WASA ... : International Conference on Wireless Algorithms, Systems, and Applications : proceedings. WASA最新文献

筛选
英文 中文
Gradient-Based Adversarial Attacks Against Malware Detection by Instruction Replacement 基于指令替换的梯度对抗恶意软件检测
Jiapeng Zhao, Zhongjin Liu, Xiaoling Zhang, Jintao Huang, Zhiqiang Shi, Shichao Lv, Hong Li, Limin Sun
{"title":"Gradient-Based Adversarial Attacks Against Malware Detection by Instruction Replacement","authors":"Jiapeng Zhao, Zhongjin Liu, Xiaoling Zhang, Jintao Huang, Zhiqiang Shi, Shichao Lv, Hong Li, Limin Sun","doi":"10.1007/978-3-031-19208-1_50","DOIUrl":"https://doi.org/10.1007/978-3-031-19208-1_50","url":null,"abstract":"","PeriodicalId":89308,"journal":{"name":"WASA ... : International Conference on Wireless Algorithms, Systems, and Applications : proceedings. WASA","volume":"76 1","pages":"603-612"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80124283","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Deep Learning Approach Based on Continuous Wavelet Transform Towards Fall Detection 基于连续小波变换的深度学习跌倒检测方法
Yingwen Chen, Yuting Wei, Deming Pang, Guangtao Xue
{"title":"A Deep Learning Approach Based on Continuous Wavelet Transform Towards Fall Detection","authors":"Yingwen Chen, Yuting Wei, Deming Pang, Guangtao Xue","doi":"10.1007/978-3-031-19214-2_17","DOIUrl":"https://doi.org/10.1007/978-3-031-19214-2_17","url":null,"abstract":"","PeriodicalId":89308,"journal":{"name":"WASA ... : International Conference on Wireless Algorithms, Systems, and Applications : proceedings. WASA","volume":"123 1","pages":"206-217"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87173505","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Social-Network-Assisted Task Selection for Online Workers in Spatial Crowdsourcing: A Multi-Agent Multi-Armed Bandit Approach 空间众包中网络工作者的社会网络辅助任务选择:一个多智能体多武装强盗方法
Qi Sima, Yu-e Sun, He Huang, Guoju Gao, Yihuai Wang
{"title":"Social-Network-Assisted Task Selection for Online Workers in Spatial Crowdsourcing: A Multi-Agent Multi-Armed Bandit Approach","authors":"Qi Sima, Yu-e Sun, He Huang, Guoju Gao, Yihuai Wang","doi":"10.1007/978-3-031-19211-1_15","DOIUrl":"https://doi.org/10.1007/978-3-031-19211-1_15","url":null,"abstract":"","PeriodicalId":89308,"journal":{"name":"WASA ... : International Conference on Wireless Algorithms, Systems, and Applications : proceedings. WASA","volume":"15 1","pages":"178-190"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87180399","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Privacy-Aware Task Allocation Based on Deep Reinforcement Learning for Mobile Crowdsensing 基于深度强化学习的移动众测隐私感知任务分配
Mingchuan Yang, Jinghua Zhu, Heran Xi, Yue Yang
{"title":"Privacy-Aware Task Allocation Based on Deep Reinforcement Learning for Mobile Crowdsensing","authors":"Mingchuan Yang, Jinghua Zhu, Heran Xi, Yue Yang","doi":"10.1007/978-3-031-19211-1_16","DOIUrl":"https://doi.org/10.1007/978-3-031-19211-1_16","url":null,"abstract":"","PeriodicalId":89308,"journal":{"name":"WASA ... : International Conference on Wireless Algorithms, Systems, and Applications : proceedings. WASA","volume":"6 1","pages":"191-201"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90143175","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Practical Data Authentication Scheme for Unattended Wireless Sensor Networks Using Physically Unclonable Functions 一种实用的基于物理不可克隆功能的无人值守无线传感器网络数据认证方案
P. Wang, Lupeng Zhang, Jinhao Pan, Fengqi Li
{"title":"A Practical Data Authentication Scheme for Unattended Wireless Sensor Networks Using Physically Unclonable Functions","authors":"P. Wang, Lupeng Zhang, Jinhao Pan, Fengqi Li","doi":"10.1007/978-3-031-19208-1_48","DOIUrl":"https://doi.org/10.1007/978-3-031-19208-1_48","url":null,"abstract":"","PeriodicalId":89308,"journal":{"name":"WASA ... : International Conference on Wireless Algorithms, Systems, and Applications : proceedings. WASA","volume":"87 1","pages":"579-590"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90616800","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
R-TDBF: An Environmental Adaptive Method for RFID Redundant Data Filtering R-TDBF: RFID冗余数据滤波的环境自适应方法
Ziwen Cao, Degang Sun, Siye Wang, Yanfang Zhang, Yue Feng, Shang Jiang
{"title":"R-TDBF: An Environmental Adaptive Method for RFID Redundant Data Filtering","authors":"Ziwen Cao, Degang Sun, Siye Wang, Yanfang Zhang, Yue Feng, Shang Jiang","doi":"10.1007/978-3-031-19214-2_49","DOIUrl":"https://doi.org/10.1007/978-3-031-19214-2_49","url":null,"abstract":"","PeriodicalId":89308,"journal":{"name":"WASA ... : International Conference on Wireless Algorithms, Systems, and Applications : proceedings. WASA","volume":"43 1","pages":"582-594"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85769607","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
FSI: A FTM Calibration Method Using Wi-Fi Physical Layer Information FSI:利用Wi-Fi物理层信息的FTM校准方法
Yang Zhang, Bin Lu, W. Wang
{"title":"FSI: A FTM Calibration Method Using Wi-Fi Physical Layer Information","authors":"Yang Zhang, Bin Lu, W. Wang","doi":"10.1007/978-3-031-19214-2_30","DOIUrl":"https://doi.org/10.1007/978-3-031-19214-2_30","url":null,"abstract":"","PeriodicalId":89308,"journal":{"name":"WASA ... : International Conference on Wireless Algorithms, Systems, and Applications : proceedings. WASA","volume":"10 1","pages":"365-374"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91108536","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Proof-of-Weighted-Planned-Behavior Consensus for Efficient and Reliable Cyber-Physical Systems 高效可靠的网络物理系统的加权计划行为一致性证明
Fang Ouyang, Zheng Bao, Lixiao Zhou, Feilong Lin, Zhaolong Hu, Changbing Tang, Minglu Li
{"title":"A Proof-of-Weighted-Planned-Behavior Consensus for Efficient and Reliable Cyber-Physical Systems","authors":"Fang Ouyang, Zheng Bao, Lixiao Zhou, Feilong Lin, Zhaolong Hu, Changbing Tang, Minglu Li","doi":"10.1007/978-3-031-19208-1_10","DOIUrl":"https://doi.org/10.1007/978-3-031-19208-1_10","url":null,"abstract":"","PeriodicalId":89308,"journal":{"name":"WASA ... : International Conference on Wireless Algorithms, Systems, and Applications : proceedings. WASA","volume":"40 1","pages":"113-125"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86458116","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Efficient Privacy-Preserving Scheme for Traffic Monitoring Services in Vehicular Networks 一种高效的车载网络交通监控服务隐私保护方案
Chen Gu, X. Cui, Donghui Hu
{"title":"An Efficient Privacy-Preserving Scheme for Traffic Monitoring Services in Vehicular Networks","authors":"Chen Gu, X. Cui, Donghui Hu","doi":"10.1007/978-3-031-19208-1_1","DOIUrl":"https://doi.org/10.1007/978-3-031-19208-1_1","url":null,"abstract":"","PeriodicalId":89308,"journal":{"name":"WASA ... : International Conference on Wireless Algorithms, Systems, and Applications : proceedings. WASA","volume":"17 1","pages":"3-14"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77197285","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
TSV-MAC: Time Slot Variable MAC Protocol Based on Deep Reinforcement Learning for UASNs TSV-MAC:基于深度强化学习的时隙可变MAC协议
Yuchen Wu, Yao Liu, Zhao Zhao, Chunfeng Liu, W. Qu
{"title":"TSV-MAC: Time Slot Variable MAC Protocol Based on Deep Reinforcement Learning for UASNs","authors":"Yuchen Wu, Yao Liu, Zhao Zhao, Chunfeng Liu, W. Qu","doi":"10.1007/978-3-031-19211-1_19","DOIUrl":"https://doi.org/10.1007/978-3-031-19211-1_19","url":null,"abstract":"","PeriodicalId":89308,"journal":{"name":"WASA ... : International Conference on Wireless Algorithms, Systems, and Applications : proceedings. WASA","volume":"1 1","pages":"225-237"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89266750","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信