Wireless Algorithms, Systems, and Applications: 16th International Conference, Wasa 2021, Nanjing, China, June 25-27, 2021, Proceedings, Part III » książka
Event-based American Sign Language Recognition Using Dynamic Vision Sensor.- Multi-step domain adaption image classification network via attention mechanism and multi-level feature alignment.-Automated Honey Document Generation Using Genetic Algorithm.- Image encryption for Wireless Sensor Networks with modified Logistic Map and new Hash algorithm.- Design and implementation of a real-time distributed precise point positioning platform.- Deployment of UAV-BS for Congestion Alleviation in Cellular Networks.- Robust Estimator for NLOS Error Mitigation in TOA-based Localization.- Effectiveness Analysis of UAV Offensive Strategy with Unknown Adverse Trajectory.- Delivery Optimization for Unmanned Aerial Vehicles Based on Minimum Cost Maximum Flow With Limited Battery Capacity.- Optimized Segment Routing Traffic Engineeringwith Multiple Segments.- Robust and Efficient Mechanism Design for Heterogeneous Task Crowdsensing.- Lightweight Threshold Private Set Intersection via Oblivious Transfer.- Person Re-identification Algorithm Based on Spatial Attention Network.- OFDMA-based Asymmetric Full-duplex Media Access Control for the Next Generation WLANs.- Equitable Valuation of Crowdsensing for Machine Learning via Game Theory.- AERM: An Attribute-aware Economic Robust Spectrum Auction Mechanism.- Application of Matrix-NMS in face detection and autonomous driving.- Blockchain-based verifiable DSSE with forward security in multi-server environments.- GGCAD: A Novel Method of Adversarial Detection by Guided Grad-CAM.- Online Task Scheduling for DNN-based Applications over Cloud, Edge and End Devices.- An SDN-based Self-adaptive Resource Allocation Mechanism for Service Customization.- Privacy Risk Assessment for Text Data Based on Semantic Correlation Learning.- Multi-dimensional LSTM:A Model of NetworkText Classification.- Incentive Cooperation with Computation Delay Concerns for Socially-aware Parked Vehicle Edge Computing.- Complex Task Allocation in Spatial Crowdsourcing: A Task Graph Perspective.- Jointly Optimizing Throughput and Cost of IoV based on Coherent Beamforming and Successive Interference Cancellation Technology.- Deep Reinforcement Learning based Dynamic Content Placement and Bandwidth Allocation in Internet of Vehicles.- A Probabilistic Resilient Routing Scheme for Low-Earth-Orbit Satellite Constellations.- An Efficient Multi-Link Concurrent Transmission MAC Protocol for Long-delay Underwater Acoustic Sensor Networks.- An Advanced Cache Retransmission Mechanism for Wireless Mesh Network.- Efficient Budget-Distance-Aware Influence Maximization in Geo-Social Network.- Deep Learning-Based Task Offloading for Vehicular Edge Computing.- Hacks Hit the Phish: Phishing Attack Detection based on Hacks Search.- The sensor-cloud system and node reliability analysis.- Reinforcement Learning Based Seamless Handover Algorithm in SDN-enabled WLAN.- Attack traffic detection based on LetNet-5 and GRU hierarchical deep neural network.- Real-time and Consistent Route Update Based on Segment Routing for NFV-enabled Networks .- Privacy-Preserving Auction for Heterogeneous Task Assignment in Mobile Device Clouds.- Deep Reinforcement Learning for DAG-based Concurrent Requests Scheduling in Edge Networks.- Generative Adversarial Scheme Based GNSS Spoofing Detection for Digital Twin Vehicular Networks.- Spatial Sketch Configuration for Traffic Measurement in Software Defined Networks.- Estimating Clustering Coefficient of Multiplex Graphs with Local Differential Privacy.- New Rectangle Attack Against SKINNY Block Cipher.- Optimal convergence nodes deployment in hierarchical wireless sensor networks: an SMA-based approach.- A Virtual-Potential-Field-based Cooperative Opportunistic Routing Protocol for UAV Swarms.- Social-Interaction GAN: Pedestrian Trajectory Prediction.- An Intelligent Wallpaper Based on Ambient Light for Human Activity Sensing.- Adaptive Data Transmission and Task Scheduling for High-Definition Map Update.- Research on Path Planning for Relay Drones with Multiple Constraints.- A Reinforcement Model based Prioritized Replay to Solve the Offloading Problem in Edge Computing.- Authentication System Based on Fuzzy Extractors.- Performance Analysis of V2V-Based Vehicular Platoon with Modified CACC Scheme.- Leveraging Fine-grained Self-Correlation in Detecting Collided LoRa Transmissions.- Blockchain Oracle-Based Privacy Preservation and Reliable Identification for Vehicles.- Objects Perceptibility Prediction Model Based on Machine Learning for V2I Communication Load Reduction.- KESAR: A High-Accuracy Prediction Algorithm and Solar-Aware Routing Strategy for Outdoor WSN.- Blockchain Empowered Federated Learning for Medical Data Sharing Model.- A Deep Learning Based Intelligent Transceiver Structure for Multiuser MIMO.- GreenAP: An Energy-saving Protocol for Mobile Access Points.- A Robust Multi-Tenant Server Consolidation Algorithm.- PM2.5 and PM10 Concentration Estimation based on the Top-of-Atmosphere Reflectance.- A Secure Sensing Data Collection Mechanism based on Perturbed Compressed Sensing.- An Edge-Cloud Collaborative Object Detection System.- Underwater Acoustic signal Modulation recognition Technology based on Deep Learning.