


default search action
ICNC 2024: Big Island, HI, USA
- International Conference on Computing, Networking and Communications, ICNC 2024, Big Island, HI, USA, February 19-22, 2024. IEEE 2024, ISBN 979-8-3503-7099-7

- Erkan Karakus, Tao Wei, Qing Yang:

Machine Learning in Sensors for Collision Avoidance. 1-5 - Kwame Assa-Agyei, Kayode Owa, Funminiyi Olajide, Tawfik Al Hadhrami:

A Multi-Chaotic Key Expansion for Advanced Encryption Standard (AES) Algorithm. 1-7 - Abdullatif Albaseer, Moqbel Hamood, Mohamed M. Abdallah:

Adaptive Honeypot Defense Deployment: A Stackelberg Game Approach with Decentralized DRL for AMI Protection. 1-5 - Ahmed Nada, Min Chen:

Visual Question Answering. 6-10 - Ved Dharkar, Suman Kumar:

On the Experimental Performance Measurement of Quantum Teleportation. 11-15 - Kaitai Tong, Junbin Zhang

, Yixiao Wang, Hamid Reza Tohidypour, Panos Nasiopoulos:
A High-Fidelity Partial Face Manipulation Dataset for Enhanced Deepfake Detection. 16-20 - Shoya Imanaka, Akio Kawabata, Bijoy Chand Chatterjee, Eiji Oki:

Algorithm for Server Allocation in Delay-Sensitive Internet-of-Things Monitoring Services. 21-25 - Baker Al Smadi, William Bradley Glisson

, Majd Tahat, Hosam Alamleh, Ali Abdullah S. AlQahtani:
Credit Card Transactions Fraud Detection for Multiple Consumer Behaviors. 26-32 - Pascal Urien:

Revisiting Multi-Factor Authentication Token Cybersecurity: A TLS Identity Module Use Case. 33-38 - Arghavan Ayoughi, Chi Zhang, Stephen Okeleke, Shufei Li, Wei Xin, Yuhan Yue, Ania Aibin, Michal Aibin:

Dragonfly Algorithm Application for Solving the Nurse Scheduling Problem. 39-43 - Yameng Cao, Di Zhang, Hanyu Zhang, Yan Ling Xue:

Multi-Task Optical Performance Monitoring Using a Transfer Learning Assisted Cascaded Deep Neural Network in WDM Systems. 44-47 - Madhurima Ganguly, Abhijan Bhattacharyya, Ashis Sau, Suraj Kumar Mahato

:
Synergized QoE-Centric Streaming for Telerobotics. 48-54 - Rui Xu, Gaolei Li, Yuchen Liu, Yue Zhao, Jiawen Kang, Jianhua Li:

Regulating Covert Communication Capacity with Full-Duplex Receiver Against Location-Uncertain Eavesdropper. 55-59 - Liudong Zuo, Daqing Yun

:
Optimal Balancing of Data Transfer Time and Cost in High-Performance Networks. 60-64 - Zihe Yi, Lin Chen:

Path Computation in Multi-Switching Multi-Layer Networks. 65-69 - Gavin Black, William McCullough, Paul F. Roysdon:

Security Dataset Augmentation Invariance and Distribution Independence. 70-75 - Hao-Tse Chiu, Shuhei Saito

, Keita Kuriyama, Kentaro Tanaka, Hitoshi Hasegawa, Toshifumi Miyagi, Takeshi Onizawa, Fumiaki Maehara:
Performance Evaluation of MIMO-FTN Signaling under Multipath Fading Channels with PA Non-Linearity. 76-80 - Xiaoying Han, Xiaohua Xu:

Multi-armed Bandit Algorithm for Online Offloading and Scheduling in Edge Computing Environment. 81-87 - Ömer Gençay, Alperen Balci, Elif Tugce Ceran, Elif Uysal:

Ensuring a Semantically Effective IoT Network Through Blockchain with Delayed Feedback. 88-92 - Akito Sasahara, Fumiya Yamaguchi, Da Li, Mayumi Ueda, Shinsuke Nakajima:

An Impression-Based Video Analysis Method for Video Recommender Systems. 93-99 - Ritayan Biswas, Joonas Säe

, Juho Pirskanen, Jukka Lempiäinen:
Reliable and Low-Latency Communications for Critical Infrastructures Utilizing Wireless Mesh Networks. 100-105 - Sheng-Wei Wang

:
Selfish Mining Attacks in Sharded Blockchains. 106-110 - Sheng-Wei Wang

:
A Game Theory Based Rational Mining Strategy in Blockchains With Multiple Rational Miners. 111-115 - Peng Liu, He Wang, Chen Zheng, Yuqing Zhang:

Prompt Fix: Vulnerability Automatic Repair Technology Based on Prompt Engineering. 116-120 - Shimin Chen, Lingyun Zhou, Rui Hou:

A Segmentation-Based Data Contention Resolution Method For Optical Named Data Networking. 121-126 - Yanfei Lu, Qing Li, Qinghe Gao, Yingzhen Wu, Yan Huo, Tao Jing:

Capacity Improvement with NOMA-CI Precoding for MU-MISO Downlink Systems. 127-132 - Fei Wang, Rui Hou:

Delayed Broadcast-Based Data Forwarding Strategy for Vehicular Named Data Networks. 133-138 - Ahmed Abdelmoamen Ahmed, Bernard Nyarko:

Smart-Watcher: An AI-Powered IoT Monitoring System for Small-Medium Scale Premises. 139-143 - Soon-Soo Oh, Dong-Woo Kim:

Measurements of Shadowing Loss at 3 and 7 GHz for Small-Cell Planning in University Building. 144-147 - Ziqiu Zheng, Xuejun Li, He Wang, Gaofei Wu, Yuqing Zhang:

Research on SSL/TLS Security Differences Based on RFC Documents. 147-151 - Yixiao Wang, Zhe Li, Guowei Guan, Yipin Sun, Chunyu Wang, Hamid Reza Tohidypour, Panos Nasiopoulos, Victor C. M. Leung:

Weighted Multi-Task Vision Transformer for Distraction and Emotion Detection in Driving Safety. 152-156 - Fumiya Yamaguchi, Da Li, Mayumi Ueda, Shinsuke Nakajima:

A Product Feature Mentioned Timestamp Extraction Method in Review Videos for Online Shopping. 157-162 - Christopher J. Hansen

:
Semi-Blind Channel Estimation on 802.11 OFDM Data Symbols. 163-167 - Dhruv Nandakumar, Devin Quinn, Elijah Soba, Eunyoung Kim, Christopher Redino, Chris Chan, Kevin Choi, Abdul Rahman, Edward Bowen:

Foundational Models for Malware Embeddings Using Spatio-Temporal Parallel Convolutional Networks. 168-174 - Razvan Cristian Voicu, Aarush Kaunteya Pande, Muhammad Hassan Tanveer, Yusun Chang

:
Communication Interchange for Artificial Intelligence Systems. 175-181 - Fatemeh Zahra Safaeipour, Morteza Hashemi

:
Semantic-Aware and Goal-Oriented Communications for Object Detection in Wireless End-to-End Image Transmission. 182-187 - Fabrice Mvah, Vianney Kengne Tchendji

, Clémentin Tayou Djamégni, Ahmed H. Anwar, Deepak K. Tosh, Charles A. Kamhoua:
Deception-Based IDS Against ARP Spoofing Attacks in Software-Defined Networks. 188-192 - Ahmed Abdelmoamen Ahmed, Jamil Ahmed:

An Image-Based Plant Weed Detector Using Machine Learning. 193-197 - Jinshui Huang, Jun Wang, Qing Li, Xiaoman Jin:

Social Media Development and Multi-Modal Input for Stock Market Prediction: A Review. 198-202 - Mark Maldonado, Caleb Johnson, Manbir S. Gulati, Todd Jaspers, Paul F. Roysdon:

Advanced Cyber Deception Framework (ACDF): A Comprehensive Study. 203-208 - Yifei Song

, Juan Roa, Renjian Zhao, Zhigang Rong, Weimin Xiao, Jalal Jalali, Baoling Sheen:
Variable Code Size Autoencoder (VCSA) Meets CSI Compression in Model Generalization. 209-214 - Baisakhi Chatterjee, Rudra Dutta:

Guaranteeing Partial State Synchronization for UAV Platoon Under Message or UAV Loss. 215-220 - Yong Wang, Bhaskar Prasad Rimal, Carson Koball, Michael Fahnlander, Julia Scheaffer, Joshua Hammrich, Paolo Gentry, Dylan Westlund, Tyler Salmen, Connor Ford:

A Comprehensive Study of Supervised Machine Learning Assisted Approaches for IoT Device Identification. 221-227 - Abdulmajeed Alanazi, Khairi Hamdi:

Performance of SPAD-Detector in The Presence of Atmospheric Turbulence. 228-232 - Kylie McClanahan, Qinghua Li:

Towards Automatically Matching Security Advisories to CPEs: String Similarity-based Vendor Matching. 233-238 - William Cassel, Nahid Ebrahimi Majd:

A Lightweight Obfuscated Malware Multi-class Classifier for IoT Using Machine Learning. 239-243 - Tejesh Radhakrishna, Nahid Ebrahimi Majd:

Edge Computing Ransomware Detection in IoT Using Machine Learning. 244-248 - Mirei Onodera, Akira Hirano:

Real-Time Detection of Optical Cross-Talk for Autonomous Network Diagnosis. 249-253 - Md. Shamim Towhid, Nasik Sami Khan, Md Mahibul Hasan, Nashid Shahriar:

Towards Effective Network Intrusion Detection in Imbalanced Datasets: A Hierarchical Approach. 254-258 - Liang Zhang, Bijan Jabbari:

Machine Learning for Caching Placement in Edge Computing Networks. 259-264 - Katsuyuki Yamauchi, Da Li, Panote Siriaraya, Yukiko Kawai, Shinsuke Nakajima:

Enhancing Walking Experience: A Walking Route Recommendation System Considering Nearby Spots. 265-270 - Bingyan Li, Weiliang Liu, Salim Nader, Jiaqi Song, Chengyu Zhang, Michal Aibin:

Cloud Load Balancing Algorithms Performance Evaluation Using a Unified Testing Platform. 271-277 - Kalon M. Bienz, Behnam Ghalamchi:

Wireless Instant Fault Detection Through Finite-Element Trained Machine Learning. 278-283 - Pankaj Singh, Su-Jin Kim, Sung-Yoon Jung:

Nanocommunication: PHY Advancements in Electromagnetic and Molecular Approaches. 284-290 - Hovannes Kulhandjian

, Brian Irineo, Jacob Sales, Michel Kulhandjian:
Low-Cost Tree Health Categorization and Localization Using Drones and Machine Learning. 296-300 - Hovannes Kulhandjian

, Jose Maciel Torres, Nicholas Amely, Cruz Nieves, Christian Reeves, Michel Kulhandjian:
AI-based Road Inspection Framework Using Drones with GPS-less Navigation. 301-305 - Morgane Joly, Éric Renault, Fabian Rivière:

Classification of BLE Packet According to AGC Index with Detection of Non-Ideal Reception Cases. 306-310 - Krishna Murthy Kattiyan Ramamoorthy, Wei Wang

, Kazem Sohraby, Yanxiao Zhao:
Proof-of-QoE NOMA Token: A Crypto Rewarding Concept to Incentivize Local Relay In Non-Orthogonal Multiple Access Wireless Networks. 311-315 - Shi Zhou, Qingchun Chen, Yaxuan Chen, Lei Zheng:

AoI-Aware Adaptive Relaying in Buffer-Aided Wireless-Powered NOMA Network with Random Arrivals. 316-322 - Yuta Hayashi, Toshihiko Nishimura, Takanori Sato, Yasutaka Ogawa, Takeo Ohgane:

Performance Evaluation of Loose Beamforming Using Direct-Binary Search in Massive MIMO Systems. 323-328 - Zhi-Xiang Wang, Jia Hou:

Performance Analysis of High-Dimensional NOMA System with In-Phase/ Quadrature Index Modulation. 329-333 - Gosan Noh:

Effect of Beam Broadening in Directional Beamforming-Based Cellular Networks. 334-338 - Thara Son

, Sooyoung Kim:
An Efficient PLS Scheme for Coded MIMO Systems Under Imperfect Channel Estimation. 339-343 - Koki Muramatsu, Yoshihiko Uematsu, Satoru Okamoto, Naoaki Yamanaka:

Edge Computing That Utilizes In-Network CPUs to Achieve High Capacity and Interruption Tolerance With Fewer Edge Servers. 344-348 - Chenqi Li, Jingtao Yao:

Incorporating Game Theory with Soft Sets. 349-354 - Xinyi Wu, Deli Qiao:

DRL-Based Energy Efficient Power Adaptation for Fast HARQ in the Finite Blocklength Regime. 355-360 - Jun Saito, Takanori Hara, Kenichi Higuchi:

Peak Cancellation Signal-Based Parallel PAPR Reduction Method Using Low-Dimensional Null Space in Massive MIMO-OFDM. 361-365 - Hiroki Fujimoto, Takanori Hara, Kenichi Higuchi:

Transmitter Filtering-aided Sparse Activity Detection for TDD-based Random Access. 366-370 - Orhan Tahir Yavascan, Mutlu Ahmetoglu, Elif Uysal, Umut Gurbuz, Ömer Gençay, Alperen Balci:

DCCTA: Age of Information in Slotted ALOHA Under Duty Cycle Constraints. 371-375 - Ricardo Lent:

Multi-Objective Cognitive Routing in Space DTNs. 376-381 - Yuhang Liu, Xiaosong Yu, Yongli Zhao, Avishek Nag:

Power-scheduled Routing Strategy for Quantum Key Distribution over Classical Optical Networks. 382-386 - Priva Chassem Kamdem

, Alain B. Zemkoho
, Laurent Njilla, Marcellin Nkenlifack
, Charles A. Kamhoua:
Bayesian Game for Cyber Deception Against Remote Attack on Automotive Systems. 387-393 - Fernanda Famá, Charalampos Kalalas

, Sandra Lagén, Paolo Dini:
Measuring Data Similarity for Efficient Federated Learning: A Feasibility Study. 394-400 - Sommer Harris, Jaelyn Ma, Meet Patel, Kshitij Nair, Niranjan Velraj, Michal Aibin:

Infrastructure Cost Analysis for Running Timetabling Software Using Various Deployment Architectures in the Cloud. 401-406 - Brenda G. Gouveia, Iandra Galdino, Egberto Caballero, Julio C. H. Soto

, Taiane Coelho Ramos, Raphael Guerra, Débora C. Muchaluat-Saade, Célio Vinicius N. Albuquerque:
Parameter tuning for accurate heart rate measurement using Wi-Fi signals. 407-411 - Ali Owfi, Ali Abbasi, Fatemeh Afghah, Jonathan D. Ashdown, Kurt A. Turck:

Dynamic Online Modulation Recognition using Incremental Learning. 412-416 - Xinyu Zhang, Long Li, Lina Pu, Jing Yang, Zichen Wang, Rong Fu, Zhipeng Jiang:

Deep Learning-based Malicious Energy Attack Detection in Sustainable IoT Network. 417-422 - Sathvik Murli, Dhruv Nandakumar, Prabhat Kumar Kushwaha, Cheng Wang, Christopher Redino, Abdul Rahman, Shalini Israni, Tarun Singh, Edward Bowen:

Cross-Temporal Detection of Novel Ransomware Campaigns: A Multi-Modal Alert Approach. 423-429 - Shuva Paul, Sanjana Vijayshankar, Richard Macwan:

Demystifying Cyberattacks: Potential for Securing Energy Systems With Explainable AI. 430-434 - Siamak Azadiabad, Ferhat Khendek

:
Managing Failures and Service Quality in the Context of NFV. 435-440 - Md Faishal Yousuf, Shaad Mahmud:

Generating Synthetic Time-Series Data on Edge Devices Using Generative Adversarial Networks. 441-445 - Souryendu Das, Stavros Kalafatis:

Speed Testing for Measuring Network Traffic in a Smart Network Switch. 446-450 - Jian Liu, Chin-Tser Huang:

Adaptive Channel Switching for Connected Vehicles under Extreme Weather Conditions: A Reinforcement Learning Based Approach. 451-455 - Elisabeth Tchaptchet

, Elie Fute Tagne, Jaime C. Acosta, Danda B. Rawat, Charles A. Kamhoua:
Detecting Deepfakes Using GAN Manipulation Defects in Human Eyes. 456-462 - Ekramul Haque, Kamrul Hasan, Imtiaz Ahmed, Md. Sahabul Alam, Tariqul Islam:

Enhancing UAV Security Through Zero Trust Architecture: An Advanced Deep Learning and Explainable AI Analysis. 463-467 - Jie Li

, John D. Leidel
, Brian Page, Yong Chen
:
Towards Cycle-accurate Simulation of xBGAS. 468-472 - Yong Xue, Alexander Brodsky, Daniel A. Menascé:

GRASP and ILS Based Meta-Heuristic Approximation Algorithms for Optimal Virtual Network Synthesis (VNS) in Multi-AS Environment. 473-479 - Junxiu Zhou, Yangyang Tao:

WGAN-Based Oversampling for QoS-Aware M2M Network Power Allocation. 480-484 - Mahmudul Hasan, Sachin Shetty:

Sentiment Analysis With Lipschitz Recurrent Neural Networks Based Generative Adversarial Networks. 485-489 - Andy Neparidze, Ahmed Amine Mchayaa, Julian David Schäfer, Daniel Silhavy, Robert Seeliger, Stephan Steglich, Stefan Arbanowski

:
Deep Explainable Content-Aware Per-Scene Video Encoding. 490-494 - Lan Luo, Christopher Morales-Gonzalez, Shan Wang, Zhen Ling, Xinwen Fu

:
Unified View of IoT and CPS Security and Privacy. 495-499 - Amar Sinha

, Anmol Agrawal, Sandip Roy, Venkanna Uduthalapally, Debanjan Das, Rajarshi Mahapatra, Sachin Shetty:
AnDet: ML-Based Anomaly Detection of UEs in a Multi-cell B5G Mobile Network for Improved QoS. 500-505 - Sayyed Farid Ahamed, Kazi Aminul Islam

, Sachin Shetty:
Targeted Transfer Learning: Leveraging Optimal Transport for Enhanced Knowledge Transfer. 506-510 - Tatsuya Otoshi

, Masayuki Murata:
Beamforming with Free Energy Principle under Hierarchical Codebook. 511-517 - Kyota Hattori, Tomohiro Korikawa, Chikako Takasaki:

Trend Encoder with Attentive Neural Process: Node Performance Extrapolation for Non-Time-Series Datasets. 518-522 - Hongwei Li, Danai Chasaki:

Heterogeneous GNN with Express Edges for Intrusion Detection in Cyber-Physical Systems. 523-529 - Jialong Zhou, Yuni Lai, Jian Ren, Kai Zhou

:
Black-Box Attacks Against Signed Graph Analysis via Balance Poisoning. 530-535 - Christopher Morales-Gonzalez, Matthew Harper, Michael Cash, Qun Zhou Sun, Xinwen Fu

:
On Building Automation Systems and Attacks. 536-542 - Nariman Torkzaban, Anousheh Gholami, John S. Baras:

On the Importance of Trust in Next-Generation Networked Cyber-Physical Systems. 543-548 - Jian Ren, Tongtong Li:

Privacy-Preserving Characterization and Data Publishing. 549-553 - Bo Sullivan, Junaid Ahmed Khan:

OBSERVE: Blockchain-Based Zero Trust Security Protocol for Connected and Autonomous Vehicles (CAVs) Data Using Simple Machine Learning. 554-559 - Yu Zhang, Wei Lin, Sisi Chen, Qingyu Song, Jiaxun Lu, Yunfeng Shao, Bei Yu, Hong Xu:

Fed2Com: Towards Efficient Compression in Federated Learning. 560-566 - Yangyang Tao, Junxiu Zhou:

Straggler Mitigation in Edge Computing with Coded Compressed Sensing. 567-572 - Toru Furusawa, Akihiro Nakao:

Cooperative Load Balancing of Neighboring Edge Clouds with LISP. 573-578 - Talha Siddique, Shaad Mahmud:

A Surrogate Tiny Machine Learning Model of Variational Autoencoder For Real-Time Baseline Correction of Magnetometer Data. 579-583 - Arisa Tsuji, Masato Oguchi:

Comparison of FHE Schemes and Libraries for Efficient Cryptographic Processing. 584-590 - Lijun Dong, Richard Li:

Characteristics Aware Video Packet Dropping and Packet Wash. 591-597 - Carl C. Udora, Peng Qian, Sweta Anmulwar, Anil Fernando

, Ning Wang
:
Quality of Experience Modelling and Analysis for Live Holographic Teleportation. 598-604 - Akihiro Kuwabara, Yutaro Osako, Sorachi Kato, Takuya Fujihashi, Toshiaki Koike-Akino, Takashi Watanabe:

Implicit Neural Representation-Based Hybrid Digital-Analog Image Delivery. 605-610 - Puning Zhang, Changfeng Liu, Honggang Wang, Dapeng Wu, Ruyan Wang, Hong Zou:

Context-Aware Edge-Cloud Collaborative Scene Text Recognition. 611-617 - Kun Hua

, Hansong Xu, Tigang Jiang:
A Secure and Robust ECG Signal Transmission System for Cardiac Arrhythmia Identification. 618-623 - Shinsuke Bannai, Katsuya Suto

:
Stereo-Aided Blockage Prediction for mmWave V2X Communications. 624-628 - Wenhan Zhang, Marwan Krunz, Md. Rabiul Hossain:

CyPA: A Cyclic Prefix Assisted DNN for Protocol Classification in Shared Spectrum. 629-634 - Soumya Banerjee, Sandip Roy, Sayyed Farid Ahamed, Devin Quinn, Marc Vucovich, Dhruv Nandakumar, Kevin Choi, Abdul Rahman, Edward Bowen, Sachin Shetty:

MIA-BAD: An Approach for Enhancing Membership Inference Attack and its Mitigation with Federated Learning. 635-640 - Ryan Kerr, Steven H. H. Ding, Li Li, Adrian Taylor:

Accelerating Autonomous Cyber Operations: A Symbolic Logic Planner Guided Reinforcement Learning Approach. 641-647 - Zhu Lin Tao, Jia Hou:

Design of Smoothed L0 UnfoldingNet Architecture for OFDM Channel Estimation. 648-652 - Eranga Bandara, Sachin Shetty, Abdul Rahman, Ravi Mukkamala, Peter Foytik, Xueping Liang:

RMF-GPT - OpenAI GPT-3.5 LLM, Blockchain, NFT, Model Cards and OpenScap Enabled Intelligent RMF Automation System. 653-658 - Jiayue Zhou, Jianan Hong, Chengchen Zhu, Futai Zou, Cunqing Hua:

Trustful Blockchain-Enabled Identity Management for VANET with Short-Latency Authentication. 659-663 - Kylie McClanahan, Sky Elder, Marie Louise Uwibambe, Yaling Liu, Rithyka Heng, Qinghua Li:

When ChatGPT Meets Vulnerability Management: The Good, the Bad, and the Ugly. 664-670 - Rana Abou Khamis, Ashraf Matrawy:

Could Min-Max Optimization be a General Defense Against Adversarial Attacks? 671-676 - Wenjun Fan, Siyuan Wu, Hao Chen:

An SDN-Enabled Elliptic-Curve Diffie-Hellman Key Exchange Towards Secure P2P Networking. 677-683 - Biagio Boi, Christian Esposito:

Decentralized Authentication for Web of Things: a Self-Sovereign Identity (SSI)-Based Solution. 684-688 - Abdelkareem Jaradat, Hanan Lutfiyya, Anwar Haque:

Synthetic Power Consumption Data Generation For Appliance Operation Modes. 689-694 - Jihwan Kim, Dongmin Shin, Chang-Gun Lee:

Mitigating Pessimism for Guaranteeing Safety Despite Physical Errors in CPS's. 695-699 - Duong Thuy Anh Nguyen, Jiaming Cheng, Ni Trieu, Duong Tung Nguyen:

Optimal Workload Allocation for Distributed Edge Clouds with Renewable Energy and Battery Storage. 700-705 - Vincent Latzko, Christian Vielhaus, Mahshid Mehrabi, Frank H. P. Fitzek

:
Accelerator-Aware Computation Offloading Under Timing Constraints. 706-710 - Lutong Chen, Kaiping Xue

, Jian Li, Zhonghui Li, Nenghai Yu:
Security-Enhanced WireGuard Protocol Design Using Quantum Key Distribution. 718-723 - Dongxiao Yu, Kaiyi Zhang, Youming Tao, Wenlu Xu, Yifei Zou, Xiuzhen Cheng:

Correlation-Aware and Personalized Privacy-Preserving Data Collection. 724-729 - Thomas Reisinger, Eerke Albert Boiten, Isabel Wagner

:
SEPPI: Secure and Privacy-Preserving Invitation for Unified Communication Meetings. 730-736 - Raoul Raftopoulos, Salvatore D'Oro, Tommaso Melodia, Giovanni Schembra:

DRL-Based Latency-Aware Network Slicing in O-RAN with Time-Varying SLAs. 737-743 - Lihao Zhang, Haijian Sun, Jin Sun, Rose Qingyang Hu:

WiSegRT: Dataset for Site-Specific Indoor Radio Propagation Modeling with 3D Segmentation and Differentiable Ray-Tracing: (Invited Paper). 744-748 - Praveen Fernando, Jin Wei-Kocsis:

QoE-Aware Airborne Communication Infrastructure for Surveillance in Wildfires. 749-753 - Zhiwu Guo, Wenhan Zhang, Ming Li, Marwan Krunz, Mohammad Hossein Manshaei:

DL-SIC: Deep Learning Aided Successive Interference Cancellation in Shared Spectrum. 754-760 - Muhammad Enayetur Rahman

, Md. Shirajum Munir, Sachin Shetty:
An Attention-based AI Model for 3D Beam Prediction in THz Unmanned Aerial Vehicle Communication. 761-766 - Hovannes Kulhandjian

, Yue Yang, Nicholas Amely:
Design and Implementation of a Smart Agricultural Robot bullDOG (SARDOG). 767-771 - Pavlos Doanis, Thrasyvoulos Spyropoulos:

Multi-Agent DQN with Sample-Efficient Updates for Large Inter-Slice Orchestration Problems. 772-777 - Ting-Li Huoh, Timothy Miskell, Onur Barut, Yan Luo, Peilong Li, Tong Zhang:

Malware Detection for Portable Executables Using a Multi-input Transformer-Based Approach. 778-782 - Zhuosheng Zhang, Noor Ahmed, Shucheng Yu:

QE-DBA: Query-Efficient Decision-Based Adversarial Attacks via Bayesian Optimization. 783-788 - Jian Ren, Tongtong Li:

Graph Isomorphism-Characterization and Efficient Algorithms. 789-793 - Mingjin Zhang, Jiannong Cao, Yuvraj Sahni, Xiangchun Chen, Shan Jiang

:
Resource-efficient Parallel Split Learning in Heterogeneous Edge Computing. 794-798 - Hongyang Du, Ruichen Zhang, Dusit Niyato, Jiawen Kang, Zehui Xiong

, Dong In Kim
:
Reinforcement Learning with Large Language Models (LLMs) Interaction for Network Services. 799-803 - Xiaonan You, Shengli Zhang, Taotao Wang, Soung Chang Liew:

Hyperclique: A Novel P2P Network Structure for Blockchain Systems. 804-809 - Justin Presley, Xi Wang, Xusheng Ai, Tianyuan Yu, Tym Brandel, Proyash Podder, Varun Patil, Alex Afanasyev, F. Alex Feltus, Lixia Zhang, Susmit Shannigrahi

:
Hydra: A Scalable Decentralized P2P Storage Federation for Large Scientific Datasets. 810-816 - Richard Vogel, Robert Manthey, Matthias Baumgart, Christian Roschke, Marc Ritter, Matthias Vodel:

Tamperproof Data Transmission to Offline IoT Devices in a Zero-Trust Environment. 817-822 - Guanglin Xing, Xiaoqi Li, Rui Hou:

A Reconstruction Forest-Based Interest Flooding Attack Detection Method in Named Data Networking. 823-829 - Yusaku Hayamizu, Hitoshi Asaeda:

Multicast Service Deployment Using Information Centric Cloud-Native Network Functions. 830-835 - Tatsuya Otoshi

, Masayuki Murata:
Distributed Beamforming by Multi-Agent Active Inference. 836-842 - Vanlin Sathya, Aasawaree Deshmukh, Manan Shah, Mehmet Yavuz:

Battery Life: Performance Analysis and Comparison between Wi-Fi, CBRS, and Macro Deployment System. 843-849 - Tomohiro Korikawa, Chikako Takasaki, Kyota Hattori, Hidenari Oowada:

A Routing Method with Link Information-based Rule Selection in Non-Terrestrial Networks. 850-855 - Jingjing Yao, Semih Cal, Xiang Sun:

Reliability-Aware Offloading in UAV-Aided Mobile Edge Network by Lyapunov Optimization. 856-861 - Mohammad Hossein Manshaei, Marwan Krunz, Amal Yousseef:

Performance Evaluation of DSRC and C-V2X Coexistence in the 5.895-5.925 GHz Spectrum. 862-867 - Ali Ehsanian, Thrasyvoulos Spyropoulos:

Distributed LSTM-based Slice Resource Allocation for Beyond 5G Networks. 868-874 - Jovita Mateus, Guy-Alain Lusilao-Zodi

, Antoine B. Bagula:
Federated Learning-Based Solution for DDoS Detection in SDN. 875-880 - Yuzhu Zhang, Hao Xu:

Optimal Dynamic Resource Allocation for Multi-RIS Assisted Wireless Network: A Causal Reinforcement Learning Approach. 881-885 - Ankan Dash, Jingyi Gu, Guiling Wang

, Nirwan Ansari
:
Self-Supervised Learning for User Localization. 886-890 - Khaled Sabahein, Feng Wang, Zhonghui Wang:

An Actor-Critic Approach for Resource Allocation in Energy Harvesting-Powered Wireless Body Area Network. 891-897 - Jiahui Jin, Ting Li:

Participation Selection in Mobile Crowd Sensing with Diversity Ensures. 898-902 - Wei Chen, Xiaotian Xu, Cong Hou, Ranxin Gao, Guanlin Si, Yue Zhang:

An Authorizable Threshold Signature Scheme for Secure Sharing and Mining of Power IoT Data. 903-909 - Shuo Wang, Chen Sun, Haojin Li, Tao Cui:

Cross-Tier Coordination in Spectrum Sharing: A Blockchain Approach. 910-914 - Shulei Zeng, Yao Sun, Mugen Peng:

Blockchain-Assisted Cross-Domain Data Governance for Social Computing. 915-920 - Ece Bingöl, Eylem Ekici:

mmWave Beam Selection in Dynamic Multi-Path Environments: A POMDP Approach. 921-926 - Tianyuan Yu, Zhaoning Kong, Xinyu Ma

, Lan Wang, Lixia Zhang:
PythonRepo: Persistent In-Network Storage for Named Data Networking. 927-931 - Darius Saif, Ashraf Matrawy:

Mass Configuration of Heterogeneous IIoT Nodes: A Proposal and Experimental Evaluation. 932-937 - Kohei Okazaki, Junichi Funasaka:

Implementation of Proxy to Make Content Shared on BitTorrent Retrievable from CCN. 938-943 - Vanlin Sathya, Aasawaree Deshmukh, Mohit Goyal, Mehmet Yavuz:

Roaming Performance Analysis and Comparison Between Wi-Fi and Private Cellular Network. 944-950 - Lihua Ruan, Hongyi Zhu:

A Hybrid Fiber-Femtocell Indoor Network to Support Low-Latency and High-Bandwidth Indoor Communication Applications. 951-956 - Shunsuke Fujio, Kazuyuki Ozaki:

Radio Propagation Environment Prediction Method for UAV-Assisted Cellular Networks with Millimeter-Wave Beamforming. 957-961 - Muztaba Fuad

, Anthony Smith, Debzani Deb
:
A Mobile App-Based Indoor Mobility Detection Approach Using Bluetooth Signal Strength. 962-968 - Tan-Jan Ho, Hua-Yu Luo:

A Min-Max Approximation-Based SDP Approach to Robust Vehicle Location Estimation in VANETS. 969-973 - Nadieh Moghadam:

Detecting and Counteracting Adversaries in Wireless Multicast over Fading Channels. 974-977 - Abigail O. Oyekola, Imtiaz Ahmed, Danda B. Rawat, Ramesh Annavajjala, Sachin Shetty:

Data-Driven Joint Demodulation and Decoding in THz Communication Systems. 978-983 - Hovannes Kulhandjian

, Brandon Poorman, Javier Gutierrez, Michel Kulhandjian:
AI-powered Emergency Keyword Detection for Autonomous Vehicles. 984-988 - Sai Sharanya Yellampalli, Mikulas Chalupa, Jingyi Wang, Hyo Jung Song, Xinyue Zhang, Hao Yue, Miao Pan:

Client Selection in Federated Learning: A Dynamic Matching-Based Incentive Mechanism. 989-993 - Chia-Yu Lin, Chih-Hung Han, Wei-Chih Yin, Ted T. Kuo:

A Cluster-based Privacy-Enhanced Hierarchical Federated Learning Framework with Secure Aggregation. 994-999 - Aidan Samuel Wright, Sandeep John Philip, Xiaomin Ma:

Constrained Bayesian Optimization of VANET Safety Messaging Using Deep Learning Neural Networks. 1000-1005 - Ruixin Li, Chun Wang, Zibin Zheng, Huawei Huang:

Enhancing Federated Learning with Self-Determining Mechanism in MEC. 1006-1010 - Hyuck M. Kwon, Jyothi Sri Sai Manne, Khanh Pham:

5G-and-Beyond Positioning Against Amplify-and-Forward Relay Jamming. 1011-1015 - Ryota Kuribayashi, Mamoru Sawahashi:

Comparisons of TDM and FDM Pilot Signals for Phase Noise Estimation with High-Order QAM for DFT-Spread OFDM. 1016-1021 - Hyuck M. Kwon:

Intermittent Markov Frequency-Hopping Entropy Rate. 1022-1026 - Hisham Abuella, Md Zobaer Islam, Russ Messenger, John F. O'Hara, Sabit Ekin:

Analysis and Empirical Validation of Visible Light Path Loss Model for Vehicular Sensing and Communication. 1027-1031 - Chenhao Yang, Xin Wang, Wei Ni, Yi Jiang:

Beamforming Design for MIMO DFRC Systems with Transmit Covariance Constraints. 1032-1036 - Xiangrui Ning, Ming Zeng, Zesong Fei:

Joint Task Offloading and Service Migration in RIS Assisted Vehicular Edge Computing Network Based on Deep Reinforcement Learning. 1037-1042 - Kohsuke Sonoda, Hiroshi Katada, Shigeru Shimamoto, Taku Yamazaki, Takumi Miyoshi:

Extended Physarum Solver for Capacity-Constraint Routing. 1043-1047 - Shengping Zhou, Ming Zeng, Zesong Fei:

User Grouping with Fairness Consideration in Massive MIMO System with Varying Channel Quality. 1048-1053 - Mauro Belgiovine, Jerry Gu, Joshua Groen, Miquel Sirera, Utku Demir, Kaushik R. Chowdhury:

MEGATRON: Machine Learning in 5G with Analysis of Traffic in Open Radio Access Networks. 1054-1058 - Hideki Tode, Yosuke Tanigawa, Ratha Yeu, Akio Hasegawa:

[Invited Paper] Time Gating Control Approaches for Time Critical Applications from Perspective of Wireless LANs and All Optical Networks. 1059-1064 - Lusi Li, Rui Ning, Ziyu Wang

, Shuai Hao:
A Dual Transfer Framework for Cooperative Spectrum Sensing in Cognitive Radio. 1065-1070 - Ding Zhao, Ibrahim Pehlivan

, Aditya Wadaskar, Danijela Cabric:
Fast Frequency-Direction Mapping Design for Data Communication With True-Time-Delay Array Architecture. 1071-1076 - Mayuko Inoue, Tomoaki Ohtsuki, Mondher Bouazizi:

DTL-Based CSI Feedback Combined with Continual Learning in FDD Massive MIMO Systems. 1077-1081 - Xiaowei Nie, Demin Wang, Yuqing Zhang, Xiaoduo Pan, Zhibin Zuo:

A Deep Reinforcement Learning-based Contention Window Avoidance Scheme for Distinguishing Network Service Priorities. 1082-1086 - Ahmed Hamdi Sakr, Sergei S. Avedisov, Shishir Manjunatha, Onur Altintas:

Performance Assessment of Intent Sharing in Infrastructure-Assisted Cooperative Perception Services. 1087-1091 - Ziqi Wang, Shiwen Mao:

AIGC for RF Sensing: The Case of RFID-Based Human Activity Recognition. 1092-1097 - Grace Colette Tessa Masse, Abderrahim Benslimane, Vianney Kengne Tchendji

, Ahmed H. Anwar:
A Secure Hierarchical Federated Learning Using Dirichlet-based Trust Management. 1098-1103 - Hiroto Shida, Aoto Kaburaki, Koichi Adachi:

Energy-Efficient Multi-Hop LoRaWAN with Transmission and Synchronization Control. 1104-1108 - Aoto Kaburaki, Koichi Adachi, Osamu Takyu, Mai Ohta, Takeo Fujii:

LBT-Based Resource Allocation Methods Utilizing Periodicity of Traffic in LPWAN. 1109-1113 - Ines Carole Kombou Sihomnou, Abderrahim Benslimane, Ahmed Hemida, Gabriel Deugoue, Charles A. Kamhoua:

Game-Theoretic Defense Strategies for Mitigating Gray Hole Attacks on Energy-Limited Sensors in Wireless Sensor Networks. 1114-1120 - Yuzhu Zhang, Hao Xu:

Decentralized Learning based Optimal Design for RIS-assisted Multi-user Ad-Hoc Network: A Multi-Player Multi-Armed Bandits Approach. 1121-1125 - Mohammad Hossein Alishahi

, Paul Fortier, Ming Zeng, Fang Fang:
Computation Rate Maximization in STAR-RIS Aided Wireless Powered Mobile Edge Computing Networks with NOMA. 1126-1131 - Alireza Famili, Tolga O. Atalay, Angelos Stavrou:

5GPS: 5G Femtocell Placement Strategies for Ultra-Precise Indoor Localization in the Metaverse. 1132-1138 - Daiki Ishikawa, Chedlia Ben Naila

, Hiraku Okada
, Masaaki Katayama
:
Performance Analysis of LDPC Coded Outdoor Long-Distance Imaging MIMO System. 1139-1143 - Touhid Hossain Pritom

, Simon Welzel, Florian Klingler:
Cuckoos United: Extending Cuckoo Filters for Message Dissemination in Vehicular Networks. 1144-1148 - Yuto Lim, Lishuai Yuan, Zhaowei Zhong:

Quantum Error Corrected Fidelity Routing Design for Long-Distance Quantum Networks. 1149-1153 - Denis A. Khotimsky, Eugene B. DeFrancisci, Gregory K. Sherrill, Rajesh Yadav:

Contention - Based Operation in TDM-Type Passive Optical Networks. 1154-1157 - Xinyuan Zhang, Xiaoyang Mao, Wan-Young Chung, Zhigang Gao, Jianwen Feng, Kentaro Go:

Area4U: Predicting Interaction Hotspots for Large Public Displays. 1158-1163 - Zibin Lin, Taotao Wang, Chonghe Zhao, Shengli Zhang, Qing Yang, Long Shi:

A Measurement Investigation of ERC-4337 Smart Contracts on Ethereum Blockchain. 1164-1170 - Kota Makino, Takeshi Hirai, Tutomu Murase:

Cooperative Mobility Control for Maintaining Required Throughput in Multiple Ad Hoc Networks with Autonomous Mobile Robots. 1171-1176

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














