Wireless Artificial Intelligent Computing Systems and Applications -

Wireless Artificial Intelligent Computing Systems and Applications

18th International Conference, WASA 2024, Qindao, China, June 21–23, 2024, Proceedings, Part II
Buch | Softcover
XIV, 546 Seiten
2024
Springer International Publishing (Verlag)
978-3-031-71466-5 (ISBN)
87,73 inkl. MwSt

The three-volume proceedings set LNCS 14997-14999 constitutes the refereed proceedings of the 18th International Conference on Wireless Algorithms, Systems, and Applications, WASA 2024, held in Qindao, China, during June 21-23, 2024.

The 98 full papers and 10 short papers included in these proceedings were carefully reviewed and selected from 301 submissions. They focus on cutting-edge ideas, research findings, and innovative solutions in the dynamic intersection of wireless technologies and artificial intelligence (AI) computing systems.

.- FedMQ: Multi-grained Quantization for Heterogeneous Federated Learning.
.- A Secure and Efficient Privacy Data Aggregation Mechanism.
.- A Lightweight Method to Survey with Protecting Privacy yet Maintaining Accuracy.
.- A Method for Abnormal Detection and Poisoned Data Recovery in Clustered Federated Learning.
.- FedDAGC: Dynamic Adaptive Graph Coarsening for Federated Learning on Non-IID Graphs.
.- Defending Against Poisoning Attacks in Federated Prototype Learning on Non-IID Data.
.- Federated Learning for Edge Heterogeneous Object Detection Algorithm.
.- CoR-FHD: Communication-Efficient and Robust Federated Hyperdimensional Computing for Activity Recognition.
.- Dynamic Staleness Control for Asynchronous Federated Learning in Decentralized Topology.
.- Fair and Communication-Efficient Personalized Federated Learning.
.- Distributed & Personalized Federated Learning in Wireless Ad Hoc Networks.
.- DS-TFP: A Distributed and Secure Traffic Flow Prediction Framework Based on Federated Graph Learning.
.- Federated Dynamic Graph Fusion Framework for Remaining Useful Life Prediction.
.- FEAttack: A Fast and Efficient Hard-Label Textual Attack Framework.
.- Pleno-Sense: An Adaptive Switching Algorithm towards Robust Respiration Monitoring Across Diverse Motion Scenarios.
.- Inter-Technology Backscatter Communication: A Bidirectional Zigbee-BLE System.
.- Distributed Dynamic Virtual Network Embedding in Container Networks.
.- Automatic Modulation Recognition Using Parallel Feature Extraction Architecture.
.- A Message Routing Algorithm Based on the Importance of Node Social Relationships in Opportunistic Mobile Networks.
.- Real-time Atmospheric Duct Height Prediction Framework Based on Spatio-temporal to Ensure Maritime Communication Security.
.- An Extra Diagnosis Algorithm for Conditional Recursive Match Networks under the PMC Model.
.- Personalized mmWave Signal Synthesis for Human Sensing.
.- Remorabook: Privacy-Preserving Mobile Social Networking Based on Remora Computing.
.- DSBA: Dynamic Sharded Blockchain Architecture for Industrial Emergency Data Sharing.
.- A Novel Merging Framework for Homogeneous and Heterogeneous Blockchain Systems.
.- Active Defense Simulation Evaluation of Industrial Control Systems Based on Attack-Defense Graph.
.- Hybrid Heterogeneous Wireless Chargers Placement.
.- An Efficient Fault-tolerant Communication Scheme in 3-ary n-cube Networks.
.- 3D Physical Layer Secure Transmission for UAV-assisted Mobile Communications without Locations of Eavesdroppers.
.- Adaptive Self-healing Routing for Heterogeneous Ambient Backscatter Wireless Sensor Networks.
.- Joint Optimization of Maximum Achievable Rate in SWIPT Systems Assisted by Active STAR-RIS.
.- Anonymity on Byzantine-Resilient Decentralized Computing.
.- A DRL-Based Edge Intelligent Servo Control with Semi-Closed-Loop Feedbacks in Industrial IoT.
.- Anomaly Detection under Normality-Shifted IoT Scenario: Filter, Detection, and Adaption.
.- DevDet: Detecting IoT Device Impersonation Attacks via Traffic Based Identification.
.- Multiscale Adversarial Domain Adaptation Approach for Cloud-Edge Collaborative Fault Diagnosis of Industrial Equipment.
.- Detection and Localization of Malicious Nodes in Internet of Things Based on SDN.
.- Enhancing Scalability: A Complete Tree Sharding Architecture towards IoT.
.- A Cloud-Edge Integrated Water Body Extraction Using Superpixel Segmentation.
.- Layer-Aware Microservice Deployment for Edge Computing with Service Reliability Provisioning.
.- FusionFlow: Neural Fusion and Compression for Communication Efficient Edge-Cloud Collaborative Computing.
.- Toward Low Overhead and Real-time Multi-vehicle Collaborative Perception via V2V Communication.

Erscheinungsdatum
Reihe/Serie Lecture Notes in Computer Science
Zusatzinfo XIV, 546 p. 215 illus., 196 illus. in color.
Verlagsort Cham
Sprache englisch
Maße 155 x 235 mm
Themenwelt Informatik Theorie / Studium Künstliche Intelligenz / Robotik
Technik Elektrotechnik / Energietechnik
Technik Nachrichtentechnik
Schlagworte Artificial Intelligence • Computing Methodologies • distributed computing methodologies • machine learning • network algorithms • Network Architectures • network performance evaluation • Network Protocols • Networks • Network Security • network services • Security and Privacy • Systems Security
ISBN-10 3-031-71466-0 / 3031714660
ISBN-13 978-3-031-71466-5 / 9783031714665
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich
Eine kurze Geschichte der Informationsnetzwerke von der Steinzeit bis …

von Yuval Noah Harari

Buch | Hardcover (2024)
Penguin (Verlag)
28,00