Abstract is missing.
- Towards Multi-Person Gesture Recognition using Commodity Wi-FiXiaozhuang Liu, Zhenxing Niu, Wenye Wang. 1-10 [doi]
- A Novel ROS2 QoS Policy-Enabled Synchronizing Middleware for Co-Simulation of Heterogeneous Multi-Robot SystemsEmon Dey, Mikolaj Walczak, Mohammad Saeid Anwar, Nirmalya Roy, Jade Freeman, Timothy Gregory, Niranjan Suri, Carl E. Busart. 1-10 [doi]
- A Data and Model Parallelism based Distributed Deep Learning System in a Network of Edge DevicesTanmoy Sen, Haiying Shen. 1-10 [doi]
- A Secure Federated Learning Approach to Smart Microgrid Stability PredictionAbtahi Reza, Anway Bose, Li Bai. 1-7 [doi]
- A Systematic Approach for Temporal Traffic Selection Across Various ApplicationsNazia Sharmin, Jaime C. Acosta, Christopher Kiekintveld. 1-7 [doi]
- Characterizing the 2022- Russo-Ukrainian Conflict Through the Lenses of Aspect-Based Sentiment Analysis: Dataset, Methodology, and Key FindingsMaurantonio Caprolu, Alireza Sadighian, Roberto Di Pietro. 1-10 [doi]
- mmLock: User Leaving Detection Against Data Theft via High-Quality mmWave Radar ImagingJiawei Xu, Ziqian Bi, Amit Singha, Tao Li, Yimin Chen 0004, Yanchao Zhang. 1-10 [doi]
- DNS++: Dynamic Name Resolution with Homomorphic Encryption Based PrivacyFrancesco Tusa, David Griffin 0001, Miguel Rio. 1-7 [doi]
- A Quinary Coding and Matrix Structure-Based Channel Hopping Algorithm for Blind Rendezvous in Cognitive Radio NetworksQinglin Liu, Zhiyong Lin, Zong-Heng Wei, Jianfeng Wen, Congming Yi, Hai Liu 0001. 1-10 [doi]
- Two-Step Feature Selection Technique for Secure and Lightweight Internet of ThingsSo-Eun Jeon, Ye-Sol Oh, Ye-Seul Kil, Yeonji Lee, Il-Gu Lee. 1-6 [doi]
- A Deep Learning Approach for ECG Authentication on Implantable Medical DevicesMustafa Mahjeed, Geetha Thamilarasu, Nicole Johnson, Christian Alfonso. 1-7 [doi]
- Autonomous Network Assurance in Intent Based Networking: Vision and ChallengesAris Leivadeas, Matthias Falkner. 1-10 [doi]
- Quantum Assisted Scheduling Algorithm for Federated Learning in Distributed NetworksXinliang Wei, Lei Fan, Yuanxiong Guo, Yanmin Gong 0001, Zhu Han 0001, Yu Wang 0003. 1-10 [doi]
- Cost-Effective Offloading Strategies for UAV Contingency Planning in Smart CitiesChing-Chi Lin, Bruno Chianca, Leonard David Bereholschi, Jian-Jia Chen, Guthemberg Silvestre. 1-7 [doi]
- Protection of Network Security Selector Secrecy in Outsourced Network TestingSultan Alasmari, Weichao Wang, Aidong Lu, Yu Wang. 1-10 [doi]
- An Efficient and Fair Wireless Resource Allocation Scheme for LTE and Wi-Fi over Unlicensed BandsRamin Yarinezhad, Eylem Ekici. 1-10 [doi]
- Social Equality-Aware Resource Allocation for Post-Disaster Communication RestorationJianqing Liu, Shangjia Dong, Thomas Morris, Yuguang Fang. 1-10 [doi]
- Improving Fairness of NDN Congestion Control from Resource Pooling PerspectiveKai Sakamoto, Yusaku Hayamizu, Miki Yamamoto. 1-2 [doi]
- Deep Learning-based Transceiver with One-bit ADC Over Fading ChannelMetasebia D. Gemeda, Min S. Han, Ameha T. Abebe, Chung Gu Kang. 1-6 [doi]
- Towards Adversarial-Resilient Deep Neural Networks for False Data Injection Attack Detection in Power GridsJiangnan Li, Yingyuan Yang, Jinyuan Stella Sun, Kevin Tomsovic, Hairong Qi 0001. 1-10 [doi]
- PAROS: The Missing "Puzzle" in Smart Home Router Operating SystemsKeyang Yu, Dong Chen. 1-10 [doi]
- Improving Machine Learning Robustness via Adversarial TrainingLong Dang, Thushari Hapuarachchi, Kaiqi Xiong, Jing Lin. 1-10 [doi]
- On the Harmful Effects of Active Network ProbingAlamin Mohammed, Theo Karagioules, Emir Halepovic, Shangyue Zhu, Aaron Striegel. 1-8 [doi]
- Addressing Concept Drift of Dynamic Traffic Environments through Rapid and Self-Adaptive Bandwidth AllocationLihua Ruan, Elaine Wong 0001. 1-7 [doi]
- Underprovisioned GPUs: On Sufficient Capacity for Real-Time Mission-Critical PerceptionYigong Hu, Ila Gokarn, Shengzhong Liu, Archan Misra, Tarek F. Abdelzaher. 1-10 [doi]
- TwinSync: A Digital Twin Synchronization Protocol for Bandwidth-Limited IoT ApplicationsDeepti Kalasapura, Jinyang Li 0004, Shengzhong Liu, Yizhuo Chen, Ruijie Wang 0004, Tarek F. Abdelzaher, Matthew Caesar 0001, Joydeep Bhattacharyya, Jae Kim, Guijun Wang, Greg Kimberly, Josh D. Eckhardt, Denis Osipychev. 1 [doi]
- Study on Remote Identification and Integrated Information Management Technology for Unmanned Aerial VehiclesSuna Choi, Kyu-Min Kang. 1-2 [doi]
- ImCT: A Feasible Scheme for Deploying Implicit Certificates with Certificate Transparency in IoTHuiqing Wan, Qiongxiao Wang, Yajun Teng, Cunqing Ma, Jingqiang Lin, Mingyu Wang. 1-10 [doi]
- Multigraph-Based Routing in Delay Tolerant Networks: An Alternative to Contact Graph RoutingAlan Hylton, Michael Moy, Robert Kassouf-Short, Jacob Cleveland. 1-7 [doi]
- Data-Driven Next-Generation Wireless Networking: Embracing AI for Performance and SecurityJiahao Xue, Zhe Qu, Shangqing Zhao, Yao Liu 0007, Zhuo Lu. 1-10 [doi]
- One-class Classification Using Autoencoder Feature Residuals for Improved IoT Network Intrusion DetectionBrian Lewandowski, Randy C. Paffenroth. 1-7 [doi]
- Hyron: A New Approach for Automating the Network ACL Delivery PipelineJacob Neil Taylor, Ngoc T. Le, Joonsang Baek, Willy Susilo. 1-10 [doi]
- Message from the Workshop General ChairKewei Sha. 1-2 [doi]
- Are We All in a Truman Show? Spotting Instagram Crowdturfing through Self-TrainingPier Paolo Tricomi, Sousan Tarahomi, Christian Cattai, Francesco Martini, Mauro Conti. 1-10 [doi]
- IoT Sentinel: Correlation-based Attack Detection, Localization, and Authentication in IoT NetworksDianshi Yang, Abhinav Kumar, Stuart Ray, Wei Wang, Reza Tourani. 1-10 [doi]
- Inferring Sensitive User Information Through Biosignals Using Deep LearningArun Sarma, Geethapriya Thamilarasu. 1-2 [doi]
- Explainable AI-Based Intrusion Detection Systems for Cloud and IoTMaria Camila Gaitan-Cardenas, Mahmoud Abdelsalam, Kaushik Roy. 1-7 [doi]
- An Accurate Graph Generative Model with Tunable FeaturesTakahiro Yokoyama, Yoshiki Sato, Sho Tsugawa, Kohei Watabe. 1-2 [doi]
- Predictable Internet Clients and In-Switch Deep Packet InspectionSahil Gupta, Devashish Gosain, Minseok Kwon, Hrishikesh B. Acharya. 1-10 [doi]
- Location Inference under Temporal CorrelationYukun Dong, Yidan Hu, Aisha Aseeri, Depeng Li 0002, Rui Zhang 0007. 1-10 [doi]
- SkABNet: A Data Structure for Efficient Discovery of Streaming Data for IoTPhilipp Kisters, Heiko Bornholdt, Janick Edinger. 1-10 [doi]
- Reliability-Oriented Designs in UAV-assisted NOMA Transmission with Finite Blocklength Codes and Content CachingYang Yang, Mustafa Cenk Gursoy. 1-8 [doi]
- An Improved Fire and Smoke Detection Method Based on YOLOv7Jie Lian, Xinyu Pan, Jin Guo. 1-7 [doi]
- Availability Model of a 5G-MEC SystemThilina Pathirana, Gianfranco Nencioni. 1-10 [doi]
- Delay Fairness in 5G Networks with SD-RANFidan Mehmeti, Wolfgang Kellerer. 1-10 [doi]
- Camera-based Vehicle-to-Vehicle Visible Light Communication - A Software-Only Solution for Vehicle ManufacturersMichael Plattner, Gerald Ostermayer. 1-7 [doi]
- Residual Attention Assisted Calibrated Beam Training for mmWave Communication SystemsJihyung Kim 0001, Soyoung Yoo, Junghyun Kim. 1-2 [doi]
- Understanding the Security and Performance of the Web Presence of Hospitals: A Measurement StudyMohammed Alkinoon, Abdulrahman Alabduljabbar, Hattan Althebeiti, RhongHo Jang, DaeHun Nyang, David Mohaisen. 1-10 [doi]
- Stealthy Backdoor Attack on RF Signal ClassificationTianming Zhao 0001, Zijie Tang, Tianfang Zhang, Huy Phan, Yan Wang 0003, Cong Shi 0004, Bo Yuan 0001, Yingying Chen 0001. 1-10 [doi]
- Building Identification Using Smartphone Sensors and a MapJihoon Lee, Kyungmin Go, Myungchul Kim 0001. 1-7 [doi]
- Hardware Controller and Simulator for $log_{2}N$ Switching FabricsMarek Michalski. 1-2 [doi]
- Per-Flow Packet Loss Measurement without ProbingShakir Mahmood, Muhammad Shahzad 0001. 1-10 [doi]
- PLCD: Policy Learning for Capped Service Mobility DowntimeMwasinga Lusungu Josh, Syed M. Raza, Duc Tai Le, Moonseong Kim, Hyunseung Choo. 1-7 [doi]
- Persival: Using Delayed Remote Updates in a Distributed Mobile SimulationJohannes Kässinger, David Rosin, Frank Dürr, Benedikt Mehler, Thomas Hubatscheck, Kurt Rothermel. 1-10 [doi]
- Depicting Instant Messaging Encrypted Traffic Characteristics through an Empirical StudyZolboo Erdenebaatar, Riyad Alshammari, Biswajit Nandy, Nabil Seddigh, Marwa Elsayed, Nur Zincir-Heywood. 1-10 [doi]
- Value Trees: Multi-Hop and Asynchronous Economic Transactions in Distributed SystemsPuming Fang, Tilman Wolf. 1-10 [doi]
- Iterative Resolution with IPv6 Packets FailingMomoka Yamamoto, Jin Nakazato, Manabu Tsukada, Hiroshi Esaki. 1-2 [doi]
- INSPIRE: Instance-Level Privacy-Pre Serving Transformation for Vehicular Camera VideosZhouyu Li, Ruozhou Yu, Anupam Das 0001, Shaohu Zhang, Huayue Gu, Xiaojian Wang, Fangtong Zhou, Aafaq Sabir, Dilawer Ahmed, Ahsan Zafar. 1-10 [doi]
- Analysis of Evil Twin, Deauthentication, and Disassociation Attacks on Wi-Fi CamerasZachary P. Neal, Kewei Sha. 1-7 [doi]
- Traffic-Aware In-Network Aggregation Placement for Multi-Tenant Distributed Machine LearningHeewon Kim, Hochan Lee, Sangheon Pack. 1-9 [doi]
- Location Verification of Crowd-Sourced SensorsChristopher Kitras, Carter Pollan, Kyle Myers, Camille Wirthlin Tischner, Philip Lundrigan. 1-7 [doi]
- Cost-Effective Joint Establishment of Fronthaul and Virtual Base Stations in a Stochastic C-RANYunyi Wu, Yongbing Zhang. 1-7 [doi]
- Environmentally-Aware Robotic Vehicle Networks Routing Computation for Last-mile DeliveriesChengyi Qu, Rounak Singh, Sharan Srinivas, Prasad Calyam. 1-10 [doi]
- DeepHealth: Geospatial and ML-Based Approach to Identify Health Disparities and Determinants for Improving Pandemic Health CareJinwei Liu, Rui Gong, Long Cheng 0003, Richard A. Aló. 1-10 [doi]
- aDBF: an autonomous electromagnetic noise filtering mechanism for industrial environmentsAngel C. Herrero, Julio A. Sanguesa, Francisco J. Martinez, Piedad Garrido, Carlos T. Calafate. 1-7 [doi]
- CPS: A Multipath Scheduling Algorithm for Low-Latency Applications in 5G Edge NetworksBaosen Zhao, Wanghong Yang, Wenji Du, Yongmao Ren, Jianan Sun, Xu Zhou. 1-10 [doi]
- LiteCast: Flexible Scalable and Uniform Local Data-Sharing in Real-TimeJagnyashini Debadarshini, Sudipta Saha. 1-10 [doi]
- Beam Profiling and Beamforming Modeling for mmWave NextG NetworksEfat Samir Fathalla, Sahar Zargarzadeh, Chunsheng Xin, Hongyi Wu, Peng Jiang, Joao F. Santos, Jacek Kibilda, Aloizio Pereira da Silva. 1-10 [doi]
- ESDI: Entanglement Scheduling and Distribution in the Quantum InternetHuayue Gu, Ruozhou Yu, Zhouyu Li, Xiaojian Wang, Fangtong Zhou. 1-10 [doi]
- A Gateway Proxy with ECN Buffer Control for Inter-Datacenter Congestion ControlKeita Aoki, Miki Yamamoto. 1-2 [doi]
- Ransomware Classification Using Machine LearningNahid Ebrahimi Majd, Torsha Mazumdar. 1-7 [doi]
- Experimental Analysis of Phase Error in Centralized and Distributed SDR SystemsMahmoud Badi, Dinesh Rajan, Joseph Camp. 1-7 [doi]
- Message from the General ChairKrishna Kant 0001. 1-2 [doi]
- Early Marking for Controllable Maximum Queue Length in Data Center NetworksWentao Wang, Jiangping Han, Rui Zhuang, Kaiping Xue, Qibin Sun, Jun Lu. 1-10 [doi]
- EA-Market: Empowering Real-Time Big Data Applications with Short-Term Edge SLA LeasesRuozhou Yu, Huayue Gu, Xiaojian Wang, Fangtong Zhou, Guoliang Xue, Dejun Yang. 1-10 [doi]
- How Can Equitable Peering be Achieved Between ISPs and Content Providers?Ali Nikkhah, Scott Jordan. 1-10 [doi]
- Towards Trajectory Prediction-Based UAV Deployment in Smart Transportation SystemsFan Liang, Xing Liu, Nuri Alperen Kose, Kubra Gundogan, Wei Yu. 1-9 [doi]
- Outdoor Millimeter-Wave Picocell Placement using Drone-based Surveying and Machine LearningIan C. McDowell, Rahul Bulusu, Hem Regmi, Sanjib Sur. 1-10 [doi]
- PLR: An In-Network Proactive Loss Recovery Scheme for Named Data NetworkingYuxin Chen, Jiayu Yang, Xuanbo Huang, Jiangping Han, Bobo Wang, Jian Li 0031, Kaiping Xue. 1-10 [doi]
- Automatic Synthesis of Network Security Services: A First StepLei Xu 0024, Yangyong Zhang, Phakpoom Chinprutthiwong, Guofei Gu. 1-10 [doi]
- SecureGAN: Secure Three-Party GAN TrainingSijia Cao, Hanlin Zhang, Yuhang Wang, Jie Lin, Fanyu Kong, Leyun Yu. 1-7 [doi]
- FProbe: The Flow-Centric Detection and a Large-Scale Measurement of Browser FingerprintingRui Zhao. 1-10 [doi]
- Evaluating the Joint Use of Alternate Internet Delivery Models in Deterministic Rural NetworksEsther Max-Onakpoya, Corey Baker. 1-10 [doi]
- Intelligent Security Aware Routing: Using Model-Free Reinforcement LearningAnand Mudgerikar, Elisa Bertino. 1-10 [doi]
- A Self-Distributing System Framework for the Computing ContinuumRoberto Rodrigues Filho, Renato S. Dias, João Seródio, Barry Porter, Fábio M. Costa, Edson Borin, Luiz F. Bittencourt. 1-10 [doi]
- Secure and Cost Effective IoT Authentication and Data Storage Framework using Blockchain NFTNahid Ebrahimi Majd, Mike Sharko. 1-7 [doi]
- VTBC: Privatizing the Volume and Timing of Transactions for Blockchain ApplicationsTrevor Miller, Bobby Alvarez, Thang Hoang. 1-10 [doi]
- $\mathrm{P}^{3}$: A Privacy-Preserving Perception Framework for Building Vehicle-Edge Perception Networks Protecting Data PrivacyTianyu Bai, Danyang Shao, Ying He, Song Fu, Qing Yang 0003. 1-10 [doi]
- E-App: Adaptive mmWave Access Point Planning with Environmental Awareness in Wireless LANsYuchen Liu, Mingzhe Chen, Dongkuan Xu, Zhaohui Yang, Shangqing Zhao. 1-10 [doi]
- Improved Conflict-Based Search for the Virtual Network Embedding ProblemYi Zheng, Srivatsan Ravi, Erik Kline, Lincoln Thurlow, Sven Koenig, T. K. Satish Kumar. 1-10 [doi]
- Spam SMS Classification Using Machine LearningNahid Ebrahimi Majd, Mandar Shivaji Hanchate. 1-7 [doi]
- Moving Target Defense for Service-Oriented Mission-Critical NetworksDoganalp Ergenc, Florian Schneider, Peter Kling, Mathias Fischer 0001. 1-10 [doi]
- Machine Learning Based Intelligent Routing for VDTNsShiyi Liu, Haiying Shen, Brian L. Smith, Volker Fessmann. 1-10 [doi]