Wireless Algorithms, Systems, and Applications
Wireless Algorithms, Systems, and Applications
18th International Conference, WASA 2024, Qindao, China, June 21-23, 2024, Proceedings, Part II
Zou, Yifei; Guo, Shaoyong; Cai, Zhipeng; Takabi, Daniel
Springer International Publishing AG
12/2024
503
Mole
9783031714665
Pré-lançamento - envio 15 a 20 dias após a sua edição
.- A Secure and Efficient Privacy Data Aggregation Mechanism.
.- A Lightweight Method to Survey with Protecting Privacy yet Maintaining Accuracy.
.- A Method for Abnormal Detection and Poisoned Data Recovery in Clustered Federated Learning.
.- FedDAGC: Dynamic Adaptive Graph Coarsening for Federated Learning on Non-IID Graphs.
.- Defending Against Poisoning Attacks in Federated Prototype Learning on Non-IID Data.
.- Federated Learning for Edge Heterogeneous Object Detection Algorithm.
.- CoR-FHD: Communication-Efficient and Robust Federated Hyperdimensional Computing for Activity Recognition.
.- Dynamic Staleness Control for Asynchronous Federated Learning in Decentralized Topology.
.- Fair and Communication-Efficient Personalized Federated Learning.
.- Distributed & Personalized Federated Learning in Wireless Ad Hoc Networks.
.- DS-TFP: A Distributed and Secure Traffic Flow Prediction Framework Based on Federated Graph Learning.
.- Federated Dynamic Graph Fusion Framework for Remaining Useful Life Prediction.
.- FEAttack: A Fast and Efficient Hard-Label Textual Attack Framework.
.- Pleno-Sense: An Adaptive Switching Algorithm towards Robust Respiration Monitoring Across Diverse Motion Scenarios.
.- Inter-Technology Backscatter Communication: A Bidirectional Zigbee-BLE System.
.- Distributed Dynamic Virtual Network Embedding in Container Networks.
.- Automatic Modulation Recognition Using Parallel Feature Extraction Architecture.
.- A Message Routing Algorithm Based on the Importance of Node Social Relationships in Opportunistic Mobile Networks.
.- Real-time Atmospheric Duct Height Prediction Framework Based on Spatio-temporal to Ensure Maritime Communication Security.
.- An Extra Diagnosis Algorithm for Conditional Recursive Match Networks under the PMC Model.
.- Personalized mmWave Signal Synthesis for Human Sensing.
.- Remorabook: Privacy-Preserving Mobile Social Networking Based on Remora Computing.
.- DSBA: Dynamic Sharded Blockchain Architecture for Industrial Emergency Data Sharing.
.- A Novel Merging Framework for Homogeneous and Heterogeneous Blockchain Systems.
.- Active Defense Simulation Evaluation of Industrial Control Systems Based on Attack-Defense Graph.
.- Hybrid Heterogeneous Wireless Chargers Placement.
.- An Efficient Fault-tolerant Communication Scheme in 3-ary n-cube Networks.
.- 3D Physical Layer Secure Transmission for UAV-assisted Mobile Communications without Locations of Eavesdroppers.
.- Adaptive Self-healing Routing for Heterogeneous Ambient Backscatter Wireless Sensor Networks.
.- Joint Optimization of Maximum Achievable Rate in SWIPT Systems Assisted by Active STAR-RIS.
.- Anonymity on Byzantine-Resilient Decentralized Computing.
.- A DRL-Based Edge Intelligent Servo Control with Semi-Closed-Loop Feedbacks in Industrial IoT.
.- Anomaly Detection under Normality-Shifted IoT Scenario: Filter, Detection, and Adaption.
.- DevDet: Detecting IoT Device Impersonation Attacks via Traffic Based Identification.
.- Multiscale Adversarial Domain Adaptation Approach for Cloud-Edge Collaborative Fault Diagnosis of Industrial Equipment.
.- Detection and Localization of Malicious Nodes in Internet of Things Based on SDN.
.- Enhancing Scalability: A Complete Tree Sharding Architecture towards IoT.
.- A Cloud-Edge Integrated Water Body Extraction Using Superpixel Segmentation.
.- Layer-Aware Microservice Deployment for Edge Computing with Service Reliability Provisioning.
.- FusionFlow: Neural Fusion and Compression for Communication Efficient Edge-Cloud Collaborative Computing.
.- Toward Low Overhead and Real-time Multi-vehicle Collaborative Perception via V2V Communication.
.- A Secure and Efficient Privacy Data Aggregation Mechanism.
.- A Lightweight Method to Survey with Protecting Privacy yet Maintaining Accuracy.
.- A Method for Abnormal Detection and Poisoned Data Recovery in Clustered Federated Learning.
.- FedDAGC: Dynamic Adaptive Graph Coarsening for Federated Learning on Non-IID Graphs.
.- Defending Against Poisoning Attacks in Federated Prototype Learning on Non-IID Data.
.- Federated Learning for Edge Heterogeneous Object Detection Algorithm.
.- CoR-FHD: Communication-Efficient and Robust Federated Hyperdimensional Computing for Activity Recognition.
.- Dynamic Staleness Control for Asynchronous Federated Learning in Decentralized Topology.
.- Fair and Communication-Efficient Personalized Federated Learning.
.- Distributed & Personalized Federated Learning in Wireless Ad Hoc Networks.
.- DS-TFP: A Distributed and Secure Traffic Flow Prediction Framework Based on Federated Graph Learning.
.- Federated Dynamic Graph Fusion Framework for Remaining Useful Life Prediction.
.- FEAttack: A Fast and Efficient Hard-Label Textual Attack Framework.
.- Pleno-Sense: An Adaptive Switching Algorithm towards Robust Respiration Monitoring Across Diverse Motion Scenarios.
.- Inter-Technology Backscatter Communication: A Bidirectional Zigbee-BLE System.
.- Distributed Dynamic Virtual Network Embedding in Container Networks.
.- Automatic Modulation Recognition Using Parallel Feature Extraction Architecture.
.- A Message Routing Algorithm Based on the Importance of Node Social Relationships in Opportunistic Mobile Networks.
.- Real-time Atmospheric Duct Height Prediction Framework Based on Spatio-temporal to Ensure Maritime Communication Security.
.- An Extra Diagnosis Algorithm for Conditional Recursive Match Networks under the PMC Model.
.- Personalized mmWave Signal Synthesis for Human Sensing.
.- Remorabook: Privacy-Preserving Mobile Social Networking Based on Remora Computing.
.- DSBA: Dynamic Sharded Blockchain Architecture for Industrial Emergency Data Sharing.
.- A Novel Merging Framework for Homogeneous and Heterogeneous Blockchain Systems.
.- Active Defense Simulation Evaluation of Industrial Control Systems Based on Attack-Defense Graph.
.- Hybrid Heterogeneous Wireless Chargers Placement.
.- An Efficient Fault-tolerant Communication Scheme in 3-ary n-cube Networks.
.- 3D Physical Layer Secure Transmission for UAV-assisted Mobile Communications without Locations of Eavesdroppers.
.- Adaptive Self-healing Routing for Heterogeneous Ambient Backscatter Wireless Sensor Networks.
.- Joint Optimization of Maximum Achievable Rate in SWIPT Systems Assisted by Active STAR-RIS.
.- Anonymity on Byzantine-Resilient Decentralized Computing.
.- A DRL-Based Edge Intelligent Servo Control with Semi-Closed-Loop Feedbacks in Industrial IoT.
.- Anomaly Detection under Normality-Shifted IoT Scenario: Filter, Detection, and Adaption.
.- DevDet: Detecting IoT Device Impersonation Attacks via Traffic Based Identification.
.- Multiscale Adversarial Domain Adaptation Approach for Cloud-Edge Collaborative Fault Diagnosis of Industrial Equipment.
.- Detection and Localization of Malicious Nodes in Internet of Things Based on SDN.
.- Enhancing Scalability: A Complete Tree Sharding Architecture towards IoT.
.- A Cloud-Edge Integrated Water Body Extraction Using Superpixel Segmentation.
.- Layer-Aware Microservice Deployment for Edge Computing with Service Reliability Provisioning.
.- FusionFlow: Neural Fusion and Compression for Communication Efficient Edge-Cloud Collaborative Computing.
.- Toward Low Overhead and Real-time Multi-vehicle Collaborative Perception via V2V Communication.