


default search action
INFOCOM 2022: New York, NY, USA - Workshops
- IEEE INFOCOM 2022 - IEEE Conference on Computer Communications Workshops, INFOCOM 2022 - Workshops, New York, NY, USA, May 2-5, 2022. IEEE 2022, ISBN 978-1-6654-0926-1

- Xiaolong Deng, Tiejun Lv, LinMing Song:

Novel Efficient Block Chain and Rule-based Intelligent Privacy Share System in Future Network. 1-8 - Gurjashan Singh Pannu, Seyhan Ucar, Takamasa Higuchi, Onur Altintas, Falko Dressler:

Vehicular Virtual Edge Computing using Heterogeneous V2V and V2C Communication. 1-2 - Guowen Wu

, Yuhan Zhao, Yizhou Shen, Hong Zhang, Shigen Shen
, Shui Yu
:
DRL-based Resource Allocation Optimization for Computation Offloading in Mobile Edge Computing. 1-6 - Alena Chang

, Guoliang Xue:
Order Matters: On the Impact of Swapping Order on an Entanglement Path in a Quantum Network. 1-6 - Nalam Venkata Abhishek

, Muhammad Naveed Aman, Teng Joon Lim, Biplab Sikdar:
PIC: Preserving Data Integrity in UAV Assisted Communication. 1-6 - Zhenning Wang

, Mingze Li
, Liang Zhao, Huan Zhou, Ning Wang:
A3C-based Computation Offloading and Service Caching in Cloud-Edge Computing Networks. 1-2 - Diego A. Cuji, Zhengnan Li, Milica Stojanovic:

ACT: an Acoustic Communications Testbed. 1-6 - Leandros Maglaras

, Nick Ayres, Sotiris Moschoyiannis
, Leandros Tassiulas:
The end of Eavesdropping Attacks through the Use of Advanced End to End Encryption Mechanisms. 1-2 - Umesh Bodkhe, Sudeep Tanwar

:
P2 COMM: A Secure and Low-Cost Message Dissemination Scheme for Connected Vehicles. 1-6 - Anmol Kumar

, Gaurav Somani:
DDoS attack mitigation in cloud targets using scale-inside out assisted container separation. 1-6 - Ying Ju, Yuchao Chen, Zhiwei Cao, Haoyu Wang, Lei Liu, Qingqi Pei, Neeraj Kumar:

Learning Based and Physical-layer Assisted Secure Computation Offloading in Vehicular Spectrum Sharing Networks. 1-6 - Varun Kohli

, Amit Chougule
, Vinay Chamola
, F. Richard Yu:
MbRE IDS: An AI and Edge Computing Empowered Framework for Securing Intelligent Transportation Systems. 1-6 - Mehbub Alam

, Nurzaman Ahmed, Rakesh Matam, Ferdous Ahmed Barbhuiya:
L3Fog: Fog Node Selection and Task Offloading Framework for Mobile IoT. 1-6 - Prateek Mahajan, Anusha Kumar, G. Sai Sesha Chalapathi, Rajkumar Buyya:

EFTA: An Energy-efficient, Fault-Tolerant, and Area-optimized UAV Placement Scheme for Search Operations. 1-6 - Abdalaziz Sawwan

, Jie Wu:
Unreliable Multi-hop Networks Routing Protocol For Age of Information-Sensitive Communication. 1-2 - Chao Yang, Lingxiao Wang, Xuyu Wang

, Shiwen Mao:
Demo Abstract: Environment-adaptive 3D Human Pose Tracking with RFID. 1-2 - Xiaolin Zhu, Yong Zhang, Zhao Zhang

, Da Guo, Qi Li, Zhao Li:
Interpretability Evaluation of Botnet Detection Model based on Graph Neural Network. 1-6 - Yanlang Zheng, Huan Zhou, Rui Chen, Kai Jiang, Yue Cao

:
SAC-based Computation Offloading and Resource Allocation in Vehicular Edge Computing. 1-6 - Dongyang Yang, Yifan Han

, Yang Du, He Huang, Yu-E Sun, Shiping Chen:
LSE: A Learning-based Per-flow Spread Estimation Framework for Network Data Streams. 1-6 - Chao Yang, Xuyu Wang

, Shiwen Mao:
Demo Abstract: Technology-agnostic Approach to RF based Human Activity Recognition. 1-2 - Lingxiao Chen, Guoqiang Gong, Kai Jiang, Huan Zhou, Rui Chen:

DDPG-based Computation Offloading and Service Caching in Mobile Edge Computing. 1-6 - Meng Wang, Qinghe Du, Likang Zhang:

Minimum-SNR Maximization for Robust IRS-assisted Legitimate Monitoring System. 1-6 - Hervais Simo, Michael Kreutzer:

REGRETS: A New Corpus of Regrettable (Self-)Disclosures on Social Media. 1-2 - Sara Jafarbeiki, Amin Sakzad, Shabnam Kasra Kermanshahi

, Ron Steinfeld, Raj Gaire:
PRESSGenDB: PRivacy-prEserving Substring Search on Encrypted Genomic DataBase. 1-6 - Sarantis Kalafatidis

, Vassilis Demiroglou
, Lefteris Mamatas, Vassilis Tsaoussidis
:
Experimenting with an SDN-Based NDN Deployment over Wireless Mesh Networks. 1-6 - Jiabao Wang, Haoran Zha, Jiangzhi Fu:

Evaluation of deep learning model in the field of electromagnetic signal recognition. 1-6 - Ebuka Oguchi

, Nirnimesh Ghose, Mehmet C. Vuran
:
STUN: Secret-Free Trust-Establishment For Underground Wireless Networks. 1-6 - Wendi Feng

, Ranzheng Cao, Zhi-Li Zhang:
STATOEUVER: State-aware Load Balancing for Network Function Virtualization. 1-2 - Joseph Bolarinwa

, Alex Smith, Adnan Aijaz, Aleksandar Stanoev, Manuel Giuliani:
Demo: Untethered Haptic Teleoperation for Nuclear Decommissioning using a Low-Power Wireless Control Technology. 1-2 - Zahra Aref, Narayan B. Mandayam:

Impact of Subjectivity in Deep Reinforcement Learning based Defense of Cloud Storage. 1-6 - Igor Bisio, Chiara Garibotto, Fabio Lavagetto, Andrea Sciarrone:

A Novel IoT-based Edge Sensing Platform for Structure Health Monitoring. 1-6 - Vincent Charpentier

, Nina Slamnik-Krijestorac, Johann Márquez-Barja
:
Assessing the impact of CAM messages in vehicular communications in real highway environments. 1-2 - Ruichen Zhang, Ke Xiong, Xingcong Tian, Yang Lu, Pingyi Fan

, Khaled Ben Letaief
:
Inverse Reinforcement Learning Meets Power Allocation in Multi-user Cellular Networks. 1-2 - Ying Ju, Haoyu Wang, Yuchao Chen, Lei Liu, Tong-Xing Zheng, Qingqi Pei, Ming Xiao:

DRL-based Beam Allocation in Relay-aided Multi-user MmWave Vehicular Networks. 1-6 - Christos Liaskos

, Konstantinos Alexandris, Siyu Tang, Anindya Das:
End-to-end TCP-compatible Backpressure Routing. 1-6 - Ruyu Luo, Wanli Ni

, Hui Tian:
Visualizing Multi-Agent Reinforcement Learning for Robotic Communication in Industrial IoT Networks. 1-2 - Qixun Zhang, Xinye Gao:

Joint Communication and Sensing Enabled Cooperative Perception Testbed for Connected Automated Vehicles. 1-2 - Pablo Avila-Campos

, Jetmir Haxhibeqiri
, Ingrid Moerman, Jeroen Hoebeke:
Beacon-Based Wireless TSN Association. 1-2 - Yuguo Li, Shaoheng Tan, Zhiwen Wang, Dingding Li:

A NUMA-aware Key-Value Store for Hybrid Memory Architecture. 1-6 - Silin Feng, Jiajun Chen, Zhiwei Zhao:

Cost Effective Routing in Large-scale Multi-hop LoRa Networks. 1-6 - Theodoros Tsourdinis, Ilias Chatzistefanidis

, Nikos Makris
, Thanasis Korakis:
AI-driven Service-aware Real-time Slicing for beyond 5G Networks. 1-6 - Wei Liu, Li Chen, Weidong Wang:

General Decentralized Federated Learning for Communication-Computation Tradeoff. 1-6 - Yahya Hassanzadeh-Nazarabadi, Sanaz Taheri Boshrooyeh, Öznur Özkasap:

DHT-based Edge and Fog Computing Systems: Infrastructures and Applications. 1-6 - Xin Shen, Zhuo Li, Xin Chen:

Online Node Cooperation Strategy Design for Hierarchical Federated Learning. 1-6 - Bhargav Gokalgandhi, Ivan Seskar:

Channel Estimation for Massive MIMO systems using Tensor Cores in GPU. 1-6 - Rajesh Gupta

, Sudeep Tanwar
:
Interference Mitigation and Secrecy-ensured D2D Resource Allocation Scheme using Game Theory. 1-6 - Haina Zheng, Ke Xiong, Mengying Sun, Zhangdui Zhong, Khaled Ben Letaief

:
Age-Energy Efficiency in WPCNs: A Deep Reinforcement Learning Approach. 1-2 - Vishal Venkatraman, Shantanu Pal, Zahra Jadidi

, Alireza Jolfaei
:
A Conceptual Trust Management Framework under Uncertainty for Smart Vehicular Networks. 1-7 - Eloi Cruz Harillo, Felix Freitag

:
LoRaCoin: Towards a blockchain-based platform for managing LoRa devices. 1-2 - Jie Cao, Xu Zhu

, Sumei Sun, Petar Popovski
, Shaohan Feng, Yufei Jiang:
Age of Loop Oriented Wireless Networked Control System: Communication and Control Co-Design in the FBL Regime. 1-6 - Zhihao Wang, Dingde Jiang, Zhihan Lv

, Houbing Song
:
A Deep Reinforcement Learning based Intrusion Detection Strategy for Smart Vehicular Networks. 1-6 - Wanli Ni

, Xufeng Liu, Hui Tian:
Battery-less Massive Access for Simultaneous Information Transmission and Federated Learning in WPT Networks. 1-2 - Venkata Praveen Kumar Madhavarapu

, Shameek Bhattacharjee
, Sajal K. Das:
A Generative Model for Evasion Attacks in Smart Grid. 1-6 - Mohamed A. Abd-Elmagid, Harpreet S. Dhillon:

Distribution of AoI in EH-powered Multi-source Systems under Non-preemptive and Preemptive Policies. 1-8 - Chunming Qiao, Yangming Zhao, Gongming Zhao, Hongli Xu:

Quantum Data Networking for Distributed Quantum Computing: Opportunities and Challenges. 1-6 - Yuan Gao, Yang Guo, Ping Wang, Siming Yang, Jing Wang, Xiaonan Wang, Yu Ding, Weidang Lu, Yu Zhang, Guoxing Huang, Jiang Cao:

Secure Enhancement in NOMA-based UAV-MEC Networks. 1-6 - Jalil Taghia, Farnaz Moradi, Hannes Larsson, Xiaoyu Lan, Masoumeh Ebrahimi, Andreas Johnsson:

Demonstration of Policy-Induced Unsupervised Feature Selection in a 5G network. 1-2 - Gilson Miranda, Esteban Municio, Jetmir Haxhibeqiri

, Daniel F. Macedo
, Jeroen Hoebeke, Ingrid Moerman, Johann M. Márquez-Barja
:
Evaluating Time-Sensitive Networking Features on Open Testbeds. 1-2 - Cihang Cheng, Ming Liu, Ke Xiong:

A Dual-RFID-Tag Based Indoor Localization Method with Multiple Apertures. 1-2 - Qiuming Zhu

, Yi Zhao, Yang Huang, Zhipeng Lin, Lu Han, Jie Wang, Yunpeng Bai, Tianxu Lan, Fuhui Zhou, Qihui Wu:
DEMO Abstract: An UAV-based 3D Spectrum Real-time Mapping System. 1-2 - Haotong Cao, Yue Hu, Shengchen Wu, Yongan Guo:

Dynamic and Secure Resource Allocation Framework of Slices for 5G-Enabled Cyber Physical Systems. 1-6 - Jagnyashini Debadarshini, Sudipta Saha:

Efficient Coordination among Electrical Vehicles: An IoT-Assisted Approach. 1-2 - Yu Huang, Pengfei Liu, Jie Yang:

Radio Frequency Fingerprint Identification Method Based on Ensemble Learning. 1-6 - Haonan Zhang, Chuanchuan Yang, Bin Dai:

When Wireless Federated Learning Meets Physical Layer Security: The Fundamental Limits. 1-6 - Peng Qian, Ning Wang, Rahim Tafazolli

:
User Intent Driven Path Switching in Video Delivery - An Edge Computing Based Approach. 1-6 - Le Xia

, Yao Sun, Xiaoqian Li, Gang Feng, Muhammad Ali Imran
:
Wireless Resource Management in Intelligent Semantic Communication Networks. 1-6 - Magreth Mushi, Harshvardhan P. Joshi, Rudra Dutta

, Ismail Güvenç
, Mihail L. Sichitiu
, Brian A. Floyd
, Thomas Zajkowski:
The AERPAW Experiment Workflow - Considerations for Designing Usage Models for a Computing-supported Physical Research Platform. 1-8 - Beibei Li

, Yaxin Shi, Yuqing Guo, Qinglei Kong, Yukun Jiang:
Incentive and Knowledge Distillation Based Federated Learning for Cross-Silo Applications. 1-6 - Haoyu Zhu, Ninghao Zhou, Jia Hou:

Security Performance Analysis of NOMA System Based on Multi-Slot Combined Reception. 1-6 - Ying Chen, Hazer Inaltekin

, Maria Gorlatova:
Demo Abstract: Pixel Similarity-Based Content Reuse in Edge-Assisted Virtual Reality. 1-2 - Argha Sen, Sashank Bonda, Jay Jayatheerthan, Sandip Chakraborty:

An ns3-based Energy Module for 5G mmWave Base Stations. 1-2 - Roman Zlobin

, Aleksey A. Kureev
, Evgeny M. Khorov:
Receiver Design and Frame Format for Uplink NOMA in Wi-Fi. 1-2 - Tao Wang, Xiangquan Shi, Jing Tao, Xiaoyan Wang, Biao Han

:
Efficient Synchronous MAC Protocols for Terahertz Networking in Wireless Data Center. 1-6 - Alfredo Nascita, Francesco Cerasuolo

, Davide Di Monda
, Jonas Thern Aberia Garcia, Antonio Montieri
, Antonio Pescapè:
Machine and Deep Learning Approaches for IoT Attack Classification. 1-6 - Riya Kakkar, Smita Agrawal, Rajesh Gupta

, Sudeep Tanwar
:
Blockchain and Zero-Sum Game-based Dynamic Pricing Scheme for Electric Vehicle Charging. 1-6 - Jian Fang, Zhiyi Zhou, Sunhaoran Jin, Lei Wang, Bingxian Lu, Zhenquan Qin:

Exploring LoRa for Drone Detection. 1-2 - Sarvesh Sanjay Wanode, Milind Anand, Barsha Mitra:

Optimal Feature Set Selection for IoT Device Fingerprinting on Edge Infrastructure using Machine Intelligence. 1-6 - Wei Guan, Bo Gao, Ke Xiong, Yang Lu:

Spectrum Sharing in UAV-Assisted HetNet Based on CMB-AM Multi-Agent Deep Reinforcement Learning. 1-2 - Mianxue Gu, Hantao Feng, Hongyu Sun, Peng Liu, Qiuling Yue, Jinglu Hu, Chunjie Cao, Yuqing Zhang:

Hierarchical Attention Network for Interpretable and Fine-Grained Vulnerability Detection. 1-6 - Sergei Chuprov

, Leon Reznik
, Antoun Obeid, Srujan Shetty:
How Degrading Network Conditions Influence Machine Learning End Systems Performance? 1-6 - Xiaojiang Zuo, Xiao Wang, Rui Han:

An Empirical Analysis of CAPTCHA Image Design Choices in Cloud Services. 1-6 - Tung-Wei Kuo:

Competitive Analyses of Online Minimum Age of Information Transmission Scheduling. 1-8 - Dengfeng Yao, Minghui Dai, Tianshun Wang, Yuan Wu, Zhou Su:

Intelligent Sensing and Communication assisted Pedestrians Recognition in Vehicular Networks: An Effective Throughput Maximization Approach. 1-6 - Baidi Xiao, Yan Shao, Rongpeng Li, Zhifeng Zhao, Honggang Zhang:

Demo: Deep Reinforcement Learning for Resource Management in Cellular Network Slicing. 1-2 - Naivedya Lath, Kaustubh Thapliyal, Kartik Kandpal, Mohammad Wazid, Ashok Kumar Das, Devesh Pratap Singh:

BDESF-ITS: Blockchain-Based Secure Data Exchange and Storage Framework for Intelligent Transportation System. 1-6 - Praveen Rao, Arun Zachariah:

Enabling Large-Scale Human Genome Sequence Analysis on CloudLab. 1-2 - Xu Zheng, Qihao Dong

, Anmin Fu
:
WMDefense: Using Watermark to Defense Byzantine Attacks in Federated Learning. 1-6 - Xiu Susie Fang, Quan Z. Sheng

, Jian Yang
, Guohao Sun, Xianzhi Wang
, Yihong Zhang:
Resolving Conflicts among Unbalanced Multi-Source Data When Multi-Value Objects Exist. 1-2 - Terry N. Guo:

Connectivity-Aware Fast Network Forming Aided By Digital Twin For Emergency Use. 1-6 - Paolo Medagliani, Sébastien Martin

, Jérémie Leguay, Shengming Cai, Feng Zeng, Nicolas Huin:
Resource Defragmentation for Network Slicing. 1-2 - Bharat S. Rawal, Sudhanshu Patel

, Mithileysh Sathiyanarayanan
:
Identifying DDoS Attack using Split-Machine Learning System in 5G and Beyond Networks. 1-6 - Hassaan Hydher, Dushantha Nalin K. Jayakody, Kasun T. Hemachandra, Tharaka Samarasinghe

:
UAV Deployment for Data Collection in Energy Constrained WSN System. 1-6 - Abhishek Majumder, Joy Lal Sarkar, Bibudhendu Pati, Chhabi Rani Panigrahi, V. Ramasamy, Sudipta Roy, Vikas Kumar:

MERIT: Multi-Itinerary Tourist Recommendation Engine for Industrial Internet of Things. 1-6 - Yash Deshpande, Onur Ayan, Wolfgang Kellerer

:
Improving AoI via Learning-based Distributed MAC in Wireless Networks. 1-8 - Nasimul Hasan, Zhenxiang Chen, Chuan Zhao, Yuhui Zhu

, Cong Liu:
IoT Botnet Detection framework from Network Behavior based on Extreme Learning Machine. 1-6 - Songlin Chen, Sijing Wang, Xingchen Xu, Long Jiao, Hong Wen:

Physical Layer Security Authentication Based Wireless Industrial Communication System for Spoofing Detection. 1-2 - Runze Tang, Gaolei Duan, Lei Xie, Yanling Bu, Ming Zhao, Zhenjie Lin, Qiang Lin:

Static Obstacle Detection based on Acoustic Signals. 1-2 - Jian Fang, Lei Wang, Zhenquan Qin, Bingxian Lu:

LoRa-based Outdoor 3D Localization. 1-2 - Balázs Vass

, Csaba Sarkadi, Gábor Rétvári:
Programmable Packet Scheduling With SP-PIFO: Theory, Algorithms and Evaluation. 1-6 - Haoran Zhao, Bo He, He Zhou, Jiangyin Zhou, Qi Qi, Jingyu Wang

, Haifeng Sun, Jianxin Liao:
QUIC-Enabled Data Aggregation for Short Packet Communication in mMTC. 1-2 - Rahul Mishra

, Hari Prabhat Gupta, Tanima Dutta:
Noise-Resilient Federated Learning: Suppressing Noisy Labels in the Local Datasets of Participants. 1-2 - Chengxiao Yu, Wei Quan, Kang Liu, Mingyuan Liu, Ziheng Xu

, Hongke Zhang:
DRL-Based Fountain Codes for Concurrent Multipath Transfer in 6G Networks. 1-6 - Ilias Siniosoglou, Vasileios Argyriou, Thomas Lagkas, Ioannis D. Moscholios, George F. Fragulis, Panagiotis G. Sarigiannidis:

Unsupervised Bias Evaluation of DNNs in non-IID Federated Learning Through Latent micro-Manifolds. 1-6 - Hussam Abdellatif, Viduneth Ariyarathna, Sergey Petrushkevich, Arjuna Madanayake

, Josep Miquel Jornet:
A Real-Time Ultra-broadband Software-Defined Radio Platform for Terahertz Communications. 1-2 - Himanshu Sharma

, Ishan Budhiraja
, Neeraj Kumar, Rajkumar Tekchandani:
Secrecy Rate Maximization for THz-Enabled Femto Edge Users using Deep Reinforcement Learning in 6G. 1-6 - Shuze Shen, Zheyi Ma, Mingqing Liu, Qingwen Liu, Yunfeng Bai, Mingliang Xiong:

A Cloud-Terminal Collaborative System for Crowd Counting and Localization Using Multi-UAVs. 1-6 - Ahan Kak

, Van-Quan Pham, Huu-Trung Thieu
, Nakjung Choi:
Demo: A Disaggregated O-RAN Platform for Network Slice Deployment and Assurance. 1-2 - Yaoyao Wang

, Xiaoguang Chen
:
Joint modulation of 3-PPM and quantum squeezed states in communication systems. 1-5 - Henry Clausen, Aditya Manocha, Michael Scott Gibson:

Detecting Proxies Relaying Streaming Internet Traffic. 1-6 - Chen Wang, Daosen Zhai, Ruonan Zhang, Huan Li, Haotong Cao, Anish Jindal

:
Joint UAVs Position Optimization and Offloading Decision for Blockchain-enabled Intelligent Transportation. 1-6 - Anuja R. Nair

, Nilesh Kumar Jadav
, Rajesh Gupta
, Sudeep Tanwar
:
AI-empowered Secure Data Communication in V2X Environment with 6G Network. 1-6 - Mingqian Liu, Zhenju Zhang, Nan Zhao, Yunfei Chen:

Adversarial Attacks on Deep Neural Networks Based Modulation Recognition. 1-6 - Husnain Rafiq

, Nauman Aslam, Biju Issac
, Rizwan Hamid Randhawa
:
An Investigation on Fragility of Machine Learning Classifiers in Android Malware Detection. 1-6 - Xiaoming Yuan, Jiahui Chen, Ning Zhang, Chunsheng Zhu, Qiang Ye, Xuemin Sherman Shen

:
FedTSE: Low-Cost Federated Learning for Privacy-Preserved Traffic State Estimation in IoV. 1-6 - Ali Akbar Mohammadi, Rasheed Hussain

, Alma Oracevic
, Syed Muhammad Ahsan Raza Kazmi, Fatima Hussain, Moayad Aloqaily, Junggab Son:
A Novel TCP/IP Header Hijacking Attack on SDN. 1-2 - Ziwei Liu, Lei Xie, Jingyi Ning, Ming Zhao, Liming Wang, Hao Peng:

Remote Meter Reading based on Lightweight Edge Devices. 1-2 - Yulong He, Xiaofan He:

Location Privacy-Aware Coded Offloading for Distributed Edge Computing. 1-6 - Gabriel Antonio F. Rebello, Gustavo Franco Camilo

, Maria Potop-Butucaru, Miguel Elias M. Campista, Marcelo Dias de Amorim, Luís Henrique M. K. Costa:
PCNsim: A Flexible and Modular Simulator for Payment Channel Networks. 1-2 - Yichuan Wang, Rui Fan, Xinyue Yin, Xinhong Hei:

Trusted Storage Architecture for Machine Reasoning based on Blockchain. 1-6 - Dilwar Hussain Barbhuiya, Adittya Dey, Rajdeep Ghosh

, Kunal Das, Kumarjit Ray
, Nabajyoti Medhi
:
Resource Aware Fog Based Remote Health Monitoring System. 1-6 - Tarek Ahmed, Shengjie Xu

:
Shellcoding: Hunting for Kernel32 Base Address. 1-2 - Gaurang Bansal, Biplab Sikdar:

Secure and Trusted Attestation Protocol for UAV Fleets. 1-6 - Xin Yao, Jiangong Chen, Ting He, Jing Yang

, Bin Li
:
A Scalable Mixed Reality Platform for Remote Collaborative LEGO Design. 1-2 - Hemant Rathore, Adithya Samavedhi, Sanjay K. Sahay, Mohit Sewak:

Are Malware Detection Models Adversarial Robust Against Evasion Attack? 1-2 - Junlin Liu, Yukun Sun

, Junqi Su, Zhaojiang Li, Xing Zhang, Bo Lei, Wenbo Wang:
Computing Power Network: A Testbed and Applications with Edge Intelligence. 1-2 - Vladislav Li, George Amponis, Jean-Christophe Nebel

, Vasileios Argyriou, Thomas Lagkas, Savvas Ouzounidis, Panagiotis G. Sarigiannidis:
Super Resolution for Augmented Reality Applications. 1-6 - Jong-Min Kim

, Ju-Hyung Lee, Yeongrok Lee, Hong-Seol Cha, Hyunsu Park, Jincheol Sim, Chulwoo Kim, Young-Chai Ko:
Experimental Demonstration of RoFSO Transmission Combining WLAN Standard and WDM-FSO over 100m Distance. 1-2 - Katarzyna Koptyra, Marek R. Ogiela:

An extension of imagechain concept that allows multiple images per block. 1-2 - Zhuangzhuang Liao, Xiaojie Fang, Ning Zhang, Tao Han, Xuejun Sha:

On Carrier Scheme Convergence: A WFRFT-based Hybrid Carrier Scheme Demonstration. 1-2 - Xiaolei Liu, Xiaoyu Li, Desheng Zheng

, Jiayu Bai, Yu Peng, Shibin Zhang:
Automatic Selection Attacks Framework for Hard Label Black-Box Models. 1-7 - Ivan Vaccari, Alberto Carlevaro

, Sara Narteni
, Enrico Cambiaso
, Maurizio Mongelli:
On The Detection Of Adversarial Attacks Through Reliable AI. 1-6 - Hanbiao Du, Meng Shen, Rungeng Sun, Jizhe Jia, Liehuang Zhu, Yanlong Zhai:

Malicious Transaction Identification in Digital Currency via Federated Graph Deep Learning. 1-6 - Tengyu Zhang, Jun Liu, Feifei Gao:

Vision Aided Beam Tracking and Frequency Handoff for mmWave Communications. 1-2 - Xinjie Gu, Xiaolong Wang, Yuchen Feng, Yuzhu Long, Mithun Mukherjee, Zhigeng Pan, Mian Guo, Qi Zhang

:
Demo: TINGLE: Pushing Edge Intelligence in Synchronization and Useful Data Transfer for Human-Robotic Arm Interactions. 1-2 - Sohan Gyawali

, Omar Beg
:
Cyber Attacks Detection using Machine Learning in Smart Grid Systems. 1-2 - Suranga Handagala, Miriam Leeser, Kalyani Patle, Michael Zink

:
Network Attached FPGAs in the Open Cloud Testbed (OCT). 1-6 - Li Yi, Weidong Fang, Wei Chen, Wuxiong Zhang, Guoqing Jia:

Overlapped Connected Dominating Set for Big Data Security. 1-5 - Huiwen Hu, Qianlan Bai, Yuedong Xu:

SCSGuard: Deep Scam Detection for Ethereum Smart Contracts. 1-6 - Priyesh Ranjan, Federico Corò, Ashish Gupta, Sajal K. Das:

Leveraging Spanning Tree to Detect Colluding Attackers in Federated Learning. 1-2 - Jacob Hall

, Duschia Bodet
, Josep Miquel Jornet:
Experimental Demonstration of Multiple Input Multiple Output Communications above 100 GHz. 1-2 - Jingheng Zheng, Wanli Ni

, Hui Tian, Deniz Gündüz, Tony Q. S. Quek
:
Semi-Federated Learning: An Integrated Framework for Pervasive Intelligence in 6G Networks. 1-6 - Jiawei Li, Jessie Hui Wang, Jilong Wang:

Dynamic Pricing for Idle Resource in Public Clouds: Guarantee Revenue from Strategic Users. 1-2 - Yogendra Kumar

, Siba K. Udgata:
Machine learning model for IoT-Edge device based Water Quality Monitoring. 1-6 - Nicholas A. Peters

, Muneer Alshowkan, Joseph C. Chapman, Philip G. Evans, David A. Hooper
, Warren P. Grice, Hsuan-Hao Lu, Joseph M. Lukens, Raphael C. Pooser, Claire E. Marvinney, Alexander Miloshevsky, Brian P. Williams, Brandon A. Wilson:
Quantum Networking and Communications at Oak Ridge National Laboratory. 1-6 - Victor Sanchez-Agüero, Francisco Valera

, Iván Vidal, Borja Nogales
, Jaime Cabezas, Carlos Vidal:
A virtualization approach to validate services and subsystems of a MALE UAS. 1-6 - Dezhi Wang, Wei Wang, Yuhan Kang, Zhu Han:

Dynamic Data Offloading for Massive Users in Ultra-dense LEO Satellite Networks based on Stackelberg Mean Field Game. 1-6 - Alexander Kolar, Allen Zang, Joaquin Chung, Martin Suchara, Rajkumar Kettimuthu:

Adaptive, Continuous Entanglement Generation for Quantum Networks. 1-6 - Tanya Shreedhar, Sanjit K. Kaul

, Roy D. Yates:
Coexistence of Age Sensitive Traffic and High Throughput Flows: Does Prioritization Help? 1-6 - Shreya Ghosh, Soumya K. Ghosh:

MANTRA: Semantic Mobility Knowledge Analytics Framework for Trajectory Annotation. 1-2 - Xiangyue Yang, Haoxiang Luo

, Jingshan Duan, Hongfang Yu:
Ultra Reliable and Low Latency Authentication Scheme for Internet of Vehicles Based on Blockchain. 1-5 - Marco Gaglianese

, Stefano Forti
, Federica Paganelli
, Antonio Brogi
:
Lightweight Self-adaptive Cloud-IoT Monitoring across Fed4FIRE+ Testbeds. 1-6 - Marija Gajic

, Marcin Bosk
, Susanna Schwarzmann, Stanislav Lange, Thomas Zinner:
Demonstrating QoE-aware 5G Network Slicing Emulated with HTB in OMNeT++. 1-2 - Nitish K. Panigrahy, Prajit Dhara

, Don Towsley
, Saikat Guha, Leandros Tassiulas:
Optimal Entanglement Distribution using Satellite Based Quantum Networks. 1-6 - Navpreet Kaur, Juntao Chen:

Collaborative Learning for Large-Scale Discrete Optimal Transport under Incomplete Populational Information. 1-2 - Turhan Kimbrough, Pu Tian, Weixian Liao, Erik Blasch, Wei Yu

:
Deep CAPTCHA Recognition Using Encapsulated Preprocessing and Heterogeneous Datasets. 1-6 - Wenxin Lei, Sijing Wang, Ning Zhang, Hong Wen, Wenjing Hou, Haojie Lin, Zhu Han:

Adaptive Decision-Making Framework for Federated Learning Tasks in Multi-Tier Computing. 1-2 - Daoqin Lin, Yuchun Guo, Huan Sun, Yishuai Chen:

FedCluster: A Federated Learning Framework for Cross-Device Private ECG Classification. 1-6 - Vincent Charpentier

, Nina Slamnik-Krijestorac, Johann Márquez-Barja
:
Latency-aware C-ITS application for improving the road safety with CAM messages on the Smart Highway testbed. 1-6 - Ming Zhang

, Zhe Sun, Hui Li, Ben Niu, Fenghua Li, Yuhang Xie, Chunhao Zheng:
A blockchain-based Privacy-Preserving Framework for Cross-Social Network Photo Sharing. 1-6 - Wenjing Hou, Hong Wen, Ning Zhang, Wenxin Lei, Haojie Lin:

Dynamic Load Combined Prediction Framework with Collaborative Cloud-Edge for Microgrid. 1-2 - Du Hui, Zhuo Li, Xin Chen:

Quality-Aware Incentive Mechanism Design Based on Matching Game for Hierarchical Federated Learning. 1-6 - Panxin Bai, Heng Zhang, Jian Zhang

, Hongran Li:
USV Control With Adaptive Compensation Under False Data Injection Attacks. 1-2 - Chengjin Liu, Zoe Lin Jiang, Xin Zhao, Qian Chen, Junbin Fang

, Daojing He
, Jun Zhang, Xuan Wang:
Efficient and Privacy-Preserving Logistic Regression Scheme based on Leveled Fully Homomorphic Encryption. 1-6 - Subhankar Banerjee, Sennur Ulukus:

Age of Information in the Presence of an Adversary. 1-8 - Jianhang Zhu, Jie Gong:

Online Scheduling of Transmission and Processing for AoI Minimization with Edge Computing. 1-6 - Leonardo Badia

, Andrea Zanella
, Michele Zorzi:
Game Theoretic Analysis of Age of Information for Slotted ALOHA Access With Capture. 1-6 - Gilson Miranda, Esteban Municio, Jetmir Haxhibeqiri

, Daniel F. Macedo
, Jeroen Hoebeke, Ingrid Moerman, Johann M. Márquez-Barja
:
Time-Sensitive Networking Experimentation on Open Testbeds. 1-6 - Danyang Song, Yifei Zhu

, Cong Zhang, Jiangchuan Liu:
Trueno: A Cross-Platform Machine Learning Model Serving Framework in Heterogeneous Edge Systems. 1-2 - Qixun Zhang, Chang Yang:

Testbed and Performance Evaluation of 3D MmWave Beam Tracking in Mobility Scenario. 1-2 - Pierluigi Locatelli, Pietro Spadaccino, Francesca Cuomo:

Ruling Out IoT Devices in LoRaWAN. 1-2 - Mahmuda Akter, Nour Moustafa, Timothy M. Lynar

:
Edge Intelligence-based Privacy Protection Framework for IoT-based Smart Healthcare Systems. 1-8 - Younes Ben Mazziane

, Sara Alouf
, Giovanni Neglia:
A Formal Analysis of the Count-Min Sketch with Conservative Updates. 1-6 - Rui Kang

, Mengfei Zhu, Eiji Oki:
Implementation of Service Function Chain Deployment with Allocation Models in Kubernetes. 1-2 - Jagnyashini Debadarshini, Sudipta Saha:

Simultaneous Intra-Group Communication: Understanding the Problem Space. 1-2 - Jigna J. Hathaliya, Hetav Modi, Rajesh Gupta

, Sudeep Tanwar
:
Deep learning and Blockchain-based Essential and Parkinson Tremor Classification Scheme. 1-6 - Dimitrios Pliatsios, Thomas Lagkas, Vasileios Argyriou, Antonios Sarigiannidis, Dimitrios Margounakis, Theocharis Saoulidis, Panagiotis G. Sarigiannidis:

A Hybrid RF-FSO Offloading Scheme for Autonomous Industrial Internet of Things. 1-6 - Jiwei Mo, Jiangshu Liu, Zhiwei Zhao:

Exploiting Function-level Dependencies for Task Offloading in Edge Computing. 1-6 - Shang Shi, Yu Wang

, Heng Dong, Guan Gui, Tomoaki Ohtsuki:
Smartphone-Aided Human Activity Recognition Method using Residual Multi-Layer Perceptron. 1-6 - Yuhao Chen

, Jinyao Yan, Yuan Zhang, Karin Anna Hummel
:
Differentiating Losses in Wireless Networks: A Learning Approach. 1-2 - Zhengjun Gao, Guowen Wu

, Yizhou Shen, Hong Zhang, Shigen Shen
, Qiying Cao
:
DRL-based Optimization of Privacy Protection and Computation Performance in MEC Computation Offloading. 1-6 - Wei Zhao, Wenjie Kang, Xuchong Liu, Xin Su, Yue Zhang, Hao Jiang:

Social Relationship Mining Based on User Telephone Communication Data for Cooperative Relationship Recommendation. 1-6 - Manish Bhurtel

, Yuba Raj Siwakoti
, Danda B. Rawat:
Phishing Attack Detection with ML-Based Siamese Empowered ORB Logo Recognition and IP Mapper. 1-6 - Mahdi Beitollahi, Ning Lu:

Multi-frame Scheduling for Federated Learning over Energy-Efficient 6G Wireless Networks. 1-6 - Florian Wiedner

, Max Helm, Sebastian Gallenmüller
, Georg Carle:
HVNet: Hardware-Assisted Virtual Networking on a Single Physical Host. 1-6 - Luhan Zou, Yunkai Wei, Lixiang Ma, Supeng Leng:

Feature-Attended Multi-Flow LSTM for Anomaly Detection in Internet of Things. 1-6 - Zehua Ren, Yang Liu, Huixiang Liu, Baoxiang Jiang, Xiangzhen Yao, Lin Li, Haiwen Yang, Ting Liu:

Network Security Situation Awareness Based on Spatio-temporal Correlation of Alarms. 1-2 - Nilesh Kumar Jadav

, Rajesh Gupta
, Sudeep Tanwar
:
Blockchain and Edge Intelligence-based Secure and Trusted V2V Framework Underlying 6G Networks. 1-6 - Nima Namvar, Fatemeh Afghah:

Heterogeneous Airborne mmWave Cells: Optimal Placement for Power-Efficient Maximum Coverage. 1-6 - Chengjun Jia, Chenglong Li, Yifan Li, Xiaohe Hu, Jun Li:

An Observation of Packet Classification: Most Rules are at the Top. 1-6

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














