WASA 2022: THE 17TH INTERNATIONAL CONFERENCE ON WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS
TALK KEYWORD INDEX

This page contains an index consisting of author-provided keywords.

3
3D reconstruction
A
Abnormal Behavior
Abstract syntax tree
Abstractive summarization
Access control
Acoustic ranging
active motion
Adaptive
Adaptive control
Adaptive factor
Adversarial example
Aerial Computing
AI
ALGORITHMS
Align instruction
Amnesia
Android malware detection
Application data unit
Application layer feature engineering
Applied Cryptography
approximation algorithm
ARM Cortex-M3
Atrous convolution,
attack path discovery
Attention mechanism
Auction
Authentication session key negotiation
AutoML
Autonomous vehicle
B
background adaptive
backscatter communication
Backward induction
Bandwidth Allocation
bandwidth limitation
Battery-free
beacon
Beamforming
Belief propagation
Bi-graph
Bi-LSTM
Bidirectional self-attention mechanism
Binary Diffing
Bit vector
Blockchain
Bloom Filter
Body sensor network Sensor fusion
BPNN
Broadcast
Bundle Recommendation
C
CA-free
Cache nodes
Certificateless
Channel Attention
Channel State Information
Chinese commercial cryptography
Chinese news headlines
Cloud
Cluster analysis
Cluster-head Election Indicator
Clustering
Clustering Routing Protocol
CNN
coal mine rescue
Code clone detection
Code-shifted differential chaos shift keying (CS-DCSK)
collaborative beamforming
collaborative computing
Collaborative computing offloading
Collaborative filtering
Communication Efficiency
Communication-Efficient
Competition
Computation Offloading
computer vision
Consensus algorithm
Consensus mechanism
Consortium blockchain
Constant ciphertext length
Contact-free material recognition
Content adaptive recurrent unit
Content caching
Continuous wavelet transform
Contrastive Learning
convolutional neural network
Convolutions
CP-HPA
Cramer-Rao lower bound
Cross-Domain sentiment classification
Cross-layer
Crowd Sensing
Crowdsensing systems
Cubature Kalman filter
Cyber-physical systems
D
Dangerous Driving Behavior Detection
Data analysis
Data authentication
Data Cleaning
data collection
Data Extension
Data loss minimization
Data poisoning
Data sharing
data synthesis and release
Dataset
DDoS
Deep Convolutional Neural Network
Deep learning
Deep reinforcement learning
Defense resource allocation
Delay Detection Interval
Departure time prediction
Deployment
Depth Estimation
Differential privacy
Digital Signature
direct position determination
Direct trust
Disparity Warping
Disprover
distress gesture recognition
Distributed incentive mechanism
distributed simulation
Domain Adaptation
Driver distraction recognition
Dropout
Dual discriminator
Dynamic analysis
Dynamic Grouping
Dynamic service placement
E
E-voting
Edge caching
Edge collaborative
Edge computing
Edge Intelligence
Edge Server
Edge server deployment
Edge service
Edge-assistant vehicular network (EAVN)
Edge-cloud collaboration
electric taxi
Elliptic curve code
Encrypted traffic classification
Energy efficiency
Energy optimization
Entity relationships prediction
Ethereum
Evolutionary algorithm
Evolutionary Game
evolving mobility model
Extreme Learning Machine
F
Fall detection
False data injection attacks
Feature engineering
Feature extraction
Feature fusion
Feature representation
Federated Edge Learning
Federated Learning
Federated reinforcement learning
ferry node
Few-shot Learning
Filting
Fine-grained Access Control
Firmware vulnerability
Floor plan construction
flying tour scheduling
format-checkable
Forward Security
FPGA
FPGA-based pipeline
FPN
Freshness
FTM
Fuzzy Extractors
Fuzzy theory
G
Game theory
Gathering Areas
Generalizability
Generating Labels
Genetic algorithm
Gesture Recognition
Global Integration Network
Gradient attack
Gradient Coding
Gradient Quantization
Graph attention network
Graph classification
Graph Convolution
Graph Convolution Network
Graph Convolutional Network
Graph Convolutional Neural Networks
Graph enhancement
Graph neural network
Graph Neural Networks
greatest common divisor
GSO system
H
Handwriting recognition
Hashing
Head orientation
Heterogeneous Edge Networks
Heterogeneous graph neural network
Heterogeneous information fusion
Heterogeneous information network
Heterogeneous Network
Heterogeneous neural network
Hierarchical Encryption
Hierarchical server
High Altitude Unmanned Aerial Vehicles
high efficient interference calculation
High-definition map
high-dimensional data
Homomorphic encryption
HTTPS
human mobility
Human-Centered
Human-centered Computing
Hybrid beamforming
Hyperledger Fabric
I
IB-PRE
ICS devices
Identity Linking Attack
IIoT
Image caption generation
image processing
Imperfect channel state information
Important neuron
Incentive Mechanism
Indirect trust
Industrial Internet of Things
Industrial wireless sensor network
Inertial sensing
Information-centric satellite networks
Insider Threat Detection
Instant Delivery
Intelligent Transportation Systems
Intelligent wireless sensing
Interference Analysis
interference mitigation
Internet of electric vehicles (IoEVs)
Internet of Things
Internet of vehicle
Internet of vehicles
Intrusion detection
Invisible backdoor attack
IoT
IoT devices
IP geolocation
iterative decoding
K
Kalman Filter
Key
Keynote
Keynote1
Keynote2
Keynote3
Knowledge graph embedding
KSP
L
Label consistent
Landmark mining
Lane detection
large scale NGSO system
Large-scale database
Lattice
Layer-based
LDPC code
Light Field
Light Gradient Boosting Machine
Lightweight cryptography
Line Crossing Detection
Lite computation
LLN
local differential privacy
local region
local rotation transformation
Location Privacy
Log Anomaly Detection
Long-range dependency
Long-term utility
LoRa
Loss assessment
low communication costs
low power consumption
Low-poisoning rate
Lower bounds
LSTM
LTN
LWE
LWE problem
M
Machine learning
Malconv
Malicious domain detection
Malware detection
Mapping encoding
Maritime Ad Hoc network
Maritime environment monitoring
Maritime Internet of Things
Massive multiple-input multiple-output (MIMO)
Massive Satellite Constellations
maximum likelihood estimation
Memory compression
Message Confidentiality
Meta Learning
Millimeter wave radar
millimeter-wave
Misbehavior detection
Mixed-criticality traffic scheduling
Mobile
Mobile charging
Mobile charging vehicles (MCVs)
Mobile cloud gaming
Mobile clouds retrieval
Mobile Computing
Mobile Crowd Sensing
Mobile crowdsensing
Mobile edge computing
mobile edge computing (MEC)
Mobile Localization
Mobile-Edge Computing
Mode Switching
Model Partition
Model quality
Model Splitting
Monte Carlo
Motion behavior decision
Motion Recognition
Multi-agent
Multi-agent Deep Deterministic Policy Gradient
Multi-agent deep Q-learning network
Multi-agent multi-armed bandit
Multi-armed bandit
Multi-armed bandits
Multi-channel
multi-dimensional query
Multi-head attention
Multi-label
multi-objective optimization
Multi-publisher/Multi-worker
Multi-resource allocation
Multi-scale fusion,
Multi-sided Fairness
Multi-stage dependencies
Multi-task Learning
Multimodal learning
Multimodal Sensing
multipath
Multiple Access Control Protocol
Mutual information maximization
N
NAS
NER
Network
Network cheat
Network clustering
Network Intrusion Detection
Network measurement
Network telemetry
Neural Network Compression
NLOS
Node localization
Non-IID
NSGA-II algorithm
O
Oblivious transfer
Ocean current direction
Offloading
Online auction strategy
Online task selection
Operator Batching
Optical Tag
Optimization
Optimization Modulo Theories
Order Dispatch
orthogonal frequency division multiplexing (OFDM)
P
Packet Caching
Packet classification
Paillier encryption
Paillier homomorphic encryption
parameter generator network
Parked vehicular network
Passive Sensing
path planning
Pearson Correlation
Percolation Idea
Performance evaluation
Personalized Federated Learning
Phishing detection
PHY
physical interaction control
Physical layer security
Physically Unclonable Functions
Pick-up point recommendation
PIFuHD
Polar code
Popularity
Position Prediction
Power-aware
Pre-trained language model
Pre-trained model
Prediction
Privacy
Privacy Preserving
Privacy protection
Privacy-preserving
private set intersection
Proof-of-WeightedPlanned-Behavior
Prototype System
Proximal policy optimization
PSO
Q
QoE
QoE impairment
QoS
Quantitative Analysis
quantum computation
Quantum Cryptography
Quantum Secret Sharing
R
Radio Frequency Identification
Rate splitting multiple access
rateless code
Real Deployment Test
Real-time Semantic Segmentation
Real-time Signature
Recommendation System
Reconfigurable intelligent surface
Redundant filtering
Reinforcement Learning
Reliability
Reliability-Aware
Reliable routing
Replicator Dynamics
Request dispatch
ResNet
Resource allocation
Resource management
resource optimization
RFID
RFID Security
Ride-hailing system
Ring signcryption
Robust
Robust filter
Rounding technique
Route Convergence
Routing
Routing planning
Routing protocol
Runtime-reconfigurability
S
Sample Balanced
satellite position probability
SCA
Scenario marking
Scheduling
SCL algorithm
Secret Sharing
Secure Aggregation
Security
Security and Privacy
Self-attention
Self-recommendation
Self-supervised Learning
Sentence-Bert
Seq2Seq
Service customized networks
Service deployment
Service placement
Shamir threshold scheme
Side-channel attacks
Simulation Test
Skeletal Features
Smart contract
Smart grid
Smart grids
Smart Healthcare Systems
smart home
Smartphone
Social Interactions
Social Network
Software security entity
Sources Identification
Spatial Attention
Spatial crowdsourcing
Spatio-temporal features
spectral clustering
Spectral efficiency
Spreading influence
SRv6
Stackelberg game
Static analysis
Stochastic geometry
subcarrier index modulation (SIM)
Superframe structure
SYSTEMS
T
Target Detection
target selection
Task allocation
Task assignment
task dependency
Task matching
Task offloading
Task scheduling
Taxi Order Cancellation
tba
tba1
tba2
tba3
TCP-BBR
Temporal Convolution
Temporal Log Vectors
Thompson sampling
Thyroid Ultrasound Images
TI-LFA
Time sensitive network
Time Slot
Time utility function
Time-Sensitive Networking
Topology reconstruction
Traceable ring signature
Track Fusion
traffic analysis
Traffic classification
Traffic incident duration
Traffic Monitoring Services
Traffic Prediction
Training efficiency
Trajectory Heat map
Trajectory optimization
Trajectory prediction
Trajectory-based
Transaction latency
Transfer Learning
Transformer
Transformer,
Travel pattern mining
Trust evaluation system
Trust management
Trust metrics
Truth discovery
Type identification
U
UAV
UAV Ad Hoc Networks
UAV communications
UAV networks
UC-security
Ultrasonic Sensing
Ultrasonic signal
Unattended Wireless Sensor Networks
Underground self-positioning
Underwater acoustic (UWA) communication
Underwater Acoustic Sensor Networks
Underwater sensor networks
Unitary Operation
Unmanned aerial vehicle
Unmanned Aerial Vehicles
unsupervised learning
Urban Travel
User mobility
USV
V
VAE
VANET
VANETs
Vehicle clustering
Vehicle edge computing
vehicle re-identification
Vehicular edge computing
Vehicular networks
Vertical federated learning
Vision Transformer
Vulnerability analysis
Vulnerability detection
Vulnerability Identification
W
Weak Label Estimation
Wearable devices
WiFi backscatter
WiFi Fingerprint-based Localization
WIRELESS
wireless localization
wireless mobile ad hoc network
Wireless sensing
Wireless sensor network
Wireless Sensor Networks
Worker Selection
WSNs
Y
Yao's garbled circuits
Z
Zero-loss