default search action
iThings/GreenCom/CPSCom/SmartData 2021: Melbourne, Australia
- 2021 IEEE International Conferences on Internet of Things (iThings) and IEEE Green Computing & Communications (GreenCom) and IEEE Cyber, Physical & Social Computing (CPSCom) and IEEE Smart Data (SmartData) and IEEE Congress on Cybermatics (Cybermatics), Melbourne, Australia, December 6-8, 2021. IEEE 2021, ISBN 978-1-6654-1762-4
- Tari Zahir, Ruidong Li:
Message from the CPSCom 2021 General Chairs: iThings-GreenCom-CPSCom-SmartData-Cybermatics 2021. xvii - James Xi Zheng, Tom H. Luan, Xiao Liu:
Message from the CPSCom 2021 Program Chairs: iThings-GreenCom-CPSCom-SmartData-Cybermatics 2021. xviii - Jiuyong Li, Aniello Castiglione:
Message from the IEEE SmartData 2021 General Chairs: iThings-GreenCom-CPSCom-SmartData-Cybermatics 2021. xxi - Dimitrios Georgakopoulos, Schahram Dustdar, Tao Gu:
Message from the iThings 2021 General Chairs: iThings-GreenCom-CPSCom-SmartData-Cybermatics 2021. xiii - Prem Prakash Jayaraman, Karan Mitra, Haipeng Dai:
Message from the iThings 2021 Program Chairs: iThings-GreenCom-CPSCom-SmartData-Cybermatics 2021. xiv - Dusit Niyato, Yan Zhang, Sheng Wen:
Message from the GreenCom 2021 General Chairs and Program Chairs: iThings-GreenCom-CPSCom-SmartData-Cybermatics 2021. xxiv - Niels Gandraß, Michel Rottleuthner, Thomas C. Schmidt:
uTimer: A Uniform Low-level Timer API for RIOT OS. 1-8 - Duaa Zuhair Al-Hamid, Adnan Al-Anbuky:
Vehicular Grouping Protocol: Towards Cyber Physical Network Intelligence. 9-16 - Korkut Bekiroglu, Ali Tekeoglu, Jiayue Shen, Ilker Boz:
Low-Cost Internet of Things Based Real- Time Pavement Monitoring System. 17-22 - Ahmed Raoof, Chung-Horng Lung, Ashraf Matrawy:
Integrating 6LoWPAN Security with RPL Using The Chained Secure Mode Framework. 23-28 - Aroosa Hameed, John Violos, Nina Santi, Aris Leivadeas, Nathalie Mitton:
A Machine Learning Regression Approach for Throughput Estimation in an IoT Environment. 29-36 - Abdulla Aboumadi, Elias Yaacoub, Khalid Abualsaud:
A Lightweight Central Learning Approach for Arrhythmia Detection from ECG Signals. 37-42 - Satoshi Okada, Daisuke Miyamoto, Yuji Sekiya, Hideki Takase, Hiroshi Nakamura:
LDoS Attacker Detection Algorithms in Zigbee Network. 43-50 - Zhangcheng Qiang, Yuxin Zhang, Pari Delir Haghighi, Abdur Rahim Mohammad Forkan, Prem Prakash Jayaraman, Junyao Deng:
MobileDLSearch: Ontology-based Mobile Platform for Effective Sharing and Reuse of Deep Learning Models. 51-58 - Alexander Nußbaum, Johannes Schütte, Luoyao Hao, Henning Schulzrinne, Florian Alt:
Tremble: TRansparent Emission Monitoring with BLockchain Endorsement. 59-64 - Kent Sanders, Stephen S. Yau:
An Effective Approach to Protecting Low-Power and Lossy IoT Networks Against Blackhole Attacks. 65-72 - Amin Abken, Seng W. Loke, Arkady B. Zaslavsky:
Towards Group Activity Recognition and Analysis for Improving the Safety of Automated Vehicles. 73-82 - Ah Hyun Yuh, Soon Ju Kang:
Real-Time Sound Event Classification for Human Activity of Daily Living using Deep Neural Network. 83-88 - Kanaka Sai Jagarlamudi, Arkady B. Zaslavsky, Seng W. Loke, Alireza Hassani, Alexey Medvedev:
Quality and Cost Aware Service Selection in IoT-Context Management Platforms. 89-98 - Poliana de Moraes, Arlindo Flávio da Conceição:
Protecting LoRaWan data against untrusted network servers. 99-106 - Reza Bairam Zadeh, Arkady B. Zaslavsky, Seng W. Loke, Somaiyeh Mahmoud Zadeh:
Multi-UAVs for Bushfire Situational Awareness: a Comparison of Environment Traversal Algorithms. 107-114 - Harun Surej Ilango, Maode Ma, Rong Su:
Low Rate DoS Attack Detection in IoT - SDN using Deep Learning. 115-120 - Yehuda Afek, Anat Bremler-Barr, David Hay, Avraham Shalev:
MUDirect: Protecting P2P IoT Devices with MUD. 121-129 - Takuto Yamauchi, Takanori Hirano, Jialong Li, Takafumi Kawasaki, Yin Chen, Akira Tsuge, Tadashi Okoshi, Jin Nakazawa, Nobukazu Yoshioka, Georgios Palaiokrassas, Antonios Litke, Kenji Tei:
A Development Method for Safe Node-RED Systems using Discrete Controller Synthesis. 130-137 - Keisuke Furumoto, Mitsuhiro Umizaki, Akira Fujita, Takahiko Nagata, Takeshi Takahashi, Daisuke Inoue:
Extracting Threat Intelligence Related IoT Botnet From Latest Dark Web Data Collection. 138-145 - Xinyue Jiang, Risheng Deng, Dong Zhang, Chunming Wu:
Flow Anomaly Telemetry Driven by Programmable Data Plane. 146-152 - Line M. P. Larsen, Sarah Ruepp, Michael S. Berger, Henrik Lehrmann Christiansen:
Energy Consumption Modelling of Next Generation Mobile Crosshaul Networks. 153-160 - Marie-Anne Lacroix, Romuald Rocher, Pascal Scalart:
Advanced energy model and spectral efficiency optimization in short-range wireless sensor networks. 161-167 - Mohamed Gaballa, Maysam Abbod, Muna Albasman:
Power Allocation & MRC Analysis for Single Input Multi Output Non-Orthogonal Multiple Access System. 168-173 - Yongjie Zhan, Le Li, Yuwen Qian, Chuan Ma, Ming Ding, Bo Liu:
A Hybrid Spatiotemporal Attack in Continuous LBS Queries. 174-181 - Zhenxiao Luo, Guopin Tang, Chen Wang, Yipeng Zhou, James Xi Zheng, Jessie Hui Wang, Gang Liu, Di Wu:
Generating High-quality Movie Tags from Social Reviews: A Learning-driven Approach. 182-189 - Jinkai Zheng, Phil K. Mu, Ziqian Man, Tom H. Luan, Lin X. Cai, Hangguan Shan:
Device Placement for Autonomous Vehicles using Reinforcement Learning. 190-196 - Yu Yan, Shuai Ding, Zijie Yue, Hui Yang, Lina Qu, Yinghui Li:
A non-contact mental fatigue detection method for space medical experiment using multi-feature fusion model. 197-203 - Lianting Xue, Long Cheng, Yuancheng Li, Ying Mao:
Quantum Machine Learning for Electricity Theft Detection: an Initial Investigation. 204-208 - Xiaojie Feng, Haizhou Du:
FLZip: An Efficient and Privacy-Preserving Framework for Cross-Silo Federated Learning. 209-216 - Arpan Bhattacharjee, Shahriar Badsha, Md Tamjid Hossain, Charalambos Konstantinou, Xueping Liang:
Vulnerability Characterization and Privacy Quantification for Cyber-Physical Systems. 217-223 - Zixuan Xu, Jingci Zhang, Shang Ai, Chen Liang, Lu Liu, Yuanzhang Li:
Offensive and Defensive Countermeasure Technology of Return-Oriented Programming. 224-228 - Jidong Geng, Chao Zhang, Haoyuan Gao, Yang Lv, Xiaopei Wu:
Motion Resistant Facial Video based Heart Rate Estimation Method using Head-Mounted Camera. 229-237 - Yuping Zhang, Youyang Qu, Longxiang Gao, Bruce Gu, Lei Cui, Xuemeng Zhai:
GPDP: Game-Enhanced Personalized Differentially Private Smart Community. 238-243 - Chen Wang, Jian Xu, Long Yin:
A Secure Cloud-Edge Collaborative Logistic Regression Model. 244-253 - Qianqian Pan, Jun Wu, Xi Lin, Jianhua Li:
Side-Channel Analysis-Based Model Extraction on Intelligent CPS: An Information Theory Perspective. 254-261 - Sena Seneviratne, Liyanage C. De Silva, Sanjeeva Witharana:
Taxonomy And Survey Of Performance Prediction Systems For The Distributed Systems Including The Clouds. 262-268 - Chung-Ming Huang, Shu-Hang Huang:
The Registration-based Scheduling for Avoiding Collision using the Triggered RAW for IEEE 802.11ah. 269-275 - Yu Zhang, Zhongzheng Lai, Dong Yuan, Wei Bao, Bing Bing Zhou, Jing Qiu, Shen Wang, Stewart Adams:
GauPro: An Accuracy-Improved Indoor Positioning System Based on Beacon Probabilistic Fingerprint. 276-283 - Alì Aghazadeh Ardebili, Antonella Longo, Antonio Ficarella:
Digital Twins bonds society with cyber-physical Energy Systems: a literature review. 284-289 - Steffen Randrup, Issam Raïs, John Markus Bjørndalen, Phuong Hoai Ha, Otto J. Anshus:
Impact of image compression on CNN performance metrics for CPS nodes at the Arctic Tundra. 290-297 - Chao Xu, Jessie Hui Wang, Rui Li, Tao Yu, Jilong Wang:
A Quick Recovery Strategy for Network Failure under Multipath Multicast Transmissions. 298-305 - Xiumei Deng, Jun Li, Long Shi, Zhe Wang, Jessie Hui Wang, Taotao Wang:
On Dynamic Resource Allocation for Blockchain Assisted Federated Learning over Wireless Channels. 306-313 - Ryan Wen Liu, Maohan Liang, Jiangtian Nie, Xianjun Deng, Zehui Xiong, Jiawen Kang, Helin Yang, Yang Zhang:
Intelligent Data-Driven Vessel Trajectory Prediction in Marine Transportation Cyber-Physical System. 314-321 - Jieying Zhou, Junyao Zheng, Pengfei He, Weigang Wu:
Research on Social Attribute Aware-based Vehicular Opportunistic Routing Protocol. 322-329 - Chengyuan Zhang, Changqing An, Jessie Hui Wang, Ziyi Zhao, Tao Yu, Jilong Wang:
SAFSN: A Self-Attention Based Neural Network for Encrypted Mobile Traffic Classification. 330-337 - Arthur Sandor Voundi Koe, Juan Tang, Shan Ai, Hongyang Yan, Shiwen Zhang:
Revocable Outsourcing Multi-Authority ABE for Medical Data in Mobile Cloud. 338-345 - Yon Vanommeslaeghe, Joachim Denil, Bert Van Acker, Paul De Meulenaere:
Automatic Generation of Workflows for Efficient Design Space Exploration for Cyber-Physical Systems. 346-351 - Lihao Zhang, Taotao Wang, Soung Chang Liew:
Speeding up Block Propagation in Bitcoin Network: A Cut-through Relaying Scheme. 352-358 - Md Towhidul Absar Chowdhury, Naveen Sharma:
Citizenly: A platform to encourage data-driven decision making for the community by the community. 359-364 - Antonella Longo, Alì Aghazadeh Ardebili, Marco Zappatore, Divya Pragna Mulla:
May SARS-CoV-2 be prevented by an indoor air monitoring smart data service? 365-371 - Carson K. Leung, Chenru Zhao, Hao Zheng:
Smart Data Analytics on COVID-19 Data. 372-379 - Jake Stauffer, Qingxue Zhang:
s2Cloud: A Novel Cloud System for Mobile Health Big Data Management. 380-383 - Hideya Yoshiuchi:
Optimized Route Calculation Technology with Smart Building Platform. 384-390 - Juei-Yian Lin, Jhih-Yuan Huang, Wei-Po Lee:
Question-Answer Generation for Data Augmentation. 391-397
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.