


default search action
iThings/GreenCom/CPSCom/SmartData/Cybermatics 2024: Copenhagen, Denmark
- 2024 IEEE International Conferences on Internet of Things (iThings) and IEEE Green Computing & Communications (GreenCom) and IEEE Cyber, Physical & Social Computing (CPSCom) and IEEE Smart Data (SmartData) and IEEE Congress on Cybermatics, Copenhagen, Denmark, August 19-22, 2024. IEEE 2024, ISBN 979-8-3503-5163-7

- Tanjina Islam, Ana Oprescu, Zoltán Ádám Mann, Sander Klous:

A Framework to Optimize the Energy Cost of Securing Neural Network Inference. 1-8 - Ruihao Chen, Chengcheng Lyu, Wenzhao Wang, Hui Lin, Qingxin Lin:

A Containerized IoT Simulation Environment for Network Warfare Training. 1-8 - Jiapeng Wang, Zhihan Zheng, Kefan Qiu, Yu-an Tan, Chen Liang, Wenjuan Li:

A Framework for BMC Firmware Vulnerability Analysis and Exploitation. 9-16 - Minhao Zhu, Huanhuan Gu, Xun Che, Jingfei Chen, Qian Zhao, Fan Liu, Yu Zheng:

A Novel Diversified API Recommendation for Power System Sensors. 17-22 - Huanhuan Gu, Jing Shang, Xun Che, Qian Zhao, Pengchuan Wang, Jingfei Chen, Fan Liu:

A Secure Ethernet Passive Optical Network Protocol for Industrial Internet of Things. 23-30 - Sheng Wang, Chun Chen, Bing Han, Jun Zhu:

A Trusted and Decentralized Federated Learning Framework for IoT devices in Smart City. 31-37 - Yanmei Jiao, Kiminori Sato, Bo Wu

:
A Walk-through Type Authentication System using Real-Time Gaze & Motion Detection. 38-43 - Zakaria Benomar, Marco Garofalo, Nikolaos Georgantas, Francesco Longo, Giovanni Merlino, Antonio Puliafito:

Bridging IoT Protocols with the Web of Things: A Path to Enhanced Interoperability. 44-51 - Weiheng Fu, Rongzhong Chen, Kaiwen Chen, Xiaojun Xie:

Civil Engineering Design in IoT: Leveraging Improved Swarm Intelligence Optimization. 52-59 - Chunling Dong, Yu Feng:

Cubic-DUCAG: A New Modeling and Probabilistic Computing Approach for Cyclic Network Attacks. 60-66 - Hugo Hadjur, Doreid Ammar, Laurent Lefèvre:

Deep Reinforcement Learning for Energy-efficient Selection of Embedded Services at the Edge. 67-74 - Bochun Du, Long Qu:

Deep Reinforcement Learning-Based AoI Minimization in UAV-Assisted Multi-Platoon Vehicular Networks. 75-81 - Zhongliao Yang

, Zhengye Xie
, Chen Dong, Xinmin Fan, Zhenyi Chen:
Digital Microfluidic Biochips Test Path Planning Based on Swarm Intelligence Optimization and Internet of Things Technology. 82-89 - Chengyu Lin, Xiaoding Wang, Hui Lin:

Elevating Smart Contract Defenses: A Coordinated NLP-Based Strategy for Vulnerability Detection. 90-97 - Shuang Fu, Xiangping Bryce Zhai, Changyan Yi, Lei Pang, Chee Wei Tan:

Energy Efficient and Low Latency Computation Offloading via Truly PPO in Mobile Edge Computing Networks with Multi-UAV. 98-104 - Jun Tang, Jingpeng Sun, Bing Guo, Yan Shen, Shengxin Dai, Peng Wang:

Enhancing Sales Forecasting Accuracy in the Presence of Missing Data. 105-111 - Raoof Doorshi, Hajira Saleem, Reza Malekian:

Enhancing Visual Inertial Odometry Performance using Deep Learning-based Sensor Fusion. 112-117 - Junling Wang, Dongyang Wu, Yupeng Wang:

IoT Meets Computer Vision: An Improved Detection of Tomato Pests and Diseases. 118-123 - Huixia Lai, Fan Zhou, Bo Wang, Hongrui Chen, Shi Zhang:

Local-GAN: An Anomaly Detection Method Based on Local Key Features and GAN for IoT. 124-132 - Jingjing Lin, Jingsong Lin, Chenxi Lyu, Xinmin Fan, Chen Dong:

malDetect: Malware Classification Using API Sequence and Comparison with Transformer Encoder. 133-140 - Jiali Hu, Long Qu, Qinglin Song, Ran Zhu:

Minimizing Data Transmission Delay in Vehicular Networks through Network Coding-based Broadcasting. 141-148 - Keito Inoshita

, Xiaokang Zhou, Shohei Shimizu:
Multi-Domain and Multi-View Oriented Deep Neural Network for Sentiment Analysis in Large Language Models. 149-156 - Shiyu Chen, Qianmu Li:

Prediction of Social Influence in Social Networks. 157-162 - Chung-Ming Huang, Chia-Hsiang Chen, Jianhua Ma:

Priority-Considered Channel Access for Registration-Backoff-Time (RBT) -based IEEE 802.11ah IOT Network. 163-170 - Alireza Famili, Amin Tabrizian, Tolga O. Atalay, Angelos Stavrou:

RADIO: Reinforcement Learning-Aided Deployment of Wi-Fi Routers in 5G Networks for Indoor Drone Orchestrating. 171-178 - Xin Jin, Shiyu Chen:

Recommendation Algorithm Based on Social Influence Diffusion. 179-184 - Yifei Wang, Mengzhu Pan, Qianmu Li:

TGIEN: An Interpretable Image Editing Method for IoT Applications Based on Text Guidance. 185-192 - Honglei Fu, Pan Wang, Xuejiao Chen:

The Pipeline of VAE base Network Traffic Anomaly Detection Algorithm. 193-199 - Olha Boiko, Anton Komin, Vira Shendryk, Reza Malekian, Paul Davidsson:

TinyML on Mobile Devices for Hybrid Energy Management Systems. 200-207 - Pan Wang, Minyao Liu, Zeyi Li

, Zixuan Wang, Xuejiao Chen:
Unsupervised Real-Time Flow Data Drift Detection Based on Model Logits for Internet of Things Network Traffic Classification. 208-215 - Ravindi de Silva, Arkady B. Zaslavsky, Seng W. Loke, Prem Prakash Jayaraman:

A Comparative Analysis of Query Generation Methods for IoT Middleware Evaluation. 216-223 - Xun Che, Yu Zheng, Minhao Zhu, Qianmu Li, Xu Dong:

A Domain-Adaptive Large Language Model With Refinement Framework For IoT Cybersecurity. 224-229 - Jing Song, Changkai Zhang, Xun Che:

The integrated monitoring system for rail transit and the switching method for the main and backup control centers. 230-234 - Difeng Zhu, Hang Zhou, Anchen Lin, Binbin Zhou:

A Dynamic Risk-aware Routing Recommendation Using Deep Reinforcement Learning. 235-240 - Jianxiang Cao, Xing Song, Wenqian Shang:

A Framework for Privacy-Preserving Efficient Collaborative Learning. 241-245 - Samson Otieno Ooko

, Charles Theuri Kagwi:
A Machine Learning Model for Prediction of Malaria from Microscopic Blood Cell Images. 246-251 - Raúl Gómez Ramos, Jaime Duque Domingo, Eduardo Zalama, Jaime Gómez García-Bermejo:

Ambient Intelligence Ecosystem for Elderly Pattern Detection and Care Using Social Robots. 252-259 - Dominik Grüdl, Thomas Wieland, Daniela Nicklas:

An Architectural Reference Model for IoT Device Management. 260-267 - Franc Pouhela, Maryam Arabshahi, Hans D. Schotten:

Analyzing and Predicting the Power Consumption of a Publish/Subscribe IoT-Broker. 268-275 - Frédéric Lassabe, Dominique Dhoutaut, Benoît Piranda, Olga Kouchnarenko, Julien Bourgeois:

Building a First Prototype of a Multi-scale Modular Distributed Display. 276-281 - Jintao Cao, Allie Null, Marissa Stewart, Suman Bhunia, Mohammad Salman:

Combatting the TrickBot Threat: Analysis, Impact, and Defensive Strategies in Cybersecurity. 282-287 - Pushpendu Kar, Puttipatt Ingkasit:

Development of a User-Friendly and Efficient Control System for Smart Home. 288-293 - Hussah Albinali, Farag Azzedin, Muhammad Riaz:

DEVS-RPL: Design Formal Discrete Event Model of Routing Protocol over LLN. 294-299 - Faiga Alawad

, Peter Herrmann, Vajira Thambawita:
Integrating Synthetic Data Modelling into an Adaptive Sampling Framework for IoT Devices. 300-307 - Severin Pang, Justas Katkus, Stefan Hild:

Inverse-PID: A Mathematical Approach Towards Detecting Real-World Wear and Tear in Industrial Machines. 308-313 - Franc Pouhela, Sogo Pierre Sanon, Dennis Krummacker, Hans D. Schotten:

MMQP: A Lightweight, Secure and Scalable IoT Communication Protocol. 314-323 - Hassan Hammoud, Frédéric Weis, Christophe Langrume

, Melen Leclerc, Jean-Marie Bonnin:
Monitoring of in-field risk of infection events by foliar pathogens using smart IoT nodes. 324-330 - Adel Elzemity, Budi Arief

:
Privacy Threats and Countermeasures in Federated Learning for Internet of Things: A Systematic Review. 331-338 - Mohammad Ali Nemer, Joseph Azar, Abdallah Makhoul, Julien Bourgeois:

A Review of Early Time Series Classification Methods on Machinery Dataset. 347-352 - Omer Melih Gul:

Achieving Asymptotically Optimal Throughput and Fairness for Energy Harvesting Sensors in IoT Network Systems. 353-360 - Raffaele Bolla, Roberto Bruschi, Franco Davoli, Paolo Ghiorzo, Lorenzo Ivaldi, Chiara Lombardo, Beatrice Siccardi:

Comparison of the Performance and Energy Efficiency Evaluation of 5G User-Plane Functions. 361-368 - Alejandro Muñiz Da Costa, Pablo Armingol Robles

, Luis M. Contreras, Óscar González de Dios:
Creation of Topological Maps of Energy Consumption for IP Networks. 369-376 - Hamza Saadaoui, Hajer Rabii, Zeynep Tulumen:

Design and Development of a Real-Time IoT Infrastructure for a future workspace - Energy efficiency and sustainability. 377-385 - Ashkan Tashk, M. A. Alavianmehr:

Enhanced Pedestrian Detection and Tracking Using Multi-Person Pose Extraction and Deep Convolutional LSTM Network. 386-391 - Federico Librino, Francesca Martelli, Giovanni Resta, Glauco Cecchi, Andrea Motroni, Andrea Ria:

How much RF Energy can be Harvested from V2X Communications? An Experimental Assessment. 392-399 - Mohammad N. Patwary, Samiya Khan, Syed Junaid Nawaz:

Low-Cost Green Computing-as-a-Service Testbed for SMEs: Leveraging AI and 6G for Enhanced Productivity. 400-407 - Antoine Bossard:

On three fundamental graph enumeration problems and the corresponding graph generation algorithms. 408-414 - Maxime Agusti, Eddy Caron, Benjamin Fichel, Laurent Lefèvre, Olivier Nicol, Anne-Cécile Orgerie:

PowerHeat: A non-intrusive approach for estimating the power consumption of bare metal water-cooled servers. 415-421 - Hung-Ming Sung, You-Shin Tsai, Timothy Chen

, Ju-Chun Ko, Yi-Ping Hung:
Rivercare: Shaping the Decentralized Identity of Mother Nature on Blockchain through Care Activities of Stewards. 422-429 - Riham Elsaadany, Guy Bégin:

A Number of Conceptual Scalable Node-Organizing Multi-Tiered Blockchain Architectures for IoT. 430-437 - Matteo Vaccargiu, Roberto Tonelli:

An Ethereum Oracle-based solution for P2P Energy Trading Market. 438-445 - Eddie Zhang, Daniel Wu, Jeffrey Boman:

Carbon-Aware Workload Shifting for Mitigating Environmental Impact of Generative AI Models. 446-453 - Shinnosuke Masuda, Tsuyoshi Hasegawa, Taishi Nakai, Akira Sakurai, Kazuyuki Shudo:

High-Bandwidth Node Selection in Compact Block Relay. 454-458 - Ahmed Burhan Mohammed

, Lamia Chaari Fourati, Ahmed M. Fakhrudeen:
Isolation Forest Algorithm Against UAV's GPS Spoofing Attack. 459-463 - Guorui Chen, Jiyan Liu, Chaoliang Li, Chen Zhang, Sirui Jiang, Bin Zhang, Entao Luo:

Research on Recognition and Feature Extraction of SQL Attack Action. 464-470 - Vladimir Marbukh:

Poster: Green Network Optimization with Multi-Agent Reinforcement Learning: Work in Progress. 471-472 - Zhuotao Lian, Weiyu Wang, Chunhua Su, Kouichi Sakurai:

AggreMark: Efficient Watermarking in Federated Learning via Weighted Averaging. 473-478 - Cecilia Delgado Solorzano, Manuel Delaflor

, Carlos Toxtli:
Assessing the Syllogistic Logic and Fact-Checking Capabilities of Large Language Models. 479-488 - Yuquan Zhou, Hejin Huang, Wenyu Liao, Jiyan Liu, Xiangdong Ying, Chen Zhang, Entao Luo:

CRT-Paillier Homomorphic Privacy Protection Scheme Based on BLS Signatures in Mobile Vehicular Networks. 489-496 - Le Hong, Ran Yan, Ruihan Wang

, Hao Chen, Weicheng Cui:
Data-driven ship inspection planning based on evolutionary game. 497-504 - Weihao Guo, Xiaoji Ma, Pingyuan Ge, Ying Chen, Qiuling Yue, Yuqing Zhang:

Defense Contrastive Poisoning: An Application of JPEG to Self-Supervised Contrastive Learning Indiscriminate Poisoning Attacks. 505-510 - Jie Kang, Shixuan Liu, Kuihua Huang, Changjun Fan, Hua He, Chao Chen:

Graph-CoRe: Graph Representation Learning with Contrastive Subgraph Replacement. 511-518 - John Dian:

IoT-based Visual Crack Detection Based on Multi-scale Self-Attention Neural Network. 519-526 - Haoxiang Cheng

, Shixuan Liu, Changjun Fan, Kuihua Huang, Hua He, Xianghan Wang, Zhong Liu:
LLM4HIN: Discovering Meta-path with Large Language Model for Reasoning on Complex Heterogeneous Information Networks. 527-534 - Long Meng, Liqun Chen:

Long-Term Time-Stamping Schemes Based on MACs, Archives, and Transient Keys. 535-542 - Luis Ruhländer, Emilian Popp, Maria Stylidou, Sajjad Khan

, Davor Svetinovic:
On the Security and Privacy Implications of Large Language Models: In-Depth Threat Analysis. 543-550 - Yunfei Wang, Shixuan Liu, Wenhao Wang, Cheng Zhu, Changjun Fan, Kuihua Huang, Chao Chen:

PentraFormer: Learning Agents for Automated Penetration Testing via Sequence Modeling. 551-558 - Zhijing Hu, Hao Yan, Yuhao Zheng, Hua He, Chao Chen, Changjun Fan, Kuihua Huang:

STIOS: A Novel Self-supervised Diffusion Model for Trajectory Imputation in Open Environment Scenarios. 559-566 - Xiaoji Ma, Weihao Guo, Pingyuan Ge, Ying Chen, Qiuling Yue, Yuqing Zhang:

Enhancing Data-Free Robustness Stealing Attack via Boundary Data Generation. 567-572 - Jiayu Zhang, Canyao Lu, Juan Xu, Xiangping Bryce Zhai:

TimesInformer: An Approach to Predicting Urban Water Supply with Multi-Periodic Features. 573-578 - Shahid Abbas, Sana Amjad, Stefan Craß, Seyed Amid Moeinzadeh Mirhosseini:

Analysis of Blockchain-IoT Connection Patterns based on Clients Type. 579-586 - Michael Hofmeier, Wolfgang Hommel:

Application for Electronic Signatures Using Blockchain Technology to Support Trust, Sovereignty and Privacy. 587-594 - Azadeh Sarkheyli, Elnaz Sarkheyli:

Social Media Integration in Public Transportation: A Case Study of Sweden. 595-600 - Cecilia Delgado Solorzano, Carlos Toxtli:

The Use of AI-powered Language Tools in Crowdsourcing to reduce Language Barriers. 601-608 - Monu Chaudhary, Suman Bhunia:

Understanding Blockchain Trilemma, Causes and Solutions. 609-616

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














