Abstract is missing.
- Hybrid RIS-assisted Cooperative Communication Model Design and Performance AnalysisAbhilash Kumar Pandey, Amrith Aathmaram, B. Sainath. 1-6 [doi]
- Dyslexeasy-App to Improve Readability through the Extracted Summary for Dyslexic UsersMarianna Di Gregorio, Marco Romano 0001, Monica Sebillo, Giuliana Vitiello. 1-6 [doi]
- OTA-NN: Observational Therapy-Assistance Neural Network for Enhancing Autism Intervention QualityMinxiao Wang, Ning Yang. 1-7 [doi]
- CloudRAFT: A Cloud-based Framework for Remote Experimentation for Mobile NetworksSabarish Krishna Moorthy, Chencheng Lu, Zhangyu Guan, Nicholas Mastronarde, George Sklivanitis, Dimitris Pados, Elizabeth Serena Bentley, Michael J. Medley. 1-6 [doi]
- Dynamic Time Slot Allocation Algorithm for Quadcopter SwarmsSharif Azem, Anam Tahir, Heinz Koeppl. 1-6 [doi]
- Enhancement of road weather services using vehicle sensor dataToon Bogaerts, Sylvain Watelet, Chris Thoen, Tom Coopman, Joris Van den Bergh, Maarten Reyniers, Dirck Seynaeve, Wim Casteels, Steven Latré, Peter Hellinckx. 1-6 [doi]
- MQTT-4EST: RulE-basEd WEb Editor for Semantic-aware Topic Naming in MQTTTobias Christian Piller, David Maria Merz, Abdelmajid Khelil. 1-8 [doi]
- AIDA-DB: A Data Management Architecture for the Edge and Cloud ContinuumNuno Faria, Daniel Costa, José Pereira 0001, Ricardo Vilaça, Luis Ferreira, Fábio Coelho. 1-6 [doi]
- Trusted Decentralized Federated LearningAnousheh Gholami, Nariman Torkzaban, John S. Baras. 1-6 [doi]
- A Study on Iterative Equalization for DFTs-OFDM Waveform under sub-THz ChannelsRoberto Bomfin, Ahmad Nimr, Gerhard P. Fettweis. 1-6 [doi]
- On Attacks To Federated Learning and a Blockchain-empowered ProtectionChristian Esposito, Giancarlo Sperlì, Vincenzo Moscato, Zhongliang Zhao. 1-6 [doi]
- Security and Privacy Evaluation Methods and Metrics in Vehicular NetworksLeila Benarous, Saadi Boudjit. 1-6 [doi]
- Interoperability and Scalability Trade-offs in Open IoT PlatformsDener Ottolini, Ivan D. Zyrianoff, Carlos Kamienski. 1-6 [doi]
- Improving Sexting Safety through Media Forwarding ControlMirko Franco, Ombretta Gaggi, Claudio E. Palazzi. 1-6 [doi]
- Communication-Loss Trade-Off in Federated Learning: A Distributed Client Selection AlgorithmMinoo Hosseinzadeh, Nathaniel Hudson, Sam Heshmati, Hana Khamfroush. 1-6 [doi]
- Efficient Load Migration Scheme for Fog NetworksMohammed A. Jasim, Nazli Siasi, Nasir Ghani. 1-6 [doi]
- On Designing a Mobile App to Support People with Cognitive Disabilities in Daily ActivitiesLisa Cesario, Giovanni Delnevo, Massimiliano Malavasi, Lorenzo Desideri, Silvia Mirri. 1-6 [doi]
- Teaching Distributed and Heterogeneous Robotic CellsJohannes Mey, Sebastian Ebert, Tianfang Lin, Giang T. Nguyen, Stefan Gumhold, Uwe Aßmann. 1-2 [doi]
- Machine Learning Subsystem for Autonomous Collision Avoidance on a small UAS with Embedded GPUNicholas Polosky, Tyler Gwin, Sean Furman, Parth Barhanpurkar, Jithin Jagannath. 1-7 [doi]
- Performance Evaluation of Orbital Angular Momentum Mode Multiplexing Systems Impaired by Phase NoisePeyman Neshaastegaran, Ming Jian. 1-6 [doi]
- A Practical Implementation of Physical Layer Security in Wireless NetworksSayed Amir Hoseini, Fayçal Bouhafs, Frank T. H. den Hartog. 1-4 [doi]
- IoT Interoperability with W3C Web of ThingsMichael Lagally, Michael McCool. 1-5 [doi]
- Integrating Mobile IoT Devices into the Arrowhead Framework Using Web of ThingsChiara Bonsignori, Carlo Puliafito, Antonio Virdis, Enzo Mingozzi, Giuseppe Iannaccone. 1-6 [doi]
- Multiple AUVs for Ocean Phenomena Monitoring: A ReviewAnsa Shermin S, Sarang C. Dhongdi. 1-7 [doi]
- Waveform Comparison under Hardware Limitations for 6G Sub-THz CommunicationsLe-Hang Nguyen, Volker Braun, Hardy Halbauer, Thorsten Wild. 1-6 [doi]
- Concurrent Transmission for Multi-Robot CoordinationSourabha Bharadwaj, Karunakar Gonabathula, Sudipta Saha, Chayan Sarkar, Rekha Raja. 1-6 [doi]
- Path and Floor Detection in Outdoor Environments for Fall Prevention of the Visually Impaired PopulationXin Wang, Juan Calderon, Navid Khoshavi, Luis Gabriel Jaimes. 1-6 [doi]
- Towards 6G zero touch networks: The case of automated Cloud-RAN deploymentsBini Angui, Romuald Corbel, Veronica Quintuna Rodriguez, Emile Stephan. 1-6 [doi]
- Designing Interactive Systems for Seniors: Living on an IslandFabio Pittarello. 1-6 [doi]
- Aligning accessibility design to non-disabled people's perceptionsChantal Lengua, Vincenzo Rubano, Fabio Vitali. 1-6 [doi]
- Multipurpose Sensing Platform for Improved Road SafetyMiguel Carvalhosa, João Almeida, Paulo C. Bartolomeu, Joaquim Ferreira 0001. 1-7 [doi]
- Delay Considerations for Reliable Communications in LoRaWANJoar Blom Rydell, Oliver Otterlind, Ismail Butun. 1-6 [doi]
- Requirements and Specifications for the Orchestration of Network Intelligence in 6GMiguel Camelo, Luca Cominardi, Marco Gramaglia, Marco Fiore, Andres Garcia-Saavedra, Lidia Fuentes, Danny De Vleeschauwer, Paola Soto-Arenas, Nina Slamnik-Krijestorac, Joaquín Ballesteros, Chia-Yu Chang, Gabriele Baldoni, Johann M. Márquez-Barja, Peter Hellinckx, Steven Latré. 1-9 [doi]
- On the security of 6G use cases: Threat Analysis of 'All-Senses Meeting'Zakaria Laaroussi, Elif Ustundag Soykan, Michael Liljenstam, Utku Gülen, Leyli Karaçay, Emrah Tomur. 1-6 [doi]
- On increasing password security awareness using a serious gameGiovanni Delnevo, Luca Deluigi, Davide Evangelisti, Simone Magnani. 82-87 [doi]
- Gamification of a University-level Web Technologies course: a five years experienceGiovanni Delnevo, Chiara Ceccarini, Paola Salomoni, Catia Prandi. 88-93 [doi]
- UDP-based Extremely Low Latency StreamingSeohyang Kim, Seungyoung Shin, Joonseok Moon. 94-99 [doi]
- Joint Content Valuations and Proactive Caching for Content Distribution NetworksYoussef A. Youssef, John Tadrous, Sameh Hosny, Mohammed Nafie. 100-105 [doi]
- Migration-Aware Optimized Resource Allocation in B5G Edge NetworksTadeus Prastowo, Ayub Shah, Luigi Palopoli, Roberto Passerone, Giuseppe Piro. 106-113 [doi]
- Latency and network aware placement for cloud-native 5G/6G servicesKiranpreet Kaur, Fabrice Guillemin, Veronica Quintuna Rodriguez, Françoise Sailhan. 114-119 [doi]
- Prioritized Traffic Shaping for Low-latency MEC Flows in MEC-enabled Cellular NetworksPo-Hao Huang, Fu-Cheng Hsieh, Wen-Jen Hsieh, Chi-Yu Li, Ying-Dar Lin. 120-125 [doi]
- A Novel Request Handler Algorithm for Multi-access Edge Computing Platforms in 5GGayan Dilanka, Lakshan Viranga, Rajitha Pamudith, Tharindu D. Gamage, Pasika Ranaweera, Indika A. M. Balapuwaduge, Madhusanka Liyanage. 126-131 [doi]
- Competing TCP Congestion Control Algorithms over a Satellite NetworkPinhan Zhao, Benjamin Peters, Jae Chung, Mark Claypool. 132-138 [doi]
- ACK-Less Rate Adaptation for IEEE 802.11bc Enhanced Broadcast Services Using Sim-to-Real Deep Reinforcement LearningTakamochi Kanda, Yusuke Koda, Koji Yamamoto, Takayuki Nishio. 139-143 [doi]
- ImPos: An Image-Based Indoor Positioning SystemYunzhi Li, Rajeswari Hita Kambhamettu, Yidan Hu, Rui Zhang. 144-150 [doi]
- De-prioritization Impact of LCH-based Prioritization for Industrial Internet of Things in 3GPP NRSangkyu Baek, Anil Agiwal, Jaehyuk Jang. 151-156 [doi]
- Kinesthetic Coding Based on the Fast Wavelet Transform for Remote-Controlling a Quadrotor DroneFrank Engelhardt, Sophie Herbrechtsmeyer, Mesut Günes. 157-162 [doi]
- Sum-Rate Optimization for Visible-Light-Band UAV Networks Based on Particle Swarm OptimizationYuwei Long, Nan Cen. 163-168 [doi]
- A UAV Flight Method for Non-Uniform User Distributions in Aerial Wireless Relay NetworksHiroyuki Asano, Hiraku Okada, Chedlia Ben Naila, Masaaki Katayama. 169-174 [doi]
- Full-Duplex Aerial Communication System for Multiple UAVs with Directional AntennasTao Yu, Kiyomichi Araki, Kei Sakaguchi. 175-180 [doi]
- 20-µs Accuracy Time-Synchronization Method using Bluetooth Low Energy for Internet-of-Things SensorsMasayasu Harada, Shintaro Izumi, Ryosuke Kozeni, Yukiko Yoshikawa, Toru Ishii, Hiroshi Kawaguchi, Shohei Uemura, Kaname Araki. 181-186 [doi]
- Energy Efficient Virtual Network Embedding in Virtualized Wireless Sensor NetworksVahid Maleki Raee, Amin Ebrahimzadeh, Marsa Rayani, Roch H. Glitho, May El Barachi, Fatna Belqasmi. 187-192 [doi]
- Bluetooth Mesh Technology for the Joint Monitoring of Indoor Environments and Mobile Device Localization: A Performance StudyLeonardo Montecchiari, Angelo Trotta, Luciano Bononi, Marco Di Felice. 193-199 [doi]
- Adaptive Early Exit of Computation for Energy-Efficient and Low-Latency Machine Learning over IoT NetworksEric Samikwa, Antonio Di Maio, Torsten Braun. 200-206 [doi]
- Constrained Deep Reinforcement Learning for Smart Load BalancingOmar Houidi, Djamal Zeghlache, Victor Perrier, Pham Tran Anh Quang, Nicolas Huin, Jérémie Leguay, Paolo Medagliani. 207-215 [doi]
- Energy-aware optimization of UAV base stations placement via decentralized multi-agent Q-learningBabatunji Omoniwa, Boris Galkin, Ivana Dusparic. 216-222 [doi]
- Self-Optimization of Cellular Networks Using Deep Reinforcement Learning with Hybrid Action SpaceMariam M. N. Aboelwafa, Ghada Alsuhli, Karim Banawan, Karim G. Seddik. 223-229 [doi]
- RIRL: A Recurrent Imitation and Reinforcement Learning Method for Long-Horizon Robotic TasksZhitao Yu, Jian Zhang 0028, Shiwen Mao, Senthilkumar C. G. Periaswamy, Justin Patton. 230-235 [doi]
- Evaluating Efficiency and Security of Connected and Autonomous Vehicle ApplicationsCurtis R. Taylor, Jason M. Carter, Shean Huff, Eric Nafziger, Jackeline Rios-Torres, Bob Zhang, Joseph Turcotte. 236-239 [doi]
- Securing Remote User Authentication in Industrial Internet of ThingsK. Nimmy, Sriram Sankaran, Krishnashree Achuthan, Prasad Calyam. 244-247 [doi]
- SmartCrypt: Secure Storing and Sharing of Time Series Data Streams in IIoTSubir Halder, Thomas Newe. 248-251 [doi]
- LearnPhi: a Real-Time Learning Model for Early Prediction of Phishing Attacks in IoVYesin Sahraoui, Chaker Abdelaziz Kerrache, Ahmed Korichi, Anna Maria Vegni, Marica Amadeo. 252-255 [doi]
- Malware Family Classification via Residual Prefetch ArtifactsAdam Duby, Teryl Taylor, Yanyan Zhuang. 256-259 [doi]
- NR-U and Wi-Fi Coexistence Enhancement Exploiting Multiple Bandwidth Parts AssignmentMehdi Haghshenas, Maurizio Magarini. 260-263 [doi]
- Designing a 5G architecture to overcome the challenges of the teleoperated transport and logisticsJohann M. Márquez-Barja, Dries Naudts, Vasilis Maglogiannis, Seilendria A. Hadiwardoyo, Ingrid Moerman, Matthijs Klepper, Geerd Kakes, Xiangyu Lian, Wim Vandenberghe, Rakshith Kusumakar, Joost Vandenbossche. 264-267 [doi]
- 4G/5G performance of a multi-RAT UAV for medical parcel deliveryHenrique Cesar Carvalho de Resende, João Francisco Nunes Pinheiro, Philippe Reiter, Cristiano Bonato Both, Johann M. Márquez-Barja. 268-271 [doi]
- Analyzing 5G NR-U and WiGig Coexistence with Multiple-Beam Directional LBTYao Ma 004, Susanna Mosleh, Jason Coder. 272-275 [doi]
- A Comprehensive Analysis on Network Slicing for Smart Hospital ApplicationsShalitha Wijethilaka, Pawani Porambage, Chamitha de Alwis, Madhusanka Liyanage. 276-279 [doi]
- Impact Analysis of Training in Deep Reinforcement Learning-based Radio Access Network SlicingIrene Vilà, Jordi Pérez-Romero, Oriol Sallent, Anna Umbert. 280-283 [doi]
- A non-invasive social monitoring application for danger situations based on a edge-based Machine Learning solutionBilal Moussa Fares, Pietro Manzoni, Johann M. Márquez-Barja, Juan-Carlos Cano, Carlos T. Calafate. 284-289 [doi]
- tenth LIDAR-Based RacesMichael Bosello, Rita Tse, Giovanni Pau 0001. 290-298 [doi]
- Balancing Latency and Accuracy on Deep Video Analytics at the EdgeXuebing Li, Byungjin Cho, Yu Xiao 0001. 299-306 [doi]
- On implementing socialization algorithms on Virtual Objects in the Social IoTSilvia Corpino, Silvia Mirri, Mariella Sole, Daniele D. Giusto, Giovanni Pau 0001, Roberto Girau. 307-312 [doi]
- Polar Coding for Efficient Transport Layer MulticastPablo Gil Pereira, Thorsten Herfet. 313-318 [doi]
- QoS-Aware Priority-Based Task Offloading for Deep Learning Services at the EdgeMinoo Hosseinzadeh, Andrew Wachal, Hana Khamfroush, Daniel E. Lucani. 319-325 [doi]
- Learning-based Multivariate Real-Time Data Pruning for Smart PMU CommunicationRushang Gupta, Varun Gupta, Akash Kumar Mandal, Swades De. 326-331 [doi]
- Security of Micro MEC in 6G: A Brief OverviewIjaz Ahmad, Sergio Lembo, Felipe Rodriguez, Stephan Mehnert, Mikko Vehkaperä. 332-337 [doi]
- Towards the Optimal Pattern of Joint Beamforming, User Scheduling and Power Allocation in a multi-RAT NetworkJörg von Mankowski, Hansini Vijayaraghavan, Alberto Martínez Alba, Leonardo Goratti, Wolfgang Kellerer. 338-345 [doi]
- DNN-aided Low-complexity Physical-layer Network Coding Enabled Non-orthogonal Multiple AccessGuanyu Chen, Tse-Tin Chan, Haoyuan Pan, Jiaxin Liang. 346-351 [doi]
- Frame-Capture-Based CSI Recomposition Pertaining to Firmware-Agnostic WiFi SensingRyosuke Hanahara, Sohei Itahara, Kota Yamashita, Yusuke Koda, Akihito Taya, Takayuki Nishio, Koji Yamamoto. 352-356 [doi]
- Drone Positioning for Visible Light Communication with Drone-Mounted LED and CameraYukito Onodera, Yu Nakayama, Hiroki Takano, Daisuke Hisano. 357-362 [doi]
- An Anomaly Detection Model for IoT Networks based on Flow and Flag Features using a Feed-Forward Neural NetworkImtiaz Ullah, Qusay H. Mahmoud. 363-368 [doi]
- Shining New Light on Useful Features for Network Intrusion Detection AlgorithmsHeather Lawrence, Uchenna Ezeobi, Gedare Bloom, Yanyan Zhuang. 369-377 [doi]
- RHC: Cluster based Feature Reduction for Network Intrusion DetectionsMd. Hasan Tarek, Md. Mumtahin Habib Ullah Mazumder, Sadia Sharmin, Md. Shariful Islam, Mohammad Shoyaib, Muhammad Mahbub Alam. 378-384 [doi]
- WiFi-based IoT Devices Profiling Attack based on Eavesdropping of Encrypted WiFi TrafficMnassar Alyami, Ibrahim Alharbi, Cliff Zou, Yan Solihin, Karl Ackerman. 385-392 [doi]
- First Experimental Results on Real-Time Cleaning Activity Monitoring SystemRyo Yaegashi, Yu Nakayama, Moe Matsuki, Ryoma Yasunaga, Marie Katsurai. 393-398 [doi]
- Age of Data Aware Internet of Things ApplicationsKaneez Fizza, Prem Prakash Jayaraman, Abhik Banerjee, Dimitrios Georgakopoulos, Rajiv Ranjan. 399-404 [doi]
- A Web Of Things Context-Aware IoT System leveraging Q-learningLuca Bedogni, Francesco Poggi. 405-410 [doi]
- A Hierarchical Architectural Model for IoT End-User Service CompositionFederico Montori, Vincenzo Armandi, Luca Bedogni. 411-416 [doi]
- Decentralized Ad-Hoc Seaport Truck AuthenticationPaulo C. Bartolomeu, Joana Bernardino, Joaquim Ferreira 0001. 417-420 [doi]
- A Privacy-preserving Scheme for Passive Monitoring of People's Flows through WiFi BeaconsKalkidan Gebru. 421-424 [doi]
- Towards an Optimal Feature Selection Method for AI-Based DDoS Detection SystemSajal Saha, Annita Tahsin Priyoti, Aakriti Sharma, Anwar Haque. 425-428 [doi]
- Deception for Characterizing Adversarial Strategies in Complex Networked SystemsMd Ali Reza Al Amin, Peter Foytik, Sachin Shetty, Jessica Dorismond, Marco A. Gamarra. 429-432 [doi]
- Blockchain-based Device Identity Management with Consensus Authentication for IoT DevicesMunkenyi Mukhandi, Francisco Damião, Jorge Granjal, João P. Vilela. 433-436 [doi]
- Building Realistic Experimentation Environments for AI-enhanced Management and Orchestration (MANO) of 5G and beyond V2X systemsNina Slamnik-Krijestorac, Miguel Camelo Botero, Luca Cominardi, Steven Latré, Johann M. Márquez-Barja. 437-440 [doi]
- On Deep Learning Classification of Digitally Modulated Signals Using Raw I/Q DataJohn A. Snoap, Dimitrie C. Popescu, Chad M. Spooner. 441-444 [doi]
- Leveraging UAV Rotation To Increase Phase Coherency in Distributed Transmit BeamformingMahmoud Badi, N. Cameron Matson, Dinesh Rajan, Joseph Camp. 445-448 [doi]
- Quality-Aware Video Analytics in Edge Computing EnvironmentsMohammad Nazmus Sadat, Erwin Vargas-Alfonso, Rui Dai. 449-452 [doi]
- Low-Complexity Adaptive Digital Pre-Distortion with Meta-Learning based Neural NetworksAlexis Falempin, Rafik Zayani, Jean-Baptiste Doré, Emilio Calvanese Strinati. 453 [doi]
- MQTPP - Towards Multiple Q-Table based Path Planning in UAV EnvironmentsMichael R. Jones, Soufiene Djahel, Kristopher Welsh. 457-460 [doi]
- Offloading Robot Control with 5GPeter Sossalla, Justus Rischke, Giang T. Nguyen 0002, Frank H. P. Fitzek. 461-464 [doi]
- Forest Fire Surveillance using Live Video Streaming from UAV via Multiple LTE NetworksKoichi Nihei, Natsuki Kai, Yuki Maruyama, Toshiaki Yamashita, Dai Kanetomo, Takako Kitahara, Masaaki Maruyama, Takashi Ohki, Kitso Kusin, Hendrik Segah. 465-468 [doi]
- Distributed Trajectory Design for Underwater Multi-Robot Relay NetworksHongzhi Guo, Clifford Boakye-Mensah. 469-472 [doi]
- UAV-FAP: User Fairness-Driven Access Point on UAV for Wi-Fi NetworksYung-Chuan Wu, Hong-Rong Chang, Meng-Shou Wu, Chi-Yu Li, Kuochen Wang. 473-476 [doi]
- Help From Above: UAV-Empowered Network Resiliency in Post-Disaster ScenariosChristian Esposito, Gianluca Rizzo. 477-480 [doi]
- Dynamic Generation of Revenue through the insertion of advertisements into video contentsFrancisco Lopez-Navarrete, Joaquín Sánchez-Soriano, Oscar Martínez Bonastre. 481-482 [doi]
- IoT Edge Orchestration for Distributed DNN Service with Containerized Resource AllocationHyungbin Park, Taeyoung Kim, Younghwan Jin, SuKyoung Lee. 483-484 [doi]
- Novel Quality of Experience Experimentation Framework Through Programmable Network ManagementAhmed Osama Basil, Mu Mu, Ali Al-Sherbaz. 485-486 [doi]
- Enabling video conferencing in low bandwidthMuzzafer Ali, Suchetana Chakraborty. 487-488 [doi]
- Improving Data Consistency in Vehicular Micro CloudsGurjashan Singh Pannu, Stephan Dunkel, Seyhan Ucar, Takamasa Higuchi, Onur Altintas, Falko Dressler. 489-490 [doi]
- An Optimistic Synchronization Based Server Selection Scheme with Successive ParticipationAkio Kawabata, Bijoy Chand Chatterjee, Eiji Oki. 491-492 [doi]
- Distributed Fog-based Caching Solution for Content-Centric Networking in IoTYoussef Sellami, Ghada Jaber, Ahmed Lounis. 493-494 [doi]
- Towards Risk Adjusted Wireless Access under Jamming: Reliability through Multi-ConnectivityVladimir Marbukh. 495-496 [doi]
- Computing offloading and load balancing within UAV clustersSana Ben Aissa, Asma Ben Letaifa, Abderrahim Sahli, Abderrezak Rachedi. 497-498 [doi]
- Gradual Control Method for Program File Placement in Hierarchical Cloud-Edge PlatformKeigo Kono, Takehiro Sato, Eiji Oki. 499-500 [doi]
- Phasic Policy Gradient Based Resource Allocation for Industrial Internet of ThingsLokesh Bommisetty, Venkatesh Tiruchirai Gopalakrishnan. 501-502 [doi]
- Empirical Differences in LTE Open- and Closed-Loop Power ControlAziz Kord, Jason Coder, Aric Sanders. 503-504 [doi]
- Applying Time-aware Shaper Considering User Identifier to Service Provider NetworkYuhei Kawakami, Hideo Kawata, Takahiro Kubo, Natsuki Yasuhara, Shinichi Yoshihara, Tomoaki Yoshida. 505-506 [doi]
- Radio and Power over Double Clad Fiber System for 4K/8K Satellite BroadcastingZixuan Guo, Jiang Liu 0005, Shigeru Shimamoto. 507-508 [doi]
- Neighbor Discovery in a Multi-Transceiver Free-Space-Optical Ad Hoc NetworkJessica Vazquez-Estrada, Suman Bhunia, Mahmudur Khan, Yicheng Qian, Nero Tran Huu. 509-510 [doi]
- Ambient Backscatter Communication System Utilizing Multicarrier SignalChangyoung An, Hyeong Min Kwon, Heung-Gyoon Ryu. 511-512 [doi]
- Generalization of probabilistic scheduling models for realizing URLLC applicationsSuyong Eum, Shin'ichi Arakawa, Masayuki Murata. 513-514 [doi]
- Deep Learning Transceiver for Terahertz Band Communication System with 1-bit ADC and OversamplingMetasebia D. Gemeda, Min S. Han, Ameha T. Abebe, Chung Gu Kang. 515-516 [doi]
- Signal Propagation Through the Inside of Robot Leg for Non-wired Robot SystemChihyeh Chen, Megumi Saito, Shigeru Shimamoto. 517-518 [doi]
- Robust First Path Detection Based on Two-Stage CNN for Unspecified UWB Pulse ShapeSehwan Choi, Chae-Hun Im, Chungyong Lee. 519-520 [doi]
- Topic Load Balancing in a multi IoT Gateways Scenario under Publish/Subscribe ParadigmMattia Giovanni Spina, Gerardo Mario Marotta, Stefano Gualtieri, Floriano De Rango. 521-522 [doi]
- FLUIDS: Federated Learning with semi-supervised approach for Intrusion Detection SystemOns Aouedi, Kandaraj Piamrat, Guillaume Muller, Kamal Deep Singh. 523-524 [doi]
- A Lidar Information-based Privacy-Preserving Authentication Scheme Using Elliptic Curve Cryptosystem in VANETsTing Gu, Kiho Lim, Gyu Ho Choi, Xiwei Wang. 525-526 [doi]
- MalDIST: From Encrypted Traffic Classification to Malware Traffic Detection and ClassificationOfek Bader, Adi Lichy, Chen Hajaj, Ran Dubin, Amit Dvir. 527-533 [doi]
- Ohana Means Family: Malware Family Classification using Extreme Learning MachinesAaron Walker, Raj Mani Shukla, Tapadhir Das, Shamik Sengupta. 534-542 [doi]
- Cyber Deception using Honeypot Allocation and Diversity: A Game Theoretic ApproachAhmed H. Anwar, Charles A. Kamhoua. 543-549 [doi]
- Lightweight Authentication and Authorization Protocol for Dynamic Charging of Electric VehiclesAbdulaziz Alshaeri, Mohamed Younis. 550-556 [doi]
- Comparing the Predictability of Sensor Modalities to Detect Stress from Wearable Sensor DataRyan Holder, Ramesh Kumar Sah, Michael Cleveland, Hassan Ghasemzadeh 0001. 557-562 [doi]
- Characterization of Magnetic Communication Through Human BodyRajpreet Kaur Gulati, Sayemul Islam, Amitangshu Pal, Krishna Kant 0001, Albert Kim. 563-568 [doi]
- Multi-factor Behavioral Authentication Using Correlations Enhanced by Neural Network-based Score FusionAkira Miyazawa, Tran Phuong Thao, Rie Shigetomi Yamaguchi. 569-577 [doi]
- X-Fidence: Post-Pandemic Wellness By Density Monitoring with Privacy PreservationRaiful Hasan, Ragib Hasan. 578-583 [doi]
- Cooperative Task-Oriented Group Formation for Vehicular NetworksHuiye Liu, Douglas M. Blough. 584-592 [doi]
- Vehicular Knowledge Networking and Mobility-Aware Smart Knowledge PlacementSeyhan Ucar, Takamasa Higuchi, Chang-Heng Wang, Duncan Deveaux, Onur Altintas, Jérôme Härri. 593-598 [doi]
- Required-Data-Rate-Based Distributed Resource Allocation Scheme for MmWave V2V with RelayYue Yin, Tao Yu, Kei Sakaguchi. 599-604 [doi]
- Mitigating Location-based Attacks Using Predication Models in Vehicular Ad-Hoc NetworksAdam Dean, Brennan Huber, Farah I. Kandah. 605-610 [doi]
- Context-based Mixed-Numerology Profile Selection for 5G and BeyondDheeraj Kotagiri, Anan Sawabe, Eiji Takahashi, Takanori Iwai, Takeo Onishi, Yoshiaki Nishikawa. 611-616 [doi]
- Knowledge Transfer based Radio and Computation Resource Allocation for 5G RAN SlicingHao Zhou, Melike Erol-Kantarci. 617-623 [doi]
- Unsupervised root-cause identification of software bugs in 5G RANTobias Sundqvist, Monowar H. Bhuyan, Erik Elmroth. 624-630 [doi]
- Learning Semantics: An Opportunity for Effective 6G CommunicationsMohamed Sana, Emilio Calvanese Strinati. 631-636 [doi]
- Slicing Scheduling for Supporting Critical Traffic in Beyond 5GAli Esmaeily, Katina Kralevska, Toktam Mahmoodi. 637-643 [doi]
- End-to-End Quality-of-Service Assurance with Autonomous Systems: 5G/6G Case StudyVan Sy Mai, Richard J. La, Tao Zhang, Abdella Battou. 644-651 [doi]
- Modeling and Analysis of mMTC Traffic in 5G Base StationsFidan Mehmeti, Thomas F. La Porta. 652-660 [doi]
- An Optimized M-ary Amplitude Phase Shift Keying Scheme for Ultrabroadband Terahertz CommunicationPriyangshu Sen, Viduneth Ariyarathna, Josep Miquel Jornet. 661-666 [doi]
- Data Importance Aware Periodic Machine Learning Model Update for Sparse Mobile CrowdsensingYuichi Inagaki, Ryoichi Shinkuma, Takehiro Sato, Eiji Oki. 667-670 [doi]
- A Mobile App to Pin Media to the Real WorldMirko Franco, Pietro Giacomazzi, Claudio E. Palazzi. 671-674 [doi]
- LSTM-Based High Precision Pedestrian PositioningMasaki Inoue, Suhua Tang, Sadao Obana. 675-678 [doi]
- Development of a window positioning method considering network characteristics for a mobile tiled displayTohru Kondo, Hiroki Murakami, Kaori Maeda. 679-682 [doi]
- Evaluation of the Bluetooth-based Proximity Estimation for Automatic Exposure DeterminationKamran Sayrafian, Brian Cloteaux, Vladimir Marbukh, Christian Emiyah. 683-686 [doi]
- Implementation of a sea monitoring system based on social internet of thingsAndrea Piras, Silvia Mirri, Mariella Sole, Daniele D. Giusto, Giovanni Pau 0001, Roberto Girau. 687-690 [doi]
- Time series analysis for temperature forecasting using TinyMLMaria Francesca Alati, Giancarlo Fortino, Juan Morales, José M. Cecilia, Pietro Manzoni. 691-694 [doi]
- Bringing MQTT Brokers to the Edge: A Preliminary EvaluationDaniele Ronzani, Claudio E. Palazzi, Pietro Manzoni. 695-698 [doi]
- Blockchain and Web of Things for Structural Health Monitoring Applications: A Proof of ConceptLorenzo Gigli, Luca Sciullo, Federico Montori, Alessandro Marzani, Marco Di Felice. 699-702 [doi]
- MARS - Towards Mobile Assisted RSSI Secret Key Extraction Strategy in WBANsJack Hodgkiss, Soufiene Djahel. 703-706 [doi]
- Intelligence at the IoT Edge: Activity Recognition with Low-Power Microcontrollers and Convolutional Neural NetworksAlessandro Ghibellini, Luciano Bononi, Marco Di Felice. 707-710 [doi]
- MBM-IoT: Intelligent Multi-Baseline Modeling of Heterogeneous Device Behaviors against IoT BotnetJianyu Wang, Jianli Pan. 711-712 [doi]
- An Unsupervised Ensemble Learning Approach for Novelty-based Botnet DetectorsMehrdad Hajizadeh, Milad Abbaszadeh Jahromi, Thomas Bauschert. 713-714 [doi]
- Case Study of Attribute Based Access Control for Genomics Data Using Named Data NetworkingDavid Reddick, F. Alex Feltus, Susmit Shannigrahi. 715-716 [doi]
- Evaluation of Impact of Intermediate GPS Spoofing to Mobile TerminalsTatsuya Ueki, Kazutoshi Yoshii, Shigeru Shimamoto, Katsunari Mizuno, Kenta Matsufuji. 717-718 [doi]
- On the Feasibility of Handwritten Signature Authentication Using PPG SensorA. B. M. Mohaimenur Rahman, Yetong Cao, Xinliang Wei, Pu Wang, Fan Li, Yu Wang. 719-720 [doi]
- Propagation Characteristics of 920 MHz band LPWA for Inspections of Power Transmission Lines Using UAVsTekkan Okuda, Hiraku Okada, Hiroki Tanaka, Toshihiro Fujiwara, Nobuo Matsui, Chedlia Ben Naila, Masaaki Katayama. 721-722 [doi]
- A Study on Dynamic Collection of Cooperative Awareness Messages in V2X Safety ApplicationsChaima Zoghlami, Rahim Kacimi, Riadh Dhaou. 723-724 [doi]
- RoofCoin: a blockchain for internet of vehicles based on the ROOF standard and VSNAbdellah Kaci, Abderrezak Rachedi. 725-726 [doi]
- A RAN Slicing Architecture for ITS-G5 Cooperative Intelligent Transport SystemMeroua Moussaoui, Rachedi Abdennour, Toufik Ahmed, Mohamed Mosbah. 727-728 [doi]
- BenchAV: A Security Benchmarking Framework for Autonomous DrivingMohammad Aminul Hoque, Md. Mahmud Hossain, Ragib Hasan. 729-730 [doi]
- An Interaction Provenance-based Trust Management Scheme For Connected VehiclesMohammad Aminul Hoque, Ragib Hasan. 731-732 [doi]
- CAVE-VR and Unity Game Engine for Visualizing City Scale 3D MeshesCalvin Davis, Jaired Collins, Joshua Fraser, Haoxiang Zhang, Shizeng Yao, Emily Lattanzio, Bimal Balakrishnan, Ye Duan, Prasad Calyam, Kannappan Palaniappan. 733-734 [doi]
- Detecting forged AS paths from BGP graph features using Recurrent Neural NetworksKevin Hoarau, Pierre-Ugo Tournoux, Tahiry Razafindralambo. 735-736 [doi]
- Performance of Federated Learning with Local Differential Privacy: Federation or IndividualƒYuta Kakizaki, Koya Sato, Keiichi Iwamura. 737-738 [doi]
- A Decentralized Machine Learning Scheme with Input Perturbation-Based Differential PrivacyMasakazu Okamoto, Koya Sato, Keiichi Iwamura. 739-740 [doi]
- CentAir: Centrality Based Cross Layer Routing for Software-Defined Aerial NetworksTalip Tolga Sari, Gökhan Seçinti. 741-742 [doi]
- Suspicious ARP Activity Detection and Clustering Based on Autoencoder Neural NetworksYuwei Sun, Hideya Ochiai, Hiroshi Esaki. 743-744 [doi]
- A Scalable Real-Time Distributed Multiagent Decision Making Algorithm with CostPaul Cotae, Myong Kang, Alexander Velazquez. 745-746 [doi]
- Machine Learning-based Urban Mobility Monitoring SystemMarco Bertolusso, Michele Spanu, Vlad Popescu, Mauro Fadda, Daniele D. Giusto. 747-748 [doi]
- Deployment Options of 5G Network Slicing for Smart HealthcareRakshitha De Silva, Yushan Siriwardhana, Tharaka Samarasinghe, Madhusanka Liyanage, Mika Ylianttila. 749-750 [doi]
- Acar: An application-aware network routing system using SRv6Tomoki Sugiura, Keichi Takahashi, Kohei Ichikawa, Hajimu Iida. 751-752 [doi]
- Bassa-ML - A Blockchain and Model Card Integrated Federated Learning Provenance PlatformEranga Bandara, Sachin Shetty, Abdul-Rahman, Ravi Mukkamala, Juan Zhao 0003, Xueping Liang. 753-759 [doi]
- The Tragedy of the MinersVijay Banerjee, Ryan Rabinowitz, Mark Stidd, Rory Lewis, Philip N. Brown, Gedare Bloom. 760-765 [doi]
- T-HIBE: A Novel Key Establishment Solution for Decentralized, Multi-Tenant IoT SystemsSayon Duttagupta, Dave Singelée, Bart Preneel. 766-774 [doi]
- Robust and Efficient Data Security Solution for Pervasive Data Sharing in IoTWassila Lalouani, Mohamed Younis, Mohammad Ebrahimabadi, Naghmeh Karimi. 775-781 [doi]
- A Residual LSTM based Multi-Label Classification Framework for Proactive SLA Management in a Latency Critical NFV Application Use-CaseNikita Jalodia, Mohit Taneja, Alan Davy, Behnam Dezfouli. 782-789 [doi]
- A Deep Reinforcement Learning-based Resource Management Scheme for SDN-MEC-supported XR ApplicationsBao Nguyen Trinh, Gabriel-Miro Muntean. 790-795 [doi]
- Competitive Multi-Agent Load Balancing with Adaptive Policies in Wireless NetworksPedro Enrique Iturria Rivera, Melike Erol-Kantarci. 796-801 [doi]
- Robust Function Deployment against Uncertain Recovery Time with Workload-Dependent Failure ProbabilityMengfei Zhu, Fujun He, Eiji Oki. 802-807 [doi]
- Misbehavior Detection Using Collective Perception under Privacy ConsiderationsManabu Tsukada, Shimpei Arii, Hideya Ochiai, Hiroshi Esaki. 808-814 [doi]
- A lightweight Privacy-Preserving V2I Mutual Authentication Scheme using Cuckoo Filter in VANETsShafika Showkat Moni, D. Manivannan 0001. 815-820 [doi]
- On Frame Fingerprinting and Controller Area Networks Security in Connected VehiclesAlessio Buscemi, Ion Turcanu, German Castignani, Thomas Engel 0001. 821-826 [doi]
- Accurately Redirecting a Malicious DroneWenxin Chen, Yingfei Dong, Zhenhai Duan. 827-834 [doi]
- JAVRIS: Joint Artificial Visual Prediction and Control for Remote-(Robot) Interaction SystemsAndreas Ingo Grohmann, Johannes V. S. Busch, Adrian Bretschneider Perez, Christopher Lehmann, Frank H. P. Fitzek. 835-840 [doi]
- Location Independent Gesture Recognition Using Channel State InformationIsrael Elujide, Chunhai Feng, Aref Shiran, Jian Li, Yonghe Liu. 841-846 [doi]
- NN-key: A Neural Network-Based Secret Key for Demapping OFDM SymbolsNasim Soltani, Yanyu Li, Deniz Erdogmus, Yanzhi Wang, Kaushik R. Chowdhury. 847-852 [doi]
- Performance Enhancement of Rolling Shutter Based Visible Light Communication via Selective Reception Using Dual CamerasMasayuki Kinoshita, Takumi Toguma, Shun Yamaguchi, Sora Ibaraki, Koji Kamakura, Takaya Yamazato. 853-857 [doi]
- Multi-Channel Authentication for Secure D2D using Optical Camera CommunicationTianwen Li, Yukito Onodera, Yu Nakayama, Daisuke Hisano. 858-863 [doi]
- TXOP sharing with Coordinated Spatial Reuse in Multi-AP Cooperative IEEE 802.11be WLANsD. Nunez, Francesc Wilhelmi, Stefano Avallone, M. Smith, Boris Bellalta. 864-870 [doi]
- Clustering and Transmit Power Control for Social Assisted D2D Cellular NetworksRahul Thakur, Swati Agarwal 0001. 871-876 [doi]
- CAMAF: A framework to increase safety on the roadVincent Charpentier, Erik de Britto e Silva, Seilendria A. Hadiwardoyo, Johann M. Márquez-Barja. 877-880 [doi]
- Respiratory Rate Estimation Based on WiFi Frame CaptureTakamochi Kanda, Takashi Sato, Hiromitsu Awano, Sota Kondo, Koji Yamamoto. 881-884 [doi]
- Monitoring Electric Vehicles on The GoDavide Aguiari, Ka Seng Chou, Rita Tse, Giovanni Pau 0001. 885-888 [doi]
- Non-contact Blood Pressure Estimation By Microwave Reflection Employing Machine LearningHinako Ochi, Jiang Liu 0005, Shigeru Shimamoto. 889-892 [doi]
- TraceMe: Real-Time Contact Tracing and Early Prevention of COVID-19 based on Online Social NetworksYesin Sahraoui, Ludovica De Lucia, Anna Maria Vegni, Chaker Abdelaziz Kerrache, Marica Amadeo, Ahmed Korichi. 893-896 [doi]
- A Load Balancing Method Using K-means++ for P2P MMORPGsRyo Kambe, Sumiko Miyata Shibaura. 897-900 [doi]
- Optimization of Quantized Phase Shifts for Reconfigurable Smart Surfaces Assisted CommunicationsMaximiliano Rivera, Mohammad Chegini, Wael Jaafar, Safwan Alfattani, Halim Yanikomeroglu. 901-904 [doi]
- An Efficient Range Search Method Utilizing Detour Routes in Skip GraphYuya Miki, Takeshi Kaneko, Ryohei Banno, Kazuyuki Shudo. 905-908 [doi]
- SDN-based Platform Enabling Intelligent Routing within Transit Autonomous System NetworksOns Fares, Abdulhalim Dandoush, Nadjib Aitsaadi. 909-912 [doi]
- An Experimental Platform for Hard TSNMaël Guiraud, Brice Leclerc, Olivier Marcé. 913-916 [doi]
- An Optimal Allocation Framework of Security Virtual Network Functions in 6G Satellite DeploymentsAntonio Petrosino, Giuseppe Piro, Luigi Alfredo Grieco, Gennaro Boggia. 917-920 [doi]
- Demonstration of video conferencing tool with overlay network protocolTaiki Yoshikawa, Hijiri Komura, Ren Goto, Kazushige Matama, Chihiro Nishiwaki, Katsuhiro Naito. 921-922 [doi]
- Demonstrating Internet Of Secure Elements ServerPascal Urien. 923-924 [doi]
- BakeryRobot: 5G connected robot for SMEsAndreas Ingo Grohmann, Christopher Lehmann, Thomas Höschele, Frank H. P. Fitzek. 925-926 [doi]
- Demo: An Experimental Environment Based On Mini-PCs For Federated Learning ResearchFelix Freitag, Pedro Vilchez, Lu Wei, Chun-Hung Liu, Mennan Selimi, Iordanis Koutsopoulos. 927-928 [doi]
- An End-to-End System for Monitoring IoT Devices in Smart HomesKeith Erkert, Andrew Lamontagne, Jereming Chen, John Cummings, Mitchell Hoikka, Kuai Xu, Feng Wang. 929-930 [doi]
- Smart City Technology for Disaster Management: Demonstrating the Use of Bluetooth Low Energy (BLE) Beacons for Emergency Alert DisseminationRaiful Hasan, Ragib Hasan, Tanveer Islam. 931-932 [doi]
- Demonstration of In-Network Audio Processing for Low-Latency Anomaly Detection in Smart FactoriesHuanzhuo Wu, Yunbin Shen, Máté Tömösközi, Giang T. Nguyen 0002, Frank H. P. Fitzek. 933-934 [doi]
- Experiencing CAMAF for safer smart mobilityVincent Charpentier, Erik de Britto e Silva, Seilendria A. Hadiwardoyo, Nina Slamnik-Krijestorac, Johann M. Márquez-Barja. 935-936 [doi]
- Demonstration of Multi-Diversity WLAN Supporting Low-latency and Seamless Video StreamingYoshihisa Kondo, Hiroyuki Yomo, Hiroyuki Yokoyama. 937-938 [doi]
- Bitteiler: Demonstration of Efficient and Private Massive Industrial IoT CommunicationsMáté Tömösközi, Maroua Taghouti, Huanzhuo Wu, Frank H. P. Fitzek. 939-940 [doi]
- Realistic Experimentation Environments for Intelligent and Distributed Management and Orchestration (MANO) in 5G and beyondNina Slamnik-Krijestorac, Paola Soto-Arenas, Miguel Camelo Botero, Luca Cominardi, Steven Latré, Johann M. Márquez-Barja. 943-944 [doi]
- Object Estimation Method for Edge Devices Inspired by Multimodal Information Processing in the BrainRyoga Seki, Daichi Kominami, Hideyuki Shimonishi, Masayuki Murata, Masaya Fujiwaka. 945-946 [doi]
- Towards feasibility of Deep-Learning based Intrusion Detection System for IoT Embedded DevicesJonathan Hunter, Brennan Huber, Farah I. Kandah. 947-948 [doi]
- Towards Internet Of Secure ElementsPascal Urien. 949-950 [doi]
- Latency Guarantee Service Slice in 5G and BeyondLijun Dong, Richard Li. 951-952 [doi]
- A Host-based Investigation of IPv6 in Academia: The Cases of Japan and VietnamKien Nguyen, Phi-Le Nguyen, Hiroo Sekiya. 953-954 [doi]
- Toward Secured Internet of Things (IoT) Networks: A New Machine Learning based Technique for Fingerprinting of Radio DevicesAbdallah Abdallah, Marcos F. B. de Abreu, Flávio H. T. Vieira, Kleber Vieira Cardoso. 955-956 [doi]
- BIANFE: Object identification and authentication in federated scenariosCarolina Gonçalves, Bruno Sousa, Nuno Antunes. 957-958 [doi]
- Image Size Reduction by Road-Side Edge Computing for Wireless Relay Transmission and Object DetectionWeiran Yuan, Kazuki Maruta, Yu Nakayama, Daisuke Hisano, Kei Sakaguchi. 959-960 [doi]
- Tactile Electronics Meets Softwarised NetworksJens Wagner, Helmuth Morath, Jiajing Zhang, Florian Wieczorek, Lisa Lüneburg, Frank H. P. Fitzek, Giang T. Nguyen 0002. 961-962 [doi]
- EmergencyBlock: A Blockchain-based Public Emergency Alert SystemZeynep Dündar, Oguzhan Kocatürk, Gökhan Seçinti. 963-964 [doi]
- Multi-Operator Intelligent UAV Delivery Networks in Beyond Visual Line of Sight OperationsAnindo Mahmood, Kevin Ramirez Reynoso, Mostafizur Rahman, Sheikh Ariful Islam. 965-966 [doi]
- Using CFN for Uniform Sampling of Cloud-Native DatacentersAviv Yehezkel, Eyal Elyashiv, Sharon Barkai. 967-968 [doi]