Abstract is missing.
- Privacy-Preserving Group Closeness MaximizationZihao Zhao, Sijia Cao, Hanlin Zhang, Jie Lin, Fanyu Kong, Leyun Yu. 1-6 [doi]
- Explainability-Informed Targeted Malware MisclassificationQuincy Card, Kshitiz Aryal, Maanak Gupta. 1-8 [doi]
- Acies-OS: A Content-Centric Platform for Edge AI Twinning and OrchestrationJinyang Li 0004, Yizhuo Chen, Tomoyoshi Kimura, Tianshi Wang, Ruijie Wang 0004, Denizhan Kara, Yigong Hu, Li Wu, Walid A. Hanafy, Abel Souza, Prashant J. Shenoy, Maggie B. Wigness, Joydeep Bhattacharyya, Jae Kim, Guijun Wang, Greg Kimberly, Josh D. Eckhardt, Denis Osipychev, Tarek F. Abdelzaher. 1-9 [doi]
- Towards Optimal Load Balancing in Multi-Zone Kubernetes Clusters via Reinforcement LearningJosé Santos 0001, Tim Wauters, Filip De Turck, Peter Steenkiste. 1-9 [doi]
- Decentralized Multi-agent Reinforcement Learning for Large-scale Mobile Wireless Sensor Network Control Using Mean Field GamesZejian Zhou, Lijun Qian, Hao Xu. 1-6 [doi]
- Large Language Model-Guided Disentangled Belief Representation Learning on Polarized Social GraphsJinning Li, Ruipeng Han, Chenkai Sun, Dachun Sun, Ruijie Wang 0004, Jingying Zeng, Yuchen Yan, Hanghang Tong, Tarek F. Abdelzaher. 1-9 [doi]
- Exploring Similarity-Based Graph Compression for Efficient Network Analysis and EmbeddingHamdi Selim Akin, Mehmet Emin Aktas, Muhammed Ifte Islam, Tanvir Hossain, Esra Akbas. 1-6 [doi]
- Cloudy Forecast: How Predictable is Communication Latency in the Cloud?Owen Hilyard, Bocheng Cui, Marielle Webster, Abishek Bangalore Muralikrishna, Aleksey Charapko. 1-9 [doi]
- On the Potential of an Independent Avatar to Augment Metaverse Social NetworksTheofanis P. Raptis, Chiara Boldrini, Marco Conti, Andrea Passarella. 1-9 [doi]
- QATFP-YOLO: Optimizing Object Detection on Non-GPU Devices with YOLO Using Quantization-Aware Training and Filter PruningGift Idama, Yifan Guo, Wei Yu. 1-6 [doi]
- Beyond Traditional Methods: Deep Learning with Data Augmentation for Robust Access ControlMustafa Al-Lail, Daniela Pinto, Luis Alvarez Almanza, Francisco Salazar, Carolina Rizzi. 1-6 [doi]
- Enabling Reliable Environmental Sensing with LoRa, Energy Harvesting, and Domain AdaptationAitian Ma, Jean C. Tonday Rodriguez, Mo Sha 0001. 1-9 [doi]
- DeePref: Deep Reinforcement Learning For Video Prefetching In Content Delivery NetworksNawras Alkassab, Chin-Tser Huang, Tania Lorido-Botran. 1-6 [doi]
- Secure and Efficient Entanglement Distribution Protocols for Near-Term Quantum InternetNicholas Skjellum, Mohamed Shaban, Muhammad Ismail. 1-9 [doi]
- Redefining DDoS Attack Detection Using A Dual-Space Prototypical Network-Based ApproachFernando Martinez, Mariyam Mapkar, Ali Alfatemi, Mohamed Rahouti, Yufeng Xin, Kaiqi Xiong, Nasir Ghani. 1-9 [doi]
- LibGuard: Protecting Sensitive Data In Android Third-Party Libraries From XLDH AttacksFannv He, Jice Wang, Yuhang Huang, Xiancui Peng, Yuqing Zhang 0001. 1-6 [doi]
- Mitigating Cross-Technology Interference in Low-Power Wireless NetworksWaltenegus Dargie, Zegeye Mekasha Kidane. 1-8 [doi]
- Scaling Container Caching to Larger Networks with Multi-Agent Reinforcement LearningAustin Chen, Genya Ishigaki. 1-5 [doi]
- Beyond Wake Words: Advancing Smart Speaker Protection with Continuous Authentication and Local ProfilesLuca Hernández Acosta, Andreas Reinhardt 0001, Tobias Müller, Delphine Reinhardt. 1-9 [doi]
- Usage-Dependent Quality of Service for Free WiFi NetworksRobin Laidig, Jona Herrmann, Frank Dürr, Kurt Rothermel. 1-9 [doi]
- RobustETH: Ensuring Economic Fairness in ETH2.0's Distributed Validator TechnologyShenghang Chen, Zhicheng Xu, Kun Zhou, Xiaoli Zhang 0003, Hongbing Cheng. 1-9 [doi]
- Appro-Fun: Approximate Machine Unlearning in Federated SettingZuobin Xiong, Wei Li, Zhipeng Cai. 1-9 [doi]
- Digital Twin Continuum: a Key Enabler for Pervasive Cyber-Physical EnvironmentsAntonello Barbone, Samuele Burattini, Matteo Martinelli, Marco Picone, Alessandro Ricci, Antonio Virdis. 1-9 [doi]
- Predicting F1-Scores of Classifiers in Network Intrusion Detection SystemsPriscila Silva, Gaspard Baye, Alexandre Broggi, Nathaniel D. Bastian, Gökhan Kul, Lance Fiondella. 1-6 [doi]
- FL-EVCS: Federated Learning based Anomaly Detection for EV Charging EcosystemShaurya Purohit, Manimaran Govindarasu. 1-9 [doi]
- Super-resolution Localization and Tracking in WiFi SensingJian Wang 0098, Jack Chuang, Sebastian Semper, Nada Golmie. 1-9 [doi]
- Agent Deprogramming Finetuning Away Backdoor Triggers for Secure Machine Learning Models/LLMsDeMarcus Edwards, Danda B. Rawat. 1-6 [doi]
- Flow Correlator: A Flow Table Cache Management StrategyLuke McHale, Paul V. Gratz, Alex Sprintson. 1-9 [doi]
- In-network Reinforcement Learning for Attack Mitigation using Programmable Data Plane in SDNAparna Ganesan, Kamil Saraç. 1-9 [doi]
- LEMUR: Efficient Multicasting in Ad-hoc Networks Using Label Switching and Unicast RoutingDylan Cirimelli-Low, J. J. Garcia-Luna-Aceves. 1-7 [doi]
- RAPID: Reinforcement Learning-Aided Femtocell Placement for Indoor Drone LocalizationAlireza Famili, Amin Tabrizian, Tolga O. Atalay, Angelos Stavrou, Peng Wei. 1-9 [doi]
- Adversarial Attack Detection for Deep Learning Driving Maneuver Classifiers in Connected Autonomous VehiclesTanmoy Sen, Haiying Shen. 1-9 [doi]
- Lightweight Coordinated Sampling for Dynamic Flows under Budget ConstraintsMingming Chen, Thomas La Porta, Trent Jaeger, Srikanth V. Krishnamurthy. 1-9 [doi]
- A Distortion Free Watermark Scheme for Relational DatabasesJiang Han, Xiaowei Peng, Hequn Xian, Dalin Yang. 1-6 [doi]
- Eavesdropper-Avoiding Neighbor Discovery for Multi-Sector Directional Wireless SystemsMd Asif Ishrak Sarder, Murat Yuksel, Elizabeth Bentley. 1-9 [doi]
- Cooperative Task Offloading for Multi-Access Edge-Cloud Networks: A Multi-Group Multi-Agent Deep Reinforcement LearningAkito Suzuki, Masahiro Kobayashi, Eiji Oki. 1-9 [doi]
- Impact of Client Choice on Distributed Resource Allocation in Edge ComputingCaroline Rublein, Fidan Mehmeti, Mark Mahon, Thomas F. La Porta. 1-9 [doi]
- Hybrid LoRa Network Architecture: Automatic Switching between LoRaWAN and LoRa Mesh Network in Environments with Dynamic Obstacle VariationsHyungsub Kim, Hayoung Kim, Somi Baek, Ryan Melenchuk, Jaden Soroka, Anthony Smith. 1-6 [doi]
- On Improved Efficiency and Forward Security of 0-RTT Key Exchange for SDPLei Zhang, Jingguo Ge, Yulei Wu, Tong Li, Hui Li, Yuepeng E. 1-9 [doi]
- SleepWalker: Constrastive Fine-tuning Technique for Text to Kinematics Models for Human Computer InteractionDeMarcus Edwards, Danda B. Rawat. 1-7 [doi]
- The Hardware and Software Test Bed for MPTCPMarek Michalski. 1-2 [doi]
- On the Impact of Overcoming Wake-up Radio Limitations on the Performance of Energy Aware Routing in Wireless Sensor NetworksAbhimanyu Venkatraman Sheshashayee, Chiara Petrioli, Stefano Basagni. 1-9 [doi]
- Performance Analysis of HFrFT Based on Wigner Transform for ISAC ApplicationsMohammad Reza Mousavi 0002, Stephan Ludwig. 1-6 [doi]
- Efficient URL and URI CompressionFelix Savins, Kevin Saric, Gowri Sankar Ramachandran, Raja Jurdak. 1-9 [doi]
- Trusting the Cloud-Native Edge: Remotely Attested Kubernetes WorkersJordi Thijsman, Merlijn Sebrechts, Filip De Turck, Bruno Volckaert. 1-6 [doi]
- Private Set Intersection Protocol with Perfect Hashing on OKVS: An Enhanced Approach for Privacy-Preserving OperationsJiyeon Lee. 1-2 [doi]
- QuadraCode AI: Smart Contract Vulnerability Detection with Multimodal RepresentationJiblal Upadhya, Kritagya Upadhyay, Arpan Sainju, Samir Poudel, Md. Nahid Hasan, Khem Poudel, Jaishree Ranganathan. 1-9 [doi]
- Traffic Engineering in Large-scale Networks via Multi-Agent Deep Reinforcement Learning with Joint-TrainingVan An Le, Duc-Long Nguyen, Phi-Le Nguyen, Yusheng Ji. 1-9 [doi]
- A Cost-Effective Long-Distance Industrial IoT SystemGuoping Wang. 1-5 [doi]
- Cyrus: A DRL-based Puncturing Solution to URLLC/eMBB Multiplexing in O-RANEhsan Ghoreishi, Bahman Abolhassani, Yan Huang 0025, Shiva Acharya, Wenjing Lou, Y. Thomas Hou 0001. 1-9 [doi]
- Uncertainty-Aware Forecasting of Computational Load in MECs Using Distributed Machine Learning: A Tokyo Case StudyPhil Aupke, Akihiro Nakao, Andreas Kassler. 1-6 [doi]
- Towards Protecting On-Device Machine Learning with RISC-V based Multi-Enclave TEEYongzhi Wang, Venkata Sai Ramya Padmasri Boggaram. 1-6 [doi]
- Toward Multimodal Vertical Federated Learning: A Traffic Analysis Case StudyAgnideven Palanisamy Sundar, Feng Li 0001, Xukai Zou, Tianchong Gao. 1-9 [doi]
- Leveraging Blockchain and Coded Computing for Secure Edge Collaborate Learning in Industrial IoTYuliang Chen, Xi Lin, Hansong Xu, Siyi Liao, Jin Guo, Chunming Zou. 1-6 [doi]
- DDD: A DNS-based DDoS Defense Scheme Using PuzzlesHyeonmin Lee, Taehyun Kang, Sukhun Yang, Jinyong Jun, Taekyoung Kwon 0001. 1-9 [doi]
- Multimodal Frequeny Spectrum Fusion Schema for RGB-T Image Semantic SegmentationHengyan Liu, Wenzhang Zhang, Tianhong Dai, Longfei Yin, Guangyu Ren. 1-6 [doi]
- Fake Base Station Detection and BlacklistingSourav Purification, Simeon Wuthier, Jinoh Kim, Jonghyun Kim, Sang-Yoon Chang. 1-9 [doi]
- A Neuro-Symbolic Artificial Intelligence Network Intrusion Detection SystemAlice Bizzarri, Brian Jalaian, Fabrizio Riguzzi, Nathaniel D. Bastian. 1-9 [doi]
- Implementation and Performance Measurement of the SUHDSA (Secure, Useful, and High-performance Data-Stream Anonymization)+ AlgorithmJiyeon Lee, Soonseok Kim. 1-2 [doi]
- Data Augmentation for Human Activity Recognition via Condition Space Interpolation within a Generative ModelTianshi Wang, Yizhuo Chen, Qikai Yang, Dachun Sun, Ruijie Wang 0004, Jinyang Li, Tomoyoshi Kimura, Tarek F. Abdelzaher. 1-9 [doi]
- Improving Android Malware Detection with Entropy Bytecode-to-Image Encoding FrameworkSaleh J. Makkawy, Abdalrahman H. Alblwi, Michael J. De Lucia, Kenneth E. Barner. 1-9 [doi]
- KESIC: Kerberos Extensions for Smart, IoT and CPS DevicesRenascence Tarafder Prapty, Sashidhar Jakkamsetti, Gene Tsudik. 1-9 [doi]
- iCrop: Enabling High-Precision Crop Disease Detection via LoRa TechnologyXu Tao, Jackson Butcher, Simone Silvestri, Flavio Esposito. 1-9 [doi]
- Individual Dynamic Real-Time Range Queries in Adaptive Quad StreamingSimon Keller, Rainer Mueller. 1-9 [doi]
- Privacy-Preserving Edge Assistance for Solving Matrix Eigenvalue ProblemXiaotong Zhao, Hanlin Zhang, Jie Lin, Fanyu Kong, Leyun Yu. 1-6 [doi]
- Hybrid Quantum-Classical Computing via Dantzig-Wolfe Decomposition for Integer Linear ProgrammingXinliang Wei, Jiyao Liu, Lei Fan, Yuanxiong Guo, Zhu Han 0001, Yu Wang 0003. 1-9 [doi]
- CasePad: Privacy-preserving Finger Activity Sensing via Passive Acoustic Signals Enhanced by Mini-Structures in Smartphone CasesZhengkun Ye, Yan Wang, Yingying Chen. 1-9 [doi]
- Clearing Clouds from the Horizon: Latency Characterization of Public Cloud Service PlatformsRita Ingabire, Antonio Bazco Nogueras, Vincenzo Mancuso, Luis M. Contreras 0001, Jesús Folgueira. 1-9 [doi]
- Hide-and-Seek: Data Sharing with Customizable Machine Learnability and PrivacyHairuo Xu, Tao Shu. 1-9 [doi]
- A MECApp-aware Lifecycle Management Approach in 5G Edge-Cloud DeploymentsPaolo Bellavista, Armir Bujari, Luca Foschini 0001, Andrea Sabbioni, Riccardo Venanzi. 1-6 [doi]
- Foundations of In-Network Quantum Computing for Future Communication NetworksYannik Böck, Holger Boche, Riccardo Bassoli, Frank H. P. Fitzek. 1-9 [doi]
- Digital Twin based Internet of VehiclesCheng Qian 0007, Mian Qian, Kun Hua, Hengshuo Liang, Guobin Xu, Wei Yu 0002. 1-6 [doi]
- Energy-Efficient Deployment of Stateful FaaS Vertical Applications on Edge Data NetworksClaudio Cicconetti, Raffaele Bruno 0001, Andrea Passarella. 1-9 [doi]
- Channel Estimation for MIMO-OTFS Satellite Communication: a Deep Learning-Based ApproachYuan Gao, Xinchen Xu, Bintao Hu, Jianbo Du, Wenrui Yang, Yanliang Jin. 1-6 [doi]
- Switching Fabric Internal State AnalyzerMarek Michalski. 1-2 [doi]
- Networking Experiments in the Keio Future Photonic Network Open Laboratory with Field-installed Hollow-Core Optical Fiber CablesSatoru Okamoto. 1-9 [doi]
- Evaluation of Hardware-based Video Encoders on Modern GPUs for UHD Live-StreamingKasidis Arunruangsirilert, Jiro Katto. 1-9 [doi]
- Hardware Simulation of Multi-Service QueuesJoanna Weissenberg, Marek Michalski. 1-2 [doi]
- SHPAC: Fine-grained and Multi-platform Supported Access Control System for Smart Home ScenarioYiyu Yang, Yuqing Zhang. 1-6 [doi]
- An Edge Resource Selection Scheme Considering QoS and Computational ParametersMatthias Frei, Reinhard German, Anatoli Djanatliev. 1-9 [doi]
- Edge Computing Network Intrusion Detection System in IoT Using Deep LearningAndres Hinojosa, Nahid Ebrahimi Majd. 1-6 [doi]
- Poster: Embedded-Based Differentiated Communication for Remote ECG Monitoring with a Multi-Level Blockchain SystemChathumi Samaraweera, Dongming Peng, Adarsha Bhattarai, Yutong Liu. 1-2 [doi]
- ECO: Edge Continuum Orchestrator Framework for managing serverless chains across the Cloud-Edge SpectrumMuhamed Alarbi, Robert Belson, Hanan Lutfiyya. 1-6 [doi]
- Big Data Quality Scoring for Structured Data Using MapReduceYalong Wu, Shalini Dhamodharan, Vinuthna Ghattamaneni, Narmada Kokila, Chandrika Pathakamuri, Timothy Carter, Pu Tian, Kewei Sha. 1-6 [doi]
- Performance Analysis for Underwater Video Transmission with Imperfect ResamplingRana D. Hegazy, Laurence B. Milstein, Pamela C. Cosman. 1-9 [doi]
- RecuGAN: A Novel Generative AI Approach for Synthesizing RF Coverage MapsSopan Sarkar, Mohammad Hossein Manshaei, Marwan Krunz, Hamid Ravaee. 1-9 [doi]
- CoWiL: Combating Cross-Technology Interference in LoRaWANChenglong Shao, Kazuya Tsukamoto, Yi-Wei Ma, Yingbo Hua, Xianpeng Wang. 1-6 [doi]
- Advancing Network Security with Quantum-Safe System IntegrationJianzhou Mao, Guobin Xu, Eric Sakk, Shuangbao Wang 0001. 1-9 [doi]
- Downlink STBC-GSSK and STBC-UAV Assisted NOMA for 6G and BeyondAnindya Bal, Sumit Chowdhury, Haofan Cai. 1-2 [doi]
- UAV Trajectory Optimization for Air-to-Water Optical Wireless ChannelsSk Samiul Reza, Murat Yuksel. 1-9 [doi]
- Data Security Approaches to Support Open Science on High-Performance Computing SystemsMd. Kamal Hossain Chowdhury, Purushotham V. Bangalore. 1-6 [doi]
- Intelligent Trajectory-based Approach to UAV Location Integrity ChecksMincheol Shin, Sang-Yoon Chang, Jonghyun Kim, Kyungmin Park, Jinoh Kim. 1-9 [doi]
- ECG-grained Cardiac Monitoring Using RFIDNingning Wang, Tianya Zhao, Shiwen Mao, Harrison X. Bai, Zhicheng Jiao, Xuyu Wang. 1-9 [doi]
- Web3.0 Literary Landscape: Deep Learning and Blockchain for Nobel Prize PredictionsSida Huang, Jialuoyi Tan, Yuji Dong, Jie Zhang. 1-6 [doi]
- Learning-Based WiFi Fingerprint Inpainting via Generative Adversarial NetworksYu Chan, Pin-Yu Lin, Yu-Yun Tseng, Jen-Jee Chen, Yu-Chee Tseng. 1-7 [doi]
- Enhancing Capacity of Optical Circuit Switching Clos Network in Data Center: Progress and ChallengesEiji Oki, Haruto Taka, Takeru Inoue. 1-9 [doi]
- Location Privacy Protection Method with Route ConstraintsJiang Han, Hequn Xian, Dalin Yang, Han Jiang. 1-6 [doi]
- The Remote Networking Lab ManagerMarek Michalski. 1-2 [doi]
- Detecting IP Prefix Mismatches on SDN Data PlaneShu-Po Tung, Yu-Min Lin, Keng-Lun Chang, Hsu-Chun Hsiao, Tiffany Hyun-Jin Kim. 1-9 [doi]
- Securing Federated Learning: Enhancing Defense Mechanisms against Poisoning AttacksBenjamin Birchman, Geethapriya Thamilarasu. 1-6 [doi]
- ViEdge: An Edge-based Platform for Video Analytics Applications in Smart EstatesVishal Choudhary, Rahul Aggarwal, Hock-Beng Lim, Binbin Chen. 1-2 [doi]
- Explainability Guided Adversarial Evasion Attacks on Malware DetectorsKshitiz Aryal, Maanak Gupta, Mahmoud Abdelsalam, Moustafa Saleh. 1-9 [doi]
- Improving Web Content Delivery with HTTP/3 and Non-Incremental EPSAbhinav Gupta, Radim Bartos. 1-9 [doi]
- Impact of Latency and Bandwidth Limitations on the Safety Performance of Collaborative PerceptionDereje Shenkut, B. V. K. Vijaya Kumar. 1-8 [doi]
- Performance or Anonymity? Source-Driven Tor Relay Selection for Performance EnhancementKelei Zhang, Sang-Yoon Chang. 1-9 [doi]
- Advanced DDoS Attack Classification using Ensemble Model with Meta-LearnerAnkith Indra Kumar, Genya Ishigaki. 1-2 [doi]
- A Novel Neural Networks-based Framework for APT Detection in Networked Autonomous SystemsHassan El Alami, Danda B. Rawat. 1-6 [doi]
- Unlocking Efficiency in B5G Networks: The Need for Adaptive Service Function ChainsDavid Perez Abreu, Karima Velasquez, Marília Curado, Edmundo Monteiro. 1-8 [doi]
- Neural Network-based Blocking Prediction for Dynamic Network SlicingNitin Datta Movva, Genya Ishigaki. 1-6 [doi]
- Sharing Stateless Containers among MEC Applications Composed of Multiple ContainersShuntaro Yanagisawa, Kohki Yamada, Atsushi Sekiguchi, Takao Kondo, Ken Kumakura, Keisuke Maesako, Liang Zhang, Kosuke Mori, Fumio Teraoka. 1-6 [doi]
- Deadline-oriented Flow Control for Real-time UHD Videos in 5G Edge NetworksWanghong Yang, Wenji Du, Baosen Zhao, Tingting Yuan, Yongmao Ren, Xu Zhou, Qinghua Wu, Xiaoming Fu 0001. 1-9 [doi]
- Acoustic-based Alphanumeric Input Interface for EarablesYilin Wang, Zi Wang, Jie Yang. 1-9 [doi]
- Comparing Space Versus Surface Gateways for Internetworking pLEO Satellite NetworksAllan Ko, Thomas H. Shake, Rahul Amin. 1-9 [doi]
- Content Caching Optimization Based on Improved Bandit Learning AlgorithmMiao Li, Siyi Qiu, Jiong Liu, Wenping Song. 1-4 [doi]