


default search action
17th WASA 2022: Dalian, China - Part I
- Lei Wang, Michael Segal, Jenhui Chen, Tie Qiu:

Wireless Algorithms, Systems, and Applications - 17th International Conference, WASA 2022, Dalian, China, November 24-26, 2022, Proceedings, Part I. Lecture Notes in Computer Science 13471, Springer 2022, ISBN 978-3-031-19207-4
Cyber-Physical Systems Including Intelligent Transportation Systems and Smart Healthcare Systems
- Chen Gu

, Xuande Cui, Donghui Hu:
An Efficient Privacy-Preserving Scheme for Traffic Monitoring Services in Vehicular Networks. 3-14 - Xiuli Liu, Wanshu Fan, Dongsheng Zhou:

Skin Lesion Segmentation via Intensive Atrous Spatial Transformer. 15-26 - Xing Wei, Shang Yao, Chong Zhao, Di Hu, Hui Luo, Yang Lu:

Graph Convolutional Networks (GCN)-Based Lightweight Detection Model for Dangerous Driving Behavior. 27-39 - Junhua Wu, Huiru Zhang, Guangshun Li, Kan Yu:

Increasing the Accuracy of Secure Model for Medical Data Sharing in the Internet of Things. 40-51 - Wenyue Wang, Xiang Tian, Xiaolu Cheng, Yuan Yuan, Biwei Yan, Jiguo Yu:

A Smart Contract-Based Intelligent Traffic Adaptive Signal Control Scheme. 52-63 - Mengjie Sun, Ke Li, Yaowen Zheng, Weidong Zhang, Hong Li, Limin Sun:

Inferring Device Interactions for Attack Path Discovery in Smart Home IoT. 64-75 - Yanbing Chen

, Wei Ke
, Hao Sheng
, Zhang Xiong
:
A Local Rotation Transformation Model for Vehicle Re-Identification. 76-87 - Kaixiang Hou, Tianyi Xu, Chao Xu, Xiaobo Zhou, Tie Qiu, Fengbiao Zan:

A Prototype System for Blockchain Performance Evaluation. 88-100 - Yang Lv, Zesheng Cheng, Zhiqiang Lv

, Jianbo Li:
A Spatial-Temporal Convolutional Model with Improved Graph Representation. 101-112 - Fang Ouyang, Zheng Bao, Lixiao Zhou, Feilong Lin

, Zhaolong Hu, Changbing Tang, Minglu Li:
A Proof-of-Weighted-Planned-Behavior Consensus for Efficient and Reliable Cyber-Physical Systems. 113-125 - Yizong Wang, Haoyu Wang, Dong Zhao, Fuyu Yang, Huadong Ma:

E2M: Evolving Mobility Modeling in Metropolitan-Scale Electric Taxi Systems. 126-138 - Xiang Ying, Zhen Liu, Jie Gao, Ruixuan Zhang, Han Jiang, Xi Wei:

Multi-task Class Feature Space Fusion Domain Adaptation Network for Thyroid Ultrasound Images: Research on Generalization of Smart Healthcare Systems. 139-152 - Haowei Wang, Rui Xu

, Xiaoqiang Di, Jing Chen
, Dejun Zhu, Juping Sun, Yuchen Zhu:
A Caching Strategy Based on Spreading Influence in Information-Centric Satellite Networks. 153-164 - Hao Yu, Chong Zhao, Xing Wei, Yan Zhai, Zhen Chen, Guangling Sun, Yang Lu:

Posture and Appearance Fusion Network for Driver Distraction Recognition. 165-174 - Jiujun Cheng, Yonghong Xiong, Shuai Feng, Guiyuan Yuan, Qichao Mao, Bo Lu:

A Behavior Decision Method for Autonomous Vehicles in an Urban Scene. 175-184 - Fuyong Sun, Ruipeng Gao, Weiwei Xing, Yaoxue Zhang, Wei Lu, Jun Fang, Shui Liu, Nan Ma, Hua Chai:

TimeBird: Context-Aware Graph Convolution Network for Traffic Incident Duration Prediction. 185-195 - Bixun Zhang, Xu Ding, Hang Zheng, Xiang Zheng, Pengfei Xu:

The Link Awareness Driven Resource Allocation Algorithm Based on Scenario Marking and Vehicle Clustering in VANETs. 196-205 - Rongkun Ye, Zhiqiang Lv

, Aite Zhao, Jianbo Li:
Socially Acceptable Trajectory Prediction for Scene Pedestrian Gathering Area. 206-215 - Xiaochao Dang, Yanhong Bai, Daiyang Zhang, Gaoyuan Liu, Zhanjun Hao:

Wi-KF: A Rehabilitation Motion Recognition in Commercial Wireless Devices. 216-228
Security and Privacy
- Xiaoling Tao, Runrong Liu, Lianyou Fu, Qiqi Qiu, Yuelin Yu, Haijing Zhang:

An Effective Insider Threat Detection Apporoach Based on BPNN. 231-243 - Shiyuan Xu

, Xue Chen, Yunhua He, Yibo Cao, Shang Gao:
VMT: Secure VANETs Message Transmission Scheme with Encryption and Blockchain. 244-257 - Hongniu Zhang, Mohan Li, Yanbin Sun, Guanqun Qu:

Robust Truth Discovery Against Multi-round Data Poisoning Attacks. 258-270 - Chenguang Zhu, Gewangzi Du, Tongshuai Wu, Ningning Cui, Liwei Chen, Gang Shi:

BERT-Based Vulnerability Type Identification with Effective Program Representation. 271-282 - Xufeng Jiang, Lu Li:

Privacy-Preserving and Truthful Auction for Task Assignment in Outsourced Cloud Environments. 283-295 - Da Teng

, Yanqing Yao
, Yingdong Wang
, Lei Zhou
, Chao Huang
:
An SM2-based Traceable Ring Signature Scheme for Smart Grid Privacy Protection. 296-313 - Liyuan Cao, Yingwen Chen, Kaiyu Cai, Dongsheng Wang, Yuchuan Luo, Guangtao Xue:

Collusion-Tolerant Data Aggregation Method for Smart Grid. 314-325 - Ning Huang

, Xue-cai Feng
, Rui Zhang
, Xiugui Yang
, Hui Xia
:
Network Defense Resource Allocation Scheme with Multi-armed Bandits. 326-337 - Han Sun, Yan Zhang, Mingxuan Li, Zhen Xu:

FLFHNN: An Efficient and Flexible Vertical Federated Learning Framework for Heterogeneous Neural Network. 338-350 - Xincheng Duan, Biwei Yan, Anming Dong, Li Zhang, Jiguo Yu:

Phishing Frauds Detection Based on Graph Neural Network on Ethereum. 351-363 - Jiaxu Ding, Biwei Yan, Guijuan Wang, Li Zhang, Yubing Han, Jiguo Yu, Yan Yao:

Blockchain-Aided Hierarchical Attribute-Based Encryption for Data Sharing. 364-376 - Yan Jin, Chunxiao Ye, Mengqing Yang, Chunming Ye:

Efficient Certificateless Ring Signcryption Scheme with Constant Ciphertext Length on Blockchain. 377-388 - Sinian Luo, Weibin Wu, Yanbin Li, Ruyun Zhang, Zhe Liu:

An Efficient Soft Analytical Side-Channel Attack on Ascon. 389-400 - Xu Yang

, Yuchuan Luo
, Ming Xu
, Shaojing Fu
, Yingwen Chen:
Privacy-preserving WiFi Fingerprint Localization Based on Spatial Linear Correlation. 401-412 - Qihang Zhang, Jiuwu Zhang, Xiulong Liu, Xinyu Tong, Keqiu Li:

Secure RFID Handwriting Recognition-Attacker Can Hear but Cannot Understand. 413-426 - Fengyuan Qiu, Hao Yang

, Lu Zhou, Chuan Ma
, Liming Fang:
Privacy Preserving Federated Learning Using CKKS Homomorphic Encryption. 427-440 - Shiyu Xu, Shi Yu, Liang Xiao

, Zefang Lv:
Reinforcement Learning Based Vulnerability Analysis for Smart Grids Against False Data Injection Attacks. 441-452 - Jianrong Wang, Haoran Sun, Tianyi Xu:

Blockchain-Based Secure and Efficient Federated Learning with Three-phase Consensus and Unknown Device Selection. 453-465 - Yueqing Wu, Hao Fu, Guoming Zhang, Bin Zhao, Minghui Xu, Yifei Zou, Xiaotao Feng, Pengfei Hu:

TraceDroid: Detecting Android Malware by Trace of Privacy Leakage. 466-478 - Yijie Yan, Shiyuan Xu

:
CA-Free Real-Time Fuzzy Digital Signature Scheme. 479-490 - Lidong Xu

, Mingqiang Wang:
Efficient Post Quantum Random Oblivious Transfer Based on Lattice. 491-499 - Baolin Wang, Chunqiang Hu, Zewei Liu:

A Secure Aggregation Scheme for Model Update in Federated Learning. 500-512 - Jing Zhang, Zhixin Shi, Hao Wu, Mengyan Xing:

A Novel Self-supervised Few-shot Network Intrusion Detection Method. 513-525 - Zhaowei Li, Na Dang, Wenshuo Ma, Xiaowu Liu:

A Trust Secure Data Aggregation Model with Multiple Attributes for WSNs. 526-534 - Xiaolei Wang

, Yang Wang, Mingqiang Wang:
Lattice-Based Revocable Identity-Based Proxy Re-encryption with Re-encryption Verifiability. 535-544 - Cheng Hu

, Fangfang Yuan
, Yanbing Liu
, Cong Cao
, Chunyan Zhang, Jianlong Tan:
Malicious Domain Detection with Heterogeneous Graph Propagation Network. 545-556 - Hongjuan Li, Da Wei, Geng Sun, Jian Wang, Jiahui Li, Hui Kang:

Interference Mitigation via Collaborative Beamforming in UAV-Enabled Data Collections: A Multi-objective Optimization Method. 557-566 - Ruizhong Du

, Lin Zhen
, Yan Liu
:
Authentication Mechanism Based on Physical Layer Security in Industrial Wireless Sensor Networks. 567-578 - Pingchuan Wang, Lupeng Zhang, Jinhao Pan, Fengqi Li

:
A Practical Data Authentication Scheme for Unattended Wireless Sensor Networks Using Physically Unclonable Functions. 579-590 - Degang Sun, Yue Cui, Siye Wang, Yanfang Zhang:

On Eliminating Blocking Interference of RFID Unauthorized Reader Detection. 591-602 - Jiapeng Zhao, Zhongjin Liu, Xiaoling Zhang, Jintao Huang, Zhiqiang Shi, Shichao Lv, Hong Li, Limin Sun:

Gradient-Based Adversarial Attacks Against Malware Detection by Instruction Replacement. 603-612
Topology Control and Coverage
- Gang Xu, Qi Tang, Zhifei Wang, Baoqi Huang:

Opportunistic Network Routing Algorithm Based on Ferry Node Cluster Active Motion and Collaborative Computing. 615-626 - Zhenxian Ma, Ran Wang, Changyan Yi, Kun Zhu:

Optimal Deployment and Scheduling of a Mobile Charging Station in the Internet of Electric Vehicles. 627-639
Energy-Efficient Algorithms, Systems and Protocol Design
- Caina Gao, Jia Zhang, Linlin Guo, Lili Meng, Hui Ji, Jiande Sun:

Energy Efficiency Optimization for RIS Assisted RSMA System over Estimated Channel. 643-654

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














