


default search action
ACM Transactions on Sensor Networks, Volume 20
Volume 20, Number 1, January 2024
- Yiwen Dong

, Amelie Bonde
, Jesse R. Codling
, Adeola Bannis
, Jinpu Cao
, Asya Macon
, Gary A. Rohrer
, Jeremy Miles
, Sudhendu R. Sharma
, Tami M. Brown-Brandl
, Akkarit Sangpetch
, Orathai Sangpetch
, Pei Zhang
, Hae Young Noh
:
PigSense: Structural Vibration-based Activity and Health Monitoring System for Pigs. 1:1-1:43 - Michael Baddeley

, Carlo Alberto Boano
, Antonio Escobar-Molero
, Ye Liu
, Xiaoyuan Ma
, Victor Marot
, Usman Raza
, Kay Römer
, Markus Schuss
, Aleksandar Stanoev
:
Understanding Concurrent Transmissions: The Impact of Carrier Frequency Offset and RF Interference on Physical Layer Performance. 2:1-2:39 - Jianzhi Tang

, Luoyi Fu
, Shiyu Liang
, Fei Long
, Lei Zhou
, Xinbing Wang
, Chenghu Zhou
:
FlowerCast: Efficient Time-sensitive Multicast in Wireless Sensor Networks with Link Uncertainty. 3:1-3:32 - Qian Zhang

, Zheng Yang
, Fan Li
, Biaokai Zhu
, Pengpeng Chen
:
WVC: Towards Secure Device Paring for Mobile Augmented Reality. 4:1-4:22 - Yuning Yu

, Shanglin Hsu
, Andre Chen
, Yutian Chen
, Bin Tang
:
Truthful and Optimal Data Preservation in Base Station-less Sensor Networks: An Integrated Game Theory and Network Flow Approach. 5:1-5:40 - Jinke Song, Shangfeng Wan, Min Huang, Jiqiang Liu, Limin Sun, Qiang Li:

Toward Automatically Connecting IoT Devices with Vulnerabilities in the Wild. 6:1-6:26 - Bo Wei

, Weitao Xu
, Mingcen Gao
, Guohao Lan
, Kai Li
, Chengwen Luo
, Jin Zhang
:
SolarKey: Battery-free Key Generation Using Solar Cells. 7:1-7:24 - Xuewei Bai

, Yongcai Wang
, Haodi Ping
, Xiaojia Xu
, Deying Li
, Shuo Wang
:
InferLoc: Hypothesis-Based Joint Edge Inference and Localization in Sparse Sensor Networks. 8:1-8:28 - Jianbo Li

, Genji Yuan
, Zheng Yang
:
Edge-assisted Object Segmentation Using Multimodal Feature Aggregation and Learning. 9:1-9:22 - Jie Lian

, Changlai Du
, Jiadong Lou
, Li Chen
, Xu Yuan
:
EchoSensor: Fine-grained Ultrasonic Sensing for Smart Home Intrusion Detection. 10:1-10:24 - Wei You

, Meixuan Ren
, Yuzhuo Ma
, Die Wu
, Jilin Yang
, Xuxun Liu
, Tang Liu
:
Practical Charger Placement Scheme for Wireless Rechargeable Sensor Networks with Obstacles. 11:1-11:23 - Guopeng Li

, Haisheng Tan
, Liuyan Liu
, Hao Zhou
, Shaofeng H.-C. Jiang
, Zhenhua Han
, Xiang-Yang Li
, Guoliang Chen
:
DAG Scheduling in Mobile Edge Computing. 12:1-12:25 - Chaofan Ma

, Wei Liang
, Meng Zheng
, Xiaofang Xia
, Lin Chen:
A Voronoi Diagram and Q-Learning based Relay Node Placement Method Subject to Radio Irregularity. 13:1-13:27 - Ya Nan

, Shiqi Jiang
, Mo Li
:
Large-scale Video Analytics with Cloud-Edge Collaborative Continuous Learning. 14:1-14:23 - Xin Yang

, Omid Ardakanian
:
Blinder: End-to-end Privacy Protection in Sensing Systems via Personalized Federated Learning. 15:1-15:32 - Yingxiao Wu

, Haocheng Ni
, Changlin Mao
, Jianping Han
, Wenyao Xu
:
Non-intrusive Human Vital Sign Detection Using mmWave Sensing Technologies: A Review. 16:1-16:36 - Qingyi Chang

, Dan Tao
, Jiangtao Wang
, Ruipeng Gao
:
Deep Compressed Sensing based Data Imputation for Urban Environmental Monitoring. 17:1-17:21 - Duc Van Le

, Joy Qiping Yang
, Siyuan Zhou
, Daren Ho
, Rui Tan
:
Design, Deployment, and Evaluation of an Industrial AIoT System for Quality Control at HP Factories. 18:1-18:19 - Amitangshu Pal

, Hongzhi Guo
, Sijung Yang
, Mustafa Alper Akkas
, Xufeng Zhang
:
Taking Wireless Underground: A Comprehensive Summary. 19:1-19:44 - Xinjun Cai

, Zheng Yang
, Liang Dong
, Qiang Ma
, Xin Miao
, Zhuo Liu
:
Multi-User Mobile Augmented Reality with ID-Aware Visual Interaction. 20:1-20:23 - Bowen Pang

, Sicong Liu, Hongli Wang, Bin Guo, Yuzhan Wang
, Hao Wang
, Zhenli Sheng, Zhongyi Wang, Zhiwen Yu:
AdaMEC: Towards a Context-adaptive and Dynamically Combinable DNN Deployment Framework for Mobile Edge Computing. 21:1-21:28 - Rahul Mishra

, Hari Prabhat Gupta
:
A Model Personalization-based Federated Learning Approach for Heterogeneous Participants with Variability in the Dataset. 22:1-22:28 - Junsheng Li

, Ling Wang
, Jie Liu
, Jinshan Tang
:
ViST: A Ubiquitous Model with Multimodal Fusion for Crop Growth Prediction. 23:1-23:23 - Ziyao Huang

, Weiwei Wu
, Chenchen Fu
, Xiang Liu
, Feng Shan
, Jianping Wang
, Xueyong Xu
:
Communication-Topology-preserving Motion Planning: Enabling Static Routing in UAV Networks. 24:1-24:39 - Weizheng Wang

, Qing Wang
, Marco Zuniga
:
Taming Irregular Cardiac Signals for Biometric Identification. 25:1-25:26
Volume 20, Number 2, March 2024
- Fangyu Li

, WenZhan Song
, Xiaohua Xu
:
Editorial: Special Issue on Cyber-Physical Security and Zero Trust. 26:1-26:2 - Di Wang

, Fangyu Li
, Kaibo Liu
, Xi Zhang
:
Real-time Cyber-Physical Security Solution Leveraging an Integrated Learning-Based Approach. 27:1-27:22 - Ying Ju

, Mingjie Yang
, Chinmay Chakraborty
, Lei Liu
, Qingqi Pei
, Ming Xiao
, Keping Yu
:
Reliability-Security Tradeoff Analysis in mmWave Ad Hoc-based CPS. 28:1-28:23 - Zhen Hong

, Lingling Lu
, Dehua Zheng
, Jiahui Suo
, Peng Sun
, Raheem Beyah
, Zhenyu Wen
:
Detect Insider Attacks in Industrial Cyber-physical Systems Using Multi-physical Features-based Fingerprinting. 29:1-29:27 - Zhuoyi Miao

, Jun Yu
:
A Robust Learning Framework for Smart Grids in Defense Against False-Data Injection Attacks. 30:1-30:12 - Junqin Huang

, Linghe Kong
, Jingwei Wang
, Guihai Chen
, Jianhua Gao
, Gang Huang
, Muhammad Khurram Khan
:
Secure Data Sharing over Vehicular Networks Based on Multi-sharding Blockchain. 31:1-31:23 - Yinghong Yang

, Fenhua Bai
, Zhuo Yu
, Tao Shen
, Yingli Liu
, Bei Gong
:
An Anonymous and Supervisory Cross-chain Privacy Protection Protocol for Zero-trust IoT Application. 32:1-32:20 - Junyi Liu

, Yifu Tang
, Haimeng Zhao
, Xieheng Wang
, Fangyu Li
, Jingyi Zhang
:
CPS Attack Detection under Limited Local Information in Cyber Security: An Ensemble Multi-Node Multi-Class Classification Approach. 33:1-33:27 - Siben Tian

, Fenhua Bai
, Tao Shen
, Chi Zhang
, Bei Gong
:
VSSB-Raft: A Secure and Efficient Zero Trust Consensus Algorithm for Blockchain. 34:1-34:22 - Shun Zhang

, Pengfei Lan
, Benfei Duan
, Zhili Chen
, Hong Zhong
, Neal N. Xiong
:
DPIVE: A Regionalized Location Obfuscation Scheme with Personalized Privacy Levels. 35:1-35:26
- Ping Zhao

, Jin Jiang
, Guanglin Zhang
:
FedSuper: A Byzantine-Robust Federated Learning Under Supervision. 36:1-36:29 - Danyang Li

, Jingao Xu
, Zheng Yang
, Chengpei Tang
:
Train Once, Locate Anytime for Anyone: Adversarial Learning-based Wireless Localization. 37:1-37:21 - Zhipeng Zhou

, Feng Wang
, Wei Gong
:
i-Sample: Augment Domain Adversarial Adaptation Models for WiFi-based HAR. 38:1-38:20 - Qianru Liao

, Yongzhi Huang
, Yandao Huang
, Kaishun Wu
:
An Eavesdropping System Based on Magnetic Side-Channel Signals Leaked by Speakers. 39:1-39:30 - Luoyu Mei

, Zhimeng Yin
, Shuai Wang
, Xiaolei Zhou
, Taiwei Ling
, Tian He
:
ECRLoRa: LoRa Packet Recovery under Low SNR via Edge-Cloud Collaboration. 40:1-40:25 - Xiaolin Gu

, Wenjia Wu
, Aibo Song
, Ming Yang
, Zhen Ling
, Junzhou Luo
:
RF-TESI: Radio Frequency Fingerprint-based Smartphone Identification under Temperature Variation. 41:1-41:21 - Shanyue Wang

, Yubo Yan
, Yujie Chen
, Panlong Yang
, Xiang-Yang Li
:
Spray: A Spectrum-efficient and Agile Concurrent Backscatter System. 42:1-42:21 - Shuangqing Xia

, Tianzhang Xing
, Chase Q. Wu
, Guoqing Liu
, Jiadi Yang
, Kang Li
:
AQMon: A Fine-grained Air Quality Monitoring System Based on UAV Images for Smart Cities. 43:1-43:20 - Yuan He

, Jia Zhang
, Rui Xi
, Xin Na
, Yimiao Sun
, Beibei Li
:
Detection and Identification of Non-cooperative UAV Using a COTS mmWave Radar. 44:1-44:22 - Wen Zhang

, Chen Pan
, Tao Liu
, Jeff Jun Zhang
, Mehdi Sookhak
, Mimi Xie
:
Intelligent Networking for Energy Harvesting Powered IoT Systems. 45:1-45:31 - Yaming Xu

, Yan Wang
, Boliang Li
:
Robust Classification and 6D Pose Estimation by Sensor Dual Fusion of Image and Point Cloud Data. 46:1-46:21 - Zhihao Shen, Wan Du

, Xi Zhao
, Jianhua Zou
:
Retrieving Similar Trajectories from Cellular Data of Multiple Carriers at City Scale. 47:1-47:28 - Jinghui Zhang

, Jiawei Wang
, Yaning Li
, Fa Xin
, Fang Dong
, Junzhou Luo
, Zhihua Wu
:
Addressing Heterogeneity in Federated Learning with Client Selection via Submodular Optimization. 48:1-48:32 - Tuo Shi

, Zhipeng Cai
, Jianzhong Li
, Hong Gao
:
Optimize the Age of Useful Information in Edge-assisted Energy-harvesting Sensor Networks. 49:1-49:26 - Zhiyuan Zhou

, Xiaolei Zhou
, Baoshen Guo
, Shuai Wang
, Tian He
:
Multi-sensor Data-driven Route Prediction in Instant Delivery with a 3-Conversion Network. 50:1-50:21
Volume 20, Number 3, May 2024
- Boyu Fan

, Xiang Su
, Sasu Tarkoma
, Pan Hui
:
Behave Differently when Clustering: A Semi-asynchronous Federated Learning Approach for IoT. 51:1-51:28 - Yifan Xu

, Fan Dang
, Kebin Liu
, Zhui Zhu
, Xinlei Chen
, Xu Wang
, Xin Miao
, Haitian Zhao
:
BEANet: An Energy-efficient BLE Solution for High-capacity Equipment Area Network. 52:1-52:23 - Guoming Zhang

, Xiaoyu Ji
, Xinyan Zhou
, Donglian Qi
, Wenyuan Xu
:
Ultrasound Communication Using the Nonlinearity Effect of Microphone Circuits in Smart Devices. 53:1-53:22 - Zehua Sun

, Tao Ni
, Huanqi Yang
, Kai Liu
, Yu Zhang
, Tao Gu
, Weitao Xu
:
FLoRa+: Energy-efficient, Reliable, Beamforming-assisted, and Secure Over-the-air Firmware Update in LoRa Networks. 54:1-54:28 - Haiyang Huang

, Tianhui Meng
, Jianxiong Guo
, Xuekai Wei
, Weijia Jia
:
SecEG: A Secure and Efficient Strategy against DDoS Attacks in Mobile Edge Computing. 55:1-55:21 - Yushi Cheng, Boyang Zhou

, Yanjiao Chen
, Yi-Chao Chen
, Xiaoyu Ji
, Wenyuan Xu
:
Evaluating Compressive Sensing on the Security of Computer Vision Systems. 56:1-56:24 - Ravi Raj Saxena

, Joydeep Pal
, Srinivasan Iyengar
, Bhawana Chhaglani
, Anurag Ghosh
, Venkata N. Padmanabhan
, Prabhakar T. Venkata
:
Holistic Energy Awareness and Robustness for Intelligent Drones. 57:1-57:31 - Zichuan Xu

, Haiyang Qiao
, Weifa Liang
, Zhou Xu
, Qiufen Xia
, Pan Zhou
, Omer F. Rana
, Wenzheng Xu
:
Flow-Time Minimization for Timely Data Stream Processing in UAV-Aided Mobile Edge Computing. 58:1-58:28 - Anderson Biegelmeyer

, Alexandre dos Santos Roque
, Edison Pignaton de Freitas
:
An Experimental Study on BLE 5 Mesh Applied to Public Transportation. 59:1-59:27 - Xiao Zhang

, James Mariani
, Li Xiao
, Matt W. Mutka
:
Exploiting Fine-grained Dimming with Improved LiFi Throughput. 60:1-60:24 - Jie Lian

, Xu Yuan
, Jiadong Lou
, Li Chen
, Hao Wang
, Nian-Feng Tzeng
:
Room-scale Location Trace Tracking via Continuous Acoustic Waves. 61:1-61:23 - Liangyi Gong

, Hao Lin
, Daibo Liu
, Lanqi Yang
, Hongyi Wang
, Jiaxing Qiu
, Zhenhua Li
, Feng Qian
:
Who Should We Blame for Android App Crashes? An In-Depth Study at Scale and Practical Resolutions. 62:1-62:24 - Hongwei Du

, Jingfang Su
, Zhao Zhang
, Zhenhua Duan
, Cong Tian
, Ding-Zhu Du
:
Full View Maximum Coverage of Camera Sensors: Moving Object Monitoring. 63:1-63:23 - Roufaida Laidi

, Djamel Djenouri
, Youcef Djenouri
, Jerry Chun-Wei Lin
:
TG-SPRED: Temporal Graph for Sensorial Data PREDiction. 64:1-64:20 - Qiang Ma

, Hao Yuan
, Zhe Hu
, Xu Wang
, Zheng Yang
:
A Liquidity Analysis System for Large-scale Video Streams in the Oilfield. 65:1-65:22 - Simeon Babatunde

, Arwa Alsubhi
, Josiah D. Hester
, Jacob Sorber
:
Greentooth: Robust and Energy Efficient Wireless Networking for Batteryless Devices. 66:1-66:31 - Xiaolong Zheng

, Ruinan Li
, Yuting Wang
, Liang Liu
, Huadong Ma
:
PolarScheduler: Dynamic Transmission Control for Floating LoRa Networks. 67:1-67:33 - Francesco Betti Sorbelli

, Federico Corò
, Sajal K. Das
, Lorenzo Palazzetti
, Cristina M. Pinotti
:
Drone-Based Bug Detection in Orchards with Nets: A Novel Orienteering Approach. 68:1-68:28 - Pengfei Wang

, Dian Jiao
, Leyou Yang
, Bin Wang
, Ruiyun Yu
:
Hypergraph-based Truth Discovery for Sparse Data in Mobile Crowdsensing. 69:1-69:23 - Xianzhong Ding

, Alberto Cerpa
, Wan Du
:
Exploring Deep Reinforcement Learning for Holistic Smart Building Control. 70:1-70:28 - Jiarui Zhang

, Jiliang Wang
:
FusionTrack: Towards Accurate Device-free Acoustic Motion Tracking with Signal Fusion. 71:1-71:30 - Yijie Chen

, Jiliang Wang
, Jing Yang
:
Exploiting Anchor Links for NLOS Combating in UWB Localization. 72:1-72:22 - Mingzhe Li

, Wei Wang
, Jin Zhang
:
Towards Efficient and Deposit-Free Blockchain-Based Spatial Crowdsourcing. 73:1-73:22 - Yuncan Zhang

, Weifa Liang
, Wenzheng Xu
, Zichuan Xu
, Xiaohua Jia
:
Cost Minimization of Digital Twin Placements in Mobile Edge Computing. 74:1-74:26 - Xiangwei Meng

, Wei Liang
, Zisang Xu
, Kuanching Li
, Muhammad Khurram Khan
, Xiaoyan Kui
:
An Anonymous Authenticated Group Key Agreement Scheme for Transfer Learning Edge Services Systems. 75:1-75:23
Volume 20, Number 4, July 2024
- Pengfei Hu

, Zhe Chen
, Chris Xiaoxuan Lu
, Xuyu Wang
, Jun Luo
, Prasant Mohapatra
:
Introduction to the Special Section on Contact-free Smart Sensing in AIoT. 76:1-76:4 - Gasper Slapnicar

, Wenjin Wang
, Mitja Lustrek
:
Feasibility of Remote Blood Pressure Estimation via Narrow-band Multi-wavelength Pulse Transit Time. 77:1-77:21 - Biyun Sheng

, Jiabin Li
, Linqing Gui
, Zhengxin Guo
, Fu Xiao
:
LiteWiSys: A Lightweight System for WiFi-based Dual-task Action Perception. 78:1-78:19 - Peng Liao

, Xuyu Wang
, Lingling An
, Shiwen Mao
, Tianya Zhao
, Chao Yang
:
TFSemantic: A Time-Frequency Semantic GAN Framework for Imbalanced Classification Using Radio Signals. 79:1-79:22 - Xiaobin Zhang

, Hongzhe Xu
, Jianwei Liu
, Jinsong Han
:
TomFi: Small Object Tracking Using Commodity WiFi. 80:1-80:15 - Penghao Wang

, Ruobing Jiang
, Zhongwen Guo
, Chao Liu
:
Afitness: Fitness Monitoring on Smart Devices via Acoustic Motion Images. 81:1-81:24 - Xun Wang

, Zhizheng Yang
, Wei Wang
, Haipeng Dai
, Shuyu Shi
, Qing Gu
:
UltraCLR: Contrastive Representation Learning Framework for Ultrasound-based Sensing. 82:1-82:23 - Zhiqiang Wang

, Jiahui Hou
, Guangyu Wu
, Suyuan Liu
, Puhan Luo
, Xiang-Yang Li
:
Efficient Task-driven Video Data Privacy Protection for Smart Camera Surveillance System. 83:1-83:21 - Yaxin Mei

, Wenhua Wang
, Yuzhu Liang
, Qin Liu
, Shuhong Chen
, Tian Wang
:
Privacy-Enhanced Cooperative Storage Scheme for Contact-Free Sensory Data in AIoT with Efficient Synchronization. 84:1-84:19 - Xiaocheng Wang

, Guiyun Fan
, Rong Ding
, Haiming Jin
, Wentian Hao
, Mingyuan Tao
:
Water Salinity Sensing with UAV-Mounted IR-UWB Radar. 85:1-85:37 - Tiantian Liu

, Chao Wang
, Zhengxiong Li
, Ming-Chun Huang
, Wenyao Xu
, Feng Lin
:
Wavoice: An mmWave-Assisted Noise-Resistant Speech Recognition System. 86:1-86:29 - Qing Guo

, Lei Xie
, Xinran Lu
, Yanling Bu
, Chuyu Wang
, Baoliu Ye
, Sanglu Lu
:
LightGyro: A Batteryless Orientation Measuring Scheme Based on Light Reflection. 87:1-87:23 - Ruoyu Zhao

, Yushu Zhang
, Wenying Wen
, Rushi Lan
, Yong Xiang
:
E-TPE: Efficient Thumbnail-Preserving Encryption for Privacy Protection in Visual Sensor Networks. 88:1-88:26 - Mingda Han

, Huanqi Yang
, Tao Ni
, Di Duan
, Mengzhe Ruan
, Yongliang Chen
, Jia Zhang
, Weitao Xu
:
mmSign: mmWave-based Few-Shot Online Handwritten Signature Verification. 89:1-89:31 - Xinxin Lu, Lei Wang, Chi Lin, Xin Fan, Bin Han, Xin Han, Zhenquan Qin:

AutoDLAR: A Semi-supervised Cross-modal Contact-free Human Activity Recognition System. 90:1-90:20 - Feng Li

, Jiayi Zhao
, Huan Yang
, Dongxiao Yu
, Yuanfeng Zhou
, Yiran Shen
:
VibHead: An Authentication Scheme for Smart Headsets through Vibration. 91:1-91:21 - Zhiyi Zhou

, Lei Wang
, Xinxin Lu
, Yu Tian
, Jian Fang
, Bingxian Lu
:
Wave-CapNet: A Wavelet Neuron-based Wi-Fi Sensing Model for Human Identification. 92:1-92:20 - Shuai Wang, Luoyu Mei

, Zhimeng Yin, Hao Li, Ruofeng Liu, Wenchao Jiang, Chris Xiaoxuan Lu
:
End-to-End Target Liveness Detection via mmWave Radar and Vision Fusion for Autonomous Vehicles. 93:1-93:26 - Youwei Zhang

, Feiyu Han
, Panlong Yang
, Yuanhao Feng
, Yubo Yan
, Ran Guan
:
Wi-Cyclops: Room-Scale WiFi Sensing System for Respiration Detection Based on Single-Antenna. 94:1-94:24
- Zhichao Cao

, Chenning Li
, Li Liu
, Mi Zhang
:
WiVelo: Fine-grained Wi-Fi Walking Velocity Estimation. 95:1-95:21 - Jiangyuan Chen

, Ammar Hawbani
, Xiaohua Xu
, Xingfu Wang
, Liang Zhao
, Zhi Liu
, Saeed H. Alsamhi
:
A DRL-based Partial Charging Algorithm for Wireless Rechargeable Sensor Networks. 96:1-96:24 - Xia Cheng

, Mo Sha
:
MERA: Meta-Learning Based Runtime Adaptation for Industrial Wireless Sensor-Actuator Networks. 97:1-97:24 - Kang Yang

, Wan Du
:
A Low-Density Parity-Check Coding Scheme for LoRa Networking. 98:1-98:29 - Xianzhong Ding

, Wan Du
:
Optimizing Irrigation Efficiency using Deep Reinforcement Learning in the Field. 99:1-99:34 - Li Zhang

, Xu Zhou
, Danyang Li
, Zheng Yang
:
HCCNet: Hybrid Coupled Cooperative Network for Robust Indoor Localization. 100:1-100:22 - Daibo Liu

, Chao Qian
, Huigui Rong
, Siwang Zhou
, Chaocan Xiang
, Hongbo Jiang
:
Energy and QoE Optimization for Mobile Video Streaming with Adaptive Brightness Scaling. 101:1-101:24
Volume 20, Number 5, September 2024
- Akshay Gadre

, Zachary Manchester
, Swarun Kumar
:
Adapting LoRa Ground Stations for Low-latency Imaging and Inference from LoRa-enabled CubeSats. 102:1-102:30 - Muhammad Sarmad Mir

:
RGB LED for Communication, Harvesting and Sensing in IoT Applications. 103:1-103:23 - Miao Guo

, Shibo He
, Chaojie Gu
, Xiuzhen Guo
, Ji-ming Chen
, Tao Gao
, Tongtong Wang
:
Towards Distributed Flow Scheduling in IEEE 802.1Qbv Time-Sensitive Networks. 104:1-104:30 - Huan Liu

, Yuzhe Zhang
, Xuxu Chen
, Dalin Zhang
, Rui Li
, Tao Qin
:
Self-Supervised EEG Representation Learning for Robust Emotion Recognition. 105:1-105:22 - Shiyang Wang

, Xingchen Wang
, Wenjun Jiang
, Chenglin Miao
, Qiming Cao
, Haoyu Wang
, Ke Sun
, Hongfei Xue
, Lu Su
:
Towards Smartphone-based 3D Hand Pose Reconstruction Using Acoustic Signals. 106:1-106:32 - Yuan Wu

, Yanjiao Chen
, Jian Zhang
, Xueluan Gong
, Hongliang Bi
:
Ubi-AD: Towards Ubiquitous, Passive Alzheimer Detection using the Smartwatch. 107:1-107:22 - Siheng Li

, Beihong Jin
, Zhi Wang
, Fusang Zhang
, Xiaoyong Ren
, Haiqin Liu
:
Leveraging Attention-reinforced UWB Signals to Monitor Respiration during Sleep. 108:1-108:28 - Jianxiong Guo

, Xingjian Ding
, Weili Wu
, Ding-Zhu Du
:
A Double Auction for Charging Scheduling among Vehicles Using DAG-Blockchains. 109:1-109:27 - Minyu Teng

, Jingxuan Han
, Jintao Xie
, Jiayao Gao
, Jiangfeng Li
, Yang Shi
:
Obfuscating Ciphertext-Policy Attribute-Based Re-Encryption for Sensor Networks with Cloud Storage. 110:1-110:39 - Yantao Li

, Xinyang Li
, Xinyu Lei
, Huafeng Qin
, Yiwen Hu
, Gang Zhou
:
On the Inference of Original Graph Information from Graph Embeddings. 111:1-111:28 - Min He

, Yali Chen
, Min Liu
, Xiaokun Fan
, Yuchen Zhu
:
Reliable and Energy-Efficient Communications in Mobile Robotic Networks by Collaborative Beamforming. 112:1-112:24 - Yantao Li

, Kaijian Dan
, Xinyu Lei
, Huafeng Qin
, Shaojiang Deng
, Gang Zhou
:
Using Reinforcement Learning to Escape Automatic Filter-based Adversarial Example Defense. 113:1-113:26 - Yachen Mao

, Yubo Yan
, Shanyue Wang
, Xiang-Yang Li
:
Stabilizing Dynamic Backscatter for Swift and Accurate Object Tracking. 114:1-114:18
Volume 20, Number 6, November 2024
- Haifeng Jia

, Yichen Wei
, Yibo Pi
, Cailian Chen
:
Power-Domain Interference Graph Estimation for Multi-hop BLE Networks. 115:1-115:28 - Wenhui Cheng

, Zixian Jiang
, Chaocan Xiang
, Jianglan Fu
:
Marginal Effect-aware Multiple-Vehicle Scheduling for Road Data Collection: A Near-optimal Result. 116:1-116:21 - Jumana Bukhari

, Zhenghao Zhang
:
Understanding Long Range-Frequency Hopping Spread Spectrum (LR-FHSS) with Real-World Packet Traces. 117:1-117:30 - Shuai Zhu

, Thiemo Voigt
, Fatemeh Rahimian
, JeongGil Ko
:
On-device Training: A First Overview on Existing Systems. 118:1-118:39 - Yifei Sun

, Bojie Lv
, Haisheng Tan
, Rui Wang
, Francis C. M. Lau:
COSMO: Dynamic Uploading Scheduling in mmWave-Based Sensor Networks with Mobile Blockers. 119:1-119:27 - Fahim Niaz

, Jian Zhang
, Yang Zheng
, Muhammad Khalid
, Ashfaq Niaz
:
mm-CUR: A Novel Ubiquitous, Contact-free, and Location-aware Counterfeit Currency Detection in Bundles Using Millimeter-Wave Sensor. 120:1-120:26 - Xinjun Cai

, Jingao Xu
, Kuntian Deng
, Hongbo Lan
, Yue Wu
, Xiangwen Zhuge
, Zheng Yang
:
TrinitySLAM: On-board Real-time Event-image Fusion SLAM System for Drones. 121:1-121:22 - Yujia Gao

, Li Shen
, Liang Liu
, Zijian Cao
, Dacheng Tao
, Huadong Ma
, Nei Kato
:
Neural-aware Decoupling Fusion based Personalized Federated Learning for Intelligent Sensing. 122:1-122:21 - Xiaofeng Cao

, Deke Guo
, Feng Lyu
, Peng Yang
, Weiming Zhang
:
CoDe: Customizing Urban HD Map Deployment Strategy with Spatio-Temporal GPS Trace. 123:1-123:21 - Leiyang Xu

, Xiaolong Zheng
, Yucheng Zhang
, Liang Liu
, Huadong Ma
:
WiCAM2.0: Imperceptible and Targeted Attack on Deep Learning based WiFi Sensing. 124:1-124:22 - Zejun Xu

, Wenqiang Jin
, Changwei Yao, Xinyi Liu, Shuang Ma, Yu Liu, Zheng Qin
, Iman Vakilinia
, Daibo Liu:
EM-Rhythm: An Authentication Method for Heterogeneous IoT Devices. 125:1-125:21 - Yeming Li

, Borui Li
, Jiamei Lv
, Wei Dong
:
BLEdge: Edge-centric Programming for BLE Applications with Multi-connection Optimization. 126:1-126:25 - Ruochen Zhou

, Xiaoyu Ji
, Han Chen
, Chen Yan
, Wenyuan Xu
:
Detecting Hidden Voice Recorders via ADC Electromagnetic Radiation. 127:1-127:26 - Yunhao Yao

, Jiahui Hou
, Guangyu Wu
, Yihang Cheng
, Mu Yuan
, Puhan Luo
, Zhiqiang Wang
, Xiang-Yang Li
:
SecoInfer: Secure DNN End-Edge Collaborative Inference Framework Optimizing Privacy and Latency. 128:1-128:29 - Chunlin Li

, Yong Zhang
, Long Yu
, Kun Jiang
, Youlong Luo
, Shaohua Wan
:
DRL-based Content Caching Strategy With Efficient User Preference Predictions in UAV-assisted VEC. 129:1-129:32 - Tiziana Cattai

, Stefania Colonnese
, Domenico Garlisi
, Antonino Pagano
, Francesca Cuomo
:
GraphSmart: A Method for Green and Accurate IoT Water Monitoring. 130:1-130:32

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














