Abstract is missing.
- Security of Machine Learning-Based Anomaly Detection in Cyber Physical SystemsZahra Jadidi, Shantanu Pal, Nithesh Nayak K, Arawinkumaar Selvakkumar, Chih-Chia Chang, Maedeh Beheshti, Alireza Jolfaei. 1-7 [doi]
- A Defense-Attack Game under Multiple Preferences and Budget Constraints with EquilibriumNadia Niknami, Abdalaziz Sawwan, Jie Wu 0001. 1-10 [doi]
- Graph Representation of Computer Network Resources for Precise AllocationsStuart Baxley, Deniz Gurkan, Hamidreza Validi, Illya V. Hicks. 1-10 [doi]
- Evolved IoT Malware Detection using Opcode Category Sequence through Machine LearningSungHyun Moon, Youngho Kim, Hyunjong Lee, Donghoon Kim, Doosung Hwang. 1-7 [doi]
- DLT-based Data Mules for Smart TerritoriesMirko Zichichi, Luca Serena, Stefano Ferretti, Gabriele D'Angelo. 1-7 [doi]
- A Pseudo-Bayesian Subframe based Framework for Grant-Free Massive Random Access in 5G NR NetworksThilina N. Weerasinghe, Vicente Casares Giner, Indika A. M. Balapuwaduge, Frank Y. Li, Marius-Constantin Vochin. 1-7 [doi]
- LUSketch: A Fast and Precise Sketch for top-k Finding in Data StreamsJie Lu, Hongchang Chen, Zhen Zhang. 1-10 [doi]
- ADIperf: A Framework for Application-driven IoT Network Performance EvaluationSamir Si-Mohammed, Thomas Begin, Isabelle Guérin Lassous, Pascale Vicat-Blanc. 1-8 [doi]
- Engage: Session Guarantees for the EdgeMiguel Belém, Pedro Fouto, Taras Lykhenko, João Leitão 0001, Nuno M. Preguiça, Luis Rodrigues. 1-10 [doi]
- Differentially Private Distributed Multi-Task Relationship LearningKaizhong Jin, Xiang Cheng, Yuchao Ma. 1-10 [doi]
- Towards Connecting the Disconnected InternetJim Martin 0001, Manveen Kaur, Long Cheng, Abolfazi Razi. 1-7 [doi]
- Peer-to-Peer Communication Trade-Offs for Smart Grid ApplicationsPurboday Ghosh, Shashank Shekhar 0001, Yashen Lin, Ulrich Münz, Gabor Karsai. 1-10 [doi]
- Predictive Cyber Defense Remediation against Advanced Persistent Threat in Cyber-Physical SystemsKamrul Hasan, Sachin Shetty, Tariqul Islam, Imtiaz Ahmed. 1-10 [doi]
- Discovery of Rare yet Co-occurring Actions with Temporal Characteristics in Episodic Cyberattack StreamsGordon Werner, Shanchieh Yang. 1-10 [doi]
- Using RSSI to Form Path in an Indoor SpaceMuztaba Fuad, Debzani Deb, Brixx-John G. Panlaqui, Charles F. Mickle. 1-2 [doi]
- Intelligent Reflecting Surface-Aided Centralized Scheduling for mmWave V2V NetworksSheng Pan, Xin Ming Zhang 0001, Dan Keun Sung. 1-10 [doi]
- VeriBlock: A Blockchain-Based Verifiable Trust Management Architecture with Provable InteractionsShantanu Pal, Ambrose Hill, Tahiry M. Rabehaja, Michael Hitchens. 1-7 [doi]
- FLOR: A Federated Learning-based Music Recommendation EngineJasper Sha, Nathaniel Basara, Joseph Freedman, Hailu Xu. 1-2 [doi]
- Exact Algorithms for Finding Fixed-Length Cycles in Edge-Weighted GraphsRhyd Lewis, Fiona Carroll. 1-2 [doi]
- On the Applicability of Payment Channel Networks for Allocation of Transport Ticket RevenuesMatthias Grundmann, Otto von Zastrow-Marcks, Hannes Hartenstein. 1-7 [doi]
- Towards Deterministic Fault-Tolerant Service Function Slicing in Edge NetworksDanyang Zheng, Chengzong Peng, Ben Wang, Xiaojun Cao. 1-8 [doi]
- An Energy-Efficient Load Balancing Scheme in Heterogeneous Clusters by Linear ProgrammingYujian Zhang, Mingde Li, Fei Tong. 1-10 [doi]
- Radio Resource Selection in C-V2X Mode 4: A Multiagent Deep Reinforcement Learning ApproachWeixiang Chen, Bo Gu, Xiaojun Tan, Chenhua Wei. 1-8 [doi]
- Elements of Architecture of Simulator Realized on NetFPGA10G CardMarek Michalski. 1-2 [doi]
- SCORING: Towards Smart Collaborative cOmputing, caching and netwoRking paradIgm for Next Generation communication infrastructuresZakaria Ait Hmitti, Hamza Ben Ammar, Ece Gelal Soyak, Youcef Kardjadja, Sepideh Malektaji, Soukaina Ouledsidi Ali, Marsa Rayani, Muhammad Saqib, Seyedreza Taghizadeh, Wessam Ajib, Halima Elbiaze, Ozgur Ercetin, Yacine Ghamri-Doudane, Roch Glitho. 1-10 [doi]
- LiTIV: A Lightweight Traceable Data Integrity Verification Scheme for Version Control SystemsXin Xu, Wei Wang 0314, Jingqiang Lin, Zhen Yang, Haoling Fan, Qiongxiao Wang. 1-10 [doi]
- IoBT-OS: Optimizing the Sensing-to-Decision Loop for the Internet of Battlefield ThingsDongxin Liu, Tarek F. Abdelzaher, Tianshi Wang, Yigong Hu, Jinyang Li, Shengzhong Liu, Matthew Caesar, Deepti Kalasapura, Joydeep Bhattacharyya, Nassy Srour, Jae Kim, Guijun Wang, Greg Kimberly, Shouchao Yao. 1-10 [doi]
- Real-time Application Identification of RTC Media Streams via Encrypted Traffic AnalysisHua Wu 0004, Chengfei Zhu, Guang Cheng 0001, Xiaoyan Hu. 1-10 [doi]
- Towards Production Deployment of a SDX Control FrameworkMert Cevik, Michael J. Stealey, Cong Wang 0014, Jeronimo Bezerra, Julio Ibarra, Vasilka Chergarova, Heidi Morgan, Yufeng Xin. 1-10 [doi]
- Security and Threats of Intelligent Reflecting Surface Assisted Wireless CommunicationsHaolin Tang, Salih Sarp, Yanxiao Zhao, Wei Wang, Chunsheng Xin. 1-9 [doi]
- Conference Information: Message from the Program Co-ChairsRajkumar Buyya, Krishna Kant 0001, Ting He 0001. 1-2 [doi]
- DGGCN: Dictionary based DGA detection method based on DomainGraph and GCNHaoran Jiao, Qing Wang, Zhaoshan Fan, Junrong Liu, Dan Du, Ning Li, Yuling Liu. 1-10 [doi]
- Multi-Controller Load Balancing Mechanism Based on Improved Genetic AlgorithmAixin Xu, Shimin Sun, Ze Wang, Xiaofan Wang, Li Han. 1-8 [doi]
- Interfacing Intelligent Personal Assistant to SDI/O with one clickGiuseppe Tricomi, Luca D'Agati, Zakaria Benomar, Francesco Longo 0001, Giovanni Merlino, Antonio Puliafito. 1-8 [doi]
- Towards Optimal Tradeoff Between Data Freshness and Update Cost in Information-update SystemsZhongdong Liu, Bin Li 0014, Zizhan Zheng, Y. Thomas Hou, Bo Ji 0001. 1-10 [doi]
- mmFit: Low-Effort Personalized Fitness Monitoring Using Millimeter WaveYucheng Xie, Ruizhe Jiang, Xiaonan Guo, Yan Wang 0003, Jerry Cheng, Yingying Chen 0001. 1-10 [doi]
- Distributed Ledgers for Enhanced Machine-to-Machine Trust in Smart CitiesCameron Hickert, Ali Tekeoglu, Joseph Maurio, Ryan Watson, Daniel Syed, Jeffrey Chavis, Gill Brown, Tamim Sookoor. 1-7 [doi]
- An Asynchronous Multi-Beam MAC Protocol for Multi-Hop Wireless NetworksShivam Garg, Nandini Venkatraman, Elizabeth Serena Bentley, Sunil Kumar 0001. 1-9 [doi]
- Inferring User Activities from IoT Device Events in Smart Homes: Challenges and OpportunitiesXuanli Lin, Yinxin Wan, Kuai Xu, Feng Wang 0002, Guoliang Xue. 1-10 [doi]
- Tracing Tor Hidden Service Through Protocol CharacteristicsYi Qin, Tianming Zheng, Yue Wu 0010, Futai Zou. 1-9 [doi]
- ORSM: Online Routing and Scheduling Mechanism for Mix-flows in Data Center NetworksZhewei Tang, Tong Zhang 0018, Kun Zhu. 1-10 [doi]
- Achieving High End-to-End Availability in VNF NetworksEnrique Rodicio, Deng Pan, Jason Liu, Bin Tang. 1-10 [doi]
- Using Markov Chain Monte Carlo Algorithm for Sampling Imbalance Binary IDS DatasetsNajmeh Abedzadeh, Matthew Jacobs. 1-7 [doi]
- A Democratically Anonymous and Trusted Architecture for CTI Sharing using BlockchainKealan Dunnett, Shantanu Pal, Zahra Jadidi, Guntur Dharma Putra, Raja Jurdak. 1-7 [doi]
- Automating Operator Oversight in an Autonomous, Regulated, Safety-Critical Research FacilityTripti Samal, Rudra Dutta, Ismail Güvenç, Mihail L. Sichitiu, Brian A. Floyd, Thomas Zajkowski. 1-10 [doi]
- Socially-aware Collaborative Defense System against Bit-Flip Attack in Social Internet of Things and Its Online Assignment OptimizationLi-Hsing Yang, Shin-Shan Huang, Tsai-Ling Cheng, Yi-Ching Kuo, Jian-Jhih Kuo. 1-10 [doi]
- PPAS: Privacy-preserving Resource Discovery for Multi-domain SFC orchestrationNeha Joshi, Rishabh Kumar, Abhishek Thakur, A. Antony Franklin, N. V. Narendra Kumar. 1-7 [doi]
- Internet Security Aesthetics: Can internet transparency afford social trust?Fiona Carroll, Rhyd Lewis. 1-2 [doi]
- FITIC: A Few-shot Learning Based IoT Traffic Classification MethodWenxu Jia, Yipeng Wang 0001, Yingxu Lai, Huijie He, Ruiping Yin. 1-10 [doi]
- Scalable Resource Allocation Techniques for Edge Computing SystemsCaroline Rublein, Fidan Mehmeti, Taha D. Gunes, Sebastian Stein 0001, Thomas F. La Porta. 1-10 [doi]
- Evaluating Feature Robustness for Windows Malware Family ClassificationAdam Duby, Teryl Taylor, Gedare Bloom, Yanyan Zhuang. 1-10 [doi]
- Introducing Data Processing Units (DPU) at the Edge [Invited]Luca Barsellotti, Faris Alhamed, Juan Jose Vegas Olmos, Francesco Paolucci, Piero Castoldi, Filippo Cugini. 1-6 [doi]
- A QoS Guarantee Mechanism for Service Function Chains in NFV-enabled NetworksYi Yue, Wencong Yang, Xuebei Zhang, Rong Huang, Xiongyan Tang. 1-2 [doi]
- Mobility-aware Software-Defined Service-Centric NetworkingDiego O. Rodrigues, Torsten Braun, Guilherme Maia, Leandro Villas. 1-10 [doi]
- Performance Evaluation of Low-Latency Live Streaming of MPEG-DASH UHD video over Commercial 5G NSA/SA NetworkKasidis Arunruangsirilert, Bo Wei, Hang Song, Jiro Katto. 1-6 [doi]
- Efficient Indoor Localization with Multiple Consecutive Geomagnetic SequencesHui Zhuang, Tao He, Qun Niu, Ning Liu. 1-9 [doi]
- A Secure Dynamic Edge Resource Federation Architecture for Cross-Domain IoT SystemsRonghua Xu, Yu Chen 0002, Xiaohua Li, Erik Blasch. 1-7 [doi]
- Optimization of Wireless Power Transfer for Wireless-Powered Mobile Edge ComputingXiaogang Dong, Zheng Wan, Changshou Deng. 1-7 [doi]
- A Federated Learning Framework for Automated Decision Making with Microscopic Traffic SimulationKhandaker Mamun Ahmed, Samuel Muvdi, Jason Liu, M. Hadi Amini. 1-9 [doi]
- 3: Renewal-Reward Process-Based Password Protection in Internet of ThingsThomas Neumann, Kyle Welsh, Caden Perez, Kewei Sha, Yalong Wu. 1-7 [doi]
- Automatic Field Extraction of Extended TLV for Binary Protocol Reverse EngineeringZewen Huang, Kui Wu, Shengqiang Huang, Yang Zhou, Ronnie Salvador Giagone. 1-10 [doi]
- Worker Selection for On-Demand CrowdsourcingTianxiang Tan, Yibo Wu, Zida Liu, Guohong Cao. 1-10 [doi]
- Energy-Efficient Data Transfer Optimization via Decision-Tree Based Uncertainty ReductionHasibul Jamil, Lavone Rodolph, Jacob Goldverg, Tevfik Kosar. 1-10 [doi]
- Context-aware task offloading with QoS-provisioning for MEC multi-RAT vehicular networksLucas Bréhon-Grataloup, Rahim Kacimi, André-Luc Beylot. 1-9 [doi]
- Energy-Aware Multi-Agent Reinforcement Learning for Collaborative Execution in Mission-Oriented Drone NetworksYing Li, Changling Li, Jiyao Chen, Christine Roinou. 1-9 [doi]
- Neural Networks for DDoS Attack Detection using an Enhanced Urban IoT DatasetArvin Hekmati, Eugenio Grippo, Bhaskar Krishnamachari. 1-8 [doi]
- Server Workload Assignment for Real-Time Range Queries in Adaptive Quad Streaming Sensor EnvironmentsSimon Keller, Rainer Mueller. 1-10 [doi]
- Data-driven efficient digital signal processing over a field trial space-division multiplexed fiber-optic transmissionLuis Felipe Florenzan Reyes, Francesco Smarra, Roland Ryf, Tetsuya Hayashi, Andrea Marotta, Cristian Antonelli, Alessandro D'Innocenzo. 1-8 [doi]
- Localizing Campus Shuttles from One Single Base Station Using LoRa Link CharacteristicsJunyang Shi, Mo Sha 0001. 1-10 [doi]
- Intelligent Fuzzing Algorithm for 5G NAS Protocol Based on Predefined RulesFengjiao He, Wenchuan Yang, Baojiang Cui, Jia Cui. 1-7 [doi]
- Exon: An Oblivious Exactly-Once Messaging ProtocolZiad Kassam, Paulo Sérgio Almeida, Ali Shoker. 1-10 [doi]
- Design and Implementation of a Strong Representation System for Network PoliciesFangping Lan, Sanchari Biswas, Bin Gui, Jie Wu 0001, Anduo Wang. 1-10 [doi]
- A Computing Power Resource Modeling Approach for Computing Power NetworkJiacong Li, Hang Lv 0006, Bo Lei, Yunpeng Xie. 1-2 [doi]
- An ICN-based Secure Task Cooperation Scheme in Challenging Wireless Edge NetworksNingchun Liu, Shuai Gao, Teng Liang, Xindi Hou, Sajal K. Das 0001. 1-7 [doi]
- A Distributed & Lightweight Framework to Secure IoT Networks Against Network Layer AttacksPrasesh Adina, Muhammad Shahzad. 1-9 [doi]
- Deep Reinforcement Learning Based Computation Offloading in SWIPT-assisted MEC NetworksChangwei Wan, Songtao Guo, Yuanyuan Yang 0001. 1-10 [doi]
- Multi-Armed Bandits Based Task Selection of A Mobile Crowdsensing WorkerQinghua Sima, Guoju Gao, He Huang 0001, Yu-e Sun, Yang Du 0006, Xiaoyu Wang, Jie Wu 0001. 1-10 [doi]