Abstract is missing.
- An Adaptive Power level Allocation Model in LoRa for Internet of ThingsPreti Kumari, Hari Prabhat Gupta, Tanima Dutta. 1-2 [doi]
- An Improved Communications in Cyber Physical System Architecture, Protocols and ApplicationsMadhan E. S., Uttam Ghosh, Deepak K. Tosh, Mandal K., E. Murali, Soumalya Ghosh. 1-6 [doi]
- iTracker: Towards Sustained Self-Tracking in Dynamic Feature Environment with SmartphonesBoyuan Sun, Qiang Ma 0007, Zhichao Cao, Yunhao Liu. 1-9 [doi]
- Implementing a Real-Time Image Captioning Service for Scene Identification Using Embedded SystemHe-Yen Hsieh, Jenq-Shiou Leu, Sheng-An Huang. 1-2 [doi]
- Underwater Datalogger for Accurate Position and Location Estmation and TrackingXiyuan Zhu, Wurong Shih, Yahong Rosa Zheng. 1-2 [doi]
- Playing with Fire: Exploring Concurrent Transmissions in Ultra-wideband RadiosDavide Vecchia, Pablo Corbalán, Timofei Istomin, Gian Pietro Picco. 1-9 [doi]
- A Machine Learning Approach Using Classifier Cascades for Optimal Routing in Opportunistic Internet of Things NetworksVidushi Vashishth, Anshuman Chhabra, Deepak Kumar Sharma. 1-9 [doi]
- Real Time Attack Detection with Deep LearningChristian Callegari, Elena Bucchianeri, Stefano Giordano, Michele Pagano. 1-5 [doi]
- Network Function Deployment with Balanced Server and Link Resources in Tree TopologiesYang Chen, Jie Wu 0001. 1-9 [doi]
- Millimeter Wave Remote UAV Control and Communications for Public Safety ScenariosWilliam Xia, Michele Polese, Marco Mezzavilla, Giuseppe Loianno, Sundeep Rangan, Michele Zorzi. 1-7 [doi]
- Compress or Interfere?Alaa Awad Abdellatif, Lutfi Samara, Amr Mohamed, Abdulla K. Al-Ali, Aiman Erbad, Mohsen Guizani. 1-6 [doi]
- WiZoom: Accurate Multipath Profiling using Commodity WiFi Devices with Limited BandwidthHua Xue, Jiadi Yu, Yanmin Zhu, Li Lu, Shiyou Qian, Minglu Li 0001. 1-9 [doi]
- No Entry: Anti-Noise Energy Detector for Chirp-Based Acoustic CommunicationChulyoung Kwak, Seongwon Kim, Soonwon Ka, Jihwan Lee, Sunghyun Choi. 1-9 [doi]
- PEC: Synthetic Aperture RFID Localization with Aperture Position Error CompensationRun Zhao, Dong Wang 0024, Qian Zhang 0012, Haonan Chen, Huatao Xu. 1-9 [doi]
- Privacy-Preserving Sketching for Online Social Network Data PublicationTianchong Gao, Feng Li 0001. 1-9 [doi]
- Early Classification Approach for Multivariate Time Series using Sensors of Different Sampling RateAshish Gupta, Hari Prabhat Gupta, Tanima Dutta. 1-2 [doi]
- Strategic Network Infrastructure Sharing through Backup Reservation in a Competitive EnvironmentJing Hou, Li Sun, Tao Shu, Yong Xiao, Marwan Krunz. 1-9 [doi]
- A Solution for Dynamic Spectrum Management in Mission-Critical UAV NetworksAlireza Shamsoshoara, Mehrdad Khaledi, Fatemeh Afghah, Abolfazl Razi, Jonathan D. Ashdown, Kurt Turck. 1-6 [doi]
- Decentralized Task Allocation in Lossy Networks: A Simulation StudyMatthew Rantanen, Nicholas Mastronarde, Jeffrey Hudack, Karthik Dantu. 1-9 [doi]
- Truthful Quality-Aware Data Crowdsensing for Machine LearningYuxi Zhao, Xiaowen Gong. 1-9 [doi]
- Non-Intrusive Deployment of Blockchain in Establishing Cyber-Infrastructure for Smart CityAdeel A. Malik, Deepak K. Tosh, Uttam Ghosh. 1-6 [doi]
- Joint Beamforming-Power-Bandwidth Allocation in Terahertz NOMA NetworksXiaofei Zhang, Chong Han, Xudong Wang. 1-9 [doi]
- Online Data Quality Learning for Quality-Aware CrowdsensingXiangyu Zhang, Xiaowen Gong. 1-9 [doi]
- Machine Learning Based Dynamic Cooperative Transmission Framework for IoUT NetworksAhmad A. Aziz El-Banna, Ahmed B. Zaky, Basem M. ElHalawany, Joshua Zhexue Huang, Kaishun Wu. 1-9 [doi]
- Maximizing Energy Efficiency of Period-Area Coverage with UAVs for Wireless Rechargeable Sensor NetworksChi Lin, Chunyang Guo, Wan Du, Jing Deng 0001, Lei Wang 0005, Guowei Wu. 1-9 [doi]
- FaceInput: A Hand-Free and Secure Text Entry System through Facial VibrationMaoning Guan, Wenqiang Chen, Yandao Huang, Rukhsana Ruby, Kaishun Wu. 1-9 [doi]
- SparseTag: High-Precision Backscatter Indoor Localization with Sparse RFID Tag ArraysChao Yang, Xuyu Wang, Shiwen Mao. 1-9 [doi]
- A New Paradigm for Non-contact Vitals Monitoring using Visible Light SensingHisham Abuella, Sabit Ekin. 1-2 [doi]
- X-Burst: Enabling Multi-Platform Cross-Technology Communication between Constrained IoT DevicesRainer Hofmann, Carlo Alberto Boano, Kay Römer. 1-9 [doi]
- Pharos: A Rapid Neighbor Discovery Algorithm for Power-Restricted Wireless Sensor NetworksYuchen Zhu, Bo Yang 0026, Min Liu 0001, Zhongcheng Li. 1-9 [doi]
- Driving in the Fog: Latency Measurement, Modeling, and Optimization of LTE-based Fog Computing for Smart VehiclesYong Xiao, Marwan Krunz, Haris Volos 0002, Takashi Bando. 1-9 [doi]
- FoVR: Attention-based VR Streaming through Bandwidth-limited Wireless NetworksSongzhou Yang, Yuan He, Xiaolong Zheng 0002. 1-9 [doi]
- Parallel Feedback Communications for Magnetic MIMO Wireless Power Transfer SystemWenxiong Hua, Xiang Cui, Hao Zhou, Panlong Yang, Xiang-Yang Li. 1-9 [doi]
- Commercial Wi-Fi Based Fall Detection with Environment Influence MitigationLei Zhang, Zhirui Wang, Liu Yang. 1-9 [doi]
- Quality of Control Assessment for Tactile Cyber-Physical SystemsKurian Polachan, Prabhakar T. Venkata, Chandramani Singh, Deepak Panchapakesan. 1-9 [doi]
- Adaptive Resource Management for a Virtualized Computing Platform within Edge ComputingThembelihle Dlamini, Ángel Fernández Gambín. 1-9 [doi]
- A Proof of Concept SRAM-based Physically Unclonable Function (PUF) Key Generation Mechanism for IoT DevicesAshwija Reddy Korenda, Fatemeh Afghah, Bertrand Cambou, Christopher Philabaum. 1-8 [doi]
- Privacy Invasion through Smarthome IoT SensingRavishankar Chamarajnagar, Ashwin Ashok. 1-9 [doi]
- HiPER-V: A High Precision Radio Frequency Vehicle for Aerial MeasurementsMaqsood Ahamed Abdul Careem, Jorge Gomez, Dola Saha, Aveek Dutta. 1-6 [doi]
- Occupancy Analytics in Retail Stores Using Wireless SignalsSaandeep Depatla, Yasamin Mostofi. 1-9 [doi]
- Implementation of Password Management System Using Ternary Addressable PUF GeneratorMohammad Mohammadinodoushan, Bertrand Cambou, Christopher Philabaum, David Hély, Duane Booher. 1-8 [doi]
- Trans-Sense: Real Time Transportation Schedule Estimation Using Smart PhonesAli Mohamed AbdelAziz, Amin A. Shoukry, Walid Gomaa, Moustafa Youssef. 1-8 [doi]
- Source Localization and Tracking for Dynamic Radio Cartography using Directional AntennasMohsen Joneidi, Hassan Yazdani, Azadeh Vosoughi, Nazanin Rahnavard. 1-9 [doi]
- MType: A Magnetic Field-based Typing System on the Hand for Around-Device InteractionYuFeng Deng, Dong Wang 0024, Qian Zhang 0012, Run Zhao. 1-9 [doi]
- ECO-UW IoT: Eco-friendly Reliable and Persistent Data Transmission in Underwater Internet of ThingsMehdi Rahmati, Vidyasagar Sadhu, Dario Pompili. 1-9 [doi]
- DeepLap: A Deep Learning based Non-Specific Low Back Pain Symptomatic Muscles Recognition SystemNian Wang, Zhe Zhang, Jing Xiao, Li Cui. 1-9 [doi]
- Triangular Antenna Layout Facilitates Deployability of CSI Indoor Localization SystemsXinyu Tong, Hao Li, Xiaohua Tian, Xinbing Wang. 1-9 [doi]
- Learning-based Blockage Prediction for Robust Links in Dynamic Millimeter Wave NetworksMasoud Zarifneshat, Li Xiao 0001, Jiliang Tang. 1-9 [doi]
- Long-Range Short-Burst Mobile Mesh Networking: Architecture and EvaluationRam Ramanathan, Christophe Servaes, Warren Ramanathan, Ayush Dusia, Adarshpal S. Sethi. 1-2 [doi]
- MatchMaker: An Inter-operator Network Sharing Framework in Unlicensed BandsMohammed Hirzallah, Yong Xiao, Marwan Krunz. 1-9 [doi]
- Formation control of a mono-operated UAV fleet through ad-hoc communications: a Q-learning approachNicola Roberto Zema, Dominique Quadri, Steven Martin 0001, Omar Shrit. 1-6 [doi]
- DuoRelay: Parallel Interference Nulling using Full-duplex RelayingAnanya Mahanti, Wei-Han Chen, Prasun Sinha. 1-9 [doi]
- COSTA: Cost-aware Service Caching and Task Offloading Assignment in Mobile-Edge ComputingTuyen X. Tran, Kevin Chan, Dario Pompili. 1-9 [doi]
- Pushing the Limit of CSI-based Activity Recognition: An Enhanced Approach via Packet ReconstructionYoujing Lu, Fan Wu 0006, ShaoJie Tang, Linghe Kong, Guihai Chen. 1-9 [doi]
- 2AN: A Temporal-Frequency Fusion Attention Network for Spectrum Energy Level PredictionKehan Li, Zebo Liu, Shibo He, Jiming Chen. 1-9 [doi]
- Workload-Aware Task Placement in Edge-Assisted Human Re-identificationAnil Acharya, Yantian Hou, Ying Mao, Min Xian, Jiawei Yuan. 1-9 [doi]
- Towards Scalable Video Analytics at the EdgeTheodore Stone, Nathaniel Stone, Puneet Jain, Yurong Jiang, Kyu-Han Kim, Srihari Nelakuditi. 1-9 [doi]
- Urban Anomaly Detection by processing Mobile Traffic Traces with LSTM Neural NetworksHoang Duy Trinh, Lorenza Giupponi, Paolo Dini. 1-8 [doi]
- Ultralow Power Wireless-Fire-Alarm-System using a VO2-Based Metal-Insulator-Transition DeviceJimin Son, Sungwoo Jo, Sun-Kyu Jung, Hyun-Tak Kim. 1-2 [doi]
- Algorithms for Provisioning Edge Computing Resources to Minimize Data Transport CostsNima Seyedtalebi. 1-9 [doi]
- Wide-Area GPS Time Monitoring Against Spoofing Using Belief PropagationSriramya Bhamidipati, Kyeong Jin Kim, Hongbo Sun, Philip V. Orlik. 1-8 [doi]
- When Wireless Charging Meets Fresnel Zones: Even Obstacles Can Enhance Charging EfficiencyChi Lin, Feng Gao, Haipeng Dai, Lei Wang 0005, Guowei Wu. 1-9 [doi]
- AdaComm: Tracing Channel Dynamics for Reliable Cross-Technology CommunicationWeiguo Wang, Xiaolong Zheng 0002, Yuan He 0004, Xiuzhen Guo. 1-9 [doi]
- A Stackelberg Game based River Water Pollution Monitoring System using LoRa TechnologyPreti Kumari, Hari Prabhat Gupta, Tanima Dutta. 1-5 [doi]
- Enabling Secure Voice Input on Augmented Reality Headsets using Internal Body VoiceJiacheng Shang, Jie Wu 0001. 1-9 [doi]
- MOSFET-based Ultra-low-power Realization of Analog Joint Source-Channel Coding for IoTsVidyasagar Sadhu, Mehdi Rahmati, Dario Pompili. 1-3 [doi]
- VISIT: Placement of Unmanned Aerial Vehicles for Anisotropic Monitoring TasksWeijun Wang, Haipeng Dai, Chao Dong, Fu Xiao, Xiao Cheng, Guihai Chen. 1-9 [doi]
- Nearly-Optimal Resource Allocation for Coexisting Industrial Wireless Networks with Line TopologiesJialin Zhang, Wei Liang 0001, Bo Yang 0026, Meng Zheng 0001, Huaguang Shi, Seung Ho Hong. 1-9 [doi]
- InDP: In-Network Data Processing for Wireless Sensor NetworksEbram Kamal William, Mun Choon Chan. 1-9 [doi]
- FusionEye: Perception Sharing for Connected Vehicles and its Bandwidth-Accuracy Trade-offsHansi Liu, Pengfei Ren, Shubham Jain, Mohannad Murad, Marco Gruteser, Fan Bai. 1-9 [doi]
- IoT Network Security from the Perspective of Adversarial Deep LearningYalin E. Sagduyu, Yi Shi 0001, Tugba Erpek. 1-9 [doi]
- Towards Fast and Reliable WiFi Authentication by Utilizing Visible Light DiversityZhiwei Zhao, Geyong Min, Yaoyao Pang, Weifeng Gao, Jiamei Lv. 1-9 [doi]
- ActiveTracker: Uncovering the Trajectory of App Activities over Encrypted Internet Traffic StreamsDing Li, Wenzhong Li, Xiaoliang Wang 0001, Cam-Tu Nguyen, Sanglu Lu. 1-9 [doi]
- G-Fall: Device-free and Training-free Fall Detection with GeophonesYandao Huang, Wenqiang Chen, Hongjie Chen, Lu Wang 0002, Kaishun Wu. 1-9 [doi]
- A Convolutional Neural Network Approach for Classification of LPWAN Technologies: Sigfox, LoRA and IEEE 802.15.4gAdnan Shahid, Jaron Fontaine, Miguel Camelo, Jetmir Haxhibeqiri, Martijn Saelens, Zaheer Khan 0001, Ingrid Moerman, Eli De Poorter. 1-8 [doi]
- NB-IoT Network Monitoring and DiagnosingZhenxian Hu, Guangtao Xue, Yi-Chao Chen, Minglu Li 0001. 1-9 [doi]
- MSNET-Blockchain: A New Framework for Securing Mobile Satellite Communication NetworkMing Feng, Hao Xu. 1-9 [doi]
- ReActor: Real-time and Accurate Contactless Gesture Recognition with RFIDShigeng Zhang, Chengwei Yang, Xiaoyan Kui, Jianxin Wang, Xuan Liu 0001, Song Guo 0001. 1-9 [doi]
- Speech Based Human Authentication on SmartphonesHaipeng Dai, Wei Wang 0002, Alex X. Liu, Kang Ling, Jiajun Sun. 1-9 [doi]
- Service Station Positioning for Mobile Charger in Wireless Rechargeable Sensor NetworksYinan Zhu. 1-2 [doi]
- Dependency-Aware and Latency-Optimal Computation Offloading for Multi-User Edge Computing NetworksChang Shu, Zhiwei Zhao, Yunpeng Han, Geyong Min. 1-9 [doi]
- Grid Software Defined Radio Network Testbed for Hybrid Measurement and EmulationKapil R. Dandekar, Simon Begashaw, Marko Jacovic, Alex Lackpour, Ilhaan Rasheed, Xaime Rivas Rey, Cem Sahin, Sharif Shaher, Geoffrey Mainland. 1-9 [doi]
- Integrity Threat Identification for Distributed IoT in Precision AgricultureRavishankar Chamarajnagar, Ashwin Ashok. 1-9 [doi]