Abstract is missing.
- Web-based Training Platform with AR Games for Dyslexic ChildrenMan-Ching Yuen, Ka-Fai Ng, Chi Wai Yung, Jogesh K. Muppala, Cheuk-Hong Lok, Senrui Zhou, Hoi-Chung Lau. 1-6 [doi]
- Novel Crash Prevention Framework for C-V2X using Deep LearningForam N. Shah, Dhaval K. Patel, Kashish D. Shah, Mehul S. Raval, Mukesh A. Zaveri, S. N. Merchant. 7-12 [doi]
- Moving-Target-Defense based Security Mechanisms: A System Management PerspectiveKaliappa Ravindran, Michael Iannelli, Arun Adiththan. 13-18 [doi]
- A Lightweight IoT-Based Framework for Vehicular Ad Hoc Network (VANET)Chandra Shekhar 0007, Jagnyashini Debadarshini, Puneet Kumar Singh, Sudipta Saha. 19-24 [doi]
- Micro-Vibration Based Health Monitoring: Effect of External Factors on Ballistocardiogram SignalsUme Rani Jawad, Vaishnavi Rangaraj, Arpitha Kumar, Rakshith K. Shetty, Swarna Kedia, Abhishek Appaji, Madhusmita Rawooth, Pooja Kadambi, Pavan Kumar Kaushik, Vishwa Singh. 25-30 [doi]
- Boolean Similarity Measure for Assessing Temporal Variation in the Network Attack SurfaceGhanshyam S. Bopche, Deepnarayan Tiwari, Gopal N. Rai. 31-36 [doi]
- An Optimal Preferred Network Offload Scan Framework for Smart Wearable IoT DevicesGovind Singh, Monika Prakash, Anshul Pandey. 37-41 [doi]
- Impact of V2V Communication on Energy Consumption of Connected Electric Trucks in Stable Platoon FormationK. B. Devika, Rohith G. 0001, Shankar C. Subramanian. 42-47 [doi]
- RcAMA - An Recursive Composition Algebra-based Framework for Detection of Multistage AttacksGhanshyam S. Bopche, Gopal N. Rai, Deepnarayan Tiwari. 48-53 [doi]
- Health Assessment of 1485 Top Level Domain's Name ServersSanjay Adiwal, Balaji Rajendran, Pushparaj Shetty D, Sithu D. Sudarsan. 54-59 [doi]
- VeCEn: A Data Acquisition Framework for Heterogeneous Vehicular NetworksSagar Kavaiya, Dhaval K. Patel, Mukesh A. Zaveri, Mehul S. Raval, S. N. Merchant. 60-65 [doi]
- IOT based Sensor System for 24×7 monitoring movement disorder symptoms using machine learningAbin Ghosh, Nishita Anand, Pavan Kaushik, Vaishali Bagrodia, Pramod Kumar Pal, Ravi Yadav. 66-71 [doi]
- Investigating IoT Systems Security Attacks using Network ForensicsAyushi Mishra, Priyanka Bagade. 72-77 [doi]
- Deep Learning for Knee Osteoarthritis Severity Stage Detection using X-Ray ImagesBhaveshkumar Choithram Dharmani, Kavin Khatri. 78-83 [doi]
- Smartverse: Blockchain based Crowdsourced V2X Message Verification and Dissemination SystemM. R. Jivthesh, Rohit Mathew Samuel, M. R. Gaushik, N. B. Sai Shibu, Sethuraman N. Rao, Nidhin Mahesh A. 84-89 [doi]
- A comparative study on Wavelet Transform-based algorithm for calculating Heart Rate from BallistocardiographyKanishk Soman, Nishita Anand, Ashwathi Nambiar, Amar Dani. 90-95 [doi]
- Secure Onboarding and Management of Electronic Shelf Labels in RetailGiridhar D. Mandyam, Mauro Scagnol, Nicolas Graube. 96-101 [doi]
- iBMSR: Intelligent Body Mass Status Recognition from Respiratory AuscultationSubhrangshu Adhikary, Arindam Ghosh 0002, Subrata Nandi. 102-107 [doi]
- Practical Coded ShardingNilesh Rathi, K. Gopinath. 108-113 [doi]
- Myochain: A Blockchain Protocol for Delay Bounded Transaction ConfirmationAditya Ahuja, R. Vigneswaran, M. A. Rajan, Sachin Lodha. 114-118 [doi]
- FedEmo: A Privacy-Preserving Framework for Emotion Recognition using EEG Physiological DataMohd Ayaan Anwar, Manan Agrawal, Neha Gahlan, Divyashikha Sethia, Gaurav Kumar Singh, Rishabh Chaurasia. 119-124 [doi]
- Skin Tone Assessment Using Hyperspectral Reconstruction from RGB ImageNishchal Jagadeesha, Ankur Trisal, Vijay Narayan Tiwari. 125-128 [doi]
- CrossTrustchain: Cross-Chain Interoperability using Multivariate Trust ModelsDhruv Patel, Harsh Anand, Suchetana Chakraborty. 129-134 [doi]
- A ZK-SNARK based Proof of Assets Protocol for Bitcoin ExchangesB. Swaroopa Reddy. 135-140 [doi]
- Clinical Validation of an Indigeneous Micro-Vibration Vital Parameter Monitor Dozee VSSwarna Kedia, Inam Ur Rahman, Ashish Kaushal, E. Mahizhvannan, Rishabh Shamra Jain, Rachna Radhakrishna, Srishti Rao, Kumar Chokalingam, Madhusmita Rawooth, Pooja Kadambi, Gaurav Parchani. 141-146 [doi]
- ProFace: A Cancelable Face Template Protection ApproachSurabhi Garg, Arun Kumar Jindal, Rajan M. A, Srinivasa Rao Chalamala. 147-152 [doi]
- A Real-time IoMT Enabled Remote Cardiac Rehabilitation FrameworkShereena Shaji, Ravi Sankaran, Ramesh Guntha, Rahul Krishnan Pathinarupothi. 153-158 [doi]
- Detecting Sensitive Information from Unstructured Text in a Data-Constrained EnvironmentSaurabh Anand, Manish Shukla 0001, Sachin Lodha. 159-164 [doi]
- State of Internet Privacy and Tales of ECH-TLSVinod S. Khandkar, Manjesh K. Hanawal, Sameer G. Kulkarni. 165-170 [doi]
- Noise Recycling using GRAND for Improving the Decoding PerformanceArslan Riaz, Amit Solomon, Furkan Ercan, Muriel Médard, Rabia Tugce Yazicigil, Ken R. Duffy. 171-173 [doi]
- FENCE: A Real-Time Privacy-Preserving Solution for Enterprise Internet Forensics at ScaleMaruthi Seshidhar Inukonda, Sai Harsha Kottapalli, Bheemarjuna Reddy Tamma, Sparsh Mittal. 174-176 [doi]
- A Smartphone-based Application to Detect Parkinson's Disease Using AudioSaumya Mathkar, Prakhar Karsh, Udit Baluja, Surjya Ghosh, Sougata Sen, Vinayak Naik. 177-179 [doi]
- Demonstrating Deep Learning driven BPSK Demodulation using Software-Defined RadiosArhum Ahmad, Satyam Agarwal. 180-182 [doi]
- Demonstration of LegalHelper: A Low-cost tool for Smart Translation and Creation of Legal ContractsGarvit Chugh, Suchetana Chakraborty. 183-185 [doi]
- Closed loop optimization of 5G network slicesKavya Govindarajan, Seep Goel, Praveen Jayachandran, Steve Glover, JM Pulido Villaverde, Jacques Cresp, Joel Viale, Sophie Martin, Fabrice Livigni. 186-188 [doi]
- Radian: Paperless Academic Testimonials Enabled for Long-Term ValidationSouvik Pan, Dhiman Saha, Rajat Moona. 189-191 [doi]
- Split Computing based Quantized PoseNet Model for Distributed AI Architecture in IoT-EdgeJyotirmoy Karjee, Praveen S. Naik, Kartik Anand, Chandrashekhar S. Byadgi, Ramesh Babu Venkat Dabbiru, N. Srinidhi. 192-194 [doi]
- ANROL: Autonomous Navigation based on ROS and Laser OdometryAkshat Vikram Singh, Yash Agrawal, Rahul Gupta, Abhishek Kumar, Vivek Ashok Bohara. 195-197 [doi]
- Demonstration of a Testbed with State Estimation for Studying Security in Measurement and Control of Electric Power Transmission GridYinghui Nie, Zhen Zhu, Boyang Zhou, Chenfan Huang, Longxiang Cheng. 198-200 [doi]
- A Reliability Assurance Framework for Cloud-Native Telco WorkloadsMudit Verma, Dushyant Behl, Praveen Jayachandran, Amandeep Singh, Mathews Thomas. 201-203 [doi]
- BlockPaaS: Blockchain Platform as a ServiceYuvaraj Rajendra, Venkatesan Subramanian 0002, Sandeep Kumar Shukla. 204-206 [doi]
- #Dushyant Behl, Hai Huang, Palanivel A. Kodeswaran, Sayandeep Sen. 207-209 [doi]
- Demonstration of a V2X Use Case Using MEC-assisted 5G Emulation FrameworkMadhuri Annavazzala, Arun Kant Dubey, Supriya Dilip Tambe, Bheemarjuna Reddy Tamma, A. Antony Franklin. 210-212 [doi]
- Demo of Hybrid LiFi/WiFi Network for an Indoor EnvironmentSaswati Paramita, Anand Srivastava, Vivek Ashok Bohara, Abhijit Mitra, Hari Ramamoorthy M, Hari Krishna, Arumugam Paventhan. 213-215 [doi]
- WiROS: A QoS Software Solution for ros2 in a WiFi NetworkBishal Jaiswal, Himanshu Tyagi, Aditya Gopalan, Vishal Sevani. 216-218 [doi]
- NATIVE: Network Aggregation based Tiled Live Video StreamingKeshav Gambhir, Tanmay Rajore, Shubham Chaudhary 0006, Taral Jain, Avishi Gupta, Mukulika Maity, Arani Bhattacharya. 219-221 [doi]
- Link quality analysis of LoRa for Internet of Underwater ThingsShrutkirthi S. Godkhindi, Preetham Reddy, T. V. Prabhakar. 222-224 [doi]
- Securing Containers: Honeypots for Analysing Container AttacksYogesh C. Jadhav, Arjun Sable, Maithri Suresh, Manjesh K. Hanawal. 225-227 [doi]
- An Edge-inclusive WebRTC-based Framework to Enable Embodied Visual Analytics in TelerobotAshis Sau, Abhijan Bhattacharyya, Madhurima Ganguly, Suraj Kumar Mahato. 228-230 [doi]
- Demonstrating Multi-modal Human Instruction Comprehension with AR Smart GlassDulanga Weerakoon, Vigneshwaran Subbaraju, Tuan Tran, Archan Misra. 231-233 [doi]
- Whodunnit? A case-study of an investigation to find a multi-core scalability bottleneckChaitanya Varma, Varsha Apte. 234-242 [doi]
- LiteEx: A Lightweight Feature Extraction Tool for Captured Network TracesMayank Swarnkar, Rakesh Kumar, Raja Baidyo, Hariharasudhan G. 243-251 [doi]
- Impact Analysis of Tunnel Probing Protocol on SD-WAN's Mainstream TrafficPavan Iddalagi, Amrita Mishra. 252-259 [doi]
- CSMA/CA-based MAC Protocol for Aerial Audio NetworkingDania Qara Bala, Bhaskaran Raman. 260-268 [doi]
- Multicloud Deployment of AI Workflows Using FaaS and Storage ServicesManju Ramesh, Dheeraj Chahal, Rekha Singhal. 269-277 [doi]
- Megha: Decentralized Federated Scheduling for Data Center WorkloadsMeghana Thiyyakat, Subramaniam Kalambur, Dinkar Sitaram. 278-286 [doi]
- A Push-Pull Train for Safety of Autonomous Vehicle SoftwareSuhrid A. Wadekar. 287-294 [doi]
- A Cost Effective Reliability Aware Scheduler for Task Graphs in Multi-Cloud SystemAtharva Tekawade, Suman Banerjee. 295-303 [doi]
- Weighted GNN-based Betweenness Centrality Considering Stability and Connection StructureRamya D. Shetty, Shrutilipi Bhattacharjee. 304-308 [doi]
- Self-Supervised Reinforcement Learning for Proactive Prediction of Passive IntermodulationSerene Banerjee, Pratyush Kiran Uppuluri, Rahul Sharma N, Subhadip Bandyopadhyay. 309-313 [doi]
- Defense Against Byzantine Attack in Cognitive Radio Using Isolation ForestDanish Mehmuda, Chinmay Bhagat, Dhrupam Patel, Kamal M. Captain, Ashok Parmar. 314-318 [doi]
- Analysis of PAPR in OTFS Modulation with Classical Selected Mapping TechniqueSneha Chennamsetty, Subba Rao Boddu, Prabhu Chandhar, Krishna Chaitanya Bulusu. 319-322 [doi]
- Out of Band Emission Suppression and PAPR Analysis in OFDM systemsRoshan S. Sam, Vishal Kalkundrikar, Kashyap B. K. Seetharam, Sreenath Ramanath. 323-326 [doi]
- Railways Communication Beyond 5G: Opportunities and ChallengesIpshita Panda, Sreenath Ramanath. 327-330 [doi]
- Intelligent RMCSA Algorithm for Space Division Multiplexed Elastic Optical Network (SDM-EON)Baljinder Singh Heera, Anjali Sharma, Kumari Akansha, Yatindra Nath Singh. 331-334 [doi]
- Distributed Probabilistic Congestion Control in LEO Satellite NetworksPranav S. Page, Kaustubh S. Bhargao, Hrishikesh V. Baviskar, Gaurav S. Kasbekar. 335-339 [doi]
- Data Centric Approach to Modulation ClassificationVenkatesh Sathyanarayanan, Peter Gerstoft, Aly El Gamal. 340-344 [doi]
- Touch-Interfacing Middleware Network Design in 6GMantisha Gupta, Rakesh Kumar Jha, Manish Sabraj. 345-349 [doi]
- Survivable Transparent OFDM Optical Grids/Clouds: Efficient Dynamic Route Selection with Minimized Spectral FragmentationSougata Das, Monish Chatterjee. 350-354 [doi]
- MatchVNE: A Stable Virtual Network Embedding Strategy Based on Matching TheoryKeerthan Kumar T. G, Ankit Srivastava, Anurag Satpathy, Sourav Kanti Addya, S. G. Koolagudi. 355-359 [doi]
- Hand it Over Carefully: Security Breach during Handover in 5G-V2XMeenu Rani Dey, Moumita Patra. 360-363 [doi]
- Speed Estimation of UAVs in Dense Urban DeploymentsIpshita Panda, Sreenath Ramanath. 364-367 [doi]
- CancelOut GCN Diffusion(CoutGCN): Finding the Influential Spreaders to Diffuse InformationKoyena Chowdhury, Amit Paul 0002, Animesh Dutta. 368-372 [doi]
- Autonomous Vehicle Cyber-Attacks Classification FrameworkYazan Aref, Abdelkader Ouda. 373-377 [doi]
- +: Inertial Sensing to Reinforce Involvement of Silent Listeners during an Online InteractionGarvit Chugh, Suchetana Chakraborty, Sandip Chakraborty. 378-381 [doi]
- Demonstration of RF-VLC Hand-over using Receiver side Channel SelectionR. N. Sathisha, Faheem Ahmed, Varun Raghunathan. 382-386 [doi]
- Low-cost PM Sensors Performance, Drift Analysis, Calibration and Optimal DeploymentGautam Tiwari, Brejesh Lall. 387-391 [doi]
- IRS-Aided Communication System with Phase Noise and Hardware Impairments: Performance Analysis and CharacterizationMohd Hamza Naim Shaikh, Vivek Ashok Bohara, Anand Srivastava. 392-396 [doi]
- A Low-Cost Edge-IoT Based Smart Poultry FarmAlokik Vijay, Tushar Garg, Vikas Goyal, Rashmi, Ajay Yadav, Rahul Mukherjee. 397-399 [doi]
- Channel Modeling for Diffusive Molecular Communication Systems in The Presence of Multiple Silent Absorbing TargetsAkarsh Yadav, Ajit Kumar, Sudhir Kumar. 400-404 [doi]
- Virtual Machine Placement in Non-Cooperative Cloud Federation-AllianceSourav Kanti Addya, Anurag Satpathy, Ashok Kumar Turuk, Bibhudatta Sahoo 0001. 405-409 [doi]
- Downlink SNR Estimation of Wi-Fi Clients using Machine LearningSiddharth Dhama, Nadeem Akhtar, Preyas Hathi, Samar Agnihotri. 410-413 [doi]
- Energy Detector for Spectrum Sensing using Robust Statistics in non-Gaussian Noise EnvironmentBandaru Bhavana, Samrat L. Sabat, Namburu Swetha, Trilochan Panigrahi. 414-418 [doi]
- Intelligent routing for enabling haptic communication in 6G NetworkAnutusha Dogra, Rakesh Kumar Jha, Kumud Ranjan Jha. 419-422 [doi]
- Efficient Privacy-Preserving Authentication using Blockchain for VANETAkhil Pariyarath, Shubham Tomar, Meenakshi Tripathi. 423-426 [doi]
- FreeSteer: A Smartphone Application for Detecting Anxiety in Novice Drivers through Smart GlassesDebasree Das, Pragma Kar, Sugandh Pargal, Sandip Chakraborty. 427-431 [doi]
- Improving Threat Detection Capabilities in Windows Endpoints with OsqueryAkshay Bakshi, Tanish Sawant, Prasad Thakare, Azeez Dandawala, Manjesh K. Hanawal, Atul Kabra. 432-435 [doi]
- Opinion Dynamics: Bots and the Spiral of SilenceAshish Shukla, Neeraja Sahasrabudhe, Sharayu Moharir. 436-439 [doi]
- Strategic Energy Saving Technique for Multiple Visible Light Communication Access Points (VAP)Vishal Kumar, Rohit Kumar, Himani Mehta. 440-444 [doi]
- ANROLA: Autonomous Navigation with ROS and Laser OdometryAkshat Vikram Singh, Yash Agrawal, Rahul Gupta, Abhishek Kumar, Vivek Ashok Bohara. 445-447 [doi]
- ED.Ai: A Ballistic Simulator for Cardiac and Respiratory Micro-vibration TestingPooja Kadambi, Madhusmita Rawooth, Nishita Anand, Amar Dani, Rishabh Samra, Gaurav Parchani. 448-451 [doi]
- SmartHART: A Priority-aware Scheduling and Routing Scheme for IIoT Networks using Deep Reinforcement LearningShanti Chilukuri, Aditya Gupta, Hemanth Sri Sai Pulamolu. 452-456 [doi]
- Enhanced User Pairing and Power Allocation Strategies for Downlink NOMA Systems with Imperfections in SICSiva Mouni Nemalidinne, Pavan M. Reddy, Abhinav Kumar 0001, Prabhat K. Upadhyay. 457-461 [doi]
- Monitoring Engagement in Online Classes Through WiFi CSIVijay Kumar Singh, Pragma Kar, Ayush Madhan-Sohini, Madhav Rangaiah, Sandip Chakraborty, Mukulika Maity. 462-465 [doi]
- Double Deep Reinforcement Learning assisted Handovers in 5G and Beyond Cellular NetworksShweta Verma, S. Abhirami, Abhinav Kumar, SaiDhiraj Amuru. 466-470 [doi]
- Making Ductless-split Cooling Systems Energy Efficient using IoTKeshav Kaushik, Vinayak Naik. 471-473 [doi]
- Finding Survivors in a Terrestrial Region: A Solution to the Unmanned Aerial Vehicle Trajectory Planning ProblemK. Santhosh Kumar, P. Arun Raj Kumar. 474-476 [doi]
- Online Learning Algorithms for Mobile Data OffloadingM. Sushma, K. P. Naveen. 477-479 [doi]
- Energy Efficient Multiple Visible Light Communication Access Points (VAP)Vishal Kumar, Rohit Kumar. 480-482 [doi]
- Semi-Global Circular Centrality to find Influential SpreadersAnju Bhuiya, Koyena Chowdhury, Suman Nandi, Animesh Dutta. 483-485 [doi]
- Fixed Budget Beam Identification in Millimeter Wave Systems via Unimodal BanditsDebamita Ghosh, Manjesh K. Hanawal. 486-488 [doi]
- Exploiting Drift Detection Techniques for Next Generation Radio Access NetworksVenkateswarlu Gudepu, Venkatarami Reddy Chintapalli, Luca Valcarenghi, Koteswararao Kondepu. 489-491 [doi]
- CPRA: Co-operative Packet Routing AlgorithmAniket Modi. 492-494 [doi]
- VNFTestChain: Blockchain Based Test Framework for Trusted VNF Services in 5G and B5GPanchanan Nath, Pranav Kumar Singh, Anshuman Kalla, Maharaj Brahma. 495-497 [doi]
- Invited Paper: Challenges and Opportunities in Enabling Secure 5G PositioningAneet Kumar Dutta, Mridula Singh. 498-504 [doi]
- Security Management in Content Distribution Networks: a delay-variance reduction approach for content mirror site placementVenkat Venkateswaran, Chin-Tser Huang, Kaliappa Ravindran. 505-512 [doi]
- Defending Root DNS Servers Against DDoS Using Layered DefensesA. S. M. Rizvi, Jelena Mirkovic, John S. Heidemann, Wesley Hardaker, Robert Story. 513-521 [doi]
- Clarity: Analysing Security in Web ApplicationsConnor J. Potter, Neetesh Saxena, Soumyadev Maity. 522-528 [doi]
- Trust and Reputation Management for Blockchain-enabled IoTGuntur Dharma Putra, Sidra Malik, Volkan Dedeoglu, Salil S. Kanhere, Raja Jurdak. 529-536 [doi]
- Occupancy counting in dense and sparse settings with a low-cost thermal cameraSoumya R. Sahoo, Haroon R. Lone. 537-544 [doi]
- mmAssist : Passive Monitoring of Driver's Attentiveness Using mmWave SensorsArgha Sen, Anirban Das, Prasenjit Karmakar, Sandip Chakraborty. 545-553 [doi]
- SENTINEL: Self Protecting 5G Core Control Plane from DDoS Attacks for High Availability ServiceAditya Chilukuri, Shwetha Vittal, A. Antony Franklin. 554-562 [doi]
- ReFleX: Enabling Full Duplex Relay ClusterAvishek Banerjee, Lu Chen 0010, Kannan Srinivasan 0001. 563-571 [doi]
- HyFDMAC: A Hybrid Access Full-Duplex MAC ProtocolYazeed Alkhrijah, Joseph Camp, Dinesh Rajan. 572-578 [doi]
- Experience: Implementation of Edge-Cloud for Autonomous Navigation ApplicationsYuvraj Chowdary Makkena, Rajashekhar Reddy Tella, Nisarg Parekh, Prem Kumar Saraf, Annu, Hershita Shukla, Akhila Matathammal, Sarat Chandra Sai Danda, Praveen Chandrahas, Akshay Ramesh Jadhav, Praveen Tammana, Koteswararao Kondepu, Rajalakshmi Pachamuthu. 579-587 [doi]
- Multitask Scheduling of Computer Vision Workload on Edge Graphical Processing UnitsArani Bhattacharya, Paritosh Shukla, Ansuman Banerjee, Saumya Jaipuria, Nanjangud C. Narendra, Dhruv Garg. 588-593 [doi]
- Trust-based Misinformation Containment in Directed Online Social NetworksArnab Kumar Ghoshal, Nabanita Das 0001, Soham Das 0001, Subhankar Dhar. 594-602 [doi]
- Dual-Stream CNN-BiLSTM Model with Attention Layer for Automatic Modulation ClassificationAshok Parmar, Divya K. A, Ankit Chouhan, Kamal M. Captain. 603-608 [doi]
- IndoorRSSINet - Deep learning based 2D RSSI map prediction for indoor environments with application to wireless localizationNibin Raj, B. S. Vineeth. 609-616 [doi]
- Causality-Aware Channel State Information EncodingSerene Banerjee, Athanasios Karapantelakis, Lackis Eleftheriadis, Hamed Farhadi, Vandita Singh, R. M. Karthick. 617-625 [doi]
- Design for sustainability - an imperative for future mobile networksDerrick Remedios, Lieven Levrau, Satish Kanugovi, Susanna Kallio. 626-631 [doi]
- Efficient Memory Optimized Aggregated Bit Vector (EMOABV) Algorithm with Dynamic ABV Intersection Result CacheUday Trivedi, Lakshmi Sowjanya Dokku, Jyotsna Sangamesh. 632-639 [doi]
- Fast Proactive Re-Route with Detours on Joint Paths in Named-Data Networks for Communications of Smart Electric Power Transmission GridsBoyang Zhou, Zhen Zhu, Yinghui Nie, Xiang Chen, Bingjing Yan, Qiang Yang 0004, Chunming Wu 0001. 640-648 [doi]
- iCharge: An IoT-Assisted Framework for Efficient Charging of the Electric-VehiclesJagnyashini Debadarshini, Rejeti Megha Vardhan, Sudipta Saha, Chandrashekhar N. Bhende. 649-657 [doi]
- Lessons Learnt From the Implementation of the IEEE 802.15.4e-TSCH MACIpsita Sanyal, Deeksha P. Rao, Rakshana Gunasekaran, Sachin SM, T. V. Prabhakar. 658-666 [doi]
- A Wideband Array Antenna with Elliptical Slots on Substrate Integrated Waveguide TechnologySomayeh Komeylian, Christopher Paolini, Mahasweta Sarkar. 667-673 [doi]
- A Stable Link Allocation Algorithm for 5G Millimeterwave NetworksSubhojit Sarkar, Subhankar Ghosal, Subhadip Bandyopadhyay, Sasthi C. Ghosh 0001. 674-681 [doi]
- A High Bandwidth 4 × 1 Antenna Array of Circular Patches with Two SectorsSomayeh Komeylian, Christopher Paolini, Mahasweta Sarkar. 682-690 [doi]
- Frequency Division Duplex Based Cooperative VFD: Outage Analysis and Relay Power AllocationJustin Jose, Parvez Shaik, Shubham Bisen, Vinat Goyal, Vimal Bhatia. 691-697 [doi]
- Bayesian Regression for Interpretable Network DimensioningShrihari Vasudevan, Sleeba P. Puthennurakel, Marcial Gutierrez, M. J. Prasath. 698-705 [doi]
- Weak Supervision and Transformed-based Sentiment Analysis on Multi-lingual DataShubhangi Rastogi. 706-712 [doi]
- FedNSE: Optimal Node Selection for Federated Learning with Non-IID DataSourav Bansal, Manav Bansal, Rohit Verma, Rajeev Shorey, Huzur Saran. 713-721 [doi]
- Multi-Agent Packet Routing (MAPR): Co-Operative Packet Routing Algorithm with Multi-Agent Reinforcement LearningAniket Modi, Rishi Shah, Krishnanshu Jain, Rohit Verma, Rajeev Shorey, Huzur Saran. 722-730 [doi]
- Towards adoption of secure communication protocol in Software Defined NetworksGayatri Priyadarsini Kancherla, Sameer G. Kulkarni. 731-738 [doi]
- Thwarting Piracy: Anti-debugging Using GPU-assisted Self-healing CodesAdhokshaj Mishra, Manjesh K. Hanawal. 739-747 [doi]
- Data Protection in Permissioned Blockchains using Privilege SeparationArun Joseph, Nikita Yadav, Vinod Ganapathy, Dushyant Behl, Praveen Jayachandran. 748-756 [doi]
- A 5G OpenAirInterface (OAI) Testbed with MEC: Deployment, Application testing and Slicing SupportPriyal Thakkar, Shashvat Sanadhya, Pimmy Gandotra, Brejesh Lall. 757-762 [doi]
- Estimating Task Completion Times for Network Rollouts using Statistical Models within Partitioning-based Regression MethodsVenkatachalam Natchiappan, Shrihari Vasudevan, Thalanayar Muthukumar. 763-767 [doi]
- A Multi-Tenant System for 5/6G Testbed as-a-ServiceRaffaele Bolla, Roberto Bruschi, Chiara Lombardo, Sergio Mangialardi, Alireza Mohammadpour, Ramin Rabbani, Beatrice Siccardi. 768-773 [doi]
- Enhancing GSMA Operator Platform Group Standards to Enable Seamless Application Mobility in Multi-Domain Multi-Access Edge Computing NetworksNanjangud C. Narendra. 774-779 [doi]
- Financial Fake News Detection via Context-Aware Embedding and Sequential Representation using Cross-Joint NetworksPadmapriya Mohankumar, Ashraf Kamal, Vishal Kumar Singh, Amrish Satish. 780-784 [doi]
- A Scalable Heuristic on Energy Consumption of Fog-RANBharat Dwivedi, Sandip Chakraborty, Debarati Sen. 785-790 [doi]
- Delay-based Fidelity Monitoring of Distributed Network EmulationHoussam ElBouanani, Chadi Barakat, Walid Dabbous, Thierry Turletti. 791-796 [doi]
- Network Intrusion Detection Through Machine Learning With Efficient Feature SelectionRohan Desai, Venkatesh Tiruchirai Gopalakrishnan. 797-801 [doi]
- Performance Evaluation of Video Streaming Applications with Target Wake Time in Wi-Fi 6Govind Rajendran, Rishabh Roy, Preyas Hathi, Nadeem Akhtar, Samar Agnihotri. 802-807 [doi]
- Security for oneM2M-Based Smart City Network: An OM2M ImplementationGangavarapu Vigneswara Ihita, Vybhav. K. Acharya, Likhith Kanigolla, Sachin Chaudhari, Thierry Monteil 0001. 808-813 [doi]
- Scene Reconstruction and Trajectory Estimation in Hierarchical MANETAtrayee Gupta. 814-818 [doi]
- EELAS: Energy Efficient and Latency Aware Scheduling of Cloud-Native ML WorkloadsIlias Syrigos, Dimitris Kefalas, Nikos Makris, Thanasis Korakis. 819-824 [doi]
- SIRM: Cost efficient and SLO aware ML prediction on Fog-Cloud NetworkChetan Phalak, Dheeraj Chahal, Rekha Singhal. 825-829 [doi]
- Towards Next-generation Ultra-Wideband TechnologyAniruddh Rao Kabbinale, Ankur Bansal, Karthik Srinivasa Gopalan. 830-834 [doi]
- Experimental Research Reproducibility and Experiment Workflow ManagementYuri Demchenko, Sebastian Gallenmüller, Serge Fdida, Panayiotis Andreou, Cedric Crettaz, Mathias Kirkeng. 835-840 [doi]
- Performance Measurement of Distributed Storage on Edge DevicesPriyam Loganathan, Dhruv Rauthan, Animesh Trivedi, Vinayak Naik. 841-846 [doi]
- Understanding Network Nodal Points for Emergency ServicesM. Saravanan, V. Rajagopalan, Divya Sachdeva. 847-851 [doi]
- ZoneSync: Real-Time Identification of Zones in IoT-EdgeH. Manish Kausik, Jagnyashini Debadarshini, Himanshu Goyal, Sudipta Saha. 852-856 [doi]
- Spectrum Activity Monitoring and Analysis for Sub-6 GHz Bands Using a HelikiteSung Joon Maeng, Özgür Özdemir, H. N. Nandakumar, Ismail Güvenç, Mihail L. Sichitiu, Rudra Dutta, Magreth Mushi. 857-862 [doi]