


default search action
ISCC 2022: Rhodes, Greece
- IEEE Symposium on Computers and Communications, ISCC 2022, Rhodes, Greece, June 30 - July 3, 2022. IEEE 2022, ISBN 978-1-6654-9792-3

- Seyedali Tabaeiaghdaei

, Adrian Perrig:
Data-Plane Energy Efficiency of a Next-Generation Internet Architecture. 1-8 - Wisam Abbasi

, Paolo Mori, Andrea Saracino, Valerio Frascolla:
Privacy vs Accuracy Trade-Off in Privacy Aware Face Recognition in Smart Systems. 1-8 - Masih Abedini, Irfan S. Al-Anbagi

:
Active Eavesdroppers Detection System in Multi-hop Wireless Sensor Networks. 1-6 - Leah Kazenmayer, Gabriela Ford, Jiechao Zhang, Rezaur Rahman, Furkan Cimen, Damla Turgut, Samiul Hasan

:
Traffic Volume Prediction with Automated Signal Performance Measures (ATSPM) Data. 1-6 - Jiawei Liang, Juan Li, Kun Zhu, Changyan Yi:

Learning Auction in Coded Distributed Computing with Heterogeneous User Demands. 1-6 - Yuejun Li, Huajun Cui, Jiyan Sun, Yan Zhang, Yueqi Li, Guozhu Meng, Weiping Wang

:
Automated Privacy Network Traffic Detection via Self-labeling and Learning. 1-8 - Andreia Pinto

, João Viana
, Diogo Martinho, Vítor Crista, José Miguel Diniz, Joana Reis, João Matos, David Greer, Goreti Marreiros, Alberto Freitas
:
Improving the lifestyle behavior of type 2 diabetes mellitus patients using a mobile application. 1-5 - Kei Oshio, Satoshi Takada, Chansu Han, Akira Tanaka, Jun'ichi Takeuchi:

Poster: Flexible Function Estimation of IoT Malware Using Graph Embedding Technique. 1-3 - Yuanhao Liu, Fen Zhou, Michal Pióro, Tao Shang

, Juan-Manuel Torres-Moreno, Abderrahim Benslimane:
On Flow-based Directed p-Cycle Design in Elastic Optical Networks. 1-7 - Tianhao Miao, Qinghua Wu, Ting Liu, Penglai Cui, Rui Ren, Zhenyu Li, Gaogang Xie:

MD-Roofline: A Training Performance Analysis Model for Distributed Deep Learning. 1-8 - Guanghui Ma, Rajendran Parthiban, Nemai Karmakar:

Novel Handover Algorithms Using Pattern Recognition for Hybrid LiFi Networks. 1-7 - Chafiq Titouna, Farid Naït-Abdesselam:

A False Data Injection Attack Detection Approach Using Convolutional Neural Networks in Unmanned Aerial Systems. 1-6 - Andrea Sabbioni

, Carlo Mazzocca, Michele Colajanni, Rebecca Montanari, Antonio Corradi:
A Fully Decentralized Architecture for Access Control Verification in Serverless Environments. 1-6 - Valeria Lukaj, Francesco Martella, Antonino Quattrocchi, Maria Fazio, Roberto Montanini, Massimo Villari, Antonio Celesti:

Towards IoT Rejuvenation: a Study on HY-SRF05 Ultrasonic Sensor Ageing for Intelligent Street Pole Lamp Control in a Smart City. 1-8 - Esmaeil Amiri

, Ning Wang, Serdar Vural, Rahim Tafazolli
:
Dynamic Anchor Point Selection in Software Defined Distributed Mobility Management. 1-7 - Michaël Mahamat

, Ghada Jaber, Abdelmadjid Bouabdallah:
A Deep Reinforcement Learning-Based Context-Aware Wireless Mobile Charging Scheme for the Internet of Things. 1-6 - Shareeful Islam, Spyridon Papastergiou, Stefano Silvestri

:
Cyber Threat Analysis Using Natural Language Processing for a Secure Healthcare System. 1-7 - Wei Gao, Meihong Yang, Wei Zhang, Libin Liu:

Efficient OFDM Channel Estimation with RRDBNet. 1-5 - Eduardo Nuno Almeida

, Rui Campos
, Manuel Ricardo
:
Traffic-Aware UAV Placement using a Generalizable Deep Reinforcement Learning Methodology. 1-6 - Chen Chen

, Lars Nagel
, Lin Cui, Fung Po Tso:
B-Scale: Bottleneck-aware VNF Scaling and Flow Routing in Edge Clouds. 1-6 - Armando Ruggeri, Antonino Galletta, Lorenzo Carnevale, Massimo Villari:

An Energy Efficiency Analysis of the Blockchain-Based extended Triple Diffie-Hellman Protocol for IoT. 1-6 - Farhad Arpanaei, Shayan Hajipour

, Hamzeh Beyranvand, José Alberto Hernández
, David Larrabeiti:
A Comparative Study on Shared Precomputed Restoration and Shared Backup Path Protection in EONs. 1-6 - Claudia Ferraris, Giuseppe Pettiti, Gianluca Amprimo

, Debora Desideri
, Roberto Pratola
, Katiuscia Sacco
, Irene Ronga, Guido Coppo, Danilo Soprani, Jacopo Barbagallo, Santina Antinoro, Paolo Ariano, Luigi Privitera:
Telerehabilitation of cognitive, motor and sleep disorders in neurological pathologies: the REHOME project. 1-6 - Zhao Li, Shijun Zhang, Jiangyi Yin, Meijie Du, Zhongyi Zhang, Qingyun Liu:

Fighting Against Piracy: An Approach to Detect Pirated Video Websites Enhanced by Third-party Services. 1-7 - Weiwei Hu, Bo Gu

, Jinming Li, Zhen Qin:
BC-MCSDT: A Blockchain-based Trusted Mobile Crowdsensing Data Trading Framework. 1-7 - Islam Ahmed Moursy, Sahar Mohamed Ghanem, Mohamed Nazih ElDerini:

A Blockchain-Based Architecture for Access Control Management of IoT Applications. 1-6 - Rúben Queirós, Eduardo Nuno Almeida

, Helder Fontes
, José Ruela, Rui Campos
:
Wi-Fi Rate Adaptation using a Simple Deep Reinforcement Learning Approach. 1-3 - Edward L. Amoruso

, Stephen P. Johnson, Raghu Nandan Avula, Cliff C. Zou:
A Web Infrastructure for Certifying Multimedia News Content for Fake News Defense. 1-7 - Peter Sossalla, Justus Rischke, Fabian Baier, Sebastian Itting, Giang T. Nguyen

, Frank H. P. Fitzek
:
Private 5G Solutions for Mobile Industrial Robots: A Feasibility Study. 1-6 - Mohamed Irfanulla Mohamed Abdulla, Audrey Queudet, Maryline Chetto

, Lamia Belouaer:
Real-time Resource Management in Smart Energy-Harvesting Systems. 1-7 - Tianyu Meng, Dali Zhu, Xiaodong Xie, Hualin Zeng:

Non-Contact Heart Rate Signal Extraction and Identification Based on Speckle Image. 1-6 - Huajun Cui, Guozhu Meng, Yueqi Li, Yuejun Li, Yan Zhang, Jiyan Sun, Dali Zhu, Weiping Wang

:
LibHunter: An Unsupervised Approach for Third-party Library Detection without Prior Knowledge. 1-7 - Siyu Yuan

, Bin Han
, Dennis Krummacker, Hans D. Schotten:
Massive Twinning to Enhance Emergent Intelligence. 1-4 - Francesco Martella, Maria Fazio, Antonio Celesti, Valeria Lukaj, Antonino Quattrocchi, Massimo Di Gangi, Massimo Villari:

Federated Edge for Tracking Mobile Targets on Video Surveillance Streams in Smart Cities. 1-6 - Luigi De Dominicis, Spyridion Kolovos, Kakia Panagidi

, Ralph Hedel, Ilias Mitsoulas, Karim Boudergui, Argiro Boziari, Stathes Hadjiefthymiades:
The INCLUDING platform for Radiological and Nuclear exercises and training: the Joint Action at the Piraeus port. 1-6 - Isaac Briggs, Vincent Ivy, David Berdik, Fadi Wedyan, Yaser Jararweh:

Modeling and Simulation of 5G-based Edge Networks for Lightweight Machine Learning Applications. 1-6 - Evangelos A. Stathopoulos

, Alexander V. Shvets
, Roberto Carlini, Sotiris Diplaris, Stefanos Vrochidis, Leo Wanner, Ioannis Kompatsiaris:
Social Media and Web Sensing on Interior and Urban Design. 1-6 - Zhiwei Wei

, Bing Li, Rongqing Zhang, Xiang Cheng, Liuqing Yang:
OCVC: An Overlapping-Enabled Cooperative Computing Protocol in Vehicular Fog Computing. 1-6 - Christos Liaskos, Georgios G. Pyrialakos

, Alexandros Pitilakis, Ageliki Tsioliaridou, Michail Christodoulou, Nikolaos V. Kantartzis, Sotiris Ioannidis, Andreas Pitsillides, Ian F. Akyildiz:
Integrating Software-Defined Metasurfaces into Wireless Communication Systems: Design and Prototype Evaluation. 1-6 - Argyro Mavrogiorgou, Spyridon Kleftakis, Nikolaos Zafeiropoulos, Konstantinos Mavrogiorgos, Athanasios Kiourtis, Dimosthenis Kyriazis:

A Comparative Study of ML Algorithms for Scenario-agnostic Predictions in Healthcare. 1-7 - Elham Arshad, Giuliano Turri, Bruno Crispo:

Mollywood: Subtitles as an attack vector. 1-7 - Lijun Dong, Richard Li

:
Precise Latency Guarantee with Mobility and Handover in 5G and Beyond. 1-7 - Marios Adam Sirgiannis, Charalampos Manifavas, Ioannis Papaefstathiou:

Making Citizens' systems more Secure: Practical Encryption Bypassing and Countermeasures. 1-7 - Juan Vargas, Cédric Thienot, Xavier Lagrange:

MBSFN and SC-PTM as Solutions to Reduce Energy Consumption in Cellular Networks. 1-6 - Yichuan Li, Mohammed El-Hajjar:

Intelligent Analog Radio Over Fiber aided C-RAN for Mitigating Nonlinearity and Improving Robustness. 1-6 - Wei Huang

, Andrea Araldo, Hind Castel-Taleb, Badii Jouaber:
Dimensioning resources of Network Slices for energy-performance trade-off. 1-6 - Diogo Machado, Vítor Santos Costa

, Pedro Brandão
:
Impact of the glycaemic sampling method in diabetes data mining. 1-6 - Hind Boukhairat, Mohammed-Amine Koulali:

Deep-Learning for Cooperative Spectrum Sensing Optimization in Cognitive Internet of Things. 1-7 - Jiaqi Kang, Huiran Yang, Yan Zhang, Yueyue Dai, Mengqi Zhan, Weiping Wang

:
ActDetector: A Sequence-based Framework for Network Attack Activity Detection. 1-7 - Robert Zakrzewski, Trevor Martin, George Oikonomou

:
Anomaly Detection in Logical Sub-Views of WSNs. 1-7 - Isadora P. Possebon, Bruno Castro da Silva, Alberto E. Schaeffer-Filho:

Look-Ahead Reinforcement Learning for Load Balancing Network Traffic. 1-6 - Lorenzo De Lauretis

, Fabio Persia
, Stefania Costantini:
A Smart Ecosystem to improve Patient Monitoring using Wearables, Intelligent Agents, Complex Event Processing and Image Processing. 1-7 - Gizem Sümen, Burak Ahmet Çelebi, Günes Karabulut-Kurt, Ali Görçin, Semiha Tedik Basaran:

Multi-Channel Learning with Preprocessing for Automatic Modulation Order Separation. 1-5 - Jinlong Xu, Dong Wei, Weiqing Huang:

Specific Emitter Identification via Spatial Characteristic of Polarization Fingerprint. 1-7 - Yujie Yao, Hao Zhou, Melike Erol-Kantarci:

Deep Reinforcement Learning-based Radio Resource Allocation and Beam Management under Location Uncertainty in 5G mm Wave Networks. 1-6 - Konstantinos Oikonomou:

A Spectrum Analysis Approach for the Median Problem in Modern Network Environments. 1-6 - Yaqiang Zhang, Rengang Li, Yaqian Zhao, Ruyang Li

:
Deep Reinforcement Learning based Mobility-Aware Service Migration for Multi-access Edge Computing Environment. 1-6 - Ester Zumpano, Pasquale Iaquinta, Luciano Caroprese

, Giuseppe Lucio Cascini, Francesco Dattola, Ivana Pellegrino, Miriam Iusi, Pierangelo Veltri, Eugenio Vocaturo:
Poster SIMPATICO 3D. 1-3 - Ana M. B. C. Quevedo, Carlos H. O. O. Quevedo, Rafael L. Gomes

, Samuel F. Camara, Joaquim Celestino Jr.:
A Reputation and Security Mechanism for Heterogeneous Vehicular Networks. 1-6 - Sarantis Kalafatidis

, Vassilis Demiroglou
, Sotiris Skaperas, Georgios Tsoulouhas, Polychronis Valsamas, Lefteris Mamatas, Vassilis Tsaoussidis
:
Experiments with SDN-based Adaptable Non-IP Protocol Stacks in Smart-City Environments. 1-3 - Francesco Witz, Baptiste Buchi

, Hakim Mabed, Frédéric Lassabe, Jaafar Gaber, Wahabou Abdou
:
Deep Learning for the selection of the best modular robots self-reconfiguration algorithm. 1-6 - Shamisa Kaspour, Abdulsalam Yassine:

A Federated Learning Model With Short Sequence To Point Mechanism For Smart Home Energy Disaggregation. 1-6 - Yaqiang Zhang, Ruyang Li

, Yaqian Zhao, Rengang Li, Xuelei Li, Tuo Li:
Online Decentralized Task Allocation Optimization for Edge Collaborative Networks. 1-6 - Stelios Andreadis, Nick Pantelidis, Ilias Gialampoukidis, Stefanos Vrochidis, Ioannis Kompatsiaris:

Water quality issues: Can we detect a creeping crisis with social media data? 1-6 - G. Dimopoulos, G. Megas, Evangelos Papapetrou, Christos Liaskos:

Ant Colony Optimization for Programmable Wireless Environments: Enabling Model and Initial Results. 1-6 - Guozhi Lin, Jingguo Ge, Yulei Wu, Hui Li, Liangxiong Li:

Digital Twin Networks: Learning Dynamic Network Behaviors from Network Flows. 1-6 - Jaime Galán-Jiménez, Alejandro González Vegas, Javier Berrocal:

Reduction of latency of microservice based loT applications in rural areas with lack of connectivity using UAV-based networks. 1-6 - Yan Wang

, Qianqian Ren:
Dynamic Graph Convolutional Network for Long Short-term Traffic Flow Prediction. 1-6 - Hao Wang, Hui Kang, Geng Sun, Jiahui Li, Jingwu Xiao, Ning Lit:

Position Errors Analysis, Prediction and Recovery for UAV-enabled Virtual Antenna Array. 1-6 - Hang Shen, Yilong Heng, Ning Shi, Tianjing Wang, Guangwei Bai:

Drone-Small-Cell-Assisted Spectrum Management for 5G and Beyond Vehicular Networks. 1-8 - Siyuan Leng, Yingke Xie, Yifan Zhang, Yunchuan Guo, Liang Fang, Fenghua Li:

DICOF: A Distributed and Collaborative Framework for Hybrid DDoS Attack Detection. 1-7 - Nicholas Lurski, Andrew Monica, Brooke Peterson, Stergios Papadakis:

Rapid Identification and Characterization of Laser Injected Clock Faults through OBIC Mapping. 1-6 - Leandro M. Dallanora, Ariel Góes de Castro, Roberto Irajá Tavares da Costa Filho, Fábio D. Rossi

, Arthur Francisco Lorenzon, Marcelo Caggiani Luizelli:
DyPro: Dynamic Probing Planning for In-Band Network Telemetry. 1-6 - Joanna Georgiou, Moysis Symeonides, Michalis Kasioulis, Demetris Trihinas, George Pallis, Marios D. Dikaiakos:

BenchPilot: Repeatable & Reproducible Benchmarking for Edge Micro-DCs. 1-6 - Geng Sun, Xiaoya Zheng, Yuying Lian, Jiahui Li, Fang Mei:

Reliable UAV Communication via Collaborative Beamforming: A Multi-objective Optimization Approach. 1-7 - Rui Mao, Heming Ji, Xiaoyu Wang:

Dynamic Authentication Mechanism Research and Security Protocol Design of HIOT. 1-8 - Gengbiao Yue, Yumei Wang, Yu Liu:

Rule Placement and Switch Migration-based Scheme for Controller Load Balancing in SDN. 1-6 - Nithish Velagala, Leandros Maglaras

, Nick Ayres, Sotiris Moschoyiannis
, Leandros Tassiulas:
Enhancing Privacy of Online Chat Apps Utilising Secure Node End-to-End Encryption (SNE2EE). 1-3 - Shangyuan Zhuang, Jiyan Sun, Hangsheng Zhang, Xiaohui Kuang, Ling Pang, Haitao Liu, Yinlong Liu:

StinAttack: A Lightweight and Effective Adversarial Attack Simulation to Ensemble IDSs for Satellite- Terrestrial Integrated Network. 1-8 - Lucas M. A. de Souza, Célio Albuquerque, Fernanda G. O. Passos, Diego G. Passos:

Convergence-Time Analysis for the HTE Link Quality Estimator. 1-7 - Taimoor Ul Islam

, Fahd Ahmed Khan:
Sorted Channel Based User Search for Initial Access in 5G and Beyond Cellular Networks. 1-6 - Rui Jesus, Yubraj Gupta

, Luís Bastião Silva, Carlos Costa
:
Vendor Neutral Cloud Platform for 4D Digital Pathology. 1-6 - Alaa A. Algamal, Ahmed H. Abd El-Malek

, Hossam M. H. Shalaby:
Reliable Free-Space Optical Communication System Performance for Matching Multi-level Customer Needs: Using Hybrid Modulation System with Deep Reinforcement Learning. 1-7 - Marlon Cordeiro Domenech, André Ricardo Abed Grégio, Luis Carlos Erpen De Bona:

On Metadata Privacy in Instant Messaging. 1-7 - Jianhua Wang

, Xiaolin Chang, Ricardo J. Rodríguez, Yixiang Wang:
Assessing Anonymous and Selfish Free-rider Attacks in Federated Learning. 1-6 - Benedetta Bolis, Lorenzo Fratini, Mirko Salaris, Marco D. Santambrogio:

GRETA: erGonomic stREss Tracking pAd. 1-6 - Muhammad Salman Haleem

, Leandro Pecchia:
A Deep Learning Based ECG Segmentation Tool for Detection of ECG Beat Parameters. 1-4 - Marco Furini, Emilia Flisi:

Opinion Leaders and Twitter: Metric Proposal and Psycholinguistic Analysis. 1-5 - Sulyman Age Abdulkareem, Chuan Heng Foh, François Carrez, Klaus Moessner:

SMOTE-Stack for Network Intrusion Detection in an IoT Environment. 1-6 - Yuemei Wu, Dong Wei, Jing Li, Weiqing Huang, Xiang Meng:

Physical Layer Authentication Based on Full Channel Information under Dual-polarized Antenna Communication Systems. 1-7 - Matteo Mendula

, Armir Bujari, Luca Foschini, Paolo Bellavista
:
A Data-Driven Digital Twin for Urban Activity Monitoring. 1-6 - Yichao Wu

, Chenglong Li, Jiahai Yang, Zhiliang Wang, Wei Hu, Ang Xia, Yong Jiang, Yao Wang, Liuli Wu:
WebIoT: Classifying Internet of Things Devices at Internet Scale through Web Characteristics. 1-7 - Md. Akbar Hossain

, Sayan Kumar Ray
, Geri Harris, Shakil Ahmed
:
An Emergency Response System to Support Early Stage Dementia Patients. 1-4 - Philipp Zißner

, Paulo H. L. Rettore
, Bruno P. Santos, Roberto Rigolin Ferreira Lopes
, Peter Sevenich:
Road Traffic Density Estimation Based on Heterogeneous Data Fusion. 1-6 - Ivanoe De Falco, Antonio Della Cioppa, Tomas Koutny, Umberto Scafuri

, Ernesto Tarantino, Martin Ubl
:
An Evolution-based Machine Learning Approach for Inducing Glucose Prediction Models. 1-6 - Xiaoyan Liu, Zhiwei Xu, Yana Qin, Jie Tian:

A Discrete-event-based Simulator for Distributed Deep Learning. 1-7 - Claudia Ferraris, Gianluca Amprimo

, Giuseppe Pettiti, Giulia Masi
, Lorenzo Priano
:
Automatic Detector of Gait Alterations using RGB-D sensor and supervised classifiers: a preliminary study. 1-6 - Ruizhong Du, Yuan Wang, Ziyuan Wang:

Real-time Audit Scheme Based on Multilevel Roles in a Medical Cloud Environment. 1-7 - Mohammad Mahzoun, Liliya Kraleva

, Raluca Posteuca, Tomer Ashur
:
Differential Cryptanalysis of K-Cipher. 1-7 - Giulia Guarino, Ivan Bernabucci

, Daniele Bibbo
, Marta Caviglia
, Amara J. Ambai
, Giovanni Putoto
, Luca Ragazzoni
, Francesca Tognon
, Matthew Jusu Vandy
, Francesco Barone-Adesi
, Maurizio Schmid
:
A Data-Based System for the Optimization of Emergency Medical Services Allocation in Rural Countries. 1-4 - Mingzhu Qiang, Changyan Yi, Juan Li

, Kun Zhu, Jun Cai:
Joint Task Offloading and VM Placement for Edge Computing with Time-Sequential IIoT Applications. 1-6 - Linda Senigagliesi, Manola Ricciuti, Gianluca Ciattaglia, Ennio Gambi:

Physiological Parameters Extraction by Accelerometric Signal Analysis During Sleep. 1-4 - Bin Han

, Hans D. Schotten:
Multi-Sensory HMI for Human-Centric Industrial Digital Twins: A 6G Vision of Future Industry. 1-7 - Tibério Baptista, Rui Jesus, Luís Bastião Silva, Carlos Costa

:
Scalable Digital Pathology Platform Over Standard Cloud Native Technologies. 1-6 - Jorge F. Schmidt

, Udo Schilcher, Siddhartha S. Borkotoky, Christian A. Schmidt:
Energy Consumption in LoRa IoT: Benefits of Adding Relays to Dense Networks. 1-6 - Guangjun Wu, Bingqing Zhu, Jun Li:

BMKS: A Blockchain Based Multi-Keyword Search Scheme for Medical Data Sharing. 1-7 - Ioanna Angeliki Kapetanidou

, Stavros Malagaris, Vassilis Tsaoussidis
:
Avoiding Notorious Content Sources: A Content-Poisoning Attack Mitigation Approach. 1-6 - Hongyue Kang, Wei Li, Jelena V. Misic, Vojislav B. Misic, Xiaolin Chang:

Dual-UAV Aided Secure Dynamic G2U Communication. 1-6 - Antonio Celesti, Maria Fazio, Lorenzo Carnevale, Massimo Villari:

A NLP-based Approach to Improve Speech Recognition Services for People with Speech Disorders. 1-6 - Eray Güven, Günes Karabulut-Kurt:

CNN-aided Channel and Carrier Frequency Offset Estimation for HAPS-LEO Links. 1-6 - Donghui Ding, Bo Long, Feng Zhuo, Zhongcheng Li, Hanwen Zhang, Chen Tian, Yi Sun:

Lilac: Parallelizing Atomic Cross-Chain Swaps. 1-8 - Mahdi Sharara, Sahar Hoteit, Véronique Vèque, Francesca Bassi

:
Minimizing Power Consumption by Joint Radio and Computing Resource Allocation in Cloud-Ran. 1-6 - Dimitris Koutras, Christos Grigoriadis, Michalis Papadopoullos, Panayiotis Kotzanikolaou, Christos Douligeris:

Automating environmental vulnerability analysis for network services. 1-7 - Adrien Gougeon, François Lemercier, Anne Blavette, Anne-Cécile Orgerie:

Modeling the End-to-End Energy Consumption of a Nation-Wide Smart Metering Infrastructure. 1-7 - Valeria Lukaj, Francesco Martella, Antonio Celesti, Maria Fazio, Massimo Villari:

An Enriched Visualization Tool based on Google Maps for Water Distribution Networks in Smart Cities. 1-6 - Arpad Müller, Wisam Abbasi

, Andrea Saracino:
Demo: Usage Control using Controlled Privacy Aware Face Recognition. 1-3 - Hao-Kai Hong, Fan-Hsun Tseng

:
Ring-based Intelligent Reflecting Surface Placement for 5G and Beyond. 1-6 - Antonio Lioy, Ignazio Pedone, Silvia Sisinni:

(POSTER) Using MACsec to protect a Network Functions Virtualisation infrastructure. 1-3 - Ryu Kazama, Hirotake Abe, Chunghan Lee

:
Evaluating TCP Throughput Predictability from Packet Traces using Recurrent Neural Network. 1-6 - Panagiotis C. Kokkinos:

Towards the Realization of Converged Cloud, Edge and Networking Infrastructures in Smart MegaCities. 1-5 - Giovanni Delnevo

, Arber Kazazi, Elio Amadori, Silvia Mirri
:
Social Sensing for Monuments Recognition using Convolutional Neural Networks: A Case Study. 1-6 - Md Tahmid Hossain, Robson E. De Grande:

Adaptive Q-leaming-supported Resource Allocation Model in Vehicular Fogs. 1-6 - Nan Xiang, Xuebin Ma:

TKDA: An Improved Method for K-degree Anonymity in Social Graphs. 1-6 - Eftychia Lakka, George Hatzivasilis

, Stylianos Karagiannis
, Andreas Alexopoulos, Manos Athanatos, Sotiris Ioannidis, Manolis Chatzimpyrros, Grigoris Kalogiannis, George Spanoudakis:
Incident Handling for Healthcare Organizations and Supply-Chains. 1-7 - Edward W. Chandler:

Expanded Excel-Based Simulator Tool for Resource-Allocation Optimization for Distributed Network Protocols. 1-6 - Alessio Catalfamo, Antonio Celesti, Maria Fazio, Giovanni Randazzo, Massimo Villari:

A Platform for Federated Learning on the Edge: a Video Analysis Use Case. 1-7 - Maria Diamanti

, Nikolaos Fryganiotis, Symeon Papavassiliou, Christos Pelekis, Eirini-Eleni Tsiropoulou:
On the Minimum Collisions Assignment Problem in Interdependent Networked Systems. 1-6 - Jorge Baranda, Luca Vettori, Josep Mangues-Bafalluy, Ricardo Martinez

, Engin Zeydan:
Demo: Automated Multi-Site E2E Orchestration of Hybrid Network Services Mixing PNF, VNF and CNFs. 1-3 - Thomas Dimakis, Malamati D. Louta

, Thomas Kyriakides, Alexandros-Apostolos A. Boulogeorgos, Konstantina Banti, Ioanna Karampelia, Nikos Papadimitriou:
GreenLoRaWAN: An energy efficient and resilient LoRaWAN communication protocol. 1-7 - Sayed Amir Hoseini

, Parastoo Sadeghi, Faycal Bouhafs, Neda Aboutorab, Frank T. H. den Hartog:
Network-Controlled Physical-Layer Security: Enhancing Secrecy through Friendly Jamming. 1-7 - Yukun Zhou, Dezun Dong, Zhengbin Pang, Junhong Ye, Feng Jin:

Fast-Converging Congestion Control in Datacenter Networks. 1-7 - Zijun Cheng, Degang Sun, Leiqi Wang, Qiujian Lv, Yan Wang:

MMSP: A LSTM Based Framework for Multi-Step Attack Prediction in Mixed Scenarios. 1-6 - Christos Tselikis, Christos Douligeris, Sarandis Mitropoulos, Leandros Maglaras

:
Re-configuration from the Edge: alternative Software Models for time-sensitive IoT Applications. 1-3 - Bruno Chianca Ferreira, Guillaume Dufour

, Guthemberg Silvestre:
A Lightweight Fluid Model for Mobile Ad hoc Distributed Systems. 1-7 - Matias R. P. dos Santos

, Marcel K. R. Mei, Antonio C. Oliveira, Ricardo de A. L. Rabelo, Gustavo B. Figueiredo:
A New Soccer Game Optimization Modeling For Flexible Functional Splitting Dimensioning in CF-RAN Networks. 1-6 - Guojian Luo, Jianfeng Qu

, Lina Zhang, Xiaoyu Fang
, Yi Zhang, Tong Zhou:
Spatial-based Bayesian Hidden Markov Models with Dirichlet Mixtures for Video Anomaly Detection. 1-6 - Binal Tejani, Robson E. De Grande:

Fair Connectivity-Oriented Allocation for Combined Resources in VCC Networks. 1-6 - Pengcheng Liu, Zhen Han, Zhixin Shi, Meimei Li, Meichen Liu:

Frequency Hopping Signal Recognition Based on Horizontal Spatial Attention. 1-8 - Giampaolo Bovenzi

, Francesco Cerasuolo
, Antonio Montieri
, Alfredo Nascita, Valerio Persico, Antonio Pescapè:
A Comparison of Machine and Deep Learning Models for Detection and Classification of Android Malware Traffic. 1-6 - Lucas N. Silva, Paulo H. L. Rettore

, Vinícius F. S. Mota, Bruno P. Santos:
MobVis: A Framework for Analysis and Visualization of Mobility Traces. 1-6 - Kevin Hoarau, Pierre-Ugo Tournoux, Tahiry Razafindralambo

:
BGNN: Detection of BGP Anomalies Using Graph Neural Networks. 1-6 - Iakovos Pittaras, Nikos Fotiou, Christos Karapapas, Vasilios A. Siris, George C. Polyzos:

Secure, Mass Web of Things Actuation Using Smart Contracts-Based Digital Twins. 1-6 - Junjun Si, Zejiang Chen, Bo Tu, Shuaifu Dai, Xiangqun Chen:

City-Scale Fingerprint Positioning Framework based on MDT Data. 1-6 - Duc V. Nguyen

, Le Ngan, Lai Huyen Thuong, Truong Thu Huong:
LL-VAS: Adaptation Method for Low-Latency 360-degree Video Streaming over Mobile Networks. 1-6 - Jorge Baranda, Josep Mangues-Bafalluy, Luca Vettori, Ricardo Martínez

, Engin Zeydan:
Enabling the SLA Management of Federated Network Services through Scaling Operations. 1-6 - Margarida Silva, André Mourato, Gonçalo Marques, Susana Sargento, André Reis:

A Platform for Autonomous Swarms of UAVs. 1-6 - Aneesh Bhattacharya, Risav Rana, Venkanna Udutalapally, Debanjan Das:

CoviFL: Edge-Assisted Federated Learning for Remote COVID-19 Detection in an AIoMT Framework. 1-6 - Clemens-Konrad Mueller, Steffen Steiner

, Volker Kuehn:
Information Bottleneck Optimization of a Finite Bit Resolution Fast Fourier Transform. 1-6 - Yuanhong Zhang, Zhiwen Wang, Junquan Liu, Haipeng Du, Qinghua Zheng, Weizhan Zhang:

Deep Reinforcement Learning Based Adaptive 360-degree Video Streaming with Field of View Joint Prediction. 1-8 - Marisangila Alves, Guilherme Piêgas Koslovski:

Joint Cache Placement and Request Routing Optimization in Heterogeneous Cellular Networks. 1-6 - Mitsuhiro Umizaki

, Tomohiro Morikawa, Akira Fujita, Takeshi Takahashi, Tsung-Nan Lin, Daisuke Inoue:
Understanding the Characteristics of Public Blocklist Providers. 1-7 - Fuyi Wang, Leo Yu Zhang, Lei Pan, Shengshan Hu, Robin Doss:

Towards Privacy-Preserving Neural Architecture Search. 1-6 - Parya Haji Mirzaee, Mohammad Shojafar, Haitham S. Cruickshank, Rahim Tafazolli

:
CHFL: A Collaborative Hierarchical Federated Intrusion Detection System for Vehicular Networks. 1-7 - Yintan Ai, Hua Li, Xianrong Wang, Jiafeng Wang, Yaru Ding:

The Design and Specification of Path Adjustable SFC Using YANG Data Model. 1-6 - Shuang Liang, Zhiyi Fang, Geng Sun, Jiahui Li:

Reducing Hovering and Motion Energy Consumptions for UAV-enabled Collaborative Beamforming. 1-7 - Ziwen An, Yanheng Liu, Geng Sun, Hongyang Pan, Aimin Wang:

UAV-enabled Wireless Powered Communication Networks: A Joint Scheduling and Trajectory Optimization Approach. 1-7 - Rui Mao, Heming Ji, Di Cheng, Xiaoyu Wang, Yan Wang, Degang Sun:

Implicit Continuous Authentication Model Based on Mobile Terminal Touch Behavior. 1-7 - Marco Avvenuti, Marco Bongiovanni, Luca Ciampi

, Fabrizio Falchi
, Claudio Gennaro, Nicola Messina:
A Spatio- Temporal Attentive Network for Video-Based Crowd Counting. 1-6 - Farzad Veisi, Julien Montavont, Fabrice Theoleyre

:
SDN-TSCH: Enabling Software Defined Networking for Scheduled Wireless Networks with Traffic Isolation. 1-7 - Moysis Symeonides, Demetris Trihinas, Joanna Georgiou, Michalis Kasioulis, George Pallis, Marios D. Dikaiakos, Theodoros Toliopoulos

, Anna-Valentini Michailidou
, Anastasios Gounaris:
Demo: The RAINBOW Analytics Stack for the Fog Continuum. 1-3 - Xiaohui Chen

, Ying Tong, Chunlai Du, Yongji Liu, Zhenquan Ding, Qingyun Ran, Yi Zhang, Lei Cui, Zhiyu Hao:
MalPro: Learning on Process-Aware Behaviors for Malware Detection. 1-7 - Ruonan Li, Aimin Wang, Geng Sun, Jiahui Li, Xiaoya Zheng:

Bi-objective Optimization for Collaborative UAV Secure Communication under Forest Channel. 1-7 - Carmela Comito

:
Sensing Social Media to Forecast COVID-19 Cases. 1-6 - Adrià Mallorquí, Agustín Zaballos

, Daniel Serra:
The Antarctic Delay Tolerant Network. 1-7 - Jing Li, Shunliang Zhang, Mengyan Xing, Zhuang Qiao, Xiaohui Zhang:

Mobile Device Identification Based on Two-dimensional Representation of RF Fingerprint with Deep Learning. 1-6 - Sowmya Rasipuram, Junaid Hamid Bhat, Anutosh Maitra, Bishal Shaw, Sriparna Saha:

Multimodal Depression Detection Using Task-oriented Transformer-based Embedding. 1-4 - Yi Qin, Jiahe Wu, Futai Zou, Yue Wu:

Breaking Tor's Anonymity by Modifying Cell's Command. 1-7 - Harshit Srivastava, Ravi Sankar:

Cooperation Model for Optimized Classification on Social Data. 1-5 - Andrea De Salve

, Andrea Lisi, Paolo Mori, Laura Ricci:
Selective Disclosure in Self-Sovereign Identity based on Hashed Values. 1-8 - Hua Wu, Chaoqun Cui, Guang Cheng, Xiaoyan Hu:

PSCM: Towards Practical Encrypted Unknown Protocol Classification. 1-6 - Homin Kang, Soon-Ju Kang:

Sensor Fusion and Device Collaboration based Smart Plug Hub Architecture for Precise Identification of ADL in Real-Time. 1-7 - Mnassar Alyami, Mohammed Alkhowaiter

, Mansour Al Ghanim, Cliff C. Zou, Yan Solihin:
MAC-Layer Traffic Shaping Defense Against WiFi Device Fingerprinting Attacks. 1-7 - Giuseppe Aceto, Ciro Guida

, Antonio Montieri
, Valerio Persico, Antonio Pescapè:
A First Look at Accurate Network Traffic Generation in Virtual Environments. 1-6 - Foivos Allayiotis, Christos Bouras, Vasileios Kokkinos

:
A Machine Learning Mechanism for Improved Energy Consumption in 5G Small Cells. 1-6 - Antonio Caruso

, Stefano Chessa
, Soledad Escolar
, Fernando Rincón, Juan C. López:
Task Scheduling Stabilization for Solar Energy Harvesting Internet of Things Devices. 1-6 - Wassila Lalouani, Mohamed F. Younis:

A Federated Learning Framework for Resource Constrained Fog Networks. 1-6

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














