


default search action
INFOCOM 2021: Vancouver, BC, Canada - Workshops
- 2021 IEEE Conference on Computer Communications Workshops, INFOCOM Workshops 2021, Vancouver, BC, Canada, May 10-13, 2021. IEEE 2021, ISBN 978-1-6654-0443-3 
- Ramneek, Sangheon Pack: 
 A Credible Service Level Agreement Enforcement Framework for 5G Edge. 1-2
- Matthew Bradley, Shengjie Xu  : :
 A Metric for Machine Learning Vulnerability to Adversarial Examples. 1-2
- Rui Ma, Ke Xiong, Yang Lu: 
 Enhancing the Handover Performance in Heterogeneous High-speed Railway Communication Networks: A Bayesian-based Method. 1-2
- Mariusz Mazurek  , Konrad Kania , Konrad Kania , Tomasz Rymarczyk , Tomasz Rymarczyk , Dariusz Wójcik, Tomasz Cieplak , Dariusz Wójcik, Tomasz Cieplak , Piotr Golabek , Piotr Golabek : :
 Implementation of Block-Wise-Transform-Reduction Method for Image Reconstruction in Ultrasound Transmission Tomography. 1-2
- Maxim Anikeev, Haya Schulmann, Hervais Simo: 
 Privacy Policies of Mobile Apps - A Usability Study. 1-2
- Geoff Twardokus  , Hanif Rahbari , Hanif Rahbari : :
 Evaluating V2V Security on an SDR Testbed. 1-3
- Farooq Hoseiny, Sadoon Azizi, Mohammad Shojafar, Fardin Ahmadiazar, Rahim Tafazolli  : :
 PGA: A Priority-aware Genetic Algorithm for Task Scheduling in Heterogeneous Fog-Cloud Computing. 1-6
- Beomyeol Jeon  , S. M. Ferdous , S. M. Ferdous , Muntasir Raihan Rahman, Anwar Walid: , Muntasir Raihan Rahman, Anwar Walid:
 Privacy-Preserving Decentralized Aggregation for Federated Learning. 1-6
- Sixu Cai, Fen Zhou, Zonghua Zhang, Ahmed Meddahi: 
 Disaster-Resilient Service Function Chain Embedding Based on Multi-Path Routing. 1-7
- Yao Xin, Wenjun Li, Yi Wang, Song Yao: 
 An FPGA-based High-Throughput Packet Classification Architecture Supporting Dynamic Updates for Large-Scale Rule Sets. 1-2
- Aniruddha Kushwaha, Naveen Bazard, Ashwin Gumaste: 
 IPv6 Flow-Label based Application Aware Routing in SDNs. 1-6
- Xiaojie Fang, Xinyu Yin, Ning Zhang  , Xuejun Sha, Hongli Zhang, Zhu Han: , Xuejun Sha, Hongli Zhang, Zhu Han:
 Demonstrating Physical Layer Security Via Weighted Fractional Fourier Transform. 1-2
- Jihyeon Yun  , Atilla Eryilmaz, Changhee Joo: , Atilla Eryilmaz, Changhee Joo:
 Remote Tracking of Dynamic Sources under Sublinear Communication Costs. 1-6
- Aashish Gottipati, Jacobus E. van der Merwe: 
 BoTM: Basestation-on-the-move, a Radio Access Network Management Primitive. 1-6
- Bintia Keita, Ashutosh Srivastava, Fraida Fund, Shivendra S. Panwar: 
 A controlled, reproducible, and extensible experiment for evaluating the impact of Tor latency. 1-2
- Muhammad Naeem Tahir, Marcos Katz: 
 C-ITS Communications using Heterogeneous Wireless Technologies. 1-2
- Yue Chen, Changle Li, Wenwei Yue, Hehe Zhang, Guoqiang Mao: 
 Engineering A Large-Scale Traffic Signal Control: A Multi-Agent Reinforcement Learning Approach. 1-6
- Mengxiang Liu, Zexuan Jin, Jinhui Xia, Mingyang Sun, Ruilong Deng, Peng Cheng: 
 Demo Abstract: A HIL Emulator-Based Cyber Security Testbed for DC Microgrids. 1-2
- Onur Ayan, Anthony Ephremides, Wolfgang Kellerer  : :
 Age of Information: An Indirect Way To Improve Control System Performance. 1-7
- Jianhong Zhang, Menglong Wu, Qijia Zhang, Chenggen Peng: 
 A lightweight Data Sharing Scheme with Resisting Key Abuse in Mobile Edge Computing. 1-6
- Qiang Liu, Yifei Gao, Runhao Liu, Jiayao Wang: 
 AutoCEW: An Autonomous Cyberspace Early Warning Framework via Ensemble Learning. 1-6
- Zongyue Hou, Xinwei Zhang  : :
 Secret Key Generation Scheme Based on Generative Adversarial Networks in FDD Systems. 1-6
- Aljawharah Alnasser, Hongjian Sun: 
 Trust-based Model for Securing Vehicular Networks Against RSU Attacks. 1-6
- Jinwei Liu, Long Cheng  : :
 SwiftS: A Dependency-Aware and Resource Efficient Scheduling for High Throughput in Clouds. 1-2
- Rasmus Vestergaard, Qi Zhang  , Daniel E. Lucani , Daniel E. Lucani : :
 Enabling Random Access in Universal Compressors. 1-6
- Sayani Sarkar, Shivanjali Khare, Michael W. Totaro, Ashok Kumar: 
 A Novel Energy Aware Secure Internet of Drones Design: ESIoD. 1-6
- Gusang Lee, Won Joon Yun, Soyi Jung  , Joongheon Kim , Joongheon Kim , Jae-Hyun Kim: , Jae-Hyun Kim:
 Visualization of Deep Reinforcement Autonomous Aerial Mobility Learning Simulations. 1-2
- Qixun Zhang, Zhenhao Li, Xinye Gao, Zhiyong Feng: 
 Performance Evaluation of Radar and Communication Integrated System for Autonomous Driving Vehicles. 1-2
- Boya Di: 
 Sharing the Surface: RIS-aided Distributed Mechanism Design for Hybrid Beamforming in Multi-cell Multi-user Networks. 1-2
- Mengyu Sun, Zhangbing Zhou, Walid Gaaloul: 
 Adaptive IoT Service Configuration Optimization in Edge Networks. 1-2
- Wanli Ni  , Yuanwei Liu , Yuanwei Liu , Zhaohui Yang, Hui Tian: , Zhaohui Yang, Hui Tian:
 Over-the-Air Federated Learning and Non-Orthogonal Multiple Access Unified by Reconfigurable Intelligent Surface. 1-6
- Adita Kulkarni, Anand Seetharam: 
 QoE-aware Assignment and Scheduling of Video Streams in Heterogeneous Cellular Networks. 1-6
- Ankush Mitra, Basudeb Bera  , Ashok Kumar Das: , Ashok Kumar Das:
 Design and Testbed Experiments of Public Blockchain-Based Security Framework for IoT-Enabled Drone-Assisted Wildlife Monitoring. 1-6
- Jose Monterroso, Jacobus E. van der Merwe, Kirk Webb, Gary Wong: 
 Towards using the POWDER platform for RF propagation validation. 1-6
- Shihao Li, Weiwei Miao, Zeng Zeng, Lei Wei, Chengling Jiang, Chuanjun Wang, Mingxuan Zhang: 
 Multi-Job Multi-Edge Allocation in Edge Computing Environments. 1-2
- Eric Muhati, Danda B. Rawat  : :
 Adversarial Machine Learning for Inferring Augmented Cyber Agility Prediction. 1-6
- Kaixin Lin, Yuguo Li, Dawei Jian, Shengquan Hu, Dingding Li: 
 Vmemcpy: Parallelizing Memory Copy with Multi-core in the Cloud. 1-6
- Borui Li, Chenghao Tong, Yi Gao, Wei Dong: 
 S2: a Small Delta and Small Memory Differencing Algorithm for Reprogramming Resource-constrained IoT Devices. 1-2
- Yadi Ye, Leyou Zhang, Wenting You, Yi Mu: 
 Secure Decentralized Access Control Policy for Data Sharing in Smart Grid. 1-6
- Berat Can Senel  , Maxime Mouchet, Justin Cappos, Olivier Fourmaux, Timur Friedman , Maxime Mouchet, Justin Cappos, Olivier Fourmaux, Timur Friedman , Rick McGeer: , Rick McGeer:
 EdgeNet: the Global Kubernetes Cluster Testbed. 1-2
- Jorge Baranda, Josep Mangues-Bafalluy, Luca Vettori, Ricardo Martínez  , Engin Zeydan: , Engin Zeydan:
 Scaling Federated Network Services: Managing SLAs in Multi-Provider Industry 4.0 Scenarios. 1-2
- Ashish Gupta, Hari Prabhat Gupta, Tanima Dutta: 
 A Deep Learning based Traffic Flow Classification with Just a Few Packets. 1-2
- Mohammad Mahdi Khalili, Iman Vakilinia  : :
 Trading Privacy through Randomized Response. 1-6
- Hongwei Li, Danai Chasaki: 
 Ensemble Machine Learning for Intrusion Detection in Cyber-Physical Systems. 1-2
- Xiaokun Xu, Mark Claypool: 
 A First Look at the Network Turbulence for Google Stadia Cloud-based Game Streaming. 1-5
- Evgeny M. Khorov, Aleksey A. Kureev  , Vladislav Molodtsov: , Vladislav Molodtsov:
 FIND: an SDR-based Tool for Fine Indoor Localization. 1-2
- Hadeel Alrubayyi, Gokop Goteng, Mona Jaber, James Kelly: 
 A Novel Negative and Positive Selection Algorithm to Detect Unknown Malware in the IoT. 1-6
- Omur Ozel, Parisa Rafiee: 
 Intermittent Status Updating Through Joint Scheduling of Sensing and Retransmissions. 1-6
- Fotis Foukalas, Athanasios Tziouvaras  : :
 A Federated Machine Learning Protocol for Fog Networks. 1-6
- Yongjin Kim: 
 Virtual Credit Framework in the Remote Work Era. 1-2
- Lingshan Liu, Ke Xiong, Yang Lu, Pingyi Fan  , Khaled Ben Letaief , Khaled Ben Letaief : :
 Age-constrained Energy Minimization in UAV-Assisted Wireless Powered Sensor Networks: A DQN-based Approach. 1-2
- Mohammed Gharib  , Fatemeh Afghah, Elizabeth S. Bentley: , Fatemeh Afghah, Elizabeth S. Bentley:
 OPAR: Optimized Predictive and Adaptive Routing for Cooperative UAV Networks. 1-6
- Yuling Cui, Danhao Deng, Chaowei Wang, Weidong Wang: 
 Joint Trajectory and Power Optimization for Energy Efficient UAV Communication Using Deep Reinforcement Learning. 1-6
- Cui-Qin Dai, Qinqin Yang, Jinsong Wu  , Qianbin Chen: , Qianbin Chen:
 Intelligent Gateway Placement in Satellite-Terrestrial Integrated Network. 1-6
- Jiangong Chen, Feng Qian, Bin Li  : :
 An Interactive and Immersive Remote Education Platform based on Commodity Devices. 1-2
- Argha Sen, Abhijit Mondal, Basabdatta Palit  , Jay Jayatheerthan, Krishna Paul, Sandip Chakraborty: , Jay Jayatheerthan, Krishna Paul, Sandip Chakraborty:
 An ns3-based Energy Module of 5G NR User Equipments for Millimeter Wave Networks. 1-2
- Yan Zheng, Tian Pan  , Yan Zhang, Enge Song, Tao Huang , Yan Zhang, Enge Song, Tao Huang , Yunjie Liu: , Yunjie Liu:
 Multipath In-band Network Telemetry. 1-2
- Puming Fang, Tilman Wolf: 
 Enabling Virtual Network Functions in Named Data Networking. 1-6
- Omar Sami Oubbati, Mohammed Atiquzzaman  , Abderrahmane Lakas , Abderrahmane Lakas , Abdullah Baz , Abdullah Baz , Hosam Alhakami, Wajdi Alhakami: , Hosam Alhakami, Wajdi Alhakami:
 Multi-UAV-enabled AoI-aware WPCN: A Multi-agent Reinforcement Learning Strategy. 1-6
- Baturalp Buyukates  , Sennur Ulukus: , Sennur Ulukus:
 Timely Communication in Federated Learning. 1-6
- Chaogang Tang, Chunsheng Zhu, Xianglin Wei, Qing Li  , Joel J. P. C. Rodrigues: , Joel J. P. C. Rodrigues:
 Task Caching in Vehicular Edge Computing. 1-6
- Jincheng Wang, Zhuohua Li  , John C. S. Lui, Mingshen Sun: , John C. S. Lui, Mingshen Sun:
 Topology-Theoretic Approach To Address Attribute Linkage Attacks In Differential Privacy. 1-6
- Noah Ziems, Shaoen Wu: 
 Security Vulnerability Detection Using Deep Learning Natural Language Processing. 1-6
- Luke Bertot, Lucas Nussbaum: 
 Leveraging Notebooks on Testbeds: the Grid'5000 Case. 1-6
- Shuang Wu  , Xi Peng, Guangjian Tian: , Xi Peng, Guangjian Tian:
 Decentralized Max-Min Resource Allocation for Monotonic Utility Functions. 1-6
- Georgios Drainakis, Panagiotis Pantazopoulos  , Konstantinos V. Katsaros , Konstantinos V. Katsaros , Vasilis Sourlas , Vasilis Sourlas , Angelos Amditis: , Angelos Amditis:
 On the Distribution of ML Workloads to the Network Edge and Beyond. 1-6
- Melih Bastopcu  , Sennur Ulukus: , Sennur Ulukus:
 Timely Tracking of Infection Status of Individuals in a Population. 1-7
- Novella Bartolini, Andrea Coletta, Gaia Maselli  , Mauro Piva, Domenicomichele Silvestri: , Mauro Piva, Domenicomichele Silvestri:
 GenPath - A Genetic Multi-Round Path Planning Algorithm for Aerial Vehicles. 1-6
- Ahmed Arafa, Richard D. Wesel: 
 Timely Transmissions Using Optimized Variable Length Coding. 1-6
- Nasser Alsabilah, Danda B. Rawat  : :
 Anomaly Detection in Smart Home Networks Using Kalman Filter. 1-6
- Yan Zhang, Tian Pan  , Yan Zheng, Enge Song, Tao Huang , Yan Zheng, Enge Song, Tao Huang , Yunjie Liu: , Yunjie Liu:
 VXLAN-based INT: In-band Network Telemetry for Overlay Network Monitoring. 1-2
- Hua Wu  , Xin Li, Guang Cheng, Xiaoyan Hu , Xin Li, Guang Cheng, Xiaoyan Hu : :
 Monitoring Video Resolution of Adaptive Encrypted Video Traffic Based on HTTP/2 Features. 1-6
- Li-e Wang, Yihui Wang, Yan Bai, Peng Liu, Xianxian Li: 
 POI Recommendation with Federated Learning and Privacy Preserving in Cross Domain Recommendation. 1-6
- Yanfang Mo  , Qiulin Lin , Qiulin Lin , Minghua Chen , Minghua Chen , Si-Zhao Joe Qin , Si-Zhao Joe Qin : :
 Optimal Peak-Minimizing Online Algorithms for Large-Load Users with Energy Storage. 1-2
- Yaqiang Zhang, Rengang Li, Yaqian Zhao, Ruyang Li  : :
 A Request Scheduling Optimization Mechanism Based on Deep Q-Learning in Edge Computing Environments. 1-2
- Harald Øverby: 
 Dynamic Economic Models for MMO Markets. 1-6
- Jiawei Yuan, Laurent Njilla: 
 Lightweight and Reliable Decentralized Reward System using Blockchain. 1-6
- Sharmin Akter, Mohammad Shahriar Rahman  , Md. Zakirul Alam Bhuiyan, Nafees Mansoor , Md. Zakirul Alam Bhuiyan, Nafees Mansoor : :
 Towards Secure Communication in CR-VANETs Through a Trust-Based Routing Protocol. 1-6
- Xian Liu: 
 Secrecy in Aerial Networking: a Stochastic Geometry Approach. 1-6
- Paul Ruth, Kate Keahey, Mert Cevik, Zhuo Zhen, Cong Wang, Jason Anderson: 
 Overcast: Running Controlled Experiments Spanning Research and Commercial Clouds. 1-6
- Jie Cao, Xu Zhu  , Yufei Jiang, Zhongxiang Wei: , Yufei Jiang, Zhongxiang Wei:
 Can AoI and Delay be Minimized Simultaneously with Short-Packet Transmission? 1-6
- Emeka Obiodu, Abdullahi Abubakar, Nishanth Sastry  : :
 Is it 5G or not? Investigating doubts about the 5G icon and network performance. 1-6
- Derek Phanekham  , Suku Nair, Nageswara S. V. Rao, Mike Truty: , Suku Nair, Nageswara S. V. Rao, Mike Truty:
 Predicting Throughput of Cloud Network Infrastructure Using Neural Networks. 1-6
- Minghao Fang, Xijun Wang  , Chao Xu, Howard H. Yang, Tony Q. S. Quek , Chao Xu, Howard H. Yang, Tony Q. S. Quek : :
 Computing-aided Update for Information Freshness in the Internet of Things. 1-7
- Md. Rashed Iqbal Nekvi, Anwar Haque  : :
 Evaluating Contact Tracing Apps for Privacy Preservation and Effectiveness. 1-6
- Jie Li, Shi Zhou, Vasileios Giotsas: 
 Performance Analysis of Multipath BGP. 1-6
- Yahya Hassanzadeh-Nazarabadi, Moayed Haji Ali, Nazir Nayal: 
 Opera: Scalable Simulator for Distributed Systems. 1-2
- Yinian Zhou, Awais Ahmad Siddiqi, Jia Zhang, Junchen Guo, Rui Xi  , Meng Jin, Zhengang Zhai, Yuan He: , Meng Jin, Zhengang Zhai, Yuan He:
 Voice Recovery from Human Surroundings with Millimeter Wave Radar. 1-2
- Nader Bouacida, Jiahui Hou, Hui Zang, Xin Liu: 
 Adaptive Federated Dropout: Improving Communication Efficiency and Generalization for Federated Learning. 1-6
- Yahya Hassanzadeh-Nazarabadi, Sanaz Taheri Boshrooyeh  : :
 A Consensus Protocol With Deterministic Finality. 1-2
- Panagiotis Kostakis, Anastasios-Stavros Charismiadis, Dimitris Tsolkas, Harilaos Koumaras: 
 An Experimentation Platform for Automated Assessment of Multimedia Services over Mobile Networks. 1-2
- Huiyi Ding, Ka-Cheong Leung: 
 Resource Allocation for Low-Latency NOMA-V2X Networks Using Reinforcement Learning. 1-6
- Youqun Li, Yichi Zhang, Haojin Zhu, Suguo Du: 
 Toward Automatically Generating Privacy Policy for Smart Home Apps. 1-7
- Muhammad Aslam, Wei Liu, Xianjun Jiao, Jetmir Haxhibeqiri  , Jeroen Hoebeke, Ingrid Moerman, Esteban Municio, Pedro Heleno Isolani, Gilson Miranda, Johann Márquez-Barja , Jeroen Hoebeke, Ingrid Moerman, Esteban Municio, Pedro Heleno Isolani, Gilson Miranda, Johann Márquez-Barja : :
 High Precision Time Synchronization on Wi-Fi based Multi-Hop Network. 1-2
- Erteng Hu, Anmin Fu  , Zhiyi Zhang, Linjie Zhang, Yantao Guo, Yin Liu: , Zhiyi Zhang, Linjie Zhang, Yantao Guo, Yin Liu:
 ACTracker: A Fast and Efficient Attack Investigation Method Based on Event Causality. 1-6
- Preti Kumari, Hari Prabhat Gupta, Tanima Dutta: 
 A lightweight Compression-based Energy-Efficient Smart Metering System in Long-Range Network. 1-2
- Esteban Municio, Mert Cevik, Paul Ruth, Johann M. Márquez-Barja  : :
 Achieving End-to-End Connectivity in Global Multi-Domain Networks. 1-6
- Haya Schulmann, Michael Waidner  : :
 SSLChecker. 1-2
- Aris Cahyadi Risdianto, Ee-Chien Chang: 
 OctoBot: An Open-Source Orchestration System for a Wide Range Network Activity Generation. 1-3
- Kirk Webb, Sneha Kumar Kasera, Neal Patwari, Jacobus E. van der Merwe: 
 WiMatch: Wireless Resource Matchmaking. 1-6
- Anuj Bist, Chetna Singhal  : :
 Efficient Immersive Surveillance of Inaccessible Regions using UAV Network. 1-6
- Simon Delamare, Lucas Nussbaum: 
 Kwollect: Metrics Collection for Experiments at Scale. 1-6
- Song Gao, Shaowen Yao, Ruidong Li  : :
 Transferable Adversarial Defense by Fusing Reconstruction Learning and Denoising Learning. 1-6
- Jonatan Krolikowski, Ovidiu Iacoboaiea, Zied Ben-Houidi, Dario Rossi: 
 WiFi Dynoscope: Interpretable Real-Time WLAN Optimization. 1-2
- Deborsi Basu, Abhishek Jain, Uttam Ghosh, Raja Datta  : :
 QoS-aware Controller and Hypervisor Placement in vSDN-enabled 5G Networks for Time-critical Applications. 1-6
- Jibo Shi, Bin Ge, Yang Liu, Yu Yan, Shuang Li: 
 Data Privacy Security Guaranteed Network Intrusion Detection System Based on Federated Learning. 1-6
- Daniel J. Kulenkamp, Violet R. Syrotiuk: 
 Support for Differentiated Airtime in Wireless Networks. 1-6
- Lien-Wu Chen, Hsing-Fu Tseng: 
 DeepSafe: A Hybrid Kitchen Safety Guarding System with Stove Fire Recognition Based on the Internet of Things. 1-2
- Jong-Min Kim  , Ju-Hyung Lee, Young-Chai Ko: , Ju-Hyung Lee, Young-Chai Ko:
 Demo Abstract: WLAN Standard-based Non-Coherent FSO Transmission over 100m Indoor and Outdoor Environments. 1-2
- Maxwell McManus, Zhangyu Guan, Elizabeth Serena Bentley, Scott Pudlewski  : :
 Experimental Analysis of Cross-Layer Sensing for Protocol-Agnostic Packet Boundary Recognition. 1-6
- Bahadir Durmaz, Erman Ayday: 
 Entering Watch Dogs*: Evaluating Privacy Risks Against Large-Scale Facial Search and Data Collection. 1-6
- Everaldo Andrade, Fernando Matos, Paulo Ditarso Maciel, Michele Nogueira, Aldri Santos: 
 Quality Assessment of VANETs-Supported Video Dissemination of Critical Urban Events. 1-6
- Jason Ma, Michael H. Ostertag, Dinesh Bharadia, Tajana Rosing: 
 Frequency-aware Trajectory and Power Control for Multi-UAV Systems. 1-6
- Yang Liu, Jian Kang, Yiran Li, Bin Ji: 
 A Network Intrusion Detection Method Based on CNN and CBAM. 1-6
- Kirill Glinskiy, Aleksey A. Kureev  , Evgeny M. Khorov: , Evgeny M. Khorov:
 SDR-based Testbed for Real-time CQI Prediction for URLLC. 1-2
- Hao Li, Xin Li, Zhuzhong Qian, Xiaolin Qin: 
 Resource-Aware Service Function Chain Deployment in Cloud-Edge Environment. 1-6
- George Stamatakis, Nikolaos Pappas, Alexandros G. Fragkiadakis, Apostolos Traganitis: 
 Autonomous Maintenance in IoT Networks via AoI-driven Deep Reinforcement Learning. 1-7
- Laqin Fan, Lan Wang: 
 Secure Sharing of Spatio-Temporal Data through Name-based Access Control. 1-7
- Mario Franke  , Florian Klingler: , Florian Klingler:
 Poster Abstract: HiL meets Commodity Hardware - SimbaR for coupling IEEE 802.11 Radio Channels. 1-2
- Abdulaziz Alali  , Danda B. Rawat , Danda B. Rawat : :
 Combating Distance Limitation in Sub-Terahertz Frequency Band for Physical Layer Security in UAV Communications. 1-6
- Qinglin Xun, Weichao Li, Haorui Guo, Yi Wang: 
 Enabling Lightweight Network Performance Monitoring and Troubleshooting in Data Center. 1-2
- Shuai Li, Junchen Guo, Rui Xi  , Chunhui Duan, Zhengang Zhai, Yuan He: , Chunhui Duan, Zhengang Zhai, Yuan He:
 Pedestrian Trajectory based Calibration for Multi-Radar Network. 1-2
- Markus Brandt, Haya Schulmann: 
 Optimized BGP Simulator for Evaluation of Internet Hijacks. 1-2
- Jingxue Sun, Zhiqiu Huang, Ting Yang, Wengjie Wang, Yuqing Zhang: 
 A system for detecting third-party tracking through the combination of dynamic analysis and static analysis. 1-6
- Mingqian Liu, Jiakun Wang, Cheng Qian: 
 Incremental Learning Based Radio Frequency Fingerprint Identification Using Intelligent Representation. 1-6
- Zhi Zhou, Ke Luo, Xu Chen: 
 Deep Reinforcement Learning for Intelligent Cloud Resource Management. 1-6
- Tanya Shreedhar, Sanjit K. Kaul  , Roy D. Yates: , Roy D. Yates:
 An Empirical Study of Ageing in the Cloud. 1-6
- Hyejeong Jeong, Jieun Yu, Wonjun Lee: 
 Poster Abstract: A Semi-Supervised Approach for Network Intrusion Detection Using Generative Adversarial Networks. 1-2
- Xing Yang  , Lei Shu, Kai Huang, Kailiang Li , Lei Shu, Kai Huang, Kailiang Li , Heyang Yao: , Heyang Yao:
 Poster Abstract: Insecticidal Performance Simulation of Solar Insecticidal Lamps Internet of Things Using the Number of Falling Edge Trigger. 1-2
- Daisy Roberts  , Ashutosh Srivastava, Fraida Fund, Shivendra S. Panwar: , Ashutosh Srivastava, Fraida Fund, Shivendra S. Panwar:
 Tackling the latency divide with Copa. 1-2
- Ralph P. Ritchey, Richard Perry: 
 Machine Learning Toolkit for System Log File Reduction and Detection of Malicious Behavior. 1-2
- Runsen Gong, Weichao Li, Fuliang Li, Yi Wang: 
 On the Reliability of State-of-the-art Network Testbed Components. 1-2
- José Antonio Gómez-Hernández, Pedro García-Teodoro, Juan Antonio Holgado Terriza  , Gabriel Maciá-Fernández, José Camacho-Páez, J. M. Noguera-Comino: , Gabriel Maciá-Fernández, José Camacho-Páez, J. M. Noguera-Comino:
 Monitoring Android Communications for Security. 1-2
- Emmanouil Fountoulakis, Nikolaos Pappas, Anthony Ephremides: 
 Resource Allocation for Heterogeneous Traffic with Power Consumption Constraints. 1-2
- Gaurang Bansal, Biplab Sikdar  : :
 Security Service Pricing Model for UAV Swarms: A Stackelberg Game Approach. 1-6
- Huilian Zhang  , Xiaofan He, Qingqing Wu , Xiaofan He, Qingqing Wu , Huaiyu Dai: , Huaiyu Dai:
 Spectral Graph Theory Based Resource Allocation for IRS-Assisted Multi-Hop Edge Computing. 1-6
- Roudy Dagher, François-Xavier Molina, Alexandre Abadie, Nathalie Mitton, Emmanuel Baccelli: 
 An Open Experimental Platform for Ranging, Proximity and Contact Event Tracking using Ultra-Wide-Band and Bluetooth Low-Energy. 1-6
- Ferenc Fejes, Szilveszter Nádas  , Gergo Gombos, Sándor Laki: , Gergo Gombos, Sándor Laki:
 A Core-Stateless L4S Scheduler for P4-enabled hardware switches with emulated HQoS. 1-2
- Pan Tang, Jianhua Zhang, Yuxiang Zhang, Yicheng Guan, Pan Qi, Fangyu Wang, Li Yu, Ping Zhang: 
 Demo Abstract: "See the Radio Waves" via VR and Its Application in Wireless Communications. 1-2
- Yongjie Guan, Xueyu Hou, Tao Han, Sheng Zhang: 
 DeepMix: A Real-time Adaptive Virtual Content Registration System with Intelligent Detection. 1-2
- Jose A. Ayala-Romero, Andres Garcia-Saavedra, Xavier Costa-Pérez  , George Iosifidis: , George Iosifidis:
 Demonstrating a Bayesian Online Learning for Energy-Aware Resource Orchestration in vRANs. 1-2
- Danai Chasaki, Christopher Mansour: 
 Detecting Malicious Hosts in SDN through System Call Learning. 1-2
- Noriaki Kamiyama, Kouki Sakurai, Akihiro Nakao: 
 Measurement Analysis of Co-occurrence Degree of Web Objects. 1-6
- Esteban Municio, Mert Cevik, Paul Ruth, Johann M. Márquez-Barja  : :
 Experimenting in a Global Multi-Domain Testbed. 1-2
- Long Huang, Zhen Meng, Zeyu Deng, Chen Wang, Liying Li  , Guodong Zhao: , Guodong Zhao:
 Robot Behavior-Based User Authentication for Motion-Controlled Robotic Systems. 1-6
- Ali Gohar  , Gianfranco Nencioni: , Gianfranco Nencioni:
 Minimizing the Cost of 5G Network Slice Broker. 1-6
- Yong Zeng, Tong Dong, Qingqi Pei, Jiale Liu, Jianfeng Ma: 
 LPDBN: A Privacy Preserving Scheme for Deep Belief Network. 1-6
- Hua Wu  , Ya Liu, Guang Cheng, Xiaoyan Hu , Ya Liu, Guang Cheng, Xiaoyan Hu : :
 Real-time Packet Loss Detection for TCP and UDP Based on Feature-Sketch. 1-6
- Tejasvi Alladi  , Vishnu Venkatesh, Vinay Chamola, Nitin Chaturvedi: , Vishnu Venkatesh, Vinay Chamola, Nitin Chaturvedi:
 Drone-MAP: A Novel Authentication Scheme for Drone-Assisted 5G Networks. 1-6
- Hervais Simo, Haya Schulmann, Marija Schufrin, Steven Lamarr Reynolds, Jörn Kohlhammer: 
 PrivInferVis: Towards Enhancing Transparency over Attribute Inference in Online Social Networks. 1-2
- Lizhuang Tan, Wei Su, Yanwen Liu, Xiaochuan Gao, Wei Zhang: 
 DCQUIC: Flexible and Reliable Software-defined Data Center Transport. 1-8
- Rahul Mishra  , Hari Prabhat Gupta, Tanima Dutta: , Hari Prabhat Gupta, Tanima Dutta:
 A Network Resource Aware Federated Learning Approach using Knowledge Distillation. 1-2
- Gunasekaran Raja  , Kapal Dev , Kapal Dev , Nisha Deborah Philips, S. A. Mohamed Suhaib, M. Deepakraj, Ramesh Krishnan Ramasamy: , Nisha Deborah Philips, S. A. Mohamed Suhaib, M. Deepakraj, Ramesh Krishnan Ramasamy:
 DA-WDGN: Drone-Assisted Weed Detection using GLCM-M features and NDIRT indices. 1-6
- Asif Hasnain, Holger Karl: 
 Learning Coflow Admissions. 1-6
- Xinyu Crystal Wu, T. S. Eugene Ng: 
 ITSY: Initial Trigger-Based PFC Deadlock Detection in the Data Plane. 1-8
- Sayanti Ghosh  , Abhijit Bhowmick, Sanjay Dhar Roy , Abhijit Bhowmick, Sanjay Dhar Roy , Sumit Kundu: , Sumit Kundu:
 A UAV based Multi-hop D2D Network for Disaster Management. 1-6
- Helin Yang, Jun Zhao, Jiangtian Nie  , Neeraj Kumar , Neeraj Kumar , Kwok-Yan Lam, Zehui Xiong , Kwok-Yan Lam, Zehui Xiong : :
 UAV-Assisted 5G/6G Networks: Joint Scheduling and Resource Allocation Based on Asynchronous Reinforcement Learning. 1-6
- Mingjie Feng, Marwan Krunz, Wenhan Zhang  : :
 Task Partitioning and User Association for Latency Minimization in Mobile Edge Computing Networks. 1-6
- Tomas Hlavacek, Haya Schulmann, Michael Waidner: 
 Not All Conflicts Are Created Equal: Automated Error Resolution in RPKI Deployments. 1-2
- Cheng Li, Jianwei Mao, Shuping Peng, Yang Xia, Zhibo Hu, Zhenbin Li: 
 Application-aware G-SRv6 network enabling 5G services. 1-2
- Shadi Eltanani  , Ibrahim Ghafir: , Ibrahim Ghafir:
 Aerial Wireless Networks: Proposed Solution for Coverage Optimisation. 1-6
- Jorge Baranda, Josep Mangues-Bafalluy, Engin Zeydan, Claudio Casetti, Carla-Fabiana Chiasserini, Marco Malinverno, Corrado Puligheddu  , Milan Groshev, Carlos Guimarães, Konstantin Tomakh, Denys Kucherenko, Oleksii Kolodiazhnyi: , Milan Groshev, Carlos Guimarães, Konstantin Tomakh, Denys Kucherenko, Oleksii Kolodiazhnyi:
 Demo: AIML-as-a-Service for SLA management of a Digital Twin Virtual Network Service. 1-2
- Saffana Alshangiti, Mawada Alahmadi, Mohammed Alkhatib, Rashid Tahir  , Fareed Zaffar: , Fareed Zaffar:
 Poster Abstract: BounceBack - A DDoS Attack Using Unsuspecting Accomplices in the Network. 1-2
- Justin Burr, Shengjie Xu  : :
 Improving Adversarial Attacks Against Executable Raw Byte Classifiers. 1-2
- Chia-Hung Lin, Shih-Chun Lin  , Erik Blasch: , Erik Blasch:
 TULVCAN: Terahertz Ultra-broadband Learning Vehicular Channel-Aware Networking. 1-6
- Sachin Rana, Ahmet Aksoy: 
 Automated Fast-flux Detection using Machine Learning and Genetic Algorithms. 1-6
- Anthony Dowling, Yaoqing Liu, Lauren Huie, Kang Chen: 
 Building an Information-Centric and LoRa-Based Sensing Platform for IoT. 1-6
- Zheyi Ma, Hao Li, Wen Fang  , Qingwen Liu, Bin Zhou, Zhiyong Bu: , Qingwen Liu, Bin Zhou, Zhiyong Bu:
 A Cloud-Edge-Terminal Collaborative System for Temperature Measurement in COVID-19 Prevention. 1-6
- Yuan Gao, Cheng Yang, Weidang Lu, Yiming Wenchen, Yu Zhang, Guoxing Huang, Jiang Cao: 
 Joint Resource Optimization in Two-way Relaying Energy Harvesting Cognitive Sensor Network. 1-6
- Xiaoyu Hao, Tao Yang, Yulin Hu  , Bo Hu: , Bo Hu:
 Performance Analysis for Correlated AoI and Energy Efficiency in Heterogeneous CR-IoT System. 1-8
- Pham Tien Dat, Atsushi Kanno  , Naokatsu Yamamoto, Tetsuya Kawanishi: , Naokatsu Yamamoto, Tetsuya Kawanishi:
 1024-QAM Analog Waveform Transmission Over a Seamless Fiber-Wireless System in W Band. 1-2
- Vishrant Tripathi  , Eytan H. Modiano: , Eytan H. Modiano:
 Age Debt: A General Framework for Minimizing Age of Information. 1-6
- Tian Qin  , Guang Cheng, Wenchao Chen, Si Wu: , Guang Cheng, Wenchao Chen, Si Wu:
 A Lightweight Residual Networks Framework for DDoS Attack Classification Based on Federated Learning. 1-6
- Qian Xia, Wei Wang, Lin Chen, Kang G. Shin, Zhaoyang Zhang: 
 Poster Abstract: Neighbor-aware Queue-based Random Access. 1-2
- Kaitao Meng, Xiaofan He, Deshi Li, Mingliu Liu, Chan Xu  : :
 Sensing Quality Constrained Packet Rate Optimization via Multi-UAV Collaborative Compression and Relay. 1-6
- Shuo Wang, Binwei Wu, Chen Zhang, Yudong Huang, Tao Huang  , Yunjie Liu: , Yunjie Liu:
 Large-Scale Deterministic IP Networks on CENI. 1-6
- Yang Deng, Tao Han, Ning Zhang  : :
 FLeX: Trading Edge Computing Resources for Federated Learning via Blockchain. 1-2
- Miquel Ferriol Galmés  , Albert Cabellos-Aparicio: , Albert Cabellos-Aparicio:
 Decentralised Internet Infrastructure: Securing Inter-Domain Routing (DEMO). 1-2
- Yahya Hassanzadeh-Nazarabadi, Kedar Kshatriya, Öznur Özkasap: 
 Smart Contract-enabled LightChain Test Network. 1-2
- Yuxiang Lin, Jiamei Lv, Yi Gao, Wei Dong: 
 Achieving Variable 5G Uplink Bandwidth for IoT Applications. 1-2
- Nina Slamnik-Krijestorac, Girma M. Yilma  , Faqir Zarrar Yousaf, Marco Liebsch, Johann M. Márquez-Barja , Faqir Zarrar Yousaf, Marco Liebsch, Johann M. Márquez-Barja : :
 Multi-domain MEC orchestration platform for enhanced Back Situation Awareness. 1-2
- Wanru Xu, Xiaochen Fan, Tao Wu, Yue Xi, Panlong Yang, Chang Tian: 
 Interest Users Cumulatively in Your Ads: A Near Optimal Study for Wi-Fi Advertisement Scheduling. 1-6
- Jorge Eduardo Rivadeneira  , Jorge Sá Silva, Ricardo Colomo-Palacios, André Rodrigues , Jorge Sá Silva, Ricardo Colomo-Palacios, André Rodrigues , José Marcelo Fernandes , José Marcelo Fernandes , Fernando Boavida: , Fernando Boavida:
 A Privacy-Aware Framework Integration into a Human-in-the-Loop IoT System. 1-6
- Hantong Zheng, Huan Zhou, Ning Wang, Peng Chen, Shouzhi Xu: 
 Reinforcement Learning for Energy-efficient Edge Caching in Mobile Edge Networks. 1-6
- Florian Klingler, Max Schettler, Sigrid Dimce, Muhammad Sohaib Amjad, Falko Dressler: 
 Poster Abstract: mmWave on the Road - Field Testing IEEE 802.11ad WLAN at 60 GHz. 1-2
- Yating Dai, Yijun Guo, Jianjun Hao: 
 UAV Placement and Resource Allocation for Multi-hop UAV Assisted Backhaul System. 1-6
- Jingxue Sun, Ting Yang, Zhiqiu Huang, Wengjie Wang, Yuqing Zhang: 
 Using Dynamic Analysis to Automatically Detect Anti-Adblocker on the Web. 1-6
- Md Kamran Chowdhury Shisher  , Heyang Qin, Lei Yang, Feng Yan, Yin Sun , Heyang Qin, Lei Yang, Feng Yan, Yin Sun : :
 The Age of Correlated Features in Supervised Learning based Forecasting. 1-8
- Yukito Ueno, Ryo Nakamura, Yohei Kuga, Hiroshi Esaki: 
 P2PNIC: High-Speed Packet Forwarding by Direct Communication between NICs. 1-6
- Yuxi Zhao, Xiaowen Gong: 
 Quality-Aware Distributed Computation and User Selection for Cost-Effective Federated Learning. 1-6
- Yixin He  , Daosen Zhai, Ruonan Zhang, Jianbo Du, Gagangeet Singh Aujla, Haotong Cao: , Daosen Zhai, Ruonan Zhang, Jianbo Du, Gagangeet Singh Aujla, Haotong Cao:
 A Mobile Edge Computing Framework for Task Offloading and Resource Allocation in UAV-assisted VANETs. 1-6
- Tianshun Wang  , Yang Li, Yuan Wu, Liping Qian , Yang Li, Yuan Wu, Liping Qian , Lin Bin, Weijia Jia: , Lin Bin, Weijia Jia:
 Optimal Channel Sharing assisted Multi-user Computation Offloading via NOMA. 1-6
- Nabeel Sheikh, Mayur Pawar, Victor B. Lawrence: 
 Zero trust using Network Micro Segmentation. 1-6
- Walter Wong, Aleksandr Zavodovski  , Lorenzo Corneo , Lorenzo Corneo , Nitinder Mohan , Nitinder Mohan , Jussi Kangasharju , Jussi Kangasharju : :
 SPA: Harnessing Availability in the AWS Spot Market. 1-6

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


 Google
Google Google Scholar
Google Scholar Semantic Scholar
Semantic Scholar Internet Archive Scholar
Internet Archive Scholar CiteSeerX
CiteSeerX ORCID
ORCID














