


default search action
ACM Transactions on Sensor Networks, Volume 20
Volume 20, Number 1, January 2024
- Yiwen Dong
, Amelie Bonde
, Jesse R. Codling
, Adeola Bannis
, Jinpu Cao
, Asya Macon
, Gary A. Rohrer
, Jeremy Miles
, Sudhendu R. Sharma
, Tami M. Brown-Brandl
, Akkarit Sangpetch
, Orathai Sangpetch
, Pei Zhang
, Hae Young Noh
:
PigSense: Structural Vibration-based Activity and Health Monitoring System for Pigs. 1:1-1:43 - Michael Baddeley
, Carlo Alberto Boano
, Antonio Escobar-Molero
, Ye Liu
, Xiaoyuan Ma
, Victor Marot
, Usman Raza
, Kay Römer
, Markus Schuss
, Aleksandar Stanoev
:
Understanding Concurrent Transmissions: The Impact of Carrier Frequency Offset and RF Interference on Physical Layer Performance. 2:1-2:39 - Jianzhi Tang
, Luoyi Fu
, Shiyu Liang
, Fei Long
, Lei Zhou
, Xinbing Wang
, Chenghu Zhou
:
FlowerCast: Efficient Time-sensitive Multicast in Wireless Sensor Networks with Link Uncertainty. 3:1-3:32 - Qian Zhang
, Zheng Yang
, Fan Li
, Biaokai Zhu
, Pengpeng Chen
:
WVC: Towards Secure Device Paring for Mobile Augmented Reality. 4:1-4:22 - Yuning Yu
, Shanglin Hsu
, Andre Chen
, Yutian Chen
, Bin Tang
:
Truthful and Optimal Data Preservation in Base Station-less Sensor Networks: An Integrated Game Theory and Network Flow Approach. 5:1-5:40 - Jinke Song, Shangfeng Wan, Min Huang, Jiqiang Liu, Limin Sun, Qiang Li:
Toward Automatically Connecting IoT Devices with Vulnerabilities in the Wild. 6:1-6:26 - Bo Wei
, Weitao Xu
, Mingcen Gao
, Guohao Lan
, Kai Li
, Chengwen Luo
, Jin Zhang
:
SolarKey: Battery-free Key Generation Using Solar Cells. 7:1-7:24 - Xuewei Bai
, Yongcai Wang
, Haodi Ping
, Xiaojia Xu
, Deying Li
, Shuo Wang
:
InferLoc: Hypothesis-Based Joint Edge Inference and Localization in Sparse Sensor Networks. 8:1-8:28 - Jianbo Li
, Genji Yuan
, Zheng Yang
:
Edge-assisted Object Segmentation Using Multimodal Feature Aggregation and Learning. 9:1-9:22 - Jie Lian
, Changlai Du
, Jiadong Lou
, Li Chen
, Xu Yuan
:
EchoSensor: Fine-grained Ultrasonic Sensing for Smart Home Intrusion Detection. 10:1-10:24 - Wei You
, Meixuan Ren
, Yuzhuo Ma
, Die Wu
, Jilin Yang
, Xuxun Liu
, Tang Liu
:
Practical Charger Placement Scheme for Wireless Rechargeable Sensor Networks with Obstacles. 11:1-11:23 - Guopeng Li
, Haisheng Tan
, Liuyan Liu
, Hao Zhou
, Shaofeng H.-C. Jiang
, Zhenhua Han
, Xiang-Yang Li
, Guoliang Chen
:
DAG Scheduling in Mobile Edge Computing. 12:1-12:25 - Chaofan Ma
, Wei Liang
, Meng Zheng
, Xiaofang Xia
, Lin Chen:
A Voronoi Diagram and Q-Learning based Relay Node Placement Method Subject to Radio Irregularity. 13:1-13:27 - Ya Nan
, Shiqi Jiang
, Mo Li
:
Large-scale Video Analytics with Cloud-Edge Collaborative Continuous Learning. 14:1-14:23 - Xin Yang
, Omid Ardakanian
:
Blinder: End-to-end Privacy Protection in Sensing Systems via Personalized Federated Learning. 15:1-15:32 - Yingxiao Wu
, Haocheng Ni
, Changlin Mao
, Jianping Han
, Wenyao Xu
:
Non-intrusive Human Vital Sign Detection Using mmWave Sensing Technologies: A Review. 16:1-16:36 - Qingyi Chang
, Dan Tao
, Jiangtao Wang
, Ruipeng Gao
:
Deep Compressed Sensing based Data Imputation for Urban Environmental Monitoring. 17:1-17:21 - Duc Van Le
, Joy Qiping Yang
, Siyuan Zhou
, Daren Ho
, Rui Tan
:
Design, Deployment, and Evaluation of an Industrial AIoT System for Quality Control at HP Factories. 18:1-18:19 - Amitangshu Pal
, Hongzhi Guo
, Sijung Yang
, Mustafa Alper Akkas
, Xufeng Zhang
:
Taking Wireless Underground: A Comprehensive Summary. 19:1-19:44 - Xinjun Cai
, Zheng Yang
, Liang Dong
, Qiang Ma
, Xin Miao
, Zhuo Liu
:
Multi-User Mobile Augmented Reality with ID-Aware Visual Interaction. 20:1-20:23 - Bowen Pang
, Sicong Liu, Hongli Wang, Bin Guo, Yuzhan Wang
, Hao Wang
, Zhenli Sheng, Zhongyi Wang, Zhiwen Yu:
AdaMEC: Towards a Context-adaptive and Dynamically Combinable DNN Deployment Framework for Mobile Edge Computing. 21:1-21:28 - Rahul Mishra
, Hari Prabhat Gupta
:
A Model Personalization-based Federated Learning Approach for Heterogeneous Participants with Variability in the Dataset. 22:1-22:28 - Junsheng Li
, Ling Wang
, Jie Liu
, Jinshan Tang
:
ViST: A Ubiquitous Model with Multimodal Fusion for Crop Growth Prediction. 23:1-23:23 - Ziyao Huang
, Weiwei Wu
, Chenchen Fu
, Xiang Liu
, Feng Shan
, Jianping Wang
, Xueyong Xu
:
Communication-Topology-preserving Motion Planning: Enabling Static Routing in UAV Networks. 24:1-24:39 - Weizheng Wang
, Qing Wang
, Marco Zuniga
:
Taming Irregular Cardiac Signals for Biometric Identification. 25:1-25:26
Volume 20, Number 2, March 2024
- Fangyu Li
, WenZhan Song
, Xiaohua Xu
:
Editorial: Special Issue on Cyber-Physical Security and Zero Trust. 26:1-26:2 - Di Wang
, Fangyu Li
, Kaibo Liu
, Xi Zhang
:
Real-time Cyber-Physical Security Solution Leveraging an Integrated Learning-Based Approach. 27:1-27:22 - Ying Ju
, Mingjie Yang
, Chinmay Chakraborty
, Lei Liu
, Qingqi Pei
, Ming Xiao
, Keping Yu
:
Reliability-Security Tradeoff Analysis in mmWave Ad Hoc-based CPS. 28:1-28:23 - Zhen Hong
, Lingling Lu
, Dehua Zheng
, Jiahui Suo
, Peng Sun
, Raheem Beyah
, Zhenyu Wen
:
Detect Insider Attacks in Industrial Cyber-physical Systems Using Multi-physical Features-based Fingerprinting. 29:1-29:27 - Zhuoyi Miao
, Jun Yu
:
A Robust Learning Framework for Smart Grids in Defense Against False-Data Injection Attacks. 30:1-30:12 - Junqin Huang
, Linghe Kong
, Jingwei Wang
, Guihai Chen
, Jianhua Gao
, Gang Huang
, Muhammad Khurram Khan
:
Secure Data Sharing over Vehicular Networks Based on Multi-sharding Blockchain. 31:1-31:23 - Yinghong Yang
, Fenhua Bai
, Zhuo Yu
, Tao Shen
, Yingli Liu
, Bei Gong
:
An Anonymous and Supervisory Cross-chain Privacy Protection Protocol for Zero-trust IoT Application. 32:1-32:20 - Junyi Liu
, Yifu Tang
, Haimeng Zhao
, Xieheng Wang
, Fangyu Li
, Jingyi Zhang
:
CPS Attack Detection under Limited Local Information in Cyber Security: An Ensemble Multi-Node Multi-Class Classification Approach. 33:1-33:27 - Siben Tian
, Fenhua Bai
, Tao Shen
, Chi Zhang
, Bei Gong
:
VSSB-Raft: A Secure and Efficient Zero Trust Consensus Algorithm for Blockchain. 34:1-34:22 - Shun Zhang
, Pengfei Lan
, Benfei Duan
, Zhili Chen
, Hong Zhong
, Neal N. Xiong
:
DPIVE: A Regionalized Location Obfuscation Scheme with Personalized Privacy Levels. 35:1-35:26
- Ping Zhao
, Jin Jiang
, Guanglin Zhang
:
FedSuper: A Byzantine-Robust Federated Learning Under Supervision. 36:1-36:29 - Danyang Li
, Jingao Xu
, Zheng Yang
, Chengpei Tang
:
Train Once, Locate Anytime for Anyone: Adversarial Learning-based Wireless Localization. 37:1-37:21 - Zhipeng Zhou
, Feng Wang
, Wei Gong
:
i-Sample: Augment Domain Adversarial Adaptation Models for WiFi-based HAR. 38:1-38:20 - Qianru Liao
, Yongzhi Huang
, Yandao Huang
, Kaishun Wu
:
An Eavesdropping System Based on Magnetic Side-Channel Signals Leaked by Speakers. 39:1-39:30 - Luoyu Mei
, Zhimeng Yin
, Shuai Wang
, Xiaolei Zhou
, Taiwei Ling
, Tian He
:
ECRLoRa: LoRa Packet Recovery under Low SNR via Edge-Cloud Collaboration. 40:1-40:25 - Xiaolin Gu
, Wenjia Wu
, Aibo Song
, Ming Yang
, Zhen Ling
, Junzhou Luo
:
RF-TESI: Radio Frequency Fingerprint-based Smartphone Identification under Temperature Variation. 41:1-41:21 - Shanyue Wang
, Yubo Yan
, Yujie Chen
, Panlong Yang
, Xiang-Yang Li
:
Spray: A Spectrum-efficient and Agile Concurrent Backscatter System. 42:1-42:21 - Shuangqing Xia
, Tianzhang Xing
, Chase Q. Wu
, Guoqing Liu
, Jiadi Yang
, Kang Li
:
AQMon: A Fine-grained Air Quality Monitoring System Based on UAV Images for Smart Cities. 43:1-43:20 - Yuan He
, Jia Zhang
, Rui Xi
, Xin Na
, Yimiao Sun
, Beibei Li
:
Detection and Identification of Non-cooperative UAV Using a COTS mmWave Radar. 44:1-44:22 - Wen Zhang
, Chen Pan
, Tao Liu
, Jeff Jun Zhang
, Mehdi Sookhak
, Mimi Xie
:
Intelligent Networking for Energy Harvesting Powered IoT Systems. 45:1-45:31 - Yaming Xu
, Yan Wang
, Boliang Li
:
Robust Classification and 6D Pose Estimation by Sensor Dual Fusion of Image and Point Cloud Data. 46:1-46:21 - Zhihao Shen, Wan Du
, Xi Zhao
, Jianhua Zou
:
Retrieving Similar Trajectories from Cellular Data of Multiple Carriers at City Scale. 47:1-47:28 - Jinghui Zhang
, Jiawei Wang
, Yaning Li
, Fa Xin
, Fang Dong
, Junzhou Luo
, Zhihua Wu
:
Addressing Heterogeneity in Federated Learning with Client Selection via Submodular Optimization. 48:1-48:32 - Tuo Shi
, Zhipeng Cai
, Jianzhong Li
, Hong Gao
:
Optimize the Age of Useful Information in Edge-assisted Energy-harvesting Sensor Networks. 49:1-49:26 - Zhiyuan Zhou
, Xiaolei Zhou
, Baoshen Guo
, Shuai Wang
, Tian He
:
Multi-sensor Data-driven Route Prediction in Instant Delivery with a 3-Conversion Network. 50:1-50:21
Volume 20, Number 3, May 2024
- Boyu Fan
, Xiang Su
, Sasu Tarkoma
, Pan Hui
:
Behave Differently when Clustering: A Semi-asynchronous Federated Learning Approach for IoT. 51:1-51:28 - Yifan Xu
, Fan Dang
, Kebin Liu
, Zhui Zhu
, Xinlei Chen
, Xu Wang
, Xin Miao
, Haitian Zhao
:
BEANet: An Energy-efficient BLE Solution for High-capacity Equipment Area Network. 52:1-52:23 - Guoming Zhang
, Xiaoyu Ji
, Xinyan Zhou
, Donglian Qi
, Wenyuan Xu
:
Ultrasound Communication Using the Nonlinearity Effect of Microphone Circuits in Smart Devices. 53:1-53:22 - Zehua Sun
, Tao Ni
, Huanqi Yang
, Kai Liu
, Yu Zhang
, Tao Gu
, Weitao Xu
:
FLoRa+: Energy-efficient, Reliable, Beamforming-assisted, and Secure Over-the-air Firmware Update in LoRa Networks. 54:1-54:28 - Haiyang Huang
, Tianhui Meng
, Jianxiong Guo
, Xuekai Wei
, Weijia Jia
:
SecEG: A Secure and Efficient Strategy against DDoS Attacks in Mobile Edge Computing. 55:1-55:21 - Yushi Cheng, Boyang Zhou
, Yanjiao Chen
, Yi-Chao Chen
, Xiaoyu Ji
, Wenyuan Xu
:
Evaluating Compressive Sensing on the Security of Computer Vision Systems. 56:1-56:24 - Ravi Raj Saxena
, Joydeep Pal
, Srinivasan Iyengar
, Bhawana Chhaglani
, Anurag Ghosh
, Venkata N. Padmanabhan
, Prabhakar T. Venkata
:
Holistic Energy Awareness and Robustness for Intelligent Drones. 57:1-57:31 - Zichuan Xu
, Haiyang Qiao
, Weifa Liang
, Zhou Xu
, Qiufen Xia
, Pan Zhou
, Omer F. Rana
, Wenzheng Xu
:
Flow-Time Minimization for Timely Data Stream Processing in UAV-Aided Mobile Edge Computing. 58:1-58:28 - Anderson Biegelmeyer
, Alexandre dos Santos Roque
, Edison Pignaton de Freitas
:
An Experimental Study on BLE 5 Mesh Applied to Public Transportation. 59:1-59:27 - Xiao Zhang
, James Mariani
, Li Xiao
, Matt W. Mutka
:
Exploiting Fine-grained Dimming with Improved LiFi Throughput. 60:1-60:24 - Jie Lian
, Xu Yuan
, Jiadong Lou
, Li Chen
, Hao Wang
, Nian-Feng Tzeng
:
Room-scale Location Trace Tracking via Continuous Acoustic Waves. 61:1-61:23 - Liangyi Gong
, Hao Lin
, Daibo Liu
, Lanqi Yang
, Hongyi Wang
, Jiaxing Qiu
, Zhenhua Li
, Feng Qian
:
Who Should We Blame for Android App Crashes? An In-Depth Study at Scale and Practical Resolutions. 62:1-62:24 - Hongwei Du
, Jingfang Su
, Zhao Zhang
, Zhenhua Duan
, Cong Tian
, Ding-Zhu Du
:
Full View Maximum Coverage of Camera Sensors: Moving Object Monitoring. 63:1-63:23 - Roufaida Laidi
, Djamel Djenouri
, Youcef Djenouri
, Jerry Chun-Wei Lin
:
TG-SPRED: Temporal Graph for Sensorial Data PREDiction. 64:1-64:20 - Qiang Ma
, Hao Yuan
, Zhe Hu
, Xu Wang
, Zheng Yang
:
A Liquidity Analysis System for Large-scale Video Streams in the Oilfield. 65:1-65:22 - Simeon Babatunde
, Arwa Alsubhi
, Josiah D. Hester
, Jacob Sorber
:
Greentooth: Robust and Energy Efficient Wireless Networking for Batteryless Devices. 66:1-66:31 - Xiaolong Zheng
, Ruinan Li
, Yuting Wang
, Liang Liu
, Huadong Ma
:
PolarScheduler: Dynamic Transmission Control for Floating LoRa Networks. 67:1-67:33 - Francesco Betti Sorbelli
, Federico Corò
, Sajal K. Das
, Lorenzo Palazzetti
, Cristina M. Pinotti
:
Drone-Based Bug Detection in Orchards with Nets: A Novel Orienteering Approach. 68:1-68:28 - Pengfei Wang
, Dian Jiao
, Leyou Yang
, Bin Wang
, Ruiyun Yu
:
Hypergraph-based Truth Discovery for Sparse Data in Mobile Crowdsensing. 69:1-69:23 - Xianzhong Ding
, Alberto Cerpa
, Wan Du
:
Exploring Deep Reinforcement Learning for Holistic Smart Building Control. 70:1-70:28 - Jiarui Zhang
, Jiliang Wang
:
FusionTrack: Towards Accurate Device-free Acoustic Motion Tracking with Signal Fusion. 71:1-71:30 - Yijie Chen
, Jiliang Wang
, Jing Yang
:
Exploiting Anchor Links for NLOS Combating in UWB Localization. 72:1-72:22 - Mingzhe Li
, Wei Wang
, Jin Zhang
:
Towards Efficient and Deposit-Free Blockchain-Based Spatial Crowdsourcing. 73:1-73:22 - Yuncan Zhang
, Weifa Liang
, Wenzheng Xu
, Zichuan Xu
, Xiaohua Jia
:
Cost Minimization of Digital Twin Placements in Mobile Edge Computing. 74:1-74:26 - Xiangwei Meng
, Wei Liang
, Zisang Xu
, Kuanching Li
, Muhammad Khurram Khan
, Xiaoyan Kui
:
An Anonymous Authenticated Group Key Agreement Scheme for Transfer Learning Edge Services Systems. 75:1-75:23
Volume 20, Number 4, July 2024
- Pengfei Hu
, Zhe Chen
, Chris Xiaoxuan Lu
, Xuyu Wang
, Jun Luo
, Prasant Mohapatra
:
Introduction to the Special Section on Contact-free Smart Sensing in AIoT. 76:1-76:4 - Gasper Slapnicar
, Wenjin Wang
, Mitja Lustrek
:
Feasibility of Remote Blood Pressure Estimation via Narrow-band Multi-wavelength Pulse Transit Time. 77:1-77:21 - Biyun Sheng
, Jiabin Li
, Linqing Gui
, Zhengxin Guo
, Fu Xiao
:
LiteWiSys: A Lightweight System for WiFi-based Dual-task Action Perception. 78:1-78:19 - Peng Liao
, Xuyu Wang
, Lingling An
, Shiwen Mao
, Tianya Zhao
, Chao Yang
:
TFSemantic: A Time-Frequency Semantic GAN Framework for Imbalanced Classification Using Radio Signals. 79:1-79:22 - Xiaobin Zhang
, Hongzhe Xu
, Jianwei Liu
, Jinsong Han
:
TomFi: Small Object Tracking Using Commodity WiFi. 80:1-80:15 - Penghao Wang
, Ruobing Jiang
, Zhongwen Guo
, Chao Liu
:
Afitness: Fitness Monitoring on Smart Devices via Acoustic Motion Images. 81:1-81:24 - Xun Wang
, Zhizheng Yang
, Wei Wang
, Haipeng Dai
, Shuyu Shi
, Qing Gu
:
UltraCLR: Contrastive Representation Learning Framework for Ultrasound-based Sensing. 82:1-82:23 - Zhiqiang Wang
, Jiahui Hou
, Guangyu Wu
, Suyuan Liu
, Puhan Luo
, Xiang-Yang Li
:
Efficient Task-driven Video Data Privacy Protection for Smart Camera Surveillance System. 83:1-83:21 - Yaxin Mei
, Wenhua Wang
, Yuzhu Liang
, Qin Liu
, Shuhong Chen
, Tian Wang
:
Privacy-Enhanced Cooperative Storage Scheme for Contact-Free Sensory Data in AIoT with Efficient Synchronization. 84:1-84:19 - Xiaocheng Wang
, Guiyun Fan
, Rong Ding
, Haiming Jin
, Wentian Hao
, Mingyuan Tao
:
Water Salinity Sensing with UAV-Mounted IR-UWB Radar. 85:1-85:37 - Tiantian Liu
, Chao Wang
, Zhengxiong Li
, Ming-Chun Huang
, Wenyao Xu
, Feng Lin
:
Wavoice: An mmWave-Assisted Noise-Resistant Speech Recognition System. 86:1-86:29 - Qing Guo
, Lei Xie
, Xinran Lu
, Yanling Bu
, Chuyu Wang
, Baoliu Ye
, Sanglu Lu
:
LightGyro: A Batteryless Orientation Measuring Scheme Based on Light Reflection. 87:1-87:23 - Ruoyu Zhao
, Yushu Zhang
, Wenying Wen
, Rushi Lan
, Yong Xiang
:
E-TPE: Efficient Thumbnail-Preserving Encryption for Privacy Protection in Visual Sensor Networks. 88:1-88:26 - Mingda Han
, Huanqi Yang
, Tao Ni
, Di Duan
, Mengzhe Ruan
, Yongliang Chen
, Jia Zhang
, Weitao Xu
:
mmSign: mmWave-based Few-Shot Online Handwritten Signature Verification. 89:1-89:31 - Xinxin Lu, Lei Wang, Chi Lin, Xin Fan, Bin Han, Xin Han, Zhenquan Qin:
AutoDLAR: A Semi-supervised Cross-modal Contact-free Human Activity Recognition System. 90:1-90:20 - Feng Li
, Jiayi Zhao
, Huan Yang
, Dongxiao Yu
, Yuanfeng Zhou
, Yiran Shen
:
VibHead: An Authentication Scheme for Smart Headsets through Vibration. 91:1-91:21 - Zhiyi Zhou
, Lei Wang
, Xinxin Lu
, Yu Tian
, Jian Fang
, Bingxian Lu
:
Wave-CapNet: A Wavelet Neuron-based Wi-Fi Sensing Model for Human Identification. 92:1-92:20 - Shuai Wang, Luoyu Mei
, Zhimeng Yin, Hao Li, Ruofeng Liu, Wenchao Jiang, Chris Xiaoxuan Lu
:
End-to-End Target Liveness Detection via mmWave Radar and Vision Fusion for Autonomous Vehicles. 93:1-93:26 - Youwei Zhang
, Feiyu Han
, Panlong Yang
, Yuanhao Feng
, Yubo Yan
, Ran Guan
:
Wi-Cyclops: Room-Scale WiFi Sensing System for Respiration Detection Based on Single-Antenna. 94:1-94:24
- Zhichao Cao
, Chenning Li
, Li Liu
, Mi Zhang
:
WiVelo: Fine-grained Wi-Fi Walking Velocity Estimation. 95:1-95:21 - Jiangyuan Chen
, Ammar Hawbani
, Xiaohua Xu
, Xingfu Wang
, Liang Zhao
, Zhi Liu
, Saeed H. Alsamhi
:
A DRL-based Partial Charging Algorithm for Wireless Rechargeable Sensor Networks. 96:1-96:24 - Xia Cheng
, Mo Sha
:
MERA: Meta-Learning Based Runtime Adaptation for Industrial Wireless Sensor-Actuator Networks. 97:1-97:24 - Kang Yang
, Wan Du
:
A Low-Density Parity-Check Coding Scheme for LoRa Networking. 98:1-98:29 - Xianzhong Ding
, Wan Du
:
Optimizing Irrigation Efficiency using Deep Reinforcement Learning in the Field. 99:1-99:34 - Li Zhang
, Xu Zhou
, Danyang Li
, Zheng Yang
:
HCCNet: Hybrid Coupled Cooperative Network for Robust Indoor Localization. 100:1-100:22 - Daibo Liu
, Chao Qian
, Huigui Rong
, Siwang Zhou
, Chaocan Xiang
, Hongbo Jiang
:
Energy and QoE Optimization for Mobile Video Streaming with Adaptive Brightness Scaling. 101:1-101:24
Volume 20, Number 5, September 2024
- Akshay Gadre
, Zachary Manchester
, Swarun Kumar
:
Adapting LoRa Ground Stations for Low-latency Imaging and Inference from LoRa-enabled CubeSats. 102:1-102:30 - Muhammad Sarmad Mir
:
RGB LED for Communication, Harvesting and Sensing in IoT Applications. 103:1-103:23 - Miao Guo
, Shibo He
, Chaojie Gu
, Xiuzhen Guo
, Ji-ming Chen
, Tao Gao
, Tongtong Wang
:
Towards Distributed Flow Scheduling in IEEE 802.1Qbv Time-Sensitive Networks. 104:1-104:30 - Huan Liu
, Yuzhe Zhang
, Xuxu Chen
, Dalin Zhang
, Rui Li
, Tao Qin
:
Self-Supervised EEG Representation Learning for Robust Emotion Recognition. 105:1-105:22 - Shiyang Wang
, Xingchen Wang
, Wenjun Jiang
, Chenglin Miao
, Qiming Cao
, Haoyu Wang
, Ke Sun
, Hongfei Xue
, Lu Su
:
Towards Smartphone-based 3D Hand Pose Reconstruction Using Acoustic Signals. 106:1-106:32 - Yuan Wu
, Yanjiao Chen
, Jian Zhang
, Xueluan Gong
, Hongliang Bi
:
Ubi-AD: Towards Ubiquitous, Passive Alzheimer Detection using the Smartwatch. 107:1-107:22 - Siheng Li
, Beihong Jin
, Zhi Wang
, Fusang Zhang
, Xiaoyong Ren
, Haiqin Liu
:
Leveraging Attention-reinforced UWB Signals to Monitor Respiration during Sleep. 108:1-108:28 - Jianxiong Guo
, Xingjian Ding
, Weili Wu
, Ding-Zhu Du
:
A Double Auction for Charging Scheduling among Vehicles Using DAG-Blockchains. 109:1-109:27 - Minyu Teng
, Jingxuan Han
, Jintao Xie
, Jiayao Gao
, Jiangfeng Li
, Yang Shi
:
Obfuscating Ciphertext-Policy Attribute-Based Re-Encryption for Sensor Networks with Cloud Storage. 110:1-110:39 - Yantao Li
, Xinyang Li
, Xinyu Lei
, Huafeng Qin
, Yiwen Hu
, Gang Zhou
:
On the Inference of Original Graph Information from Graph Embeddings. 111:1-111:28 - Min He
, Yali Chen
, Min Liu
, Xiaokun Fan
, Yuchen Zhu
:
Reliable and Energy-Efficient Communications in Mobile Robotic Networks by Collaborative Beamforming. 112:1-112:24 - Yantao Li
, Kaijian Dan
, Xinyu Lei
, Huafeng Qin
, Shaojiang Deng
, Gang Zhou
:
Using Reinforcement Learning to Escape Automatic Filter-based Adversarial Example Defense. 113:1-113:26 - Yachen Mao
, Yubo Yan
, Shanyue Wang
, Xiang-Yang Li
:
Stabilizing Dynamic Backscatter for Swift and Accurate Object Tracking. 114:1-114:18
Volume 20, Number 6, November 2024
- Haifeng Jia
, Yichen Wei
, Yibo Pi
, Cailian Chen
:
Power-Domain Interference Graph Estimation for Multi-hop BLE Networks. 115:1-115:28 - Wenhui Cheng
, Zixian Jiang
, Chaocan Xiang
, Jianglan Fu
:
Marginal Effect-aware Multiple-Vehicle Scheduling for Road Data Collection: A Near-optimal Result. 116:1-116:21 - Jumana Bukhari
, Zhenghao Zhang
:
Understanding Long Range-Frequency Hopping Spread Spectrum (LR-FHSS) with Real-World Packet Traces. 117:1-117:30 - Shuai Zhu
, Thiemo Voigt
, Fatemeh Rahimian
, JeongGil Ko
:
On-device Training: A First Overview on Existing Systems. 118:1-118:39 - Yifei Sun
, Bojie Lv
, Haisheng Tan
, Rui Wang
, Francis C. M. Lau:
COSMO: Dynamic Uploading Scheduling in mmWave-Based Sensor Networks with Mobile Blockers. 119:1-119:27 - Fahim Niaz
, Jian Zhang
, Yang Zheng
, Muhammad Umair Khalid
, Ashfaq Niaz
:
mm-CUR: A Novel Ubiquitous, Contact-free, and Location-aware Counterfeit Currency Detection in Bundles Using Millimeter-Wave Sensor. 120:1-120:26 - Xinjun Cai
, Jingao Xu
, Kuntian Deng
, Hongbo Lan
, Yue Wu
, Xiangwen Zhuge
, Zheng Yang
:
TrinitySLAM: On-board Real-time Event-image Fusion SLAM System for Drones. 121:1-121:22 - Yujia Gao
, Li Shen
, Liang Liu
, Zijian Cao
, Dacheng Tao
, Huadong Ma
, Nei Kato
:
Neural-aware Decoupling Fusion based Personalized Federated Learning for Intelligent Sensing. 122:1-122:21 - Xiaofeng Cao
, Deke Guo
, Feng Lyu
, Peng Yang
, Weiming Zhang
:
CoDe: Customizing Urban HD Map Deployment Strategy with Spatio-Temporal GPS Trace. 123:1-123:21 - Leiyang Xu
, Xiaolong Zheng
, Yucheng Zhang
, Liang Liu
, Huadong Ma
:
WiCAM2.0: Imperceptible and Targeted Attack on Deep Learning based WiFi Sensing. 124:1-124:22 - Zejun Xu, Wenqiang Jin, Changwei Yao, Xinyi Liu, Shuang Ma, Yu Liu, Zheng Qin, Iman Vakilinia, Daibo Liu:
EM-Rhythm: An Authentication Method for Heterogeneous IoT Devices. 125:1-125:21 - Yeming Li
, Borui Li
, Jiamei Lv
, Wei Dong
:
BLEdge: Edge-centric Programming for BLE Applications with Multi-connection Optimization. 126:1-126:25 - Ruochen Zhou
, Xiaoyu Ji
, Han Chen
, Chen Yan
, Wenyuan Xu
:
Detecting Hidden Voice Recorders via ADC Electromagnetic Radiation. 127:1-127:26 - Yunhao Yao
, Jiahui Hou
, Guangyu Wu
, Yihang Cheng
, Mu Yuan
, Puhan Luo
, Zhiqiang Wang
, Xiang-Yang Li
:
SecoInfer: Secure DNN End-Edge Collaborative Inference Framework Optimizing Privacy and Latency. 128:1-128:29 - Chunlin Li
, Yong Zhang
, Long Yu
, Kun Jiang
, Youlong Luo
, Shaohua Wan
:
DRL-based Content Caching Strategy With Efficient User Preference Predictions in UAV-assisted VEC. 129:1-129:32 - Tiziana Cattai
, Stefania Colonnese
, Domenico Garlisi
, Antonino Pagano
, Francesca Cuomo
:
GraphSmart: A Method for Green and Accurate IoT Water Monitoring. 130:1-130:32

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.