


default search action
37th ICOIN 2023: Bangkok, Thailand
- International Conference on Information Networking, ICOIN 2023, Bangkok, Thailand, January 11-14, 2023. IEEE 2023, ISBN 978-1-6654-6268-6
- Sunao Miyamoto, Shota Yamada, Takeo Fujii:
Height Pattern Estimation Method Using the Combination of Radio Map and 3D Map for Spectrum Sharing. 1-6 - Shougo Matsuo, Sunao Miyamoto, Hirofumi Nakajo, Takeo Fujii:
Beam Pattern Estimation of 5G Millimeter-Wave Base Station Based on Radio Map and Multi-Beam Antenna Model at 28GHz. 7-12 - Shuto Fukue, Giuseppe Thadeu Freitas de Abreu, Koji Ishibashi:
Network-Assisted Full-Duplex Millimeter-Wave Cell-Free Massive MIMO with Localization-Aided Inter-User Channel Estimation. 13-18 - Apurba Adhikary, Md. Shirajum Munir, Avi Deb Raha
, Yu Qiao, Sang Hoon Hong, Eui-Nam Huh, Choong Seon Hong:
An Artificial Intelligence Framework for Holographic Beamforming: Coexistence of Holographic MIMO and Intelligent Omni-Surface. 19-24 - Van-Binh Duong
, Younghan Kim:
A Design of Service Mesh Based 5G Core Network Using Cilium. 25-28 - Chungjae Choe, Sungwook Jung, Nak-Myoung Sung, Sukjun Lee:
Scene identification using visual semantic segmentation and supplementary classifier for resource-constrained edge systems. 29-32 - Ricardo do Nascimento Boing, Hugo Vaz Sampaio
, Fernando Koch, Wesley dos Reis Bezerra, Rene Nolio Santa Cruz
, Carlos Becker Westphall:
Advances in Distributed Load Orchestration for Vision Computing in 5G-MEC Environments. 33-38 - Peter Sossalla, Johannes Hofer, Christian Vielhaus, Justus Rischke, Frank H. P. Fitzek
:
Offloading Visual SLAM Processing to the Edge: An Energy Perspective. 39-44 - Dhruv Nakrani, Jayesh Khuman, Ram Narayan Yadav:
Dynamic Edge Server Placement for Computation Offloading in Vehicular Edge Computing. 45-50 - Shuyang Ren, Choonhwa Lee:
Blockchain-Based Service Migration for Multi-Access Edge Computing. 51-55 - Yeonoh An, Hoorin Park
, Wonjun Lee:
Signal Strength Balanced Scheduling for Secure Ambient Backscatter Networks. 56-61 - Ngoc-Truong Nguyen, Ton-Nhan Le, Khanh-Hoi Le Minh, Kim-Hung Le
:
Towards Generating Semi-Synthetic Datasets for Network Intrusion Detection System. 62-66 - Wesley dos Reis Bezerra, Ricardo do Nascimento Boing, Cristiano Antonio de Souza, Carlos Becker Westphall:
An Experimentation on CoAP Multi Factor Authentication Mechanism with Reputation for Internet of Things Constrained Devices and Low Power Wide Area Network. 67-72 - Olarn Wongwirat, Supannada Chotipant, Tadchapon Hongtong, Nattawat Suttijumnong:
Development of WLAN Topology Display System. 73-78 - Tarun Jain, Sainath Bitragunta, Ashuthosh Bhatia:
Relay Selection, Eavesdropper-Aware Relaying, PHY-Secrecy Capacity Analysis of Cooperative Wireless System over Hybrid Fading Channels. 79-84 - Taro Miyamoto, Shusuke Narieda
, Takeo Fujii, Hiroshi Naruse:
Measurement of Sub-GHz Band LPWA Radiowave Propagation on Each Floor in Indoor Environment. 85-88 - Kentaro Yoda, Takumi Yasaka, Kohei Miyashita, Satoshi Suyama, Hiroyuki Otsuka:
Considerations on Tradeoff Between Downlink NOMA and Beamforming in Mobile Systems. 89-93 - Daisuke Kumamoto, Shusuke Narieda
, Takeo Fujii, Hiroshi Naruse:
Lower Bound for the Number of Accommodable End-devices in LPWAN with Multiple Interferences. 94-97 - Yusuke Itayama, Hirofumi Nakajo, Shougo Matsuo, Takeo Fujii:
Measurement-based Spectrum Database for Non-Terrestrial Networks. 98-103 - Hong Nguyen, Arash Hajisafi, Alireza Abdoli, Seon Ho Kim, Cyrus Shahabi:
An Evaluation of Time-Series Anomaly Detection in Computer Networks. 104-109 - Jinho Park, Kwangsue Chung:
Collaborative Computation Offloading Scheme Based on Deep Reinforcement Learning. 110-115 - Luyao Zou, Chu Myaet Thwal, Seong-Bae Park, Choong Seon Hong:
Edge-assisted Attention-based Federated Learning for Multi-Step EVSE-enabled Prosumer Energy Demand Prediction. 116-121 - Eunil Seo, Vinh Pham, Erik Elmroth:
Accelerating convergence in wireless federated learning by sharing marginal data. 122-127 - Jeongho Kang, Kwangsue Chung:
Adaptive Streaming Scheme with Reinforcement Learning in Edge Computing Environments. 128-133 - Yu Qiao, Md. Shirajum Munir, Apurba Adhikary, Avi Deb Raha
, Sang Hoon Hong, Choong Seon Hong:
A Framework for Multi-Prototype Based Federated Learning: Towards the Edge Intelligence. 134-139 - K. Haribabu, Ankit Agrawal, Ritika Bhatia, Ashutosh Bhatia, Kamlesh Tiwari:
T-PASS: A Blockchain-based NFT Enabled Property Management and Exchange System. 140-145 - Ritik Bavdekar, Eashan Jayant Chopde, Ankit Agrawal, Ashutosh Bhatia, Kamlesh Tiwari:
Post Quantum Cryptography: A Review of Techniques, Challenges and Standardizations. 146-151 - João Santos, Ivone Amorim
, Alexandre Ulisses, João Correia Lopes
, Vasco Filipe:
Secure, Dynamic and Uncomplicated Licensing of Movies on a Blockchain Infrastructure. 152-157 - Seok Bin Son, Soohyun Park, Haemin Lee, Youngkee Kim, Dongwan Kim, Joongheon Kim:
Introduction to MITRE ATT&CK: Concepts and Use Cases. 158-161 - Cong-Danh Nguyen, Nghi Hoang Khoa, Khoa Nguyen-Dang Doan, Nguyen Tan Cam:
Android Malware Category and Family Classification Using Static Analysis. 162-167 - Özgür Alaca
, Saud Althunibat, Serhan Yarkan, Scott L. Miller, Khalid A. Qaraqe
:
Performance Analysis of Uplink IM-OFDMA Systems in the Presence of CFO and Rx-IQI. 168-173 - Min-Seok Yoon, Kyoung Min Kim, Tae-Jin Lee:
Selective Competition for NOMA-capable Devices Using RIS. 174-177 - Muhammad Usman Sheikh, Muhsin Ali, Guillermo Carpintero, Kalle Ruttik, Edward Mutafangwa, Riku Jäntti:
Channel Characterization at Sub-THz Band with Measurements and Ray Tracing in Indoor Case. 178-183 - Raudel Ravelo Suarez, Amiya Nayak
:
THL2H-Ex: An Improved Neighbor Discovery Approach for Wireless Sensor Networks. 184-189 - Samad Salehi Kolahi, Tahany Shaheen, Eli Aderson, Rahaf Aljadani, Asma Ceyddique:
IEEE 802.11ac WLAN Analysis in 160Mhz Channel. 190-193 - Kohei Tsuchida
, Naoki Matsumoto, Kunitake Kaneko:
Node-Centric Random Walk for Fast Index-Free Personalized PageRank. 194-199 - Seyed Ali Alhosseini, Christoph Meinel:
The More The Merrier: Reconstruction of Twitter Firehose. 200-205 - Nway Nway Ei, Pyae Sone Aung, Seong-Bae Park, Eui-Nam Huh, Choong Seon Hong:
Joint Association and Power Allocation for Data Collection in HAP-LEO-Assisted IoT Networks. 206-211 - Ichiu Inoue, Kayoko Yamamoto:
Development of Activity Management System to Watch over Children. 212-217 - Kodai Tanabe, Go Hasegawa, Gen Kitagata:
Traffic reduction for out-of-band network management over LPWA. 218-223 - Ijaz Ahmad
, Seokjoo Shin:
Perceptual Encryption-based Privacy-Preserving Deep Learning for Medical Image Analysis. 224-229 - Kazumasa Omote:
Towards Decentralized Autonomous Digital Signatures Using Smart Contracts. 230-235 - Feng Xiao, Jin Wang, Min Wei, Chang Liu, Vanqui Le, Jiangpei Xu:
Privacy Data Protection Scheme of Industrial Field Equipment Based on Fully Homomorphic Encryption. 236-241 - Marwa Jabberi, Ali Wali, Adel M. Alimi:
Generative Data Augmentation applied to Face Recognition. 242-247 - Nam-Phuong Tran, Nhu-Ngoc Dao, Quang Tuan Do, The-Vi Nguyen, Sungrae Cho
:
Privacy-Preserving Traffic Flow Prediction: A Split Learning Approach. 248-250 - Haoran Qi, Zhan Shu, Xiaomin Chen:
Topology Design for Data Center Networks Using Deep Reinforcement Learning. 251-256 - Changdae Lee, Jaeseok Yoo, Kwang-Hyun Park:
Design of a 3D Scene Reconstruction Network Robust to High-Frequency Areas Based on 2.5D Sketches and Encoders. 257-262 - Ilane Karise Barbosa Cunha, Joaquim Celestino Júnior, Marcial Porto Fernandez, Ahmed Patel, Maxwell E. Monteiro:
VNDN-Fuzzy - A strategy to mitigate the forwarding interests broadcast storm problem in VNDN networks. 263-270 - Ngo Thien Thu, Eui-Nam Huh, Choong Seon Hong:
ETANet: An Efficient Triple-Attention Network for Salient Object Detection. 271-276 - Girum Fitihamlak Ejigu, Sang Hoon Hong, Choong Seon Hong:
Robust Federated Learning with Local Mixed Co-teaching. 277-281 - Junhan Zang, Syed M. Raza
, Hyunseung Choo, Gyurin Byun, Moonseong Kim:
Deep Reinforcement Learning Driven Aggregate Flow Entries Eviction in Software Defined Networking. 282-286 - Yu Zhang, Mengze Cui, Mina Abadeer, Sergei Gorlatch:
A QoS-Aware Routing Mechanism for SDN-Based Integrated Networks. 287-292 - Zhun Ge, Jiacheng Hou, Amiya Nayak
:
Forecasting SDN End-to-End Latency Using Graph Neural Network. 293-298 - Jumana Khrais, Mariam Al-Issa, Reham Al-Omari, Ahmad T. Al-Hammouri:
A Software-Defined Networks Approach for Cyber Physical Systems. 299-304 - Varun Sharma, Shatrunjay Rawat:
Optimizing Forensic Data Availability and Retention of SDN Forensic Logs by Using Bloom Filter. 305-311 - Hyowon Kim, Inshil Doh:
Privacy Enhanced Federated Learning Utilizing Differential Privacy and Interplanetary File System. 312-317 - Raza Ul-Mustafa, Alan McGibney, Susan Rea:
Establishing Trustworthy Rational Friendships in Social Internet of Things. 318-327 - Ondrej Hujnak, Kamil Malinka
, Petr Hanácek:
Indirect Bluetooth Low Energy Connection Detection. 328-333 - Jan Zboril, Ondrej Hujnak, Kamil Malinka
:
IoT Gateways Network Communication Analysis. 334-339 - Khanista Namee, Peerapon Sawatdee, Nanthawad Promsorn, Siwalai Chinchua, Areej Meny, Supeeti Kulchan:
Applying of Websocket and WebRTC for Video Calling in Telemedicine during COVID-19 Pandemic. 340-346 - Talaya Farasat, Muhammad Ahmad Rathore, JongWon Kim:
Integrating Machine Learning for Network Threat Detection with SmartX Multi-Sec Framework. 347-351 - Avi Deb Raha
, Md. Shirajum Munir, Apurba Adhikary
, Yu Qiao, Seong-Bae Park, Choong Seon Hong:
An Artificial Intelligent-Driven Semantic Communication Framework for Connected Autonomous Vehicular Network. 352-357 - Kenta Terada, Yasuo Okabe, Yoshinori Matsumoto:
Is Puzzle-Based CAPTCHA Secure Against Attacks Based on CNN? 358-362 - Sung Hyun Oh, Jeong Gon Kim:
LSTM-based PdM Platform for Automobile SCU Inspection Equipment. 363-365 - Faqiang Zhang, Nuttanan Wichitaksorn, Bhargab Chattopadhyay:
Coreset Construction for Extra Binomial Variation in Binomial Regression. 366-369 - Hrishikesh Dutta, Amit Kumar Bhuyan, Subir Biswas:
Multi-armed Bandit Learning for TDMA Transmission Slot Scheduling and Defragmentation for Improved Bandwidth Usage. 370-375 - Amit Kumar Bhuyan, Hrishikesh Dutta, Subir Biswas:
UAV Trajectory Planning For Improved Content Availability in Infrastructure-less Wireless Networks. 376-381 - Dong Uk Kim, Seong Bae Park, Choong Seon Hong, Eui-nam Huh:
Resource Allocation and User Association Using Reinforcement Learning via Curriculum in a Wireless Network with High User Mobility. 382-386 - Fivos Allagiotis, Christos Bouras, Vasileios Kokkinos
, Apostolos Gkamas
, Philippos Pouyioutas:
Reinforcement Learning Approach for Resource Allocation in 5G HetNets. 387-392 - Praphan Pavarangkoon
, Shohei Nakajima, Nattapong Kitsuwan:
Cache Node Placement Scheme Considering Maximum Traffic in Content-Centric Networks. 393-395 - Tho Minh Duong, Sungoh Kwon
:
Characteristics of FRET-based Molecular Communication. 396-399 - Jaewook Lee, Sangwon Seo, Haneul Ko:
UAV-Based Data Collection and Wireless Power Transfer System with Deep Reinforcement Learning. 400-403 - Souad Labghough, Fouad Ayoub, Faissal El Bouanani
, Mostafa Belkasmi, Khalid A. Qaraqe
:
ABEP Analysis of Coded and Uncoded Mixed RF/FSO Communication System SWIPT-based. 404-409 - Surjeet Kumar, Shilpa Thakur, Ajay Singh:
Secrecy Performance of Energy Harvesting Based D2D Communications in Spectrum-Sharing Networks. 410-414 - Koduru Sree Venkateswara Rao, Ajay Singh:
Security of Energy Harvesting Based D2D Communications in Cognitive Cellular Network. 415-419 - Chi-Won Park, Yuri Seo, Teh-Jen Sun, Ga-Won Lee, Eui-Nam Huh:
Small Object Detection Technology Using Multi-Modal Data Based on Deep Learning. 420-422 - Sumit Kumar Dam, Md. Shirajum Munir, Avi Deb Raha
, Apurba Adhikary, Seong-Bae Park, Choong Seon Hong:
RNN-based Text Summarization for Communication Cost Reduction: Toward a Semantic Communication. 423-426 - Caesar Wu, Pascal Bouvry:
The Emerged Artificial Intelligence Protocol for Hierarchical Information Network. 427-432 - Sara Badar, Souad Labghough, Almaha Al-Abdulghani, Eiman Mohammed, Othmane Bouhali
, Khalid A. Qaraqe
:
Machine Learning Assisted Approach for Water Leaks Detection. 433-437 - Ching-Seh Mike Wu, Sam Chen:
A Heuristic Intrusion Detection Approach Using Deep Learning Model. 438-442 - Sheikh Salman Hassan
, Yu Min Park, Kitae Kim, Sang Hoon Hong, Choong Seon Hong:
Seamless and Efficient Resources Allocation in 6G Satellite Networks Servicing Remote User Equipments. 443-448 - Kimchheang Chhea
, Sengly Muy, Jung-Ryun Lee:
Kuramoto-Inspired Wireless Resource Allocation for Weighted Networks. 449-453 - Shusuke Narieda
, Takeo Fujii:
Robustness to Digital Power Adjustment in Transmit Power Allocation for Poor Conditioned LPWA End Devices. 454-456 - Yang Yu, Sanghwan Lee:
A Collaborative UAV Routing Algorithm for Time Sensitive Surveillance Tasks. 457-460 - Masaki Sugiyama, Aohan Li, Makoto Naruse, Mikio Hasegawa
:
Scalable Channel Allocation in Downlink NOMA Using Parallel Array of Laser Chaos Decision-Maker. 461-466 - Shaogang Hu, Renwei Li, Qiang Hu, Guanchao Qiao:
ResNet-TCN: A Joint Model for ECG Heartbeat Classification with High Accuracy. 467-471 - May Phu Paing, One-Sun Cho, Jae-Wan Cho:
Histopathological Classification of Colorectal Polyps using Deep Learning. 472-477 - Sandhya Soni, Rahul Makkar
, Divyang Rawal, Nikhil Sharma:
Link-Level Assessment of NOMA Aided Multi-hop DECT-2020 New Radio for mMTC Applications. 478-482 - Loc X. Nguyen, Pyae Sone Aung, Huy Q. Le, Seong-Bae Park, Choong Seon Hong:
A New Chapter for Medical Image Generation: The Stable Diffusion Method. 483-486 - Francisco Mardônio Vieira Filho, Bruno Lopes Alcantara Batista, Joaquim Celestino Júnior, José Neuman de Souza:
Heimdall: Blockchain-Based Consent Management Framework. 487-492 - Kyuchang Kang, Changseok Bae:
Classification performance evaluation of latent vector in encoder-decoder model. 493-498 - Chu Myaet Thwal
, Ye Lin Tun
, Kitae Kim, Seong-Bae Park, Choong Seon Hong:
Transformers with Attentive Federated Aggregation for Time Series Stock Forecasting. 499-504 - Sheikh Salman Hassan
, Seong-Bae Park, Eui-Nam Huh, Choong Seon Hong:
Seamless and Intelligent Resource Allocation in 6G Maritime Networks Framework via Deep Reinforcement Learning. 505-510 - Dongwook Kim, Hyunju Lee, Jung-Hyok Kwon, Jaehoon Park, Bokyoung Kim, Eui-Jik Kim:
Advanced Signal Processing of Photo-Excited Current Spectroscopy Based on Trap State Distribution for Photo-Sensor Applications. 511-516 - Dupyo Hong, DongWan Kim, Oh Jung Min, Yongtae Shin:
Resource Allocation Reinforcement Learning for Quality of Service Maintenance in Cloud-Based Services. 517-521 - Zhegao Piao, Yeong Hyeon Gu, Seong Joon Yoo, Myoung-ho Seong:
Segmentation of Cerebral Hemorrhage CT Images using Swin Transformer and HarDNet. 522-525 - Huy Q. Le, Loc X. Nguyen, Seong-Bae Park, Choong Seon Hong:
Layer-wise Knowledge Distillation for Cross-Device Federated Learning. 526-529 - Yujie Li, Sang-Chul Kim:
Vehicle Platooning Algorithm for Improving Following Control. 530-533 - Anh-Tien Tran, Demeke Shumeye Lakew, Duc Thien Hua, Quang Tuan Do, Nhu-Ngoc Dao, Sungrae Cho
:
A Review on Rate-Splitting Multiple Access-Assisted Downlink Networks: Rate Optimizations. 534-536 - Dongbeom Ko, Jaeho Jeon, Sungjoo Kang:
A Research on Low Latency Motion Control System using Real-time Scheduling in Edge Server. 537-540 - Trinh Thuc Lai, Jaehyuk Cho, Myungsik Yoo:
Noise Reduction Caused by External Events in Wireless Sensor Network. 541-544 - Quang Hieu Vo, Sang Hoon Hong, Lok-Won Kim, Choong Seon Hong:
Integrated Optimization in Training Process for Binary Neural Network. 545-548 - Nguyen Dang Tri
, Loc X. Nguyen, Huy Q. Le, KiTae Kim, S. M. Ahsan Kazmi, Seong-Bae Park, Eui-Nam Huh, Choong Seon Hong:
Semantic Communication for AR-based Services in 5G and Beyond. 549-553 - Iftekharul Islam Shovon, Seokjoo Shin:
The Performance of Graph Neural Network in Detecting Fake News from Social Media Feeds. 560-564 - Kyunghee Jung, Toan Duc Nguyen, Duc-Tai Le, Junghyun Bum, Simon S. Woo, Hyunseung Choo:
Hand Bone X-rays Segmentation and Congregation for Age Assessment using Deep Learning. 565-568 - Dara Ron, Eun-Jeong Han, Jung-Ryun Lee:
Spectral Efficiency Maximization for V2V Communication Underlaid Cellular Uplink Using Deep Neural Networks. 569-573 - Hui-Chun Hung
, Ping-Han Lee:
Applying Deep Knowledge Tracing Model for University Students' Programming Learning. 574-577 - Mrunal Hareshwar Gaikar, K. Hari Babu
:
A Data-plane Approach for Detecting Malware in IoT Networks. 578-583 - Cuong Manh Ho, The-Vi Nguyen, Chunghyun Lee, Thi My Tuyen Nguyen, Sungrae Cho
:
Cooperative User Relaying with RSMA for 6G Networks: Overview, Research Challenges and Future Trends. 584-587 - Tian-Bo Deng:
Phase-Compensating-Circuit Design Utilizing Linear-Nonlinear Joint Optimizations. 588-591 - Jiann-Liang Chen, Zheng-Zhun Chen, Youg-Sheng Chang, Ching-Iang Li, Tien-I Kao, Yu-Ting Lin, Yu-Yi Xiao, Jian-Fu Qiu:
AI BOX: Artificial intelligence-based autonomous abnormal network traffic response mechanism. 592-595 - Yu Min Park, Kitae Kim, Seong-Bae Park, Choong Seon Hong:
Trajectory Optimization of Multiple Urban Air Mobility for Reliable Communications with Integrated Space-Air-Ground Network. 596-599 - Takeshi Kato, Norihiro Ishikawa:
A PSK-based Multi-hop Authentication for Home Network and its Implementation Using PUCC Protocol. 600-605 - Issaree Srisomboon, Sanghwan Lee:
UAVs Reformation Approach Based on Packet Loss in GPS-Denied Environments. 606-609 - Nico Saputro:
A Brief review on Network Identity-based Moving Target Defense. 610-615 - Deepti Sharma, Adarsh Kumar, Ramesh Babu Battula
:
FedBeam: Federated learning based privacy preserved localization for mass-Beamforming in 5GB. 616-621