default search action
16th MSN 2020: Tokyo, Japan
- 16th International Conference on Mobility, Sensing and Networking, MSN 2020, Tokyo, Japan, December 17-19, 2020. IEEE 2020, ISBN 978-1-7281-9916-0
- Remous-Aris Koutsiamanis, Georgios Z. Papadopoulos, Bruno Quoitin, Nicolas Montavont:
A Centralized Controller for Reliable and Available Wireless Schedules in Industrial Networks. 1-9 - Dariush Salami, Olga Streibel, Marcus Rhenius, Stephan Sigg:
A FAIR Extension for the MQTT Protocol. 10-16 - Chaogang Tang, Chunsheng Zhu, Huaming Wu, Xianglin Wei, Qing Li, Joel J. P. C. Rodrigues:
A Game Theoretical Pricing Scheme for Vehicles in Vehicular Edge Computing. 17-22 - Si-Ahmed Naas, Thaha Mohammed, Stephan Sigg:
A Global Brain fuelled by Local intelligence: Optimizing Mobile Services and Networks with AI. 23-32 - Xiujun Wang, Zhi Liu, Susumu Ishihara, Zhe Dang, Jie Li:
A Near-optimal Protocol for the Subset Selection Problem in RFID Systems. 33-42 - Wuyungerile Li, Haode Gao, Yingcong Liu, Bing Jia, Baoqi Huang:
A Priority Task Scheduling Algorithm based on Residual Energy in EH-WSNs. 43-48 - Shunyi Wang, Xiaobin Tan, Simin Li, Xiang Xu, Jian Yang, Quan Zheng:
A QoE-based 360° Video Adaptive Bitrate Delivery and Caching Scheme for C-RAN. 49-56 - Muhammad Aslam, Dengpan Ye, Muhammad Hanif, Muhammad Asad:
Adaptive Machine learning: A Framework for Active Malware Detection. 57-64 - Rui Liu, Jianping Pan:
AirQ: A Privacy-Preserving Truth Discovery Framework for Vehicular Air Quality Monitoring. 65-72 - Na Gai, Kaiping Xue, Peixuan He, Bin Zhu, Jianqing Liu, Debiao He:
An Efficient Data Aggregation Scheme with Local Differential Privacy in Smart Grid. 73-80 - Zhou Su, Tianxin Lin, Qichao Xu, Nan Chen, Shui Yu, Song Guo:
An Online Pricing Strategy of EV Charging and Data Caching in Highway Service Stations. 81-85 - Roni Hytonen, Alison Tshala, Jan Schreier, Melissa Holopainen, Aada Forsman, Minna Oksanen, Rainhard Dieter Findling, Le Ngu Nguyen, Stephan Sigg, Nico Jähne-Raden:
Analysing Ballistocardiography for Pervasive Healthcare. 86-91 - Guoxiong Su, Wenyuan Yang, Zhengding Luo, Yinghong Zhang, Zhiqiang Bai, Yuesheng Zhu:
BDTF: A Blockchain-Based Data Trading Framework with Trusted Execution Environment. 92-97 - Xiaodong Ren, Feilong Lin, Zhongyu Chen, Changbing Tang, Zhonglong Zheng, Minglu Li:
BIA: A Blockchain-based Identity Authorization Mechanism. 98-105 - Zhendong Xu, Baoqi Huang, Bing Jia, Wuyungerile Li:
Compressed Multivariate Kernel Density Estimation for WiFi Fingerprint-based Localization. 106-112 - Tianhui Meng, Huaming Wu, Zhihao Shang, Yubin Zhao, Cheng-Zhong Xu:
CoOMO: Cost-efficient Computation Outsourcing with Multi-site Offloading for Mobile-Edge Services. 113-120 - Sripriya Srikant Adhatarao, Haitao Wang, Mayutan Arumaithurai, Xiaoming Fu:
COPSS-lite: A Lightweight ICN based Pub/Sub System for IoT Environments. 121-128 - Bo Yang, Xiangyu Bai:
Data Collection Strategy Based on Drone Technology in Wireless Sensor Networks. 129-136 - Hongzhi Xiao, Chen Qiu, Qinglin Yang, Huakun Huang, Junbo Wang, Chunhua Su:
Deep Reinforcement Learning for Optimal Resource Allocation in Blockchain-based IoV Secure Systems. 137-144 - Shanshan Sun, Zuchao Ma, Liang Liu, Hang Gao, Jianfei Peng:
Detection of malicious nodes in drone ad-hoc network based on supervised learning and clustering algorithms. 145-152 - Wei Yang Bryan Lim, Jer Shyuan Ng, Zehui Xiong, Dusit Niyato, Song Guo, Cyril Leung, Chunyan Miao:
Dynamic Resource Allocation for Hierarchical Federated Learning. 153-160 - Yang Li, Yuan Wu, Weijia Jia:
Dynamic Spectrum Allocation Enabled Multi-user Latency Minimization in Mobile Edge Computing. 161-168 - XiaoHua Xu, Lixin Wang:
Efficient Algorithm for Multi-Constrained Opportunistic Wireless Scheduling. 169-173 - Yunhui Guo, Xiaofan Yu, Kamalika Chaudhuri, Tajana Rosing:
Efficient Distributed Training in Heterogeneous Mobile Networks with Active Sampling. 174-181 - Yu Liang, Jidong Ge, Sheng Zhang, Changan Niu, Wei Song, Bin Luo:
Efficient Service Entity Chain Placement in Mobile Edge Computing. 182-189 - Weidu Ye, Wenjia Wu, Feng Shan, Ming Yang, Junzhou Luo:
Energy-efficient Trajectory Planning and Speed Scheduling for UAV-assisted Data Collection. 190-197 - Zhongjun Ma, Zhenchun Wei, Wenjie Zhang, Zengwei Lyu, Junyi Xu, Benhong Zhang:
Energy-saving Strategy for Edge Computing by Collaborative Processing Tasks on Base Stations. 198-205 - Brett Weinger, Jinoh Kim, Alex Sim, Makiya Nakashima, Nour Moustafa, K. John Wu:
Enhancing IoT Anomaly Detection Performance for Federated Learning. 206-213 - Takaaki Kawai, Hiroshi Mineno:
Evaluation environment using edge computing for artificial intelligence-based irrigation system. 214-219 - Kaiwen Guo, Yingling Quan, Hao Zhou, Zhi Liu, Panlong Yang, Xiang-Yang Li:
FD-Band: A Ubiquitous Fall Detection System Using Low-Cost COTS Smart Band. 220-227 - Peng Zhou:
Federated Deep Payload Classification for Industrial Internet with Cloud-Edge Architecture. 228-235 - Cheng Huang, Ziyang Zhang, Jing Huang, Fulong Chen:
Fine-grained Device and Data Access Control of Community Medical Internet of Things. 236-243 - Qingyang Fan, Junyu Lin, Guangsheng Feng, Zihan Gao, Huiqiang Wang, Yafei Li:
Joint Service Caching and Computation Offloading to Maximize System Profits in Mobile Edge-Cloud Computing. 244-251 - Simin Li, Xiaobin Tan, Shunyi Wang, Jian Yang, Quan Zheng:
Jointly Video Bitrate Adaptation and Multicast Resource Allocation in Mobile Edge Networks. 252-259 - Syed Bilal Hussain Shah, Lei Wang, Md. Ershadul Haque, Md Jahirul Islam, Anil Carie, Neeraj Kumar:
Lifetime Improvements of Smart Sensors Maintenance Protocol in Prospect of IoT-based Rampal Power Plant. 260-267 - Lu Ma, Weiling Chang, Chao Li, Shanjin Ni, Jia Cui, Ming Liu:
Load balancing and resource management in distributed B5G networks. 268-274 - Zhipeng Song, Zhichao Cao, Zhenjiang Li, Jiliang Wang:
Magic Wand: Towards Plug-and-Play Gesture Recognition on Smartwatch. 275-282 - Luming Yang, Shaojing Fu, Yuchuan Luo, Jiangyong Shi:
Markov Probability Fingerprints: A Method for Identifying Encrypted Video Traffic. 283-290 - Chih-Ho Hsu:
MEC-Assisted FoV-Aware and QoE-Driven Adaptive 360° Video Streaming for Virtual Reality. 291-298 - Guanlong Teng, Feng Hong, Yue Xu, Jianbo Qi, Ruobing Jiang, Chao Liu, Zhongwen Guo:
MobiFit: Contactless Fitness Assistant for Freehand Exercises Using Just One Cellular Signal Receiver. 299-306 - Yan Zhang, Xiaolong Zheng, Liang Liu, Huadong Ma:
Multivariate and Multi-frequency LSTM based Fine-grained Productivity Forecasting for Industrial IoT. 307-314 - Yuncong Hong, Bojie Lv, Rui Wang, Haisheng Tan, Zhenhua Han, Hao Zhou, Francis C. M. Lau:
Online Distributed Job Dispatching with Outdated and Partially-Observable Information. 315-322 - Jiachen Wu, Jipeng Li, Yan Wang, Yanru Zhang, Yingjie Zhou:
Optimal Defense Strategy against Evasion Attacks. 323-329 - Go Hasegawa, Masayuki Murata, Yoshihiro Nakahira, Masayuki Kashima, Shingo Ata:
Optimizing functional split of baseband processing on TWDM-PON based fronthaul network. 330-336 - Zhifei Wang, Luning Liu, Luhan Wang, Xiangming Wen, Wenpeng Jing:
Privacy-Protecting Reputation Management Scheme in IoV-based Mobile Crowdsensing. 337-343 - Jianfeng Zhang, Wensheng Zhang, Lingjun Pu, Jingdong Xu:
QoS Optimization of DNN Serving Systems Based on Per-Request Latency Characteristics. 344-351 - Jiong Dong, Kaoru Ota, Mianxiong Dong:
Real-Time Survivor Detection in UAV Thermal Imagery Based on Deep Learning. 352-359 - Chunhui Liu, Kai Liu, Xincao Xu, Hualing Ren, Feiyu Jin, Songtao Guo:
Real-time Task Offloading for Data and Computation Intensive Services in Vehicular Fog Computing Environments. 360-366 - Yuki Kishimoto, Xiaoyan Wang, Masahiro Umehira:
Reinforcement Learning based Joint Channel/Subframe Selection Scheme for Fair LTE-WiFi Coexistence. 367-372 - Bo Cui, Xinmiao Jian, Qi Chen:
Research on D2D Data Transmission Protocol in NDN. 373-380 - Xiangmao Chang, Xianghui Zhang, Muhammad Waqas Isa, Weiwei Wu, Yan Li:
RF-WTI: Wood Types Identification based on Commodity RFID Devices. 381-386 - Yingjiao Niu, Lingguang Lei, Yuewu Wang, Jiang Chang, Shijie Jia, Chunjing Kou:
SASAK: Shrinking the Attack Surface for Android Kernel with Stricter "seccomp" Restrictions. 387-394 - Jinjie Lu, Waixi Liu, Yinghao Zhu, Sen Ling, Zhitao Chen, Jiaqi Zeng:
Scheduling mix-flow in SD-DCN based on Deep Reinforcement Learning with Private Link. 395-401 - Gen Li, Shutian Hua, Liang Liu, Xiaolong Zheng, Huadong Ma:
SDN Based Computation Offloading for Industrial Internet of Things. 402-409 - Liheng Shen, Shaopeng Hu, Kohei Shimasaki, Taku Senoo, Idaku Ishii:
Simultaneous Multi-face Zoom Tracking for 3-D People-Flow Analysis with Face Identification. 410-417 - Dezhi Ran, Yuanxing Zhang, Wenhan Zhang, Kaigui Bian:
SSR: Joint Optimization of Recommendation and Adaptive Bitrate Streaming for Short-form Video Feed. 418-426 - Dapeng Wu, Jin Yang, Honggang Wang, Boran Yang, Ruyan Wang:
Terminal-Edge-Cloud Collaboration: An Enabling Technology for Robust Multimedia Streaming. 427-434 - Junchao Gong, Xiaojun Zhu, Lijie Xu:
Throughput Maximization for UAV-Enabled Data Collection. 435-440 - Xinjing Yuan, Lingjun Pu, Ruilin Yun, Jingdong Xu:
Tile-based Multi-source Adaptive Streaming for 360-degree Ultra-High-Definition Videos. 441-448 - Ernest Ntizikira, Lei Wang, Bingxian Lu, Xinxin Lu:
TL-IDPS: Two Level Intrusion Detection and Prevention System using Probabilistic Optimal Feature Set Estimation. 449-456 - Shan Wang, Zengyu Song, Hao Zhou, Xing Guo, Jun Xu, Zhi Liu:
Towards mmWave Localization with Controllable Reflectors in NLoS Scenarios. 457-464 - Goodlet Akwasi Kusi, Qi Xia, Christian Nii Aflah Cobblah, Jianbin Gao, Hu Xia:
Training Machine Learning Models Through Preserved Decentralization. 465-472 - Ming Tao, Geng Sun, Tian Wang:
Urban Mobility Prediction based on LSTM and Discrete Position Relationship Model. 473-478 - Yuan Linghu, Ming Xu, Xiangxue Li, Haifeng Qian:
Weighted Local Outlier Factor for Detecting Anomaly on In-Vehicle Network. 479-487 - Jie Hu, Li Zhang, Qin Yu, Kun Yang:
Wireless Information and Energy Provision with Practical Modulation in Energy Self-Sustainable Wireless Networks. 488-495 - Suqin Pang, Fan Bai, Di Zhang, Zheng Wen, Takuro Sato:
A Geometry-based Non-stationary Wideband MIMO Channel Model and Correlation Analysis for Vehicular Communication Systems. 496-501 - Bo Wu, Shoji Nishimura, Qun Jin, Yishui Zhu:
Analyzing Eye-movements of Drivers with Different Experiences When Making a Turn. 502-507 - Ankur Chowdhary, Dijiang Huang, Jayasurya Sevalur Mahendran, Daniel Romo, Yuli Deng, Abdulhakim Sabur:
Autonomous Security Analysis and Penetration Testing. 508-515 - Anderson Bergamini de Neira, Alex Medeiros de Araújo, Michele Nogueira:
Early Botnet Detection for the Internet and the Internet of Things by Autonomous Machine Learning. 516-523 - Jiaquan Zhang, Xiaoming Yao, Xiaoming Fu:
Identifying unfamiliar callers' professions from privacy-preserving mobile phone data. 524-530 - Zihan Chen, Guang Cheng, Bomiao Jiang, Shuye Tang, Shuyi Guo, Yuyang Zhou:
Length Matters: Fast Internet Encrypted Traffic Service Classification based on Multi-PDU Lengths. 531-538 - Kiyoshy Nakamura, Pietro Manzoni, Marco Zennaro, Juan-Carlos Cano, Carlos T. Calafate:
[Invited] LoRaCTP: a LoRa based Content Transfer Protocol for sustainable edge computing. 539-545 - Wassila Lalouani, Mohamed F. Younis:
Machine Learning Enabled Secure Collection of Phasor Data in Smart Power Grid Networks. 546-553 - Han Hu, Weiwei Song, Qun Wang, Fuhui Zhou, Rose Qingyang Hu:
Mobility-Aware Offloading and Resource Allocation in MEC-Enabled IoT Networks. 554-560 - Mubashir Adnan Qureshi, Lili Qiu, Ajay Mahimkar, Jian He, Ghufran Baig:
Multi-dimensional Impact Detection and Diagnosis in Cellular Networks. 561-568 - Hideki Tode, Ashish Man Singh Pradhan, Daishi Kondo, Yosuke Tanigawa:
[Invited] NDN Based Participatory Crowdsensing Framework with Area-focused Interest Forwarding. 569-575 - Shuying Wei, Xiaoliang Wang, Ke Xu:
NoPTPeer: Protecting Android Devices from Stealthy Spoofing and Stealing in WLANs without Privilege. 576-583 - Si-Ahmed Naas, Stephan Sigg:
Real-time Emotion Recognition for Sales. 584-591 - Noriaki Kamiyama, Rin Hamada:
Resilient Caching in Information-Centric Networking. 592-598 - Chao Yang, Xuyu Wang, Shiwen Mao:
Subject-adaptive Skeleton Tracking with RFID. 599-606 - Kyi Thar Ko, Masahiro Mambo:
Trapdoor Assignment of PEKS-based NDN Strategy in Two-Tier Networks. 607-613 - Jie-ming Chen, Lei-Lei Shi, Lu Liu, Ayodeji Ayorinde, Rongbo Zhu, John Panneerselvam:
User Interest Communities Influence Maximization in a Competitive Environment. 614-621 - Fu Chen, Yujia Huo, Kun Liu, Wenying Tang, Jianming Zhu, Zhiyuan Sui:
A Study on MQTT Node Selection. 622-623 - Ganggui Wang, Celimuge Wu, Tsutomu Yoshinaga, Rui Yin:
Impact of Mode Selection on the Performance of D2D-Unlicensed Communications. 624-625 - Zhaoyang Du, Celimuge Wu, Tsutomu Yoshinaga:
UAV-empowered Protocol for Information Sharing in VDTN. 626-627 - Chao Yang, Xuyu Wang, Shiwen Mao:
Demo Abstract: Vision-aided 3D Human Pose Estimation with RFID. 628-629 - Ruizhong Du, Yi Wang:
Verifiable Blockchain-Based Searchable Encryption with forward and backward privacy. 630-635 - Yuantao Teng, Zhengyou Xia:
A Traffic Engineering Technology Based on Segment Routing in SDN. 636-641 - Yang Zhou, Kui Xiao, Yan Zhang:
An Ensemble Learning Approach for Extracting Concept Prerequisite Relations from Wikipedia. 642-647 - Wei Zhao, Taoyang Zhou, Xuangou Wu, Xiujun Wang, Ruilin Pan, Xun Shao:
Boosting Cooperative Game with Complete Information in Multi-UAV Mesh Router Networks. 648-653 - Xiao Yang, Chaofeng Zhang, Caijuan Chen, Haozhe Liang:
Community Preference-Based Information-Centric Networking Cache. 654-658 - Ming Liu, Lu Ma, Chao Li, Weiling Chang, Yuanjie Wang, Jianming Cui, Yingying Ji:
Design and Analysis of Decentralized Interactive Cyber Defense Approach based on Multi-agent Coordination. 659-664 - Modhawi Alotaibi, Dandan Liu, Amiya Nayak:
Improving the Response Time of SDN Controllers Based on Vertical Handover. 665-670 - Guangjie Han, Xingjie Wang, Ning Sun, Li Liu:
A Collision-free MAC protocol based on quorum system for underwater acoustic sensor networks. 671-676 - Jianguo Zhou, Hua Dai, Jie Zhu, Rongqi Qi, Geng Yang, Jian Xu:
A Privacy-preserving and Collusion-resisting Top-k Query Processing in WSNs. 677-682 - Fusang Zhang, Kai Niu, Xiaolai Fu, Beihong Jin:
AcousticThermo: Temperature Monitoring Using Acoustic Pulse Signal. 683-687 - Jiaying Wu, Chuyu Wang, Lei Xie:
Gesture Recognition System Based on Neural Networks by Using COTS RFID Tag Array. 688-693 - Shupo Fu, Shigeng Zhang, Danming Jiang, Xuan Liu:
Real-time and Accurate RFID Tag Localization based on Multiple Feature Fusion. 694-699 - Junpeng Liang, Lei Yang, Zhenyu Wang, Xuxun Liu, Weigang Wu:
Coding based Distributed Data Shuffling for Low Communication Cost in Data Center Networks. 700-705 - Meile Shi, Zhen Wang, Pengfei Yu, Qi Du:
Improving Analysis of Automatic Distribution Changes for Power Grid. 706-710 - Marwa Keshk, Nour Moustafa, Elena Sitnikova, Benjamin P. Turnbull, Dinusha Vatsalan:
Privacy-Preserving Techniques for Protecting Large-Scale Data of Cyber-Physical Systems. 711-717 - Kai Huang, Jing Zhang, Jiakun An, Jinglin Han, Yunjie Lei:
Research on load forecasting model on power sensor net. 718-722 - Huang He, Zhou Xian, Guo Liang, Chang Hao, Ma Ning:
Research on visualization planning method of distribution network based on graphical model integration. 723-728 - Juan Luo, Xinyu Li, Yanliu Zheng:
Researches on Intelligent Traffic Signal Control Based on Deep Reinforcement Learning. 729-734 - Yizhen Sun, Yiman Xie, Weiping Wang, Shigeng Zhang, Jun Gao, Yating Chen:
WSAD: An Unsupervised Web Session Anomaly Detection Method. 735-739 - Yizhen Sun, Dandan Lin, Hong Song, Minjia Yan, Linjing Cao:
A Method to Construct Vulnerability Knowledge Graph based on Heterogeneous Data. 740-745 - Shichang He, Xuan Liu, Xinning Chen, Ying Huang:
ECDT: Exploiting Correlation Diversity for Knowledge Transfer in Partial Domain Adaptation. 746-751 - Xiaolin Tan, Shiyao Hu, Chunguang He, Pengfei Sun, Jing Zhang, Ying Ma:
Study on Location and Sizing Programming of Regional Substation. 752-755 - Juan Luo, Qian Qian, Luxiu Yin, Ying Qiao:
A Game-Theoretical Approach for Task Offloading in Edge Computing. 756-761 - Salahadin Seid, Marco Zennaro, Mulugeta Libsie, Ermanno Pietrosemoli, Pietro Manzoni:
A Low Cost Edge Computing and LoRaWAN Real Time Video Analytics for Road Traffic Monitoring. 762-767 - Dandan Liu, Nitesh Krishna, Amiya Nayak:
A Novel Service Composition Approach for Offloading in Mobile Edge Computing. 768-773 - Yizhen Sun, Shupo Fu, Shigeng Zhang, Hongyu Zhu, Yongfa Li:
Accurate IoT Device Identification from Merely Packet Length. 774-778 - Zhehao Li, Lei Shi, Yi Shi, Yuqi Fan, Zhenchun Wei, Liaoyuan Wu:
An Optimal Wireless Transmission Strategy based on Coherent Beamforming and Successive Interference Cancellation for Edge Computing. 779-784 - Mingzhi Wang, Tao Ma, Tao Wu, Chao Chang, Fang Yang, Huaixi Wang:
Dependency-Aware Dynamic Task Scheduling in Mobile-Edge Computing. 785-790 - Ning Li, Jianen Yan, Zhaoxin Zhang, José-Fernán Martínez, Xin Yuan:
Game Theory based Joint Task Offloading and Resource Allocation Algorithm for Mobile Edge Computing. 791-796 - Kuntao Cui, Wenli Sun, Bin Lin, Wenqiang Sun:
Load Balancing Mechanisms of Unmanned Surface Vehicle Cluster Based on Marine Vehicular Fog Computing. 797-802 - Ruizhong Du, Wangkai He, Junfeng Tian:
Virtual Machine Security Migration Strategy Based on the Edge Computing Environment. 803-808
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.