default search action
16th SECON 2019: Boston, MA, USA
- 16th Annual IEEE International Conference on Sensing, Communication, and Networking, SECON 2019, Boston, MA, USA, June 10-13, 2019. IEEE 2019, ISBN 978-1-7281-1207-7
- Mohammad Mohammadinodoushan, Bertrand Cambou, Christopher Robert Philabaum, David Hély, Duane Booher:
Implementation of Password Management System Using Ternary Addressable PUF Generator. 1-8 - Zhenxian Hu, Guangtao Xue, Yi-Chao Chen, Minglu Li:
NB-IoT Network Monitoring and Diagnosing. 1-9 - Kehan Li, Zebo Liu, Shibo He, Jiming Chen:
TF2AN: A Temporal-Frequency Fusion Attention Network for Spectrum Energy Level Prediction. 1-9 - Ram Ramanathan, Christophe Servaes, Warren Ramanathan, Ayush Dusia, Adarshpal S. Sethi:
Long-Range Short-Burst Mobile Mesh Networking: Architecture and Evaluation. 1-2 - Songzhou Yang, Yuan He, Xiaolong Zheng:
FoVR: Attention-based VR Streaming through Bandwidth-limited Wireless Networks. 1-9 - Ali Mohamed AbdelAziz, Amin A. Shoukry, Walid Gomaa, Moustafa Youssef:
Trans-Sense: Real Time Transportation Schedule Estimation Using Smart Phones. 1-8 - Christian Callegari, Elena Bucchianeri, Stefano Giordano, Michele Pagano:
Real Time Attack Detection with Deep Learning. 1-5 - Sriramya Bhamidipati, Kyeong Jin Kim, Hongbo Sun, Philip V. Orlik:
Wide-Area GPS Time Monitoring Against Spoofing Using Belief Propagation. 1-8 - Kurian Polachan, Prabhakar T. Venkata, Chandramani Singh, Deepak Panchapakesan:
Quality of Control Assessment for Tactile Cyber-Physical Systems. 1-9 - Chi Lin, Feng Gao, Haipeng Dai, Lei Wang, Guowei Wu:
When Wireless Charging Meets Fresnel Zones: Even Obstacles Can Enhance Charging Efficiency. 1-9 - Jialin Zhang, Wei Liang, Bo Yang, Meng Zheng, Huaguang Shi, Seung Ho Hong:
Nearly-Optimal Resource Allocation for Coexisting Industrial Wireless Networks with Line Topologies. 1-9 - Hisham Abuella, Sabit Ekin:
A New Paradigm for Non-contact Vitals Monitoring using Visible Light Sensing. 1-2 - Yuchen Zhu, Bo Yang, Min Liu, Zhongcheng Li:
Pharos: A Rapid Neighbor Discovery Algorithm for Power-Restricted Wireless Sensor Networks. 1-9 - Tianchong Gao, Feng Li:
Privacy-Preserving Sketching for Online Social Network Data Publication. 1-9 - Alaa Awad Abdellatif, Lutfi Samara, Amr Mohamed, Abdulla K. Al-Ali, Aiman Erbad, Mohsen Guizani:
Compress or Interfere? 1-6 - Yandao Huang, Wenqiang Chen, Hongjie Chen, Lu Wang, Kaishun Wu:
G-Fall: Device-free and Training-free Fall Detection with Geophones. 1-9 - Hansi Liu, Pengfei Ren, Shubham Jain, Mohannad Murad, Marco Gruteser, Fan Bai:
FusionEye: Perception Sharing for Connected Vehicles and its Bandwidth-Accuracy Trade-offs. 1-9 - Ravishankar Chamarajnagar, Ashwin Ashok:
Integrity Threat Identification for Distributed IoT in Precision Agriculture. 1-9 - Weiguo Wang, Xiaolong Zheng, Yuan He, Xiuzhen Guo:
AdaComm: Tracing Channel Dynamics for Reliable Cross-Technology Communication. 1-9 - Madhan E. S., Uttam Ghosh, Deepak K. Tosh, Mandal K., E. Murali, Soumalya Ghosh:
An Improved Communications in Cyber Physical System Architecture, Protocols and Applications. 1-6 - Nima Seyedtalebi:
Algorithms for Provisioning Edge Computing Resources to Minimize Data Transport Costs. 1-9 - Jing Hou, Li Sun, Tao Shu, Yong Xiao, Marwan Krunz:
Strategic Network Infrastructure Sharing through Backup Reservation in a Competitive Environment. 1-9 - Ebram Kamal William, Mun Choon Chan:
InDP: In-Network Data Processing for Wireless Sensor Networks. 1-9 - Yang Chen, Jie Wu:
Network Function Deployment with Balanced Server and Link Resources in Tree Topologies. 1-9 - Shigeng Zhang, Chengwei Yang, Xiaoyan Kui, Jianxin Wang, Xuan Liu, Song Guo:
ReActor: Real-time and Accurate Contactless Gesture Recognition with RFID. 1-9 - Tuyen X. Tran, Kevin Chan, Dario Pompili:
COSTA: Cost-aware Service Caching and Task Offloading Assignment in Mobile-Edge Computing. 1-9 - Adnan Shahid, Jaron Fontaine, Miguel Camelo, Jetmir Haxhibeqiri, Martijn Saelens, Zaheer Khan, Ingrid Moerman, Eli De Poorter:
A Convolutional Neural Network Approach for Classification of LPWAN Technologies: Sigfox, LoRA and IEEE 802.15.4g. 1-8 - Ahmad A. Aziz El-Banna, Ahmed Bayoumy Zaki, Basem M. ElHalawany, Joshua Zhexue Huang, Kaishun Wu:
Machine Learning Based Dynamic Cooperative Transmission Framework for IoUT Networks. 1-9 - Hua Xue, Jiadi Yu, Yanmin Zhu, Li Lu, Shiyou Qian, Minglu Li:
WiZoom: Accurate Multipath Profiling using Commodity WiFi Devices with Limited Bandwidth. 1-9 - Xiangyu Zhang, Xiaowen Gong:
Online Data Quality Learning for Quality-Aware Crowdsensing. 1-9 - Chao Yang, Xuyu Wang, Shiwen Mao:
SparseTag: High-Precision Backscatter Indoor Localization with Sparse RFID Tag Arrays. 1-9 - Weijun Wang, Haipeng Dai, Chao Dong, Fu Xiao, Xiao Cheng, Guihai Chen:
VISIT: Placement of Unmanned Aerial Vehicles for Anisotropic Monitoring Tasks. 1-9 - Nian Wang, Zhe Zhang, Jing Xiao, Li Cui:
DeepLap: A Deep Learning based Non-Specific Low Back Pain Symptomatic Muscles Recognition System. 1-9 - Anil Acharya, Yantian Hou, Ying Mao, Min Xian, Jiawei Yuan:
Workload-Aware Task Placement in Edge-Assisted Human Re-identification. 1-9 - Mohsen Joneidi, Hassan Yazdani, Azadeh Vosoughi, Nazanin Rahnavard:
Source Localization and Tracking for Dynamic Radio Cartography using Directional Antennas. 1-9 - Theodore Stone, Nathaniel Stone, Puneet Jain, Yurong Jiang, Kyu-Han Kim, Srihari Nelakuditi:
Towards Scalable Video Analytics at the Edge. 1-9 - Rainer Hofmann, Carlo Alberto Boano, Kay Römer:
X-Burst: Enabling Multi-Platform Cross-Technology Communication between Constrained IoT Devices. 1-9 - Wenxiong Hua, Xiang Cui, Hao Zhou, Panlong Yang, Xiang-Yang Li:
Parallel Feedback Communications for Magnetic MIMO Wireless Power Transfer System. 1-9 - Run Zhao, Dong Wang, Qian Zhang, Haonan Chen, Huatao Xu:
PEC: Synthetic Aperture RFID Localization with Aperture Position Error Compensation. 1-9 - Boyuan Sun, Qiang Ma, Zhichao Cao, Yunhao Liu:
iTracker: Towards Sustained Self-Tracking in Dynamic Feature Environment with Smartphones. 1-9 - Ashwija Reddy Korenda, Fatemeh Afghah, Bertrand Cambou, Christopher Robert Philabaum:
A Proof of Concept SRAM-based Physically Unclonable Function (PUF) Key Generation Mechanism for IoT Devices. 1-8 - Yuxi Zhao, Xiaowen Gong:
Truthful Quality-Aware Data Crowdsensing for Machine Learning. 1-9 - Ming Feng, Hao Xu:
MSNET-Blockchain: A New Framework for Securing Mobile Satellite Communication Network. 1-9 - Xinyu Tong, Hao Li, Xiaohua Tian, Xinbing Wang:
Triangular Antenna Layout Facilitates Deployability of CSI Indoor Localization Systems. 1-9 - Youjing Lu, Fan Wu, Shaojie Tang, Linghe Kong, Guihai Chen:
Pushing the Limit of CSI-based Activity Recognition: An Enhanced Approach via Packet Reconstruction. 1-9 - Matthew Rantanen, Nicholas Mastronarde, Jeffrey Hudack, Karthik Dantu:
Decentralized Task Allocation in Lossy Networks: A Simulation Study. 1-9 - Yinan Zhu:
Service Station Positioning for Mobile Charger in Wireless Rechargeable Sensor Networks. 1-2 - Kapil R. Dandekar, Simon Begashaw, Marko Jacovic, Alex Lackpour, Ilhaan Rasheed, Xaime Rivas Rey, Cem Sahin, Sharif Shaher, Geoffrey Mainland:
Grid Software Defined Radio Network Testbed for Hybrid Measurement and Emulation. 1-9 - Maqsood Ahamed Abdul Careem, Jorge Gomez, Dola Saha, Aveek Dutta:
HiPER-V: A High Precision Radio Frequency Vehicle for Aerial Measurements. 1-6 - Mehdi Rahmati, Vidyasagar Sadhu, Dario Pompili:
ECO-UW IoT: Eco-friendly Reliable and Persistent Data Transmission in Underwater Internet of Things. 1-9 - Preti Kumari, Hari Prabhat Gupta, Tanima Dutta:
An Adaptive Power level Allocation Model in LoRa for Internet of Things. 1-2 - Saandeep Depatla, Yasamin Mostofi:
Occupancy Analytics in Retail Stores Using Wireless Signals. 1-9 - Alireza Shamsoshoara, Mehrdad Khaledi, Fatemeh Afghah, Abolfazl Razi, Jonathan D. Ashdown, Kurt A. Turck:
A Solution for Dynamic Spectrum Management in Mission-Critical UAV Networks. 1-6 - Chi Lin, Chunyang Guo, Wan Du, Jing Deng, Lei Wang, Guowei Wu:
Maximizing Energy Efficiency of Period-Area Coverage with UAVs for Wireless Rechargeable Sensor Networks. 1-9 - William Xia, Michele Polese, Marco Mezzavilla, Giuseppe Loianno, Sundeep Rangan, Michele Zorzi:
Millimeter Wave Remote UAV Control and Communications for Public Safety Scenarios. 1-7 - Mohammed Hirzallah, Yong Xiao, Marwan Krunz:
MatchMaker: An Inter-operator Network Sharing Framework in Unlicensed Bands. 1-9 - Adeel A. Malik, Deepak K. Tosh, Uttam Ghosh:
Non-Intrusive Deployment of Blockchain in Establishing Cyber-Infrastructure for Smart City. 1-6 - Yong Xiao, Marwan Krunz, Haris Volos, Takashi Bando:
Driving in the Fog: Latency Measurement, Modeling, and Optimization of LTE-based Fog Computing for Smart Vehicles. 1-9 - Thembelihle Dlamini, Ángel Fernández Gambín:
Adaptive Resource Management for a Virtualized Computing Platform within Edge Computing. 1-9 - Ding Li, Wenzhong Li, Xiaoliang Wang, Cam-Tu Nguyen, Sanglu Lu:
ActiveTracker: Uncovering the Trajectory of App Activities over Encrypted Internet Traffic Streams. 1-9 - Davide Vecchia, Pablo Corbalán, Timofei Istomin, Gian Pietro Picco:
Playing with Fire: Exploring Concurrent Transmissions in Ultra-wideband Radios. 1-9 - Nicola Roberto Zema, Dominique Quadri, Steven Martin, Omar Shrit:
Formation control of a mono-operated UAV fleet through ad-hoc communications: a Q-learning approach. 1-6 - Ravishankar Chamarajnagar, Ashwin Ashok:
Privacy Invasion through Smarthome IoT Sensing. 1-9 - Zhiwei Zhao, Geyong Min, Yaoyao Pang, Weifeng Gao, Jiamei Lv:
Towards Fast and Reliable WiFi Authentication by Utilizing Visible Light Diversity. 1-9 - Vidyasagar Sadhu, Mehdi Rahmati, Dario Pompili:
MOSFET-based Ultra-low-power Realization of Analog Joint Source-Channel Coding for IoTs. 1-3 - Chang Shu, Zhiwei Zhao, Yunpeng Han, Geyong Min:
Dependency-Aware and Latency-Optimal Computation Offloading for Multi-User Edge Computing Networks. 1-9 - Yufeng Deng, Dong Wang, Qian Zhang, Run Zhao:
MType: A Magnetic Field-based Typing System on the Hand for Around-Device Interaction. 1-9 - Vidushi Vashishth, Anshuman Chhabra, Deepak Kumar Sharma:
A Machine Learning Approach Using Classifier Cascades for Optimal Routing in Opportunistic Internet of Things Networks. 1-9 - Yalin E. Sagduyu, Yi Shi, Tugba Erpek:
IoT Network Security from the Perspective of Adversarial Deep Learning. 1-9 - Haipeng Dai, Wei Wang, Alex X. Liu, Kang Ling, Jiajun Sun:
Speech Based Human Authentication on Smartphones. 1-9 - Ashish Gupta, Hari Prabhat Gupta, Tanima Dutta:
Early Classification Approach for Multivariate Time Series using Sensors of Different Sampling Rate. 1-2 - He-Yen Hsieh, Jenq-Shiou Leu, Sheng-An Huang:
Implementing a Real-Time Image Captioning Service for Scene Identification Using Embedded System. 1-2 - Jimin Son, Sungwoo Jo, Sun-Kyu Jung, Hyun-Tak Kim:
Ultralow Power Wireless-Fire-Alarm-System using a VO2-Based Metal-Insulator-Transition Device. 1-2 - Xiyuan Zhu, Wurong Shih, Yahong Rosa Zheng:
Underwater Datalogger for Accurate Position and Location Estmation and Tracking. 1-2 - Preti Kumari, Hari Prabhat Gupta, Tanima Dutta:
A Stackelberg Game based River Water Pollution Monitoring System using LoRa Technology. 1-5 - Ananya Mahanti, Wei-Han Chen, Prasun Sinha:
DuoRelay: Parallel Interference Nulling using Full-duplex Relaying. 1-9 - Xiaofei Zhang, Chong Han, Xudong Wang:
Joint Beamforming-Power-Bandwidth Allocation in Terahertz NOMA Networks. 1-9 - Jiacheng Shang, Jie Wu:
Enabling Secure Voice Input on Augmented Reality Headsets using Internal Body Voice. 1-9 - Hoang Duy Trinh, Lorenza Giupponi, Paolo Dini:
Urban Anomaly Detection by processing Mobile Traffic Traces with LSTM Neural Networks. 1-8 - Chulyoung Kwak, Seongwon Kim, Soonwon Ka, Jihwan Lee, Sunghyun Choi:
No Entry: Anti-Noise Energy Detector for Chirp-Based Acoustic Communication. 1-9 - Masoud Zarifneshat, Li Xiao, Jiliang Tang:
Learning-based Blockage Prediction for Robust Links in Dynamic Millimeter Wave Networks. 1-9 - Lei Zhang, Zhirui Wang, Liu Yang:
Commercial Wi-Fi Based Fall Detection with Environment Influence Mitigation. 1-9 - Maoning Guan, Wenqiang Chen, Yandao Huang, Rukhsana Ruby, Kaishun Wu:
FaceInput: A Hand-Free and Secure Text Entry System through Facial Vibration. 1-9
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.