


default search action
19th SECON 2022: Stockholm, Sweden
- 19th Annual IEEE International Conference on Sensing, Communication, and Networking, SECON 2022, Stockholm, Sweden, September 20-23, 2022. IEEE 2022, ISBN 978-1-6654-8643-9

- Kun Yang

, Xiaolong Zheng, Jie Xiong
, Liang Liu, Huadong Ma:
WiImg: Pushing the Limit of WiFi Sensing with Low Transmission Rates. 1-9 - Leiyang Xu

, Xiaolong Zheng, Xiangyuan Li, Yucheng Zhang, Liang Liu, Huadong Ma:
WiCAM: Imperceptible Adversarial Attack on Deep Learning based WiFi Sensing. 10-18 - Bryan Bo Cao, Abrar Alali, Hansi Liu, Nicholas Meegan, Marco Gruteser, Kristin J. Dana, Ashwin Ashok, Shubham Jain:

ViTag: Online WiFi Fine Time Measurements Aided Vision-Motion Identity Association in Multi-person Environments. 19-27 - Hao Pan, Feitong Tan, Wenhao Li, Yi-Chao Chen, Lanqing Yang, Guangtao Xue, Xiaoyu Ji:

MagDefender: Detecting Eavesdropping on Mobile Devices using the Built-in Magnetometer. 28-36 - Ting Wang, Peng Yang, Zhihao Wang, Haibin Cai:

Blocking Island Paradigm Enhanced Intelligent Coordinated Virtual Network Embedding Based on Deep Reinforcement Learning. 37-45 - James Mariani, Yongqi Han, Li Xiao:

Co-Cache: Inertial-Driven Infrastructure-less Collaborative Approximate Caching. 46-54 - Xiaoying Lei

:
Online Bayesian Learning for Rate Adaptation in Non-stationary Wireless Channels. 55-63 - Yao Wang

, Tao Gu
, Tom H. Luan
, Yong Yu:
Your Breath Doesn't Lie: Multi-user Authentication by Sensing Respiration Using mmWave Radar. 64-72 - Xiao Zhang, James Mariani, Li Xiao, Matt W. Mutka

:
LiFOD: Lighting Extra Data via Fine-grained OWC Dimming. 73-81 - Yi Zhong, Lei Jiao

, Ruiting Zhou, Liujing Song:
On-Demand or On-Premises: Online Mitigation of DDoS Attacks via Cloud-Edge Coordination. 82-90 - Khaled Alkiek, Khaled A. Harras

, Moustafa Youssef:
EarGest: Hand Gesture Recognition with Earables. 91-99 - Orlando E. Martínez-Durive

, Theo Couturieux, Cezary Ziemlicki, Marco Fiore:
VoronoiBoost: Data-driven Probabilistic Spatial Mapping of Mobile Network Metadata. 100-108 - Eranga Bandara, Xueping Liang, Sachin Shetty

, Ravi Mukkamala, Abdul Rahman, Wee Keong Ng:
Skunk - A Blockchain and Zero Trust Security Enabled Federated Learning Platform for 5G/6G Network Slicing. 109-117 - Zhirong Tang

, Lizhao You, Haipeng Dai
, Liqun Fu:
Quick and Reliable Physical-layer Data Aggregation in LoRa through Multi-Packet Reception. 118-126 - Xiaolin Gu, Wenjia Wu, Naixuan Guo, Wei He, Aibo Song, Ming Yang, Zhen Ling, Junzhou Luo:

TeRFF: Temperature-aware Radio Frequency Fingerprinting for Smartphones. 127-135 - Georg Meller

, Michael Methfessel, Bastian Lindner, Jens Wagner
, Rolf Kraemer, Frank Ellinger:
Wakeup Receiver Using Passive Amplification by Means of a Switched SAW Resonator. 136-144 - Zeyu Wang

, Xiaoxi He, Zimu Zhou, Xu Wang, Qiang Ma, Xin Miao, Zhuo Liu, Lothar Thiele, Zheng Yang:
Stitching Weight-Shared Deep Neural Networks for Efficient Multitask Inference on GPU. 145-153 - Zhiyao Sheng, Huatao Xu, Qian Zhang, Dong Wang:

Facilitating Radar-Based Gesture Recognition With Self-Supervised Learning. 154-162 - Shuai Wang, Jianlin Guo, Pu Wang, Kieran Parsons, Philip V. Orlik, Yukimasa Nagai, Takenori Sumi, Parth Pathak:

X-Disco: Cross-technology Neighbor Discovery. 163-171 - Chenning Li

, Li Liu, Zhichao Cao, Mi Zhang:
WiVelo: Fine-grained Walking Velocity Estimation for Wi-Fi Passive Tracking. 172-180 - Xieyang Sun

, Wei Xi, Zhiping Jiang, Zuhao Chen, Han Hao
:
ScreenInformer: Whispering Secret Information via an LCD Screen. 181-189 - Suwei Xu, Yibo Jin, Zhuzhong Qian, Sheng Zhang, Ming Zhao, Zhenjie Lin, Qiang Lin, Liming Wang:

Energy-efficient Federated Learning via Stabilization-aware On-device Update Scaling. 190-198 - Jing Zhao, Ruwu Wang:

FedMix: A Sybil Attack Detection System Considering Cross-layer Information Fusion and Privacy Protection. 199-207 - Rong Cong

, Zhiwei Zhao, Linyuanqi Zhang, Geyong Min:
CoopEdge: Cost-effective Server Deployment for Cooperative Multi-Access Edge Computing. 208-216 - Wenchao Jiang, Feng Li, Luoyu Mei, Ruofeng Liu, Shuai Wang:

VisBLE: Vision-Enhanced BLE Device Tracking. 217-225 - Tushar Routh, Nurani Saoda, Md Fazlay Rabbi Masum Billah, Brad Campbell

:
Low Cost Light Source Identification in Real World Settings. 226-234 - Niloofar Yazdani, Nikolaos Kouvelas, Daniel E. Lucani, R. Venkatesha Prasad

:
Divide and Code: Efficient and Real-time Data Recovery from Corrupted LoRa Frames. 235-243 - Haofan Cai, Ge Wang, Josue Leyva, Ian Pham, Jinsong Han, Shigang Chen, Chen Qian:

ChopTags: An Accurate and Low-cost Interface to Identify User/Item Interactions. 244-252 - Youmei Song, Lei Jiao

, Renyu Yang, Tianyu Wo, Jie Xu:
Incentivizing Online Edge Caching via Auction - Based Subsidization. 253-261 - Hao Li, Ruofeng Liu

, Shuai Wang, Wenchao Jiang, Chris Xiaoxuan Lu
:
Pedestrian Liveness Detection Based on mmWave Radar and Camera Fusion. 262-270 - Yuting Yan, Yibo Jin, Sheng Zhang, Fangwen Cheng, Zhuzhong Qian, Sanglu Lu:

Focus! Provisioning Attention-aware Detection for Real-time On-device Video Analytics. 271-279 - Xiaolin Guo, Fang Dong, Dian Shen, Zhaowu Huang, Zhenyang Ni, Yulong Jiang, Daheng Yin:

Exploiting the Computational Path Diversity with In-network Computing for MEC. 280-288 - Yunzhong Chen, Jiadi Yu, Linghe Kong

, Yanmin Zhu, Feilong Tang:
RFPass: Towards Environment-Independent Gait-based User Authentication Leveraging RFID. 289-297 - Haipeng Dai

, Xuzhen Lin, Jiaqi Zheng, Yuben Qu, Weijun Wang, Shuyu Shi, Chi Lin, Wanchun Dou:
DARPA: Deployment of UAVs for Polygonal Sizable Object Surveillance. 298-306 - Kai Zhang, Jiuwu Zhang, Xin Xie, Xinyu Tong, Xiulong Liu, Keqiu Li:

Frequency- and Orientation-related Phase Fingerprints for RFID Tag Authentication. 307-315 - Chi Lin, Chuanying Ji, Fenglong Ma, Lei Wang, Wei Zhong, Guowei Wu:

WiLCA: Accelerating Contactless Authentication with Limited Data. 316-324 - Zijian Li

, Zihan Chen, Xiaohui Wei, Shang Gao, Chenghao Ren, Tony Q. S. Quek
:
HPFL-CN: Communication-Efficient Hierarchical Personalized Federated Edge Learning via Complex Network Feature Clustering. 325-333 - Adeel Nasrullah, Momin Ahmad Khan, Fatima Muhammad Anwar:

Universal Timestamping with Ambient Sensing. 334-342 - Jianqi Du, Fenghao Xu, Chennan Zhang, Zidong Zhang

, Xiaoyin Liu, Pengcheng Ren, Wenrui Diao, Shanqing Guo, Kehuan Zhang:
Identifying the BLE Misconfigurations of IoT Devices through Companion Mobile Apps. 343-351 - Yinan Zhu

, Chunhui Duan, Xuan Ding, Zheng Yang:
ReaderPrint: A Universal Method for RFID Readers Authentication Based on Impedance Mismatch. 352-360 - Shan Chang, Xinggang Hu, Hongzi Zhu, Wei Liu

, Lei Yang:
VOGUE: Secure User Voice Authentication on Wearable Devices using Gyroscope. 361-369 - Simone Soderi

, Alessandro Brighente, Federico Turrin, Mauro Conti
:
VLC Physical Layer Security through RIS-aided Jamming Receiver for 6G Wireless Networks. 370-378 - Yukun Yuan

, Yue Zhao, Lin Chen, Shan Lin:
Game Theoretic Analysis of Urban E-Taxi Systems: Equilibria and Efficiency. 379-387 - Shuai Nie, Mohammad Mosiur Lunar, Geng Bai, Yufeng Ge, Santosh K. Pitla, Can Emre Koksal, Mehmet C. Vuran

:
mmWave on a Farm: Channel Modeling for Wireless Agricultural Networks at Broadband Millimeter-Wave Frequency. 388-396 - Mert D. Pesé, Dongyao Chen, C. Andrés Campos, Alice Ying, Troy Stacer, Kang G. Shin:

DETROIT: Data Collection, Translation and Sharing for Rapid Vehicular App Development. 397-406 - Jeong-A Lim, Yeongjin Kim:

Real-time DNN Model Partitioning for QoE Enhancement in Mobile Vision Applications. 407-415 - Tian Liu, Xueyang Hu, Tao Shu:

Assisting Backdoor Federated Learning with Whole Population Knowledge Alignment in Mobile Edge Computing. 416-424 - Xiangling Ding

, Wenjie Zhu, Dengyong Zhang:
DeepFake Videos Detection via Spatiotemporal Inconsistency Learning and Interactive Fusion. 425-433 - Ce Shang, Yan Sun, Hong Luo:

A Hybrid Deep Reinforcement Learning Approach for Dynamic Task Offloading in NOMA-MEC System. 434-442 - Hao Feng, Songtao Guo, Chao Chen, Xianlong Jiao:

Distributed Caching Control Strategy in Mobile Edge Computing: A Mean Field Game Approach. 443-451 - Ju Wang, Liqiong Chang, Omid Abari, Srinivasan Keshav:

How Manufacturers Can Easily Improve Working Range of Passive RFIDs. 452-460 - Xingpeng Fan, Gongming Zhao, Huaqing Tu, Hongli Xu, He Huang:

MASCOT: Mobility-Aware Service Function Chain Routing in Mobile Edge Computing. 461-469 - Qi Zhang, Yang Zhang, Shukui Zhang, Hao Long:

Task Scheduling Algorithm Based on Computing-Aware in Mobile Ad Hoc Cloud. 470-478 - Haipeng Dai

, Yue Zhao, Weijun Wang, Rong Gu, Yuben Qu, Chi Lin, Lijie Xu, Wanchun Dou:
Placing Wireless Chargers with Multiple Antennas. 479-487 - Mingqian Shao, Yifan Liu, Bin Duo, Jin Ning, Junsong Luo, Xing Zhu, Mingzhe Liu, Zhengqiang Wang:

Joint Passive Beamforming and Elevation Angle-Dependent Trajectory Design for RIS-aided UAV-enabled Wireless Sensor Networks. 488-496 - Aleksandar Ichkov, Simon Häger, Petri Mähönen, Ljiljana Simic:

Comparative Evaluation of Millimeter-Wave Beamsteering Algorithms Using Outdoor Phased Antenna Array Measurements. 497-505 - Punyasha Chatterjee

, Pratham Majumder, Arpita Debnath, Sajal K. Das:
Distributed Decision Making for V2V Charge Sharing in Intelligent Transportation Systems. 506-514

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














