default search action
39th INFOCOM 2020: Toronto, ON, Canada - Workshops
- 39th IEEE Conference on Computer Communications, INFOCOM Workshops 2020, Toronto, ON, Canada, July 6-9, 2020. IEEE 2020, ISBN 978-1-7281-8695-5
- Clement Kam, Sastry Kompella, Anthony Ephremides:
Age of Incorrect Information for Remote Estimation of a Binary Markov Source. 1-6 - Jaya Prakash Champati, Mikael Skoglund, James Gross:
Detecting State Transitions of a Markov Source: Sampling Frequency and Age Trade-off. 7-12 - Shaoling Hu, Wei Chen:
Balancing Data Freshness and Distortion in Real-time Status Updating with Lossy Compression. 13-18 - He Ma, Shidong Zhou, Xiujun Zhang, Limin Xiao:
Transmission Scheduling for Multi-loop Wireless Networked Control Based on LQ Cost Offset. 19-25 - Bo Chang, Liying Li, Guodong Zhao, Zhen Meng, Muhammad Ali Imran, Zhi Chen:
Age of Information for Actuation Update in Real-Time Wireless Control Systems. 26-30 - Parisa Rafiee, Peng Zou, Omur Ozel, Suresh Subramaniam:
Maintaining Information Freshness in Power-Efficient Status Update Systems. 31-36 - M. Arun, Saminathan Balamurali, Bharat S. Rawal, Qiang Duan, Lakshmana Kumar Ramasamy, Balamurugan Baluswamy:
Mutual Authentication and Authorized Data Access Between Fog and User Based on Blockchain Technology. 37-42 - Dilu Zhang, Lei Fan:
Cerberus: Privacy-Preserving Computation in Edge Computing. 43-49 - Libin Liu, Hong Xu, Chengxi Gao, Peng Wang:
Bottleneck-Aware Coflow Scheduling Without Prior Knowledge. 50-55 - Yuan Wu, Xu Xu, Liping Qian, Bo Ji, Zhiguo Shi, Weijia Jia:
Revenue-Sharing based Computation-Resource Allocation for Mobile Blockchain. 56-61 - Duo Zhang, Youliang Tian, Linjie Wang, Sheng Gao, Jianfeng Ma:
Cooperative Game Model of Delegation Computing: Verifier Separated from Calculators. 62-67 - Chenming Yang, Liang Zhou, Hui Wen, Yue Wu:
U-ASG: A Universal Method to Perform Adversarial Attack on Autoencoder based Network Anomaly Detection Systems. 68-73 - Hua Wu, Zhenhua Yu, Guang Cheng, Shuyi Guo:
Identification of Encrypted Video Streaming Based on Differential Fingerprints. 74-79 - Chong Liu, Xiangyang Luo, Fuxiang Yuan, Fenlin Liu:
RNBG: A Ranking Nodes Based IP Geolocation Method. 80-84 - Lin Han, Yingzhen Qu, Lijun Dong, Richard Li:
A Framework for Bandwidth and Latency Guaranteed Service in New IP Network. 85-90 - Gang Liu, Wei Quan, Nan Cheng, Ning Lu, Hongke Zhang, Xuemin Shen:
P4NIS: Improving network immunity against eavesdropping with programmable data planes. 91-96 - Fan Wu, Wang Yang, Ju Ren, Feng Lyu, Xiaojie Ding, Yaoxue Zhang:
Adaptive Video Streaming Using Dynamic NDN Multicast in WLAN. 97-102 - Ao Li, Xin Liu, Qiang Guan, Deyun Chen, Guanglu Sun:
A View-Invariant Feature Learning Model for Cross-View Security Authentication in Mobile Smart Devices. 103-108 - Hina Batool, Ammar Masood:
Enterprise Mobile Device Management Requirements and Features. 109-114 - Sheng Wang, Linning Peng, Hua Fu, Aiqun Hu, Xinyu Zhou:
A Convolutional Neural Network-Based RF Fingerprinting Identification Scheme for Mobile Phones. 115-120 - Nattanon Wongwiwatchai, Phannawhat Pongkham, Kunwadee Sripanidkulchai:
Comprehensive Detection of Vulnerable Personal Information Leaks in Android Applications. 121-126 - Akinsola Akinsanya, Manish Nair, Yijin Pan, Jiangzhou Wang:
A Dynamic Resource Allocation Scheme in Vehicular Communications. 127-131 - Tianqi Chen, Jian He, Huiling Zhu, Lin Cai, Peng Yue, Jiangzhou Wang:
Resource Allocation in Drone-Assisted Emergency Communication Systems. 132-137 - Yuan Gao, Jiang Cao, Ping Wang, Junsong Yin, Ming He, Ming Zhao, Mugen Peng, Su Hu, Yunchuan Sun, Jing Wang, Shaochi Cheng, Yang Guo, Yanchang Du, Yanxi Cai, Jinhui Huang, Kai Qiu:
Intelligent UAV Based Flexible 5G Emergency Networks: Field Trial and System Level Results. 138-143 - Hongming Zhang, Li Wang, Aiguo Fei:
An Integrated Platoon and UAV System for 3D Localization in Search and Rescue. 144-149 - Xiangwang Hou, Zhiyuan Ren, Jingjing Wang, Shuya Zheng, Hailin Zhang:
Latency and Reliability Oriented Collaborative Optimization for Multi-UAV Aided Mobile Edge Computing System. 150-156 - Cong Xu, Tingqiu Yuan, Haibo Zhang, Tao Huang, Feilong Tang:
Dual Channel Per-packet Load Balancing for Datacenters. 157-164 - Kaihui Gao, Dan Li, Li Chen, Jinkun Geng, Fei Gui, Yang Cheng, Yue Gu:
Predicting Traffic Demand Matrix by Considering Inter-flow Correlations. 165-170 - Minghan Jia, Weifeng Sun, Zun Wang, Yaohua Yan, Hongyu Qin, Kelong Meng:
MFBBR: An Optimized Fairness-aware TCP-BBR Algorithm in Wired-cum-wireless Network. 171-176 - Jiao Li, Li Chen:
A Concurrent Weighted Communication Scheme for Blockchain Transaction. 177-182 - Muhammad Habib Ur Rehman, Khaled Salah, Ernesto Damiani, Davor Svetinovic:
Towards Blockchain-Based Reputation-Aware Federated Learning. 183-188 - Sriram S, Vinayakumar R., Mamoun Alazab, K. P. Soman:
Network Flow based IoT Botnet Attack Detection using Deep Learning. 189-194 - Amit Dua, Akash Dutta, Nishat Zaman, Neeraj Kumar:
Blockchain-based E-waste Management in 5G Smart Communities. 195-200 - Changshuo Hu, Dong Ma, Mahbub Hassan, Wen Hu:
NLC: Natural Light Communication using Switchable Glass. 201-206 - Jingjie Zong, Shuangzhi Li, Di Zhang, Gangtao Han, Xiaomin Mu, Ali Kashif Bashir, Joel J. P. C. Rodrigues:
Smart User Pairing for Massive MIMO Enabled Industrial IoT Communications. 207-212 - Wali Ullah Khan, Ju Liu, Furqan Jameel, Muhammad Toaha Raza Khan, Syed Hassan Ahmed, Riku Jäntti:
Secure Backscatter Communications in Multi-Cell NOMA Networks: Enabling Link Security for Massive IoT Networks. 213-218 - Ayan Mondal, Sudip Misra:
BIND: Blockchain-Based Flow-Table Partitioning in Distributed Multi-Tenant Software-Defined Networks. 219-224 - Ephraim Moges, Tao Han:
DecOp: Decentralized Network Operations in Software Defined Networking using Blockchain. 225-230 - Siyi Liao, Jun Wu, Jianhua Li, Ali Kashif Bashir:
Proof-of-Balance: Game-Theoretic Consensus for Controller Load Balancing of SDN. 231-236 - Durbadal Chattaraj, Sourav Saha, Basudeb Bera, Ashok Kumar Das:
On the Design of Blockchain-Based Access Control Scheme for Software Defined Networks. 237-242 - Parisa Foroughi, Hamzeh Beyranvand, Maurice Gagnaire, Sawsan Al Zahr:
User Association in Hybrid UAV-cellular Networks for Massive Real-time IoT Applications. 243-248 - Maninderpal Singh, Gagangeet Singh Aujla, Rasmeet Singh Bali:
ODOB: One Drone One Block-based Lightweight Blockchain Architecture for Internet of Drones. 249-254 - Rajesh Gupta, Arpit Shukla, Parimal Mehta, Pronaya Bhattacharya, Sudeep Tanwar, Sudhanshu Tyagi, Neeraj Kumar:
VAHAK: A Blockchain-based Outdoor Delivery Scheme using UAV for Healthcare 4.0 Services. 255-260 - Vikas Hassija, Vikas Saxena, Vinay Chamola:
A Blockchain-based Framework for Drone-Mounted Base Stations in Tactile Internet Environment. 261-266 - Jifan Tang, Wanli Zhang, Xiangyang Gong, Guangpeng Li, Delei Yu, Ye Tian, Bowen Liu, Lei Zhao:
A Flexible Hierarchical Network Architecture with Variable-Length IP Address. 267-272 - Sheng Jiang, Guangpeng Li, Brian E. Carpenter:
A New Approach to a Service Oriented Internet Protocol. 273-278 - Morteza Kheirkhah, Truong Khoa Phan, XinPeng Wei, David Griffin, Miguel Rio:
UCIP: User Controlled Internet Protocol. 279-284 - Yuhong Li, Peng Zhang, Yingchao Zhou, Di Jin:
A Data Forwarding Mechanism based on Deep Reinforcement Learning for Deterministic Networks. 285-290 - Stefano Angieri, Marcelo Bagnulo, Alberto García-Martínez, Bingyang Liu, Xinpeng Wei:
InBlock4: Blockchain-based Route Origin Validation. 291-296 - Yoshiaki Inoue:
The Probability Distribution of the AoI in Queues with Infinitely Many Servers. 297-302 - Mohammad Moltafet, Markus Leinonen, Marian Codreanu:
Average Age of Information in a Multi-Source M/M/1 Queueing Model with LCFS Prioritized Packet Management. 303-308 - Zhongdong Liu, Liang Huang, Bin Li, Bo Ji:
Anti-Aging Scheduling in Single-Server Queues: A Systematic and Comparative Study. 309-316 - Jingzhou Sun, Zhiyuan Jiang, Sheng Zhou, Zhisheng Niu:
Age-Optimal Scheduling for Heterogeneous Traffic with Timely-Throughput Constraint. 317-322 - Haitao Huang, Deli Qiao, Mustafa Cenk Gursoy:
Age-Energy Tradeoff in Fading Channels with Packet-Based Transmissions. 323-328 - Mangang Xie, Jie Gong, Xiao Ma:
Is the Packetized Transmission Efficient? An Age-Energy Perspective. 329-333 - Haina Zheng, Ke Xiong, Pingyi Fan, Zhangdui Zhong, Khaled Ben Letaief:
Age-Energy Region in Wireless Powered Communication Networks. 334-339 - Piotr Gawlowicz, Elnaz Alizadeh Jarchlo, Anatolij Zubow:
WiFi over VLC using COTS Devices. 340-345 - Merkebu Girmay, Vasilis Maglogiannis, Dries Naudts, Jaron Fontaine, Adnan Shahid, Eli De Poorter, Ingrid Moerman:
Adaptive CNN-based Private LTE Solution for Fair Coexistence with Wi-Fi in Unlicensed Spectrum. 346-351 - Ashutosh Srivastava, Fraida Fund, Shivendra S. Panwar:
An Experimental Evaluation of Low Latency Congestion Control for mmWave Links. 352-357 - Xiaoyong Yuan, Pan He, Xiaolin Li, Dapeng Wu:
Adaptive Adversarial Attack on Scene Text Recognition. 358-363 - Yu Lu, Ju Liu, Xueyin Zhao, Xiaoxi Liu, Weiqiang Chen, Xuesong Gao:
Image Translation with Attention Mechanism based on Generative Adversarial Networks. 364-369 - Siqin Fang, Sean Kennedy, Chenggang Wang, Boyang Wang, Qingqi Pei, Xuefeng Liu:
Sparser: Secure Nearest Neighbor Search with Space-filling Curves. 370-375 - Rabeya Bosri, Abdur Razzak Uzzal, Abdullah Al Omar, Md. Zakirul Alam Bhuiyan, Mohammad Shahriar Rahman:
HIDEchain: A User-Centric Secure Edge Computing Architecture for Healthcare IoT Devices. 376-381 - Hong Su, Bing Guo, Yan Shen, Tao Li, Chaoxia Qing, Zhen Zhang:
A Solution for State Conflicts of Smart Contract in Interaction with Non-blockchain. 382-387 - Xiao Wu, Han Qiu, Shuyi Zhang, Gérard Memmi, Keke Gai, Wei Cai:
ChainIDE 2.0: Facilitating Smart Contract Development for Consortium Blockchain. 388-393 - Zhaoyan Song, Ruiting Zhou, Shihan Zhao, Shixin Qin, John C. S. Lui, Zongpeng Li:
Edge Emergency Demand Response Control via Scheduling in Cloudlet Cluster. 394-399 - Wei Feng, Wan Tang, Ximin Yang, Lu Liu:
MEM: A Multi-Staged Eviction Mechanism of Flowtable for Software-Defined Datacenters. 400-405 - Guoping Tan, Huipeng Zhang, Siyuan Zhou:
Resource Allocation in MEC-enabled Vehicular Networks: A Deep Reinforcement Learning Approach. 406-411 - Federico Mason, Federico Chiariotti, Martina Capuzzo, Davide Magrin, Andrea Zanella, Michele Zorzi:
Combining LoRaWAN and a New 3D Motion Model for Remote UAV Tracking. 412-417 - Paresh Saxena, Thomas Dreibholz, Harald Skinnemoen, Özgü Alay, M. A. Vazquez-Castro, Simone Ferlin, Güray Açar:
Resilient Hybrid SatCom and Terrestrial Networking for Unmanned Aerial Vehicles. 418-423 - Xin Wang, Shuhui Chen, Jinshu Su:
App-Net: A Hybrid Neural Network for Encrypted Mobile Traffic Classification. 424-429 - Libin Liu, Li Chen, Hong Xu, Hua Shao:
Automated Traffic Engineering in SDWAN: Beyond Reinforcement Learning. 430-435 - Xiang Chen, Yuxin Chen, Qun Huang, Haifeng Zhou, Dong Zhang, Chunming Wu, Junchi Xing:
FastScale: Fast Scaling Out of Network Functions. 436-442 - Fuyou Li, Zitian Zhang, Yunpeng Zhu, Jie Zhang:
Prediction of Twitter Traffic Based on Machine Learning and Data Analytics. 443-448 - Jianyu Wang, Wenchi Cheng, Hailin Zhang:
Statistical QoS Provisioning Based Caching Placement for D2D Communications Based Emergency Networks. 449-454 - Xin Liu, Xueyan Zhang:
Green Cognitive Internet of Things with Self Supply of Energy and Spectrum in Emergency Communications. 455-459 - Weifeng Sun, Guanghao Zhang, Yuankui Zhang, Chi Lin:
RAT-NHP: Radio Access Technology Selection Based on N-hop Prediction. 460-465 - Yu Liu, Qinghe Du:
Security Enhancement and Evaluation for Noise Aggregation over Wireless Fading Channels. 466-471 - Philippe Jacquet, Dalia Popescu, Bernard Mans:
Connecting flying backhauls of drones to enhance vehicular networks with fixed 5G NR infrastructure. 472-477 - Zhaohua Lv, Jianjun Hao, Yijun Guo:
Energy Minimization for MEC-enabled Cellular-Connected UAV: Trajectory Optimization and Resource Scheduling. 478-483 - Olga G. Vikhrova, Sara Pizzi, Antonella Molinaro, Giuseppe Araniti:
Paging Group Size Distribution for Multicast Services in 5G Networks. 484-489 - Sudip Misra, Pallav Kumar Deb, Nidhi Pathak, Anandarup Mukherjee:
Blockchain-Enabled SDN for Securing Fog-Based Resource-Constrained IoT. 490-495 - Lei Liu, Wei Feng, Chen Chen, Yuru Zhang, Dapeng Lan, Xiaoming Yuan, Sahil Vashisht:
BS-IoT: Blockchain Based Software Defined Network Framework for Internet of Things. 496-501 - Syed Bilal Hussain Shah, Lei Wang, Prakasha Reddy, Chettupally Anil Carie:
Non-Cooperative Game to Balance Energy and Security in Resource Constrained IoT Networks. 502-507 - Dawid Polap, Gautam Srivastava, Alireza Jolfaei, Reza M. Parizi:
Blockchain Technology and Neural Networks for the Internet of Medical Things. 508-513 - Ying Gao, Yijian Chen, Hongliang Lin, Joel J. P. C. Rodrigues:
Blockchain based secure IoT data sharing framework for SDN-enabled smart communities. 514-519 - Qiao Tian, Pengwan Qin, Meiyu Wang, Yang Liu:
D-S based Fusion Method for Against Malicious Nodes in Wireless Sensor Networks. 520-525 - Zhexian Shen, Kui Xu:
Location-Aided Secure Transmission for Uplink Massive MIMO System Against Full-Duplex Jammer. 526-531 - Pengfei Zhu, Konglin Zhu, Lin Zhang:
Security Analysis of LTE-V2X and A Platooning Case Study. 532-537 - Hanxun Ren, Qinghe Du, Yijie Ou, Pinyi Ren:
Fountain-Coding-Aided Secure Delivery via Cross-locking Between Payload Data and Control Information. 538-543 - Inam Ullah Khan, Nadeem Javaid, C. James Taylor, Kelum A. A. Gamage, Xiandong Ma:
Big Data Analytics Based Short Term Load Forecasting Model for Residential Buildings in Smart Grids. 544-549 - Zhengping Luo, Tao Hou, Tung Thanh Nguyen, Hui Zeng, Zhuo Lu:
Log Analytics in HPC: A Data-driven Reinforcement Learning Framework. 550-555 - Yongyong Wei, Rong Zheng:
Handling Device Heterogeneity in Wi-Fi based Indoor Positioning Systems. 556-561 - Zhenhui Situ, Ivan Wang Hei Ho, Yun Hou, Peiya Li:
The Feasibility of NOMA in C-V2X. 562-567 - Mikhail Krasnoselskii, Grigorii Melnikov, Yury Yanovich:
No-Dealer: Byzantine Fault-Tolerant Random Number Generator. 568-573 - Yongge Wang, Jingwen Sun, Xin Wang, Yunchuan Wei, Hao Wu, Zhou Yu, Gillian Chu:
Sperax: An Approach To Defeat Long Range Attacks In Blockchains. 574-579 - Yuxing Li, Hu Zheng, Chengqiang Huang, Ke Pei, Jinghui Li, Longbo Huang:
Terminator: An Efficient and Light-weight Fault Localization Framework. 580-585 - Yunpeng Cao, Haifeng Wang, Shuqing He:
Dynamic deployment model for large-scale compute-intensive clusters. 586-591 - Lemei Huang, Sheng Cheng, Yu Guan, Xinggong Zhang, Zongming Guo:
Consistent User-Traffic Allocation and Load Balancing in Mobile Edge Caching. 592-597 - Alaa Awad Abdellatif, Carla-Fabiana Chiasserini, Francesco Malandrino:
Active Learning-based Classification in Automated Connected Vehicles. 598-603 - Minghui LiWang, Zhibin Gao, Seyyedali Hosseinalipour, Huaiyu Dai, Xianbin Wang:
Energy-aware Allocation of Graph Jobs in Vehicular Cloud Computing-enabled Software-defined IoV. 604-609 - Marica Amadeo, Giuseppe Ruggeri, Claudia Campolo, Antonella Molinaro, Giuseppe Mangiullo:
Caching Popular and Fresh IoT Contents at the Edge via Named Data Networking. 610-615 - Chenghan Jia, Kai Lin, Jing Deng:
A Multi-property Method to Evaluate Trust of Edge Computing Based on Data Driven Capsule Network. 616-621 - Li Ding, Biao Han, Xiaoyan Wang, Peng Li, Baosheng Wang:
Distributed Intelligence Empowered Data Aggregation and Distribution for Multi-robot Cooperative Communication. 622-627 - Adil Ali Raja, Muhammad Ali Jamshed, Haris Pervaiz, Syed Ali Hassan:
Performance Analysis of UAV-assisted Backhaul Solutions in THz enabled Hybrid Heterogeneous Network. 628-633 - Omid Esrafilian, Rajeev Gangula, David Gesbert:
Autonomous UAV-aided Mesh Wireless Networks. 634-640 - Yuan Liu, Ke Xiong, Bo Gao, Yu Zhang, Pingyi Fan, Khaled Ben Letaief:
Multi-UAV Assisted Communication Networks: Towards Max-Min Secrecy Rate. 641-646 - Tharindu D. Ponnimbaduge Perera, Stefan Panic, Dushantha Nalin K. Jayakody, P. Muthuchidambaranathan:
UAV-assisted Data Collection in Wireless Powered Sensor Networks over Multiple Fading Channels. 647-652 - Hui Wen, Yue Wu, Chenming Yang, Hancong Duan, Shui Yu:
A Unified Federated Learning Framework for Wireless Communications: towards Privacy, Efficiency, and Security. 653-658 - Sixian Sun, Xiao Fu, Bin Luo, Xiaojiang Du:
Detecting and Mitigating ARP Attacks in SDN-Based Cloud Environment. 659-664 - Haili Yu, Guangshun Li, Junhua Wu, Xinrong Ren, Jiabin Cao:
A Location-Based Path Privacy Protection Scheme in Internet of Vehicles. 665-670 - Fabio Busacca, Laura Galluccio, Sergio Palazzo:
Drone-assisted Edge Computing: a game-theoretical approach. 671-676 - Mahsa Keshavarz, Alireza Shamsoshoara, Fatemeh Afghah, Jonathan D. Ashdown:
A Real-time Framework for Trust Monitoring in a Network of Unmanned Aerial Vehicles. 677-682 - Sayed Amir Hoseini, Jahan Hassan, Ayub Bokani, Salil S. Kanhere:
Trajectory Optimization of Flying Energy Sources using Q-Learning to Recharge Hotspot UAVs. 683-688 - Xu Wang, Randall A. Berry:
MAC Trade-offs Between Age and Reachability of Information in Vehicular Safety Applications. 689-695 - Melih Bastopcu, Sennur Ulukus:
Who Should Google Scholar Update More Often? 696-701 - Zhengxiong Yuan, Bin Li, Jia Liu:
Can We Improve Information Freshness with Predictions in Mobile Crowd-Learning? 702-709 - Chao Xu, Xijun Wang, Howard H. Yang, Hongguang Sun, Tony Q. S. Quek:
AoI and Energy Consumption Oriented Dynamic Status Updating in Caching Enabled IoT Networks. 710-715 - Mengjie Yi, Xijun Wang, Juan Liu, Yan Zhang, Bo Bai:
Deep Reinforcement Learning for Fresh Data Collection in UAV-assisted IoT Networks. 716-721 - Hantao Feng, Xiaotong Fu, Hongyu Sun, He Wang, Yuqing Zhang:
Efficient Vulnerability Detection based on abstract syntax tree and Deep Learning. 722-727 - Pierre Danhier, Clément Massart, François-Xavier Standaert:
Fidelity Leakages: Applying Membership Inference Attacks to Preference Data. 728-733 - Junchi Xing, Chunming Wu:
Detecting Anomalies in Encrypted Traffic via Deep Dictionary Learning. 734-739 - Sriram S, Vinayakumar R., V. Sowmya, Mamoun Alazab, K. P. Soman:
Multi-scale Learning based Malware Variant Detection using Spatial Pyramid Pooling Network. 740-745 - Poongodi M, Mounir Hamdi, Vijayakumar Varadarajan, Bharat S. Rawal, Maode Ma:
Building an Authentic and Ethical Keyword Search by applying Decentralised (Blockchain) Verification. 746-753 - Lifeng Liu, Jian Li, Tim Tingqiu Yuan:
TEE-Based Mutual Proofs of Transmission Services in Decentralized Systems. 754-759 - Jianyi Zhang, Pengju Li, Zhili Xu, Anqi Wang, Jin Liu, Zhiqiang Wang:
Gemini-Chain: A Regulatable Digital Currency Model based on Blockchain. 760-765 - Prabhu Janakaraj, Pinyarash Pinyoanuntapong, Pu Wang, Minwoo Lee:
Towards In-Band Telemetry for Self Driving Wireless Networks. 766-773 - Filip Krasniqi, Jocelyne Elias, Jérémie Leguay, Alessandro E. C. Redondi:
End-to-end Delay Prediction Based on Traffic Matrix Sampling. 774-779 - Mohamed Moulay, Rafael A. García Leiva, Pablo J. Rojo Maroni, Javier Lazaro, Vincenzo Mancuso, Antonio Fernández Anta:
A Novel Methodology for the Automated Detection and Classification of Networking Anomalies. 780-786 - Nikita Trivedi, Bighnaraj Panigrahi, Hemant Kumar Rath:
WiNetSense: Sensing and Analysis Model for Large-scale Wireless Networks. 787-792 - Ziyi Shen, Shuyu He, Qing Yang:
QuickWalk: Quick Trust Assessment for Vehicular Social Networks. 793-798 - Bin Jiang, Jiachen Yang, Houbing Song:
Protecting Privacy From Aerial photography: State of the Art, Opportunities, and Challenges. 799-804 - Di Tang, Jian Gu, Weijia Han, Xiao Ma:
Quantitative Analysis on Source-Location Privacy for Wireless Sensor Networks. 805-809 - Weiqiang Xie, Xiao Yu, Yuqing Zhang, He Wang:
An Improved Shapley Value Benefit Distribution Mechanism in Cooperative Game of Cyber Threat Intelligence Sharing. 810-815 - Mattia Milani, Marco Nesler, Michele Segata, Luca Baldesi, Leonardo Maccari, Renato Lo Cigno:
Improving BGP Convergence with Fed4FIRE+ Experiments. 816-823 - Yuanjun Yao, Qiang Cao, Paul Ruth, Mert Cevik, Cong Wang, Jeffrey S. Chase:
Logical Peering for Interdomain Networking on Testbeds. 824-829 - Luke Bertot, Lucas Nussbaum, David Margery:
Implementing SFA Support on an Established HPC-flavored Testbed: Lessons Learned. 830-835 - Qian Qu, Ronghua Xu, Seyed Yahya Nikouei, Yu Chen:
An Experimental Study on Microservices based Edge Computing Platforms. 836-841 - Floriano De Rango, Mauro Tropea, Peppino Fazio:
Mitigating DoS attacks in IoT EDGE Layer to preserve QoS topics and nodes' energy. 842-847 - Gianluca Aloi, Giancarlo Fortino, Raffaele Gravina, Pasquale Pace, Claudio Savaglio:
E-ALPHA: Edge-based Assisted Living Platform for Home cAre. 848-853 - Batyr Charyyev, Mehmet Hadi Gunes:
IoT Event Classification Based on Network Traffic. 854-859 - Madhusudan Singh:
Tri-Blockchain Based Intelligent Vehicular Networks. 860-864 - Gunasekaran Raja, Yelisetty Manaswini, Gaayathri Devi Vivekanandan, Harish Sampath, Kapal Dev, Ali Kashif Bashir:
AI-Powered Blockchain - A Decentralized Secure Multiparty Computation Protocol for IoV. 865-870 - Gaurang Bansal, Vinay Chamola:
Lightweight Authentication Protocol for Inter Base Station Communication in Heterogeneous Networks. 871-876 - Ishan Budhiraja, Neeraj Kumar, Sudhanshu Tyagi, Quoc-Viet Pham, Sudeep Tanwar:
Energy Efficient Mode Selection Scheme for Wireless Powered D2D Communications with NOMA Underlaying UAV. 877-882 - Dingde Jiang, Zhihao Wang, Zhihan Lv, Wenpan Li:
Smart Antenna-based Multi-hop Highly-Energy-Efficient DSA Approach to Drone-assisted Backhaul Networks for 5G. 883-887 - Mohammad Wazid, Ashok Kumar Das, Sachin Shetty, Joel J. P. C. Rodrigues:
On the Design of Secure Communication Framework for Blockchain-Based Internet of Intelligent Battlefield Things Environment. 888-893 - Huilian Zhang, Xiaofan He, Huaiyu Dai:
Secure UAV Communication Networks via Friendly Jamming and Bandwidth Allocation. 894-899 - Jiaxin Liu, Wei Zhao, Ye Hong, Sheng Gao, Xi Huang, Yingjie Zhou:
Learning Features of Brain Network for Anomaly Detection. 900-905 - Zhenyu Wang, Honglin Hu, Xianfu Chen, Ting Zhou, Tianheng Xu:
A Novel SSVEP-Based Brain-Computer Interface Using Joint Frequency and Space Modulation. 906-911 - Doga Can Atabay, Elif Uysal, Onur Kaya:
Improving Age of Information in Random Access Channels. 912-917 - Emmanouil Fountoulakis, Nikolaos Pappas, Marian Codreanu, Anthony Ephremides:
Optimal Sampling Cost in Wireless Networks with Age of Information Constraints. 918-923 - Sneihil Gopal, Sanjit K. Kaul, Rakesh Chaturvedi, Sumit Roy:
A Non-Cooperative Multiple Access Game for Timely Updates. 924-929 - He Chen, Yifan Gu, Soung-Chang Liew:
Age-of-Information Dependent Random Access for Massive IoT Networks. 930-935 - Qining Zhang, Haoyue Tang, Jintao Wang:
Minimizing the Age of Synchronization in Power-Constrained Wireless Networks with Unreliable Time-Varying Channels. 936-941 - Kumar Saurav, Rahul Vaze:
Game of Ages. 942-947 - Rajshekhar Vishweshwar Bhat, Rahul Vaze, Mehul Motani:
Age of Information Minimization in Fading Multiple Access Channels. 948-953 - Ngombo Armando, José Marcelo Fernandes, André Rodrigues, Jorge Sá Silva, Fernando Boavida:
Exploring Approaches to the Management of Physical, Virtual, and Social Sensors. 954-959 - Xiaole Li, Hongyun Zheng, Yuchun Guo:
Migrating to SDN for Mobile Core Networks: A Dynamic and Global Perspective. 960-965 - Chang Su, Jin Wang, Xianzhong Xie:
Point-of-Interest Recommendation based on Geographical Influence and Extended Pairwise Ranking. 966-971 - Paulo Silva, Carolina Gonçalves, Carolina Godinho, Nuno Antunes, Marília Curado:
Using NLP and Machine Learning to Detect Data Privacy Violations. 972-977 - Hongning Li, Jiexiong Chen, Le Wang, Qingqi Pei, Hao Yue:
Privacy-preserving Data Aggregation for Big Data in Financial Institutions. 978-983 - Yan Sun, Lihua Yin, Zhe Sun, Zhihong Tian, Xiaojiang Du:
An IoT data sharing privacy preserving scheme. 984-990 - Shuli Zheng, Lixuan Pan, Donghui Hu, Meng Li, Yuqi Fan:
A Blockchain-Based Trading Platform for Big Data. 991-996 - Zhiqiang Wang, Pingchuan Ma, Xiaoxiang Zou, Jianyi Zhang, Tao Yang:
Security of Medical Cyber-physical Systems: An Empirical Study on Imaging Devices. 997-1002 - Liuqing Yang, Xiao-Yang Liu, Wenbo Gong:
Secure Smart Home Systems: A Blockchain Perspective. 1003-1008 - David H. S. Lima, André L. L. de Aquino, Marília Curado:
An NFV MANO Architecture with a Resource Allocation Mechanism Based on Game Theory. 1009-1014 - Fang Fu, Yunpeng Kang, Zhicai Zhang, F. Richard Yu:
Transcoding for Live Streaming-based on Vehicular Fog Computing: An Actor-Critic DRL Approach. 1015-1020 - Mengni Ruan, Huan Zhou, Dawei Li, Xuxun Liu, Qingyong Deng:
Detection of Temporal Communities in Mobile Social Networks. 1021-1026 - Wenjie Kang, Peidong Zhu, Xuchong Liu:
Integrated Defense Mechanism Based on Attack Goals against Three Attack Strategies in Smart Grid. 1027-1032 - Federico Chiariotti, Alberto Signori, Filippo Campagnaro, Michele Zorzi:
Underwater Jamming Attacks as Incomplete Information Games. 1033-1038 - Sabarish Krishna Moorthy, Zhangyu Guan:
LeTera: Stochastic Beam Control Through ESN Learning in Terahertz-Band Wireless UAV Networks. 1039-1044 - Hao Liang, Aijun Liu, Xinhai Tong, Chao Gong:
Raptor-like Rateless Spinal Codes using Outer Systematic Polar Codes for Reliable Deep Space Communications. 1045-1050 - Aparna Kumari, Arpit Shukla, Rajesh Gupta, Sudeep Tanwar, Sudhanshu Tyagi, Neeraj Kumar:
ET-DeaL: A P2P Smart Contract-based Secure Energy Trading Scheme for Smart Grid Systems. 1051-1056 - Haotong Cao, Yue Hu, Qin Wang, Shengchen Wu, Longxiang Yang:
A Blockchain-Based Virtual Network Embedding Algorithm for Secure Software Defined Networking. 1057-1062 - Sudip Misra, Kounteya Sarkar, Nurzaman Ahmed:
Blockchain-Based Controller Recovery in SDN. 1063-1068 - Furqan Jameel, Wali Ullah Khan, Muhammad Ali Jamshed, Haris Pervaiz, Qammer H. Abbasi, Riku Jäntti:
Reinforcement Learning for Scalable and Reliable Power Allocation in SDN-based Backscatter Heterogeneous Network. 1069-1074 - Liping Zhang, Rong Chai, Tiantian Yang, Qianbin Chen:
Min-Max Worst-Case Design for Computation Offloading in Multi-user MEC System. 1075-1080 - Peiying Zhang, Fanglin Liu, Neeraj Kumar, Gagangeet Singh Aujla:
Information Classification Strategy for Blockchain-based Secure SDN in IoT Scenario. 1081-1086 - Roberto Torre Arranz, Robert-Steve Schmoll, Florian Kemser, Hani Salah, Ievgenii Tsokalo, Frank H. P. Fitzek:
Demo: Benchmarking Live Migration Performance of Two Trendy Virtualization Technologies. 1087-1088 - Gauravdeep Shami, Marc Lyonnais, Rodney Wilson:
Real Time Adaptive Networking using Programmable 100Gbps NIC on Data Transfer Nodes. 1089-1090 - Shahzeb Mustafa, Prasun Kanti Dey, Murat Yuksel:
GENIX: A GENI-based IXP Emulation. 1091-1092 - Gunasekaran Raja, Priyanka Dhanasekaran, Sudha Anbalagan, Aishwarya Ganapathisubramaniyan, Ali Kashif Bashir:
SDN-enabled Traffic Alert System for IoV in Smart Cities. 1093-1098 - Chunsheng Lin, Juanjuan Huang, Sai Huang, Yuanyuan Yao, Xin Guo:
Features Fusion based Automatic Modulation Classification Using Convolutional Neural Network. 1099-1104 - Jibo Shi, Haojun Zhao, Meiyu Wang, Qiao Tian:
Signal Recognition Based On Federated Learning. 1105-1110 - Hua Wu, Qiuyan Wu, Guang Cheng, Shuyi Guo:
Instagram User Behavior Identification Based on Multidimensional Features. 1111-1116 - Yihan Liang, Yejun He, Jian Qiao:
Optimal Power Splitting for Simultaneous Wireless Information and Power Transfer in Millimeter-wave Networks. 1117-1122 - Su Wang, Shuo Wang, Ru Huo, Tao Huang, Jiang Liu, Yunjie Liu:
DeepAalo: Auto-adjusting Demotion Thresholds for Information-agnostic Coflow Scheduling. 1123-1128 - Xiaoyang Zhao, Chuan Wu, Franck Le:
Improving Inter-domain Routing through Multi-agent Reinforcement Learning. 1129-1134 - Pingping Tang, Yuning Dong, Shiwen Mao:
Online Traffic Classification Using Granules. 1135-1140 - Su Wang, Shuo Wang, Dong Zhou, Yiran Yang, Wenjie Zhang, Tao Huang, Ru Huo, Yunjie Liu:
Large-Scale and Rapid Flow Size Estimation for Improving Flow Scheduling. 1141-1146 - Xiaofan He, Richeng Jin, Huaiyu Dai:
Glide and Zap Q-Learning. 1147-1152 - Gaetano Somma, Constantine Ayimba, Paolo Casari, Simon Pietro Romano, Vincenzo Mancuso:
When Less is More: Core-Restricted Container Provisioning for Serverless Computing. 1153-1159 - German Sviridov, Cedric Beliard, Andrea Bianco, Paolo Giaccone, Dario Rossi:
Removing human players from the loop: AI-assisted assessment of Gaming QoE. 1160-1165 - Xiang Li, Yuchun Guo, Ye Sheng, Yishuai Chen:
Characterizing Social Marketing Behavior of E-commerce Celebrities and Predicting Their Value. 1166-1171 - Johannes Pflugmacher, Stephan Escher, Jan Reubold, Thorsten Strufe:
The German-Speaking Twitter Community Reference Data Set. 1172-1177 - Tung V. Doan, Zhongyi Fan, Giang T. Nguyen, Hani Salah, Dongho You, Frank H. P. Fitzek:
Follow Me, If You Can: A Framework for Seamless Migration in Mobile Edge Cloud. 1178-1183 - Luning Liu, Luhan Wang, Xiangming Wen:
Joint Network Selection and Traffic Allocation in Multi-Access Edge Computing-Based Vehicular Crowdsensing. 1184-1189 - Juan Fang, Yong Chen, Shuaibing Lu:
A Scheduling Strategy for Reduced Power Consumption in Mobile Edge Computing. 1190-1195 - Lihan Zhang, Zhuo Li, Xin Chen:
Incentive Mechanism Design for Edge-Cloud Collaboration in Mobile Crowd Sensing. 1196-1201 - Liang Zhao, Areeb Saldin, Jia Hu, Luwei Fu, Junling Shi, Yunchong Guan:
A Novel Simulated Annealing based Routing Algorithm in F-SDNs. 1202-1207 - Mithun Mukherjee, Vikas Kumar, Ankit Lat, Mian Guo, Rakesh Matam, Yunrong Lv:
Distributed Deep Learning-based Task Offloading for UAV-enabled Mobile Edge Computing. 1208-1212 - Nikhil Kumar, Monalisa Ghosh, Chetna Singhal:
UAV Network for Surveillance of Inaccessible Regions with Zero Blind Spots. 1213-1218 - Sunil Jacob, Varun G. Menon, P. G. Shynu, Fathima Shemim KS, Bandana Mahapatra, Saira Joseph:
Bidirectional Multi-tier Cognitive Swarm Drone 5G Network. 1219-1224 - Pritom Gogoi, Joy Dutta, Rakesh Matam, Mithun Mukherjee:
An UAV assisted Multi-Sensor based Smart Parking System. 1225-1230 - Alok Ranjan, Himanshu Bhushan Sahu, Prasant Misra, Yanxiao Zhao, Hui Sun:
RSSI or LQI: Insights from Real-Time Deployments for Underground Sensing and Applications. 1231-1236 - Rui Chen, Xiyuan Huang, Wei Liu, Yan Zhou:
RFID-Based Vehicle Localization Scheme in GPS-Less Environments. 1237-1241 - Juan Xu, Yan Zhang, Yakun Zhao, Jiali Kan, Lin Lin:
A TDMA Protocol Based on Data Priority for In-Vivo Wireless NanoSensor Networks. 1242-1247 - Kun Yang, Cong Shen, Tie Liu:
Deep Reinforcement Learning based Wireless Network Optimization: A Comparative Study. 1248-1253 - Yiwen Wu, Sipei Zhou, Yunkai Wei, Supeng Leng:
Deep Reinforcement Learning for Controller Placement in Software Defined Network. 1254-1259 - Jing Jiang, Junyu Chen, Yongbin Xie, Hongjiang Lei, Ling Zheng:
Modified-PBIL Based User Selection for Multi-user Massive MIMO Systems with Massive Connectivity. 1260-1265 - Kai Huang, Kailiang Li, Lei Shu, Xing Yang:
Demo Abstract: High Voltage Discharge Exhibits Severe Effect on ZigBee-based Device in Solar Insecticidal Lamps Internet of Things. 1266-1267 - Miao Huang, Haihan Duan, Yanru Chen, Yanbing Yang, Jie Hao, Liangyin Chen:
Demo Abstract: FingerLite: Finger Gesture Recognition Using Ambient Light. 1268-1269 - Wei Zhang, Siyu Fu, Zixu Cao, Zhiyuan Jiang, Shunqing Zhang, Shugong Xu:
An SDR-in-the-Loop Carla Simulator for C-V2X-Based Autonomous Driving. 1270-1271 - Piotr Gawlowicz, Anatolij Zubow, Suzan Bayhan:
Demo Abstract: Cross-Technology Communication between LTE-U/LAA and WiFi. 1272-1273 - Zequn Chen, Runji Lin, Haihan Duan, Yanru Chen, Yanbing Yang, Rengmao Wu, Liangyin Chen:
Increasing the Data Rate for Reflected Optical Camera Communication Using Uniform LED Light. 1274-1275 - Daniel F. Perez-Ramirez, Rebecca Steinert, Natalia Vesselinova, Dejan Kostic:
Demo Abstract: Elastic Deployment of Robust Distributed Control Planes with Performance Guarantees. 1276-1277 - Qixun Zhang, Huan Sun, Zhiqing Wei, Zhiyong Feng:
Sensing and Communication Integrated System for Autonomous Driving Vehicles. 1278-1279 - Pavlos Basaras, Stepán Kucera, Kariem Fahmi, Holger Claussen, George Iosifidis:
Demo: Seamless Mobile Video Streaming in Multicast Multi-RAT Communications. 1280-1281 - German Sviridov, Cedric Beliard, Gwendal Simon, Andrea Bianco, Paolo Giaccone, Dario Rossi:
Demo abstract: Leveraging AI players for QoE estimation in cloud gaming. 1282-1283 - Peter Willis, Nirmala Shenoy, Hrishikesh B. Acharya:
Demo Abstract: Loop Avoidance in Computer Networks Using a Meshed Tree Protocol. 1284-1285 - Zhu Tang, Sudan Li, Peng Xun, Chengsong Wang, Wenping Deng, Baosheng Wang:
Demo Abstract: AutoPCT: An Agile Protocol Conformance Automatic Test Platform Based on Editable EFSM. 1286-1287 - Ningning Hou, Yuanqing Zheng:
Demo Abstract: CLoRa-A Covert Channel over LoRa PHY. 1288-1289 - Zaheer Khan, Janne Lehtomäki, Adnan Shahid, Ingrid Moerman:
DEMO: Real-time Edge Analytics and Concept Drift Computation for Efficient Deep Learning From Spectrum Data. 1290-1291 - Cedric Beliard, Alessandro Finamore, Dario Rossi:
Opening the Deep Pandora Box: Explainable Traffic Classification. 1292-1293 - Ran Ben Basat, Gil Einziger, Bilal Tayh:
Near Optimal Network-wide Per-Flow Measurement. 1294-1295 - Gonglong Chen, Wei Dong, Fujian Qiu, Gaoyang Guan, Yi Gao, Siyu Zeng:
Scalable and Interactive Simulation for IoT Applications with TinySim. 1296-1297 - Itamar Cohen, Gil Einziger, Maayan Goldstein, Yaniv Sa'ar, Gabriel Scalosub, Erez Waisbard:
Poster Abstract: Parallel VM Placement with Provable Guarantees. 1298-1299 - Lei Ding, Yang Li, Haiyang Wang, Ke Xu:
Measurement and Analysis of Cloud User Interest: A Glance From BitTorrent. 1300-1301 - Yi Zhao, Wei Bao, Dan Wang, Ke Xu, Liang Lv:
Connection-based Pricing for IoT Devices: Motivation, Comparison, and Potential Problems. 1302-1303 - Jing Chen, Zili Meng, Mingwei Xu:
Poster Abstract: Always Heading for the Peak: Learning to Route with Domain Knowledge. 1304-1305 - Weihan Chen, Zhiliang Wang, Han Zhang, Xia Yin, Xingang Shi, Lei Sun:
Poster Abstract: Joint Optimization of Service Function Chain Elastic Scaling and Routing. 1306-1307 - Su Wang, Zhiliang Wang, Xia Yin, Xingang Shi:
Poster Abstract: An Unsupervised Two-Layer Multi-Step Network Attack Detector. 1308-1309 - Wonwoo Jang, Wonjun Lee:
Poster Abstract: Towards Ambient Backscatter as an Anti-jamming Solution for IoT Devices. 1310-1311 - Florian Klingler, Fynn Hauptmeier, Christoph Sommer, Falko Dressler:
Poster Abstract: An Open Source Approach to Field Testing of WLAN up to IEEE 802.11ad at 60 GHz Using Commodity Hardware. 1312-1313 - Lei Feng, Xiaoyu Que, Peng Yu, Wenjing Li, Xuesong Qiu:
IRS Assisted Multiple User Detection for Uplink URLLC Non-Orthogonal Multiple Access. 1314-1315 - Yeming Li, Wei Dong, Yuxiang Lin:
Poster Abstract: Environment-Independent Electronic Device Detection using Millimeter-Wave. 1316-1317 - Jorge Baranda, Josep Mangues-Bafalluy, Luca Vettori, Ricardo Martínez, Giuseppe Avino, Carla-Fabiana Chiasserini, Corrado Puligheddu, Claudio Casetti, Juan Brenes Baranzano, Giada Landi, Koteswararao Kondepu, Francesco Paolucci, Silvia Fichera, Luca Valcarenghi:
Arbitrating Network Services in 5G Networks for Automotive Vertical Industry. 1318-1319 - Jorge Baranda, Josep Mangues-Bafalluy, Luca Vettori, Ricardo Martínez, Kiril Antevski, Luigi Girletti, Carlos J. Bernardos, Konstantin Tomakh, Denys Kucherenko, Giada Landi, Juan Brenes Baranzano, Xi Li, Xavier Costa-Pérez, Fabio Ubaldi, G. Imbarlina, Molka Gharbaoui:
NFV Service Federation: enabling Multi-Provider eHealth Emergency Services. 1322-1323 - Achille Salaün, Anne Bouillard, Marc-Olivier Buob:
Demo Abstract: End-to-end Root Cause Analysis of a Mobile Network. 1324-1325 - Jie Li, Cong Zhang, Zhi Liu, Wei Sun, Wei Hu, Qiyue Li:
Demo Abstract: Narwhal: a DASH-based Point Cloud Video Streaming System over Wireless Networks. 1326-1327 - Ke Lin, Siyao Cheng, Jianzhong Li:
Demo Abstract: iCrutch: A Smartphone-based Intelligent Crutch for Smart Home Applications. 1328-1329 - Shuping Peng, Jianwei Mao, Ruizhao Hu, Zhenbin Li:
Demo Abstract: APN6: Application-aware IPv6 Networking. 1330-1331 - Evgeny M. Khorov, Aleksey Kureev, Ilya Levitsky, Ian F. Akyildiz:
Prototyping NOMA Constellation Rotation in Wi-Fi. 1332-1333 - Zhao Zhao, Yanzhao Hou, Xiaosheng Tang, Xiaofeng Tao:
Demo Abstract: Cross-layer Authentication Based on Physical Channel Information using OpenAirInterface. 1334-1335 - Esteban Municio, Steven Latré, Johann M. Márquez-Barja:
Whispering to Industrial IoT for converging multi-domain Network Programmability. 1336-1337 - Nina Slamnik-Krijestorac, Johann M. Márquez-Barja:
Demo Abstract: Assessing MANO Performance based on VIM Platforms within MEC Context. 1338-1339 - Md. Tahmid Rashid, Daniel Zhang, Dong Wang:
Demo Abstract: Social Media-Driven UAV Sensing Frameworks in Disaster Response Applications. 1340-1341 - Shengen Wei, Jiankun Wang, Zenghua Zhao:
Poster Abstract: LocTag: Passive WiFi Tag for Robust Indoor Localization via Smartphones. 1342-1343 - Wei Xiong, Lin Zhang, Maxwell McNeil, Petko Bogdanov, Mariya Zheleva:
Fractals in the Air: Under-determined modulation recognition for MIMO communication. 1344-1345 - Yuetong Yang, Zhiquan Lai, Lei Cai, Dongsheng Li:
Poster Abstract: Model Average-based Distributed Training for Sparse Deep Neural Networks. 1346-1347 - Insup Lee, Heejun Roh, Wonjun Lee:
Poster Abstract: Encrypted Malware Traffic Detection Using Incremental Learning. 1348-1349 - Xiaoyu Zhang, Yongzhi Wang, Yu Zou:
Reconsidering Leakage Prevention in MapReduce. 1350-1351 - Yu Zou, Yongzhi Wang, Xiaoyu Zhang:
Enforcing Control Flow Confidentiality with SGX. 1352-1353 - Tian Pan, Enge Song, Chenhao Jia, Wendi Cao, Tao Huang, Bin Liu:
Lightweight Network-Wide Telemetry Without Explicitly Using Probe Packets. 1354-1355 - Kien Nguyen, Hiroo Sekiya:
Poster Abstract: Relaxing Network Selection for TCP Short Flows Using SYN Duplication. 1356-1357 - Yuchao Zhang, Ye Tian, Wendong Wang, Peizhuang Cong, Chao Chen, Dan Li, Ke Xu:
Federated Routing Scheme for Large-scale Cross Domain Network. 1358-1359 - Bin Han, Siyu Yuan, Zhiyuan Jiang, Yao Zhu, Hans D. Schotten:
Robustness Analysis of Networked Control Systems with Aging Status. 1360-1361 - Md. Tahmid Rashid, Daniel Zhang, Dong Wang:
Poster Abstract: A Computational Model-Driven Hybrid Social Media and Drone-Based Wildfire Monitoring Framework. 1362-1363 - Seoungbin Bae, Youngki Kim, Heejun Roh, Wonjun Lee:
Poster Abstract: Suppressing CSI Leakage in Multi-user MIMO Networks via Precoding. 1364-1365
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.