


default search action
ACM Transactions on Sensor Networks, Volume 21
Volume 21, Number 1, January 2025
- Haifeng Sun
, Haohua Du
, Xiaojing Yu
, Jiahui Hou
, Lan Zhang
, Xiangyang Li
:
IUAC: Inaudible Universal Adversarial Attacks Against Smart Speakers. 1:1-1:20 - Jiaoyan Chen
, Zhehao Cheng
, Jin Liu
, Xianjun Deng
, Laurence T. Yang
, Yihong Chen
:
Achieving Panoramic View Coverage in Visual Mobile Crowd-Sensing Networks for Emergency Monitoring Applications. 2:1-2:27 - Francesco Betti Sorbelli
, Sajjad Ghobadi
, Cristina M. Pinotti
:
Single- and Multi-Depot Optimization for UAV-Based IoT Data Collection in Neighborhoods. 3:1-3:30 - Quan Chen
, Zhipeng Cai
, Jing Li
, Ning Li
, Lianglun Cheng
, Hong Gao
, Song Guo
:
Structure-Adaptive and Power-Aware Broadcast Scheduling for Multihop Wireless-Powered IoT Networks. 4:1-4:32 - Hao Wang
, Haoran Zhang
, Lu Wang
, Shichang Xuan
, Qian Zhang
:
Fedeval: Defending Against Lazybone Attack via Multi-dimension Evaluation in Federated Learning. 5:1-5:23 - Huimin Chen
, Chaojie Gu
, Lilin Xu
, Rui Tan
, Shibo He
, Jiming Chen
:
Listen to Your Face: A Face Authentication Scheme Based on Acoustic Signals. 6:1-6:23 - Yuzheng Zhu
, Chengzhe Luo
, Yongpan Zou
, Dongping Chen
, Kaishun Wu
:
TimbreSense: Timbre Abnormality Detection for Bel Canto with Smart Devices. 7:1-7:20 - Jia Xu, Wenbin Chen, Haipeng Dai, Lijie Xu, Fu Xiao, Linfeng Liu:
Wireless Charging Scheduling for Long-term Utility Optimization. 8:1-8:31 - Shakhrul Iman Siam
, Hyunho Ahn
, Li Liu
, Samiul Alam
, Hui Shen
, Zhichao Cao
, Ness B. Shroff
, Bhaskar Krishnamachari
, Mani Srivastava
, Mi Zhang
:
Artificial Intelligence of Things: A Survey. 9:1-9:75 - Zhongcheng Wei
, Wei Chen
, Shuli Ning
, Weidong Lin
, Nan Li
, Bin Lian
, Xiang Sun
, Jijun Zhao
:
A Survey on WiFi-based Human Identification: Scenarios, Challenges, and Current Solutions. 10:1-10:32
Volume 21, Number 2, March 2025
- Ju Wang
, Liqiong Chang
, Shourya Aggarwal
, Omid Abari
, Srinivasan Keshav
:
Sustainable and Low-Cost Greenhouse Soil Moisture Monitoring Using Battery-Free RFID Sensors. 11:1-11:28 - Hui Huang
, Qiang Ye
, Yitong Zhou
:
Safety-Critical Offloading with Constrained Reinforcement Learning for Multi-access Edge Computing. 12:1-12:37 - Shengheng Liu
, Zihuan Mao
, Xingkang Li
, Mengguan Pan
, Peng Liu
, Yongming Huang
, Xiaohu You
:
Model-Driven Deep Neural Network for Enhancing Direction Finding with Commodity 5G gNodeB. 13:1-13:25 - Sukanya Jewsakul
, Edith C. H. Ngai
:
RACEME: Embedded Intelligence for Correlation-driven Predictive Energy-harvesting Management in LoRa Networks. 14:1-14:38 - Kalyan Nakka
, Habib M. Ammari
:
Hierarchical Deployment and Square Tessellation for Connected k-Coverage in Heterogeneous Planar Wireless Sensor Networks. 15:1-15:27 - Andrea Maioli
, Kevin Alessandro Quinones
, Saad Ahmed
, Muhammad Hamad Alizai
, Luca Mottola
:
Dynamic Voltage and Frequency Scaling for Intermittent Computing. 16:1-16:34 - Prithwi Bagchi
, Basudeb Bera
, Ashok Kumar Das
, Biplab Sikdar
:
Quantum Safe Lattice-Based Single Round Online Collaborative Multi-Signature Scheme for Blockchain-Enabled IoT Applications. 17:1-17:33 - Shengheng Liu
, Ningning Fu
:
Enabling Low-Power Massive MIMO with Ternary ADCs for AIoT Sensing. 18:1-18:26 - Siyuan Zhou
, Duc Van Le
, Linshan Jiang
, Zhuoran Chen
, Xiaohua Peng
, Daren Ho
, Jianmin Zheng
, Rui Tan
:
RoboCam: Model-Based Robotic Visual Sensing for Precise Inspection of Mesh Screens. 19:1-19:23 - Akram Hussain
, Yuan Luo
:
Spatial Correlations Based Fault Tolerant Source Localization Using Wireless Sensor Networks. 20:1-20:30 - Ke Xu
, Jiangtao Wang
, Hongyuan Zhu
, Dingchang Zheng
:
Evaluating Self-Supervised Learning for WiFi CSI-Based Human Activity Recognition. 21:1-21:38 - Kang Yang
, Yuning Chen
, Wan Du
:
FLog: Automated Modeling of Link Quality for LoRa Networks in Orchards. 22:1-22:28 - Rupendra Pratap Singh Hada
, Abhishek Srivastava
:
A Hybrid Approach for Localisation of Sensor Nodes in Remote Locations. 23:1-23:33 - Ziang Wang
, Chunhui Duan
, Jiawei Xue
, Fan Li
, Qihua Feng
, Yinan Zhu
, Ziyang Zhou
:
TagRecon: Fine-Grained 3D Reconstruction of Multiple Tagged Packages via RFID Systems. 24:1-24:25 - Yantao Li
, Yichao Wang
, Hongyu Huang
:
RPWAEAuth: Sensor-Based Continuous Authentication Using Reconstruction Probability in Wasserstein Autoencoder. 25:1-25:18

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.