Abstract is missing.
- A Machine Learning Based Approach to Mobile Network AnalysisZengwen Yuan, Yuanjie Li, Chunyi Peng, Songwu Lu, Haotian Deng, Zhaowei Tan, Taqi Raza. 1-9 [doi]
- HSNet: Energy Conservation in Heterogeneous Smartphone Ad Hoc NetworksJames Mariani, Spencer Ottarson, Li Xiao. 1-9 [doi]
- An Edge Device Centric E-Health Interconnection ArchitectureW. Liu, E. K. Park, S. S. Zhu, Udo R. Krieger. 1-5 [doi]
- Cumulative Participant Selection with Switch Costs in Large-Scale Mobile Crowd SensingHanshang Li, Ting Li, Fan Li, Yue Wu, Yu Wang. 1-9 [doi]
- FastQ: QoS Control Based on the Time Sequence of First Few PacketsAung Kaung Myat, Masaru Onodera, Yoshito Tobe. 1-2 [doi]
- Dynamic Policy Deployment in SDN Switch Based on Monitoring and Analysis of User BehaviorsLigang Dong, Long Chen, Yunfei Zhang, Bohan He, Jing Zhou, Weiming Wang, Victor C. M. Leung. 1-8 [doi]
- PETS: Bottleneck-Aware Spark Tuning with Parameter EnsemblesTiago B. G. Perez, Wei Chen 0038, Raymond Ji, Liu Liu, Xiaobo Zhou. 1-9 [doi]
- Deep Learning-Based Malicious Account Detection in the Momo Social NetworkJiaqi Wang, Xinlei He, Qingyuan Gong, Yang Chen, Tianyi Wang, Xin Wang. 1-2 [doi]
- A Distributed Approach Based on Hierarchical Decompostion for Network Coded Group MulticastMeng Sun, Xinchang Zhang, Jianwei Zhang 0009. 1-2 [doi]
- RoVEr: Robust and Verifiable Erasure Code for Hadoop Distributed File SystemsTeng Wang, Son Nam Nguyen, Jiayin Wang, Tengpeng Li, Xiaoqian Zhang, Ningfang Mi, Bin Zhao, Bo Sheng. 1-9 [doi]
- An Optimal Checkpointing Model with Online OCI Adjustment for Stream Processing ApplicationsYuan Zhuang, Xiaohui Wei, Hongliang Li, Yongfang Wang, Xubin He. 1-9 [doi]
- Opportunistic Prefetching of Cellular Internet of Things (cIoT) Device ContextsSrinivasan Iyengar, Vijay K. Gurbani, Yu Zhou, Sameerkumar Sharma. 1-6 [doi]
- A Novel Data Secure Deletion Scheme for Mobile DevicesMinshen Wang, Jinbo Xiong, Rong Ma, Qi Li 0011, Biao Jin. 1-8 [doi]
- Protecting Voice Controlled Systems Using Sound Source Identification Based on Acoustic CuesYuan Gong, Christian Poellabauer. 1-9 [doi]
- Social-Aware D2D Caching Content Deployment Strategy over Edge Computing Wireless NetworksTingting Xu, Jian Jiao, Xin Chen, Ying Chen. 1-6 [doi]
- GPU-Accelerated Task Execution in Heterogeneous Edge EnvironmentsDominik Schäfer, Janick Edinger, Christian Becker. 1-7 [doi]
- Request Dispatching for Minimizing Service Response Time in Edge Cloud SystemsHongyue Wu, ShuiGuang Deng, Wei Li, Samee U. Khan, Jianwei Yin, Albert Y. Zomaya. 1-9 [doi]
- A Double-Layer Detection and Classification Approach for Network AttacksChong Sun, Kun Lv, Changzhen Hu, Hui Xie. 1-8 [doi]
- FlowCop: Detecting "Stranger" in Network Traffic ClassificationNingjia Fu, Yuwei Xu, Jianzhong Zhang, Rongkang Wang, Jingdong Xu. 1-9 [doi]
- Xspider: A Multi-Switch Testbed for Software Defined NetworksHuiling Shi, Wei Zhang, Xinchang Zhang. 1-2 [doi]
- Attacking Network Isolation in Software-Defined Networks: New Attacks and CountermeasuresRui Xiao, Hui Zhu, Chao Song, Ximeng Liu, Jian Dong, Hui Li. 1-9 [doi]
- Democratizing Network Reservations through Application-Aware OrchestrationJoaquín Chung, Rajkumar Kettimuthu, Nageswara S. V. Rao, Ian T. Foster. 1-9 [doi]
- Distributed Device Caching for Information Updating in Emergency CommunicationsJiazhen Zhou, Cory Beard, Yi Qian. 1-9 [doi]
- Efficient Density Estimation Algorithm for Ultra Dense Wireless NetworksThierry Arrabal, Dominique Dhoutaut, Eugen Dedu. 1-9 [doi]
- Interaction Patterns in a Multilayer Social NetworkAshwin Bahulkar, Boleslaw K. Szymanski. 1-8 [doi]
- Towards 3D Deployment of UAV Base Stations in Uneven TerrainXiaofei He, Wei Yu 0002, Hansong Xu, Jie Lin, Xinyu Yang, Chao Lu 0002, Xinwen Fu. 1-9 [doi]
- The Runtime System Problem Identification Method Based on Log AnalysisYanfang Liu, Jianghua Lv, Shilong Ma, Wentao Yao. 1-7 [doi]
- A Multi-Rounds Double Auction Based Resource Trading for Small-Cell Caching SystemFeiran You, Jun Li, Jinhui Lu, Feng Shu, Tingting Liu, Zhu Han. 1-7 [doi]
- PopCorns: Power Optimization Using a Cooperative Network-Server Approach for Data CentersBingqian Lu, Sai Santosh Dayapule, Fan Yao, Jingxin Wu, Guru Venkataramani, Suresh Subramaniam. 1-9 [doi]
- Robust WiFi-Enabled Device-Free Gesture Recognition via Unsupervised Adversarial Domain AdaptationHan Zou, Jianfei Yang, Yuxun Zhou, Lihua Xie, Costas J. Spanos. 1-8 [doi]
- EVN: An Elastic Virtual Network Supporting NFV Customized and Rapid MigrationJian Zou, Jingyu Wang, Qi Qi, Haifeng Sun, Zhenguang Yu, Jun Xu. 1-2 [doi]
- Leveraging the Potential of WSN for an Efficient Correction of Air Pollution Fine-Grained SimulationsAhmed Boubrima, Walid Bechkit, Hervé Rivano, Lionel Soulhac. 1-9 [doi]
- LTE Transmission in Unlicensed Bands: Evaluating the Impact over Clear Channel AssessmentBabak Mafakheri, Leonardo Goratti, Roberto Riggio, Chiara Buratti, Sam Reisenfeld. 1-8 [doi]
- Approximating the k-Minimum Distance Rumor Source Detection in Online Social NetworksSoklong Lim, Jun Hao, Zaixin Lu, Xuechen Zhang, Zhao Zhang. 1-9 [doi]
- Malware Detection Using Machine Learning Based on the Combination of Dynamic and Static FeaturesJingling Zhao, Suoxing Zhang, Bohan Liu, Baojiang Cui. 1-6 [doi]
- A Low-Cost Edge Server Placement Strategy in Wireless Metropolitan Area NetworksYongzheng Ren, Feng Zeng, Wenjia Li, Lin Meng. 1-6 [doi]
- Slytherin: Dynamic, Network-Assisted Prioritization of Tail Packets in Datacenter NetworksHamed Rezaei, Mojtaba MalekpourShahraki, Balajee Vamanan. 1-9 [doi]
- Workload Partitioning and Task Migration to Reduce Response Times in Heterogeneous Computing EnvironmentsDominik Schäfer, Janick Edinger, Martin Breitbach, Christian Becker. 1-11 [doi]
- Group Based Strategy to Accelerate Rendezvous in Cognitive Radio NetworksYi Ji, Juncheng Jia, Jin Wang, Jingya Zhou, Shukui Zhang. 1-9 [doi]
- A Lightweight Scheme for Rapid and Accurate WiFi Path CharacterizationLixing Song, Aaron Striegel. 1-9 [doi]
- A Survey of Blockchain: Techniques, Applications, and ChallengesWeichao Gao, William G. Hatcher, Wei Yu 0002. 1-11 [doi]
- The Research on Designs of Multiple Flow Tables in the OpenFlow ProtocolLigang Dong, Long Chen, Bohan He, Weiming Wang. 1-2 [doi]
- Crowdsensing Approach to Monitoring and Optimize Wi-Fi Networks in Adversarial EnvironmentsEliana Neuza Silva, Fernando Mira da Silva, Rui Manuel Rocha. 1-2 [doi]
- Cross-Layer Self-Similar Coflow Scheduling for Machine Learning ClustersGuang Yang, Yong Jiang, Qing Li, Xuya Jia, Mingwei Xu. 1-9 [doi]
- Failure-Inference-Based Fast Reroute with Progressive Link Metric IncrementsPhani Krishna Penumarthi, Aaron Pecora, Jason M. O'Kane, Srihari Nelakuditi. 1-7 [doi]
- Task Scheduling with Optimized Transmission Time in Collaborative Cloud-Edge LearningYutao Huang, Yifei Zhu, Xiaoyi Fan, Xiaoqiang Ma, Fangxin Wang, Jiangchuan Liu, Ziyi Wang, Yong Cui 0001. 1-9 [doi]
- Handover and Load Balancing for Distributed Network Control: Applications in ITS Message DisseminationAnuj Kaul, Li Xue, Katia Obraczka, Mateus A. S. Santos, Thierry Turletti. 1-8 [doi]
- On Scalable In-Network Operator Placement for Edge ComputingJulien Gedeon, Michael Stein, Lin Wang, Max Mühlhäuser. 1-9 [doi]
- Empirical Evaluation of SDN Controllers Using Mininet/Wireshark and Comparison with CbenchRagaharini Jawaharan, Purnima Murali Mohan, Tamal Das, Mohan Gurusamy. 1-2 [doi]
- A Safety-Security Assessment Approach for Communication-Based Train Control (CBTC) Systems Based on the Extended Fault TreeShengwei Yi, Hongwei Wang, Yangyang Ma, Feng Xie, Puhan Zhang, Liqing Di. 1-5 [doi]
- Towards Blockchain-Based Scalable and Trustworthy File SharingShujie Cui, Muhammad Rizwan Asghar, Giovanni Russello. 1-2 [doi]
- Towards a Robust and Scalable TCP Flavors Prediction Model from Passive TrafficDesta Haileselassie Hagos, Paal E. Engelstad, Anis Yazidi, Øivind Kure. 1-11 [doi]
- Diffusion Utility Increment Based Crowdsensing Data Transmission Model over City Public Traffic SystemZhenlong Peng, Jian An, Xiaolin Gui, Tianjie Wu, Jingxian Xu. 1-6 [doi]
- Preserving Access Pattern Privacy in SGX-Assisted Encrypted SearchShujie Cui, Sana Belguith, Ming Zhang, Muhammad Rizwan Asghar, Giovanni Russello. 1-9 [doi]
- Optimizing Online Task Allocation for Multi-Attribute Social SensingYang Zhang, Daniel Zhang, Nathan Vance, Dong Wang 0002. 1-9 [doi]
- Survivability Model for Security and Dependability Analysis of a Vulnerable Critical SystemXiaolin Chang, ShaoHua Lv, Ricardo J. Rodríguez, Kishor S. Trivedi. 1-6 [doi]
- A Monte Carlo Graph Search Algorithm with Ant Colony Optimization for Optimal Attack Path AnalysisHui Xie, Kun Lv, Changzhen Hu, Chong Sun. 1-8 [doi]
- A Boundless Resource Orchestrator Based on Container Technology in Edge ComputingZhenguang Yu, Jingyu Wang, Qi Qi 0001, Haifeng Sun, Jian Zou. 1-2 [doi]
- Blockchain-Based Security Layer for Identification and Isolation of Malicious Things in IoT: A Conceptual DesignMandrita Banerjee, JungHee Lee, Qian Chen, Kim-Kwang Raymond Choo. 1-6 [doi]
- Pedestrian Detection Algorithm Based on Multi-Feature CascadeJia Wen, Pengfei Liu, Chu Jia, Hongjun Wang. 1-6 [doi]
- Synthetic Forgery Attack against Continuous Keystroke Authentication SystemsYan Sun, Shambhu J. Upadhyaya. 1-7 [doi]
- Centralized versus Distributed Efficient Route Computation with Multiply-Constrained Link CostsRajesh Bajracharya, John N. Daigle. 1-9 [doi]
- Cluster-Aware Kronecker Supported Data Collection for Sensory DataSiguang Chen, ZhiHao Wang, Kewei Sha. 1-6 [doi]
- A Comparative Performance Evaluation of Wake-Up Radio-Based Data Forwarding for Green Wireless NetworksStefano Basagni, Georgia Koutsandria, Chiara Petrioli. 1-9 [doi]
- Exploring the Optimal Platform Configuration for Power-Constrained HPC WorkflowsKun Tang, Xubin He, Saurabh Gupta, Sudharshan S. Vazhkudai, Devesh Tiwari. 1-9 [doi]
- Vulnerability Mining Method Based on Genetic Algorithm and Model ConstraintJun Yang, Guojun Mei, Chen Chen. 1-7 [doi]
- User Localization Using Random Access Channel Signals in LTE Networks with Massive MIMOAleksei Fedorov, Haibo Zhang 0001, Yawen Chen. 1-9 [doi]
- New Big Data Collecting Method Based on Compressive Sensing in WSNDe-gan Zhang, Xiao-Hua Liu, Yuya Cui, Hong-tao Peng. 1-2 [doi]
- ICN-Based Light-Weighted Mobility Support in IoTDonghyeok An, Dohyung Kim. 1-2 [doi]
- FR-WARD: Fast Retransmit as a Wary but Ample Response to Distributed Denial-of-Service Attacks from the Internet of ThingsSamuel Mergendahl, Devkishen Sisodia, Jun Li, Hasan Cam. 1-9 [doi]
- Redundancy Elimination on Unidirectional Lossy LinksLeijun Huang, Hailin Feng, Ying Le, Chaofan Shen. 1-9 [doi]
- Understanding Housing Market Behaviour from a Microscopic PerspectiveJiaying Kou, Xiaoming Fu 0001, Jiahua Du, Hua Wang, Geordie Z. Zhang. 1-9 [doi]
- Quality of Service Optimization for Vehicular Edge Computing with Solar-Powered Road Side UnitsYu-Jen Ku, Po-Han Chiang, Sujit Dey. 1-10 [doi]
- Worker Recruitment Strategy for Self-Organized Mobile Social CrowdsensingEn Wang, Yongjian Yang, Jie Wu, Dongming Luan, Hengzhi Wang. 1-9 [doi]
- On the Asymptotic Performance of Delay-Constrained Slotted ALOHALei Deng, Jing Deng, Po-Ning Chen, Yunghsiang S. Han. 1-8 [doi]
- Chirp Interference Mitigation for FHSS Communication Based on Compressive SensingYongshun Zhang, Xin Jia, Weigang Zhu, Jianquan Zhao, Shuya Kong. 1-2 [doi]
- The Aftermath of Broken Links: Resilience of IoT Systems from a Networking PerspectiveSigit Aryo Pambudi, Jie Wang, Wenye Wang, Min Song, Xiaoyan Zhu. 1-9 [doi]
- Improving Integrated LTE-WiFi Network Performance with SDN Based Flow SchedulingKang Chen, Jianwei Liu, James J. Martin, Kuang-Ching Wang, Hongxin Hu. 1-9 [doi]
- A Blockchain-Based Authentication and Security Mechanism for IoTDongxing Li, Wei Peng, Wenping Deng, Fangyu Gai. 1-6 [doi]
- Wi-Count: Passing People Counting with COTS WiFi DevicesYanni Yang, Jiannong Cao, Xuefeng Liu, Xiulong Liu. 1-9 [doi]
- Coalition-Based Cooperative Routing in Cognitive Radio NetworksChowdhury Sayeed Hyder, Li Xiao 0001, Guoliang Xing. 1-9 [doi]
- Enhanced Attack Aware Security Provisioning Scheme in SDN/NFV Enabled over 5G NetworkIhsan H. Abdulqadder, Deqing Zou, Israa T. Aziz, Bin Yuan. 1-9 [doi]
- An Assured Deletion Technique for Cloud-Based IoTBryan Hall, Manimaran Govindarasu. 1-9 [doi]
- On Context-Aware DDoS Attacks Using Deep Generative NetworksGonca Gürsun, Murat Sensoy, Melih Kandemir. 1-9 [doi]
- Multi-Dimension Threat Situation Assessment Based on Network Security AttributesYang Yu, Jian Wang, Jiqiang Liu, Lei Han, Xudong He, ShaoHua Lv. 1-2 [doi]
- Achieve Efficient and Privacy-Preserving Medical Primary Diagnosis Based on kNNDan Zhu, Hui Zhu, Ximeng Liu, Hui Li, Fengwei Wang, Hao Li. 1-9 [doi]
- CloudRand: Building Heterogeneous and Moving-Target Network InterfacesSeungwon Shin, Zhaoyan Xu, Yeonkeun Kim, Guofei Gu. 1-11 [doi]
- Application, Workload, and Infrastructure Models for Virtualized Content Delivery Networks Deployed in Edge Computing EnvironmentsThang Le Duc, Per-Olov Östberg. 1-7 [doi]
- ActivityShielder: An Activity Hijacking Defense Scheme for Android DevicesFei Yan, Yijia Li, Liqiang Zhang. 1-9 [doi]
- The Classified and Active Caching Strategy for Iterative Application in SparkDejiao Niu, Bo Chen, Tao Cai, Zhipeng Chen. 1-2 [doi]
- Selecting Combined Countermeasures for Multi-Attack Paths in Intrusion Response SystemFengHua Li, Yongjun Li, Zhengkun Yang, Yunchuan Guo, Lihua Yin, Zhen Wang. 1-9 [doi]
- ReaderTrack: Reader-Book Interaction Reasoning Using RFID and SmartwatchYuFeng Deng, Dong Wang, Qian Zhang, Run Zhao, Bo Chen. 1-9 [doi]
- A Fully Digital Physical Unclonable Function Based Temperature Sensor for Secure Remote SensingYuan Cao, Yunyi Guo, Benyu Liu, Wei Ge, Min Zhu, Chip-Hong Chang. 1-8 [doi]
- An Extended Exploration to the Epidemic Containment GameJia-Hao Xu, Zhen Wang, Guanghai Cui, Yizhi Ren, Hong Ding, Kim-Kwang Raymond Choo. 1-7 [doi]
- Interest Tree Based Information Dissemination via Vehicular Named Data NetworkingXiaokun Li, Siyang Wang, Weigang Wu, Xu Chen, Bin Xiao. 1-9 [doi]
- MMCode: Enhancing Color Channels for Screen-Camera Communication with Semi-Supervised ClusteringXu Chen, Wenzhong Li, Tong Zhan, Sanglu Lu. 1-9 [doi]
- New Reliable Self-Adaptive Routing Protocol for Vehicular Ad Hoc NetworkDe-gan Zhang, Yue Dong, Jie Zhang, Ting Zhang. 1-6 [doi]
- Storage-Aware Network Stack for NVM-Assisted Key-Value StoreShiyan Chen, Dagang Li, Xiaogang Chen, Wenbing Han, Deze Zeng. 1-9 [doi]
- IoTAegis: A Scalable Framework to Secure the Internet of ThingsZhiyuan Zheng, Allen Webb, A. L. Narasimha Reddy, Riccardo Bettati. 1-9 [doi]
- A Feasible Anomaly Diagnosis Mechanism for Stateful Firewall RulesChi-Shih Chao. 1-2 [doi]
- Exploring Scalable Computing Architectures for Interactions AnalysisTaruna Seth, Chao Feng, Murali Ramanathan, Vipin Chaudhary. 1-9 [doi]
- A Pricing Based Cost-Aware Dynamic Resource Management for Cooperative Cloudlets in Edge ComputingXili Wan, Jia Yin, Xinjie Guan, Guangwei Bai, Baek-Young Choi. 1-6 [doi]
- Sensing Fruit Ripeness Using Wireless SignalsSheng Tan, Linghan Zhang, Jie Yang 0003. 1-9 [doi]
- Probabilistic Position Estimation and Model Checking for Resource-Constrained IoT DevicesToshifusa Sekizawa, Taiju Mikoshi, Masataka Nagura, Ryo Watanabe, Qian Chen. 1-7 [doi]
- INCEPT: INcremental ControllEr PlacemenT in Software Defined NetworksTamal Das, Mohan Gurusamy. 1-6 [doi]
- Hierarchical Filtering Method of Alerts Based on Multi-Source Information Correlation AnalysisXudong He, Jian Wang, Jiqiang Liu, Lei Han, Yang Yu, ShaoHua Lv. 1-6 [doi]
- HFCC: An Adaptive Congestion Control Algorithm Based on Explicit Hybrid FeedbacksXianliang Jiang, Guang Jin, Haiming Chen. 1-8 [doi]
- Cost-Effective and Eco-Friendly Green Routing Using Renewable EnergySeng Kyoun Jo, Lin Wang, Jussi Kangasharju, Max Mühlhäuser. 1-8 [doi]
- Modelling Switches with Internal Buffering in Software-Defined NetworksDeepak Singh, Bryan Ng, Yuan-Cheng Lai, Ying-Dar Lin, Winston K. G. Seah. 1-9 [doi]
- Simplifying Network Updates in SDN and NFV Networks Using GUMLei Wang, Qing Li, Yang Liu, Yong Jiang, Jianping Wu. 1-9 [doi]
- Bandwidth Preemption for High-Priority Data Transfer on Dedicated ChannelsLiudong Zuo, Chase Q. Wu, Nageswara S. V. Rao, Aiqin Hou, Chia-Han Chang. 1-8 [doi]
- Transaction-Based Flow Rule Conflict Detection and Resolution in SDNJie Cui 0004, Sheng Zhou, Hong Zhong, Yan Xu, Kewei Sha. 1-9 [doi]
- A Power-Efficient Approach to TCAM-Based Regular Expression MatchingKun Huang, Xuelin Chen. 1-9 [doi]
- Efficient Conditional Privacy-Preserving Authentication Scheme Using Revocation Messages for VANETHong Zhong 0001, Bo Huang, Jie Cui 0004, Jiang Li, Kewei Sha. 1-8 [doi]
- Estimating Short Connection Capacity on High Performance User Level Network StackJing Xie, Wenxue Cheng, Tong Zhang 0018, Danfeng Shan, Fengyuan Ren. 1-9 [doi]
- Active Probing-Based Schemes and Data Analytics for Investigating Malicious Fast-Flux Web-Cloaking Based DomainsZiji Guo, Yong Guan. 1-9 [doi]
- Novel Method of Game-Based Energy Efficient Subcarrier Allocation for IoTDe-gan Zhang, Ya-meng Tang, Xiao Huan Liu, Yu-ya Cui. 1-6 [doi]
- Analysis of Channel Access Priority Classes in LTE-LAA Spectrum Sharing SystemYao Ma. 1-7 [doi]
- Harnessing Uncertainty in Vulnerability MarketZhen Li, Qi Liao. 1-9 [doi]
- Amazon Echo Security: Machine Learning to Classify Encrypted TrafficRyan Blake Jackson, Tracy Camp. 1-10 [doi]
- Terminal Sensitive Data Protection by Adjusting Access Time Bidirectionally and AutomaticallyXiaofeng Lu, Chen Liang, Shengfei Zhang, Pietro Liò, Jing Sha. 1-6 [doi]
- Group-Query-as-a-Service for Secure Low-Latency Opportunistic RF Spectrum Access in Mobile Edge Computing Enabled Wireless NetworksAbdulhamid Adebayo, Danda B. Rawat, Lina Ni, Min Song 0002. 1-7 [doi]
- Security Threat Analysis of SDN Switch Flow TableYing Qian, Prabir Bhattacharya, Wanqing You, Kai Qian. 1-2 [doi]
- Combating Cross-Technology Interference for Robust Wireless Sensing with COTS WiFiYue Zheng, Zheng Yang 0002, Junjie Yin, Chenshu Wu, Kun Qian 0004, Fu Xiao, Yunhao Liu. 1-9 [doi]
- A Framework for Misconfiguration Diagnosis in Interconnected Multiparty SystemsMalek Athamnah, Amitangshu Pal, Krishna Kant. 1-9 [doi]
- Synchronization of Video-Embedded 3D Contents for Tiled Display SystemLongjiang Li, Shawn Xiaoli Xiong, Jianjun Yang, Yuming Mao. 1-6 [doi]
- A Stop-Wait Collaborative Charging Scheme for Mobile Wireless Rechargeable Sensor NetworksHe Li, Tian Xiao, Yihua Lan, Qinglei Qi, Quan Liu, Jinjiang Liu. 1-2 [doi]
- Evolution of Resource Sharing Cooperation Based on Reciprocity in Social NetworksGuanghai Cui, Yizhi Ren, Shengwen Tian, Ting Wu, Kim-Kwang Raymond Choo. 1-9 [doi]
- A Decentralizing Attribute-Based Signature for Healthcare BlockchainYou Sun, Rui Zhang, Xin Wang, Kaiqiang Gao, Ling Liu. 1-9 [doi]
- Probability of Coexistence of LTE-LAA and WLAN Systems Based on Delay ConstraintsYao Ma, William Young, Eric Anderson, Jason Coder. 1-9 [doi]
- Layered Compression Scheme for Efficient Data Collection of Sensory DataSiguang Chen, Shujun Zhang, Bin Xu, Jing Hu, Vijayakumar Varadarajan. 1-5 [doi]
- Multicast Rate Adaptation in WLAN via NDNFan Wu, Wang Yang, Zhenyu Fan, Kaijin Tian. 1-8 [doi]
- Machine Learning Based Flow Entry Eviction for OpenFlow SwitchesHemin Yang, George F. Riley. 1-8 [doi]
- CAFFE: Congestion-Aware Fast Failure Recovery in Software Defined NetworksZhijie Zhu, Qing Li, Shu-Tao Xia, Mingwei Xu. 1-9 [doi]
- Protecting the Privacy of Networked Multi-Agent Systems Controlled over the CloudAlimzhan Sultangazin, Suhas N. Diggavi, Paulo Tabuada. 1-7 [doi]
- HSATA: Improved SATA Protocol with HMACYatao Yang, Guangcan Cao, Ming Qu, Jierun Huang, Yuan Gao. 1-6 [doi]
- CCoLBP: Chromatic Co-Occurrence of Local Binary Pattern for Face Presentation Attack DetectionFei Peng, Le Qin, Min Long. 1-9 [doi]
- TW-FCM: An Improved Fuzzy-C-Means Algorithm for SPIT DetectionYu Zhang, Huan Wu, Jianzhong Zhang, Jingjing Wang, Xueqiang Zou. 1-9 [doi]
- Multi-Class Wheat Moisture Detection with 5GHz Wi-Fi: A Deep LSTM ApproachWeidong Yang, Xuyu Wang, Shui Cao, Hui Wang, Shiwen Mao. 1-9 [doi]
- Can Machine Learning Techniques Be Effectively Used in Real Networks against DDoS Attacks?Jarrod N. Bakker, Bryan Ng, Winston K. G. Seah. 1-6 [doi]
- Energy Management for Multi-User Mobile-Edge Computing Systems with Energy Harvesting Devices and QoS ConstraintsGuanglin Zhang, Yan Chen, Zhirong Shen, Lin Wang. 1-6 [doi]
- CoinExpress: A Fast Payment Routing Mechanism in Blockchain-Based Payment Channel NetworksRuozhou Yu, Guoliang Xue, Vishnu Teja Kilari, Dejun Yang, Jian Tang 0008. 1-9 [doi]
- Robust Component-Based Network Localization with Noisy Range MeasurementsTianyuan Sun, Yongcai Wang, Deying Li, Wenping Chen, Zhaoquan Gu. 1-9 [doi]
- Is Crowdcharging Possible?Eyuphan Bulut, Steven Hernandez, Aashish Dhungana, Boleslaw K. Szymanski. 1-9 [doi]
- Secondary Controller Mapping for Reliable Control Traffic Forwarding in SDNLim Yong Zhi, Purnima Murali Mohan, Vignesh Sridharan, Mohan Gurusamy. 1-2 [doi]
- STRAP: Secure TRansfer of Association ProtocolPhilip Lundrigan, Sneha Kumar Kasera, Neal Patwari. 1-9 [doi]
- On the RSA Problem in SLICE Networks: A Novel Relaxation and Decomposition ApproachYang Wang, Hung Nguyen, Chaoyang Li. 1-5 [doi]
- IoT Applications in Fog and Edge Computing: Where Are We and Where Are We Going?Melanie Heck, Janick Edinger, Dominik Schäfer, Christian Becker. 1-6 [doi]