default search action
INFOCOM 2021: Vancouver, BC, Canada - Workshops
- 2021 IEEE Conference on Computer Communications Workshops, INFOCOM Workshops 2021, Vancouver, BC, Canada, May 10-13, 2021. IEEE 2021, ISBN 978-1-6654-0443-3
- Ramneek, Sangheon Pack:
A Credible Service Level Agreement Enforcement Framework for 5G Edge. 1-2 - Matthew Bradley, Shengjie Xu:
A Metric for Machine Learning Vulnerability to Adversarial Examples. 1-2 - Rui Ma, Ke Xiong, Yang Lu:
Enhancing the Handover Performance in Heterogeneous High-speed Railway Communication Networks: A Bayesian-based Method. 1-2 - Mariusz Mazurek, Konrad Kania, Tomasz Rymarczyk, Dariusz Wójcik, Tomasz Cieplak, Piotr Golabek:
Implementation of Block-Wise-Transform-Reduction Method for Image Reconstruction in Ultrasound Transmission Tomography. 1-2 - Maxim Anikeev, Haya Schulmann, Hervais Simo:
Privacy Policies of Mobile Apps - A Usability Study. 1-2 - Geoff Twardokus, Hanif Rahbari:
Evaluating V2V Security on an SDR Testbed. 1-3 - Farooq Hoseiny, Sadoon Azizi, Mohammad Shojafar, Fardin Ahmadiazar, Rahim Tafazolli:
PGA: A Priority-aware Genetic Algorithm for Task Scheduling in Heterogeneous Fog-Cloud Computing. 1-6 - Beomyeol Jeon, S. M. Ferdous, Muntasir Raihan Rahman, Anwar Walid:
Privacy-Preserving Decentralized Aggregation for Federated Learning. 1-6 - Sixu Cai, Fen Zhou, Zonghua Zhang, Ahmed Meddahi:
Disaster-Resilient Service Function Chain Embedding Based on Multi-Path Routing. 1-7 - Yao Xin, Wenjun Li, Yi Wang, Song Yao:
An FPGA-based High-Throughput Packet Classification Architecture Supporting Dynamic Updates for Large-Scale Rule Sets. 1-2 - Aniruddha Kushwaha, Naveen Bazard, Ashwin Gumaste:
IPv6 Flow-Label based Application Aware Routing in SDNs. 1-6 - Xiaojie Fang, Xinyu Yin, Ning Zhang, Xuejun Sha, Hongli Zhang, Zhu Han:
Demonstrating Physical Layer Security Via Weighted Fractional Fourier Transform. 1-2 - Jihyeon Yun, Atilla Eryilmaz, Changhee Joo:
Remote Tracking of Dynamic Sources under Sublinear Communication Costs. 1-6 - Aashish Gottipati, Jacobus E. van der Merwe:
BoTM: Basestation-on-the-move, a Radio Access Network Management Primitive. 1-6 - Bintia Keita, Ashutosh Srivastava, Fraida Fund, Shivendra S. Panwar:
A controlled, reproducible, and extensible experiment for evaluating the impact of Tor latency. 1-2 - Muhammad Naeem Tahir, Marcos Katz:
C-ITS Communications using Heterogeneous Wireless Technologies. 1-2 - Yue Chen, Changle Li, Wenwei Yue, Hehe Zhang, Guoqiang Mao:
Engineering A Large-Scale Traffic Signal Control: A Multi-Agent Reinforcement Learning Approach. 1-6 - Mengxiang Liu, Zexuan Jin, Jinhui Xia, Mingyang Sun, Ruilong Deng, Peng Cheng:
Demo Abstract: A HIL Emulator-Based Cyber Security Testbed for DC Microgrids. 1-2 - Onur Ayan, Anthony Ephremides, Wolfgang Kellerer:
Age of Information: An Indirect Way To Improve Control System Performance. 1-7 - Jianhong Zhang, Menglong Wu, Qijia Zhang, Chenggen Peng:
A lightweight Data Sharing Scheme with Resisting Key Abuse in Mobile Edge Computing. 1-6 - Qiang Liu, Yifei Gao, Runhao Liu, Jiayao Wang:
AutoCEW: An Autonomous Cyberspace Early Warning Framework via Ensemble Learning. 1-6 - Zongyue Hou, Xinwei Zhang:
Secret Key Generation Scheme Based on Generative Adversarial Networks in FDD Systems. 1-6 - Aljawharah Alnasser, Hongjian Sun:
Trust-based Model for Securing Vehicular Networks Against RSU Attacks. 1-6 - Jinwei Liu, Long Cheng:
SwiftS: A Dependency-Aware and Resource Efficient Scheduling for High Throughput in Clouds. 1-2 - Rasmus Vestergaard, Qi Zhang, Daniel E. Lucani:
Enabling Random Access in Universal Compressors. 1-6 - Sayani Sarkar, Shivanjali Khare, Michael W. Totaro, Ashok Kumar:
A Novel Energy Aware Secure Internet of Drones Design: ESIoD. 1-6 - Gusang Lee, Won Joon Yun, Soyi Jung, Joongheon Kim, Jae-Hyun Kim:
Visualization of Deep Reinforcement Autonomous Aerial Mobility Learning Simulations. 1-2 - Qixun Zhang, Zhenhao Li, Xinye Gao, Zhiyong Feng:
Performance Evaluation of Radar and Communication Integrated System for Autonomous Driving Vehicles. 1-2 - Boya Di:
Sharing the Surface: RIS-aided Distributed Mechanism Design for Hybrid Beamforming in Multi-cell Multi-user Networks. 1-2 - Mengyu Sun, Zhangbing Zhou, Walid Gaaloul:
Adaptive IoT Service Configuration Optimization in Edge Networks. 1-2 - Wanli Ni, Yuanwei Liu, Zhaohui Yang, Hui Tian:
Over-the-Air Federated Learning and Non-Orthogonal Multiple Access Unified by Reconfigurable Intelligent Surface. 1-6 - Adita Kulkarni, Anand Seetharam:
QoE-aware Assignment and Scheduling of Video Streams in Heterogeneous Cellular Networks. 1-6 - Ankush Mitra, Basudeb Bera, Ashok Kumar Das:
Design and Testbed Experiments of Public Blockchain-Based Security Framework for IoT-Enabled Drone-Assisted Wildlife Monitoring. 1-6 - Jose Monterroso, Jacobus E. van der Merwe, Kirk Webb, Gary Wong:
Towards using the POWDER platform for RF propagation validation. 1-6 - Shihao Li, Weiwei Miao, Zeng Zeng, Lei Wei, Chengling Jiang, Chuanjun Wang, Mingxuan Zhang:
Multi-Job Multi-Edge Allocation in Edge Computing Environments. 1-2 - Eric Muhati, Danda B. Rawat:
Adversarial Machine Learning for Inferring Augmented Cyber Agility Prediction. 1-6 - Kaixin Lin, Yuguo Li, Dawei Jian, Shengquan Hu, Dingding Li:
Vmemcpy: Parallelizing Memory Copy with Multi-core in the Cloud. 1-6 - Borui Li, Chenghao Tong, Yi Gao, Wei Dong:
S2: a Small Delta and Small Memory Differencing Algorithm for Reprogramming Resource-constrained IoT Devices. 1-2 - Yadi Ye, Leyou Zhang, Wenting You, Yi Mu:
Secure Decentralized Access Control Policy for Data Sharing in Smart Grid. 1-6 - Berat Can Senel, Maxime Mouchet, Justin Cappos, Olivier Fourmaux, Timur Friedman, Rick McGeer:
EdgeNet: the Global Kubernetes Cluster Testbed. 1-2 - Jorge Baranda, Josep Mangues-Bafalluy, Luca Vettori, Ricardo Martínez, Engin Zeydan:
Scaling Federated Network Services: Managing SLAs in Multi-Provider Industry 4.0 Scenarios. 1-2 - Ashish Gupta, Hari Prabhat Gupta, Tanima Dutta:
A Deep Learning based Traffic Flow Classification with Just a Few Packets. 1-2 - Mohammad Mahdi Khalili, Iman Vakilinia:
Trading Privacy through Randomized Response. 1-6 - Hongwei Li, Danai Chasaki:
Ensemble Machine Learning for Intrusion Detection in Cyber-Physical Systems. 1-2 - Xiaokun Xu, Mark Claypool:
A First Look at the Network Turbulence for Google Stadia Cloud-based Game Streaming. 1-5 - Evgeny M. Khorov, Aleksey Kureev, Vladislav Molodtsov:
FIND: an SDR-based Tool for Fine Indoor Localization. 1-2 - Hadeel Alrubayyi, Gokop Goteng, Mona Jaber, James Kelly:
A Novel Negative and Positive Selection Algorithm to Detect Unknown Malware in the IoT. 1-6 - Omur Ozel, Parisa Rafiee:
Intermittent Status Updating Through Joint Scheduling of Sensing and Retransmissions. 1-6 - Fotis Foukalas, Athanasios Tziouvaras:
A Federated Machine Learning Protocol for Fog Networks. 1-6 - Yongjin Kim:
Virtual Credit Framework in the Remote Work Era. 1-2 - Lingshan Liu, Ke Xiong, Yang Lu, Pingyi Fan, Khaled Ben Letaief:
Age-constrained Energy Minimization in UAV-Assisted Wireless Powered Sensor Networks: A DQN-based Approach. 1-2 - Mohammed Gharib, Fatemeh Afghah, Elizabeth S. Bentley:
OPAR: Optimized Predictive and Adaptive Routing for Cooperative UAV Networks. 1-6 - Yuling Cui, Danhao Deng, Chaowei Wang, Weidong Wang:
Joint Trajectory and Power Optimization for Energy Efficient UAV Communication Using Deep Reinforcement Learning. 1-6 - Cui-Qin Dai, Qinqin Yang, Jinsong Wu, Qianbin Chen:
Intelligent Gateway Placement in Satellite-Terrestrial Integrated Network. 1-6 - Jiangong Chen, Feng Qian, Bin Li:
An Interactive and Immersive Remote Education Platform based on Commodity Devices. 1-2 - Argha Sen, Abhijit Mondal, Basabdatta Palit, Jay Jayatheerthan, Krishna Paul, Sandip Chakraborty:
An ns3-based Energy Module of 5G NR User Equipments for Millimeter Wave Networks. 1-2 - Yan Zheng, Tian Pan, Yan Zhang, Enge Song, Tao Huang, Yunjie Liu:
Multipath In-band Network Telemetry. 1-2 - Puming Fang, Tilman Wolf:
Enabling Virtual Network Functions in Named Data Networking. 1-6 - Omar Sami Oubbati, Mohammed Atiquzzaman, Abderrahmane Lakas, Abdullah Baz, Hosam Alhakami, Wajdi Alhakami:
Multi-UAV-enabled AoI-aware WPCN: A Multi-agent Reinforcement Learning Strategy. 1-6 - Baturalp Buyukates, Sennur Ulukus:
Timely Communication in Federated Learning. 1-6 - Chaogang Tang, Chunsheng Zhu, Xianglin Wei, Qing Li, Joel J. P. C. Rodrigues:
Task Caching in Vehicular Edge Computing. 1-6 - Jincheng Wang, Zhuohua Li, John C. S. Lui, Mingshen Sun:
Topology-Theoretic Approach To Address Attribute Linkage Attacks In Differential Privacy. 1-6 - Noah Ziems, Shaoen Wu:
Security Vulnerability Detection Using Deep Learning Natural Language Processing. 1-6 - Luke Bertot, Lucas Nussbaum:
Leveraging Notebooks on Testbeds: the Grid'5000 Case. 1-6 - Shuang Wu, Xi Peng, Guangjian Tian:
Decentralized Max-Min Resource Allocation for Monotonic Utility Functions. 1-6 - Georgios Drainakis, Panagiotis Pantazopoulos, Konstantinos V. Katsaros, Vasilis Sourlas, Angelos Amditis:
On the Distribution of ML Workloads to the Network Edge and Beyond. 1-6 - Melih Bastopcu, Sennur Ulukus:
Timely Tracking of Infection Status of Individuals in a Population. 1-7 - Novella Bartolini, Andrea Coletta, Gaia Maselli, Mauro Piva, Domenicomichele Silvestri:
GenPath - A Genetic Multi-Round Path Planning Algorithm for Aerial Vehicles. 1-6 - Ahmed Arafa, Richard D. Wesel:
Timely Transmissions Using Optimized Variable Length Coding. 1-6 - Nasser Alsabilah, Danda B. Rawat:
Anomaly Detection in Smart Home Networks Using Kalman Filter. 1-6 - Yan Zhang, Tian Pan, Yan Zheng, Enge Song, Tao Huang, Yunjie Liu:
VXLAN-based INT: In-band Network Telemetry for Overlay Network Monitoring. 1-2 - Hua Wu, Xin Li, Guang Cheng, Xiaoyan Hu:
Monitoring Video Resolution of Adaptive Encrypted Video Traffic Based on HTTP/2 Features. 1-6 - Li-e Wang, Yihui Wang, Yan Bai, Peng Liu, Xianxian Li:
POI Recommendation with Federated Learning and Privacy Preserving in Cross Domain Recommendation. 1-6 - Yanfang Mo, Qiulin Lin, Minghua Chen, Si-Zhao Joe Qin:
Optimal Peak-Minimizing Online Algorithms for Large-Load Users with Energy Storage. 1-2 - Yaqiang Zhang, Rengang Li, Yaqian Zhao, Ruyang Li:
A Request Scheduling Optimization Mechanism Based on Deep Q-Learning in Edge Computing Environments. 1-2 - Harald Øverby:
Dynamic Economic Models for MMO Markets. 1-6 - Jiawei Yuan, Laurent Njilla:
Lightweight and Reliable Decentralized Reward System using Blockchain. 1-6 - Sharmin Akter, Mohammad Shahriar Rahman, Md. Zakirul Alam Bhuiyan, Nafees Mansoor:
Towards Secure Communication in CR-VANETs Through a Trust-Based Routing Protocol. 1-6 - Xian Liu:
Secrecy in Aerial Networking: a Stochastic Geometry Approach. 1-6 - Paul Ruth, Kate Keahey, Mert Cevik, Zhuo Zhen, Cong Wang, Jason Anderson:
Overcast: Running Controlled Experiments Spanning Research and Commercial Clouds. 1-6 - Jie Cao, Xu Zhu, Yufei Jiang, Zhongxiang Wei:
Can AoI and Delay be Minimized Simultaneously with Short-Packet Transmission? 1-6 - Emeka Obiodu, Abdullahi Abubakar, Nishanth Sastry:
Is it 5G or not? Investigating doubts about the 5G icon and network performance. 1-6 - Derek Phanekham, Suku Nair, Nageswara S. V. Rao, Mike Truty:
Predicting Throughput of Cloud Network Infrastructure Using Neural Networks. 1-6 - Minghao Fang, Xijun Wang, Chao Xu, Howard H. Yang, Tony Q. S. Quek:
Computing-aided Update for Information Freshness in the Internet of Things. 1-7 - Md. Rashed Iqbal Nekvi, Anwar Haque:
Evaluating Contact Tracing Apps for Privacy Preservation and Effectiveness. 1-6 - Jie Li, Shi Zhou, Vasileios Giotsas:
Performance Analysis of Multipath BGP. 1-6 - Yahya Hassanzadeh-Nazarabadi, Moayed Haji Ali, Nazir Nayal:
Opera: Scalable Simulator for Distributed Systems. 1-2 - Yinian Zhou, Awais Ahmad Siddiqi, Jia Zhang, Junchen Guo, Rui Xi, Meng Jin, Zhengang Zhai, Yuan He:
Voice Recovery from Human Surroundings with Millimeter Wave Radar. 1-2 - Nader Bouacida, Jiahui Hou, Hui Zang, Xin Liu:
Adaptive Federated Dropout: Improving Communication Efficiency and Generalization for Federated Learning. 1-6 - Yahya Hassanzadeh-Nazarabadi, Sanaz Taheri Boshrooyeh:
A Consensus Protocol With Deterministic Finality. 1-2 - Panagiotis Kostakis, Anastasios-Stavros Charismiadis, Dimitris Tsolkas, Harilaos Koumaras:
An Experimentation Platform for Automated Assessment of Multimedia Services over Mobile Networks. 1-2 - Huiyi Ding, Ka-Cheong Leung:
Resource Allocation for Low-Latency NOMA-V2X Networks Using Reinforcement Learning. 1-6 - Youqun Li, Yichi Zhang, Haojin Zhu, Suguo Du:
Toward Automatically Generating Privacy Policy for Smart Home Apps. 1-7 - Muhammad Aslam, Wei Liu, Xianjun Jiao, Jetmir Haxhibeqiri, Jeroen Hoebeke, Ingrid Moerman, Esteban Municio, Pedro Heleno Isolani, Gilson Miranda, Johann Márquez-Barja:
High Precision Time Synchronization on Wi-Fi based Multi-Hop Network. 1-2 - Erteng Hu, Anmin Fu, Zhiyi Zhang, Linjie Zhang, Yantao Guo, Yin Liu:
ACTracker: A Fast and Efficient Attack Investigation Method Based on Event Causality. 1-6 - Preti Kumari, Hari Prabhat Gupta, Tanima Dutta:
A lightweight Compression-based Energy-Efficient Smart Metering System in Long-Range Network. 1-2 - Esteban Municio, Mert Cevik, Paul Ruth, Johann M. Márquez-Barja:
Achieving End-to-End Connectivity in Global Multi-Domain Networks. 1-6 - Haya Schulmann, Michael Waidner:
SSLChecker. 1-2 - Aris Cahyadi Risdianto, Ee-Chien Chang:
OctoBot: An Open-Source Orchestration System for a Wide Range Network Activity Generation. 1-3 - Kirk Webb, Sneha Kumar Kasera, Neal Patwari, Jacobus E. van der Merwe:
WiMatch: Wireless Resource Matchmaking. 1-6 - Anuj Bist, Chetna Singhal:
Efficient Immersive Surveillance of Inaccessible Regions using UAV Network. 1-6 - Simon Delamare, Lucas Nussbaum:
Kwollect: Metrics Collection for Experiments at Scale. 1-6 - Song Gao, Shaowen Yao, Ruidong Li:
Transferable Adversarial Defense by Fusing Reconstruction Learning and Denoising Learning. 1-6 - Jonatan Krolikowski, Ovidiu Iacoboaiea, Zied Ben-Houidi, Dario Rossi:
WiFi Dynoscope: Interpretable Real-Time WLAN Optimization. 1-2 - Deborsi Basu, Abhishek Jain, Uttam Ghosh, Raja Datta:
QoS-aware Controller and Hypervisor Placement in vSDN-enabled 5G Networks for Time-critical Applications. 1-6 - Jibo Shi, Bin Ge, Yang Liu, Yu Yan, Shuang Li:
Data Privacy Security Guaranteed Network Intrusion Detection System Based on Federated Learning. 1-6 - Daniel J. Kulenkamp, Violet R. Syrotiuk:
Support for Differentiated Airtime in Wireless Networks. 1-6 - Lien-Wu Chen, Hsing-Fu Tseng:
DeepSafe: A Hybrid Kitchen Safety Guarding System with Stove Fire Recognition Based on the Internet of Things. 1-2 - Jong-Min Kim, Ju-Hyung Lee, Young-Chai Ko:
Demo Abstract: WLAN Standard-based Non-Coherent FSO Transmission over 100m Indoor and Outdoor Environments. 1-2 - Maxwell McManus, Zhangyu Guan, Elizabeth Serena Bentley, Scott Pudlewski:
Experimental Analysis of Cross-Layer Sensing for Protocol-Agnostic Packet Boundary Recognition. 1-6 - Bahadir Durmaz, Erman Ayday:
Entering Watch Dogs*: Evaluating Privacy Risks Against Large-Scale Facial Search and Data Collection. 1-6 - Everaldo Andrade, Fernando Matos, Paulo Ditarso Maciel, Michele Nogueira, Aldri Santos:
Quality Assessment of VANETs-Supported Video Dissemination of Critical Urban Events. 1-6 - Jason Ma, Michael H. Ostertag, Dinesh Bharadia, Tajana Rosing:
Frequency-aware Trajectory and Power Control for Multi-UAV Systems. 1-6 - Yang Liu, Jian Kang, Yiran Li, Bin Ji:
A Network Intrusion Detection Method Based on CNN and CBAM. 1-6 - Kirill Glinskiy, Aleksey Kureev, Evgeny M. Khorov:
SDR-based Testbed for Real-time CQI Prediction for URLLC. 1-2