


default search action
19th MSN 2023: Nanjing, China
- 19th International Conference on Mobility, Sensing and Networking, MSN 2023, Nanjing, China, December 14-16, 2023. IEEE 2023, ISBN 979-8-3503-5826-1

- Linqing Gui, Ling Deng, Cheng Peng, Hui Cai, Biyun Sheng, Zhengxin Guo, Fu Xiao:

MMHeart: An Efficient Heartbeat Monitoring System Based on MIMO mmWave Radar. 1-8 - Maolong Yin, Zhuo Sun, Bin Guo, Zhiwen Yu:

Effi-MAOT: A Communication-Efficient Multi-Camera Active Object Tracking. 9-16 - Luyao Jiang, Kai Liu, Chunhui Liu

, Hualing Ren, Guozhi Yan, Feiyu Jin, Songtao Guo:
LiDAR based Cooperative Sensing in Vehicular Edge Computing. 17-23 - Boxiao Zhang, Panlong Yang, Yubo Yan, Xin He, Weiwei Jiang:

PAssTrack: Practical and Accurate Passive Human Tracking System Using Commodity Wi-Fi. 24-31 - Sihan Ma, Xiangmao Chang, Yifan Zhang, Lele Zheng:

LoCount: Long-distance Crowd Counting Based on LoRa Signal. 32-39 - Shan Su, Haixing Xu, Liang Wang, Bin Guo, Zhiwen Yu:

Age-of-Information Driven Mobile Crowdsensing in Wireless Edge Computing. 40-47 - Guisong Yang, Jinwei Wu, Jiacai Li, Xingyu He, Yunhuai Liu, Fanglei Sun:

GRAIM: Game and Reverse Auction based Incentive Mechanism in Mobile Crowd Sensing. 48-55 - Yankan Yang, Baoqi Huang:

An Energy-Efficient Smartphone Positioning Scheme by Fusing WiFi, GPS and PDR. 64-71 - Elisei Ember, Jesús Puerta Pestana

, Michael Krisper
, Michael Stocker, Kay Römer
, Carlo Alberto Boano, Pablo Corbalán Pelegrín:
Impact of Feature Selection and CIR Window Length on NLoS Classification for UWB Systems. 72-80 - Bo Wang, Zihui Luo, Xiaolong Zheng, Liang Liu, Huadong Ma:

Software-Defined Collaborative Scheduling of Computing and Network Resources. 81-88 - Hongxiang Wang, Yifei Lu, Zhen Wang:

TSFCC: The Two-Stage Fast Congestion Control Algorithm Based on Software Defined Networking. 89-96 - Fei Gao, Wuyungerile Li, Nisuna Bao, Bing Jia:

An Adaptive MAC Protocol for Energy Harvesting Wireless Sensor Networks in Harsh Environment. 97-104 - Lei Wang, Yonghua Wang, Bingfeng Zheng:

Dynamic Power Control Method Based on Stacked SRU Network Combined with NoisyNet DQN for CRN. 105-112 - Yan Zhong, Hao Chen, Wei Liu, Lizhao You, Taotao Wang, Liqun Fu:

Deep Reinforcement Learning based Channel Allocation for Channel Bonding Wi-Fi Networks. 113-119 - Siyuan Zhou, Xiaojing Liu, Bin Tang, Guoping Tan:

Handover Probability in 3D Mobile UAV Cellular Networks. 120-126 - Xiao Zhao, Kan Yu, Dong Li, Xiaowu Liu, Chuanwen Luo:

Secure Ultra-reliable and Low Latency Communication in NOMA-UAV Networks. 127-134 - Huadong Guo, Weiqing Huang, Wen Wang, Jinglong Guo, Zhaohua Qiu:

An Interference Mitigation Strategy for LEO Satellite Systems based on Adaptive Beamforming with Sidelobe Suppression. 135-142 - Siyuan Zhou, Xiaofan Yu, Bin Tang, Zhihao Qu:

Handover Analysis with Spatially Correlated Blockage Model. 143-150 - Chengliang Wang, Jiayi He:

Distributed Cooperative Search Algorithm with Information Screening. 151-158 - Jialing Ni, Pan Qi, Jianfeng Lu:

Toward Quality-Aware Reverse Auction-based Incentive Mechanism for Federated Learning. 159-166 - Wenying Yao, Tong Liu, Yangguang Cui, Yanmin Zhu:

Heterogeneity-Aware Federated Learning with Adaptive Local Epoch Size in Edge Computing. 167-174 - Mingchang Shuang, Zhe Zhang, Yanchao Zhao:

Communication Efficient Personalized Federated Learning via Hierarchical Clustering and Layer-wise Aggregation. 175-182 - Jinxin Zhang, Fuyou Miao:

The Improved Data Aggregation Scheme for Wireless Sensor Networks Based on Robust Chinese Remainder Theorem. 183-190 - Shangrui Wu, Yupeng Li, Yang Xu, Qin Liu, Weijia Jia, Tian Wang:

EKDF: An Ensemble Knowledge Distillation Framework for Robust Collaborative Inference on Heterogeneous Edge Devices. 191-198 - Jianfeng Rao, Tong Liu, Yangguang Cui, Yanmin Zhu:

A Meta Reinforcement Learning-based Scheme for Adaptive Service Placement in Edge Computing. 199-206 - Senlei Bao, Shubin Zhang, Kaikai Chi, Xiaolong Chen, Wei Gao:

Lyapunov-Based Computation Rate Maximization for Wireless Powered Edge Computing. 207-214 - Chao Sang, Jianhua Li, Jun Wu, Wu Yang:

ECADA: An Edge Computing Assisted Delay-Aware Anomaly Detection Scheme for ICS. 215-222 - Jian An, Yunxiang Zhao, Feifei Wang, Xin He, Xiaolin Gui:

A Method for Person Re-Identification and Trajectory Tracking in Cross-Device Edge Environments. 223-229 - Fangyi Mou, Zhiqing Tang, Jiong Lou, Jianxiong Guo, Wenhua Wang, Tian Wang:

Joint Task Scheduling and Container Image Caching in Edge Computing. 230-237 - Zimo Ma, Jun Zhao:

QoS Aware Resource Management in Mobile Edge Computing for Emerging Artificial Intelligence (AI) Applications. 238-245 - Xia Deng, Guole Lin, Le Chang, Fei Tong:

Deep Reinforcement Learning for QoE-Aware Offloading in Space-Terrestrial Integrated Networks. 246-253 - Zhenxuan Xu, Xiaolin Guo, Zhaowu Huang, Shucun Fu, Fang Dong:

ROIAdaptor: Adaptive Task Offloading of ROI-Encoded Videos for Edge Video Analytics. 254-261 - Shujuan Tian, Song Zou, Yi Tan, Dongsu Shen, Yanchun Li:

Dynamic Content Cache Strategy Based on Content Prediction in the Internet of Vehicles. 262-269 - Siyuan Li

, Xi Lin, Gaolei Li, Lixing Chen, Siyi Liao, Jing Wang, Jianhua Li:
DPG-DT: Differentially Private Generative Digital Twin for Imbalanced Learning in Industrial IoT. 270-276 - Kunze Li, Yuxiao Ren, Zhiping Lin, Liang Xiao:

Reinforcement Learning Based Friendly Jamming for Digital Twins Against Active Eavesdropping. 277-284 - Jiale Lei

, Peihao Yang, Linghe Kong
, Yehan Ma, Xingjian Lu, Deyu Lin, Guihai Chen, E. Zhao:
ACORN: Adaptive Compression-Reconstruction for Video Services in 5G-U Industrial IoT. 285-292 - Junquan Fan, Jiahui Hou, Xiangyang Li:

Accurate Deep Learning Inference Latency Prediction over Dynamic Running Mobile Devices. 293-300 - Tingpei Huang, Shiyu Guo, Hu Zhu, Jianhang Liu, Shibao Li:

Mobile User Pairing Scheme in NOMA-Enabled Backscatter Communication Networks. 301-308 - Bingling Luo, Hongxia Wang, Fei Zhang, Jinghong Xia, Heng Wang:

Adaptive Robust Watermarking for Color Images. 309-316 - Jianqi Du, Zidong Zhang

, Fenghao Xu, Wenrui Diao:
Living in the Past: Analyzing BLE IoT Devices Based on Mobile Companion Apps in Old Versions. 317-324 - Yu Yu, Yulian Pan, Wenjia Wu, Ming Yang:

MASA: Measurement and Analysis of MAC Address Randomization with Sniffer Array. 325-332 - Bo Chen, Chen Yang, Can Wang, Xuangou Wu:

Web Fingerprint Defense with Timing-assistant Traffic Burst Shaping. 333-340 - Lei Guo, Shan Jing, Liang Wei, Chuan Zhao:

Crossfire Attack Defense Method Based on Virtual Topology. 341-350 - Huiping Qian, Hao Han, Xiaojun Zhu, Fengyuan Xu:

ShuffleCAN: Enabling Moving Target Defense for Attack Mitigation on Automotive CAN. 351-358 - Xijie Ba, Jiaqi Yang, Cong Ma:

A Lightweight Zone Authentication Scheme with Auto-Refreshing Pseudonyms for C-V2X. 359-366 - Hongyu Yang, Tao Zhang, Ze Hu, Liang Zhang, Xiang Cheng:

An Improved Capsule Network for DGA Domain Detection. 367-373 - Jiyun Yang, Can Gui, Zhibo Zhang, Wanli Liu:

A Novel Permission Filtering Approach for Android Malware Detection and Malware Family Classification. 374-381 - Fei Lv, Rongkang Sun, Hangyu Wang, Meng Zhang, Shuaizong Si, Zhe Bu, Chengsheng Zhou, Limin Sun:

CNN-PSO-KELM: A Deep Learning Intrusion Detection Model for Imbalanced IoT Data. 382-389 - Huaishuo Ren, Liangyi Gong, Xiuliang Mo, Lanqi Yang, Zuwei Yin:

Robust Intrusion Detection for Industrial IoT. 390-397 - Xiao Cui, Xiaohui Han, Guangqi Liu, Wenbo Zuo, Zhiwen Wang:

Communication-Efficient Federated Learning for Network Traffic Anomaly Detection. 398-405 - Jinli Zhang, Feng Dai, Yaqin Cao, Ru Tan, Xiang Cui, Qixu Liu:

SWDNet: Stealth Web Shell Detection Technology based on Triplet Network. 406-414 - Zhenfei Zhang, Ping Li, Biaokai Zhu, Tao Wu, Panlong Yang, Zhao Lv:

Arrow: Capture the Inaudible Attacker in 3D Space via Smart-speaker. 415-422 - Benteng Zhang

, Yingchi Mao, Zijian Tu, Xiaoming He, Ping Ping, Jie Wu:
Optimizing Privacy-Accuracy Trade-off in DP-FL via Significant Gradient Perturbation. 423-430 - Juan Du, Zhicheng Xu, Duanyang Liu, Xiaoli Zhang, Hongbing Cheng:

EPT: Enhancing User Transparency for Confidential Smart Contract. 431-438 - Siyi Wei, Jinbin Tu, Yun Wang:

A Non-Intrusive and Real-Time Data Provenance Method for DDS Systems. 439-446 - Xinyang Li, Yujue Wang, Yong Ding, Yijie Zhou, Changsong Yang

, Zhenwei Guo:
A Lightweight Privacy-Preserving Data Sharing Scheme Supporting Intelligent Pricing in Smart Grid. 447-454 - Jiahui Huang, Lan Zhang, Anran Li, Haoran Cheng, Jiexin Xu, Hongmei Song:

Adaptive and Efficient Participant Selection in Vertical Federated Learning. 455-462 - Yuxin Zhao, Guangyu Wu, Jiahui Hou, Xiang-Yang Li:

Supvirus: A Scenario-Oriented Feature Poisoning Attack Approach in SplitFed Learning. 463-471 - Jiguang Lv, Shuchun Xu, Yi Ling, Dapeng Man, Shuai Han, Wu Yang:

Data Poisoning Attack Based on Privacy Reasoning and Countermeasure in Federated Learning. 472-479 - Nengfu Cai, Zhiqin Yang, Shuhai Wang, Yanling Jiang, Mingsheng Liu, Gang Li:

Efficient Side-Channel Attack through Balanced Labels Compression and Variational Autoencoder. 480-487 - Jiangtao Liao, Huidan Hu, Keke Huang, Huasong Jin, Changlu Lin:

LDfuzz: A Directed Greybox Fuzzer for Solidity Smart Contract. 488-495 - Qianniu Chen, Kang Fu, Li Lu

, Meng Chen, Zhongjie Ba, Feng Lin, Kui Ren:
BypTalker: An Adaptive Adversarial Example Attack to Bypass Prefilter-enabled Speaker Recognition. 496-503 - Yingcheng Wang, Songtao Guo, Dewen Qiao

:
FedSG: Subgraph Federated Learning on Multiple Non-IID Graphs. 504-511 - Weiheng Tang, Lin Chen, Xu Chen:

A Straggler-resilient Federated Learning Framework for Non-IID Data Based on Harmonic Coding. 512-519 - Yingchi Mao, Zibo Wang, Jun Wu, Lijuan Shen, Shufang Xu, Jie Wu:

Two-way Delayed Updates with Model Similarity in Communication-Efficient Federated Learning. 520-527 - Qian Che, Yixuan Li, Ziyao Peng, Wanyuan Wang, Yichuan Jiang:

Decentralized Subgoal Tree Search for Multiagent Planning without Priors or Communication. 528-535 - Yichen Wei, Guang Cheng, Tian Qin, Zihan Chen:

A Hypernetwork-based Personalized Federated Learning Framework for Encrypted Traffic Classification. 536-543 - Jun Nie, Danyang Xiao, Lei Yang, Weigang Wu:

FedCME: Client Matching and Classifier Exchanging to Handle Data Heterogeneity in Federated Learning. 544-552 - Xiaohui Wei, Didi Jiao, Shiyu Tong, Zijian Li

, Chenghao Ren, Hengshan Yue:
CFPA: Cognitive Federated Partial Adaptation for Effective Personalization. 553-561 - Xiangqian Li, Chunmei Ma, Baogui Huang, Guangshun Li:

Communication-Efficient Personalized Federated Learning on Non-IID Data. 562-569 - Weiyan Wang, Yiming Zhang, Yilun Jin, Han Tian, Li Chen:

MDP: Model Decomposition and Parallelization of Vision Transformer for Distributed Edge Inference. 570-578 - Wenxing Zhu, Xiangxue Li:

Secure Mutual Learning with Low Interactions for Deep Model Training. 579-587 - Guoqiang Zhao, Xiaoyun Yan, Aodie Cui, Chang Hu, Jiaqi Bao, Junjie Huang:

TSTR: A Real-Time RGB-Thermal Semantic Segmentation Model with Multimodal Fusion Transformers. 588-595 - Xuke Wu, Lan Wang, Mingjiang Xie, Kun Shan:

A Well-Designed Regularization Scheme for Latent Factorization of High-Dimensional and Incomplete Water-Quality Tensors from Sensor Networks. 596-603 - Lingyi Xu

, Xingyuan Liang, Xiaolei Zhou, Tian He:
Multi-Stage Vehicle Dispatch for Community Group-buying Logistics via Deep Reinforcement Learning. 604-611 - Xihui Li, Zhenhua Tan, Ziwei Cheng, Xiaoer Wu:

Lipreading using Joint Preception Temporal Convolutional Network. 612-619 - Xue Wang, Xingwei Wang, Jie Jia, Xijia Lu

, Min Huang:
A Scheduling optimization Mechanism Combining Q-learning and Genetic Algorithm. 620-627 - Tianyu Zeng, Xiaoxi Zhang, Daipeng Feng, Jingpu Duan, Zhi Zhou, Xu Chen:

RLink: Accelerate On-Device Deep Reinforcement Learning with Inference Knowledge at the Edge. 628-635 - Jiongkun Su, Junmei Yao, Ruitao Xie, Kaishun Wu:

DeepSpectrum: A Deep-Learning-based Spectrum Identification for Wireless Signals. 636-643 - Xi Zheng, Hongcheng Xie, Yu Guo, Rongfang Bie:

FedIR: Learning Invariant Representations from Heterogeneous Data in Federated Learning. 644-651 - Tao Xing, Helei Cui, Yaxing Chen, Zihui Luo, Bin Guo, Zhiwen Yu, Xiaobing Guo, Yirong Ma:

Harnessing Edge Computing Resources for Accelerating Industrial Tasks. 652-659 - Qiufen Xia, Zhou Xu, Zhuangze Hou:

Incentive Mechanism Based on Double Auction for Federated Learning in Satellite Edge Clouds. 660-668 - Nan Liu

, Tom H. Luan
, Yuntao Wang, Yiliang Liu, Zhou Su:
Auction-Based Dynamic Resource Allocation in Social Metaverse. 669-676 - Junjian Li, Honglong Chen, Yudong Gao, Kai Lin, Yuping Liu:

B³A: Bokeh Based Backdoor Attack with Feature Restrictions. 677-684 - Ranran Wang, Zhaokang Zhang, Yiran Wang, Yin Zhang:

Minimal Substitution-based Label Propagation for Anomalous Blockchain Detection. 685-692 - Kai Ding, Yidu Huang, Ming Tao, Renping Xie, Xueqiang Li, Shuling Yang:

Improved LSTM Algorithm for WBGT Index Prediction in Smart Cities. 693-698 - Qili Guo, Chengzhe Lai, Haoyan Ma, Dong Zheng:

A Group-oriented Authentication Scheme for IoT Devices in 5G Networks. 699-706 - Zhihai Tang, Aiwen Huang

, Yonghua Wang, Le Chang, Tian Wang:
Edge Servers on Wheels: Deployment and Route Planning of Mobile Servers for Internet of Vehicles. 707-713 - Xingying Wang, Linwen Zhang, Hang Tu, Qin Liu

, Man Zhou:
Smart Card Auto-Selection Using GPS and WiFi Fingerprints for Smartphones. 714-721 - Zhaobin Ma

, Zhiqiang Lv
, Jianbo Li, Fengqian Xia:
A Spatio-Temporal Tree and Gauss Convolutional Network for Traffic Flow Forecasting. 722-729 - Bin Tang, Nuo Yu, Fen Han, Jiakai Gong, Yuan Ge:

Collaborative Service Placement and Request Scheduling in Mobile Edge Networks. 730-735 - Yanfei Jiang, Lian Wen, Shaoyang Zhang, Yongli Liu:

Comparing Different Neural Network Models on Subway Traffic Volume Forecast. 736-743 - Bo Xu, Haitao Zhao, Haiguang Lai, Xiaozhen Lu:

Similarity-aware Contract Design for Multi-task Federated Learning in Vehicular Networks. 744-749 - Pengfei Du, Tingyue Xiao, Ziyue Liu, Chaojin Qing:

AI-Based 3D UAV Coverage Deployment for Internet of Vehicles in the Complex Mountain Environment. 750-755 - Longze Li, Haitao Zhao, Wenxue Sun, Zhuoran Xu, Yihang Jia, Shuyi Ma:

Performance Analysis of Multi-RIS Aided Communication Under Weibull Fading. 756-761 - Jie Li, Jiaqi Liu, Bin Guo:

HAMF: Highly Adaptable Multi-graph Fusion for Cross-domain Graphs. 762-767 - Rongli Gai, Huatian Zhang, Zhibin Guo, Xiangzhou Kong, Shan Qin:

Blueberry flower detection algorithm based on improved YOLOv8. 768-773 - Yuxi Wang, Wanyu Song, Zheng Zhang, Longze Li, Yiyang Ni:

An Indoor Positioning Method Based on Quadratic Space Judgment. 774-779 - Chaoqiang Yang, Liancheng Zhang, Yi Gou, Wenhao Xia, Ming Hu, Jichang Wang:

Trace6: A Practical Threatener Traceback Model in IPv6 Network. 780-785 - Weiping Zhu, Haoyang Li, Ning Ding, Yukang Chen, Yufei Sun, Chao Ma, Wei Li:

Virtual Target Based Multi-agent Surrounding Approach. 786-793 - Yue He, Chen Mu, Yu Sun:

Enhancing Intersection Signal Control: Distributional Double Dueling Deep Q-learning Network with Priority Experience Replay and NoisyNet Approach. 794-799 - Yu Sun, Chen Mu, Jing Sun, Yue He:

A Greedy Algorithm-based Approach for Dynamic Carpooling Matching and Route Selection in Ride-hailing. 800-805 - Ziheng Li, Xiyang Peng, Yuting Zhao, Xulong Wang, Yun Yang, Po Yang:

A Weakly Supervised Learning Framework for Parkinson's Disease Assessment Using Wearable Sensor. 813-818 - Junwei Tang, Qiaosen Pi, Ruhan He, Jin Huang, Tao Peng, Xinrong Hu, Wenlong Tian:

A lightweight method for Android malware classification based on teacher assistant distillation. 819-824 - Heng Zhang, Lei Wu, Zhemin Sun, Zhikai Zhang, Ming Li, Hongran Li, Jian Zhang

:
Maximizing Throughput in Unmanned Surface Vehicle Relay System under Jamming Attacks. 825-830 - Chaoqun Liu, Xuanpeng Li, Guangyu Li, Chen Gong:

An Efficient Skip Link-based Traffic Prediction Algorithm with Multi-Scale Feature Extraction. 831-836 - Jifei Zhu, Ziwei Liu, Yimao Sun, Yanbing Yang:

SemiGest: Recognizing Hand Gestures via Visible Light Sensing with Fewer Labels. 837-842 - Jing Wang, Xi Lin, Jun Wu, Qinghua Mao, Bei Pei, Jianhua Li, Suchang Guo, Baitao Zhang:

Multi-Level ACE-based IoT Knowledge Sharing for Personalized Privacy-Preserving Federated Learning. 843-848 - Kang Yan, Nina Shu, Tao Wu, Chunsheng Liu, Jun Huang, Jingbo Yu

:
Joint Client Selection and Training optimization for Energy-Efficient Federated Learning. 849-854 - Han Zhang, Libo Chen, Ming Liu, Yong Shi, Songyang Wu, Zhi Xue:

Both Sides Needed: A Two-Dimensional Measurement Study of Email Security Based on SPF and DMARC. 855-861 - Jinxin Zhang, Fuyou Miao:

A Novel Data Aggregation Scheme for Wireless Sensor Networks Based on Residue Number System with Nonpairwise-Prime Moduli. 862-867 - Yuhang Shan, Guang Cheng, Zihan Chen:

Identifying Fine-Grained Douyin User Behaviors via Analyzing Encrypted Network Traffic. 868-875 - Cheng Chi, Wenqu Chen, Jinqiu He:

Do Non-competing Data Intermediaries Matter? A Property Rights Perspective. 876-881

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














