Abstract is missing.
- Continuous User Verification via Respiratory BiometricsJian Liu 0001, Yingying Chen 0001, Yudi Dong, Yan Wang, Tianming Zhao, Yu-Dong Yao. 1-10 [doi]
- Deeper Exercise Monitoring for Smart Gym using Fused RFID and CV DataZijuan Liu, Xiulong Liu, Keqiu Li. 11-19 [doi]
- Reconfigure and Reuse: Interoperable Wearables for Healthcare IoTNidhi Pathak, Anandarup Mukherjee, Sudip Misra. 20-29 [doi]
- TrueHeart: Continuous Authentication on Wrist-worn Wearables Using PPG-based BiometricsTianming Zhao, Yan Wang 0003, Jian Liu 0001, Yingying Chen 0001, Jerry Cheng, Jiadi Yu. 30-39 [doi]
- A Converse Result on Convergence Time for Opportunistic Wireless SchedulingMichael J. Neely. 40-48 [doi]
- Is Deadline Oblivious Scheduling Efficient for Controlling Real-Time Traffic in Cellular Downlink Systems?Sherif ElAzzouni, Eylem Ekici, Ness B. Shroff. 49-58 [doi]
- On the Power of Randomization for Scheduling Real-Time Traffic in Wireless NetworksChristos Tsanikidis, Javad Ghaderi. 59-68 [doi]
- OST: On-Demand TSCH Scheduling with Traffic-AwarenessSeungbeom Jeong, Hyung-Sin Kim, Jeongyeup Paek, Saewoong Bahk. 69-78 [doi]
- (How Much) Does a Private WAN Improve Cloud Performance?Todd Arnold, Ege Gürmeriçliler, Georgia Essig, Arpit Gupta, Matt Calder, Vasileios Giotsas, Ethan Katz-Bassett. 79-88 [doi]
- De-anonymization of Social Networks: the Power of CollectivenessJiapeng Zhang, Luoyi Fu, Xinbing Wang, Songwu Lu. 89-98 [doi]
- Towards Correlated Queries on Trading of Private Web Browsing HistoryHui Cai, Fan Ye 0003, Yuanyuan Yang, Yanmin Zhu, Jie Li. 99-108 [doi]
- Towards Pattern-aware Privacy-preserving Real-time Data CollectionZhibo Wang, Wenxin Liu, Xiaoyi Pang, Ju Ren, Zhe Liu, Yongle Chen. 109-118 [doi]
- Camel: Smart, Adaptive Energy Optimization for Mobile Web InteractionsJie Ren 0007, Lu Yuan, Petteri Nurmi, Xiaoming Wang, Miao Ma, Ling Gao, Zhanyong Tang, Jie Zheng, Zheng Wang. 119-128 [doi]
- COSE: Configuring Serverless Functions using Statistical LearningNabeel Akhtar, Ali Raza, Vatche Ishakian, Ibrahim Matta. 129-138 [doi]
- Machine Learning on Volatile InstancesXiaoxi Zhang, Jianyu Wang, Gauri Joshi, Carlee Joe-Wong. 139-148 [doi]
- Optimizing Mixture Importance Sampling Via Online Learning: Algorithms and ApplicationsTingwei Liu, Hong Xie 0004, John C. S. Lui. 149-158 [doi]
- Exploring Best Arm with Top Reward-Cost Ratio in Stochastic BanditsZhida Qin, Xiaoying Gan, Jia Liu, Hongqiu Wu, Haiming Jin, Luoyi Fu. 159-168 [doi]
- MABSTA: Collaborative Computing over Heterogeneous Devices in Dynamic EnvironmentsYi-Hsuan Kao, Kwame-Lante Wright, Po-Han Huang, Bhaskar Krishnamachari, Fan Bai. 169-178 [doi]
- Combinatorial Multi-Armed Bandit Based Unknown Worker Recruitment in Heterogeneous CrowdsensingGuoju Gao, Jie Wu 0001, Mingjun Xiao, Guoliang Chen 0001. 179-188 [doi]
- Stochastic Network Utility Maximization with Unknown Utilities: Multi-Armed Bandits ApproachArun Verma, Manjesh K. Hanawal. 189-198 [doi]
- Energy-Efficient UAV Crowdsensing with Multiple Charging Stations by Deep LearningChi Harold Liu, Chengzhe Piao, Jian Tang 0008. 199-208 [doi]
- RF Backscatter-based State Estimation for Micro Aerial VehiclesShengkai Zhang, Wei Wang 0050, Ning Zhang, Tao Jiang. 209-217 [doi]
- SocialDrone: An Integrated Social Media and Drone Sensing System for Reliable Disaster ResponseMd. Tahmid Rashid, Daniel Yue Zhang, Dong Wang. 218-227 [doi]
- VFC-Based Cooperative UAV Computation Task Offloading for Post-disaster RescueWeiwei Chen 0007, Zhou Su, Qichao Xu, Tom H. Luan, Ruidong Li. 228-236 [doi]
- Coded Edge ComputingKwang Taik Kim, Carlee Joe-Wong, Mung Chiang. 237-246 [doi]
- HotDedup: Managing Hot Data Storage at Network Edge through Optimal Distributed DeduplicationShijing Li, Tian Lan. 247-256 [doi]
- Joint Configuration Adaptation and Bandwidth Allocation for Edge-based Real-time Video AnalyticsCan Wang, Sheng Zhang 0001, Yu Chen, Zhuzhong Qian, Jie Wu, Mingjun Xiao. 257-266 [doi]
- Latency-aware VNF Chain Deployment with Efficient Resource Reuse at Network EdgePanpan Jin, Xincai Fei, Qixia Zhang, Fangming Liu, Bo Li 0001. 267-276 [doi]
- A Universal Method to Combat Multipaths for RFID SensingGe Wang 0003, Chen Qian 0001, Kaiyan Cui, Xiaofeng Shi, Han Ding, Wei Xi, Jizhong Zhao, Jinsong Han. 277-286 [doi]
- AnyScatter: Eliminating Technology Dependency in Ambient Backscatter SystemsTaekyung Kim, Wonjun Lee. 287-296 [doi]
- RF-Ear: Contactless Multi-device Vibration Sensing and Identification Using COTS RFIDPanlong Yang, Yuanhao Feng, Jie Xiong 0001, Ziyang Chen, Xiang-Yang Li 0001. 297-306 [doi]
- TagRay: Contactless Sensing and Tracking of Mobile Objects using COTS RFID DevicesZiyang Chen, Panlong Yang, Jie Xiong 0001, Yuanhao Feng, Xiang-Yang Li 0001. 307-316 [doi]
- Communication-Efficient Network-Distributed Optimization with Differential-Coded CompressorsXin Zhang, Jia Liu, Zhengyuan Zhu, Elizabeth S. Bentley. 317-326 [doi]
- How to Distribute Computation in NetworksDerya Malak, Alejandro Cohen, Muriel Médard. 327-336 [doi]
- Simple and Fast Distributed Computation of Betweenness CentralityPierluigi Crescenzi, Pierre Fraigniaud, Ami Paz. 337-346 [doi]
- Systematic Topology Design for Large-Scale Networks: A Unified FrameworkYijia Chang, Xi Huang, Longxiulin Deng, Ziyu Shao, Junshan Zhang. 347-356 [doi]
- MagView: A Distributed Magnetic Covert Channel via Video Encoding and DecodingJuchuan Zhang, Xiaoyu Ji, Wenyuan Xu, Yi-Chao Chen, Yuting Tang, Gang Qu. 357-366 [doi]
- Stealthy DGoS Attack: DeGrading of Service under the Watch of Network TomographyCho-Chun Chiu, Ting He. 367-376 [doi]
- Voiceprint Mimicry Attack Towards Speaker Verification System in Smart HomeLei Zhang, Yan Meng, Jiahao Yu, Chong Xiang, Brandon Falk, Haojin Zhu. 377-386 [doi]
- Your Privilege Gives Your Privacy Away: An Analysis of a Home Security Camera ServiceJinyang Li, Zhenyu Li 0001, Gareth Tyson, Gaogang Xie. 387-396 [doi]
- Autonomous Unknown-Application Filtering and Labeling for DL-based Traffic Classifier UpdateJielun Zhang, Fuhao Li, Feng Ye, Hongyu Wu. 397-405 [doi]
- Communication-Efficient Distributed Deep Learning with Merged Gradient Sparsification on GPUsShaohuai Shi, Qiang Wang, Xiaowen Chu, Bo Li, Yang Qin, Ruihao Liu, Xinxiao Zhao. 406-415 [doi]
- Tracking the State of Large Dynamic Networks via Reinforcement LearningMatthew Andrews, Sem C. Borst, Jeongran Lee, Enrique Martin-Lopez, Karina Palyutina. 416-425 [doi]
- Unsupervised and Network-Aware Diagnostics for Latent Issues in Network Information DatabasesHua Shao, Li Chen, Youjian Zhao. 426-435 [doi]
- AoI Scheduling with Maximum ThresholdsChengzhang Li, Shaoran Li, Yongce Chen, Y. Thomas Hou, Wenjing Lou. 436-445 [doi]
- Minimizing Age of Information in Multi-channel Time-sensitive Information Update SystemsZhenzhi Qian, Fei Wu 0008, Jiayu Pan, Kannan Srinivasan, Ness B. Shroff. 446-455 [doi]
- On the Minimum Achievable Age of Information for General Service-Time DistributionsJaya Prakash Champati, Ramana R. Avula, Tobias J. Oechtering, James Gross. 456-465 [doi]
- Unifying AoI Minimization and Remote Estimation - Optimal Sensor/Controller Coordination with Random Two-way DelayCho-Hsin Tsai, Chih-Chun Wang. 466-475 [doi]
- AoI and Throughput Tradeoffs in Routing-aware Multi-hop Wireless NetworksJiadong Lou, Xu Yuan, Sastry Kompella, Nian-Feng Tzeng. 476-485 [doi]
- Decentralized placement of data and analytics in wireless networks for energy-efficient executionPrithwish Basu, Theodoros Salonidis, Brent Kraczek, Sayed M. Saghaian N. E., Ali Sydney, Bongjun Ko, Tom La Porta, Kevin S. Chan. 486-495 [doi]
- Link Quality Estimation of Cross-Technology CommunicationJia Zhang, Xiuzhen Guo, Haotian Jiang, Xiaolong Zheng 0002, Yuan He 0004. 496-505 [doi]
- S-MAC: Achieving High Scalability via Adaptive Scheduling in LPWANZhuqing Xu, Junzhou Luo, Zhimeng Yin, Tian He 0001, Fang Dong 0001. 506-515 [doi]
- Exploring the interplay between CDN caching and video streaming performanceEhab Ghabashneh, Sanjay Rao. 516-525 [doi]
- Similarity Caching: Theory and AlgorithmsMichele Garetto, Emilio Leonardi, Giovanni Neglia. 526-535 [doi]
- T-cache: Dependency-free Ternary Rule Cache for Policy-based ForwardingYing Wan, Haoyu Song, Yang Xu, Yilun Wang, Tian Pan, Chuwen Zhang, Bin Liu 0001. 536-545 [doi]
- Universally Stable Cache NetworksYuanyuan Li, Stratis Ioannidis. 546-555 [doi]
- Dynamic Speed Warping: Similarity-Based One-shot Learning for Device-free Gesture SignalsXun Wang, Ke Sun, Ting Zhao, Wei Wang 0002, Qing Gu. 556-565 [doi]
- Push the Limit of Acoustic Gesture RecognitionYanwen Wang, Jiaxing Shen, Yuanqing Zheng. 566-575 [doi]
- Towards Anti-interference WiFi-based Activity Recognition System Using Interference-Independent Phase ComponentJinyang Huang, Bin Liu 0016, Pengfei Liu, Chao Chen, Ning Xiao, Yu Wu, Chi Zhang 0001, Nenghai Yu. 576-585 [doi]
- WiHF: Enable User Identified Gesture Recognition with WiFiChenning Li, Manni Liu, Zhichao Cao. 586-595 [doi]
- Computation Scheduling for Wireless Powered Mobile Edge Computing NetworksTongxin Zhu, Jianzhong Li, Zhipeng Cai, Yingshu Li, Hong Gao. 596-605 [doi]
- Distributed and Optimal RDMA Resource Scheduling in Shared Data Center NetworksDian Shen, Junzhou Luo, Fang Dong 0001, Xiaolin Guo, Kai Wang, John C. S. Lui. 606-615 [doi]
- Injection Time Planning: Making CQF Practical in Time-Sensitive NetworkingJinli Yan, Wei Quan, Xuyan Jiang, ZhiGang Sun. 616-625 [doi]
- Preemptive All-reduce Scheduling for Expediting Distributed DNN TrainingYixin Bao, Yanghua Peng, Yangrui Chen, Chuan Wu. 626-635 [doi]
- BLESS: A BLE Application Security Scanning FrameworkYue Zhang 0025, Jian Weng 0001, Zhen Ling, Bryan Pearson, Xinwen Fu. 636-645 [doi]
- Exposing the Fingerprint: Dissecting the Impact of the Wireless Channel on Radio FingerprintingAmani Al-Shawabka, Francesco Restuccia, Salvatore D'Oro, Tong Jian, Bruno Costa Rendon, Nasim Soltani, Jennifer G. Dy, Stratis Ioannidis, Kaushik R. Chowdhury, Tommaso Melodia. 646-655 [doi]
- Learning Optimal Sniffer Channel Assignment for Small Cell Cognitive Radio NetworksLixing Chen, Zhuo Lu, Pan Zhou, Jie Xu 0001. 656-665 [doi]
- SpiderMon: Towards Using Cell Towers as Illuminating Sources for Keystroke MonitoringKang Ling, Yuntang Liu, Ke Sun, Wei Wang, Lei Xie, Qing Gu. 666-675 [doi]
- Eagle: Refining Congestion Control by Learning from the ExpertsSalma Emara, Baochun Li, Yanjiao Chen. 676-685 [doi]
- Fast Network Alignment via Graph Meta-LearningFan Zhou 0002, Chengtai Cao, Goce Trajcevski, Kunpeng Zhang, Ting Zhong, Ji Geng. 686-695 [doi]
- MagPrint: Deep Learning Based User Fingerprinting Using Electromagnetic SignalsLanqing Yang, Yi-Chao Chen, Hao Pan, Dian Ding, Guangtao Xue, Linghe Kong, Jiadi Yu, Minglu Li 0001. 696-705 [doi]
- Rldish: Edge-Assisted QoE Optimization of HTTP Live Streaming with Reinforcement LearningHuan Wang, Kui Wu, Jianping Wang 0001, Guoming Tang. 706-715 [doi]
- A New Fully-Distributed Arbitration-Based Membership ProtocolShegufta Bakht Ahsan, Indranil Gupta. 716-725 [doi]
- A Zeroth-Order ADMM Algorithm for Stochastic Optimization over Distributed Processing NetworksZai Shi, Atilla Eryilmaz. 726-735 [doi]
- PDL: A Data Layout towards Fast Failure Recovery for Erasure-coded Distributed Storage SystemsLiangliang Xu, Min Lv, Zhipeng Li, Cheng Li, Yinlong Xu. 736-745 [doi]
- Sequential addition of coded sub-tasks for straggler mitigationAjay Badita, Parimal Parag, Vaneet Aggarwal. 746-755 [doi]
- Dense Distributed Massive MIMO: Precoding and Power ControlAliye Özge Kaya, Harish Viswanathan. 756-763 [doi]
- Online Learning for Joint Beam Tracking and Pattern Optimization in Massive MIMO SystemsJongjin Jeong, Sung-Hoon Lim, Yujae Song, Sang-Woon Jeon. 764-773 [doi]
- Optimizing Resolution-Adaptive Massive MIMO NetworksNarayan Prasad, Xiao-Feng Qi, Arkady Molev-Shteiman. 774-783 [doi]
- Skin-MIMO: Vibration-based MIMO Communication over Human SkinDong Ma 0001, Yuezhong Wu, Ming Ding 0001, Mahbub Hassan, Wen Hu. 784-793 [doi]
- AZTEC: Anticipatory Capacity Allocation for Zero-Touch Network SlicingDario Bega, Marco Gramaglia, Marco Fiore, Albert Banchs, Xavier Costa-Pérez. 794-803 [doi]
- OKpi: All-KPI Network Slicing Through Efficient Resource AllocationJ. Martín-Peréz, Francesco Malandrino, Carla-Fabiana Chiasserini, Carlos Jesus Bernardos. 804-813 [doi]
- Elastic Network VirtualizationMax Alaluna, Nuno Neves 0001, Fernando M. V. Ramos. 814-823 [doi]
- Letting off STEAM: Distributed Runtime Traffic Scheduling for Service Function ChainingMarcel Blöcher, Ramin Khalili, Lin Wang, Patrick Eugster. 824-833 [doi]
- DeepAdapter: A Collaborative Deep Learning Framework for the Mobile Web Using Context-Aware Network PruningYakun Huang, Xiuquan Qiao, Jian Tang, Pei Ren, Ling Liu, Calton Pu, Junliang Chen. 834-843 [doi]
- DeepWiERL: Bringing Deep Reinforcement Learning to the Internet of Self-Adaptive ThingsFrancesco Restuccia, Tommaso Melodia. 844-853 [doi]
- Distributed Inference Acceleration with Adaptive DNN Partitioning and OffloadingThaha Mohammed, Carlee Joe-Wong, Rohit Babbar, Mario Di Francesco. 854-863 [doi]
- Informative Path Planning for Mobile Sensing with Reinforcement LearningYongyong Wei, Rong Zheng. 864-873 [doi]
- IoTArgos: A Multi-Layer Security Monitoring System for Internet-of-Things in Smart HomesYinxin Wan, Kuai Xu, Guoliang Xue, Feng Wang 0002. 874-883 [doi]
- IoTGaze: IoT Security Enforcement via Wireless Context AnalysisTianbo Gu, Zheng Fang, Allaukik Abhishek, Hao Fu, Pengfei Hu, Prasant Mohapatra. 884-893 [doi]
- Pinpointing Hidden IoT Devices via Spatial-temporal Traffic FingerprintingXiaobo Ma, Jian Qu, Jianfeng Li, John C. S. Lui, Zhenhua Li 0001, Xiaohong Guan. 894-903 [doi]
- RUEGAN: Embracing a Self-Adversarial Agent for Building a Defensible Edge Security ArchitectureJinYi Yoon, HyungJune Lee. 904-913 [doi]
- Guardian: Evaluating Trust in Online Social Networks with Graph Convolutional NetworksWanyu Lin, Zhaolin Gao, Baochun Li. 914-923 [doi]
- Joint Inference on Truth/Rumor and Their Sources in Social NetworksShan Qu, Ziqi Zhao, Luoyi Fu, Xinbing Wang, Jun Xu. 924-933 [doi]
- Privacy Policy in Online Social Network with Targeted Advertising BusinessGuocheng Liao, Xu Chenl, Jianwei Huang. 934-943 [doi]
- When Reputation Meets Subsidy: How to Build High Quality On Demand Service PlatformsZhixuan Fang, Jianwei Huang. 944-953 [doi]
- RepBun: Load-Balanced, Shuffle-Free Cluster Caching for Structured DataMinchen Yu, Yinghao Yu, Yunchuan Zheng, Baichen Yang, Wei Wang 0030. 954-963 [doi]
- *Ruiyun Yu, Dezhi Ye, Jie Li. 964-973 [doi]
- Universal Online Sketch for Tracking Heavy Hitters and Estimating Moments of Data StreamsQingjun Xiao, Zhiying Tang, Shigang Chen. 974-983 [doi]
- On the Economic Value of Mobile CachingYichen Ruan, Carlee Joe-Wong. 984-993 [doi]
- A Fast Carrier Scheduling Algorithm for Battery-free Sensor Tags in Commodity Wireless NetworksCarlos M. Pérez-Penichet, Dilushi Piumwardane, Christian Rohner, Thiemo Voigt. 994-1003 [doi]
- Activating Wireless Voice for E-Toll Collection Systems with Zero Start-up CostZhenlin An, Qiongzheng Lin, Lei Yang 0025, Xie Lei 0004. 1004-1013 [doi]
- Global Cooperation for Heterogeneous NetworksWeiwei Chen, Zhimeng Yin, Tian He. 1014-1023 [doi]
- Harmony: Saving Concurrent Transmissions from Harsh RF InterferenceXiaoyuan Ma, Peilin Zhang, Ye Liu, Carlo Alberto Boano, Hyung-Sin Kim, Jianming Wei, Jun Huang. 1024-1033 [doi]
- SAFCast: Smart Inter-Datacenter Multicast Transfer with Deadline Guarantee by Store-And-ForwardingHsueh-Hong Kang, Chi-Hsiang Hung, Charles H.-P. Wen. 1034-1042 [doi]
- Scheduling for Weighted Flow and Completion Times in Reconfigurable NetworksMichael Dinitz, Benjamin Moseley. 1043-1052 [doi]
- Scheduling Placement-Sensitive BSP Jobs with Inaccurate Execution Time EstimationZhenhua Han, Haisheng Tan, Shaofeng H.-C. Jiang, Xiaoming Fu 0001, Wanli Cao, Francis C. M. Lau 0001. 1053-1062 [doi]
- Tiny Tasks - A Remedy for Synchronization Constraints in Multi-Server SystemsMarkus Fidler, Brenton D. Walker, Stefan Bora. 1063-1072 [doi]
- A Longitudinal View of Netflix: Content Delivery over IPv6 and Content Cache DeploymentsTrinh Viet Doan, Vaibhav Bajpai, Sam Crawford. 1073-1082 [doi]
- LiveScreen: Video Chat Liveness Detection Leveraging Skin ReflectionHongbo Liu, Zhihua Li, Yucheng Xie, Ruizhe Jiang, Yan Wang, Xiaonan Guo, Yingying Chen 0001. 1083-1092 [doi]
- MultiLive: Adaptive Bitrate Control for Low-delay Multi-party Interactive Live StreamingZiyi Wang, Yong Cui 0001, Xiaoyu Hu, Xin Wang, Wei Tsang Ooi, Yi Li 0015. 1093-1102 [doi]
- PERM: Neural Adaptive Video Streaming with Multi-path TransmissionYushuo Guan, Yuanxing Zhang, Bingxuan Wang, Kaigui Bian, Xiaoliang Xiong, Lingyang Song. 1103-1112 [doi]
- Dynamic User Recruitment with Truthful Pricing for Mobile CrowdSensingWenbin Liu, Yongjian Yang, En Wang, Jie Wu. 1113-1122 [doi]
- Multi-Task-Oriented Vehicular Crowdsensing: A Deep Learning ApproachChi Harold Liu, Zipeng Dai, Haoming Yang, Jian Tang 0008. 1123-1132 [doi]
- Towards Personalized Privacy-Preserving Incentive for Truth Discovery in Crowdsourced Binary-Choice Question AnsweringPeng Sun, Zhibo Wang, Yunhe Feng, Liantao Wu, Yanjun Li 0004, Hairong Qi, Zhi Wang 0003. 1133-1142 [doi]
- Look Ahead at the First-mile in Livecast with Crowdsourced Highlight PredictionCong Zhang 0002, Jiangchuan Liu, Zhi Wang, Lifeng Sun. 1143-1152 [doi]
- Stable and Efficient Piece-Selection in Multiple Swarm BitTorrent-like Peer-to-Peer NetworksNouman Khan, Mehrdad Moharrami, Vijay Subramanian. 1153-1162 [doi]
- ReLoca: Optimize Resource Allocation for Data-parallel Jobs using Deep LearningZhiyao Hu, Dongsheng Li, Dongxiang Zhang, Yixin Chen. 1163-1171 [doi]
- Semi-distributed Contention-based Resource Allocation for Ultra Reliable Low Latency CommunicationsPatrick Brown, Salah-Eddine Elayoubi. 1172-1180 [doi]
- SoSA: Socializing Static APs for Edge Resource Pooling in Large-Scale WiFi SystemFeng Lyu 0001, Ju Ren, Peng Yang, Nan Cheng, Yaoxue Zhang, Xuemin Sherman Shen. 1181-1190 [doi]
- Expanding the Role of Preambles to Support User-defined Functionality in MIMO-based WLANsZhengguang Zhang, Hanif Rahbari, Marwan Krunz. 1191-1200 [doi]
- Exploiting Self-Similarity for Under-Determined MIMO Modulation RecognitionWei Xiong, Lin Zhang, Maxwell McNeil, Petko Bogdanov, Mariya Zheleva. 1201-1210 [doi]
- Online Precoding Design for Downlink MIMO Wireless Network Virtualization with Imperfect CSIJuncheng Wang, Min Dong, Ben Liang, Gary Boudreau. 1211-1220 [doi]
- Physical-Layer Arithmetic for Federated Learning in Uplink MU-MIMO Enabled Wireless NetworksTao Huang, Baoliu Ye, Zhihao Qu, Bin Tang, Lei Xie, Sanglu Lu. 1221-1230 [doi]
- A Deep Analysis on General Approximate CountersTong Yun, Bin Liu. 1231-1240 [doi]
- Efficient and Consistent TCAM UpdatesBohan Zhao, Rui Li, Jin Zhao, Tilman Wolf. 1241-1250 [doi]
- Faster and More Accurate Measurement through Additive-Error CountersRan Ben-Basat, Gil Einziger, Michael Mitzenmacher, Shay Vargaftik. 1251-1260 [doi]
- Network Monitoring for SDN Virtual NetworksGyeongsik Yang, Heesang Jin, Minkoo Kang, Gi Jun Moon, Chuck Yoo. 1261-1270 [doi]
- DeepTrack: Grouping RFID Tags Based on Spatio-temporal Proximity in Retail SpacesShasha Li, Mustafa Y. Arslan, Amir Khojastepour, Srikanth V. Krishnamurthy, Sampath Rangarajan. 1271-1280 [doi]
- Enabling RFID-Based Tracking for Multi-Objects with Visual Aids: A Calibration-Free SolutionChunhui Duan, Wenlei Shi, Fan Dang, Xuan Ding. 1281-1290 [doi]
- Reliable Backscatter with Commodity BLEMaolin Zhang, Jia Zhao, Si Chen, Wei Gong. 1291-1299 [doi]
- Reliable Wide-Area Backscatter via Channel PolarizationGuochao Song, Hang Yang, Wei Wang 0050, Tao Jiang. 1300-1308 [doi]
- Clustering-preserving Network Flow SketchingYongquan Fu, Dongsheng Li, Siqi Shen, Yiming Zhang 0003, Kai Chen. 1309-1318 [doi]
- Efficient Coflow Transmission for Distributed Stream ProcessingWenxin Li, Xu Yuan, Wenyu Qu, Heng Qi, Xiaobo Zhou, Sheng Chen, Renhai Xu. 1319-1328 [doi]
- Online Network Flow Optimization for Multi-Grade Service ChainsVíctor Valls, George Iosifidis, Geeth de Mel, Leandros Tassiulas. 1329-1338 [doi]
- SketchFlow: Per-Flow Systematic Sampling Using Sketch Saturation EventRhongHo Jang, Daehong Min, Seongkwang Moon, David Mohaisen, DaeHun Nyang. 1339-1348 [doi]
- Predictive Scheduling for Virtual RealityI-Hong Hou, Narges Zarnaghi Naghsh, Sibendu Paul, Y. Charlie Hu, Atilla Eryilmaz. 1349-1358 [doi]
- PROMAR: Practical Reference Object-based Multi-user Augmented RealityTengpeng Li, Son Nam Nguyen, Xiaoqian Zhang, Teng Wang, Bo Sheng. 1359-1368 [doi]
- SCYLLA: QoE-aware Continuous Mobile Vision with FPGA-based Dynamic Deep Neural Network ReconfigurationShuang Jiang, Zhiyao Ma, Xiao Zeng, Chenren Xu, Mi Zhang, Chen Zhang, Yunxin Liu. 1369-1378 [doi]
- User Preference Based Energy-Aware Mobile AR System with Edge ComputingHaoxin Wang, Jiang (Linda) Xie. 1379-1388 [doi]
- Approximation Algorithms for the Team Orienteering ProblemWenzheng Xu, Zichuan Xu, Jian Peng 0002, Weifa Liang, Tang Liu 0001, Xiaohua Jia, Sajal K. Das 0001. 1389-1398 [doi]
- Design and Optimization of Electric Autonomous Vehicles with Renewable Energy Source for Smart CitiesPengzhan Zhou, Cong Wang, Yuanyuan Yang. 1399-1408 [doi]
- Enabling Communication via Automotive Radars: An Adaptive Joint Waveform Design ApproachCeyhun D. Ozkaptan, Eylem Ekici, Onur Altintas. 1409-1418 [doi]
- Revealing Much While Saying Less: Predictive Wireless for Status UpdateZhiyuan Jiang, Zixu Cao, Siyu Fu, Fei Peng, Shan Cao, Shunqing Zhang, Shugong Xu. 1419-1428 [doi]
- CoBeam: Beamforming-based Spectrum Sharing With Zero Cross-Technology Signaling for 5G Wireless NetworksLorenzo Bertizzolo, Emrecan Demirors, Zhangyu Guan, Tommaso Melodia. 1429-1438 [doi]
- Towards Primary User Sybil-proofness for Online Spectrum Auction in Dynamic Spectrum AccessXuewen Dong, Qiao Kang, Qingsong Yao, Di Lu, Yang Xu, Jia Liu. 1439-1448 [doi]
- Online Bayesian Learning for Rate Selection in Millimeter Wave Cognitive Radio NetworksMuhammad Anjum Qureshi, Cem Tekin. 1449-1458 [doi]
- U-CIMAN: Uncover Spectrum and User Information in LTE Mobile Access NetworksRui Zou, Wenye Wang. 1459-1468 [doi]
- MAMBA: A Multi-armed Bandit Framework for Beam Tracking in Millimeter-wave SystemsIrmak Aykin, Berk Akgun, Mingjie Feng, Marwan Krunz. 1469-1478 [doi]
- PASID: Exploiting Indoor mmWave Deployments for Passive Intrusion DetectionFrancesco Devoti, Vincenzo Sciancalepore, Ilario Filippini, Xavier Costa-Pérez. 1479-1488 [doi]
- Turbo-HB: A Novel Design and Implementation to Achieve Ultra-Fast Hybrid BeamformingYongce Chen, Yan Huang 0025, Chengzhang Li, Y. Thomas Hou, Wenjing Lou. 1489-1498 [doi]
- SIMBA: Single RF Chain Multi-User Beamforming in 60 GHz WLANsKeerthi Priya Dasala, Josep Miquel Jornet, Edward W. Knightly. 1499-1508 [doi]
- Coeus: Consistent and Continuous Network Update in Software-Defined NetworksXin He, Jiaqi Zheng, Haipeng Dai, Chong Zhang, Wajid Rafique, Geng Li, Wanchun Dou, Qiang Ni. 1509-1518 [doi]
- Flow Table Security in SDN: Adversarial Reconnaissance and Intelligent AttacksMingli Yu, Ting He, Patrick Drew McDaniel, Quinn K. Burke. 1519-1528 [doi]
- Toward Optimal Software-Defined Interdomain RoutingQiao Xiang, Jingxuan Zhang, Kai Gao, Yeon-sup Lim, Franck Le, Geng Li, Y. Richard Yang. 1529-1538 [doi]
- Towards Latency Optimization in Hybrid Service Function Chain Composition and EmbeddingDanyang Zheng, Chengzong Peng, Xueting Liao, Ling Tian, Guangchun Luo, Xiaojun Cao. 1539-1548 [doi]
- MAGIC: Magnetic Resonant Coupling for Intra-body CommunicationStella Banou, Kai Li, Kaushik Chowdhury. 1549-1558 [doi]
- Dynamically Adaptive Cooperation Transmission among Satellite-Ground Integrated NetworksFeilong Tang. 1559-1568 [doi]
- Synergetic Denial-of-Service Attacks and Defense in Underwater Named Data NetworkingYue Li, Yingjian Liu, Yu Wang 0003, Zhongwen Guo, Haoyu Yin, Hao Teng. 1569-1578 [doi]
- An Energy Efficiency Multi-Level Transmission Strategy based on underwater multimodal communication in UWSNsZhao Zhao, Chunfeng Liu 0001, Wenyu Qu, Tao Yu. 1579-1587 [doi]
- Bound-based Network Tomography for Inferring Interesting Link MetricsHuikang Li, Yi Gao, Wei Dong, Chun Chen 0001. 1588-1597 [doi]
- ProTO: Proactive Topology Obfuscation Against Adversarial Network Topology InferenceTao Hou, Zhe Qu, Tao Wang, Zhuo Lu, Yao Liu. 1598-1607 [doi]
- SpreadSketch: Toward Invertible and Network-Wide Detection of SuperspreadersLu Tang, Qun Huang, Patrick P. C. Lee. 1608-1617 [doi]
- Variational Information Diffusion for Probabilistic Cascades PredictionFan Zhou 0002, Xovee Xu, Kunpeng Zhang, Goce Trajcevski, Ting Zhong. 1618-1627 [doi]
- A Dynamic Mechanism for Security Management in Multi-Agent Networked SystemsShiva Navabi, Ashutosh Nayyar. 1628-1637 [doi]
- KV-Fresh: Freshness Authentication for Outsourced Multi-Version Key-Value StoresYidan Hu, Rui Zhang, Yanchao Zhang. 1638-1647 [doi]
- Modeling the Impact of Network Connectivity on Consensus Security of Proof-of-Work BlockchainYang Xiao, Ning Zhang 0017, Wenjing Lou, Y. Thomas Hou. 1648-1657 [doi]
- Scheduling DDoS Cloud Scrubbing in ISP Networks via Randomized Online AuctionsWencong You, Lei Jiao, Jun Li, Ruiting Zhou. 1658-1667 [doi]
- Automating Cloud Deployment for Deep Learning Inference of Real-time Online ServicesYang Li, Zhenhua Han, Quanlu Zhang, Zhenhua Li, Haisheng Tan. 1668-1677 [doi]
- Geryon: Accelerating Distributed CNN Training by Network-Level Flow SchedulingShuai Wang, Dan Li, Jinkun Geng. 1678-1687 [doi]
- Neural Tensor Completion for Accurate Network MonitoringKun Xie 0001, Huali Lu, Xin Wang, Gaogang Xie, Yong Ding, Dongliang Xie, Jigang Wen, Dafang Zhang. 1688-1697 [doi]
- Optimizing Federated Learning on Non-IID Data with Reinforcement LearningHao Wang, Zakhary Kaplan, Di Niu, Baochun Li. 1698-1707 [doi]
- A Lightweight Auction Framework for Spectrum Allocation with Strong Security GuaranteesKe Cheng, Liangmin Wang, Yulong Shen, Yangyang Liu, Yongzhi Wang, Lele Zheng. 1708-1717 [doi]
- Fair and Protected Profit Sharing for Data Trading in Pervasive Edge Computing EnvironmentsYaodong Huang, Yiming Zeng, Fan Ye 0003, Yuanyuan Yang. 1718-1727 [doi]
- Secure Balance Planning of Off-blockchain Payment Channel NetworksPeng Li, Toshiaki Miyazaki, Wanlei Zhou. 1728-1737 [doi]
- Travel with Your Mobile Data Plan: A Location-Flexible Data ServiceZhiyuan Wang, Lin Gao 0001, Jianwei Huang. 1738-1747 [doi]
- Distributed Collaborative 3D-Deployment of UAV Base Stations for On-Demand CoverageTatsuaki Kimura, Masaki Ogura. 1748-1757 [doi]
- Looking before Crossing: An Optimal Algorithm to Minimize UAV Energy by Speed Scheduling with a Practical Flight Energy ModelFeng Shan, Junzhou Luo, RunQun Xiong, Wenjia Wu, Jiashuo Li. 1758-1767 [doi]
- SwarmControl: An Automated Distributed Control Framework for Self-Optimizing Drone NetworksLorenzo Bertizzolo, Salvatore D'Oro, Ludovico Ferranti, Leonardo Bonati, Emrecan Demirors, Zhangyu Guan, Tommaso Melodia, Scott Pudlewski. 1768-1777 [doi]
- WBF-PS: WiGig Beam Fingerprinting for UAV Positioning System in GPS-denied EnvironmentsPei-Yuan Hong, Chi-Yu Li, Hong-Rong Chang, YuanHao Hsueh, Kuochen Wang. 1778-1787 [doi]
- AudiSDN: Automated Detection of Network Policy Inconsistencies in Software-Defined NetworksSeungsoo Lee, Seungwon Woo, Jinwoo Kim, Vinod Yegneswaran, Phillip Porras, Seungwon Shin. 1788-1797 [doi]
- Inferring Firewall Rules by Cache Side-channel Analysis in Network Function VirtualizationYoungjoo Shin, Dongyoung Koo, Junbeom Hur. 1798-1807 [doi]
- Multicast Traffic Engineering with Segment Trees in Software-Defined NetworksChih-Hang Wang, Sheng-Hao Chiang, Shan-Hsiang Shen, De-Nian Yang, Wen-Tsuen Chen. 1808-1817 [doi]
- SDN-based Order-aware Live Migration of Virtual MachinesDinuni Fernando, Ping Yang, Hui Lu. 1818-1827 [doi]
- Edge Assisted Mobile Semantic Visual SLAMJingao Xu, Hao Cao, Danyang Li, Kehong Huang, Chen Qian, Longfei Shangguan, Zheng Yang 0002. 1828-1837 [doi]
- POLAR: Passive object localization with IEEE 802.11ad using phased antenna arraysDolores García, Jesus Omar Lacruz, Pablo Jiménez Mateo, Joerg Widmer. 1838-1847 [doi]
- AcouRadar: Towards Single Source based Acoustic LocalizationLinsong Cheng, Zhao Wang, Yunting Zhang, Weiyi Wang, Weimin Xu, Jiliang Wang. 1848-1856 [doi]
- When FTM Discovered MUSIC: Accurate WiFi-based Ranging in the Presence of MultipathKevin Jiokeng, Gentian Jakllari, Alain Tchana, André-Luc Beylot. 1857-1866 [doi]
- An Adaptive and Fast Convergent Approach to Differentially Private Deep LearningZhiying Xu, Shuyu Shi, Alex X. Liu, Jun Zhao, Lin Chen. 1867-1876 [doi]
- Enabling Execution Assurance of Federated Learning at Untrusted ParticipantsXiaoli Zhang, Fengting Li, Zeyu Zhang, Qi Li, Cong Wang, Jianping Wu. 1877-1886 [doi]
- EncELC: Hardening and Enriching Ethereum Light Clients with Trusted EnclavesChengjun Cai, Lei Xu, Anxin Zhou, Ruochen Wang, Cong Wang, Qian Wang. 1887-1896 [doi]
- Mneme: A Mobile Distributed LedgerDimitris Chatzopoulos, Sujit Gujar, Boi Faltings, Pan Hui. 1897-1906 [doi]
- DRAMD: Detect Advanced DRAM-based Stealthy Communication Channels with Neural NetworksZhiyuan Lv, Youjian Zhao, Chao Zhang, Haibin Li. 1907-1916 [doi]
- PPGPass: Nonintrusive and Secure Mobile Two-Factor Authentication via WearablesYetong Cao, Qian Zhang, Fan Li, Song Yang, Yu Wang. 1917-1926 [doi]
- ROBin: Known-Plaintext Attack Resistant Orthogonal Blinding via Channel RandomizationYanjun Pan, Yao Zheng, Ming Li. 1927-1936 [doi]
- Setting the Yardstick: A Quantitative Metric for Effectively Measuring Tactile InternetJoseph P. Verburg, H. J. C. Kroep, Vineet Gokhale, R. Venkatesha Prasad, Vijay Rao. 1937-1946 [doi]
- FastVA: Deep Learning Video Analytics Through Edge Processing and NPU in MobileTianxiang Tan, Guohong Cao. 1947-1956 [doi]
- Improving Quality of Experience by Adaptive Video Streaming with Super-ResolutionYinjie Zhang, Yuanxing Zhang, Yi Wu, Yu Tao, Kaigui Bian, Pan Zhou, Lingyang Song, Hu Tuo. 1957-1966 [doi]
- Stick: A Harmonious Fusion of Buffer-based and Learning-based Approach for Adaptive StreamingTianchi Huang, Chao Zhou, Rui-Xiao Zhang, Chenglei Wu, Xin Yao 0003, Lifeng Sun. 1967-1976 [doi]
- Streaming 360-Degree Videos Using Super-ResolutionMallesham Dasari, Arani Bhattacharya, Santiago Vargas, Pranjal Sahu, Aruna Balasubramanian, Samir R. Das. 1977-1986 [doi]
- Classification of Load Balancing in the InternetRafael Almeida, Ítalo Cunha, Renata Teixeira, Darryl Veitch, Christophe Diot. 1987-1996 [doi]
- Offloading Dependent Tasks in Mobile Edge Computing with Service CachingGongming Zhao, Hongli Xu, Yangming Zhao, Chunming Qiao, Liusheng Huang. 1997-2006 [doi]
- One More Config is Enough: Saving (DC)TCP for High-speed Extremely Shallow-buffered DatacentersWei Bai 0001, Shuihai Hu, Kai Chen, Kun Tan, Yongqiang Xiong. 2007-2016 [doi]
- TINA: A Fair Inter-datacenter Transmission Mechanism with Deadline GuaranteeXiaodong Dong, Wenxin Li, Xiaobo Zhou, Keqiu Li, Heng Qi. 2017-2025 [doi]
- An Effective Multi-node Charging Scheme for Wireless Rechargeable Sensor NetworksTang Liu 0001, Baijun Wu, Shihao Zhang, Jian Peng 0002, Wenzheng Xu. 2026-2035 [doi]
- Energy Harvesting Long-Range Marine CommunicationAli Hosseini-Fahraji, Pedram Loghmannia, Kexiong Curtis Zeng, Xiaofan Li, Sihan Yu, Sihao Sun, Dong Wang, Yaling Yang, Majid Manteghi, Lei Zuo. 2036-2045 [doi]
- Maximizing Charging Utility with Obstacles through Fresnel Diffraction ModelChi Lin, Feng Gao, Haipeng Dai, Jiankang Ren, Lei Wang 0005, Guowei Wu. 2046-2055 [doi]
- Placing Wireless Chargers with Limited MobilityHaipeng Dai, Chaofeng Wu, Xiaoyu Wang, Wanchun Dou, Yunhuai Liu. 2056-2065 [doi]
- Collaborate or Separate? Distributed Service Caching in Mobile Edge CloudsZichuan Xu, Lizhen Zhou, Sid Chi-Kin Chau, Weifa Liang, Qiufen Xia, Pan Zhou. 2066-2075 [doi]
- Cooperative Service Caching and Workload Scheduling in Mobile Edge ComputingXiao Ma, Ao Zhou, Shan Zhang, Shangguang Wang. 2076-2085 [doi]
- Joint Optimization of Signal Design and Resource Allocation in Wireless D2D Edge ComputingJunghoon Kim, Taejoon Kim, Morteza Hashemi, Christopher G. Brinton, David J. Love. 2086-2095 [doi]
- Reducing the Service Function Chain Backup Cost over the Edge and Cloud by a Self-adapting SchemeXiaojun Shang, Yaodong Huang, Zhenhua Liu, Yuanyuan Yang 0001. 2096-2105 [doi]
- An Adaptive Robustness Evolution Algorithm with Self-Competition for Scale-Free Internet of ThingsTie Qiu, Zilong Lu, Keqiu Li, Guoliang Xue, Dapeng Oliver Wu. 2106-2115 [doi]
- Bandwidth Allocation and Service Differentiation in D2D Wireless NetworksFrançois Baccelli, Sanket S. Kalamkar. 2116-2125 [doi]
- Low-Overhead Joint Beam-Selection and Random-Access Schemes for Massive Internet-of-Things with Non-Uniform Channel and LoadYihan Zou, Kwang Taik Kim, Xiaojun Lin, Mung Chiang, Zhi Ding 0001, Risto Wichman, Jyri Hämäläinen. 2126-2135 [doi]
- Online Control of Preamble Groups with Priority in Cellular IoT NetworksJie Liu, Mamta Agiwal, Miao Qu, Hu Jin. 2136-2144 [doi]
- A Randomly Accessible Lossless Compression Scheme for Time-Series DataRasmus Vestergaard, Daniel E. Lucani, Qi Zhang. 2145-2154 [doi]
- On the Optimal Repair-Scaling Trade-off in Locally Repairable CodesSi Wu, Zhirong Shen, Patrick P. C. Lee. 2155-2164 [doi]
- URSAL: Ultra-Efficient, Reliable, Scalable, and Available Block Storage at Low CostHuiba Li, Yiming Zhang 0003, Haonan Wang, Ping Zhong 0002. 2165-2174 [doi]
- Working Set Theorems for Routing in Self-Adjusting Skip List NetworksChen Avin, Iosif Salem, Stefan Schmid 0001. 2175-2184 [doi]
- Lightweight Sybil-Resilient Multi-Robot Networks by Multipath ManipulationYong Huang, Wei Wang, Yiyuan Wang, Tao Jiang, Qian Zhang. 2185-2193 [doi]
- RF-Rhythm: Secure and Usable Two-Factor RFID AuthenticationJiawei Li, Chuyu Wang, Ang Li, Dianqi Han, Yan Zhang, Jinhang Zuo, Rui Zhang, Lei Xie, Yanchao Zhang. 2194-2203 [doi]
- SeVI: Boosting Secure Voice Interactions with Smart DevicesXiao Wang, Hongzi Zhu, Shan Chang, Xudong Wang. 2204-2212 [doi]
- Towards Context Address for Camera-to-Human CommunicationSiyuan Cao, Habiba Farrukh, He Wang 0008. 2213-2222 [doi]
- Analysis, Modeling, and Implementation of Publisher-side Ad Request FilteringLiang Lv, Ke Xu, Haiyang Wang, Meng Shen, Yi Zhao, Minghui Li, Guanhui Geng, Zhichao Liu. 2223-2232 [doi]
- Differentially Private Range Counting in Planar Graphs for Spatial SensingAbhirup Ghosh, Jiaxin Ding, Rik Sarkar, Jie Gao 0001. 2233-2242 [doi]
- Message Type Identification of Binary Network Protocols using Continuous Segment SimilarityStephan Kleber, Rens Wouter van der Heijden, Frank Kargl. 2243-2252 [doi]
- Search Me in the Dark: Privacy-preserving Boolean Range Query over Encrypted Spatial DataXiangyu Wang, Jianfeng Ma, Ximeng Liu, Robert H. Deng, Yinbin Miao, Dan Zhu, Zhuoran Ma. 2253-2262 [doi]
- Cost Minimization in Multi-Path Communication under Throughput and Maximum Delay ConstraintsQingyu Liu, Haibo Zeng, Minghua Chen 0001, Lingjia Liu 0001. 2263-2272 [doi]
- Hop-by-Hop Multipath Routing: Choosing the Right Nexthop SetKlaus Schneider 0004, Beichuan Zhang, Lotfi Benmohamed. 2273-2282 [doi]
- Joint Power Routing and Current Scheduling in Multi-Relay Magnetic MIMO WPT SystemHao Zhou, Wenxiong Hua, Jialin Deng, Xiang Cui, Xiang-Yang Li 0001, Panlong Yang. 2283-2292 [doi]
- Verifying Policy-based Routing at Internet ScaleXiaozhe Shao, Lixin Gao 0001. 2293-2302 [doi]
- CoLoRa: Enabling Multi-Packet Reception in LoRaShuai Tong, Zhenqiang Xu, Jiliang Wang. 2303-2311 [doi]
- DyLoRa: Towards Energy Efficient Dynamic LoRa Transmission ControlYinghui Li, Jing Yang, Jiliang Wang. 2312-2320 [doi]
- LiteNap: Downclocking LoRa ReceptionXianjin Xia, Yuanqing Zheng, Tao Gu. 2321-2330 [doi]
- Online Concurrent Transmissions at LoRa GatewayZhe Wang, Linghe Kong, Kangjie Xu, Liang He 0002, Kaishun Wu, Guihai Chen. 2331-2340 [doi]
- HiFi: Hybrid Rule Placement for Fine-Grained Flow Management in SDNsGongming Zhao, Hongli Xu, Jingyuan Fan, Liusheng Huang, Chunming Qiao. 2341-2350 [doi]
- Homa: An Efficient Topology and Route Management Approach in SD-WAN OverlaysDiman Zad Tootaghaj, Faraz Ahmed, Puneet Sharma, Mihalis Yannakakis. 2351-2360 [doi]
- Incremental Server Deployment for Scalable NFV-enabled NetworksJianChun Liu, Hongli Xu, Gongming Zhao, Chen Qian 0001, Xingpeng Fan, Liusheng Huang. 2361-2370 [doi]
- Network Slicing in Heterogeneous Software-defined RANsQiaofeng Qin, Nakjung Choi, Muntasir Raihan Rahman, Marina Thottan, Leandros Tassiulas. 2371-2380 [doi]
- A Structured Bidirectional LSTM Deep Learning Method For 3D Terahertz Indoor LocalizationShukai Fan, Yongzhi Wu, Chong Han, Xudong Wang 0001. 2381-2390 [doi]
- MagB: Repurposing the Magnetometer for Fine-Grained Localization of IoT DevicesParamasiven Appavoo, Mun Choon Chan, Anand Bhojan. 2391-2399 [doi]
- mmTrack: Passive Multi-Person Localization Using Commodity Millimeter Wave RadioChenshu Wu, Feng Zhang 0016, Beibei Wang 0001, K. J. Ray Liu. 2400-2409 [doi]
- Selection of Sensors for Efficient Transmitter LocalizationArani Bhattacharya, Caitao Zhan, Himanshu Gupta, Samir R. Das, Petar M. Djuric. 2410-2419 [doi]
- Automatically and Adaptively Identifying Severe Alerts for Online Service SystemsNengwen Zhao, Panshi Jin, Lixin Wang, Xiaoqin Yang, Rong Liu, Wenchi Zhang, Kaixin Sui, Dan Pei. 2420-2429 [doi]
- On the impact of accurate radio link modeling on the performance of WirelessHART control networksYuriy Zacchia Lun, Claudia Rinaldi, Amal Alrish, Alessandro D'Innocenzo, Fortunato Santucci. 2430-2439 [doi]
- Online Spread Estimation with Non-duplicate SamplingYu-E. Sun, He Huang 0001, Chaoyi Ma, Shigang Chen, Yang Du, Qingjun Xiao. 2440-2448 [doi]
- ADA: Adaptive Deep Log Anomaly DetectorYali Yuan, Sripriya Srikant Adhatarao, Mingkai Lin, Yachao Yuan, Zheli Liu, Xiaoming Fu 0001. 2449-2458 [doi]
- DFD: Adversarial Learning-based Approach to Defend Against Website FingerprintingAhmed Abusnaina, RhongHo Jang, Aminollah Khormali, DaeHun Nyang, David Mohaisen. 2459-2468 [doi]
- Threats of Adversarial Attacks in DNN-Based Modulation RecognitionYun Lin 0005, Haojun Zhao, Ya Tu, Shiwen Mao, Zheng Dou. 2469-2478 [doi]
- ZeroWall: Detecting Zero-Day Web Attacks through Encoder-Decoder Recurrent Neural NetworksRuming Tang, Zheng Yang, Zeyan Li, Weibin Meng, Haixin Wang, Qi Li, Yongqian Sun, Dan Pei, Tao Wei, Yanfei Xu, Yan Liu. 2479-2488 [doi]
- An Incentive Mechanism Design for Efficient Edge Learning by Deep Reinforcement Learning ApproachYufeng Zhan, Jiang Zhang. 2489-2498 [doi]
- Intelligent Video Caching at Network Edge: A Multi-Agent Deep Reinforcement Learning ApproachFangxin Wang, Feng Wang 0001, Jiangchuan Liu, Ryan Shea, Lifeng Sun. 2499-2508 [doi]
- Network-Aware Optimization of Distributed Learning for Fog ComputingYuwei Tu, Yichen Ruan, Satyavrat Wagle, Christopher G. Brinton, Carlee Joe-Wong. 2509-2518 [doi]
- SurveilEdge: Real-time Video Query based on Collaborative Cloud-Edge Deep LearningShibo Wang, Shusen Yang, Cong Zhao. 2519-2528 [doi]
- Enabling Live Migration of Containerized Applications Across CloudsThad Benjaponpitak, Meatasit Karakate, Kunwadee Sripanidkulchai. 2529-2538 [doi]
- Online Placement of Virtual Machines with Prior DataDavid Naori, Danny Raz. 2539-2548 [doi]
- PAM & PAL: Policy-Aware Virtual Machine Migration and Placement in Dynamic Cloud Data CentersHugo Flores, Vincent Tran, Bin Tang. 2549-2558 [doi]
- SplitCast: Optimizing Multicast Flows in Reconfigurable Datacenter NetworksLong Luo, Klaus-Tycho Foerster, Stefan Schmid 0001, Hongfang Yu. 2559-2568 [doi]
- Joint Access Point Placement and Power-Channel-Resource-Unit Assignment for 802.11ax-Based Dense WiFi with QoS RequirementsShuwei Qiu, Xiaowen Chu, Yiu-Wing Leung, Joseph Kee-Yin Ng. 2569-2578 [doi]
- Machine Learning-based Spoofing Attack Detection in MmWave 60GHz IEEE 802.11ad NetworksNing Wang, Long Jiao, Pu Wang, Weiwei Li, Kai Zeng. 2579-2588 [doi]
- MU-ID: Multi-user Identification Through Gaits Using Millimeter Wave RadiosXin Yang, Jian Liu, Yingying Chen 0001, Xiaonan Guo, Yucheng Xie. 2589-2598 [doi]
- SmartBond: A Deep Probabilistic Machinery for Smart Channel Bonding in IEEE 802.11acRaja Karmakar, Samiran Chattopadhyay, Sandip Chakraborty. 2599-2608 [doi]
- A Fast Hybrid Data Sharing Framework for Hierarchical Mobile Edge ComputingJunjie Xie, Deke Guo, Xiaofeng Shi, Haofan Cai, Chen Qian 0001, Honghui Chen. 2609-2618 [doi]
- Data-driven Distributionally Robust Optimization for Edge IntelligenceZhaofeng Zhang, Sen Lin, Mehmet Dedeoglu, Kemi Ding, Junshan Zhang. 2619-2628 [doi]
- Delay-Optimal Distributed Edge Computing in Wireless Edge NetworksXiaowen Gong. 2629-2638 [doi]
- Fog Integration with Optical Access Networks from an Energy Efficiency PerspectiveAhmed H. Helmy, Amiya Nayak. 2639-2647 [doi]