Language:
English
繁體中文
Help
回圖書館首頁
手機版館藏查詢
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Wireless artificial intelligent comp...
~
WASA (Conference) (2024 :)
Linked to FindBook
Google Book
Amazon
博客來
Wireless artificial intelligent computing systems and applications = 18th International Conference, WASA 2024, Qindao, China, June 21-23, 2024 : proceedings.. Part I /
Record Type:
Electronic resources : Monograph/item
Title/Author:
Wireless artificial intelligent computing systems and applications/ edited by Zhipeng Cai ... [et al.].
Reminder of title:
18th International Conference, WASA 2024, Qindao, China, June 21-23, 2024 : proceedings.
remainder title:
WASA 2024
other author:
Cai, Zhipeng.
corporate name:
WASA (Conference)
Published:
Cham :Springer Nature Switzerland : : 2025.,
Description:
xxi, 520 p. :ill. (some col.), digital ;24 cm.
[NT 15003449]:
FEKNN: A Wi-Fi Indoor Localization Method Based on Feature Enhancement and KNN. -- Smartphone Indoor Fusion Localization with Trust Region-Based Magnetic Matching. -- Multi-agent Deep Reinforcement Learning-based UAV-enable NOMA Communication Networks Optimization. -- BufferConcede: Conceding Buffer for RoCE Traffic in TCP/RoCE Mix-Flows. -- An Effective Cooperative Jamming-based Secure Transmission Scheme for a Mobile Scenario. -- ID-Gait: Fine-grained Human Gait State Recognition using Wi-Fi Signal. -- Anti-Packet-Loss Encrypted Traffic Classification via Masked Autoencoder. -- Graph Transformer Hawkes Processes for Causal Structure Learning in Telecom Networks. -- Design of Maritime End-to-End Autoencoder Communication System Based on Compressed Channel Feedback. -- ZigRa: Physical-layer Cross-Technology Communication from ZigBee to LoRa. -- Wireless Portable Dry Electrode Multi-channel sEMG Acquisition System. -- A Double Layer Consensus Optimization Mechanism in DAG-based Blockchain for Carbon Trading. -- Probabilistic Offloading Algorithm for Opportunistic Networks Integrating Node Influence Prediction. -- Secret Sharing Based Key Agreement Protocol for Body Area Networks. -- Active Detection Based NTP Device Attribute Detection. -- Cyber Sentinel: Fortifying Voice Assistant Security with Biometric Template Integration in Neural Networks. -- Traceable Health Data Sharing Based on Blockchain. -- KD-Eye: Lightweight Pupil Segmentation for Eye Tracking on VR Headsets via Knowledge Distillation. -- Meta-RFF: Few-Shot Open-Set Incremental Learning for RF Fingerprint Recognition via Multi-phase Meta Task Adaptation. -- Left Ventricular Hypertrophy Detection Algorithm Using Feature Selection and CNN-LSTM. -- Application with Digital Currencies Trading Using Machine Learning. -- Mobile Crowdsourcing Task Assignment Algorithm Based on ConvNeXt and GRU. -- Inferring the Number of Clusters for Radar Emitters via Threshold Segmentation and Information Fusion. -- Enhancing Student Classroom Behavior Detection Using Improved SlowFast. -- LV-auth: Lip Motion Fusion for Voiceprint Authentication. -- Generative Model-Based Edge-Assisted Object Detection in Bandwidth-Constrained Network. -- Enhancing Generalized Zero-shot Learning with Dynamic Selective Knowledge Distillation. -- BehaMiner: System Behavior Mining for Audit Log based on Graph Learning. -- REHG: A Recommender Engine Based on Heterogeneous Graph. -- Step-by-Step and Tailored Teaching: Dynamic Knowledge Distillation. -- TBA-GNN: A Traffic Behavior Analysis Model with Graph Neural Networks for Malicious Traffic Detection. -- Enhancing Adversarial Robustness in Automatic Modulation Recognition with Dynamical Systems-Inspired Deep Learning Frameworks. -- E-SAGE: Explainability-based Defense Against Backdoor Attacks on Graph Neural Networks. -- Sophon IDS: Mitigating the Effectiveness of GAN-based Adversarial Attacks via Tailored Misinformation. -- An Early Warning Method for Fracturing Accidents Using Joint CNN and LSTM Modeling. -- Defense Strategy in Federated Learning: Unveiling Stealthy Threats and the Similarity Filter Solution. -- FedScale: A Federated Unlearning Method Mimicking Human Forgetting Processes. -- The Client-level GAN-based Data Reconstruction Attack and Defense in Clustered Federated Learning. -- Byzantine-Robust Federated Learning Based on Blockchain. -- FedDue: Optimizing Personalized Federated Learning through Dynamic Update Classifier. -- FedDCT: A Dynamic Cross-Tier Federated Learning Framework in Wireless Networks.
Contained By:
Springer Nature eBook
Subject:
Wireless communication systems - Congresses. -
Online resource:
https://doi.org/10.1007/978-3-031-71464-1
ISBN:
9783031714641
Wireless artificial intelligent computing systems and applications = 18th International Conference, WASA 2024, Qindao, China, June 21-23, 2024 : proceedings.. Part I /
Wireless artificial intelligent computing systems and applications
18th International Conference, WASA 2024, Qindao, China, June 21-23, 2024 : proceedings.Part I /[electronic resource] :WASA 2024edited by Zhipeng Cai ... [et al.]. - Cham :Springer Nature Switzerland :2025. - xxi, 520 p. :ill. (some col.), digital ;24 cm. - Lecture notes in computer science,149971611-3349 ;. - Lecture notes in computer science ;14997..
FEKNN: A Wi-Fi Indoor Localization Method Based on Feature Enhancement and KNN. -- Smartphone Indoor Fusion Localization with Trust Region-Based Magnetic Matching. -- Multi-agent Deep Reinforcement Learning-based UAV-enable NOMA Communication Networks Optimization. -- BufferConcede: Conceding Buffer for RoCE Traffic in TCP/RoCE Mix-Flows. -- An Effective Cooperative Jamming-based Secure Transmission Scheme for a Mobile Scenario. -- ID-Gait: Fine-grained Human Gait State Recognition using Wi-Fi Signal. -- Anti-Packet-Loss Encrypted Traffic Classification via Masked Autoencoder. -- Graph Transformer Hawkes Processes for Causal Structure Learning in Telecom Networks. -- Design of Maritime End-to-End Autoencoder Communication System Based on Compressed Channel Feedback. -- ZigRa: Physical-layer Cross-Technology Communication from ZigBee to LoRa. -- Wireless Portable Dry Electrode Multi-channel sEMG Acquisition System. -- A Double Layer Consensus Optimization Mechanism in DAG-based Blockchain for Carbon Trading. -- Probabilistic Offloading Algorithm for Opportunistic Networks Integrating Node Influence Prediction. -- Secret Sharing Based Key Agreement Protocol for Body Area Networks. -- Active Detection Based NTP Device Attribute Detection. -- Cyber Sentinel: Fortifying Voice Assistant Security with Biometric Template Integration in Neural Networks. -- Traceable Health Data Sharing Based on Blockchain. -- KD-Eye: Lightweight Pupil Segmentation for Eye Tracking on VR Headsets via Knowledge Distillation. -- Meta-RFF: Few-Shot Open-Set Incremental Learning for RF Fingerprint Recognition via Multi-phase Meta Task Adaptation. -- Left Ventricular Hypertrophy Detection Algorithm Using Feature Selection and CNN-LSTM. -- Application with Digital Currencies Trading Using Machine Learning. -- Mobile Crowdsourcing Task Assignment Algorithm Based on ConvNeXt and GRU. -- Inferring the Number of Clusters for Radar Emitters via Threshold Segmentation and Information Fusion. -- Enhancing Student Classroom Behavior Detection Using Improved SlowFast. -- LV-auth: Lip Motion Fusion for Voiceprint Authentication. -- Generative Model-Based Edge-Assisted Object Detection in Bandwidth-Constrained Network. -- Enhancing Generalized Zero-shot Learning with Dynamic Selective Knowledge Distillation. -- BehaMiner: System Behavior Mining for Audit Log based on Graph Learning. -- REHG: A Recommender Engine Based on Heterogeneous Graph. -- Step-by-Step and Tailored Teaching: Dynamic Knowledge Distillation. -- TBA-GNN: A Traffic Behavior Analysis Model with Graph Neural Networks for Malicious Traffic Detection. -- Enhancing Adversarial Robustness in Automatic Modulation Recognition with Dynamical Systems-Inspired Deep Learning Frameworks. -- E-SAGE: Explainability-based Defense Against Backdoor Attacks on Graph Neural Networks. -- Sophon IDS: Mitigating the Effectiveness of GAN-based Adversarial Attacks via Tailored Misinformation. -- An Early Warning Method for Fracturing Accidents Using Joint CNN and LSTM Modeling. -- Defense Strategy in Federated Learning: Unveiling Stealthy Threats and the Similarity Filter Solution. -- FedScale: A Federated Unlearning Method Mimicking Human Forgetting Processes. -- The Client-level GAN-based Data Reconstruction Attack and Defense in Clustered Federated Learning. -- Byzantine-Robust Federated Learning Based on Blockchain. -- FedDue: Optimizing Personalized Federated Learning through Dynamic Update Classifier. -- FedDCT: A Dynamic Cross-Tier Federated Learning Framework in Wireless Networks.
The three-volume proceedings set LNCS 14997-14999 constitutes the refereed proceedings of the 18th International Conference on Wireless Algorithms, Systems, and Applications, WASA 2024, held in Qindao, China, during June 21-23, 2024. The 98 full papers and 10 short papers included in these proceedings were carefully reviewed and selected from 301 submissions. They focus on cutting-edge ideas, research findings, and innovative solutions in the dynamic intersection of wireless technologies and artificial intelligence (AI) computing systems.
ISBN: 9783031714641
Standard No.: 10.1007/978-3-031-71464-1doiSubjects--Topical Terms:
660078
Wireless communication systems
--Congresses.
LC Class. No.: QA76.9.A43
Dewey Class. No.: 004.6
Wireless artificial intelligent computing systems and applications = 18th International Conference, WASA 2024, Qindao, China, June 21-23, 2024 : proceedings.. Part I /
LDR
:05303nmm a2200349 a 4500
001
2407956
003
DE-He213
005
20241113115733.0
006
m d
007
cr nn 008maaau
008
260204s2025 sz s 0 eng d
020
$a
9783031714641
$q
(electronic bk.)
020
$a
9783031714634
$q
(paper)
024
7
$a
10.1007/978-3-031-71464-1
$2
doi
035
$a
978-3-031-71464-1
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A43
072
7
$a
TJKW
$2
bicssc
072
7
$a
TEC061000
$2
bisacsh
072
7
$a
TJKW
$2
thema
082
0 4
$a
004.6
$2
23
090
$a
QA76.9.A43
$b
W312 2024
111
2
$a
WASA (Conference)
$n
(18th :
$d
2024 :
$c
Qindao, China)
$3
3780131
245
1 0
$a
Wireless artificial intelligent computing systems and applications
$h
[electronic resource] :
$b
18th International Conference, WASA 2024, Qindao, China, June 21-23, 2024 : proceedings.
$n
Part I /
$c
edited by Zhipeng Cai ... [et al.].
246
3
$a
WASA 2024
260
$a
Cham :
$b
Springer Nature Switzerland :
$b
Imprint: Springer,
$c
2025.
300
$a
xxi, 520 p. :
$b
ill. (some col.), digital ;
$c
24 cm.
490
1
$a
Lecture notes in computer science,
$x
1611-3349 ;
$v
14997
505
0
$a
FEKNN: A Wi-Fi Indoor Localization Method Based on Feature Enhancement and KNN. -- Smartphone Indoor Fusion Localization with Trust Region-Based Magnetic Matching. -- Multi-agent Deep Reinforcement Learning-based UAV-enable NOMA Communication Networks Optimization. -- BufferConcede: Conceding Buffer for RoCE Traffic in TCP/RoCE Mix-Flows. -- An Effective Cooperative Jamming-based Secure Transmission Scheme for a Mobile Scenario. -- ID-Gait: Fine-grained Human Gait State Recognition using Wi-Fi Signal. -- Anti-Packet-Loss Encrypted Traffic Classification via Masked Autoencoder. -- Graph Transformer Hawkes Processes for Causal Structure Learning in Telecom Networks. -- Design of Maritime End-to-End Autoencoder Communication System Based on Compressed Channel Feedback. -- ZigRa: Physical-layer Cross-Technology Communication from ZigBee to LoRa. -- Wireless Portable Dry Electrode Multi-channel sEMG Acquisition System. -- A Double Layer Consensus Optimization Mechanism in DAG-based Blockchain for Carbon Trading. -- Probabilistic Offloading Algorithm for Opportunistic Networks Integrating Node Influence Prediction. -- Secret Sharing Based Key Agreement Protocol for Body Area Networks. -- Active Detection Based NTP Device Attribute Detection. -- Cyber Sentinel: Fortifying Voice Assistant Security with Biometric Template Integration in Neural Networks. -- Traceable Health Data Sharing Based on Blockchain. -- KD-Eye: Lightweight Pupil Segmentation for Eye Tracking on VR Headsets via Knowledge Distillation. -- Meta-RFF: Few-Shot Open-Set Incremental Learning for RF Fingerprint Recognition via Multi-phase Meta Task Adaptation. -- Left Ventricular Hypertrophy Detection Algorithm Using Feature Selection and CNN-LSTM. -- Application with Digital Currencies Trading Using Machine Learning. -- Mobile Crowdsourcing Task Assignment Algorithm Based on ConvNeXt and GRU. -- Inferring the Number of Clusters for Radar Emitters via Threshold Segmentation and Information Fusion. -- Enhancing Student Classroom Behavior Detection Using Improved SlowFast. -- LV-auth: Lip Motion Fusion for Voiceprint Authentication. -- Generative Model-Based Edge-Assisted Object Detection in Bandwidth-Constrained Network. -- Enhancing Generalized Zero-shot Learning with Dynamic Selective Knowledge Distillation. -- BehaMiner: System Behavior Mining for Audit Log based on Graph Learning. -- REHG: A Recommender Engine Based on Heterogeneous Graph. -- Step-by-Step and Tailored Teaching: Dynamic Knowledge Distillation. -- TBA-GNN: A Traffic Behavior Analysis Model with Graph Neural Networks for Malicious Traffic Detection. -- Enhancing Adversarial Robustness in Automatic Modulation Recognition with Dynamical Systems-Inspired Deep Learning Frameworks. -- E-SAGE: Explainability-based Defense Against Backdoor Attacks on Graph Neural Networks. -- Sophon IDS: Mitigating the Effectiveness of GAN-based Adversarial Attacks via Tailored Misinformation. -- An Early Warning Method for Fracturing Accidents Using Joint CNN and LSTM Modeling. -- Defense Strategy in Federated Learning: Unveiling Stealthy Threats and the Similarity Filter Solution. -- FedScale: A Federated Unlearning Method Mimicking Human Forgetting Processes. -- The Client-level GAN-based Data Reconstruction Attack and Defense in Clustered Federated Learning. -- Byzantine-Robust Federated Learning Based on Blockchain. -- FedDue: Optimizing Personalized Federated Learning through Dynamic Update Classifier. -- FedDCT: A Dynamic Cross-Tier Federated Learning Framework in Wireless Networks.
520
$a
The three-volume proceedings set LNCS 14997-14999 constitutes the refereed proceedings of the 18th International Conference on Wireless Algorithms, Systems, and Applications, WASA 2024, held in Qindao, China, during June 21-23, 2024. The 98 full papers and 10 short papers included in these proceedings were carefully reviewed and selected from 301 submissions. They focus on cutting-edge ideas, research findings, and innovative solutions in the dynamic intersection of wireless technologies and artificial intelligence (AI) computing systems.
650
0
$a
Wireless communication systems
$x
Congresses.
$3
660078
650
0
$a
Artificial intelligence
$v
Congresses.
$3
606815
650
1 4
$a
Wireless and Mobile Communication.
$3
3338159
650
2 4
$a
Artificial Intelligence.
$3
769149
650
2 4
$a
Computer and Information Systems Applications.
$3
3538505
650
2 4
$a
Computing Milieux.
$3
893243
650
2 4
$a
Computer Communication Networks.
$3
775497
700
1
$a
Cai, Zhipeng.
$3
1939640
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer Nature eBook
830
0
$a
Lecture notes in computer science ;
$v
14997.
$3
3780132
856
4 0
$u
https://doi.org/10.1007/978-3-031-71464-1
950
$a
Computer Science (SpringerNature-11645)
based on 0 review(s)
Location:
ALL
電子資源
Year:
Volume Number:
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
W9513454
電子資源
11.線上閱覽_V
電子書
EB QA76.9.A43
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login