


default search action
17th MSN 2021: Exeter, UK
- 17th International Conference on Mobility, Sensing and Networking, MSN 2021, Exeter, United Kingdom, December 13-15, 2021. IEEE 2021, ISBN 978-1-6654-0668-0

- Luming Yang, Shaojing Fu, Yuchuan Luo, Yongjun Wang, Wentao Zhao:

A Clustering Method of Encrypted Video Traffic Based on Levenshtein Distance. 1-8 - Jing'an Xue, Haibo Wang, Jilong Wang, Zhe Chen, Tong Li

:
A Distributed Hybrid Load Management Model for Anycast CDNs. 9-16 - Jer Shyuan Ng

, Wei Yang Bryan Lim
, Zehui Xiong
, Xianjun Deng, Yang Zhang, Dusit Niyato, Cyril Leung:
A Hierarchical Incentive Mechanism for Coded Federated Learning. 17-24 - Dongkun Huo, Qiang Liu, Yantao Sun, Huiling Li:

A Large Inter-satellite Non-dependent Routing Technology - IS-OLSR. 25-31 - Qian Chen, Xian Zhao, Wenyue Sun, Changda Wang:

A Node Importance Ranking Method Based on the Rate of Network Entropy Changes. 32-39 - Di Wu, Juan Xu, Jiabin Yuan, Xiangping Zhai:

A Novel Deployment Method for UAV-mounted Mobile Base Stations. 40-47 - Lingling Hu, Liang Liu, Yulei Liu, Wenbin Zhai

, Xinmeng Wang:
A robust fixed path-based routing scheme for protecting the source location privacy in WSNs. 48-55 - Tingting Lu, Fanping Zeng, Jingfei Shen, Guozhu Chen, Wenjuan Shu, Weikang Zhang:

A Scheduling Scheme in a Container-Based Edge Computing Environment Using Deep Reinforcement Learning Approach. 56-65 - Liu Tao, Xiang Wang, Xiyang Peng, Po Yang, Jun Qi, Yun Yang:

Activity Selection to Distinguish Healthy People from Parkinson's Disease Patients Using I-DA. 66-73 - Zhihong Sun, Jun Chen, Mithun Mukherjee, Haihui Wang, Dang Zhang:

An Improved Online Multiple Pedestrian Tracking Based on Head and Body Detection. 74-80 - Fidan Mehmeti, Thomas F. La Porta:

Analyzing a 5G Dataset and Modeling Metrics of Interest. 81-88 - Weiqing Huang, Bingyang Li, Wen Wang, Meng Zhang, Sixue Lu, Yushan Han:

AWGAN: Unsupervised Spectrum Anomaly Detection with Wasserstein Generative Adversarial Network along with Random Reverse Mapping. 89-96 - Mohamad Muwfak Hlal, Weizhi Meng

:
BALSAPro: Towards A Security Protocol for Bluetooth Low Energy. 97-104 - Quanwen He, Hui Lin, Fu Xiao, Jia Hu, Xiaoding Wang

:
Blockchain-based Access Control Model to Preserve Privacy for Students' Credit Information. 105-111 - Margarita Vitoropoulou, Konstantinos Tsitseklis

, Vasileios Karyotis, Symeon Papavassiliou:
Caching, Recommendations and Opportunistic Offloading at the Network Edge. 112-119 - Yutong Ye, Min Zhang, Dengguo Feng:

Collecting Spatial Data Under Local Differential Privacy. 120-127 - Pengmiao Li, Yuchao Zhang, Huahai Zhang, Wendong Wang, Ke Xu, Zhili Zhang:

CRATES: A Cache Replacement Algorithm for Low Access Frequency Period in Edge Server. 128-135 - Ahmed Almutairi

, Suresh Srinivasan, Alireza Keshavarz-Haddad, Ehsan Aryafar:
Deep Transfer Learning for Cross-Device Channel Classification in mmWave Wireless. 136-144 - Qi Xia, Zeyi Tao, Qun Li

:
Defending Against Byzantine Attacks in Quantum Federated Learning. 145-152 - Yuanyuan Xie, Bing Chen, Jiale Zhang, Di Wu

:
Defending against Membership Inference Attacks in Federated learning via Adversarial Example. 153-160 - Ludovico Poli, Sangeet Saha, Xiaojun Zhai, Klaus D. McDonald-Maier:

Design and Implementation of a RISC V Processor on FPGA. 161-166 - Md Tamjid Hossain

, Shafkat Islam, Shahriar Badsha, Haoting Shen:
DeSMP: Differential Privacy-exploited Stealthy Model Poisoning Attacks in Federated Learning. 167-174 - Fengyu Zhou

, Hao Zhou, Shan Wang, Wangqiu Zhou, Zhi Liu, Xiang-Yang Li:
Distributed Routing Protocol for Large-Scale Backscatter-enabled Wireless Sensor Network. 175-182 - Xiangyu Li, Zhenfu Cao, Jiachen Shen, Xiaolei Dong:

DPFDT: Decentralized Privacy-preserving Fair Data Trading System. 183-190 - Jindi Wu, Qi Xia, Qun Li:

Efficient Privacy-Preserving Federated Learning for Resource-Constrained Edge Devices. 191-198 - Jacky Cao

, Xiang Su, Benjamin Finley, Antti Pauanne, Mostafa H. Ammar, Pan Hui:
Evaluating Multimedia Protocols on 5G Edge for Mobile Augmented Reality. 199-206 - Chan Yun Hin, Edith C. H. Ngai:

FedHe: Heterogeneous Models and Communication-Efficient Federated Learning. 207-214 - Parya Haji Mirzaee, Mohammad Shojafar, Zahra Pooranian, Pedram Asef, Haitham S. Cruickshank, Rahim Tafazolli

:
FIDS: A Federated Intrusion Detection System for 5G Smart Metering Network. 215-222 - Ruijie Zhao, Yiteng Huang, Xianwen Deng, Zhi Xue, Jiabin Li, Zijing Huang, Yijun Wang:

Flow Transformer: A Novel Anonymity Network Traffic Classifier with Attention Mechanism. 223-230 - Rushi Babaria, Sharat Chandra Madanapalli, Himal Kumar

, Vijay Sivaraman:
FlowFormers: Transformer-based Models for Real-time Network Flow Classification. 231-238 - Tian Qin

, Guang Cheng, Wenchao Chen, Xuan Lei:
FNEL: An Evolving Intrusion Detection System Based on Federated Never-Ending Learning. 239-246 - Liang Wang, Haixing Xu, Zhiwen Yu, Rujun Guan, Bin Guo, Zhuo Sun:

Friendship Understanding by Smartphone-based Interactions: A Cross-space Perspective. 247-254 - Fabian A. Rincon Vija, Samuel Cregut, Georgios Z. Papadopoulos

, Nicolas Montavont:
From Wired to Wireless BMS in Electric Vehicles. 255-262 - Sen Ling, Waixi Liu, Yinghao Zhu, Miaoquan Tan, Jieming Huang, Zhenzheng Guo, Wen-Hong Lin:

FullSight: Towards Scalable, High-Coverage, and Fine-grained Network Telemetry. 263-270 - Bo Wang, Zunfu Huang, Dongming Zhao, Kun Huang, Meixian Song, Qinxue Jiang, Naixue Xiong:

IDS: An Intelligent Data Semantics System for Communication Link Prediction in SIoT. 271-278 - Zengyu Song, Hao Zhou, Shan Wang, Jinmeng Fan, Kaiwen Guo, Wangqiu Zhou, Xiaoyan Wang, Xiang-Yang Li:

IMFi: IMU-WiFi based Cross-modal Gait Recognition System with Hot-Deployment. 279-286 - Rukhsana Ruby, Basem M. ElHalawany, Kaishun Wu:

Impact of UAV Mobility on Physical Layer Security. 287-295 - Xiyu Chen, Yangzhe Liao, Qingsong Ai, Ke Zhang:

Joint Task Offloading and Resource Allocation for MEC Networks Considering UAV Trajectory. 296-302 - Ryan Hosler, Tyler Phillips, Xiaoyuan Yu, Agnideven Palanisamy Sundar, Xukai Zou, Feng Li:

Learning Discriminative Features for Adversarial Robustness. 303-310 - Le Lai, Tongqing Zhou, Zhiping Cai, Jiaping Yu, Hao Bai, Jinhua Cui:

Leveraging blockchain for cross-institution data sharing and authentication in mobile healthcare. 311-318 - Hongrui Chen, Yuan Xiong, Jingru Wang, Zhong Zhou

:
Long-Term Visual Localization with Semantic Enhanced Global Retrieval. 319-326 - Min Yan, Li Wang, Xuanyuan Wang, Liang Li, Lianming Xu, Aiguo Fei:

Matching Theory Aided Federated Learning Method for Load Forecasting of Virtual Power Plant. 327-333 - Bo Liu, Yanyun Xu, Weiqing Huang, Shaoying Guo:

Method for Detecting and Analyzing the Compromising Emanations of USB Storage Devices. 334-340 - Bingyang Guo, Fan Shi, Chengxi Xu, Min Zhang, Yang Li:

Mining Centralization of Internet Service Infrastructure in the Wild. 341-349 - Qi Wu, Guolin Chen, Xiaoxia Huang:

Mobility-Aware Efficient Task Offloading with Dependency Guarantee in Mobile Edge Computing Networks. 350-357 - WangYang Yu, Menghan Jia, Bo Yuan:

Modeling and Analysis of Medical Resource Sharing and Scheduling for Public Health Emergencies based on Petri Nets. 358-365 - Menghui Zhou

, Xulong Wang, Yun Yang, Fengtao Nan, Yu Zhang, Jun Qi, Po Yang:
Modeling Disease Progression Flexibly with Nonlinear Disease Structure via Multi-task Learning. 366-373 - Zhiyuan Zhou, Xiaolei Zhou, Yao Lu, Hua Yan, Baoshen Guo, Shuai Wang:

Multi-Source Data-Driven Route Prediction for Instant Delivery. 374-381 - Bonan Shen, Chenhong Cao, Tong Liu, Jiangtao Li, Yufeng Li:

Neural Adaptive IoT Streaming Analytics with RL-Adapt. 382-389 - Dan Zhang, Yiwen Liang

, Zhihong Sun, Mithun Mukherjee:
One-Class Support Vector Machine with Particle Swarm Optimization for Geo-Acoustic Anomaly Detection. 390-395 - Bing Wang, Yuchun Guo, Yishuai Chen:

Personalized Path Recommendation with Specified Way-points Based on Trajectory Representations. 396-403 - Hanzheng Lyu, Jianyu Niu, Fangyu Gai, Chen Feng:

Publish or Perish: Defending Withholding Attack in Dfinity Consensus. 404-411 - Rutao Yu, Jiangang Shu

, Dekai Yan, Xiaohua Jia:
ReDetect: Reentrancy Vulnerability Detection in Smart Contracts with High Accuracy. 412-419 - Jian Wang

, Yongxin Liu, Shuteng Niu, Houbing Song
:
Reinforcement Learning based Scheduling for Heterogeneous UAV Networking. 420-427 - Wenjuan Shu, Fanping Zeng, Zhen Ling, Junyi Liu, Tingting Lu, Guozhu Chen:

Resource Demand Prediction of Cloud Workloads Using an Attention-based GRU Model. 428-437 - Biaokai Zhu, Liyun Tian, Die Wu, Meiya Dong, Sheng Gao, Lu Zhang, Sanman Liu, Deng-Ao Li:

RF-Vsensing: RFID-based Single Tag Contactless Vibration Sensing and Recognition. 438-445 - Qiong Wu

, Zhenming Liu:
Rosella: A Self-Driving Distributed Scheduler for Heterogeneous Clusters. 446-453 - Aishah Aseeri, Rui Zhang:

SecQSA: Secure Sampling-Based Quantile Summary Aggregation in Wireless Sensor Networks. 454-461 - Xiaosong Gao, Jiaxin Zeng, Xiaobo Zhou, Tie Qiu, Keqiu Li:

Soft Actor-Critic Algorithm for 360-Degree Video Streaming with Long-Term Viewport Prediction. 462-469 - Mingxing Liu, Ying Liu, Ke Xu, Lin He, Xiaoliang Wang, Yangfei Guo, Weiyu Jiang:

TAP: A Traffic-Aware Probabilistic Packet Marking for Collaborative DDoS Mitigation. 470-478 - Feng Wang, Dingde Jiang, Yingjie Chen, Houbing Song

, Zhihan Lv
:
Time-varying Contact Management with Dynamic Programming for LEO Satellite Networks. 479-485 - Li Wang, Weizhi Meng

, Wenjuan Li:
Towards DTW-based Unlock Scheme using Handwritten Graphics on Smartphones. 486-493 - Xiaoyan Hu, Xiaoyi Song, Guang Cheng, Jian Gong, Lu Yang, Honggang Chen, Zhichao Liang:

Towards Efficient Co-audit of Privacy-Preserving Data on Consortium Blockchain via Group Key Agreement. 494-501 - Wenzhi Wang, Meng Fan, Aimin Yu, Dan Meng:

Towards Heap-Based Memory Corruption Discovery. 502-511 - Yang Cai, Biao Han

, Jinshu Su, Xiaoyan Wang:
TraceModel: An Automatic Anomaly Detection and Root Cause Localization Framework for Microservice Systems. 512-519 - Jinfeng Ma, Mengxuan Du, Haifeng Zheng, Xinxin Feng:

Unsupervised Federated Adversarial Domain Adaptation for Heterogeneous Internet of Things. 520-527 - Yuanjun Xia, Shi Dong

, Tao Peng, Tao Wang:
Wireless Network Abnormal Traffic Detection Method Based on Deep Transfer Reinforcement Learning. 528-535 - Agon Memedi

, Falko Dressler:
A Location-Aware Cross-Layer MAC Protocol for Vehicular Visible Light Communications. 536-542 - Zai Shi, Atilla Eryilmaz:

Communication-efficient Subspace Methods for High-dimensional Federated Learning. 543-550 - Felix O. Olowononi

, Ahmed H. Anwar
, Danda B. Rawat, Jaime C. Acosta, Charles A. Kamhoua:
Deep Learning for Cyber Deception in Wireless Networks. 551-558 - Guillem Reus Muns, Batool Salehi, Debashri Roy, Tong Jian, Zifeng Wang, Jennifer G. Dy, Stratis Ioannidis

, Kaushik R. Chowdhury
:
Deep Learning on Visual and Location Data for V2I mmWave Beamforming. 559-566 - Teng Ma, Xin Chen, Libo Jiao, Ying Chen:

Deep Reinforcement Learning-based Edge Caching and Multi-link Cooperative Communication in Internet-of-Vehicles. 567-574 - Shucheng Hu, Tao Ren, Jianwei Niu

, Zheyuan Hu, Guoliang Xing:
Distributed Task Offloading based on Multi-Agent Deep Reinforcement Learning. 575-583 - Yunhuai Liu, Yonggui Huang, Sheng Gu:

DVC: An Deductable Video Coding for Video Broadcast in Highly Dynamic Networks. 584-591 - Xuezheng Liu, Ke Liu, Guoqiao Ye, Miao Hu, Yipeng Zhou

, Di Wu:
Gaming at the Edge: A Weighted Congestion Game Approach for Latency-Sensitive Scheduling. 592-599 - Fabian Wölk, Tingting Yuan

, Krisztina Kis-Katos, Xiaoming Fu:
Measuring Consumption Changes in Rural Villages based on Satellite Image Data - A Case Study for Thailand and Vietnam. 600-607 - Wenjun Yang, Shengjie Shu, Lin Cai, Jianping Pan:

MM-QUIC: Mobility-aware Multipath QUIC for Satellite Networks. 608-615 - Andreas Andreou

, Constandinos X. Mavromoustakis, George Mastorakis, Jordi Mongay Batalla:
Network Security by Merging two Robust Tools from the Mathematical Firmament. 616-621 - Htet Htet Hlaing

, Yuki Funamoto, Masahiro Mambo:
Performance Comparison of Hybrid Encryption-based Access Control Schemes in NDN. 622-627 - Richard Li

, Lijun Dong, Cédric Westphal, Kiran Makhijani
:
Qualitative Communication for Emerging Network Applications with New IP. 628-637 - Yang Liu, Lei Liu, Zhongmin Yan, Jia Hu:

The Algorithm of Multi-source to Multi-sink Traffic scheduling. 638-644 - Thi Ha Ly Dinh, Megumi Kaneko

, Keisuke Wakao, Kenichi Kawamura, Takatsune Moriyama, Yasushi Takatori:
Towards an Energy-Efficient DQN-based User Association in Sub6GHz/mmWave Integrated Networks. 645-652 - You Luo, Feng Wang, Jiangchuan Liu:

Towards High Accuracy Low Latency Real-Time Road Information Collection: An Edge-Assisted Sensor Fusion Approach. 653-660 - Tutomu Murase:

User Cooperative Mobility for Higher QoS in Ad Hoc Network: Framework and Evaluation. 661-670 - Hantao Mei, Guang Cheng, Wei Gao, Junqiang Chen:

Website Fingerprinting on Access network and Core Gateway. 671-678 - Felix Beierle, Hai Dinh-Tuan, Yong Wu:

Demonstrator Game Showcasing Indoor Positioning via BLE Signal Strength. 679-680 - Bo Hui, Chen Jiang

, Pavani Ankireddy, Wenlu Wang, Wei-Shinn Ku:
Indoor Navigation for Users with Mobility Aids Using Smartphones and Neighborhood Networks. 681-682 - Jinfu Chen, Shang Yin, Saihua Cai, Lingling Zhao, Shengran Wang:

L-KPCA: an efficient feature extraction method for network intrusion detection. 683-684 - Hai Dinh-Tuan, Katerina Katsarou, Patrick Herbke

:
Optimizing microservices with hyperparameter optimization. 685-686 - Shunbao Li

, Po Yang, Vitaveska Lanfranchi
:
Examing and Evaluating Dimension Reduction Algorithms for Classifying Alzheimer's Diseases using Gene Expression Data. 687-693 - Mustapha Khiati, Djamel Djenouri, Jianguo Ding

, Youcef Djenouri:
LSTM for Periodic Broadcasting in Green IoT Applications over Energy Harvesting Enabled Wireless Networks: Case Study on ADAPCAST. 694-699 - Ziying Song, Peiliang Wu, Kuihe Yang, Yu Zhang, Yi Liu:

MsfNet: a novel small object detection based on multi-scale feature fusion. 700-704 - Liu Yang, Junjie Yang, Yi Guo

:
Under-determined Blind Speech Separation via the Convolutive Transfer Function and lp Regularization. 705-709 - Sen Yuan, Geming Xia, Jian Chen, Chaodong Yu:

Toward Dispersed Computing: Cases and State-of-The-Art. 710-717 - Chaodong Yu, Geming Xia, Zhaohang Wang:

Trust Evaluation of Computing Power Network Based on Improved Particle Swarm Neural Network. 718-725 - Yipeng Wang, Tongqing Zhou, Changsheng Hou, Bingnan Hou, Zhiping Cai:

2prong: Adaptive Video Streaming with DNN and MPC. 726-731 - Jing Wang, Weiping Zhu, Jianqiao Lai, Zhu Wang:

FDataCollector: A Blockchain Based Friendly Web Data Collection System. 732-739 - Nicola Zingirian, Federico Botti:

Mobile Unattended-Operation Detector for Bulk Dangerous Goods Handling. 740-745 - Lusha Mo, Gaofeng Lv, Baosheng Wang, Guanjie Qiao, Jing Tan:

The Design and Implementation of an Efficient Quaternary Network Flow Watermark Technology. 746-751 - Tao Liu, Qinshu Chen, Hui Li, Bohui Wang, Xin Yang:

TSCF: An Efficient Two-Stage Cuckoo Filter for Data Deduplication. 752-757 - Yiwei Yu, Guang Cheng, Zihan Chen

, Haoxuan Ding:
A DDoS protection method based on traffic scheduling and scrubbing in SDN. 758-765 - Mahboubeh Mohammadi, Ali Balador, Zaloa Fernández

, Iñaki Val:
Adaptive Distributed Beacon Congestion Control with Machine Learning in VANETs. 766-771 - Di Han

, Yifan Huang, Xiaotian Jing, Junmin Liu:
AND: Effective Coupling of Accuracy, Novelty and Diversity in the Recommender System. 772-777 - Cheng Shen, Kai Han, Tianyuan Bi:

Attention-based Bicomponent Synchronous Graph Convolutional Network for traffic flow prediction. 778-785 - Mikhail Zolotukhin, Pyry Kotilainen

, Timo Hämäläinen
:
Intelligent IDS Chaining for Network Attack Mitigation in SDN. 786-791 - Rongman Hong, Hao He:

Interference and Consultation in Virtual Public Space: The Practice of Intermedia Art in Metaverse. 792-797 - Tao Liu, Shengli Pan, Peng Li:

Large-Area Human Behavior Recognition with Commercial Wi-Fi Devices. 798-805 - Hongtao Li, Hao Cheng, Lei Yang:

Reliable Routing and Scheduling in Time-Sensitive Networks. 806-811 - Lin Wang, Lehao Lin

, Xiao Wu, Rongman Hong:
Seshat: Decentralizing Oral History Text Analysis. 812-817 - Wenfei Qian, Pingjian Wang, Lingguang Lei, Tianyu Chen, Bikuan Zhang:

A Secure And High Concurrency SM2 Cooperative Signature Algorithm For Mobile Network. 818-824 - Guido Dietl:

On Firefly Synchronization of Sleep Phases in Energy Efficient Meshed Networks. 825-830 - Xiazhe Tu, Chao Xun, Xiangyu Wu, Jinbo Li, Lingyi Yang:

Power information integrated display system based on interconnection technology. 831-836 - Zhe Wang, Hongda Zhao, Mingxia Zhu:

Research and Application of Intelligent Distribution Network Planning for Multi-source Data Fusion. 837-842 - Hongda Zhao, Mingxia Zhu, Zhe Wang:

Research on Visual Engine of Smart Planning System Based on Internet of Things. 843-848 - Kun Wang, Jiaxing Che, Zhejun Shen:

Sequence-Based Indoor Relocalization for Mobile Augmented Reality. 1-5

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














