Wireless Algorithms, Systems, and Applications 16th International Conference, WASA 2021, Nanjing, China, June 25-27, 2021, Proceedings, Part III / [electronic resource] :
edited by Zhe Liu, Fan Wu, Sajal K. Das.
- 1st ed. 2021.
- XVI, 601 p. 277 illus., 223 illus. in color. online resource.
- Theoretical Computer Science and General Issues, 12939 2512-2029 ; .
- Theoretical Computer Science and General Issues, 12939 .
Event-based American Sign Language Recognition Using Dynamic Vision Sensor -- Multi-step domain adaption image classification network via attention mechanism and multi-level feature alignment.-Automated Honey Document Generation Using Genetic Algorithm -- Image encryption for Wireless Sensor Networks with modified Logistic Map and new Hash algorithm -- Design and implementation of a real-time distributed precise point positioning platform -- Deployment of UAV-BS for Congestion Alleviation in Cellular Networks -- Robust Estimator for NLOS Error Mitigation in TOA-based Localization -- Effectiveness Analysis of UAV Offensive Strategy with Unknown Adverse Trajectory -- Delivery Optimization for Unmanned Aerial Vehicles Based on Minimum Cost Maximum Flow With Limited Battery Capacity -- Optimized Segment Routing Traffic Engineeringwith Multiple Segments -- Robust and Efficient Mechanism Design for Heterogeneous Task Crowdsensing -- Lightweight Threshold Private Set Intersection via Oblivious Transfer -- Person Re-identification Algorithm Based on Spatial Attention Network -- OFDMA-based Asymmetric Full-duplex Media Access Control for the Next Generation WLANs -- Equitable Valuation of Crowdsensing for Machine Learning via Game Theory -- AERM: An Attribute-aware Economic Robust Spectrum Auction Mechanism -- Application of Matrix-NMS in face detection and autonomous driving -- Blockchain-based verifiable DSSE with forward security in multi-server environments -- GGCAD: A Novel Method of Adversarial Detection by Guided Grad-CAM -- Online Task Scheduling for DNN-based Applications over Cloud, Edge and End Devices -- An SDN-based Self-adaptive Resource Allocation Mechanism for Service Customization -- Privacy Risk Assessment for Text Data Based on Semantic Correlation Learning -- Multi-dimensional LSTM:A Model of NetworkText Classification -- Incentive Cooperation with Computation Delay Concerns for Socially-aware Parked Vehicle Edge Computing -- Complex Task Allocation in Spatial Crowdsourcing:A Task Graph Perspective -- Jointly Optimizing Throughput and Cost of IoV based on Coherent Beamforming and Successive Interference Cancellation Technology -- Deep Reinforcement Learning based Dynamic Content Placement and Bandwidth Allocation in Internet of Vehicles -- A Probabilistic Resilient Routing Scheme for Low-Earth-Orbit Satellite Constellations -- An Efficient Multi-Link Concurrent Transmission MAC Protocol for Long-delay Underwater Acoustic Sensor Networks -- An Advanced Cache Retransmission Mechanism for Wireless Mesh Network -- Efficient Budget-Distance-Aware Influence Maximization in Geo-Social Network -- Deep Learning-Based Task Offloading for Vehicular Edge Computing -- Hacks Hit the Phish: Phishing Attack Detection based on Hacks Search -- The sensor-cloud system and node reliability analysis -- Reinforcement Learning Based Seamless Handover Algorithm in SDN-enabled WLAN -- Attack traffic detection based on LetNet-5 and GRU hierarchical deep neural network -- Real-time and Consistent Route Update Based on Segment Routing for NFV-enabled Networks -- Privacy-Preserving Auction for Heterogeneous Task Assignment in Mobile Device Clouds -- Deep Reinforcement Learning for DAG-based Concurrent Requests Scheduling in Edge Networks -- Generative Adversarial Scheme Based GNSS Spoofing Detection for Digital Twin Vehicular Networks -- Spatial Sketch Configuration for Traffic Measurement in Software Defined Networks -- Estimating Clustering Coefficient of Multiplex Graphs with Local Differential Privacy -- New Rectangle Attack Against SKINNY Block Cipher -- Optimal convergence nodes deployment in hierarchical wireless sensor networks: an SMA-based approach -- A Virtual-Potential-Field-based Cooperative Opportunistic Routing Protocol for UAV Swarms -- Social-Interaction GAN: Pedestrian Trajectory Prediction -- An Intelligent Wallpaper Based on Ambient Light for Human Activity Sensing -- Adaptive Data Transmission and Task Scheduling for High-Definition Map Update -- Research on Path Planning for Relay Drones with Multiple Constraints -- A Reinforcement Model based Prioritized Replay to Solve the Offloading Problem in Edge Computing -- Authentication System Based on Fuzzy Extractors -- Performance Analysis of V2V-Based Vehicular Platoon with Modified CACC Scheme -- Leveraging Fine-grained Self-Correlation in Detecting Collided LoRa Transmissions -- Blockchain Oracle-Based Privacy Preservation and Reliable Identification for Vehicles -- Objects Perceptibility Prediction Model Based on Machine Learning for V2I Communication Load Reduction -- KESAR: A High-Accuracy Prediction Algorithm and Solar-Aware Routing Strategy for Outdoor WSN -- Blockchain Empowered Federated Learning for Medical Data Sharing Model -- A Deep Learning Based Intelligent Transceiver Structure for Multiuser MIMO -- GreenAP: An Energy-saving Protocol for Mobile Access Points -- A Robust Multi-Tenant Server Consolidation Algorithm -- PM2.5 and PM10 Concentration Estimation based on the Top-of-Atmosphere Reflectance -- A Secure Sensing Data Collection Mechanism based on Perturbed Compressed Sensing -- An Edge-Cloud Collaborative Object Detection System -- Underwater Acoustic signal Modulation recognition Technology based on Deep Learning.
The three-volume set constitutes the proceedings of the 16th International Conference on Wireless Algorithms, Systems, and Applications, WASA 2021, which was held during June 25-27, 2021, in Nanjing, China. The 103 full and 57 short papers presented in these proceedings were carefully reviewed and selected from 315 submissions. Part III of the set includes the papers of the contributors that took part in the workshops co-located with the conference.The following topics are covered in the volume: network protocols, signal processing, wireless telecommunication systems, routing algorithms, cryptography, local area networks, and others.
9783030861377
10.1007/978-3-030-86137-7 doi
Computer networks .
Application software.
Computer systems.
Data structures (Computer science).
Information theory.
Artificial intelligence.
Computers.
Computer Communication Networks.
Computer and Information Systems Applications.
Computer System Implementation.
Data Structures and Information Theory.
Artificial Intelligence.
Computing Milieux.
TK5105.5-5105.9
004.6
Event-based American Sign Language Recognition Using Dynamic Vision Sensor -- Multi-step domain adaption image classification network via attention mechanism and multi-level feature alignment.-Automated Honey Document Generation Using Genetic Algorithm -- Image encryption for Wireless Sensor Networks with modified Logistic Map and new Hash algorithm -- Design and implementation of a real-time distributed precise point positioning platform -- Deployment of UAV-BS for Congestion Alleviation in Cellular Networks -- Robust Estimator for NLOS Error Mitigation in TOA-based Localization -- Effectiveness Analysis of UAV Offensive Strategy with Unknown Adverse Trajectory -- Delivery Optimization for Unmanned Aerial Vehicles Based on Minimum Cost Maximum Flow With Limited Battery Capacity -- Optimized Segment Routing Traffic Engineeringwith Multiple Segments -- Robust and Efficient Mechanism Design for Heterogeneous Task Crowdsensing -- Lightweight Threshold Private Set Intersection via Oblivious Transfer -- Person Re-identification Algorithm Based on Spatial Attention Network -- OFDMA-based Asymmetric Full-duplex Media Access Control for the Next Generation WLANs -- Equitable Valuation of Crowdsensing for Machine Learning via Game Theory -- AERM: An Attribute-aware Economic Robust Spectrum Auction Mechanism -- Application of Matrix-NMS in face detection and autonomous driving -- Blockchain-based verifiable DSSE with forward security in multi-server environments -- GGCAD: A Novel Method of Adversarial Detection by Guided Grad-CAM -- Online Task Scheduling for DNN-based Applications over Cloud, Edge and End Devices -- An SDN-based Self-adaptive Resource Allocation Mechanism for Service Customization -- Privacy Risk Assessment for Text Data Based on Semantic Correlation Learning -- Multi-dimensional LSTM:A Model of NetworkText Classification -- Incentive Cooperation with Computation Delay Concerns for Socially-aware Parked Vehicle Edge Computing -- Complex Task Allocation in Spatial Crowdsourcing:A Task Graph Perspective -- Jointly Optimizing Throughput and Cost of IoV based on Coherent Beamforming and Successive Interference Cancellation Technology -- Deep Reinforcement Learning based Dynamic Content Placement and Bandwidth Allocation in Internet of Vehicles -- A Probabilistic Resilient Routing Scheme for Low-Earth-Orbit Satellite Constellations -- An Efficient Multi-Link Concurrent Transmission MAC Protocol for Long-delay Underwater Acoustic Sensor Networks -- An Advanced Cache Retransmission Mechanism for Wireless Mesh Network -- Efficient Budget-Distance-Aware Influence Maximization in Geo-Social Network -- Deep Learning-Based Task Offloading for Vehicular Edge Computing -- Hacks Hit the Phish: Phishing Attack Detection based on Hacks Search -- The sensor-cloud system and node reliability analysis -- Reinforcement Learning Based Seamless Handover Algorithm in SDN-enabled WLAN -- Attack traffic detection based on LetNet-5 and GRU hierarchical deep neural network -- Real-time and Consistent Route Update Based on Segment Routing for NFV-enabled Networks -- Privacy-Preserving Auction for Heterogeneous Task Assignment in Mobile Device Clouds -- Deep Reinforcement Learning for DAG-based Concurrent Requests Scheduling in Edge Networks -- Generative Adversarial Scheme Based GNSS Spoofing Detection for Digital Twin Vehicular Networks -- Spatial Sketch Configuration for Traffic Measurement in Software Defined Networks -- Estimating Clustering Coefficient of Multiplex Graphs with Local Differential Privacy -- New Rectangle Attack Against SKINNY Block Cipher -- Optimal convergence nodes deployment in hierarchical wireless sensor networks: an SMA-based approach -- A Virtual-Potential-Field-based Cooperative Opportunistic Routing Protocol for UAV Swarms -- Social-Interaction GAN: Pedestrian Trajectory Prediction -- An Intelligent Wallpaper Based on Ambient Light for Human Activity Sensing -- Adaptive Data Transmission and Task Scheduling for High-Definition Map Update -- Research on Path Planning for Relay Drones with Multiple Constraints -- A Reinforcement Model based Prioritized Replay to Solve the Offloading Problem in Edge Computing -- Authentication System Based on Fuzzy Extractors -- Performance Analysis of V2V-Based Vehicular Platoon with Modified CACC Scheme -- Leveraging Fine-grained Self-Correlation in Detecting Collided LoRa Transmissions -- Blockchain Oracle-Based Privacy Preservation and Reliable Identification for Vehicles -- Objects Perceptibility Prediction Model Based on Machine Learning for V2I Communication Load Reduction -- KESAR: A High-Accuracy Prediction Algorithm and Solar-Aware Routing Strategy for Outdoor WSN -- Blockchain Empowered Federated Learning for Medical Data Sharing Model -- A Deep Learning Based Intelligent Transceiver Structure for Multiuser MIMO -- GreenAP: An Energy-saving Protocol for Mobile Access Points -- A Robust Multi-Tenant Server Consolidation Algorithm -- PM2.5 and PM10 Concentration Estimation based on the Top-of-Atmosphere Reflectance -- A Secure Sensing Data Collection Mechanism based on Perturbed Compressed Sensing -- An Edge-Cloud Collaborative Object Detection System -- Underwater Acoustic signal Modulation recognition Technology based on Deep Learning.
The three-volume set constitutes the proceedings of the 16th International Conference on Wireless Algorithms, Systems, and Applications, WASA 2021, which was held during June 25-27, 2021, in Nanjing, China. The 103 full and 57 short papers presented in these proceedings were carefully reviewed and selected from 315 submissions. Part III of the set includes the papers of the contributors that took part in the workshops co-located with the conference.The following topics are covered in the volume: network protocols, signal processing, wireless telecommunication systems, routing algorithms, cryptography, local area networks, and others.
9783030861377
10.1007/978-3-030-86137-7 doi
Computer networks .
Application software.
Computer systems.
Data structures (Computer science).
Information theory.
Artificial intelligence.
Computers.
Computer Communication Networks.
Computer and Information Systems Applications.
Computer System Implementation.
Data Structures and Information Theory.
Artificial Intelligence.
Computing Milieux.
TK5105.5-5105.9
004.6