


default search action
ISCC 2023: Gammarth, Tunisia
- IEEE Symposium on Computers and Communications, ISCC 2023, Gammarth, Tunisia, July 9-12, 2023. IEEE 2023, ISBN 979-8-3503-0048-2

- Juan Li, Vikram Pandey, Rasha Hendawi:

A Blockchain-Based Personal Health Knowledge Graph for Secure Integrated Health Data Management. 1-7 - Aymen Mudheher Badr, Lamia Chaari Fourati, Samiha Ayed:

An Improved GIFT Lightweight Encryption Algorithm to Protect Medical Data In IoT. 1-7 - Roberto Marino

, Lorenzo Carnevale, Massimo Villari:
When Robotics Meets Distributed Learning: the Federated Learning Robotic Network Framework. 1-6 - Ammar Kouki:

(POSTER) Advanced LTCC-Integrated Technologies for mmWave 5G/Satellite Communication Antennas. 1-2 - Zhong Cao, Yuchun Guo, Yishuai Chen, Daoqin Lin:

Bayesian-Based Symptom Screening for Medical Dialogue Diagnosis. 1-6 - Achraf Othman, Ahmed Elsheikh, Amnah Mohammed Al-Mutawaa:

Internet of Things (IoT) for Elderly's Healthcare and Wellbeing: Applications, Prospects and Challenges. 1-8 - Christian Sicari, Alessio Catalfamo, Lorenzo Carnevale, Antonino Galletta, Daniel Balouek-Thomert, Manish Parashar, Massimo Villari:

TEMA: Event Driven Serverless Workflows Platform for Natural Disaster Management. 1-6 - Amal Jlassi, Khaoula ElBedoui, Walid Barhoumi

:
Glioma Tumor's Detection and Classification Using Joint YOLOv7 and Active Contour Model. 1-5 - Ibraheem M. Alkhawaldeh

, Ghada Awad Altarawneh, Mohammad Al-Jafari, Mahmoud S. Abdelgalil
, Ahmad S. Tarawneh, Ahmad B. A. Hassanat:
A Machine Learning Approach for Predicting Lung Metastases and Three-Month Prognostic Factors in Hepatocellular Carcinoma Patients Using SEER Data. 1-5 - Shaon Bhatta Shuvo, Swastik Bagga, Ziad Kobti:

COVID-19 Analysis in Canada using Deep Learning and Multi-Factor Data-Driven Approach with a Novel Dataset. 1-4 - George Chatzisofroniou, Chris Markellos, Panayiotis Kotzanikolaou:

Assessing the Security Risks of Medical Mobile Applications. 1-7 - Farshideh Kordi, Christian Barnard, Paul Fortier

, Amine Miled:
Poster: Conceptual Design for FPGA Based Artifical Intelligence Model for HIL Applications. 1-3 - Flavio Bertini

, Daniela Beltrami, Pegah Barakati, Laura Calzà, Enrico Ghidoni, Danilo Montesi
:
A Web-Based Application for Screening Alzheimer's Disease in the Preclinical Phase. 1-6 - Annamaria Ficara

, Maria Fazio
, Antonino Galletta
, Antonio Celesti
, Massimo Villari
:
Large-Scale Agent-Based Transport Model for the Metropolitan City of Messina. 1-6 - Bharat Paudyal, Chris Creed

, Sherelle Knowles, Hilton Mutariswa, Ian Williams:
An IoT-Based Solution for Monitoring Young People with Emotional Behavioral Disorders in a Residential Childcare Setting. 1-6 - Nasim Mahmud Nayan

, Ashraful Islam, Muhammad Usama Islam
, Eshtiak Ahmed, Mohammad Mobarak Hossain
, Md. Zahangir Alam:
SMOTE Oversampling and Near Miss Undersampling Based Diabetes Diagnosis from Imbalanced Dataset with XAI Visualization. 1-6 - Ashraful Islam, Beenish Moalla Chaudhry, Aminul Islam:

Designing Healthcare Relational Agents: A Conceptual Framework with User-Centered Design Guidelines. 1-4 - Aida Eduard

, Dnislam Urazayev, Yermakhan Magzym
, Dimitrios Zorbas:
Demo: Implementation of a Train-Arrival Notification System. 1-3 - Sergio Laso, Lorenzo Tore-Gálvez, Javier Berrocal, Carlos Canal, Juan Manuel Murillo:

Deploying Digital Twins Over the Cloud-to-Thing Continuum. 1-6 - Maissa Elleuch, Sofiène Tahar:

Formal Analysis of an IoT-Based Healthcare Application. 1-5 - Mouna Dhmiri, Yassine Manai, Tahar Ezzedine:

2-D Numerical Modeling of Fluid-Structure Interaction Analysis and Absorption Study of the Red Blood Cell Inside the Capillary. 1-6 - Alisa Kawade, Wataru Chujo, Kentaro Kobayashi:

Spatial 4PPM Correlation with Successive Interference Cancellation for Low-Luminance WDM/SDM Screen to Camera Uplink. 1-7 - Ahmad B. A. Hassanat, Ghada Awad Altarawneh, Ibraheem M. Alkhawaldeh, Yasmeen Jamal Alabdallat

, Amir F. Atiya, Ahmad Abujaber, Ahmad S. Tarawneh:
The Jeopardy of Learning from Over-Sampled Class-Imbalanced Medical Datasets. 1-7 - Cheolhwan Lee, Ho-Min Kang, Yeong Jun Jeon, Soon Ju Kang:

Ambient Sound Analysis for Non-Invasive Indoor Activity Detection in Edge Computing Environments. 1-6 - Alessandro Pacini

, Francesca Pennucci, Giorgio Leonarduzzi, Andrea Sgambelluri, Luca Valcarenghi, Molka Gharbaoui, Piero Castoldi, Gianluca Paparatto, Erica De Vita
, Alberto Arcuri
, Claudio Passino, Stefano Dalmiani
, Michele Emdin, Sabina Nuti:
E-Health in Tuscany Inner Areas: The PROXIMITY-CARE Approach. 1-7 - Gabriele Morabito

, Valeria Lukaj, Armando Ruggeri, Maria Fazio, Maria Annunziata Astone, Massimo Villari:
Docflow: Supervised Multi-Method Document Anonymization Engine. 1-6 - Sofia Montebugnoli

, Luca Foschini:
A Multicloud Observability Support Based on ElasticSearch for Cloud-native Smart Cities Services. 1-6 - Ioannis Panopoulos, Sokratis Nikolaidis, Stylianos I. Venieris, Iakovos S. Venieris:

Exploring the Performance and Efficiency of Transformer Models for NLP on Mobile Devices. 1-4 - Aimé Cedric Muhoza

, Emmanuel Bergeret, Corinne Brdys, Francis Gary:
Low-Mobility Complementary Tool for Patient Follow-Up: A Proof of Concept for E-Health. 1-4 - Davide Montagno Bozzone, Stefano Chessa

, Michele Girolami, Federica Paganelli:
A VNF-Chaining Approach for Enhancing Ground Network with UAVs in a Crowd-Based Environment. 1-6 - Takumi Ishida, Chedlia Ben Naila

, Hiraku Okada, Masaaki Katayama:
Performance of Intelligent Reflecting Surface Based-FSO Link Under Strong Turbulence and Spatial Jitter. 1-5 - Laura Rodrigues Soares, Jéferson Campos Nobre, Gabriel Kerschner:

Design of a Blockchain-Based Secure Storage Architecture for Resource-Constrained Healthcare. 1-6 - Linda Senigagliesi, Antonio Nocera

, Matteo Angelini, Davide De Grazia, Gianluca Ciattaglia, Fabiola Olivieri, Maria Rita Rippo, Ennio Gambi:
A Deep Learning Approach to Remotely Monitor People's Frailty Status. 1-4 - Long Chen, Yanqing Song, Jianguo Chen:

A Framework for Few-Shot Network Threats Based on Generative Adversarial Networks. 1-6 - Sarra Jebri

, Arij Ben Amor, Mohamed Abid, Ammar Bouallegue:
Light Automatic Authentication of Data Transmission in 6G/IoT Healthcare System. 1-4 - Jinxing Zheng, Takaya Yamazato

, Katsuhiro Naito:
A Testbed to Integrate Private 5G Networks with Visible Light Communication for Service Area Expansion. 1-5 - Nourin Ahmed, Namarta Vij, Ziad Kobti:

Comparative Study of LBP and HOG Feature Extraction Techniques for COVID-19 Pneumonia Classification. 1-6 - Claudio Pascarelli, Chiara Colucci, Gianvito Mitrano, Angelo Corallo:

Business Models in Digital Health: Bibliometric Analysis and Systematic Literature Review. 1-4 - Jorik De Bruycker, Frédéric B. Leloup

, Nobby Stevens:
Wavelength Selection Considerations for Optical Wireless Positioning Systems. 1-6 - Damos Ayobo Abongo, Mohamed Gaha, Safa Cherif, Wael Jaafar

, Guillaume Houle, Christian Buteau:
A Novel Framework for Distribution Power Lines Detection. 1-4 - Luis Jesús Martín León, Juan Luis Herrera

, Javier Berrocal, Jaime Galán-Jiménez:
EFCC: a flexible Emulation Framework to evaluate network, computing and application deployments in the Cloud Continuum. 1-6 - Wordh Ul Hasan, Juan Li, Shadi Alian, Tianyi Liang, Vikram Pandey, Kimia Tuz Zaman, Jun Kong, Cui Tao:

Honoring Heritage, Managing Health: A Mobile Diabetes Self-Management App for Native Americans with Cultural Sensitivity and Local Factors. 1-6 - Sricharan Donkada, Seyedamin Pouriyeh

, Reza M. Parizi, Chloe Yixin Xie, Hossain Shahriar:
Early Heart Disease Detection Using Mel-Spectrograms and Deep Learning. 1-6 - Yanfei Hu, Shuai Li, Shuailou Li, Boyang Zhang, Yu Wen:

DAMUS: Adaptively Updating Hardware Performance Counter Based Malware Detector Under System Resource Competition. 1-7 - Savvas Hadjixenophontos, Anna Maria Mandalari, Yuchen Zhao, Hamed Haddadi:

PRISM: Privacy Preserving Healthcare Internet of Things Security Management. 1-5 - Soumaya Nheri:

Human Face Detection Improvement using Subclass Learning and Low Variance Directions. 1-5 - Inabat Akanova, Dnislam Urazayev, Yerassyl Kadirzhanov, Dimitrios Zorbas:

Demo: a LoRaWAN Emulator Testbed. 1-3 - Kimia Tuz Zaman, Wordh Ul Hasan, Juan Li, Cui Tao:

Empowering Caregivers of Alzheimer's Disease and Related Dementias (ADRD) with a GPT-Powered Voice Assistant: Leveraging Peer Insights from Social Media. 1-7 - Vineela Nalla, Seyedamin Pouriyeh

, Reza M. Parizi, InChan Hwang, Beatrice Brown-Mulry, Linglin Zhang, Minjae Woo
:
Influence of Convolutional Neural Network Depth on the Efficacy of Automated Breast Cancer Screening Systems. 1-4 - Amel Chehbani

, Stephanie Sahuguede
, Anne Julien-Vergonjanne
:
Neonate Heart Rate Variability Monitoring Using Optical Wireless Link. 1-6 - Christos Milarokostas, Katerina Giannopoulou, Ioannis Fotis, Dimitris Tsolkas, Nikos I. Passas, Lazaros F. Merakos:

Poster: Link-level Performance Analysis of a LoRa System. 1-3 - Mudhafar Nuaimi, Lamia Chaari Fourati, Bassem Ben Hamed:

A Scalable Intrusion Detection Approach for Industrial Internet of Things Based on Federated Learning and Attention Mechanism. 1-4 - Sayna Rotbei

, Luigi Napolitano, Stefania Zinno
, Paolo Verze
, Alessio Botta:
Predicting Patient Sexual Function After Prostate Surgery Using Machine Learning. 1-6 - Rania Alhalaseh, Dhuha Ali Ghani AL-Mashhadany, Mohammad Abbadi:

The Effect of Feature Selection on Diabetes Prediction Using Machine Learning. 1-7 - Zhansaya Bagdauletkyzy, Madiyar Galymgereyev, Assel Abzalova, Abylay Kairatbek, Dimitrios Zorbas:

Poster: A Simulator for Time-Slotted LoRa Networks. 1-3 - Maqsood Ahmad, Francesco Bergadano, Valerio Costamagna, Bruno Crispo, Giovanni Russello:

AppBox: A Black-Box Application Sandboxing Technique for Mobile App Management Solutions. 1-7 - Davide Ciraolo

, Antonio Celesti, Maria Fazio, Mirjam Bonanno, Massimo Villari, Rocco Salvatore Calabrò:
Emotional Artificial Intelligence Enabled Facial Expression Recognition for Tele-Rehabilitation: A Preliminary Study. 1-6 - Vinicius Ferreira, João Bastos, André Martins, Paulo Araújo, Nicolás F. Lori, João Faria

, António Costa
, Helena Fernández-López
:
NETEDGE MEP: A CNF-based Multi-access Edge Computing Platform. 1-6 - Antonio Celesti, Maria Fazio, Armando Ruggeri, Fabrizio Celesti

, Massimo Villari, Mirjam Bonanno, Rocco Salvatore Calabrò:
Adopting Machine Learning-Based Pose Estimation as Digital Biomarker in Motor Tele-Rehabilitation. 1-4 - Sotirios Batsakis

, Emmanuel Papadakis
, Ilias Tachmazidis
, Tianhua Chen
, Grigoris Antoniou
, Marios Adamou
:
Neuro Intel: A System for Clinical Diagnosis of Attention Deficit Hyperactivity Disorder (ADHD) Using Artificial Intelligence. 1-6 - Khalid Alghatani, Abdelmounaam Rezgui, Nariman Ammar:

Predicting Out-of-Hospital Vital Sign Measurements through Deep Learning. 1-4 - Ilyes Mrad, Emna Baccour, Ridha Hamila, Muhammad Asif Khan

, Aiman Erbad, Mounir Hamdi:
RL-CEALS: Reinforcement Learning for Collaborative Edge Assisted Live Streaming. 193-199 - Wissem Abbes

, Hamdi Kchaou
, Zied Kechaou, Adel M. Alimi
:
A Hybrid Algorithm for Service Bursting Based on GA and BPSO in Hybrid Clouds. 200-205 - Zunera Umar, Michela Meo

:
Performance Improvements Through Recommendations for a PLC Network with Collaborative Caching in Remote Areas. 206-212 - Stefania Zinno

, Antonia Affinito, Nicola Pasquino, Giorgio Ventre, Alessio Botta:
Prediction of RTT Through Radio-Layer Parameters in 4G/5G Dual-Connectivity Mobile Networks. 213-218 - Davide Borsatti, Walter Cerroni, Luca Foschini, Genady Ya. Grabarnik, Filippo Poltronieri

, Domenico Scotece, Larisa Shwartz, Cesare Stefanelli, Mauro Tortonesi
, Mattia Zaccarini
:
Modeling Digital Twins of Kubernetes-Based Applications. 219-224 - Marilson Duarte Soares, Diego G. Passos

, Pedro V. Gonzalez Castellanos:
A Cognitive Module for Secondary Radios Operating at the 2.5 GHz LTE Band on Indoor Environments. 225-231 - Samar Bouazizi, Emna Benmohamed

, Hela Ltifi:
A Novel Approach of ESN Reservoir Structure Learning for Improved Predictive Performance. 232-237 - Etienne LE Louet, Antoine Blin, Julien Sopena, Ahmed Amamou, Kamel Haddadou:

Effects of secured DNS transport on resolver performance. 238-244 - David Carmo, Luísa Gonçalves, Ana Dias

, Nuno Pombo
:
Improved Flaky Test Detection with Black-Box Approach and Test Smells. 245-251 - Ying Wan, Haoyu Song, Tian Pan, Bin Liu, Yu Jia, Ling Qian:

Multi-Stage Flow Table Caching: From Theory to Algorithm. 252-258 - Somnath Mazumdar, Thomas Dreibholz:

Proactive Resource Orchestration Framework for Cloud/Fog Platform. 259-265 - Xuebo Sun, Hui Wang, Sheng Pan, Tongfei Liu:

Online Bargaining Scheme Based Dynamic Resource Allocation for Soft-Deadline Tasks in Edge Computing. 266-271 - Yukai Hou, Zhiwei Wei, Shiyang Liu, Bing Li, Rongqing Zhang, Xiang Cheng, Liuqing Yang:

Cross-Regional Task Offloading with Multi-Agent Reinforcement Learning for Hierarchical Vehicular Fog Computing. 272-277 - Wenjuan Xing:

A URL-based Computing Power Scheduling Method and System. 278-283 - Bruno José Olivieri de Souza, Thiago Lamenza, Marcelo Paulon

, Victor Bastos Rodrigues
, Vítor Couvêa Andrezo Carneiro, Markus Endler:
Collecting Sensor Data from WSNs on the Ground by UAVs: Assessing Mismatches from Real-World Experiments and Their Corresponding Simulations. 284-290 - Xiang Wu, Bohao Li, Boyang Zhang, Xiaofan Liu

, Wei Ren, Kim-Kwang Raymond Choo:
Attack Analysis on Two-party Signature and Threshold Signature Based on Dilithium. 291-297 - Huijie Huangfu, Ziyuan Yang, Maosong Ran, Weihua Zhang, Jingfeng Lu, Yi Zhang:

A Robust Prototype-Free Retrieval Method for Automatic Check-Out. 298-303 - Xuechang Zhao, Qing Yu, Yifan Wang:

Streaming Session Recommendation Based on User's Global Attributes. 304-309 - Xuehan Zhang, Zhongxu Bao, Yuqing Yin, Xu Yang, Xiao Xu, Qiang Niu:

Finding Potential Pneumoconiosis Patients with Commercial Acoustic Device. 310-315 - Xinyu Yuan

, Yan Qiao, Pei Zhao, Rongyao Hu, Benchu Zhang:
Traffic Matrix Estimation based on Denoising Diffusion Probabilistic Model. 316-322 - Jingshun Du, Chaokun Zhang, Shen He, Wenyu Qu:

Learning-Based Congestion Control Assisted by Recurrent Neural Networks for Real-Time Communication. 323-328 - Hongrui Nie, Shaosheng Li, Yong Liu:

TAMCQF: Hybrid Traffic Scheduling Mechanism Integrating TAS and Multi-CQF in TSN. 329-334 - Jiashuo Yu, Long Huang

, Longlong Zhu, Dong Zhang, Chunming Wu:
DTRadar: Accelerating Search Process of Decision Trees in Packet Classification. 335-341 - Hang Lin, Weiwei Lin, Jing Lin, Longlong Zhu, Dong Zhang, Chunming Wu:

P4CTM: Compressed Traffic Pattern Matching Based on Programmable Data Plane. 342-347 - Guanglei Chen, Jiangping Han, Xiwen Jie, Peilin Hong, Kaiping Xue

:
FACC: Flow-Size-Aware Congestion Control in Data Center Networks. 348-353 - Xiwen Jie, Hang Wang, Runzhou Li, Guanglei Chen, Peilin Hong:

F2-HPCC: Achieve Faster Convergence and Better Fairness for HPCC. 354-359 - Luciano Zembruzki

, Arthur Selle Jacobs, Lisandro Zambenedetti Granville
, Ricardo José Pfitscher
:
Examining the Centralization of Email Industry: A Landscape Analysis for IPv4 and IPv6. 360-366 - Ioannis-Aris Kostis

, Dimitris Sarafis
, Konstantinos Karamitsios, Magda Tsolaki, Anthoula Tsolaki:
An E-Commerce Conversational Virtual Assistant in Service of Mild Cognitive Impairment Patients. 367-372 - Ningning Cui, Liwei Chen, Gang Shi:

BVSNO: Binary Code Vulnerability Detection Based on Slice Semantic and Node Order. 373-379 - Xiaotian Yin, Chao Zhang, Wei Wang:

A Discriminative Multi-task Learning for Autism Classification Based on Speech Signals. 386-391 - Anuj Jain

, Sartaj Sahni:
Optimal Walks in Contact Sequence Temporal Graphs with No Zero Duration Cycle. 392-398 - Yuanchen Gao, Guosheng Xu, Guoai Xu:

WELID: A Weighted Ensemble Learning Method for Network Intrusion Detection. 399-404 - Pedro Moreira

, António Ribeiro, João Marco C. Silva
:
AGE: Automatic Performance Evaluation of API Gateways. 405-410 - Sokratis Nikolaidis, Stylianos I. Venieris, Iakovos S. Venieris:

MultiTASC: A Multi-Tenancy-Aware Scheduler for Cascaded DNN Inference at the Consumer Edge. 411-416 - Chih-Kai Huang

, Guillaume Pierre
:
AdapPF: Self-Adaptive Scrape Interval for Monitoring in Geo-Distributed Cluster Federations. 417-423 - Hamdi Kchaou

, Wissem Abbes
, Zied Kechaou, Adel M. Alimi
:
Collaborative Fuzzy Clustering Approach for Scientific Cloud Workflows. 424-429 - Valeria Lukaj, Alessio Catalfamo, Francesco Martella, Maria Fazio, Massimo Villari, Antonio Celesti:

A NoSQL DBMS Transparent Data Encryption Approach for Cloud/Edge Continuum. 430-435 - Vlastimil Kosar

, Lukas Sismis
, Jirí Matousek, Jan Korenek:
Accelerating IDS Using TLS Pre-Filter in FPGA. 436-442 - Vytautas Tumas, Sean Rivera, Damien Magoni, Radu State:

Federated Byzantine Agreement Protocol Robustness to Targeted Network Attacks. 443-449 - Tsuyoshi Hasegawa, Akira Sakurai, Kazuyuki Shudo:

Quick Notification of Block Generation Using Bloom Filter in a Blockchain. 457-463 - Dimitris Koutras

, Panos Dimitrellos, Panayiotis Kotzanikolaou
, Christos Douligeris
:
Automated WiFi Incident Detection Attack Tool on 802.11 Networks. 464-469 - Amine Rguez, Yassine Hadjadj-Aoul, Farah Slim, Gerardo Rubino, Asma Selmi:

A GRASP-Based Algorithm for Virtual Network Embedding. 470-473 - Sandeep Gupta

, Bruno Crispo:
Device Behavioral Profiling for Autonomous Protection Using Deep Neural Networks. 474-478 - Sarah Hussein Toman

, Lazhar Hamel
, Mohamed Graiet:
Refinement and Verification for IoT Service Composition. 483-486 - Mamadou Bagayogo, Soumaya Hamouda, Rim Barrak:

Path Loss Modeling at 26 GHz in Indoor and Outdoor Tunisian Environments for B5G/6G wireless networks. 487-490 - Taiki Kato, Shinichi Yamagiwa, Koichi Marumo:

Performance Enhancement of Stream-Based Decompression Process by Notifying Compression Buffer Size. 491-494 - Chaima Ben Rabah, Gouenou Coatrieux, Riadh Abdelfattah:

A Hybrid 2D-1D CNN for Scanner Device Linking Based on Scanning Noise. 495-498 - João Soares, Miguel Luís

, Susana Sargento
:
Mobile LoRa Gateway for Communication and Sensing on the Railway. 499-502 - Tolga Karadas, Kübra Kalkan:

IBAM: IPFS and Blockchain based Authentication for MQTT protocol in IoT. 537-542 - Hamouma Moumen

, Badreddine Benreguia, Leila Saadi, Ahcène Bounceur:
Locating the Diffusion Source in Networks by Critical Observers. 543-548 - Rim Ben Fekih, Mariam Lahami, Mohamed Jmaiel, Salma Bradai:

Formal Modeling and Verification of ERC Smart Contracts: Application to NFT. 556-561 - Emna BenSaid, Mohamed Neji

, Adel M. Alimi
:
Natural Face Anonymization via Latent Space Layers Swapping. 562-567 - Zhimin Tang, Duohe Ma, Xiaoyan Sun

, Kai Chen, Liming Wang, Junye Jiang:
Every Time Can Be Different: A Data Dynamic Protection Method Based on Moving Target Defense. 568-574 - Wang Li, Xin Chen, Libo Jiao, Yijie Wang:

Deep Reinforcement Learning-Based Intelligent Task Offloading and Dynamic Resource Allocation in 6G Smart City. 575-581 - Shakil Ahmed, Ahmed E. Kamal:

Sky's the Limit: Navigating 6G with ASTAR-RIS for UAVs Optimal Path Planning. 582-587 - Xiaodong Yan, Gongbo Zhou, Ping Zhou, Wei Wang, Lianfeng Han

, Zhenzhi He:
A Transmission Power Distribution Method Based on Lyapunov for Scraper Chain Tension Monitoring Network. 588-593 - Yalin Zhang, Hui Gao, Bei Liu, Xin Su, Xibin Xu:

Intelligent and Stable Resource Allocation for Delay-Sensitive MEC in 6G Networks. 594-599 - Hou-Yeh Tao, Chih-Kai Huang

, Shan-Hsiang Shen:
A Low-overhead Network Monitoring for SDN-Based Edge Computing. 600-606 - Mayssa Trabelsi, Nadjib Mohamed Mehdi Bendaoud, Samir Ben Ahmed:

Multi-objective Optimization for Dynamic Service Placement Strategy for Real-Time Applications in Fog Infrastructure. 607-612 - Zhilei Zhu, Wanli Dong

, Xiaoming Gao, Anjie Peng:
DepthWise Attention: Towards Individual Channels Attention. 613-618 - Hongyan Peng, Tongtong Wu, Zhenkui Shi, Xianxian Li:

FedEF: Federated Learning for Heterogeneous and Class Imbalance Data. 619-624 - Tao Niu, Yinglei Teng, Panpan Zou, Yiding Liu:

Cluster, Reconstruct and Prune: Equivalent Filter Pruning for CNNs without Fine-Tuning. 625-630 - Yunfei Wang, Hao Wang, Xiaozhen Lu, Lu Zhou, Liang Liu:

Detecting Ethereum Phishing Scams with Temporal Motif Features of Subgraph. 631-636 - Yuxuan Deng, Xiuhua Li, Chuan Sun, Jinlong Hao, Xiaofei Wang, Victor C. M. Leung:

Deep Reinforcement Learning for Joint Service Placement and Request Scheduling in Mobile Edge Computing Networks. 637-642 - Liangsi Ma, Bei Liu, Xin Su, Xibin Xu:

A Model-Driven Quasi-ResNet Belief Propagation Neural Network Decoder for LDPC Codes. 643-648 - Aymen Omri, Javier Hernandez Fernandez

, Roberto Di Pietro
:
Subcarrier-Index Modulation for OFDM-based PLC Systems. 649-655 - Chengwan Zhang, Congcong Miao, Changqing An

, Anlun Hong, Ning Wang
, Zhiquan Wang, Jilong Wang:
Metis: Detecting Fake AS-PATHs Based on Link Prediction. 656-662 - Hamouma Moumen

, Badreddine Benreguia, Ahcène Bounceur, Leila Saadi:
Limiting the Spread of Fake News on Social Networks by Users as Witnesses. 663-668 - Shahzeb Javed

, Dimitrios Zorbas:
Downlink Traffic Demand-Based Gateway Activation in LoRaWAN. 669-674 - Sirine Marrakchi, Heni Kaaniche:

Solving Band Diagonally Dominant Linear Systems Using Gaussian Elimination: Shared-Memory Parallel Programming with OpenMP. 675-680 - Ahcene Boumhand

, Kamal Deep Singh, Yassine Hadjadj-Aoul, Matthieu Liewig, César Viho:
Network Traffic Classification for Detecting Multi-Activity Situations. 681-687 - Mohamed Zaytoon, Marwan Torki:

The Effect of Non-Reference Point Cloud Quality Assessment (NR-PCQA) Loss on 3D Scene Reconstruction from a Single Image. 721-726 - Jihene Tmamna, Emna Ben Ayed, Rahma Fourati, Mounir Ben Ayed:

An Automatic Vision Transformer Pruning Method Based on Binary Particle Swarm Optimization. 727-732 - Joël Roman Ky

, Philippe Graff
, Bertrand Mathieu, Thibault Cholez
:
A Hybrid P4/NFV Architecture for Cloud Gaming Traffic Detection with Unsupervised ML. 733-738 - Mariem Abbes, Zied Kechaou, Adel M. Alimi

:
Deep learning approach for Tunisian hate Speech detection on Facebook. 739-744 - Siwar Ben Gamra, Ezzeddine Zagrouba

, André Bigand:
An eXplainable Artificial Intelligence Method for Deep Learning-Based Face Detection in Paintings. 745-751 - Hikmat Khan, Nidhal C. Bouaynaya, Ghulam Rasool:

The Importance of Robust Features in Mitigating Catastrophic Forgetting. 752-757 - Diana Gratiela Berbecaru

, Stefano Giannuzzi, Daniele Canavese
:
Autoencoder-SAD: An Autoencoder-based Model for Security Attacks Detection. 758-763 - Eva Papadogiannaki, Sotiris Ioannidis:

Pump Up the JARM: Studying the Evolution of Botnets Using Active TLS Fingerprinting. 764-770 - Diana Gratiela Berbecaru

, Lorenzo Pintaldi:
Exploiting Emercoin Blockchain and Trusted Computing for IoT Scenarios: A Practical Approach. 771-776 - Javier Hernandez Fernandez

, Aymen Omri, Roberto Di Pietro
:
Performance Analysis of Physical Layer Security in Power Line Communication Networks. 777-782 - Mahdi Fotouhi

, Alessio Buscemi
, Florian Jomrich, Christian Köbel, Thomas Engel:
Evaluation of PTP Security Controls on gPTP. 783-789 - Ming Wang, Yahui Li, Han Zhang, Anlun Hong, Jun He, Jilong Wang:

Knocking Cells: Latency-Based Identification of IPv6 Cellular Addresses on the Internet. 790-796 - Qi Tang, Ruijie Hang, Gang Xu, Gaofeng Zhang, Shuai Li, Baoqi Huang:

Seed Node Selection Algorithm Based on Node Influence in Opportunistic Offloading. 797-803 - Xiaojun Wu, Yaya Lu, Zhenghan Tang, Daolong Wu, Haitao Xiao, Zhongzheng Sun:

Communication Interference Recognition Based on Improved Deep Residual Shrinkage Network. 804-809 - Jinlong E, Chaokun Zhang:

SCON: A Secure Cooperative Framework Against Gossip Dissemination in Opportunistic Network. 810-815 - Zhixin Shi, Hao Wu, Jing Zhang, Meng Zhang, Weiqing Huang:

FindSpy: A Wireless Camera Detection System Based on Pre-Trained Transformers. 816-822 - Nassim Labdaoui, Fabienne Nouvel, Stephanie Dutertre:

Energy-efficient IoT Communications: A Comparative Study of Long-Term Evolution for Machines (LTE-M) and Narrowband Internet of Things (NB-IoT) Technologies. 823-830 - Xuehan Zhang, Zhongxu Bao, Yuqing Yin, Xu Yang, Xiao Xu, Qiang Niu:

LoFall: LoRa-Based Long-Range Through-Wall Fall Detection. 831-836 - Zhen Meng, Yiming Shi, Yumeng Liang, Xinzhe Wen, Anfu Zhou, Huadong Ma, Hairong Qian:

Physical Layer Identity Information Protection against Malicious Millimeter Wave Sensing. 837-843 - Fei Liang, Siye Wang, Ziwen Cao, Yue Feng, Shang Jiang, Yanfang Zhang:

BPCluster: An Anomaly Detection Algorithm for RFID Trajectory Based on Probability. 844-850 - Dozohoua Silue, Mondher Labidi, Fethi Choubani:

Antenna For Early Detection Of Skin Sarcoma By Resonant Frequency Shift. 851-856 - Yunting Tao, Fanyu Kong

, Yuliang Shi, Jia Yu, Hanlin Zhang, Huiyi Liu:
Efficient Privacy-Preserving Multi-Functional Data Aggregation Scheme for Multi-Tier IoT System. 857-863 - Kalyan Nakka

, Habib M. Ammari:
Square tessellation for stochastic connected k- coverage in planar wireless sensor networks. 864-867 - Intidhar Bedhief

, Meriem Kassar, Taoufik Aguili, Rania Boughanmi, Oumaima Nijaoui:
Auto-Scalable Software Defined Networking Control Plane for Internet of Things. 868-871 - Robert Williamson

, Jesús Martínez del Rincón
, Anastasios Koidis, Carlos Reaño
:
RGB-2-Hyper-Spectral Image Reconstruction for Food Science Using Encoder/Decoder Neural Architectures. 872-875 - Ahlem Aboud, Nizar Rokbani, Adel M. Alimi

:
A Beta Multi-Objective Whale Optimization Algorithm. 876-879 - João Soares, Miguel Luís

, Duarte M. G. Raposo
, Pedro Rito
, Susana Sargento
:
Backhaul Assessment in Dual Band WiFi Mesh. 880-883 - Syrine Kallel, Rahma Fourati:

Data Analysis of Electromyostimulation Training Effect on Muscles and Sports Performance. 884-888 - Wiam Rabhi, Fatima El Jaimi, Walid Amara

, Zakaria Charouh
, Amal Ezzouhri, Hafssa Benaboud, Moudathirou Ben Saindou, Fatima Ouardi:
An Integrated Framework for Bird Recognition Using Dynamic Machine Learning-Based Classification. 889-892 - Ali El Kamel

:
A GNN-Based Rate Limiting Framework for DDoS Attack Mitigation in Multi-Controller SDN. 893-896 - Sirine Ghenjeti, Rim Barrak, Soumaya Hamouda:

High Gain and Compact Microstrip Patch Antenna Array Design for 26 GHz Broadband Wireless Systems. 932-937 - Badreddine Yacine Yacheur

, Toufik Ahmed
, Mohamed Mosbah
:
Throughput Enhancement in Hybrid Vehicular Networks Using Deep Reinforcement Learning. 938-943 - Evelyne Akopyan, Riadh Dhaou, Emmanuel Lochin, Bernard Pontet, Jacques Sombrin

:
On the Network Characterization of Nano-Satellite Swarms. 944-949 - Bruno Ribeiro, Alexandre J. T. Santos

, Maria João Nicolau
:
Evaluation of a Collision Prediction System for VRUs Using V2X and Machine Learning: Intersection Collision Avoidance for Motorcycles. 950-955 - Aida Eduard

, Dnislam Urazayev, Aruzhan Sabyrbek
, Yermakhan Magzym
, Dimitrios Zorbas:
Infrastructure-Less Long-Range Train-Arrival Notification System. 956-962 - José Oliveira, Duarte M. G. Raposo

, Susana Sargento:
Edge-Based IPFS for Content Distribution of City Services. 963-969 - Huozhu Wang, Ziyuan Zhu, Dan Meng:

Which2learn: A Vulnerability Dataset Complexity Measurement Method for Data-Driven Detectors. 970-976 - Feifei Xu, Guangzhen Li:

Multiple Information Extraction and Interaction for Emotion Recognition in Multi-Party Conversation. 977-982 - Wu Wenjiao, Rongzuo Guo, Fan Xiangkui:

UAV-Assisted Mobile Edge Computing Task Offloading Strategy for Minimizing Terminal Energy Consumption. 983-988 - Yige Li, Han Yang:

Lightweight Video Frame Interpolation Based on Bidirectional Attention Module. 989-994 - Tong Wang

, Xiaohui Kuang, Hu Li, Qianjin Du, Zhanhao Hu, Huan Deng, Gang Zhao:
Driving into Danger: Adversarial Patch Attack on End-to-End Autonomous Driving Systems Using Deep Learning. 995-1000 - Zhizhen Xiang, Yingying Xu, Zhenzhou Tang:

How Does Oversampling Affect the Performance of Classification Algorithms? 1001-1006 - Wenjie Yu, Boyang Zhou:

Using Long-Short-Term Memory to Effectively Identify Persistent Routes Under Stealthy Link Flooding Attacks in Software-Defined Networks. 1007-1012 - Ruizhong Du, Na Liu, Mingyue Li, Junfeng Tian:

RVDSE: Efficient Result Verifiable Searchable Encryption in Redactable Blockchain. 1013-1019 - Yanfei Hu, Shuailou Li, Boyang Zhang, Xu Cheng, Yu Wen:

HUND: Enhancing Hardware Performance Counter Based Malware Detection Under System Resource Competition Using Explanation Method. 1020-1026 - Xu Wang, Jianguo Jiang, Yan Wang, Qiujian Lv, Leiqi Wang:

UAG: User Action Graph Based on System Logs for Insider Threat Detection. 1027-1032 - Xiang Ying, Chenxi Liu, Dengcheng Hu:

GCFL: Blockchain-based Efficient Federated Learning for Heterogeneous Devices. 1033-1038 - Yuhai Lu, Xiaolin Wang, Fangfang Yuan

, Cong Cao
, Xiaoliang Zhang, Yanbing Liu
:
RegexClassifier: A GNN-Based Recognition Method for State-Explosive Regular Expressions. 1039-1045 - Imene Ouali, Rahma Fourati, Mohamed Ben Halima, Ali Wali:

A Novel Method for Arabic Text Detection with Interactive Visualization. 1046-1050 - Hajer Grira, Ikbal Chammakhi Msadaa

, Khaled Grayaa:
Enhancing Fingerprinting Indoor Positioning Systems Through Hierarchical Clustering and GAN-Based CNN. 1054-1057 - Zeina Awada, Kinda Khawam, Samer Lahoud, Melhem El Helou:

A Stackelberg Game for Multi-Tenant RAN Slicing in 5G Networks. 1058-1061 - Houssam Benaboud, Walid Amara, Amal Ezzouhri, Fatima El Jaimi, Wiam Rabhi, Zakaria Charouh

:
Aggregating Multiple Embeddings: A Novel Approach to Enhance Reliability and Reduce Complexity in Facial Recognition. 1062-1065 - Amine Khelifi, Mahmut Gemici, Giuseppina Carannante, Charles Cliff Johnson, Nidhal C. Bouaynaya:

A Deep Learning Approach For Airport Runway Detection and Localization From Satellite Imagery. 1066-1069 - Roger Sanchez Vital

, Carles Gomez, Eduard Garcia Villegas:
Energy-efficient Wireless Mesh Networks with IEEE 802.11ba: A New Architecture. 1070-1074 - Sabri Khamari, Rachedi Abdennour, Toufik Ahmed, Mohamed Mosbah:

Adaptive Deep Reinforcement Learning Approach for Service Migration in MEC-Enabled Vehicular Networks. 1075-1079 - Mohamed Hedi Fourati, Soumaya Marzouk, Mohamed Jmaiel:

Towards Microservices-Aware Autoscaling: A Review. 1080-1083 - Akira Sakurai, Kazuyuki Shudo:

Accelerating Block Propagation with Sender Switchover in a Blockchain. 1086-1089 - Ali El Kamel

:
A Fast Failure Recovery Mechanism using On-Premise/Cloud-based NAS in SDN. 1090-1093 - Mihia Kassi, Soumaya Hamouda:

Large-Scale Virtual BBU Pool Implementation: the First Step Towards a Realistic RAN Virtualization. 1094-1097 - Kaouther Gasmi, Kamel Abassi, Lamia Romdhani, Olivier Debauche

:
Reinforcement Learning-Based Approach for Microservices-Based Application Placement in Edge Environment. 1098-1103 - Sara Kassan, Imed Hadj-Kacem, Sana Ben Jemaa, Sylvain Allio:

Robustness Analysis of Hybrid Machine Learning Model for Anomaly Forecasting in Radio Access Networks. 1104-1109 - Shamisa Kaspour, Abdulsalam Yassine:

Variational Auto-Encoder Model and Federated Approach for Non-Intrusive Load Monitoring in Smart Homes. 1110-1115 - Lorenzo Epifani, Vincenzo D'Avino, Antonio Caruso

:
TEBAKA: Territorial Basic Knowledge Acquisition. An Agritech Project for Italy: Results on Self-Supervised Semantic Segmentation. 1116-1121 - Luke Puppo, Weng-Keen Wong, Bechir Hamdaoui, Abdurrahman Elmaghbub:

HiNoVa: A Novel Open-Set Detection Method for Automating RF Device Authentication. 1122-1128 - Qingqing Cai, Gang Sun

, Hongfang Yu, Long Luo:
High Throughput Routing Path Selection for Payment Channel Network. 1129-1134 - Jiang Shao, Xinyi Li, Minglin Li, Sen Liu, Yang Xu:

S-PFC: Enabling Semi-Lossless RDMA Network with Selective Response to PFC. 1135-1141 - Qiankun Liu, Xing Li:

6Former: Transformer-Based IPv6 Address Generation. 1142-1148 - Yuqi Qiu

, Baiyang Li
, Zhiqian Li, Liang Jiao, Yujia Zhu, Qingyun Liu:
Before Toasters Rise Up: A View into the Emerging DoH Resolver's Deployment Risk. 1149-1155 - Renjie Jiang, Tong Zhang, Changyan Yi:

Effective Coflow Scheduling in Hybrid Circuit and Packet Switching Networks. 1156-1161 - Andrea De Salve

, Damiano Di Francesco Maesa, Fabio Federico, Paolo Mori, Laura Ricci:
AlgoID: A Blockchain Reliant Self-Sovereign Identity Framework on Algorand. 1162-1168 - Junjun Si, Yang Xiang, Jin Yang, Li Li, Bo Tu, Xiangqun Chen, Rongqing Zhang:

A Dual Self-supervised Deep Trajectory Clustering Method. 1169-1172 - Junhong Guo

, Peiran Wu, Lingyun Xiao:
An Assistant Diagnosis System for Parkinson Disease Based on Mutual Information and Genetic Algorithm. 1173-1176 - Yun Su

:
Semi-supervised Multivariate Time Series Classification by Subsample Correlation Prediction. 1177-1180 - Reem Nassar, Imad H. Elhajj, Ayman I. Kayssi, Samer Salam:

Feature Relevance in NAT Detection Using Explainable AI. 1181-1184 - Haokai Jing, Tong Zhang:

Improving Traffic Scheduling Based on Per-flow Virtual Queues in Time-Sensitive Networking. 1185-1188 - Shuting Long, Bei Liu, Hui Gao, Xin Su, Xibin Xu:

Deep Reinforcement Learning-Based SFC Deployment Scheme for 6G IoT Scenario. 1189-1192 - Hanze Chen, Feng Xiao, Lingfei Cheng, Longlong Zhu, Dong Zhang:

A Network Function Virtualization Resource Allocation Model Based on Heterogeneous Computing. 1193-1196 - Ahlem Arfaoui, Maha Cherif, Ridha Bouallegue

:
End-to-End Deep Learning assisted by Reconfigurable Intelligent Surface for uplink MU massive MIMO under PA Non-Linearities. 1203-1206 - Aozhuo Sun, Bingyu Li, Qiongxiao Wang, Huiqing Wan

, Jingqiang Lin, Wei Wang:
Semi-CT: Certificates Transparent to Identity Owners but Opaque to Snoopers. 1207-1213 - Hao Sun, Yongji Liu, Zhenquan Ding, Yang Xiao, Zhiyu Hao, Hongsong Zhu:

An Enhanced Vulnerability Detection in Software Using a Heterogeneous Encoding Ensemble. 1214-1220 - Song Peng, Yang Liu, Jingwen Chen, Jinlong He, Yaoqi Wang:

Komorebi: A DAG-based Asynchronous BFT Consensus via Sharding. 1221-1227 - Junfeng Tian, Caishi Jing, Jin Tian:

CuckChain: A Cuckoo Rule Based Secure, High Incentive and Low Latency Blockchain System via Sharding. 1228-1234 - Yulun Wu, Zhujun Zhang, Dali Zhu, Wei Fan:

Dynamic PBFT with Active Removal. 1235-1241 - Qiaozhi Feng, Yamei Xia, Wenbin Yao, Tianbo Lu

, Xiaoyan Zhang:
Malicious Relay Detection for Tor Network Using Hybrid Multi-Scale CNN-LSTM with Attention. 1242-1247 - Yifei Cheng, Yujia Zhu, Rui Qin, Jiang Xie, Yitong Cai:

DRDoSHunter: A Novel Approach Based on FDA and Inter-flow Features for DRDoS Detection. 1248-1254 - Xiang Li

, Beibei Feng, Tianning Zang, Xiaolin Xu, Shuyuan Zhao, Jingrun Ma:
Facing Unknown: Open-World Encrypted Traffic Classification Based on Contrastive Pre-Training. 1255-1260 - Zhiye Wang, Baisong Liu

, Chennan Lin, Xueyuan Zhang, Ce Hu, Jiangcheng Qin, Linze Luo:
Revisiting Data Poisoning Attacks on Deep Learning Based Recommender Systems. 1261-1267 - Zhiyong Chen, Junyu Lai, Junhong Zhu, Wanyi Ma, Lianqiang Gan, Tian Xia:

Spatiotemporal-Enhanced Recurrent Neural Network for Network Traffic Prediction. 1268-1273 - Weiqing Huang, Yangyang Zong, Zhixin Shi, Puzhuo Liu:

MESCAL: Malicious Login Detection Based on Heterogeneous Graph Embedding with Supervised Contrastive Learning. 1274-1279 - Rui Yu, Fei Xiao, Zhiliang Wang, Jiahai Yang, Dongqi Han

, Zhihua Wang, Minghui Jin, Chenglong Li, Enhuan Dong, Shutao Xia:
Anomaly Detection in Heterogeneous Time Series Data for Server-Monitoring Tasks. 1280-1286 - Parisa Rahimi, Myasar R. Tabany, Seyedali Pourmoafi:

A Novel Low Power and High Speed 9- Transistors Dynamic Full-Adder Cell Simulation and Design. 1287-1292 - Guillaume Gaillard, Congduc Pham:

CANL LoRa: Collision Avoidance by Neighbor Listening for Dense LoRa Networks. 1293-1298 - Sarah Hussein Toman

, Aida Lahouij, Lazhar Hamel
, Zinah Hussein Toman, Mohamed Graiet:
A Correct by Construction Model for CBPS Systems Verification. 1299-1304 - Osman Salem, Ahmed Mehaoua, Raouf Boutaba:

The Sight for Hearing: An IoT-Based System to Assist Drivers with Hearing Disability. 1305-1310 - Alexandre F. Cardoso, Célio Vinicius N. de Albuquerque, Cledson de Souza, Diego G. Passos

:
Asynchronous and Heterogeneous Wake-Up Schedules for IoT Neighbor Communication. 1311-1316 - Rabeb Ben Othmen

, Wassim Abbessi
, Sofiane Ouni
, Wafa Badreddine, Gilles Dequen:
Simulation Of Optimized Cluster Based PBFT Blockchain Validation Process. 1317-1322 - Wissem Chorfa, Nihel Ben Youssef, Abderrazak Jemai:

Threat Modeling with Mitre ATT&CK Framework Mapping for SD-IOT Security Assessment and Mitigations. 1323-1326 - Liang Jiao, Yujia Zhu, Xingyu Fu, Yi Zhou, Fenglin Qin, Qingyun Liu:

CCSv6: A Detection Model for DNS-over-HTTPS Tunnel Using Attention Mechanism over IPv6. 1327-1330 - Luyi Li, Yueyang Li, Ruxue Luo, Yuzhen Chen, Wenjun Fan:

Still Not Aware of the Loophole of Unintentional Access to Docker? A Proof of Concept. 1331-1334 - Yunhao Liu, Songyi Zhong, Zhenglin Li, Yang Zhou:

Contrastive Learning with Attention Mechanism and Multi-Scale Sample Network for Unpaired Image-to-Image Translation. 1335-1339 - Huiqing Wan

, Qiongxiao Wang, Cunqing Ma, Yajun Teng, Jingqiang Lin, Dingfeng Ye:
ESCORT: Efficient Status Check and Revocation Transparency for Linkage-Based Pseudonym Certificates in VANETs. 1340-1343 - Weikang Yao, Tian Song:

A Covert TLS Encryption Transmission Method Based on Network Covert Channel. 1344-1347 - Georgios Drainakis, Peristera A. Baziana

, Adonis Bogris:
Optical Intra- and Inter-Rack Switching Architecture for Scalable, Low-Latency Data Center Networks. 1348-1351 - Houda Khlif, Hatem Hadj Kacem, Saúl E. Pomares Hernández, Ojilvie Avila-Cortés:

Spatio-temporal Behavior in Cyber-Physical Systems from a Natural Phenomena Perspective. 1358-1361 - Ruizhong Du, Na Liu, Mingyue Li, Caixia Ma:

Multi-Client Searchable Symmetric Encryption in Redactable Blockchain for Conjunctive Queries. 1362-1368 - Qingfeng Zhang

, Jiawei Zhu, Muqian Chen, Xuebin Wang, Qingyun Liu, Jinqiao Shi:
A Comprehensive Evaluation of the Impact on Tor Network Anonymity Caused by ShadowRelay. 1369-1375 - Long Dai, Jiarong Mao, Liaoran Xu

, Xuefeng Fan, Xiaoyi Zhou:
Balancing Robustness and Covertness in NLP Model Watermarking: A Multi-Task Learning Approach. 1376-1382 - Wenjie Liu, Liming Wang:

A Novel Malware Classification Method Based on Memory Image Representation. 1404-1409 - Jiaxing Zhou, Tao Ban, Tomohiro Morikawa, Takeshi Takahashi, Daisuke Inoue:

Color-coded Attribute Graph: Visual Exploration of Distinctive Traits of IoT-Malware Families. 1410-1416 - Gang Liu, Tongli Wang, Yichao Dong, Kai Zhan, Wenli Yang:

MFG-R: Chinese Text Matching with Multi-Information Fusion Graph Embedding and Residual Connections. 1417-1422 - Junhong Guo

, Yonggang Ding, Ying Li, Lingling Zheng, Xinyue Ma, Lingyun Xiao:
Deep Knowledge Tracking Based on Double Attention Mechanism and Cognitive Difficulty. 1423-1428 - Arijit Karati

, Li-Chun Chang:
Cryptanalysis of a Lightweight Privacy Enhancing Authentication Scheme for Internet of Vehicles. 1429-1434 - Junyu Lai, Huashuo Liu

, Yusong Sun, Junhong Zhu, Wanyi Ma, Lianqiang Gan:
Multi-Agent Deep Reinforcement Learning Based Computation Offloading Approach for LEO Satellite Broadband Networks. 1435-1440 - Yuxin Zhang, Xingyu Fu

, Rong Yang, Yangxi Li:
DRSDetector: Detecting Gambling Websites by Multi-level Feature Fusion. 1441-1447 - Hao Miao, Zhou Zhou, Renjie Li, Fengyuan Shi, Wei Yang, Shu Li, Qingyun Liu:

Hunting for Hidden RDP-MITM: Analyzing and Detecting RDP MITM Tools Based on Network Features. 1448-1453 - Jianquan Ouyang, Wenke Wang:

FedCrowdSensing: Incentive Mechanism for Crowdsensing Based on Reputation and Federated Learning. 1454-1461 - Yuzhen Li, Zhou Zhou, Renjie Li, Fengyuan Shi, Jiang Guo, Qingyun Liu:

GoGDDoS: A Multi-Classifier for DDoS Attacks Using Graph Neural Networks. 1462-1467 - Ahlem Arfaoui, Maha Cherif, Ridha Bouallegue

:
Analysis of One-Bit DAC for RIS-Assisted MU Massive MIMO Systems with Efficient Autoencoder Based Deep Learning. 1468-1473 - Jingwen Li, Yingpeng Sang, Hui Tian:

Differentially Private Functional Mechanism for Broad Learning System. 1474-1479

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














