Wireless algorithms, systems, and applications 17th International Conference, WASA 2022, Dalian, China, November 24-26, 2022, proceedings Part 1

Gespeichert in:
Bibliographische Detailangaben
Körperschaft: WASA (VerfasserIn)
Weitere Verfasser: Wang, Lei (HerausgeberIn), Segal, Michael (HerausgeberIn), Chen, Jenhui (HerausgeberIn), Qiu, Tie (HerausgeberIn)
Format: UnknownFormat
Sprache:eng
Veröffentlicht: Cham Springer 2022
Schriftenreihe:Lecture notes in computer science 13471
Schlagworte:
Online Zugang:Cover
Inhaltsverzeichnis
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Titel Jahr Verfasser
Gradient-Based Adversarial Attacks Against Malware Detection by Instruction Replacement 2022 Zhao, Jiapeng
A Trust Secure Data Aggregation Model with Multiple Attributes for WSNs 2022 Li, Zhaowei
A Novel Self-supervised Few-shot Network Intrusion Detection Method 2022 Zhang, Jing
Reinforcement Learning Based Vulnerability Analysis for Smart Grids Against False Data Injection Attacks 2022 Xu, Shiyu
An Efficient Soft Analytical Side-Channel Attack on Ascon 2022 Luo, Sinian
Phishing Frauds Detection Based on Graph Neural Network on Ethereum 2022 Duan, Xincheng
Wi-KF: A Rehabilitation Motion Recognition in Commercial Wireless Devices 2022 Dang, Xiaochao
A Caching Strategy Based on Spreading Influence in Information-Centric Satellite Networks 2022 Wang, Haowei
E2M: Evolving Mobility Modeling in Metropolitan-Scale Electric Taxi Systems 2022 Wang, Yizong
A Spatial-Temporal Convolutional Model with Improved Graph Representation 2022 Lv, Yang
A Proof-of-Weighted-Planned-Behavior Consensus for Efficient and Reliable Cyber-Physical Systems 2022 Ouyang, Fang
Inferring Device Interactions for Attack Path Discovery in Smart Home IoT 2022 Sun, Mengjie
A Smart Contract-Based Intelligent Traffic Adaptive Signal Control Scheme 2022 Wang, Wenyue
Optimal Deployment and Scheduling of a Mobile Charging Station in the Internet of Electric Vehicles 2022 Ma, Zhenxian
On Eliminating Blocking Interference of RFID Unauthorized Reader Detection 2022 Sun, Degang
Malicious Domain Detection with Heterogeneous Graph Propagation Network 2022 Hu, Cheng
Privacy Preserving Federated Learning Using CKKS Homomorphic Encryption 2022 Qiu, Fengyuan
Secure RFID Handwriting Recognition-Attacker Can Hear but Cannot Understand 2022 Zhang, Qihang
Network Defense Resource Allocation Scheme with Multi-armed Bandits 2022 Huang, Ning
BERT-Based Vulnerability Type Identification with Effective Program Representation 2022 Zhu, Chenguang
Alle Artikel auflisten