Wireless Algorithms, Systems, and Applications

Wireless Algorithms, Systems, and Applications

18th International Conference, WASA 2024, Qindao, China, June 21-23, 2024, Proceedings, Part II

Zou, Yifei; Guo, Shaoyong; Cai, Zhipeng; Takabi, Daniel

Springer International Publishing AG

12/2024

503

Mole

9783031714665

Pré-lançamento - envio 15 a 20 dias após a sua edição

Descrição não disponível.
.- FedMQ: Multi-grained Quantization for Heterogeneous Federated Learning.

.- A Secure and Efficient Privacy Data Aggregation Mechanism.

.- A Lightweight Method to Survey with Protecting Privacy yet Maintaining Accuracy.

.- A Method for Abnormal Detection and Poisoned Data Recovery in Clustered Federated Learning.

.- FedDAGC: Dynamic Adaptive Graph Coarsening for Federated Learning on Non-IID Graphs.

.- Defending Against Poisoning Attacks in Federated Prototype Learning on Non-IID Data.

.- Federated Learning for Edge Heterogeneous Object Detection Algorithm.

.- CoR-FHD: Communication-Efficient and Robust Federated Hyperdimensional Computing for Activity Recognition.

.- Dynamic Staleness Control for Asynchronous Federated Learning in Decentralized Topology.

.- Fair and Communication-Efficient Personalized Federated Learning.

.- Distributed & Personalized Federated Learning in Wireless Ad Hoc Networks.

.- DS-TFP: A Distributed and Secure Traffic Flow Prediction Framework Based on Federated Graph Learning.

.- Federated Dynamic Graph Fusion Framework for Remaining Useful Life Prediction.

.- FEAttack: A Fast and Efficient Hard-Label Textual Attack Framework.

.- Pleno-Sense: An Adaptive Switching Algorithm towards Robust Respiration Monitoring Across Diverse Motion Scenarios.

.- Inter-Technology Backscatter Communication: A Bidirectional Zigbee-BLE System.

.- Distributed Dynamic Virtual Network Embedding in Container Networks.

.- Automatic Modulation Recognition Using Parallel Feature Extraction Architecture.

.- A Message Routing Algorithm Based on the Importance of Node Social Relationships in Opportunistic Mobile Networks.

.- Real-time Atmospheric Duct Height Prediction Framework Based on Spatio-temporal to Ensure Maritime Communication Security.

.- An Extra Diagnosis Algorithm for Conditional Recursive Match Networks under the PMC Model.

.- Personalized mmWave Signal Synthesis for Human Sensing.

.- Remorabook: Privacy-Preserving Mobile Social Networking Based on Remora Computing.

.- DSBA: Dynamic Sharded Blockchain Architecture for Industrial Emergency Data Sharing.

.- A Novel Merging Framework for Homogeneous and Heterogeneous Blockchain Systems.

.- Active Defense Simulation Evaluation of Industrial Control Systems Based on Attack-Defense Graph.

.- Hybrid Heterogeneous Wireless Chargers Placement.

.- An Efficient Fault-tolerant Communication Scheme in 3-ary n-cube Networks.

.- 3D Physical Layer Secure Transmission for UAV-assisted Mobile Communications without Locations of Eavesdroppers.

.- Adaptive Self-healing Routing for Heterogeneous Ambient Backscatter Wireless Sensor Networks.

.- Joint Optimization of Maximum Achievable Rate in SWIPT Systems Assisted by Active STAR-RIS.

.- Anonymity on Byzantine-Resilient Decentralized Computing.

.- A DRL-Based Edge Intelligent Servo Control with Semi-Closed-Loop Feedbacks in Industrial IoT.

.- Anomaly Detection under Normality-Shifted IoT Scenario: Filter, Detection, and Adaption.

.- DevDet: Detecting IoT Device Impersonation Attacks via Traffic Based Identification.

.- Multiscale Adversarial Domain Adaptation Approach for Cloud-Edge Collaborative Fault Diagnosis of Industrial Equipment.

.- Detection and Localization of Malicious Nodes in Internet of Things Based on SDN.

.- Enhancing Scalability: A Complete Tree Sharding Architecture towards IoT.

.- A Cloud-Edge Integrated Water Body Extraction Using Superpixel Segmentation.

.- Layer-Aware Microservice Deployment for Edge Computing with Service Reliability Provisioning.

.- FusionFlow: Neural Fusion and Compression for Communication Efficient Edge-Cloud Collaborative Computing.

.- Toward Low Overhead and Real-time Multi-vehicle Collaborative Perception via V2V Communication.
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.
networks;network algorithms;network protocols;network performance evaluation;network services;network architectures;security and privacy;network security;systems security;computing methodologies;artificial intelligence;machine learning;distributed computing methodologies