default search action
19th CCNC 2022: Las Vegas, NV, USA
- 19th IEEE Annual Consumer Communications & Networking Conference, CCNC 2022, Las Vegas, NV, USA, January 8-11, 2022. IEEE 2022, ISBN 978-1-6654-3161-3
- Mohammed A. Jasim, Nazli Siasi, Nasir Ghani:
Efficient Load Migration Scheme for Fog Networks. 1-6 - Joar Blom Rydell, Oliver Otterlind, Ismail Butun:
Delay Considerations for Reliable Communications in LoRaWAN. 1-6 - Tobias Christian Piller, David Maria Merz, Abdelmajid Khelil:
MQTT-4EST: RulE-basEd WEb Editor for Semantic-aware Topic Naming in MQTT. 1-8 - Michael Lagally, Michael McCool:
IoT Interoperability with W3C Web of Things. 1-5 - Leila Benarous, Saadi Boudjit:
Security and Privacy Evaluation Methods and Metrics in Vehicular Networks. 1-6 - Mirko Franco, Ombretta Gaggi, Claudio E. Palazzi:
Improving Sexting Safety through Media Forwarding Control. 1-6 - Nicholas Polosky, Tyler Gwin, Sean Furman, Parth Barhanpurkar, Jithin Jagannath:
Machine Learning Subsystem for Autonomous Collision Avoidance on a small UAS with Embedded GPU. 1-7 - Sharif Azem, Anam Tahir, Heinz Koeppl:
Dynamic Time Slot Allocation Algorithm for Quadcopter Swarms. 1-6 - Lisa Cesario, Giovanni Delnevo, Massimiliano Malavasi, Lorenzo Desideri, Silvia Mirri:
On Designing a Mobile App to Support People with Cognitive Disabilities in Daily Activities. 1-6 - Sabarish Krishna Moorthy, Chencheng Lu, Zhangyu Guan, Nicholas Mastronarde, George Sklivanitis, Dimitris Pados, Elizabeth Serena Bentley, Michael J. Medley:
CloudRAFT: A Cloud-based Framework for Remote Experimentation for Mobile Networks. 1-6 - Abhilash Kumar Pandey, Amrith Aathmaram, B. Sainath:
Hybrid RIS-assisted Cooperative Communication Model Design and Performance Analysis. 1-6 - Le-Hang Nguyen, Volker Braun, Hardy Halbauer, Thorsten Wild:
Waveform Comparison under Hardware Limitations for 6G Sub-THz Communications. 1-6 - Zakaria Laaroussi, Elif Ustundag Soykan, Michael Liljenstam, Utku Gülen, Leyli Karaçay, Emrah Tomur:
On the security of 6G use cases: Threat Analysis of 'All-Senses Meeting'. 1-6 - Xin Wang, Juan M. Calderón, Navid Khoshavi, Luis Gabriel Jaimes:
Path and Floor Detection in Outdoor Environments for Fall Prevention of the Visually Impaired Population. 1-6 - Roberto Bomfin, Ahmad Nimr, Gerhard P. Fettweis:
A Study on Iterative Equalization for DFTs-OFDM Waveform under sub-THz Channels. 1-6 - Fabio Pittarello:
Designing Interactive Systems for Seniors: Living on an Island. 1-6 - Christian Esposito, Giancarlo Sperlì, Vincenzo Moscato, Zhongliang Zhao:
On Attacks To Federated Learning and a Blockchain-empowered Protection. 1-6 - Miguel Camelo, Luca Cominardi, Marco Gramaglia, Marco Fiore, Andres Garcia-Saavedra, Lidia Fuentes, Danny De Vleeschauwer, Paola Soto-Arenas, Nina Slamnik-Krijestorac, Joaquín Ballesteros, Chia-Yu Chang, Gabriele Baldoni, Johann M. Márquez-Barja, Peter Hellinckx, Steven Latré:
Requirements and Specifications for the Orchestration of Network Intelligence in 6G. 1-9 - Bini Angui, Romuald Corbel, Verónica Quintuna Rodriguez, Emile Stephan:
Towards 6G zero touch networks: The case of automated Cloud-RAN deployments. 1-6 - Marianna Di Gregorio, Marco Romano, Monica Sebillo, Giuliana Vitiello:
Dyslexeasy-App to Improve Readability through the Extracted Summary for Dyslexic Users. 1-6 - Minxiao Wang, Ning Yang:
OTA-NN: Observational Therapy-Assistance Neural Network for Enhancing Autism Intervention Quality. 1-7 - Johannes Mey, Sebastian Ebert, Tianfang Lin, Giang T. Nguyen, Stefan Gumhold, Uwe Aßmann:
Teaching Distributed and Heterogeneous Robotic Cells. 1-2 - Sayed Amir Hoseini, Fayçal Bouhafs, Frank T. H. den Hartog:
A Practical Implementation of Physical Layer Security in Wireless Networks. 1-4 - Peyman Neshaastegaran, Ming Jian:
Performance Evaluation of Orbital Angular Momentum Mode Multiplexing Systems Impaired by Phase Noise. 1-6 - Miguel Carvalhosa, João Almeida, Paulo C. Bartolomeu, Joaquim Ferreira:
Multipurpose Sensing Platform for Improved Road Safety. 1-7 - Chiara Bonsignori, Carlo Puliafito, Antonio Virdis, Enzo Mingozzi, Giuseppe Iannaccone:
Integrating Mobile IoT Devices into the Arrowhead Framework Using Web of Things. 1-6 - Anousheh Gholami, Nariman Torkzaban, John S. Baras:
Trusted Decentralized Federated Learning. 1-6 - Dener Ottolini, Ivan D. Zyrianoff, Carlos Kamienski:
Interoperability and Scalability Trade-offs in Open IoT Platforms. 1-6 - Sourabha Bharadwaj, Karunakar Gonabathula, Sudipta Saha, Chayan Sarkar, Rekha Raja:
Concurrent Transmission for Multi-Robot Coordination. 1-6 - Chantal Lengua, Vincenzo Rubano, Fabio Vitali:
Aligning accessibility design to non-disabled people's perceptions. 1-6 - Toon Bogaerts, Sylvain Watelet, Chris Thoen, Tom Coopman, Joris Van den Bergh, Maarten Reyniers, Dirck Seynaeve, Wim Casteels, Steven Latré, Peter Hellinckx:
Enhancement of road weather services using vehicle sensor data. 1-6 - Minoo Hosseinzadeh, Nathaniel Hudson, Sam Heshmati, Hana Khamfroush:
Communication-Loss Trade-Off in Federated Learning: A Distributed Client Selection Algorithm. 1-6 - Ansa Shermin S, Sarang C. Dhongdi:
Multiple AUVs for Ocean Phenomena Monitoring: A Review. 1-7 - Nuno Faria, Daniel Costa, José Pereira, Ricardo Vilaça, Luis Meruje Ferreira, Fábio Coelho:
AIDA-DB: A Data Management Architecture for the Edge and Cloud Continuum. 1-6 - Giovanni Delnevo, Luca Deluigi, Davide Evangelisti, Simone Magnani:
On increasing password security awareness using a serious game. 82-87 - Giovanni Delnevo, Chiara Ceccarini, Paola Salomoni, Catia Prandi:
Gamification of a University-level Web Technologies course: a five years experience. 88-93 - Seohyang Kim, Seungyoung Shin, Joonseok Moon:
UDP-based Extremely Low Latency Streaming. 94-99 - Youssef A. Youssef, John Tadrous, Sameh Hosny, Mohammed Nafie:
Joint Content Valuations and Proactive Caching for Content Distribution Networks. 100-105 - Tadeus Prastowo, Ayub Shah, Luigi Palopoli, Roberto Passerone, Giuseppe Piro:
Migration-Aware Optimized Resource Allocation in B5G Edge Networks. 106-113 - Kiranpreet Kaur, Fabrice Guillemin, Verónica Quintuna Rodriguez, Françoise Sailhan:
Latency and network aware placement for cloud-native 5G/6G services. 114-119 - Po-Hao Huang, Fu-Cheng Hsieh, Wen-Jen Hsieh, Chi-Yu Li, Ying-Dar Lin:
Prioritized Traffic Shaping for Low-latency MEC Flows in MEC-enabled Cellular Networks. 120-125 - Gayan Dilanka, Lakshan Viranga, Rajitha Pamudith, Tharindu D. Gamage, Pasika Ranaweera, Indika A. M. Balapuwaduge, Madhusanka Liyanage:
A Novel Request Handler Algorithm for Multi-access Edge Computing Platforms in 5G. 126-131 - Pinhan Zhao, Benjamin Peters, Jae Chung, Mark Claypool:
Competing TCP Congestion Control Algorithms over a Satellite Network. 132-138 - Takamochi Kanda, Yusuke Koda, Koji Yamamoto, Takayuki Nishio:
ACK-Less Rate Adaptation for IEEE 802.11bc Enhanced Broadcast Services Using Sim-to-Real Deep Reinforcement Learning. 139-143 - Yunzhi Li, Rajeswari Hita Kambhamettu, Yidan Hu, Rui Zhang:
ImPos: An Image-Based Indoor Positioning System. 144-150 - Sangkyu Baek, Anil Agiwal, Jaehyuk Jang:
De-prioritization Impact of LCH-based Prioritization for Industrial Internet of Things in 3GPP NR. 151-156 - Frank Engelhardt, Sophie Herbrechtsmeyer, Mesut Günes:
Kinesthetic Coding Based on the Fast Wavelet Transform for Remote-Controlling a Quadrotor Drone. 157-162 - Yuwei Long, Nan Cen:
Sum-Rate Optimization for Visible-Light-Band UAV Networks Based on Particle Swarm Optimization. 163-168 - Hiroyuki Asano, Hiraku Okada, Chedlia Ben Naila, Masaaki Katayama:
A UAV Flight Method for Non-Uniform User Distributions in Aerial Wireless Relay Networks. 169-174 - Tao Yu, Kiyomichi Araki, Kei Sakaguchi:
Full-Duplex Aerial Communication System for Multiple UAVs with Directional Antennas. 175-180 - Masayasu Harada, Shintaro Izumi, Ryosuke Kozeni, Yukiko Yoshikawa, Toru Ishii, Hiroshi Kawaguchi, Shohei Uemura, Kaname Araki:
20-µs Accuracy Time-Synchronization Method using Bluetooth Low Energy for Internet-of-Things Sensors. 181-186 - Vahid Maleki Raee, Amin Ebrahimzadeh, Marsa Rayani, Roch H. Glitho, May El Barachi, Fatna Belqasmi:
Energy Efficient Virtual Network Embedding in Virtualized Wireless Sensor Networks. 187-192 - Leonardo Montecchiari, Angelo Trotta, Luciano Bononi, Marco Di Felice:
Bluetooth Mesh Technology for the Joint Monitoring of Indoor Environments and Mobile Device Localization: A Performance Study. 193-199 - Eric Samikwa, Antonio Di Maio, Torsten Braun:
Adaptive Early Exit of Computation for Energy-Efficient and Low-Latency Machine Learning over IoT Networks. 200-206 - Omar Houidi, Djamal Zeghlache, Victor Perrier, Pham Tran Anh Quang, Nicolas Huin, Jérémie Leguay, Paolo Medagliani:
Constrained Deep Reinforcement Learning for Smart Load Balancing. 207-215 - Babatunji Omoniwa, Boris Galkin, Ivana Dusparic:
Energy-aware optimization of UAV base stations placement via decentralized multi-agent Q-learning. 216-222 - Mariam M. N. Aboelwafa, Ghada Alsuhli, Karim Banawan, Karim G. Seddik:
Self-Optimization of Cellular Networks Using Deep Reinforcement Learning with Hybrid Action Space. 223-229 - Zhitao Yu, Jian Zhang, Shiwen Mao, Senthilkumar C. G. Periaswamy, Justin Patton:
RIRL: A Recurrent Imitation and Reinforcement Learning Method for Long-Horizon Robotic Tasks. 230-235 - Curtis R. Taylor, Jason M. Carter, Shean Huff, Eric Nafziger, Jackeline Rios-Torres, Bob Zhang, Joseph Turcotte:
Evaluating Efficiency and Security of Connected and Autonomous Vehicle Applications. 236-239 - K. Nimmy, Sriram Sankaran, Krishnashree Achuthan, Prasad Calyam:
Securing Remote User Authentication in Industrial Internet of Things. 244-247 - Subir Halder, Thomas Newe:
SmartCrypt: Secure Storing and Sharing of Time Series Data Streams in IIoT. 248-251 - Yesin Sahraoui, Chaker Abdelaziz Kerrache, Ahmed Korichi, Anna Maria Vegni, Marica Amadeo:
LearnPhi: a Real-Time Learning Model for Early Prediction of Phishing Attacks in IoV. 252-255 - Adam Duby, Teryl Taylor, Yanyan Zhuang:
Malware Family Classification via Residual Prefetch Artifacts. 256-259 - Mehdi Haghshenas, Maurizio Magarini:
NR-U and Wi-Fi Coexistence Enhancement Exploiting Multiple Bandwidth Parts Assignment. 260-263 - Johann M. Márquez-Barja, Dries Naudts, Vasilis Maglogiannis, Seilendria A. Hadiwardoyo, Ingrid Moerman, Matthijs Klepper, Geerd Kakes, Xiangyu Lian, Wim Vandenberghe, Rakshith Kusumakar, Joost Vandenbossche:
Designing a 5G architecture to overcome the challenges of the teleoperated transport and logistics. 264-267 - Henrique Cesar Carvalho de Resende, João Francisco Nunes Pinheiro, Philippe Reiter, Cristiano Bonato Both, Johann M. Márquez-Barja:
4G/5G performance of a multi-RAT UAV for medical parcel delivery. 268-271 - Yao Ma, Susanna Mosleh, Jason B. Coder:
Analyzing 5G NR-U and WiGig Coexistence with Multiple-Beam Directional LBT. 272-275 - Shalitha Wijethilaka, Pawani Porambage, Chamitha de Alwis, Madhusanka Liyanage:
A Comprehensive Analysis on Network Slicing for Smart Hospital Applications. 276-279 - Irene Vilà, Jordi Pérez-Romero, Oriol Sallent, Anna Umbert:
Impact Analysis of Training in Deep Reinforcement Learning-based Radio Access Network Slicing. 280-283 - Bilal Moussa Fares, Pietro Manzoni, Johann M. Márquez-Barja, Juan-Carlos Cano, Carlos T. Calafate:
A non-invasive social monitoring application for danger situations based on a edge-based Machine Learning solution. 284-289 - Michael Bosello, Rita Tse, Giovanni Pau:
Train in Austria, Race in Montecarlo: Generalized RL for Cross-Track F1tenth LIDAR-Based Races. 290-298 - Xuebing Li, Byungjin Cho, Yu Xiao:
Balancing Latency and Accuracy on Deep Video Analytics at the Edge. 299-306 - Silvia Corpino, Silvia Mirri, Mariella Sole, Daniele D. Giusto, Giovanni Pau, Roberto Girau:
On implementing socialization algorithms on Virtual Objects in the Social IoT. 307-312 - Pablo Gil Pereira, Thorsten Herfet:
Polar Coding for Efficient Transport Layer Multicast. 313-318 - Minoo Hosseinzadeh, Andrew Wachal, Hana Khamfroush, Daniel E. Lucani:
QoS-Aware Priority-Based Task Offloading for Deep Learning Services at the Edge. 319-325 - Rushang Gupta, Varun Gupta, Akash Kumar Mandal, Swades De:
Learning-based Multivariate Real-Time Data Pruning for Smart PMU Communication. 326-331 - Ijaz Ahmad, Sergio Lembo, Felipe Rodriguez, Stephan Mehnert, Mikko Vehkaperä:
Security of Micro MEC in 6G: A Brief Overview. 332-337 - Jörg von Mankowski, Hansini Vijayaraghavan, Alberto Martínez Alba, Leonardo Goratti, Wolfgang Kellerer:
Towards the Optimal Pattern of Joint Beamforming, User Scheduling and Power Allocation in a multi-RAT Network. 338-345 - Guanyu Chen, Tse-Tin Chan, Haoyuan Pan, Jiaxin Liang:
DNN-aided Low-complexity Physical-layer Network Coding Enabled Non-orthogonal Multiple Access. 346-351 - Ryosuke Hanahara, Sohei Itahara, Kota Yamashita, Yusuke Koda, Akihito Taya, Takayuki Nishio, Koji Yamamoto:
Frame-Capture-Based CSI Recomposition Pertaining to Firmware-Agnostic WiFi Sensing. 352-356 - Yukito Onodera, Yu Nakayama, Hiroki Takano, Daisuke Hisano:
Drone Positioning for Visible Light Communication with Drone-Mounted LED and Camera. 357-362 - Imtiaz Ullah, Qusay H. Mahmoud:
An Anomaly Detection Model for IoT Networks based on Flow and Flag Features using a Feed-Forward Neural Network. 363-368 - Heather Lawrence, Uchenna Ezeobi, Gedare Bloom, Yanyan Zhuang:
Shining New Light on Useful Features for Network Intrusion Detection Algorithms. 369-377 - Md. Hasan Tarek, Md. Mumtahin Habib Ullah Mazumder, Sadia Sharmin, Md. Shariful Islam, Mohammad Shoyaib, Muhammad Mahbub Alam:
RHC: Cluster based Feature Reduction for Network Intrusion Detections. 378-384 - Mnassar Alyami, Ibrahim Alharbi, Cliff C. Zou, Yan Solihin, Karl Ackerman:
WiFi-based IoT Devices Profiling Attack based on Eavesdropping of Encrypted WiFi Traffic. 385-392 - Ryo Yaegashi, Yu Nakayama, Moe Matsuki, Ryoma Yasunaga, Marie Katsurai:
First Experimental Results on Real-Time Cleaning Activity Monitoring System. 393-398 - Kaneez Fizza, Prem Prakash Jayaraman, Abhik Banerjee, Dimitrios Georgakopoulos, Rajiv Ranjan:
Age of Data Aware Internet of Things Applications. 399-404 - Luca Bedogni, Francesco Poggi:
A Web Of Things Context-Aware IoT System leveraging Q-learning. 405-410 - Federico Montori, Vincenzo Armandi, Luca Bedogni:
A Hierarchical Architectural Model for IoT End-User Service Composition. 411-416 - Paulo C. Bartolomeu, Joana Bernardino, Joaquim Ferreira:
Decentralized Ad-Hoc Seaport Truck Authentication. 417-420 - Kalkidan Gebru:
A Privacy-preserving Scheme for Passive Monitoring of People's Flows through WiFi Beacons. 421-424 - Sajal Saha, Annita Tahsin Priyoti, Aakriti Sharma, Anwar Haque:
Towards an Optimal Feature Selection Method for AI-Based DDoS Detection System. 425-428 - Md Ali Reza Al Amin, Peter Foytik, Sachin Shetty, Jessica Dorismond, Marco A. Gamarra:
Deception for Characterizing Adversarial Strategies in Complex Networked Systems. 429-432 - Munkenyi Mukhandi, Francisco Damião, Jorge Granjal, João P. Vilela:
Blockchain-based Device Identity Management with Consensus Authentication for IoT Devices. 433-436 - Nina Slamnik-Krijestorac, Miguel Camelo Botero, Luca Cominardi, Steven Latré, Johann M. Márquez-Barja:
Building Realistic Experimentation Environments for AI-enhanced Management and Orchestration (MANO) of 5G and beyond V2X systems. 437-440 - John A. Snoap, Dimitrie C. Popescu, Chad M. Spooner:
On Deep Learning Classification of Digitally Modulated Signals Using Raw I/Q Data. 441-444 - Mahmoud Badi, N. Cameron Matson, Dinesh Rajan, Joseph Camp:
Leveraging UAV Rotation To Increase Phase Coherency in Distributed Transmit Beamforming. 445-448 - Mohammad Nazmus Sadat, Erwin Vargas-Alfonso, Rui Dai:
Quality-Aware Video Analytics in Edge Computing Environments. 449-452 - Alexis Falempin, Rafik Zayani, Jean-Baptiste Doré, Emilio Calvanese Strinati:
Low-Complexity Adaptive Digital Pre-Distortion with Meta-Learning based Neural Networks. 453 - Michael R. Jones, Soufiene Djahel, Kristopher Welsh:
MQTPP - Towards Multiple Q-Table based Path Planning in UAV Environments. 457-460 - Peter Sossalla, Justus Rischke, Giang T. Nguyen, Frank H. P. Fitzek:
Offloading Robot Control with 5G. 461-464 - Koichi Nihei, Natsuki Kai, Yuki Maruyama, Toshiaki Yamashita, Dai Kanetomo, Takako Kitahara, Masaaki Maruyama, Takashi Ohki, Kitso Kusin, Hendrik Segah:
Forest Fire Surveillance using Live Video Streaming from UAV via Multiple LTE Networks. 465-468 - Hongzhi Guo, Clifford Boakye-Mensah:
Distributed Trajectory Design for Underwater Multi-Robot Relay Networks. 469-472 - Yung-Chuan Wu, Hong-Rong Chang, Meng-Shou Wu, Chi-Yu Li, Kuochen Wang:
UAV-FAP: User Fairness-Driven Access Point on UAV for Wi-Fi Networks. 473-476 - Christian Esposito, Gianluca Rizzo:
Help From Above: UAV-Empowered Network Resiliency in Post-Disaster Scenarios. 477-480 - Hyungbin Park, TaeYoung Kim, Younghwan Jin, SuKyoung Lee:
IoT Edge Orchestration for Distributed DNN Service with Containerized Resource Allocation. 483-484 - Ahmed Osama Basil, Mu Mu, Ali Al-Sherbaz:
Novel Quality of Experience Experimentation Framework Through Programmable Network Management. 485-486 - Muzzafer Ali, Suchetana Chakraborty:
Enabling video conferencing in low bandwidth. 487-488 - Gurjashan Singh Pannu, Stephan Dunkel, Seyhan Ucar, Takamasa Higuchi, Onur Altintas, Falko Dressler:
Improving Data Consistency in Vehicular Micro Clouds. 489-490 - Akio Kawabata, Bijoy Chand Chatterjee, Eiji Oki:
An Optimistic Synchronization Based Server Selection Scheme with Successive Participation. 491-492 - Youssef Sellami, Ghada Jaber, Ahmed Lounis:
Distributed Fog-based Caching Solution for Content-Centric Networking in IoT. 493-494 - Vladimir Marbukh:
Towards Risk Adjusted Wireless Access under Jamming: Reliability through Multi-Connectivity. 495-496 - Sana Ben Aissa, Asma Ben Letaifa, Abderrahim Sahli, Abderrezak Rachedi:
Computing offloading and load balancing within UAV clusters. 497-498 - Keigo Kono, Takehiro Sato, Eiji Oki:
Gradual Control Method for Program File Placement in Hierarchical Cloud-Edge Platform. 499-500 - Lokesh Bommisetty, Venkatesh Tiruchirai Gopalakrishnan:
Phasic Policy Gradient Based Resource Allocation for Industrial Internet of Things. 501-502 - Aziz Kord, Jason B. Coder, Aric Sanders:
Empirical Differences in LTE Open- and Closed-Loop Power Control. 503-504 - Yuhei Kawakami, Hideo Kawata, Takahiro Kubo, Natsuki Yasuhara, Shinichi Yoshihara, Tomoaki Yoshida:
Applying Time-aware Shaper Considering User Identifier to Service Provider Network. 505-506 - Zixuan Guo, Jiang Liu, Shigeru Shimamoto:
Radio and Power over Double Clad Fiber System for 4K/8K Satellite Broadcasting. 507-508 - Jessica Vazquez-Estrada, Suman Bhunia, Mahmudur Khan, Yicheng Qian, Nero Tran Huu:
Neighbor Discovery in a Multi-Transceiver Free-Space-Optical Ad Hoc Network. 509-510 - Changyoung An, Hyeong Min Kwon, Heung-Gyoon Ryu:
Ambient Backscatter Communication System Utilizing Multicarrier Signal. 511-512 - Suyong Eum, Shin'ichi Arakawa, Masayuki Murata:
Generalization of probabilistic scheduling models for realizing URLLC applications. 513-514 - Metasebia D. Gemeda, Min S. Han, Ameha T. Abebe, Chung Gu Kang:
Deep Learning Transceiver for Terahertz Band Communication System with 1-bit ADC and Oversampling. 515-516 - Chihyeh Chen, Megumi Saito, Shigeru Shimamoto:
Signal Propagation Through the Inside of Robot Leg for Non-wired Robot System. 517-518 - Sehwan Choi, Chae-Hun Im, Chungyong Lee:
Robust First Path Detection Based on Two-Stage CNN for Unspecified UWB Pulse Shape. 519-520 - Mattia Giovanni Spina, Gerardo Mario Marotta, Stefano Gualtieri, Floriano De Rango:
Topic Load Balancing in a multi IoT Gateways Scenario under Publish/Subscribe Paradigm. 521-522 - Ons Aouedi, Kandaraj Piamrat, Guillaume Muller, Kamal Deep Singh:
FLUIDS: Federated Learning with semi-supervised approach for Intrusion Detection System. 523-524 - Ting Gu, Kiho Lim, Gyu Ho Choi, Xiwei Wang:
A Lidar Information-based Privacy-Preserving Authentication Scheme Using Elliptic Curve Cryptosystem in VANETs. 525-526 - Ofek Bader, Adi Lichy, Chen Hajaj, Ran Dubin, Amit Dvir:
MalDIST: From Encrypted Traffic Classification to Malware Traffic Detection and Classification. 527-533 - Aaron Walker, Raj Mani Shukla, Tapadhir Das, Shamik Sengupta:
Ohana Means Family: Malware Family Classification using Extreme Learning Machines. 534-542 - Ahmed H. Anwar, Charles A. Kamhoua:
Cyber Deception using Honeypot Allocation and Diversity: A Game Theoretic Approach. 543-549 - Abdulaziz Alshaeri, Mohamed F. Younis:
Lightweight Authentication and Authorization Protocol for Dynamic Charging of Electric Vehicles. 550-556 - Ryan Holder, Ramesh Kumar Sah, Michael Cleveland, Hassan Ghasemzadeh:
Comparing the Predictability of Sensor Modalities to Detect Stress from Wearable Sensor Data. 557-562 - Rajpreet Kaur Gulati, Sayemul Islam, Amitangshu Pal, Krishna Kant, Albert Kim:
Characterization of Magnetic Communication Through Human Body. 563-568 - Akira Miyazawa, Tran Phuong Thao, Rie Shigetomi Yamaguchi:
Multi-factor Behavioral Authentication Using Correlations Enhanced by Neural Network-based Score Fusion. 569-577 - Raiful Hasan, Ragib Hasan:
X-Fidence: Post-Pandemic Wellness By Density Monitoring with Privacy Preservation. 578-583 - Huiye Liu, Douglas M. Blough:
Cooperative Task-Oriented Group Formation for Vehicular Networks. 584-592 - Seyhan Ucar, Takamasa Higuchi, Chang-Heng Wang, Duncan Deveaux, Onur Altintas, Jérôme Härri:
Vehicular Knowledge Networking and Mobility-Aware Smart Knowledge Placement. 593-598 - Yue Yin, Tao Yu, Kei Sakaguchi:
Required-Data-Rate-Based Distributed Resource Allocation Scheme for MmWave V2V with Relay. 599-604 - Adam Dean, Brennan Huber, Farah I. Kandah:
Mitigating Location-based Attacks Using Predication Models in Vehicular Ad-Hoc Networks. 605-610 - Dheeraj Kotagiri, Anan Sawabe, Eiji Takahashi, Takanori Iwai, Takeo Onishi, Yoshiaki Nishikawa:
Context-based Mixed-Numerology Profile Selection for 5G and Beyond. 611-616 - Hao Zhou, Melike Erol-Kantarci:
Knowledge Transfer based Radio and Computation Resource Allocation for 5G RAN Slicing. 617-623 - Tobias Sundqvist, Monowar H. Bhuyan, Erik Elmroth:
Unsupervised root-cause identification of software bugs in 5G RAN. 624-630 - Mohamed Sana, Emilio Calvanese Strinati:
Learning Semantics: An Opportunity for Effective 6G Communications. 631-636 - Ali Esmaeily, Katina Kralevska, Toktam Mahmoodi:
Slicing Scheduling for Supporting Critical Traffic in Beyond 5G. 637-643 - Van Sy Mai, Richard J. La, Tao Zhang, Abdella Battou:
End-to-End Quality-of-Service Assurance with Autonomous Systems: 5G/6G Case Study. 644-651 - Fidan Mehmeti, Thomas F. La Porta:
Modeling and Analysis of mMTC Traffic in 5G Base Stations. 652-660 - Priyangshu Sen, Viduneth Ariyarathna, Josep Miquel Jornet:
An Optimized M-ary Amplitude Phase Shift Keying Scheme for Ultrabroadband Terahertz Communication. 661-666 - Yuichi Inagaki, Ryoichi Shinkuma, Takehiro Sato, Eiji Oki:
Data Importance Aware Periodic Machine Learning Model Update for Sparse Mobile Crowdsensing. 667-670 - Mirko Franco, Pietro Giacomazzi, Claudio E. Palazzi:
A Mobile App to Pin Media to the Real World. 671-674 - Masaki Inoue, Suhua Tang, Sadao Obana:
LSTM-Based High Precision Pedestrian Positioning. 675-678 - Tohru Kondo, Hiroki Murakami, Kaori Maeda:
Development of a window positioning method considering network characteristics for a mobile tiled display. 679-682 - Kamran Sayrafian, Brian Cloteaux, Vladimir Marbukh, Christian Emiyah:
Evaluation of the Bluetooth-based Proximity Estimation for Automatic Exposure Determination. 683-686 - Andrea Piras, Silvia Mirri, Mariella Sole, Daniele D. Giusto, Giovanni Pau, Roberto Girau:
Implementation of a sea monitoring system based on social internet of things. 687-690 - Maria Francesca Alati, Giancarlo Fortino, Juan Morales-García, José M. Cecilia, Pietro Manzoni:
Time series analysis for temperature forecasting using TinyML. 691-694 - Daniele Ronzani, Claudio E. Palazzi, Pietro Manzoni:
Bringing MQTT Brokers to the Edge: A Preliminary Evaluation. 695-698 - Lorenzo Gigli, Luca Sciullo, Federico Montori, Alessandro Marzani, Marco Di Felice:
Blockchain and Web of Things for Structural Health Monitoring Applications: A Proof of Concept. 699-702 - Jack Hodgkiss, Soufiene Djahel:
MARS - Towards Mobile Assisted RSSI Secret Key Extraction Strategy in WBANs. 703-706 - Alessandro Ghibellini, Luciano Bononi, Marco Di Felice:
Intelligence at the IoT Edge: Activity Recognition with Low-Power Microcontrollers and Convolutional Neural Networks. 707-710 - Jianyu Wang, Jianli Pan:
MBM-IoT: Intelligent Multi-Baseline Modeling of Heterogeneous Device Behaviors against IoT Botnet. 711-712 - Mehrdad Hajizadeh, Milad Abbaszadeh Jahromi, Thomas Bauschert:
An Unsupervised Ensemble Learning Approach for Novelty-based Botnet Detectors. 713-714 - David Reddick, F. Alex Feltus, Susmit Shannigrahi:
Case Study of Attribute Based Access Control for Genomics Data Using Named Data Networking. 715-716 - Tatsuya Ueki, Kazutoshi Yoshii, Shigeru Shimamoto, Katsunari Mizuno, Kenta Matsufuji:
Evaluation of Impact of Intermediate GPS Spoofing to Mobile Terminals. 717-718 - A. B. M. Mohaimenur Rahman, Yetong Cao, Xinliang Wei, Pu Wang, Fan Li, Yu Wang:
On the Feasibility of Handwritten Signature Authentication Using PPG Sensor. 719-720 - Tekkan Okuda, Hiraku Okada, Hiroki Tanaka, Toshihiro Fujiwara, Nobuo Matsui, Chedlia Ben Naila, Masaaki Katayama:
Propagation Characteristics of 920 MHz band LPWA for Inspections of Power Transmission Lines Using UAVs. 721-722 - Chaima Zoghlami, Rahim Kacimi, Riadh Dhaou:
A Study on Dynamic Collection of Cooperative Awareness Messages in V2X Safety Applications. 723-724 - Abdellah Kaci, Abderrezak Rachedi:
RoofCoin: a blockchain for internet of vehicles based on the ROOF standard and VSN. 725-726 - Meroua Moussaoui, Rachedi Abdennour, Toufik Ahmed, Mohamed Mosbah:
A RAN Slicing Architecture for ITS-G5 Cooperative Intelligent Transport System. 727-728 - Mohammad Aminul Hoque, Md. Mahmud Hossain, Ragib Hasan:
BenchAV: A Security Benchmarking Framework for Autonomous Driving. 729-730 - Mohammad Aminul Hoque, Ragib Hasan:
An Interaction Provenance-based Trust Management Scheme For Connected Vehicles. 731-732 - Calvin Davis, Jaired Collins, Joshua Fraser, Haoxiang Zhang, Shizeng Yao, Emily Lattanzio, Bimal Balakrishnan, Ye Duan, Prasad Calyam, Kannappan Palaniappan:
CAVE-VR and Unity Game Engine for Visualizing City Scale 3D Meshes. 733-734 - Kevin Hoarau, Pierre-Ugo Tournoux, Tahiry Razafindralambo:
Detecting forged AS paths from BGP graph features using Recurrent Neural Networks. 735-736 - Yuta Kakizaki, Koya Sato, Keiichi Iwamura:
Performance of Federated Learning with Local Differential Privacy: Federation or Individualƒ. 737-738 - Masakazu Okamoto, Koya Sato, Keiichi Iwamura:
A Decentralized Machine Learning Scheme with Input Perturbation-Based Differential Privacy. 739-740 - Talip Tolga Sari, Gökhan Seçinti:
CentAir: Centrality Based Cross Layer Routing for Software-Defined Aerial Networks. 741-742 - Yuwei Sun, Hideya Ochiai, Hiroshi Esaki:
Suspicious ARP Activity Detection and Clustering Based on Autoencoder Neural Networks. 743-744 - Paul Cotae, Myong H. Kang, Alexander Velazquez:
A Scalable Real-Time Distributed Multiagent Decision Making Algorithm with Cost. 745-746 - Marco Bertolusso, Michele Spanu, Vlad Popescu, Mauro Fadda, Daniele D. Giusto:
Machine Learning-based Urban Mobility Monitoring System. 747-748 - Rakshitha De Silva, Yushan Siriwardhana, Tharaka Samarasinghe, Madhusanka Liyanage, Mika Ylianttila:
Deployment Options of 5G Network Slicing for Smart Healthcare. 749-750 - Tomoki Sugiura, Keichi Takahashi, Kohei Ichikawa, Hajimu Iida:
Acar: An application-aware network routing system using SRv6. 751-752 - Eranga Bandara, Sachin Shetty, Abdul Rahman, Ravi Mukkamala, Juan Zhao, Xueping Liang:
Bassa-ML - A Blockchain and Model Card Integrated Federated Learning Provenance Platform. 753-759 - Vijay Banerjee, Ryan Rabinowitz, Mark Stidd, Rory A. Lewis, Philip N. Brown, Gedare Bloom:
The Tragedy of the Miners. 760-765 - Sayon Duttagupta, Dave Singelée, Bart Preneel:
T-HIBE: A Novel Key Establishment Solution for Decentralized, Multi-Tenant IoT Systems. 766-774 - Wassila Lalouani, Mohamed F. Younis, Mohammad Ebrahimabadi, Naghmeh Karimi:
Robust and Efficient Data Security Solution for Pervasive Data Sharing in IoT. 775-781 - Nikita Jalodia, Mohit Taneja, Alan Davy, Behnam Dezfouli:
A Residual LSTM based Multi-Label Classification Framework for Proactive SLA Management in a Latency Critical NFV Application Use-Case. 782-789 - Bao Nguyen Trinh, Gabriel-Miro Muntean:
A Deep Reinforcement Learning-based Resource Management Scheme for SDN-MEC-supported XR Applications. 790-795 - Pedro Enrique Iturria-Rivera, Melike Erol-Kantarci:
Competitive Multi-Agent Load Balancing with Adaptive Policies in Wireless Networks. 796-801 - Mengfei Zhu, Fujun He, Eiji Oki:
Robust Function Deployment against Uncertain Recovery Time with Workload-Dependent Failure Probability. 802-807 - Manabu Tsukada, Shimpei Arii, Hideya Ochiai, Hiroshi Esaki:
Misbehavior Detection Using Collective Perception under Privacy Considerations. 808-814 - Shafika Showkat Moni, D. Manivannan:
A lightweight Privacy-Preserving V2I Mutual Authentication Scheme using Cuckoo Filter in VANETs. 815-820 - Alessio Buscemi, Ion Turcanu, German Castignani, Thomas Engel:
On Frame Fingerprinting and Controller Area Networks Security in Connected Vehicles. 821-826 - Wenxin Chen, Yingfei Dong, Zhenhai Duan:
Accurately Redirecting a Malicious Drone. 827-834 - Andreas Ingo Grohmann, Johannes V. S. Busch, Adrian Bretschneider Perez, Christopher Lehmann, Frank H. P. Fitzek:
JAVRIS: Joint Artificial Visual Prediction and Control for Remote-(Robot) Interaction Systems. 835-840 - Israel Elujide, Chunhai Feng, Aref Shiran, Jian Li, Yonghe Liu:
Location Independent Gesture Recognition Using Channel State Information. 841-846 - Nasim Soltani, Yanyu Li, Deniz Erdogmus, Yanzhi Wang, Kaushik R. Chowdhury:
NN-key: A Neural Network-Based Secret Key for Demapping OFDM Symbols. 847-852 - Masayuki Kinoshita, Takumi Toguma, Shun Yamaguchi, Sora Ibaraki, Koji Kamakura, Takaya Yamazato:
Performance Enhancement of Rolling Shutter Based Visible Light Communication via Selective Reception Using Dual Cameras. 853-857 - Tianwen Li, Yukito Onodera, Yu Nakayama, Daisuke Hisano:
Multi-Channel Authentication for Secure D2D using Optical Camera Communication. 858-863 - David Nunez, Francesc Wilhelmi, Stefano Avallone, Malcolm Smith, Boris Bellalta:
TXOP sharing with Coordinated Spatial Reuse in Multi-AP Cooperative IEEE 802.11be WLANs. 864-870 - Rahul Thakur, Swati Agarwal:
Clustering and Transmit Power Control for Social Assisted D2D Cellular Networks. 871-876 - Vincent Charpentier, Erik de Britto e Silva, Seilendria A. Hadiwardoyo, Johann M. Márquez-Barja:
CAMAF: A framework to increase safety on the road. 877-880 - Takamochi Kanda, Takashi Sato, Hiromitsu Awano, Sota Kondo, Koji Yamamoto:
Respiratory Rate Estimation Based on WiFi Frame Capture. 881-884 - Davide Aguiari, Ka-Seng Chou, Rita Tse, Giovanni Pau:
Monitoring Electric Vehicles on The Go. 885-888 - Hinako Ochi, Jiang Liu, Shigeru Shimamoto:
Non-contact Blood Pressure Estimation By Microwave Reflection Employing Machine Learning. 889-892 - Yesin Sahraoui, Ludovica De Lucia, Anna Maria Vegni, Chaker Abdelaziz Kerrache, Marica Amadeo, Ahmed Korichi:
TraceMe: Real-Time Contact Tracing and Early Prevention of COVID-19 based on Online Social Networks. 893-896 - Ryo Kambe, Sumiko Miyata:
A Load Balancing Method Using K-means++ for P2P MMORPGs. 897-900 - Maximiliano Rivera, Mohammad Chegini, Wael Jaafar, Safwan Alfattani, Halim Yanikomeroglu:
Optimization of Quantized Phase Shifts for Reconfigurable Smart Surfaces Assisted Communications. 901-904 - Yuya Miki, Takeshi Kaneko, Ryohei Banno, Kazuyuki Shudo:
An Efficient Range Search Method Utilizing Detour Routes in Skip Graph. 905-908 - Ons Fares, Abdulhalim Dandoush, Nadjib Aitsaadi:
SDN-based Platform Enabling Intelligent Routing within Transit Autonomous System Networks. 909-912 - Maël Guiraud, Brice Leclerc, Olivier Marcé:
An Experimental Platform for Hard TSN. 913-916 - Antonio Petrosino, Giuseppe Piro, Luigi Alfredo Grieco, Gennaro Boggia:
An Optimal Allocation Framework of Security Virtual Network Functions in 6G Satellite Deployments. 917-920 - Taiki Yoshikawa, Hijiri Komura, Ren Goto, Kazushige Matama, Chihiro Nishiwaki, Katsuhiro Naito:
Demonstration of video conferencing tool with overlay network protocol. 921-922 - Pascal Urien:
Demonstrating Internet Of Secure Elements Server. 923-924 - Andreas Ingo Grohmann, Christopher Lehmann, Thomas Höschele, Frank H. P. Fitzek:
BakeryRobot: 5G connected robot for SMEs. 925-926 - Felix Freitag, Pedro Vilchez, Lu Wei, Chun-Hung Liu, Mennan Selimi, Iordanis Koutsopoulos:
Demo: An Experimental Environment Based On Mini-PCs For Federated Learning Research. 927-928 - Keith Erkert, Andrew Lamontagne, Jereming Chen, John Cummings, Mitchell Hoikka, Kuai Xu, Feng Wang:
An End-to-End System for Monitoring IoT Devices in Smart Homes. 929-930 - Raiful Hasan, Ragib Hasan, Tanveer Islam:
Smart City Technology for Disaster Management: Demonstrating the Use of Bluetooth Low Energy (BLE) Beacons for Emergency Alert Dissemination. 931-932 - Huanzhuo Wu, Yunbin Shen, Máté Tömösközi, Giang T. Nguyen, Frank H. P. Fitzek:
Demonstration of In-Network Audio Processing for Low-Latency Anomaly Detection in Smart Factories. 933-934 - Vincent Charpentier, Erik de Britto e Silva, Seilendria A. Hadiwardoyo, Nina Slamnik-Krijestorac, Johann M. Márquez-Barja:
Experiencing CAMAF for safer smart mobility. 935-936 - Yoshihisa Kondo, Hiroyuki Yomo, Hiroyuki Yokoyama:
Demonstration of Multi-Diversity WLAN Supporting Low-latency and Seamless Video Streaming. 937-938 - Máté Tömösközi, Maroua Taghouti, Huanzhuo Wu, Frank H. P. Fitzek:
Bitteiler: Demonstration of Efficient and Private Massive Industrial IoT Communications. 939-940 - Nina Slamnik-Krijestorac, Paola Soto-Arenas, Miguel Camelo Botero, Luca Cominardi, Steven Latré, Johann M. Márquez-Barja:
Realistic Experimentation Environments for Intelligent and Distributed Management and Orchestration (MANO) in 5G and beyond. 943-944 - Ryoga Seki, Daichi Kominami, Hideyuki Shimonishi, Masayuki Murata, Masaya Fujiwaka:
Object Estimation Method for Edge Devices Inspired by Multimodal Information Processing in the Brain. 945-946 - Jonathan Hunter, Brennan Huber, Farah I. Kandah:
Towards feasibility of Deep-Learning based Intrusion Detection System for IoT Embedded Devices. 947-948 - Pascal Urien:
Towards Internet Of Secure Elements. 949-950 - Lijun Dong, Richard Li:
Latency Guarantee Service Slice in 5G and Beyond. 951-952 - Kien Nguyen, Phi Le Nguyen, Hiroo Sekiya:
A Host-based Investigation of IPv6 in Academia: The Cases of Japan and Vietnam. 953-954 - Abdallah S. Abdallah, Marcos F. B. de Abreu, Flávio H. T. Vieira, Kleber Vieira Cardoso:
Toward Secured Internet of Things (IoT) Networks: A New Machine Learning based Technique for Fingerprinting of Radio Devices. 955-956 - Carolina Gonçalves, Bruno Sousa, Nuno Antunes:
BIANFE: Object identification and authentication in federated scenarios. 957-958 - Weiran Yuan, Kazuki Maruta, Yu Nakayama, Daisuke Hisano, Kei Sakaguchi:
Image Size Reduction by Road-Side Edge Computing for Wireless Relay Transmission and Object Detection. 959-960 - Jens Wagner, Helmuth Morath, Jiajing Zhang, Florian Wieczorek, Lisa Lüneburg, Frank H. P. Fitzek, Giang T. Nguyen:
Tactile Electronics Meets Softwarised Networks. 961-962 - Zeynep Dündar, Oguzhan Kocatürk, Gökhan Seçinti:
EmergencyBlock: A Blockchain-based Public Emergency Alert System. 963-964 - Anindo Mahmood, Kevin Ramirez Reynoso, Mostafizur Rahman, Sheikh Ariful Islam:
Multi-Operator Intelligent UAV Delivery Networks in Beyond Visual Line of Sight Operations. 965-966 - Aviv Yehezkel, Eyal Elyashiv, Sharon Barkai:
Using CFN for Uniform Sampling of Cloud-Native Datacenters. 967-968
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.