Abstract is missing.
- Learned Image Compression with Frequency Domain LossSoonbin Lee, JongBeom Jeong, Inae Kim, Eun-Seok Ryu. 1-4 [doi]
- Implementation of Blockchain based P2P Energy Trading PlatformSubin Kwak, Joohyung Lee. 5-7 [doi]
- Implementing Viewport Tile Extractor for Viewport-Adaptive 360-Degree Video Tiled StreamingJongBeom Jeong, Soonbin Lee, Inae Kim, Eun-Seok Ryu. 8-12 [doi]
- Contextual Bandits Approach for Selecting the Best Channel in Industry 4.0 NetworkRojeena Bajracharya, Haejoon Jung. 13-16 [doi]
- A Measurement Based Feasibility Study on Remote Driving SystemYang Yu, Sanghwan Lee. 17-19 [doi]
- An Efficient Driver Selection Algorithm for Controlling Multiple Vehicles in Remote DrivingSyed Qamar Zulqarnain, Sanghwan Lee. 20-23 [doi]
- A Sequence Change Algorithm in Vehicle Platooning for Longer Driving RangeIssaree Srisomboon, Sanghwan Lee. 24-27 [doi]
- Real-time Detection of Cache Side-channel Attack Using Non-cache Hardware EventsHodong Kim, Changhee Hahn, Junbeom Hur. 28-31 [doi]
- Hardware-Based FLUSH+RELOAD Attack on Armv8 System via ACPHeemin Lee, Sungyeong Jang, Han-Yee Kim, Taeweon Suh. 32-35 [doi]
- Neural Network Stealing via MeltdownHoyong Jeong, Dohyun Ryu, Junbeom Hur. 36-38 [doi]
- Constructing Covert Channel on Intel CPU-iGPU platformTaehun Kim, Jaehan Kim, Youngjoo Shin. 39-42 [doi]
- Non-Local Self-Attention Mechanism for Real-Time Context Embedding Deep Shadow Removal NetworkDohyun Kim, Joongheon Kim. 43-45 [doi]
- A Tutorial on Quantum Graph Recurrent Neural Network (QGRNN)Jaeho Choi, Seunghyeok Oh, Joongheon Kim. 46-49 [doi]
- Quantum Convolutional Neural Network for Resource-Efficient Image Classification: A Quantum Random Access Memory (QRAM) ApproachSeunghyeok Oh, Jaeho Choi, Jong-Kook Kim, Joongheon Kim. 50-52 [doi]
- Auction-based Truthful Distributed Resource Allocation for Smart Grid SystemsHyomin Ahn, Junghyun Kim, Joongheon Kim. 53-55 [doi]
- Performance Comparison of SRCNN, VDSR, and SRDenseNet Deep Learning Models in Embedded Autonomous Driving PlatformsJoongheon Kim, Myungjae Shin, Dohyun Kim, SooHyun Park, Yeongeun Kang, Junghyun Kim, Haemin Lee, Won Joon Yun, Jaeho Choi, Seunghoon Park, Seunghyeok Oh, Jaesung Yoo. 56-58 [doi]
- Mobility-Aware Prioritized Flow Rule Placement in Software-Defined Access NetworksYeunwoong Kyung. 59-61 [doi]
- Priority-Based Dynamic Resource Allocation Scheme in Network SlicingHaneul Ko, Jaewook Lee 0002, Sangheon Pack. 62-64 [doi]
- Mobility-Aware Optimal Task Offloading in Distributed Edge ComputingYoubin Jeon, Hosung Baek, Sangheon Pack. 65-68 [doi]
- Adaptive Beacon Transmission for Reducing Inter-Reception Time in Vehicle PlatooningMinok Kim, Joonwoo Kim, Sangheon Pack. 69-71 [doi]
- On Performance of Deep Reinforcement Learning-based Listen-Before-Talk (LBT) SchemeMinjeong Lee, Jaewook Lee 0002, Hochan Lee, Taeyun Kim, Sangheon Pack. 72-75 [doi]
- Relative Cost Routing, Modulation and Spectrum Allocation in Elastic Optical NetworksAnwar Alyatama. 127-131 [doi]
- QoS Improvement in SDN Using Centralized Routing Based on FeedbackMohammadreza Saadatpour, Touraj Shabanian, Mohammad Behdadfar, Amin Ghalami Osgouei. 132-136 [doi]
- OP4T: Bringing Advanced Network Packet Timestamping into the FieldMohammed Hawari, Thomas H. Clausen. 137-142 [doi]
- A Proposal of Stochastic Quantitative Resilience Index Based on SLAs for Communication LinesHiroki Kashiwazaki, Hiroki Takakura, Shinji Shimojo. 143-148 [doi]
- Effective Node Resistance and its Implication on Network RobustnessKazuyuki Yamashita, Hiroyuki Ohsaki. 149-153 [doi]
- On the Resource Management of KubernetesEunsook Kim, Kyungwoon Lee, Chuck Yoo. 154-158 [doi]
- Infrastructure-Assisted Cooperative Multi-UAV Deep Reinforcement Energy Trading Learning for Big-Data ProcessingSo-Yi Jung, Won Joon Yun, Joongheon Kim, Jae-Hyun Kim. 159-162 [doi]
- An Anonymous Distributed Electronic Voting System Using ZerocoinYu Takabatake, Yasuo Okabe. 163-168 [doi]
- Analysis of Drone Propagation With Ray Tracing From Sub-6 GHz Upto Terahertz Frequencies in a Real World Urban EnvironmentMuhammad Usman Sheikh, Kalle Ruttik, Norshaida Saba, Edward Mutafungwa, Riku Jäntti, Jyri Hämäläinen. 169-174 [doi]
- An Efficient Method to Collect Statistics in SDN Using Curvature Based SamplingSandhya Rathee, Divesh Uttamchandani, K. Haribabu, Ashutosh Bhatia. 175-180 [doi]
- Cross Hashing: Anonymizing encounters in Decentralised Contact Tracing ProtocolsJunade Ali, Vladimir Dyo. 181-185 [doi]
- Real-Time Geolocation Approach through LoRa on Internet of ThingsChristos Bouras, Apostolos Gkamas, Vasileios Kokkinos, Nikolaos Papachristos. 186-191 [doi]
- DCT Compression Scheme for Wireless Sensor Information considering Spatial CorrelationKohei Natsume, Mai Ohta, Koichi Adachi, Osamu Takyu, Takeo Fujii. 192-196 [doi]
- Joint Latency and Reliability-Aware Controller PlacementKurdman Abdulrahman Rasol Rasol, Jordi Domingo-Pascual. 197-202 [doi]
- Wireless System Selection with Spectrum Database for IoTSoraya Mitate, Yudai Yamazaki, Takeo Fujii, Shusuke Narieda. 203-208 [doi]
- Devices and Backscatter Tag MAC Protocol for an Integrated Wireless NetworkEun Jin Choi, Kyoung Min Kim, Tae-Jin Lee. 209-212 [doi]
- Multi-UAV-Assisted MEC System: Joint Association and Resource Management FrameworkNway Nway Ei, Seok-won Kang, Madyan Alsenwi, Yan Kyaw Tun, Choong Seon Hong. 213-218 [doi]
- UAV Trajectory Design for UAV-2-GV Communication in VANETsAunas Manzoor, Nguyen Dang Tri, Choong Seon Hong. 219-224 [doi]
- Large-scale farm sensing system using UAV and long-distance wireless communicationYoshihiro Higashiura, Hiroshi Yamamoto. 225-230 [doi]
- Engineering a Network in the SkyZygmunt J. Haas, Zhong Zheng 0001. 237-242 [doi]
- Enhanced Performance and Privacy via Resolver-Less DNSTobias Mueller, Erik Sy. 243-248 [doi]
- A Secure Mobile Payment Protocol for Handling Accountability with Formal VerificationChalee Thammarat, Chian Techapanupreeda. 249-254 [doi]
- A Proposal for Correlation-based Steganography Using Shamir's Secret Sharing Scheme and DCT DomainKaito Onuma, Sumiko Miyata. 255-260 [doi]
- Caching Performance of Named Data Networking with NDNSSeshariana Rahma Melati, Leanna Vidya Yovita, Ratna Mayasari. 261-266 [doi]
- Lightweight and Scalable DAG based distributed ledger for verifying IoT data integritySumanth Reddy Cherupally, Srinivas Boga, Prashanth Podili, Kotaro Kataoka. 267-272 [doi]
- Malware Detection Using Gradient Boosting Decision Trees with Customized Log Loss FunctionYun Gao, Hirokazu Hasegawa, Yukiko Yamaguchi, Hajime Shimada. 273-278 [doi]
- SVM-based Detection of False Data Injection in Intelligent Transportation SystemJoe Diether Cabelin, Paul Vincent Alpano, Jhoanna Rhodette Pedrasa. 279-284 [doi]
- Recognition System of Activities in Daily Living Based on Deep Sensing of Water UsageKeidai Hori, Hiroshi Yamamoto. 285-290 [doi]
- Deep Regression Model for Videos Popularity Prediction in Mobile Edge Caching NetworksArooj Masood, The-Vi Nguyen, Sungrae Cho. 291-294 [doi]
- Precursory Analysis of Attack-Log Time Series by Machine Learning for Detecting Bots in CAPTCHATsuyoshi Arai, Yasuo Okabe, Yoshinori Matsumoto. 295-300 [doi]
- A Server Migration Method Using Q-Learning with Dimension Reduction in Edge ComputingRyo Urimoto, Yukinobu Fukushima, Yuya Tarutani, Tutomu Murase, Tokumi Yokohira. 301-304 [doi]
- Optimization of RSSI based indoor localization and tracking to monitor workers in a hazardous working zone using Machine Learning techniquesPubudu Aravinda, Sulochana Sooriyaarachchi, Chandana Gamage, Navinda Kottege. 305-310 [doi]
- An Ensemble Learning Model for Agricultural Irrigation PredictionYan-An Chen, Wen-Hao Hsieh, Yu-Shuo Ko, Nen-Fu Huang. 311-316 [doi]
- Access Management using Vickrey-Clarke-Groves Auction in Terrestrial-Drone NetworksJunghyun Kim, Joongheon Kim. 317-320 [doi]
- Enhancing dynamism in management and network slice establishment through deep learningRodrigo Moreira, Larissa Ferreira Rodrigues, Pedro Frosi Rosa, Rui L. Aguiar, Flávio de Oliveira Silva. 321-326 [doi]
- A Comprehensive Review on Email Spam Classification using Machine Learning AlgorithmsMansoor Raza, Nathali Dilshani Jayasinghe, Muhana Magboul Ali Muslam. 327-332 [doi]
- Propagation Measurements and Models of 915 MHz LoRa Radio in a Block Cave Gold MinePhilip Branch. 333-338 [doi]
- Joint Design of Power Control and SIC Decoding Order for Max-Min Fairness optimization in Uplink NOMA SystemsJongmin Kim, Junbeom Kim, Seok-Hwan Park. 339-342 [doi]
- Effectiveness of Vicinity-based Content Finding in Mobile NDN EnvironmentsAtthapol Suwannasa, Matthew Broadbent, Andreas Mauthe. 343-348 [doi]
- MDP-Based Handover In Heterogeneous Ultra-Dense NetworksAmel Khodmi, Sonia Ben Rejeb, Nidal Nasser, Zièd Choukair. 349-352 [doi]
- Pico-eNB Tx Power Optimization for Multiband HetNets with MCS Incorporating 1024-QAMAyumi Yoneyama, Fumiya Kemmochi, Hiroyuki Otsuka. 353-357 [doi]
- Parallel Monitoring Architecture for 100 Gbps and Beyond Optical EthernetHideki Otsuki, Eiji Kawai, Katsuyoshi Setoyama, Hiroyuki Kimiyama, Katsuhiro Sebayashi, Mitsuru Maruyama. 358-360 [doi]
- Reconfigurable Transport Networks to Accommodate Much More Traffic DemandKazuya Anazawa, Toru Mano, Takeru Inoue, Atsushi Taniguchi, Kohei Mizuno. 361-366 [doi]
- Comparative Performance Analysis of Underlying Network Topologies for BlockchainBhavesh Toshniwal, Kotaro Kataoka. 367-372 [doi]
- A Solution for Recovering Network Topology with Missing Links using Sparse ModelingRyotaro Matsuo, Hiroyuki Ohsaki. 373-378 [doi]
- GRGE: Detection of Gliomas Using Radiomics, GA Features and Extremely Randomized TreesRahul Kumar 0003, Ankur Gupta 0002, Harkirat Singh Arora, Balasubramanian Raman. 379-384 [doi]
- Machine Learning Algorithm for Detection of False Data Injection Attack in Power SystemAjit Kumar, Neetesh Saxena, Bong-Jun Choi. 385-390 [doi]
- Using Auxiliary Inputs in Deep Learning Models for Detecting DGA-based Domain NamesIndraneel Ghosh, Subham Kumar, Ashutosh Bhatia, Deepak Kumar Vishwakarma. 391-396 [doi]
- Blockage and Ray Tracing Propagation Model in 3GPP Specified Industrial EnvironmentMuhammad Usman Sheikh, Kalle Ruttik, Riku Jäntti, Jyri Hämäläinen. 397-402 [doi]
- Lightweight messaging protocol for precision agricultureEng-Kee Tan, Yung-Wey Chong, Raden Arief Setyawan, Muhammad Niswar, Khin Than Mya. 403-407 [doi]
- Proposals on the Root Data Domain Gateway and System Operations for IoT Data InteroperabilityEisei Yoshida, Tetsuya Yokotani, Koichi Ishibashi, Hiroaki Mukai. 408-412 [doi]
- Real-Time Recommendation System for Online Broadcasting AdvertisementChaeeun Jeong, Seongju Kang, Kwangsue Chung. 413-416 [doi]
- Clustering-Guided Incremental Learning of TasksYoonhee Kim, Eunwoo Kim. 417-421 [doi]
- On the Tradeoff between Computation-Time and Learning-Accuracy in GAN-based Super-Resolution Deep LearningJooyong Shim, Joongheon Kim, Jong-Kook Kim. 422-424 [doi]
- On the Correlation between Spectral Measures of Network Topology and Flow-Level QoSKazuyuki Yamashita, Hiroyuki Ohsaki. 425-428 [doi]
- Impact of ARQ on the Distortion Performance of Underwater Acoustic Mobile NetworksAndrej Stefanov. 429-431 [doi]
- Investigating Cybersecurity News Articles by Applying Topic Modeling MethodPiyush Ghasiya, Koji Okamura. 432-438 [doi]
- Improving the performance of Machine Learning Algorithms for TOR detectionAdityan Gurunarayanan, Ankit Agrawal, Ashutosh Bhatia, Deepak Kumar Vishwakarma. 439-444 [doi]
- Using Machine Learning for Task Distribution in Fog-Cloud Scenarios: A Deep Performance AnalysisMohammadreza Pourkiani, Masoud Abedi. 445-450 [doi]
- Proposal of device control method based on consensus building using reinforcement learningIsato Oishi, Yuya Tarutani, Yukinobu Fukushima, Tokumi Yokohira. 451-456 [doi]
- Auction-based Deep Learning Computation Offloading for Truthful Edge Computing: A Myerson Auction ApproachHaemin Lee, SooHyun Park, Junghyun Kim, Joongheon Kim. 457-459 [doi]
- Metric-Based Learning for Nearest-Neighbor Few-Shot Image ClassificationMin Jun Lee, Jungmin So. 460-464 [doi]
- VCG Auction Mechanism based on Block Chain in Smart GridTaeyun Ha, Donghyun Lee, Chunghyun Lee, Sungrae Cho. 465-468 [doi]
- Proper Cost Hamiltonian Design for Combinatorial Optimization Problems: A Boolean Function ApproachJaeho Choi, Seunghyeok Oh, SooHyun Park, Jong-Kook Kim, Joongheon Kim. 469-472 [doi]
- Robust Epileptic Seizure Detection Using Multiscale Distribution Entropy Analysis for Short EEG RecordingsJin-Oh Park, Dae-Young Lee, Young-Seok Choi. 473-476 [doi]
- Analysis of the Earth Fixed Beam Duration in the LEOJong Soo Baik, Jae-Hyun Kim. 477-479 [doi]
- Adaptive Jamming Considering Location Information Inaccuracy for Anti-UAV SystemWoo-Cheol Jin, Kyungtae Kim, Ji-Woong Choi. 480-482 [doi]
- Generative Adversarial Attacks on Fingerprint Recognition SystemsHee won Kwon, Jea-Won Nam, Joongheon Kim, Youn Kyu Lee. 483-485 [doi]
- Protection against Flow Table Overflow Attack in Software Defined NetworksSichul Kevin Noh, Min-Jae Kang, Minho Park. 486-490 [doi]
- Spatio-Temporal Degree of Freedom: Interference Management in 5G Edge SON NetworksJoonpyo Hong, Yun Hee Cho, Sung Kyung Kim, Jee-hyeon Na, Jeongho Kwak. 491-494 [doi]
- Signal Processing Optimization for Federated Learning over Multi-User MIMO Uplink ChannelMoonsung Huh, Daesung Yu, Seok-Hwan Park. 495-498 [doi]
- A Novel Algorithm for Estimating Fast-Moving Vehicle Speed in Intelligent Transport SystemsTrong-Hop Do, Dang-Khoa Tran, Dinh-Quang Hoang, Dat Vuong, Trong-Minh Hoang, Nhu-Ngoc Dao, Chunghyun Lee, Sungrae Cho. 499-503 [doi]
- Learning Graph Representation of Bug Reports to Triage Bugs using Graph Convolution NetworkSyed Farhan Alam Zaidi, Chan-Gun Lee. 504-507 [doi]
- A Subject-Centric Credential Management Method based on the Verifiable CredentialsSeungjoo Lim, Min-Hyung Rhie, DongYeop Hwang, Ki-Hyung Kim. 508-510 [doi]
- Efficient Data Delivery in Content-Centric Network with Stronger Privacy of PublisherTaek-Young Youn, Joongheon Kim, Seog Chung Seo. 511-513 [doi]
- Intelligent Face Recognition on the Edge Computing using Neuromorphic TechnologyJae-Woo Kim, Cosmas Ifeanyi Nwakanma, Dong Seong Kim, Jae-Min Lee. 514-516 [doi]
- Vulnerability Analysis of DID Document's Updating Process in the Decentralized Identifier SystemsMin-Hyung Rhie, Kyung-Hoon Kim, DongYeop Hwang, Ki-Hyung Kim. 517-520 [doi]
- Gesture Recognition for Note Generation in VR Rhythm GameRiski Nur Azizah, Yeasom Lee, Jason J. Jung, Bong-Soo Sohn. 521-524 [doi]
- Re-Identification for Multi-Object Tracking Using Triplet LossKoung-Suk Ko, Woo-Jin Ahn, Geon-Hee Kim, Myo-Taeg Lim, Tae-Koo Kang, Dong-Sung Pae. 525-527 [doi]
- Service Management in Virtual Machine and Container Mixed Environment using Service MeshHokeun Lim, Younghan Kim, Kyoungjae Sun. 528-530 [doi]
- Proposal of Management Agent for Delay Sensitive IoT CommunicationMasafumi Katoh, Tomonori Kubota, Takeshi Yasuie, Yukihiro Watanabe, Yuji Nomura. 531-536 [doi]
- Large L-shape Fit Spectrum Allocation for Elastic Optical Network with Spectrum SlicingKaito Akaki, Praphan Pavarangkoon, Nattapong Kitsuwan. 537-540 [doi]
- An Empirical Evaluation and Analysis of Performance of Multiple Optane SSDsJaehyun Han, Guangyu Zhu, Eunseo Lee, Sangmook Lee, Yongseok Son. 541-545 [doi]
- A Trustworthy Food Resume Traceability System Based on Blockchain TechnologyMeng-Ju Lee, Jhong-Ting Luo, Jia-Jung Shao, Nen-Fu Huang. 546-552 [doi]
- Reliable and Delay Tolerant Transmission Protocols for LPWAN IoT SensorsCheng-Che Huang, Yu-Cheng Chien, Jia Cheng Zhang, Nen-Fu Huang. 553-558 [doi]
- An Empirical Evaluation of NVM-aware File Systems on Intel Optane DC Persistent Memory ModulesGuangyu Zhu, Jaehyun Han, Sangjin Lee, Yongseok Son. 559-564 [doi]
- Reliable Integrated Space-Oceanic Network Profit Maximization by Bender Decomposition ApproachSheikh Salman Hassan, Umer Majeed, Choong Seon Hong. 565-570 [doi]
- Traffic-aware Dynamic Container Deployment on the Network EdgeMuhamad Rizka Maulana, Hsiao-Yin Peng, Ying-Cen Lai, Li-Der Chou. 571-576 [doi]
- Hit Ratio and Latency Optimization for Caching Systems: A SurveyAnh-Tien Tran, Demeke Shumeye Lakew, The-Vi Nguyen, Van-Dat Tuong, Thanh Phung Truong, Nhu-Ngoc Dao, Sungrae Cho. 577-581 [doi]
- Decentralized Online Voting using Blockchain and Secret ContractsAaron Fernandes, Karan Garg, Ankit Agrawal, Ashutosh Bhatia. 582-587 [doi]
- Cross-Silo Model-Based Secure Federated Transfer Learning for Flow-Based Traffic ClassificationUmer Majeed, Sheikh Salman Hassan, Choong Seon Hong. 588-593 [doi]
- Lowest-In First-Service System for the Efficient MPT (Microwave Power Transfer) to Multiple ReceiversChangyoung An, Hyeong Min Kwon, Heung-Gyoon Ryu. 594-596 [doi]
- Loss and Energy Tradeoff in Multi-access Edge Computing Enabled Federated LearningChit Wutyee Zaw, Choong Seon Hong. 597-602 [doi]
- Bitcoin Price Forecasting via Ensemble-based LSTM Deep Learning NetworksMyungjae Shin, David A. Mohaisen, Joongheon Kim. 603-608 [doi]
- Large-term sensing system for agriculture utilizing UAV and wireless power transferShota Nishiura, Hiroshi Yamamoto. 609-614 [doi]
- On Design of Caching Threshold of Caching Strategy CDO for ICNKota Tohno, Ryo Nakamura, Noriaki Kamiyama. 615-620 [doi]
- Bridge Me If You Can! Evaluating the Latency of Securing ProfinetStephan Hohmann, Tobias Mueller, Marius Stübs. 621-626 [doi]
- Scalable Private P2P network for distributed and Hierarchical Machine Learning in VANETsJeong Min Jeon, Choong Seon Hong. 627-629 [doi]
- Deep-learning Based Deafness Aware Scheme for mmWave D2D CommunicationsWoongsoo Na. 630-632 [doi]
- A Precise Muscle Activity Onset/Offset Detection via EMG SignalKimoon Kang, Kiwon Rhee, Hyun-Chool Shin. 633-635 [doi]
- Vital information extraction using FMCW radarHo-Ik Choi, Jongwun Seul, Hyun-Chool Shin. 636-639 [doi]
- EMG Based Gesture Recognition Using Noise RemovalKimoon Kang, Hyun-Chool Shin. 640-643 [doi]
- In-Vehicle Passenger Detection Using FMCW RadarHeemang Song, Youngkeun Yoo, Hyun-Chool Shin. 644-647 [doi]
- Is Bloom Filter a Bad Choice for Security and Privacy?Ripon Patgiri, Sabuzima Nayak, Naresh Babu Muppalaneni. 648-653 [doi]
- Performance Evaluation of Consensus Protocols in Blockchain-based Audit SystemsAshar Ahmad, Muhammad Saad, Joongheon Kim, DaeHun Nyang, David A. Mohaisen. 654-656 [doi]
- Context-aware Model Selection for On-Device Object DetectionSeongju Kang, Chaeeun Jeong, Kwangsue Chung. 662-666 [doi]
- Network Completion: Beyond Matrix CompletionCong Tran, Won-Yong Shin. 667-670 [doi]
- Convolutional Neural Networks based on Random Kernels in the Frequency DomainYuna Han, Bilel Derbel, Byung-Woo Hong. 671-673 [doi]
- Task Priority-based Resource Allocation Algorithm for Task Offloading in Fog-enabled IoT SystemsHoa Tran-Dang, Dong Seong Kim. 674-679 [doi]
- On the CDN Pricing Strategies in the Internet Traffic Delivery ChainSeunghyun Lee, Changhee Joo. 680-682 [doi]
- Data-driven Data Augmentation for Motor Imagery Brain-Computer InterfaceHyeon-Kyu Lee, Ji-Hack Lee, Jin-Oh Park, Young-Seok Choi. 683-686 [doi]
- Skeleton Silhouette Based Disentangled Feature Extraction Network for Invariant Gait RecognitionJae-Seok Yoo, Kwang-Hyun Park. 687-692 [doi]
- A Role-Based Orchestration Approach for Cloud ApplicationsYue Wang, Choonhwa Lee. 693-698 [doi]
- An Efficient Neural Network-Based Next -Hop Selection Strategy for Multi-hop VANETsJunyao Chen, Rajib Paul, Young-June Choi. 699-702 [doi]
- Joint Optimization of 3D Hybrid Beamforming and User Scheduling for 2D Planar Antenna SystemsNajam us Saqib, Kyung-Yul Cheon, Seungkeun Park, Sang-Woon Jeon. 703-707 [doi]
- Location-Aware Task Offloading for MEC-based High Mobility ServiceHaziq Hamzah, Duc Tai Le, Moonseong Kim, Hyunseung Choo. 708-711 [doi]
- Resource Allocation Scheme Based on Deep Reinforcement Learning for Device-to-Device CommunicationsSeoyoung Yu, Yun Jae Jeong, Jeong-Woo Lee. 712-714 [doi]
- Revisiting Bluetooth Adaptive Frequency Hopping Prediction with a UbertoothJanggoon Lee, Chanhee Park, Heejun Roh. 715-717 [doi]
- Stream-Based Active Learning with Multiple KernelsJeongMin Chae, Song-Nam Hong. 718-722 [doi]
- Deep Learning-based Syllable Recognition Framework for Korean ChildrenSuyeong Yang, Minhee Lee, Hyosu Kim. 723-726 [doi]
- BS Deployment Strategy and Energy Efficient BS Switching in Heterogeneous Networks for 5GDonghyun Lee, Gunhee Jang, Taeyun Ha, Junsuk Oh, Sungrae Cho. 727-729 [doi]
- Motion Estimation via Scale-Space in Unsupervised Deep LearningJaehwan Kim, Bilel Derbel, Byung-Woo Hong. 730-731 [doi]
- Analysis and Prediction of Hourly Energy Consumption Based on Long Short-Term Memory Neural NetworkRubina Akter, Jae-Min Lee, Dong Seong Kim. 732-734 [doi]
- Accident Type Definition for Implementation of Pedestrian Accident Recognition AlgorithmMingi Jeong, Sangyeoun Lee, Myungnam Bae, Kang Bok Lee. 735-737 [doi]
- One-Class Classification Based Bug Triage System to Assign a Newly Added DeveloperSyed Farhan Alam Zaidi, Chan-Gun Lee. 738-741 [doi]
- Performance Evaluation of Wireless LAN for UAS CommunicationTae-Yoon Kim, Jun-Woo Cho, Jae-Hyun Kim. 742-744 [doi]
- Analysis on the Privacy of DID Service Properties in the DID DocumentKyung-Hoon Kim, Seungjoo Lim, DongYeop Hwang, Ki-Hyung Kim. 745-748 [doi]
- A Study of CNN-Based Human Behavior Recognition with Channel State InformationKyo-Min Hwang, Sang-Chul Kim. 749-751 [doi]
- Information Sharing System Adapted to Disaster PhaseKazuma Uemoto, Toshiya Takami. 752-754 [doi]
- User-Preference-based Proactive Caching in Edge NetworksThe-Vi Nguyen, Van-Dat Tuong, Anh-Tien Tran, Thanh Phung Truong, Demeke Shumeye Lakew, Chunghyun Lee, Yunseong Lee, Sungrae Cho. 755-757 [doi]
- Let's Attest! Multi-modal Certificate Exchange for the Web of TrustTobias Mueller. 758-763 [doi]
- A Traffic Scheduling Mechanism for Industrial Wireless Network Accessing IPv6 InternetMin Wei, Xueqin Xiang, Cheng Li. 764-769 [doi]
- Edge Caching for Content Sharing in Vehicular Networks: Technical Challenges, Existing Approaches, and Future DirectionsUmar Sa'ad, Demeke Shumeye Lakew, Sungrae Cho. 770-775 [doi]
- Remote Sensing Image Registration Using Equivariance FeaturesWoo-Ju Lee, Seoung-Jun Oh. 776-781 [doi]
- Intelligent Home Energy Management System based on Bi-directional Long-short Term Memory and Reinforcement LearningMuhammad Diyan 0001, Murad Khan, Zhenbo Cao, Bhagya Nathali Silva, Jihun Han, Ki Jun Han. 782-787 [doi]
- Fusing LIDAR sensor and RGB camera for object detection in autonomous vehicle with fuzzy logic approachTri Nguyen, Myungsik Yoo. 788-791 [doi]
- Energy Balancing and Source Node Privacy Protection in Event Monitoring Wireless NetworksLilian Charles Mutalemwa, Seokjoo Shin. 792-797 [doi]
- Dog Noseprint Identification AlgorithmSungmin Cho, Jinwook Paeng, Taehong Kim, Chanil Kim, Ji Soo Kim, Hyeseong Kim, Junseok Kwon. 798-800 [doi]
- Energy-Efficiency Comparison of Ad-hoc Routings in a Shadowing Environment for Smart IoTYuta Kuwahara, Naoki Aihara, Satoshi Yamazaki, Kouji Ohuchi, Hideki Mizuno. 801-804 [doi]
- Learning-based Frequency Synchronization with NTP for Low-cost Phasor Measurement UnitsHeejae Park, Seongryool Wee, Laihyuk Park. 805-807 [doi]
- Harmful Animals Detection System Utilizing Cooperative Actuation of Multiple Sensing DevicesDaichi Ozaki, Hiroshi Yamamoto, Eiji Utsunomiya, Kiyohito Yoshihara. 808-813 [doi]
- Recycling of Adversarial Attacks on the DNN of Autonomous CarsHyunjun Mun, Seonggwan Seo, Joobeom Yun. 814-817 [doi]
- DMHZ: A Decision Support System Based on Machine Computational Design for Heart Disease Diagnosis Using Z-Alizadeh Sani DatasetAnkur Gupta 0002, Harkirat Singh Arora, Rahul Kumar 0003, Balasubramanian Raman. 818-823 [doi]
- Riverbed Modeler Reinforcement Learning M&S Framework Supported by Supervised LearningGyu-min Lee, Cheol-Woong Lee, Byeong-hee Roh. 824-827 [doi]
- Improved Raft Algorithm exploiting Federated Learning for Private Blockchain performance enhancementDonghee Kim, Inshil Doh, Kijoon Chae. 828-832 [doi]
- Tactile Perception Modulation by Transcutaneous Electrical StimulationHyejin An, Jongwun Seul, Hyun-Chool Shin. 833-836 [doi]
- A Secure Corroboration Protocol for Internet of Things (IoT) Devices Using MQTT Version 5 and LDAPNethmi N. Nanayakkara Vithanage, Sangeeth S. Hetti Thanthrige, Malsha C. K. Paththini Kapuge, Tharindu H. Malwenna, Chethana Liyanapathirana, Janaka L. Wijekoon. 837-841 [doi]
- Multimedia Contents Retrieval based on 12-Mood VectorChang-bae Moon, Jong-Yeol Lee, Dong Seong Kim, Byeong Man Kim. 842-844 [doi]
- Attribute-Based Access Control(ABAC) with Decentralized Identifier in the Blockchain-Based Energy Transaction PlatformBeomSeok Kim, WoonSeob Shin, DongYeop Hwang, Ki-Hyung Kim. 845-848 [doi]
- Joint Behavioral Cloning and Reinforcement Learning Method for Propofol and Remifentanil Infusion in AnesthesiaMyungjae Shin, Joongheon Kim. 849-852 [doi]
- Night-Time Vehicle Distance Estimation Using Camera Geometry and Deep LearningTrong-Hop Do, Dang-Khoa Tran, Dinh-Quang Hoang, Minh Quan Pham, Quang-Dung Pham, Nhu-Ngoc Dao, Chunghyun Lee, Sungrae Cho. 853-857 [doi]
- A Feasible Study of Cube Sensing Organization Map for Cognitive Spectrum AllocationQuang-Dung Pham, Trong-Hop Do, Nhu-Ngoc Dao, Woongsoo Na, Chunghyun Lee, Sungrae Cho. 858-863 [doi]
- A VNF Placement Method based on VNF CharacteristicsSang-Il Kim, Hwa-sung Kim. 864-869 [doi]
- Real-time health monitoring system design based on optical camera communicationMd. Faisal Ahmed, Md. Osman Ali, Md. Habibur Rahman, Yeong Min Jang. 870-873 [doi]
- Machine-Learning based Analog and Mixed-signal Circuit Design and OptimizationJae-Won Nam, Youn Kyu Lee. 874-876 [doi]
- Performance Analysis of Machine Learning Based Fault Detection for Cloud InfrastructureHojoon Won, Younghan Kim. 877-880 [doi]