


default search action
18th WASA 2024: Qindao, China - Part III
- Zhipeng Cai

, Daniel Takabi
, Shaoyong Guo
, Yifei Zou
:
Wireless Artificial Intelligent Computing Systems and Applications - 18th International Conference, WASA 2024, Qindao, China, June 21-23, 2024, Proceedings, Part III. Lecture Notes in Computer Science 14999, Springer 2025, ISBN 978-3-031-71469-6 - Sheng Ouyang, Fanlong Zhang, Junyu Mai, Yuan Chai, Quan Chen, Yongchao Tao:

Efficient Online Path Selection and Workload Allocation for In-Network Computing in MEC. 1-13 - Xinyu Zhang, Gaojie Wu, Luwei Fu, Wenliang Mao, Zhiwei Zhao:

CO-LEACH: Cooperative Data Collection Protocol for Data-Heterogeneous WSNs. 14-26 - Yong Wang, Yi Xiong, Tianyu Yang

, Yiran Shen:
Profinder: Towards Professionals Recognition on Mobile Devices for Users with Cognitive Decline. 27-38 - Dongkuo Wu, Xueyi Wang, Xingwei Wang, Min Huang, Zhitong Wang:

Truthful Double Auction-Based Resource Allocation Mechanisms for Latency-Sensitive Applications in Edge Clouds. 39-51 - Sheng Yi, Hao Zhang, Feiyu Jin, Yiyang Hu, Rongzhen Li, Kai Liu:

V2ICooper: Toward Vehicle-to-Infrastructure Cooperative Perception with Spatiotemporal Asynchronous Fusion. 52-64 - Pingjie Ou, Ningjiang Chen, Zizhan Huang:

Recommendation-Aware Collaborative Edge Caching Strategy in the Internet of Vehicles. 65-77 - Liehuang Zhu, Awais Bilal, Kashif Sharif, Fan Li:

Towards Robust Internet of Vehicles Security: An Edge Node-Based Machine Learning Framework for Attack Classification. 78-89 - Nuanlai Wang

, Shanchen Pang, Xiaofeng Ji, Haiyuan Gui, Xiao He:
Device-Edge-Cloud Collaborative Video Stream Processing and Scheduling Strategy Based on Deep Reinforcement Learning. 90-99 - Qiuyu Yu, Tong Zhang, Changyan Yi:

Consistent Low-Latency Scheduling for Microsecond-Scale Tasks in Data Centers. 100-113 - Haoke Zhang, Yiyong Huang, Wei Han, Dan Xiong, Chuanfu Zhang, Yanjie Yang:

Multi-scale Data Reconstruction Based Policy Optimization Algorithm for Skill Learning. 114-125 - Xiaoyu Wu, Anming Dong, Jiguo Yu, Sufang Li, Guijuan Wang, You Zhou:

Joint Optimization Design of Intelligence Reflecting Surface Assisted MU-MISO System Based on Deep Reinforcement Learning. 126-138 - Yuanyuan Wang, Chi Zhang, Miao Pan:

Secure Motion Verification for High Altitude Platforms with a Hybrid AOA-TDOA-FDOA Scheme. 139-150 - Li Yan, Hailin Hu, Kun Yang, Gaozhou Wang, Ti Guan, Yanwei Zheng:

Variational Autoencoder Based Automatic Clustering for Multivariate Time Series Anomaly Detection. 151-162 - Xue Chen, Chen Cui, Ning Wang, Zhaogong Zhang, Jinghong He, Xin Guan:

Deep Reinforcement Learning Based Economic Dispatch with Cost Constraint in Cyber Physical Energy System. 163-175 - Zhilong Cao, Anming Dong, Jiguo Yu, Sufang Li, Xiang Tian, Li Zhang:

InceptionNeXt Network with Relative Position Information for Microexpression Recognition. 176-185 - Ye Ding

, Mingyu Shao
, Jie Wang
, Qi Wan
:
AdMarks: Image Steganography Based on Adversarial Perturbation. 186-198 - Zhijian Huang, Shuguang Song, Han Liu, Hongyu Kuang, Jingjing Zhang, Pengfei Hu:

A Review on Binary Code Analysis Datasets. 199-214 - Nuanyu Cao:

Low-Cost Robot Path Planning Mechanism for Escaping from Dead Ends. 215-227 - Fei Wang, Penglin Dai, Chuzhao Li, Zhangjie Meng, Kai Liu:

Towards Communication-Efficient Collaborative Perception: Harnessing Channel-Spatial Attention and Knowledge Distillation. 228-240 - Cheng Liu, Xianlei Long, Yan Li, Chao Chen, Fuqiang Gu, Songyu Yuan, Chunlong Zhang:

Improving Anomaly Scene Recognition with Large Vision-Language Models. 241-252 - Tianle Wang, Shan Chang:

ReSU-Net: State Space Model for 3D Abdominal Multi-organ Segmentation. 253-265 - He Zhu, Ce Li, Haitian Yang, Yan Wang, Weiqing Huang:

Autocue : Targeted Textual Adversarial Attacks with Adversarial Prompts. 266-278 - Kanchon Kanti Podder

, Jian Zhang
, Lingyan Wang:
Universal Sign Language Recognition System Using Gesture Description Generation and Large Language Model. 279-289 - Xiayan Ji, Lina Chen, Hong Gao, Fangyao Shen, Hongjie Guo:

A High-Precision Generality Method for Chinese Nested Named Entity Recognition. 290-301 - Fan Liang

, Lingqiang Ge:
Tree of Thought Prompt in Robotic Arm Control. 302-313

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














