WASA ... : International Conference on Wireless Algorithms, Systems, and Applications : proceedings. WASA最新文献

筛选
英文 中文
TraceDroid: Detecting Android Malware by Trace of Privacy Leakage TraceDroid:检测Android恶意软件的隐私泄露痕迹
Yueqing Wu, Hao Fu, Guoming Zhang, Bin Zhao, Minghui Xu, Yifei Zou, Xiaotao Feng, Pengfei Hu
{"title":"TraceDroid: Detecting Android Malware by Trace of Privacy Leakage","authors":"Yueqing Wu, Hao Fu, Guoming Zhang, Bin Zhao, Minghui Xu, Yifei Zou, Xiaotao Feng, Pengfei Hu","doi":"10.1007/978-3-031-19208-1_38","DOIUrl":"https://doi.org/10.1007/978-3-031-19208-1_38","url":null,"abstract":"","PeriodicalId":89308,"journal":{"name":"WASA ... : International Conference on Wireless Algorithms, Systems, and Applications : proceedings. WASA","volume":"31 1","pages":"466-478"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74311666","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Blockchain-Based Secure and Efficient Federated Learning with Three-phase Consensus and Unknown Device Selection 基于区块链的安全高效的三阶段共识和未知设备选择联邦学习
Jianrong Wang, Haoran Sun, Tianyi Xu
{"title":"Blockchain-Based Secure and Efficient Federated Learning with Three-phase Consensus and Unknown Device Selection","authors":"Jianrong Wang, Haoran Sun, Tianyi Xu","doi":"10.1007/978-3-031-19208-1_37","DOIUrl":"https://doi.org/10.1007/978-3-031-19208-1_37","url":null,"abstract":"","PeriodicalId":89308,"journal":{"name":"WASA ... : International Conference on Wireless Algorithms, Systems, and Applications : proceedings. WASA","volume":"76 1","pages":"453-465"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72802720","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cooperative Offloading Based on Online Auction for Mobile Edge Computing 基于在线拍卖的移动边缘计算协同卸载
Xiao Zheng, S. B. H. Shah, L. Nawaf, O. Rana, Yuanyuan Zhu, Jianyuan Gan
{"title":"Cooperative Offloading Based on Online Auction for Mobile Edge Computing","authors":"Xiao Zheng, S. B. H. Shah, L. Nawaf, O. Rana, Yuanyuan Zhu, Jianyuan Gan","doi":"10.1007/978-3-031-19211-1_51","DOIUrl":"https://doi.org/10.1007/978-3-031-19211-1_51","url":null,"abstract":"","PeriodicalId":89308,"journal":{"name":"WASA ... : International Conference on Wireless Algorithms, Systems, and Applications : proceedings. WASA","volume":"55 1","pages":"617-628"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73781453","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Prototype System for Blockchain Performance Evaluation 区块链性能评估原型系统
Kaixiang Hou, Tianyi Xu, Chao Xu, Xiaoping Zhou, Tie Qiu, Fengbiao Zan
{"title":"A Prototype System for Blockchain Performance Evaluation","authors":"Kaixiang Hou, Tianyi Xu, Chao Xu, Xiaoping Zhou, Tie Qiu, Fengbiao Zan","doi":"10.1007/978-3-031-19208-1_8","DOIUrl":"https://doi.org/10.1007/978-3-031-19208-1_8","url":null,"abstract":"","PeriodicalId":89308,"journal":{"name":"WASA ... : International Conference on Wireless Algorithms, Systems, and Applications : proceedings. WASA","volume":"30 1","pages":"88-100"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73931251","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Incentive Offloading with Communication and Computation Capacity Concerns for Vehicle Edge Computing 考虑通信和计算能力的车辆边缘计算激励卸载
Chen Song, Ying Li, Jianbo Li, Chunxin Lin
{"title":"Incentive Offloading with Communication and Computation Capacity Concerns for Vehicle Edge Computing","authors":"Chen Song, Ying Li, Jianbo Li, Chunxin Lin","doi":"10.1007/978-3-031-19211-1_52","DOIUrl":"https://doi.org/10.1007/978-3-031-19211-1_52","url":null,"abstract":"","PeriodicalId":89308,"journal":{"name":"WASA ... : International Conference on Wireless Algorithms, Systems, and Applications : proceedings. WASA","volume":"115 1","pages":"629-637"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79251801","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Joint Optimization of Bandwidth Allocation and Gradient Quantization for Federated Edge Learning 面向联邦边缘学习的带宽分配和梯度量化联合优化
Hao Yan, Bin Tang, Baoliu Ye
{"title":"Joint Optimization of Bandwidth Allocation and Gradient Quantization for Federated Edge Learning","authors":"Hao Yan, Bin Tang, Baoliu Ye","doi":"10.1007/978-3-031-19211-1_37","DOIUrl":"https://doi.org/10.1007/978-3-031-19211-1_37","url":null,"abstract":"","PeriodicalId":89308,"journal":{"name":"WASA ... : International Conference on Wireless Algorithms, Systems, and Applications : proceedings. WASA","volume":"60 1","pages":"444-455"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84979161","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Graph Convolutional Networks (GCN)-Based Lightweight Detection Model for Dangerous Driving Behavior 基于图卷积网络(GCN)的危险驾驶行为轻量化检测模型
Xing Wei, Shang Yao, Chong Zhao, Di Hu, Hui Luo, Yang Lu
{"title":"Graph Convolutional Networks (GCN)-Based Lightweight Detection Model for Dangerous Driving Behavior","authors":"Xing Wei, Shang Yao, Chong Zhao, Di Hu, Hui Luo, Yang Lu","doi":"10.1007/978-3-031-19208-1_3","DOIUrl":"https://doi.org/10.1007/978-3-031-19208-1_3","url":null,"abstract":"","PeriodicalId":89308,"journal":{"name":"WASA ... : International Conference on Wireless Algorithms, Systems, and Applications : proceedings. WASA","volume":"38 1","pages":"27-39"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85092076","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Lattice-Based Revocable Identity-Based Proxy Re-encryption with Re-encryption Verifiability 具有可验证性的基于格子的可撤销身份代理重加密
Xiaolei Wang, Yang Wang, Mingqiang Wang
{"title":"Lattice-Based Revocable Identity-Based Proxy Re-encryption with Re-encryption Verifiability","authors":"Xiaolei Wang, Yang Wang, Mingqiang Wang","doi":"10.1007/978-3-031-19208-1_44","DOIUrl":"https://doi.org/10.1007/978-3-031-19208-1_44","url":null,"abstract":"","PeriodicalId":89308,"journal":{"name":"WASA ... : International Conference on Wireless Algorithms, Systems, and Applications : proceedings. WASA","volume":"53 1","pages":"535-544"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82280926","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Collusion-Tolerant Data Aggregation Method for Smart Grid 智能电网容合谋数据聚合方法
Liyuan Cao, Yingwen Chen, Kaiyu Cai, Dongsheng Wang, Yuchuan Luo, Guangtao Xue
{"title":"Collusion-Tolerant Data Aggregation Method for Smart Grid","authors":"Liyuan Cao, Yingwen Chen, Kaiyu Cai, Dongsheng Wang, Yuchuan Luo, Guangtao Xue","doi":"10.1007/978-3-031-19208-1_26","DOIUrl":"https://doi.org/10.1007/978-3-031-19208-1_26","url":null,"abstract":"","PeriodicalId":89308,"journal":{"name":"WASA ... : International Conference on Wireless Algorithms, Systems, and Applications : proceedings. WASA","volume":"46 3 1","pages":"314-325"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82600248","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
LogLR: A Log Anomaly Detection Method Based on Logical Reasoning LogLR:基于逻辑推理的日志异常检测方法
Kehan Zhang, Xiaoqiang Di, Xu Liu, Bolun Li, Luyue Fang, Yiping Qin, Jinhui Cao
{"title":"LogLR: A Log Anomaly Detection Method Based on Logical Reasoning","authors":"Kehan Zhang, Xiaoqiang Di, Xu Liu, Bolun Li, Luyue Fang, Yiping Qin, Jinhui Cao","doi":"10.1007/978-3-031-19214-2_41","DOIUrl":"https://doi.org/10.1007/978-3-031-19214-2_41","url":null,"abstract":"","PeriodicalId":89308,"journal":{"name":"WASA ... : International Conference on Wireless Algorithms, Systems, and Applications : proceedings. WASA","volume":"35 1","pages":"489-500"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82393676","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信