default search action
WCNC 2021: Nanjing, China
- IEEE Wireless Communications and Networking Conference, WCNC 2021, Nanjing, China, March 29 - April 1, 2021. IEEE 2021, ISBN 978-1-7281-9505-6
- Yubo Shen, Yitong Liu, Hongwen Yang, Lin Sang, Wei He:
Cell-Cluster Network-Assisted Adaptive Streaming Media optimization over Wireless Network. 1-6 - Ming Xia, Yunhan Wang, Xiaoyan Wang, Zhen Cheng, Kaikai Chi:
INSIGHT: An AR-Enabled User Interface for Vision-Based Markerless Interaction with IoT Nodes. 1-7 - Yuting Wang, Yibin Zhang, Jinlong Sun, Guan Gui, Tomoaki Ohtsuki, Fumiyuki Adachi:
A Novel Compression CSI Feedback based on Deep Learning for FDD Massive MIMO Systems. 1-5 - Kiran Mathews, Reinhard Gotzhein:
OB-EWMA: A Link Metric for Reliability-constrained Routing in Wireless Networks. 1-7 - Xinxin Yang, Heli Zhang, Hong Ji, Xi Li:
Hybrid Cooperative Caching Based IoT Network Considering the Data Cold Start. 1-6 - Xiaoming Shi, Na Deng:
Coverage Probability of UAV-Enabled Millimeter Wave Communications in Finite Areas. 1-6 - Abdelrahman Abushattal, Hüseyin Arslan:
Phase Index-Based Receive Spatial Modulation PHY Security Against Supervised Pattern Recognition. 1-5 - Li Wei, Chongwen Huang, George C. Alexandropoulos, Zhaohui Yang, Chau Yuen, Zhaoyang Zhang:
Joint Channel Estimation and Signal Recovery in RIS-Assisted Multi-User MISO Communications. 1-6 - Junjie Chen, Yong Liu, Qingchun Chen, Xiaolong Lan, Gang Cheng, Yongwei Fu, Zheng Zhang:
On the Adaptive AoI-aware Buffer-aided Transmission Scheme for NOMA Networks. 1-6 - Muhammad Sohaib Amjad, Falko Dressler:
Software-based In-Band Full Duplex Relays for IEEE 802.11a/g/p: An Experimental Study. 1-7 - Haoyu Zhu, Yingjiao Li, Zhiyong Chen, Li Song:
Mobile Edge Resource optimization for Multiplayer Interactive Virtual Reality Game. 1-6 - Taochun Wang, Ying Liu, Fulong Chen, Chengmei Lv, Chengtian Wang, Chuangxin Zhao:
Slice-based Motion Trajectory Privacy Protection Method in Crowd Sensing. 1-6 - Hsueh-Wen Tseng, Ting-Ting Yang, Fang-Tzu Hsu:
An MEC-based VNF Placement and Scheduling Scheme for AR Application Topology. 1-6 - Dali Zhu, Haitao Liu, Ting Li, Jiyan Sun, Jie Liang, Hangsheng Zhang, Liru Geng, Yinlong Liu:
Deep Reinforcement Learning-based Task Offloading in Satellite-Terrestrial Edge Computing Networks. 1-7 - Siqiang Zhao, Yuan Fang, Ling Qiu:
Deep Learning-Based channel estimation with SRGAN in OFDM Systems. 1-6 - Zhipeng Gao, Dong Miao, Langcheng Zhao, Zijia Mo, Guangpeng Qi, Liang Yan:
Triple-partition Network: Collaborative Neural Network based on the 'End Device-Edge-Cloud'. 1-7 - Yali Luo, Zhengwei Jiang, Jun Jiang, Peian Yang, Xuren Wang, Kai Zhang:
CAN: Complementary Attention Network for Aspect Level Sentiment Classification in Social E-Commerce. 1-6 - Xingyu Yuan, Jianping Zheng:
Nonlinear One-bit Precoding for Massive MIMO Downlink: Minimizing the Maximum Mean Squared Error. 1-6 - Amr Hilal, Ismail Arai, Samy El-Tawab:
DataLoc+: A Data Augmentation Technique for Machine Learning in Room-Level Indoor Localization. 1-7 - Chen Wang, Zhiyuan Ren, Wenchi Cheng, Shuya Zheng, Hailin Zhang:
Time-Expanded Graph-Based Dispersed Computing Policy for LEO Space Satellite Computing. 1-6 - Yixuan Wei, Xinghua Sun, Yan Zhang, Xijun Wang:
Performance Analysis of SPMA Protocol: A Markov Renewal Process Approach. 1-6 - Yizhong Zhang, Danyan Lan, Chao Wang, Ping Wang, Fuqiang Liu:
Deep Reinforcement Learning-aided Transmission Design for Multi-user V2V Networks. 1-6 - Junghaa Seo, Sangwoo Park, Joonhyuk Kang:
Adversarial, yet Friendly Signal Design for Secured Wireless Communication. 1-7 - Jinghang Liu, Xiaodong Xu, Shujun Han, Ziting Zhang, Cong Liu:
Hybrid Relay Selection and Cooperative Jamming scheme for Secure Communication in Healthcare-IoT. 1-7 - Hanchen Sun, Jingqiu Gao, Li Li, Zheng Ma, Pingzhi Fan:
Successive Cancellation List Flipping for Short Polar Codes Based on Row Weights of Generator Matrix. 1-6 - Aijin Zhang, Kun Zhu, Ran Wang, Changyan Yi:
Missing Data Inference for Crowdsourced Radio Map Construction: An Adversarial Auto-Encoder Method. 1-6 - Chen Lyu, Dongmei Huang, Qingyao Jia, Xiao Han, Xiaomei Zhang, Chi-Hung Chi, Yang Xu:
Predictable Model for Detecting Sybil Attacks in Mobile Social Networks. 1-6 - Zihao Sang, Songtao Guo, Ying Wang:
Collaborative Video Cache Management Strategy in Mobile Edge Computing. 1-6 - Jihao Li, Hewu Li, Jun Liu, Zeqi Lai, Qian Wu, Xiaomo Wang:
A Timeslot Division Strategy for Availability in Integrated Satellite and Terrestrial Network. 1-7 - Nicholas Woolsey, Mingyue Ji, Brent Kraczek:
Predicting Needs in Future Decentralized Networks through Analysis of Barrage Relay Networks. 1-6 - Mengyu Chen, Weifa Liang, Jing Li:
Energy-Efficient Data Collection Maximization for UAV-Assisted Wireless Sensor Networks. 1-7 - George C. Alexandropoulos, Ioanna Vinieratou, Mattia Rebato, Luca Rose, Michele Zorzi:
Uplink Beam Management for Millimeter Wave Cellular MIMO Systems with Hybrid Beamforming. 1-7 - Jia Guo, Chenyang Yang:
Learning Power Control for Cellular Systems with Heterogeneous Graph Neural Network. 1-6 - Juan A. Cabrera, Raphael Steppert, Frank Gabriel, Frank H. P. Fitzek:
Do not Waste the Waste: Packetized Rateless Algebraic Consistency for IEEE 802.11 Networks. 1-6 - Zixin Wang, Hanyu Zhu, Yong Zhou, Xiliang Luo:
Joint Traffic Signal and Connected Vehicle Control in IoV via Deep Reinforcement Learning. 1-6 - Zhenduo Wang, Xingyu Chen, Chengyun Liu, Xiaoyan Ning, Zhiguo Sun:
BER Performance Analysis of Hybrid Carrier Framework with IQ Imbalance Compensation. 1-6 - Yang Li, Heli Zhang, Hong Ji, Xi Li:
UAV-Assisted Cellular Communication: Joint Trajectory and Coverage Optimization. 1-6 - Ahmad Khalil, Nader Mbarek, Olivier Togni:
Fuzzy Logic based model for self-optimizing energy consumption in IoT environment. 1-7 - Yunxue Zhao, Xiaomei Zhu, Guoxiu Duan, Xuekai Zong:
Spectrum Sensing for Cognitive Radio Using FLOM and CNN in Alpha Noise. 1-6 - Bo Xu, Wenchao Xia, Jun Zhang, Xinghua Sun, Hongbo Zhu:
Dynamic Client Association for Energy-Aware Hierarchical Federated Learning. 1-6 - Yajun Ma, Hongguang Sun, Shuqin Li, Xijun Wang, Tony Q. S. Quek:
Performance Analysis of IoT networks with Mobile Data Collectors. 1-7 - Changmok Yang, Jinmyeong Lee, Saewoong Bahk:
Target Wake Time Scheduling Strategies for Uplink Transmission in IEEE 802.11ax Networks. 1-6 - Emad Ibrahim, Rickard Nilsson, Jaap van de Beek:
Intelligent Reflecting Surfaces for MIMO Communications in LoS Environments. 1-6 - Feng Wang, Mustafa Cenk Gursoy, Senem Velipasalar:
Adversarial Reinforcement Learning in Dynamic Channel Access and Power Control. 1-6 - Ziang Zhang, Xu Zhu, Yufei Jiang, Jie Cao, Yujie Liu:
Closed-Form AoI Analysis for Dual-Queue Short-Block Transmission with Block Error. 1-6 - Qun Li, Hanqin Shao:
Cooperative Resource Allocation for Computation Offloading in Mobile-Edge Computing Networks. 1-6 - Ahmed Elshafiy, Ashwin Sampath, Kenneth Rose:
A Clustering Approach to optimizing Beam Steering Directions in Wireless Systems. 1-7 - Yu Chen, Jie Chen, Ganesh Krishnamurthi, Huijing Yang, Huahui Wang, Wenjie Zhao:
Deep Reinforcement Learning for RAN Optimization and Control. 1-6 - Pengfei Ma, Hancheng Lu, Ming Zhang, Jinxue Liu, Ruoyun Chen:
QoS-Driven Video Uplinking in NOMA-Based IoT. 1-6 - Asil Koç, Tho Le-Ngoc:
Swarm Intelligence based Power Allocation in Hybrid Millimeter-Wave Massive MIMO Systems. 1-7 - Yin Gao, Jiajun Chen, Zhuang Liu, Liang Liu, Nan Hu:
Deep Learning based Location Prediction with Multiple Features in Communication Network. 1-5 - Kunlin Hou, Qinzhen Xu, Xiangyu Zhang, Yongming Huang, Luxi Yang:
User Association and Power Allocation Based on Unsupervised Graph Model in Ultra-Dense Network. 1-6 - Guangyuan Zheng, Chen Xu, Hao Long, Xiongwen Zhao:
MEC in NOMA-HetNets: A Joint Task Offloading and Resource Allocation Approach. 1-6 - Yan Zhang, Lei Zhang, Burong Kang, Yue Ma, Tong Chen:
Secure and Reliable Parking Protocol Based on Blockchain for VANETs. 1-6 - Bejjipuram Sombabu, V. S. Ch Lakshmi Narayana, Sharayu Moharir:
Loss-of-Credibility Bandits. 1-6 - Xinjing Yuan, Lingjun Pu, Xiaohang Xu, Jingdong Xu:
Explore the Impact of Cellular Resource Allocation on Mobile UHD Video Streaming over 5G UDN. 1-7 - Haojiang Hua, Xiaoli Chu:
Content Caching Policy with Edge Caching User Classification in Fog Radio Access Networks. 1-7 - Guangyu Zhu, Li Guo, Chao Dong, Xidong Mu:
Mission Time Minimization for Multi-UAV-Enabled Data Collection with Interference. 1-6 - Yuya Cui, Degan Zhang, Ting Zhang, Peng Yang, Haoli Zhu:
A New Approach on Task Offloading Scheduling for Application of Mobile Edge Computing. 1-6 - Junyoung Choi, Jaewon Hur, Saewoong Bahk:
Push yoUr Password: Secure and Fast WiFi Connection for IoT Devices. 1-6 - David Cotton, Zenon Chaczko:
GymD2D: A Device-to-Device Underlay Cellular Offload Evaluation Platform. 1-7 - Jin Mitsugi, Yuusuke Kawakita, Haruhisa Ichikawa:
Full duplex backscatter communication with subcarrier synchronized decimation. 1-6 - Nannan Zhang, Wei Wang, Ruining Lan, Pan Zhou, Aiping Huang:
Delay-Aware Cache-Enabled Cooperative D2D Transmission in Mobile Cellular Networks. 1-6 - Zhihao Dong, Xu Zhu, Yufei Jiang, Haiyong Zeng:
Manager Selection and Resource Allocation for 5G-V2X Platoon Systems with Finite Blocklength. 1-6 - Yingsheng Peng, Yong Liu, Han Zhang:
Deep Reinforcement Learning based Path Planning for UAV-assisted Edge Computing Networks. 1-6 - Weishan Huang, Xinyu Lei, Hongyu Huang:
PTA-SC: Privacy-Preserving Task Allocation for Spatial Crowdsourcing. 1-7 - Muying Chen, Koichi Adachi, Osamu Takyu, Mai Ohta, Takeo Fujii:
Transmission Timing Control Using ACK Signal in LoRaWAN. 1-6 - Peng Zou, Xianglin Wei, Omur Ozel, Tian Lan, Suresh Subramaniam:
Timely Probabilistic Data Preprocessing in Mobile Edge Computing. 1-6 - David Ginthör, René Guillaume, Maximilian Schüngel, Hans D. Schotten:
5G RAN Slicing for Deterministic Traffic. 1-6 - Dongyang Xu:
Quantum Circuit for Coding Acceleration Under Random Disturbance: Case for OFDM Pilot Anti-Denial. 1-6 - Yu-Shu Chen, You-Jia Chang, Ming-Jer Tsai, Jang-Ping Sheu:
Fuzzy-Logic-Based Handover Algorithm for 5G Networks. 1-7 - Shuo Yuan, Bin Cao, Mugen Peng, Yaohua Sun:
ChainsFL: Blockchain-driven Federated Learning from Design to Realization. 1-6 - Puneeth Jubba Honnaiah, Eva Lagunas, Danilo Spano, Nicola Maturo, Symeon Chatzinotas:
Demand-based Scheduling for Precoded Multibeam High-Throughput Satellite Systems. 1-6 - Archiki Prasad, Vishal Jain, Sharayu Moharir:
Decentralized Age-of-Information Bandits. 1-6 - Pengkun Jing, Yanni Han, Jiyan Sun, Tao Lin, Yanjie Hu:
AutoRoot: A Novel Fault Localization Schema of Multi-dimensional Root Causes. 1-7 - Naufan Raharya, Changyang She, Wibowo Hardjawana, Branka Vucetic:
Deep Learning for Distributed User Association in Massive Industrial IoT Networks. 1-6 - Mingxi Tan, Dazhi Sun, Xiaohong Li:
A Secure and Efficient Blockchain-based Key Management Scheme for LoRaWAN. 1-7 - Yunkai Guo, Shushi Gu, Qinyu Zhang, Ning Zhang, Wei Xiang:
A Coded Distributed Computing Framework for Task Offloading from Multi-UAV to Edge Servers. 1-6 - Anyue Wang, Lei Lei, Eva Lagunas, Symeon Chatzinotas, Ana Isabel Pérez-Neira, Björn E. Ottersten:
Joint Beam-Hopping Scheduling and Power Allocation in NOMA-Assisted Satellite Systems. 1-6 - Gang Yang, Yating Liao, Ying-Chang Liang, Olav Tirkkonen:
Reconfigurable Intelligent Surface Empowered Underlaying Device-to-Device Communication. 1-6 - Xinjing Yuan, Lingjun Pu, Xiaohang Xu, Yuwei Xu, Jingdong Xu:
Streaming-Aware Cellular Resource Allocation for UHD Video Streaming over Ultra Dense Network. 1-7 - Van-Trung Pham, Tu N. Nguyen, Bing-Hong Liu, Tong Lin:
Minimizing Latency for Multiple-Type Data Aggregation in Wireless Sensor Networks. 1-6 - Lifei Hao, Baoqi Huang, Hao Hong, Bing Jia, Wuyungerile Li:
A Channel Adaptive WiFi Indoor Localization Method based on Deep Learning. 1-6 - Peng Hou, Ruiqi Liu:
Statistical QoS Guarantee for Power-Efficient Downlink NOMA with Statistical CSI. 1-6 - Abbas Arghavani, Anders Ahlén, André Teixeira, Subhrakanti Dey:
A Game-theoretic Approach to Covert Communications in the Presence of Multiple Colluding Wardens. 1-7 - Pedamalli Saikrishna, Ashok Kumar Reddy Chavva, Mukul Beniwal, Ankur Goyal:
Deep Learning Based Channel Estimation with Flexible Delay and Doppler Networks for 5G NR. 1-6 - Mangqing Guo, Mustafa Cenk Gursoy:
Channel Estimation for Intelligent Reflecting Surface Assisted Wireless Communications. 1-6 - Khurram Hussain, Raju Gupta:
Method to Minimize Radio Resource Wastage and Battery Consumption in NB-IoT. 1-7 - Yongjun Xu, Zijian Liu, Zhaohui Yang, Chongwen Huang:
Energy-Efficient Resource Allocation with Imperfect CSI in NOMA-based D2D Networks with SWIPT. 1-6 - Anqi Shen, Kai Sun, Wei Huang, Yidi Shao, Yukun An:
A Voronoi-Based User-Centric Cooperation Scheme in Cell-Less Architecture. 1-6 - Chaoyang Wen, Ling Qiu, Xiaowen Liang:
Securing UAV Communication with Mobile UAV Eavesdroppers: Joint Trajectory and Communication Design. 1-6 - Andra M. Voicu, Ljiljana Simic, Marina Petrova:
Modelling Large-Scale CSMA Wireless Networks. 1-6 - Hao Shi, Mingyu Fan, Yu Zhang, Maoyang Chen, Xingyu Liao, Wenqiang Hu:
An Effective Dynamic Membership Authentication and Key Management Scheme in Wireless Sensor Networks. 1-6 - Yan Shao, Rongpeng Li, Zhifeng Zhao, Honggang Zhang:
Graph Attention Network-based DRL for Network Slicing Management in Dense Cellular Networks. 1-6 - Nengyu Zhu, Xiaodong Xu, Shujun Han, Suyu Lv:
Sleep-Scheduling and Joint Computation-Communication Resource Allocation in MEC Networks for 5G IIoT. 1-7 - Saibal K. Ghosh, Dharma P. Agrawal:
A high performance hierarchical caching framework for mobile edge computing environments. 1-6 - Ruiqi Liu, Wei Dai, Chao Zhang:
Multi-target Detection by Distributed Passive Radar Systems without Reference Signals. 1-5 - Qun Li:
Legitimate Eavesdropping with Wireless Powered Proactive Full-duplex Eavesdroppers. 1-6 - Stephan Zeitz, Peter Neuhaus, Martin Schlüter, Meik Dörpinghaus, Gerhard P. Fettweis:
Soft-Output Equalizers for Systems Employing 1-Bit Quantization and Temporal Oversampling. 1-6 - Ishank Juneja, Santosh Fatale, Sharayu Moharir:
Correlated Age-of-Information Bandits. 1-6 - Hedieh Ajam, Marzieh Najafi, Vahid Jamali, Robert Schober:
Channel Modeling for IRS-Assisted FSO Systems. 1-7 - Jaykumar Sheth, Behnam Dezfouli:
MonFi: A Tool for High-Rate, Efficient, and Programmable Monitoring of WiFi Devices. 1-7 - Qi Cao, Huan Zhang, Zheng Shi, Hong Wang, Yaru Fu, Guanghua Yang, Shaodan Ma:
Outage Performance Analysis of HARQ-Aided Multi-RIS Systems. 1-6 - Zhuo Li, Xu Zhou, Taixin Li, Yang Liu:
An Optimal-Transport-Based Reinforcement Learning Approach for Computation Offloading. 1-6 - Donglai Zhao, Gang Wang, Shaobo Jia, Ruoyu Zhang:
Performance Analysis of K-Tier Ultra-Dense Networks over Nakagami-m Fading Channels. 1-6 - Qi Zhang, Xiaodong Xu, Xiaofeng Tao, Cong Liu:
Base Station Sleeping Strategy Based on D2D Cluster Head Density Optimization and Selection. 1-7 - Wei Wan, Jianrong Lu, Shengshan Hu, Leo Yu Zhang, Xiaobing Pei:
Shielding Federated Learning: A New Attack Approach and Its Defense. 1-7 - Xinbin Shen, Lingchao Guo, Zhaoming Lu, Xiangming Wen, Shuang Zhou:
WiAgent: Link Selection for CSI-Based Activity Recognition in Densely Deployed Wi-Fi Environments. 1-6 - Zhouyin Wang, Pengzun Gao, Zibo He, Long Zhao:
A CGAN-based Model for Human-like Driving Decision Making. 1-6 - Jiangtian Nie, Jun Luo, Zehui Xiong, Dusit Niyato, Ping Wang, Yang Zhang:
Multi-Leader Multi-Follower Game-based Incentive Scheme for Socially-Aware Mobile Crowdsensing. 1-6 - Belal Essam ElDiwany, Amr A. El-Sherif, Tamer A. ElBatt:
Network-Coded Wireless Powered Cellular Networks: Lifetime and Throughput Analysis. 1-6 - Estefanía Recayte, Andrea Munari:
Caching at the Edge: Outage Probability. 1-6 - Min Lu, Bin Zhou, Zhiyong Bu, Kecheng Zhang, Zhen-Hua Ling:
Compressed Network in Network Models for Traffic Classification. 1-6 - Weiqing Huang, Zhaowen Feng, Yanyun Xu, Ning Zhang:
A Novel Method for Malicious Implanted Computer Video Cable Detection via Electromagnetic Features. 1-6 - Wenhao Cai, Rang Liu, Yang Liu, Ming Li, Qian Liu:
Intelligent Reflecting Surface Assisted Multi-cell Multi-band Wireless Networks. 1-6 - Olfa Dallel, Souheil Ben Ayed, Jamel Bel Hadj Tahar:
Secure IoT-based Emergency Management System for Smart Buildings. 1-7