaluation Method Based on Improved Importance Algorithm for SCADAZhaoqian Zhu, Yenan Chen, Bo Su, Linsen Li. 978-983 [doi]
- Evolutionary Discrete Optimization Inspired by Zero-Sum Game TheoryRuiran Yu, Haoliang Wen, Yuhan Xu. 984-989 [doi]
- Research on data collection and energy supplement mechanism in WRSN based on UAV: a method to maximize energy supplement efficiencyWen Xie, Xiangyu Bai, Yaru Ren. 990-995 [doi]
- Intelligent rush repair of unmanned distribution network based on deep reinforcement learningYue Zhao, Yang Chuan, Shi Pu, Xuwen Han, Shiyu Xia, Yanqi Xie. 996-1000 [doi]
- Energy Minimization for IRS-assisted UAV-empowered Wireless CommunicationsYangzhe Liao, Jiaying Liu, Yi Han, Quan Yu, Qingsong Ai, Quan Liu, Xiaojun Zhai. 1001-1006 [doi]
- Trajectory Planning Model for Vehicle Platoons at Off-rampXinyu Chen, Chen Mu, Yu Kong. 1007-1012 [doi]
- Space-Air-Ground-Aqua Integrated Intelligent Network: Vision, and Potential TechniquesJinhui Huang, Junsong Yin, Shuangshuang Wang. 1013-1018 [doi]
- Fast Detection of Multi-Direction Remote Sensing Ship Object Based on Scale Space PyramidZiying Song, Li Wang, Guoxin Zhang, Caiyan Jia, Jiangfeng Bi, Haiyue Wei, Yongchao Xia, Chao Zhang, Lijun Zhao 0003. 1019-1024 [doi]
- Fire Detection Scheme in Tunnels Based on Multi-source Information FusionTianyu Zhang, Yi Liu, Weidong Fang, Gentuan Jia, Yunzhou Qiu. 1025-1030 [doi]
- Improving Imbalanced Text Classification with Dynamic Curriculum LearningXulong Zhang 0001, Jianzong Wang, Ning Cheng, Jing Xiao 0006. 1031-1036 [doi]
- Intelligent optimization and allocation strategy of emergency repair resources based on big dataJiangdong Liu, Yue Zhao, Bo Wang, Jie Gao, Li Xu, Ying Ma. 1037-1042 [doi]