


default search action
32nd ICCCN 2023: Honolulu, HI, USA
- 32nd International Conference on Computer Communications and Networks, ICCCN 2023, Honolulu, HI, USA, July 24-27, 2023. IEEE 2023, ISBN 979-8-3503-3618-4

- Chengyi Qu

, Rounak Singh, Sharan Srinivas, Prasad Calyam:
Environmentally-Aware Robotic Vehicle Networks Routing Computation for Last-mile Deliveries. 1-10 - Zolboo Erdenebaatar, Riyad Alshammari, Biswajit Nandy, Nabil Seddigh, Marwa Elsayed

, Nur Zincir-Heywood:
Depicting Instant Messaging Encrypted Traffic Characteristics through an Empirical Study. 1-10 - Xinliang Wei, Lei Fan, Yuanxiong Guo, Yanmin Gong, Zhu Han, Yu Wang

:
Quantum Assisted Scheduling Algorithm for Federated Learning in Distributed Networks. 1-10 - Xiaozhuang Liu, Zhenxing Niu, Wenye Wang:

Towards Multi-Person Gesture Recognition using Commodity Wi-Fi. 1-10 - Trevor Miller, Bobby Alvarez, Thang Hoang:

VTBC: Privatizing the Volume and Timing of Transactions for Blockchain Applications. 1-10 - Yukun Dong

, Yidan Hu
, Aisha Aseeri, Depeng Li, Rui Zhang:
Location Inference under Temporal Correlation. 1-10 - Efat Samir Fathalla, Sahar Zargarzadeh, Chunsheng Xin, Hongyi Wu, Peng Jiang, Joao F. Santos, Jacek Kibilda, Aloizio Pereira da Silva:

Beam Profiling and Beamforming Modeling for mmWave NextG Networks. 1-10 - Jinwei Liu, Rui Gong, Long Cheng, Richard A. Aló:

DeepHealth: Geospatial and ML-Based Approach to Identify Health Disparities and Determinants for Improving Pandemic Health Care. 1-10 - Keyang Yu, Dong Chen:

PAROS: The Missing "Puzzle" in Smart Home Router Operating Systems. 1-10 - Qinglin Liu, Zhiyong Lin, Zong-Heng Wei, Jianfeng Wen, Congming Yi, Hai Liu:

A Quinary Coding and Matrix Structure-Based Channel Hopping Algorithm for Blind Rendezvous in Cognitive Radio Networks. 1-10 - Esther Max-Onakpoya, Corey Baker

:
Evaluating the Joint Use of Alternate Internet Delivery Models in Deterministic Rural Networks. 1-10 - Emon Dey, Mikolaj Walczak, Mohammad Saeid Anwar, Nirmalya Roy, Jade Freeman, Timothy Gregory, Niranjan Suri, Carl E. Busart:

A Novel ROS2 QoS Policy-Enabled Synchronizing Middleware for Co-Simulation of Heterogeneous Multi-Robot Systems. 1-10 - Roberto Rodrigues Filho

, Renato S. Dias, João Seródio, Barry Porter, Fábio M. Costa, Edson Borin, Luiz F. Bittencourt
:
A Self-Distributing System Framework for the Computing Continuum. 1-10 - Christopher Kitras

, Carter Pollan, Kyle Myers, Camille Wirthlin Tischner, Philip Lundrigan
:
Location Verification of Crowd-Sourced Sensors. 1-7 - Aris Leivadeas, Matthias Falkner:

Autonomous Network Assurance in Intent Based Networking: Vision and Challenges. 1-10 - Sultan Alasmari, Weichao Wang, Aidong Lu, Yu Wang:

Protection of Network Security Selector Secrecy in Outsourced Network Testing. 1-10 - Lei Xu, Yangyong Zhang, Phakpoom Chinprutthiwong, Guofei Gu:

Automatic Synthesis of Network Security Services: A First Step. 1-10 - Alan Hylton, Michael Moy, Robert Kassouf-Short, Jacob Cleveland:

Multigraph-Based Routing in Delay Tolerant Networks: An Alternative to Contact Graph Routing. 1-7 - Yuxin Chen

, Jiayu Yang, Xuanbo Huang, Jiangping Han, Bobo Wang, Jian Li, Kaiping Xue
:
PLR: An In-Network Proactive Loss Recovery Scheme for Named Data Networking. 1-10 - Nazia Sharmin, Jaime C. Acosta, Christopher Kiekintveld:

A Systematic Approach for Temporal Traffic Selection Across Various Applications. 1-7 - Krishna Kant:

Message from the General Chair. 1-2 - Lihua Ruan

, Elaine Wong:
Addressing Concept Drift of Dynamic Traffic Environments through Rapid and Self-Adaptive Bandwidth Allocation. 1-7 - Nahid Ebrahimi Majd, Mike Sharko:

Secure and Cost Effective IoT Authentication and Data Storage Framework using Blockchain NFT. 1-7 - Michael Plattner

, Gerald Ostermayer:
Camera-based Vehicle-to-Vehicle Visible Light Communication - A Software-Only Solution for Vehicle Manufacturers. 1-7 - So-Eun Jeon, Ye-Sol Oh, Ye-Seul Kil, Yeon-Ji Lee, Il-Gu Lee:

Two-Step Feature Selection Technique for Secure and Lightweight Internet of Things. 1-6 - Yigong Hu, Ila Gokarn, Shengzhong Liu, Archan Misra, Tarek F. Abdelzaher:

Underprovisioned GPUs: On Sufficient Capacity for Real-Time Mission-Critical Perception. 1-10 - Abtahi Reza, Anway Bose, Li Bai:

A Secure Federated Learning Approach to Smart Microgrid Stability Prediction. 1-7 - Shakir Mahmood, Muhammad Shahzad:

Per-Flow Packet Loss Measurement without Probing. 1-10 - Puming Fang, Tilman Wolf:

Value Trees: Multi-Hop and Asynchronous Economic Transactions in Distributed Systems. 1-10 - Angel C. Herrero, Julio A. Sanguesa, Francisco J. Martinez, Piedad Garrido, Carlos T. Calafate:

aDBF: an autonomous electromagnetic noise filtering mechanism for industrial environments. 1-7 - Yuchen Liu, Mingzhe Chen, Dongkuan Xu, Zhaohui Yang, Shangqing Zhao:

E-App: Adaptive mmWave Access Point Planning with Environmental Awareness in Wireless LANs. 1-10 - Pier Paolo Tricomi, Sousan Tarahomi, Christian Cattai, Francesco Martini, Mauro Conti

:
Are We All in a Truman Show? Spotting Instagram Crowdturfing through Self-Training. 1-10 - Jie Lian, Xinyu Pan, Jin Guo:

An Improved Fire and Smoke Detection Method Based on YOLOv7. 1-7 - Francesco Tusa

, David Griffin, Miguel Rio:
DNS++: Dynamic Name Resolution with Homomorphic Encryption Based Privacy. 1-7 - Long Dang

, Thushari Hapuarachchi, Kaiqi Xiong
, Jing Lin:
Improving Machine Learning Robustness via Adversarial Training. 1-10 - Heewon Kim, Hochan Lee, Sangheon Pack:

Traffic-Aware In-Network Aggregation Placement for Multi-Tenant Distributed Machine Learning. 1-9 - Keita Aoki, Miki Yamamoto:

A Gateway Proxy with ECN Buffer Control for Inter-Datacenter Congestion Control. 1-2 - Kewei Sha

:
Message from the Workshop General Chair. 1-2 - Yunyi Wu

, Yongbing Zhang:
Cost-Effective Joint Establishment of Fronthaul and Virtual Base Stations in a Stochastic C-RAN. 1-7 - Baosen Zhao, Wanghong Yang, Wenji Du, Yongmao Ren

, Jianan Sun, Xu Zhou:
CPS: A Multipath Scheduling Algorithm for Low-Latency Applications in 5G Edge Networks. 1-10 - Jagnyashini Debadarshini, Sudipta Saha:

LiteCast: Flexible Scalable and Uniform Local Data-Sharing in Real-Time. 1-10 - Jacob Neil Taylor

, Ngoc-Thuy Le
, Joonsang Baek
, Willy Susilo
:
Hyron: A New Approach for Automating the Network ACL Delivery Pipeline. 1-10 - Jihyung Kim, Soyoung Yoo, Junghyun Kim:

Residual Attention Assisted Calibrated Beam Training for mmWave Communication Systems. 1-2 - Marek Michalski

:
Hardware Controller and Simulator for $log_{2}N$ Switching Fabrics. 1-2 - Jiawei Xu, Ziqian Bi, Amit Singha, Tao Li, Yimin Chen, Yanchao Zhang:

mmLock: User Leaving Detection Against Data Theft via High-Quality mmWave Radar Imaging. 1-10 - Tianming Zhao, Zijie Tang, Tianfang Zhang, Huy Phan, Yan Wang, Cong Shi, Bo Yuan, Yingying Chen:

Stealthy Backdoor Attack on RF Signal Classification. 1-10 - Jihoon Lee, Kyungmin Go, Myungchul Kim:

Building Identification Using Smartphone Sensors and a Map. 1-7 - Deepti Kalasapura, Jinyang Li, Shengzhong Liu, Yizhuo Chen, Ruijie Wang, Tarek F. Abdelzaher, Matthew Caesar, Joydeep Bhattacharyya, Jae Kim, Guijun Wang, Greg Kimberly, Josh D. Eckhardt, Denis Osipychev:

TwinSync: A Digital Twin Synchronization Protocol for Bandwidth-Limited IoT Applications. 1 - Arun Sarma, Geethapriya Thamilarasu:

Inferring Sensitive User Information Through Biosignals Using Deep Learning. 1-2 - Johannes Kässinger, David Rosin, Frank Dürr, Benedikt Mehler, Thomas Hubatscheck, Kurt Rothermel:

Persival: Using Delayed Remote Updates in a Distributed Mobile Simulation. 1-10 - Ruozhou Yu

, Huayue Gu, Xiaojian Wang
, Fangtong Zhou, Guoliang Xue, Dejun Yang:
EA-Market: Empowering Real-Time Big Data Applications with Short-Term Edge SLA Leases. 1-10 - Yang Yang, Mustafa Cenk Gursoy:

Reliability-Oriented Designs in UAV-assisted NOMA Transmission with Finite Blocklength Codes and Content Caching. 1-8 - Zhouyu Li, Ruozhou Yu

, Anupam Das, Shaohu Zhang, Huayue Gu, Xiaojian Wang
, Fangtong Zhou, Aafaq Sabir, Dilawer Ahmed, Ahsan Zafar:
INSPIRE: Instance-Level Privacy-Pre Serving Transformation for Vehicular Camera Videos. 1-10 - Ian C. McDowell, Rahul Bulusu, Hem Regmi, Sanjib Sur:

Outdoor Millimeter-Wave Picocell Placement using Drone-based Surveying and Machine Learning. 1-10 - Fidan Mehmeti, Wolfgang Kellerer:

Delay Fairness in 5G Networks with SD-RAN. 1-10 - Huiqing Wan

, Qiongxiao Wang, Yajun Teng, Cunqing Ma, Jingqiang Lin, Mingyu Wang:
ImCT: A Feasible Scheme for Deploying Implicit Certificates with Certificate Transparency in IoT. 1-10 - Rui Zhao:

FProbe: The Flow-Centric Detection and a Large-Scale Measurement of Browser Fingerprinting. 1-10 - Philipp Kisters, Heiko Bornholdt, Janick Edinger:

SkABNet: A Data Structure for Efficient Discovery of Streaming Data for IoT. 1-10 - Momoka Yamamoto, Jin Nakazato, Manabu Tsukada, Hiroshi Esaki:

Iterative Resolution with IPv6 Packets Failing. 1-2 - Ali Nikkhah, Scott Jordan:

How Can Equitable Peering be Achieved Between ISPs and Content Providers? 1-10 - Takahiro Yokoyama, Yoshiki Sato, Sho Tsugawa, Kohei Watabe:

An Accurate Graph Generative Model with Tunable Features. 1-2 - Doganalp Ergenc, Florian Schneider, Peter Kling, Mathias Fischer:

Moving Target Defense for Service-Oriented Mission-Critical Networks. 1-10 - Nahid Ebrahimi Majd, Torsha Mazumdar:

Ransomware Classification Using Machine Learning. 1-7 - Maria Camila Gaitan-Cardenas, Mahmoud Abdelsalam, Kaushik Roy:

Explainable AI-Based Intrusion Detection Systems for Cloud and IoT. 1-7 - Fan Liang, Xing Liu, Nuri Alperen Kose, Kubra Gundogan

, Wei Yu
:
Towards Trajectory Prediction-Based UAV Deployment in Smart Transportation Systems. 1-9 - Jiangnan Li, Yingyuan Yang, Jinyuan Stella Sun, Kevin Tomsovic, Hairong Qi:

Towards Adversarial-Resilient Deep Neural Networks for False Data Injection Attack Detection in Power Grids. 1-10 - Wentao Wang, Jiangping Han, Rui Zhuang, Kaiping Xue

, Qibin Sun, Jun Lu:
Early Marking for Controllable Maximum Queue Length in Data Center Networks. 1-10 - Sahil Gupta, Devashish Gosain, Minseok Kwon, Hrishikesh B. Acharya:

Predictable Internet Clients and In-Switch Deep Packet Inspection. 1-10 - Zachary P. Neal, Kewei Sha

:
Analysis of Evil Twin, Deauthentication, and Disassociation Attacks on Wi-Fi Cameras. 1-7 - Jianqing Liu, Shangjia Dong

, Thomas Morris, Yuguang Fang
:
Social Equality-Aware Resource Allocation for Post-Disaster Communication Restoration. 1-10 - Shiyi Liu, Haiying Shen, Brian L. Smith, Volker Fessmann:

Machine Learning Based Intelligent Routing for VDTNs. 1-10 - Mohammed Alkinoon

, Abdulrahman Alabduljabbar, Hattan Althebeiti, Rhongho Jang, DaeHun Nyang, David Mohaisen:
Understanding the Security and Performance of the Web Presence of Hospitals: A Measurement Study. 1-10 - Brian Lewandowski, Randy C. Paffenroth

:
One-class Classification Using Autoencoder Feature Residuals for Improved IoT Network Intrusion Detection. 1-7 - Yi Zheng

, Srivatsan Ravi
, Erik Kline, Lincoln Thurlow, Sven Koenig, T. K. Satish Kumar:
Improved Conflict-Based Search for the Virtual Network Embedding Problem. 1-10 - Jiahao Xue, Zhe Qu, Shangqing Zhao, Yao Liu, Zhuo Lu:

Data-Driven Next-Generation Wireless Networking: Embracing AI for Performance and Security. 1-10 - Tanmoy Sen

, Haiying Shen:
A Data and Model Parallelism based Distributed Deep Learning System in a Network of Edge Devices. 1-10 - Tianyu Bai, Danyang Shao, Ying He, Song Fu, Qing Yang:

$\mathrm{P}^{3}$: A Privacy-Preserving Perception Framework for Building Vehicle-Edge Perception Networks Protecting Data Privacy. 1-10 - Maurantonio Caprolu, Alireza Sadighian, Roberto Di Pietro

:
Characterizing the 2022- Russo-Ukrainian Conflict Through the Lenses of Aspect-Based Sentiment Analysis: Dataset, Methodology, and Key Findings. 1-10 - Huayue Gu, Ruozhou Yu

, Zhouyu Li, Xiaojian Wang
, Fangtong Zhou:
ESDI: Entanglement Scheduling and Distribution in the Quantum Internet. 1-10 - Anand Mudgerikar, Elisa Bertino:

Intelligent Security Aware Routing: Using Model-Free Reinforcement Learning. 1-10 - Mahmoud Badi, Dinesh Rajan, Joseph Camp:

Experimental Analysis of Phase Error in Centralized and Distributed SDR Systems. 1-7 - Mustafa Mahjeed, Geetha Thamilarasu, Nicole Johnson, Christian Alfonso:

A Deep Learning Approach for ECG Authentication on Implantable Medical Devices. 1-7 - Sijia Cao, Hanlin Zhang, Yuhang Wang, Jie Lin, Fanyu Kong, Leyun Yu:

SecureGAN: Secure Three-Party GAN Training. 1-7 - Thilina Pathirana, Gianfranco Nencioni:

Availability Model of a 5G-MEC System. 1-10 - Nahid Ebrahimi Majd, Mandar Shivaji Hanchate:

Spam SMS Classification Using Machine Learning. 1-7 - Alamin Mohammed, Theo Karagioules, Emir Halepovic, Shangyue Zhu, Aaron Striegel:

On the Harmful Effects of Active Network Probing. 1-8 - Metasebia D. Gemeda, Min S. Han, Ameha T. Abebe, Chung Gu Kang:

Deep Learning-based Transceiver with One-bit ADC Over Fading Channel. 1-6 - Mwasinga Lusungu Josh

, Syed M. Raza, Duc-Tai Le, Moonseong Kim, Hyunseung Choo:
PLCD: Policy Learning for Capped Service Mobility Downtime. 1-7 - Kai Sakamoto, Yusaku Hayamizu, Miki Yamamoto:

Improving Fairness of NDN Congestion Control from Resource Pooling Perspective. 1-2 - Dianshi Yang

, Abhinav Kumar
, Stuart Ray, Wei Wang, Reza Tourani
:
IoT Sentinel: Correlation-based Attack Detection, Localization, and Authentication in IoT Networks. 1-10 - Ramin Yarinezhad, Eylem Ekici:

An Efficient and Fair Wireless Resource Allocation Scheme for LTE and Wi-Fi over Unlicensed Bands. 1-10 - Ching-Chi Lin, Bruno Chianca, Leonard David Bereholschi, Jian-Jia Chen, Guthemberg Silvestre:

Cost-Effective Offloading Strategies for UAV Contingency Planning in Smart Cities. 1-7 - Suna Choi, Kyu-Min Kang:

Study on Remote Identification and Integrated Information Management Technology for Unmanned Aerial Vehicles. 1-2

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














