Abstract is missing.
- Resilient information management system for disaster situationsToshiaki Miyazaki, Kazuya Anazawa, Yusuke Igarashi, Peng Li, Song Guo. 1-6 [doi]
- Low latency Interleave Division Multiple Access SystemTran Thi Thao Nguyen, Leonardo Lanante, Yuhei Nagao, Masayuki Kurosaki, Shingo Yoshizawa, Hiroshi Ochi. 7-12 [doi]
- Heron-Bilateration based location estimation technique for indoor WLANSushil Tiwari, Vinod Kumar Jain. 13-17 [doi]
- Delay analysis of ARQ protocol for energy-efficient transmission in WBANNattakorn Promwongsa, Teerapat Sanguankotchakorn. 18-23 [doi]
- The multipolling mechanism based on the prioritization for WLAN network with multiple access pointsTran Duc Le. 24-29 [doi]
- A CCN-based multi-source and multi-path transport mechanism for wireless mobile networksMahfuzur Rahman Bosunia, Seonghyuck Kwon, Seong-Ho Jeong. 30-34 [doi]
- On the effect of wireless communication range heterogeneity on WSN performanceShota Agemura, Kei Katayama, Hiroyuki Ohsaki. 35-40 [doi]
- An anomaly detection technique in wearable wireless monitoring systems for studies of gait freezing in Parkinson's diseaseThuy T. Pham, Diep N. Nguyen, Eryk Dutkiewicz, Alistair Lee McEwan, Philip Heng Wai Leong. 41-45 [doi]
- A trusted computing architecture for health careAmar A. Rasheed. 46-50 [doi]
- Deadline-aware routing with probabilistic delay guarantee in cyber-physical systemsByeong-Hoon Jang, Sunghwa Son, Kyung-Joon Park. 51-53 [doi]
- Exploiting IoT services by integrating emotion recognition in Web of ObjectsMuhammad Aslam Jarwar, Ilyoung Chong. 54-56 [doi]
- Harvesting and Energy aware Adaptive Sampling Algorithm for guaranteeing self-sustainability in Wireless Sensor NetworksChangmin Lee, Jaiyong Lee. 57-62 [doi]
- A mobility-based temperature-aware routing protocol for Wireless Body Sensor NetworksBeomsu Kim, SeokYoon Kang, JuHo Lim, Kyong Hoon Kim, Ki-Il Kim. 63-66 [doi]
- Handover in outdoor Visible Light Communication systemDang Quang Hien, Myungsik Yoo. 67-69 [doi]
- Delayed Dynamic Bandwidth Channel Access scheme for IEEE 802.11ac WLANsWoojoong Kim, Jae-Pil Jeong, Young-Joo Suh. 70-75 [doi]
- Adaptive routing in wireless sensor networks under electromagnetic interferenceTrung Hoang, Ruslan Kirichek, Alexander Paramonov, Franck Houndonougbo, Andrey Koucheryavy. 76-79 [doi]
- Decoding method comparisons in Light-to-Camera communicationBummin Kim, Hyunha Park, Yusung Kim, Ikjun Yeom. 80-82 [doi]
- Performance of dual-hop communication systems with partially differential modulations scheme in railway environmentsWoong Cho, Hanbyeog Cho. 83-85 [doi]
- A multi-objective WLAN planning methodZhaoyu Zhang, Xin Di, Jun Tian, Zhou Zhu. 86-91 [doi]
- Optimization of multi-channel access in learning assisted measurement of channel occupancy ratio by USRPTakumi Kimura, Osamu Takyu, Fumihito Sasamori, Shiro Handa, Takeo Fujii, Mai Ohta. 92-96 [doi]
- Reactive configuration updating for Intent-Based NetworkingYoshiharu Tsuzaki, Yasuo Okabe. 97-102 [doi]
- Performance evaluation and improvement of large-scale Content-Centric NetworkingRyo Nakamura, Hiroyuki Ohsaki. 103-108 [doi]
- Static lightpath establishment method with multi-path routing in elastic optical networksMasaaki Takezaki, Kouji Hirata. 109-111 [doi]
- Sampled-data synchronization for chaotic Lur'e systems and application to secure communicationJunmin Park, PooGyeon Park. 112-117 [doi]
- Efficient mobility support for content delivery in mobile communicationsMahfuzur Rahman Bosunia, Seong-Ho Jeong. 118-121 [doi]
- Improved localized distributed routing algorithm with smart mechanismMinh-Anh Tran, Nguyen Chien Trinh. 122-127 [doi]
- IPv6-based geographical forwarding in the vehicular network environment for ITSSanghyun Ahn. 128-131 [doi]
- A performance evaluation of Software Defined Networking load balancers implementationsWalber Jose Adriano Silva, Kelvin Lopes Dias, Djamel Fawzi Hadj Sadok. 132-137 [doi]
- Channel allocation and transmission power management scheme in software defined network-based WLAN environmentsHwi-Young Lee, Won-Jin Lee, Minsu Shin, Min Young Chung. 138-142 [doi]
- An optimized flow management mechanism in OpenFlow networkEugene Tan Boon Hong, Chong Yung Wey. 143-147 [doi]
- Distributed service function failover mechanism in service function chainingDongeun Suh, Hosung Baek, Seokwon Jang, Sol Han, Sangheon Pack. 148-150 [doi]
- A Network Service Permission Control Platform for Service Function ChainingAnh-Vu Vu, Younghan Kim. 151-156 [doi]
- Routing method with flow entry aggregation for software-defined networkingKoichi Yoshioka, Kouji Hirata, Miki Yamamoto. 157-162 [doi]
- Optimizing resource allocation for elastic security VNFs in the SDNFV-enabled cloud computingTrung V. Phan, Nguyen Khac Bao, Youngpin Kim, Hyun-Jin Lee, Minho Park. 163-166 [doi]
- SLA-driven Ordered Variable-width Windowing for service-chain deployment in SDN datacentersYuan-Ming Pai, Charles H.-P. Wen, Li-Ping Tung. 167-172 [doi]
- Data center traffic engineering using Markov approximationKouji Hirata, Miki Yamamoto. 173-178 [doi]
- A bandwidth friendly architecture for Cloud GamingMuhammad Usman, Adnan Iqbal, Mariam Kiran. 179-184 [doi]
- RT-VNE: A real-time strategy for Virtual Network Embedding towards resource efficiencyLam Duc Nguyen, Naeon Kim, Seohyang Kim, Chong-kwon Kim. 185-190 [doi]
- Quality-of-service aware resource allocation for virtual machinesChiwook Jeong, Taejin Ha, JongWon Kim 0001, Hyuk Lim. 191-193 [doi]
- On demand inter domain mobility in SDN based Proxy Mobile IPv6Syed M. Raza, Pankaj Thorat, Rajesh Challa, Hyunseung Choo. 194-199 [doi]
- Performance improvement of chaos MIMO transmission scheme by LDPC code concatenation using symbol MAP detection and STBCNaoto Horiike, Eiji Okamoto, Tetsuya Yamamoto. 200-205 [doi]
- Content-aware RaptorQToan Duc Bui, Phuc Chau, Jitae Shin. 206-209 [doi]
- Analysis of adaptive modulation performance in networks with multiple access Slotted AlohaAna Paula Teles Ribeiro da Silva, Jose Marcos Camara Brito. 210-215 [doi]
- Analysis of computer simulated and field experimental results in multiuser MIMO system considering errors of CSI feedback under multipath fading environmentsKazuhiro Yamaguchi, Takahiro Yamaguchi, Naoki Ginoza, Kyoka Abe, Hideaki Matsue, Kunio Uekado, Takakazu Namera, Satoshi Nanamatsu. 216-221 [doi]
- Iterative algorithm for OFDM transmission over Rayleigh channelsNatasa S. Zivic, Obaid Ur Rehman, Christoph Ruland. 222-224 [doi]
- Transmission performance for SDM-PON using biased signal sending schemeHiromi Ueda. 225-230 [doi]
- Improving network performance by using multiple power-constrained amplify-and-forward relaysDac-Binh Ha, Duc-Dung Tran, Duy-Hung Ha, Anh-Nhat Nguyen. 231-235 [doi]
- Host independent and distributed detection system of the network attack by using OpenFlowRyosuke Miyazaki, Junpei Kawamoto, Shinichi Matsumoto, Kouichi Sakurai. 236-241 [doi]
- A ranked searchable encryption scheme for encrypted data hosted on the Public CloudShahzaib Tahir, Muttukrishnan Rajarajan, Ali Sajjad. 242-247 [doi]
- Malware originated HTTP traffic detection utilizing cluster appearance ratioHideki Ogawa, Yukiko Yamaguchi, Hajime Shimada, Hiroki Takakura, Mitsuaki Akiyama, Takeshi Yagi. 248-253 [doi]
- Enhanced password processing scheme based on visual cryptography and OCRDana Yang, Inshil Doh, Kijoon Chae. 254-258 [doi]
- Analysis of link discovery service attacks in SDN controllerTri-Hai Nguyen, Myungsik Yoo. 259-261 [doi]
- THE: Time Hint Enabled RF powered computingKilyong Shin, Yusung Kim, Ikjun Yeom. 262-264 [doi]
- An implementation of security mechanism in chip for industrial wireless networksMin Wei, Zhen Wang, Keecheon Kim. 265-270 [doi]
- Spectrum edge decision method for energy detection with FFTMai Ohta, Makoto Taromaru, Takeo Fujii, Osamu Takyu. 271-276 [doi]
- State transition latency reduction scheme in the LTE/LTE-A radio access networkJinseong Lee, Jaiyong Lee. 277-280 [doi]
- Cognitive directional cost-based transmit power control in IEEE 802.11 WLANMehdi Guessous, Pr. Lahbib Zenkouar. 281-287 [doi]
- Integrating RF-powered backscatter with underlay cognitive radio networksKwang-Hyun Park, Daniyal Munir, Jun Suk Kim, Min Young Chung. 288-292 [doi]
- The application of windowed dynamic programming algorithm in software and cognitive radarYunlei Zhang, Guimei Zheng, Aniruddha Bhattacharjya, Jun Tang. 293-297 [doi]
- A study of advanced D2D transmission for use in 5G cellular systemsYao-Liang Chung. 298-302 [doi]
- Optimal cluster head selection and rotation of cognitive wireless sensor networks for simultaneous data gatheringShohei Fujii, Osamu Takyu, Fumihito Sasamori, Shiro Handa, Takeo Fujii, Mai Ohta. 303-308 [doi]
- On stability of slotted-ALOHA systems with delay constraints and geometric transmission probabilityTakayuki Horiuchi, Katsumi Sakakibara, Jumpei Taketsugu. 309-314 [doi]
- A mobility-aware network selection method for vehicle-to-infrastructure communication over LTE-A multi-tier networksEmmanuel Ndashimye, Nurul I. Sarkar, Sayan Kumar Ray. 315-320 [doi]
- 4G LTE-A systems at vehicular speeds: Performance evaluationJanry Budomo, Iftekhar Ahmad, Daryoush Habibi, Eric Dines. 321-326 [doi]
- Performance improvement of non-orthogonal multiple access scheme using code division multiplexingHiroki Kitagawa, Eiji Okamoto. 327-331 [doi]
- Dynamic access-point selection method using Markov approximationTomotaka Kimura, Kouji Hirata, Masahiro Muraguchi. 332-337 [doi]
- A novel traffic reduction technique for the redundancy protocol for Ethernet (RPE)Nguyen Xuan Tien, Semog Kim, Jong-myung Rhee, Sang Yoon Park. 338-343 [doi]
- An OFDMA two-symbol coordination MAC protocol for full-duplex wireless networksJiseon Lee, Hyeongtae Ahn, Cheeha Kim. 344-348 [doi]
- Outliers detection and correction for cooperative distributed online learning in Wireless sensor networkMinh N. H. Nguyen, Chuan Pham, Nguyen H. Tran, Choong Seon Hong. 349-353 [doi]
- Bloom filter based data collection algorithm for wireless sensor networksAnum Talpur, Thomas Newe, Faisal Karim Shaikh, Adil Amjad Sheikh, Emad Felemban, Abdelmajid Khelil. 354-359 [doi]
- Analysis of cache-based transport protocol at congestion in Wireless Sensor NetworksMelchizedek I. Alipio, Nestor Michael C. Tiglao. 360-365 [doi]
- Joint Distortion-Energy control for energy harvesting video sensor nodesHwan-Hee Lee, Chang-Hyun Lee, Myeong-jin Lee. 366-371 [doi]
- Extending wireless sensor network lifetimes through Channel Load Aware (CLAW) routingMichelangelo Cruz, Isabel Montes, Augusto Remillano, Nestor Tiglao, Roel Ocampo, Cedric Angelo M. Festin, Nemesio Macabale. 372-376 [doi]
- Multiple information collection by utilizing physical wireless parameter conversion sensor network (PHY-C SN)Koji Kakinuma, Takeo Fujii. 377-382 [doi]
- Energy-adaptive data compression and transmission range determination for energy-harvesting wireless sensor networksJunmin Yi, Eom Ji Oh, Dong Kun Noh, Ikjune Yoon. 383-385 [doi]
- A smartphone application for location recording and rescue request using twitterYuuto Ohtsuka, Hiroshi Ishii, Keisuke Utsu, Osamu Uchida. 386-388 [doi]
- A hybrid approach for Hindi-English machine translationOmkar Dhariya, Shrikant Malviya, Uma Shanker Tiwary. 389-394 [doi]
- On the effectiveness of random jumps in an influence maximization algorithm for unknown graphsShodai Mihara, Sho Tsugawa, Hiroyuki Ohsaki. 395-400 [doi]
- Content-aware rate adaptation scheme to improve stability in HTTP Adaptive StreamingMyongwoo Kim, Jiwoo Park, Kwangsue Chung. 401-405 [doi]
- A study of IoT-based post-disaster managementMd Kamruzzaman, Nurul I. Sarkar, Jairo A. Gutiérrez, Sayan Kumar Ray. 406-410 [doi]
- Connected electric vehicles for flexible vehicle-to-grid (V2G) servicesSeungwook Yoon, Kanggu Park, Euiseok Hwang. 411-413 [doi]
- Task offloading technique using DMIPS in wearable devicesJongwon Lee, Jaejun Ko, Young-June Choi. 414-416 [doi]
- Performance improvement of satellite/terrestrial integrated mobile communication system using unmanned aerial vehicle cooperative communicationsTomohiro Akiyoshi, Eiji Okamoto, Hiroyuki Tsuji, Amane Miura. 417-422 [doi]
- An energy efficient rendezvous node selection approachEunchong Lim, Bongjae Kim, Hong Min. 423-425 [doi]
- Busy tone based multi-slot allocation protocol for improving performance in IEEE WLANsSun-Min Choi, Sunmyeng Kim. 426-428 [doi]
- Dynamic pricing for resource allocation in wireless network virtualization: A Stackelberg game approachTai Manh Ho, Nguyen H. Tran, S. M. Ahsan Kazmi, Choong Seon Hong. 429-434 [doi]
- G.O.T.H.A.M. - mesh network management and visualization for batman-advJunho Kim, Minseok Seo, Sungwon Lee. 435-437 [doi]
- Child safety wearable deviceAkash Moodbidri, Hamid Shahnasser. 438-444 [doi]
- Reducing positioning errors in the important access point selection method for fingerprint localization by spatial partitioningHaeSung Kim, DongYeop Hwang, Ki-Hyung Kim, Jai-Jin Jung. 445-447 [doi]
- Design and implementation of simulator for analysis of BLE broadcast signal collisionGaoyang Shan, Byeong-uk Lee, Seung-Hun Shin, Byeong-hee Roh. 448-452 [doi]
- Development of data collecting system for forecasting with meteorological sensorsEver Enrique Castillo Osorio, SeokYoon Kang, Bum-Su Kim, JoHo Lim, Kyong Hoon Kim, Ki-Il Kim. 453-456 [doi]
- An enhanced security authentication mechanism in the environment partially distributed mobility managementDohyun Kim, Yongtae Shin. 457-462 [doi]
- Design and implementation of object tracking system based on LoRaDong-hyun Kim, Jung Bin Park, Jae-Ho Shin, Jong-Deok Kim. 463-467 [doi]
- Performance enhancement and IoT based monitoring for smart homeJetendra Joshi, Vishal Rajapriya, S. R. Rahul, Pranith Kumar, Siddhanth Polepally, Rohit Samineni, D. G. Kamal Tej. 468-473 [doi]
- WoO enabled IoT service provisioning based on learning user preferences and situationSajjad Ali, Muhammad Golam Kibria, Ilyoung Chong. 474-476 [doi]
- A Fog/Cloud based data delivery model for publish-subscribe systemsVan Nam Pham, Eui-nam Huh. 477-479 [doi]
- Development of a Multiuser Interaction Middleware based on D2D communicationsYoung-Han Yun, Hoon Choi. 480-485 [doi]
- Performance and accuracy trade-off analysis of techniques for anomaly detection in IoT sensorsPaulo Silas Severo de Souza, Wagner dos Santos Marques, Fabio Diniz Rossi, Guilherme da Cunha Rodrigues, Rodrigo N. Calheiros. 486-491 [doi]
- NEWSBED: The Internet of Things testbed platformJun Hwan Huh, Dong-hyun Kim, Jong-Deok Kim. 492-494 [doi]
- Multi-purpose connected electronic nose system for health screening and indoor air quality monitoringJongwoo Choi, Jun-Seok Park, Sungjune Chang, Hae Ryong Lee. 495-499 [doi]
- Development of sensor system to support coastal fisheryShun Tanaka, Masayoshi Fukushima, Hiroshi Yamamoto, Katsuyuki Yamazaki. 500-502 [doi]
- Evaluating live virtual machine migration overhead on client's application perspectivePetronio Bezerra, Gustavo Martins, Reinaldo Gomes, Fellype Cavalcante, Anderson F. B. F. da Costa. 503-508 [doi]
- A proposal of OpenFlow controller to improve transfer rate in mesh networkSeawon Koh, Junho Kim, Sungwon Lee. 509-511 [doi]
- Time Synchronization for Underwater Cellular NetworksSumin Jeong, Suk Chan Kim. 512-517 [doi]
- Comparison of contention-based MAC protocols for Underwater Sensor NetworksJenith L. Banluta, Lilet D. Balbuena, Nestor Michael C. Tiglao, Jhoanna Rhodette I. Pedrasa. 518-523 [doi]
- Resource allocation algorithm for multi-hop networks based on pulse-coupled oscillatorJi-Young Jung, Eutteum Kong, Ui-Seong Yu, Chanjae Lee, Jung-Hyun Bang, Jung-Ryun Lee. 524-525 [doi]
- Location-Based Service (LBS) data sharing using the k-member-limited clustering mechanism over the 4G and Wi Fi hybrid wireless mobile networksChung-Ming Huang, Duy-Tuan Dao, Chia-Ming Mai. 526-531 [doi]
- Research on the development of heterogeneous network transmission system for seismic exploration wireless data acquisitionWeichong Zhong, Enqing Dong, Xianhui Cao, Dejing Zhang, Zhenqiang Huang, Juan Xu, Guanxuan Li, Chao Xu. 532-536 [doi]
- Analyzing Backpressure routing interaction with TCP for Wireless Mesh NetworksAbdelbaset Kabou, José Núñez-Martínez, Nadia Nouali-Taboudjemat, Omar Nouali, Josep Mangues-Bafalluy. 537-542 [doi]
- Relay selection method using radio environment database for multi-hop V2V communicationsCong-Hoang Diem, Takeo Fujii. 543-548 [doi]
- Risk analysis and countermeasure for bit-flipping attack in LoRaWANJungwoon Lee, DongYeop Hwang, Jihong Park, Ki-Hyung Kim. 549-551 [doi]
- Performance evaluation of 6TiSCH for resilient data transport in wireless sensor networksJoven Daniel R. Nepomuceno, Nestor Michael C. Tiglao. 552-557 [doi]
- ADON - Anonymous data exchange in hybrid opportunistic networks using utility functions and bloom filtersRafal Skowronski. 558-563 [doi]
- Moving small cells in public safety networksMinsu Shin, Syed Tariq Shah, Min Young Chung, Syed Faraz Hasan, Boon-Chong Seet, Peter Han Joo Chong. 564-568 [doi]
- Fully Distributed GRIDNET protocol, with no trusted authoritiesRafal Skowronski. 569-574 [doi]
- Anonymization scheme using non-trusted agent for location based servicesMyungah Ko, Myungwhan Choi. 575-577 [doi]
- City-level IP geolocation based on network topology community detectionMingyue Li, Xiangyang Luo, Wenqi Shi, Lixiang Chai. 578-583 [doi]
- A novel traffic routing method using hybrid Ant Colony System based on genetic algorithmDang-Nhac Lu, Thi Hau Nguyen, Thi-Thu-Trang Ngo, Duc-Nhan Nguyen, Ha-Nam Nguyen. 584-589 [doi]
- Development of population monitoring system for events in a large parkKeita Arai, Hiroshi Yamamoto, Katsuyuki Yamazaki. 590-592 [doi]
- Password typos resilience in honey encryptionHoyul Choi, Hyunjae Nam, Junbeom Hur. 593-598 [doi]
- Invisible embedded techniques for optical camera communicationsNam Tuan Le, Yeong Min Jang. 599-603 [doi]
- A practical SDN-based data offloading frameworkHyukjoon Lee, Hwasung Kim, Younghan Kim. 604-607 [doi]
- Smart city service platform associated with smart homeEungha Kim. 608-610 [doi]
- Application of a HID certificate issue algorithm for strengthening private information security over the V2V environmentSung Su Park, Sang Gyun Du, Keecheon Kim. 611-615 [doi]
- A novel architecture to enhance Quality of Service in IP networksSriharsha Karamchati, Shatrunjay Rawat, Vital Varma. 616-621 [doi]
- Physical-virtual topological visualization of OF@TEIN SDN-enabled multi-site cloudMuhammad Usman 0012, Aris Cahyadi Risdianto, Jung-Su Han, JongWon Kim 0001, Nguyen Van Huynh. 622-624 [doi]
- Dynamic flow steering for IoT monitoring data in SDN-coordinated IoT-Cloud servicesHeebum Yoon, Seungryong Kim, Taekho Nam, JongWon Kim. 625-627 [doi]
- The performance of caching strategies in content centric networkingLe Phong Du, Tuan Anh Le, Nguyen Duc Thai, Phuong Luu Vo. 628-632 [doi]
- Performance-based congestion control in information centric networkChangdae Lim, Yusung Kim, Ikjun Yeom. 633-635 [doi]
- VolvoxDC : A new scalable data center network architectureManjish Pal, Nabajyoti Medhi. 636-640 [doi]
- Access control of MTC devices using reinforcement learning approachJihun Moon, Yujin Lim. 641-643 [doi]
- Design and implementation of low-level machine learning API and API serverDong-hyun Kim, Kyoung Seok Na, Jae-Min Lee, Jung Bin Park, Jun Young Lim, Jong-Deok Kim. 644-648 [doi]
- A high available service based on virtualization technology in NFVSang-Il Kim, Hwa-sung Kim. 649-652 [doi]
- Server load prediction using stream miningHajer Toumi, Zaki Brahmi, Zoulaykha Benarfa, Mohamed Mohsen Gammoudi. 653-661 [doi]
- Enabling high-level network programming: A northbound API for Software-Defined NetworksCesar Rocha Vasconcelos, Reinaldo Cezar M. Gomes, Anderson F. B. F. da Costa, Daniella Dias C. da Silva. 662-667 [doi]
- Tracking method of moving target in complex environmentZhuo Yan, Xiangdong Zhou, Jiahu Yuan, Xiaowei Han. 668-673 [doi]
- Domain-based identifier-locator mapping management for distributed mobility controlNak-Jung Choi, Ji In Kim, Seok Joo Koh. 674-678 [doi]
- Study of distributed wireless access point controllerGyewan An, Sangyun Han, Sungwon Lee. 679-681 [doi]
- Analysing the performance of unslotted sensor networks based on the IEEE 802.15.4 employed EIED algorithmTrong-Minh Hoang, Van Truong Nguyen, Nhu-Giap Nguyen, Tuan-Nguyen Lang. 682-685 [doi]
- Dynamic spectrum allocation method for reducing crosstalk in multi-core fiber networksKai Morita, Kouji Hirata. 686-688 [doi]
- CCMF: A Congestion Control method with Fairness for multipath transportBo Hu, Yang Yang, Zeng Wang, Lin Xing. 689-694 [doi]
- Quality assessment of streaming services in mobile devicesJa-Ok Koo, Yalew Zelalem Jembre, Young-June Choi, Zhetao Li, Tingrui Pei, Nobuyoshi Komuro, Hiroo Sekiya. 695-699 [doi]
- Improving throughput and user fairness through priority scheduling in WLANPrateek Pandey, Sasthi C. Ghosh. 700-705 [doi]
- Extended intra-route collision avoidance method with variable transmission power based on SIR collision modelNaoya Numata, Hiroaki Higaki. 706-711 [doi]
- Malware traffic classification using convolutional neural network for representation learningWei Wang, Ming Zhu, Xuewen Zeng, Xiaozhou Ye, Yiqiang Sheng. 712-717 [doi]
- Scenario and countermeasure for replay attack using join request messages in LoRaWANSeungJae Na, DongYeop Hwang, WoonSeob Shin, Ki-Hyung Kim. 718-720 [doi]