Vai al contenuto principale della pagina

Wireless algorithms, systems, and applications : 17th International Conference, WASA 2022, Dalian, China, November 24-26, 2022, proceedings, part I / / edited by Lei Wang, [and three others]



(Visualizza in formato marc)    (Visualizza in BIBFRAME)

Titolo: Wireless algorithms, systems, and applications : 17th International Conference, WASA 2022, Dalian, China, November 24-26, 2022, proceedings, part I / / edited by Lei Wang, [and three others] Visualizza cluster
Pubblicazione: Cham, Switzerland : , : Springer, , [2022]
©2022
Descrizione fisica: 1 online resource (687 pages)
Disciplina: 002
Soggetto topico: Wireless communication systems
Persona (resp. second.): WangLei
Nota di bibliografia: Includes bibliographical references and index.
Nota di contenuto: Intro -- Preface -- Organization -- Contents - Part I -- Contents - Part II -- Contents - Part III -- Cyber-Physical Systems Including Intelligent Transportation Systems and Smart Healthcare Systems -- An Efficient Privacy-Preserving Scheme for Traffic Monitoring Services in Vehicular Networks -- 1 Introduction -- 2 Background -- 2.1 Definitions -- 2.2 Models -- 3 Our Proposed Scheme -- 3.1 Overview -- 3.2 Location Privacy-Preserving Mechanism -- 3.3 Identity Privacy-Preserving Mechanism -- 4 Performance Evaluation -- 4.1 Results of Privacy-Preserving Mechanisms -- 4.2 Results of Costs -- 5 Conclusion -- References -- Skin Lesion Segmentation via Intensive Atrous Spatial Transformer -- 1 Introduction -- 2 Related Works -- 2.1 Hand-Crafted Feature Based Methods -- 2.2 Deep Learning Based Methods -- 3 The Proposed Method -- 3.1 Overall Framework -- 3.2 IASPP Module -- 3.3 Loss Function -- 4 Experiments -- 4.1 Experiment Settings -- 4.2 Experimental Results -- 4.3 Analysis -- 4.4 Conclusion -- References -- Graph Convolutional Networks (GCN)-Based Lightweight Detection Model for Dangerous Driving Behavior -- 1 Introduction -- 2 Related Work -- 2.1 Skeleton-Based Action Recognition -- 2.2 SVD Compress -- 3 Methodology -- 3.1 Graph Construction -- 3.2 Local Information Capture Module Based on GCN -- 3.3 Scene Fusion Based on Lightweight Object Detection -- 3.4 SVD-Based Compression -- 4 Experiments -- 4.1 Dataset and Parameter Settings -- 4.2 Comparison with the State-of-the-Art -- 5 Ablation Study -- 5.1 Significance of Local Information -- 5.2 Effectiveness of Model Compression -- 5.3 Visualization -- 6 Conclusion -- References -- Increasing the Accuracy of Secure Model for Medical Data Sharing in the Internet of Things -- 1 Introduction -- 2 Related Work -- 3 System Model -- 4 VIM and SFA Algorithm.
4.1 Validation Incentive Mechanism Based on Model Quality -- 4.2 SFA Algorithm -- 5 Security Analysis and Performance Evaluation -- 5.1 Security Analysis -- 5.2 Performance Evaluation -- 6 Conclusions -- References -- A Smart Contract-Based Intelligent Traffic Adaptive Signal Control Scheme -- 1 Introduction -- 2 Related Work -- 2.1 Edge Computing -- 2.2 Consortium Blockchain -- 2.3 Signal Timing Optimization -- 3 Intelligent Traffic Signal Control Solution -- 3.1 Problem Description -- 3.2 System Design -- 3.3 System Model -- 3.4 Scheme Flow -- 4 Security Analysis and Experimental Results -- 4.1 Security Analysis -- 4.2 Experimental Results -- 5 Conclusion -- References -- Inferring Device Interactions for Attack Path Discovery in Smart Home IoT -- 1 Introduction -- 2 Background: Smart Home IoT -- 3 Motivation and Threat Model -- 3.1 Motivation Examples -- 3.2 Threat Model -- 4 Design -- 4.1 App-enabled Interaction Identification -- 4.2 Physical Interaction Identification -- 4.3 Attack Path Discovery -- 5 Experiments and Results -- 5.1 Experimental Setup -- 5.2 Results -- 6 Discussion -- 7 Conclusion -- References -- A Local Rotation Transformation Model for Vehicle Re-Identification -- 1 Introduction -- 2 Related Work -- 2.1 Vehicle Re-Identification -- 2.2 Data Augmentation -- 3 Methodology -- 3.1 Overall Framework -- 3.2 Local Rotation Transformation -- 3.3 Target Selection Module -- 4 Experiment and Discussion -- 4.1 Datasets -- 4.2 Implementation -- 4.3 Ablation Study -- 4.4 Comparison with the State-of-the-Art -- 5 Conclusion -- References -- A Prototype System for Blockchain Performance Evaluation -- 1 Introduction -- 2 Related Work -- 3 The Scheme of Building Prototype System -- 3.1 The Scheme of Real Deployment Test -- 3.2 The Scheme of Real Simulation Test -- 4 Experiment -- 4.1 The Architecture of Prototype System.
4.2 The Experiments of Real Deployment Test -- 4.3 The Experiments of Simulation Test -- 5 Conclusion -- References -- A Spatial-Temporal Convolutional Model with Improved Graph Representation -- 1 Introduction -- 2 Related Work -- 2.1 Data Presented with Graph -- 2.2 Spatial-Temporal Data Forecasting -- 3 Data Design -- 3.1 Unstructured Graph Data -- 4 Model Design -- 4.1 Spatial Convolutional Layer -- 4.2 Temporal Convolutional Layer -- 5 Experiments -- 5.1 Dataset -- 5.2 Settings -- 5.3 Quantitative Analysis -- 5.4 Qualitative Analysis -- 6 Conclusions -- References -- A Proof-of-Weighted-Planned-Behavior Consensus for Efficient and Reliable Cyber-Physical Systems -- 1 Introduction -- 2 Architecture of Blockchain-Enabled CPS -- 2.1 Real Space Layer -- 2.2 Cyber Space Layer -- 2.3 Blockchain Layer -- 3 PoWPB -- 3.1 TPB -- 3.2 Design of PoWPB -- 3.3 Optimal Credit Threshold and Authorized Candidate Algorithm Design -- 4 Numerical Tests -- 5 Conclusions -- A Appendix -- A.1 Proof of Theorem 1 -- References -- E2M: Evolving Mobility Modeling in Metropolitan-Scale Electric Taxi Systems -- 1 Introduction -- 2 Overview -- 2.1 ET Contextualization -- 2.2 Framework Overview -- 3 Data Preprocessing -- 3.1 Mobility Event Extraction -- 3.2 Hotspot Detection -- 4 Mobility Modeling -- 4.1 Transition Pattern Modeling -- 4.2 Charging Pattern Modeling -- 4.3 Resting Pattern Modeling -- 5 Trajectory Generation -- 5.1 Deterministic Finite Automaton Algorithm -- 5.2 Fleet Generation Algorithm -- 6 Evaluation -- 6.1 Dataset and Experimental Settings -- 6.2 Transition Pattern Modeling Evaluation -- 6.3 Charging Behavior Prediction -- 6.4 Generation Evaluation -- 7 Conclusion -- References -- Multi-task Class Feature Space Fusion Domain Adaptation Network for Thyroid Ultrasound Images: Research on Generalization of Smart Healthcare Systems -- 1 Introduction.
2 Related Work -- 2.1 Adversarial Domain Adaptation -- 2.2 Medical Applications Based on Deep Learning -- 3 Method -- 3.1 Multi-task Domain Adaptation Framework -- 3.2 Class Feature Space Fusion -- 4 Experimental Results and Analysis -- 4.1 Dataset -- 4.2 Experiment Setup and Evaluation Value -- 4.3 Experiment Results -- 5 Conclusion -- References -- A Caching Strategy Based on Spreading Influence in Information-Centric Satellite Networks -- 1 Introduction -- 2 Related Work -- 3 The Time-Varying Model of Satellite Networks -- 4 The CSSI Cache Model -- 4.1 Cache Strategy Based on Spreading Influence -- 4.2 The CSSI Routing and Forwarding Strategy -- 5 Simulation Experiments -- 5.1 Parameter Settings -- 5.2 Evaluation Indicators -- 5.3 Experimental Results -- 6 Summary -- References -- Posture and Appearance Fusion Network for Driver Distraction Recognition -- 1 Introduction -- 2 Related Work -- 2.1 Graph Neural Network -- 2.2 Driver Behavior Recognition -- 3 Proposed Method -- 3.1 Patch Extraction Module -- 3.2 MFD-former Encoder -- 4 Experiments -- 4.1 Datasets Settings -- 4.2 Implementation Details -- 4.3 Comparison Results -- 5 Conclusion -- References -- A Behavior Decision Method for Autonomous Vehicles in an Urban Scene -- 1 Introduction -- 2 Trajectory and Behavior Prediction Method -- 2.1 Surrounding Vehicle Collection Extraction -- 2.2 Behavior and Trajectory Prediction of Adjacent Vehicles -- 3 Autonomous Vehicle Behavior Decision Model -- 3.1 Formal Specification -- 3.2 Autonomous Driving Behavior Decision -- 3.3 Multi-objective Evolutionary Algorithm for DMAV -- 4 Experiments and Evaluation -- 4.1 Experiment Results -- 4.2 Simulation Results of Behavior Decision Model -- 5 Conclusion -- References -- TimeBird: Context-Aware Graph Convolution Network for Traffic Incident Duration Prediction -- 1 Introduction -- 2 Related Work.
2.1 Spatio-temporal Forecasting -- 2.2 Traffic Incident Duration -- 3 Problem Definition -- 4 Model Architecture -- 4.1 Spatial Correlations -- 4.2 External Attributes -- 4.3 Temporal Correlations -- 4.4 Context-Aware Attention Mechanism -- 4.5 Model Training -- 5 Experiments -- 5.1 Implementation -- 5.2 Comparison with Baseline Methods -- 6 Conclusion -- References -- The Link Awareness Driven Resource Allocation Algorithm Based on Scenario Marking and Vehicle Clustering in VANETs -- 1 Introduction -- 2 System Model -- 3 Channel Resource Allocation Mechanism -- 3.1 Scenario Marking Based on the Density of Vehicles -- 3.2 V2V Links Clustering -- 3.3 Channel Allocation -- 4 Distributed Power Control Scheme -- 4.1 Power Control Based on the Interior Point Method -- 4.2 Complexity Analysis -- 5 Experiment -- 6 Conclusion -- References -- Socially Acceptable Trajectory Prediction for Scene Pedestrian Gathering Area -- 1 Introduction -- 2 Related Work -- 2.1 Gathering Area -- 2.2 Generative Modeling -- 3 Method -- 3.1 Problem Definition -- 3.2 GA-GAN -- 4 Experiment -- 4.1 Dataset and Implementation Details -- 4.2 Quantitative Analysis -- 4.3 Qualitative Analysis -- 5 Conclusion -- References -- Wi-KF: A Rehabilitation Motion Recognition in Commercial Wireless Devices -- 1 Introduction -- 2 Relates Work -- 2.1 Non-Wi-Fi Based Motion Recognition -- 2.2 Wi-Fi Based Motion Recognition -- 3 Related Theories -- 3.1 Channel State Information -- 3.2 Doppler Frequency Shifts -- 4 Systems Design -- 4.1 System Overview -- 4.2 Data Acquisition and Processing -- 4.3 BoCF Feature Extraction -- 4.4 ELM Classification Algorithm -- 5 Set-Up of the Experimental and Analysis of the Experimental -- 5.1 Experimental Setup -- 5.2 Experimental Analysis -- 6 Results -- References -- Security and Privacy -- An Effective Insider Threat Detection Apporoach Based on BPNN.
1 Introduction.
Titolo autorizzato: Wireless Algorithms, Systems, and Applications  Visualizza cluster
ISBN: 3-031-19208-7
Formato: Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione: Inglese
Record Nr.: 996500063703316
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Serie: Lecture Notes in Computer Science