


default search action
22nd MASS 2025: Chicago, IL, USA
- 22nd IEEE International Conference on Mobile Ad-Hoc and Smart Systems, MASS 2025, Chicago, IL, USA, October 6-8, 2025. IEEE 2025, ISBN 979-8-3315-6599-2

- Tehmina Bibi, Anselm Köhler, Jan-Thomas Fischer, Falko Dressler:

Deep Bidirectional LSTM-Based Sensor Fusion for 3D Localization in Dynamic Environments. 1-9 - Jianchao Song, Usman Shuaibu Musa, Yixin Chen, Papa Pene, Yifan Guo, Wei Yu:

Federated Learning for Edge WiFi Sensing: Improving Few-Shot Learning Across Various Classifications. 10-18 - Tianchen Wang, Yizhuo Chen, Hongjue Zhao, You Lyu, Jinyang Li, Tomoyoshi Kimura, Yigong Hu, Denizhan Kara, Maggie B. Wigness, Jeffrey Twigg, Tarek F. Abdelzaher:

On Network-Efficient Multimodal Multi-Vantage Foundation Models for Distributed Sensing. 19-27 - Ningning Wang, Yiting Wang, Tianya Zhao, Yuwei Dai, Harrison X. Bai, Karthik Suresh, Zhicheng Jiao, Shiwen Mao, Xuyu Wang

:
RFID-Based Vital Sign Monitoring Under Motion Using Physics-Informed Generative Models. 28-36 - Amirhossein Roknilamouki, Fikadu T. Dagefu, Eylem Ekici, Brian Kim, Justin Kong, Terrence J. Moore, Yin Sun, Ness B. Shroff:

Safe and Reliable Deep Reinforcement Learning for Covert Routing. 37-44 - Nancy Varshney, Federico Mungari, Corrado Puligheddu, Ahmed Badawy, Carla-Fabiana Chiasserini:

XAI4C: An XAI-powered Conflict Detection Framework in O-RAN. 45-50 - Jingzhou Shen, Xuyu Wang

:
An Efficient and Explainable KAN Framework for Wireless Radiation Field Prediction. 51-59 - JinYi Yoon, HyungJune Lee:

CollectiveFL: Edge-to-Edge Collective Intelligence Transfer in Federated Continual Learning. 60-68 - Vajiheh Farhadi, James Giffen:

Cooperative Deep Q-Learning for Strategic Backup Scheduling in Smart Grid Recovery. 69-77 - Tengfei Wang, Teng Liu, Xin Wang, Heng Zhang, Ming Yang, Xiaoming Wu:

DFed-LaMA: Differentially Private Federated Learning via Adaptive Layer-Wise Model Aggregation. 78-83 - Yashuo Wu, Carla-Fabiana Chiasserini, Marco Levorato:

Distributed Context-Aware Resource Allocation for Dynamic Sensor Fusion in Edge Inference. 84-92 - Ruxin Wang

, Gabrielle Gonzalez, Wen Liu, Chen Wang, Tung-Sung Tseng:
DrinkMR: Unobtrusive Drinking Monitoring Using Off-The-Shelf Smart Glasses. 93-101 - Rohit Bhusal, Hongzhi Guo, Ian F. Akyildiz:

Edge-Assisted Generative AI-Driven Video Communication using Topological Data Analysis. 102-110 - Keiwan Soltani, Vishesh Kumar Tanwar, Ashish Gupta, Sajal K. Das:

Energy-Efficient Split Learning for Resource-Constrained Environments: A Smart Farming Solution. 111-119 - Haiqiao Liu, Songjun Huang, Chuanneng Sun, Dario Pompili, Jie Gong:

Large Vision-Language Model-Assisted Information-Rich Semantic Segmentation. 120-126 - Jiongyu Dai, Raymond Zhao, Farhad Rezazadeh, Lizhong Zheng, Haining Wang, Lingjia Liu:

Learning Low-Dimensional Representation for O-RAN Testing via Transformer-ESN. 127-133 - Tingcong Jiang, Chuanneng Sun, Dario Pompili:

Location- and Modality-aware Heterogeneous Data Fusion for Cooperative Perception. 134-142 - Pegah Torkamandi, Navid Hasanzadeh, Jörg Ott, Shahrokh Valaee:

Privacy-Preserving Crowd Size Estimation Using Wi-Fi and Machine Learning. 143-150 - Shenghao Jia, Chaoyue Niu, Fan Wu:

Real-Time Drone Flight Height Decision for 3D Building Reconstruction with NeRF. 151-159 - Sara Alosaime, Arshad Jhumka:

RIFLES: Resource-effIcient Federated LEarning via Scheduling. 160-166 - Kanishka P. Wijewardena, Griffin Klevering, Xiao Zhang, Li Xiao:

VIOSem: Visual-Inertial Odometry via Semantic Communication-enhanced Modulation Design. 167-173 - Hao Wang, Suining He:

Vision-Language Modeling for Scene Understanding and Reasoning of Vehicle-to-X Interactions. 174-182 - Hatef Nouri, George Sklivanitis, Dimitris A. Pados, Elizabeth Serena Bentley:

Adaptive Waveform Shaping for SINR-Optimal Interference Avoidance in OFDM Systems. 183-188 - Minh Phu Vuong, Chul-Ho Lee, Do Young Eun:

Effective Delayed Patching for Transient Malware Control on Networks. 189-197 - Keyuan Zhang, Yin Sun, Bo Ji:

Multimodal Remote Inference. 198-204 - Shihao Shen, Cheng Zhang, Chao Qiu, Xiaofei Wang, Wenyu Wang:

RESCUER: QoS-Aware Service Rescheduling in Serverless Crowdsourced Edge Cloud Clusters. 205-213 - Raghav Rathi, Yilin Wang, Zhenghao Zhang:

2-Pipe: Simultaneous Downlink Transmissions with the Same Spreading Factor in LoRa Networks. 214-220 - Jainam Dhruva, Simone Silvestri:

Efficient HVAC Control using Machine Learning and Adaptive Differential Evolution. 221-229 - Huayue Gu, Runzhe Mo, Quntao Zhuang, Ruozhou Yu:

LACE: Loss-Aware Constellation Design for Global-Scale Entanglement Distribution. 230-236 - Sangwoo Cho, Yeongjin Kim:

Service Route Optimization for Autonomous Vehicles in Edge-Assisted Cellular Infrastructure. 237-245 - Teresa Blanco Abad, Vijay S. Rao, Nikos Kouvelas, Venkatesha Prasad, Kumar Ramamoorthy, Sujay Narayana:

SFMAC: Bleeps that enable high-density LoRaWANs. 246-254 - Anisa Bente Newaz, Sunho Lim, Sthephany Rojas Sabogal, Jinseok Chae, Jangho Lee:

SkyDecoy: Drone-Assisted Decoy Strategies for Preserving Location Privacy in Sky-of-Privacy-Things. 255-263 - Sima Naderi Mighan, Jelena V. Misic, Vojislav B. Misic:

A Dual-Layer Blockchain Sharding Scheme. 264-270 - Nadia Niknami, Vahid Mahzoon, Rajorshi Biswas, Slobadan Vucetic, Jie Wu:

An Interpretable Multi-Modal Transformer-Based Intrusion Detection System Utilizing Log Messages and PCAP Files. 271-279 - Sourav Purification, Simeon Wuthier, Jinoh Kim, Ikkyun Kim, Sang-Yoon Chang:

Base Station Certificate and Authentication for 5G Radio Control Security. 280-288 - Jingwei Zhang, Ruxin Wang, Chen Wang:

Converting Your Bluetooth Headphones into Active Sensing Authenticator: a Bone-Conduction Solution. 289-297 - Tianya Zhao, Xuyu Wang

:
Data-Free Backdoor Attacks on Self-Supervised Human Activity Recognition Models. 298-303 - Elham Amini, Jelena V. Misic, Vojislav B. Misic:

Fast Consensus with Retries and Priority Upgrade. 304-310 - Manh V. Nguyen, Liang Zhao, Bobin Deng, Shaoen Wu:

FL-SNNs: Benchmarking the Byzantine-Robustness of Uniquely-Shaped Surrogate Gradients. 311-319 - Huiwen Zhang, Feng Ye:

Non-Invasive User Profiling through Label Inference in FL-based Network Traffic Classification. 320-328 - Abhinav Kumar

, Swastik Brahma, Baocheng Geng, Charles A. Kamhoua:
Prospect Theoretic Hypothesis Testing-based Cyber Deception. 329-337 - Garvit Agarwal, Yucheng Xie, Yousef Mohammed Y. Alomayri, Feng Li:

RansomNet: Ransomware Classification Using Sub-Graph Mining of Function Call Graphs. 338-344 - Jaskirat Sudan, Fatima Qasem, Hasky Fynn, Fatima Mohammed, Ashwin Sarvadey, Tian Xie, Ang Li, Xiao Zhang:

ViKey: Secure Door Access Control Using Passive Visible Light Tags. 345-353 - Jiyang Chen, Jianwei Liu, Jinsong Han:

Argus-ear: Unconstrained-Vocabulary Sound Eavesdropping via μm-level mmWave Sensing. 354-362 - Md. Romyull Islam

, Bobin Deng, Nobel Dhar, Tu N. Nguyen, Selena He, Yong Shi, Kun Suo:
Characterizing and Understanding Energy Footprint and Efficiency of Small Language Model on Edges. 363-371 - Ye Tian, Xiaoyuan Ren, Zihao Wang, Onat Güngör, Xiaofan Yu, Tajana Rosing:

DailyLLM: Context-Aware Activity Log Generation Using Multi-Modal Sensors and LLMs. 372-380 - Md Sazedur Rahman, Mohamed Elmahallawy, Sanjay Madria, Samuel Frimpong:

Detecting Untargeted Attacks and Mitigating Unreliable Updates in Federated Learning for Underground Mining Operations. 381-390 - Chenyang Wang, Qi Han, Andrew Bernklau:

Distributed Participant Selection in Networks of Heterogeneous Drones for Federated Learning. 391-397 - Kai Huang, Yingchi Mao, Benteng Zhang, Yihan Chen, Yuchu Chen, Jie Wu:

Efficient Zero-Cost Neural Architecture Search for Personalized AI Systems in Cloud-Edge Networks. 398-406 - Anindya Bal, Haofan Cai, Hanqing Guo, Yao Zheng, Xiaoxue Zhang:

Enabling Joint Sensing and Communication via STBC Assisted NOMA in ISAC Systems. 407-414 - Brandon Ramirez, Jonah Duncan, Tran Minh Khoi Le, Synnove Svendsen, Junaid Ahmed Khan:

Energy-Aware Multi-Modal Vision Transformer (ViT) based C-V2X Cooperative Perception in CAVs. 415-423 - Wen Liu, Zeyu Deng, Chen Wang:

Fingerprint Authentication Using Vibration-boosted Refreshing Touchscreen. 424-430 - Junsoo Park, Yeongjin Kim:

Parecon: Enhancing Mobile AI Vision Apps through DNN Partition and Resolution Control. 431-437 - Zhiyuan Guan, Zhiqiang Wang, Jiahui Hou, Zhentan Feng:

PCG: Enhancing Object Distance Estimation via Patch-to-Center Geometry. 438-446 - Griffin Klevering, Kanishka P. Wijewardena, Xiao Zhang, Joshua Siegel, Li Xiao:

PlaCoB: Collaborative Beamforming for Long Range Platoon-to-Platoon Communication. 447-455 - Zhiwei Zheng, Junfeng Zhu, Shigeng Zhang, Yalong Xiao:

PreFall: Early Detection of Consecutive Fall Events with Commercial Wi-Fi Devices. 456-464 - Md. Nurul Absur, Abhinav Kumar

, Swastik Brahma, Saptarshi Debroy:
Reliable Multi-view 3D Reconstruction for 'Just-in-time' Edge Environments. 465-472 - Viola Bernazzoli, Pietro Morri, Eugenio Moro, Mattia Brambilla, Ilario Filippini, Monica Nicoli:

Robust Uplink Ranging in 5G Networks: An Integrated O-RAN Approach. 473-481 - Eduardo Baena, Zihan Xu, Moinak Ghoshal, Imran Khan, Phuc Dinh, Z. Jonny Kong, Y. Charlie Hu, Dimitrios Koutsonikolas:

Root Cause Analysis of Cellular Network Throughput Degradations under Vehicular Mobility. 482-490 - Yinze Li

, Brendan J. Mackenzie, Stefan Lommaert, Tom Van Eyck
, Zhaoyi Liu
, David Newton, Friedrich Wolf-Monheim, Sam Michiels
, Danny Hughes:
RTASP: Real-Time Actuator and Sensor Platform. 491-497 - Hasky Fynn, Jaskirat Sudan, Fatima Qasem, Fatima Mohammed, Xiao Zhang:

Demo: A Passive Optical Tagging Approach for Secure and Revocable Entry Systems. 498-499 - Pavel Stasa, Filip Benes, Jiri Svub, Veroslav Holusa, Miroslava Obrusnikova, Jakub Unucka, Yong-Shin Kang, Sang Do Noh:

Integrated Air Filtration System with Adaptive Regeneration for Public Transport and Industrial Appl. 500-501 - Pavel Stasa, Filip Benes, Jiri Svub, Veroslav Holusa, Miroslava Obrusnikova, Jan Dulovec, Lukas Hollesch, Jakub Unucka, Jongtae Rhee, Jin-Woo Jung:

Optimization of Warehouse Management Using Drones, Artificial Intelligence and RFID. 502-503 - Xiaoxue Zhang, Sammy Tesfai, Minmei Wang, Haofan Cai:

PAVE: Privacy-Preserving Aggregated Verification For Multi-Enterprises Blockchain. 504-505 - Dickson Akuoko Sarpong, Hongzhi Guo:

Poster: Meter-Range Passive NFC for Battery-free Internet of Things. 506-507 - Yibin Liang, Usama Saeed, Ramin Safavinejad, Nima Mohammadi, Lingjia Liu:

SDR Testbed for Mobile Distributed MIMO. 508-509 - Pavel Stasa, Filip Benes, Jiri Svub, Veroslav Holusa, Miroslava Obrusnikova, Jan Dulovec, Lukas Hollesch, Jakub Unucka, Jongtae Rhee, Jin-Woo Jung:

Smart_Safe: AI-Driven Safety System for Indoor Industrial Environments Using Wearable and Auto-ID. 510-511 - Jia-Ming Liang, Shahsank Mishra, Kun-Lin Liu, Huan-I Liao, Jen-Chieh Wu, Yi-Ting Wang, Jen-Jee Chen:

Demo: A Real-Time Intelligent Mail Management System with Multimodal Learning. 512 - Tongzhou Yang, Qihao Li, Chao Liang, Zhuang Ling, Fengye Hu:

A Device-Cooperative-based Scheme for Federated Learning with Unreliable Communications in IIoT. 513-518 - Ifrah Andleeb, Arsalan Hameed, Katsuya Suto, Mitra Mirhassani, Ning Zhang:

Mitigating Adversarial Attacks in Object Detection using Multi-Modal Fusion in Autonomous Vehicles. 519-527 - Yixuan Yang, Yutong Pan, Junhe Zhang, Wanli Ni:

Task Offloading for Collaborative Inference of LLM Agents at the Network Edge. 525-530 - Chuanlei Li, Xu Hu, Minghui Xu, Kun Li, Yue Zhang, Xiuzhen Cheng:

Can Large Language Models Be Trusted Paper Reviewers? A Feasibility Study. 531-536 - Bang Tran, Haoyu Wang, Xiaoqian Zhang, Peng Jiang:

Exploring Safer Image Sharing: A Vision-Language Approach to Privacy Risk Detection and Protection. 537-542 - Haoyang Peng, Minghui Xu, Yinhao Xiao:

FlipBoost: Strengthening Backdoors in LoRA-Tuned Language Models via Bit-Level Injection. 543-548 - Rui Jiao, Yue Zhang, Jinku Li, Boyang Ma:

SCCA: A Multi-Agent Code Security Analysis Framework for AI-Assisted Code Generation. 549-554 - Zhihao Li, Kun Li, Boyang Ma, Minghui Xu, Yue Zhang, Xiuzhen Cheng:

We Urgently Need Privilege Management in MCP: A Measurement of API Usage in MCP Ecosystems. 555-560 - Yue Li, Xiao Li, Hao Wu, Yue Zhang, Fengyuan Xu, Xiuzhen Cheng, Sheng Zhong:

When LLMs Copy to Think: Uncovering Copy-Guided Attacks in Reasoning LLMs. 561-566 - Le Yu, Xing Su, Jiayue Zhang:

A Deep Reinforcement Learning Framework for Multi-Interval HVAC Control. 567-573 - Xin Zhang, Yuqi Song, Deiby Wu Lee:

A Review of Vision-Based Depth Estimation: Current Methods and Future Directions. 574-579 - Deiby Wu Lee, Xin Zhang, Yuqi Song:

An Efficient CNN with Adaptive Loss for Binocular Depth Estimation. 580-584 - Fei Zuo, Junghwan Rhee, Shuaibing Lu, Yuqi Song, Xin Zhang:

An Empirical Study on the Multi-Stage Nature of APT Attacks in Cloud Computing. 585-591 - Busra Cayoren, Enver Ozdemir:

Privacy-Preserving Centralized Authentication for Smart Vehicular Environments. 592-597 - Yu Xiao, Guillermo E. Atkin, Chi Zhou:

Artificial Noise Aided NOMA-MISO System Based on Combinatorial Design. 598-603 - Hung-Chin Jang, Yu-You Liu:

Quantized Blockchain-Based Federated Learning for Secure and Efficient Training. 604-609 - Kowshick Srinivasan, Aakanksha Trivedi, Shuhui Yang:

Quantum-Enhanced Clustering for Intrusion detection system in IoT devices. 610-615 - Oylum Gerenli, Gunes Karabulut-Kurt, Enver Ozdemir:

Lightweight Group Handover for Uncrewed Aerial Vehicles (UAVs). 616-621 - Devin Meyer, Ze Hao He, Yunge Li, Huirong Fu, Lanyu Xu:

Adversarial Attacks and Defenses for Panoptic Perception Models in Autonomous Driving. 622-627 - Adam M. Deinhardt, Devin W. Bowler, Marcelo M. Carvalho, Ting Liu, Damian Valles:

AIoT for Autism: Analyzing Motor Behaviors in Virtual Environments Using Visual Data. 628-633 - Kyra Nhat-Thy Vo, Bhagawat Baanav Yedla Ravi, Mustafa Mohammad Shaky, Sandip Ray:

Automotive Security Virtual Exploration Platform for Wheel Speed Sensor Attacks. 634-639 - Joon Kim, Chengwei Duan, Sandip Ray:

Bit-Flipping Attack Exploration and Countermeasure in 5G Network. 640-645 - Abhinna Das, Oladayo Oyedeji, Reyva Babtista, Justin Varghese, Timothy Trull, Yi Shang:

Enhancing Addiction Research through Advanced Wearable Sensing and Data Analysis. 646-651 - Haylie Rayl, Stephen Chien, Lucas Lippeatt, Amit Singha, Tao Li, Feng Li:

Exposing Privacy Vulnerabilities in mmWave Sensing via Membership Inference Attacks. 652-657 - Isaac Van Meter, Xiaoyan Hong:

Inter-Zone Trust and Secure Data Sharing in Mission-Critical Internet of Underwater Things. 658-663 - Jorge R. Rodriguez, Habib M. Ammari:

k-Coverage in Three-Dimensional Wireless Sensor Networks Using a Game Theoretical Approach. 664-669 - Christopher Xu, Emma Matsuda, Wilondja Jacob, Garvit Agarwal, Feng Li:

MalFusion: A Hybrid Approach to Ransomware Detection. 670-675 - Elias Zheng, Jacob Chunn, Darrin Hanna, Huirong Fu:

Open, Adaptive, Object Detection for Edge Systems with a Vision-Language TinyLLM. 676-681 - Joshua Quintano, Yao Qiang, Huirong Fu:

PA-JJAMA: An LLM Based Intrusion Detection System for CAN Bus Networks. 682-687 - Roberto D. Esquivel, Habib M. Ammari:

Q-Learning-Based Sensor Selection for k-Coverage in Wireless Sensor Networks. 688-693 - Ian Yee, Alan Huang, Shu Hu:

Robust Deepfake Detection via Synthetic Domain Alignment. 694-699 - Shahad Altamimi

, Qasem Abu Al-Haija, Abdullah AlShuaibi:
Securing Distributed IoT Systems: Blockchain-Based Protocol with Integrated Intrusion Response. 700-704 - Devin Bowler, Adam Deinhardt, Marcelo M. Carvalho, Ting Liu, Damian Valles:

Simulation-Based Smart Home Architecture for Autism Support Using CSI-Based Movement Detection. 705-710 - Shivam Patel, Ravi Kumar, Awaneesh Kumar Yadav, Manoj Misra:

A Secure D2D 5G-AKA Protocol with Anonymity Resistance and Perfect Forward Secrecy. 711-716 - Asm Mobarak Hossain, Nadim Mahmud, Ethan Han, Neil Advani, Bibodh Baral, Md. Osman Gani, Vaskar Raychoudhury:

A Smart and Barrier-Aware Navigation System for Wheelchair Routing. 717-722 - Abdul Kadir, Sateesh Kumar Peddoju:

A Three-Level Feature Selection Framework for Android Malware Detection. 723-728 - Amogh Babu K. A, Sateesh Kumar Peddoju:

DroidSwarmAI: Android Malware Detection using GCN and Bio-Inspired Feature Selection. 729-734 - Jacob Hagberg, Paul Snyder, Michael Ullrich, Prasad Pothana, Sreejith Vidhyadharan:

Edge-Enabled Acoustic Sensing for Real-Time UAV Detection and Localization in C-UAS Applications. 735-740 - Alvin Chin, Billy Huang, Justin Chan, Joshua Garcia, Philip Yu, Kevin Leicht:

Ephemeral Social Networks: Capturing Proximity Social Networking at In-Person Events. 741-746 - Joseph Mikkelson, Dominic G. De La Cerda, Yanwei Wu, Xiaoguang Ma:

Microgrid Testbed for Cybersecurity Studies: A Platform for Testing Attacks and Resilience. 747-752 - Manuel Delucchi, Gianni Viardo Vercelli, Subhransu Sourav Priyadarshan:

IoT-Enabled Control Room for Coordinated UAV Fleet Management. 753-758 - Papiya Das, Francesco Betti Sorbelli, Punyasha Chatterjee, Cristina M. Pinotti:

Urban Roads and Aerial Autonomy: Are Drones Safe Above Busy Roads? 759-764 - Jacob H. Zawadzki, Mohammed A. Jasim:

A Priority-Based Spectrum Allocation Method for Centralized UAV Networks. 765-770 - Alexandre Heideker, Giovanni Interdonato, Sara Pizzi, Antonella Molinaro, Angelo Trotta:

Mobility-Aware Orchestration for UAV-Enabled IoT Networks in Emergency Scenarios. 771-775

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














