default search action
ICNC 2024: Big Island, HI, USA
- International Conference on Computing, Networking and Communications, ICNC 2024, Big Island, HI, USA, February 19-22, 2024. IEEE 2024, ISBN 979-8-3503-7099-7
- Erkan Karakus, Tao Wei, Qing Yang:
Machine Learning in Sensors for Collision Avoidance. 1-5 - Kwame Assa-Agyei, Kayode Owa, Funminiyi Olajide, Tawfik Al Hadhrami:
A Multi-Chaotic Key Expansion for Advanced Encryption Standard (AES) Algorithm. 1-7 - Abdullatif Albaseer, Moqbel Hamood, Mohamed M. Abdallah:
Adaptive Honeypot Defense Deployment: A Stackelberg Game Approach with Decentralized DRL for AMI Protection. 1-5 - Ahmed Nada, Min Chen:
Visual Question Answering. 6-10 - Ved Dharkar, Suman Kumar:
On the Experimental Performance Measurement of Quantum Teleportation. 11-15 - Kaitai Tong, Junbin Zhang, Yixiao Wang, Hamid Reza Tohidypour, Panos Nasiopoulos:
A High-Fidelity Partial Face Manipulation Dataset for Enhanced Deepfake Detection. 16-20 - Shoya Imanaka, Akio Kawabata, Bijoy Chand Chatterjee, Eiji Oki:
Algorithm for Server Allocation in Delay-Sensitive Internet-of-Things Monitoring Services. 21-25 - Baker Al Smadi, William B. Glisson, Majd Tahat, Hosam Alamleh, Ali Abdullah S. AlQahtani:
Credit Card Transactions Fraud Detection for Multiple Consumer Behaviors. 26-32 - Pascal Urien:
Revisiting Multi-Factor Authentication Token Cybersecurity: A TLS Identity Module Use Case. 33-38 - Arghavan Ayoughi, Chi Zhang, Stephen Okeleke, Shufei Li, Wei Xin, Yuhan Yue, Ania Aibin, Michal Aibin:
Dragonfly Algorithm Application for Solving the Nurse Scheduling Problem. 39-43 - Yameng Cao, Di Zhang, Hanyu Zhang, Yan Ling Xue:
Multi-Task Optical Performance Monitoring Using a Transfer Learning Assisted Cascaded Deep Neural Network in WDM Systems. 44-47 - Madhurima Ganguly, Abhijan Bhattacharyya, Ashis Sau, Suraj Kumar Mahato:
Synergized QoE-Centric Streaming for Telerobotics. 48-54 - Rui Xu, Gaolei Li, Yuchen Liu, Yue Zhao, Jiawen Kang, Jianhua Li:
Regulating Covert Communication Capacity with Full-Duplex Receiver Against Location-Uncertain Eavesdropper. 55-59 - Liudong Zuo, Daqing Yun:
Optimal Balancing of Data Transfer Time and Cost in High-Performance Networks. 60-64 - Zihe Yi, Lin Chen:
Path Computation in Multi-Switching Multi-Layer Networks. 65-69 - Gavin Black, William McCullough, Paul F. Roysdon:
Security Dataset Augmentation Invariance and Distribution Independence. 70-75 - Hao-Tse Chiu, Shuhei Saito, Keita Kuriyama, Kentaro Tanaka, Hitoshi Hasegawa, Toshifumi Miyagi, Takeshi Onizawa, Fumiaki Maehara:
Performance Evaluation of MIMO-FTN Signaling under Multipath Fading Channels with PA Non-Linearity. 76-80 - Xiaoying Han, Xiaohua Xu:
Multi-armed Bandit Algorithm for Online Offloading and Scheduling in Edge Computing Environment. 81-87 - Ömer Gençay, Alperen Balci, Elif Tugce Ceran, Elif Uysal:
Ensuring a Semantically Effective IoT Network Through Blockchain with Delayed Feedback. 88-92 - Akito Sasahara, Fumiya Yamaguchi, Da Li, Mayumi Ueda, Shinsuke Nakajima:
An Impression-Based Video Analysis Method for Video Recommender Systems. 93-99 - Ritayan Biswas, Joonas Säe, Juho Pirskanen, Jukka Lempiäinen:
Reliable and Low-Latency Communications for Critical Infrastructures Utilizing Wireless Mesh Networks. 100-105 - Sheng-Wei Wang:
Selfish Mining Attacks in Sharded Blockchains. 106-110 - Sheng-Wei Wang:
A Game Theory Based Rational Mining Strategy in Blockchains With Multiple Rational Miners. 111-115 - Peng Liu, He Wang, Chen Zheng, Yuqing Zhang:
Prompt Fix: Vulnerability Automatic Repair Technology Based on Prompt Engineering. 116-120 - Shimin Chen, Lingyun Zhou, Rui Hou:
A Segmentation-Based Data Contention Resolution Method For Optical Named Data Networking. 121-126 - Yanfei Lu, Qing Li, Qinghe Gao, Yingzhen Wu, Yan Huo, Tao Jing:
Capacity Improvement with NOMA-CI Precoding for MU-MISO Downlink Systems. 127-132 - Fei Wang, Rui Hou:
Delayed Broadcast-Based Data Forwarding Strategy for Vehicular Named Data Networks. 133-138 - Ahmed Abdelmoamen Ahmed, Bernard Nyarko:
Smart-Watcher: An AI-Powered IoT Monitoring System for Small-Medium Scale Premises. 139-143 - Soon-Soo Oh, Dong-Woo Kim:
Measurements of Shadowing Loss at 3 and 7 GHz for Small-Cell Planning in University Building. 144-147 - Ziqiu Zheng, Xuejun Li, He Wang, Gaofei Wu, Yuqing Zhang:
Research on SSL/TLS Security Differences Based on RFC Documents. 147-151 - Yixiao Wang, Zhe Li, Guowei Guan, Yipin Sun, Chunyu Wang, Hamid Reza Tohidypour, Panos Nasiopoulos, Victor C. M. Leung:
Weighted Multi-Task Vision Transformer for Distraction and Emotion Detection in Driving Safety. 152-156 - Fumiya Yamaguchi, Da Li, Mayumi Ueda, Shinsuke Nakajima:
A Product Feature Mentioned Timestamp Extraction Method in Review Videos for Online Shopping. 157-162 - Christopher J. Hansen:
Semi-Blind Channel Estimation on 802.11 OFDM Data Symbols. 163-167 - Dhruv Nandakumar, Devin Quinn, Elijah Soba, Eunyoung Kim, Christopher Redino, Chris Chan, Kevin Choi, Abdul Rahman, Edward Bowen:
Foundational Models for Malware Embeddings Using Spatio-Temporal Parallel Convolutional Networks. 168-174 - Razvan Cristian Voicu, Aarush Kaunteya Pande, Muhammad Hassan Tanveer, Yusun Chang:
Communication Interchange for Artificial Intelligence Systems. 175-181 - Fatemeh Zahra Safaeipour, Morteza Hashemi:
Semantic-Aware and Goal-Oriented Communications for Object Detection in Wireless End-to-End Image Transmission. 182-187 - Fabrice Mvah, Vianney Kengne Tchendji, Clémentin Tayou Djamégni, Ahmed H. Anwar, Deepak K. Tosh, Charles A. Kamhoua:
Deception-Based IDS Against ARP Spoofing Attacks in Software-Defined Networks. 188-192 - Ahmed Abdelmoamen Ahmed, Jamil Ahmed:
An Image-Based Plant Weed Detector Using Machine Learning. 193-197 - Jinshui Huang, Jun Wang, Qing Li, Xiaoman Jin:
Social Media Development and Multi-Modal Input for Stock Market Prediction: A Review. 198-202 - Mark Maldonado, Caleb Johnson, Manbir Gulati, Todd Jaspers, Paul F. Roysdon:
Advanced Cyber Deception Framework (ACDF): A Comprehensive Study. 203-208 - Yifei Song, Juan Roa, Renjian Zhao, Zhigang Rong, Weimin Xiao, Jalal Jalali, Baoling Sheen:
Variable Code Size Autoencoder (VCSA) Meets CSI Compression in Model Generalization. 209-214 - Baisakhi Chatterjee, Rudra Dutta:
Guaranteeing Partial State Synchronization for UAV Platoon Under Message or UAV Loss. 215-220 - Yong Wang, Bhaskar Prasad Rimal, Carson Koball, Michael Fahnlander, Julia Scheaffer, Joshua Hammrich, Paolo Gentry, Dylan Westlund, Tyler Salmen, Connor Ford:
A Comprehensive Study of Supervised Machine Learning Assisted Approaches for IoT Device Identification. 221-227 - Abdulmajeed Alanazi, Khairi Hamdi:
Performance of SPAD-Detector in The Presence of Atmospheric Turbulence. 228-232 - Kylie McClanahan, Qinghua Li:
Towards Automatically Matching Security Advisories to CPEs: String Similarity-based Vendor Matching. 233-238 - William Cassel, Nahid Ebrahimi Majd:
A Lightweight Obfuscated Malware Multi-class Classifier for IoT Using Machine Learning. 239-243 - Tejesh Radhakrishna, Nahid Ebrahimi Majd:
Edge Computing Ransomware Detection in IoT Using Machine Learning. 244-248 - Mirei Onodera, Akira Hirano:
Real-Time Detection of Optical Cross-Talk for Autonomous Network Diagnosis. 249-253 - Md. Shamim Towhid, Nasik Sami Khan, Md Mahibul Hasan, Nashid Shahriar:
Towards Effective Network Intrusion Detection in Imbalanced Datasets: A Hierarchical Approach. 254-258 - Liang Zhang, Bijan Jabbari:
Machine Learning for Caching Placement in Edge Computing Networks. 259-264 - Katsuyuki Yamauchi, Da Li, Panote Siriaraya, Yukiko Kawai, Shinsuke Nakajima:
Enhancing Walking Experience: A Walking Route Recommendation System Considering Nearby Spots. 265-270 - Bingyan Li, Weiliang Liu, Salim Nader, Jiaqi Song, Chengyu Zhang, Michal Aibin:
Cloud Load Balancing Algorithms Performance Evaluation Using a Unified Testing Platform. 271-277 - Kalon M. Bienz, Behnam Ghalamchi:
Wireless Instant Fault Detection Through Finite-Element Trained Machine Learning. 278-283 - Pankaj Singh, Su-Jin Kim, Sung-Yoon Jung:
Nanocommunication: PHY Advancements in Electromagnetic and Molecular Approaches. 284-290 - Hovannes Kulhandjian, Brian Irineo, Jacob Sales, Michel Kulhandjian:
Low-Cost Tree Health Categorization and Localization Using Drones and Machine Learning. 296-300 - Hovannes Kulhandjian, Jose Maciel Torres, Nicholas Amely, Cruz Nieves, Christian Reeves, Michel Kulhandjian:
AI-based Road Inspection Framework Using Drones with GPS-less Navigation. 301-305 - Morgane Joly, Éric Renault, Fabian Rivière:
Classification of BLE Packet According to AGC Index with Detection of Non-Ideal Reception Cases. 306-310 - Krishna Murthy Kattiyan Ramamoorthy, Wei Wang, Kazem Sohraby, Yanxiao Zhao:
Proof-of-QoE NOMA Token: A Crypto Rewarding Concept to Incentivize Local Relay In Non-Orthogonal Multiple Access Wireless Networks. 311-315 - Shi Zhou, Qingchun Chen, Yaxuan Chen, Lei Zheng:
AoI-Aware Adaptive Relaying in Buffer-Aided Wireless-Powered NOMA Network with Random Arrivals. 316-322 - Yuta Hayashi, Toshihiko Nishimura, Takanori Sato, Yasutaka Ogawa, Takeo Ohgane:
Performance Evaluation of Loose Beamforming Using Direct-Binary Search in Massive MIMO Systems. 323-328 - Zhi-Xiang Wang, Jia Hou:
Performance Analysis of High-Dimensional NOMA System with In-Phase/ Quadrature Index Modulation. 329-333 - Gosan Noh:
Effect of Beam Broadening in Directional Beamforming-Based Cellular Networks. 334-338 - Thara Son, Sooyoung Kim:
An Efficient PLS Scheme for Coded MIMO Systems Under Imperfect Channel Estimation. 339-343 - Koki Muramatsu, Yoshihiko Uematsu, Satoru Okamoto, Naoaki Yamanaka:
Edge Computing That Utilizes In-Network CPUs to Achieve High Capacity and Interruption Tolerance With Fewer Edge Servers. 344-348 - Chenqi Li, Jingtao Yao:
Incorporating Game Theory with Soft Sets. 349-354 - Xinyi Wu, Deli Qiao:
DRL-Based Energy Efficient Power Adaptation for Fast HARQ in the Finite Blocklength Regime. 355-360 - Jun Saito, Takanori Hara, Kenichi Higuchi:
Peak Cancellation Signal-Based Parallel PAPR Reduction Method Using Low-Dimensional Null Space in Massive MIMO-OFDM. 361-365 - Hiroki Fujimoto, Takanori Hara, Kenichi Higuchi:
Transmitter Filtering-aided Sparse Activity Detection for TDD-based Random Access. 366-370 - Orhan Tahir Yavascan, Mutlu Ahmetoglu, Elif Uysal, Umut Gurbuz, Ömer Gençay, Alperen Balci:
DCCTA: Age of Information in Slotted ALOHA Under Duty Cycle Constraints. 371-375 - Ricardo Lent:
Multi-Objective Cognitive Routing in Space DTNs. 376-381 - Yuhang Liu, Xiaosong Yu, Yongli Zhao, Avishek Nag:
Power-scheduled Routing Strategy for Quantum Key Distribution over Classical Optical Networks. 382-386 - Priva Chassem Kamdem, Alain B. Zemkoho, Laurent Njilla, Marcellin Nkenlifack, Charles A. Kamhoua:
Bayesian Game for Cyber Deception Against Remote Attack on Automotive Systems. 387-393 - Fernanda Famá, Charalampos Kalalas, Sandra Lagén, Paolo Dini:
Measuring Data Similarity for Efficient Federated Learning: A Feasibility Study. 394-400 - Sommer Harris, Jaelyn Ma, Meet Patel, Kshitij Nair, Niranjan Velraj, Michal Aibin:
Infrastructure Cost Analysis for Running Timetabling Software Using Various Deployment Architectures in the Cloud. 401-406 - Brenda G. Gouveia, Iandra Galdino, Egberto Caballero, Julio C. H. Soto, Taiane Coelho Ramos, Raphael Guerra, Débora C. Muchaluat-Saade, Célio Vinicius N. Albuquerque:
Parameter tuning for accurate heart rate measurement using Wi-Fi signals. 407-411 - Ali Owfi, Ali Abbasi, Fatemeh Afghah, Jonathan D. Ashdown, Kurt A. Turck:
Dynamic Online Modulation Recognition using Incremental Learning. 412-416 - Xinyu Zhang, Long Li, Lina Pu, Jing Yang, Zichen Wang, Rong Fu, Zhipeng Jiang:
Deep Learning-based Malicious Energy Attack Detection in Sustainable IoT Network. 417-422 - Sathvik Murli, Dhruv Nandakumar, Prabhat Kumar Kushwaha, Cheng Wang, Christopher Redino, Abdul Rahman, Shalini Israni, Tarun Singh, Edward Bowen:
Cross-Temporal Detection of Novel Ransomware Campaigns: A Multi-Modal Alert Approach. 423-429 - Shuva Paul, Sanjana Vijayshankar, Richard Macwan:
Demystifying Cyberattacks: Potential for Securing Energy Systems With Explainable AI. 430-434 - Siamak Azadiabad, Ferhat Khendek:
Managing Failures and Service Quality in the Context of NFV. 435-440 - Md Faishal Yousuf, Shaad Mahmud:
Generating Synthetic Time-Series Data on Edge Devices Using Generative Adversarial Networks. 441-445 - Souryendu Das, Stavros Kalafatis:
Speed Testing for Measuring Network Traffic in a Smart Network Switch. 446-450 - Jian Liu, Chin-Tser Huang:
Adaptive Channel Switching for Connected Vehicles under Extreme Weather Conditions: A Reinforcement Learning Based Approach. 451-455 - Elisabeth Tchaptchet, Elie Fute Tagne, Jaime C. Acosta, Danda B. Rawat, Charles A. Kamhoua:
Detecting Deepfakes Using GAN Manipulation Defects in Human Eyes. 456-462 - Ekramul Haque, Kamrul Hasan, Imtiaz Ahmed, Md. Sahabul Alam, Tariqul Islam:
Enhancing UAV Security Through Zero Trust Architecture: An Advanced Deep Learning and Explainable AI Analysis. 463-467 - Jie Li, John D. Leidel, Brian Page, Yong Chen:
Towards Cycle-accurate Simulation of xBGAS. 468-472 - Yong Xue, Alexander Brodsky, Daniel A. Menascé:
GRASP and ILS Based Meta-Heuristic Approximation Algorithms for Optimal Virtual Network Synthesis (VNS) in Multi-AS Environment. 473-479 - Junxiu Zhou, Yangyang Tao:
WGAN-Based Oversampling for QoS-Aware M2M Network Power Allocation. 480-484 - Mahmudul Hasan, Sachin Shetty:
Sentiment Analysis With Lipschitz Recurrent Neural Networks Based Generative Adversarial Networks. 485-489 - Andy Neparidze, Ahmed Amine Mchayaa, Julian David Schäfer, Daniel Silhavy, Robert Seeliger, Stephan Steglich, Stefan Arbanowski:
Deep Explainable Content-Aware Per-Scene Video Encoding. 490-494 - Lan Luo, Christopher Morales-Gonzalez, Shan Wang, Zhen Ling, Xinwen Fu:
Unified View of IoT and CPS Security and Privacy. 495-499 - Amar Sinha, Anmol Agrawal, Sandip Roy, Venkanna Uduthalapally, Debanjan Das, Rajarshi Mahapatra, Sachin Shetty:
AnDet: ML-Based Anomaly Detection of UEs in a Multi-cell B5G Mobile Network for Improved QoS. 500-505 - Sayyed Farid Ahamed, Kazi Aminul Islam, Sachin Shetty:
Targeted Transfer Learning: Leveraging Optimal Transport for Enhanced Knowledge Transfer. 506-510 - Tatsuya Otoshi, Masayuki Murata:
Beamforming with Free Energy Principle under Hierarchical Codebook. 511-517 - Kyota Hattori, Tomohiro Korikawa, Chikako Takasaki:
Trend Encoder with Attentive Neural Process: Node Performance Extrapolation for Non-Time-Series Datasets. 518-522 - Hongwei Li, Danai Chasaki:
Heterogeneous GNN with Express Edges for Intrusion Detection in Cyber-Physical Systems. 523-529 - Jialong Zhou, Yuni Lai, Jian Ren, Kai Zhou:
Black-Box Attacks Against Signed Graph Analysis via Balance Poisoning. 530-535 - Christopher Morales-Gonzalez, Matthew Harper, Michael Cash, Qun Zhou Sun, Xinwen Fu:
On Building Automation Systems and Attacks. 536-542 - Nariman Torkzaban, Anousheh Gholami, John S. Baras:
On the Importance of Trust in Next-Generation Networked Cyber-Physical Systems. 543-548 - Jian Ren, Tongtong Li:
Privacy-Preserving Characterization and Data Publishing. 549-553 - Bo Sullivan, Junaid Ahmed Khan:
OBSERVE: Blockchain-Based Zero Trust Security Protocol for Connected and Autonomous Vehicles (CAVs) Data Using Simple Machine Learning. 554-559 - Yu Zhang, Wei Lin, Sisi Chen, Qingyu Song, Jiaxun Lu, Yunfeng Shao, Bei Yu, Hong Xu:
Fed2Com: Towards Efficient Compression in Federated Learning. 560-566 - Yangyang Tao, Junxiu Zhou:
Straggler Mitigation in Edge Computing with Coded Compressed Sensing. 567-572 - Toru Furusawa, Akihiro Nakao:
Cooperative Load Balancing of Neighboring Edge Clouds with LISP. 573-578 - Talha Siddique, Shaad Mahmud:
A Surrogate Tiny Machine Learning Model of Variational Autoencoder For Real-Time Baseline Correction of Magnetometer Data. 579-583 - Arisa Tsuji, Masato Oguchi:
Comparison of FHE Schemes and Libraries for Efficient Cryptographic Processing. 584-590 - Lijun Dong, Richard Li:
Characteristics Aware Video Packet Dropping and Packet Wash. 591-597 - Carl C. Udora, Peng Qian, Sweta Anmulwar, Anil Fernando, Ning Wang:
Quality of Experience Modelling and Analysis for Live Holographic Teleportation. 598-604 - Akihiro Kuwabara, Yutaro Osako, Sorachi Kato, Takuya Fujihashi, Toshiaki Koike-Akino, Takashi Watanabe:
Implicit Neural Representation-Based Hybrid Digital-Analog Image Delivery. 605-610 - Puning Zhang, Changfeng Liu, Honggang Wang, Dapeng Wu, Ruyan Wang, Hong Zou:
Context-Aware Edge-Cloud Collaborative Scene Text Recognition. 611-617 - Kun Hua, Hansong Xu, Tigang Jiang:
A Secure and Robust ECG Signal Transmission System for Cardiac Arrhythmia Identification. 618-623 - Shinsuke Bannai, Katsuya Suto:
Stereo-Aided Blockage Prediction for mmWave V2X Communications. 624-628 - Wenhan Zhang, Marwan Krunz, Md. Rabiul Hossain:
CyPA: A Cyclic Prefix Assisted DNN for Protocol Classification in Shared Spectrum. 629-634 - Soumya Banerjee, Sandip Roy, Sayyed Farid Ahamed, Devin Quinn, Marc Vucovich, Dhruv Nandakumar, Kevin Choi, Abdul Rahman, Edward Bowen, Sachin Shetty:
MIA-BAD: An Approach for Enhancing Membership Inference Attack and its Mitigation with Federated Learning. 635-640 - Ryan Kerr, Steven H. H. Ding, Li Li, Adrian Taylor:
Accelerating Autonomous Cyber Operations: A Symbolic Logic Planner Guided Reinforcement Learning Approach. 641-647 - Zhu Lin Tao, Jia Hou:
Design of Smoothed L0 UnfoldingNet Architecture for OFDM Channel Estimation. 648-652 - Eranga Bandara, Sachin Shetty, Abdul Rahman, Ravi Mukkamala, Peter Foytik, Xueping Liang:
RMF-GPT - OpenAI GPT-3.5 LLM, Blockchain, NFT, Model Cards and OpenScap Enabled Intelligent RMF Automation System. 653-658 - Jiayue Zhou, Jianan Hong, Chengchen Zhu, Futai Zou, Cunqing Hua:
Trustful Blockchain-Enabled Identity Management for VANET with Short-Latency Authentication. 659-663 - Kylie McClanahan, Sky Elder, Marie Louise Uwibambe, Yaling Liu, Rithyka Heng, Qinghua Li:
When ChatGPT Meets Vulnerability Management: The Good, the Bad, and the Ugly. 664-670 - Rana Abou Khamis, Ashraf Matrawy:
Could Min-Max Optimization be a General Defense Against Adversarial Attacks? 671-676 - Wenjun Fan, Siyuan Wu, Hao Chen:
An SDN-Enabled Elliptic-Curve Diffie-Hellman Key Exchange Towards Secure P2P Networking. 677-683 - Biagio Boi, Christian Esposito:
Decentralized Authentication for Web of Things: a Self-Sovereign Identity (SSI)-Based Solution. 684-688 - Abdelkareem Jaradat, Hanan Lutfiyya, Anwar Haque:
Synthetic Power Consumption Data Generation For Appliance Operation Modes. 689-694 - Jihwan Kim, Dongmin Shin, Chang-Gun Lee:
Mitigating Pessimism for Guaranteeing Safety Despite Physical Errors in CPS's. 695-699 - Duong Thuy Anh Nguyen, Jiaming Cheng, Ni Trieu, Duong Tung Nguyen:
Optimal Workload Allocation for Distributed Edge Clouds with Renewable Energy and Battery Storage. 700-705 - Vincent Latzko, Christian Vielhaus, Mahshid Mehrabi, Frank H. P. Fitzek:
Accelerator-Aware Computation Offloading Under Timing Constraints. 706-710 - Lutong Chen, Kaiping Xue, Jian Li, Zhonghui Li, Nenghai Yu:
Security-Enhanced WireGuard Protocol Design Using Quantum Key Distribution. 718-723 - Dongxiao Yu, Kaiyi Zhang, Youming Tao, Wenlu Xu, Yifei Zou, Xiuzhen Cheng:
Correlation-Aware and Personalized Privacy-Preserving Data Collection. 724-729 - Thomas Reisinger, Eerke Albert Boiten, Isabel Wagner:
SEPPI: Secure and Privacy-Preserving Invitation for Unified Communication Meetings. 730-736 - Raoul Raftopoulos, Salvatore D'Oro, Tommaso Melodia, Giovanni Schembra:
DRL-Based Latency-Aware Network Slicing in O-RAN with Time-Varying SLAs. 737-743 - Lihao Zhang, Haijian Sun, Jin Sun, Rose Qingyang Hu:
WiSegRT: Dataset for Site-Specific Indoor Radio Propagation Modeling with 3D Segmentation and Differentiable Ray-Tracing: (Invited Paper). 744-748 - Praveen Fernando, Jin Wei-Kocsis:
QoE-Aware Airborne Communication Infrastructure for Surveillance in Wildfires. 749-753 - Zhiwu Guo, Wenhan Zhang, Ming Li, Marwan Krunz, Mohammad Hossein Manshaei:
DL-SIC: Deep Learning Aided Successive Interference Cancellation in Shared Spectrum. 754-760 - Muhammad Enayetur Rahman, Md. Shirajum Munir, Sachin Shetty:
An Attention-based AI Model for 3D Beam Prediction in THz Unmanned Aerial Vehicle Communication. 761-766 - Hovannes Kulhandjian, Yue Yang, Nicholas Amely:
Design and Implementation of a Smart Agricultural Robot bullDOG (SARDOG). 767-771 - Pavlos Doanis, Thrasyvoulos Spyropoulos:
Multi-Agent DQN with Sample-Efficient Updates for Large Inter-Slice Orchestration Problems. 772-777 - Ting-Li Huoh, Timothy Miskell, Onur Barut, Yan Luo, Peilong Li, Tong Zhang:
Malware Detection for Portable Executables Using a Multi-input Transformer-Based Approach. 778-782 - Zhuosheng Zhang, Noor Ahmed, Shucheng Yu:
QE-DBA: Query-Efficient Decision-Based Adversarial Attacks via Bayesian Optimization. 783-788 - Jian Ren, Tongtong Li:
Graph Isomorphism-Characterization and Efficient Algorithms. 789-793 - Mingjin Zhang, Jiannong Cao, Yuvraj Sahni, Xiangchun Chen, Shan Jiang:
Resource-efficient Parallel Split Learning in Heterogeneous Edge Computing. 794-798 - Hongyang Du, Ruichen Zhang, Dusit Niyato, Jiawen Kang, Zehui Xiong, Dong In Kim:
Reinforcement Learning with Large Language Models (LLMs) Interaction for Network Services. 799-803 - Xiaonan You, Shengli Zhang, Taotao Wang, Soung Chang Liew:
Hyperclique: A Novel P2P Network Structure for Blockchain Systems. 804-809 - Justin Presley, Xi Wang, Xusheng Ai, Tianyuan Yu, Tym Brandel, Proyash Podder, Varun Patil, Alex Afanasyev, F. Alex Feltus, Lixia Zhang, Susmit Shannigrahi:
Hydra: A Scalable Decentralized P2P Storage Federation for Large Scientific Datasets. 810-816 - Richard Vogel, Robert Manthey, Matthias Baumgart, Christian Roschke, Marc Ritter, Matthias Vodel:
Tamperproof Data Transmission to Offline IoT Devices in a Zero-Trust Environment. 817-822 - Guanglin Xing, Xiaoqi Li, Rui Hou:
A Reconstruction Forest-Based Interest Flooding Attack Detection Method in Named Data Networking. 823-829 - Yusaku Hayamizu, Hitoshi Asaeda:
Multicast Service Deployment Using Information Centric Cloud-Native Network Functions. 830-835 - Tatsuya Otoshi, Masayuki Murata:
Distributed Beamforming by Multi-Agent Active Inference. 836-842 - Vanlin Sathya, Aasawaree Deshmukh, Manan Shah, Mehmet Yavuz:
Battery Life: Performance Analysis and Comparison between Wi-Fi, CBRS, and Macro Deployment System. 843-849 - Tomohiro Korikawa, Chikako Takasaki, Kyota Hattori, Hidenari Oowada:
A Routing Method with Link Information-based Rule Selection in Non-Terrestrial Networks. 850-855 - Jingjing Yao, Semih Cal, Xiang Sun:
Reliability-Aware Offloading in UAV-Aided Mobile Edge Network by Lyapunov Optimization. 856-861 - Mohammad Hossein Manshaei, Marwan Krunz, Amal Yousseef:
Performance Evaluation of DSRC and C-V2X Coexistence in the 5.895-5.925 GHz Spectrum. 862-867 - Ali Ehsanian, Thrasyvoulos Spyropoulos:
Distributed LSTM-based Slice Resource Allocation for Beyond 5G Networks. 868-874 - Jovita Mateus, Guy-Alain Lusilao Zodi, Antoine B. Bagula:
Federated Learning-Based Solution for DDoS Detection in SDN. 875-880 - Yuzhu Zhang, Hao Xu:
Optimal Dynamic Resource Allocation for Multi-RIS Assisted Wireless Network: A Causal Reinforcement Learning Approach. 881-885 - Ankan Dash, Jingyi Gu, Guiling Wang, Nirwan Ansari:
Self-Supervised Learning for User Localization. 886-890 - Khaled Sabahein, Feng Wang, Zhonghui Wang:
An Actor-Critic Approach for Resource Allocation in Energy Harvesting-Powered Wireless Body Area Network. 891-897 - Jiahui Jin, Ting Li:
Participation Selection in Mobile Crowd Sensing with Diversity Ensures. 898-902 - Wei Chen, Xiaotian Xu, Cong Hou, Ranxin Gao, Guanlin Si, Yue Zhang:
An Authorizable Threshold Signature Scheme for Secure Sharing and Mining of Power IoT Data. 903-909 - Shuo Wang, Chen Sun, Haojin Li, Tao Cui:
Cross-Tier Coordination in Spectrum Sharing: A Blockchain Approach. 910-914 - Shulei Zeng, Yao Sun, Mugen Peng:
Blockchain-Assisted Cross-Domain Data Governance for Social Computing. 915-920 - Ece Bingöl, Eylem Ekici:
mmWave Beam Selection in Dynamic Multi-Path Environments: A POMDP Approach. 921-926 - Tianyuan Yu, Zhaoning Kong, Xinyu Ma, Lan Wang, Lixia Zhang:
PythonRepo: Persistent In-Network Storage for Named Data Networking. 927-931 - Darius Saif, Ashraf Matrawy:
Mass Configuration of Heterogeneous IIoT Nodes: A Proposal and Experimental Evaluation. 932-937 - Kohei Okazaki, Junichi Funasaka:
Implementation of Proxy to Make Content Shared on BitTorrent Retrievable from CCN. 938-943 - Vanlin Sathya, Aasawaree Deshmukh, Mohit Goyal, Mehmet Yavuz:
Roaming Performance Analysis and Comparison Between Wi-Fi and Private Cellular Network. 944-950 - Lihua Ruan, Hongyi Zhu:
A Hybrid Fiber-Femtocell Indoor Network to Support Low-Latency and High-Bandwidth Indoor Communication Applications. 951-956 - Shunsuke Fujio, Kazuyuki Ozaki:
Radio Propagation Environment Prediction Method for UAV-Assisted Cellular Networks with Millimeter-Wave Beamforming. 957-961 - Muztaba Fuad, Anthony Smith, Debzani Deb:
A Mobile App-Based Indoor Mobility Detection Approach Using Bluetooth Signal Strength. 962-968 - Tan-Jan Ho, Hua-Yu Luo:
A Min-Max Approximation-Based SDP Approach to Robust Vehicle Location Estimation in VANETS. 969-973 - Nadieh Moghadam:
Detecting and Counteracting Adversaries in Wireless Multicast over Fading Channels. 974-977 - Abigail O. Oyekola, Imtiaz Ahmed, Danda B. Rawat, Ramesh Annavajjala, Sachin Shetty:
Data-Driven Joint Demodulation and Decoding in THz Communication Systems. 978-983 - Hovannes Kulhandjian, Brandon Poorman, Javier Gutierrez, Michel Kulhandjian:
AI-powered Emergency Keyword Detection for Autonomous Vehicles. 984-988 - Sai Sharanya Yellampalli, Mikulas Chalupa, Jingyi Wang, Hyo Jung Song, Xinyue Zhang, Hao Yue, Miao Pan:
Client Selection in Federated Learning: A Dynamic Matching-Based Incentive Mechanism. 989-993 - Chia-Yu Lin, Chih-Hung Han, Wei-Chih Yin, Ted T. Kuo:
A Cluster-based Privacy-Enhanced Hierarchical Federated Learning Framework with Secure Aggregation. 994-999 - Aidan Samuel Wright, Sandeep John Philip, Xiaomin Ma:
Constrained Bayesian Optimization of VANET Safety Messaging Using Deep Learning Neural Networks. 1000-1005 - Ruixin Li, Chun Wang, Zibin Zheng, Huawei Huang:
Enhancing Federated Learning with Self-Determining Mechanism in MEC. 1006-1010 - Hyuck M. Kwon, Jyothi Sri Sai Manne, Khanh Pham:
5G-and-Beyond Positioning Against Amplify-and-Forward Relay Jamming. 1011-1015 - Ryota Kuribayashi, Mamoru Sawahashi:
Comparisons of TDM and FDM Pilot Signals for Phase Noise Estimation with High-Order QAM for DFT-Spread OFDM. 1016-1021 - Hyuck M. Kwon:
Intermittent Markov Frequency-Hopping Entropy Rate. 1022-1026 - Hisham Abuella, Md Zobaer Islam, Russ Messenger, John F. O'Hara, Sabit Ekin:
Analysis and Empirical Validation of Visible Light Path Loss Model for Vehicular Sensing and Communication. 1027-1031 - Chenhao Yang, Xin Wang, Wei Ni, Yi Jiang:
Beamforming Design for MIMO DFRC Systems with Transmit Covariance Constraints. 1032-1036 - Xiangrui Ning, Ming Zeng, Zesong Fei:
Joint Task Offloading and Service Migration in RIS Assisted Vehicular Edge Computing Network Based on Deep Reinforcement Learning. 1037-1042 - Kohsuke Sonoda, Hiroshi Katada, Shigeru Shimamoto, Taku Yamazaki, Takumi Miyoshi:
Extended Physarum Solver for Capacity-Constraint Routing. 1043-1047 - Shengping Zhou, Ming Zeng, Zesong Fei:
User Grouping with Fairness Consideration in Massive MIMO System with Varying Channel Quality. 1048-1053 - Mauro Belgiovine, Jerry Gu, Joshua Groen, Miquel Sirera, Utku Demir, Kaushik R. Chowdhury:
MEGATRON: Machine Learning in 5G with Analysis of Traffic in Open Radio Access Networks. 1054-1058 - Hideki Tode, Yosuke Tanigawa, Ratha Yeu, Akio Hasegawa:
[Invited Paper] Time Gating Control Approaches for Time Critical Applications from Perspective of Wireless LANs and All Optical Networks. 1059-1064 - Lusi Li, Rui Ning, Ziyu Wang, Shuai Hao:
A Dual Transfer Framework for Cooperative Spectrum Sensing in Cognitive Radio. 1065-1070 - Ding Zhao, Ibrahim Pehlivan, Aditya Wadaskar, Danijela Cabric:
Fast Frequency-Direction Mapping Design for Data Communication With True-Time-Delay Array Architecture. 1071-1076 - Mayuko Inoue, Tomoaki Ohtsuki, Mondher Bouazizi:
DTL-Based CSI Feedback Combined with Continual Learning in FDD Massive MIMO Systems. 1077-1081 - Xiaowei Nie, Demin Wang, Yuqing Zhang, Xiaoduo Pan, Zhibin Zuo:
A Deep Reinforcement Learning-based Contention Window Avoidance Scheme for Distinguishing Network Service Priorities. 1082-1086 - Ahmed Hamdi Sakr, Sergei S. Avedisov, Shishir Manjunatha, Onur Altintas:
Performance Assessment of Intent Sharing in Infrastructure-Assisted Cooperative Perception Services. 1087-1091 - Ziqi Wang, Shiwen Mao:
AIGC for RF Sensing: The Case of RFID-Based Human Activity Recognition. 1092-1097 - Grace Colette Tessa Masse, Abderrahim Benslimane, Vianney Kengne Tchendji, Ahmed H. Anwar:
A Secure Hierarchical Federated Learning Using Dirichlet-based Trust Management. 1098-1103 - Hiroto Shida, Aoto Kaburaki, Koichi Adachi:
Energy-Efficient Multi-Hop LoRaWAN with Transmission and Synchronization Control. 1104-1108 - Aoto Kaburaki, Koichi Adachi, Osamu Takyu, Mai Ohta, Takeo Fujii:
LBT-Based Resource Allocation Methods Utilizing Periodicity of Traffic in LPWAN. 1109-1113 - Ines Carole Kombou Sihomnou, Abderrahim Benslimane, Ahmed Hemida, Gabriel Deugoue, Charles A. Kamhoua:
Game-Theoretic Defense Strategies for Mitigating Gray Hole Attacks on Energy-Limited Sensors in Wireless Sensor Networks. 1114-1120 - Yuzhu Zhang, Hao Xu:
Decentralized Learning based Optimal Design for RIS-assisted Multi-user Ad-Hoc Network: A Multi-Player Multi-Armed Bandits Approach. 1121-1125 - Mohammad Hossein Alishahi, Paul Fortier, Ming Zeng, Fang Fang:
Computation Rate Maximization in STAR-RIS Aided Wireless Powered Mobile Edge Computing Networks with NOMA. 1126-1131 - Alireza Famili, Tolga O. Atalay, Angelos Stavrou:
5GPS: 5G Femtocell Placement Strategies for Ultra-Precise Indoor Localization in the Metaverse. 1132-1138 - Daiki Ishikawa, Chedlia Ben Naila, Hiraku Okada, Masaaki Katayama:
Performance Analysis of LDPC Coded Outdoor Long-Distance Imaging MIMO System. 1139-1143 - Touhid Hossain Pritom, Simon Welzel, Florian Klingler:
Cuckoos United: Extending Cuckoo Filters for Message Dissemination in Vehicular Networks. 1144-1148 - Yuto Lim, Lishuai Yuan, Zhaowei Zhong:
Quantum Error Corrected Fidelity Routing Design for Long-Distance Quantum Networks. 1149-1153 - Denis A. Khotimsky, Eugene B. DeFrancisci, Gregory K. Sherrill, Rajesh Yadav:
Contention - Based Operation in TDM-Type Passive Optical Networks. 1154-1157 - Xinyuan Zhang, Xiaoyang Mao, Wan-Young Chung, Zhigang Gao, Jianwen Feng, Kentaro Go:
Area4U: Predicting Interaction Hotspots for Large Public Displays. 1158-1163 - Zibin Lin, Taotao Wang, Chonghe Zhao, Shengli Zhang, Qing Yang, Long Shi:
A Measurement Investigation of ERC-4337 Smart Contracts on Ethereum Blockchain. 1164-1170 - Kota Makino, Takeshi Hirai, Tutomu Murase:
Cooperative Mobility Control for Maintaining Required Throughput in Multiple Ad Hoc Networks with Autonomous Mobile Robots. 1171-1176
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.