Abstract is missing.
- ZION: A Scalable W3C Web of Things DirectoryCristiano Aguzzi, Lorenzo Gigli, Ivan D. Zyrianoff, Luca Roffia. 1-6 [doi]
- Towards Coordinating Machines and Operators in Industry 5.0 through the Web of ThingsMarco Picone, Valeria Villani, Marcello Pietri, Luca Bedogni. 1-6 [doi]
- Blockchain-Based Device Identity Management and Authentication in Cyber-Physical SystemsUttam Ghosh, Debashis Das, Sourav Banerjee, Saraju P. Mohanty. 1-6 [doi]
- Toward a Digital Twin: Combining Sensing, Machine Learning, and Data Visualization for the Effective Management of a Coastal Lagoon EnvironmentGiovanni Delnevo, Gianni Tumedei, Vittorio Ghini, Catia Prandi. 1-6 [doi]
- Does Twinning Vehicular Networks Enhance Their Performance in Dense Areas?Sarah Al-Shareeda, Sema F. Oktug, Yusuf Yaslan, Gökhan Yurdakul, Berk Canberk. 1-6 [doi]
- On TinyML WiFi Fingerprinting-Based Indoor Localization: Comparing RSSI vs. CSI UtilizationDiego Méndez, Marco Zennaro, Moez Altayeb, Pietro Manzoni. 1-6 [doi]
- Test-field Development for ICWSNs and Preliminary Evaluation for mmWave-Band Wireless CommunicationsShintaro Mori. 1-2 [doi]
- Stress Evaluation with Biometric Information Using Smartphone by Radio Wave ReflectionSuzumi Sato, Hayato Shimano, Megumi Saito, Shigeru Shimamoto, Nao Kobayashi. 1-4 [doi]
- On the Interaction with Large Language Models for Web Accessibility: Implications and ChallengesGiovanni Delnevo, Manuel Andruccioli, Silvia Mirri. 1-6 [doi]
- Accessibility of Mobile User Interfaces using Flutter and React NativeLorenzo Perinello, Ombretta Gaggi. 1-6 [doi]
- SeReIn-M: Sensor Relationship Inference in Multi-Resident Smart HomesFahim Ahmed Irfan, Razib Iqbal, Ayesha Siddiqua. 1-6 [doi]
- Performance Evaluation of Split Computing with TinyML on IoT DevicesFabio Bove, Simone Colli, Luca Bedogni. 1-6 [doi]
- Graph Autoencoders for Detecting Anomalous Intrusions in OT Networks Through Dynamic Link DetectionAlex Howe, Dale Peasley, Mauricio Papa. 1-6 [doi]
- Towards a Data Physicalization Toolkit for Non-Sighted UsersFabio Pittarello, Manuel Semenzato. 1-6 [doi]
- Data-Driven Learning Based Secrecy Rate Optimization for RIS-Assisted Secure Wireless Networks: A Multi-Armed Bandit ApproachHongshan Mao, Hao Xu. 1-6 [doi]
- Virtualization in Robot Swarms: Past, Present, and FutureReinhardt Karnapke, Martin Richter, Matthias Werner. 1-6 [doi]
- Train Your Attention and Executive Functions with Eye-Riders! A Videogame for Improving Cognitive Abilities in Neurodiverse ChildrenMariagrazia Benassi, Davide Paolillo, Matilde Spinoso, Sara Giovagnoli, Noemi Mazzoni, Luca Formica, Gianni Tumedei, Catia Prandi. 1-6 [doi]
- A Cloud-Oriented Indoor-Outdoor Real-Time Localization IoT Architecture for Industrial EnvironmentsLaura Belli, Luca Davoli, Gianluigi Ferrari 0001. 1-6 [doi]
- Automated Resource Dimensioning in Cloud Using Hybrid Reinforcement LearningCarla Mouradian, Fetahi Wuhib. 1-8 [doi]
- From Frustration to Function: A Study on Usability Challenges in Smart Home IoT DevicesVignay Chanda, Luoyao Hao, Henning Schulzrinne. 1-6 [doi]
- Challenges of Modeling Participant Behavior in CrowdSensing EvaluationChristine Bassem. 1-6 [doi]
- ReVo: A Hybrid Consensus Protocol for Blockchain in the Internet of Things through Reputation and Voting MechanismsShivam Barke, Gautam Srivastava 0001. 1-8 [doi]
- An Information Processing System Design Approach to Underwater Robotic SwarmsDavid Mortimore, Raymond R. Buettner, Marc S. Ramsey. 1-6 [doi]
- Distributing Reasoning on WoT Edge ArchitecturesLina Nachabe, Alexandre Bento, Kamal Singh, Lionel Médini, Frédérique Laforest. 1-7 [doi]
- Decentralized Cluster Head Selection in IoV using Federated Deep Reinforcement LearningChandler Scott, Mohammad S. Khan, Anirudh Paranjothi, Joshua Qiang Li. 1-7 [doi]
- A Multi-Protocol IoT Platform for Enhanced Interoperability and Standardization in Smart HomeMihnea Cristian Marin, Mattia Cerutti, Sanders Batista, Mattia Brambilla. 1-6 [doi]
- An Edge Computing-Oriented WoT Architecture for Air Quality Monitoring in Mobile Vehicular ScenariosLuca Davoli, Laura Belli, Gianluigi Ferrari 0001, Elisa Londero, Paolo Azzoni. 1-7 [doi]
- QoE Estimation Method with Time-series Features Extracted from Packet Flows for Video StreamingJunki Oura, Akihiro Wada, Masatoshi Ogawa, Kaoru Yokoo, Jun Kakuta, Teruhisa Ninomiya. 1-6 [doi]
- A ROS-based Agricultural AI-Driven AGV (A3GV) with Collaboration and Guiding from Drones in the Outdoor Farming FieldsHung-Yu Lin, Zhe-Yu Xu, Jian Yu Zhou, Jen-Yeu Chen. 1-2 [doi]
- A Distributed Processing Communication Scheme for Real-Time Applications over Wide-Area NetworksSanetora Hiragi, Bijoy Chand Chatterjee, Eiji Oki, Akio Kawabata. 25-30 [doi]
- Cache Control Method for Multiple Web Cache Servers Based on Co-Occurrence DegreeMakoto Misumi, Masato Tariki, Noriaki Kamiyama. 31-36 [doi]
- SwitchingNet: Edge-Assisted Model Switching for Accurate Video Recognition Over Best-Effort NetworksFlorian Beye, Yasunori Babazaki, Ryuhei Ando, Takashi Oshiba, Koichi Nihei, Katsuhiko Takahashi. 37-43 [doi]
- FASTEN: Towards a FAult-Tolerant and STorage EfficieNt Cloud: Balancing Between Replication and DeduplicationSabbir Ahmed, Md Nahiduzzaman, Tariqul Islam 0001, Faisal Haque Bappy, Tarannum Shaila Zaman, Raiful Hasan. 44-50 [doi]
- Classification-Based Transfer Learning for Blind Adaptive Receiver BeamformingMichael Wentz, Jack Capper, Binoy G. Kurien, Keith Forsythe, Kaushik R. Chowdhury. 59-64 [doi]
- BitFormer: Transformer-Based Neural Network for Bitrate Prediction in Real-Time CommunicationsTailai Song, Gianluca Perna, Paolo Garza, Michela Meo, Maurizio Matteo Munafò. 65-70 [doi]
- DRL-APNS: A Deep Reinforcement Learning-Powered Framework for Accurate Predictive Network Slicing AllocationAmr Abo-eleneen, Alaa Awad Abdellatif, Aiman Erbad, Amr Mohamed 0001. 71-76 [doi]
- Why Real-Time Matters: Performance Evaluation of Recent Ultra-Low Latency Audio Communication SystemsRamon Moscatelli, Kevin Stahel, Robert Kraneis, Christian Werner. 77-83 [doi]
- Dynamic Clustering Page Allocation for Read-Intensive Multimedia Streaming ApplicationsHan Jang, Youngbin Jin, Dongjun Lee, Ben Lee. 84-89 [doi]
- Service Graphs Generation in Intent-Based NetworksSasan Sabour, Amin Ebrahimzadeh, Fetahi Wuhib, Mbarka Soualhia, Roch H. Glitho. 90-97 [doi]
- Accelerating Feedback Control for QoE Fairness in Adaptive Video Streaming Over ICNRei Nakagawa, Satoshi Ohzahata, Ryo Yamamoto. 98-106 [doi]
- Deceiving Post-Hoc Explainable AI (XAI) Methods in Network Intrusion DetectionThulitha Senevirathna, Bartlomiej Siniarski, Madhusanka Liyanage, Shen Wang 0006. 107-112 [doi]
- Resource-Aware Service Prioritization in a Slice-Supportive 5G Core Control Plane for Improved Resilience and SustenanceSupriya Kumari, Shwetha Vittal, A. Antony Franklin. 113-120 [doi]
- Beyond Tokens: Distributed, De-Centralized, Local Authorization Framework for Beyond 5GC SBIBharath Kumar R., Rajavelsamy R.. 121-126 [doi]
- Impacts of a Single GPS Spoofer on Multiple Receivers: Formal Analysis and Experimental EvaluationWenxin Chen, Yingfei Dong, Zhenhai Duan. 127-134 [doi]
- Toward Accurate Environmental Mapping using Balloon-based UAVsAhmed Boubrima, Zhambyl Shaikhanov, Edward W. Knightly. 135-142 [doi]
- A Lightweight Aggregate Authentication Protocol for Internet of DronesImage Bhattarai, Cong Pu, Kim-Kwang Raymond Choo. 143-151 [doi]
- Distributed Hardware-Assisted Authentication and Key Agreement Protocol for Internet of ThingsAbdulaziz Alshaeri, Mohamed Younis 0001. 152-158 [doi]
- Analyses of Hidden and Exposed Nodes in LPWAN with Energy Detection Based Carrier SenseShusuke Narieda, Takeo Fujii. 159-164 [doi]
- Noisy Label Detection for Multi-labeled MalwareNaoki Fukushi, Toshiki Shibahara, Hiroki Nakano, Takashi Koide, Daiki Chiba 0001. 165-171 [doi]
- COPS: A Compact On-Device Pipeline for Real-Time Smishing DetectionHarichandana B. S. S, Sumit Kumar 0006, Manjunath Bhimappa Ujjinakoppa, Barath Raj Kandur Raja. 172-179 [doi]
- Assessing Time Offset and Classifier Impacts on Preamble-based Cross-Collection SEIJoshua H. Tyler, Donald R. Reising, Mohamed K. M. Fadul, Mina Sartipi. 180-187 [doi]
- Detecting Reentrancy Vulnerability in Smart Contracts using Graph Convolution NetworksHozefa Lakadawala, Komla Dzigbede, Yu Chen. 188-193 [doi]
- Opportunistic Protocols for People Counting in Dynamic NetworksAlexander Jung, Helge Parzyjegla, Peter Danielis. 198-201 [doi]
- Robust Interactive HMI for Occupancy Estimation in Smart Buildings (WIP)Maher Dissem, Manar Amayri, Nizar Bouguila. 202-205 [doi]
- Wi-Fi Sensing for Human Identification Through ESP32 Devices: An Experimental StudyFabio Gaiba, Luca Bedogni, Giacomo Gori, Andrea Melis 0001, Marco Prandini. 206-209 [doi]
- A Real-Time Human Tracking System Using Multiple Cameras to Reduce Network LoadsHikaru Katayama, Hideto Yano, Tomoki Yoshihisa, Hideyuki Shimonishi. 210-213 [doi]
- Implementation and Evaluation of a Facial Image Obscuring Method for Person Identification to Protect Personal DataSatoru Matsumoto, Tomoki Yoshihisa, Hideyuki Shimonishi, Tomoya Kawakami, Yuuichi Teranishi. 214-217 [doi]
- A Framework for Context Recognition from Voice Commands and Conversations with Smart AssistantsJeniya Sultana, Razib Iqbal. 218-221 [doi]
- Development and Evaluation of Information-Centric Service Mesh Using NDN Function ChainingHideyuki Saito, Kenji Kanai, Hidenori Nakazato. 222-227 [doi]
- Network-Transparent Load Balancing and Migration for Edge ComputingYohei Namba, Ryo Morishima, Hiroaki Nishi. 228-233 [doi]
- Proactive Caching in the Edge-Cloud Continuum with Federated LearningIvan D. Zyrianoff, Leonardo Montecchiari, Angelo Trotta, Lorenzo Gigli, Carlos Kamienski, Marco Di Felice. 234-240 [doi]
- Enhancing Indoor Millimeter Radio Communication: A Probabilistic Approach to RSS Map EstimationDaiki Kodama, Kenji Ohira, Hideyuki Shimonishi, Toshiro Nakahira, Daisuke Murayama, Tomoaki Ogawa. 241-247 [doi]
- Proactive Millimeter-Wave Link Quality Prediction Utilizing Out-of-Band CSI Fingerprinting and Supervised Learning: An Experimental StudyShoki Ohta, Cheng Chen, Takayuki Nishio. 248-253 [doi]
- CSI2PC: 3D Point Cloud Reconstruction Using CSINatsuki Ikuo, Sorachi Kato, Takuma Matsukawa, Tomoki Murakami, Takuya Fujihashi, Takashi Watanabe, Shunsuke Saruwatari. 254-259 [doi]
- Electricity Theft Detection Approach Using One-Class Classification for AMIMadeleine Miller, Hany Habbak, Mahmoud M. Badr, Mohamed Baza, Mohamed Mahmoud 0001, Mostafa M. Fouda. 260-265 [doi]
- Hidden in Time, Revealed in Frequency: Spectral Features and Multiresolution Analysis for Encrypted Internet Traffic ClassificationNathan Dillbary, Roi Yozevitch, Amit Dvir, Ran Dubin, Chen Hajaj. 266-271 [doi]
- Anti-Money Laundering in Cryptocurrencies Through Graph Neural Networks: A Comparative StudySimone Marasi, Stefano Ferretti. 272-277 [doi]
- On Using Artificial Intelligence to Predict Music Playlist SuccessRoberto Cavicchioli, Jia-Cheng Hu, Marco Furini. 278-283 [doi]
- HYDRAted - High Yield Dense Robotic Arms Technically Evolved DemonstratorAndreas Ingo Grohmann, Frank Peters, David Kuss, Mauri Seidel, Frank H. P. Fitzek. 282-283 [doi]
- On developing a procedural level generator based on the Model Synthesis algorithm in the context of serious gamesDavide Paolillo, Bryan Corradino, Gianni Tumedei, Mariagrazia Benassi, Catia Prandi. 284-289 [doi]
- Enhancing Road Safety Through Fitness-to-Drive Metrics: The NextPerception Project on Driver Behavior Analysis and GamificationMaria Mengozzi, Manuel Andruccioli, Silvia Mirri, Giovanni Delnevo, Roberto Girau. 290-295 [doi]
- Reactive Jamming of the Helium NetworkSrinivas Tenneti, Romika Jakhar, Khaled Harfoush. 296-301 [doi]
- Route Selection in Low-Cost Participatory Mobile Sensing of Air QualityMohamed Anis Fekih, Walid Bechkit, Hervé Rivano. 302-310 [doi]
- On the Decentralization of Mobile Crowdsensing in Distributed Ledgers: An Architectural VisionLorenzo Gigli, Federico Montori, Mirko Zichichi, Luca Bedogni, Stefano Ferretti, Marco Di Felice. 311-317 [doi]
- Maximized Content Offloading for Content Centric V2G NetworksArzoo Miglani, Neeraj Kumar 0001. 318-323 [doi]
- GhostBuster: Detecting Misbehaving Remote ID-Enabled DronesMart Keizer, Savio Sciancalepore, Gabriele Oligeri. 324-332 [doi]
- Secured Cluster-Based Electricity Theft Detectors Against Blackbox Evasion AttacksIslam Elgarhy, Ahmed T. El-Toukhy, Mahmoud M. Badr, Mohamed Mahmoud 0001, Mostafa M. Fouda, Maazen Alsabaan, Hisham A. Kholidy. 333-338 [doi]
- Malicious Log Detection Using Machine Learning to Maximize the Partial AUCTaishi Nishiyama, Atsutoshi Kumagai, Akinori Fujino, Kazunori Kamiya. 339-344 [doi]
- Introduction to Quantum Systems and Security VulnerabilitiesIgnacio Astaburuaga, Shamik Sengupta. 345-351 [doi]
- MalBuster: Scalable, Real-Time, and Concept Drift-Adaptive Malware Detection for Smart EnvironmentsJingwen Wang, Peilong Li, Ethan Weitkamp, Yusuke Satani, Adam Omundsen. 352-355 [doi]
- Detecting Zero-Day Attack with Federated Learning Using Autonomously Extracted Anomalies in IoTTakahiro Ohtani, Ryo Yamamoto, Satoshi Ohzahata. 356-359 [doi]
- Architectural Exploration and Design for Ultra-Reliable Low-Latency Indoor Robotics SystemsAyub Shah, Roberto Passerone. 360-363 [doi]
- Deep Learning-Based Proactive Physical Layer Handover using Cameras for Indoor EnvironmentKhanh Nam Nguyen, Kenichi Takizawa. 364-367 [doi]
- FlexHash - Hybrid Locality Sensitive Hashing for IoT Device IdentificationNathan Thom, Jay Thom, Batyr Charyyev, Emily M. Hand, Shamik Sengupta. 368-371 [doi]
- Water Wastage Detection in Smart Homes Through IoT and Machine LearningChiara Brunelli, Gianmarco Pappacoda, Ivan D. Zyrianoff, Luciano Bononi, Marco Di Felice. 372-375 [doi]
- Enabling a Scalable and Adaptive Cloud Infrastructure for Virtual Users in the Social Internet of ThingsSilvia Corpino, Matteo Anedda, Mauro Fadda, Daniele D. Giusto, Roberto Girau. 376-379 [doi]
- Leveraging Edge Computing and Orchestration Platform for Enhanced Pedestrian Safety Application: The DEDICAT-6G ApproachSalah Eddine Merzougui, Xhulio Limani, Andreas Gavrielides, Phillipe Reiter, Claudio E. Palazzi, Johann Márquez-Barja. 380-383 [doi]
- Distributed Framework of WSN-Assisted UAV Network for Highway SurveillanceMuhammad Mansoor Ashraf, Saadi Boudjit. 384-387 [doi]
- Deep Reinforcement Learning for Channel State Information Prediction in Internet of VehiclesXing Liu 0013, Wei Yu 0002, Cheng Qian 0007, David W. Griffith, Nada Golmie. 388-391 [doi]
- Blockchain-Enabled RF Radiation Exposure Level Measurement in Wireless Mobile NetworksNivin Madawalage, Tharani Thalgahagoda, Inushi Gunatilake, Pramitha Fernando, Geeth P. Wijesiri, Chatura Seneviratne, Madhusanka Liyanage. 392-395 [doi]
- Towards Faster DRL Training: An Edge AI Approach for UAV Obstacle Avoidance by Splitting Complex EnvironmentsPatrick McEnroe, Shen Wang 0006, Madhusanka Liyanage. 396-399 [doi]
- Edge-Oriented Point Cloud Compression by Moving Object Detection for Realtime Smart MonitoringItsuki Takada, Daiki Nitto, Yoshihiro Midoh, Noriyuki Miura, Jun Shiomi, Ryoichi Shinkuma. 400-405 [doi]
- Queue-Length-Based Offloading for Delay Sensitive Applications in Federated Cloud-Edge-Fog SystemsRen-Hung Hwang, Yuan-Cheng Lai, Ying-Dar Lin. 406-411 [doi]
- Fluid Computing in the Internet of Things: A Digital Twin ApproachLuca Bedogni, Marco Picone, Marcello Pietri, Marco Mamei, Franco Zambonelli. 412-418 [doi]
- Lightweight Multimodal Fusion Computing Model for Emotional Streaming in Edge PlatformJyotirmoy Karjee, Karan Raj Kakwani, Kartik Anand, Praveen S. Naik. 419-424 [doi]
- Goals are Enough: Inducing AdHoc Cooperation Among Unseen Multi-Agent Systems in IMFsKaushik Dey, Satheesh K. Perepu, Abir Das. 425-432 [doi]
- Distributed Multi-Agent Deep Q-Learning for Fast Roaming in IEEE 802.11ax Wi-Fi SystemsTing-Hui Wang, Li-Hsiang Shen, Kai-Ten Feng. 433-438 [doi]
- SliceGPT - OpenAI GPT-3.5 LLM, Blockchain and Non-Fungible Token Enabled Intelligent 5G/6G Network Slice Broker and MarketplaceEranga Bandara, Peter Foytik, Sachin Shetty, Ravi Mukkamala, Abdul-Rahman, Xueping Liang, Wee Keong Ng, Kasun De Zoysa. 439-445 [doi]
- RAFT: A Real-Time Framework for Root Cause Analysis in 5G and Beyond Vulnerability DetectionYifeng Peng, Xinyi Li, Jingda Yang, Sudhanshu Arya, Ying Wang. 446-454 [doi]
- Burst Collision Reduction Scheme for Low-Latency Video Transmission in 5G Uplink SystemsTatsuya Fukui, Kousuke Morita, Hiroki Ishiduka, Yuki Sakaue, Satoshi Narikawa. 455-459 [doi]
- Cost-Effective Network Packet Manipulation and Error-Detection DeviceAlexander F. K. Janus, Steffen Moser, Frank Slomka. 460-465 [doi]
- Cipher Modulation for Optical Camera Communication with Digital SignageAyano Higuchi, Yu Nakayama. 466-471 [doi]
- Keyboardless Keyboard: Smart Phone Gyroscope for Improved User InterfaceGustavo Flores, Ani Nahapetian. 472-477 [doi]
- PePC: Popularity Based Early Predictive Caching in Named Data NetworksNeminath Hubballi, Pankaj Chaudhary, Sameer G. Kulkarni. 478-483 [doi]
- Lifelog Mesh Sensor Network System Supporting Wake-Up Control Function Based on States of Power GenerationHaoting Zhang, Hiroshi Yamamoto. 484-489 [doi]
- Recognizing Seasonal Sleep Patterns of Elderly in Smart Homes Using ClusteringZahraa Khais Shahid, Saguna Saguna, Christer Åhlund. 490-498 [doi]
- A Real-Time Hand Gesture Recognition System on Raspberry Pi: A Deep Learning-Based ApproachAlyssa Yu, Cheng Qian 0007, Yifan Guo. 499-506 [doi]
- Sensor Sound Classification in Neonatal Intensive Care Units Based on Multiple Features and Neural NetworksIgor Fontes, Arthur Melo, Alejandro C. Frery, André L. L. de Aquino. 507-512 [doi]
- Energy Efficient and Reliable Maintenance for SDN-Based Scheduled Wireless NetworksFarzad Veisi, Julien Montavont, Fabrice Theoleyre. 513-518 [doi]
- Positive Reputation Score for Bitcoin P2P NetworkSimeon Wuthier, Nazmus Sakib, Sang-Yoon Chang. 519-524 [doi]
- Spotting Fake Profiles in Social Networks via Keystroke DynamicsAlvin Kuruvilla, Rojanaye Daley, Rajesh Kumar. 525-533 [doi]
- Authenticating AI-Generated Social Media Images Using Frequency Domain AnalysisNihal Poredi, Deeraj Nagothu, Yu Chen 0002. 534-539 [doi]
- Digital Twin Integrity Protection in Distributed Control SystemsMohammad Ebrahimabadi, Javad Bahrami, Mohamed Younis 0001, Naghmeh Karimi. 540-545 [doi]
- Enhanced Scheduling Strategy and Energy Efficiency for Extended Reality in 5G AdvancedVinay Kumar Shrivastava, Sriganesh Rajendran, Aby Kanneath Abraham, Rajavelsamy Rajadurai. 546-549 [doi]
- Objective QoE Models for Cloud-Based First Person Shooter Game over Mobile NetworksHenrique Souza Rossi, Karan Mitra, Christer Åhlund, Irina Cotanis, Niclas Örgen, Per Johansson. 550-553 [doi]
- Securing MQTT-M2M Communications in a Food Retail DistributionMattia Giovanni Spina, Mauro Tropea, Floriano De Rango. 554-557 [doi]
- FedRx: Federated Distillation-Based Solution for Preventing Hospitals Overcrowding During Seasonal Diseases Using MECYesin Sahraoui, Chaker Abdelaziz Kerrache, Carlos T. Calafate, Pietro Manzoni. 558-561 [doi]
- Digital Twin for Bruise Detection in Precision AgricultureMidhun Nair, Obeng Lydia Dede, Soumadeep De, Renny Edwin Fernandez. 562-565 [doi]
- Regional Correlation Aided Mobile Traffic Prediction with Spatiotemporal Deep LearningJeongjun Park, Lusungu Josh Mwasinga, Huigyu Yang, Syed M. Raza, Duc Tai Le, Moonseong Kim, Min Young Chung, Hyunseung Choo. 566-569 [doi]
- Dynamic Mirror Placement for Reducing Inter-AS Traffic in NDNXuheng Cao, Noriaki Kamiyama. 570-573 [doi]
- A Real-Time Anonymous Traffic Detection Based on Reinforcement LearningDazhou Liu, Younghee Park. 574-577 [doi]
- RDMA Transmission Control Method: Using Network Resource Allocation For Wide-Area Data CollectionRyouhei Tsugami, Tatsuya Fukui, Satoshi Narikawa. 578-581 [doi]
- Zero-touch Service Management for 6G verticals: Smart Traffic Management Case StudyRaúl Cuervo Bello, Nina Slamnik-Krijestorac, Johann M. Márquez-Barja. 582-585 [doi]
- RGB-D Camera-Based Object Grounding Surface Estimation SystemNatsuki Natori, Masayuki Mikuriya, Fumitoshi Ogino, Yu Nakayama. 586-589 [doi]
- Multi-Channel Transport Scheduler for Extended Reality in Distributed ComputingJyotirmoy Karjee, Praveen S. Naik, Kartik Anand, Utkash Sharma, Abhay Thakur. 590-593 [doi]
- Word Embedding with Emotionally Relevant Keyword Search for Context Detection from Smart Home Voice CommandsBrent Anderson, Razib Iqbal. 594-595 [doi]
- A Low-Cost IoT System for Water Quality Monitoring in Developing CountriesOmar Otoniel Flores-Cortez. 596-597 [doi]
- Collaborative Misbehaviour Response System for Improving Road SafetyKhaled Chikh, Chinmay Satish Shrivastav, Roberto Cavicchioli. 600-601 [doi]
- Energy Optimization of Distributed Video Processing System in Dynamic EnvironmentYang Lou, Hideyuki Shimonishi, Masayuki Murata 0001, Nattaon Techasarntikul. 602-603 [doi]
- Edge-Assisted Opportunistic Federated Learning for Distributed IoT SystemsNoor Khial, Alaa Awad Abdellatif, Amr Mohamed 0001, Aiman Erbad, Carla-Fabiana Chiasserini. 604-605 [doi]
- An Application of Named Data Network on InterPlanetary File SystemMingyu Ma 0004, Hidenori Nakazato. 606-607 [doi]
- Task Allocation in the Edge Cloud Scenario Incorporating Customized RequirementsFarha Masroor, Rishab Khanna, Neena Goveas. 608-609 [doi]
- Experimental Evaluation Toward Mobility-Driven Model Integration Between EdgesShota Ono, Taku Yamazaki, Takumi Miyoshi, Akihito Taya, Yuuki Nishiyama, Kaoru Sezaki. 610-611 [doi]
- Heterogeneous Edge Server and Job Allocation Based on k-means++ and Transfer ProbabilityKohei Ogawa, Sumiko Miyata. 612-613 [doi]
- Reciprocal Altruism as a Rogue Node Detection Mechanism in Dynamic Spectrum Access NetworksTruc Duong, Anna Wisniewska, Nirnimesh Ghose. 614-615 [doi]
- Superimposed Iterative Transmission for Varying Communication Ranges in Rolling Shutter Based Visible Light CommunicationRyuto Maeda, Masayuki Kinoshita, Koji Kamakura, Takaya Yamazato. 616-617 [doi]
- TAS Rescheduling Using Different Amounts of Allowable JitterHironao Abe, Hideo Kawata, Yuhei Kawakami, Shinichi Yoshihara, Tomoaki Yoshida. 618-619 [doi]
- Outage Analysis for All the Satellites in a Randomly Distributed ConstellationKennedy A. Lee, John R. Barry. 620-621 [doi]
- On the Theoretical BER Performance of STCM-MIMO SystemsBehzad Mozaffari Tazehkand, Fatemeh Asghari Azhiri, Reza Abdolee, Vida Vakilian. 622-623 [doi]
- Untrained Deep Learning Techniques for Channel Estimation With Limited Pilots in RIS-Enhanced SIMO-OFDM SystemsFan-Shuo Tseng, Tsang-Yi Wang, Pin-Chu Yu. 624-625 [doi]
- Evaluating the Latency Impact for Time-Critical Operational Technology Applications of Transitioning IEC-61850 GOOSE Operations to 5GMatthew Boeding, Paul Scalise, Michael Hempel, Hamid Sharif. 626-627 [doi]
- Study on the Coverage Extension of Millimeter Wave UAV BS Networks by Using IRSSota Yamamoto, Jin Nakazato, Gia Khanh Tran. 628-629 [doi]
- A Novel Framework to Reduce the Initial Access Latency by Utilizing Multi Resolution Angle of Arrival Estimation in 6GSridhar Kondabathini, Lalit Pathak, Kiran Bynam, Jyotirmov Karjee. 630-631 [doi]
- Performance Analysis of Indoor 5G NR SystemsBikash Chandra Singh, Sachin Shetty, Praneet Chivate, David Wright, Alex Alenberg, Peter Woodward. 632-633 [doi]
- Proposal of Differential Privacy Anonymization for IoT Applications Using MQTT BrokerKentaro Morise, Tokimasa Toyohara, Hiroaki Nishi. 634-635 [doi]
- Application-Specific Security in IoT NetworkSabrina Ahmed, Mohammed Zamshed Ali. 636-637 [doi]
- Estimation of Systolic and Diastolic Blood Pressure in a Non-Contact Method Using MicrowavesMiyu Matsuda, Jiang Liu 0005, Taka-Aki Nakada, Shigeru Shimamoto. 638-639 [doi]
- SBTCert: A Soulbound Token Certificate Verification SystemTarun Vihar Tumati, Xunfei Jiang, Yun Tian. 640-641 [doi]
- Image Transmission over LoRa-Based Networks: A Performance Study Using Image Compression and Reconstruction MethodsObeng Lydia Dede, Harikrishnan Muraleedharan Jalajamony, Renny Edwin Fernandez. 642-643 [doi]
- Towards an Interpretable AI Framework for Advanced Classification of Unmanned Aerial Vehicles (UAVs)Ekramul Haque, Kamrul Hasan, Imtiaz Ahmed 0001, Md. Sahabul Alam, Tariqul Islam 0001. 644-645 [doi]
- Automated Design System of Automotive Ethernet Utilizing Simulation-Based Machine LearningYasuhiro Mori, Hiroshi Yamamoto, Yojiro Suyama, Tatsuya Izumi, Hirofumi Urayama, Shiho Kobayashi, Hideaki Tani. 646-647 [doi]
- Detecting Cyber Attacks in Smart-Grid Networks with Probability Distribution ComparisonNisha Kumari Barsha, Neminath Hubballi. 648-649 [doi]
- Self-Sovereign Identity Management in Ship-Based 5G-Devices Use CasePeter Foytik, Safdar Hussain Bouk, Gustave Anderson, Sachin Shetty. 650-651 [doi]
- Enhanced SB-SPS Scheme to Mitigate Half Duplex Problem for Relay Transmission in Vehicle PlatooningAkito Ohshima, Kosuke Sanada, Hiroyuki Hatano, Kazuo Mori. 654-655 [doi]
- MuLeS: A Multi-Client Learning-Based MPQUIC SchedulerThanh Trung Nguyen, Minh Hai Vu, Thi Ha Ly Dinh, Phi-Le Nguyen, Kien Nguyen 0002. 656-661 [doi]
- Reasoning with the Theory of Mind for Pragmatic Semantic CommunicationChristo Kurisummoottil Thomas, Emilio Calvanese Strinati, Walid Saad. 662-668 [doi]
- Monitoring Web QoE in Satellite Networks from Passive MeasurementsGianluca Perna, Martino Trevisan, Danilo Giordano, Daniel Perdices, Marco Mellia. 669-676 [doi]
- Pragmatic Goal-Oriented Communications Under Semantic-Effectiveness Channel ErrorsTomás Hüttebräucker, Mohamed Sana, Emilio Calvanese Strinati. 683-689 [doi]
- Concatenated Structure of EP and Turbo Equalizer for Overloaded Massive MIMO DetectionTakuma Kobayashi, Takumi Takahashi, Shinsuke Ibi, Seiichi Sampei. 690-695 [doi]
- Interference-Aware Analog Beam Selection for Cell-Free Massive MIMO With Hybrid Beamforming Over Millimeter-Wave ChannelsShunsuke Kamiwatari, Masaaki Ito, Issei Kanno, Kengo Ando, Koji Ishibashi. 696-701 [doi]
- Enabling Cooperative Hybrid Beamforming in TDD-Based Distributed MIMO SystemsNariman Torkzaban, Mohammad Ali Khojastepour, John S. Baras. 702-707 [doi]
- Evasion Attacks in Smart Power Grids: A Deep Reinforcement Learning ApproachAhmed T. El-Toukhy, Mohamed Mahmoud 0001, Atef H. Bondok, Mostafa M. Fouda, Maazen Alsabaan. 708-713 [doi]
- A Multi-Level Dempster-Shafer and Reinforcement Learning-Based Reputation System for Connected Vehicle SecurityPranay Chowdary Jasti, Henry Griffith, Heena Rathore. 714-720 [doi]
- Community-Sourced Bluetooth Low Energy Device Fingerprinting Based on Link Layer PacketsAnthony Jairam, Yong Wang. 721-729 [doi]
- Game Theory for Privacy-Preserving Cybersecurity Information Exchange FrameworkIgnacio Astaburuaga, Shamik Sengupta. 730-735 [doi]
- The Degree of Entanglement: Cyber-Physical Awareness in Digital Twin ApplicationsMarco Picone, Stefano Mariani 0001, Roberto Cavicchioli, Paolo Burgio, Arslane Hamza Cherif. 736-744 [doi]
- Digital Shadow Sensor Framework for Smart Agriculture: Time Series Prediction Through Data Segmentation and ClusteringLuca Sciullo, Angelo Trotta, Sara Bosi, Luciano Bononi, Marco Di Felice. 745-751 [doi]
- On the Integration of Digital Twin Networks into City Digital Twins: Benefits and ChallengesIon Turcanu, German Castignani, Sébastien Faye. 752-758 [doi]
- Exploitation of Digital Twins in Smart ManufacturingGiacomo Cabri, Alireza Rahimi. 759-764 [doi]
- Link Setup Latency in Vehicle-to-Vehicle WLANs: A Comparative StudyTakamasa Higuchi, Seyhan Ucar, Chunghan Lee, Onur Altintas. 765-770 [doi]
- Platoon Vulnerability due to Network Topology and Targeted VehicleConstance Hendrix, Gedare Bloom. 771-776 [doi]
- Evaluation of NR-Sidelink for Cooperative Industrial AGVsShubhangi Bhadauria, Klea Plaku, Yash Deshpande, Wolfgang Kellerer. 777-783 [doi]
- On the Analysis of AI-Optimized Aerial Cell-Free Massive MIMOMohammad Shah Alamgir, Brian Kelley. 784-791 [doi]
- A Cyclic Hyper-parameter Selection Approach for Reinforcement Learning-based UAV Path PlanningMichael R. Jones, Soufiene Djahel, Kristopher Welsh. 792-798 [doi]
- Machine Learning-Based Energy-efficient Workload Management for Data CentersMatthew Smith, Luke Zhao, Jonathan Cordova, Xunfei Jiang, Mahdi Ebrahimi. 799-802 [doi]
- WIP: Towards a Transactional Network Stack for Power-Failure ResilienceKai Vogelgesang, Phillip Raffeck, Peter Wcurrency unitgemann, Thorsten Herfet, Wolfgang Schröder-Preikschat. 803-806 [doi]
- On Execution at End Devices for Energy Detection Based Carrier Sense in LPWANShusuke Narieda, Takeo Fujii. 807-810 [doi]
- Evaluation of RoCE Protocol in Backhaul Systems for Ultra-High-Speed THz Wireless LANNorimasa Yafune, Kazuto Yano, Keiichiro Mori, Toshikazu Sakano. 811-814 [doi]
- Analysis of Clock Distribution in User-centric Radio Access Network for Cell-Free Massive MIMOTakahide Murakami, Naoki Aihara, Yu Tsukamoto, Akio Ikami, Hiroyuki Shinbo, Yoshiaki Amano. 815-818 [doi]
- Adaptive Network Slicing Control Method for Unpredictable Network Variations Using Quality-Diversity AlgorithmsAmato Otsuki, Daichi Kominami, Hideyuki Shimonishi, Masayuki Murata 0001, Tatsuya Otoshi. 819-822 [doi]
- Multimodal Interface for Games: A Case Study with TinyMLHaoxuan Xie, Lam Chi Hou, Lap Tou Chau, Lei Ka Weng, Xichen Wang, Yuxuan Guo, Giovanni Delnevo, Chiara Ceccarini, Chan-Tong Lam, Su-Kit Tang. 823-826 [doi]
- FadePrint - Satellite Spoofing Detection via Fading FingerprintingGabriele Oligeri, Savio Sciancalepore, Alireza Sadighian. 827-830 [doi]
- Decentralized Waveform Co-Design for Integrated Sensing and Communications Systems via Approximate Dynamic ProgrammingShammi A. Doly, Alex R. Chiriyath, Andrew Herschfelt, Md. Ali Azam, Shankarachary Ragi, Daniel W. Bliss. 831-834 [doi]
- Enhancing 360- Degree Video Streaming via Selective Inpainting for Bandwidth OptimizationPratik Abhijeet Bendre, Shashwat Kumar, A. Antony Franklin. 835-838 [doi]
- FS-Boost: Communication-Efficient Federated Subtree-Based Gradient Boosting Decision TreesKotaro Shimamura, Shinya Takamaeda-Yamazaki. 839-842 [doi]
- Low Latency Self-Interference Suppression in In-Band Full-Duplex RelayNann Win Moe Thet, Kenichi Takizawa. 843-846 [doi]
- Measurement Study of IEEE 802.11ah Sub-1 GHz Wireless Channel PerformanceStefan Aust. 847-850 [doi]
- Selective OFDMA Transmission Method Based on Downlink Communication Quality Requirements in IEEE 802.11ax Wireless LANsHayato Yamakata, Yosuke Tanigawa, Hideki Tode. 851-856 [doi]
- Congestion State Estimation via Packet-Level RTT Gradient Analysis with Gradual RTT SmoothingAnan Sawabe, Yusuke Shinohara, Takanori Iwai. 857-862 [doi]
- Revisiting TCP Pacing for Throughput Performance Enhancement Over TDD Band in Private Mobile NetworksAnan Sawabe, Yusuke Shinohara, Takanori Iwai. 863-868 [doi]
- Performance Comparison of Clipped and Filtered OFDM/QAM and SC/APSK with BICMKazuaki Hanazawa, Yuto Hama, Hideki Ochiai. 869-874 [doi]
- SLA-MLO: Congestion-Aware SLA-Based Scheduling of Multiple Links in IEEE 802.11 beSuneel Kumar, Eduard Garcia Villegas, Daniel Camps-Mur. 875-880 [doi]
- Data-Driven Tuning of Deep Unfolding-Aided Blind Signal Separation for Short Data LengthTaisuke Nogami, Shinsuke Ibi, Takumi Takahashi, Hisato Iwai. 881-886 [doi]
- Joint Channel and Data Estimation via Bayesian Parametric Bilinear Inference for OTFS TransmissionKengo Furuta, Takumi Takahashi, Kenta Ito, Shinsuke Ibi. 887-892 [doi]
- Monitoring Network Slices with a Genetic Algorithm ApproachZahraa El Attar, Yassine Hadjadj Aoul, Géraldine Texier. 893-898 [doi]
- Robust Deep Learning-Based Secret Key Generation in Dynamic LiFi Networks Against Concept DriftElmahedi Mahalal, Muhammad Ismail 0001, Zi-Yang Wu, Mostafa M. Fouda, Zubair Md. Fadlullah, Nei Kato. 899-904 [doi]
- Design and Implementation of Data Plane Supporting Time-Sensitive Networking in 5G NetworksSiang-Jhen Wu, Chien Chen, Jyh-Cheng Chen. 905-911 [doi]
- Antenna Design for Robust Millimeter Wave LoS-MIMO Link in Mobile Analog Repeater Achieving Low Latency and High CapacityMasahiro Takigawa, Ryochi Kataoka, Issei Kanno, Yoji Kishi. 912-917 [doi]
- Natively Secure 6G IoT Using Intelligent Physical Layer SecurityIsrat Ara, Brian Kelley. 918-924 [doi]
- Multi-Homing AP Connection for Cell-Free Massive MIMO in Distributed CPU EnvironmentNaoki Aihara, Akio Ikami, Yu Tsukamoto, Takahide Murakami, Hiroyuki Shinbo, Yoshiaki Amano. 925-930 [doi]
- Chebyshev Polynomial and Private Blockchain Based Cross-Domain Authentication Protocol for IoD NetworksCong Pu, Kim-Kwang Raymond Choo, Image Bhattarai. 931-936 [doi]
- Fair Consensus in Blockchain with Heterogeneous Miners using Reinforcement Learning aided Adaptive Proof-of-WorkPrateek Sethi, Tri Nguyen, Mayukh Roy Chowdhury, Susanna Pirttikangas, Aloizio P. Silva. 937-942 [doi]
- On the Analysis of Model Poisoning Attacks Against Blockchain-Based Federated LearningRukayat Olapojoye, Mohamed Baza, Tara Salman. 943-949 [doi]
- Decentralized Defense: Leveraging Blockchain against Poisoning Attacks in Federated Learning SystemsRashmi Thennakoon, Arosha Wanigasundara, Sanjaya Weerasinghe, Chatura Seneviratne, Yushan Siriwardhana, Madhusanka Liyanage. 950-955 [doi]
- Robust Aggregation Technique Against Poisoning Attacks in Multi-Stage Federated Learning ApplicationsYushan Siriwardhana, Pawani Porambage, Madhusanka Liyanage, Samuel Marchal, Mika Ylianttila. 956-962 [doi]
- A Distillation-Based Attack Against Adversarial Training Defense for Smart Grid Federated LearningAtef H. Bondok, Mohamed Mahmoud 0001, Mahmoud M. Badr, Mostafa M. Fouda, Maazen Alsabaan. 963-968 [doi]
- FedSafe-No KDC Needed: Decentralized Federated Learning with Enhanced Security and EfficiencyMohamed I. Ibrahem, Mostafa M. Fouda, Zubair Md. Fadlullah. 969-975 [doi]
- Fingerprinting VPNs with Custom Router Firmware: A New Censorship Threat ModelSultan Almutairi, Yogev Neumann, Khaled Harfoush. 976-981 [doi]
- A Decentralized Smart Grid Communication Framework Using SDN-Enabled BlockchainUttam Ghosh, Laurent Njilla, Sachin Shetty, Charles A. Kamhoua. 982-985 [doi]
- DDoS Attacks in Communication: Analysis and Mitigation of Unreliable Clients in Federated LearningSogo Pierre Sanon, Rekha Reddy, Christoph Lipps, Hans Dieter Schotten. 986-989 [doi]
- Detecting DDoS Attacks Through AI driven SDN Intrusion Detection SystemFrancesco Salatino, Mattia Giovanni Spina, Mauro Tropea, Floriano De Rango. 990-993 [doi]
- On the Trade-Off Between Privacy and Information Quality in Location Based ServicesFrancesco Apollonio, Luca Bedogni, Giacomo Gori, Andrea Melis 0001, Marco Prandini. 994-997 [doi]
- Integrating Blockchain Technology with PKI for Secure and Interoperable Communication in 5G and Beyond Vehicular NetworksFetulhak Abdurahman Shewajo, Abdelwahab Boualouache, Sidi-Mohammed Senouci, Inès El Korbi, Bouziane Brik, Kinde Anlay Fante. 998-1001 [doi]
- Autonomous Multi-Hop Network Using PSO-based Mobile Robot Swarm with the Moving Target TechniqueKouichi Genda. 1002-1005 [doi]
- ACADEME: Aerial Cell-Assisted Device-Edge coinference ModEl in 6G Wireless NetworkTushar Vrind, Chandar Kumar, Debabrata Das. 1006-1009 [doi]
- Deep Reinforcement Learning Based Bandwidth Part Assignment in 5G NR-US. Ram Aditya, Shyamal Dhua, Animesh Kumar, Vimal Bastin Edwin Joseph, R. Rajavelsamy. 1010-1013 [doi]
- Evaluating CAP Theorem on a Stateless 5G CoreSiddhesh Pratim Sovitkar, Shwetha Vittal, A. Antony Franklin. 1014-1017 [doi]
- Data-Driven Energy Profiling for Resource-Efficient 5G Vertical ServicesHendrik Schippers, Christian Wietfeld. 1018-1021 [doi]
- On the Deployment Control and Runtime Monitoring of Containers Based on Consumer Side SBOMsNobutaka Kawaguchi, Charlie Hart. 1022-1025 [doi]
- Framework: Clustering-Driven Approach for Base Station Parameter Optimization and Automation (CeDA-BatOp)Sudharshan Paindi Jayakumar, Alberto Conte. 1026-1029 [doi]
- Performance Tradeoff in ML-Based Intrusion Detection Systems: Efficacy vs. Resource UsageNathan Dai, Suleyman Uludag. 1030-1031 [doi]
- Efficient TIS Sensitivity Measurement With Machine Learning Approach and 5G DatasetYi-Wei Chen, Min-Je Tsai, Henry Horng-Shing Lu, Kai-Ten Feng, Ta-Sung Lee, Jih-Chuan Lan. 1032-1033 [doi]
- Distance-Statistical Based Byzantine-Robust Algorithms in Federated LearningFrancesco Colosimo, Floriano De Rango. 1034-1035 [doi]
- A Study of AI-Based In-Vehicle Intrusion Detection SystemsElies Gherbi, Hamza Khemissa, Mohammed Lamine Bouchouia, Maxime Ayrault. 1036-1037 [doi]
- Tram-FL: Routing-based Model Training for Decentralized Federated LearningKota Maejima, Takayuki Nishio, Asato Yamazaki, Yuko Hara-Azumi. 1038-1039 [doi]
- Image Coding for Machines with Object Region LearningTakahiro Shindo, Taiju Watanabe, Kein Yamada, Hiroshi Watanabe. 1040-1041 [doi]
- Source CSI Dataset for Multi-Task CSI FeedbackMayuko Inoue, Tomoaki Ohtsuki. 1042-1043 [doi]
- TIM-MARL: Information Sharing for Multi-Agent Reinforcement Learning in Smart EnvironmentsAyesha Siddiqua, Siming Liu 0001, Razib Iqbal, Fahim Ahmed Irfan, Logan Ross, Brian Zweerink. 1044-1045 [doi]
- Towards Transparency in Email SecurityRonald Petrlic, David Stiegler. 1046-1047 [doi]
- Machine Learning Algorithms for DoS and DDoS Cyberattacks Detection in Real-Time EnvironmentEthan Berei, M. Ajmal Khan, Ahmed Oun. 1048-1049 [doi]
- Exploiting Spatial and Descriptive Information for Generative CompressionEri Hosonuma, Taku Yamazaki, Takumi Miyoshi, Akihito Taya, Yuuki Nishiyama, Kaoru Sezaki. 1050-1051 [doi]
- Backoff-Based Opportunistic Routing with Concurrent TransmissionTaku Yamazaki, Tomoyuki Yokoyama, Takumi Miyoshi, Ryo Yamamoto. 1052-1053 [doi]
- ConChain: A Scheme for Contention-Free and Attack Resilient BlockChainFaisal Haque Bappy, Tariqul Islam 0001, Tarannum Shaila Zaman, Md Sajidul Islam Sajid, Mir Mehedi Ahsan Pritom. 1054-1055 [doi]
- Predicting Downlink Retransmissions in 5G Networks Using Deep LearningSafdar Hussain Bouk, Babatunji Omoniwa, Sachin Shetty. 1056-1057 [doi]
- Wireless Point Cloud Streaming Experiment Using IEEE 802.11axTaku Yamazaki, Naoki Maeda, Takumi Miyoshi, Takuya Asaka. 1058-1059 [doi]
- Optimization for Low-Resource Speaker Adaptation in End-to-End Text-to-SpeechChangi Hong, Jung Hyuk Lee, Moongu Jeon, Hong Kook Kim. 1060-1061 [doi]
- Heartbeat Interval Estimation Method Using Sub-Terahertz SensingShusaku Umeda, Kazuaki Ishioka, Kota Nakamura, Michiya Hayama, Akinori Taira, Akihiro Okazaki. 1062-1063 [doi]
- Frequency Resource Allocation for IRS-Aided Communication Using Beam Squint ApproachEi Tanaka, Yuichi Kawamoto, Nei Kato, Masashi Iwabuchi, Riku Ohmiya, Tomoki Murakami. 1064-1065 [doi]
- BERT-Based Prediction Model of Management Sales Forecast Error Using Japanese Firms' Earnings Meeting TranscriptsSiya Bao, Yiqun Jin. 1066-1067 [doi]
- Deep Joint Source-Channel Coding with Optimal Compression Rate for mmWave Mobile Image TransmissionJunichiro Yamada, Katsuya Suto. 1068-1069 [doi]
- Location-Based Broad-Range Null-Steering in V2X Multiuser MIMO TransmissionYuki Sasaki, Sojin Ozawa, Kabuto Arai, Jin Nakazato, Manabu Tsukada, Kazuki Maruta. 1070-1071 [doi]
- Calibration of Real-Time LIDAR Data with Static 3D ImageYuta Sone, Katsuki Teraoka, Kenta Azuma, Ryoichi Shinkuma, Gabriele Trovato, Koichi Nihei, Takanori Iwai. 1072-1073 [doi]
- A Study on Open-Loop Transmit Power Control for Scalable Cell-Free NetworksKeita Fukushima, Keiichi Mizutani, Hiroshi Harada. 1074-1075 [doi]
- Downlink RIS-NOMA with Constellation Adjustment for 6G Wireless Communication SystemsJu Yeong Baek, Young Seok Lee, Bang Chul Jung. 1076-1077 [doi]
- Performance Analysis for IRS-Assisted SWIPT with Geometry-Based Phase ShiftMasaaki Miura, Katsuya Suto. 1078-1079 [doi]
- Proposal of LEO Based Population Estimation System Using Smartphone Emitted WLAN signalsFuto Noda, Gia Khanh Tran. 1080-1081 [doi]
- Hierarchical MUSIC Technique for Direction Finding of Multiple Signal SourcesMinkyu Oh, Young Seok Lee, Jeong-Bong Lim, Chang-Ok Kang, Bang Chul Jung. 1082-1083 [doi]
- Underwater Large-Area Non-Contact Power Transfer Using Two-Dimensional WaveguideAkihito Noda. 1084-1085 [doi]
- A Study on Semi-Reliable Communications for Real-Time Data Stream ServicesKotaro Uchida, Mikiya Yoshida, Hiroyuki Koga. 1086-1087 [doi]
- Optimizing mmWave Beamforming for High-Speed Connected Autonomous Vehicles: An Adaptive ApproachRyo Iwaki, Jin Nakazato, Muhammad Asad 0002, Ehsan Javanmardi, Kazuki Maruta, Manabu Tsukada, Hideya Ochiai, Hiroshi Esaki. 1088-1089 [doi]
- Cloud Storage Workload Characterization: An Approach with Time-Series AnalysisAbiola Adegboyega. 1090-1091 [doi]
- Demo: Split Computing-Based Privacy-Preserving Image Classification and Object DetectionTakayuki Nishio, Kojin Yorita, Shoki Ohta, Kota Maejima, Kanare Kodera, Yutaro Horikawa, Kozo Fukui. 1092-1093 [doi]
- Hierarchical Distributed Q-Learning-Based Resource Allocation and UBS Control in SATINKakyeom Jeon, Howon Lee. 1094-1095 [doi]
- Resource Allocation and Placement for Tethered Flying Platform-Aided IAB Network: Distributed DQN ApproachYerin Lee, Howon Lee. 1096-1097 [doi]
- Performance Improvement of Laser-Charged Multi-UAV Networks Based on a DQN ApproachJimin Jeon, Howon Lee. 1098-1099 [doi]
- A Study on Bloom Filter-Based Routing Scheme to Reduce Network Overhead in ICNTaketo Yasuyama, Mikiya Yoshida, Hiroyuki Koga. 1100-1101 [doi]
- Dynamic Transmission Parameter Settings Based on Data Transmission and Reception Performance for 920MHz LoRa CommunicationRikuto Tanaka, Daiki Nobayashi, Kazuya Tsukamoto, Takeshi Ikenaga, Goshi Sato, Kenichi Takizawa. 1102-1103 [doi]
- Performance Evaluation of the Impact Between IEEE 802.11ah and Private LoRa Using 920 MHz BandYusuke Takeuchi, Daiki Nobayashi, Takeshi Ikenaga. 1104-1105 [doi]
- Attention Mechanism-Empowered MADDPG for Distributed Resource Allocation in Cell-Free Mobile Edge ComputingFitsum Debebe Tilahun, Chung G. Kang 0001. 1106-1107 [doi]
- Accuracy Improvement Method for Malicious Domain Detection Using Machine LearningToshiki Koga, Daiki Nobayashi, Takeshi Ikenaga. 1108-1109 [doi]
- Packet Recovery Method with Redundant Packets for Large Spatio-Temporal Data RetentionNaoki Tanaka, Daiki Nobayashi, Kazuya Tsukamoto, Takeshi Ikenaga. 1110-1111 [doi]
- Proof-of-Concept of Digital Twin for Road Safety Assisted by B5G Heterogeneous MEC NetworkKazuma Nonomura, Kui Wang, Gunhee Cho, Hiroki Matsuo, Jin Nakazato, Zongdian Li, Tao Yu, Kei Sakaguchi. 1110-1111 [doi]
- Balancing Beyond-Shannon: Demonstration of Functional Compression Using a Balancing RobotSifat Rezwan, Juan A. Cabrera 0002, Frank H. P. Fitzek. 1112-1113 [doi]
- Intuitive Robot Control with Data Gloves for Industrial Use CasesAchim Schade, Vu Nguyen 0005, Cansu Gencoglu, Giang T. Nguyen 0002, Frank H. P. Fitzek. 1114-1115 [doi]
- CYPHONIC Adapter: Enabling Secure P2P Connectivity for Diverse IoT DevicesRen Goto, Kazushige Matama, Ryouta Aihata, Michiyo Suda, Hidekazu Suzuki, Katsuhiro Naito. 1116-1117 [doi]
- Demonstration of Wireless Multi-Path Communication to Improve ReliabilityChristopher Lehmann, Yijun Zhu, Andreas Ingo Grohmann, Frank H. P. Fitzek. 1118-1119 [doi]
- A Demonstration of ALTRUIST for Conducting QoE Subjective Tests in Immersive SystemsHenrique Souza Rossi, Karan Mitra, Christer Åhlund, Irina Cotanis. 1120-1121 [doi]
- Demonstrating Wi-Fi Slicing Capabilities for Enhancing Performance of Industrial ApplicationsXhulio Limani, Nina Slamnik-Krijestorac, Gilson Miranda, Ali Bostani, Xiaoman Shen, Chun Pan, Xingfeng Jiang, Chi Zhang, Johann M. Márquez-Barja. 1122-1123 [doi]
- Showcasing 5G SA Experimentation Capabilities for Vertical IndustriesVincent Charpentier, Nina Slamnik-Krijestorac, Juan Brenes, Johann M. Márquez-Barja. 1124-1125 [doi]
- Demonstration of Innovative Trusted TLS-IM Multi-Factor Authentication TokenPascal Urien. 1126-1127 [doi]