


default search action
ACM Transactions on Sensor Networks, Volume 21
Volume 21, Number 1, January 2025
- Haifeng Sun
, Haohua Du
, Xiaojing Yu
, Jiahui Hou
, Lan Zhang
, Xiangyang Li
:
IUAC: Inaudible Universal Adversarial Attacks Against Smart Speakers. 1:1-1:20 - Jiaoyan Chen
, Zhehao Cheng
, Jin Liu
, Xianjun Deng
, Laurence T. Yang
, Yihong Chen
:
Achieving Panoramic View Coverage in Visual Mobile Crowd-Sensing Networks for Emergency Monitoring Applications. 2:1-2:27 - Francesco Betti Sorbelli
, Sajjad Ghobadi
, Cristina M. Pinotti
:
Single- and Multi-Depot Optimization for UAV-Based IoT Data Collection in Neighborhoods. 3:1-3:30 - Quan Chen
, Zhipeng Cai
, Jing Li
, Ning Li
, Lianglun Cheng
, Hong Gao
, Song Guo
:
Structure-Adaptive and Power-Aware Broadcast Scheduling for Multihop Wireless-Powered IoT Networks. 4:1-4:32 - Hao Wang
, Haoran Zhang
, Lu Wang
, Shichang Xuan
, Qian Zhang
:
Fedeval: Defending Against Lazybone Attack via Multi-dimension Evaluation in Federated Learning. 5:1-5:23 - Huimin Chen
, Chaojie Gu
, Lilin Xu
, Rui Tan
, Shibo He
, Jiming Chen
:
Listen to Your Face: A Face Authentication Scheme Based on Acoustic Signals. 6:1-6:23 - Yuzheng Zhu
, Chengzhe Luo
, Yongpan Zou
, Dongping Chen
, Kaishun Wu
:
TimbreSense: Timbre Abnormality Detection for Bel Canto with Smart Devices. 7:1-7:20 - Jia Xu, Wenbin Chen, Haipeng Dai, Lijie Xu, Fu Xiao, Linfeng Liu:
Wireless Charging Scheduling for Long-term Utility Optimization. 8:1-8:31 - Shakhrul Iman Siam
, Hyunho Ahn
, Li Liu
, Samiul Alam
, Hui Shen
, Zhichao Cao
, Ness B. Shroff
, Bhaskar Krishnamachari
, Mani Srivastava
, Mi Zhang
:
Artificial Intelligence of Things: A Survey. 9:1-9:75 - Zhongcheng Wei
, Wei Chen
, Shuli Ning
, Weidong Lin
, Nan Li
, Bin Lian
, Xiang Sun
, Jijun Zhao
:
A Survey on WiFi-based Human Identification: Scenarios, Challenges, and Current Solutions. 10:1-10:32
Volume 21, Number 2, March 2025
- Ju Wang
, Liqiong Chang
, Shourya Aggarwal
, Omid Abari
, Srinivasan Keshav
:
Sustainable and Low-Cost Greenhouse Soil Moisture Monitoring Using Battery-Free RFID Sensors. 11:1-11:28 - Hui Huang
, Qiang Ye
, Yitong Zhou
:
Safety-Critical Offloading with Constrained Reinforcement Learning for Multi-access Edge Computing. 12:1-12:37 - Shengheng Liu
, Zihuan Mao
, Xingkang Li
, Mengguan Pan
, Peng Liu
, Yongming Huang
, Xiaohu You
:
Model-Driven Deep Neural Network for Enhancing Direction Finding with Commodity 5G gNodeB. 13:1-13:25 - Sukanya Jewsakul
, Edith C. H. Ngai
:
RACEME: Embedded Intelligence for Correlation-driven Predictive Energy-harvesting Management in LoRa Networks. 14:1-14:38 - Kalyan Nakka
, Habib M. Ammari
:
Hierarchical Deployment and Square Tessellation for Connected k-Coverage in Heterogeneous Planar Wireless Sensor Networks. 15:1-15:27 - Andrea Maioli
, Kevin Alessandro Quinones
, Saad Ahmed
, Muhammad Hamad Alizai
, Luca Mottola
:
Dynamic Voltage and Frequency Scaling for Intermittent Computing. 16:1-16:34 - Prithwi Bagchi
, Basudeb Bera
, Ashok Kumar Das
, Biplab Sikdar
:
Quantum Safe Lattice-Based Single Round Online Collaborative Multi-Signature Scheme for Blockchain-Enabled IoT Applications. 17:1-17:33 - Shengheng Liu
, Ningning Fu
:
Enabling Low-Power Massive MIMO with Ternary ADCs for AIoT Sensing. 18:1-18:26 - Siyuan Zhou
, Duc Van Le
, Linshan Jiang
, Zhuoran Chen
, Xiaohua Peng
, Daren Ho
, Jianmin Zheng
, Rui Tan
:
RoboCam: Model-Based Robotic Visual Sensing for Precise Inspection of Mesh Screens. 19:1-19:23 - Akram Hussain
, Yuan Luo
:
Spatial Correlations Based Fault Tolerant Source Localization Using Wireless Sensor Networks. 20:1-20:30 - Ke Xu
, Jiangtao Wang
, Hongyuan Zhu
, Dingchang Zheng
:
Evaluating Self-Supervised Learning for WiFi CSI-Based Human Activity Recognition. 21:1-21:38 - Kang Yang
, Yuning Chen
, Wan Du
:
FLog: Automated Modeling of Link Quality for LoRa Networks in Orchards. 22:1-22:28 - Rupendra Pratap Singh Hada
, Abhishek Srivastava
:
A Hybrid Approach for Localisation of Sensor Nodes in Remote Locations. 23:1-23:33 - Ziang Wang
, Chunhui Duan
, Jiawei Xue
, Fan Li
, Qihua Feng
, Yinan Zhu
, Ziyang Zhou
:
TagRecon: Fine-Grained 3D Reconstruction of Multiple Tagged Packages via RFID Systems. 24:1-24:25 - Yantao Li
, Yichao Wang
, Hongyu Huang
:
RPWAEAuth: Sensor-Based Continuous Authentication Using Reconstruction Probability in Wasserstein Autoencoder. 25:1-25:18
Volume 21, Number 3, May 2025
- Ziyao Huang, Weiwei Wu, Vincent Chau, Kui Wu, Xiang Liu, Jianping Wang:
Minimizing Age of Event in Artificial Intelligence of Things. 26:1-26:29 - Yimiao Sun, Yuan He, Jiacheng Zhang, Xin Na, Yande Chen, Weiguo Wang, Xiuzhen Guo:
Exploiting Dispersion Effect of Signals for Accurate Indoor WiFi Localization. 27:1-27:21 - Rongxin Zhu, Azzedine Boukerche, Qiuling Yang:
An Interference-aware and Collision-free MAC Protocol for Underwater Wireless Sensor Networks. 28:1-28:26 - Yurui Zhang, Dongmei Li, Xiaomei Zhang, Wenjing Lv:
An Efficient Cross-Domain Fine Grain Proxy Re-encryption Scheme for Secure Transmission in IIOT. 29:1-29:21 - Jiuwei Li, Shixin Wang, Zhaoyuan Xu, Wei Xi, Shuai Wang, Wei Gong:
EchScatter: Enriching Codeword Translation for High-Throughput Ambient ZigBee Backscatter. 30:1-30:21 - Anqi Zhang, Ping Zhao, Wenke Lu, Guanglin Zhang:
Decentralized Federated Learning towards Communication Efficiency, Robustness, and Personalization. 31:1-31:20 - Puhan Luo, Jiahui Hou, Haisheng Tan, Mu Yuan, Guangyu Wu, Kaiwen Guo, Zhiqiang Wang, Xiang-Yang Li:
ChannelZip: SLO-Aware Channel Compression for Task-Adaptive Model Serving on IoT Devices. 32:1-32:27
Volume 21, Number 4, July 2025
- Fatima Hachem, Davide Vecchia, Maria Luisa Damiani, Gian Pietro Picco:
Fine-Grained Stop-Move Detection with UWB: Quality Metrics and Real-World Evaluation. 33:1-33:33 - Zhigang Yin, Marko Radeta, Mohan Liyanage, Mayowa Olapade, Abdul-Rasheed Ottun, Agustin Zuniga, Pan Hui, Petteri Nurmi, Huber Flores:
SNAKE: Harnessing Human Touch for Produce Quality Estimation to Foster Sustainable Retail Practices. 34:1-34:39 - Arun Sekar Rajasekaran, Maria Azees, Basker Palaniswamy, Ashok Kumar Das, Mohammed J. F. Alenazi:
ESALP2: Efficient Signature Aggregation with Location Privacy Preservation in Wireless Body Area Networks. 35:1-35:25 - Lingyu Du, Xucong Zhang, Guohao Lan:
Resource-efficient Gaze Estimation via Frequency-domain Multi-task Contrastive Learning. 36:1-36:24 - Fengyu Zhou, Hao Zhou, Weiming Guo, Zhan Wang, Wangqiu Zhou, Xiang Cui, Xiaoyan Wang, Xiang-Yang Li:
DAEE: Distributed Adaptive Exploration and Exploitation for Orientation Adjustment in Magnetic Wireless Power Transfer System. 37:1-37:25 - Chunlin Li, Kejun Long, Mengjie Yang, Liang Zhao, Xiaoheng Deng, Denghua Li, Shaohua Wan:
D3QN-TD3-Based User Association and Resource Allocation in ISAC-Aided Vehicular Edge Computing. 38:1-38:31 - Ashish Kashinath, Sibin Mohan, Akshay Uttama Nambi, Sumukh Marathe:
Physics-Based Fault Analysis for Commodity PIR Sensors. 39:1-39:29 - Sijia Zhang, Xiang Cui, Haohua Du, Shaoang Li, Yingqi Yu, Jiahui Hou, Xiang-Yang Li:
DPShaping: Balancing Privacy Guarantee and Communication Cost in IoT Traffic Shaping. 40:1-40:22 - Gecheng Chen, Chengwen Luo, Haiming Zeng, Gangren Wen, Zheng Luo, Jia Wang, Jin Zhang, Zhongru Yang, Jianqiang Li:
Material-ID: Towards mmWave-based Material Identification. 41:1-41:26 - Yuanhao Feng, Jinyang Huang, Youwei Zhang, Xiang Zhang, Meng Li, Fusang Zhang, Tianyue Zheng, Anran Li, Mianxiong Dong, Zhi Liu:
RF-Eye: Commodity RFID Can Know What You Write and Who You Are Wherever You Are. 42:1-42:26 - Ping Li, Xinrui He, Zhenfei Zhang, Feiyu Han, Panlong Yang, Zhao Lv:
Location-aware Inaudible Attack Defense Towards Smart Speakers. 43:1-43:21

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.