


default search action
ISCC 2024: Paris, France
- IEEE Symposium on Computers and Communications, ISCC 2024, Paris, France, June 26-29, 2024. IEEE 2024, ISBN 979-8-3503-5423-2

- Fabian Graf, Thomas Watteyne, Filip Maksimovic, Michael Villnow:

Bit- and Symbol-Error Patterns in IEEE 802.15.4 TSCH Mode. 1-6 - Antonio Celesti, Marco Dell'Acqua, Giovanni Lonia, Davide Ciraolo, Fabrizio Celesti

, Maria Fazio, Massimo Villari, Mirjam Bonanno, Rocco Salvatore Calabrò:
Leveraging Audio Biomarkers for Enriching the Tele-Monitoring of Patients. 1-6 - Bin Dong, Tian Song, Qianyu Zhang:

SwiftOGA: An Efficient and Swift Online Gradient Ascent Algorithm for Caching Replacement. 1-6 - Bithi Banik, Constanza Zurita Valdebenito, Al Mamun Bhuiyan, Soumya P. Dash, Yuan Lin, Debasish Ghose:

Bi-directional Estimation of Infant Heart and Respiration Rates Using Machine Learning Algorithms. 1-6 - Youness Amadiaz, Ahmed Nait-Sidi-Moh, Said Kharraja:

Decision Support for Patient Transport Efficiency Based on V2X Communications in Healthcare Systems. 1-6 - Tong Yin, Xin Chen, Libo Jiao:

Service Delay Minimization for UAV-Aided Edge-Cloud Networks. 1-7 - Zhenghao Li, Yang Zhang, Xing Hu, Shaoqing Li, Bin Liang:

Hardware Trojan Detection Based on Circuit Sequence Features with GRU Neural Network. 1-7 - Simon Dahdal

, Alessandro Gilli, Filippo Poltronieri
, Mauro Tortonesi
, Cesare Stefanelli, Niranjan Suri:
RoamML Platform: Enabling Distributed Continual Learning for Disaster Relief Operations. 1-6 - Leonardo Azalim de Oliveira

, Edelberto Franco Silva
, Mário Antônio Ribeiro Dantas:
A NWDAF Study Employing Machine Learning Models on a Simulated 5G Network Dataset. 1-6 - Benoit Lemoine:

Kubernetes Horizontal Pod Autoscaler Enhanced Design for Protected Workloads. 1-7 - Daniele Santoro, Marco Zambianco

, Claudio Facchinetti, Domenico Siracusa:
Demo: Cloud-native Cyber Deception with Decepto. 1-3 - Ichrak Kallala, Thomas Watteyne, Quentin Lampin

, Marion Dumay, Stéphane Coutant, Cédric Adjih, Paul Muhlethaler:
(Demo) Joint Automated Header and Payload Compression in Constrained Networks. 1-3 - Jose C. C. Pinto, Eder J. Scheid, Muriel Figueredo Franco, Lisandro Z. Granville:

Eeny, Meeny, Miny, Moe: Analyzing and Comparing the Selection of DNS Lookup Tools. 1-6 - Mark Adrian Gambito, Maria Fazio, Armando Ruggeri, Antonio Celesti, Massimo Villari:

Immersive Experiences in the Metaverse to Contrast Drunk Driving. 1-6 - Roberto Marino

, Antonino Marino, Domenica De Domenico, Lorenzo Carnevale, Mark Adrian Gambito, Massimo Villari:
A Low Cost Platform for Distributed Data-Driven Structural Health Monitoring. 1-6 - Adriana Arteaga Arce, Nikos Filinis, Lei Fu, Carol Habib, Leonardo Militano, Dimitrios Spatharakis, Anastasios Zafeiropoulos, Thomas Michael Bohnert, Nathalie Mitton, Symeon Papavassiliou:

Virtual Objects for Robots and Sensor Nodes in Distributed Applications over the Cloud Continuum. 1-6 - Vincenzo Spadari

, Francesco Cerasuolo
, Giampaolo Bovenzi, Antonio Pescapè:
An MLOps Framework for Explainable Network Intrusion Detection with MLflow. 1-6 - Yuwei Xu, Jiangfeng Li, Yujie Hou, Lei Wang, Kehui Song, Guang Cheng:

NuanceTracker: A Website Fingerprinting Attack against Tor Hidden Services through Burst patterns. 1-7 - Raouia Masmoudi Ghodhbane

, Aurélien Hernandez
, Sabri Janfaoui:
A Pressure and Temperature Wireless Sensing Network Communicating with LoRa Modulation. 1-3 - H. P. Madushanka

, Rafaela Scaciota, Sumudu Samarakoon, Mehdi Bennis:
Real-Time Remote Control via VR over Limited Wireless Connectivity. 1-3 - Tao Leng, Lixin Zhao, Yuedong Pan, Aimin Yu, Ziyuan Zhu, Lijun Cai, Dan Meng:

Early Detection of Fileless Attacks Based on Multi-Feature Fusion of Complex Attack Vectors. 1-7 - Jonathan Rivalan

, Long H. Ngo
, Étienne Leclercq
, Anastasios Zafeiropoulos:
Palindrome.js: 3D monitoring for distributed systems visual analysis. 1-6 - Kai-Wen Chen, Li-Ping Tung, Tai Tan Phan, Chi-Yu Li:

Stealthy Remote Collection of Call Statistics in 4G/5G Mobile Networks. 1-6 - Vincenzo Agate

, Pierluca Ferraro, Giuseppe Lo Re:
A Privacy-Preserving System for Enhancing the QoI of Collected Data in a Smart Connected Community. 1-6 - Nikolaos Vathis, Grammati E. Pantziou, Charalampos Konstantopoulos, Damianos Gavalas:

Solving the Regular Language-Constrained Team Orienteering Problem with Time Windows for Route Planning Applications. 1-6 - Kamran Razavi

, Shayan Davari Fard, George Karlos
, Vinod Nigade, Max Mühlhäuser, Lin Wang:
NetNN: Neural Intrusion Detection System in Programmable Networks. 1-8 - Iliar Rabet, Hossein Fotouhi, Mário Alves, Jaya Prakash Champati, James Gross, Maryam Vahabi, Mats Björkman:

A Stochastic Network Calculus Model for TSCH Schedulers. 1-7 - Shaoyin Chen, Yang Yang, Jingting Mei, Zhipeng Gao, Lanlan Rui, Peng Yu:

Federated Domain Generalization for Network Traffic Prediction via Spatial-Temporal Feature Learning. 1-6 - Emna Ammar Elhadjamor, Houda Harbaoui:

A Comparison Analysis of Heart Disease Prediction Using Supervised Machine Learning Techniques. 1-6 - Hicham Lakhlef, Thomas Lerner, Aness Kebir, Nadia El Atia, Xingyu Du, Valentine Ingardin:

Blockchain-Enabled SDN Solutions for IoT: Advancements, Discussions, and Strategic Insights. 1-6 - Anestis Kaimakamidis, Ioannis Pitas:

Leveraging Collective Knowledge for Forest Fire Classification. 1-8 - Marco Garofalo, Mario Colosi

, Alessio Catalfamo, Massimo Villari:
Web-Centric Federated Learning over the Cloud-Edge Continuum Leveraging ONNX and WASM. 1-7 - Haoran Chen, Hang Wang, Guanglei Chen, Peilin Hong:

SIM: Sub-RTT-based Incast Mitigation in Data Center Networks. 1-6 - José Gómez-delaHiz

, Andrés García-López, Santiago García-Gil, Diego Ramos-Ramos, Aymen Fakhreddine
, Juan Manuel Murillo, Jaime Galán-Jiménez:
Throughput-Energy Efficiency Trade-off in Microservices-Based UAV Networks. 1-6 - Zhou Zhou, Zahra Pooranian, Mohammad Shojafar, Fabio Martinelli:

An Edge Server Deployment Strategy for Multi-Objective Optimization in the Internet of Vehicles. 1-6 - Hannah L. Bradwell, Ray B. Jones, Leonie A. N. Cooper, Katie J. Edwards, Simone Tomaz, Rory Baxter, Rebecca Baines, Toni Page, Arunangsu Chatterjee, Anna C. Whittaker, Richard Haynes, Catherine Hennessy:

Remote Scoping of an Audio-Reminiscence Tool for Care Home Residents. 1-7 - Sampad Banik, Xingya Liu, Jiang (Linda) Xie:

SABR: A Self-Adaptive Beamforming-Based Rendezvous Protocol for Cognitive Radio Networks with Dense Primary Users. 1-6 - Deborah Djon, Darragh Connaughton, Geoff Hamilton, Andrew McCarren:

Comparative Analysis of Methods for Performing a Side-Channel Video-Fingerprinting Attack. 1-7 - Caio M. C. Viana, Carlos H. G. Ferreira, Fabricio Murai, Aldri Luiz dos Santos, Lourenço Alves Pereira Júnior:

Devil in the Noise: Detecting Advanced Persistent Threats with Backbone Extraction. 1-7 - Stefano Tennina:

5G Network Planning for Mobile Multimedia Applications in an Urban Environment: A Simulation Study. 1-6 - Xiaoyu Fang, Xiaoqing Ma, Cong Wang, Yan Niu, Liya Ma, Tianmu Gao, Rong Yang:

Detecting and Exploring Malicious Websites through Multi-Message Passing Heterogeneous Neural Network. 1-7 - Diego Medeiros de Abreu, Antônio J. G. Abelém:

qRL: Reinforcement Learning Routing for Quantum Entanglement Networks. 1-6 - Diana Gratiela Berbecaru

, Silvia Sisinni, Matteo Simone:
On the evaluation of X.509 certificate processing in Transport Layer Security interceptors. 1-6 - Kejin Xu, Xi Wang, Lun Li, Jin Gao:

eBPF-sec: A Defensive Framework Against eBPF Attacks on Containers. 1-7 - Dimitrios Papaioannou, Vasileios Mygdalis

, Ioannis Pitas:
Proof of Quality Inference (PoQI): An AI Consensus Protocol for Decentralized DNN Inference Frameworks. 1-7 - Alexandre Freire Osorio, Fabio Grassiotto, Saulo Aldighieri Moraes, Amparo Munoz, Sildolfo Francisco Gomes Neto, Wandemberg Gibaut:

Transfer Learning for Human Activity Recognition in Federated Learning on Android Smartphones with Highly Imbalanced Datasets. 1-4 - Guanghui Zhang, Jing Guo:

E-Stream: An Energy-Efficient Approach to Short-form Video Streaming in Mobile Devices. 1-6 - Sara Baldoni:

Quality of Experience for immersive media: from content creation to rendering. 1-6 - Tobias Köppl, René Zander, Nikolay Tcholtchev:

Resilience of lattice-based Cryptosystems to Quantum Attacks. 1-6 - Andreas Tsagkaropoulos, Yiannis Verginadis, Gregoris Mentzas:

A multi-context Severity-based SLO Violation Detector. 1-6 - Maycon Leone Maciel Peixoto

:
Quantum Edge Computing for Data Analysis in Connected Autonomous Vehicles. 1-6 - Diletta Chiaro, Fabio Giampaolo, Sara Amitrano

, Francesco Piccialli:
FLOWS: Federated Learning Optimization With Sinkhorn. 1-6 - Christos Theodoropoulos, Dimitris Koutras, Christos Douligeris, Panayiotis Kotzanikolaou:

An Edge Multi Factor Authentication System for Cyber Physical Systems Based on OTP. 1-3 - Georgios Samaras, Marinela Mertiri, Maria-Evgenia Xezonaki, Vasileios Theodorou, Panteleimon-Konstantinos Chartsias, Theodoros Bozios:

Democratizing Predictive Analytics with Generative Artificial Intelligence towards AI-Native Networks. 1-6 - Tan Tai Phan, Shang-Chun Tai, Yu-Shuo Chang, Wei-Xun Chen, Chi-Yu Li:

Automatic Bridging for Mobile Wireless Backhaul System. 1-4 - Laile Xi, Heng Zhang, Shenghao Lin, Weidong Zhang, Yuyan Sun, Hongsong Zhu, Limin Sun:

Enhancing Coverage in Stateful Protocol Fuzzing via Value-Based Selection. 1-6 - Jia Zhang, Wanyue Cao, Qiang Fu, Hao Li:

Resource-Aware Intent Compilation for Virtual Private Cloud. 1-6 - Ashkan Gholamhosseinian, Jochen Seitz:

Poster: Collision Resolution for an Uncontrolled Intersection Using Vehicular Communication. 1-3 - Yousef Kloob

, Mohammad Ahmad Al-Jarrah, Emad Alsusa, Christos Masouros:
Trade-off performance analysis of Radcom using the relative entropy. 1-5 - Hanzhi Wang, David Marshall, Derek K. Jones, Yuhua Li

:
Improving High-Frequency Details in Cerebellum for Brain MRI Super-Resolution. 1-7 - Reda Chefira

, Raja Mahmou
, Mohamed Ayou:
Smart Data Imputation techniques for Indoor Air Quality Monitoring in e-Health-like environments. 1-7 - Liang Jiao, Jianqiang Li, Wenxiu Zhang, Tianyu Cui, Yi Zhou, Yujia Zhu, Qingyun Liu:

Measuring Encrypted DNS Service with TLS1.3 Support over IPv6. 1-7 - Ying Chen, Jiao Zhang, Tian Pan, Tao Huang

, Chengcheng Li, Yasheng Zhang:
SARO: Intelligent Data-Driven Routing Optimization for LEO Satellite Networks. 1-6 - Aymern Belghith:

Balancing Detection Speed and Resource Efficiency in Healthcare Vulnerability Scanning. 1-6 - Sara Faour, Malisa Vucinic, Filip Maksimovic, David C. Burnett, Paul Muhlethaler, Thomas Watteyne, Kristofer S. F. Pister:

TMVS: Threshold-based Majority Voting Scheme for Robust SRAM PUFs. 1-8 - Davide Mulfari, Lorenzo Carnevale, Massimo Villari:

Sequence-to-Sequence Models in Italian Atypical Speech Recognition. 1-6 - B. Jalil, Vincenzo Lionetti, Luca Valcarenghi:

Utilizing Time-Distributed Layers to Estimate Vital Parameter from Video Sequences. 1-6 - Xin Wang, Ning Li:

A Presentation Generation Method Combining Topic Segmentation and Text Summarization. 1-7 - Davide Tazzioli, Riccardo Venanzi, Luca Foschini:

Stateful Service Migration Support for Kubernetes-based Orchestration in Industry 4.0. 1-6 - Mattia Zaccarini

, Davide Borsatti, Walter Cerroni, Luca Foschini, Genady Ya. Grabarnik, Lorenzo Manca, Filippo Poltronieri
, Domenico Scotece, Larisa Shwartz, Cesare Stefanelli, Mauro Tortonesi
:
TELKA: Twin-Enhanced Learning for Kubernetes Applications. 1-6 - Roberto Casadei, Giovanni Delnevo

, Roberto Girau, Silvia Mirri:
Modelling Groups of Humans: Towards Crowd Digital Twins. 1-6 - Bruno José Olivieri de Souza, Markus Endler:

Ventures, Insights, and Ponderings from Real-World experiments with FANETs and UAVs. 1-7 - Haiyang Li, Zhiqiang Lv, Ning Zhang, Yixin Zhang

, Qingqing Ye:
HID Detector: A New Detection Framework Against HID Attacks Based on Behavior Features. 1-7 - Yeabsira Asefa Ashengo, Tara Ali-Yahiya, Nicola Roberto Zema:

Efficient Task Offloading in Multi-access Edge Computing Servers using Asynchronous Meta Reinforcement Learning in 5G. 1-6 - Bruna Alice Oliveira de Brito, Itamir de Morais Barroca Filho

, Jean Mário Moreira de Lima, André Morais Gurgel, Ramon Santos Malaquias:
Natural Language Processing in the Context of Cancer: A Systematic Review. 1-6 - Hasan Atalay Gunel, Tayfun Yilmaz

, Ibrahim Hökelek, Haci Ilhan:
Error Performance of RIS-Assisted Space-Time Coded Network under Time-Selective Fading Environments. 1-6 - Siya Xu, Qimeng Fu, Wenjing Li, Peng Yu, Yang Yang, Long Bai:

Cloud-edge-terminal Collaborative Proactive Caching and Differentiated Delivery of Heterogeneous Content for AR in Metaverse. 1-6 - Utsav Banerjee:

Energy-Efficient and Secure Clustering with Post-Quantum DTLS in Wireless Sensor Networks. 1-6 - Satendra Raj, Aryansh Tripathi, Kamal Singh:

POSTER: Compact Linked Data for Constrained Web of Things Using CBOR-LD. 1-3 - Bruno S. Martins, Allan Mariano de Souza, Denis Rosário, Carlos A. Astudillo, Eduardo Cerqueira, Leandro Villas

:
Partial Training Mechanism to Handle the Impact of Stragglers in Federated Learning with Heterogeneous Clients. 1-6 - Emmanuel N. Amachaghi, Sulyman Age Abdulkareem, Sotiris Chatzimiltis, Mohammad Shojafar, Chuan Heng Foh:

An Efficient Intrusion Detection Solution for Near-Real-Time Open-RAN. 1-7 - Zhaoyang Xu, Zhujie Guan, Mengmeng Tian:

CSR-PTDNG: A Graph Construction Method for DNS Tunneling Domain Names Detection. 1-7 - Pranita Subhash Shedage, Seyedamin Pouriyeh, Reza M. Parizi, Meng Han, Giovanna Sannino, Nasrin Dehbozorgi:

Stress Detection Using Multimodal Physiological Signals With Machine Learning From Wearable Devices. 1-6 - Pieruigi Dell'Acqua, Maria Fazio, Lorenzo Carnevale, Massimo Villari:

Knowledge Distillation and Federated Learning for Data-Driven Monitoring of Electrical Vehicle Li-Battery. 1-5 - Andreea Ancuta Corici, Nils Lahmann, Marius Corici, Martin Hocquel-Hans

, Simone Kuntz, Anne Deter, Anne Grohnert, Benny Häusler, Hemant Zope:
5G Wound Management System for Remote Areas. 1-6 - Aaron Raymond See, Aloysius Matthew A. Beronque, Jillian Joy L. Tenerife, C. Pacudan Enrique, Jing Angelo G. Clet, Jovelyn C. Cuizon, Yu-Sheng Lin:

HandyCare: A Digital Approach for Home-Based Hand Edema Treatment. 1-6 - Alessandro Calvio, Filippo Lenzi, Armir Bujari, Luca Foschini:

Charting the Route: Fine-grained Road Topology Construction for Logistics Digital Twins. 1-6 - Xingjie Wang, Kan Wang, Di Zhang, Junhuai Li, Momiao Zhou, Timo Hämäläinen

:
Generative Diffusion Model-Based Deep Reinforcement Learning for Uplink Rate-Splitting Multiple Access in LEO Satellite Networks. 1-8 - Javier Blanco-Romero

, Vicente Lorenzo
, Florina Almenáres
, Daniel Díaz Sánchez, Celeste Campo, Carlos García-Rubio:
Integrating Post-Quantum Cryptography into CoAP and MQTT-SN Protocols. 1-6 - Ensiye Kiyamousavi

, Boris Kraychev, Ivan Koychev
:
FedDyS: Enhancing Federated Learning Efficiency with Dynamic Sample Selection. 1-8 - Francesco Medina

, Maria Chiara Molteni, Antonio Josè Di Scala, Lorenzo Nava:
Analysis and contributions to an open source Kyber library in Rust. 1-6 - Georgios Koukis

, Sotiris Skaperas, Ioanna Angeliki Kapetanidou, Lefteris Mamatas, Vassilis Tsaoussidis:
Evaluating CNI Plugins Features & Tradeoffs for Edge Cloud Applications. 1-6 - Arian Ahmadi, Anders Høst-Madsen, Zixiang Xiong:

Latency and Energy Minimization in NOMA-Assisted MEC Network: A Federated Deep Reinforcement Learning Approach. 1-6 - Minghao Ma, Zhixin Shi, Qilei Yin, Yangyang Zong:

SHTree: A Structural Encrypted Traffic Fingerprint Generation Method for Multiple Classification Tasks. 1-7 - Eranga Bandara, Peter Foytik, Sachin Shetty, Ravi Mukkamala, Abdul Rahman, Xueping Liang, Ng Wee Keong, Kasun De Zoysa:

WedaGPT - Generative-AI (with Custom-Trained Meta's Llama2 LLM), Blockchain, Self Sovereign Identity, NFT and Model Card Enabled Indigenous Medicine Platform. 1-6 - Peng Qian, Ning Wang, Chuan Heng Foh

, Jia Zhang
, Carl C. Udora, Rahim Tafazolli:
Enabling eBPF-based packet duplication for robust volumetric video streaming. 1-7 - Yu Wang, Dongdong Huo, Chuang Li, Sixiang Wang, Xiaokun Guo, Qihui Zhou, Yu Wang:

Cross-Architecture IoT Firmware Similarity Comparison Based on Multi-Layer GCN. 1-7 - Sadek Misto Kirdi, Nicola Scarano, Franco Oberti, Luca Mannella

, Stefano Di Carlo, Alessandro Savino
:
CARACAS: vehiCular ArchitectuRe for detAiled Can Attacks Simulation. 1-6 - Juan Pablo Sáenz, Luigi De Russis

:
Empowering Users: End User Development for Mobile Applications Privacy Management. 1-6 - Renjie Pei, Wenxin Li, Yulong Li

, Song Zhang
, Yaozhen Li, Wenyu Qu:
Mild: A Zero-Wait Multi-Round Proactive Transport. 1-7 - Grazia D'Onghia, Diana Gratiela Berbecaru, Antonio Lioy:

Shaping a Quantum-Resistant Future: Strategies for Post-Quantum PKI. 1-6 - Giovanni Lonia, Davide Ciraolo, Maria Fazio, Fabrizio Celesti

, Paolo Ruggeri, Massimo Villari, Antonio Celesti:
Comparing CNN and ViT in both Centralised and Federated Learning Scenarios: a Pneumonia Diagnosis Case Study. 1-7 - José Giner-Pérez de Lucía, Julio Fernández-Pedauye, Marco A. Celdrán-Bernabeu, Jose-Norberto Mazón, José M. Cecilia:

Unveiling Touristic Pulse: Harnessing Social Sensing for Dynamic Insights. 1-6 - Visham Hurbungs, Vandana Bassoo, T. P. Fowdur:

A novel One-vs-Next approach for multiclass classification. 1-6 - José Santos

:
Towards Cloud-Native Virtual Reality Applications: State-Of-The-Art and Open Challenges. 1-6 - Antonio Caruso

, Stefano Chessa
:
Energy Sustainable IoT Scheduling in a Fog/IoT Interplay. 1-6 - Yangyang Zong, Zhixin Shi, Weiqing Huang:

LONGAN: Detecting Lateral Movement based on Heterogeneous Graph Neural Networks with Temporal Features. 1-6 - José Edilson Silva Filho

, Nícolas de Araújo Moreira, Mathieu Bourgais, Cecilia Zanni-Merk, Laurent Vercouter, Jarbas Aryel Nunes da Silveira, Walter Abrahão dos Santos:
ELICITATION: A Satellite Constellation Simulator Using Multi-Agent Systems, Blockchain and the IoMT. 1-6 - Junaid Khan, Umar Zaman, Eunkyu Lee, Kyungsup Kim

:
Innovative Video-based Approach for Epileptic Seizure Detection in Mice. 1-5 - Alessio Catalfamo, Lorenzo Carnevale, Marco Garofalo, Massimo Villari:

Flower Full-Compliant Implementation of Federated Learning with Homomorphic Encryption. 1-5 - Yuqing Liu, Fang Mei, Geng Sun, Hui Kang, Xinrong Guo:

UAV-enabled Secure Communication Under Marine Imperfect Channel Based on Collaborative Beamforming. 1-7 - Ons Aouedi, Gautam Jajoo, Kandaraj Piamrat:

METALS : seMi-supervised fEderaTed Active Learning for intrusion detection Systems. 1-6 - Kristtopher Kayo Coelho, Maurício M. Okuyama, Michele Nogueira, Alex Borges Vieira, Edelberto F. Silva

, José Augusto Miranda Nacif:
A Dynamic Approach to Health Data Anonymization by Separatrices. 1-6 - Zhenying Qu, Yang Yang, Yating Sun, Zhipeng Gao, Lanlan Rui, Siya Xu:

Network Management Service Composition Migration Method Based on Anomaly Detection. 1-6 - Giovanni Triboli, Marco Picone

, Marko Bertogna:
Intelligent Livestock Waste Sensing & Management: Architecture and Challenges in the Po Valley. 1-6 - Kaiye Huang, Xinyu Zhang, Xiongbo Cao, Mohammed El-Hajjar, Yichuan Li:

Machine Learning Based Visible Light Positioning System Under High Blockage Conditions. 1-7 - Gabriele Morabito

, Armando Ruggeri, Antonio Celesti, Massimo Villari, Maria Fazio:
Content-based Obfuscation for Structured Documents using Secret Sharing at the Edge. 1-7 - Vincenzo Bevilacqua

, Antonio Di Marino, Emanuel Di Nardo
, Angelo Ciaramella, Ivanoe De Falco, Giovanna Sannino:
Cross-domain Super-Resolution in Medical Imaging. 1-6 - Shifeng Peng, Xuefeng Hou, Zhishu Shen

, Qiushi Zheng, Jiong Jin, Atsushi Tagami, Jingling Yuan:
Collaborative Satellite Computing through Adaptive DNN Task Splitting and Offloading. 1-6 - Iran F. Ribeiro

, Guilherme Brotto, Antonio A. de A. Rocha, Vinícius F. S. Mota:
Measuring Fidelity and Utility of Time Series Generative Adversarial Networks. 1-6 - Akito Yamamoto

, Tetsuo Shibuya:
Privacy-Optimized Randomized Response for Sharing Multi-Attribute Data. 1-8 - Alex F. R. Trajano

, José Neuman de Souza:
Leveraging Idle Edge Computing Resources for Execution of Cloud Native Services in Dynamic Regions. 1-7 - Ahmed Abdelmaguid

, Marwan Torki, Ayman Khalafallah
:
AraEGI: Arabic Gender Identification Using Transformers for Egyptian Dialect. 1-7 - Silvia Sisinni, Diana Gratiela Berbecaru

, Valerio Donnini, Antonio Lioy:
MATCH-IN: Mutual Attestation for Trusted Collaboration in Heterogeneous IoT Networks. 1-6 - Carmelo Scribano, Filippo Muzzini:

Emergency Vehicles in the Smart Cities: Challenges and Enabling Technologies. 1-6 - Giovanni Lonia, Davide Ciraolo, Maria Fazio, Massimo Villari, Antonio Celesti:

Comparing CNNs and ViTs for Medical Image Classification Leveraging Transfer Learning. 1-7 - Lucas L. C. Freitas, Kristtopher Kayo Coelho, Michele Nogueira, Alex Borges Vieira, José Augusto Miranda Nacif, Edelberto F. Silva

:
Context-Sensitive Access Control and Zero Trust for Security in E-Health. 1-6 - Diana Gratiela Berbecaru

, Stefano Giannuzzi:
On Detecting Anomalous TLS Connections with Artificial Intelligence Models. 1-6 - Nícolas Riccieri Gardin Assumpçáo, Leandro Villas

:
Fast, Private, and Protected: Safeguarding Data Privacy and Defending Against Model Poisoning Attacks in Federated Learning. 1-6 - Luca Turchet

, Paolo Casari:
Performance Analysis of Slicing on a 10-node 5G Architecture for Networked Music Performances. 1-6 - Marco Furini:

Recommendation Systems: Issues, Challenges and Regulations. 1-6 - Sidney Loyola de Sá, Aline Paes, Antônio A. de A. Rocha:

A Multimodal Approach to Predict Video Popularity from a Large Streaming Service. 1-7 - Armando Ruggeri, Annamaria Ficara

, Giuseppe Sollazzo, Gaetano Bosurgi, Maria Fazio:
A Comparative Analysis of Deep Learning Approaches for Road Anomaly Detection. 1-6 - Alex Piccioni

, Angel Luis Zuriarrain Sosa
, Roberto Alesii, Fabio Graziosi:
SDR-Based Supporting System for Multimedia Services in Mobile Communication Networks. 1-6 - Tailai Song, Paolo Garza, Michela Meo, Maurizio Matteo Munafò:

Throughput Prediction in Real-Time Communications: Spotlight on Traffic Extremes. 1-7 - Candra Ahmadi, Jiann-Liang Chen:

Enhancing Phishing Detection: A Multi-Layer Ensemble Approach Integrating Machine Learning for Robust Cybersecurity. 1-6 - Anderson Aparecido do Carmo Frasão, Tiago Heinrich, Vinicius Fulber-Garcia

, Newton Carlos Will, Rafael R. Obelheiro, Carlos Alberto Maziero:
I See Syscalls by the Seashore: An Anomaly-based IDS for Containers Leveraging Sysdig Data. 1-6 - Ioanna Valsamara, Christos Papaioannidis, Ioannis Pitas:

Domain Expertise Assessment for Multi-DNN Agent Systems. 1-7 - Stefano Giacomelli

, Marco Giordano, Claudia Rinaldi
:
The OCON model: an old but gold solution for distributable supervised classification. 1-7 - Vincenzo Agate

, Alessandra De Paola, Salvatore Drago
, Pierluca Ferraro, Giuseppe Lo Re:
Enhancing IoT Network Security with Concept Drift-Aware Unsupervised Threat Detection. 1-6 - Yixin Zhang

, Haiyang Li, Qingqing Ye, Junjie Hu
, Yinglong Han, Zhiqiang Lv:
A Conducted Compromising Emanations Method on High-Speed USB Devices via USB Hubs. 1-8 - Sergio Barrachina-Muñoz, Rasoul Nikbakht, Albert Bel, Jorge Baranda, Miquel Payaró, Josep Mangues-Bafalluy:

DEMO: On-demand 5G/6G edge verticals via third-party UPF selection and cloud-native relocation. 1-3 - Rui Jesus, José Frías, Pedro Gouveia, João Santinha, Luís Bastião Silva, Carlos Costa

:
DICOM Gateway Anonymizer: A Cloud architecture for a scalable research PACS. 1-6 - Diego Medeiros de Abreu, Christian Esteve Rothenberg, Antônio J. G. Abelém:

QML-IDS: Quantum Machine Learning Intrusion Detection System. 1-6 - Enrico Boffetti

, Arcangela Rago, Giuseppe Piro, Gennaro Boggia:
Design of AI-based Digital Twin Network for Multimedia Service Provisioning. 1-6 - Y. Thomas, Nikos Fotiou, Iakovos Pittaras, George Xylomenos:

Poster: Named Data Networking for Data Spaces. 1-3 - Ruiyu Li, Guangxia Li, Xiao Lu, Jichao Liu, Yan Jin:

A Context Augmented Multi-Play Multi-Armed Bandit Algorithm for Fast Channel Allocation in Opportunistic Spectrum Access. 1-6 - Josafat Ribeiro Leal Filho, Alexander Kocian

, Antônio Augusto Fröhlich, Stefano Chessa
:
Continual Learning in Recurrent Neural Networks for the Internet of Things: A Stochastic Approach. 1-6 - Qiu Wang, Zhaoyang Wang:

Height Range and Throughput Analysis for Directional UAV-Assisted Backscatter Communications Networks. 1-6 - Naeem Ullah

, Javed Ali Khan, Ivanoe De Falco, Giovanna Sannino:
Bridging Clinical Gaps: Multi-Dataset Integration for Reliable Multi-Class Lung Disease Classification with DeepCRINet and Occlusion Sensitivity. 1-6 - Thomas Katsantas, Yannis Thomas, Christos Karapapas, George Xylomenos:

Enhancing IPFS privacy through triple hashing. 1-6 - Mohammad Imran Ali, Giuseppe Di Modica, Giorgia Rondinini, Andrea Sabbioni

, Antonio Corradi:
Function profiling to support smart Serverless service deployment in the Cloud continuum. 1-6 - Ghofrane Fersi:

FOLLOWER: A Fog-based peer-to-peer routing protocol for mobile Internet of Things. 1-6 - Antonio Agliata, Antonio Pilato, Sorrentino Mariacarmen, Salvatore Bottiglieri, Emanuel Di Nardo, Angelo Ciaramella:

Generative AI and Emotional Health: Innovations with Haystack. 1-4 - Luca Carmisciano, Tobia Boschi, Francesca Chiaromonte, Franca Delmastro, Andrea Vandin

:
Investigating Functional Data Analysis for Wearable Physiological Sensor Data in Stress Evaluation. 1-6 - Kenneth Lewenhagen, Martin Boldt, Anton Borg:

Automated Generation of CCTV Camera Coverage Areas for Smart Cities Using Line-of-Sight Analysis. 1-6 - Kevin Bogner

, Dave Singelée
, Aysajan Abidin
:
Entangled States and Bell's Inequality: A New Approach to Quantum Distance Bounding. 1-6 - Clément Courageux-Sudan, Anne-Cécile Orgerie, Martin Quinson:

Studying the end-to-end performance, energy consumption and carbon footprint of fog applications. 1-7 - Rasool Seyghaly, Jordi Garcia, Xavi Masip-Bruin, Mohammad Mahmoodi Varnamkhasti

:
An Optimized Data Architecture for Smart Advertising based on Federated Learning. 1-7 - Chaochao Liu, Degang Sun, Zhixin Shi, Ning Zhang:

A New Method of Cyber Deception Defense. 1-7 - Pedro Escaleira

, Vitor A. Cunha
, João Paulo Barraca, Diogo Gomes, Rui L. Aguiar:
MoFaaS: A Moving Target Defense Approach to Fortify Functions as a Service. 1-7 - Andrea Montanari, Alexandra Marele, Francesco Franco

, Francesco Poggi, Luca Bedogni:
Wearable Device Positioning for Activity Recognition and Monitoring. 1-6 - Di Cheng, Rui Mao, Qing Hao, Yan Wang, Jiacheng Li:

Smartphone Gait Authentication Based on Activity Recognition Task in Unconstrained Environment. 1-7 - Cinzia Bernardeschi, Gianluca Dini, Maurizio Palmieri

, Alessio Vivani:
Attacks detection in Cyber-Physical Systems with Neural Networks: a case study. 1-6 - Romain Facq, Charles Thonier, Trifun Savic, Bertrand Marcon, Thomas Watteyne:

Demo: The Embedded Orchestra. 1-2 - Kalpana Ranasinghe, H. P. Madushanka

, Rafaela Scaciota, Sumudu Samarakoon, Mehdi Bennis:
Maze Discovery using Multiple Robots via Federated Learning. 1-3 - Aissa Hadj Mohamed, Joahannes B. D. da Costa, Leandro A. Villas

, Júlio Cesar dos Reis, Allan Mariano de Souza:
Combining Client Selection Strategy with Knowledge Distillation for Federated Learning in non-IID Data. 1-7 - Santiago García-Gil, Diego Ramos-Ramos, José Gómez-delaHiz

, Andrés García-López, Sergio López-López, Juan Manuel Murillo, Jaime Galán-Jiménez:
Latency-Aware Load Distribution Algorithm for Microservice Deployment in UAV Networks. 1-6 - Jun He, Yahui Li, Han Zhang, Changqing An, Jilong Wang:

ROV-GD: Improving the Measurement of ROV Deployment Using Graph Difference. 1-7 - Nikos Fotiou, Chalima Dimitra Nassar Kyriakidou, Athanasia Maria Papathanasiou, Iakovos Pittaras, Yannis Thomas, George Xylomenos:

Certificate Management for Cloud-Hosted Digital Twins. 1-6 - Debora de Oliveira, Célio Vinicius Neves de Albuquerque, Diego G. Passos

, Katia Obraczka, Fabiano Bhering:
A Distributed Architecture for Dynamic Multipath Video Routing in Wireless Networks. 1-7 - Georgios Koukis

, Sotiris Skaperas, Ioanna Angeliki Kapetanidou, Lefteris Mamatas, Vassilis Tsaoussidis:
Performance Evaluation of Kubernetes Networking Approaches across Constraint Edge Environments. 1-6 - Antonio Serra, Federica Paganelli, Antonio Brogi, Paola Cappanera:

A Genetic Algorithm for Placing VNF Chains with Multiple Flavours. 1-6 - Carlos Melo, Glauber D. Gonçalves, Francisco Airton Silva, André Soares:

Performance Modeling and Evaluation of Hyperledger Fabric: An Analysis Based on Transaction Flow and Endorsement Policies. 1-6

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














