


default search action
19th CCNC 2022: Las Vegas, NV, USA
- 19th IEEE Annual Consumer Communications & Networking Conference, CCNC 2022, Las Vegas, NV, USA, January 8-11, 2022. IEEE 2022, ISBN 978-1-6654-3161-3

- Mohammed A. Jasim

, Nazli Siasi, Nasir Ghani:
Efficient Load Migration Scheme for Fog Networks. 1-6 - Joar Blom Rydell, Oliver Otterlind, Ismail Butun:

Delay Considerations for Reliable Communications in LoRaWAN. 1-6 - Tobias Christian Piller, David Maria Merz, Abdelmajid Khelil

:
MQTT-4EST: RulE-basEd WEb Editor for Semantic-aware Topic Naming in MQTT. 1-8 - Michael Lagally, Michael McCool:

IoT Interoperability with W3C Web of Things. 1-5 - Leila Benarous

, Saadi Boudjit:
Security and Privacy Evaluation Methods and Metrics in Vehicular Networks. 1-6 - Mirko Franco

, Ombretta Gaggi, Claudio E. Palazzi:
Improving Sexting Safety through Media Forwarding Control. 1-6 - Nicholas Polosky, Tyler Gwin, Sean Furman, Parth Barhanpurkar, Jithin Jagannath:

Machine Learning Subsystem for Autonomous Collision Avoidance on a small UAS with Embedded GPU. 1-7 - Sharif Azem, Anam Tahir, Heinz Koeppl:

Dynamic Time Slot Allocation Algorithm for Quadcopter Swarms. 1-6 - Lisa Cesario

, Giovanni Delnevo
, Massimiliano Malavasi, Lorenzo Desideri, Silvia Mirri
:
On Designing a Mobile App to Support People with Cognitive Disabilities in Daily Activities. 1-6 - Sabarish Krishna Moorthy

, Chencheng Lu, Zhangyu Guan, Nicholas Mastronarde, George Sklivanitis, Dimitris Pados, Elizabeth Serena Bentley, Michael J. Medley:
CloudRAFT: A Cloud-based Framework for Remote Experimentation for Mobile Networks. 1-6 - Abhilash Kumar Pandey, Amrith Aathmaram, B. Sainath:

Hybrid RIS-assisted Cooperative Communication Model Design and Performance Analysis. 1-6 - Le-Hang Nguyen, Volker Braun, Hardy Halbauer, Thorsten Wild:

Waveform Comparison under Hardware Limitations for 6G Sub-THz Communications. 1-6 - Zakaria Laaroussi, Elif Ustundag Soykan, Michael Liljenstam, Utku Gülen, Leyli Karaçay, Emrah Tomur:

On the security of 6G use cases: Threat Analysis of 'All-Senses Meeting'. 1-6 - Xin Wang, Juan M. Calderón, Navid Khoshavi, Luis Gabriel Jaimes:

Path and Floor Detection in Outdoor Environments for Fall Prevention of the Visually Impaired Population. 1-6 - Roberto Bomfin, Ahmad Nimr, Gerhard P. Fettweis:

A Study on Iterative Equalization for DFTs-OFDM Waveform under sub-THz Channels. 1-6 - Fabio Pittarello:

Designing Interactive Systems for Seniors: Living on an Island. 1-6 - Christian Esposito, Giancarlo Sperlì, Vincenzo Moscato, Zhongliang Zhao:

On Attacks To Federated Learning and a Blockchain-empowered Protection. 1-6 - Miguel Camelo, Luca Cominardi, Marco Gramaglia, Marco Fiore, Andres Garcia-Saavedra, Lidia Fuentes, Danny De Vleeschauwer

, Paola Soto-Arenas, Nina Slamnik-Krijestorac, Joaquín Ballesteros, Chia-Yu Chang, Gabriele Baldoni, Johann M. Márquez-Barja
, Peter Hellinckx
, Steven Latré:
Requirements and Specifications for the Orchestration of Network Intelligence in 6G. 1-9 - Bini Angui, Romuald Corbel, Verónica Quintuna Rodriguez, Emile Stephan:

Towards 6G zero touch networks: The case of automated Cloud-RAN deployments. 1-6 - Marianna Di Gregorio, Marco Romano

, Monica Sebillo, Giuliana Vitiello
:
Dyslexeasy-App to Improve Readability through the Extracted Summary for Dyslexic Users. 1-6 - Minxiao Wang

, Ning Yang
:
OTA-NN: Observational Therapy-Assistance Neural Network for Enhancing Autism Intervention Quality. 1-7 - Johannes Mey, Sebastian Ebert, Tianfang Lin, Giang T. Nguyen

, Stefan Gumhold, Uwe Aßmann
:
Teaching Distributed and Heterogeneous Robotic Cells. 1-2 - Sayed Amir Hoseini

, Fayçal Bouhafs, Frank T. H. den Hartog:
A Practical Implementation of Physical Layer Security in Wireless Networks. 1-4 - Peyman Neshaastegaran, Ming Jian:

Performance Evaluation of Orbital Angular Momentum Mode Multiplexing Systems Impaired by Phase Noise. 1-6 - Miguel Carvalhosa, João Almeida

, Paulo C. Bartolomeu
, Joaquim Ferreira
:
Multipurpose Sensing Platform for Improved Road Safety. 1-7 - Chiara Bonsignori, Carlo Puliafito, Antonio Virdis, Enzo Mingozzi, Giuseppe Iannaccone:

Integrating Mobile IoT Devices into the Arrowhead Framework Using Web of Things. 1-6 - Anousheh Gholami, Nariman Torkzaban, John S. Baras:

Trusted Decentralized Federated Learning. 1-6 - Dener Ottolini, Ivan D. Zyrianoff

, Carlos Kamienski:
Interoperability and Scalability Trade-offs in Open IoT Platforms. 1-6 - Sourabha Bharadwaj

, Karunakar Gonabathula, Sudipta Saha, Chayan Sarkar, Rekha Raja:
Concurrent Transmission for Multi-Robot Coordination. 1-6 - Chantal Lengua, Vincenzo Rubano, Fabio Vitali:

Aligning accessibility design to non-disabled people's perceptions. 1-6 - Toon Bogaerts, Sylvain Watelet, Chris Thoen, Tom Coopman, Joris Van den Bergh

, Maarten Reyniers
, Dirck Seynaeve, Wim Casteels, Steven Latré, Peter Hellinckx
:
Enhancement of road weather services using vehicle sensor data. 1-6 - Minoo Hosseinzadeh, Nathaniel Hudson

, Sam Heshmati, Hana Khamfroush:
Communication-Loss Trade-Off in Federated Learning: A Distributed Client Selection Algorithm. 1-6 - Ansa Shermin S

, Sarang C. Dhongdi:
Multiple AUVs for Ocean Phenomena Monitoring: A Review. 1-7 - Nuno Faria

, Daniel Costa, José Pereira
, Ricardo Vilaça
, Luis Meruje Ferreira, Fábio Coelho
:
AIDA-DB: A Data Management Architecture for the Edge and Cloud Continuum. 1-6 - Giovanni Delnevo

, Luca Deluigi, Davide Evangelisti, Simone Magnani:
On increasing password security awareness using a serious game. 82-87 - Giovanni Delnevo

, Chiara Ceccarini, Paola Salomoni, Catia Prandi:
Gamification of a University-level Web Technologies course: a five years experience. 88-93 - Seohyang Kim, Seungyoung Shin, Joonseok Moon:

UDP-based Extremely Low Latency Streaming. 94-99 - Youssef A. Youssef, John Tadrous, Sameh Hosny, Mohammed Nafie:

Joint Content Valuations and Proactive Caching for Content Distribution Networks. 100-105 - Tadeus Prastowo

, Ayub Shah, Luigi Palopoli, Roberto Passerone, Giuseppe Piro:
Migration-Aware Optimized Resource Allocation in B5G Edge Networks. 106-113 - Kiranpreet Kaur, Fabrice Guillemin

, Verónica Quintuna Rodriguez, Françoise Sailhan:
Latency and network aware placement for cloud-native 5G/6G services. 114-119 - Po-Hao Huang, Fu-Cheng Hsieh, Wen-Jen Hsieh, Chi-Yu Li

, Ying-Dar Lin:
Prioritized Traffic Shaping for Low-latency MEC Flows in MEC-enabled Cellular Networks. 120-125 - Gayan Dilanka, Lakshan Viranga, Rajitha Pamudith, Tharindu D. Gamage, Pasika Ranaweera

, Indika A. M. Balapuwaduge, Madhusanka Liyanage
:
A Novel Request Handler Algorithm for Multi-access Edge Computing Platforms in 5G. 126-131 - Pinhan Zhao

, Benjamin Peters, Jae Chung, Mark Claypool:
Competing TCP Congestion Control Algorithms over a Satellite Network. 132-138 - Takamochi Kanda, Yusuke Koda, Koji Yamamoto, Takayuki Nishio:

ACK-Less Rate Adaptation for IEEE 802.11bc Enhanced Broadcast Services Using Sim-to-Real Deep Reinforcement Learning. 139-143 - Yunzhi Li

, Rajeswari Hita Kambhamettu, Yidan Hu
, Rui Zhang:
ImPos: An Image-Based Indoor Positioning System. 144-150 - Sangkyu Baek, Anil Agiwal, Jaehyuk Jang:

De-prioritization Impact of LCH-based Prioritization for Industrial Internet of Things in 3GPP NR. 151-156 - Frank Engelhardt

, Sophie Herbrechtsmeyer, Mesut Günes:
Kinesthetic Coding Based on the Fast Wavelet Transform for Remote-Controlling a Quadrotor Drone. 157-162 - Yuwei Long, Nan Cen:

Sum-Rate Optimization for Visible-Light-Band UAV Networks Based on Particle Swarm Optimization. 163-168 - Hiroyuki Asano

, Hiraku Okada, Chedlia Ben Naila
, Masaaki Katayama:
A UAV Flight Method for Non-Uniform User Distributions in Aerial Wireless Relay Networks. 169-174 - Tao Yu, Kiyomichi Araki, Kei Sakaguchi:

Full-Duplex Aerial Communication System for Multiple UAVs with Directional Antennas. 175-180 - Masayasu Harada, Shintaro Izumi, Ryosuke Kozeni, Yukiko Yoshikawa, Toru Ishii, Hiroshi Kawaguchi

, Shohei Uemura, Kaname Araki:
20-µs Accuracy Time-Synchronization Method using Bluetooth Low Energy for Internet-of-Things Sensors. 181-186 - Vahid Maleki Raee

, Amin Ebrahimzadeh, Marsa Rayani
, Roch H. Glitho, May El Barachi
, Fatna Belqasmi:
Energy Efficient Virtual Network Embedding in Virtualized Wireless Sensor Networks. 187-192 - Leonardo Montecchiari

, Angelo Trotta, Luciano Bononi
, Marco Di Felice:
Bluetooth Mesh Technology for the Joint Monitoring of Indoor Environments and Mobile Device Localization: A Performance Study. 193-199 - Eric Samikwa

, Antonio Di Maio
, Torsten Braun
:
Adaptive Early Exit of Computation for Energy-Efficient and Low-Latency Machine Learning over IoT Networks. 200-206 - Omar Houidi

, Djamal Zeghlache, Victor Perrier, Pham Tran Anh Quang, Nicolas Huin, Jérémie Leguay, Paolo Medagliani:
Constrained Deep Reinforcement Learning for Smart Load Balancing. 207-215 - Babatunji Omoniwa, Boris Galkin, Ivana Dusparic:

Energy-aware optimization of UAV base stations placement via decentralized multi-agent Q-learning. 216-222 - Mariam M. N. Aboelwafa, Ghada Alsuhli

, Karim Banawan
, Karim G. Seddik:
Self-Optimization of Cellular Networks Using Deep Reinforcement Learning with Hybrid Action Space. 223-229 - Zhitao Yu, Jian Zhang, Shiwen Mao, Senthilkumar C. G. Periaswamy, Justin Patton:

RIRL: A Recurrent Imitation and Reinforcement Learning Method for Long-Horizon Robotic Tasks. 230-235 - Curtis R. Taylor

, Jason M. Carter, Shean Huff, Eric Nafziger, Jackeline Rios-Torres, Bob Zhang
, Joseph Turcotte:
Evaluating Efficiency and Security of Connected and Autonomous Vehicle Applications. 236-239 - K. Nimmy, Sriram Sankaran, Krishnashree Achuthan, Prasad Calyam:

Securing Remote User Authentication in Industrial Internet of Things. 244-247 - Subir Halder, Thomas Newe

:
SmartCrypt: Secure Storing and Sharing of Time Series Data Streams in IIoT. 248-251 - Yesin Sahraoui, Chaker Abdelaziz Kerrache, Ahmed Korichi, Anna Maria Vegni, Marica Amadeo

:
LearnPhi: a Real-Time Learning Model for Early Prediction of Phishing Attacks in IoV. 252-255 - Adam Duby, Teryl Taylor, Yanyan Zhuang:

Malware Family Classification via Residual Prefetch Artifacts. 256-259 - Mehdi Haghshenas

, Maurizio Magarini:
NR-U and Wi-Fi Coexistence Enhancement Exploiting Multiple Bandwidth Parts Assignment. 260-263 - Johann M. Márquez-Barja

, Dries Naudts, Vasilis Maglogiannis, Seilendria A. Hadiwardoyo, Ingrid Moerman, Matthijs Klepper, Geerd Kakes, Xiangyu Lian, Wim Vandenberghe, Rakshith Kusumakar, Joost Vandenbossche:
Designing a 5G architecture to overcome the challenges of the teleoperated transport and logistics. 264-267 - Henrique Cesar Carvalho de Resende, João Francisco Nunes Pinheiro, Philippe Reiter, Cristiano Bonato Both

, Johann M. Márquez-Barja
:
4G/5G performance of a multi-RAT UAV for medical parcel delivery. 268-271 - Yao Ma, Susanna Mosleh

, Jason B. Coder:
Analyzing 5G NR-U and WiGig Coexistence with Multiple-Beam Directional LBT. 272-275 - Shalitha Wijethilaka, Pawani Porambage, Chamitha de Alwis

, Madhusanka Liyanage
:
A Comprehensive Analysis on Network Slicing for Smart Hospital Applications. 276-279 - Irene Vilà

, Jordi Pérez-Romero, Oriol Sallent, Anna Umbert:
Impact Analysis of Training in Deep Reinforcement Learning-based Radio Access Network Slicing. 280-283 - Bilal Moussa Fares, Pietro Manzoni, Johann M. Márquez-Barja

, Juan-Carlos Cano, Carlos T. Calafate:
A non-invasive social monitoring application for danger situations based on a edge-based Machine Learning solution. 284-289 - Michael Bosello

, Rita Tse, Giovanni Pau
:
Train in Austria, Race in Montecarlo: Generalized RL for Cross-Track F1tenth LIDAR-Based Races. 290-298 - Xuebing Li, Byungjin Cho, Yu Xiao

:
Balancing Latency and Accuracy on Deep Video Analytics at the Edge. 299-306 - Silvia Corpino, Silvia Mirri

, Mariella Sole, Daniele D. Giusto, Giovanni Pau
, Roberto Girau:
On implementing socialization algorithms on Virtual Objects in the Social IoT. 307-312 - Pablo Gil Pereira, Thorsten Herfet:

Polar Coding for Efficient Transport Layer Multicast. 313-318 - Minoo Hosseinzadeh, Andrew Wachal, Hana Khamfroush, Daniel E. Lucani:

QoS-Aware Priority-Based Task Offloading for Deep Learning Services at the Edge. 319-325 - Rushang Gupta, Varun Gupta, Akash Kumar Mandal, Swades De:

Learning-based Multivariate Real-Time Data Pruning for Smart PMU Communication. 326-331 - Ijaz Ahmad

, Sergio Lembo, Felipe Rodriguez, Stephan Mehnert, Mikko Vehkaperä
:
Security of Micro MEC in 6G: A Brief Overview. 332-337 - Jörg von Mankowski, Hansini Vijayaraghavan

, Alberto Martínez Alba, Leonardo Goratti, Wolfgang Kellerer
:
Towards the Optimal Pattern of Joint Beamforming, User Scheduling and Power Allocation in a multi-RAT Network. 338-345 - Guanyu Chen, Tse-Tin Chan

, Haoyuan Pan, Jiaxin Liang:
DNN-aided Low-complexity Physical-layer Network Coding Enabled Non-orthogonal Multiple Access. 346-351 - Ryosuke Hanahara, Sohei Itahara, Kota Yamashita, Yusuke Koda, Akihito Taya, Takayuki Nishio, Koji Yamamoto:

Frame-Capture-Based CSI Recomposition Pertaining to Firmware-Agnostic WiFi Sensing. 352-356 - Yukito Onodera, Yu Nakayama, Hiroki Takano, Daisuke Hisano:

Drone Positioning for Visible Light Communication with Drone-Mounted LED and Camera. 357-362 - Imtiaz Ullah, Qusay H. Mahmoud:

An Anomaly Detection Model for IoT Networks based on Flow and Flag Features using a Feed-Forward Neural Network. 363-368 - Heather Lawrence, Uchenna Ezeobi, Gedare Bloom, Yanyan Zhuang:

Shining New Light on Useful Features for Network Intrusion Detection Algorithms. 369-377 - Md. Hasan Tarek

, Md. Mumtahin Habib Ullah Mazumder
, Sadia Sharmin, Md. Shariful Islam, Mohammad Shoyaib, Muhammad Mahbub Alam:
RHC: Cluster based Feature Reduction for Network Intrusion Detections. 378-384 - Mnassar Alyami, Ibrahim Alharbi, Cliff C. Zou, Yan Solihin, Karl Ackerman:

WiFi-based IoT Devices Profiling Attack based on Eavesdropping of Encrypted WiFi Traffic. 385-392 - Ryo Yaegashi, Yu Nakayama, Moe Matsuki, Ryoma Yasunaga, Marie Katsurai:

First Experimental Results on Real-Time Cleaning Activity Monitoring System. 393-398 - Kaneez Fizza

, Prem Prakash Jayaraman
, Abhik Banerjee
, Dimitrios Georgakopoulos
, Rajiv Ranjan:
Age of Data Aware Internet of Things Applications. 399-404 - Luca Bedogni, Francesco Poggi

:
A Web Of Things Context-Aware IoT System leveraging Q-learning. 405-410 - Federico Montori, Vincenzo Armandi, Luca Bedogni:

A Hierarchical Architectural Model for IoT End-User Service Composition. 411-416 - Paulo C. Bartolomeu

, Joana Bernardino, Joaquim Ferreira
:
Decentralized Ad-Hoc Seaport Truck Authentication. 417-420 - Kalkidan Gebru:

A Privacy-preserving Scheme for Passive Monitoring of People's Flows through WiFi Beacons. 421-424 - Sajal Saha, Annita Tahsin Priyoti, Aakriti Sharma, Anwar Haque

:
Towards an Optimal Feature Selection Method for AI-Based DDoS Detection System. 425-428 - Md Ali Reza Al Amin, Peter Foytik, Sachin Shetty

, Jessica Dorismond, Marco A. Gamarra:
Deception for Characterizing Adversarial Strategies in Complex Networked Systems. 429-432 - Munkenyi Mukhandi

, Francisco Damião, Jorge Granjal, João P. Vilela:
Blockchain-based Device Identity Management with Consensus Authentication for IoT Devices. 433-436 - Nina Slamnik-Krijestorac, Miguel Camelo Botero, Luca Cominardi, Steven Latré, Johann M. Márquez-Barja

:
Building Realistic Experimentation Environments for AI-enhanced Management and Orchestration (MANO) of 5G and beyond V2X systems. 437-440 - John A. Snoap, Dimitrie C. Popescu, Chad M. Spooner:

On Deep Learning Classification of Digitally Modulated Signals Using Raw I/Q Data. 441-444 - Mahmoud Badi, N. Cameron Matson

, Dinesh Rajan, Joseph Camp:
Leveraging UAV Rotation To Increase Phase Coherency in Distributed Transmit Beamforming. 445-448 - Mohammad Nazmus Sadat

, Erwin Vargas-Alfonso
, Rui Dai:
Quality-Aware Video Analytics in Edge Computing Environments. 449-452 - Alexis Falempin, Rafik Zayani, Jean-Baptiste Doré, Emilio Calvanese Strinati:

Low-Complexity Adaptive Digital Pre-Distortion with Meta-Learning based Neural Networks. 453 - Michael R. Jones

, Soufiene Djahel
, Kristopher Welsh:
MQTPP - Towards Multiple Q-Table based Path Planning in UAV Environments. 457-460 - Peter Sossalla, Justus Rischke, Giang T. Nguyen

, Frank H. P. Fitzek
:
Offloading Robot Control with 5G. 461-464 - Koichi Nihei, Natsuki Kai, Yuki Maruyama, Toshiaki Yamashita, Dai Kanetomo, Takako Kitahara, Masaaki Maruyama, Takashi Ohki, Kitso Kusin

, Hendrik Segah:
Forest Fire Surveillance using Live Video Streaming from UAV via Multiple LTE Networks. 465-468 - Hongzhi Guo, Clifford Boakye-Mensah:

Distributed Trajectory Design for Underwater Multi-Robot Relay Networks. 469-472 - Yung-Chuan Wu, Hong-Rong Chang, Meng-Shou Wu, Chi-Yu Li

, Kuochen Wang:
UAV-FAP: User Fairness-Driven Access Point on UAV for Wi-Fi Networks. 473-476 - Christian Esposito, Gianluca Rizzo:

Help From Above: UAV-Empowered Network Resiliency in Post-Disaster Scenarios. 477-480 - Hyungbin Park, TaeYoung Kim, Younghwan Jin, SuKyoung Lee:

IoT Edge Orchestration for Distributed DNN Service with Containerized Resource Allocation. 483-484 - Ahmed Osama Basil

, Mu Mu, Ali Al-Sherbaz:
Novel Quality of Experience Experimentation Framework Through Programmable Network Management. 485-486 - Muzzafer Ali, Suchetana Chakraborty:

Enabling video conferencing in low bandwidth. 487-488 - Gurjashan Singh Pannu, Stephan Dunkel, Seyhan Ucar, Takamasa Higuchi, Onur Altintas, Falko Dressler:

Improving Data Consistency in Vehicular Micro Clouds. 489-490 - Akio Kawabata, Bijoy Chand Chatterjee, Eiji Oki:

An Optimistic Synchronization Based Server Selection Scheme with Successive Participation. 491-492 - Youssef Sellami

, Ghada Jaber, Ahmed Lounis
:
Distributed Fog-based Caching Solution for Content-Centric Networking in IoT. 493-494 - Vladimir Marbukh:

Towards Risk Adjusted Wireless Access under Jamming: Reliability through Multi-Connectivity. 495-496 - Sana Ben Aissa, Asma Ben Letaifa, Abderrahim Sahli

, Abderrezak Rachedi:
Computing offloading and load balancing within UAV clusters. 497-498 - Keigo Kono, Takehiro Sato, Eiji Oki:

Gradual Control Method for Program File Placement in Hierarchical Cloud-Edge Platform. 499-500 - Lokesh Bommisetty, Venkatesh Tiruchirai Gopalakrishnan:

Phasic Policy Gradient Based Resource Allocation for Industrial Internet of Things. 501-502 - Aziz Kord, Jason B. Coder, Aric Sanders:

Empirical Differences in LTE Open- and Closed-Loop Power Control. 503-504 - Yuhei Kawakami, Hideo Kawata, Takahiro Kubo, Natsuki Yasuhara, Shinichi Yoshihara, Tomoaki Yoshida:

Applying Time-aware Shaper Considering User Identifier to Service Provider Network. 505-506 - Zixuan Guo, Jiang Liu, Shigeru Shimamoto:

Radio and Power over Double Clad Fiber System for 4K/8K Satellite Broadcasting. 507-508 - Jessica Vazquez-Estrada, Suman Bhunia

, Mahmudur Khan, Yicheng Qian, Nero Tran Huu:
Neighbor Discovery in a Multi-Transceiver Free-Space-Optical Ad Hoc Network. 509-510 - Changyoung An, Hyeong Min Kwon, Heung-Gyoon Ryu:

Ambient Backscatter Communication System Utilizing Multicarrier Signal. 511-512 - Suyong Eum, Shin'ichi Arakawa, Masayuki Murata:

Generalization of probabilistic scheduling models for realizing URLLC applications. 513-514 - Metasebia D. Gemeda, Min S. Han, Ameha T. Abebe, Chung Gu Kang:

Deep Learning Transceiver for Terahertz Band Communication System with 1-bit ADC and Oversampling. 515-516 - Chihyeh Chen, Megumi Saito, Shigeru Shimamoto:

Signal Propagation Through the Inside of Robot Leg for Non-wired Robot System. 517-518 - Sehwan Choi, Chae-Hun Im, Chungyong Lee:

Robust First Path Detection Based on Two-Stage CNN for Unspecified UWB Pulse Shape. 519-520 - Mattia Giovanni Spina, Gerardo Mario Marotta, Stefano Gualtieri, Floriano De Rango:

Topic Load Balancing in a multi IoT Gateways Scenario under Publish/Subscribe Paradigm. 521-522 - Ons Aouedi

, Kandaraj Piamrat, Guillaume Muller, Kamal Deep Singh:
FLUIDS: Federated Learning with semi-supervised approach for Intrusion Detection System. 523-524 - Ting Gu, Kiho Lim, Gyu Ho Choi, Xiwei Wang:

A Lidar Information-based Privacy-Preserving Authentication Scheme Using Elliptic Curve Cryptosystem in VANETs. 525-526 - Ofek Bader, Adi Lichy, Chen Hajaj

, Ran Dubin, Amit Dvir:
MalDIST: From Encrypted Traffic Classification to Malware Traffic Detection and Classification. 527-533 - Aaron Walker

, Raj Mani Shukla, Tapadhir Das
, Shamik Sengupta:
Ohana Means Family: Malware Family Classification using Extreme Learning Machines. 534-542 - Ahmed H. Anwar

, Charles A. Kamhoua:
Cyber Deception using Honeypot Allocation and Diversity: A Game Theoretic Approach. 543-549 - Abdulaziz Alshaeri, Mohamed F. Younis:

Lightweight Authentication and Authorization Protocol for Dynamic Charging of Electric Vehicles. 550-556 - Ryan Holder, Ramesh Kumar Sah, Michael Cleveland, Hassan Ghasemzadeh:

Comparing the Predictability of Sensor Modalities to Detect Stress from Wearable Sensor Data. 557-562 - Rajpreet Kaur Gulati, Sayemul Islam, Amitangshu Pal, Krishna Kant, Albert Kim

:
Characterization of Magnetic Communication Through Human Body. 563-568 - Akira Miyazawa, Tran Phuong Thao, Rie Shigetomi Yamaguchi:

Multi-factor Behavioral Authentication Using Correlations Enhanced by Neural Network-based Score Fusion. 569-577 - Raiful Hasan, Ragib Hasan

:
X-Fidence: Post-Pandemic Wellness By Density Monitoring with Privacy Preservation. 578-583 - Huiye Liu, Douglas M. Blough:

Cooperative Task-Oriented Group Formation for Vehicular Networks. 584-592 - Seyhan Ucar, Takamasa Higuchi, Chang-Heng Wang, Duncan Deveaux, Onur Altintas, Jérôme Härri:

Vehicular Knowledge Networking and Mobility-Aware Smart Knowledge Placement. 593-598 - Yue Yin, Tao Yu, Kei Sakaguchi:

Required-Data-Rate-Based Distributed Resource Allocation Scheme for MmWave V2V with Relay. 599-604 - Adam Dean, Brennan Huber, Farah I. Kandah

:
Mitigating Location-based Attacks Using Predication Models in Vehicular Ad-Hoc Networks. 605-610 - Dheeraj Kotagiri, Anan Sawabe, Eiji Takahashi, Takanori Iwai, Takeo Onishi, Yoshiaki Nishikawa:

Context-based Mixed-Numerology Profile Selection for 5G and Beyond. 611-616 - Hao Zhou, Melike Erol-Kantarci:

Knowledge Transfer based Radio and Computation Resource Allocation for 5G RAN Slicing. 617-623 - Tobias Sundqvist, Monowar Bhuyan, Erik Elmroth:

Unsupervised root-cause identification of software bugs in 5G RAN. 624-630 - Mohamed Sana, Emilio Calvanese Strinati:

Learning Semantics: An Opportunity for Effective 6G Communications. 631-636 - Ali Esmaeily, Katina Kralevska

, Toktam Mahmoodi:
Slicing Scheduling for Supporting Critical Traffic in Beyond 5G. 637-643 - Van Sy Mai, Richard J. La, Tao Zhang, Abdella Battou:

End-to-End Quality-of-Service Assurance with Autonomous Systems: 5G/6G Case Study. 644-651 - Fidan Mehmeti, Thomas F. La Porta:

Modeling and Analysis of mMTC Traffic in 5G Base Stations. 652-660 - Priyangshu Sen

, Viduneth Ariyarathna, Josep Miquel Jornet:
An Optimized M-ary Amplitude Phase Shift Keying Scheme for Ultrabroadband Terahertz Communication. 661-666 - Yuichi Inagaki, Ryoichi Shinkuma, Takehiro Sato, Eiji Oki:

Data Importance Aware Periodic Machine Learning Model Update for Sparse Mobile Crowdsensing. 667-670 - Mirko Franco

, Pietro Giacomazzi, Claudio E. Palazzi:
A Mobile App to Pin Media to the Real World. 671-674 - Masaki Inoue, Suhua Tang, Sadao Obana:

LSTM-Based High Precision Pedestrian Positioning. 675-678 - Tohru Kondo, Hiroki Murakami, Kaori Maeda:

Development of a window positioning method considering network characteristics for a mobile tiled display. 679-682 - Kamran Sayrafian

, Brian Cloteaux
, Vladimir Marbukh, Christian Emiyah:
Evaluation of the Bluetooth-based Proximity Estimation for Automatic Exposure Determination. 683-686 - Andrea Piras, Silvia Mirri

, Mariella Sole, Daniele D. Giusto, Giovanni Pau
, Roberto Girau:
Implementation of a sea monitoring system based on social internet of things. 687-690 - Maria Francesca Alati, Giancarlo Fortino, Juan Morales-García

, José M. Cecilia, Pietro Manzoni:
Time series analysis for temperature forecasting using TinyML. 691-694 - Daniele Ronzani

, Claudio E. Palazzi, Pietro Manzoni:
Bringing MQTT Brokers to the Edge: A Preliminary Evaluation. 695-698 - Lorenzo Gigli

, Luca Sciullo, Federico Montori, Alessandro Marzani
, Marco Di Felice:
Blockchain and Web of Things for Structural Health Monitoring Applications: A Proof of Concept. 699-702 - Jack Hodgkiss, Soufiene Djahel

:
MARS - Towards Mobile Assisted RSSI Secret Key Extraction Strategy in WBANs. 703-706 - Alessandro Ghibellini

, Luciano Bononi
, Marco Di Felice:
Intelligence at the IoT Edge: Activity Recognition with Low-Power Microcontrollers and Convolutional Neural Networks. 707-710 - Jianyu Wang, Jianli Pan:

MBM-IoT: Intelligent Multi-Baseline Modeling of Heterogeneous Device Behaviors against IoT Botnet. 711-712 - Mehrdad Hajizadeh, Milad Abbaszadeh Jahromi, Thomas Bauschert:

An Unsupervised Ensemble Learning Approach for Novelty-based Botnet Detectors. 713-714 - David Reddick, F. Alex Feltus, Susmit Shannigrahi:

Case Study of Attribute Based Access Control for Genomics Data Using Named Data Networking. 715-716 - Tatsuya Ueki, Kazutoshi Yoshii

, Shigeru Shimamoto, Katsunari Mizuno, Kenta Matsufuji:
Evaluation of Impact of Intermediate GPS Spoofing to Mobile Terminals. 717-718 - A. B. M. Mohaimenur Rahman

, Yetong Cao, Xinliang Wei, Pu Wang
, Fan Li, Yu Wang:
On the Feasibility of Handwritten Signature Authentication Using PPG Sensor. 719-720 - Tekkan Okuda, Hiraku Okada, Hiroki Tanaka, Toshihiro Fujiwara, Nobuo Matsui, Chedlia Ben Naila

, Masaaki Katayama:
Propagation Characteristics of 920 MHz band LPWA for Inspections of Power Transmission Lines Using UAVs. 721-722 - Chaima Zoghlami, Rahim Kacimi, Riadh Dhaou:

A Study on Dynamic Collection of Cooperative Awareness Messages in V2X Safety Applications. 723-724 - Abdellah Kaci, Abderrezak Rachedi:

RoofCoin: a blockchain for internet of vehicles based on the ROOF standard and VSN. 725-726 - Meroua Moussaoui, Rachedi Abdennour, Toufik Ahmed, Mohamed Mosbah:

A RAN Slicing Architecture for ITS-G5 Cooperative Intelligent Transport System. 727-728 - Mohammad Aminul Hoque, Md. Mahmud Hossain, Ragib Hasan

:
BenchAV: A Security Benchmarking Framework for Autonomous Driving. 729-730 - Mohammad Aminul Hoque, Ragib Hasan

:
An Interaction Provenance-based Trust Management Scheme For Connected Vehicles. 731-732 - Calvin Davis, Jaired Collins, Joshua Fraser

, Haoxiang Zhang, Shizeng Yao, Emily Lattanzio, Bimal Balakrishnan, Ye Duan
, Prasad Calyam, Kannappan Palaniappan:
CAVE-VR and Unity Game Engine for Visualizing City Scale 3D Meshes. 733-734 - Kevin Hoarau, Pierre-Ugo Tournoux, Tahiry Razafindralambo

:
Detecting forged AS paths from BGP graph features using Recurrent Neural Networks. 735-736 - Yuta Kakizaki, Koya Sato, Keiichi Iwamura:

Performance of Federated Learning with Local Differential Privacy: Federation or Individualƒ. 737-738 - Masakazu Okamoto, Koya Sato, Keiichi Iwamura:

A Decentralized Machine Learning Scheme with Input Perturbation-Based Differential Privacy. 739-740 - Talip Tolga Sari

, Gökhan Seçinti:
CentAir: Centrality Based Cross Layer Routing for Software-Defined Aerial Networks. 741-742 - Yuwei Sun, Hideya Ochiai, Hiroshi Esaki:

Suspicious ARP Activity Detection and Clustering Based on Autoencoder Neural Networks. 743-744 - Paul Cotae

, Myong H. Kang, Alexander Velazquez
:
A Scalable Real-Time Distributed Multiagent Decision Making Algorithm with Cost. 745-746 - Marco Bertolusso, Michele Spanu, Vlad Popescu

, Mauro Fadda, Daniele D. Giusto:
Machine Learning-based Urban Mobility Monitoring System. 747-748 - Rakshitha De Silva, Yushan Siriwardhana, Tharaka Samarasinghe

, Madhusanka Liyanage
, Mika Ylianttila:
Deployment Options of 5G Network Slicing for Smart Healthcare. 749-750 - Tomoki Sugiura, Keichi Takahashi, Kohei Ichikawa

, Hajimu Iida:
Acar: An application-aware network routing system using SRv6. 751-752 - Eranga Bandara, Sachin Shetty

, Abdul Rahman, Ravi Mukkamala, Juan Zhao, Xueping Liang:
Bassa-ML - A Blockchain and Model Card Integrated Federated Learning Provenance Platform. 753-759 - Vijay Banerjee, Ryan Rabinowitz, Mark Stidd, Rory A. Lewis, Philip N. Brown, Gedare Bloom:

The Tragedy of the Miners. 760-765 - Sayon Duttagupta

, Dave Singelée
, Bart Preneel:
T-HIBE: A Novel Key Establishment Solution for Decentralized, Multi-Tenant IoT Systems. 766-774 - Wassila Lalouani, Mohamed F. Younis, Mohammad Ebrahimabadi, Naghmeh Karimi:

Robust and Efficient Data Security Solution for Pervasive Data Sharing in IoT. 775-781 - Nikita Jalodia, Mohit Taneja, Alan Davy, Behnam Dezfouli:

A Residual LSTM based Multi-Label Classification Framework for Proactive SLA Management in a Latency Critical NFV Application Use-Case. 782-789 - Bao Nguyen Trinh, Gabriel-Miro Muntean:

A Deep Reinforcement Learning-based Resource Management Scheme for SDN-MEC-supported XR Applications. 790-795 - Pedro Enrique Iturria-Rivera

, Melike Erol-Kantarci:
Competitive Multi-Agent Load Balancing with Adaptive Policies in Wireless Networks. 796-801 - Mengfei Zhu, Fujun He, Eiji Oki:

Robust Function Deployment against Uncertain Recovery Time with Workload-Dependent Failure Probability. 802-807 - Manabu Tsukada, Shimpei Arii, Hideya Ochiai, Hiroshi Esaki:

Misbehavior Detection Using Collective Perception under Privacy Considerations. 808-814 - Shafika Showkat Moni, D. Manivannan:

A lightweight Privacy-Preserving V2I Mutual Authentication Scheme using Cuckoo Filter in VANETs. 815-820 - Alessio Buscemi

, Ion Turcanu
, German Castignani, Thomas Engel:
On Frame Fingerprinting and Controller Area Networks Security in Connected Vehicles. 821-826 - Wenxin Chen, Yingfei Dong, Zhenhai Duan:

Accurately Redirecting a Malicious Drone. 827-834 - Andreas Ingo Grohmann, Johannes V. S. Busch

, Adrian Bretschneider Perez, Christopher Lehmann, Frank H. P. Fitzek
:
JAVRIS: Joint Artificial Visual Prediction and Control for Remote-(Robot) Interaction Systems. 835-840 - Israel Elujide, Chunhai Feng, Aref Shiran, Jian Li, Yonghe Liu:

Location Independent Gesture Recognition Using Channel State Information. 841-846 - Nasim Soltani, Yanyu Li, Deniz Erdogmus, Yanzhi Wang, Kaushik R. Chowdhury

:
NN-key: A Neural Network-Based Secret Key for Demapping OFDM Symbols. 847-852 - Masayuki Kinoshita

, Takumi Toguma, Shun Yamaguchi, Sora Ibaraki, Koji Kamakura, Takaya Yamazato
:
Performance Enhancement of Rolling Shutter Based Visible Light Communication via Selective Reception Using Dual Cameras. 853-857 - Tianwen Li, Yukito Onodera, Yu Nakayama, Daisuke Hisano:

Multi-Channel Authentication for Secure D2D using Optical Camera Communication. 858-863 - David Nunez, Francesc Wilhelmi, Stefano Avallone, Malcolm Smith, Boris Bellalta:

TXOP sharing with Coordinated Spatial Reuse in Multi-AP Cooperative IEEE 802.11be WLANs. 864-870 - Rahul Thakur, Swati Agarwal:

Clustering and Transmit Power Control for Social Assisted D2D Cellular Networks. 871-876 - Vincent Charpentier

, Erik de Britto e Silva, Seilendria A. Hadiwardoyo, Johann M. Márquez-Barja
:
CAMAF: A framework to increase safety on the road. 877-880 - Takamochi Kanda, Takashi Sato

, Hiromitsu Awano, Sota Kondo, Koji Yamamoto:
Respiratory Rate Estimation Based on WiFi Frame Capture. 881-884 - Davide Aguiari, Ka-Seng Chou

, Rita Tse, Giovanni Pau
:
Monitoring Electric Vehicles on The Go. 885-888 - Hinako Ochi, Jiang Liu, Shigeru Shimamoto:

Non-contact Blood Pressure Estimation By Microwave Reflection Employing Machine Learning. 889-892 - Yesin Sahraoui, Ludovica De Lucia, Anna Maria Vegni, Chaker Abdelaziz Kerrache, Marica Amadeo

, Ahmed Korichi:
TraceMe: Real-Time Contact Tracing and Early Prevention of COVID-19 based on Online Social Networks. 893-896 - Ryo Kambe, Sumiko Miyata:

A Load Balancing Method Using K-means++ for P2P MMORPGs. 897-900 - Maximiliano Rivera, Mohammad Chegini, Wael Jaafar

, Safwan Alfattani, Halim Yanikomeroglu
:
Optimization of Quantized Phase Shifts for Reconfigurable Smart Surfaces Assisted Communications. 901-904 - Yuya Miki, Takeshi Kaneko, Ryohei Banno, Kazuyuki Shudo:

An Efficient Range Search Method Utilizing Detour Routes in Skip Graph. 905-908 - Ons Fares, Abdulhalim Dandoush

, Nadjib Aitsaadi:
SDN-based Platform Enabling Intelligent Routing within Transit Autonomous System Networks. 909-912 - Maël Guiraud, Brice Leclerc, Olivier Marcé:

An Experimental Platform for Hard TSN. 913-916 - Antonio Petrosino

, Giuseppe Piro, Luigi Alfredo Grieco, Gennaro Boggia:
An Optimal Allocation Framework of Security Virtual Network Functions in 6G Satellite Deployments. 917-920 - Taiki Yoshikawa, Hijiri Komura, Ren Goto, Kazushige Matama, Chihiro Nishiwaki, Katsuhiro Naito:

Demonstration of video conferencing tool with overlay network protocol. 921-922 - Pascal Urien

:
Demonstrating Internet Of Secure Elements Server. 923-924 - Andreas Ingo Grohmann, Christopher Lehmann, Thomas Höschele, Frank H. P. Fitzek

:
BakeryRobot: 5G connected robot for SMEs. 925-926 - Felix Freitag, Pedro Vilchez, Lu Wei

, Chun-Hung Liu, Mennan Selimi, Iordanis Koutsopoulos:
Demo: An Experimental Environment Based On Mini-PCs For Federated Learning Research. 927-928 - Keith Erkert, Andrew Lamontagne, Jereming Chen, John Cummings, Mitchell Hoikka, Kuai Xu, Feng Wang:

An End-to-End System for Monitoring IoT Devices in Smart Homes. 929-930 - Raiful Hasan, Ragib Hasan

, Tanveer Islam:
Smart City Technology for Disaster Management: Demonstrating the Use of Bluetooth Low Energy (BLE) Beacons for Emergency Alert Dissemination. 931-932 - Huanzhuo Wu, Yunbin Shen, Máté Tömösközi, Giang T. Nguyen

, Frank H. P. Fitzek
:
Demonstration of In-Network Audio Processing for Low-Latency Anomaly Detection in Smart Factories. 933-934 - Vincent Charpentier

, Erik de Britto e Silva, Seilendria A. Hadiwardoyo, Nina Slamnik-Krijestorac, Johann M. Márquez-Barja
:
Experiencing CAMAF for safer smart mobility. 935-936 - Yoshihisa Kondo, Hiroyuki Yomo, Hiroyuki Yokoyama:

Demonstration of Multi-Diversity WLAN Supporting Low-latency and Seamless Video Streaming. 937-938 - Máté Tömösközi, Maroua Taghouti, Huanzhuo Wu, Frank H. P. Fitzek

:
Bitteiler: Demonstration of Efficient and Private Massive Industrial IoT Communications. 939-940 - Nina Slamnik-Krijestorac, Paola Soto-Arenas, Miguel Camelo Botero, Luca Cominardi, Steven Latré, Johann M. Márquez-Barja

:
Realistic Experimentation Environments for Intelligent and Distributed Management and Orchestration (MANO) in 5G and beyond. 943-944 - Ryoga Seki, Daichi Kominami, Hideyuki Shimonishi, Masayuki Murata, Masaya Fujiwaka:

Object Estimation Method for Edge Devices Inspired by Multimodal Information Processing in the Brain. 945-946 - Jonathan Hunter, Brennan Huber, Farah I. Kandah

:
Towards feasibility of Deep-Learning based Intrusion Detection System for IoT Embedded Devices. 947-948 - Pascal Urien

:
Towards Internet Of Secure Elements. 949-950 - Lijun Dong, Richard Li

:
Latency Guarantee Service Slice in 5G and Beyond. 951-952 - Kien Nguyen, Phi Le Nguyen

, Hiroo Sekiya:
A Host-based Investigation of IPv6 in Academia: The Cases of Japan and Vietnam. 953-954 - Abdallah S. Abdallah, Marcos F. B. de Abreu, Flávio H. T. Vieira, Kleber Vieira Cardoso:

Toward Secured Internet of Things (IoT) Networks: A New Machine Learning based Technique for Fingerprinting of Radio Devices. 955-956 - Carolina Gonçalves

, Bruno Sousa, Nuno Antunes:
BIANFE: Object identification and authentication in federated scenarios. 957-958 - Weiran Yuan, Kazuki Maruta, Yu Nakayama, Daisuke Hisano, Kei Sakaguchi:

Image Size Reduction by Road-Side Edge Computing for Wireless Relay Transmission and Object Detection. 959-960 - Jens Wagner

, Helmuth Morath
, Jiajing Zhang
, Florian Wieczorek
, Lisa Lüneburg, Frank H. P. Fitzek
, Giang T. Nguyen
:
Tactile Electronics Meets Softwarised Networks. 961-962 - Zeynep Dündar, Oguzhan Kocatürk, Gökhan Seçinti:

EmergencyBlock: A Blockchain-based Public Emergency Alert System. 963-964 - Anindo Mahmood, Kevin Ramirez Reynoso, Mostafizur Rahman, Sheikh Ariful Islam

:
Multi-Operator Intelligent UAV Delivery Networks in Beyond Visual Line of Sight Operations. 965-966 - Aviv Yehezkel, Eyal Elyashiv, Sharon Barkai:

Using CFN for Uniform Sampling of Cloud-Native Datacenters. 967-968

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














