default search action
iThings/GreenCom/CPSCom/SmartData 2022: Espoo, Finland
- 2022 IEEE International Conferences on Internet of Things (iThings) and IEEE Green Computing & Communications (GreenCom) and IEEE Cyber, Physical & Social Computing (CPSCom) and IEEE Smart Data (SmartData) and IEEE Congress on Cybermatics (Cybermatics), Espoo, Finland, August 22-25, 2022. IEEE 2022, ISBN 978-1-6654-5417-9
- Swann Puig, Noria Foukia:
CleverTrash: an IoT system for waste sorting with deep learning. 1-8 - Lianyong Qi, Xiaoxiao Chi, Xiaokang Zhou, Qi Liu, Fei Dai, Xiaolong Xu, Xuyun Zhang:
Privacy-aware Data Fusion and Prediction for Smart City Services in Edge Computing Environment. 9-16 - Luoyao Hao, Xiao Yu, Tingrui Zhang, Henning Schulzrinne:
Distributed MQTT Brokers at Network Edges: A Study on Message Dissemination. 17-24 - Chang Huang, Minghua Wang:
Multi-stage Low Error Localization Based on Krill Herd Optimization Algorithm in WSNs. 25-32 - Umut Can Özyar, Arda Yurdakul:
A Decentralized Framework with Dynamic and Event-Driven Container Orchestration at the Edge. 33-40 - Bin Luo, Lingzhi Yi, Hengshan Wu, Yun Qiu, Xiangguang Li, Feilong Tang, Yuan Zhang:
A Novel Harmony Search Cat Swarm Optimization Algorithm for Optimal Bridge Sensor Placement. 41-47 - Zheng Guan, Shengqian Yu, Ya Li, Min He:
Reinforcement Learning Based Full Duplex Multi-user MIMO MAC Protocol (RL-MUFD). 48-55 - Chinmay Mahabal, Hua Fang, Honggang Wang:
On-Ramp Merging for Connected Autonomous Vehicles using Deep Reinforcement Learning. 56-61 - Fabrizio De Vita, Giorgio Nocera, Dario Bruneo, Valeria Tomaselli, Mirko Falchetto:
On-Device Training of Deep Learning Models on Edge Microcontrollers. 62-69 - Fan Liang, Fang Yuan, Xing Liu:
User Position-Based Wireless Sensor Network Deployment Algorithm. 70-76 - Tinghao Zhang, Zhijun Li, Yongrui Chen, Kwok-Yan Lam, Jun Zhao:
Edge-Cloud Cooperation for DNN Inference via Reinforcement Learning and Supervised Learning. 77-84 - Hanning Zhao, Bilhanan Silverajan:
Visual Cybersecurity Collaboration and Incident Exchange in Multi-Stakeholder IoT Environments. 85-92 - Yuan Zhang, Hengshan Wu, Lingzhi Yi, Bin Luo, Yun Qiu, Feilong Tang:
Reinforcement learning-based IoT sensor scheduling strategy for bridge structure health monitoring. 93-100 - Yuan Tian, Yihui Sun, Yong Tang:
Node Deployment and Confident Information Coverage for WSN-based Air Quality Monitoring. 101-106 - Steve Kerrison:
IoT Droplocks: Wireless Fingerprint Theft Using Hacked Smart Locks. 107-112 - Devansh Rajgarhia, Peng Liu, Shamik Sural:
Identifying Channel Related Vulnerabilities in Zephyr Firmware. 113-118 - Sunil Kumar, SeungMyeong Jeong, Il-Yeop Ahn, Muhammad Aslam Jarwar:
Things Data Interoperability Through Annotating oneM2M resources for NGSI-LD Entities. 119-124 - Mengying Wang, Wei Wang, Wenjing Xu, Jiameng Bi, Qiang Ye:
Demand-Oriented Allocation with Fairness in Multi-Operator Dynamic Spectrum Sharing Systems. 125-130 - Liquan Jiang, Zhiguang Qin:
Edge-assisted Puncturable Fine-grained Task Distribution for the IoT-oriented Crowdsensing. 131-138 - Xingqi Luo, Haotian Wang, Jinyang Dong, Chuan Zhang, Tong Wu:
Achieving Privacy-preserving Data Sharing for Dual Clouds. 139-146 - Mingming Gong, Zhiyang Li, Wuyungerile Li:
Research on ultra-wideband (UWB) indoor accurate positioning technology under signal interference. 147-154 - Yuwei Le, Yiheng Jiang, Xintong Ling, Jiaheng Wang:
Efficient and Secure Collaborative Processing in Mobile Edge Computing via Blockchain. 155-160 - Hua Yan, Shuang-Hua Yang, Yulong Ding, Yunfei Chen:
Energy Consumption Models for UAV Communications: A Brief Survey. 161-167 - Kaifei Tu, Shensheng Zheng, Xuehe Wang, Xiping Hu:
Adaptive Federated Learning via Mean Field Approach. 168-175 - Faiga Alawad:
Adaptive Sampling for Efficient Acoustic Noise Monitoring: An Incremental Learning Approach. 176-184 - Etienne Victor Depasquale, Saviour Zammit, Franco Davoli, Raffaele Bolla:
Energy analysts need a standard that interprets the Metro Area Global Information Infrastructure. 185-194 - Yuwei Fu, Di Wu, Benoit Boulet:
On the Benefits of Transfer Learning and Reinforcement Learning for Electric Short-term Load Forecasting. 195-203 - Ying Gao, Sijie Su, Yandan Chen, Qiaofeng Pan, Xiping Hu:
A Blockchain-Based Cloud Edge Fusion Computing Platform for the Smart Grid. 204-211 - Adrien Gougeon, François Lemercier, Anne Blavette, Anne-Cécile Orgerie:
Influence of Communication Technologies in Smart Grid Power Congestion Management. 212-221 - Weipeng Deng, Edith C. H. Ngai, Vera van Zoest:
Energy-Efficient Monitoring of Potential Side Effects from COVID-19 Vaccines. 222-227 - Zhirong Zhu, Jianzhong Su, Zigui Jiang, Mingxi Ye, Zibin Zheng:
Making Smart Contract Classification Easier and More Effective. 228-230 - Aigerim Ospanova, Behrouz Maham:
Delay-Outage Probability of Capacity Achieving-Based Task Offloading for Mobile Edge Computing. 236-242 - Guichang Yin, Runze Chen, Yi Zhang:
Effective task offloading heuristics for minimizing energy consumption in edge computing. 243-249 - Fei Dai, Guozhi Liu, Bi Huang, Xiaolong Xu, Chaochao Chen, Zhangbing Zhou, Xiaokang Zhou:
A Distributed Privacy-Preserving Framework for Deep Learning with Edge-Cloud Computing. 250-257 - Aigerim Ospanova, Behrouz Maham:
Edge Computing with Relaying for Task Offloading under Nakagami-m Fading Channels. 258-263 - Shanchao Zheng, Kan Yu, Guangshun Li, Xiaowu Liu:
Securing uRLLC in UAV-assisted NOMA Wireless Network. 264-271 - Yu Zhang, Guoming Tang, Qianyi Huang, Kui Wu, Yangjing Wu, Yi Wang:
Investigating Low-Battery Anxiety of Mobile Users. 272-279 - Jing Sun, Yuling Chen, Xiao Lv, Xiaobin Qian:
A Multipath Source Location Privacy Protection Scheme in Wireless Sensor Networks via Proxy Node. 280-286 - Jue Chen, Yujie Xiong, Dun He:
A Density-based Controller Placement Algorithm for Software Defined Networks. 287-291 - Yu Zhang, Guoming Tang, Qianyi Huang, Yi Wang, Hong Xu, Xudong Wang:
More Behind Your Electricity Bill: a Dual-DNN Approach to Non-Intrusive Load Monitoring. 292-299 - Liwei Kuang, Jun Wu, Shan Yin:
Construct Digital Twin Models in Cyber Space for Physical Objects of Intelligent Optical Network. 300-305 - Xiaomei Li, Huan Liu, Rongli Gai, Zumin Wang:
Prediction of water quality factors for sea cucumber farming based on Dual-Assisted prediction model. 306-313 - Zu-Min Wang, Tian-Yu Li, Min Xu, Wei Xu, Yan Liu, Lingyan Hu, Rong-Li Gai:
A Combined Model for Cherry Greenhouse Temperature Prediction Based on LMD and Attention Mechanism. 314-319 - Hongke Zhang, Zheng Yan, Xueqin Liang:
A Survey on Data Security in Network Storage Systems. 320-327 - Xiaochuan He, Chaoyue Tan, Yongtang Wu, Yuling Chen:
A Security Transaction Model Based on HTLC. 328-331 - Junhong Tao, Yongtang Wu, Yuling Chen:
A Secure Comparison Protocol in the Malicious Model. 332-337 - Yun Luo, Yuling Chen, Tao Li, Yilei Wang:
A Secure Multiparty Computation Round Optimization Scheme Based on Standard Assumption. 338-342 - Kaicheng Yang, Yongtang Wu, Yuling Chen:
A Blockchain-based Scalable Electronic Contract Signing System. 343-348 - Liying Li, Peijin Cong, Junlong Zhou, Zonghua Gu, Keqin Li:
Data Availability Optimization for Cyber-Physical Systems. 349-356 - Manxiang Yang, Yongtang Wu, Yuling Chen:
A K-anonymity Optimization Algorithm Under Attack Model. 357-362 - Juan Ma, Yuling Chen, Xiao Lv, Xiaobin Qian:
The optimal attack-defense scheme for secret sharing. 363-367 - Dapeng Tan, Tong Wang, Cheng-Yan Wang:
Embedded Fault Diagnosis Expert System: Framework, Development Platform, Algorithms and Experiments. 368-373 - Jiawei Xu, Yufeng Wang, Jianhua Ma, Qun Jin:
An effective model-free Gaussian Process based online social media recommendation. 374-378 - Rongli Gai, Xiaohong Wang, Zhiyuan Chang, Yitong Guo:
Fruit and Vegetable Picking Robot Movement Planning: A Review. 379-384 - Yanzhi Li, Yuqiao Li, Kaifeng Wang, Yan Zhang, Zumin Wang, Shuxue Zhao:
Bayesian network based on dynamic risk assessment for petrochemical sites - A case study of oil tank. 385-390 - Shan Yin, Liwei Kuang, Fei Zou:
Incremental Prediction Method of Optical Performance Degradation Trend Based on Deep Learning. 391-396 - Xiao-Mei Li, Min Xu, Tian-Yu Li, Wei Xu, Rong-Li Gai, Lingyan Hu, Zu-Min Wang:
A Combined Network for Tomato Leaf Disease Recognization Based on the Improved EfficientNet. 395-400 - Yilei Wang, Ming Liu, Tao Li, Chunmei Li, Hui Wang:
TSHML: Token Shuffling under Haircut Policy Based on Machine Learning. 401-405 - Zhang Zhihao, Zumin Wang:
Research on rolling bearing fault diagnosis method based on hybrid deep learning network model. 406-411 - Chengtian Wang, Taochun Wang, Peng Hu, Qing Qiu, Chuanxin Zhao, Fulong Chen:
Contactless Elevator Button Action Recognition Based on Passive RFID. 412-419 - Rebekah Rousi, Ville Vakkuri, Paulius Daubaris, Simo Linkola, Hooman Samani, Niko Mäkitalo, Erika Halme, Mamia Agbese, Rahul Mohanani, Tommi Mikkonen, Pekka Abrahamsson:
Beyond 100 Ethical Concerns in the Development of Robot-to-Robot Cooperation. 420-426 - Rongli Gai, Kai Wei, Huatian Zhang, Xiangzhou Kong:
Investigation on Application of Target Detection in Agriculture. 427-432 - Junhua Chen, Sihao Deng, Xueda Huang, Xinrui Yang, Dong Yan:
Safety Helmet Wearing Detection Based on A Lightweight YOLOv4 Algorithm. 433-438 - Lingyun Zhang, Yuling Chen, Xiaobin Qian:
Data Confirmation Scheme based on Auditable CP-ABE. 439-443 - Suparna De, Usamah Jassat, Alex Grace, Wei Wang, Klaus Moessner:
Mining Composite Spatio-Temporal Lifestyle Patterns from Geotagged Social Data. 444-451 - Zhihao Zhu, Zhi Gao, Yu Guo, Hanli Zhou, Zhixu Lu, Wei Li:
Fixed-time Control for Liquid-filled Flexible Spacecraft. 452-455 - Xu An Wang, Ruifeng Li:
Improved Secure Provable Data Possession Scheme for Cloud Storage. 456-460 - Lars Creutz, Kevin Wagner, Guido Dartmann:
Cyber-Physical Contracts in Offline Regions. 461-469 - Rongli Gai, Zhibin Guo, Mengke Li:
Overview of Interactive Visualization Methods. 470-475 - Chenggen Pu, Xiwu Ding, Ping Wang, Yifu Yang:
Practical Implementation of an OPC UA Multi-Server Aggregation and Management Architecture for IIoT. 476-481 - Wenshu Li, Haijun Mao, Hao Wang:
Image Augmentation based on Cross Domain Image Style Transfer. 482-487 - Jiachen Yang, Zhuo Zhang, Yang Li:
Agricultural Few-Shot Selection by Model Confidences for Multimedia Internet of Things Acquisition Dataset. 488-494 - Deyan Kong, Zhenyan Ji, Yanjuan Sang, Wei Dong, Yanyan Yang:
UA-HGAT: Uncertainty-aware Heterogeneous Graph Attention Network for Short Text Classification. 495-500 - Bingyi Xie, Honghui Xu, Zuobin Xiong, Yingshu Li, Zhipeng Cai:
A Self-Supervised Purification Mechanism for Adversarial Samples. 501-509 - Jianchao Song, Cheng Qian, Xing Liu, Hengshuo Liang, Chao Lu, Wei Yu:
Performance Assessment of Deep Neural Network on Activity Recognition in WiFi Sensing. 510-517 - Xiaoxian Dong, Xiaoxiong Weng, Yancheng Ling:
Information Extraction and Analysis of Chinese Traffic News. 518-524 - Marin Matsumoto, Masato Oguchi:
IoT Device Friendly Leveled Homomorphic Encryption Protocols. 525-532 - Jia Wang, Yazheng Li, Ronghang Ye, Jianqiang Li:
High Precision Method of Federated Learning Based on Cosine Similarity and Differential Privacy. 533-540 - Jordi Mongay Batalla, Slawomir Sujecki, Houbing Song, Constandinos X. Mavromoustakis, Tomasz Wichary:
Theoretical analysis of QBER for Quantum Key Distribution in 5G multi-site networks. 541-548 - Andreas Andreou, Constandinos X. Mavromoustakis, Houbing Song, Jordi Mongay Batalla:
CNN-Based Emotional Stress Classification using Smart Learning Dataset. 549-554 - Mahdi Barhoush, Ahmed Ayad, Anke Schmeink:
Semi-supervised Algorithms in Resource-constrained Edge Devices: An Overview and Experimental Comparison. 555-559 - Xiao-bo Cai, Li-jiao Chen, Xiao-Jing Shen, Qi Wu, Wen-dou Wu, Baijuan Wang:
Business Process Modeling and Structure Optimization of Resource Coupling in Edge Computing. 560-565 - Jenny Liu:
Smart Detection of Social Distance Violations using Gaussian Lens Model and Deep Learning. 566-569 - Xing Long:
The data mining between the asphalt properties and asphalt mixtures properties. 570-575 - Jun Li, Qinghe Du:
QoS-Aware Joint User Scheduling and Power Allocation for Energy Harvesting Wireless Networks. 576-581 - Yujing Zhou, Dahai Liu, Houbing Song:
A Survey of Machine Learning Algorithms and Techniques for Air Mobility Under Emergency Situations. 582-588 - Yao Yao, Chengwen Luo, Xingyu Feng, Yijing Huang, Jin Zhang, Jian-qiang Li:
EvoSense: Towards Self-evolving WiFi-based User Gait Recognition. 589-596 - Adamu Hussaini, Cheng Qian, Weixian Liao, Wei Yu:
A Taxonomy of Security and Defense Mechanisms in Digital Twins-based Cyber-Physical Systems. 597-604 - Ko Watanabe, Yuki Matsuda, Yugo Nakamura, Yutaka Arakawa, Shoya Ishimaru:
How do Programmers Use the Internet? Discovering Domain Knowledge from Browsing and Coding Behaviors. 605-610 - Huanjun Hu, Jie Wang, Jing Wang, Shengwei Wang, Yixi Wang, Yuxuan Ye, Rongtao Liao:
Reliability Analysis and Optimization for Sensing Data Collection and Processing in New Energy Internet Systems. 611-616 - Xun-Yu Liu, Lei Wang, Xiaoliang Ma, Gongbin Chen, Cheng He, Jun Cheng:
3D Human Pose and Shape Estimation from Video. 617-624 - Jiahui Li, Jiaxin Yan, Baolin Yin, Liang Zhao, Ran Wei:
Resource Allocation and Computation Offloading in Ultra-reliable Low-latency Communication Systems via Deep Reinforcement Learning. 625-630 - Tianlong Xiong, Min Luo, Chao Yang, Qing Cheng, Yawen Liu:
MMC Online Thermal Simulation and Life Prediction based on Digital Twin Technology. 631-635 - Yijing Huang, Chengwen Luo, Xingyu Feng, Zhongru Yang, Jin Zhang, Jian-qiang Li:
LigNet: Lightweight Hand Tracking for Edge Intelligence. 636-642 - Weiqing Yao, Zhiwei Bao, Xian Luo, Jing Wang, Jie Wang:
Age Upon Decisions for Low-latency Services in Internet of Energy Systems. 643-647 - Jie Wang, Shengwei Wang, Jing Wang, Huanjun Hu, Yixi Wang, Yuxuan Ye, Rongtao Liao:
Short-Dataset-Driven Prediction on Area Electricity Consumption with Adaptive Training Window Selection. 648-653
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.