


default search action
16th MSN 2020: Tokyo, Japan
- 16th International Conference on Mobility, Sensing and Networking, MSN 2020, Tokyo, Japan, December 17-19, 2020. IEEE 2020, ISBN 978-1-7281-9916-0

- Remous-Aris Koutsiamanis, Georgios Z. Papadopoulos

, Bruno Quoitin, Nicolas Montavont:
A Centralized Controller for Reliable and Available Wireless Schedules in Industrial Networks. 1-9 - Dariush Salami, Olga Streibel, Marcus Rhenius, Stephan Sigg:

A FAIR Extension for the MQTT Protocol. 10-16 - Chaogang Tang

, Chunsheng Zhu, Huaming Wu, Xianglin Wei, Qing Li
, Joel J. P. C. Rodrigues:
A Game Theoretical Pricing Scheme for Vehicles in Vehicular Edge Computing. 17-22 - Si-Ahmed Naas, Thaha Mohammed

, Stephan Sigg:
A Global Brain fuelled by Local intelligence: Optimizing Mobile Services and Networks with AI. 23-32 - Xiujun Wang, Zhi Liu, Susumu Ishihara, Zhe Dang, Jie Li:

A Near-optimal Protocol for the Subset Selection Problem in RFID Systems. 33-42 - Wuyungerile Li, Haode Gao, Yingcong Liu, Bing Jia, Baoqi Huang:

A Priority Task Scheduling Algorithm based on Residual Energy in EH-WSNs. 43-48 - Shunyi Wang, Xiaobin Tan, Simin Li, Xiang Xu, Jian Yang

, Quan Zheng:
A QoE-based 360° Video Adaptive Bitrate Delivery and Caching Scheme for C-RAN. 49-56 - Muhammad Aslam, Dengpan Ye, Muhammad Hanif, Muhammad Asad:

Adaptive Machine learning: A Framework for Active Malware Detection. 57-64 - Rui Liu, Jianping Pan:

AirQ: A Privacy-Preserving Truth Discovery Framework for Vehicular Air Quality Monitoring. 65-72 - Na Gai, Kaiping Xue

, Peixuan He, Bin Zhu, Jianqing Liu, Debiao He:
An Efficient Data Aggregation Scheme with Local Differential Privacy in Smart Grid. 73-80 - Zhou Su, Tianxin Lin, Qichao Xu, Nan Chen, Shui Yu

, Song Guo:
An Online Pricing Strategy of EV Charging and Data Caching in Highway Service Stations. 81-85 - Roni Hytonen

, Alison Tshala, Jan Schreier, Melissa Holopainen, Aada Forsman, Minna Oksanen, Rainhard Dieter Findling, Le Ngu Nguyen, Stephan Sigg, Nico Jähne-Raden:
Analysing Ballistocardiography for Pervasive Healthcare. 86-91 - Guoxiong Su, Wenyuan Yang, Zhengding Luo, Yinghong Zhang, Zhiqiang Bai, Yuesheng Zhu:

BDTF: A Blockchain-Based Data Trading Framework with Trusted Execution Environment. 92-97 - Xiaodong Ren, Feilong Lin

, Zhongyu Chen, Changbing Tang, Zhonglong Zheng, Minglu Li:
BIA: A Blockchain-based Identity Authorization Mechanism. 98-105 - Zhendong Xu, Baoqi Huang, Bing Jia, Wuyungerile Li:

Compressed Multivariate Kernel Density Estimation for WiFi Fingerprint-based Localization. 106-112 - Tianhui Meng, Huaming Wu, Zhihao Shang, Yubin Zhao, Cheng-Zhong Xu

:
CoOMO: Cost-efficient Computation Outsourcing with Multi-site Offloading for Mobile-Edge Services. 113-120 - Sripriya Srikant Adhatarao, Haitao Wang, Mayutan Arumaithurai, Xiaoming Fu:

COPSS-lite: A Lightweight ICN based Pub/Sub System for IoT Environments. 121-128 - Bo Yang, Xiangyu Bai:

Data Collection Strategy Based on Drone Technology in Wireless Sensor Networks. 129-136 - Hongzhi Xiao, Chen Qiu, Qinglin Yang

, Huakun Huang
, Junbo Wang, Chunhua Su:
Deep Reinforcement Learning for Optimal Resource Allocation in Blockchain-based IoV Secure Systems. 137-144 - Shanshan Sun, Zuchao Ma, Liang Liu, Hang Gao, Jianfei Peng:

Detection of malicious nodes in drone ad-hoc network based on supervised learning and clustering algorithms. 145-152 - Wei Yang Bryan Lim

, Jer Shyuan Ng
, Zehui Xiong
, Dusit Niyato, Song Guo, Cyril Leung, Chunyan Miao:
Dynamic Resource Allocation for Hierarchical Federated Learning. 153-160 - Yang Li, Yuan Wu, Weijia Jia:

Dynamic Spectrum Allocation Enabled Multi-user Latency Minimization in Mobile Edge Computing. 161-168 - XiaoHua Xu, Lixin Wang:

Efficient Algorithm for Multi-Constrained Opportunistic Wireless Scheduling. 169-173 - Yunhui Guo, Xiaofan Yu, Kamalika Chaudhuri, Tajana Rosing:

Efficient Distributed Training in Heterogeneous Mobile Networks with Active Sampling. 174-181 - Yu Liang, Jidong Ge, Sheng Zhang, Changan Niu, Wei Song, Bin Luo:

Efficient Service Entity Chain Placement in Mobile Edge Computing. 182-189 - Weidu Ye, Wenjia Wu, Feng Shan, Ming Yang, Junzhou Luo:

Energy-efficient Trajectory Planning and Speed Scheduling for UAV-assisted Data Collection. 190-197 - Zhongjun Ma, Zhenchun Wei, Wenjie Zhang, Zengwei Lyu, Junyi Xu, Benhong Zhang:

Energy-saving Strategy for Edge Computing by Collaborative Processing Tasks on Base Stations. 198-205 - Brett Weinger, Jinoh Kim, Alex Sim

, Makiya Nakashima, Nour Moustafa
, K. John Wu
:
Enhancing IoT Anomaly Detection Performance for Federated Learning. 206-213 - Takaaki Kawai, Hiroshi Mineno

:
Evaluation environment using edge computing for artificial intelligence-based irrigation system. 214-219 - Kaiwen Guo, Yingling Quan, Hao Zhou, Zhi Liu, Panlong Yang, Xiang-Yang Li:

FD-Band: A Ubiquitous Fall Detection System Using Low-Cost COTS Smart Band. 220-227 - Peng Zhou

:
Federated Deep Payload Classification for Industrial Internet with Cloud-Edge Architecture. 228-235 - Cheng Huang, Ziyang Zhang, Jing Huang, Fulong Chen:

Fine-grained Device and Data Access Control of Community Medical Internet of Things. 236-243 - Qingyang Fan, Junyu Lin, Guangsheng Feng, Zihan Gao, Huiqiang Wang, Yafei Li:

Joint Service Caching and Computation Offloading to Maximize System Profits in Mobile Edge-Cloud Computing. 244-251 - Simin Li, Xiaobin Tan, Shunyi Wang, Jian Yang

, Quan Zheng:
Jointly Video Bitrate Adaptation and Multicast Resource Allocation in Mobile Edge Networks. 252-259 - Syed Bilal Hussain Shah, Lei Wang, Md. Ershadul Haque

, Md. Jahirul Islam, Anil Carie, Neeraj Kumar
:
Lifetime Improvements of Smart Sensors Maintenance Protocol in Prospect of IoT-based Rampal Power Plant. 260-267 - Lu Ma, Weiling Chang, Chao Li, Shanjin Ni, Jia Cui, Ming Liu:

Load balancing and resource management in distributed B5G networks. 268-274 - Zhipeng Song, Zhichao Cao, Zhenjiang Li, Jiliang Wang:

Magic Wand: Towards Plug-and-Play Gesture Recognition on Smartwatch. 275-282 - Luming Yang, Shaojing Fu, Yuchuan Luo, Jiangyong Shi:

Markov Probability Fingerprints: A Method for Identifying Encrypted Video Traffic. 283-290 - Chih-Ho Hsu:

MEC-Assisted FoV-Aware and QoE-Driven Adaptive 360° Video Streaming for Virtual Reality. 291-298 - Guanlong Teng, Feng Hong

, Yue Xu, Jianbo Qi, Ruobing Jiang
, Chao Liu, Zhongwen Guo:
MobiFit: Contactless Fitness Assistant for Freehand Exercises Using Just One Cellular Signal Receiver. 299-306 - Yan Zhang, Xiaolong Zheng, Liang Liu, Huadong Ma:

Multivariate and Multi-frequency LSTM based Fine-grained Productivity Forecasting for Industrial IoT. 307-314 - Yuncong Hong, Bojie Lv, Rui Wang

, Haisheng Tan, Zhenhua Han, Hao Zhou, Francis C. M. Lau:
Online Distributed Job Dispatching with Outdated and Partially-Observable Information. 315-322 - Jiachen Wu, Jipeng Li, Yan Wang, Yanru Zhang, Yingjie Zhou:

Optimal Defense Strategy against Evasion Attacks. 323-329 - Go Hasegawa, Masayuki Murata, Yoshihiro Nakahira, Masayuki Kashima, Shingo Ata:

Optimizing functional split of baseband processing on TWDM-PON based fronthaul network. 330-336 - Zhifei Wang, Luning Liu, Luhan Wang, Xiangming Wen, Wenpeng Jing:

Privacy-Protecting Reputation Management Scheme in IoV-based Mobile Crowdsensing. 337-343 - Jianfeng Zhang

, Wensheng Zhang, Lingjun Pu, Jingdong Xu:
QoS Optimization of DNN Serving Systems Based on Per-Request Latency Characteristics. 344-351 - Jiong Dong, Kaoru Ota

, Mianxiong Dong:
Real-Time Survivor Detection in UAV Thermal Imagery Based on Deep Learning. 352-359 - Chunhui Liu

, Kai Liu, Xincao Xu
, Hualing Ren, Feiyu Jin, Songtao Guo:
Real-time Task Offloading for Data and Computation Intensive Services in Vehicular Fog Computing Environments. 360-366 - Yuki Kishimoto, Xiaoyan Wang, Masahiro Umehira:

Reinforcement Learning based Joint Channel/Subframe Selection Scheme for Fair LTE-WiFi Coexistence. 367-372 - Bo Cui, Xinmiao Jian, Qi Chen:

Research on D2D Data Transmission Protocol in NDN. 373-380 - Xiangmao Chang, Xianghui Zhang, Muhammad Waqas Isa, Weiwei Wu, Yan Li:

RF-WTI: Wood Types Identification based on Commodity RFID Devices. 381-386 - Yingjiao Niu, Lingguang Lei, Yuewu Wang, Jiang Chang, Shijie Jia, Chunjing Kou:

SASAK: Shrinking the Attack Surface for Android Kernel with Stricter "seccomp" Restrictions. 387-394 - Jinjie Lu, Waixi Liu, Yinghao Zhu, Sen Ling, Zhitao Chen, Jiaqi Zeng:

Scheduling mix-flow in SD-DCN based on Deep Reinforcement Learning with Private Link. 395-401 - Gen Li, Shutian Hua, Liang Liu, Xiaolong Zheng, Huadong Ma:

SDN Based Computation Offloading for Industrial Internet of Things. 402-409 - Liheng Shen, Shaopeng Hu, Kohei Shimasaki, Taku Senoo, Idaku Ishii

:
Simultaneous Multi-face Zoom Tracking for 3-D People-Flow Analysis with Face Identification. 410-417 - Dezhi Ran, Yuanxing Zhang, Wenhan Zhang, Kaigui Bian:

SSR: Joint Optimization of Recommendation and Adaptive Bitrate Streaming for Short-form Video Feed. 418-426 - Dapeng Wu

, Jin Yang, Honggang Wang, Boran Yang, Ruyan Wang:
Terminal-Edge-Cloud Collaboration: An Enabling Technology for Robust Multimedia Streaming. 427-434 - Junchao Gong, Xiaojun Zhu, Lijie Xu:

Throughput Maximization for UAV-Enabled Data Collection. 435-440 - Xinjing Yuan, Lingjun Pu, Ruilin Yun, Jingdong Xu:

Tile-based Multi-source Adaptive Streaming for 360-degree Ultra-High-Definition Videos. 441-448 - Ernest Ntizikira

, Lei Wang, Bingxian Lu, Xinxin Lu:
TL-IDPS: Two Level Intrusion Detection and Prevention System using Probabilistic Optimal Feature Set Estimation. 449-456 - Shan Wang, Zengyu Song, Hao Zhou, Xing Guo, Jun Xu, Zhi Liu:

Towards mmWave Localization with Controllable Reflectors in NLoS Scenarios. 457-464 - Goodlet Akwasi Kusi, Qi Xia, Christian Nii Aflah Cobblah, Jianbin Gao, Hu Xia:

Training Machine Learning Models Through Preserved Decentralization. 465-472 - Ming Tao, Geng Sun, Tian Wang:

Urban Mobility Prediction based on LSTM and Discrete Position Relationship Model. 473-478 - Yuan Linghu, Ming Xu, Xiangxue Li, Haifeng Qian:

Weighted Local Outlier Factor for Detecting Anomaly on In-Vehicle Network. 479-487 - Jie Hu, Li Zhang, Qin Yu, Kun Yang:

Wireless Information and Energy Provision with Practical Modulation in Energy Self-Sustainable Wireless Networks. 488-495 - Suqin Pang, Fan Bai, Di Zhang, Zheng Wen, Takuro Sato:

A Geometry-based Non-stationary Wideband MIMO Channel Model and Correlation Analysis for Vehicular Communication Systems. 496-501 - Bo Wu

, Shoji Nishimura, Qun Jin, Yishui Zhu:
Analyzing Eye-movements of Drivers with Different Experiences When Making a Turn. 502-507 - Ankur Chowdhary, Dijiang Huang, Jayasurya Sevalur Mahendran, Daniel Romo, Yuli Deng, Abdulhakim Sabur:

Autonomous Security Analysis and Penetration Testing. 508-515 - Anderson Bergamini de Neira

, Alex Medeiros de Araújo, Michele Nogueira:
Early Botnet Detection for the Internet and the Internet of Things by Autonomous Machine Learning. 516-523 - Jiaquan Zhang

, Xiaoming Yao, Xiaoming Fu:
Identifying unfamiliar callers' professions from privacy-preserving mobile phone data. 524-530 - Zihan Chen

, Guang Cheng, Bomiao Jiang, Shuye Tang, Shuyi Guo, Yuyang Zhou
:
Length Matters: Fast Internet Encrypted Traffic Service Classification based on Multi-PDU Lengths. 531-538 - Kiyoshy Nakamura

, Pietro Manzoni, Marco Zennaro, Juan-Carlos Cano, Carlos T. Calafate:
[Invited] LoRaCTP: a LoRa based Content Transfer Protocol for sustainable edge computing. 539-545 - Wassila Lalouani

, Mohamed F. Younis
:
Machine Learning Enabled Secure Collection of Phasor Data in Smart Power Grid Networks. 546-553 - Han Hu, Weiwei Song, Qun Wang

, Fuhui Zhou
, Rose Qingyang Hu:
Mobility-Aware Offloading and Resource Allocation in MEC-Enabled IoT Networks. 554-560 - Mubashir Adnan Qureshi, Lili Qiu, Ajay Mahimkar, Jian He, Ghufran Baig:

Multi-dimensional Impact Detection and Diagnosis in Cellular Networks. 561-568 - Hideki Tode, Ashish Man Singh Pradhan, Daishi Kondo, Yosuke Tanigawa:

[Invited] NDN Based Participatory Crowdsensing Framework with Area-focused Interest Forwarding. 569-575 - Shuying Wei, Xiaoliang Wang, Ke Xu:

NoPTPeer: Protecting Android Devices from Stealthy Spoofing and Stealing in WLANs without Privilege. 576-583 - Si-Ahmed Naas, Stephan Sigg:

Real-time Emotion Recognition for Sales. 584-591 - Noriaki Kamiyama, Rin Hamada:

Resilient Caching in Information-Centric Networking. 592-598 - Chao Yang, Xuyu Wang

, Shiwen Mao:
Subject-adaptive Skeleton Tracking with RFID. 599-606 - Kyi Thar Ko, Masahiro Mambo:

Trapdoor Assignment of PEKS-based NDN Strategy in Two-Tier Networks. 607-613 - Jie-ming Chen, Lei-Lei Shi, Lu Liu

, Ayodeji Ayorinde, Rongbo Zhu, John Panneerselvam:
User Interest Communities Influence Maximization in a Competitive Environment. 614-621 - Fu Chen, Yujia Huo, Kun Liu, Wenying Tang, Jianming Zhu, Zhiyuan Sui:

A Study on MQTT Node Selection. 622-623 - Ganggui Wang, Celimuge Wu, Tsutomu Yoshinaga, Rui Yin:

Impact of Mode Selection on the Performance of D2D-Unlicensed Communications. 624-625 - Zhaoyang Du

, Celimuge Wu, Tsutomu Yoshinaga:
UAV-empowered Protocol for Information Sharing in VDTN. 626-627 - Chao Yang, Xuyu Wang

, Shiwen Mao:
Demo Abstract: Vision-aided 3D Human Pose Estimation with RFID. 628-629 - Ruizhong Du, Yi Wang:

Verifiable Blockchain-Based Searchable Encryption with forward and backward privacy. 630-635 - Yuantao Teng, Zhengyou Xia:

A Traffic Engineering Technology Based on Segment Routing in SDN. 636-641 - Yang Zhou, Kui Xiao, Yan Zhang:

An Ensemble Learning Approach for Extracting Concept Prerequisite Relations from Wikipedia. 642-647 - Wei Zhao, Taoyang Zhou, Xuangou Wu, Xiujun Wang, Ruilin Pan, Xun Shao:

Boosting Cooperative Game with Complete Information in Multi-UAV Mesh Router Networks. 648-653 - Xiao Yang, Chaofeng Zhang, Caijuan Chen, Haozhe Liang:

Community Preference-Based Information-Centric Networking Cache. 654-658 - Ming Liu, Lu Ma, Chao Li, Weiling Chang, Yuanjie Wang, Jianming Cui

, Yingying Ji:
Design and Analysis of Decentralized Interactive Cyber Defense Approach based on Multi-agent Coordination. 659-664 - Modhawi Alotaibi

, Dandan Liu, Amiya Nayak
:
Improving the Response Time of SDN Controllers Based on Vertical Handover. 665-670 - Guangjie Han, Xingjie Wang, Ning Sun, Li Liu:

A Collision-free MAC protocol based on quorum system for underwater acoustic sensor networks. 671-676 - Jianguo Zhou, Hua Dai, Jie Zhu, Rongqi Qi, Geng Yang, Jian Xu:

A Privacy-preserving and Collusion-resisting Top-k Query Processing in WSNs. 677-682 - Fusang Zhang, Kai Niu, Xiaolai Fu, Beihong Jin:

AcousticThermo: Temperature Monitoring Using Acoustic Pulse Signal. 683-687 - Jiaying Wu, Chuyu Wang, Lei Xie:

Gesture Recognition System Based on Neural Networks by Using COTS RFID Tag Array. 688-693 - Shupo Fu, Shigeng Zhang, Danming Jiang, Xuan Liu:

Real-time and Accurate RFID Tag Localization based on Multiple Feature Fusion. 694-699 - Junpeng Liang, Lei Yang, Zhenyu Wang, Xuxun Liu, Weigang Wu:

Coding based Distributed Data Shuffling for Low Communication Cost in Data Center Networks. 700-705 - Meile Shi, Zhen Wang, Pengfei Yu, Qi Du:

Improving Analysis of Automatic Distribution Changes for Power Grid. 706-710 - Marwa Keshk

, Nour Moustafa, Elena Sitnikova
, Benjamin P. Turnbull
, Dinusha Vatsalan
:
Privacy-Preserving Techniques for Protecting Large-Scale Data of Cyber-Physical Systems. 711-717 - Kai Huang, Jing Zhang, Jiakun An, Jinglin Han, Yunjie Lei:

Research on load forecasting model on power sensor net. 718-722 - Huang He, Zhou Xian, Guo Liang, Chang Hao, Ma Ning:

Research on visualization planning method of distribution network based on graphical model integration. 723-728 - Juan Luo

, Xinyu Li, Yanliu Zheng:
Researches on Intelligent Traffic Signal Control Based on Deep Reinforcement Learning. 729-734 - Yizhen Sun, Yiman Xie, Weiping Wang, Shigeng Zhang, Jun Gao, Yating Chen:

WSAD: An Unsupervised Web Session Anomaly Detection Method. 735-739 - Yizhen Sun, Dandan Lin, Hong Song, Minjia Yan, Linjing Cao:

A Method to Construct Vulnerability Knowledge Graph based on Heterogeneous Data. 740-745 - Shichang He, Xuan Liu, Xinning Chen, Ying Huang:

ECDT: Exploiting Correlation Diversity for Knowledge Transfer in Partial Domain Adaptation. 746-751 - Xiaolin Tan, Shiyao Hu, Chunguang He, Pengfei Sun, Jing Zhang, Ying Ma:

Study on Location and Sizing Programming of Regional Substation. 752-755 - Juan Luo

, Qian Qian, Luxiu Yin, Ying Qiao:
A Game-Theoretical Approach for Task Offloading in Edge Computing. 756-761 - Salahadin Seid

, Marco Zennaro, Mulugeta Libsie, Ermanno Pietrosemoli
, Pietro Manzoni:
A Low Cost Edge Computing and LoRaWAN Real Time Video Analytics for Road Traffic Monitoring. 762-767 - Dandan Liu, Nitesh Krishna, Amiya Nayak

:
A Novel Service Composition Approach for Offloading in Mobile Edge Computing. 768-773 - Yizhen Sun, Shupo Fu, Shigeng Zhang, Hongyu Zhu, Yongfa Li:

Accurate IoT Device Identification from Merely Packet Length. 774-778 - Zhehao Li, Lei Shi, Yi Shi

, Yuqi Fan, Zhenchun Wei, Liaoyuan Wu:
An Optimal Wireless Transmission Strategy based on Coherent Beamforming and Successive Interference Cancellation for Edge Computing. 779-784 - Mingzhi Wang, Tao Ma, Tao Wu, Chao Chang, Fang Yang, Huaixi Wang:

Dependency-Aware Dynamic Task Scheduling in Mobile-Edge Computing. 785-790 - Ning Li, Jianen Yan, Zhaoxin Zhang, José-Fernán Martínez, Xin Yuan

:
Game Theory based Joint Task Offloading and Resource Allocation Algorithm for Mobile Edge Computing. 791-796 - Kuntao Cui, Wenli Sun, Bin Lin, Wenqiang Sun:

Load Balancing Mechanisms of Unmanned Surface Vehicle Cluster Based on Marine Vehicular Fog Computing. 797-802 - Ruizhong Du, Wangkai He, Junfeng Tian:

Virtual Machine Security Migration Strategy Based on the Edge Computing Environment. 803-808

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














