


default search action
ACM Transactions on Sensor Networks, Volume 18
Volume 18, Number 1, February 2022
- Yi Zhang

, Yue Zheng, Guidong Zhang, Kun Qian, Chen Qian, Zheng Yang:
GaitSense: Towards Ubiquitous Gait-Based Human Identification with Wi-Fi. 1:1-1:24 - Pamela Bezerra

, Po-Yu Chen, Julie A. McCann, Weiren Yu:
Adaptive Monitor Placement for Near Real-time Node Failure Localisation in Wireless Sensor Networks. 2:1-2:41 - Xiuzhen Guo, Yuan He, Jia Zhang, Haotian Jiang, Zihao Yu, Xin Na:

Taming the Errors in Cross-Technology Communication: A Probabilistic Approach. 3:1-3:20 - Fan Yang, Ashok Samraj Thangarajan

, Gowri Sankar Ramachandran
, Wouter Joosen, Danny Hughes:
AsTAR: Sustainable Energy Harvesting for the Internet of Things through Adaptive Task Scheduling. 4:1-4:34 - Qun Song

, Zhenyu Yan, Rui Tan:
DeepMTD: Moving Target Defense for Deep Visual Sensing against Adversarial Examples. 5:1-5:32 - Junyang Shi, Di Mu, Mo Sha

:
Enabling Cross-technology Communication from LoRa to ZigBee via Payload Encoding in Sub-1 GHz Bands. 6:1-6:26 - Yu Liu

, Joshua Comden, Zhenhua Liu, Yuanyuan Yang:
Online Resource Provisioning for Wireless Data Collection. 7:1-7:27 - Hang Wu, Jiajie Tan

, S.-H. Gary Chan:
Pedometer-free Geomagnetic Fingerprinting with Casual Walking Speed. 8:1-8:21 - Guohao Lan, Zida Liu, Yunfan Zhang, Tim Scargill, Jovan Stojkovic, Carlee Joe-Wong, Maria Gorlatova:

Edge-assisted Collaborative Image Recognition for Mobile Augmented Reality. 9:1-9:31 - Chaojie Gu

, Linshan Jiang
, Rui Tan
, Mo Li, Jun Huang
:
Attack-aware Synchronization-free Data Timestamping in LoRaWAN. 10:1-10:31 - Ran Xu

, Rakesh Kumar, Pengcheng Wang, Peter Bai, Ganga Meghanath, Somali Chaterji
, Subrata Mitra, Saurabh Bagchi:
ApproxNet: Content and Contention-Aware Video Object Classification System for Embedded Clients. 11:1-11:27 - Alberto Giaretta

, Nicola Dragoni
, Fabio Massacci:
S×C4IoT: A Security-by-contract Framework for Dynamic Evolving IoT Devices. 12:1-12:51 - Youjing Lu, Fan Wu, Qianyi Huang, Shaojie Tang, Linghe Kong

, Guihai Chen:
Shared Secret Key Generation by Exploiting Inaudible Acoustic Channels. 13:1-13:26 - Jia Zhang, Xiuzhen Guo, Haotian Jiang, Xiaolong Zheng, Yuan He

:
Link Quality Estimation of Cross-Technology Communication: The Case with Physical-Level Emulation. 14:1-14:20 - Danyang Li, Jingao Xu, Zheng Yang

, Chenshu Wu
, Jianbo Li, Nicholas D. Lane:
Wireless Localization with Spatial-Temporal Robust Fingerprints. 15:1-15:23
Volume 18, Number 2, May 2022
- Hang Cui, Tarek F. Abdelzaher:

SenseLens: An Efficient Social Signal Conditioning System for True Event Detection. 16:1-16:27 - Jing Li

, Weifa Liang
, Zichuan Xu, Xiaohua Jia, Wanlei Zhou:
Service Provisioning for Multi-source IoT Applications in Mobile Edge Computing. 17:1-17:25 - Yantao Li

, Peng Tao, Shaojiang Deng, Gang Zhou
:
DeFFusion: CNN-based Continuous Authentication Using Deep Feature Fusion. 18:1-18:20 - Yubo Yan

, Panlong Yang
, Jie Xiong
, Xiang-Yang Li
:
OpenCarrier: Breaking the User Limit for Uplink MU-MIMO Transmissions With Coordinated APs. 19:1-19:21 - Jingyi Ning, Lei Xie, Chuyu Wang, Yanling Bu, Fu Xiao, Baoliu Ye, Sanglu Lu:

Revolving Scanning on Tagged Objects: 3D Structure Detection of Logistics Packages via RFID Systems. 20:1-20:29 - Junyang Shi, Xingjian Chen, Mo Sha

:
Enabling Cross-technology Communication from LoRa to ZigBee in the 2.4 GHz Band. 21:1-21:23 - Haofan Cai, Ge Wang, Xiaofeng Shi, Junjie Xie, Minmei Wang, Chen Qian, Shigang Chen:

When Tags 'Read' Each Other: Enabling Low-Cost and Convenient Tag Mutual Identification. 22:1-22:22 - Xiaoyu Ji, Yushi Cheng, Juchuan Zhang, Yuehan Chi, Wenyuan Xu, Yi-Chao Chen:

Device Fingerprinting with Magnetic Induction Signals Radiated by CPU Modules. 23:1-23:28 - Yannic Schröder

, Lars Christian Wolf
:
InPhase: Phase-based Ranging and Localization. 24:1-24:39 - Siwang Zhou

, Yi Lian
, Daibo Liu
, Hongbo Jiang, Yonghe Liu
, Keqin Li
:
Compressive Sensing Based Distributed Data Storage for Mobile Crowdsensing. 25:1-25:21 - Xingfa Shen

, Chuang Li
, Weijie Chen
, Yongcai Wang
, Quanbo Ge
:
Transition Model-driven Unsupervised Localization Framework Based on Crowd-sensed Trajectory Data. 26:1-26:21 - Lei Xie, Peicheng Yang, Chuyu Wang, Tao Gu

, Gaolei Duan, Xinran Lu, Sanglu Lu:
GaitTracker: 3D Skeletal Tracking for Gait Analysis Based on Inertial Measurement Units. 27:1-27:27 - Pradipta Ghosh

, Xiaochen Liu
, Hang Qiu
, Marcos A. M. Vieira
, Gaurav S. Sukhatme
, Ramesh Govindan
:
Sensing the Sensor: Estimating Camera Properties with Minimal Information. 28:1-28:26 - Matthew Bradbury

, Arshad Jhumka
, Tim Watson
, Denys A. Flores
, Jonathan Burton
, Matthew Butler
:
Threat-modeling-guided Trust-based Task Offloading for Resource-constrained Internet of Things. 29:1-29:41
Volume 18, Number 3, August 2022
- Carlos Enrique Montenegro-Marín

, Paulo Alonso Gaona-García, Edward Rolando Núñez-Valdéz:
Introduction to the Special Issue on Artificial Intelligence for Underwater Sensor Networks. 30e:1-30e:3 - Van-Trung Pham, Tu N. Nguyen, Bing-Hong Liu

, My T. Thai, Braulio Dumba, Tong Lin:
Minimizing Latency for Data Aggregation in Wireless Sensor Networks: An Algorithm Approach. 30:1-30:21 - Dinesh Kumar Sah, Tu N. Nguyen, Manjusha Kandulna, Korhan Cengiz

, Tarachand Amgoth
:
3D Localization and Error Minimization in Underwater Sensor Networks. 31:1-31:25 - Mahdi Khosravy, Neeraj Gupta

, Nilanjan Dey, Rubén González Crespo
:
Underwater IoT Network by Blind MIMO OFDM Transceiver Based on Probabilistic Stone's Blind Source Separation. 32:1-32:27 - R. Kanthavel

, R. Dhaya
, A. Ahilan:
AI-Based Efficient WUGS Network Channel Modeling and Clustered Cooperative Communication. 33:1-33:14 - Buddhadeb Pradhan, Gautam Srivastava, Diptendu Sinha Roy, K. Hemant Kumar Reddy, Jerry Chun-Wei Lin

:
Traffic Classification in Underwater Networks Using SDN and Data-Driven Hybrid Metaheuristics. 34:1-34:15 - Mohamed Elhoseny

, Abdullah Lakhan, Ahmed Noori Rashid
, Mazin Abed Mohammed
, Karrar Hameed Abdulkareem:
Underwater Sensor Multi-Parameter Scheduling for Heterogenous Computing Nodes. 35:1-35:23 - Tiao Tan

, Ming Zhao
, Zhiwen Zeng:
Joint Offloading and Resource Allocation Based on UAV-Assisted Mobile Edge Computing. 36:1-36:21 - Firoj Gazi

, Nurzaman Ahmed, Sudip Misra, Wei Wei:
Reinforcement Learning-Based MAC Protocol for Underwater Multimedia Sensor Networks. 37:1-37:25 - Weizhong Yang

:
Adversarial Attack Protection Scalar Multiplication for WSNs Resistance Machine-Learning Side-channel Attack. 38:1-38:13 - Zhihan Lv

, Dongliang Chen, Hailin Feng, Wei Wei, Haibin Lv:
Artificial Intelligence in Underwater Digital Twins Sensor Networks. 39:1-39:27
- Laizhong Cui, Yulei Wu, Ryan K. L. Ko

, Alex Ladur, Jianping Wu:
Introduction to the Special Section on Resiliency for AI-enabled Smart Critical Infrastructures for 5G and Beyond. 40e:1-40e:3 - Qindong Sun

, Kai Lin
, Chengxiang Si, Yanyue Xu, Shancang Li
, Prosanta Gope:
A Secure and Anonymous Communicate Scheme over the Internet of Things. 40:1-40:21 - Zheng Yan

, Xinren Qian
, Shushu Liu
, Robert H. Deng
:
Privacy Protection in 5G Positioning and Location-based Services Based on SGX. 41:1-41:19 - Zhao Ming

, Xiuhua Li
, Chuan Sun, Qilin Fan, Xiaofei Wang, Victor C. M. Leung
:
Sleeping Cell Detection for Resiliency Enhancements in 5G/B5G Mobile Edge-Cloud Computing Networks. 42:1-42:30 - Arun Kumar Sangaiah

, Amir Javadpour
, Pedro Pinto
, Forough Ja'fari, Weizhe Zhang:
Improving Quality of Service in 5G Resilient Communication with the Cellular Structure of Smartphones. 43:1-43:23 - Xianjun Deng

, Yuan Tian
, Lingzhi Yi
, Laurence Tianruo Yang
, Yunzhi Xia
, Xiao Tang
, Chenlu Zhu
:
Resilient Deployment of Smart Nodes for Improving Confident Information Coverage in 5G IoT. 44:1-44:21 - Keke Gai

, Qiang Xiao
, Meikang Qiu
, Guolei Zhang
, Jianyu Chen
, Yihang Wei
, Yue Zhang
:
Digital Twin-enabled AI Enhancement in Smart Critical Infrastructures for 5G. 45:1-45:20 - Jie Li

, Yuxing Deng, Wei Sun, Weitao Li, Ruidong Li
, Qiyue Li
, Zhi Liu
:
Resource Orchestration of Cloud-Edge-based Smart Grid Fault Detection. 46:1-46:26 - Xu Zhang

, Yangchao Zhao, Geyong Min, Wang Miao, Haojun Huang, Zhan Ma:
Intelligent Video Ingestion for Real-time Traffic Monitoring. 47:1-47:13 - Qingyang Zhang

, Jie Cui
, Hong Zhong
, Lu Liu
:
Toward Data Transmission Security Based on Proxy Broadcast Re-encryption in Edge Collaboration. 48:1-48:27 - Cheuk-Wang Yau

, Sukanya Jewsakul
, Man-Ho Luk
, Angela P. Y. Lee
, Yunhin Chan
, Edith C. H. Ngai
, Philip W. T. Pong
, King-Shan Lui
, Jiangchuan Liu
:
NB-IoT Coverage and Sensor Node Connectivity in Dense Urban Environments: An Empirical Study. 49:1-49:36
- Tao Wu

, Panlong Yang
, Haipeng Dai
, Chaocan Xiang
, Wanru Xu
:
Optimal Charging Oriented Sensor Placement and Flexible Scheduling in Rechargeable WSNs. 50:1-50:27
Volume 18, Number 4, November 2022
- Meikang Qiu, Ke Xu, Cheng Zhang, Tianwei Zhang:

Introduction to the Special Section on Energy-efficient and Secure Computing for Artificial Intelligence and Beyond. 51e:1-51e:3 - Tao Xiang

, Hangcheng Liu, Shangwei Guo, Yan Gan, Xiaofeng Liao:
EGM: An Efficient Generative Model for Unrestricted Adversarial Examples. 51:1-51:25 - Kai Lin

, Jiayi Liu
, Guangjie Han
:
AI-Based Mean Field Game against Resource-Consuming Attacks in Edge Computing. 52:1-52:18 - Yimin Shi

, Haihan Duan, Lei Yang, Wei Cai
:
An Energy-efficient and Privacy-aware Decomposition Framework for Edge-assisted Federated Learning. 53:1-53:24 - Saiyu Qi

, Wei Wei
, Jingxian Cheng
, Yuanqing Zheng
, Zhou Su
, Jingning Zhang
, Yong Qi
:
Secure and Efficient Item Traceability for Cloud-Aided IIoT. 54:1-54:24 - Chun-I Fan

, Ya-Wen Hsu
, Cheng-Han Shie
, Yi-Fan Tseng
:
ID-Based Multireceiver Homomorphic Proxy Re-Encryption in Federated Learning. 55:1-55:25 - Zijie Huang

, Yulei Wu
, Niccoló Tempini
, Hui Lin
, Hao Yin
:
An Energy-efficient And Trustworthy Unsupervised Anomaly Detection Framework (EATU) for IIoT. 56:1-56:18 - Sun-Yuan Kung

:
XNAS: A Regressive/Progressive NAS for Deep Learning. 57:1-57:32 - Mo Li, Jiliang Wang, Swarun Kumar

, Yuanqing Zheng:
Introduction to the Special Issue on Low Power Wide Area Networks. 58e:1-58e:2 - Qingrui Pan

, Zhenlin An
, Lei Yang
, Qiongzheng Lin
:
LSAB: Enhancing Spatio-temporal Efficiency of AoA Tracking Systems. 58:1-58:25 - Zhaowei Tan

, Boyan Ding
, Jinghao Zhao
, Yunqi Guo
, Songwu Lu
:
Breaking Cellular IoT with Forged Data-plane Signaling: Attacks and Countermeasure. 59:1-59:26 - Krzysztof Grochla

, Anna Strzoda
, Rafal Marjasz
, Przemyslaw Glomb
, Kamil Ksiazek
, Zbigniew Laskarzewski
:
Energy-Aware Algorithm for Assignment of Relays in LP WAN. 60:1-60:23 - Yihang Song

, Chao Song
, Li Lu
, Shen Yang
, Songfan Li
, Chong Zhang
, Qianhe Meng
, Xiandong Shao
, Haili Wang
:
Chipnet: Enabling Large-scale Backscatter Network with Processor-free Devices. 61:1-61:26 - Jiamei Lv

, Gonglong Chen
, Wei Dong
:
Exploiting Rateless Codes and Cross-layer Optimization for Low-power Wide-area Networks. 62:1-62:24 - Lu Wang

, Xiaoke Qi
, Ruifeng Huang
, Kaishun Wu
, Qian Zhang
:
Exploring Partially Overlapping Channels for Low-power Wide Area Networks. 63:1-63:20 - Zhenqiang Xu

, Shuai Tong
, Pengjin Xie
, Jiliang Wang
:
From Demodulation to Decoding: Toward Complete LoRa PHY Understanding and Implementation. 64:1-64:27 - Xiangmao Chang, Jun Zhan, Guoliang Xing

, Jun Huang, Bing Chen, Lu Zhou:
Measurement-Based Optimization of Cell Selection in NB-IoT Networks. 65:1-65:19 - Xianjin Xia

, Ningning Hou
, Yuanqing Zheng
, Tao Gu
:
PCube: Scaling LoRa Concurrent Transmissions with Reception Diversities. 66:1-66:25 - Zehua Sun

, Huanqi Yang
, Kai Liu
, Zhimeng Yin
, Zhenjiang Li
, Weitao Xu
:
Recent Advances in LoRa: A Comprehensive Survey. 67:1-67:44 - Yaman Sangar

, Yoganand Biradavolu
, Bhuvana Krishnaswamy
:
A Novel Time-Interval Based Modulation for Large-Scale, Low-Power, Wide-Area-Networks. 68:1-68:30 - José Álamos

, Peter Kietzmann
, Thomas C. Schmidt
, Matthias Wählisch
:
DSME-LoRa: Seamless Long-range Communication between Arbitrary Nodes in the Constrained IoT. 69:1-69:43 - Frank Hessel

, Lars Almon
, Matthias Hollick
:
LoRaWAN Security: An Evolvable Survey on Vulnerabilities, Attacks and their Systematic Mitigation. 70:1-70:55 - La Van Quan, Minh Hieu Nguyen, Thanh Hung Nguyen, Kien Nguyen, Phi Le Nguyen

:
On the Global Maximization of Network Lifetime in Wireless Rechargeable Sensor Networks. 71:1-71:29 - Kasimir Aula

, Eemil Lagerspetz
, Petteri Nurmi
, Sasu Tarkoma:
Evaluation of Low-cost Air Quality Sensor Calibration Models. 72:1-72:32

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














