default search action
INFOCOM 2022: New York, NY, USA - Workshops
- IEEE INFOCOM 2022 - IEEE Conference on Computer Communications Workshops, INFOCOM 2022 - Workshops, New York, NY, USA, May 2-5, 2022. IEEE 2022, ISBN 978-1-6654-0926-1
- Xiaolong Deng, Tiejun Lv, LinMing Song:
Novel Efficient Block Chain and Rule-based Intelligent Privacy Share System in Future Network. 1-8 - Gurjashan Singh Pannu, Seyhan Ucar, Takamasa Higuchi, Onur Altintas, Falko Dressler:
Vehicular Virtual Edge Computing using Heterogeneous V2V and V2C Communication. 1-2 - Guowen Wu, Yuhan Zhao, Yizhou Shen, Hong Zhang, Shigen Shen, Shui Yu:
DRL-based Resource Allocation Optimization for Computation Offloading in Mobile Edge Computing. 1-6 - Alena Chang, Guoliang Xue:
Order Matters: On the Impact of Swapping Order on an Entanglement Path in a Quantum Network. 1-6 - Nalam Venkata Abhishek, Muhammad Naveed Aman, Teng Joon Lim, Biplab Sikdar:
PIC: Preserving Data Integrity in UAV Assisted Communication. 1-6 - Zhenning Wang, Mingze Li, Liang Zhao, Huan Zhou, Ning Wang:
A3C-based Computation Offloading and Service Caching in Cloud-Edge Computing Networks. 1-2 - Diego A. Cuji, Zhengnan Li, Milica Stojanovic:
ACT: an Acoustic Communications Testbed. 1-6 - Leandros Maglaras, Nick Ayres, Sotiris Moschoyiannis, Leandros Tassiulas:
The end of Eavesdropping Attacks through the Use of Advanced End to End Encryption Mechanisms. 1-2 - Umesh Bodkhe, Sudeep Tanwar:
P2 COMM: A Secure and Low-Cost Message Dissemination Scheme for Connected Vehicles. 1-6 - Anmol Kumar, Gaurav Somani:
DDoS attack mitigation in cloud targets using scale-inside out assisted container separation. 1-6 - Ying Ju, Yuchao Chen, Zhiwei Cao, Haoyu Wang, Lei Liu, Qingqi Pei, Neeraj Kumar:
Learning Based and Physical-layer Assisted Secure Computation Offloading in Vehicular Spectrum Sharing Networks. 1-6 - Varun Kohli, Amit Chougule, Vinay Chamola, F. Richard Yu:
MbRE IDS: An AI and Edge Computing Empowered Framework for Securing Intelligent Transportation Systems. 1-6 - Mehbub Alam, Nurzaman Ahmed, Rakesh Matam, Ferdous Ahmed Barbhuiya:
L3Fog: Fog Node Selection and Task Offloading Framework for Mobile IoT. 1-6 - Prateek Mahajan, Anusha Kumar, G. Sai Sesha Chalapathi, Rajkumar Buyya:
EFTA: An Energy-efficient, Fault-Tolerant, and Area-optimized UAV Placement Scheme for Search Operations. 1-6 - Abdalaziz Sawwan, Jie Wu:
Unreliable Multi-hop Networks Routing Protocol For Age of Information-Sensitive Communication. 1-2 - Chao Yang, Lingxiao Wang, Xuyu Wang, Shiwen Mao:
Demo Abstract: Environment-adaptive 3D Human Pose Tracking with RFID. 1-2 - Xiaolin Zhu, Yong Zhang, Zhao Zhang, Da Guo, Qi Li, Zhao Li:
Interpretability Evaluation of Botnet Detection Model based on Graph Neural Network. 1-6 - Yanlang Zheng, Huan Zhou, Rui Chen, Kai Jiang, Yue Cao:
SAC-based Computation Offloading and Resource Allocation in Vehicular Edge Computing. 1-6 - Dongyang Yang, Yifan Han, Yang Du, He Huang, Yu-E Sun, Shiping Chen:
LSE: A Learning-based Per-flow Spread Estimation Framework for Network Data Streams. 1-6 - Chao Yang, Xuyu Wang, Shiwen Mao:
Demo Abstract: Technology-agnostic Approach to RF based Human Activity Recognition. 1-2 - Lingxiao Chen, Guoqiang Gong, Kai Jiang, Huan Zhou, Rui Chen:
DDPG-based Computation Offloading and Service Caching in Mobile Edge Computing. 1-6 - Meng Wang, Qinghe Du, Likang Zhang:
Minimum-SNR Maximization for Robust IRS-assisted Legitimate Monitoring System. 1-6 - Hervais Simo, Michael Kreutzer:
REGRETS: A New Corpus of Regrettable (Self-)Disclosures on Social Media. 1-2 - Sara Jafarbeiki, Amin Sakzad, Shabnam Kasra Kermanshahi, Ron Steinfeld, Raj Gaire:
PRESSGenDB: PRivacy-prEserving Substring Search on Encrypted Genomic DataBase. 1-6 - Sarantis Kalafatidis, Vassilis Demiroglou, Lefteris Mamatas, Vassilis Tsaoussidis:
Experimenting with an SDN-Based NDN Deployment over Wireless Mesh Networks. 1-6 - Jiabao Wang, Haoran Zha, Jiangzhi Fu:
Evaluation of deep learning model in the field of electromagnetic signal recognition. 1-6 - Ebuka Oguchi, Nirnimesh Ghose, Mehmet C. Vuran:
STUN: Secret-Free Trust-Establishment For Underground Wireless Networks. 1-6 - Wendi Feng, Ranzheng Cao, Zhi-Li Zhang:
STATOEUVER: State-aware Load Balancing for Network Function Virtualization. 1-2 - Joseph Bolarinwa, Alex Smith, Adnan Aijaz, Aleksandar Stanoev, Manuel Giuliani:
Demo: Untethered Haptic Teleoperation for Nuclear Decommissioning using a Low-Power Wireless Control Technology. 1-2 - Zahra Aref, Narayan B. Mandayam:
Impact of Subjectivity in Deep Reinforcement Learning based Defense of Cloud Storage. 1-6 - Igor Bisio, Chiara Garibotto, Fabio Lavagetto, Andrea Sciarrone:
A Novel IoT-based Edge Sensing Platform for Structure Health Monitoring. 1-6 - Vincent Charpentier, Nina Slamnik-Krijestorac, Johann Márquez-Barja:
Assessing the impact of CAM messages in vehicular communications in real highway environments. 1-2 - Ruichen Zhang, Ke Xiong, Xingcong Tian, Yang Lu, Pingyi Fan, Khaled Ben Letaief:
Inverse Reinforcement Learning Meets Power Allocation in Multi-user Cellular Networks. 1-2 - Ying Ju, Haoyu Wang, Yuchao Chen, Lei Liu, Tong-Xing Zheng, Qingqi Pei, Ming Xiao:
DRL-based Beam Allocation in Relay-aided Multi-user MmWave Vehicular Networks. 1-6 - Christos Liaskos, Konstantinos Alexandris, Siyu Tang, Anindya Das:
End-to-end TCP-compatible Backpressure Routing. 1-6 - Ruyu Luo, Wanli Ni, Hui Tian:
Visualizing Multi-Agent Reinforcement Learning for Robotic Communication in Industrial IoT Networks. 1-2 - Qixun Zhang, Xinye Gao:
Joint Communication and Sensing Enabled Cooperative Perception Testbed for Connected Automated Vehicles. 1-2 - Pablo Avila-Campos, Jetmir Haxhibeqiri, Ingrid Moerman, Jeroen Hoebeke:
Beacon-Based Wireless TSN Association. 1-2 - Yuguo Li, Shaoheng Tan, Zhiwen Wang, Dingding Li:
A NUMA-aware Key-Value Store for Hybrid Memory Architecture. 1-6 - Silin Feng, Jiajun Chen, Zhiwei Zhao:
Cost Effective Routing in Large-scale Multi-hop LoRa Networks. 1-6 - Theodoros Tsourdinis, Ilias Chatzistefanidis, Nikos Makris, Thanasis Korakis:
AI-driven Service-aware Real-time Slicing for beyond 5G Networks. 1-6 - Wei Liu, Li Chen, Weidong Wang:
General Decentralized Federated Learning for Communication-Computation Tradeoff. 1-6 - Yahya Hassanzadeh-Nazarabadi, Sanaz Taheri Boshrooyeh, Öznur Özkasap:
DHT-based Edge and Fog Computing Systems: Infrastructures and Applications. 1-6 - Xin Shen, Zhuo Li, Xin Chen:
Online Node Cooperation Strategy Design for Hierarchical Federated Learning. 1-6 - Bhargav Gokalgandhi, Ivan Seskar:
Channel Estimation for Massive MIMO systems using Tensor Cores in GPU. 1-6 - Rajesh Gupta, Sudeep Tanwar:
Interference Mitigation and Secrecy-ensured D2D Resource Allocation Scheme using Game Theory. 1-6 - Haina Zheng, Ke Xiong, Mengying Sun, Zhangdui Zhong, Khaled Ben Letaief:
Age-Energy Efficiency in WPCNs: A Deep Reinforcement Learning Approach. 1-2 - Vishal Venkatraman, Shantanu Pal, Zahra Jadidi, Alireza Jolfaei:
A Conceptual Trust Management Framework under Uncertainty for Smart Vehicular Networks. 1-7 - Eloi Cruz Harillo, Felix Freitag:
LoRaCoin: Towards a blockchain-based platform for managing LoRa devices. 1-2 - Jie Cao, Xu Zhu, Sumei Sun, Petar Popovski, Shaohan Feng, Yufei Jiang:
Age of Loop Oriented Wireless Networked Control System: Communication and Control Co-Design in the FBL Regime. 1-6 - Zhihao Wang, Dingde Jiang, Zhihan Lv, Houbing Song:
A Deep Reinforcement Learning based Intrusion Detection Strategy for Smart Vehicular Networks. 1-6 - Wanli Ni, Xufeng Liu, Hui Tian:
Battery-less Massive Access for Simultaneous Information Transmission and Federated Learning in WPT Networks. 1-2 - Venkata Praveen Kumar Madhavarapu, Shameek Bhattacharjee, Sajal K. Das:
A Generative Model for Evasion Attacks in Smart Grid. 1-6 - Mohamed A. Abd-Elmagid, Harpreet S. Dhillon:
Distribution of AoI in EH-powered Multi-source Systems under Non-preemptive and Preemptive Policies. 1-8 - Chunming Qiao, Yangming Zhao, Gongming Zhao, Hongli Xu:
Quantum Data Networking for Distributed Quantum Computing: Opportunities and Challenges. 1-6 - Yuan Gao, Yang Guo, Ping Wang, Siming Yang, Jing Wang, Xiaonan Wang, Yu Ding, Weidang Lu, Yu Zhang, Guoxing Huang, Jiang Cao:
Secure Enhancement in NOMA-based UAV-MEC Networks. 1-6 - Jalil Taghia, Farnaz Moradi, Hannes Larsson, Xiaoyu Lan, Masoumeh Ebrahimi, Andreas Johnsson:
Demonstration of Policy-Induced Unsupervised Feature Selection in a 5G network. 1-2 - Gilson Miranda, Esteban Municio, Jetmir Haxhibeqiri, Daniel F. Macedo, Jeroen Hoebeke, Ingrid Moerman, Johann M. Márquez-Barja:
Evaluating Time-Sensitive Networking Features on Open Testbeds. 1-2 - Cihang Cheng, Ming Liu, Ke Xiong:
A Dual-RFID-Tag Based Indoor Localization Method with Multiple Apertures. 1-2 - Qiuming Zhu, Yi Zhao, Yang Huang, Zhipeng Lin, Lu Han, Jie Wang, Yunpeng Bai, Tianxu Lan, Fuhui Zhou, Qihui Wu:
DEMO Abstract: An UAV-based 3D Spectrum Real-time Mapping System. 1-2 - Haotong Cao, Yue Hu, Shengchen Wu, Yongan Guo:
Dynamic and Secure Resource Allocation Framework of Slices for 5G-Enabled Cyber Physical Systems. 1-6 - Jagnyashini Debadarshini, Sudipta Saha:
Efficient Coordination among Electrical Vehicles: An IoT-Assisted Approach. 1-2 - Yu Huang, Pengfei Liu, Jie Yang:
Radio Frequency Fingerprint Identification Method Based on Ensemble Learning. 1-6 - Haonan Zhang, Chuanchuan Yang, Bin Dai:
When Wireless Federated Learning Meets Physical Layer Security: The Fundamental Limits. 1-6 - Peng Qian, Ning Wang, Rahim Tafazolli:
User Intent Driven Path Switching in Video Delivery - An Edge Computing Based Approach. 1-6 - Le Xia, Yao Sun, Xiaoqian Li, Gang Feng, Muhammad Ali Imran:
Wireless Resource Management in Intelligent Semantic Communication Networks. 1-6 - Magreth Mushi, Harshvardhan P. Joshi, Rudra Dutta, Ismail Güvenç, Mihail L. Sichitiu, Brian A. Floyd, Thomas Zajkowski:
The AERPAW Experiment Workflow - Considerations for Designing Usage Models for a Computing-supported Physical Research Platform. 1-8 - Beibei Li, Yaxin Shi, Yuqing Guo, Qinglei Kong, Yukun Jiang:
Incentive and Knowledge Distillation Based Federated Learning for Cross-Silo Applications. 1-6 - Haoyu Zhu, Ninghao Zhou, Jia Hou:
Security Performance Analysis of NOMA System Based on Multi-Slot Combined Reception. 1-6 - Ying Chen, Hazer Inaltekin, Maria Gorlatova:
Demo Abstract: Pixel Similarity-Based Content Reuse in Edge-Assisted Virtual Reality. 1-2 - Argha Sen, Sashank Bonda, Jay Jayatheerthan, Sandip Chakraborty:
An ns3-based Energy Module for 5G mmWave Base Stations. 1-2 - Roman Zlobin, Aleksey Kureev, Evgeny M. Khorov:
Receiver Design and Frame Format for Uplink NOMA in Wi-Fi. 1-2 - Tao Wang, Xiangquan Shi, Jing Tao, Xiaoyan Wang, Biao Han:
Efficient Synchronous MAC Protocols for Terahertz Networking in Wireless Data Center. 1-6 - Alfredo Nascita, Francesco Cerasuolo, Davide Di Monda, Jonas Thern Aberia Garcia, Antonio Montieri, Antonio Pescapè:
Machine and Deep Learning Approaches for IoT Attack Classification. 1-6 - Riya Kakkar, Smita Agrawal, Rajesh Gupta, Sudeep Tanwar:
Blockchain and Zero-Sum Game-based Dynamic Pricing Scheme for Electric Vehicle Charging. 1-6 - Jian Fang, Zhiyi Zhou, Sunhaoran Jin, Lei Wang, Bingxian Lu, Zhenquan Qin:
Exploring LoRa for Drone Detection. 1-2 - Sarvesh Sanjay Wanode, Milind Anand, Barsha Mitra:
Optimal Feature Set Selection for IoT Device Fingerprinting on Edge Infrastructure using Machine Intelligence. 1-6 - Wei Guan, Bo Gao, Ke Xiong, Yang Lu:
Spectrum Sharing in UAV-Assisted HetNet Based on CMB-AM Multi-Agent Deep Reinforcement Learning. 1-2 - Mianxue Gu, Hantao Feng, Hongyu Sun, Peng Liu, Qiuling Yue, Jinglu Hu, Chunjie Cao, Yuqing Zhang:
Hierarchical Attention Network for Interpretable and Fine-Grained Vulnerability Detection. 1-6 - Sergei Chuprov, Leon Reznik, Antoun Obeid, Srujan Shetty:
How Degrading Network Conditions Influence Machine Learning End Systems Performance? 1-6 - Xiaojiang Zuo, Xiao Wang, Rui Han:
An Empirical Analysis of CAPTCHA Image Design Choices in Cloud Services. 1-6 - Tung-Wei Kuo:
Competitive Analyses of Online Minimum Age of Information Transmission Scheduling. 1-8 - Dengfeng Yao, Minghui Dai, Tianshun Wang, Yuan Wu, Zhou Su:
Intelligent Sensing and Communication assisted Pedestrians Recognition in Vehicular Networks: An Effective Throughput Maximization Approach. 1-6 - Baidi Xiao, Yan Shao, Rongpeng Li, Zhifeng Zhao, Honggang Zhang:
Demo: Deep Reinforcement Learning for Resource Management in Cellular Network Slicing. 1-2 - Naivedya Lath, Kaustubh Thapliyal, Kartik Kandpal, Mohammad Wazid, Ashok Kumar Das, Devesh Pratap Singh:
BDESF-ITS: Blockchain-Based Secure Data Exchange and Storage Framework for Intelligent Transportation System. 1-6 - Praveen Rao, Arun Zachariah:
Enabling Large-Scale Human Genome Sequence Analysis on CloudLab. 1-2 - Xu Zheng, Qihao Dong, Anmin Fu:
WMDefense: Using Watermark to Defense Byzantine Attacks in Federated Learning. 1-6 - Xiu Susie Fang, Quan Z. Sheng, Jian Yang, Guohao Sun, Xianzhi Wang, Yihong Zhang:
Resolving Conflicts among Unbalanced Multi-Source Data When Multi-Value Objects Exist. 1-2 - Terry N. Guo:
Connectivity-Aware Fast Network Forming Aided By Digital Twin For Emergency Use. 1-6 - Paolo Medagliani, Sébastien Martin, Jérémie Leguay, Shengming Cai, Feng Zeng, Nicolas Huin:
Resource Defragmentation for Network Slicing. 1-2 - Bharat S. Rawal, Sudhanshu Patel, Mithileysh Sathiyanarayanan:
Identifying DDoS Attack using Split-Machine Learning System in 5G and Beyond Networks. 1-6 - Hassaan Hydher, Dushantha Nalin K. Jayakody, Kasun T. Hemachandra, Tharaka Samarasinghe:
UAV Deployment for Data Collection in Energy Constrained WSN System. 1-6 - Abhishek Majumder, Joy Lal Sarkar, Bibudhendu Pati, Chhabi Rani Panigrahi, V. Ramasamy, Sudipta Roy, Vikas Kumar:
MERIT: Multi-Itinerary Tourist Recommendation Engine for Industrial Internet of Things. 1-6 - Yash Deshpande, Onur Ayan, Wolfgang Kellerer:
Improving AoI via Learning-based Distributed MAC in Wireless Networks. 1-8 - Nasimul Hasan, Zhenxiang Chen, Chuan Zhao, Yuhui Zhu, Cong Liu:
IoT Botnet Detection framework from Network Behavior based on Extreme Learning Machine. 1-6 - Songlin Chen, Sijing Wang, Xingchen Xu, Long Jiao, Hong Wen:
Physical Layer Security Authentication Based Wireless Industrial Communication System for Spoofing Detection. 1-2 - Runze Tang, Gaolei Duan, Lei Xie, Yanling Bu, Ming Zhao, Zhenjie Lin, Qiang Lin:
Static Obstacle Detection based on Acoustic Signals. 1-2 - Jian Fang, Lei Wang, Zhenquan Qin, Bingxian Lu:
LoRa-based Outdoor 3D Localization. 1-2 - Balázs Vass, Csaba Sarkadi, Gábor Rétvári:
Programmable Packet Scheduling With SP-PIFO: Theory, Algorithms and Evaluation. 1-6 - Haoran Zhao, Bo He, He Zhou, Jiangyin Zhou, Qi Qi, Jingyu Wang, Haifeng Sun, Jianxin Liao:
QUIC-Enabled Data Aggregation for Short Packet Communication in mMTC. 1-2 - Rahul Mishra, Hari Prabhat Gupta, Tanima Dutta:
Noise-Resilient Federated Learning: Suppressing Noisy Labels in the Local Datasets of Participants. 1-2 - Chengxiao Yu, Wei Quan, Kang Liu, Mingyuan Liu, Ziheng Xu, Hongke Zhang:
DRL-Based Fountain Codes for Concurrent Multipath Transfer in 6G Networks. 1-6 - Ilias Siniosoglou, Vasileios Argyriou, Thomas Lagkas, Ioannis D. Moscholios, George F. Fragulis, Panagiotis G. Sarigiannidis:
Unsupervised Bias Evaluation of DNNs in non-IID Federated Learning Through Latent micro-Manifolds. 1-6 - Hussam Abdellatif, Viduneth Ariyarathna, Sergey Petrushkevich, Arjuna Madanayake, Josep Miquel Jornet:
A Real-Time Ultra-broadband Software-Defined Radio Platform for Terahertz Communications. 1-2 - Himanshu Sharma, Ishan Budhiraja, Neeraj Kumar, Rajkumar Tekchandani:
Secrecy Rate Maximization for THz-Enabled Femto Edge Users using Deep Reinforcement Learning in 6G. 1-6 - Shuze Shen, Zheyi Ma, Mingqing Liu, Qingwen Liu, Yunfeng Bai, Mingliang Xiong:
A Cloud-Terminal Collaborative System for Crowd Counting and Localization Using Multi-UAVs. 1-6 - Ahan Kak, Van-Quan Pham, Huu-Trung Thieu, Nakjung Choi:
Demo: A Disaggregated O-RAN Platform for Network Slice Deployment and Assurance. 1-2 - Yaoyao Wang, Xiaoguang Chen:
Joint modulation of 3-PPM and quantum squeezed states in communication systems. 1-5 - Henry Clausen, Aditya Manocha, Michael Scott Gibson:
Detecting Proxies Relaying Streaming Internet Traffic. 1-6 - Chen Wang, Daosen Zhai, Ruonan Zhang, Huan Li, Haotong Cao, Anish Jindal:
Joint UAVs Position Optimization and Offloading Decision for Blockchain-enabled Intelligent Transportation. 1-6 - Anuja R. Nair, Nilesh Kumar Jadav, Rajesh Gupta, Sudeep Tanwar:
AI-empowered Secure Data Communication in V2X Environment with 6G Network. 1-6 - Mingqian Liu, Zhenju Zhang, Nan Zhao, Yunfei Chen:
Adversarial Attacks on Deep Neural Networks Based Modulation Recognition. 1-6 - Husnain Rafiq, Nauman Aslam, Biju Issac, Rizwan Hamid Randhawa:
An Investigation on Fragility of Machine Learning Classifiers in Android Malware Detection. 1-6 - Xiaoming Yuan, Jiahui Chen, Ning Zhang, Chunsheng Zhu, Qiang Ye, Xuemin Sherman Shen:
FedTSE: Low-Cost Federated Learning for Privacy-Preserved Traffic State Estimation in IoV. 1-6 - Ali Akbar Mohammadi, Rasheed Hussain, Alma Oracevic, Syed Muhammad Ahsan Raza Kazmi, Fatima Hussain, Moayad Aloqaily, Junggab Son:
A Novel TCP/IP Header Hijacking Attack on SDN. 1-2 - Ziwei Liu, Lei Xie, Jingyi Ning, Ming Zhao, Liming Wang, Hao Peng:
Remote Meter Reading based on Lightweight Edge Devices. 1-2 - Yulong He, Xiaofan He:
Location Privacy-Aware Coded Offloading for Distributed Edge Computing. 1-6 - Gabriel Antonio F. Rebello, Gustavo Franco Camilo, Maria Potop-Butucaru, Miguel Elias M. Campista, Marcelo Dias de Amorim, Luís Henrique M. K. Costa:
PCNsim: A Flexible and Modular Simulator for Payment Channel Networks. 1-2 - Yichuan Wang, Rui Fan, Xinyue Yin, Xinhong Hei:
Trusted Storage Architecture for Machine Reasoning based on Blockchain. 1-6 - Dilwar Hussain Barbhuiya, Adittya Dey, Rajdeep Ghosh, Kunal Das, Kumarjit Ray, Nabajyoti Medhi:
Resource Aware Fog Based Remote Health Monitoring System. 1-6 - Tarek Ahmed, Shengjie Xu:
Shellcoding: Hunting for Kernel32 Base Address. 1-2 - Gaurang Bansal, Biplab Sikdar:
Secure and Trusted Attestation Protocol for UAV Fleets. 1-6 - Xin Yao, Jiangong Chen, Ting He, Jing Yang, Bin Li:
A Scalable Mixed Reality Platform for Remote Collaborative LEGO Design. 1-2 - Hemant Rathore, Adithya Samavedhi, Sanjay K. Sahay, Mohit Sewak:
Are Malware Detection Models Adversarial Robust Against Evasion Attack? 1-2 - Junlin Liu, Yukun Sun, Junqi Su, Zhaojiang Li, Xing Zhang, Bo Lei, Wenbo Wang:
Computing Power Network: A Testbed and Applications with Edge Intelligence. 1-2 - Vladislav Li, George Amponis, Jean-Christophe Nebel, Vasileios Argyriou, Thomas Lagkas, Savvas Ouzounidis, Panagiotis G. Sarigiannidis:
Super Resolution for Augmented Reality Applications. 1-6 - Jong-Min Kim, Ju-Hyung Lee, Yeongrok Lee, Hong-Seol Cha, Hyunsu Park, Jincheol Sim, Chulwoo Kim, Young-Chai Ko:
Experimental Demonstration of RoFSO Transmission Combining WLAN Standard and WDM-FSO over 100m Distance. 1-2 - Katarzyna Koptyra, Marek R. Ogiela:
An extension of imagechain concept that allows multiple images per block. 1-2 - Zhuangzhuang Liao, Xiaojie Fang, Ning Zhang, Tao Han, Xuejun Sha:
On Carrier Scheme Convergence: A WFRFT-based Hybrid Carrier Scheme Demonstration. 1-2 - Xiaolei Liu, Xiaoyu Li, Desheng Zheng, Jiayu Bai, Yu Peng, Shibin Zhang:
Automatic Selection Attacks Framework for Hard Label Black-Box Models. 1-7 - Ivan Vaccari, Alberto Carlevaro, Sara Narteni, Enrico Cambiaso, Maurizio Mongelli:
On The Detection Of Adversarial Attacks Through Reliable AI. 1-6 - Hanbiao Du, Meng Shen, Rungeng Sun, Jizhe Jia, Liehuang Zhu, Yanlong Zhai:
Malicious Transaction Identification in Digital Currency via Federated Graph Deep Learning. 1-6 - Tengyu Zhang, Jun Liu, Feifei Gao:
Vision Aided Beam Tracking and Frequency Handoff for mmWave Communications. 1-2 - Xinjie Gu, Xiaolong Wang, Yuchen Feng, Yuzhu Long, Mithun Mukherjee, Zhigeng Pan, Mian Guo, Qi Zhang:
Demo: TINGLE: Pushing Edge Intelligence in Synchronization and Useful Data Transfer for Human-Robotic Arm Interactions. 1-2 - Sohan Gyawali, Omar Beg:
Cyber Attacks Detection using Machine Learning in Smart Grid Systems. 1-2 - Suranga Handagala, Miriam Leeser, Kalyani Patle, Michael Zink:
Network Attached FPGAs in the Open Cloud Testbed (OCT). 1-6 - Li Yi, Weidong Fang, Wei Chen, Wuxiong Zhang, Guoqing Jia:
Overlapped Connected Dominating Set for Big Data Security. 1-5 - Huiwen Hu, Qianlan Bai, Yuedong Xu:
SCSGuard: Deep Scam Detection for Ethereum Smart Contracts. 1-6 - Priyesh Ranjan, Federico Corò, Ashish Gupta, Sajal K. Das:
Leveraging Spanning Tree to Detect Colluding Attackers in Federated Learning. 1-2 - Jacob Hall, Duschia Bodet, Josep Miquel Jornet:
Experimental Demonstration of Multiple Input Multiple Output Communications above 100 GHz. 1-2 - Jingheng Zheng, Wanli Ni, Hui Tian, Deniz Gündüz, Tony Q. S. Quek:
Semi-Federated Learning: An Integrated Framework for Pervasive Intelligence in 6G Networks. 1-6 - Jiawei Li, Jessie Hui Wang, Jilong Wang:
Dynamic Pricing for Idle Resource in Public Clouds: Guarantee Revenue from Strategic Users. 1-2 - Yogendra Kumar, Siba K. Udgata:
Machine learning model for IoT-Edge device based Water Quality Monitoring. 1-6 - Nicholas A. Peters, Muneer Alshowkan, Joseph C. Chapman, Philip G. Evans, David A. Hooper, Warren P. Grice, Hsuan-Hao Lu, Joseph M. Lukens, Raphael C. Pooser, Claire E. Marvinney, Alexander Miloshevsky, Brian P. Williams, Brandon A. Wilson:
Quantum Networking and Communications at Oak Ridge National Laboratory. 1-6 - Victor Sanchez-Agüero, Francisco Valera, Iván Vidal, Borja Nogales, Jaime Cabezas, Carlos Vidal:
A virtualization approach to validate services and subsystems of a MALE UAS. 1-6 - Dezhi Wang, Wei Wang, Yuhan Kang, Zhu Han:
Dynamic Data Offloading for Massive Users in Ultra-dense LEO Satellite Networks based on Stackelberg Mean Field Game. 1-6 - Alexander Kolar, Allen Zang, Joaquin Chung, Martin Suchara, Rajkumar Kettimuthu:
Adaptive, Continuous Entanglement Generation for Quantum Networks. 1-6 - Tanya Shreedhar, Sanjit K. Kaul, Roy D. Yates:
Coexistence of Age Sensitive Traffic and High Throughput Flows: Does Prioritization Help? 1-6 - Shreya Ghosh, Soumya K. Ghosh:
MANTRA: Semantic Mobility Knowledge Analytics Framework for Trajectory Annotation. 1-2 - Xiangyue Yang, Haoxiang Luo, Jingshan Duan, Hongfang Yu:
Ultra Reliable and Low Latency Authentication Scheme for Internet of Vehicles Based on Blockchain. 1-5 - Marco Gaglianese, Stefano Forti, Federica Paganelli, Antonio Brogi:
Lightweight Self-adaptive Cloud-IoT Monitoring across Fed4FIRE+ Testbeds. 1-6 - Marija Gajic, Marcin Bosk, Susanna Schwarzmann, Stanislav Lange, Thomas Zinner:
Demonstrating QoE-aware 5G Network Slicing Emulated with HTB in OMNeT++. 1-2 - Nitish K. Panigrahy, Prajit Dhara, Don Towsley, Saikat Guha, Leandros Tassiulas:
Optimal Entanglement Distribution using Satellite Based Quantum Networks. 1-6 - Navpreet Kaur, Juntao Chen:
Collaborative Learning for Large-Scale Discrete Optimal Transport under Incomplete Populational Information. 1-2 - Turhan Kimbrough, Pu Tian, Weixian Liao, Erik Blasch, Wei Yu:
Deep CAPTCHA Recognition Using Encapsulated Preprocessing and Heterogeneous Datasets. 1-6 - Wenxin Lei, Sijing Wang, Ning Zhang, Hong Wen, Wenjing Hou, Haojie Lin, Zhu Han:
Adaptive Decision-Making Framework for Federated Learning Tasks in Multi-Tier Computing. 1-2 - Daoqin Lin, Yuchun Guo, Huan Sun, Yishuai Chen:
FedCluster: A Federated Learning Framework for Cross-Device Private ECG Classification. 1-6 - Vincent Charpentier, Nina Slamnik-Krijestorac, Johann Márquez-Barja:
Latency-aware C-ITS application for improving the road safety with CAM messages on the Smart Highway testbed. 1-6 - Ming Zhang, Zhe Sun, Hui Li, Ben Niu, Fenghua Li, Yuhang Xie, Chunhao Zheng:
A blockchain-based Privacy-Preserving Framework for Cross-Social Network Photo Sharing. 1-6 - Wenjing Hou, Hong Wen, Ning Zhang, Wenxin Lei, Haojie Lin:
Dynamic Load Combined Prediction Framework with Collaborative Cloud-Edge for Microgrid. 1-2 - Du Hui, Zhuo Li, Xin Chen:
Quality-Aware Incentive Mechanism Design Based on Matching Game for Hierarchical Federated Learning. 1-6 - Panxin Bai, Heng Zhang, Jian Zhang, Hongran Li:
USV Control With Adaptive Compensation Under False Data Injection Attacks. 1-2 - Chengjin Liu, Zoe Lin Jiang, Xin Zhao, Qian Chen, Junbin Fang, Daojing He, Jun Zhang, Xuan Wang:
Efficient and Privacy-Preserving Logistic Regression Scheme based on Leveled Fully Homomorphic Encryption. 1-6 - Subhankar Banerjee, Sennur Ulukus:
Age of Information in the Presence of an Adversary. 1-8 - Jianhang Zhu, Jie Gong:
Online Scheduling of Transmission and Processing for AoI Minimization with Edge Computing. 1-6 - Leonardo Badia, Andrea Zanella, Michele Zorzi:
Game Theoretic Analysis of Age of Information for Slotted ALOHA Access With Capture. 1-6 - Gilson Miranda, Esteban Municio, Jetmir Haxhibeqiri, Daniel F. Macedo, Jeroen Hoebeke, Ingrid Moerman, Johann M. Márquez-Barja:
Time-Sensitive Networking Experimentation on Open Testbeds. 1-6 - Danyang Song, Yifei Zhu, Cong Zhang, Jiangchuan Liu:
Trueno: A Cross-Platform Machine Learning Model Serving Framework in Heterogeneous Edge Systems. 1-2 - Qixun Zhang, Chang Yang:
Testbed and Performance Evaluation of 3D MmWave Beam Tracking in Mobility Scenario. 1-2 - Pierluigi Locatelli, Pietro Spadaccino, Francesca Cuomo:
Ruling Out IoT Devices in LoRaWAN. 1-2 - Mahmuda Akter, Nour Moustafa, Timothy M. Lynar:
Edge Intelligence-based Privacy Protection Framework for IoT-based Smart Healthcare Systems. 1-8 - Younes Ben Mazziane, Sara Alouf, Giovanni Neglia:
A Formal Analysis of the Count-Min Sketch with Conservative Updates. 1-6 - Rui Kang, Mengfei Zhu, Eiji Oki:
Implementation of Service Function Chain Deployment with Allocation Models in Kubernetes. 1-2 - Jagnyashini Debadarshini, Sudipta Saha:
Simultaneous Intra-Group Communication: Understanding the Problem Space. 1-2 - Jigna J. Hathaliya, Hetav Modi, Rajesh Gupta, Sudeep Tanwar:
Deep learning and Blockchain-based Essential and Parkinson Tremor Classification Scheme. 1-6 - Dimitrios Pliatsios, Thomas Lagkas, Vasileios Argyriou, Antonios Sarigiannidis, Dimitrios Margounakis, Theocharis Saoulidis, Panagiotis G. Sarigiannidis:
A Hybrid RF-FSO Offloading Scheme for Autonomous Industrial Internet of Things. 1-6 - Jiwei Mo, Jiangshu Liu, Zhiwei Zhao:
Exploiting Function-level Dependencies for Task Offloading in Edge Computing. 1-6 - Shang Shi, Yu Wang, Heng Dong, Guan Gui, Tomoaki Ohtsuki:
Smartphone-Aided Human Activity Recognition Method using Residual Multi-Layer Perceptron. 1-6 - Yuhao Chen, Jinyao Yan, Yuan Zhang, Karin Anna Hummel:
Differentiating Losses in Wireless Networks: A Learning Approach. 1-2 - Zhengjun Gao, Guowen Wu, Yizhou Shen, Hong Zhang, Shigen Shen, Qiying Cao:
DRL-based Optimization of Privacy Protection and Computation Performance in MEC Computation Offloading. 1-6 - Wei Zhao, Wenjie Kang, Xuchong Liu, Xin Su, Yue Zhang, Hao Jiang:
Social Relationship Mining Based on User Telephone Communication Data for Cooperative Relationship Recommendation. 1-6 - Manish Bhurtel, Yuba Raj Siwakoti, Danda B. Rawat:
Phishing Attack Detection with ML-Based Siamese Empowered ORB Logo Recognition and IP Mapper. 1-6 - Mahdi Beitollahi, Ning Lu:
Multi-frame Scheduling for Federated Learning over Energy-Efficient 6G Wireless Networks. 1-6 - Florian Wiedner, Max Helm, Sebastian Gallenmüller, Georg Carle:
HVNet: Hardware-Assisted Virtual Networking on a Single Physical Host. 1-6 - Luhan Zou, Yunkai Wei, Lixiang Ma, Supeng Leng:
Feature-Attended Multi-Flow LSTM for Anomaly Detection in Internet of Things. 1-6 - Zehua Ren, Yang Liu, Huixiang Liu, Baoxiang Jiang, Xiangzhen Yao, Lin Li, Haiwen Yang, Ting Liu:
Network Security Situation Awareness Based on Spatio-temporal Correlation of Alarms. 1-2 - Nilesh Kumar Jadav, Rajesh Gupta, Sudeep Tanwar:
Blockchain and Edge Intelligence-based Secure and Trusted V2V Framework Underlying 6G Networks. 1-6 - Nima Namvar, Fatemeh Afghah:
Heterogeneous Airborne mmWave Cells: Optimal Placement for Power-Efficient Maximum Coverage. 1-6 - Chengjun Jia, Chenglong Li, Yifan Li, Xiaohe Hu, Jun Li:
An Observation of Packet Classification: Most Rules are at the Top. 1-6
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.