Default Cover Image

2020 International Conferences on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData) and IEEE Congress on Cybermatics (Cybermatics)

Nov. 2 2020 to Nov. 6 2020

Rhodes Island, Greece

ISBN: 978-1-7281-7647-5

Table of Contents

Title Page iFreely available from IEEE.pp. 1-1
Title Page iiiFreely available from IEEE.pp. 3-3
Copyright PageFreely available from IEEE.pp. 4-4
Table of ContentsFreely available from IEEE.pp. 5-23
Message from the Congress ChairsFreely available from IEEE.pp. 24-25
Cybermatics 2020 Organizing CommitteesFreely available from IEEE.pp. 26-26
Message from the CPSCom 2020 General ChairsFreely available from IEEE.pp. 27-27
Message from the CPSCom 2020 Program ChairsFreely available from IEEE.pp. 28-28
Message from the CPSCom 2020 Special Session ChairsFreely available from IEEE.pp. 29-29
Message from the CPSCom 2020 Steering ChairsFreely available from IEEE.pp. 30-30
CPSCom Organizing and Program CommitteesFreely available from IEEE.pp. 31-34
GreenCom 2020 Organizing CommitteeFreely available from IEEE.pp. 36-37
Message from the IEEE SmartData 2020 General ChairsFreely available from IEEE.pp. 38-38
Message from the IEEE SmartData 2020 Program ChairsFreely available from IEEE.pp. 39-39
Message from the IEEE SmartData 2020 Steering ChairsFreely available from IEEE.pp. 40-40
IEEE SmartData 2020 Program CommitteesFreely available from IEEE.pp. 41-42
Message from the iThings 2020 General ChairsFreely available from IEEE.pp. 43-43
Message from the iThings 2020 Program ChairsFreely available from IEEE.pp. 44-44
Message from the iThings 2020 Steering ChairsFreely available from IEEE.pp. 45-45
iThings 2020 Organizing and Program CommitteesFreely available from IEEE.pp. 46-48
A Hierarchical Automata Based Approach for Anomaly Detection in Smart Home DevicesFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Behavioral Model based Trust Management design for IoT at ScaleFull-text access may be available. Sign in or learn about subscription options.pp. 9-17
A Stochastic-Based Reliability Calculation Method for RTL CircuitsFull-text access may be available. Sign in or learn about subscription options.pp. 18-22
Cross-level Feature Aggregation and Fusion Network for Light Field Salient Object DetectionFull-text access may be available. Sign in or learn about subscription options.pp. 23-28
Physical-Layer Cooperative Key Generation with Correlated Eavesdropping Channels in IoTFull-text access may be available. Sign in or learn about subscription options.pp. 29-36
Trusted Anonymous Authentication For Vehicular Cyber-Physical SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 37-44
Semantic Descriptor for Intelligence ServicesFull-text access may be available. Sign in or learn about subscription options.pp. 45-53
Driving Intention Oriented Real-time Energy Management Strategy for PHEV in Urban V2X ScenarioFull-text access may be available. Sign in or learn about subscription options.pp. 70-76
Independent credible: Secure communication architecture of Android devices based on TrustZoneFull-text access may be available. Sign in or learn about subscription options.pp. 85-92
WiFi-based Device-free Vehicle Speed Measurement Using Fast Phase Correction MUSIC AlgorithmFull-text access may be available. Sign in or learn about subscription options.pp. 93-99
Attention-based Hierarchical Convolution Neural Network for Fine-grained Crop Image ClassificationFull-text access may be available. Sign in or learn about subscription options.pp. 106-112
A Stack4Things-based Web of Things ArchitectureFull-text access may be available. Sign in or learn about subscription options.pp. 113-120
Anomaly Detection Using Spatio-Temporal Correlation and Information Entropy in Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 121-128
Wheat Yield Forecasting using Regression Algorithms and Neural NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 129-134
An internet of things based transportation cart for smart construction siteFull-text access may be available. Sign in or learn about subscription options.pp. 160-167
Enhanced Knowledge Inference and Reasoning with New IPFull-text access may be available. Sign in or learn about subscription options.pp. 168-174
Joint Hybrid Precoding Scheme with Low Complexity for Single-user Massive MIMO SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 175-179
Algorithm for Determining Number of Clusters based on DichotomyFull-text access may be available. Sign in or learn about subscription options.pp. 180-185
Anomaly Detection based on Feature Correlation and Influence Degree in SDNFull-text access may be available. Sign in or learn about subscription options.pp. 186-192
Detection Algorithm Based on Deep Learning for the Multi-user MIMO-NOMA SystemFull-text access may be available. Sign in or learn about subscription options.pp. 193-197
Security, Privacy and Ethical Concerns of IoT Implementations in Hospitality DomainFull-text access may be available. Sign in or learn about subscription options.pp. 198-203
Prediction of diabetes using Multi-type dataFull-text access may be available. Sign in or learn about subscription options.pp. 204-210
Fast Monte Carlo method to simulate atmospheric backscattering of wireless laser sensor networkFull-text access may be available. Sign in or learn about subscription options.pp. 211-215
MQTT-Based Surveillance System of IoT Using UWB Real Time Location SystemFull-text access may be available. Sign in or learn about subscription options.pp. 216-221
Abnormal Road Surface Detection Based on Smart Phone Acceleration Sensor and CrowdsourcingFull-text access may be available. Sign in or learn about subscription options.pp. 222-227
Blockchain-based Secure and Reliable Manufacturing SystemFull-text access may be available. Sign in or learn about subscription options.pp. 228-233
Flood Prediction Using IoT and Artificial Neural Networks with Edge ComputingFull-text access may be available. Sign in or learn about subscription options.pp. 234-240
Low-Power Modular Multi-Sensor Node with ZeSCIP Analog FrontendFull-text access may be available. Sign in or learn about subscription options.pp. 241-245
A Contract-Based Incentive Mechanism for Traffic Offloading in Two-tier Heterogeneous NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 246-251
Robust Speaker Identification of IoT based on Stacked Sparse Denoising Auto-encodersFull-text access may be available. Sign in or learn about subscription options.pp. 252-257
Image Reconstruction of IoT based on Parallel CNNFull-text access may be available. Sign in or learn about subscription options.pp. 258-263
A semi-supervised dynamic ensemble algorithm for IoT anomaly detectionFull-text access may be available. Sign in or learn about subscription options.pp. 264-269
A feature selection algorithm for multilayer perceptron based on simultaneous two-sample representationFull-text access may be available. Sign in or learn about subscription options.pp. 270-275
Adversarial Domain Adaptation for Crisis Data Classification on Social MediaFull-text access may be available. Sign in or learn about subscription options.pp. 282-287
On the Development of a Resident Monitoring System: Usability, Privacy and Security aspectsFull-text access may be available. Sign in or learn about subscription options.pp. 288-293
Cloud Platform Performance Evaluation Using Multi-level Execution TracingFull-text access may be available. Sign in or learn about subscription options.pp. 294-299
Wi-mix: A pedestrian track tracking method combining PDR and Wi-Fi signalsFull-text access may be available. Sign in or learn about subscription options.pp. 300-309
Energy-aware Aperiodic Task Servers for Firm Real-time Energy harvesting SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 310-317
A New State Evaluation Algorithm for Rail Transit Power Supply SystemFull-text access may be available. Sign in or learn about subscription options.pp. 318-322
Energy-efficient Inference Service of Transformer-based Deep Learning Models on GPUsFull-text access may be available. Sign in or learn about subscription options.pp. 323-331
Integrating Pre-Cooling of Data Center operated with Renewable EnergiesFull-text access may be available. Sign in or learn about subscription options.pp. 332-341
Decentral load control for data centersFull-text access may be available. Sign in or learn about subscription options.pp. 350-359
Deep Reinforcement Learning and Blockchain for Peer-to-Peer Energy Trading among MicrogridsFull-text access may be available. Sign in or learn about subscription options.pp. 360-365
activIn: A novel Non-Intrusive Activity Inference ToolFull-text access may be available. Sign in or learn about subscription options.pp. 372-378
Multi-Robot-Assisted Confident Information Coverage Hole Repairing in WSNsFull-text access may be available. Sign in or learn about subscription options.pp. 379-384
occupI: A novel Non-Intrusive Occupancy Inference ToolFull-text access may be available. Sign in or learn about subscription options.pp. 392-398
Real-time Vision-Language-Navigation based on a Lite Pre-training ModelFull-text access may be available. Sign in or learn about subscription options.pp. 399-404
A Novel Scheme for Access Control Policy Generating and Evaluating in IoT based on Machine LearningFull-text access may be available. Sign in or learn about subscription options.pp. 411-418
Real-Time Operating Systems for Cyber-Physical Systems: Current Status and Future ResearchFull-text access may be available. Sign in or learn about subscription options.pp. 419-425
A Distributed DBSCAN Algorithm for Massive Data in Cyber Physical and Social ComputingFull-text access may be available. Sign in or learn about subscription options.pp. 426-433
An Evaluation of Caching in Nation Scale, Normally Isolated Mobile Ad Hoc NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 434-439
Cypher Social Contracts A Novel Protocol Specification for Cyber Physical Smart ContractsFull-text access may be available. Sign in or learn about subscription options.pp. 440-447
RFID-Based WIMEC-LANDMARC Indoor Location AlgorithmFull-text access may be available. Sign in or learn about subscription options.pp. 448-455
Data Aggregation Algorithm based on Autoregressive Model in Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 456-461
The Research on Control and Dynamic Property of Autonomous Vehicle Adaptive Lidar SystemFull-text access may be available. Sign in or learn about subscription options.pp. 462-468
Extending the CST: The Distributed Cognitive ToolkitFull-text access may be available. Sign in or learn about subscription options.pp. 474-481
Toward A Sustainable Cyber-Physical System Architecture for Urban Water Supply SystemFull-text access may be available. Sign in or learn about subscription options.pp. 482-489
DeepER: A Deep Learning based Emergency Resolution Time Prediction SystemFull-text access may be available. Sign in or learn about subscription options.pp. 490-497
Forest Type Classification with Multitemporal Sentinel-2 DataFull-text access may be available. Sign in or learn about subscription options.pp. 498-504
Automatic Prediction and Insertion of Multiple Emojis in Social Media TextFull-text access may be available. Sign in or learn about subscription options.pp. 505-512
Research and Design of Square Kilometer Array Astronomical Data Management Model Based on FabricFull-text access may be available. Sign in or learn about subscription options.pp. 513-518
CAMDet: CAM-based objection detection for non-crowded views from moving IoT devicesFull-text access may be available. Sign in or learn about subscription options.pp. 519-526
Drug-Drug Interaction Extraction using Pre-training Model of Enhanced Entity InformationFull-text access may be available. Sign in or learn about subscription options.pp. 527-532
Leveraging Multi-view Learning for Human Anomaly Detection in Industrial Internet of ThingsFull-text access may be available. Sign in or learn about subscription options.pp. 533-537
Sampling Workloads with Dynamic Time Scale to Promote the Energy Efficiency of DatacentersFull-text access may be available. Sign in or learn about subscription options.pp. 538-543
CNN Network for Head Detection with Depth Images in cyber-physical systemsFull-text access may be available. Sign in or learn about subscription options.pp. 544-549
Showing 100 out of 157