


default search action
24th APNOMS 2023: Sejong, Korea
- 24st Asia-Pacific Network Operations and Management Symposium, APNOMS 2023, Sejong, Korea, Republic of, September 6-8, 2023. IEEE 2023, ISBN 978-89-950043-9-5

- Wei Kong, Qianjin Du, Huayang Cao, Hu Li, Tong Wang, Jianwen Tian, Xiaohui Kuang:

Test Suite Generation Based on Context-Adapted Structural Coverage for Testing DNN. 1-6 - Ming-Hsuan Tsai, Wei-Sheng Syu, Te-Chuan Chiu, Sheng Chen, Chia-Che Sa, Yuan-Yao Shih, Ai-Chun Pang:

Metalens: Federated Meta-Learning Ensemble Using Flexible Classifiers on Non-IID Data. 7-12 - Quang Hieu Vo, Choong Seon Hong:

Distribution Matching with Multi-formation Function for Dataset Distillation. 13-17 - Yu Qiao, Chaoning Zhang, Huy Q. Le, Avi Deb Raha, Apurba Adhikary, Choong Seon Hong:

Knowledge Distillation in Federated Learning: Where and How to Distill? 18-23 - Ferdous Sharifi, Ali Rasaii, Melika Honarmand, Shaahin Hessabi, Young Choon Lee:

Mobility-Aware Fog Offloading. 24-29 - Luyao Zou, Huy Q. Le, Avi Deb Raha, Dong Uk Kim, Choong Seon Hong:

EFCKD: Edge-Assisted Federated Contrastive Knowledge Distillation Approach for Energy Management: Energy Theft Perspective. 30-35 - Ye Zhang, Wei Zhang, Hao Hao, Kai Zhang:

Cluster Caching Strategy Based on User Characteristics in Edge Networks. 36-41 - Theodora Adufu, Yoonhee Kim:

Optimizing Performance Using GPU Cache Data Residency Based on Application's Access Patterns. 42-47 - Yueyang Li, Wenjun Fan, Ruxue Luo:

Machine Learning-based Approach for Enhancing Multi-step Attack Prediction. 48-53 - Lei Zhang, Lizhuang Tan, Huiling Shi, Hongyang Sun, Wei Zhang:

Malicious Traffic Classification for IoT based on Graph Attention Network and Long Short-Term Memory Network. 54-59 - Hongyang Sun, Huiling Shi, Lei Zhang, Lei Huang, Wei Zhang:

CA-STCNN: An Attention-based Hybrid Deep Learning Model for Encrypted Traffic Classification. 60-65 - Xiaojun Wu, Zhenghan Tang, Yaya Lu, Daolong Wu, Haitao Xiao, Yong Tang:

Cooperative Spectrum Sensing Method against Spectrum Sensing Data Falsification Attack. 66-70 - Heng He, Sen Yang, Xiaohu Zhou, Jia Wang:

SMWT: A Universal and Lightweight SDN-Based Meter Table Watermarking Traceback Scheme. 71-76 - Javier Jose Diaz Rivera, Muhammad Afaq, Wang-Cheol Song:

Blockchain and Intent-Based Networking: A Novel Approach to Secure and Accurate Network Policy Implementation. 77-82 - Hao Chen, Yili Jin, Weipeng Wang, Wei Liu, Lizhao You, Liqun Fu, Qiao Xiang:

When Configuration Verification Meets Machine Learning: A DRL Approach for Finding Minimum k-Link Failures. 83-88 - Issam Abdeldjalil Ikhelef, John Alasdair Warwicker, Steffen Rebennack, Mohand Yazid Saidi, Ken Chen:

Efficient Decomposition-Based Methods for Optimal VNF Placement and Chaining. 89-94 - Kexin Zhou, Xiangyu Bai, Xuemei He, Hui Zhao, Maoli Ran, Changxing Zhang:

Research on Fog Computing Offloading Mechanism for VANETs. 95-100 - Moin Ali, Young-Tak Kim:

Performance Enhancements of C-V2X Mode 4 with Virtual Cell and Resource Usage Bitmap. 101-106 - Zhenxu Gao, Wenjun Fan, Ruxue Luo:

QKD-based Secure Communication for UAV. 107-112 - Avi Deb Raha, Apurba Adhikary, Md. Shirajum Munir, Yu Qiao, Choong Seon Hong:

Segment Anything Model Aided Beam Prediction for the Millimeter Wave Communication. 113-118 - Tomofumi Kondo, Luis Guillen, Satoru Izumi, Toru Abe, Takaaki Mizuki, Takuo Suganuma:

An Energy Efficient SDN Controller Placement with Delay Constraints. 119-124 - Pang-Wei Tsai, Chao-Wei Lee, Ting-Wen Wang:

Design and Development of a Trust Mechanism to Enhance Security Protection on SDN-based IoT Network. 125-130 - Minji Choi, Heegon Kim, Jae-Hyoung Yoo, James Won-Ki Hong:

Network Traffic Prediction and Auto-Scaling of SFC using Temporal Fusion Transformer. 131-136 - Muthuraman Elangovan, Muhammad Shahid Iqbal, Chien Chen, Jyh-Cheng Chen:

Accelerating free5GC Data Plane Using Programmable Hardware. 137-142 - Nway Nway Ei, Kitae Kim, Yu Min Park, Choong Seon Hong:

Latency Minimization in Terrestrial-Non-Terrestrial Integrated Network: Joint Association and Bandwidth Allocation Framework. 143-147 - Tse-Han Wang, Min-Chih Hu, Li-Hsing Yen, Chien-Chao Tseng:

Heterogeneous UPF Integration Framework and 5G User Plane Acceleration. 148-153 - Yin-Hsin Liu, Bo-Chen Kung:

Energy Saving in 5G Cellular Networks using Machine Learning Based Cell Sleep Strategy. 154-159 - Changhoon Kang, Jongsoo Woo, James Won-Ki Hong:

Analyzing the Effect of Observer Node Addition Strategy on Bitcoin Double-Spending Attack Detection Using Graph Neural Network. 160-164 - Shuhao Yan, Shanshan Wang, Zhenxiang Chen, Xiaoqing Jiang, Xueyang Cao:

CSLog: Anomaly Detection for Syslog Based on Contrastive Self-Supervised Representation Learning. 165-170 - Minato Sakuraba, Junichi Kawasaki, Takuya Miyasaka, Atsushi Tagami:

An Anomaly Detection Approach by AIML in IP Networks with eBPF-Based Observability. 171-176 - Jiachen Wen, Ying Wang, Qianqian Zhang, Jingjing Chen, Xuesong Qiu:

Online Updating in Multicast Time-Sensitive Networking. 177-182 - Yi Jiang, Minghua Wang, Xingbin Wang:

A Efficient Adaptive Data Rate Algorithm in LoRaWAN Networks: K-ADR. 183-188 - Mengyu Wang, Shuyong Zhu, Yujun Zhang:

A Heuristic Online Algorithm for Routing in Large-Scale Deterministic Networks. 189-194 - Kyungchan Ko, Sangwoo Ryu, James Won-Ki Hong:

Enhancing QoE of WebRTC-based Video Conferencing using Deep Reinforcement Learning. 195-200 - Huy Q. Le, Yu Qiao, Loc X. Nguyen, Luyao Zou, Choong Seon Hong:

Federated Multimodal Learning for IoT Applications: A Contrastive Learning Approach. 201-206 - Ziyan Zhu, Minghua Wang, Wenbo Chen:

Energy-Efficient Geographic Routing with an Autonomous Mobile Sink Under Partial Coverage. 207-210 - Weigang Wang, Wei Jing, Sining Jiang:

SDRA: A Sensor Data Retrieval Architecture for the Heterogeneous IoT Node. 211-214 - Longfei Li, Haoyu Chen, Sungwoong Yeom, Shivani Sanjay Kolekar, Kyungbaek Kim:

Network State Prediction with Attention-Based Graph Convolutional Network. 215-218 - Jiayang Chen, Kien Nguyen, Hiroo Sekiya:

Seamless Integration of Wireless Interface to SDN Switch. 219-222 - Jingjing Chen, Ying Wang, Jiachen Wen, Qianqian Zhang, Xuesong Qiu:

An Efficient Local Search Algorithm for Traffic Engineering in Segment Routing Networks. 223-226 - Ui-Jun Baek, Min-Seong Lee, Jee-Tae Park, Jeong-Woo Choi, Chang-Yui Shin, Myung-Sup Kim:

Preprocessing and Analysis of an Open Dataset in Application Traffic Classification. 227-230 - Jia Liu, Wenjun Fan:

A Machine Learning-Based Intrusion Detection Approach for Intelligent Connected Vehicles. 231-234 - Pang-Chen Liu, Ping-Chang Tsai, Fei-Hua Kuo, Kou-Hsiang Lai:

Novel convergence of fixed-access and mobile network architectures with ultra-low latency multi-slicing. 235-238 - Mahnsuk Yoon, Jaeuk Kwon, Hyunjoo Lee, Kyucheol Cho, Jihun Seo, Jangkyu Yun:

Dynamic Selection Scheme of LTE-M and 5G for Efficient Maritime Communication Based on Traffic Volume. 239-242 - Apurba Adhikary, Avi Deb Raha, Yu Qiao, Md. Shirajum Munir, Ki Tae Kim, Choong Seon Hong:

Transformer-based Communication Resource Allocation for Holographic Beamforming: A Distributed Artificial Intelligence Framework. 243-246 - Yu-Hsien Huang, Pei-Chieh Sung, Yung-Chang Huang, Tsì-Uí Ik, Jiun-Long Huang:

Shot-By-Shot Technical Data Collection for Badminton Doubles Games. 247-250 - Jiwon Bang, Mi-Jung Choi:

Design of Personal Data Protection Decentralized Model Using Blockchain and IPFS. 251-254 - Jiahao Zeng, Feng Qi, Chang Liu, Qun Zhang, Zhili Wang:

Crowdsensing Data Trading Mechanism Based on Personalized Local Differential Privacy. 255-258 - Naoya Tahara, Senling Wang, Hiroshi Kai, Hiroshi Takahashi, Masakatu Morii:

QR-Code with Superimposed Text. 259-262 - Wei-Yi Hsieh, Hsun-Ching Tsai, Lu-An Chen, Tsì-Uí Ik:

Developing an Interview Recording System with Speaker Recognition and Emotion Classification. 267-270 - Shivani Sanjay Kolekar, Kyungbaek Kim:

Optimizing Cluster Head Placement in Federated Clustering: A Genetic Algorithm Approach. 271-274 - Misa Fukai, Masashi Tadokoro, Haruo Oishi, Ryo Uchida, Kimio Tsuchikawa:

Automation of Human Decision Making by Using Reinforcement-learning for Office Work with PC. 275-278 - Ki-Hyeon Kim, Woojin Seok, Jeonghoon Moon, Kwang Soo Kim, Joonyong Sim:

AI Research Platform for Agriculture Sector : Agriculture Sector Bigdata Management and AI Model Development Platform. 279-281 - Jiaqi Hao, Junfeng Zhao, Yuxian Li:

Research on Decompostion Method of Relational Database Oriented to Microservice Refactoring. 282-285 - Qian Chen, Xuan Wang, ZoeLin Jiang:

Efficient Cloud Computing Resource Management Strategy Based on Auction Mechanism. 286-289 - Jih-Wei Tsai, Chao-Chun Huang, Chen-Hung Chu, Gong-Da Fan:

The Smart Applications of ICT and IoT with AI Techniques in IMS Network. 290-293 - Yongzhe Yu, Shuang Wu, Sujie Shao, Jinqian Chen, Xingyu Chen:

A Multi-Agent Deep Reinforcement Learning based Cooperative Edge Data Caching Approach. 294-297 - Zihan Qin, Sujie Shao, Shaoyong Guo, Xuesong Qiu:

A Federated Learning Approach for Net Load Forecasting in Microgrids. 298-301 - Zhaoxi Zhong, Wenjun Fan:

A Honey-imprint enabled Approach for Resisting Social Engineering Attacks. 302-305 - Shunji Aoyagi, Jong-Deok Kim, Kien Nguyen, Hiroo Sekiya:

An Extensive Evaluation of TCP Congestion Control in 10 Gbps Network. 306-309 - Weiwei Zhu, Hua Wu, Jingwen Quan, Guang Cheng, Xiaoyan Hu:

Accurate Identification of Encrypted Videos in Asymmetric Routing Scenarios. 310-313 - Min-Seong Lee, Jee-Tae Park, Ui-Jun Baek, Chang-Yui Shin, Jeong-Woo Choi, Myung-Sup Kim:

Lightweight-Heavyweight Hybrid Approach for Application Traffic Classification. 314-317 - Jee-Tae Park, Ui-Jun Baek, Chang-Yui Shin, Min-Seong Lee, Jeong-Woo Choi, Myung-Sup Kim:

Network User Action Detection based on PSD Signature through Encrypted Traffic Analysis. 318-321 - Yuqiao Hou, Hongjia Li, Yuxiang Wang, Liming Wang, Zhen Xu:

Satellite Anomaly Detection based on Improved Transformer Method. 322-325 - Qianqian Zhang, Ying Wang, Tongyan Wei, Jiachen Wen, Jingjing Chen, Xuesong Qiu:

IoT Intrusion Detection Based on Personalized Federated Learning. 326-329 - Beom-Su Lee, Jong-Wouk Kim, Mi-Jung Choi:

Federated Learning Based Network Intrusion Detection Model. 330-333 - Puhe Hao, Tianyu Pan, Rui Han, Xiao Qu, Zhexuan Yang, Guozi Sun:

RPChain: Regulatable Privacy-Preserving Group Data Sharing Based on Consortium Blockchain. 334-337 - Seongbok Baik:

Detecting Digital Ad Fraud by Active Reinforcement Learning. 338-340 - Ping-Chang Tsai, Pang-Chen Liu, Fei-Hua Kuo, Kou-Hsiang Lai:

Coherent PON interconnect system with phase compensation. 341-344 - Peixin Liu, Xiangyu Bai, Zhaoran Wang:

Progress and Challenges of Polymorphic Smart Networks. 345-348 - Jiaxin Xu, Huiling Shi, Haoxiang Chu, Wei Zhang:

EeCA: A Novel Approach for Energy Conservation in MEC via NDN-Based Content Caching. 349-352 - Jiacong Li, Hang Lv, Bo Lei, Yunpeng Xie:

Modeling and Optimization for Computing Power Resource-Aware in CPN. 353-356 - Xinhang Wang, Lizhuang Tan, Wei Zhang:

enCBS: Delay Guarantee Mechanism based on Credit-based Shaping for Programmable Switch. 357-360 - Ryo Uchida, Misa Fukai, Taisuke Wakasugi, Kimio Tsuchikawa, Haruo Oishi:

Proposal of Annotation Method for RPA Scenario. 361-364 - Lirong Chen, Qiang Li:

The Effectiveness of Online Reputation Score under Silence Bias. 365-368 - Po-Kai Chuang, Hsiu-Fang Hu, Jian-Kai Huang, Chin-Cheng Hu, Ming-Hung Lee, Yu-Ping Yu, Kuo-Hsiang Lai:

Precision Time Transfer using ITU-T G.8275.1 over Optical Transport Network. 369-372 - Hong-Jie Chen, Yi-Cheng Chu, Che-Chun Teng, Chin-Ping Chuang, Min-Han Hung:

Ethernet VPN Provisioning Towards Slicing for 5G Transport Networks. 373-376 - Pin-Hua Wu, Tse-Han Fang, Wan-Chien Yang, Wei-Jie Huang:

Implementation of an OAM System for Multi-Vendor Open RAN Base Station. 377-380 - Ramneek, Patrick Hosein, Sangheon Pack:

Secure and Scalable eSIM Service Provisioning Framework for Mobile Virtual Network Operators. 381-384 - Kai-Mao Chang, Hsing-Chen Chi, Yu-Ping Yu, Kuo-Hsiang Lai:

Bandwidth Factor Computation Framework for Traffic Routing in 5G Networks. 385-388 - Yun-Jie Li, Jhao-Yin Li, Hao-Yu Kao, Yi-Lin Tsai:

An empirical study: Use autoencoder model to determine the abnormal data. 389-392 - Li-Hsuan Chu, Yen-Lin Tung, Yong-Zen Huang:

An All-Photonics Network Management System. 393-396 - Zhiqiang Fan, ZhenWei Wu, JianXin Lv, Peng Zhang, Yong Xiao:

Machine Learning Based Optical Transmission System Link Performance Degradation Prediction and Application. 397-400 - Yuhang Wu, Quan Chen, Lianglun Cheng:

Accelerating Non-Preemptive Multicast Flows in Reconfigurable Data Center Networks. 401-404 - Kuichao Zhang, Wei Su, Huiling Shi, Kai Zhang, Wei Zhang:

GrayINT - Detection and Localization of Gray Failures via Hybrid In-band Network Telemetry. 405-408 - Feng Jiang, Yongyang Cheng, Tao Zhang, Boqin Qin, Zhao Hui:

A Novel Equivalence Proof of Clock and Network Synchronization Model Towards Distributed Clouds. 409-412 - Aeri Kim, Meryam Essaid, Hongtaek Ju:

Survey on Blockchain P2P Network. 413-416

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














