Abstract is missing.
- WiImg: Pushing the Limit of WiFi Sensing with Low Transmission RatesKun Yang, Xiaolong Zheng 0002, Jie Xiong, Liang Liu 0001, Huadong Ma. 1-9 [doi]
- WiCAM: Imperceptible Adversarial Attack on Deep Learning based WiFi SensingLeiyang Xu, Xiaolong Zheng 0002, Xiangyuan Li, Yucheng Zhang, Liang Liu 0001, Huadong Ma. 10-18 [doi]
- ViTag: Online WiFi Fine Time Measurements Aided Vision-Motion Identity Association in Multi-person EnvironmentsBryan Bo Cao, Abrar Alali, Hansi Liu, Nicholas Meegan, Marco Gruteser, Kristin J. Dana, Ashwin Ashok, Shubham Jain. 19-27 [doi]
- MagDefender: Detecting Eavesdropping on Mobile Devices using the Built-in MagnetometerHao Pan, Feitong Tan, Wenhao Li, Yi-Chao Chen 0001, Lanqing Yang, Guangtao Xue, Xiaoyu Ji 0001. 28-36 [doi]
- Blocking Island Paradigm Enhanced Intelligent Coordinated Virtual Network Embedding Based on Deep Reinforcement LearningTing Wang 0001, Peng Yang, ZhiHao Wang, Haibin Cai. 37-45 [doi]
- Co-Cache: Inertial-Driven Infrastructure-less Collaborative Approximate CachingJames Mariani, Yongqi Han, Li Xiao 0001. 46-54 [doi]
- Online Bayesian Learning for Rate Adaptation in Non-stationary Wireless ChannelsXiaoying Lei. 55-63 [doi]
- Your Breath Doesn't Lie: Multi-user Authentication by Sensing Respiration Using mmWave RadarYao Wang, Tao Gu, Tom H. Luan, Yong Yu 0002. 64-72 [doi]
- LiFOD: Lighting Extra Data via Fine-grained OWC DimmingXiao Zhang, James Mariani, Li Xiao 0001, Matt W. Mutka. 73-81 [doi]
- On-Demand or On-Premises: Online Mitigation of DDoS Attacks via Cloud-Edge CoordinationYi Zhong, Lei Jiao 0002, Ruiting Zhou, Liujing Song. 82-90 [doi]
- EarGest: Hand Gesture Recognition with EarablesKhaled Alkiek, Khaled A. Harras, Moustafa Youssef 0001. 91-99 [doi]
- VoronoiBoost: Data-driven Probabilistic Spatial Mapping of Mobile Network MetadataOrlando E. Martínez-Durive, Theo Couturieux, Cezary Ziemlicki, Marco Fiore. 100-108 [doi]
- Skunk - A Blockchain and Zero Trust Security Enabled Federated Learning Platform for 5G/6G Network SlicingEranga Bandara, Xueping Liang, Sachin Shetty, Ravi Mukkamala, Abdul-Rahman, Wee Keong Ng. 109-117 [doi]
- Quick and Reliable Physical-layer Data Aggregation in LoRa through Multi-Packet ReceptionZhirong Tang, Lizhao You, Haipeng Dai, Liqun Fu 0001. 118-126 [doi]
- TeRFF: Temperature-aware Radio Frequency Fingerprinting for SmartphonesXiaolin Gu, Wenjia Wu, Naixuan Guo, Wei He, Aibo Song, Ming Yang 0001, Zhen Ling, Junzhou Luo. 127-135 [doi]
- Wakeup Receiver Using Passive Amplification by Means of a Switched SAW ResonatorGeorg Meller, Michael Methfessel, Bastian Lindner, Jens Wagner, Rolf Kraemer, Frank Ellinger. 136-144 [doi]
- Stitching Weight-Shared Deep Neural Networks for Efficient Multitask Inference on GPUZeyu Wang, Xiaoxi He, Zimu Zhou, Xu Wang 0018, Qiang Ma 0007, Xin Miao, Zhuo Liu, Lothar Thiele, Zheng Yang 0002. 145-153 [doi]
- Facilitating Radar-Based Gesture Recognition With Self-Supervised LearningZhiyao Sheng, Huatao Xu, Qian Zhang, Dong Wang. 154-162 [doi]
- X-Disco: Cross-technology Neighbor DiscoveryShuai Wang, Jianlin Guo, Pu Wang 0004, Kieran Parsons, Philip V. Orlik, Yukimasa Nagai, Takenori Sumi, Parth Pathak. 163-171 [doi]
- WiVelo: Fine-grained Walking Velocity Estimation for Wi-Fi Passive TrackingChenning Li, Li Liu, Zhichao Cao, Mi Zhang. 172-180 [doi]
- ScreenInformer: Whispering Secret Information via an LCD ScreenXieyang Sun, Wei Xi, Zhiping Jiang, Zuhao Chen, Han Hao. 181-189 [doi]
- Energy-efficient Federated Learning via Stabilization-aware On-device Update ScalingSuwei Xu, Yibo Jin 0001, Zhuzhong Qian, Sheng Zhang 0001, Ming Zhao, Zhenjie Lin, Qiang Lin, Liming Wang. 190-198 [doi]
- FedMix: A Sybil Attack Detection System Considering Cross-layer Information Fusion and Privacy ProtectionJing Zhao, Ruwu Wang. 199-207 [doi]
- CoopEdge: Cost-effective Server Deployment for Cooperative Multi-Access Edge ComputingRong Cong, Zhiwei Zhao, Linyuanqi Zhang, Geyong Min. 208-216 [doi]
- VisBLE: Vision-Enhanced BLE Device TrackingWenchao Jiang, Feng Li, Luoyu Mei, Ruofeng Liu, Shuai Wang. 217-225 [doi]
- Low Cost Light Source Identification in Real World SettingsTushar Routh, Nurani Saoda, Md Fazlay Rabbi Masum Billah, Brad Campbell. 226-234 [doi]
- Divide and Code: Efficient and Real-time Data Recovery from Corrupted LoRa FramesNiloofar Yazdani, Nikolaos Kouvelas, Daniel E. Lucani, R. Venkatesha Prasad. 235-243 [doi]
- ChopTags: An Accurate and Low-cost Interface to Identify User/Item InteractionsHaofan Cai, Ge Wang 0003, Josue Leyva, Ian Pham, Jinsong Han, Shigang Chen, Chen Qian 0001. 244-252 [doi]
- Incentivizing Online Edge Caching via Auction - Based SubsidizationYoumei Song, Lei Jiao, Renyu Yang, Tianyu Wo, Jie Xu 0007. 253-261 [doi]
- Pedestrian Liveness Detection Based on mmWave Radar and Camera FusionHao Li, Ruofeng Liu, Shuai Wang, Wenchao Jiang, Chris Xiaoxuan Lu. 262-270 [doi]
- Focus! Provisioning Attention-aware Detection for Real-time On-device Video AnalyticsYuting Yan, Yibo Jin 0001, Sheng Zhang 0001, Fangwen Cheng, Zhuzhong Qian, Sanglu Lu. 271-279 [doi]
- Exploiting the Computational Path Diversity with In-network Computing for MECXiaolin Guo, Fang Dong 0001, Dian Shen, Zhaowu Huang, Zhenyang Ni, Yulong Jiang, Daheng Yin. 280-288 [doi]
- RFPass: Towards Environment-Independent Gait-based User Authentication Leveraging RFIDYunzhong Chen, Jiadi Yu, Linghe Kong, Yanmin Zhu, Feilong Tang. 289-297 [doi]
- DARPA: Deployment of UAVs for Polygonal Sizable Object SurveillanceHaipeng Dai, Xuzhen Lin, Jiaqi Zheng, Yuben Qu, Weijun Wang, Shuyu Shi, Chi Lin, Wanchun Dou. 298-306 [doi]
- Frequency- and Orientation-related Phase Fingerprints for RFID Tag AuthenticationKai Zhang, Jiuwu Zhang, Xin Xie, Xinyu Tong, Xiulong Liu, Keqiu Li. 307-315 [doi]
- WiLCA: Accelerating Contactless Authentication with Limited DataChi Lin, Chuanying Ji, Fenglong Ma, Lei Wang 0005, Wei Zhong, Guowei Wu. 316-324 [doi]
- HPFL-CN: Communication-Efficient Hierarchical Personalized Federated Edge Learning via Complex Network Feature ClusteringZijian Li 0007, Zihan Chen, Xiaohui Wei, Shang Gao 0005, Chenghao Ren, Tony Q. S. Quek. 325-333 [doi]
- Universal Timestamping with Ambient SensingAdeel Nasrullah, Momin Ahmad Khan, Fatima Muhammad Anwar. 334-342 [doi]
- Identifying the BLE Misconfigurations of IoT Devices through Companion Mobile AppsJianqi Du, Fenghao Xu, Chennan Zhang, Zidong Zhang, Xiaoyin Liu, Pengcheng Ren, Wenrui Diao, Shanqing Guo, Kehuan Zhang. 343-351 [doi]
- ReaderPrint: A Universal Method for RFID Readers Authentication Based on Impedance MismatchYinan Zhu, Chunhui Duan, Xuan Ding, Zheng Yang 0002. 352-360 [doi]
- VOGUE: Secure User Voice Authentication on Wearable Devices using GyroscopeShan Chang, Xinggang Hu, Hongzi Zhu, Wei Liu 0138, Lei Yang. 361-369 [doi]
- VLC Physical Layer Security through RIS-aided Jamming Receiver for 6G Wireless NetworksSimone Soderi, Alessandro Brighente, Federico Turrin, Mauro Conti. 370-378 [doi]
- Game Theoretic Analysis of Urban E-Taxi Systems: Equilibria and EfficiencyYukun Yuan, Yue Zhao, Lin Chen 0002, Shan Lin 0001. 379-387 [doi]
- mmWave on a Farm: Channel Modeling for Wireless Agricultural Networks at Broadband Millimeter-Wave FrequencyShuai Nie, Mohammad Mosiur Lunar, Geng Bai, Yufeng Ge, Santosh K. Pitla, Can Emre Koksal, Mehmet C. Vuran. 388-396 [doi]
- DETROIT: Data Collection, Translation and Sharing for Rapid Vehicular App DevelopmentMert D. Pesé, Dongyao Chen, C. Andrés Campos, Alice Ying, Troy Stacer, Kang G. Shin. 397-406 [doi]
- Real-time DNN Model Partitioning for QoE Enhancement in Mobile Vision ApplicationsJeong-A Lim, Yeongjin Kim. 407-415 [doi]
- Assisting Backdoor Federated Learning with Whole Population Knowledge Alignment in Mobile Edge ComputingTian Liu, Xueyang Hu, Tao Shu. 416-424 [doi]
- DeepFake Videos Detection via Spatiotemporal Inconsistency Learning and Interactive FusionXiangling Ding, Wenjie Zhu, Dengyong Zhang. 425-433 [doi]
- A Hybrid Deep Reinforcement Learning Approach for Dynamic Task Offloading in NOMA-MEC SystemCe Shang, Yan Sun, Hong Luo. 434-442 [doi]
- Distributed Caching Control Strategy in Mobile Edge Computing: A Mean Field Game ApproachHao Feng, Songtao Guo, Chao Chen, Xianlong Jiao. 443-451 [doi]
- How Manufacturers Can Easily Improve Working Range of Passive RFIDsJu Wang 0003, Liqiong Chang, Omid Abari, Srinivasan Keshav. 452-460 [doi]
- MASCOT: Mobility-Aware Service Function Chain Routing in Mobile Edge ComputingXingpeng Fan, Gongming Zhao, Huaqing Tu, Hongli Xu, He Huang. 461-469 [doi]
- Task Scheduling Algorithm Based on Computing-Aware in Mobile Ad Hoc CloudQi Zhang, Yang Zhang, Shukui Zhang, Hao Long 0001. 470-478 [doi]
- Placing Wireless Chargers with Multiple AntennasHaipeng Dai, Yue Zhao, Weijun Wang, Rong Gu, Yuben Qu, Chi Lin, Lijie Xu, Wanchun Dou. 479-487 [doi]
- Joint Passive Beamforming and Elevation Angle-Dependent Trajectory Design for RIS-aided UAV-enabled Wireless Sensor NetworksMingqian Shao, Yifan Liu, Bin Duo, Jin Ning, Junsong Luo, Xing Zhu, Mingzhe Liu, Zhengqiang Wang. 488-496 [doi]
- Comparative Evaluation of Millimeter-Wave Beamsteering Algorithms Using Outdoor Phased Antenna Array MeasurementsAleksandar Ichkov, Simon Häger, Petri Mähönen, Ljiljana Simic. 497-505 [doi]
- Distributed Decision Making for V2V Charge Sharing in Intelligent Transportation SystemsPunyasha Chatterjee, Pratham Majumder, Arpita Debnath, Sajal K. Das 0001. 506-514 [doi]