Abstract is missing.
- Activity-Monitoring System for Harmful Wildlife Using WuR Multi Stage Sensor ArrayMakoto Misumi, Masashi Naoe, Noriaki Kamiyama. 1-4 [doi]
- Reinforcement Learning for Channel and Radio Allocations to Wireless Backhaul LinksJuliana Liman, Li-Hsing Yen. 1-4 [doi]
- GCN-Based Topology Design for Decentralized Federated Learning in IoVYupeng Li, Qi Xie, Weixu Wang, Xiaobo Zhou 0003, Keqiu Li. 1-6 [doi]
- Rule-based User Behavior Detection System for SaaS ApplicationJee-Tae Park, Ui-Jun Baek, Myung-Sup Kim, Min-Seong Lee, Chang-Yui Shin. 1-4 [doi]
- Software Defined Perimeter Monitoring and Blockchain-Based Verification of Policy MappingWaleed Akbar, Javier Jose Diaz Rivera, Talha Ahmed Khan, Muhammad Afaq, Wang-Cheol Song. 1-4 [doi]
- Maximizing Throughput of Aerial Base Stations via Resources-based Multi-Agent Proximal Policy Optimization: A Deep Reinforcement Learning ApproachYu Min Park, Sheikh Salman Hassan, Choong Seon Hong. 1-4 [doi]
- A Dynamic Association Strategy for Controller Load Balancing in Software-Defined NetworksShuangqing Li, Zhihao Li, Weiqi Zhang. 1-6 [doi]
- EDP: An eBPF-based Dynamic Perimeter for SDP in Data CenterLei Zhang, Hui Li, Jingguo Ge, Yulei Wu, Liangxiong Li, Bingzhen Wu, Haojiang Deng. 1-6 [doi]
- An Optical DWDM Transmission Architecture for High Capacity Based on Heterogeneous Submarine Cable SystemKuan-Heng Shen, Seng-Da Tu, Jian-Kai Huang. 1-4 [doi]
- Virtual Network Function Placement Model Considering Both Service Delay and AvailabilityShinya Horimoto, Eiji Oki. 1-6 [doi]
- DDoS Attack Detection Combining Time Series-based Multi-dimensional Sketch and Machine LearningYanchao Sun, Yuanfeng Han, Yue Zhang, Mingsong Chen, Shui Yu, Yimin Xu. 1-6 [doi]
- An Effective Location Registration Method Under Many User Equipments in IoTTakashi Satake, Yoshiaki Narusue, Hiroyuki Morikawa. 1-4 [doi]
- Inter-Blockchain Communication Message Relay Time Measurement and Analysis in CosmosJungyeon Kim, Meryam Essaid, Hongtaek Ju. 1-6 [doi]
- Mitigating New-Flow Attack with SDNSnapshot in P4-based SDNYun-Zhan Cai, Ting-Yu Lin, Yu-Ting Wang 0002, Ya-Pei Tuan, Meng-Hsun Tsai. 1-4 [doi]
- Method for Extracting Suspected Faulty Equipment Through Recursive Use of GNN ModelSeiji Sakuma, Ryosuke Sato, Mizuto Nakamura, Kyoko Yamagoe. 1-6 [doi]
- Who owns the address? A performant block storage model for hybrid cloudFeng Jiang, Yongyang Cheng, Boqin Qin, Zhao Hui. 1-6 [doi]
- MISCNN: A Novel Learning Scheme for CNN-Based Network Traffic ClassificationUi-Jun Baek, Boseon Kim, Jee-Tae Park, Jeong Woo Choi, Myung-Sup Kim. 1-6 [doi]
- Script-based traffic signal management for arterial road section group on MobileChia-Chun Yen, Yu-Chen Cheng, Guan-Wen Chen, Tsì-Uí Ik. 1-4 [doi]
- Experimental Comparison of Hybrid Sampling Methods for an Efficient NIDSBeom-Su Lee, Jong-Wouk Kim, Mi-Jung Choi. 1-4 [doi]
- Managing Edge AI Cameras for Traffic MonitoringGuan-Wen Chen, Yi-Hsiu Lin, Min-Te Sun, Tsì-Uí Ik. 1-4 [doi]
- FACTORY: A Fully Automated Evaluation Platform for ICT System ComponentsKazuki Tanabe, Takayuki Kuroda, Kozo Satoda. 1-4 [doi]
- SFC Path Selection based on Combination of Topological Analysis and Demand PredictionTakahiro Hirayama, Masahiro Jibiki. 1-4 [doi]
- Probability Correlation Learning for Anomaly Detection based on Distribution-Constrained AutoencoderJihua Wu, Lei Zhang 0094, Cong Liu, Qi Qi 0001, Jingyu Wang, Tong Xu 0002, Jianxin Liao. 1-6 [doi]
- Deterministic Bandwidth-Based Packet-Level Traffic Splitting for Datacenter NetworksCheng-Yu Wu, Li-Hsing Yen, Ping-Chun Hsieh, Chien-Chao Tseng. 1-6 [doi]
- QUIC Cryption Offloading Based on NanoBPFJichang Wang, Gaofeng Lv, Zhongpei Liu, Xiangrui Yang. 1-4 [doi]
- Multi-network Transmission Mechanism in Narrow-band Weak Connection EnvironmentJiacheng Guo, Jinbin Tu, Yun Wang. 1-4 [doi]
- Evaluation of the application of Seq2Seq towards the automatic derivation of a set of APIs that satisfy requirements from only ambiguous requirementsShingo Omata, Satoshi Kondoh. 1-4 [doi]
- Meta-NWDAF: A Meta-Learning based Network Data Analytic Function for Internet Traffic PredictionKuan-Hsiang Chen, Huai-Sheng Huang. 1-4 [doi]
- 2-Labeling: Shot-By-Shot Microscopic Badminton Singles Tactical DatasetYu-Hsien Huang, Yung-Chang Huang, Hao Syuan Lee, Tsì-Uí Ik, Chih-Chuan Wang. 1-6 [doi]
- Applicability Evaluation of Task Clustering Method Using Co-occurrence of OperationsRyo Uchida, Fumihiro Yokose, Taisuke Wakasugi, Kimio Tsuchikawa, Haruo Oishi, Yuki Urabe. 1-4 [doi]
- DScaler: A Horizontal Autoscaler of Microservice Based on Deep Reinforcement LearningZhijiao Xiao, Song Hu. 1-6 [doi]
- Multi-Class Traffic Density Forecasting in IoV using Spatio-Temporal Graph Neural NetworksAsif Mehmood, Talha Ahmed Khan, Muhammad Afaq, Wang-Cheol Song. 1-6 [doi]
- Sessionvideo: A Novel Approach for Encrypted Traffic Classification via 3D-CNN ModelHaiyang Wang, Tongge Xu, Jian Yang, Lijin Wu, Liqun Yang. 1-6 [doi]
- The Edge Cloud Implementation and Application of Transnational Smart Factory of 5G Private NetworkMing-Yen Wu, Jiun-Cheng Huang, Yuan-Mao Hung, Cheng-Yi Chien, Jack Shi-Jie Luo, Shuo Peng Liang. 1-6 [doi]
- GENEVE@TEIN: A Sophisticated Tunneling Technique for Communication between OpenStack-based Multiple Clouds at TEINMir Muhammad Suleman Sarwar, Javier Jose Diaz Rivera, Muhammad Afaq, Wang-Cheol Song. 1-4 [doi]
- A 5G Synchronous Optical Networking Management SystemYueh-Hsien Lin, Ting-Che Chuang, Yong-Zen Huang. 1-4 [doi]
- Research on Vertical Handover Strategy in Heterogeneous Vehicular Networks on ExpresswayYu Zhang, Xiangyu Bai, Lei Yao. 1-4 [doi]
- MicroMILTS: Fault Location for Microservices Based Mutual Information and LSTM AutoencoderLinwei Yang, Jing Li, Kuanzhi Shi, Songlin Yang, Qingfu Yang, Jiangang Sun. 1-6 [doi]
- Energy-Efficient IoE Networks Deployment for Future Smart CitiesSheikh Salman Hassan, Dong-Uk Kim, Seok-won Kang, Choong Seon Hong. 1-6 [doi]
- A Cross-Domain Data Security Sharing Approach for Edge Computing based on CP-ABEJiacong Li, Hang Lv 0006, Bo Lei. 1-6 [doi]
- Proactive Intent Policy Activation: An ML-Assisted Resource Forecasting ApproachTalha Ahmed Khan, Waleed Akbar, Muhammad Afaq, Wang-Cheol Song. 1-6 [doi]
- SDN-enabled Framework for Resilient Traffic Routing in 5G NetworksHsing-Chen Chi, Wu-Hsien Chang, Min-Chi Tseng, Yu-Ping Yu, Kuo-Hsiang Lai. 1-4 [doi]
- A Subchannel Collision Reduction Method for 3GPP C- V2X Mode 4 Network Based on Vehicular Moving StatusHaoru Su, Meng-Shiuan Pan, Shao-Wei Kao. 1-6 [doi]
- Fast Confirmation of Link Symmetry in Backoff-based Opportunistic RoutingTakuma Yamazaki, Eri Hosonuma, Taku Yamazaki, Takumi Miyoshi. 1-4 [doi]
- Intelligent Representation of Wireless Network States: A Multi-Layer Correlation ApproachShengchao Deng, Hui Gao, Xin Su 0001, Bei Liu 0002. 1-4 [doi]
- Community Structure in Public Blockchain networkMeryam Essaid, Changhyun Lee, Jungyeon Kim, Aeri Kim, Hongteak Ju. 1-6 [doi]
- An Encouraging Design for Data Owners to Join Multiple Co-existing Federated LearningLoc X. Nguyen, Luyao Zou, Huy Q. Le, Choong Seon Hong. 1-4 [doi]
- Machine-learning-assisted Traffic Classification of User Activities at Programmable Data PlaneXinyu Zhu, Yue Zhang. 1-4 [doi]
- An NLP-Based Model for the Dispatching Problem of Network OperationYun-Jie Li, Jhao-Yin Li. 1-4 [doi]
- Efficient Clustered Network Telemetry based on Failure AwarenessKai Zhang, Libin Liu, Lizhuang Tan, Ye Zhang, Wei Gao, Wei Zhang. 1-4 [doi]
- Construction of Mobile Agents' Dynamic Collaboration Network for Unmanned SystemsRong Xie. 1-4 [doi]
- ResiConnect - Fault Detection and Resilience for Multi-Stage AWGR-based Optical NetworksAnish Hirwe, Nikita Makharia, Tanmay Renugunta, Kotaro Kataoka. 1-6 [doi]
- Service classification of high-speed network traffic based on Two-Stage ClusteringHua Wu, Yuping Sui, Guang Cheng 0001, Xiaoyan Hu, Qinghua Shang. 1-6 [doi]
- Development of Wireshark Dissector for Ethereum Node Discovery Protocol/v5Junhyeong Ryu, Aeri Kim, Meryam Essaid, Hongtaek Ju. 1-4 [doi]
- An Analysis of Crypto Gas Wars in EthereumKyungchan Ko, Taeyeol Jeong, Jongsoo Woo, James Won-Ki Hong. 1-6 [doi]
- Clustering-Based Serverless Edge Computing Assisted Federated Learning for Energy ProcurementLuyao Zou, Md. Shirajum Munir, Ye Lin Tun 0001, Choong Seon Hong. 1-6 [doi]
- Construction Method of Overlay Network for Cyber-Physical SystemLiang-Jian Deng, Yubing Chen, Lichen Zhang. 1-4 [doi]
- Stabilizing Deep Reinforcement Learning Model Training for Video ConferencingSangwoo Ryu, Kyungchan Ko, James Won-Ki Hong. 1-6 [doi]
- The Deep Flow Inspection Framework Based on Horizontal Federated LearningTongyan Wei, Ying Wang, Wenjing Li. 1-4 [doi]
- A Distributed Wi-Fi Channel Assignment Method with Channel Bonding Considering the Number of Associated UsersKazuhiko Kinoshita, Yoshiki Aihara, Masami Kishida. 1-4 [doi]
- Identifying Root Cause of 5G Radio Quality Deterioration Using Machine LearningShohei Maruyama, Yoshiaki Nishikawa, Takeo Onishi, Eiji Takahashi. 1-6 [doi]
- Optimization: data-driven management using deep learning in cloud computingSajida Karim, Hui He. 1-4 [doi]
- Adaptive Ensemble Learning-based Network Resource Workload Prediction for VNF Lifecycle ManagementKhizar Abbas, Jae-Hyoung Yoo, James Won-Ki Hong. 1-4 [doi]
- LFOD: A Lightweight Flow Table Optimization Scheme in SDN Based on Flow Length Distribution in the InternetHeng He, Zhezhe Peng, Xiaohu Zhou, Jia Wang. 1-6 [doi]
- VNE-HAGBE: A Hybrid Approach to Improve VNR Request Acceptance Rate for Wireless Virtual Network EmbeddingRaihaanjun Kushiyama, Ryo Yamamoto, Satoshi Ohzahata. 1-4 [doi]
- Experimental Demonstration of Dynamic Service Function Chaining Based on Server Load Information in Optical Packet Switching NetworksYuusuke Hashimoto, Yuya Seki, Kosuke Kubota, Akihiro Fujimoto, Yosuke Tanigawa, Yusuke Hirota, Hideki Tode. 1-4 [doi]
- Interoperability Testing Tool for Operations and Maintenance Interfaces of 5G Open RAN Base StationWan-Chien Yang. 1-4 [doi]
- Implementation and Node Load Evaluation of Cloud-based Load Distribution Model in ICSNEishin Nagaoka, Ryohei Banno, Osamu Mizuno. 1-4 [doi]
- HDS: A Hierarchical Scheme for Accurate and Efficient DDoS Flooding Attack DetectionYouqiong Zhuang, Hua Wu 0004, Songtao Liu, Guang Cheng 0001, Xiaoyan Hu. 1-6 [doi]
- Time Based Concave Cache Pricing for Information-centric NetworksCheng Zhang. 1-4 [doi]
- Design and Implementation of a Redundant Transmission Technique for Ultra-Reliable Communication in 5G Core NetworksLiang-Yu Chen, Chien Chen, Jyh-Cheng Chen, Pei-Yu Ho, Chia-Cheng Wang. 1-4 [doi]
- Learning-Based Algorithms for Channel Allocations in Wireless Mesh NetworkChien-Liang Kuo, Jin-Wei Kuo, Xuan-Zhe Chen, Li-Hsing Yen. 1-4 [doi]
- A defense mechanism analysis for Dynamic Heterogeneous RedundancyLeyi Shi, Yifan Miao, Jiahao Ren, Huiwen Hou, Qiang Han. 1-4 [doi]
- Design, Development, and Operation of a SDN-Based BGP Playground for NetworkersPang-Wei Tsai, Aris Cahyadi Risdianto, Teck Chaw Ling. 1-4 [doi]
- Energy-Aware Task Offloading and Resource Allocation in Space-Aerial-Integrated MEC SystemNway Nway Ei, Ji Su Yoon, Choong Seon Hong. 1-6 [doi]
- How Does fake review Influence E-Commerce Platform Revenue?Lirong Chen, Qiang Li. 1-4 [doi]
- Vectorization Method for Device Alarms Achieving High General Ability for AI Application to Network OperationsRyosuke Sato, Mizuto Nakamura, Chiriro Sato, Seiji Sakuma, Motomu Nakajima. 1-6 [doi]
- Network Intrusion Detection System using 2D Anomaly DetectionMin-Seok Kim, Jong Hoon Shin, Choong Seon Hong. 1-4 [doi]
- Alarm Correlation Method Using Bayesian Network in Telecommunications NetworksYuya Hata, Naoki Hayashi, Yusuke Makino, Atsushi Takada, Kyoko Yamagoe. 1-4 [doi]
- Assembler: A Throughput-Efficient Module for Network Driver of Edge Computing GatewaysYannian Niu, Minghua Zhu. 1-4 [doi]
- Service Deployment with Per-Flow-Priority-Based Virtual Network Function ResizingKeigo Akahoshi, Eiji Oki. 1-6 [doi]
- Updating VNF deployment with Scaling Actions using Reinforcement AlgorithmsNamjin Seo, DongNyeong Heo, Jibum Hong, Heegon Kim, Jae-Hyoung Yoo, James Won-Ki Hong, Heevoul Choi. 1-4 [doi]
- Security Service-aware Reinforcement Learning for Efficient Network Service ProvisioningHyeonjun Jo, Kyungbaek Kim. 1-4 [doi]
- Reinforcement Learning of Graph Neural Networks for Service Function Chaining in Computer Network ManagementDongNyeong Heo, Doyoung Lee, Heegon Kim, Suhyun Park, Heeyoul Choi. 1-6 [doi]
- Simultaneous Update Model of Multiple Service Function Chains Guaranteeing State ConsistencyTomoki Takahashi, Takehiro Sato, Eiji Oki. 1-4 [doi]
- A machine learning based approach for the detection of sybil attacks in C-ITSBadis Hammi, Yacine Mohamed Idir, Rida Khatoun. 1-4 [doi]
- Effective Edge Server Placement for Efficient Federated ClusteringSungwoong Yeom, Shivani Sanjay Kolekar, Kyungbaek Kim. 1-4 [doi]
- A Data Availability Modeling Approach Towards Cloud Storage Systems Based on Client PerspectiveFeng Jiang, Yongyang Cheng, Zhao Hui, Boqin Qin, Ruibo Yan. 1-4 [doi]
- Secure enrollment token delivery for Zero Trust networks using blockchainJavier Jose Diaz Rivera, Talha Ahmed Khan, Waleed Akbar, Muhammad Afaq, Wang-Cheol Song. 1-6 [doi]
- A SDN Controller Monitoring Architecture for 5G Backhaul NetworksMin-Han Hung, Che-Chun Teng, Chin-Ping Chuang, Chi-Sheng Hsu, Jai-Wei Gong, Mei-Chun Chen. 1-4 [doi]
- Milimeter Wave Short Distance Communication for Scientific Research EquipmentKiwook Kim, JaiSeung Kwak, Woojin Seok. 1-3 [doi]
- Detecting Crossfire-Attack Hosts in Search PhaseManami Nakahara, Noriaki Kamiyama. 1-4 [doi]
- Efficient Deployment of Virtual Network Functions to Achieve Load Balance in Cloud NetworksYou-Chiun Wang, Shang-Hao Wu. 1-6 [doi]
- Pruned Autoencoder based mmWave Channel Estimation in RIS-Assisted Wireless NetworksKitae Kim, Choong Seon Hong. 1-4 [doi]
- Methods for Providing Resilience from Electric Power Side to Communications Network SideRyosuke Sato, Yoshikazu Nakamura, Tomonari Fujimoto, Yuji Shinozaki, Motomu Nakajima. 1-4 [doi]
- End-to-end Method to Evaluate One-to-all Reliabilities of Telecommunications NetworksMasahiro Hayashi. 1-4 [doi]
- Study of Information Identification Technology Considering of Overlapping and Synonyms Words in Information DistributionHaruka Osanai, Masaru Sakai, Sho Kanemaru, Kensuke Takahashi, Satoshi Kondou. 1-4 [doi]
- VAE-TCN hybrid model for KPI Anomaly DetectionBo Wu, Qian Xu, Zhenjie Yao, Yanhui Tu, Yixin Chen. 1-6 [doi]
- Double-layer access network architecture for intelligent building servicesPing-Chang Tsai, Pang-Chen Liu, Wen-Chien Chan, Fei-Hua Kuo, Kou-Hsiang Lai. 1-4 [doi]