Abstract is missing.
- Machine Learning in Sensors for Collision AvoidanceErkan Karakus, Tao Wei, Qing Yang 0001. 1-5 [doi]
- A Multi-Chaotic Key Expansion for Advanced Encryption Standard (AES) AlgorithmKwame Assa-Agyei, Kayode Owa, Funminyi Olajide, Tawfik Al Hadhrami. 1-7 [doi]
- Adaptive Honeypot Defense Deployment: A Stackelberg Game Approach with Decentralized DRL for AMI ProtectionAbdullatif Albaseer, Moqbel Hamood, Mohamed M. Abdallah 0001. 1-5 [doi]
- Visual Question AnsweringAhmed Nada, Min Chen. 6-10 [doi]
- On the Experimental Performance Measurement of Quantum TeleportationVed Dharkar, Suman Kumar. 11-15 [doi]
- A High-Fidelity Partial Face Manipulation Dataset for Enhanced Deepfake DetectionKaitai Tong, Junbin Zhang, Yixiao Wang, Hamid Reza Tohidypour, Panos Nasiopoulos. 16-20 [doi]
- Algorithm for Server Allocation in Delay-Sensitive Internet-of-Things Monitoring ServicesShoya Imanaka, Akio Kawabata, Bijoy Chand Chatterjee, Eiji Oki. 21-25 [doi]
- Credit Card Transactions Fraud Detection for Multiple Consumer BehaviorsBaker Al Smadi, William B. Glisson, Majd Tahat, Hosam Alamleh, Ali Abdullah S. AlQahtani. 26-32 [doi]
- Revisiting Multi-Factor Authentication Token Cybersecurity: A TLS Identity Module Use CasePascal Urien. 33-38 [doi]
- Dragonfly Algorithm Application for Solving the Nurse Scheduling ProblemArghavan Ayoughi, Chi Zhang, Stephen Okeleke, Shufei Li, Wei Xin, Yuhan Yue, Ania Aibin, Michal Aibin. 39-43 [doi]
- Multi-Task Optical Performance Monitoring Using a Transfer Learning Assisted Cascaded Deep Neural Network in WDM SystemsYameng Cao, Di Zhang, Hanyu Zhang, Yan Ling Xue. 44-47 [doi]
- Synergized QoE-Centric Streaming for TeleroboticsMadhurima Ganguly, Abhijan Bhattacharyya, Ashis Sau, Suraj Kumar Mahato. 48-54 [doi]
- Regulating Covert Communication Capacity with Full-Duplex Receiver Against Location-Uncertain EavesdropperRui Xu, Gaolei Li, Yuchen Liu, Yue Zhao 0010, Jiawen Kang, Jianhua Li 0001. 55-59 [doi]
- Optimal Balancing of Data Transfer Time and Cost in High-Performance NetworksLiudong Zuo, Daqing Yun. 60-64 [doi]
- Path Computation in Multi-Switching Multi-Layer NetworksZihe Yi, Lin Chen. 65-69 [doi]
- Security Dataset Augmentation Invariance and Distribution IndependenceGavin Black, William McCullough, Paul F. Roysdon. 70-75 [doi]
- Performance Evaluation of MIMO-FTN Signaling under Multipath Fading Channels with PA Non-LinearityHao-Tse Chiu, Shuhei Saito, Keita Kuriyama, Kentaro Tanaka, Hitoshi Hasegawa, Toshifumi Miyagi, Takeshi Onizawa, Fumiaki Maehara. 76-80 [doi]
- Multi-armed Bandit Algorithm for Online Offloading and Scheduling in Edge Computing EnvironmentXiaoying Han, XiaoHua Xu. 81-87 [doi]
- Ensuring a Semantically Effective IoT Network Through Blockchain with Delayed FeedbackÖmer Gençay, Alperen Balci, Elif Tugce Ceran, Elif Uysal. 88-92 [doi]
- An Impression-Based Video Analysis Method for Video Recommender SystemsAkito Sasahara, Fumiya Yamaguchi, Da Li, Mayumi Ueda, Shinsuke Nakajima. 93-99 [doi]
- Reliable and Low-Latency Communications for Critical Infrastructures Utilizing Wireless Mesh NetworksRitayan Biswas, Joonas Säe, Juho Pirskanen, Jukka Lempiäinen. 100-105 [doi]
- Selfish Mining Attacks in Sharded BlockchainsSheng-Wei Wang. 106-110 [doi]
- A Game Theory Based Rational Mining Strategy in Blockchains With Multiple Rational MinersSheng-Wei Wang. 111-115 [doi]
- Prompt Fix: Vulnerability Automatic Repair Technology Based on Prompt EngineeringPeng Liu, He Wang, Chen Zheng, Yuqing Zhang 0001. 116-120 [doi]
- A Segmentation-Based Data Contention Resolution Method For Optical Named Data NetworkingShimin Chen, Lingyun Zhou, Rui Hou 0003. 121-126 [doi]
- Capacity Improvement with NOMA-CI Precoding for MU-MISO Downlink SystemsYanfei Lu, Qing Li, Qinghe Gao, Yingzhen Wu, Yan Huo, Tao Jing. 127-132 [doi]
- Delayed Broadcast-Based Data Forwarding Strategy for Vehicular Named Data NetworksFei Wang, Rui Hou. 133-138 [doi]
- Smart-Watcher: An AI-Powered IoT Monitoring System for Small-Medium Scale PremisesAhmed Abdelmoamen Ahmed, Bernard Nyarko. 139-143 [doi]
- Measurements of Shadowing Loss at 3 and 7 GHz for Small-Cell Planning in University BuildingSoon-Soo Oh, Dong-Woo Kim. 144-147 [doi]
- Research on SSL/TLS Security Differences Based on RFC DocumentsZiqiu Zheng, Xuejun Li 0007, He Wang, Gaofei Wu, Yuqing Zhang 0001. 147-151 [doi]
- Weighted Multi-Task Vision Transformer for Distraction and Emotion Detection in Driving SafetyYixiao Wang, Zhe Li, Guowei Guan, Yipin Sun, Chunyu Wang, Hamid Reza Tohidypour, Panos Nasiopoulos, Victor C. M. Leung. 152-156 [doi]
- A Product Feature Mentioned Timestamp Extraction Method in Review Videos for Online ShoppingFumiya Yamaguchi, Da Li, Mayumi Ueda, Shinsuke Nakajima. 157-162 [doi]
- Semi-Blind Channel Estimation on 802.11 OFDM Data SymbolsChristopher J. Hansen. 163-167 [doi]
- Foundational Models for Malware Embeddings Using Spatio-Temporal Parallel Convolutional NetworksDhruv Nandakumar, Devin Quinn, Elijah Soba, Eunyoung Kim, Christopher Redino, Chris Chan, Kevin Choi, Abdul-Rahman, Edward Bowen. 168-174 [doi]
- Communication Interchange for Artificial Intelligence SystemsRazvan Cristian Voicu, Aarush Kaunteya Pande, Muhammad Hassan Tanveer, Yusun Chang. 175-181 [doi]
- Semantic-Aware and Goal-Oriented Communications for Object Detection in Wireless End-to-End Image TransmissionFatemeh Zahra Safaeipour, Morteza Hashemi. 182-187 [doi]
- Deception-Based IDS Against ARP Spoofing Attacks in Software-Defined NetworksFabrice Mvah, Vianney Kengne Tchendji, Clémentin Tayou Djamégni, Ahmed H. Anwar, Deepak K. Tosh, Charles A. Kamhoua. 188-192 [doi]
- An Image-Based Plant Weed Detector Using Machine LearningAhmed Abdelmoamen Ahmed, Jamil Ahmed. 193-197 [doi]
- Social Media Development and Multi-Modal Input for Stock Market Prediction: A ReviewJinshui Huang, Jun Wang, Qing Li, Xiaoman Jin. 198-202 [doi]
- Advanced Cyber Deception Framework (ACDF): A Comprehensive StudyMark Maldonado, Caleb Johnson, Manbir Gulati, Todd Jaspers, Paul F. Roysdon. 203-208 [doi]
- Variable Code Size Autoencoder (VCSA) Meets CSI Compression in Model GeneralizationYifei Song, Juan Roa, Renjian Zhao, Zhigang Rong, Weimin Xiao, Jalal Jalali, Baoling Sheen. 209-214 [doi]
- Guaranteeing Partial State Synchronization for UAV Platoon Under Message or UAV LossBaisakhi Chatterjee, Rudra Dutta. 215-220 [doi]
- A Comprehensive Study of Supervised Machine Learning Assisted Approaches for IoT Device IdentificationYong Wang, Bhaskar prasad Rimal, Carson Koball, Michael Fahnlander, Julia Scheaffer, Joshua Hammrich, Paolo Gentry, Dylan Westlund, Tyler Salmen, Connor Ford. 221-227 [doi]
- Performance of SPAD-Detector in The Presence of Atmospheric TurbulenceAbdulmajeed Alanazi, Khairi Hamdi. 228-232 [doi]
- Towards Automatically Matching Security Advisories to CPEs: String Similarity-based Vendor MatchingKylie McClanahan, Qinghua Li. 233-238 [doi]
- A Lightweight Obfuscated Malware Multi-class Classifier for IoT Using Machine LearningWilliam Cassel, Nahid Ebrahimi Majd. 239-243 [doi]
- Edge Computing Ransomware Detection in IoT Using Machine LearningTejesh Radhakrishna, Nahid Ebrahimi Majd. 244-248 [doi]
- Real-Time Detection of Optical Cross-Talk for Autonomous Network DiagnosisMirei Onodera, Akira Hirano. 249-253 [doi]
- Towards Effective Network Intrusion Detection in Imbalanced Datasets: A Hierarchical ApproachMd. Shamim Towhid, Nasik Sami Khan, Md Mahibul Hasan, Nashid Shahriar. 254-258 [doi]
- Machine Learning for Caching Placement in Edge Computing NetworksLiang Zhang 0011, Bijan Jabbari. 259-264 [doi]
- Enhancing Walking Experience: A Walking Route Recommendation System Considering Nearby SpotsKatsuyuki Yamauchi, Da Li, Panote Siriaraya, Yukiko Kawai, Shinsuke Nakajima. 265-270 [doi]
- Cloud Load Balancing Algorithms Performance Evaluation Using a Unified Testing PlatformBingyan Li, Weiliang Liu, Salim Nader, Jiaqi Song, Chengyu Zhang, Michal Aibin. 271-277 [doi]
- Wireless Instant Fault Detection Through Finite-Element Trained Machine LearningKalon M. Bienz, Behnam Ghalamchi. 278-283 [doi]
- Nanocommunication: PHY Advancements in Electromagnetic and Molecular ApproachesPankaj Singh, Su Jin Kim, Sung-Yoon Jung. 284-290 [doi]
- Low-Cost Tree Health Categorization and Localization Using Drones and Machine LearningHovannes Kulhandjian, Brian Irineo, Jacob Sales, Michel Kulhandjian. 296-300 [doi]
- AI-based Road Inspection Framework Using Drones with GPS-less NavigationHovannes Kulhandjian, Jose Maciel Torres, Nicholas Amely, Cruz Nieves, Christian Reeves, Michel Kulhandjian. 301-305 [doi]
- Classification of BLE Packet According to AGC Index with Detection of Non-Ideal Reception CasesMorgane Joly, Éric Renault, Fabian Rivière. 306-310 [doi]
- Proof-of-QoE NOMA Token: A Crypto Rewarding Concept to Incentivize Local Relay In Non-Orthogonal Multiple Access Wireless NetworksKrishna Murthy Kattiyan Ramamoorthy, Wei Wang 0015, Kazem Sohraby, Yanxiao Zhao. 311-315 [doi]
- AoI-Aware Adaptive Relaying in Buffer-Aided Wireless-Powered NOMA Network with Random ArrivalsShi Zhou, Qingchun Chen, Yaxuan Chen, Lei Zheng. 316-322 [doi]
- Performance Evaluation of Loose Beamforming Using Direct-Binary Search in Massive MIMO SystemsYuta Hayashi, Toshihiko Nishimura, Takanori Sato, Yasutaka Ogawa, Takeo Ohgane. 323-328 [doi]
- Performance Analysis of High-Dimensional NOMA System with In-Phase/ Quadrature Index ModulationZhi-Xiang Wang, Jia Hou. 329-333 [doi]
- Effect of Beam Broadening in Directional Beamforming-Based Cellular NetworksGosan Noh. 334-338 [doi]
- An Efficient PLS Scheme for Coded MIMO Systems Under Imperfect Channel EstimationThara Son, Sooyoung Kim. 339-343 [doi]
- Edge Computing That Utilizes In-Network CPUs to Achieve High Capacity and Interruption Tolerance With Fewer Edge ServersKoki Muramatsu, Yoshihiko Uematsu, Satoru Okamoto, Naoaki Yamanaka. 344-348 [doi]
- Incorporating Game Theory with Soft SetsChenqi Li, JingTao Yao 0001. 349-354 [doi]
- DRL-Based Energy Efficient Power Adaptation for Fast HARQ in the Finite Blocklength RegimeXinyi Wu, Deli Qiao. 355-360 [doi]
- Peak Cancellation Signal-Based Parallel PAPR Reduction Method Using Low-Dimensional Null Space in Massive MIMO-OFDMJun Saito, Takanori Hara, Kenichi Higuchi. 361-365 [doi]
- Transmitter Filtering-aided Sparse Activity Detection for TDD-based Random AccessHiroki Fujimoto, Takanori Hara, Kenichi Higuchi. 366-370 [doi]
- DCCTA: Age of Information in Slotted ALOHA Under Duty Cycle ConstraintsOrhan Tahir Yavascan, Mutlu Ahmetoglu, Elif Uysal, Umut Gurbuz, Ömer Gençay, Alperen Balci. 371-375 [doi]
- Multi-Objective Cognitive Routing in Space DTNsRicardo Lent. 376-381 [doi]
- Power-scheduled Routing Strategy for Quantum Key Distribution over Classical Optical NetworksYuhang Liu, Xiaosong Yu, Yongli Zhao, Avishek Nag. 382-386 [doi]
- Bayesian Game for Cyber Deception Against Remote Attack on Automotive SystemsPriva Chassem Kamdem, Alain B. Zemkoho, Laurent Njilla, Marcellin Nkenlifack, Charles A. Kamhoua. 387-393 [doi]
- Measuring Data Similarity for Efficient Federated Learning: A Feasibility StudyFernanda Famá, Charalampos Kalalas, Sandra Lagén, Paolo Dini. 394-400 [doi]
- Infrastructure Cost Analysis for Running Timetabling Software Using Various Deployment Architectures in the CloudSommer Harris, Jaelyn Ma, Meet Patel, Kshitij Nair, Niranjan Velraj, Michal Aibin. 401-406 [doi]
- Parameter tuning for accurate heart rate measurement using Wi-Fi signalsBrenda G. Gouveia, Iandra Galdino, Egberto Caballero, Julio C. H. Soto, Taiane Coelho Ramos, Raphael Guerra, Débora C. Muchaluat-Saade, Célio Vinicius N. Albuquerque. 407-411 [doi]
- Dynamic Online Modulation Recognition using Incremental LearningAli Owfi, Ali Abbasi, Fatemeh Afghah, Jonathan D. Ashdown, Kurt A. Turck. 412-416 [doi]
- Deep Learning-based Malicious Energy Attack Detection in Sustainable IoT NetworkXinyu Zhang, Long Li, Lina Pu, Jing Yang, Zichen Wang, Rong Fu, Zhipeng Jiang. 417-422 [doi]
- Cross-Temporal Detection of Novel Ransomware Campaigns: A Multi-Modal Alert ApproachSathvik Murli, Dhruv Nandakumar, Prabhat Kumar Kushwaha, Cheng Wang, Christopher Redino, Abdul-Rahman, Shalini Israni, Tarun Singh, Edward Bowen. 423-429 [doi]
- Demystifying Cyberattacks: Potential for Securing Energy Systems With Explainable AIShuva Paul, Sanjana Vijayshankar, Richard Macwan. 430-434 [doi]
- Managing Failures and Service Quality in the Context of NFVSiamak Azadiabad, Ferhat Khendek. 435-440 [doi]
- Generating Synthetic Time-Series Data on Edge Devices Using Generative Adversarial NetworksMd Faishal Yousuf, Shaad Mahmud. 441-445 [doi]
- Speed Testing for Measuring Network Traffic in a Smart Network SwitchSouryendu Das, Stavros Kalafatis. 446-450 [doi]
- Adaptive Channel Switching for Connected Vehicles under Extreme Weather Conditions: A Reinforcement Learning Based ApproachJian Liu 0031, Chin-Tser Huang. 451-455 [doi]
- Detecting Deepfakes Using GAN Manipulation Defects in Human EyesElisabeth Tchaptchet, Elie Fute Tagne, Jaime C. Acosta, Danda B. Rawat, Charles A. Kamhoua. 456-462 [doi]
- Enhancing UAV Security Through Zero Trust Architecture: An Advanced Deep Learning and Explainable AI AnalysisEkramul Haque, Kamrul Hasan, Imtiaz Ahmed 0001, Md. Sahabul Alam, Tariqul Islam 0001. 463-467 [doi]
- Towards Cycle-accurate Simulation of xBGASJie Li, John D. Leidel, Brian Page, Yong Chen. 468-472 [doi]
- GRASP and ILS Based Meta-Heuristic Approximation Algorithms for Optimal Virtual Network Synthesis (VNS) in Multi-AS EnvironmentYong Xue, Alexander Brodsky 0001, Daniel A. Menascé. 473-479 [doi]
- WGAN-Based Oversampling for QoS-Aware M2M Network Power AllocationJunxiu Zhou, Yangyang Tao. 480-484 [doi]
- Sentiment Analysis With Lipschitz Recurrent Neural Networks Based Generative Adversarial NetworksMahmudul Hasan 0020, Sachin Shetty. 485-489 [doi]
- Deep Explainable Content-Aware Per-Scene Video EncodingAndy Neparidze, Ahmed Amine Mchayaa, Julian David Schäfer, Daniel Silhavy, Robert Seeliger, Stephan Steglich, Stefan Arbanowski. 490-494 [doi]
- Unified View of IoT and CPS Security and PrivacyLan Luo, Christopher Morales-Gonzalez, Shan Wang 0008, Zhen Ling, Xinwen Fu. 495-499 [doi]
- AnDet: ML-Based Anomaly Detection of UEs in a Multi-cell B5G Mobile Network for Improved QoSAmar Sinha, Anmol Agrawal, Sandip Roy 0001, Venkanna Uduthalapally, Debanjan Das, Rajarshi Mahapatra, Sachin Shetty. 500-505 [doi]
- Targeted Transfer Learning: Leveraging Optimal Transport for Enhanced Knowledge TransferSayyed Farid Ahamed, Kazi Aminul Islam, Sachin Shetty. 506-510 [doi]
- Beamforming with Free Energy Principle under Hierarchical CodebookTatsuya Otoshi, Masayuki Murata 0001. 511-517 [doi]
- Trend Encoder with Attentive Neural Process: Node Performance Extrapolation for Non-Time-Series DatasetsKyota Hattori, Tomohiro Korikawa, Chikako Takasaki. 518-522 [doi]
- Heterogeneous GNN with Express Edges for Intrusion Detection in Cyber-Physical SystemsHongwei Li, Danai Chasaki. 523-529 [doi]
- Black-Box Attacks Against Signed Graph Analysis via Balance PoisoningJialong Zhou, Yuni Lai, Jian Ren 0001, Kai Zhou 0001. 530-535 [doi]
- On Building Automation Systems and AttacksChristopher Morales-Gonzalez, Matthew Harper, Michael Cash, Qun Zhou Sun, Xinwen Fu. 536-542 [doi]
- On the Importance of Trust in Next-Generation Networked Cyber-Physical SystemsNariman Torkzaban, Anousheh Gholami, John S. Baras. 543-548 [doi]
- Privacy-Preserving Characterization and Data PublishingJian Ren 0001, Tongtong Li. 549-553 [doi]
- OBSERVE: Blockchain-Based Zero Trust Security Protocol for Connected and Autonomous Vehicles (CAVs) Data Using Simple Machine LearningBo Sullivan, Junaid Ahmed Khan. 554-559 [doi]
- Fed2Com: Towards Efficient Compression in Federated LearningYu Zhang, Wei Lin, Sisi Chen, Qingyu Song, Jiaxun Lu, Yunfeng Shao 0001, Bei Yu, Hong Xu. 560-566 [doi]
- Straggler Mitigation in Edge Computing with Coded Compressed SensingYangyang Tao, Junxiu Zhou. 567-572 [doi]
- Cooperative Load Balancing of Neighboring Edge Clouds with LISPToru Furusawa, Akihiro Nakao. 573-578 [doi]
- A Surrogate Tiny Machine Learning Model of Variational Autoencoder For Real-Time Baseline Correction of Magnetometer DataTalha Siddique, Shaad Mahmud. 579-583 [doi]
- Comparison of FHE Schemes and Libraries for Efficient Cryptographic ProcessingArisa Tsuji, Masato Oguchi. 584-590 [doi]
- Characteristics Aware Video Packet Dropping and Packet WashLijun Dong, Richard Li. 591-597 [doi]
- Quality of Experience Modelling and Analysis for Live Holographic TeleportationCarl C. Udora, Peng Qian, Sweta Anmulwar, Anil Fernando, Ning Wang. 598-604 [doi]
- Implicit Neural Representation-Based Hybrid Digital-Analog Image DeliveryAkihiro Kuwabara, Yutaro Osako, Sorachi Kato, Takuya Fujihashi, Toshiaki Koike-Akino, Takashi Watanabe 0001. 605-610 [doi]
- Context-Aware Edge-Cloud Collaborative Scene Text RecognitionPuning Zhang, Changfeng Liu, Honggang Wang 0001, Dapeng Wu 0002, Ruyan Wang, Hong Zou. 611-617 [doi]
- A Secure and Robust ECG Signal Transmission System for Cardiac Arrhythmia IdentificationKun Hua, Hansong Xu, Tigang Jiang. 618-623 [doi]
- Stereo-Aided Blockage Prediction for mmWave V2X CommunicationsShinsuke Bannai, Katsuya Suto. 624-628 [doi]
- CyPA: A Cyclic Prefix Assisted DNN for Protocol Classification in Shared SpectrumWenhan Zhang 0003, Marwan Krunz, Md. Rabiul Hossain. 629-634 [doi]
- MIA-BAD: An Approach for Enhancing Membership Inference Attack and its Mitigation with Federated LearningSoumya Banerjee 0001, Sandip Roy 0001, Sayyed Farid Ahamed, Devin Quinn, Marc Vucovich, Dhruv Nandakumar, Kevin Choi, Abdul-Rahman, Edward Bowen, Sachin Shetty. 635-640 [doi]
- Accelerating Autonomous Cyber Operations: A Symbolic Logic Planner Guided Reinforcement Learning ApproachRyan Kerr, Steven H. H. Ding, Li Li 0009, Adrian Taylor. 641-647 [doi]
- Design of Smoothed L0 UnfoldingNet Architecture for OFDM Channel EstimationZhu Lin Tao, Jia Hou. 648-652 [doi]
- RMF-GPT - OpenAI GPT-3.5 LLM, Blockchain, NFT, Model Cards and OpenScap Enabled Intelligent RMF Automation SystemEranga Bandara, Sachin Shetty, Abdul-Rahman, Ravi Mukkamala, Peter Foytik, Xueping Liang. 653-658 [doi]
- Trustful Blockchain-Enabled Identity Management for VANET with Short-Latency AuthenticationJiayue Zhou, Jianan Hong, Chengchen Zhu, Futai Zou, Cunqing Hua. 659-663 [doi]
- When ChatGPT Meets Vulnerability Management: The Good, the Bad, and the UglyKylie McClanahan, Sky Elder, Marie Louise Uwibambe, Yaling Liu, Rithyka Heng, Qinghua Li. 664-670 [doi]
- Could Min-Max Optimization be a General Defense Against Adversarial Attacks?Rana Abou Khamis, Ashraf Matrawy. 671-676 [doi]
- An SDN-Enabled Elliptic-Curve Diffie-Hellman Key Exchange Towards Secure P2P NetworkingWenjun Fan, Siyuan Wu, Hao Chen. 677-683 [doi]
- Decentralized Authentication for Web of Things: a Self-Sovereign Identity (SSI)-Based SolutionBiagio Boi, Christian Esposito 0001. 684-688 [doi]
- Synthetic Power Consumption Data Generation For Appliance Operation ModesAbdelkareem Jaradat, Hanan Lutfiyya, Anwar Haque. 689-694 [doi]
- Mitigating Pessimism for Guaranteeing Safety Despite Physical Errors in CPS'sJihwan Kim, Dongmin Shin, Chang-Gun Lee. 695-699 [doi]
- Optimal Workload Allocation for Distributed Edge Clouds with Renewable Energy and Battery StorageDuong Thuy Anh Nguyen, Jiaming Cheng, Ni Trieu, Duong Tung Nguyen. 700-705 [doi]
- Accelerator-Aware Computation Offloading Under Timing ConstraintsVincent Latzko, Christian Vielhaus, Mahshid Mehrabi, Frank H. P. Fitzek. 706-710 [doi]
- Security-Enhanced WireGuard Protocol Design Using Quantum Key DistributionLutong Chen, Kaiping Xue, Jian Li, ZhongHui Li, Nenghai Yu. 718-723 [doi]
- Correlation-Aware and Personalized Privacy-Preserving Data CollectionDongxiao Yu, Kaiyi Zhang, Youming Tao 0001, Wenlu Xu, Yifei Zou, Xiuzhen Cheng 0001. 724-729 [doi]
- SEPPI: Secure and Privacy-Preserving Invitation for Unified Communication MeetingsThomas Reisinger, Eerke Albert Boiten, Isabel Wagner. 730-736 [doi]
- DRL-Based Latency-Aware Network Slicing in O-RAN with Time-Varying SLAsRaoul Raftopoulos, Salvatore D'Oro, Tommaso Melodia, Giovanni Schembra. 737-743 [doi]
- WiSegRT: Dataset for Site-Specific Indoor Radio Propagation Modeling with 3D Segmentation and Differentiable Ray-Tracing: (Invited Paper)Lihao Zhang, Haijian Sun, Jin Sun, Rose Qingyang Hu. 744-748 [doi]
- QoE-Aware Airborne Communication Infrastructure for Surveillance in WildfiresPraveen Fernando, Jin Wei-Kocsis. 749-753 [doi]
- DL-SIC: Deep Learning Aided Successive Interference Cancellation in Shared SpectrumZhiwu Guo, Wenhan Zhang, Ming Li, Marwan Krunz, Mohammad Hossein Manshaei. 754-760 [doi]
- An Attention-based AI Model for 3D Beam Prediction in THz Unmanned Aerial Vehicle CommunicationMuhammad Enayetur Rahman, Md. Shirajum Munir, Sachin Shetty. 761-766 [doi]
- Design and Implementation of a Smart Agricultural Robot bullDOG (SARDOG)Hovannes Kulhandjian, Yue Yang, Nicholas Amely. 767-771 [doi]
- Multi-Agent DQN with Sample-Efficient Updates for Large Inter-Slice Orchestration ProblemsPavlos Doanis, Thrasyvoulos Spyropoulos. 772-777 [doi]
- Malware Detection for Portable Executables Using a Multi-input Transformer-Based ApproachTing-Li Huoh, Timothy Miskell, Onur Barut, Yan Luo, Peilong Li, Tong Zhang. 778-782 [doi]
- QE-DBA: Query-Efficient Decision-Based Adversarial Attacks via Bayesian OptimizationZhuosheng Zhang 0003, Noor Ahmed, Shucheng Yu. 783-788 [doi]
- Graph Isomorphism-Characterization and Efficient AlgorithmsJian Ren 0001, Tongtong Li. 789-793 [doi]
- Resource-efficient Parallel Split Learning in Heterogeneous Edge ComputingMingjin Zhang, Jiannong Cao 0001, Yuvraj Sahni, Xiangchun Chen, Shan Jiang 0005. 794-798 [doi]
- Reinforcement Learning with Large Language Models (LLMs) Interaction for Network ServicesHongyang Du, Ruichen Zhang, Dusit Niyato, Jiawen Kang, Zehui Xiong, Dong In Kim. 799-803 [doi]
- Hyperclique: A Novel P2P Network Structure for Blockchain SystemsXiaonan You, Shengli Zhang, Taotao Wang, Soung Chang Liew. 804-809 [doi]
- Hydra: A Scalable Decentralized P2P Storage Federation for Large Scientific DatasetsJustin Presley, Xi Wang, Xusheng Ai, Tianyuan Yu, Tym Brandel, Proyash Podder, Varun Patil, Alex Afanasyev, F. Alex Feltus, Lixia Zhang 0001, Susmit Shannigrahi. 810-816 [doi]
- Tamperproof Data Transmission to Offline IoT Devices in a Zero-Trust EnvironmentRichard Vogel, Robert Manthey, Matthias Baumgart 0003, Christian Roschke, Marc Ritter, Matthias Vodel. 817-822 [doi]
- A Reconstruction Forest-Based Interest Flooding Attack Detection Method in Named Data NetworkingGuanglin Xing, Xiaoqi Li, Rui Hou 0003. 823-829 [doi]
- Multicast Service Deployment Using Information Centric Cloud-Native Network FunctionsYusaku Hayamizu, Hitoshi Asaeda. 830-835 [doi]
- Distributed Beamforming by Multi-Agent Active InferenceTatsuya Otoshi, Masayuki Murata 0001. 836-842 [doi]
- Battery Life: Performance Analysis and Comparison between Wi-Fi, CBRS, and Macro Deployment SystemVanlin Sathya, Aasawaree Deshmukh, Manan Shah, Mehmet Yavuz. 843-849 [doi]
- A Routing Method with Link Information-based Rule Selection in Non-Terrestrial NetworksTomohiro Korikawa, Chikako Takasaki, Kyota Hattori, Hidenari Oowada. 850-855 [doi]
- Reliability-Aware Offloading in UAV-Aided Mobile Edge Network by Lyapunov OptimizationJingjing Yao, Semih Cal, Xiang Sun 0001. 856-861 [doi]
- Performance Evaluation of DSRC and C-V2X Coexistence in the 5.895-5.925 GHz SpectrumMohammad Hossein Manshaei, Marwan Krunz, Amal Yousseef. 862-867 [doi]
- Distributed LSTM-based Slice Resource Allocation for Beyond 5G NetworksAli Ehsanian, Thrasyvoulos Spyropoulos. 868-874 [doi]
- Federated Learning-Based Solution for DDoS Detection in SDNJovita Mateus, Guy-Alain Lusilao-Zodi, Antoine B. Bagula. 875-880 [doi]
- Optimal Dynamic Resource Allocation for Multi-RIS Assisted Wireless Network: A Causal Reinforcement Learning ApproachYuzhu Zhang, Hao Xu. 881-885 [doi]
- Self-Supervised Learning for User LocalizationAnkan Dash, Jingyi Gu, Guiling Wang 0001, Nirwan Ansari. 886-890 [doi]
- An Actor-Critic Approach for Resource Allocation in Energy Harvesting-Powered Wireless Body Area NetworkKhaled Sabahein, Feng Wang, Zhonghui Wang. 891-897 [doi]
- Participation Selection in Mobile Crowd Sensing with Diversity EnsuresJiahui Jin, Ting Li. 898-902 [doi]
- An Authorizable Threshold Signature Scheme for Secure Sharing and Mining of Power IoT DataWei Chen, Xiaotian Xu, Cong Hou, Ranxin Gao, Guanlin Si, Yue Zhang. 903-909 [doi]
- Cross-Tier Coordination in Spectrum Sharing: A Blockchain ApproachShuo Wang, Chen Sun, Haojin Li, Tao Cui. 910-914 [doi]
- Blockchain-Assisted Cross-Domain Data Governance for Social ComputingShulei Zeng, Yao Sun, Mugen Peng. 915-920 [doi]
- mmWave Beam Selection in Dynamic Multi-Path Environments: A POMDP ApproachEce Bingöl, Eylem Ekici. 921-926 [doi]
- PythonRepo: Persistent In-Network Storage for Named Data NetworkingTianyuan Yu, Zhaoning Kong, Xinyu Ma, Lan Wang, Lixia Zhang 0001. 927-931 [doi]
- Mass Configuration of Heterogeneous IIoT Nodes: A Proposal and Experimental EvaluationDarius Saif, Ashraf Matrawy. 932-937 [doi]
- Implementation of Proxy to Make Content Shared on BitTorrent Retrievable from CCNKohei Okazaki, Junichi Funasaka. 938-943 [doi]
- Roaming Performance Analysis and Comparison Between Wi-Fi and Private Cellular NetworkVanlin Sathya, Aasawaree Deshmukh, Mohit Goyal, Mehmet Yavuz. 944-950 [doi]
- A Hybrid Fiber-Femtocell Indoor Network to Support Low-Latency and High-Bandwidth Indoor Communication ApplicationsLihua Ruan, Hongyi Zhu. 951-956 [doi]
- Radio Propagation Environment Prediction Method for UAV-Assisted Cellular Networks with Millimeter-Wave BeamformingShunsuke Fujio, Kazuyuki Ozaki. 957-961 [doi]
- A Mobile App-Based Indoor Mobility Detection Approach Using Bluetooth Signal StrengthMuztaba Fuad, Anthony Smith, Debzani Deb. 962-968 [doi]
- A Min-Max Approximation-Based SDP Approach to Robust Vehicle Location Estimation in VANETSTan-Jan Ho, Hua-Yu Luo. 969-973 [doi]
- Detecting and Counteracting Adversaries in Wireless Multicast over Fading ChannelsNadieh Moghadam. 974-977 [doi]
- Data-Driven Joint Demodulation and Decoding in THz Communication SystemsAbigail O. Oyekola, Imtiaz Ahmed 0001, Danda B. Rawat, Ramesh Annavajjala, Sachin Shetty. 978-983 [doi]
- AI-powered Emergency Keyword Detection for Autonomous VehiclesHovannes Kulhandjian, Brandon Poorman, Javier Gutierrez, Michel Kulhandjian. 984-988 [doi]
- Client Selection in Federated Learning: A Dynamic Matching-Based Incentive MechanismSai Sharanya Yellampalli, Mikulas Chalupa, Jingyi Wang, Hyo Jung Song, Xinyue Zhang 0001, Hao Yue, Miao Pan. 989-993 [doi]
- A Cluster-based Privacy-Enhanced Hierarchical Federated Learning Framework with Secure AggregationChia-Yu Lin, Chih-Hung Han, Wei-Chih Yin, Ted T. Kuo. 994-999 [doi]
- Constrained Bayesian Optimization of VANET Safety Messaging Using Deep Learning Neural NetworksAidan Samuel Wright, Sandeep John Philip, Xiaomin Ma. 1000-1005 [doi]
- Enhancing Federated Learning with Self-Determining Mechanism in MECRuixin Li, Chun Wang, Zibin Zheng, Huawei Huang. 1006-1010 [doi]
- 5G-and-Beyond Positioning Against Amplify-and-Forward Relay JammingHyuck M. Kwon, Jyothi Sri Sai Manne, Khanh Pham. 1011-1015 [doi]
- Comparisons of TDM and FDM Pilot Signals for Phase Noise Estimation with High-Order QAM for DFT-Spread OFDMRyota Kuribayashi, Mamoru Sawahashi. 1016-1021 [doi]
- Intermittent Markov Frequency-Hopping Entropy RateHyuck M. Kwon. 1022-1026 [doi]
- Analysis and Empirical Validation of Visible Light Path Loss Model for Vehicular Sensing and CommunicationHisham Abuella, Md Zobaer Islam, Russ Messenger, John F. O'Hara, Sabit Ekin. 1027-1031 [doi]
- Beamforming Design for MIMO DFRC Systems with Transmit Covariance ConstraintsChenhao Yang, Xin Wang, Wei Ni, Yi Jiang. 1032-1036 [doi]
- Joint Task Offloading and Service Migration in RIS Assisted Vehicular Edge Computing Network Based on Deep Reinforcement LearningXiangrui Ning, Ming Zeng 0004, Zesong Fei. 1037-1042 [doi]
- Extended Physarum Solver for Capacity-Constraint RoutingKohsuke Sonoda, Hiroshi Katada, Shigeru Shimamoto, Taku Yamazaki, Takumi Miyoshi. 1043-1047 [doi]
- User Grouping with Fairness Consideration in Massive MIMO System with Varying Channel QualityShengping Zhou, Ming Zeng 0004, Zesong Fei. 1048-1053 [doi]
- MEGATRON: Machine Learning in 5G with Analysis of Traffic in Open Radio Access NetworksMauro Belgiovine, Jerry Gu, Joshua Groen, Miquel Sirera, Utku Demir, Kaushik R. Chowdhury. 1054-1058 [doi]
- [Invited Paper] Time Gating Control Approaches for Time Critical Applications from Perspective of Wireless LANs and All Optical NetworksHideki Tode, Yosuke Tanigawa, Ratha Yeu, Akio Hasegawa. 1059-1064 [doi]
- A Dual Transfer Framework for Cooperative Spectrum Sensing in Cognitive RadioLusi Li, Rui Ning, Ziyu Wang, Shuai Hao. 1065-1070 [doi]
- Fast Frequency-Direction Mapping Design for Data Communication With True-Time-Delay Array ArchitectureDing Zhao, Ibrahim Pehlivan, Aditya Wadaskar, Danijela Cabric. 1071-1076 [doi]
- DTL-Based CSI Feedback Combined with Continual Learning in FDD Massive MIMO SystemsMayuko Inoue, Tomoaki Ohtsuki, Mondher Bouazizi. 1077-1081 [doi]
- A Deep Reinforcement Learning-based Contention Window Avoidance Scheme for Distinguishing Network Service PrioritiesXiaowei Nie, Demin Wang, Yuqing Zhang, Xiaoduo Pan, ZhiBin Zuo. 1082-1086 [doi]
- Performance Assessment of Intent Sharing in Infrastructure-Assisted Cooperative Perception ServicesAhmed Hamdi Sakr, Sergei S. Avedisov, Shishir Manjunatha, Onur Altintas. 1087-1091 [doi]
- AIGC for RF Sensing: The Case of RFID-Based Human Activity RecognitionZiqi Wang, Shiwen Mao. 1092-1097 [doi]
- A Secure Hierarchical Federated Learning Using Dirichlet-based Trust ManagementGrace Colette Tessa Masse, Abderrahim Benslimane, Vianney Kengne Tchendji, Ahmed H. Anwar. 1098-1103 [doi]
- Energy-Efficient Multi-Hop LoRaWAN with Transmission and Synchronization ControlHiroto Shida, Aoto Kaburaki, Koichi Adachi. 1104-1108 [doi]
- LBT-Based Resource Allocation Methods Utilizing Periodicity of Traffic in LPWANAoto Kaburaki, Koichi Adachi, Osamu Takyu, Mai Ohta, Takeo Fujii. 1109-1113 [doi]
- Game-Theoretic Defense Strategies for Mitigating Gray Hole Attacks on Energy-Limited Sensors in Wireless Sensor NetworksInes Carole Kombou Sihomnou, Abderrahim Benslimane, Ahmed Hemida, Gabriel Deugoue, Charles A. Kamhoua. 1114-1120 [doi]
- Decentralized Learning based Optimal Design for RIS-assisted Multi-user Ad-Hoc Network: A Multi-Player Multi-Armed Bandits ApproachYuzhu Zhang, Hao Xu. 1121-1125 [doi]
- Computation Rate Maximization in STAR-RIS Aided Wireless Powered Mobile Edge Computing Networks with NOMAMohammad Hossein Alishahi, Paul Fortier, Ming Zeng, Fang Fang. 1126-1131 [doi]
- 5GPS: 5G Femtocell Placement Strategies for Ultra-Precise Indoor Localization in the MetaverseAlireza Famili, Tolga O. Atalay, Angelos Stavrou. 1132-1138 [doi]
- Performance Analysis of LDPC Coded Outdoor Long-Distance Imaging MIMO SystemDaiki Ishikawa, Chedlia Ben Naila, Hiraku Okada, Masaaki Katayama. 1139-1143 [doi]
- Cuckoos United: Extending Cuckoo Filters for Message Dissemination in Vehicular NetworksTouhid Hossain Pritom, Simon Welzel, Florian Klingler. 1144-1148 [doi]
- Quantum Error Corrected Fidelity Routing Design for Long-Distance Quantum NetworksYuto Lim, Lishuai Yuan, Zhaowei Zhong. 1149-1153 [doi]
- Contention - Based Operation in TDM-Type Passive Optical NetworksDenis A. Khotimsky, Eugene B. DeFrancisci, Gregory K. Sherrill, Rajesh Yadav. 1154-1157 [doi]
- Area4U: Predicting Interaction Hotspots for Large Public DisplaysXinyuan Zhang, Xiaoyang Mao, Wan-Young Chung, Zhigang Gao, Jianwen Feng, Kentaro Go. 1158-1163 [doi]
- A Measurement Investigation of ERC-4337 Smart Contracts on Ethereum BlockchainZibin Lin, Taotao Wang, Chonghe Zhao, Shengli Zhang, Qing Yang, Long Shi. 1164-1170 [doi]
- Cooperative Mobility Control for Maintaining Required Throughput in Multiple Ad Hoc Networks with Autonomous Mobile RobotsKota Makino, Takeshi Hirai, Tutomu Murase. 1171-1176 [doi]