Abstract is missing.
- Test Suite Generation Based on Context-Adapted Structural Coverage for Testing DNNWei Kong, Qianjin Du, Huayang Cao, Hu Li, Tong Wang, Jianwen Tian, Xiaohui Kuang. 1-6 [doi]
- Metalens: Federated Meta-Learning Ensemble Using Flexible Classifiers on Non-IID DataMing-Hsuan Tsai, Wei-Sheng Syu, Te-Chuan Chiu, Sheng Chen, Chia-Che Sa, Yuan-Yao Shih, Ai-Chun Pang. 7-12 [doi]
- Distribution Matching with Multi-formation Function for Dataset DistillationQuang Hieu Vo, Choong Seon Hong. 13-17 [doi]
- Knowledge Distillation in Federated Learning: Where and How to Distill?Yu Qiao, Chaoning Zhang, Huy Q. Le, Avi Deb Raha, Apurba Adhikary, Choong Seon Hong. 18-23 [doi]
- Mobility-Aware Fog OffloadingFerdous Sharifi, Ali Rasaii, Melika Honarmand, Shaahin Hessabi, Young Choon Lee. 24-29 [doi]
- EFCKD: Edge-Assisted Federated Contrastive Knowledge Distillation Approach for Energy Management: Energy Theft PerspectiveLuyao Zou, Huy Q. Le, Avi Deb Raha, Dong-Uk Kim, Choong Seon Hong. 30-35 [doi]
- Cluster Caching Strategy Based on User Characteristics in Edge NetworksYe Zhang, Wei Zhang, Hao Hao, Kai Zhang. 36-41 [doi]
- Optimizing Performance Using GPU Cache Data Residency Based on Application's Access PatternsTheodora Adufu, Yoonhee Kim. 42-47 [doi]
- Machine Learning-based Approach for Enhancing Multi-step Attack PredictionYueyang Li, Wenjun Fan, Ruxue Luo. 48-53 [doi]
- Malicious Traffic Classification for IoT based on Graph Attention Network and Long Short-Term Memory NetworkLei Zhang, Lizhuang Tan, Huiling Shi, Hongyang Sun, Wei Zhang 0049. 54-59 [doi]
- CA-STCNN: An Attention-based Hybrid Deep Learning Model for Encrypted Traffic ClassificationHongyang Sun 0002, Huiling Shi, Lei Zhang, Lei Huang, Wei Zhang. 60-65 [doi]
- Cooperative Spectrum Sensing Method against Spectrum Sensing Data Falsification AttackXiaojun Wu, Zhenghan Tang, Yaya Lu, Daolong Wu, Haitao Xiao, Yong Tang. 66-70 [doi]
- SMWT: A Universal and Lightweight SDN-Based Meter Table Watermarking Traceback SchemeHeng He, Sen Yang, Xiaohu Zhou, Jia Wang. 71-76 [doi]
- Blockchain and Intent-Based Networking: A Novel Approach to Secure and Accurate Network Policy ImplementationJavier Jose Diaz Rivera, Muhammad Afaq, Wang-Cheol Song. 77-82 [doi]
- When Configuration Verification Meets Machine Learning: A DRL Approach for Finding Minimum k-Link FailuresHao Chen, Yili Jin, Weipeng Wang, Wei Liu, Lizhao You, Liqun Fu, Qiao Xiang. 83-88 [doi]
- Efficient Decomposition-Based Methods for Optimal VNF Placement and ChainingIssam Abdeldjalil Ikhelef, John Alasdair Warwicker, Steffen Rebennack, Mohand Yazid Saidi, Ken Chen. 89-94 [doi]
- Research on Fog Computing Offloading Mechanism for VANETsKexin Zhou, Xiangyu Bai, Xuemei He, Hui Zhao, Maoli Ran, Changxing Zhang. 95-100 [doi]
- Performance Enhancements of C-V2X Mode 4 with Virtual Cell and Resource Usage BitmapMoin Ali, Young-Tak Kim. 101-106 [doi]
- QKD-based Secure Communication for UAVZhenxu Gao, Wenjun Fan, Ruxue Luo. 107-112 [doi]
- Segment Anything Model Aided Beam Prediction for the Millimeter Wave CommunicationAvi Deb Raha, Apurba Adhikary, Md. Shirajum Munir, Yu Qiao, Choong Seon Hong. 113-118 [doi]
- An Energy Efficient SDN Controller Placement with Delay ConstraintsTomofumi Kondo, Luis Guillen, Satoru Izumi, Toru Abe, Takaaki Mizuki, Takuo Suganuma. 119-124 [doi]
- Design and Development of a Trust Mechanism to Enhance Security Protection on SDN-based IoT NetworkPang-Wei Tsai, Chao-Wei Lee, Ting-Wen Wang. 125-130 [doi]
- Network Traffic Prediction and Auto-Scaling of SFC using Temporal Fusion TransformerMinji Choi, Heegon Kim, Jae-Hyoung Yoo, James Won-Ki Hong. 131-136 [doi]
- Accelerating free5GC Data Plane Using Programmable HardwareMuthuraman Elangovan, Muhammad Shahid Iqbal, Chien Chen, Jyh-Cheng Chen. 137-142 [doi]
- Latency Minimization in Terrestrial-Non-Terrestrial Integrated Network: Joint Association and Bandwidth Allocation FrameworkNway Nway Ei, Kitae Kim, Yu Min Park, Choong Seon Hong. 143-147 [doi]
- Heterogeneous UPF Integration Framework and 5G User Plane AccelerationTse-Han Wang, Min-Chih Hu, Li-Hsing Yen, Chien-Chao Tseng. 148-153 [doi]
- Energy Saving in 5G Cellular Networks using Machine Learning Based Cell Sleep StrategyYin-Hsin Liu, Bo-Chen Kung. 154-159 [doi]
- Analyzing the Effect of Observer Node Addition Strategy on Bitcoin Double-Spending Attack Detection Using Graph Neural NetworkChanghoon Kang, Jongsoo Woo, James Won-Ki Hong. 160-164 [doi]
- CSLog: Anomaly Detection for Syslog Based on Contrastive Self-Supervised Representation LearningShuhao Yan, Shanshan Wang 0003, Zhenxiang Chen, Xiaoqing Jiang, Xueyang Cao. 165-170 [doi]
- An Anomaly Detection Approach by AIML in IP Networks with eBPF-Based ObservabilityMinato Sakuraba, Junichi Kawasaki, Takuya Miyasaka, Atsushi Tagami. 171-176 [doi]
- Online Updating in Multicast Time-Sensitive NetworkingJiachen Wen, Ying Wang 0002, Qianqian Zhang, Jingjing Chen, Xuesong Qiu 0001. 177-182 [doi]
- A Efficient Adaptive Data Rate Algorithm in LoRaWAN Networks: K-ADRYi Jiang, Minghua Wang, Xingbin Wang. 183-188 [doi]
- A Heuristic Online Algorithm for Routing in Large-Scale Deterministic NetworksMengyu Wang, Shuyong Zhu, Yujun Zhang. 189-194 [doi]
- Enhancing QoE of WebRTC-based Video Conferencing using Deep Reinforcement LearningKyungchan Ko, Sangwoo Ryu, James Won-Ki Hong. 195-200 [doi]
- Federated Multimodal Learning for IoT Applications: A Contrastive Learning ApproachHuy Q. Le, Yu Qiao, Loc X. Nguyen, Luyao Zou, Choong Seon Hong. 201-206 [doi]
- Energy-Efficient Geographic Routing with an Autonomous Mobile Sink Under Partial CoverageZiyan Zhu, Minghua Wang, Wenbo Chen. 207-210 [doi]
- SDRA: A Sensor Data Retrieval Architecture for the Heterogeneous IoT NodeWeigang Wang, Wei Jing, Sining Jiang. 211-214 [doi]
- Network State Prediction with Attention-Based Graph Convolutional NetworkLongfei Li, Haoyu Chen, Sungwoong Yeom, Shivani Sanjay Kolekar, Kyungbaek Kim. 215-218 [doi]
- Seamless Integration of Wireless Interface to SDN SwitchJiayang Chen, Kien Nguyen 0002, Hiroo Sekiya. 219-222 [doi]
- An Efficient Local Search Algorithm for Traffic Engineering in Segment Routing NetworksJingjing Chen, Ying Wang 0002, Jiachen Wen, Qianqian Zhang, Xuesong Qiu 0001. 223-226 [doi]
- Preprocessing and Analysis of an Open Dataset in Application Traffic ClassificationUi-Jun Baek, Min-Seong Lee, Jee-Tae Park, Jeong Woo Choi, Chang-Yui Shin, Myung-Sup Kim. 227-230 [doi]
- A Machine Learning-Based Intrusion Detection Approach for Intelligent Connected VehiclesJia Liu, Wenjun Fan. 231-234 [doi]
- Novel convergence of fixed-access and mobile network architectures with ultra-low latency multi-slicingPang-Chen Liu, Ping-Chang Tsai, Fei-Hua Kuo, Kou-Hsiang Lai. 235-238 [doi]
- Dynamic Selection Scheme of LTE-M and 5G for Efficient Maritime Communication Based on Traffic VolumeMahnsuk Yoon, Jaeuk Kwon, Hyunjoo Lee, Kyucheol Cho, Jihun Seo, Jangkyu Yun. 239-242 [doi]
- Transformer-based Communication Resource Allocation for Holographic Beamforming: A Distributed Artificial Intelligence FrameworkApurba Adhikary, Avi Deb Raha, Yu Qiao, Md. Shirajum Munir, Ki Tae Kim, Choong Seon Hong. 243-246 [doi]
- Shot-By-Shot Technical Data Collection for Badminton Doubles GamesYu-Hsien Huang, Pei-Chieh Sung, Yung-Chang Huang, Tsì-Uà Ik, Jiun-Long Huang. 247-250 [doi]
- Design of Personal Data Protection Decentralized Model Using Blockchain and IPFSJiwon Bang, Mi-Jung Choi. 251-254 [doi]
- Crowdsensing Data Trading Mechanism Based on Personalized Local Differential PrivacyJiahao Zeng, Feng Qi 0004, Chang Liu, Qun Zhang, Zhili Wang. 255-258 [doi]
- QR-Code with Superimposed TextNaoya Tahara, Senling Wang, Hiroshi Kai, Hiroshi Takahashi, Masakatu Morii. 259-262 [doi]
- Developing an Interview Recording System with Speaker Recognition and Emotion ClassificationWei-Yi Hsieh, Hsun-Ching Tsai, Lu-An Chen, Tsì-Uà Ik. 267-270 [doi]
- Optimizing Cluster Head Placement in Federated Clustering: A Genetic Algorithm ApproachShivani Sanjay Kolekar, Kyungbaek Kim. 271-274 [doi]
- Automation of Human Decision Making by Using Reinforcement-learning for Office Work with PCMisa Fukai, Masashi Tadokoro, Haruo Oishi, Ryo Uchida, Kimio Tsuchikawa. 275-278 [doi]
- AI Research Platform for Agriculture Sector : Agriculture Sector Bigdata Management and AI Model Development PlatformKi-Hyeon Kim, Woojin Seok, Jeonghoon Moon, Kwang-Soo Kim, Joonyong Sim. 279-281 [doi]
- Research on Decompostion Method of Relational Database Oriented to Microservice RefactoringJiaqi Hao, Junfeng Zhao, Yuxian Li. 282-285 [doi]
- Efficient Cloud Computing Resource Management Strategy Based on Auction MechanismQian Chen 0028, Xuan Wang 0002, ZoeLin Jiang. 286-289 [doi]
- The Smart Applications of ICT and IoT with AI Techniques in IMS NetworkJih-Wei Tsai, Chao-Chun Huang, Chen-Hung Chu, Gong-Da Fan. 290-293 [doi]
- A Multi-Agent Deep Reinforcement Learning based Cooperative Edge Data Caching ApproachYongzhe Yu, Shuang Wu, Sujie Shao, Jinqian Chen, Xingyu Chen. 294-297 [doi]
- A Federated Learning Approach for Net Load Forecasting in MicrogridsZihan Qin, Sujie Shao, Shaoyong Guo, Xuesong Qiu 0001. 298-301 [doi]
- A Honey-imprint enabled Approach for Resisting Social Engineering AttacksZhaoxi Zhong, Wenjun Fan. 302-305 [doi]
- An Extensive Evaluation of TCP Congestion Control in 10 Gbps NetworkShunji Aoyagi, Jong-Deok Kim, Kien Nguyen 0002, Hiroo Sekiya. 306-309 [doi]
- Accurate Identification of Encrypted Videos in Asymmetric Routing ScenariosWeiwei Zhu, Hua Wu 0004, Jingwen Quan, Guang Cheng 0001, Xiaoyan Hu. 310-313 [doi]
- Lightweight-Heavyweight Hybrid Approach for Application Traffic ClassificationMin-Seong Lee, Jee-Tae Park, Ui-Jun Baek, Chang-Yui Shin, Jeong Woo Choi, Myung-Sup Kim. 314-317 [doi]
- Network User Action Detection based on PSD Signature through Encrypted Traffic AnalysisJee-Tae Park, Ui-Jun Baek, Chang-Yui Shin, Min-Seong Lee, Jeong Woo Choi, Myung-Sup Kim. 318-321 [doi]
- Satellite Anomaly Detection based on Improved Transformer MethodYuqiao Hou, Hongjia Li, Yuxiang Wang, Liming Wang, Zhen Xu. 322-325 [doi]
- IoT Intrusion Detection Based on Personalized Federated LearningQianqian Zhang, Ying Wang 0002, Tongyan Wei, Jiachen Wen, Jingjing Chen, Xuesong Qiu 0001. 326-329 [doi]
- Federated Learning Based Network Intrusion Detection ModelBeom-Su Lee, Jong-Wouk Kim, Mi-Jung Choi. 330-333 [doi]
- RPChain: Regulatable Privacy-Preserving Group Data Sharing Based on Consortium BlockchainPuhe Hao, Tianyu Pan, Rui Han, Xiao Qu, Zhexuan Yang, Guozi Sun. 334-337 [doi]
- Detecting Digital Ad Fraud by Active Reinforcement LearningSeongbok Baik. 338-340 [doi]
- Coherent PON interconnect system with phase compensationPing-Chang Tsai, Pang-Chen Liu, Fei-Hua Kuo, Kou-Hsiang Lai. 341-344 [doi]
- Progress and Challenges of Polymorphic Smart NetworksPeixin Liu, Xiangyu Bai, Zhaoran Wang. 345-348 [doi]
- EeCA: A Novel Approach for Energy Conservation in MEC via NDN-Based Content CachingJiaxin Xu, Huiling Shi, Haoxiang Chu, Wei Zhang 0049. 349-352 [doi]
- Modeling and Optimization for Computing Power Resource-Aware in CPNJiacong Li, Hang Lv 0006, Bo Lei, Yunpeng Xie. 353-356 [doi]
- enCBS: Delay Guarantee Mechanism based on Credit-based Shaping for Programmable SwitchXinhang Wang, Lizhuang Tan, Wei Zhang 0049. 357-360 [doi]
- Proposal of Annotation Method for RPA ScenarioRyo Uchida, Misa Fukai, Taisuke Wakasugi, Kimio Tsuchikawa, Haruo Oishi. 361-364 [doi]
- The Effectiveness of Online Reputation Score under Silence BiasLirong Chen, Qiang Li. 365-368 [doi]
- Precision Time Transfer using ITU-T G.8275.1 over Optical Transport NetworkPo-Kai Chuang, Hsiu-fang Hu, Jian-Kai Huang, Chin-Cheng Hu, Ming-Hung Lee, Yu-Ping Yu, Kuo-Hsiang Lai. 369-372 [doi]
- Ethernet VPN Provisioning Towards Slicing for 5G Transport NetworksHong-Jie Chen, Yi-Cheng Chu, Che-Chun Teng, Chin-Ping Chuang, Min-Han Hung. 373-376 [doi]
- Implementation of an OAM System for Multi-Vendor Open RAN Base StationPin-Hua Wu, Tse-Han Fang, Wan-Chien Yang, Wei-Jie Huang. 377-380 [doi]
- Secure and Scalable eSIM Service Provisioning Framework for Mobile Virtual Network OperatorsRamneek, Patrick Hosein, Sangheon Pack. 381-384 [doi]
- Bandwidth Factor Computation Framework for Traffic Routing in 5G NetworksKai-Mao Chang, Hsing-Chen Chi, Yu-Ping Yu, Kuo-Hsiang Lai. 385-388 [doi]
- An empirical study: Use autoencoder model to determine the abnormal dataYun-Jie Li, Jhao-Yin Li, Hao-Yu Kao, Yi-Lin Tsai. 389-392 [doi]
- An All-Photonics Network Management SystemLi-Hsuan Chu, Yen-Lin Tung, Yong-Zen Huang. 393-396 [doi]
- Machine Learning Based Optical Transmission System Link Performance Degradation Prediction and ApplicationZhiqiang Fan, Zhenwei Wu, Jianxin Lv, Peng Zhang, Yong Xiao. 397-400 [doi]
- Accelerating Non-Preemptive Multicast Flows in Reconfigurable Data Center NetworksYuhang Wu, Quan Chen 0003, Lianglun Cheng. 401-404 [doi]
- GrayINT - Detection and Localization of Gray Failures via Hybrid In-band Network TelemetryKuichao Zhang, Wei Su, Huiling Shi, Kai Zhang, Wei Zhang. 405-408 [doi]
- A Novel Equivalence Proof of Clock and Network Synchronization Model Towards Distributed CloudsFeng Jiang, Yongyang Cheng, Tao Zhang, Boqin Qin, Zhao Hui. 409-412 [doi]
- Survey on Blockchain P2P NetworkAeri Kim, Meryam Essaid, Hongtaek Ju. 413-416 [doi]