Abstract is missing.
- MMHeart: An Efficient Heartbeat Monitoring System Based on MIMO mmWave RadarLinqing Gui, Ling Deng, Cheng Peng, Hui Cai, Biyun Sheng, Zhengxin Guo, Fu Xiao 0001. 1-8 [doi]
- Effi-MAOT: A Communication-Efficient Multi-Camera Active Object TrackingMaolong Yin, Zhuo Sun 0001, Bin Guo, Zhiwen Yu 0001. 9-16 [doi]
- LiDAR based Cooperative Sensing in Vehicular Edge ComputingLuyao Jiang, Kai Liu 0001, Chunhui Liu, HuaLing Ren, Guozhi Yan, Feiyu Jin, Songtao Guo. 17-23 [doi]
- PAssTrack: Practical and Accurate Passive Human Tracking System Using Commodity Wi-FiBoxiao Zhang, Panlong Yang, Yubo Yan, Xin He, Weiwei Jiang 0001. 24-31 [doi]
- LoCount: Long-distance Crowd Counting Based on LoRa SignalSihan Ma, Xiangmao Chang, Yifan Zhang, Lele Zheng. 32-39 [doi]
- Age-of-Information Driven Mobile Crowdsensing in Wireless Edge ComputingShan Su, Haixing Xu, Liang Wang, Bin Guo 0001, Zhiwen Yu 0001. 40-47 [doi]
- GRAIM: Game and Reverse Auction based Incentive Mechanism in Mobile Crowd SensingGuisong Yang, Jinwei Wu, Jiacai Li, Xingyu He, Yunhuai Liu, Fanglei Sun. 48-55 [doi]
- An Energy-Efficient Smartphone Positioning Scheme by Fusing WiFi, GPS and PDRYankan Yang, Baoqi Huang. 64-71 [doi]
- Impact of Feature Selection and CIR Window Length on NLoS Classification for UWB SystemsElisei Ember, Jesús Pestana, Michael Krisper, Michael Stocker, Kay Römer, Carlo Alberto Boano, Pablo Corbalán Pelegrín. 72-80 [doi]
- Software-Defined Collaborative Scheduling of Computing and Network ResourcesBo Wang, Zihui Luo, Xiaolong Zheng 0002, Liang Liu 0001, Huadong Ma. 81-88 [doi]
- TSFCC: The Two-Stage Fast Congestion Control Algorithm Based on Software Defined NetworkingHongxiang Wang, Yifei Lu, Zhen Wang. 89-96 [doi]
- An Adaptive MAC Protocol for Energy Harvesting Wireless Sensor Networks in Harsh EnvironmentFei Gao, Wuyungerile Li, Nisuna Bao, Bing Jia. 97-104 [doi]
- Dynamic Power Control Method Based on Stacked SRU Network Combined with NoisyNet DQN for CRNLei Wang, Yonghua Wang, Bingfeng Zheng. 105-112 [doi]
- Deep Reinforcement Learning based Channel Allocation for Channel Bonding Wi-Fi NetworksYan Zhong, Hao Chen, Wei Liu, Lizhao You, Taotao Wang, Liqun Fu 0001. 113-119 [doi]
- Handover Probability in 3D Mobile UAV Cellular NetworksSiyuan Zhou, Xiaojing Liu, Bin Tang, Guoping Tan. 120-126 [doi]
- Secure Ultra-reliable and Low Latency Communication in NOMA-UAV NetworksXiao Zhao, Kan Yu, Dong Li, Xiaowu Liu, Chuanwen Luo. 127-134 [doi]
- An Interference Mitigation Strategy for LEO Satellite Systems based on Adaptive Beamforming with Sidelobe SuppressionHuadong Guo, Weiqing Huang, Wen Wang, Jinglong Guo, Zhaohua Qiu. 135-142 [doi]
- Handover Analysis with Spatially Correlated Blockage ModelSiyuan Zhou, Xiaofan Yu, Bin Tang, Zhihao Qu. 143-150 [doi]
- Distributed Cooperative Search Algorithm with Information ScreeningChengliang Wang, Jiayi He. 151-158 [doi]
- Toward Quality-Aware Reverse Auction-based Incentive Mechanism for Federated LearningJialing Ni, Pan Qi, Jianfeng Lu. 159-166 [doi]
- Heterogeneity-Aware Federated Learning with Adaptive Local Epoch Size in Edge ComputingWenying Yao, Tong Liu, Yangguang Cui, Yanmin Zhu. 167-174 [doi]
- Communication Efficient Personalized Federated Learning via Hierarchical Clustering and Layer-wise AggregationMingchang Shuang, Zhe Zhang, Yanchao Zhao. 175-182 [doi]
- The Improved Data Aggregation Scheme for Wireless Sensor Networks Based on Robust Chinese Remainder TheoremJinxin Zhang, Fuyou Miao. 183-190 [doi]
- EKDF: An Ensemble Knowledge Distillation Framework for Robust Collaborative Inference on Heterogeneous Edge DevicesShangrui Wu, Yupeng Li, Yang Xu, Qin Liu, Weijia Jia 0001, Tian Wang 0001. 191-198 [doi]
- A Meta Reinforcement Learning-based Scheme for Adaptive Service Placement in Edge ComputingJianfeng Rao, Tong Liu, Yangguang Cui, Yanmin Zhu. 199-206 [doi]
- Lyapunov-Based Computation Rate Maximization for Wireless Powered Edge ComputingSenlei Bao, Shubin Zhang, Kaikai Chi, Xiaolong Chen, Wei Gao. 207-214 [doi]
- ECADA: An Edge Computing Assisted Delay-Aware Anomaly Detection Scheme for ICSChao Sang, Jianhua Li, Jun Wu, Wu Yang 0001. 215-222 [doi]
- A Method for Person Re-Identification and Trajectory Tracking in Cross-Device Edge EnvironmentsJian An, Yunxiang Zhao, Feifei Wang, Xin He, Xiaolin Gui. 223-229 [doi]
- Joint Task Scheduling and Container Image Caching in Edge ComputingFangyi Mou, Zhiqing Tang, Jiong Lou, Jianxiong Guo, Wenhua Wang, Tian Wang 0001. 230-237 [doi]
- QoS Aware Resource Management in Mobile Edge Computing for Emerging Artificial Intelligence (AI) ApplicationsZimo Ma, Jun Zhao. 238-245 [doi]
- Deep Reinforcement Learning for QoE-Aware Offloading in Space-Terrestrial Integrated NetworksXia Deng, Guole Lin, Le Chang, Fei Tong. 246-253 [doi]
- ROIAdaptor: Adaptive Task Offloading of ROI-Encoded Videos for Edge Video AnalyticsZhenxuan Xu, Xiaolin Guo, Zhaowu Huang, Shucun Fu, Fang Dong 0001. 254-261 [doi]
- Dynamic Content Cache Strategy Based on Content Prediction in the Internet of VehiclesShujuan Tian, Song Zou, Yi Tan, Dongsu Shen, Yanchun Li. 262-269 [doi]
- DPG-DT: Differentially Private Generative Digital Twin for Imbalanced Learning in Industrial IoTSiyuan Li, Xi Lin 0003, Gaolei Li, Lixing Chen, Siyi Liao, Jing Wang, Jianhua Li. 270-276 [doi]
- Reinforcement Learning Based Friendly Jamming for Digital Twins Against Active EavesdroppingKunze Li, Yuxiao Ren, Zhiping Lin, Liang Xiao 0003. 277-284 [doi]
- ACORN: Adaptive Compression-Reconstruction for Video Services in 5G-U Industrial IoTJiale Lei, Peihao Yang, Linghe Kong, Yehan Ma, Xingjian Lu, Deyu Lin, Guihai Chen, E. Zhao. 285-292 [doi]
- Accurate Deep Learning Inference Latency Prediction over Dynamic Running Mobile DevicesJunquan Fan, Jiahui Hou, Xiangyang Li 0001. 293-300 [doi]
- Mobile User Pairing Scheme in NOMA-Enabled Backscatter Communication NetworksTingpei Huang, Shiyu Guo, Hu Zhu, Jianhang Liu, Shibao Li. 301-308 [doi]
- Adaptive Robust Watermarking for Color ImagesBingling Luo, Hongxia Wang 0001, Fei Zhang, Jinghong Xia, Heng Wang. 309-316 [doi]
- Living in the Past: Analyzing BLE IoT Devices Based on Mobile Companion Apps in Old VersionsJianqi Du, Zidong Zhang, Fenghao Xu, Wenrui Diao. 317-324 [doi]
- MASA: Measurement and Analysis of MAC Address Randomization with Sniffer ArrayYu Yu, Yulian Pan, Wenjia Wu, Ming Yang. 325-332 [doi]
- Web Fingerprint Defense with Timing-assistant Traffic Burst ShapingBo Chen, Chen Yang, Can Wang, Xuangou Wu. 333-340 [doi]
- Crossfire Attack Defense Method Based on Virtual TopologyLei Guo 0021, Shan Jing, Liang Wei, Chuan Zhao. 341-350 [doi]
- ShuffleCAN: Enabling Moving Target Defense for Attack Mitigation on Automotive CANHuiping Qian, Hao Han, Xiaojun Zhu 0001, Fengyuan Xu. 351-358 [doi]
- A Lightweight Zone Authentication Scheme with Auto-Refreshing Pseudonyms for C-V2XXijie Ba, Jiaqi Yang, Cong Ma. 359-366 [doi]
- An Improved Capsule Network for DGA Domain DetectionHongyu Yang, Tao Zhang, Ze Hu, Liang Zhang 0018, Xiang Cheng. 367-373 [doi]
- A Novel Permission Filtering Approach for Android Malware Detection and Malware Family ClassificationJiyun Yang, Can Gui, Zhibo Zhang, Wanli Liu. 374-381 [doi]
- CNN-PSO-KELM: A Deep Learning Intrusion Detection Model for Imbalanced IoT DataFei Lv, Rongkang Sun, Hangyu Wang, Meng Zhang, Shuaizong Si, Zhe Bu, Chengsheng Zhou, Limin Sun 0001. 382-389 [doi]
- Robust Intrusion Detection for Industrial IoTHuaishuo Ren, Liangyi Gong, Xiuliang Mo, Lanqi Yang, Zuwei Yin. 390-397 [doi]
- Communication-Efficient Federated Learning for Network Traffic Anomaly DetectionXiao Cui, Xiaohui Han, Guangqi Liu, Wenbo Zuo, Zhiwen Wang. 398-405 [doi]
- SWDNet: Stealth Web Shell Detection Technology based on Triplet NetworkJinli Zhang, Feng Dai, Yaqin Cao, Ru Tan, Xiang Cui, Qixu Liu. 406-414 [doi]
- Arrow: Capture the Inaudible Attacker in 3D Space via Smart-speakerZhenfei Zhang, Ping Li, Biaokai Zhu, Tao Wu, Panlong Yang, Zhao Lv. 415-422 [doi]
- Optimizing Privacy-Accuracy Trade-off in DP-FL via Significant Gradient PerturbationBenteng Zhang, Yingchi Mao, Zijian Tu, Xiaoming He, Ping Ping, Jie Wu. 423-430 [doi]
- EPT: Enhancing User Transparency for Confidential Smart ContractJuan Du, Zhicheng Xu, Duanyang Liu, Xiaoli Zhang, Hongbing Cheng. 431-438 [doi]
- A Non-Intrusive and Real-Time Data Provenance Method for DDS SystemsSiyi Wei, Jinbin Tu, Yun Wang. 439-446 [doi]
- A Lightweight Privacy-Preserving Data Sharing Scheme Supporting Intelligent Pricing in Smart GridXinyang Li, Yujue Wang, Yong Ding 0005, Yijie Zhou, Changsong Yang, Zhenwei Guo. 447-454 [doi]
- Adaptive and Efficient Participant Selection in Vertical Federated LearningJiahui Huang, Lan Zhang 0002, Anran Li, Haoran Cheng, Jiexin Xu, Hongmei Song. 455-462 [doi]
- Supvirus: A Scenario-Oriented Feature Poisoning Attack Approach in SplitFed LearningYuxin Zhao, Guangyu Wu, Jiahui Hou, Xiang-Yang Li 0001. 463-471 [doi]
- Data Poisoning Attack Based on Privacy Reasoning and Countermeasure in Federated LearningJiguang Lv, Shuchun Xu, Yi Ling, Dapeng Man, Shuai Han, Wu Yang. 472-479 [doi]
- Efficient Side-Channel Attack through Balanced Labels Compression and Variational AutoencoderNengfu Cai, Zhiqin Yang, Shuhai Wang, Yanling Jiang, Mingsheng Liu, Gang Li. 480-487 [doi]
- LDfuzz: A Directed Greybox Fuzzer for Solidity Smart ContractJiangtao Liao, Huidan Hu, Keke Huang, Huasong Jin, Changlu Lin. 488-495 [doi]
- BypTalker: An Adaptive Adversarial Example Attack to Bypass Prefilter-enabled Speaker RecognitionQianniu Chen, Kang Fu, Li Lu 0008, Meng Chen, Zhongjie Ba, Feng Lin, Kui Ren 0001. 496-503 [doi]
- FedSG: Subgraph Federated Learning on Multiple Non-IID GraphsYingcheng Wang, Songtao Guo, Dewen Qiao. 504-511 [doi]
- A Straggler-resilient Federated Learning Framework for Non-IID Data Based on Harmonic CodingWeiheng Tang, Lin Chen, Xu Chen. 512-519 [doi]
- Two-way Delayed Updates with Model Similarity in Communication-Efficient Federated LearningYingchi Mao, Zibo Wang, Jun Wu, Lijuan Shen, Shufang Xu, Jie Wu. 520-527 [doi]
- Decentralized Subgoal Tree Search for Multiagent Planning without Priors or CommunicationQian Che, Yixuan Li, Ziyao Peng, Wanyuan Wang, Yichuan Jiang. 528-535 [doi]
- A Hypernetwork-based Personalized Federated Learning Framework for Encrypted Traffic ClassificationYichen Wei, Guang Cheng 0001, Tian Qin, Zihan Chen. 536-543 [doi]
- FedCME: Client Matching and Classifier Exchanging to Handle Data Heterogeneity in Federated LearningJun Nie, Danyang Xiao, Lei Yang 0024, Weigang Wu. 544-552 [doi]
- CFPA: Cognitive Federated Partial Adaptation for Effective PersonalizationXiaohui Wei, Didi Jiao, Shiyu Tong, Zijian Li 0007, Chenghao Ren, Hengshan Yue. 553-561 [doi]
- Communication-Efficient Personalized Federated Learning on Non-IID DataXiangqian Li, Chunmei Ma, Baogui Huang, Guangshun Li. 562-569 [doi]
- MDP: Model Decomposition and Parallelization of Vision Transformer for Distributed Edge InferenceWeiyan Wang, Yiming Zhang, Yilun Jin, Han Tian, Li Chen. 570-578 [doi]
- Secure Mutual Learning with Low Interactions for Deep Model TrainingWenxing Zhu, Xiangxue Li. 579-587 [doi]
- TSTR: A Real-Time RGB-Thermal Semantic Segmentation Model with Multimodal Fusion TransformersGuoqiang Zhao, Xiaoyun Yan, Aodie Cui, Chang Hu, Jiaqi Bao, Junjie Huang. 588-595 [doi]
- A Well-Designed Regularization Scheme for Latent Factorization of High-Dimensional and Incomplete Water-Quality Tensors from Sensor NetworksXuke Wu, Lan Wang, Mingjiang Xie, Kun Shan. 596-603 [doi]
- Multi-Stage Vehicle Dispatch for Community Group-buying Logistics via Deep Reinforcement LearningLingyi Xu, Xingyuan Liang, Xiaolei Zhou 0001, Tian He 0001. 604-611 [doi]
- Lipreading using Joint Preception Temporal Convolutional NetworkXihui Li, Zhenhua Tan, Ziwei Cheng, Xiaoer Wu. 612-619 [doi]
- A Scheduling optimization Mechanism Combining Q-learning and Genetic AlgorithmXue Wang, Xingwei Wang 0001, Jie Jia, Xijia Lu, Min Huang 0001. 620-627 [doi]
- RLink: Accelerate On-Device Deep Reinforcement Learning with Inference Knowledge at the EdgeTianyu Zeng, Xiaoxi Zhang, Daipeng Feng, Jingpu Duan, Zhi Zhou 0006, Xu Chen. 628-635 [doi]
- DeepSpectrum: A Deep-Learning-based Spectrum Identification for Wireless SignalsJiongkun Su, Junmei Yao, Ruitao Xie, Kaishun Wu. 636-643 [doi]
- FedIR: Learning Invariant Representations from Heterogeneous Data in Federated LearningXi Zheng, Hongcheng Xie, Yu Guo 0003, Rongfang Bie. 644-651 [doi]
- Harnessing Edge Computing Resources for Accelerating Industrial TasksTao Xing, Helei Cui, Yaxing Chen, Zihui Luo, Bin Guo 0001, Zhiwen Yu 0001, Xiaobing Guo, Yirong Ma. 652-659 [doi]
- Incentive Mechanism Based on Double Auction for Federated Learning in Satellite Edge CloudsQiufen Xia, Zhou Xu, Zhuangze Hou. 660-668 [doi]
- Auction-Based Dynamic Resource Allocation in Social MetaverseNan Liu, Tom H. Luan, Yuntao Wang, Yiliang Liu, Zhou Su. 669-676 [doi]
- B³A: Bokeh Based Backdoor Attack with Feature RestrictionsJunjian Li, Honglong Chen, Yudong Gao, Kai Lin, Yuping Liu. 677-684 [doi]
- Minimal Substitution-based Label Propagation for Anomalous Blockchain DetectionRanran Wang, Zhaokang Zhang, Yiran Wang, Yin Zhang. 685-692 [doi]
- Improved LSTM Algorithm for WBGT Index Prediction in Smart CitiesKai Ding 0005, Yidu Huang, Ming Tao, Renping Xie, Xueqiang Li 0001, Shuling Yang. 693-698 [doi]
- A Group-oriented Authentication Scheme for IoT Devices in 5G NetworksQili Guo, Chengzhe Lai, Haoyan Ma, Dong Zheng 0001. 699-706 [doi]
- Edge Servers on Wheels: Deployment and Route Planning of Mobile Servers for Internet of VehiclesZhihai Tang, Aiwen Huang, Yonghua Wang, Le Chang, Tian Wang. 707-713 [doi]
- Smart Card Auto-Selection Using GPS and WiFi Fingerprints for SmartphonesXingying Wang, Linwen Zhang, Hang Tu, Qin Liu, Man Zhou. 714-721 [doi]
- A Spatio-Temporal Tree and Gauss Convolutional Network for Traffic Flow ForecastingZhaobin Ma, Zhiqiang Lv, Jianbo Li, Fengqian Xia. 722-729 [doi]
- Collaborative Service Placement and Request Scheduling in Mobile Edge NetworksBin Tang, Nuo Yu, Fen Han, Jiakai Gong, Yuan Ge. 730-735 [doi]
- Comparing Different Neural Network Models on Subway Traffic Volume ForecastYanfei Jiang, Lian Wen, Shaoyang Zhang, Yongli Liu. 736-743 [doi]
- Similarity-aware Contract Design for Multi-task Federated Learning in Vehicular NetworksBo Xu, Haitao Zhao 0004, Haiguang Lai, Xiaozhen Lu. 744-749 [doi]
- AI-Based 3D UAV Coverage Deployment for Internet of Vehicles in the Complex Mountain EnvironmentPengfei Du, Tingyue Xiao, Ziyue Liu, Chaojin Qing. 750-755 [doi]
- Performance Analysis of Multi-RIS Aided Communication Under Weibull FadingLongze Li, Haitao Zhao, Wenxue Sun, Zhuoran Xu, Yihang Jia, Shuyi Ma. 756-761 [doi]
- HAMF: Highly Adaptable Multi-graph Fusion for Cross-domain GraphsJie Li, Jiaqi Liu, Bin Guo. 762-767 [doi]
- Blueberry flower detection algorithm based on improved YOLOv8Rongli Gai, Huatian Zhang, Zhibin Guo, Xiangzhou Kong, Shan Qin. 768-773 [doi]
- An Indoor Positioning Method Based on Quadratic Space JudgmentYuxi Wang, Wanyu Song, Zheng Zhang, Longze Li, Yiyang Ni. 774-779 [doi]
- Trace6: A Practical Threatener Traceback Model in IPv6 NetworkChaoqiang Yang, Liancheng Zhang, Yi Gou, Wenhao Xia, Ming Hu, Jichang Wang. 780-785 [doi]
- Virtual Target Based Multi-agent Surrounding ApproachWeiping Zhu, Haoyang Li, Ning Ding, Yukang Chen, Yufei Sun, Chao Ma, Wei Li. 786-793 [doi]
- Enhancing Intersection Signal Control: Distributional Double Dueling Deep Q-learning Network with Priority Experience Replay and NoisyNet ApproachYue He, Chen Mu, Yu Sun. 794-799 [doi]
- A Greedy Algorithm-based Approach for Dynamic Carpooling Matching and Route Selection in Ride-hailingYu Sun, Chen Mu, Jing Sun, Yue He. 800-805 [doi]
- A Weakly Supervised Learning Framework for Parkinson's Disease Assessment Using Wearable SensorZiheng Li, Xiyang Peng, Yuting Zhao, Xulong Wang, Yun Yang, Po Yang 0001. 813-818 [doi]
- A lightweight method for Android malware classification based on teacher assistant distillationJunwei Tang, Qiaosen Pi, Ruhan He, Jin Huang, Tao Peng 0006, Xinrong Hu, Wenlong Tian. 819-824 [doi]
- Maximizing Throughput in Unmanned Surface Vehicle Relay System under Jamming AttacksHeng Zhang, Lei Wu, Zhemin Sun, Zhikai Zhang, Ming Li, Hongran Li, Jian Zhang. 825-830 [doi]
- An Efficient Skip Link-based Traffic Prediction Algorithm with Multi-Scale Feature ExtractionChaoqun Liu, Xuanpeng Li, Guangyu Li, Chen Gong. 831-836 [doi]
- SemiGest: Recognizing Hand Gestures via Visible Light Sensing with Fewer LabelsJifei Zhu, Ziwei Liu, Yimao Sun, Yanbing Yang. 837-842 [doi]
- Multi-Level ACE-based IoT Knowledge Sharing for Personalized Privacy-Preserving Federated LearningJing Wang, Xi Lin, Jun Wu, Qinghua Mao, Bei Pei, Jianhua Li, Suchang Guo, Baitao Zhang. 843-848 [doi]
- Joint Client Selection and Training optimization for Energy-Efficient Federated LearningKang Yan, Nina Shu, Tao Wu, Chunsheng Liu, Jun Huang, Jingbo Yu. 849-854 [doi]
- Both Sides Needed: A Two-Dimensional Measurement Study of Email Security Based on SPF and DMARCHan Zhang, Libo Chen, Ming Liu, Yong Shi, Songyang Wu, Zhi Xue. 855-861 [doi]
- A Novel Data Aggregation Scheme for Wireless Sensor Networks Based on Residue Number System with Nonpairwise-Prime ModuliJinxin Zhang, Fuyou Miao. 862-867 [doi]
- Identifying Fine-Grained Douyin User Behaviors via Analyzing Encrypted Network TrafficYuhang Shan, Guang Cheng 0001, Zihan Chen. 868-875 [doi]
- Do Non-competing Data Intermediaries Matter? A Property Rights PerspectiveCheng Chi, Wenqu Chen, Jinqiu He. 876-881 [doi]