Abstract is missing.
- Deep Reinforcement Learning Based Resource Allocation for 5G V2V Groupcast CommunicationsShang-Huan Wu, Ren-Hung Hwang, Chih-Yu Wang 0001, Ching-Hsuan Chou. 1-6 [doi]
- A Refined Energy Optimization Model for Edge Computing with Machine LearningXian Liu, Changcheng Huang, Wilsun Xu. 7-11 [doi]
- Hierarchical Bayesian Attractor Model for Dynamic Task Allocation in Edge-Cloud ComputingTatsuya Otoshi, Masayuki Murata 0001, Hideyuki Shimonishi, Tetsuya Shimokawa. 12-18 [doi]
- Impact of Grammar on Language Model ComprehensionKimia Ameri, Michael Hempel, Hamid Sharif, Juan Lopez, Kalyan Perumalla. 19-24 [doi]
- Deep Reinforcement Learning-Based Optimal Parameter Design of Power ConvertersVan-Hai Bui, Fangyuan Chang, Wencong Su, Mengqi Wang, Yi Lu Murphey, Felipe Leno da Silva, Can Huang, Lingxiao Xue, Ruben Glatt. 25-29 [doi]
- Neural Network based Unsupervised Face and Mask Detection in Surveillance NetworksAninda Roy Ani, Sabir Saheel, Tarem Ahmed, Mohammad Faisal Uddin. 30-34 [doi]
- On False Data Injection Attack against Building Automation SystemsMichael Cash, Christopher Morales-Gonzalez, Shan Wang 0008, Xipeng Jin, Alex Parlato, Jason Zhu, Qun Zhou Sun, Xinwen Fu. 35-41 [doi]
- Optimal Codes for Distributed StorageJian Ren 0001, Jian Li 0007, Tongtong Li. 42-46 [doi]
- Membership Management in Collaborative Intrusion Detection SystemsChukwuebuka Ezelu, Ulrich Buehler. 47-53 [doi]
- Wiggle: Physical Challenge-Response Verification of Vehicle PlatooningConnor Dickey, Christopher Smith, Quentin Johnson 0001, Jingcheng Li, Ziqi Xu, Loukas Lazos, Ming Li 0003. 54-60 [doi]
- Network Anomaly Detection Using a Graph Neural NetworkPatrice Kisanga, Isaac Woungang, Issa Traoré, Glaucio H. S. Carvalho. 61-65 [doi]
- Byzantine-Resilient Federated Learning With Differential Privacy Using Online Mirror DescentOlusola Tolulope Odeyomi, Gergely Zaruba. 66-70 [doi]
- Adaptive Resource Allocation in Quantum Key Distribution (QKD) for Federated LearningRakpong Kaewpuang, Minrui Xu, Dusit Niyato, Han Yu 0001, Zehui Xiong, Xuemin Sherman Shen. 71-76 [doi]
- Study on High Availability and Fault ToleranceNorman Kong Koon Kit, Michal Aibin. 77-82 [doi]
- Real-Time Search and Rescue using Remotely Piloted Aircraft System with Frame DroppingRohan Sharma, Michal Aibin. 83-88 [doi]
- Emergency Surgical Scheduling Model Based on Moth-flame Optimization AlgorithmCuiting Huang, Sicong Ye, Shi Shuai, Mengdi Wei, Yehong Zhou, Anna Aibin, Michal Aibin. 89-94 [doi]
- Trust and Rewards in a Two-Tier Consensus ArchitectureHaytham Qushtom, Jelena V. Misic, Vojislav B. Misic, Xiaolin Chang. 95-100 [doi]
- Analysis of Job Completion Time in Vehicular Cloud Under Concurrent Task ExecutionChinh Tran, Mustafa Mehmet-Ali. 101-105 [doi]
- LEO Satellite Communication in IoRT: a Virtual MISO ModelXian Liu. 106-110 [doi]
- Towards Programmable Networking With CoopNet: A Horizontal Parallel Multipath ApproachRazvan Cristian Voicu, Yusun Chang. 111-116 [doi]
- Implementing Virtual Network Functions in Named Data Networking and Web 3.0Puming Fang, Tilman Wolf. 117-123 [doi]
- Performance Analysis of Fixed Broadband Wireless Access in mmWave Band in 5GSoumya Banerjee, Sarada Prasad Gochhayat, Sachin Shetty. 124-129 [doi]
- Network Services Management using Programmable Data Planes for Visual Cloud ComputingAlicia Esquivel Morel, Prasad Calyam, Chengyi Qu, Durbek Gafurov, Cong Wang 0014, Komal Thareja, Anirban Mandal, Eric Lyons 0001, Michael Zink, George Papadimitriou 0002, Ewa Deelman. 130-136 [doi]
- Augmenting Campus Wireless Architectures with SDNWilliam Brockelsby, Rudra Dutta. 137-142 [doi]
- AI-based RF-Fingerprinting Framework and Implementation using Software-Defined RadiosHovannes Kulhandjian, Elizabeth Batz, Eduardo Garcia, Selena Vega, Sanjana Velma, Michel Kulhandjian, Claude D'Amours, Burak Kantarci, Tathagata Mukherjee. 143-147 [doi]
- Reinforcement Learning based Optimal Dynamic Resource Allocation for RIS-aided MIMO Wireless Network with Hardware LimitationsYuzhu Zhang, Lijun Qian, Abdullah Eroglu, Binbin Yang, Hao Xu 0002. 148-152 [doi]
- The Hysteresis Effect of Momentum Spillover in Asset Pricing via Spatial-Temporal Graph LearningChenhao He, Qing Li 0005, Rui Cheng, Jun Wang 0089, Jinghua Tan. 153-158 [doi]
- Dynamic Spectrum Access in Non-stationary Environments: A DRL-LSTM Integrated ApproachMingjie Feng, Wenhan Zhang, Marwan Krunz. 159-164 [doi]
- Pedestrian Detection and Avoidance at Night Using Multiple Sensors and Machine LearningHovannes Kulhandjian, Jeremiah Barron, Megan Tamiyasu, Mateo Thompson, Michel Kulhandjian. 165-169 [doi]
- Blockchain-based Data Quality Assessment to Improve Distributed Machine LearningYao Du 0001, Zehua Wang, Cyril Leung, Victor C. M. Leung. 170-175 [doi]
- A Hybrid Delay-aware Approach Towards UAV Flight Data Anomaly DetectionMengjie Jia, Ashok Raja, Jiawei Yuan. 176-180 [doi]
- Adversarial Technique Validation & Defense Selection Using Attack Graph & ATT&CK MatrixMd Ariful Haque, Sachin Shetty, Charles A. Kamhoua, Kimberly Gold. 181-187 [doi]
- Virtual Curtain: A Communicative Fine-grained Privacy Control Framework for Augmented RealityAakash Shrestha, Yantian Hou, Min Long, Jiawei Yuan. 188-194 [doi]
- Using Blockchain for Decentralized Artificial Intelligence with Data PrivacyAnand Surendra Masurkar, Xiaoyan Sun, Jun Dai. 195-201 [doi]
- Evaluating Generative Adversarial Networks: A Topological ApproachNarges Alipourjeddi, Ali Miri. 202-206 [doi]
- Consensus algorithms for Opt-in/Opt-out and proximity marketing contextFatima Chahal, Hacène Fouchal, Dominique Gaïti. 207-213 [doi]
- Wrapper-Based Federated Feature Selection for IoT EnvironmentsAfsaneh Mahanipour, Hana Khamfroush. 214-219 [doi]
- Deep learning inference time guarantee in near future edge computingKouichi Genda. 220-225 [doi]
- Effectiveness and predictability of in-network storage cache for Scientific WorkflowsCaitlin Sim, Kesheng Wu, Alex Sim, Inder Monga, Chin Guok, Frank Würthwein, Diego Davila, Harvey Newman, Justas Balcas. 226-230 [doi]
- Energy-Aware and Fair Multi-User Multi-Task Computation OffloadingVincent Latzko, Osel Lhamo, Mahshid Mehrabi, Christian Vielhaus, Frank H. P. Fitzek. 231-236 [doi]
- An edge computing-based monitoring framework for situation-aware embedded real-time systemsNayreet Islam, Akramul Azim. 237-241 [doi]
- Warehouse Deployment: A Comparative Measurement Study of Commercial Wi-Fi and CBRS SystemsVanlin Sathya, Lyutianyang Zhang, Mohit Goyal, Mehmet Yavuz. 242-248 [doi]
- SPA: A Scalable Pedestrian-awareness Application using NDN over CV2XProyash Podder, Azin Neishaboori, Somak Datta Gupta, Alexander Afanasyev. 249-253 [doi]
- Hyperbolic Routing for Cache Privacy in Information Centric NetworkingSean Cannan, Andrew Jones, Robert Simon. 254-260 [doi]
- A Simple UDP-Based Web Server on a Bare PC with 64-bit Multicore Processors: Design and ImplementationNavid Ordouie, Ramesh K. Karne, Alexander L. Wijesinha, Nirmala Soundararajan. 261-265 [doi]
- Enable Computation in the Network for Driver Assistance with Object Notification and AugmentationLijun Dong, Richard Li. 266-272 [doi]
- Metaverse-based education service adoption and preference study using conjoint analysisJunghwan Lee, Seongsu Jang. 273-277 [doi]
- Evaluation of Different Time Series Forecasting Models for 5G V2V NetworksJian Liu 0031, Chin-Tser Huang. 278-282 [doi]
- Activity Detection for Grant-Free NOMA in Massive IoT NetworksMehrtash Mehrabi, Mostafa Mohammadkarimi, Masoud Ardakani. 283-287 [doi]
- Implementation of Real-Time Adversarial Attacks on DNN-based Modulation ClassifierEyad Shtaiwi, Ahmed Refaey Hussein, Awais Khawar, Ahmed Alkhateeb, Ahmed Abdelhadi, Zhu Han 0001. 288-292 [doi]
- A Machine Learning Approach for the Detection of Injection Attacks on ADS-B Messaging SystemsJoshua Price, Hadjar Ould Slimane, Khair Al Shamaileh, Vijay Kumar Devabhaktuni, Naima Kaabouch. 293-297 [doi]
- Hensel's Compression-Based Dimensionality Reduction Approach for Privacy Protection in Federated LearningAhmed El Ouadrhiri, Ahmed Abdelhadi, Phu H. Phung. 298-303 [doi]
- Secrecy Performance and Power Allocation for Cooperative Vehicular Relaying Networks in the Presence of InterferenceMohamed G. Abd El Ghafour, Ahmed H. Abd El-Malek, Mohammed Abo-Zahhad. 304-310 [doi]
- On an Integrated Security Framework for Defense Against Various DDoS Attacks in SDNHao Wu, Aiqin Hou, Weike Nie, Chase Qishi Wu. 311-317 [doi]
- Flick me once and I know it's you! Flicking-based Implicit Authentication for SmartwatchYanyan Li, Felix Ferreira, Mengjun Xie. 318-323 [doi]
- SGChain: Blockchain Platform for Availability Attack Mitigation in Smart Grid EnvironmentsRoshan Lal Neupane, Pravin Bhandari, Prasad Calyam, Reshmi Mitra. 324-330 [doi]
- A Zero-Trust Framework for Industrial Internet of ThingsAdel Atieh, Priyadarsi Nanda, Manoranjan Mohanty. 331-335 [doi]
- TPMWallet: Towards Blockchain Hardware Wallet using Trusted Platform Module in IoTWei-Yang Chiu, Weizhi Meng 0001, Wenjuan Li 0001. 336-342 [doi]
- Estimation of Cellular Wireless User Coordinates via Channel Charting and MUSICAmr Aly, Ender Ayanoglu. 343-347 [doi]
- Time-Topology Routing in 3D NetworksTomohiro Korikawa, Chikako Takasaki, Kyota Hattori, Hidenari Oowada. 348-352 [doi]
- Traffic Behavior-based Device Type ClassificationChikako Takasaki, Tomohiro Korikawa, Kyota Hattori, Hidenari Ohwada. 353-357 [doi]
- Enabling PeerCloud in Vehicular Networks: Feasibility and Reliability of Vehicle-to-Vehicle OffloadingXiaomei Zhang 0001. 358-364 [doi]
- Transmission-Cost Minimization for Packet-level Coding on Multi-path Wireless NetworksWei Mao 0003, Shu-ping Yeh, Jing Zhu 0001, Hosein Nikopour, Shilpa Talwar. 365-371 [doi]
- perMAC: Perturbation-based MAC for Dense Wireless Networks with Periodic TrafficJing Deng 0001, Po-Ning Chen, Yunghsiang S. Han. 372-376 [doi]
- Is Active IRS Useful for mmWave Wireless Networks or Not?Jalal Jalali, Ata Khalili, Atefeh Rezaei, Jeroen Famaey. 377-382 [doi]
- Can We Have a Better System than OFDM?Tongtong Li, Jinxian Deng, Jian Ren 0001. 383-387 [doi]
- ECEA Based Joint Circular Design of Reconfigurable Intelligent Surfaces with Drone During DisasterSabila Newaz, Xingya Liu. 388-392 [doi]
- Ergodic Capacity of the Cloud Radio Access Network: A General SolutionXian Liu. 393-397 [doi]
- A Novel Information-Directed Tree-Search Algorithm for RIS Phase Optimization in Massive MIMOI. Zakir Ahmed, Hamid R. Sadjadpour, Shahram Yousefi. 398-402 [doi]
- CMRCV: Causal Modeling to Localize Failed Equipment by Representative Nodes and Contribution ValuesYoichi Matsuo, Yuusuke Nakano, Keishiro Watanabe. 403-408 [doi]
- Towards Instant Clustering Approach for Federated Learning Client SelectionSarhad Arisdakessian, Omar Abdel Wahab 0001, Azzam Mourad, Hadi Otrok. 409-413 [doi]
- Using Artificial Intelligence and IoT Solution for Forest Fire PreventionGiovanni Pettorru, Mauro Fadda, Roberto Girau, Mariella Sole, Matteo Anedda, Daniele D. Giusto. 414-418 [doi]
- Hybrid Quantum Machine learning using Quantum Integrated Cloud Architecture (QICA)Samih Fadli, Bharat S. Rawal, Andrew Mentges. 419-425 [doi]
- Towards Secure Communications in Heterogeneous Internet of ThingsJames H. Nguyen, Weixian Liao, Wei Yu 0002. 426-430 [doi]
- A privacy awareness framework for NFT avatars in the metaverseDorottya Zelenyanszki, Zhé Hóu, Kamanashis Biswas, Vallipuram Muthukkumarasamy. 431-435 [doi]
- AI-based Cyber Event OSINT via Twitter DataDakota Dale, Kylie McClanahan, Qinghua Li. 436-442 [doi]
- Deep Learning Based Malapps Detection in Android Powered Mobile Cyber-Physical SystemMoinul Islam Sayed, Sajal Saha, Anwar Haque. 443-449 [doi]
- On Line Secure Elements: Deploying High Security Keystores and Personal HSMsPascal Urien. 450-455 [doi]
- AFFIRM: Privacy-by-Design Blockchain for Mobility Data in Web3 using Information Centric Fog Networks with Collaborative LearningJunaid Ahmed Khan, Kaan Ozbay. 456-462 [doi]
- COVID-19 Fake News DetectorJunjie Liu, Min Chen 0009. 463-467 [doi]
- Shallow- and Deep- fake Image Manipulation Localization Using Deep LearningJunbin Zhang, Hamid Reza Tohidypour, Yixiao Wang, Panos Nasiopoulos. 468-472 [doi]
- A Generative Adversarial Network Based Tone Mapping Operator for 4K HDR ImagesJunbin Zhang, Yixiao Wang, Hamid Reza Tohidypour, Mahsa T. Pourazad, Panos Nasiopoulos. 473-477 [doi]
- Guiding Interactive Film With Emotion-Profiling ChatbotsCelina L. Ma, Haohong Wang, Mea Wang. 478-483 [doi]
- From Screenplay to Screen: A Natural Language Processing Approach to Animated Film MakingKyle Jorgensen, Haohong Wang, Mea Wang. 484-490 [doi]
- Using Diversity to Evolve More Secure and Efficient Virtual Local Area NetworksAriel José Aizpurúa, Errin W. Fulp, Daniel Cañas. 491-495 [doi]
- On the Placement of Edge Servers in Mobile Edge ComputingHaotian Liu, Shiyun Wang, Hui Huang, Qiang Ye 0001. 496-500 [doi]
- Malicious Model Detection for Federated Learning Empowered Energy Storage SystemsXu Wang 0022, Yuanzhu Chen 0001, Octavia A. Dobre. 501-505 [doi]
- Cloud Security Requirement Based Threat AnalysisAhmed Taha 0002, Alexander Lawall, Neeraj Suri. 506-510 [doi]
- Blockchain-enabled Efficient and Secure Federated Learning in IoT and Edge Computing NetworksRanwa Al Mallah, David López 0003, Talal Halabi. 511-515 [doi]
- Early Rumor Detection in Social Media Based on Graph Convolutional NetworksNiteesh Reddy Thota, Xiaoyan Sun 0003, Jun Dai. 516-522 [doi]
- Evaluating Weather Influence on User Participation in a Crowd-sensing ApplicationIran F. Ribeiro, Vitor F. Calmon, Thiago H. Silva 0001, Celso A. S. Santos, Vinícius Fernandes Soares Mota. 523-528 [doi]
- Verification of a method for latent interest estimation based on user behavior analysis and POI attributesTakanobu Omura, Felix Dollack, Panote Siriaraya, Da Li, Katsumi Tanaka, Yukiko Kawai, Shinsuke Nakajima. 529-535 [doi]
- Preliminary Analysis of Dietary Management Support Method for Improving the Symptoms in Irritable Bowel SyndromeTakuya Yamanaka, Da Li, Shinsuke Nakajima. 536-540 [doi]
- Prioritizing transaction delivery in Ethereum networkSoosan Naderi Mighan, Jelena V. Misic, Vojislav B. Misic. 541-546 [doi]
- Distributed UAV Swarm Placement Optimization for Compressive Sensing based Target LocalizationYen-Chin Wang, Danijela Cabric. 547-551 [doi]
- Wake-up Control for Energy-efficient Identifications of Multiple Emission Sources in Wireless Sensor NetworksJunya Shiraishi, Hiroyuki Yomo. 552-557 [doi]
- A Novel Multivariate and Accurate Detection Scheme for Electricity Theft Attacks in Smart GridsAlaa Awad Abdellatif, Aya A. Amer, Khaled Bashir Shaban, Ahmed M. Massoud. 558-562 [doi]
- Two-Stage Online Reinforcement Learning based Distributed Optimal Resource Allocation for Multiple RIS-assisted Mobile Ad-Hoc NetworkYuzhu Zhang, Hao Xu. 563-567 [doi]
- Mobile Sensing Cluster with Orbiting Mutant for Indistinguishable Events in Noisy EnvironmentsNaoki Fujiyama, Shoma Izuhara, Shoma Nishigami, Eiji Nii, Hiroyuki Yomo, Yasuhisa Takizawa. 568-574 [doi]
- A Deep Q-Learning Connectivity-Aware Pheromone Mobility Model for Autonomous UAV NetworksShreyas Devaraju, Alexander Ihler, Sunil Kumar 0001. 575-580 [doi]
- Optimization Framework for Green Networking (Invited Paper)Cédric Westphal, Alexander Clemm. 581-585 [doi]
- SEANAC: Schema Enforced Automation of Name-based Access ControlProyash Podder, Alexander Afanasyev. 586-590 [doi]
- A-C: An NDN-based Blockchain Network With Erasure CodingRuiran Wang, Laurent Njilla, Shucheng Yu. 591-595 [doi]
- Evolutionary Algorithm with Phenotype Diversity for Virtual Network EmbeddingTatsuya Otoshi, Masayuki Murata 0001. 596-602 [doi]
- Client-Transparent and Self-Managed MQTT Broker Federation at the Application LayerJosé Fernando de Lacerda Machado, Marco Aurélio Spohn, Lisandro Zambenedetti Granville. 603-607 [doi]
- Joint Task and Flow Scheduling for Time-Triggered and Strict-Priority NetworksAnna Arestova, Lisa Maile, Nurbek Halikulov, Kai-Steffen Hielscher, Reinhard German. 608-614 [doi]
- VM consolidation considering cores, memory, load for energy-constrained data centersMuhammad Ali, Iryna Andriyanova, Jérôme David. 615-620 [doi]
- A Two-stage Trunk Reservation Control Method corresponding to General Call Priority using Switch Outside Disaster AreaYoichiro Arii, Katsunori Yamaoka, Ken-ichi Baba. 621-625 [doi]
- IP Transformation Initiatives to Generate Scalable Functional Verification Collaterals for Smart Reusability and Reduced Effort for Sign-offSurajit Bhattacherjee, Dipankar Pal. 626-629 [doi]
- ABP vs. OTAA activation of LoRa devices: an Experimental Study in a Rural ContextAnderson M. Da Rocha, Marcos A. De Oliveira, Pauletti José F. M., Gerson Geraldo H. Cavalheiro. 630-634 [doi]
- DAWN-Sim: A Distributed Algorithm Simulator for Wireless Ad-hoc Networks in PythonMustafa Tosun, Umut Can Çabuk, Orhan Dagdeviren, Yusuf Ozturk. 635-639 [doi]
- A Reservation-based Adaptive MAC Protocol for OFDM Physical Layers in Underwater NetworksSara Falleni, Tommaso Melodia, Stefano Basagni. 640-645 [doi]
- Simulation-based Performance Analysis of an NR-U and WiFi Coexistence System in the Presence of Hidden NodesQilei Ren, Jun Zheng 0002. 646-651 [doi]
- 5G NR-Light at Millimeter Waves: Design Guidelines for Mid-Market IoT Use CasesMatteo Pagin, Tommaso Zugno, Marco Giordani, Louis-Adrien Dufrene, Quentin Lampin, Michele Zorzi. 652-658 [doi]
- Decomposition Models for the Routing and Slot Provisioning ProblemBrigitte Jaumard, Adham Mohammed, Quang Anh Nguyen. 659-665 [doi]
- Secure Anonymous Acknowledgments in a Delay-Tolerant NetworkEdoardo Biagioni. 666-671 [doi]
- Flying Ad Hoc Coverage Area Mobility Model for Post-Disaster Area based on Two DronesIntan Nabina Azmi, Yusnani Mohd Yussoff, Norashikin M. Thamrin, Fadhlan Hafizhelmi Kamaru Zaman, Nooritawati Md Tahir. 672-676 [doi]
- Channel Allocation Algorithm Of Wi-FiJin Wang, Xiaofeng Zhong, Shidong Zhou. 677-682 [doi]
- Localization System Architecture for Enhanced Positioning in Industry 4.0 ApplicationsRamya Vasist, Vladica Sark, Meysam Goodarzi, Jesús Gutiérrez 0004, Eckhard Grass. 683-688 [doi]
- DIRS: Dynamic Initial Rate Setting in Congestion Control for Disaggregated Storage SystemsXiaoqian Zhang, Allen Yang, Danlin Jia, Li Wang, Mahsa Bayati, Pradeep Subedi, Xuebin Yao, Bo Sheng, Ningfang Mi. 689-693 [doi]
- A load balancing method using load factor on unsplittable flow edges in information and communication networksDaichi Shimizu, Norihiko Shinomiya. 694-697 [doi]
- Static Virtual Network Mapping With Advance Reservation In Elastic Optical NetworksJuzi Zhao, Varsha Kohirkar, Poonam Nigade, Ramanuja Kalkunte, Lenine Posham, Suresh Subramaniam. 698-703 [doi]
- Iterative Symbol Decision Schemes for CP-OTFS on Static Multipath ChannelsShuen-Yu Tsai, Wei-Chang Chen, Char-Dir Chung. 704-709 [doi]
- Uplink-to-Downlink Covariance Matrix Estimation in ULA-equipped FDD Massive MIMO SystemsSalime Bameri, Khalid A. Almahorg, Ramy H. Gohary, Amr El-Keyi, Yahia Ahmed. 710-715 [doi]