


default search action
15th WASA 2020: Qingdao, China - Part I
- Dongxiao Yu, Falko Dressler, Jiguo Yu:

Wireless Algorithms, Systems, and Applications - 15th International Conference, WASA 2020, Qingdao, China, September 13-15, 2020, Proceedings, Part I. Lecture Notes in Computer Science 12384, Springer 2020, ISBN 978-3-030-59015-4
Full Papers
- Chunyu Ai, Wei Zhong, Longjiang Guo:

Reinforcement Learning Based Group Event Invitation Algorithm. 3-14 - Yanhua Cao, Shiyou Qian, Qiushi Wang, Hanwen Hu, Weidong Zhu, Jian Cao, Guangtao Xue, Yanmin Zhu, Minglu Li:

OSCD: An Online Charging Scheduling Algorithm to Optimize Cost and Smoothness. 15-27 - T.-H. Hubert Chan

, Li Ning
, Yong Zhang
:
Maximizing the Expected Influence in Face of the Non-progressive Adversary. 28-39 - Hao Chen, Yourong Chen, Meng Han, Banteng Liu, Qiuxia Chen, Zhenghua Ma:

A Novel Anti-attack Revenue Optimization Algorithm in the Proof-of-Work Based Blockchain. 40-50 - Zheng Chen, Zhaoquan Gu, Yuexuan Wang:

Can the Max-Min Fair Allocation Be Trustful in a Centralized Resource System? 51-64 - Jiancheng Chi, Tie Qiu, Chaokun Zhang, Laiping Zhao:

A Novel Blockchain Network Structure Based on Logical Nodes. 65-76 - Xue-rong Cui, Tong Xu, Juan Li, Meiqi Ji, Qiqi Qi, Shibao Li:

Dynamic Distribution Routing Algorithm Based on Probability for Maritime Delay Tolerant Networks. 77-84 - Xinpeng Duan, Feng Li, Dongxiao Yu, Huan Yang, Hao Sheng:

Learning-Aided Mobile Charging for Rechargeable Sensor Networks. 85-96 - Jingjing Fan, Yan Huo, Qinghe Gao, Tao Jing:

A Social Relationship Enabled Cooperative Jamming Scheme for Wireless Communications. 97-108 - Yuqi Fan, Lunfei Wang, Jie Chen, Zhifeng Jin, Lei Shi, Juan Xu:

Multi-job Associated Task Scheduling Based on Task Duplication and Insertion for Cloud Computing. 109-120 - Xuhui Gong, Qiang-Sheng Hua, Hai Jin:

Communication-Efficient and Privacy-Preserving Protocol for Computing Over-Threshold Set-Union. 121-133 - Xinxin Han, Guichen Gao, Li Ning, Yang Wang, Yong Zhang:

Approximation Algorithm for the Offloading Problem in Edge Computing. 134-144 - Li-Tse Hsieh, Hang Liu, Yang Guo, Robert Gazda:

Quality of Service Optimization in Mobile Edge Computing Networks via Deep Reinforcement Learning. 145-157 - Hantao Hu, Yang Liu, Kai Lv, Yanwei Zheng, Wei Zhang, Wei Ke

, Hao Sheng:
Camera Style Guided Feature Generation for Person Re-identification. 158-169 - Qin Hu, Minghui Xu, Shengling Wang, Shaoyong Guo:

Sync or Fork: Node-Level Synchronization Analysis of Blockchain. 170-181 - Wei Jiang, Molin Li, Xiaobo Zhou, Wenyu Qu, Tie Qiu:

Multi-user Cooperative Computation Offloading in Mobile Edge Computing. 182-193 - Wei Jiang, Yuan Wang, Yan Tang:

SDTCNs: A Symmetric Double Temporal Convolutional Network for Chinese NER. 194-205 - Han Li, Hongliang Zhou, Hejiao Huang, Xiaohua Jia:

Verifiable Encrypted Search with Forward Secure Updates for Blockchain-Based System. 206-217 - Pengfei Li, Xin He, Nikolaos M. Freris, Panlong Yang:

Capacity Analysis of Ambient Backscatter System with Bernoulli Distributed Excitation. 218-230 - Shangsen Li

, Lailong Luo, Deke Guo, Yawei Zhao:
Multiset Synchronization with Counting Cuckoo Filters. 231-243 - Ting Li, Haitao Liu, Jie Liang, Hangsheng Zhang, Liru Geng, Yinlong Liu:

Privacy-Aware Online Task Offloading for Mobile-Edge Computing. 244-255 - Xue Li, Lanshun Nie, Xiandong Si, De-chen Zhan:

A Class Incremental Temporal-Spatial Model Based on Wireless Sensor Networks for Activity Recognition. 256-271 - Ke Lin, Jianzhong Li:

Sensor Deployment for Composite Event Monitoring in Battery-Free Sensor Networks. 272-284 - Bing Liu, Zhaoyan Shen, Zhiping Jia, Xiaojun Cai:

Optimizing Motion Estimation with an ReRAM-Based PIM Architecture. 285-297 - Chao Liu, Yingbin Li, Ruobing Jiang

, Qian Lu, Zhongwen Guo:
Trajectory-Based Data Delivery Algorithm in Maritime Vessel Networks Based on Bi-LSTM. 298-308 - Hong Liu, Peng Li, Yuanru Cui, Qian Liu, Lichen Zhang, Longjiang Guo, Xiaojun Wu, Xiaoming Wang:

Cold Start and Learning Resource Recommendation Mechanism Based on Opportunistic Network in the Context of Campus Collaborative Learning. 309-321 - Suhui Liu, Jiguo Yu, Chunqiang Hu, Mengmeng Li:

Outsourced Multi-authority ABE with White-Box Traceability for Cloud-IoT. 322-332 - Yongxin Liu

, Jian Wang
, Shuteng Niu, Houbing Song
:
Deep Learning Enabled Reliable Identity Verification and Spoofing Detection. 333-345 - Zhengyang Liu, Feng Li, Dongxiao Yu, Holger Karl, Hao Sheng:

On-Line Learning-Based Allocationof Base Stations and Channels in Cognitive Radio Networks. 346-358 - Zhiqiang Lv

, Jianbo Li, Chuanhao Dong, Wei Zhao:
A Deep Spatial-Temporal Network for Vehicle Trajectory Prediction. 359-369 - Ruina Mao, Anming Dong

, Jiguo Yu
:
Beamforming for MISO Cognitive Radio Networks Based on Successive Convex Approximation. 370-380 - Linghang Meng, Xueshu Hong, Yingwen Chen, Yuke Ding, Cheng-Zhuo Zhang:

K-Anonymous Privacy Preserving Scheme Based on Bilinear Pairings over Medical Data. 381-393 - Jiangtian Nie

, Jun Luo
, Zehui Xiong
, Dusit Niyato
, Ping Wang, Yang Zhang:
Incentive Mechanism for Socially-Aware Mobile Crowdsensing: A Bayesian Stackelberg Game. 394-406 - Hualing Ren, Kai Liu, Penglin Dai, Yantao Li, Ruitao Xie

, Songtao Guo:
Adaptive Task Scheduling via End-Edge-Cloud Cooperation in Vehicular Networks. 407-419 - Xiaoling Tao, Yang Peng

, Feng Zhao, Sufang Wang, Ziyi Liu:
An Improved Parallel Network Traffic Anomaly Detection Method Based on Bagging and GRU. 420-431 - Huaqing Tu, Hongli Xu, Liusheng Huang, Xuwei Yang, Da Yao:

Joint Server Selection and SFC Routing for Anycast in NFV-enabled SDNs. 432-443 - Zhitian Tu, Kun Zhu, Changyan Yi

, Ran Wang:
Blockchain-Based Privacy-Preserving Dynamic Spectrum Sharing. 444-456 - Chao Wang, Xiaoman Cheng, Jitong Li, Yunhua He, Ke Xiao:

A Survey: Applications of Blockchains in the Internet of Vehicles. 457-468 - Rui Wang

, Donglan Liu, Jianfei Chen, Lei Ma, Xin Liu, Hao Zhang:
A Secure Topology Control Mechanism for SDWSNs Using Identity-Based Cryptography. 469-481 - Ying Wang, Conghao Ruan, Chunqiang Hu:

A Blockchain-Based Decentralized Public Auditing Scheme for Cloud Storage. 482-493 - Yukun Wang, Mingqiang Wang:

A New Fully Homomorphic Signatures from Standard Lattices. 494-506 - Xiaocan Wu, Yu-e Sun, Yang Du, Xiaoshuang Xing, Guoju Gao, He Huang:

An Efficient Malicious User Detection Mechanism for Crowdsensing System. 507-519 - Hua Xiao, Ying Wang, Shulong Peng, Bin Lin:

Implementation of Video Transmission over Maritime Ad Hoc Network. 520-528 - Junlei Xiao, Peng Li

, Lei Nie
:
A Reliable Multi-task Allocation Based on Reverse Auction for Mobile Crowdsensing. 529-541 - Ke Xiao, Ziye Geng, Yunhua He, Gang Xu, Chao Wang, Wei Cheng:

A Blockchain Based Privacy-Preserving Cloud Service Level Agreement Auditing Scheme. 542-554 - Jieyao Xu, Dongmei Zhang, Gaoyuan Xiong, Han Zhang:

CPBA: An Efficient Conditional Privacy-Preserving Batch Authentication Scheme for VANETs. 555-567 - Qiang Xu, Yifei Zou, Dongxiao Yu, Minghui Xu, Shikun Shen, Feng Li:

Consensus in Wireless Blockchain System. 568-579 - Biwei Yan, Jiguo Yu, Yue Wang

, Qiang Guo, Baobao Chai, Suhui Liu:
Blockchain-Based Service Recommendation Supporting Data Sharing. 580-589 - Jiaxin Yan, Hua Wang, Xiaole Li, Shanwen Yi, Yao Qin:

Multi-objective Disaster Backup in Inter-datacenter Using Reinforcement Learning. 590-601 - Zhaoteng Yan

, Nan Yu, Hui Wen, Zhi Li, Hongsong Zhu, Limin Sun:
Detecting Internet-Scale NATs for IoT Devices Based on Tri-Net. 602-614 - Changsong Yang

, Xiaoling Tao, Sufang Wang, Feng Zhao:
Data Integrity Checking Supporting Reliable Data Migration in Cloud Storage. 615-626 - Feihong Yang, Yuwen Pu, Chunqiang Hu, Yan Zhou:

A Blockchain-Based Privacy-Preserving Mechanism for Attribute Matching in Social Networks. 627-639 - Guisong Yang, Yanting Li, Yan Song, Jun Li, Xingyu He, Linghe Kong

, Ming Liu:
A Real-Time Recommendation Algorithm for Task Allocation in Mobile Crowd Sensing. 640-652 - Zhen Ye, Yubin Wu

, Shuai Wang, Yang Zhang, Yanbing Chen, Wei Ke
, Hao Sheng:
A Dual Scale Matching Model for Long-Term Association. 653-665 - Kangning Yin

, Shaoqi Hou, Ye Li, Chao Li, Guangqiang Yin:
A Real-Time Vehicle Logo Detection Method Based on Improved YOLOv2. 666-677 - Zepeng Yu, Wenzhong Li

, Pinhao Wang, Sanglu Lu:
SEM: APP Usage Prediction with Session-Based Embedding. 678-690 - Jingjing Zhang, Anming Dong

, Jiguo Yu
:
Intelligent Dynamic Spectrum Access for Uplink Underlay Cognitive Radio Networks Based on Q-Learning. 691-703 - Lu Zhang, Saide Zhu, Fengyin Li, Ruinian Li, Jing Meng, Wei Li:

A Trajectory-Privacy Protection Method Based on Location Similarity of Query Destinations in Continuous LBS Queries. 704-715 - Shuo Zhang, Jinghua Zhu:

Reliable Potential Friends Identification Based on Trust Circuit for Social Recommendation. 716-729 - Yi Zhang, Yue Zheng, Guidong Zhang, Kun Qian, Chen Qian, Zheng Yang:

GaitID: Robust Wi-Fi Based Gait Recognition. 730-742 - Yubin Zhao, Junjian Huang, Xiaofan Li, Cheng-Zhong Xu

:
Optimal Node Placement for Magnetic Relay and MIMO Wireless Power Transfer Network. 743-754 - Zhihui Zhao

, Weizhong Wang, Hongsong Zhu, Hong Li, Limin Sun, Sen Zhao, Yan Hu:
EdgeCC: An Authentication Framework for the Fast Migration of Edge Services Under Mobile Clients. 755-767 - Chenwang Zheng, Dan Tao:

Attention-Based Dynamic Preference Model for Next Point-of-Interest Recommendation. 768-780 - Jinwen Zhong, Can Ma, Jiang Zhou, Weiping Wang:

From When to Where: A Multi-task Learning Approach for Next Point-of-Interest Recommendation. 781-793 - Ying Zhong, Yiran Zhu, Zhiliang Wang, Xia Yin, Xingang Shi, Keqin Li:

An Adversarial Learning Model for Intrusion Detection in Real Complex Network Environments. 794-806 - Chun-Xuan Zhou, Qiang-Sheng Hua, Hai Jin:

HotDAG: Hybrid Consensus via Sharding in the Permissionless Model. 807-821 - Yifei Zou, Minghui Xu, Yicheng Xu, Yong Zhang, Bei Gong, Xiaoshuang Xing:

Distributed Data Aggregation in Dynamic Sensor Networks. 822-833

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














