


default search action
iThings/GreenCom/CPSCom/SmartData 2022: Espoo, Finland
- 2022 IEEE International Conferences on Internet of Things (iThings) and IEEE Green Computing & Communications (GreenCom) and IEEE Cyber, Physical & Social Computing (CPSCom) and IEEE Smart Data (SmartData) and IEEE Congress on Cybermatics (Cybermatics), Espoo, Finland, August 22-25, 2022. IEEE 2022, ISBN 978-1-6654-5417-9

- Swann Puig, Noria Foukia:

CleverTrash: an IoT system for waste sorting with deep learning. 1-8 - Lianyong Qi, Xiaoxiao Chi, Xiaokang Zhou, Qi Liu, Fei Dai, Xiaolong Xu, Xuyun Zhang

:
Privacy-aware Data Fusion and Prediction for Smart City Services in Edge Computing Environment. 9-16 - Luoyao Hao, Xiao Yu, Tingrui Zhang, Henning Schulzrinne:

Distributed MQTT Brokers at Network Edges: A Study on Message Dissemination. 17-24 - Chang Huang, Minghua Wang:

Multi-stage Low Error Localization Based on Krill Herd Optimization Algorithm in WSNs. 25-32 - Umut Can Özyar, Arda Yurdakul:

A Decentralized Framework with Dynamic and Event-Driven Container Orchestration at the Edge. 33-40 - Bin Luo, Lingzhi Yi, Hengshan Wu, Yun Qiu, Xiangguang Li, Feilong Tang, Yuan Zhang:

A Novel Harmony Search Cat Swarm Optimization Algorithm for Optimal Bridge Sensor Placement. 41-47 - Zheng Guan, Shengqian Yu, Ya Li, Min He:

Reinforcement Learning Based Full Duplex Multi-user MIMO MAC Protocol (RL-MUFD). 48-55 - Chinmay Mahabal

, Hua Fang, Honggang Wang:
On-Ramp Merging for Connected Autonomous Vehicles using Deep Reinforcement Learning. 56-61 - Fabrizio De Vita

, Giorgio Nocera
, Dario Bruneo, Valeria Tomaselli
, Mirko Falchetto:
On-Device Training of Deep Learning Models on Edge Microcontrollers. 62-69 - Fan Liang, Fang Yuan, Xing Liu:

User Position-Based Wireless Sensor Network Deployment Algorithm. 70-76 - Tinghao Zhang, Zhijun Li, Yongrui Chen, Kwok-Yan Lam, Jun Zhao:

Edge-Cloud Cooperation for DNN Inference via Reinforcement Learning and Supervised Learning. 77-84 - Hanning Zhao

, Bilhanan Silverajan:
Visual Cybersecurity Collaboration and Incident Exchange in Multi-Stakeholder IoT Environments. 85-92 - Yuan Zhang, Hengshan Wu, Lingzhi Yi, Bin Luo, Yun Qiu, Feilong Tang:

Reinforcement learning-based IoT sensor scheduling strategy for bridge structure health monitoring. 93-100 - Yuan Tian, Yihui Sun, Yong Tang:

Node Deployment and Confident Information Coverage for WSN-based Air Quality Monitoring. 101-106 - Steve Kerrison

:
IoT Droplocks: Wireless Fingerprint Theft Using Hacked Smart Locks. 107-112 - Devansh Rajgarhia, Peng Liu, Shamik Sural

:
Identifying Channel Related Vulnerabilities in Zephyr Firmware. 113-118 - Sunil Kumar, SeungMyeong Jeong, Il-Yeop Ahn, Muhammad Aslam Jarwar:

Things Data Interoperability Through Annotating oneM2M resources for NGSI-LD Entities. 119-124 - Mengying Wang, Wei Wang, Wenjing Xu, Jiameng Bi, Qiang Ye:

Demand-Oriented Allocation with Fairness in Multi-Operator Dynamic Spectrum Sharing Systems. 125-130 - Liquan Jiang, Zhiguang Qin:

Edge-assisted Puncturable Fine-grained Task Distribution for the IoT-oriented Crowdsensing. 131-138 - Xingqi Luo

, Haotian Wang, Jinyang Dong, Chuan Zhang, Tong Wu:
Achieving Privacy-preserving Data Sharing for Dual Clouds. 139-146 - Mingming Gong, Zhiyang Li, Wuyungerile Li:

Research on ultra-wideband (UWB) indoor accurate positioning technology under signal interference. 147-154 - Yuwei Le, Yiheng Jiang, Xintong Ling, Jiaheng Wang:

Efficient and Secure Collaborative Processing in Mobile Edge Computing via Blockchain. 155-160 - Hua Yan, Shuang-Hua Yang, Yulong Ding, Yunfei Chen:

Energy Consumption Models for UAV Communications: A Brief Survey. 161-167 - Kaifei Tu, Shensheng Zheng, Xuehe Wang, Xiping Hu:

Adaptive Federated Learning via Mean Field Approach. 168-175 - Faiga Alawad

:
Adaptive Sampling for Efficient Acoustic Noise Monitoring: An Incremental Learning Approach. 176-184 - Etienne Victor Depasquale, Saviour Zammit, Franco Davoli, Raffaele Bolla:

Energy analysts need a standard that interprets the Metro Area Global Information Infrastructure. 185-194 - Yuwei Fu, Di Wu, Benoit Boulet:

On the Benefits of Transfer Learning and Reinforcement Learning for Electric Short-term Load Forecasting. 195-203 - Ying Gao

, Sijie Su, Yandan Chen, Qiaofeng Pan, Xiping Hu:
A Blockchain-Based Cloud Edge Fusion Computing Platform for the Smart Grid. 204-211 - Adrien Gougeon, François Lemercier, Anne Blavette, Anne-Cécile Orgerie:

Influence of Communication Technologies in Smart Grid Power Congestion Management. 212-221 - Weipeng Deng, Edith C. H. Ngai, Vera van Zoest:

Energy-Efficient Monitoring of Potential Side Effects from COVID-19 Vaccines. 222-227 - Zhirong Zhu, Jianzhong Su, Zigui Jiang, Mingxi Ye, Zibin Zheng:

Making Smart Contract Classification Easier and More Effective. 228-230 - Aigerim Ospanova

, Behrouz Maham:
Delay-Outage Probability of Capacity Achieving-Based Task Offloading for Mobile Edge Computing. 236-242 - Guichang Yin, Runze Chen

, Yi Zhang:
Effective task offloading heuristics for minimizing energy consumption in edge computing. 243-249 - Fei Dai, Guozhi Liu, Bi Huang, Xiaolong Xu, Chaochao Chen, Zhangbing Zhou, Xiaokang Zhou:

A Distributed Privacy-Preserving Framework for Deep Learning with Edge-Cloud Computing. 250-257 - Aigerim Ospanova

, Behrouz Maham:
Edge Computing with Relaying for Task Offloading under Nakagami-m Fading Channels. 258-263 - Shanchao Zheng, Kan Yu, Guangshun Li, Xiaowu Liu:

Securing uRLLC in UAV-assisted NOMA Wireless Network. 264-271 - Yu Zhang, Guoming Tang, Qianyi Huang, Kui Wu, Yangjing Wu, Yi Wang:

Investigating Low-Battery Anxiety of Mobile Users. 272-279 - Jing Sun, Yuling Chen, Xiao Lv, Xiaobin Qian:

A Multipath Source Location Privacy Protection Scheme in Wireless Sensor Networks via Proxy Node. 280-286 - Jue Chen, Yujie Xiong, Dun He:

A Density-based Controller Placement Algorithm for Software Defined Networks. 287-291 - Yu Zhang, Guoming Tang, Qianyi Huang, Yi Wang, Hong Xu, Xudong Wang:

More Behind Your Electricity Bill: a Dual-DNN Approach to Non-Intrusive Load Monitoring. 292-299 - Liwei Kuang, Jun Wu, Shan Yin:

Construct Digital Twin Models in Cyber Space for Physical Objects of Intelligent Optical Network. 300-305 - Xiaomei Li, Huan Liu, Rongli Gai, Zumin Wang:

Prediction of water quality factors for sea cucumber farming based on Dual-Assisted prediction model. 306-313 - Zu-Min Wang, Tian-Yu Li, Min Xu, Wei Xu

, Yan Liu, Lingyan Hu, Rong-Li Gai:
A Combined Model for Cherry Greenhouse Temperature Prediction Based on LMD and Attention Mechanism. 314-319 - Hongke Zhang, Zheng Yan, Xueqin Liang:

A Survey on Data Security in Network Storage Systems. 320-327 - Xiaochuan He, Chaoyue Tan, Yongtang Wu, Yuling Chen:

A Security Transaction Model Based on HTLC. 328-331 - Junhong Tao, Yongtang Wu, Yuling Chen:

A Secure Comparison Protocol in the Malicious Model. 332-337 - Yun Luo

, Yuling Chen, Tao Li, Yilei Wang:
A Secure Multiparty Computation Round Optimization Scheme Based on Standard Assumption. 338-342 - Kaicheng Yang, Yongtang Wu, Yuling Chen:

A Blockchain-based Scalable Electronic Contract Signing System. 343-348 - Liying Li, Peijin Cong, Junlong Zhou, Zonghua Gu, Keqin Li:

Data Availability Optimization for Cyber-Physical Systems. 349-356 - Manxiang Yang, Yongtang Wu, Yuling Chen:

A K-anonymity Optimization Algorithm Under Attack Model. 357-362 - Juan Ma

, Yuling Chen, Xiao Lv, Xiaobin Qian:
The optimal attack-defense scheme for secret sharing. 363-367 - Dapeng Tan, Tong Wang, Cheng-Yan Wang:

Embedded Fault Diagnosis Expert System: Framework, Development Platform, Algorithms and Experiments. 368-373 - Jiawei Xu, Yufeng Wang, Jianhua Ma, Qun Jin:

An effective model-free Gaussian Process based online social media recommendation. 374-378 - Rongli Gai, Xiaohong Wang, Zhiyuan Chang, Yitong Guo:

Fruit and Vegetable Picking Robot Movement Planning: A Review. 379-384 - Yanzhi Li, Yuqiao Li, Kaifeng Wang, Yan Zhang, Zumin Wang, Shuxue Zhao:

Bayesian network based on dynamic risk assessment for petrochemical sites - A case study of oil tank. 385-390 - Shan Yin, Liwei Kuang, Fei Zou:

Incremental Prediction Method of Optical Performance Degradation Trend Based on Deep Learning. 391-396 - Xiao-Mei Li, Min Xu, Tian-Yu Li, Wei Xu

, Rong-Li Gai, Lingyan Hu, Zu-Min Wang:
A Combined Network for Tomato Leaf Disease Recognization Based on the Improved EfficientNet. 395-400 - Yilei Wang, Ming Liu, Tao Li, Chunmei Li, Hui Wang:

TSHML: Token Shuffling under Haircut Policy Based on Machine Learning. 401-405 - Zhihao Zhang, Zumin Wang:

Research on rolling bearing fault diagnosis method based on hybrid deep learning network model. 406-411 - Chengtian Wang, Taochun Wang, Peng Hu, Qing Qiu, Chuanxin Zhao, Fulong Chen:

Contactless Elevator Button Action Recognition Based on Passive RFID. 412-419 - Rebekah Rousi, Ville Vakkuri, Paulius Daubaris

, Simo Linkola
, Hooman Samani
, Niko Mäkitalo
, Erika Halme
, Mamia Agbese
, Rahul Mohanani, Tommi Mikkonen, Pekka Abrahamsson:
Beyond 100 Ethical Concerns in the Development of Robot-to-Robot Cooperation. 420-426 - Rongli Gai, Kai Wei, Huatian Zhang, Xiangzhou Kong:

Investigation on Application of Target Detection in Agriculture. 427-432 - Junhua Chen, Sihao Deng, Xueda Huang, Xinrui Yang, Dong Yan:

Safety Helmet Wearing Detection Based on A Lightweight YOLOv4 Algorithm. 433-438 - Lingyun Zhang, Yuling Chen, Xiaobin Qian:

Data Confirmation Scheme based on Auditable CP-ABE. 439-443 - Suparna De

, Usamah Jassat, Alex Grace, Wei Wang
, Klaus Moessner:
Mining Composite Spatio-Temporal Lifestyle Patterns from Geotagged Social Data. 444-451 - Zhihao Zhu, Zhi Gao, Yu Guo, Hanli Zhou, Zhixu Lu, Wei Li:

Fixed-time Control for Liquid-filled Flexible Spacecraft. 452-455 - Xu An Wang

, Ruifeng Li:
Improved Secure Provable Data Possession Scheme for Cloud Storage. 456-460 - Lars Creutz, Kevin Wagner, Guido Dartmann

:
Cyber-Physical Contracts in Offline Regions. 461-469 - Rongli Gai, Zhibin Guo, Mengke Li:

Overview of Interactive Visualization Methods. 470-475 - Chenggen Pu, Xiwu Ding, Ping Wang, Yifu Yang:

Practical Implementation of an OPC UA Multi-Server Aggregation and Management Architecture for IIoT. 476-481 - Wenshu Li, Haijun Mao, Hao Wang:

Image Augmentation based on Cross Domain Image Style Transfer. 482-487 - Jiachen Yang, Zhuo Zhang, Yang Li:

Agricultural Few-Shot Selection by Model Confidences for Multimedia Internet of Things Acquisition Dataset. 488-494 - Deyan Kong, Zhenyan Ji, Yanjuan Sang, Wei Dong, Yanyan Yang:

UA-HGAT: Uncertainty-aware Heterogeneous Graph Attention Network for Short Text Classification. 495-500 - Bingyi Xie, Honghui Xu, Zuobin Xiong

, Yingshu Li
, Zhipeng Cai:
A Self-Supervised Purification Mechanism for Adversarial Samples. 501-509 - Jianchao Song, Cheng Qian

, Xing Liu, Hengshuo Liang, Chao Lu, Wei Yu
:
Performance Assessment of Deep Neural Network on Activity Recognition in WiFi Sensing. 510-517 - Xiaoxian Dong, Xiaoxiong Weng, Yancheng Ling:

Information Extraction and Analysis of Chinese Traffic News. 518-524 - Marin Matsumoto, Masato Oguchi:

IoT Device Friendly Leveled Homomorphic Encryption Protocols. 525-532 - Jia Wang, Yazheng Li, Ronghang Ye, Jianqiang Li

:
High Precision Method of Federated Learning Based on Cosine Similarity and Differential Privacy. 533-540 - Jordi Mongay Batalla, Slawomir Sujecki, Houbing Song, Constandinos X. Mavromoustakis, Tomasz Wichary

:
Theoretical analysis of QBER for Quantum Key Distribution in 5G multi-site networks. 541-548 - Andreas Andreou

, Constandinos X. Mavromoustakis, Houbing Song, Jordi Mongay Batalla:
CNN-Based Emotional Stress Classification using Smart Learning Dataset. 549-554 - Mahdi Barhoush

, Ahmed Ayad, Anke Schmeink:
Semi-supervised Algorithms in Resource-constrained Edge Devices: An Overview and Experimental Comparison. 555-559 - Xiao-bo Cai, Li-jiao Chen, Xiao-Jing Shen, Qi Wu, Wen-dou Wu, Baijuan Wang:

Business Process Modeling and Structure Optimization of Resource Coupling in Edge Computing. 560-565 - Jenny Liu:

Smart Detection of Social Distance Violations using Gaussian Lens Model and Deep Learning. 566-569 - Xing Long:

The data mining between the asphalt properties and asphalt mixtures properties. 570-575 - Jun Li, Qinghe Du:

QoS-Aware Joint User Scheduling and Power Allocation for Energy Harvesting Wireless Networks. 576-581 - Yujing Zhou, Dahai Liu, Houbing Song:

A Survey of Machine Learning Algorithms and Techniques for Air Mobility Under Emergency Situations. 582-588 - Yao Yao, Chengwen Luo, Xingyu Feng, Yijing Huang

, Jin Zhang, Jian-qiang Li
:
EvoSense: Towards Self-evolving WiFi-based User Gait Recognition. 589-596 - Adamu Hussaini

, Cheng Qian
, Weixian Liao, Wei Yu
:
A Taxonomy of Security and Defense Mechanisms in Digital Twins-based Cyber-Physical Systems. 597-604 - Ko Watanabe, Yuki Matsuda

, Yugo Nakamura
, Yutaka Arakawa, Shoya Ishimaru:
How do Programmers Use the Internet? Discovering Domain Knowledge from Browsing and Coding Behaviors. 605-610 - Huanjun Hu, Jie Wang, Jing Wang, Shengwei Wang, Yixi Wang, Yuxuan Ye, Rongtao Liao:

Reliability Analysis and Optimization for Sensing Data Collection and Processing in New Energy Internet Systems. 611-616 - Xun-Yu Liu, Lei Wang, Xiaoliang Ma, Gongbin Chen, Cheng He, Jun Cheng:

3D Human Pose and Shape Estimation from Video. 617-624 - Jiahui Li, Jiaxin Yan, Baolin Yin, Liang Zhao, Ran Wei:

Resource Allocation and Computation Offloading in Ultra-reliable Low-latency Communication Systems via Deep Reinforcement Learning. 625-630 - Tianlong Xiong, Min Luo, Chao Yang, Qing Cheng, Yawen Liu:

MMC Online Thermal Simulation and Life Prediction based on Digital Twin Technology. 631-635 - Yijing Huang

, Chengwen Luo, Xingyu Feng, Zhongru Yang, Jin Zhang, Jian-qiang Li
:
LigNet: Lightweight Hand Tracking for Edge Intelligence. 636-642 - Weiqing Yao, Zhiwei Bao, Xian Luo, Jing Wang, Jie Wang:

Age Upon Decisions for Low-latency Services in Internet of Energy Systems. 643-647 - Jie Wang, Shengwei Wang, Jing Wang, Huanjun Hu, Yixi Wang, Yuxuan Ye, Rongtao Liao:

Short-Dataset-Driven Prediction on Area Electricity Consumption with Adaptive Training Window Selection. 648-653

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














