


default search action
SmartIoT 2020: Beijing, China
- 2020 IEEE International Conference on Smart Internet of Things, SmartIoT 2020, Beijing, China, August 14-16, 2020. IEEE 2020, ISBN 978-1-7281-6514-1

- Keith Mayes:

Performance Evaluation and Optimisation for Kyber on the MULTOS IoT Trust-Anchor. 1-8 - Axida Shan

, Xiumei Fan, Xinghui Zhang:
Quantitative Study on Impact of Node Selfishness on Performance of MANETs. 9-14 - Muhammad Luthfi, Satoshi Goto, Osamu Ytshi:

Analysis on the Usage of Topic Model with Background Knowledge inside Discussion Activity in Industrial Engineering Context. 15-22 - Haoshi Ren, Lihai Nie, Hongyun Gao, Laiping Zhao, Jianchao Diao:

NetCruiser: Localize Network Failures by Learning from Latency Data. 23-30 - Zhengyang Gu, Kehua Jiang, Qi Zhou:

A Novel Diagnostic Algorithm for Heart Disease in ECG Monitoring System. 31-37 - Qinghua Luo, Chunyu, Xiaozhen Yan, Cong Hu, Chuntao Wang, Jinfeng Ding:

Accurate Underwater Localization Through Phase Difference. 38-42 - Xin Xin

, Sye Loong Keoh, Michele Sevegnani
, Martin Saerbeck:
Dynamic Probabilistic Model Checking for Sensor Validation in Industry 4.0 Applications. 43-50 - De-gan Zhang, Haoli Zhu, Ting Zhang, Jiaxu Wang:

New Method of MSCA for Edge Computing. 51-57 - Umar Ajaib Khan, Waqas Khalid, Saifullah Saifullah:

Energy Efficient Resource Allocation and Computation Offloading Strategy in a UAV-enabled Secure Edge-Cloud Computing System. 58-63 - Sabrina Sicari, Alessandra Rizzardi, Alberto Coen-Porisini:

Increasing the pervasiveness of the IoT: fog computing coupled with pub&sub and security. 64-71 - Yangguang Lu, Xin Chen, Ranran Xi, Ying Chen:

An access selection mechanism in 5G network slicing. 72-78 - Teng Ma, Xin Chen, Zhuo Ma, Ying Chen:

Deep Reinforcement Learning for Pre-caching and Task Allocation in Internet of Vehicles. 79-85 - He Dong, Nan Wu, Guangsheng Feng, Xinying Gao:

Research on Computing Task Allocation Method Based on Multi-UAVs Collaboration. 86-93 - Haiyan Lan, Shangyuan Wu

:
Research of edge caching strategy based on collaboration mechanism. 94-101 - De-gan Zhang, Jingyu Du, Ting Zhang, Hong-rui Fan:

New Method of Traffic Flow Forecasting Based on QPSO Strategy for Internet of Vehicles. 102-108 - Nejc Rozman, Marko Corn

, Janez Diaci:
Sharing Economy: Implementing Decentralized Privacy-Preserving Parking System. 109-116 - Zhihan Xu, Shuja Ansari

, Amir M. Abdulghani, Muhammad Ali Imran
, Qammer H. Abbasi:
IoT Enabled Smart Security Framework for 3D Printed Smart Home. 117-123 - Weifeng Sun, Minghan Jia, Guanghao Zhang, Zun Wang:

RFBBR: A Rtt Faireness Awared Algorithm Based on BBR. 124-131 - Xiaosa Li

, Zhiyong Yuan, Jianhui Zhao, Xiangyun Liao:
Dynamic and Accurate Force Feedback for Electromagnetic Haptic Display. 132-139 - Cankut Ergen, Burhan Gulbahar:

Theoretical Modelling of Smart Meter Privacy Protection with Multi-meter Energy Routing. 140-146 - Hui Song, Qunying Wu

, Zhikai Liu, Feng Ke, Daru Pan, Xian Zhou:
Analysis on Caching Strategy for Device-to-Device Communication with Multiple Helpers. 147-153 - Vanh Khuyen Nguyen

, Minh-Hieu Phan
, Wei Emma Zhang
, Quan Z. Sheng
, Trung Duc Vo:
A Hybrid Approach for Intrusive Appliance Load Monitoring in Smart Home. 154-160 - Zhicheng Li, Lixin Ji, Shuxin Liu, Jinsong Li:

A New Link Prediction in Directed Networks Based on Attributes Fusion. 161-167 - Rui Yang, Xiangzhu Meng, Lin Feng:

Scatter Balance based Semi-supervised Dimensional Reduction. 168-175 - Shihong Gao:

A Discover of Class and Image Level Variance Between Different Pruning Methods on Convolutional Neural Networks. 176-182 - Xuelei Zhao, Xinsheng Ji, Shuxin Liu, Zanyuan He:

Link Prediction Based on Information Preference Connection for Directed Network. 183-189 - Ze Xu, Sanxing Cao:

Efficient Privacy-Preserving Electronic Voting Scheme Based on Blockchain. 190-196 - Yao Ge

, Shuja Ansari
, Amir M. Abdulghani, Muhammad Ali Imran
, Qammer H. Abbasi:
Intelligent Instruction-Based IoT Framework for Smart Home Applications using Speech Recognition. 197-204 - Wenbing Zhao, Shunkun Yang, Xiong Luo:

On Threat Analysis of IoT-Based Systems: A Survey. 205-212 - Ali Alzubaidi, Karan Mitra, Pankesh Patel, Ellis Solaiman:

A Blockchain-based Approach for Assessing Compliance with SLA-guaranteed IoT Services. 213-220 - Fengqi Li

, Chunli Shang, Lupeng Zhang, Jing Liu:
TFBO: A Trusted Framework based on Blockchain for Outsourcing Data Entry. 221-227 - Munmun Biswas, Tanni Dhoom, Refat Khan Pathan

, Monisha Sen Chaiti:
Shortest Path Based Trained Indoor Smart Jacket Navigation System for Visually Impaired Person. 228-235 - Stavros A. Viktoros, Maria K. Michael, Marios M. Polycarpou:

Compact Fault Dictionaries for Efficient Sensor Fault Diagnosis in IoT-enabled CPSs. 236-243 - Gengzhe Zheng, Liming Wu, Feiyang Song, Xinying He, Gengxuan Lin, Danfeng Jiang:

Characteristic Analysis and Test of Mixed Pulley Sound Signal Based on Hidden Markov Model. 244-248 - Yifei Yao, Liangyong Chu, Linyun Shan, Qihui Lei:

Supply Chain Financial Model Innovation Based on Block-chain Drive and Construction of Cloud Computing Credit System. 249-255 - Ludi Bai, Zehui Yu

, Shifeng Zhang, Kangying Hu, Zhan Chen, Junqi Guo:
An In-class Teaching Comprehensive Evaluation Model Based on Statistical Modelling and Ensemble Learning. 256-260 - Milan Lukic

, Srdjan Sobot, Ivan Mezei
, Dejan Vukobratovic, Dragan Danilovic:
In-depth Real-World Evaluation of NB-IoT Module Energy Consumption. 261-265 - Tingyu Qi, Youzheng Wang:

NOMA-based Slotted p-Persistent CSMA with Multipacket Reception from Power Domain. 266-269 - Nahina Islam, Biplob Ray

, Faezeh Pasandideh:
IoT Based Smart Farming: Are the LPWAN Technologies Suitable for Remote Communication? 270-276 - Feiyang Song, Liming Wu, Gengzhe Zheng, Xinying He, Guanchu Wu, Yang Zhong:

Multisize plate detection algorithm based on improved Mask RCNN. 277-281 - Lei Yu, Yang Lu, Benhong Zhang, Lei Shi, Fangliang Huang, Ya Li, Yulian Shen:

Hierarchical Formal Modeling of Internet of Things System Oriented to User Behavior. 282-289 - Annisa Sarah

, Theresia Ghozali, Geraldo Giano, Melisa Mulyadi, Sandra Octaviani, Alfin Hikmaturokhman:
Learning IoT: Basic Experiments of Home Automation using ESP8266, Arduino and XBee. 290-294 - Georges Bou Ghantous

, Asif Gill
:
The DevOps Reference Architecture Evaluation : A Design Science Research Case Study. 295-299 - Chen Chen, Jiaxuan Deng, Ning Lv:

Illegal Constructions Detection in Remote Sensing Images based on Multi-scale Semantic Segmentation. 300-303 - Juan Wen, Zhiyong Yang, Lei Jin:

Wireless Signal Based Elderly Fall Detection Using XGboost Algorithm. 304-308 - Xiao Wei, Junyi Sun, Zheng Qi, Chen Fu:

XuperChain: A blockchain system that supports smart contracts parallelization. 309-313 - Batnyam Enkhtaivan, Akiko Inoue:

Mediating Data Trustworthiness by Using Trusted Hardware between IoT Devices and Blockchain. 314-318 - Qingguang Yu, Zhicheng Jiang, Yuming Liu, Gaoxiang Long:

Research of Power Energy Management Control Strategy with IOT in NZEB. 319-322 - Min Ao, Xin Zhang:

Analysis of Resource Allocation Overheads in Vehicle Ad Hoc Network Considering CSI. 323-327 - Fengxin Cheng, Caixing Shao:

Research on Artificial Fish Swarm Clustering Algorithm in Urban Internet of Vehicles. 328-332 - Zhijie Ma, Qinglin Zhao, Jianwen Yuan, Xiaobo Zhou, Li Feng:

Fork Probability Analysis of PoUW Consensus Mechanism. 333-337 - Koonlachat Meesublak, Tosapol Klinsukont:

A Cyber-Physical System Approach for Predictive Maintenance. 337-341 - Shaojun Jiang, Yilin He:

A low power circuit for medical drip infusion monitoring system. 342-345 - Qianzhen Sun, Tie Qiu, He Guo:

An Intelligent Topology Optimization Strategy Toward the Robust Onion-like Structure. 346-347 - Shi-Syun Kuo, Wei-Tsung Su:

A Blockchain-Indexed Storage supporting Scalable Data Integrity in Supply Chain Traceability. 348-349 - Jaewon Moon, Seungwoo Keum, Sung-Soon Park:

A Correlation Analysis of Indoor and Outdoor Air Quality using IoT sensors. 350-351 - Dimitrios Karagiannis, Konstantina S. Nikita

:
Design and development of a 3D Printed IoT portable Pillbox for continuous medication adherence. 352-353 - Wen-Chung Tsai, Tzu-Hsuan Tsai, Guang-Hao Xiao, Te-Jen Wang, Yu-Ruei Lian, Song-Hao Huang:

An Automatic Key-update Mechanism for M2M Communication and IoT Security Enhancement. 354-355 - Natapon Tansangworn:

Development of IoT Edge Hub for Wireless Sensor Networks based on Docker Container. 356-357

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














