default search action
GLOBECOM 2017: Singapore
- 2017 IEEE Global Communications Conference, GLOBECOM 2017, Singapore, December 4-8, 2017. IEEE 2017, ISBN 978-1-5090-5019-2
- Abdalla E. Abdelrahman, Najah AbuAli, Hossam S. Hassanein:
Driver Behavior Classification in Crash and Near-Crash Events Using 100-CAR Naturalistic Data Set. 1-6 - Lei Zhong, Yusheng Ji, Xiaoyan Wang, Shigeki Yamada, Kiyoshi Takano, Guoliang Xue:
Population-Aware Relay Placement for Wireless Multi-Hop Based Network Disaster Recovery. 1-6 - Amr S. El-Wakeel, Abdalla Osman, Aboelmagd Noureldin, Hossam S. Hassanein:
Road Test Experiments and Statistical Analysis for Real-Time Monitoring of Road Surface Conditions. 1-6 - Nouredine Tamani, Bouziane Brik, Nasreddine Lagraa, Yacine Ghamri-Doudane:
Vehicular Cloud Service Provider Selection: A Flexible Approach. 1-6 - Hongjian Peng, Weijia Jia:
WiFind: Driver Fatigue Detection with Fine-Grained Wi-Fi Signal Features. 1-6 - Xiaoru Zhang, Lin Gao, Bin Cao, Zhang Li, Mengjing Wang:
A Double Auction Mechanism for Mobile Crowd Sensing with Data Reuse. 1-6 - Mohannad A. Alswailim, Hossam S. Hassanein, Mohammad Zulkernine:
A Participant Contribution Trust Scheme for Crisis Response Systems. 1-6 - Jingwei Liu, Fanghui Cai, Longfei Wu, Rong Sun, Liehuang Zhu, Xiaojiang Du:
EPDA: Enhancing Privacy-Preserving Data Authentication for Mobile Crowd Sensing. 1-6 - Zone-Ze Wu, Cheng-Wei Wu, Lan-Da Van, Yu-Chee Tseng:
Qnalyzer: Queuing Recognition Using Accelerometer and Wi-Fi Signals. 1-7 - Prompong Pakawanwong, Vorapong Suppakitpaisarn, Liwen Xu, Naonori Kakimura:
Reducing Recovery Error in Compressive Sensing with Limited Number of Base Stations. 1-7 - Fatima Zahra Djiroun, Miloud Bagaa, Tarik Taleb:
A Markov Decision Process-Based Collision Avoidance in IoT Applications. 1-6 - Jian Su, Yongrui Chen, Zhengguo Sheng, Le Sun:
Bit Query Based M-ary Tree Protocol for RFID Tags Identification. 1-7 - Qihao Li, Kuan Zhang, Michael Cheffena, Xuemin Shen:
Channel-Based Sampling Rate and Queuing State Control in Delay-Constraint Industrial WSNs. 1-6 - Yangbin Zhang, Kaigui Bian, Lin Chen, Pan Zhou, Xiaoming Li:
Dynamic Slot-Length Control for Reducing Neighbor Discovery Latency in Wireless Sensor Networks. 1-6 - Sanjeev Sharma, Anubha Gupta, Vimal Bhatia:
Joint Estimation of ToA and Data Symbols in UWB Communication in Presence of Impulsive Interference. 1-7 - Shuai Han, Yi Li, Weixiao Meng, Chenguang He:
A New High Precise Indoor Localization Approach Using Single Access Point. 1-5 - Marzieh Mahrokh, Esfadiar Mehrshahi, Kumbesan Sandy Sandrasegaran:
Accurate RSS-Based Positioning Using a Terrain-Independent Dynamic Propagation Model. 1-6 - Avishek Patra, Sven Wittig, Andra M. Voicu, Ljiljana Simic, Marina Petrova:
Experimental Evaluation of Radio Tomographic Imaging Algorithms for Indoor Localization with Wi-Fi. 1-7 - Lin Ma, Wan Zhao, Yubin Xu, Cheng Li:
Radio Map Noise Reduction Method Using Hankel Matrix for WLAN Indoor Positioning System. 1-7 - Cam Ly Nguyen, Aftab Khan:
WiLAD: Wireless Localisation through Anomaly Detection. 1-7 - Tianqi Yu, Xianbin Wang, Abdallah Shami:
A Novel Fog Computing Enabled Temporal Data Reduction Scheme in IoT Systems. 1-5 - Ademar Takeo Akabane, Rafael L. Gomes, Richard W. Pazzi, Edmundo R. M. Madeira, Leandro A. Villas:
APOLO: A Mobility Pattern Analysis Approach to Improve Urban Mobility. 1-6 - Feng Yi, Yu Gu, Hongtao Wang, Yuyan Sun, Limin Sun:
Mobility Pattern Based Relationship Inference from Spatiotemporal Data. 1-6 - Xiaoli Zhou, Azzedine Boukerche:
Performance Analysis of Traffic-Adaptive MAC Strategies for Mobile Device-to-Device Communications. 1-6 - Mohammed Zaki Hasan, Fadi Al-Turjman:
SWARM-Based Data Delivery Framework in the Ad Hoc Internet of Things. 1-6 - Mai Ali, Tuan Nguyen Gia, Abd-Elhamid M. Taha, Amir M. Rahmani, Tomi Westerlund, Pasi Liljeberg, Hannu Tenhunen:
Autonomous Patient/Home Health Monitoring Powered by Energy Harvesting. 1-7 - Quang Duy La, Duong Nguyen-Nam, Mao Van Ngo, Tony Q. S. Quek:
Coexistence Evaluation of Densely Deployed BLE-Based Body Area Networks. 1-6 - Omar Ait Oualhaj, Mouna Elmachkour, Abdellatif Kobbane, Jalel Ben-Othman:
Graph-Based MDP to Mobile Source with Energy Harvesting in Delay Tolerant Networks System. 1-6 - Ya Gao, Wenchi Cheng, Hailin Zhang, Zan Li:
Optimal Resource Allocation with Heterogeneous QoS Provisioning for Wireless Powered Sensor Networks. 1-6 - Zheng Chu, Tuan Anh Le, Duc To, Huan Xuan Nguyen:
Sum Throughput Optimization for Wireless Powered Sensor Networks. 1-6 - Kai Kientopf, Mesut Günes:
Analyze the 2-Hop-Neighborhood for Efficient Broadcasting in Wireless Multi Hop Networks. 1-6 - Taha Bouchoucha, Chen-Nee Chuah, Zhi Ding:
Finding Link Topology of Large Scale Networks from Anchored Hop Count Reports. 1-6 - Dong-Kyu Kang, Hyung-Sin Kim, Saewoong Bahk:
ORPL-DT: Opportunistic Routing for Diverse Traffic in Multihop IoT Networks. 1-6 - Lanhua Li, Xiaoxia Huang, Shimin Gong:
Robust Cooperative Routing for Ambient Backscatter Wireless Sensor Networks. 1-6 - Nidal Nasser, Lutful Karim, Asmaa Ali, Muhammad Anan, Nesrine Khelifi:
Routing in the Internet of Things. 1-6 - Kyatsandra G. Nagananda, Chandra R. Murthy:
A Hypothesis Test for Topology Change Detection in Wireless Sensor Networks. 1-6 - Alex Burns, Longfei Wu, Xiaojiang Du, Liehuang Zhu:
A Novel Traceroute-Based Detection Scheme for Wi-Fi Evil Twin Attacks. 1-6 - Alex Mayle, Neda Hajiakhoond Bidoki, Sina Masnadi, Ladislau Bölöni, Damla Turgut:
Investigating the Value of Privacy within the Internet of Things. 1-6 - Jerzy Konorski, Szymon Szott:
Modeling a Traffic Remapping Attack Game in a Multi-Hop Ad Hoc Network. 1-7 - Jixin Feng, Warren E. Dixon, John M. Shea:
Positioning Helper Nodes to Improve Robustness of Wireless Mesh Networks to Jamming Attacks. 1-6 - Yong Feng, Nianbo Liu, Feng Wang, Qian Qian, Xiaodong Fu:
A Framework of Mobile Energy Replenishment for Wireless Sensor and Actuator Networks. 1-6 - Thien D. Nguyen, Jamil Y. Khan, Duy T. Ngo:
A Self-Sustainable RF Energy Harvesting Algorithm for WSN-Based IoT Applications. 1-6 - Geng Sun, Yanheng Liu, Meng Yang, Aimin Wang, Ying Zhang:
Charging Nodes Deployment Optimization in Wireless Rechargeable Sensor Network. 1-6 - Jinqi Zhu, Yong Feng, Ming Liu, Zhaonian Zhang, Chunmei Ma:
Node Failure Avoidance Mobile Charging in Wireless Rechargeable Sensor Networks. 1-6 - Kai Li, Wei Ni, Lingjie Duan, Mehran Abolhasan, Jianwei Niu:
SWPT: A Joint-Scheduling Model for Wireless Powered Sensor Networks. 1-6 - Xianfeng Li, Tao Zhang, Jianfeng Li:
A Particle Swarm Mobility Model for Flying Ad Hoc Networks. 1-6 - Mohamed Ayoub Messous, Amel Arfaoui, Ahmed Alioua, Sidi-Mohammed Senouci:
A Sequential Game Approach for Computation-Offloading in an UAV Network. 1-7 - Yuzhe Yang, Zijie Zheng, Kaigui Bian, Yun Jiang, Lingyang Song, Zhu Han:
Arms: A Fine-Grained 3D AQI Realtime Monitoring System by UAV. 1-6 - Yan Pan, ShiNing Li, Xiao Zhang, Jianhang Liu, Zhichuan Huang, Ting Zhu:
Directional Monitoring of Multiple Moving Targets by Multiple Unmanned Aerial Vehicles. 1-6 - So-Yeon Park, Dahee Jeong, Christina Suyong Shin, HyungJune Lee:
DroneNet+: Adaptive Route Recovery Using Path Stitching of UAVs in Ad-Hoc Networks. 1-7 - Rui Zhang, Feng Yan, Weiwei Xia, Song Xing, Yi Wu, Lianfeng Shen:
An Optimal Roadside Unit Placement Method for VANET Localization. 1-6 - Fan Jiang, Cheng Li, Zijun Gong:
Block Gauss-Seidel Method Based Detection in Vehicle-to-Infrastructure Massive MIMO Uplink. 1-6 - Billy Kihei, John A. Copeland, Yusun Chang:
Cepstral Analysis for Classifying Car Collisions in LOS/NLOS Vehicle-to-Vehicle Networks. 1-6 - Yilong Hui, Zhou Su, Tom H. Luan:
Optimal Access Control in Heterogeneous Vehicular Networks: A Game Theoretic Approach. 1-5 - Seyyedali Hosseinalipour, Anuj Nayak, Huaiyu Dai:
Real-Time Strategy Selection for Mobile Advertising in VANETs. 1-6 - Peng Sun, Noura Aljeri, Azzedine Boukerche:
A Novel Passive Road Side Unit Detection Scheme in Vehicular Networks. 1-5 - Jihene Rezgui, Soumaya Cherkaoui:
An M2M Access Management Scheme for Electrical Vehicles. 1-6 - Pengwenlong Gu, Cunqing Hua, Rida Khatoun, Yue Wu, Ahmed Serhrouchni:
Cooperative Anti-Jamming Relaying for Control Channel Jamming in Vehicular Networks. 1-6 - Agon Memedi, Hsin-Mu Tsai, Falko Dressler:
Impact of Realistic Light Radiation Pattern on Vehicular Visible Light Communication. 1-6 - Wellington Lobato, Denis do Rosário, Mario Gerla, Leandro A. Villas:
Platoon-Based Driving Protocol Based on Game Theory for Multimedia Transmission over VANET. 1-6 - Yi Dou, Henry C. B. Chan:
Access Pattern Hidden Query over Encrypted Data through Multi-Clouds. 1-6 - Hassan Mahdikhani, Rongxing Lu:
Achieving Privacy-Preserving Multi Dot-Product Query in Fog Computing-Enhanced IoT. 1-6 - Wan-Ni Shih, Tai-Lin Chin:
Approximate Multi-Keyword Rank Search on Encrypted Cloud Data. 1-5 - Maximilian Zeiser, Johann Betz, Dirk Westhoff:
Cache Covert-Channel Mitigation in Cloud Virtualization with XEN's Credit Scheduler. 1-7 - Xiaofan He, Juan Liu, Richeng Jin, Huaiyu Dai:
Privacy-Aware Offloading in Mobile-Edge Computing. 1-6 - Sultan Basudan, Xiaodong Lin, Karthik Sankaranarayanan:
An Efficient Compromised Node Revocation Scheme in Fog-Assisted Vehicular Crowdsensing. 1-6 - Xiaozhen Lu, Dongjin Xu, Liang Xiao, Lei Wang, Weihua Zhuang:
Anti-Jamming Communication Game for UAV-Aided VANETs. 1-6 - Shichao Lv, Liang Xiao, Qing Hu, Xiaoshan Wang, Changzhen Hu, Limin Sun:
Anti-Jamming Power Control Game in Unmanned Aerial Vehicle Networks. 1-6 - Xinyu Yang, Teng Wang, Xuebin Ren, Wei Yu:
Copula-Based Multi-Dimensional Crowdsourced Data Synthesis and Release with Local Privacy. 1-6 - Lei Xu, Chunxiao Jiang, Jianhua Li, Youjian Zhao, Yong Ren:
Privacy Preserving Distributed Classification: A Satisfaction Equilibrium Approach. 1-6 - Muhammad Naveed Aman, Kee Chaing Chua, Biplab Sikdar:
A Light-Weight Mutual Authentication Protocol for IoT Systems. 1-6 - Qianqian Xing, Baosheng Wang, Xiaofeng Wang, Yong Tang, Yi Wang:
Deja Q Encore RIBE: Anonymous Revocable Identity-Based Encryption with Short Parameters. 1-6 - Jia Zhang, Hai-Xin Duan, Wu Liu, Xingkun Yao:
How to Notify a Vulnerability to the Right Person? Case Study: In an ISP Scope. 1-7 - Seongwon Han, Daehyun Ban, Woojin Park, Mario Gerla:
Localization of Sybil Nodes with Electro-Acoustic Positioning in VANETs. 1-6 - Chenyu Huang, Zhice Yang, Huangxun Chen, Qian Zhang:
Signing in the Air w/o Constraints: Robust Gesture-Based Authentication for Wrist Wearables. 1-6 - Chen Tian, Pinyi Ren, Qinghe Du, Li Sun, Yichen Wang:
An Artificial Noise-Based Security Scheme for Interference Alignment-Based Wireless Networks. 1-6 - Ye Fan, Xuewen Liao, Zhenzhen Gao:
Joint Energy Harvesting and Jamming Design in Secure Communication of Relay Network. 1-6 - Wei Wang, Kah Chan Teh, Sheng Luo, Kwok Hung Li:
Secure Transmission in MISOME Wiretap Channels with Half and Full-Duplex Active Eavesdroppers. 1-6 - Milad Tatar Mamaghani, Abbas Mohammadi, Phee Lep Yeoh, Ali Kuhestani:
Secure Two-Way Communication via a Wireless Powered Untrusted Relay and Friendly Jammer. 1-6 - Maggie X. Cheng, Yi Ling, Wei Biao Wu:
Time Series Analysis for Jamming Attack Detection in Wireless Networks. 1-7 - Neminath Hubballi, Mayank Swarnkar:
BitCoding: Protocol Type Agnostic Robust Bit Level Signatures for Traffic Classification. 1-6 - Weizhi Meng, Fei Fei, Wenjuan Li, Man Ho Au:
Evaluating Challenge-Based Trust Mechanism in Medical Smartphone Networks: An Empirical Study. 1-6 - Henrik Forssell, Ragnar Thobaben, Hussein Al-Zubaidy, James Gross:
On the Impact of Feature-Based Physical Layer Authentication on Network Delay Performance. 1-6 - Yao Zhang, Lijia Xie, Dong Zhang, Gang Liu, Qi Wang:
Scalable Bandwidth Allocation Based on Domain Attributes: Towards a DDoS-Resistant Data Center. 1-6 - Danye Wu, Zhiwei Xu, Bo Chen, Yujun Zhang:
Towards Access Control for Network Coding-Based Named Data Networking. 1-6 - Lorenzo Mucchi, Luca Simone Ronga, Kaibin Huang, Yifan Chen, Rui Wang:
A New Physical-Layer Security Measure - Secrecy Pressure. 1-6 - Bin Chen, Tanya Ignatenko, Frans M. J. Willems, Roel Maes, Erik van der Sluis, Georgios N. Selimis:
A Robust SRAM-PUF Key Generation Scheme Based on Polar Codes. 1-6 - Jinsong Hu, Shihao Yan, Xiangyun Zhou, Feng Shu, Jiangzhou Wang:
Covert Communication in Wireless Relay Networks. 1-6 - Weidong Mei, Zhi Chen, Jun Fang:
Outage-Constrained Secure D2D Underlay Communication with Arbitrarily Distributed CSI Uncertainty. 1-7 - Yajun Yin, Tiejun Lv, P. Takis Mathiopoulos, Yueming Lu:
Physical Malicious Attacks Detection in AF Relaying Systems with Unreliable CSI. 1-6 - Zhen Ling, Kaizheng Liu, Yiling Xu, Yier Jin, Xinwen Fu:
An End-to-End View of IoT Security and Privacy. 1-7 - Xiaojie Yu, Xiaojun Chen, Jinqiao Shi, Liyan Shen, Dakui Wang:
Efficient and Scalable Privacy-Preserving Similar Document Detection. 1-7 - Jianbing Ni, Xiaodong Lin, Xuemin Shen:
Privacy-Preserving Data Forwarding in VANETs: A Personal-Social Behavior Based Approach. 1-6 - Jiajun Zhang, Xiaohui Liang, Zhikun Zhang, Shibo He, Zhiguo Shi:
Re-DPoctor: Real-Time Health Data Releasing with W-Day Differential Privacy. 1-6 - Liang Fang, Lihua Yin, Qiaoduo Zhang, Fenghua Li, Binxing Fang:
Who Is Visible: Resolving Access Policy Conflicts in Online Social Networks. 1-6 - Mohamed Amine Arfaoui, Ali Ghrayeb, Chadi Assi:
Achievable Secrecy Sum-Rate of the MISO VLC Broadcast Channel with Confidential Messages. 1-6 - Hui Ma, Julian Cheng, Xianfu Wang:
Cooperative Jamming Aided Robust Beamforming for MISO Channels with Unknown Eavesdroppers. 1-5 - Avishek Mukherjee, Alexander William Garvin, Santiago Enrique Sanchez, Zhenghao Zhang:
Experimental Evaluation of Time Bounded Anti-Spoofing (TBAS) in MIMO Systems. 1-6 - Xiaowen Tian, Ming Li, Zihuan Wang, Qian Liu:
Hybrid Precoder and Combiner Design for Secure Transmission in mmWave MIMO Systems. 1-6 - Santosh Timilsina, Gayan Amarasuriya:
Secure Communication in Relay-Assisted Massive MIMO Downlink. 1-7 - Feng Ye, Yi Qian:
A Security Architecture for Networked Internet of Things Devices. 1-6 - Datong Xu, Pinyi Ren, Qinghe Du, Li Sun, Yichen Wang:
Design for NOMA: Combat Eavesdropping and Improve Spectral Efficiency in the Two-User Relay Network. 1-6 - Dingwen Hu, Peilin Hong, Yixin Chen:
FADM: DDoS Flooding Attack Detection and Mitigation System in Software-Defined Networking. 1-7 - Xiaoning Zhang, Shui Yu, Zhichao Xu, Yichao Li, Zijing Cheng, Wanlei Zhou:
Flow Entry Sharing in Protection Design for Software Defined Networks. 1-7 - Moinul Hossain, Jiang Xie:
Impact of Off-Sensing Attacks in Cognitive Radio Networks. 1-6 - Hanguang Luo, Jian Su, Guangjun Wen:
A Novel Multi-Hop Distance-Bounding Protocol Used in Wireless Sensor Networks. 1-7 - Qihao Li, Kuan Zhang, Michael Cheffena, Xuemin Shen:
Channel-Based Sybil Detection in Industrial Wireless Sensor Networks: A Multi-Kernel Approach. 1-6 - Mehdi Sadeghzadeh, Mehdi Maleki, Masoud Salehi:
Large Scale Analysis of RBD Precoding for Physical Layer Security in Multi-User Wireless Networks. 1-6 - Guyue Li, Aiqun Hu, Junqing Zhang, Bin Xiao:
Security Analysis of a Novel Artificial Randomness Approach for Fast Key Generation. 1-6 - Fenghua Li, Xinyu Wang, Ben Niu, Hui Li, Chao Li, Lihua Chen:
TrackU: Exploiting User's Mobility Behavior via WiFi List. 1-6 - Shu Fu, Peng Duan, Yunjian Jia:
Content-Exchanged Based Cooperative Caching in 5G Wireless Networks. 1-6 - Haozhe Wang, Jia Hu, Geyong Min, Wang Miao, Nektarios Georgalas:
Cost-Aware Optimisation of Cache Allocation for Information-Centric Networking. 1-6 - Tao Deng, Ghafour Ahani, Pingzhi Fan, Di Yuan:
Cost-Optimal Caching for D2D Networks with Presence of User Mobility. 1-6 - Peng Yang, Ning Zhang, Shan Zhang, Li Yu, Junshan Zhang, Xuemin Shen:
Dynamic Mobile Edge Caching with Location Differentiation. 1-6 - Pavlos Sermpezis, Thrasyvoulos Spyropoulos, Luigi Vigneri, Theodoros Giannakas:
Femto-Caching with Soft Cache Hits: Improving Performance with Related Content Recommendation. 1-7 - Bomin Mao, Zubair Md. Fadlullah, Fengxiao Tang, Nei Kato, Osamu Akashi, Takeru Inoue, Kimihiro Mizutani:
A Tensor Based Deep Learning Technique for Intelligent Packet Routing. 1-6