EAI banner

Accepted papers

Main Track

  1. A Design Solution to Security Simulation Platform for Intelligent Household
    Wang Hui, Li Chengze, Li Zheng, Zhao Chunlu, National Computer Network Emergency Response Technical Team/Coordination Center, China
  2. A Fine Grain Conditional Proxy Broadcast Re-Encryption Policy for File Sharing System
    Ren Yongjun, Liu Yepeng, School of Computer and Software, Nanjing University of Information Science & Technology, Nanjing, China; Qian Chengshan, Binjiang College, Nanjing University of Information Science & Technology, Wuxi, China
  3. A Hierarchical Bayesian Model for Matching Unlabeled Point Sets
    Hu Xin, Zhang Xiaodong, Zhou Xuequan, Zhang Hua, Li Chunshan, Ding Deqiong, Chu Dianhui, Harbin Institute of Technology at Weihai, China
  4. A Information Propagation Model Based on Various Emotions and Heterogeneous Mean Field in Social Networks
    Wang Tingting, Hu Mi, Kou Lan, Chongqing University of Posts and Telecommunications, China
  5. A Social Network Information Dissemination Model Based on Evolutionary Game Considering Nodes Attitude
    Huang Hongcheng, Lai Licheng, Hu Min, Dong Mengyuan, Wang Tingting, Chongqing University of  Posts and Telecommunications, China
  6. A Time-aware Method for Occupancy Detection in a Building
    Song Ling, Shandong Jianzhu University, Jinan, China; Lyu Qiang, State Grid of China Technology College, China; Niu Xiaofei, Tian Tian, School of Computer Science and Technology, Shandong Jianzhu University, Jinan, China;  Lyu Shunming, School of Information Technology & Electrical Engineering, University of Queensland, Queensland, Australia
  7. Balanced Sleep Scheduling in Renewable Wireless Sensor Networks Towards Network Throughput for Green Cities
    Shu Lei, Nanjing Agricultural University, China
  8. Cross-social-network Interconnection Model Based on Bridge Community
    Hu Min, Dong Mengyuan, Chongqing University of Posts and Telecommunications, China
  9. Detecting Deceptive Reviews Utilizing Review Group Model
    Li Yuejun, Wang Fangxin, Zhang Shuwu, Institute of Automation, Chinese Academy of Sciences, China; Niu Xiaofei, School of Computer Science and Technology, Shandong Jianzhu University, China
  10. Dynamic Computation Offloading Based on Deep Reinforcement Learning
    Cheng BaiChuan, Zhang ZhiLong, Liu DanPu, Beijing University of Posts and Telecommunications, China
  11. Edge Computing Enabled Cognitive Portable Ground Penetrating Radar
    Wu Dalei, Omwenga MaxwellM., Liang Yu, Yang Li, University of Tennessee at Chattanooga; Huston Dryver, Xia Tian, University of Vermont, USA
  12. Harnessing D2D Communications in Collaborative Mobile Clouds for Content Sharing: An Energy Efficient Communication Scheme
    Huang Jun, Huang Chao, Chongqing University of Posts and Telecom, China; Xing Cong-cong, Nicholls State University, USA
  13. Improvement on Security of SMS Verification Codes
    Zhao Shushan, University of Pittsburgh, USA
  14. Intrusion Detection Algorithm of Shadowed Rough-fuzzy Clustering Based on Mahalanobis Distance
    Lina Wang, Jie Wang, Zimeng Xing, Nanjing University of Information Science and Technology
  15. KnowHealth: A Knowledge Graph based Question-Answer Platform for Elderly Health
  16. Li Chunshan; Zhang Hua; Hu Xin; Chu Dianhui; Zheng Hongzhen, Harbin Institute of Technology, China
  17. Research of Context Awareness Based Accident Prevention During Mobile Phone Use
    Sun Bowen, Li Quanlong, Guo Yonghui, Li Guocheng,School of Computer Science and Technology, Harbin Institute of Technology, China
  18. Supervised Machine Learning based Routing Detection for Smart Meter Network
    Hasan MD Raqibull, South Dakota School of Mines and Technology; Zhao Yanxiao, Virginia Commonwealth University; Wang Guodong, Massachusetts College of Liberal Arts; Luo Yu, Mississippi State University; Pu Lina, Southern Mississippi University; Wang Rui, Civil Aviation University
  19. Trust Prediction based on Grey Exponential Smoothing Method in VANETs
    Zhang Sanshun, Li Li, Xia Hui, Zhang Rui, Li Ye, Shandong Provincial Key Laboratory of Computer Networks, Shandong Computer Science Center (National Supercomputer Center in Jinan), Qilu University of Technology (Shandong Academy of Sciences)

Workshop on Localization, Positioning and Tracking Techniques

  1. Adaptive fusion localization mechanism towards TDoA and IMU data with LSTM correction Method
    Liu Zhiyuan, Li Liang, Wang Zheng, Ao Chen, Fu Qiang, Beijing Smart Chip Microelectronics Technology Company Ltd, China; Zhang Puning, Chongqing University of Posts and Telecommunications, China
  2. An Efficient Heuristic Algorithm for Feedback Arc Set Problem on Contigs Rearrangement
    Liu Zhihui, An Zhiyong, Liu Xiaodan, Shandong University for Business & Technology
  3. AP Deployment Optimization Based on Bluetooth Fingerprint Database Discrimination
    Ren Haoliang,Tian Zengshan,Zhou Mu, Jin Xiaoxiao, Lu Shuai, Chongqing University of Posts and Telecommunications, China
  4. Data Process for Indoor Positioning based on WiFi Fingerprint
    Cui Xuerong, Wang Mengyan, Li Juan, Ji Meiqi, Liu Jianhang, Huang Tingpei, Chen Haihua, Department of Computer and Communication Engineering, China University of Petroleum (East China), China
  5. LTE Antenna Port Number Detection Algorithm Based on Kalman Autoregression Filtering
    Jiang Pengchun, Tian Zengshan, Zhou Mu, Li Zhihao, Chongqing University of Posts and Telecommunications, China
  6. TDOA Solution Based on Neural Network in UWB-based Positioning System
    Li Zexian, Havyarimana Vincent, Wang Dong, Xiao Zhu, Hunan University
  7. The research of lever-arm effect in the Transfer Alignment
    Song Lijun, Xi’an University of Architecture and Technology

Workshop on Security, Reliability, and Resilience in Wireless Sensor Networks

  1. A Mobile Edge Computing Enabled Spectrum Blockchain for the Internet of Spectrum Devices
    Jian Yang, National University of Defense Technology; Ding Guoru, College of Communication Engineering, Army Engineering University; Xi Chen, School of Mechanical Engineering, Nanjing University of Science and Technology; Zhang Linyuan, Sun Jiachen, College of Communication Engineering, Army Engineering University; Zhao Hangsheng, School of Telecommunications, Nanjing University of Posts and Telecommunications, China
  2. A Novel Abnormal Driving Detection Method via Deep Learning in Wireless Sensor Network
    Liu Xi, Luo Mingyuan, Huang Wei, Nanchang University, China
  3. Grid Company Integrated Energy Service Risk Management based on Fault Tree Analysis and Catastrophe Model
    Sun Ke, State Grid Zhejiang Power Co., Ltd.; Fan Juanjuan, Zhejiang Huayun Info Technology Co., Ltd.; Ying Yulong, Shanghai University of Electric Power; Li Jingchao, Shanghai Dianji University, China
  4. Improved Capsule Network for Gaze estimation in Wireless Sensor Networks
    Luo Mingyuan, Liu Xi, Huang Wei, Nanchang University, China
  5. Research on Application of ATC Operation Security Based on Data Mining
    Wang Si, Shanxi University, China
  6. Resistance Compensation Method Based on Multiple Linear Regression Design
    Wang Haiying, Ren Hao, Liu Wenfeng, Li Ran, Yu Zhilong, School of Automation, Harbin University of Science and Technology, China
  7. Simulation Research on Safe Operation of UAV Non-isolated Airspace
    Jin Kai, Shanxi University, China
  8. The Comprehensive Method of Communication Jamming effectiveness Based on Grey Relational Analysis
    Wang Haojia, College of Hebei, China


EAI Institutional Members