


Остановите войну!
for scientists:


default search action
IEEE/ACM Transactions on Networking, Volume 31
Volume 31, Number 1, February 2023
- Huikang Li
, Yi Gao
, Wei Dong
, Chun Chen
:
Bound-Based Network Tomography for Inferring Interesting Path Metrics. 1-14 - Eric Ruzomberka
, David J. Love
:
Interference Moral Hazard in Large Multihop Networks. 15-29 - Anirudh Sabnis
, Tareq Si Salem
, Giovanni Neglia
, Michele Garetto
, Emilio Leonardi
, Ramesh K. Sitaraman
:
GRADES: Gradient Descent for Similarity Caching. 30-41 - Xi Chen, Qiao Xiang
, Linghe Kong
, Huisan Xu, Xue Liu
:
Learning From FM Communications: Toward Accurate, Efficient, All-Terrain Vehicle Localization. 42-57 - Haoyu Wang
, Zetian Liu, Haiying Shen
:
Machine Learning Feature Based Job Scheduling for Distributed Machine Learning Clusters. 58-73 - Xujin Zhou
, Irem Koprulu
, Atilla Eryilmaz
, Michael J. Neely
:
Efficient Distributed MAC for Dynamic Demands: Congestion and Age Based Designs. 74-87 - Federico Mason
, Gianfranco Nencioni
, Andrea Zanella
:
Using Distributed Reinforcement Learning for Resource Orchestration in a Network Slicing Scenario. 88-102 - Jiao Zhang
, Xiaolong Zhong
, Zirui Wan, Yu Tian, Tian Pan
, Tao Huang
:
RCC: Enabling Receiver-Driven RDMA Congestion Control With Congestion Divide-and-Conquer in Datacenter Networks. 103-117 - Shaopeng Zhu, Xiaolong Zheng
, Liang Liu
, Huadong Ma
:
CSMA/PJ: A Protective Jamming Based MAC Protocol to Harmonize the Long and Short Links. 118-132 - Konstantinos Oikonomou
, George Koufoudakis
, Sonia Aïssa
, Ioannis Stavrakakis
:
Probabilistic Flooding Performance Analysis Exploiting Graph Spectra Properties. 133-146 - Juncheng Wang
, Min Dong
, Ben Liang
, Gary Boudreau
, Hatem Abou-Zeid:
Delay-Tolerant OCO With Long-Term Constraints: Algorithm and Its Application to Network Resource Allocation. 147-163 - Xiaochun Yun
, Yipeng Wang
, Yongzheng Zhang, Chen Zhao
, Zijian Zhao
:
Encrypted TLS Traffic Classification on Cloud Platforms. 164-177 - Shouxi Luo
, Pingzhi Fan, Huanlai Xing
, Hongfang Yu
:
Meeting Coflow Deadlines in Data Center Networks With Policy-Based Selective Completion. 178-191 - Zhehui Zhang
, Yuanjie Li
, Qianru Li
, Jinghao Zhao
, Ghufran Baig, Lili Qiu, Songwu Lu:
Movement-Based Reliable Mobility Management for Beyond 5G Cellular Networks. 192-207 - Tongyu Zong
, Chen Li
, Yuanyuan Lei, Guangyu Li
, Houwei Cao
, Yong Liu:
Cocktail Edge Caching: Ride Dynamic Trends of Content Popularity With Ensemble Learning. 208-219 - Cao Chen
, Fen Zhou
, Massimo Tornatore
, Shilin Xiao
:
Maximizing Revenue With Adaptive Modulation and Multiple FECs in Flexible Optical Networks. 220-233 - Chia-Ming Chang, Yi-Jheng Lin
, Cheng-Shang Chang
, Duan-Shin Lee
:
On the Stability Regions of Coded Poisson Receivers With Multiple Classes of Users and Receivers. 234-247 - Gongming Zhao
, Luyao Luo
, Hongli Xu
, Chun-Jen Chung
, Liguang Xie
:
Southbound Message Delivery With Virtual Network Topology Awareness in Clouds. 248-263 - Francesco Malandrino
, Carla-Fabiana Chiasserini
, Nuria Molner, Antonio de la Oliva
:
Network Support for High-Performance Distributed Machine Learning. 264-278 - Chao Xu
, Jessie Hui Wang
, Jilong Wang
, Tao Yu, Yipeng Zhou
, Yuedong Xu
, Di Wu
, Changqing An:
Offloading Elastic Transfers to Opportunistic Vehicular Networks Based on Imperfect Trajectory Prediction. 279-293 - João Luis Sobrinho
, Miguel Alves Ferreira
:
From Non-Optimal Routing Protocols to Routing on Multiple Optimality Criteria. 294-307 - Xudong Qin
, Bin Li
, Lei Ying
:
Efficient Distributed Threshold-Based Offloading for Large-Scale Mobile Cloud Computing. 308-321 - Akbar Majidi
, Xiaofeng Gao
, Shunjia Zhu, Nazila Jahanbakhsh, Jiaqi Zheng
, Guihai Chen:
MiFi: Bounded Update to Optimize Network Performance in Software-Defined Data Centers. 322-335 - Ge Wang
, Xiaofeng Shi
, Haofan Cai
, Chen Qian, Han Ding
, Wei Xi, Kun Zhao
, Jizhong Zhao, Jinsong Han
:
A Generalized Method to Combat Multipaths for RFID Sensing. 336-351 - Chi Zhang
, Haisheng Tan
, Haoqiang Huang
, Zhenhua Han
, Shaofeng H.-C. Jiang
, Guopeng Li
, Xiangyang Li
:
Online Approximation Scheme for Scheduling Heterogeneous Utility Jobs in Edge Computing. 352-365 - Qiang Wu, Xiangping Bryce Zhai
, Xi Liu, Chunming Wu
, Fangliang Lou, Hongke Zhang
:
Performance Tuning via Lean Measurements for Acceleration of Network Functions Virtualization. 366-379 - Yijun Hao
, Fang Li, Cong Zhao
, Shusen Yang
:
Delay-Oriented Scheduling in 5G Downlink Wireless Networks Based on Reinforcement Learning With Partial Observations. 380-394 - Shaoke Xi, Kai Bu
, Wensen Mao, Xiaoyu Zhang
, Kui Ren
, Xinxin Ren:
RuleOut Forwarding Anomalies for SDN. 395-407 - Jiayu Pan
, Ahmed M. Bedewy
, Yin Sun
, Ness B. Shroff
:
Optimal Sampling for Data Freshness: Unreliable Transmissions With Random Two-Way Delay. 408-420 - Shaofei Tang
, Sicheng Zhao, Xiaoqin Pan, Zuqing Zhu
:
How to Use In-Band Network Telemetry Wisely: Network-Wise Orchestration of Sel-INT. 421-435 - Cheng Huang
, Xudong Wang
:
Distributed Scheduling With Centralized Coordination for Scalable Wireless Mesh Networking. 436-451 - Chuanpu Fu
, Qi Li
, Meng Shen
, Ke Xu
:
Frequency Domain Feature Based Robust Malicious Traffic Detection. 452-467
Volume 31, Number 2, April 2023
- Hao-Hsuan Chang
, Hao Chen
, Jianzhong Zhang
, Lingjia Liu
:
Decentralized Deep Reinforcement Learning Meets Mobility Load Balancing. 473-484 - Yunhua He
, Yueting Wu, Cui Zhang, Jialong Shen, Ke Xiao, Keshav Sood
, Limin Sun:
A Sparse Protocol Parsing Method for IIoT Based on BPSO-vote-HMM Hybrid Model. 485-496 - Tuo Shi
, Zhipeng Cai
, Jianzhong Li
, Hong Gao
, Jiancheng Chen, Ming Yang
:
Services Management and Distributed Multihop Requests Routing in Mobile Edge Networks. 497-510 - Kai Lei
, Guanjie Lin
, Meimei Zhang, Keke Li, Qi Li, Xiaojun Jing, Peng Wang:
Measuring the Consistency Between Data and Control Plane in SDN. 511-525 - Xinle Du
, Ke Xu
, Lei Xu, Kai Zheng, Meng Shen
, Bo Wu
, Tong Li
:
R-AQM: Reverse ACK Active Queue Management in Multitenant Data Centers. 526-541 - Yi Zhao
, Meina Qiao
, Haiyang Wang, Rui Zhang
, Dan Wang
, Ke Xu
:
Friendship Inference in Mobile Social Networks: Exploiting Multi-Source Information With Two-Stage Deep Learning Framework. 542-557 - Haibo Wang
, Chaoyi Ma
, Olufemi O. Odegbile, Shigang Chen
, Jih-Kwon Peir:
Randomized Error Removal for Online Spread Estimation in High-Speed Networks. 558-573 - Yi Ding
, Yu Yang
, Wenchao Jiang
, Yunhuai Liu, Tian He, Desheng Zhang:
Nationwide Deployment and Operation of a Virtual Arrival Detection System in the Wild. 574-589 - Lili Chen
, Kai Chen
, Jie Xiong
, Ke Li
, Sunghoon Ivan Lee
, Fuwei Wang
, Zhanyong Tang
, Zheng Wang
, Dingyi Fang, Xiaojiang Chen
:
Toward Wide-Area Contactless Wireless Sensing. 590-605 - François Michel
, Alejandro Cohen
, Derya Malak
, Quentin De Coninck
, Muriel Médard
, Olivier Bonaventure
:
FlEC: Enhancing QUIC With Application-Tailored Reliability Mechanisms. 606-619 - Xiang Tian
, Baoxian Zhang
, Cheng Li
:
Distributed Stable Multisource Global Broadcast for SINR-Based Wireless Multihop Networks. 620-633 - Yixin Bao
, Yanghua Peng
, Chuan Wu
:
Deep Learning-Based Job Placement in Distributed Machine Learning Clusters With Heterogeneous Workloads. 634-647 - En Wang
, Mijia Zhang
, Wenbin Liu
, Haoyi Xiong, Bo Yang
, Yongjian Yang
, Jie Wu
:
Outlier-Concerned Data Completion Exploiting Intra- and Inter-Data Correlations in Sparse CrowdSensing. 648-663 - Na Ruan, Hanyi Sun
, Zenan Lou, Jie Li
:
A General Quantitative Analysis Framework for Attacks in Blockchain. 664-679 - Waseem Ozan
, Izzat Darwazeh
, Kyle Jamieson
:
Partial OFDM Symbol Recovery to Improve Interfering Wireless Networks Operation in Collision Environments. 680-694 - Feridun Tütüncüoglu
, Sladana Josilo
, György Dán
:
Online Learning for Rate-Adaptive Task Offloading Under Latency Constraints in Serverless Edge Computing. 695-709 - Jianpeng Qi
, Rui Wang
:
R2: A Distributed Remote Function Execution Mechanism With Built-In Metadata. 710-723 - Lu Tang, Yao Xiao, Qun Huang
, Patrick P. C. Lee
:
A High-Performance Invertible Sketch for Network-Wide Superspreader Detection. 724-737 - Jiawei Huang
, Wenlu Zhang, Yijun Li, Lin Li, Zhaoyi Li
, Jin Ye, Jianxin Wang
:
ChainSketch: An Efficient and Accurate Sketch for Heavy Flow Detection. 738-753 - Mukhtiar Ahmad
, Syed Muhammad Nawazish Ali, Muhammad Taimoor Tariq, Syed Usman Jafri, Adnan Abbas
, Syeda Mashal Abbas Zaidi, Muhammad Basit Iqbal Awan, Zartash Afzal Uzmi
, Zafar Ayyub Qazi:
Neutrino: A Fast and Consistent Edge-Based Cellular Control Plane. 754-769 - Viviana Arrigoni
, Novella Bartolini
, Annalisa Massini
, Federico Trombetti:
A Bayesian Approach to Network Monitoring for Progressive Failure Localization. 770-783 - Vishrant Tripathi
, Rajat Talak
, Eytan H. Modiano:
Information Freshness in Multihop Wireless Networks. 784-799 - Yu-Han Lu, Sandy Hsin-Yu Hsiao, Chi-Yu Li
, Yi-Chen Hsieh, Po-Yi Chou, Yao-Yu Li, Tian Xie
, Guan-Hua Tu
:
Insecurity of Operational IMS Call Systems: Vulnerabilities, Attacks, and Countermeasures. 800-815 - Jielun Zhang
, Fuhao Li
, Feng Ye
:
Sustaining the High Performance of AI-Based Network Traffic Classification Models. 816-827 - Tianjian Dong
, Qi Qi
, Jingyu Wang
, Zirui Zhuang
, Haifeng Sun
, Jianxin Liao
, Zhu Han
:
Standing on the Shoulders of Giants: Cross-Slice Federated Meta Learning for Resource Orchestration to Cold-Start Slice. 828-845 - Shicheng Wang
, Menghao Zhang
, Guanyu Li
, Chang Liu, Zhiliang Wang
, Ying Liu
, Mingwei Xu
:
Bolt: Scalable and Cost-Efficient Multistring Pattern Matching With Programmable Switches. 846-861 - Guangtao Xue
, Yijie Li
, Hao Pan
, Lanqing Yang
, Yi-Chao Chen
, Xiaoyu Ji
, Jiadi Yu
:
ScreenID: Enhancing QRCode Security by Utilizing Screen Dimming Feature. 862-876 - Jiawei Li
, Chuyu Wang
, Ang Li
, Dianqi Han
, Yan Zhang
, Jinhang Zuo, Rui Zhang
, Lei Xie
, Yanchao Zhang
:
Rhythmic RFID Authentication. 877-890 - Yang Gao
, Hongli Zhang
, Xiangzhan Yu:
Higher-Order Community Detection: On Information Degeneration and Its Elimination. 891-903 - Dezhang Kong
, Yi Shen, Xiang Chen
, Qiumei Cheng
, Hongyan Liu
, Dong Zhang
, Xuan Liu
, Shuangxi Chen, Chunming Wu
:
Combination Attacks and Defenses on SDN Topology Discovery. 904-919 - Haojun Huang, Zhaoxi Li, Jialin Tian, Geyong Min
, Wang Miao
, Dapeng Oliver Wu
:
Accurate Prediction of Required Virtual Resources via Deep Reinforcement Learning. 920-933 - Jaehyun Nam
, Seungsoo Lee
, Phillip A. Porras, Vinod Yegneswaran, Seungwon Shin
:
Secure Inter-Container Communications Using XDP/eBPF. 934-947
Volume 31, Number 3, June 2023
- Wei Yang, Chi Lin
, Haipeng Dai
, Pengfei Wang
, Jiankang Ren
, Lei Wang
, Guowei Wu
, Qiang Zhang
:
Robust Wireless Rechargeable Sensor Networks. 949-964 - Xiong Wang
, Jiancheng Ye
, John C. S. Lui
:
Decentralized Scheduling and Dynamic Pricing for Edge Computing: A Mean Field Game Approach. 965-978 - Marco Faltelli
, Giacomo Belocchi, Francesco Quaglia
, Salvatore Pontarelli
, Giuseppe Bianchi
:
Metronome: Adaptive and Precise Intermittent Packet Retrieval in DPDK. 979-993 - Haoxian Chen
, Chenyuan Wu, Andrew Zhao, Mukund Raghothaman
, Mayur Naik, Boon Thau Loo:
Synthesizing Formal Network Specifications From Input-Output Examples. 994-1009 - Yang Du
, He Huang
, Yu-E Sun
, Shigang Chen
, Guoju Gao
, Xiaocan Wu
:
Self-Adaptive Sampling Based Per-Flow Traffic Measurement. 1010-1025 - Feng Lin
, Ming Gao
, Lingfeng Zhang, Yimin Li, Weiye Xu
, Jinsong Han
, Xian Xu, Wenyao Xu
, Kui Ren
:
Mobile Communication Among COTS IoT Devices via a Resonant Gyroscope With Ultrasound. 1026-1041 - Kan Yu
, Jiguo Yu
, Chuanwen Luo
:
The Impact of Mobility on Physical Layer Security of 5G IoT Networks. 1042-1055 - Min Yee Teh
, Shizhen Zhao
, Peirui Cao
, Keren Bergman
:
Enabling Quasi-Static Reconfigurable Networks With Robust Topology Engineering. 1056-1070 - Yipeng Wang
, Huijie He, Yingxu Lai
, Alex X. Liu
:
A Two-Phase Approach to Fast and Accurate Classification of Encrypted Traffic. 1071-1086 - Karim Elsayed
, Amr Rizk
:
Time-to-Live Caching With Network Delays: Exact Analysis and Computable Approximations. 1087-1100 - Xiaofeng Lu
, Fan Yang, Luwen Zou, Pietro Liò
, Pan Hui:
An LTE Authentication and Key Agreement Protocol Based on the ECC Self-Certified Public Key. 1101-1116 - Jianwei Liu
, Kaiyan Cui
, Xiang Zou
, Jinsong Han
, Feng Lin
, Kui Ren
:
Reliable Multi-Factor User Authentication With One Single Finger Swipe. 1117-1131 - Longzhi Yuan
, Qiwei Wang, Jia Zhao
, Wei Gong
:
Multiprotocol Backscatter With Commodity Radios for Personal IoT Sensors. 1132-1144 - Jingling Liu
, Jiawei Huang
, Weihe Li
, Jianxin Wang
, Tian He
:
Asymmetry-Aware Load Balancing With Adaptive Switching Granularity in Data Center. 1145-1158 - Ningning Hou
, Xianjin Xia
, Yuanqing Zheng
:
CloakLoRa: A Covert Channel Over LoRa PHY. 1159-1172 - Tareq Si Salem
, Giovanni Neglia
, Damiano Carra
:
Ascent Similarity Caching With Approximate Indexes. 1173-1186 - Vishwaraj Doshi
, Shailaja Mallick
, Do Young Eun
:
Convergence of Bi-Virus Epidemic Models With Non-Linear Rates on Networks - A Monotone Dynamical Systems Approach. 1187-1201 - JunNyung Hur
, Hyeon Gy Shon, Young Jae Kim, Myungkeun Yoon
:
Packet Chunking for File Detection. 1202-1215 - Wenzheng Xu
, Hongbin Xie, Chenxi Wang, Weifa Liang
, Xiaohua Jia
, Zichuan Xu
, Pan Zhou
, Weigang Wu
, Xiang Chen
:
An Approximation Algorithm for the h-Hop Independently Submodular Maximization Problem and Its Applications. 1216-1229 - Alon Rashelbach
, Ori Rottenstreich
, Mark Silberstein
:
Scaling by Learning: Accelerating Open vSwitch Data Path With Neural Networks. 1230-1243 - Erfan Meskar, Ben Liang
:
Fair Multi-Resource Allocation in Heterogeneous Servers With an External Resource Type. 1244-1262 - Anders E. Kalør
, Petar Popovski
:
Timely Monitoring of Dynamic Sources With Observations From Multiple Wireless Sensors. 1263-1276 - Berksan Serbetci
, Eleftherios Lampiris
, Thrasyvoulos Spyropoulos, Giuseppe Caire
, Petros Elia
:
Multi-Transmitter Coded Caching Networks With Transmitter-Side Knowledge of File Popularity. 1277-1292 - Matteo Salani
, Cristina Rottondi
, Leopoldo Ceré, Massimo Tornatore
:
Dual-Stage Planning for Elastic Optical Networks Integrating Machine-Learning-Assisted QoT Estimation. 1293-1307 - Shuqin Gao
, Costas Courcoubetis, Lingjie Duan
:
Distributed Double Auction Mechanisms for Large-Scale Device-to-Device Resource Trading. 1308-1323 - Pietro Bressana
, Noa Zilberman
, Robert Soulé
:
PTA: Finding Hard-to-Find Data Plane Bugs. 1324-1337 - Noor Felemban
, Fidan Mehmeti
, Thomas F. La Porta
:
VidQ: Video Query Using Optimized Audio-Visual Processing. 1338-1352 - Haodi Ping
, Yongcai Wang
, Deying Li
, Wenping Chen:
Understanding Node Localizability in Barycentric Linear Localization. 1353-1368 - Peng Lin
, Kejiang Ye
, Yishen Hu, Yanying Lin
, Cheng-Zhong Xu
:
A Novel Multimodal Deep Learning Framework for Encrypted Traffic Classification. 1369-1384 - Wenhao Li
, Xiaoyu Zhang
, Huaifeng Bao
, Haichao Shi
, Qiang Wang
:
ProGraph: Robust Network Traffic Identification With Graph Propagation. 1385-1399 - Xiang Chen
, Hongyan Liu
, Qun Huang
, Dong Zhang
, Haifeng Zhou
, Chunming Wu
, Xuan Liu
, Qiang Yang
:
Toward Low-Latency and Accurate State Synchronization for Programmable Networks. 1400-1415 - Jiahao Cao
, Mingwei Xu
, Qi Li
, Kun Sun
, Yuan Yang
:
The LOFT Attack: Overflowing SDN Flow Tables at a Low Rate. 1416-1431
Volume 31, Number 4, August 2023
- Minghao Ye
, Junjie Zhang
, Zehua Guo
, H. Jonathan Chao
:
FlexDATE: Flexible and Disturbance-Aware Traffic Engineering With Reinforcement Learning in Software-Defined Networks. 1433-1448 - Yongmin Zhang
, Wei Wang
, Ju Ren
, Jinge Huang, Shibo He
, Yaoxue Zhang
:
Efficient Revenue-Based MEC Server Deployment and Management in Mobile Edge-Cloud Computing. 1449-1462 - Xu Lin
, Deke Guo
, Yulong Shen
, Guoming Tang
, Bangbang Ren, Ming Xu:
SFT-Box: An Online Approach for Minimizing the Embedding Cost of Multiple Hybrid SFCs. 1463-1477 - Songtao Fu
, Qi Li
, Min Zhu, Xiaoliang Wang
, Su Yao
, Yangfei Guo
, Xinle Du
, Ke Xu
:
MASK: Practical Source and Path Verification Based on Multi-AS-Key. 1478-1493 - Junchao Ma
, Lingjia Liu
, Bodong Shang
, Shashank Jere
, Pingzhi Fan:
Performance Analysis and Optimization for Layer-Based Scalable Video Caching in 6G Networks. 1494-1506 - Jian Su
, Zhengguo Sheng
, Chenxi Huang
, Gang Li
, Alex X. Liu
, Zhangjie Fu
:
Identifying RFID Tags in Collisions. 1507-1520 - Guy Goren
, Shay Vargaftik
, Yoram Moses
:
Distributed Dispatching in the Parallel Server Model. 1521-1534 - Qi Shi
, Dong Hao
:
Social Sourcing: Incorporating Social Networks Into Crowdsourcing Contest Design. 1535-1549 - Na Wang
, Junsong Fu
, Shancheng Zhang
, Zheng Zhang, Jiawen Qiao, Jianwei Liu
, Bharat K. Bhargava
:
Secure and Distributed IoT Data Storage in Clouds Based on Secret Sharing and Collaborative Blockchain. 1550-1565 - Jianer Zhou
, Xinyi Qiu
, Zhenyu Li
, Qing Li
, Gareth Tyson, Jingpu Duan, Yi Wang, Heng Pan
, Qinghua Wu
:
A Machine Learning-Based Framework for Dynamic Selection of Congestion Control Algorithms. 1566-1581 - Shiva Raj Pokhrel
, Jinho Choi
, Anwar Walid
:
Fair and Efficient Distributed Edge Learning With Hybrid Multipath TCP. 1582-1594 - Juhyeng Han
, Insu Yun
, Seongmin Kim
, Taesoo Kim
, Sooel Son
, Dongsu Han
:
Scalable and Secure Virtualization of HSM With ScaleTrust. 1595-1610