default search action
39th INFOCOM 2020: Toronto, ON, Canada - Workshops
- 39th IEEE Conference on Computer Communications, INFOCOM Workshops 2020, Toronto, ON, Canada, July 6-9, 2020. IEEE 2020, ISBN 978-1-7281-8695-5
- Clement Kam, Sastry Kompella, Anthony Ephremides:
Age of Incorrect Information for Remote Estimation of a Binary Markov Source. 1-6 - Jaya Prakash Champati, Mikael Skoglund, James Gross:
Detecting State Transitions of a Markov Source: Sampling Frequency and Age Trade-off. 7-12 - Shaoling Hu, Wei Chen:
Balancing Data Freshness and Distortion in Real-time Status Updating with Lossy Compression. 13-18 - He Ma, Shidong Zhou, Xiujun Zhang, Limin Xiao:
Transmission Scheduling for Multi-loop Wireless Networked Control Based on LQ Cost Offset. 19-25 - Bo Chang, Liying Li, Guodong Zhao, Zhen Meng, Muhammad Ali Imran, Zhi Chen:
Age of Information for Actuation Update in Real-Time Wireless Control Systems. 26-30 - Parisa Rafiee, Peng Zou, Omur Ozel, Suresh Subramaniam:
Maintaining Information Freshness in Power-Efficient Status Update Systems. 31-36 - M. Arun, Saminathan Balamurali, Bharat S. Rawal, Qiang Duan, Lakshmana Kumar Ramasamy, Balamurugan Baluswamy:
Mutual Authentication and Authorized Data Access Between Fog and User Based on Blockchain Technology. 37-42 - Dilu Zhang, Lei Fan:
Cerberus: Privacy-Preserving Computation in Edge Computing. 43-49 - Libin Liu, Hong Xu, Chengxi Gao, Peng Wang:
Bottleneck-Aware Coflow Scheduling Without Prior Knowledge. 50-55 - Yuan Wu, Xu Xu, Liping Qian, Bo Ji, Zhiguo Shi, Weijia Jia:
Revenue-Sharing based Computation-Resource Allocation for Mobile Blockchain. 56-61 - Duo Zhang, Youliang Tian, Linjie Wang, Sheng Gao, Jianfeng Ma:
Cooperative Game Model of Delegation Computing: Verifier Separated from Calculators. 62-67 - Chenming Yang, Liang Zhou, Hui Wen, Yue Wu:
U-ASG: A Universal Method to Perform Adversarial Attack on Autoencoder based Network Anomaly Detection Systems. 68-73 - Hua Wu, Zhenhua Yu, Guang Cheng, Shuyi Guo:
Identification of Encrypted Video Streaming Based on Differential Fingerprints. 74-79 - Chong Liu, Xiangyang Luo, Fuxiang Yuan, Fenlin Liu:
RNBG: A Ranking Nodes Based IP Geolocation Method. 80-84 - Lin Han, Yingzhen Qu, Lijun Dong, Richard Li:
A Framework for Bandwidth and Latency Guaranteed Service in New IP Network. 85-90 - Gang Liu, Wei Quan, Nan Cheng, Ning Lu, Hongke Zhang, Xuemin Shen:
P4NIS: Improving network immunity against eavesdropping with programmable data planes. 91-96 - Fan Wu, Wang Yang, Ju Ren, Feng Lyu, Xiaojie Ding, Yaoxue Zhang:
Adaptive Video Streaming Using Dynamic NDN Multicast in WLAN. 97-102 - Ao Li, Xin Liu, Qiang Guan, Deyun Chen, Guanglu Sun:
A View-Invariant Feature Learning Model for Cross-View Security Authentication in Mobile Smart Devices. 103-108 - Hina Batool, Ammar Masood:
Enterprise Mobile Device Management Requirements and Features. 109-114 - Sheng Wang, Linning Peng, Hua Fu, Aiqun Hu, Xinyu Zhou:
A Convolutional Neural Network-Based RF Fingerprinting Identification Scheme for Mobile Phones. 115-120 - Nattanon Wongwiwatchai, Phannawhat Pongkham, Kunwadee Sripanidkulchai:
Comprehensive Detection of Vulnerable Personal Information Leaks in Android Applications. 121-126 - Akinsola Akinsanya, Manish Nair, Yijin Pan, Jiangzhou Wang:
A Dynamic Resource Allocation Scheme in Vehicular Communications. 127-131 - Tianqi Chen, Jian He, Huiling Zhu, Lin Cai, Peng Yue, Jiangzhou Wang:
Resource Allocation in Drone-Assisted Emergency Communication Systems. 132-137 - Yuan Gao, Jiang Cao, Ping Wang, Junsong Yin, Ming He, Ming Zhao, Mugen Peng, Su Hu, Yunchuan Sun, Jing Wang, Shaochi Cheng, Yang Guo, Yanchang Du, Yanxi Cai, Jinhui Huang, Kai Qiu:
Intelligent UAV Based Flexible 5G Emergency Networks: Field Trial and System Level Results. 138-143 - Hongming Zhang, Li Wang, Aiguo Fei:
An Integrated Platoon and UAV System for 3D Localization in Search and Rescue. 144-149 - Xiangwang Hou, Zhiyuan Ren, Jingjing Wang, Shuya Zheng, Hailin Zhang:
Latency and Reliability Oriented Collaborative Optimization for Multi-UAV Aided Mobile Edge Computing System. 150-156 - Cong Xu, Tingqiu Yuan, Haibo Zhang, Tao Huang, Feilong Tang:
Dual Channel Per-packet Load Balancing for Datacenters. 157-164 - Kaihui Gao, Dan Li, Li Chen, Jinkun Geng, Fei Gui, Yang Cheng, Yue Gu:
Predicting Traffic Demand Matrix by Considering Inter-flow Correlations. 165-170 - Minghan Jia, Weifeng Sun, Zun Wang, Yaohua Yan, Hongyu Qin, Kelong Meng:
MFBBR: An Optimized Fairness-aware TCP-BBR Algorithm in Wired-cum-wireless Network. 171-176 - Jiao Li, Li Chen:
A Concurrent Weighted Communication Scheme for Blockchain Transaction. 177-182 - Muhammad Habib Ur Rehman, Khaled Salah, Ernesto Damiani, Davor Svetinovic:
Towards Blockchain-Based Reputation-Aware Federated Learning. 183-188 - Sriram S, Vinayakumar R., Mamoun Alazab, K. P. Soman:
Network Flow based IoT Botnet Attack Detection using Deep Learning. 189-194 - Amit Dua, Akash Dutta, Nishat Zaman, Neeraj Kumar:
Blockchain-based E-waste Management in 5G Smart Communities. 195-200 - Changshuo Hu, Dong Ma, Mahbub Hassan, Wen Hu:
NLC: Natural Light Communication using Switchable Glass. 201-206 - Jingjie Zong, Shuangzhi Li, Di Zhang, Gangtao Han, Xiaomin Mu, Ali Kashif Bashir, Joel J. P. C. Rodrigues:
Smart User Pairing for Massive MIMO Enabled Industrial IoT Communications. 207-212 - Wali Ullah Khan, Ju Liu, Furqan Jameel, Muhammad Toaha Raza Khan, Syed Hassan Ahmed, Riku Jäntti:
Secure Backscatter Communications in Multi-Cell NOMA Networks: Enabling Link Security for Massive IoT Networks. 213-218 - Ayan Mondal, Sudip Misra:
BIND: Blockchain-Based Flow-Table Partitioning in Distributed Multi-Tenant Software-Defined Networks. 219-224 - Ephraim Moges, Tao Han:
DecOp: Decentralized Network Operations in Software Defined Networking using Blockchain. 225-230 - Siyi Liao, Jun Wu, Jianhua Li, Ali Kashif Bashir:
Proof-of-Balance: Game-Theoretic Consensus for Controller Load Balancing of SDN. 231-236 - Durbadal Chattaraj, Sourav Saha, Basudeb Bera, Ashok Kumar Das:
On the Design of Blockchain-Based Access Control Scheme for Software Defined Networks. 237-242 - Parisa Foroughi, Hamzeh Beyranvand, Maurice Gagnaire, Sawsan Al Zahr:
User Association in Hybrid UAV-cellular Networks for Massive Real-time IoT Applications. 243-248 - Maninderpal Singh, Gagangeet Singh Aujla, Rasmeet Singh Bali:
ODOB: One Drone One Block-based Lightweight Blockchain Architecture for Internet of Drones. 249-254 - Rajesh Gupta, Arpit Shukla, Parimal Mehta, Pronaya Bhattacharya, Sudeep Tanwar, Sudhanshu Tyagi, Neeraj Kumar:
VAHAK: A Blockchain-based Outdoor Delivery Scheme using UAV for Healthcare 4.0 Services. 255-260 - Vikas Hassija, Vikas Saxena, Vinay Chamola:
A Blockchain-based Framework for Drone-Mounted Base Stations in Tactile Internet Environment. 261-266 - Jifan Tang, Wanli Zhang, Xiangyang Gong, Guangpeng Li, Delei Yu, Ye Tian, Bowen Liu, Lei Zhao:
A Flexible Hierarchical Network Architecture with Variable-Length IP Address. 267-272 - Sheng Jiang, Guangpeng Li, Brian E. Carpenter:
A New Approach to a Service Oriented Internet Protocol. 273-278 - Morteza Kheirkhah, Truong Khoa Phan, XinPeng Wei, David Griffin, Miguel Rio:
UCIP: User Controlled Internet Protocol. 279-284 - Yuhong Li, Peng Zhang, Yingchao Zhou, Di Jin:
A Data Forwarding Mechanism based on Deep Reinforcement Learning for Deterministic Networks. 285-290 - Stefano Angieri, Marcelo Bagnulo, Alberto García-Martínez, Bingyang Liu, Xinpeng Wei:
InBlock4: Blockchain-based Route Origin Validation. 291-296 - Yoshiaki Inoue:
The Probability Distribution of the AoI in Queues with Infinitely Many Servers. 297-302 - Mohammad Moltafet, Markus Leinonen, Marian Codreanu:
Average Age of Information in a Multi-Source M/M/1 Queueing Model with LCFS Prioritized Packet Management. 303-308 - Zhongdong Liu, Liang Huang, Bin Li, Bo Ji:
Anti-Aging Scheduling in Single-Server Queues: A Systematic and Comparative Study. 309-316 - Jingzhou Sun, Zhiyuan Jiang, Sheng Zhou, Zhisheng Niu:
Age-Optimal Scheduling for Heterogeneous Traffic with Timely-Throughput Constraint. 317-322 - Haitao Huang, Deli Qiao, Mustafa Cenk Gursoy:
Age-Energy Tradeoff in Fading Channels with Packet-Based Transmissions. 323-328 - Mangang Xie, Jie Gong, Xiao Ma:
Is the Packetized Transmission Efficient? An Age-Energy Perspective. 329-333 - Haina Zheng, Ke Xiong, Pingyi Fan, Zhangdui Zhong, Khaled Ben Letaief:
Age-Energy Region in Wireless Powered Communication Networks. 334-339 - Piotr Gawlowicz, Elnaz Alizadeh Jarchlo, Anatolij Zubow:
WiFi over VLC using COTS Devices. 340-345 - Merkebu Girmay, Vasilis Maglogiannis, Dries Naudts, Jaron Fontaine, Adnan Shahid, Eli De Poorter, Ingrid Moerman:
Adaptive CNN-based Private LTE Solution for Fair Coexistence with Wi-Fi in Unlicensed Spectrum. 346-351 - Ashutosh Srivastava, Fraida Fund, Shivendra S. Panwar:
An Experimental Evaluation of Low Latency Congestion Control for mmWave Links. 352-357 - Xiaoyong Yuan, Pan He, Xiaolin Li, Dapeng Wu:
Adaptive Adversarial Attack on Scene Text Recognition. 358-363 - Yu Lu, Ju Liu, Xueyin Zhao, Xiaoxi Liu, Weiqiang Chen, Xuesong Gao:
Image Translation with Attention Mechanism based on Generative Adversarial Networks. 364-369 - Siqin Fang, Sean Kennedy, Chenggang Wang, Boyang Wang, Qingqi Pei, Xuefeng Liu:
Sparser: Secure Nearest Neighbor Search with Space-filling Curves. 370-375 - Rabeya Bosri, Abdur Razzak Uzzal, Abdullah Al Omar, Md. Zakirul Alam Bhuiyan, Mohammad Shahriar Rahman:
HIDEchain: A User-Centric Secure Edge Computing Architecture for Healthcare IoT Devices. 376-381 - Hong Su, Bing Guo, Yan Shen, Tao Li, Chaoxia Qing, Zhen Zhang:
A Solution for State Conflicts of Smart Contract in Interaction with Non-blockchain. 382-387 - Xiao Wu, Han Qiu, Shuyi Zhang, Gérard Memmi, Keke Gai, Wei Cai:
ChainIDE 2.0: Facilitating Smart Contract Development for Consortium Blockchain. 388-393 - Zhaoyan Song, Ruiting Zhou, Shihan Zhao, Shixin Qin, John C. S. Lui, Zongpeng Li:
Edge Emergency Demand Response Control via Scheduling in Cloudlet Cluster. 394-399 - Wei Feng, Wan Tang, Ximin Yang, Lu Liu:
MEM: A Multi-Staged Eviction Mechanism of Flowtable for Software-Defined Datacenters. 400-405 - Guoping Tan, Huipeng Zhang, Siyuan Zhou:
Resource Allocation in MEC-enabled Vehicular Networks: A Deep Reinforcement Learning Approach. 406-411 - Federico Mason, Federico Chiariotti, Martina Capuzzo, Davide Magrin, Andrea Zanella, Michele Zorzi:
Combining LoRaWAN and a New 3D Motion Model for Remote UAV Tracking. 412-417 - Paresh Saxena, Thomas Dreibholz, Harald Skinnemoen, Özgü Alay, M. A. Vazquez-Castro, Simone Ferlin, Güray Açar:
Resilient Hybrid SatCom and Terrestrial Networking for Unmanned Aerial Vehicles. 418-423 - Xin Wang, Shuhui Chen, Jinshu Su:
App-Net: A Hybrid Neural Network for Encrypted Mobile Traffic Classification. 424-429 - Libin Liu, Li Chen, Hong Xu, Hua Shao:
Automated Traffic Engineering in SDWAN: Beyond Reinforcement Learning. 430-435 - Xiang Chen, Yuxin Chen, Qun Huang, Haifeng Zhou, Dong Zhang, Chunming Wu, Junchi Xing:
FastScale: Fast Scaling Out of Network Functions. 436-442 - Fuyou Li, Zitian Zhang, Yunpeng Zhu, Jie Zhang:
Prediction of Twitter Traffic Based on Machine Learning and Data Analytics. 443-448 - Jianyu Wang, Wenchi Cheng, Hailin Zhang:
Statistical QoS Provisioning Based Caching Placement for D2D Communications Based Emergency Networks. 449-454 - Xin Liu, Xueyan Zhang:
Green Cognitive Internet of Things with Self Supply of Energy and Spectrum in Emergency Communications. 455-459 - Weifeng Sun, Guanghao Zhang, Yuankui Zhang, Chi Lin:
RAT-NHP: Radio Access Technology Selection Based on N-hop Prediction. 460-465 - Yu Liu, Qinghe Du:
Security Enhancement and Evaluation for Noise Aggregation over Wireless Fading Channels. 466-471 - Philippe Jacquet, Dalia Popescu, Bernard Mans:
Connecting flying backhauls of drones to enhance vehicular networks with fixed 5G NR infrastructure. 472-477 - Zhaohua Lv, Jianjun Hao, Yijun Guo:
Energy Minimization for MEC-enabled Cellular-Connected UAV: Trajectory Optimization and Resource Scheduling. 478-483 - Olga G. Vikhrova, Sara Pizzi, Antonella Molinaro, Giuseppe Araniti:
Paging Group Size Distribution for Multicast Services in 5G Networks. 484-489 - Sudip Misra, Pallav Kumar Deb, Nidhi Pathak, Anandarup Mukherjee:
Blockchain-Enabled SDN for Securing Fog-Based Resource-Constrained IoT. 490-495 - Lei Liu, Wei Feng, Chen Chen, Yuru Zhang, Dapeng Lan, Xiaoming Yuan, Sahil Vashisht:
BS-IoT: Blockchain Based Software Defined Network Framework for Internet of Things. 496-501 - Syed Bilal Hussain Shah, Lei Wang, Prakasha Reddy, Chettupally Anil Carie:
Non-Cooperative Game to Balance Energy and Security in Resource Constrained IoT Networks. 502-507 - Dawid Polap, Gautam Srivastava, Alireza Jolfaei, Reza M. Parizi:
Blockchain Technology and Neural Networks for the Internet of Medical Things. 508-513 - Ying Gao, Yijian Chen, Hongliang Lin, Joel J. P. C. Rodrigues:
Blockchain based secure IoT data sharing framework for SDN-enabled smart communities. 514-519 - Qiao Tian, Pengwan Qin, Meiyu Wang, Yang Liu:
D-S based Fusion Method for Against Malicious Nodes in Wireless Sensor Networks. 520-525 - Zhexian Shen, Kui Xu:
Location-Aided Secure Transmission for Uplink Massive MIMO System Against Full-Duplex Jammer. 526-531 - Pengfei Zhu, Konglin Zhu, Lin Zhang:
Security Analysis of LTE-V2X and A Platooning Case Study. 532-537 - Hanxun Ren, Qinghe Du, Yijie Ou, Pinyi Ren:
Fountain-Coding-Aided Secure Delivery via Cross-locking Between Payload Data and Control Information. 538-543 - Inam Ullah Khan, Nadeem Javaid, C. James Taylor, Kelum A. A. Gamage, Xiandong Ma:
Big Data Analytics Based Short Term Load Forecasting Model for Residential Buildings in Smart Grids. 544-549 - Zhengping Luo, Tao Hou, Tung Thanh Nguyen, Hui Zeng, Zhuo Lu:
Log Analytics in HPC: A Data-driven Reinforcement Learning Framework. 550-555 - Yongyong Wei, Rong Zheng:
Handling Device Heterogeneity in Wi-Fi based Indoor Positioning Systems. 556-561 - Zhenhui Situ, Ivan Wang Hei Ho, Yun Hou, Peiya Li:
The Feasibility of NOMA in C-V2X. 562-567 - Mikhail Krasnoselskii, Grigorii Melnikov, Yury Yanovich:
No-Dealer: Byzantine Fault-Tolerant Random Number Generator. 568-573 - Yongge Wang, Jingwen Sun, Xin Wang, Yunchuan Wei, Hao Wu, Zhou Yu, Gillian Chu:
Sperax: An Approach To Defeat Long Range Attacks In Blockchains. 574-579 - Yuxing Li, Hu Zheng, Chengqiang Huang, Ke Pei, Jinghui Li, Longbo Huang:
Terminator: An Efficient and Light-weight Fault Localization Framework. 580-585 - Yunpeng Cao, Haifeng Wang, Shuqing He:
Dynamic deployment model for large-scale compute-intensive clusters. 586-591 - Lemei Huang, Sheng Cheng, Yu Guan, Xinggong Zhang, Zongming Guo:
Consistent User-Traffic Allocation and Load Balancing in Mobile Edge Caching. 592-597 - Alaa Awad Abdellatif, Carla-Fabiana Chiasserini, Francesco Malandrino:
Active Learning-based Classification in Automated Connected Vehicles. 598-603 - Minghui LiWang, Zhibin Gao, Seyyedali Hosseinalipour, Huaiyu Dai, Xianbin Wang:
Energy-aware Allocation of Graph Jobs in Vehicular Cloud Computing-enabled Software-defined IoV. 604-609 - Marica Amadeo, Giuseppe Ruggeri, Claudia Campolo, Antonella Molinaro, Giuseppe Mangiullo:
Caching Popular and Fresh IoT Contents at the Edge via Named Data Networking. 610-615 - Chenghan Jia, Kai Lin, Jing Deng:
A Multi-property Method to Evaluate Trust of Edge Computing Based on Data Driven Capsule Network. 616-621 - Li Ding, Biao Han, Xiaoyan Wang, Peng Li, Baosheng Wang:
Distributed Intelligence Empowered Data Aggregation and Distribution for Multi-robot Cooperative Communication. 622-627 - Adil Ali Raja, Muhammad Ali Jamshed, Haris Pervaiz, Syed Ali Hassan:
Performance Analysis of UAV-assisted Backhaul Solutions in THz enabled Hybrid Heterogeneous Network. 628-633 - Omid Esrafilian, Rajeev Gangula, David Gesbert:
Autonomous UAV-aided Mesh Wireless Networks. 634-640 - Yuan Liu, Ke Xiong, Bo Gao, Yu Zhang, Pingyi Fan, Khaled Ben Letaief:
Multi-UAV Assisted Communication Networks: Towards Max-Min Secrecy Rate. 641-646 - Tharindu D. Ponnimbaduge Perera, Stefan Panic, Dushantha Nalin K. Jayakody, P. Muthuchidambaranathan:
UAV-assisted Data Collection in Wireless Powered Sensor Networks over Multiple Fading Channels. 647-652 - Hui Wen, Yue Wu, Chenming Yang, Hancong Duan, Shui Yu:
A Unified Federated Learning Framework for Wireless Communications: towards Privacy, Efficiency, and Security. 653-658 - Sixian Sun, Xiao Fu, Bin Luo, Xiaojiang Du:
Detecting and Mitigating ARP Attacks in SDN-Based Cloud Environment. 659-664 - Haili Yu, Guangshun Li, Junhua Wu, Xinrong Ren, Jiabin Cao:
A Location-Based Path Privacy Protection Scheme in Internet of Vehicles. 665-670 - Fabio Busacca, Laura Galluccio, Sergio Palazzo:
Drone-assisted Edge Computing: a game-theoretical approach. 671-676 - Mahsa Keshavarz, Alireza Shamsoshoara, Fatemeh Afghah, Jonathan D. Ashdown:
A Real-time Framework for Trust Monitoring in a Network of Unmanned Aerial Vehicles. 677-682