Abstract is missing.
- Age of Incorrect Information for Remote Estimation of a Binary Markov SourceClement Kam, Sastry Kompella, Anthony Ephremides. 1-6 [doi]
- Detecting State Transitions of a Markov Source: Sampling Frequency and Age Trade-offJaya Prakash Champati, Mikael Skoglund, James Gross. 7-12 [doi]
- Balancing Data Freshness and Distortion in Real-time Status Updating with Lossy CompressionShaoling Hu, Wei Chen 0002. 13-18 [doi]
- Transmission Scheduling for Multi-loop Wireless Networked Control Based on LQ Cost OffsetHe Ma, Shidong Zhou, Xiujun Zhang, Limin Xiao. 19-25 [doi]
- Age of Information for Actuation Update in Real-Time Wireless Control SystemsBo Chang, Liying Li, Guodong Zhao, Zhen Meng, Muhammad Ali Imran, Zhi Chen 0002. 26-30 [doi]
- Maintaining Information Freshness in Power-Efficient Status Update SystemsParisa Rafiee, Peng Zou, Omur Ozel, Suresh Subramaniam. 31-36 [doi]
- Mutual Authentication and Authorized Data Access Between Fog and User Based on Blockchain TechnologyM. Arun, Saminathan Balamurali, Bharat S. Rawal, Qiang Duan, Lakshmana Kumar Ramasamy, Balusamy Balamurugan. 37-42 [doi]
- Cerberus: Privacy-Preserving Computation in Edge ComputingDilu Zhang, Lei Fan. 43-49 [doi]
- Bottleneck-Aware Coflow Scheduling Without Prior KnowledgeLibin Liu, Hong Xu, Chengxi Gao, Peng Wang. 50-55 [doi]
- Revenue-Sharing based Computation-Resource Allocation for Mobile BlockchainYuan Wu, Xu Xu, Liping Qian 0001, Bo Ji, Zhiguo Shi, Weijia Jia. 56-61 [doi]
- Cooperative Game Model of Delegation Computing: Verifier Separated from CalculatorsDuo Zhang, Youliang Tian, Linjie Wang, Sheng Gao, Jianfeng Ma. 62-67 [doi]
- U-ASG: A Universal Method to Perform Adversarial Attack on Autoencoder based Network Anomaly Detection SystemsChenming Yang, Liang Zhou, Hui-Wen, Yue Wu. 68-73 [doi]
- Identification of Encrypted Video Streaming Based on Differential FingerprintsHua Wu, Zhenhua Yu, Guang Cheng, Shuyi Guo. 74-79 [doi]
- RNBG: A Ranking Nodes Based IP Geolocation MethodChong Liu, Xiangyang Luo, Fuxiang Yuan, Fenlin Liu. 80-84 [doi]
- A Framework for Bandwidth and Latency Guaranteed Service in New IP NetworkLin Han, Yingzhen Qu, Lijun Dong, Richard Li. 85-90 [doi]
- P4NIS: Improving network immunity against eavesdropping with programmable data planesGang Liu 0020, Wei Quan, Nan Cheng, Ning Lu 0001, Hongke Zhang, Xuemin Shen. 91-96 [doi]
- Adaptive Video Streaming Using Dynamic NDN Multicast in WLANFan Wu, Wang Yang, Ju Ren, Feng Lyu 0001, Xiaojie Ding, Yaoxue Zhang. 97-102 [doi]
- A View-Invariant Feature Learning Model for Cross-View Security Authentication in Mobile Smart DevicesAo Li, Xin Liu, Qiang Guan, Deyun Chen, Guanglu Sun. 103-108 [doi]
- Enterprise Mobile Device Management Requirements and FeaturesHina Batool, Ammar Masood. 109-114 [doi]
- A Convolutional Neural Network-Based RF Fingerprinting Identification Scheme for Mobile PhonesSheng Wang, Linning Peng, Hua Fu, Aiqun Hu, Xinyu Zhou. 115-120 [doi]
- Comprehensive Detection of Vulnerable Personal Information Leaks in Android ApplicationsNattanon Wongwiwatchai, Phannawhat Pongkham, Kunwadee Sripanidkulchai. 121-126 [doi]
- A Dynamic Resource Allocation Scheme in Vehicular CommunicationsAkinsola Akinsanya, Manish Nair, Yi-Jin Pan, Jiangzhou Wang. 127-131 [doi]
- Resource Allocation in Drone-Assisted Emergency Communication SystemsTianQi Chen, Jian He, Huiling Zhu, Lin Cai, Peng Yue, Jiangzhou Wang. 132-137 [doi]
- Intelligent UAV Based Flexible 5G Emergency Networks: Field Trial and System Level ResultsYuan Gao, Jiang Cao, Ping Wang, Junsong Yin, Ming He, Ming Zhao, Mugen Peng, Su Hu, Yunchuan Sun, Jing Wang, Shaochi Cheng, Yang Guo, Yanchang Du, Yanxi Cai, Jinhui Huang, Kai Qiu. 138-143 [doi]
- An Integrated Platoon and UAV System for 3D Localization in Search and RescueHongming Zhang, Li Wang 0039, Aiguo Fei. 144-149 [doi]
- Latency and Reliability Oriented Collaborative Optimization for Multi-UAV Aided Mobile Edge Computing SystemXiangwang Hou, Zhiyuan Ren, Jingjing Wang 0001, Shuya Zheng, Hailin Zhang 0001. 150-156 [doi]
- Dual Channel Per-packet Load Balancing for DatacentersCong Xu, Tingqiu Yuan, Haibo Zhang 0009, Tao Huang, Feilong Tang. 157-164 [doi]
- Predicting Traffic Demand Matrix by Considering Inter-flow CorrelationsKaihui Gao, Dan Li, Li Chen, Jinkun Geng, Fei Gui, Yang Cheng, Yue Gu. 165-170 [doi]
- MFBBR: An Optimized Fairness-aware TCP-BBR Algorithm in Wired-cum-wireless NetworkMingHan Jia, Weifeng Sun, Zun Wang, Yaohua Yan, Hongyu Qin, Kelong Meng. 171-176 [doi]
- A Concurrent Weighted Communication Scheme for Blockchain TransactionJiao Li, Li Chen. 177-182 [doi]
- Towards Blockchain-Based Reputation-Aware Federated LearningMuhammad Habib Ur Rehman, Khaled Salah, Ernesto Damiani, Davor Svetinovic. 183-188 [doi]
- Network Flow based IoT Botnet Attack Detection using Deep LearningSriram S, Vinayakumar R, Mamoun Alazab, Soman KP. 189-194 [doi]
- Blockchain-based E-waste Management in 5G Smart CommunitiesAmit Dua, Akash Dutta, Nishat Zaman, Neeraj Kumar 0001. 195-200 [doi]
- NLC: Natural Light Communication using Switchable GlassChangshuo Hu, Dong Ma 0001, Mahbub Hassan, Wen Hu. 201-206 [doi]
- Smart User Pairing for Massive MIMO Enabled Industrial IoT CommunicationsJingjie Zong, Shuangzhi Li 0001, Di Zhang 0002, Gangtao Han, Xiaomin Mu, Ali Kashif Bashir, Joel J. P. C. Rodrigues. 207-212 [doi]
- Secure Backscatter Communications in Multi-Cell NOMA Networks: Enabling Link Security for Massive IoT NetworksWali Ullah Khan, Ju Liu, Furqan Jameel, Muhammad Toaha Raza Khan, Syed Hassan Ahmed, Riku Jäntti. 213-218 [doi]
- BIND: Blockchain-Based Flow-Table Partitioning in Distributed Multi-Tenant Software-Defined NetworksAyan Mondal, Sudip Misra. 219-224 [doi]
- DecOp: Decentralized Network Operations in Software Defined Networking using BlockchainEphraim Moges, Tao Han 0002. 225-230 [doi]
- Proof-of-Balance: Game-Theoretic Consensus for Controller Load Balancing of SDNSiyi Liao, Jun Wu, Jianhua Li, Ali Kashif Bashir. 231-236 [doi]
- On the Design of Blockchain-Based Access Control Scheme for Software Defined NetworksDurbadal Chattaraj, Sourav Saha 0002, Basudeb Bera, Ashok Kumar Das. 237-242 [doi]
- User Association in Hybrid UAV-cellular Networks for Massive Real-time IoT ApplicationsParisa Foroughi, Hamzeh Beyranvand, Maurice Gagnaire, Sawsan Al Zahr. 243-248 [doi]
- ODOB: One Drone One Block-based Lightweight Blockchain Architecture for Internet of DronesManinderpal Singh, Gagangeet Singh Aujla, Rasmeet Singh Bali. 249-254 [doi]
- VAHAK: A Blockchain-based Outdoor Delivery Scheme using UAV for Healthcare 4.0 ServicesRajesh Gupta 0007, Arpit Shukla, Parimal Mehta, Pronaya Bhattacharya, Sudeep Tanwar, Sudhanshu Tyagi, Neeraj Kumar 0001. 255-260 [doi]
- A Blockchain-based Framework for Drone-Mounted Base Stations in Tactile Internet EnvironmentVikas Hassija, Vikas Saxena, Vinay Chamola. 261-266 [doi]
- A Flexible Hierarchical Network Architecture with Variable-Length IP AddressJifan Tang, Wanli Zhang, Xiangyang Gong, Guangpeng Li, Delei Yu, Ye Tian 0008, Bowen Liu, Lei Zhao. 267-272 [doi]
- A New Approach to a Service Oriented Internet ProtocolSheng Jiang, Guangpeng Li, Brian E. Carpenter. 273-278 [doi]
- UCIP: User Controlled Internet ProtocolMorteza Kheirkhah, Truong Khoa Phan, Xinpeng Wei, David Griffin 0001, Miguel Rio. 279-284 [doi]
- A Data Forwarding Mechanism based on Deep Reinforcement Learning for Deterministic NetworksYuhong Li, Peng Zhang, Yingchao Zhou, Di Jin. 285-290 [doi]
- InBlock4: Blockchain-based Route Origin ValidationStefano Angieri, Marcelo Bagnulo, Alberto García-Martínez, Bingyang Liu, Xinpeng Wei. 291-296 [doi]
- The Probability Distribution of the AoI in Queues with Infinitely Many ServersYoshiaki Inoue. 297-302 [doi]
- Average Age of Information in a Multi-Source M/M/1 Queueing Model with LCFS Prioritized Packet ManagementMohammad Moltafet, Markus Leinonen, Marian Codreanu. 303-308 [doi]
- Anti-Aging Scheduling in Single-Server Queues: A Systematic and Comparative StudyZhongdong Liu, Liang Huang, Bin Li, Bo Ji. 309-316 [doi]
- Age-Optimal Scheduling for Heterogeneous Traffic with Timely-Throughput ConstraintJingzhou Sun, Zhiyuan Jiang, Sheng Zhou, Zhisheng Niu. 317-322 [doi]
- Age-Energy Tradeoff in Fading Channels with Packet-Based TransmissionsHaitao Huang, Deli Qiao, Mustafa Cenk Gursoy. 323-328 [doi]
- Is the Packetized Transmission Efficient? An Age-Energy PerspectiveMangang Xie, Jie Gong, Xiao Ma 0001. 329-333 [doi]
- Age-Energy Region in Wireless Powered Communication NetworksHaina Zheng, Ke Xiong, Pingyi Fan, Zhangdui Zhong, Khaled Ben Letaief. 334-339 [doi]
- WiFi over VLC using COTS DevicesPiotr Gawlowicz, Elnaz Alizadeh Jarchlo, Anatolij Zubow. 340-345 [doi]
- Adaptive CNN-based Private LTE Solution for Fair Coexistence with Wi-Fi in Unlicensed SpectrumMerkebu Girmay, Vasilis Maglogiannis, Dries Naudts, Jaron Fontaine, Adnan Shahid, Eli De Poorter, Ingrid Moerman. 346-351 [doi]
- An Experimental Evaluation of Low Latency Congestion Control for mmWave LinksAshutosh Srivastava, Fraida Fund, Shivendra S. Panwar. 352-357 [doi]
- Adaptive Adversarial Attack on Scene Text RecognitionXiaoyong Yuan, Pan He, Xiaolin Li, Dapeng Wu 0001. 358-363 [doi]
- Image Translation with Attention Mechanism based on Generative Adversarial NetworksYu Lu, Ju Liu, Xueyin Zhao, Xiaoxi Liu, Weiqiang Chen, Xuesong Gao. 364-369 [doi]
- Sparser: Secure Nearest Neighbor Search with Space-filling CurvesSiqin Fang, Sean Kennedy, Chenggang Wang, Boyang Wang, Qingqi Pei, Xuefeng Liu. 370-375 [doi]
- HIDEchain: A User-Centric Secure Edge Computing Architecture for Healthcare IoT DevicesRabeya Bosri, Abdur Razzak Uzzal, Abdullah Al Omar, Md. Zakirul Alam Bhuiyan, Mohammad Shahriar Rahman. 376-381 [doi]
- A Solution for State Conflicts of Smart Contract in Interaction with Non-blockchainHong Su, Bing Guo, Yan Shen, Tao Li, Chaoxia Qing, Zhen Zhang. 382-387 [doi]
- ChainIDE 2.0: Facilitating Smart Contract Development for Consortium BlockchainXiao Wu, Han Qiu 0001, Shuyi Zhang, Gérard Memmi, Keke Gai, Wei Cai 0002. 388-393 [doi]
- Edge Emergency Demand Response Control via Scheduling in Cloudlet ClusterZhaoyan Song, Ruiting Zhou, Shihan Zhao, Shixin Qin, John C. S. Lui, Zongpeng Li. 394-399 [doi]
- MEM: A Multi-Staged Eviction Mechanism of Flowtable for Software-Defined DatacentersWei Feng, Wan Tang, Ximin Yang, Lu Liu. 400-405 [doi]
- Resource Allocation in MEC-enabled Vehicular Networks: A Deep Reinforcement Learning ApproachGuoping Tan, Huipeng Zhang, Siyuan Zhou. 406-411 [doi]
- Combining LoRaWAN and a New 3D Motion Model for Remote UAV TrackingFederico Mason, Federico Chiariotti, Martina Capuzzo, Davide Magrin, Andrea Zanella, Michele Zorzi. 412-417 [doi]
- Resilient Hybrid SatCom and Terrestrial Networking for Unmanned Aerial VehiclesParesh Saxena, Thomas Dreibholz, Harald Skinnemoen, Özgü Alay, M. A. Vazquez-Castro, Simone Ferlin, Guray Acar. 418-423 [doi]
- App-Net: A Hybrid Neural Network for Encrypted Mobile Traffic ClassificationXin Wang, Shuhui Chen, Jinshu Su. 424-429 [doi]
- Automated Traffic Engineering in SDWAN: Beyond Reinforcement LearningLibin Liu, Li Chen, Hong Xu, Hua Shao. 430-435 [doi]
- FastScale: Fast Scaling Out of Network FunctionsXiang Chen, Yuxin Chen, Qun Huang 0001, Haifeng Zhou, Dong Zhang, Chunming Wu, Junchi Xing. 436-442 [doi]
- Prediction of Twitter Traffic Based on Machine Learning and Data AnalyticsFuyou Li, Zitian Zhang, Yunpeng Zhu, Jie Zhang 0003. 443-448 [doi]
- Statistical QoS Provisioning Based Caching Placement for D2D Communications Based Emergency NetworksJianyu Wang, Wenchi Cheng, Hailin Zhang 0001. 449-454 [doi]
- Green Cognitive Internet of Things with Self Supply of Energy and Spectrum in Emergency CommunicationsXin Liu, Xueyan Zhang. 455-459 [doi]
- RAT-NHP: Radio Access Technology Selection Based on N-hop PredictionWeifeng Sun, Guanghao Zhang, Yuankui Zhang, Chi Lin. 460-465 [doi]
- Security Enhancement and Evaluation for Noise Aggregation over Wireless Fading ChannelsYu Liu, Qinghe Du. 466-471 [doi]
- Connecting flying backhauls of drones to enhance vehicular networks with fixed 5G NR infrastructurePhilippe Jacquet, Dalia Popescu, Bernard Mans. 472-477 [doi]
- Energy Minimization for MEC-enabled Cellular-Connected UAV: Trajectory Optimization and Resource SchedulingZhaohua Lv, Jianjun Hao, Yijun Guo. 478-483 [doi]
- Paging Group Size Distribution for Multicast Services in 5G NetworksOlga G. Vikhrova, Sara Pizzi, Antonella Molinaro, Giuseppe Araniti. 484-489 [doi]
- Blockchain-Enabled SDN for Securing Fog-Based Resource-Constrained IoTSudip Misra, Pallav Kumar Deb, Nidhi Pathak, Anandarup Mukherjee. 490-495 [doi]
- BS-IoT: Blockchain Based Software Defined Network Framework for Internet of ThingsLei Liu 0031, Wei Feng, Chen Chen 0006, Yuru Zhang, Dapeng Lan, Xiaoming Yuan, Sahil Vashisht. 496-501 [doi]
- Non-Cooperative Game to Balance Energy and Security in Resource Constrained IoT NetworksSyed Bilal Hussain Shah, Lei Wang, Prakasha Reddy, Chettupally Anil Carie. 502-507 [doi]
- Blockchain Technology and Neural Networks for the Internet of Medical ThingsDawid Polap, Gautam Srivastava, Alireza Jolfaei, Reza M. Parizi. 508-513 [doi]
- Blockchain based secure IoT data sharing framework for SDN-enabled smart communitiesYing Gao, Yijian Chen, Hongliang Lin, Joel J. P. C. Rodrigues. 514-519 [doi]
- D-S based Fusion Method for Against Malicious Nodes in Wireless Sensor NetworksQiao Tian, Pengwan Qin, Meiyu Wang, Yang Liu. 520-525 [doi]
- Location-Aided Secure Transmission for Uplink Massive MIMO System Against Full-Duplex JammerZhexian Shen, Kui Xu 0001. 526-531 [doi]
- Security Analysis of LTE-V2X and A Platooning Case StudyPengfei Zhu, Konglin Zhu, Lin Zhang 0013. 532-537 [doi]
- Fountain-Coding-Aided Secure Delivery via Cross-locking Between Payload Data and Control InformationHanxun Ren, Qinghe Du, Yijie Ou, Pinyi Ren. 538-543 [doi]
- Big Data Analytics Based Short Term Load Forecasting Model for Residential Buildings in Smart GridsInam Ullah Khan, Nadeem Javaid, C. James Taylor, Kelum A. A. Gamage, Xiandong Ma. 544-549 [doi]
- Log Analytics in HPC: A Data-driven Reinforcement Learning FrameworkZhengping Luo, Tao Hou, Tung Thanh Nguyen, Hui Zeng, Zhuo Lu. 550-555 [doi]
- Handling Device Heterogeneity in Wi-Fi based Indoor Positioning SystemsYongyong Wei, Rong Zheng. 556-561 [doi]
- The Feasibility of NOMA in C-V2XZhenhui Situ, Ivan Wang Hei Ho, Yun Hou, Peiya Li. 562-567 [doi]
- No-Dealer: Byzantine Fault-Tolerant Random Number GeneratorMikhail Krasnoselskii, Grigorii Melnikov, Yury Yanovich. 568-573 [doi]
- Sperax: An Approach To Defeat Long Range Attacks In BlockchainsYongge Wang, Jingwen Sun, Xin Wang, Yunchuan Wei, Hao Wu 0023, Zhou Yu, Gillian Chu. 574-579 [doi]
- Terminator: An Efficient and Light-weight Fault Localization FrameworkYuxing Li, Hu Zheng, Chengqiang Huang, Ke Pei, Jinghui Li, Longbo Huang. 580-585 [doi]
- Dynamic deployment model for large-scale compute-intensive clustersYunpeng Cao, Haifeng Wang, Shuqing He. 586-591 [doi]
- Consistent User-Traffic Allocation and Load Balancing in Mobile Edge CachingLemei Huang, Sheng Cheng, Yu Guan, Xinggong Zhang, Zongming Guo. 592-597 [doi]
- Active Learning-based Classification in Automated Connected VehiclesAlaa Awad Abdellatif, Carla-Fabiana Chiasserini, Francesco Malandrino. 598-603 [doi]
- Energy-aware Allocation of Graph Jobs in Vehicular Cloud Computing-enabled Software-defined IoVMinghui LiWang, Zhibin Gao, Seyyedali Hosseinalipour, Huaiyu Dai, Xianbin Wang. 604-609 [doi]
- Caching Popular and Fresh IoT Contents at the Edge via Named Data NetworkingMarica Amadeo, Giuseppe Ruggeri, Claudia Campolo, Antonella Molinaro, Giuseppe Mangiullo. 610-615 [doi]
- A Multi-property Method to Evaluate Trust of Edge Computing Based on Data Driven Capsule NetworkChenghan Jia, Kai Lin, Jing Deng 0001. 616-621 [doi]
- Distributed Intelligence Empowered Data Aggregation and Distribution for Multi-robot Cooperative CommunicationLi Ding, Biao Han, Xiaoyan Wang, Peng Li, Baosheng Wang. 622-627 [doi]
- Performance Analysis of UAV-assisted Backhaul Solutions in THz enabled Hybrid Heterogeneous NetworkAdil Ali Raja, Muhammad Ali Jamshed, Haris Pervaiz, Syed Ali Hassan. 628-633 [doi]
- Autonomous UAV-aided Mesh Wireless NetworksOmid Esrafilian, Rajeev Gangula, David Gesbert. 634-640 [doi]
- Multi-UAV Assisted Communication Networks: Towards Max-Min Secrecy RateYuan Liu, Ke Xiong, Bo Gao, Yu Zhang, Pingyi Fan, Khaled Ben Letaief. 641-646 [doi]
- UAV-assisted Data Collection in Wireless Powered Sensor Networks over Multiple Fading ChannelsTharindu D. Ponnimbaduge Perera, Stephan Panic, Dushantha Nalin K. Jayakody, P. Muthuchidambaranathan. 647-652 [doi]
- A Unified Federated Learning Framework for Wireless Communications: towards Privacy, Efficiency, and SecurityHui-Wen, Yue Wu, Chenming Yang, Hancong Duan, Shui Yu. 653-658 [doi]
- Detecting and Mitigating ARP Attacks in SDN-Based Cloud EnvironmentSixian Sun, Xiao Fu, Bin Luo, Xiaojiang Du. 659-664 [doi]
- A Location-Based Path Privacy Protection Scheme in Internet of VehiclesHaili Yu, Guangshun Li, Junhua Wu, Xinrong Ren, Jiabin Cao. 665-670 [doi]
- Drone-assisted Edge Computing: a game-theoretical approachF. Busacca, Laura Galluccio, Sergio Palazzo. 671-676 [doi]
- A Real-time Framework for Trust Monitoring in a Network of Unmanned Aerial VehiclesMahsa Keshavarz, Alireza Shamsoshoara, Fatemeh Afghah, Jonathan D. Ashdown. 677-682 [doi]
- Trajectory Optimization of Flying Energy Sources using Q-Learning to Recharge Hotspot UAVsSayed Amir Hoseini, Jahan Hassan, Ayub Bokani, Salil S. Kanhere. 683-688 [doi]
- MAC Trade-offs Between Age and Reachability of Information in Vehicular Safety ApplicationsXu Wang, Randall A. Berry. 689-695 [doi]
- Who Should Google Scholar Update More Often?Melih Bastopcu, Sennur Ulukus. 696-701 [doi]
- Can We Improve Information Freshness with Predictions in Mobile Crowd-Learning?Zhengxiong Yuan, Bin Li, Jia Liu. 702-709 [doi]
- AoI and Energy Consumption Oriented Dynamic Status Updating in Caching Enabled IoT NetworksChao Xu 0007, Xijun Wang, Howard H. Yang, Hongguang Sun, Tony Q. S. Quek. 710-715 [doi]
- Deep Reinforcement Learning for Fresh Data Collection in UAV-assisted IoT NetworksMengjie Yi, Xijun Wang, Juan Liu 0002, Yan Zhang, Bo Bai 0001. 716-721 [doi]
- Efficient Vulnerability Detection based on abstract syntax tree and Deep LearningHantao Feng, Xiaotong Fu, Hongyu Sun, He Wang, Yuqing Zhang. 722-727 [doi]
- Fidelity Leakages: Applying Membership Inference Attacks to Preference DataPierre Danhier, Clément Massart, François-Xavier Standaert. 728-733 [doi]
- Detecting Anomalies in Encrypted Traffic via Deep Dictionary LearningJunchi Xing, Chunming Wu. 734-739 [doi]
- Multi-scale Learning based Malware Variant Detection using Spatial Pyramid Pooling NetworkSriram S, Vinayakumar R, Sowmya V, Mamoun Alazab, Soman KP. 740-745 [doi]
- Building an Authentic and Ethical Keyword Search by applying Decentralised (Blockchain) VerificationPoongodi M, Mounir Hamdi, Vijayakumar Varadarajan 0001, Bharat S. Rawal, Maode Ma. 746-753 [doi]
- TEE-Based Mutual Proofs of Transmission Services in Decentralized SystemsLifeng Liu, Jian Li, Tim Tingqiu Yuan. 754-759 [doi]
- Gemini-Chain: A Regulatable Digital Currency Model based on BlockchainJianyi Zhang, Pengju Li, Zhili Xu, Anqi Wang, Jin Liu, Zhiqiang Wang 0006. 760-765 [doi]
- Towards In-Band Telemetry for Self Driving Wireless NetworksPrabhu Janakaraj, Pinyarash Pinyoanuntapong, Pu Wang, Minwoo Lee. 766-773 [doi]
- End-to-end Delay Prediction Based on Traffic Matrix SamplingFilip Krasniqi, Jocelyne Elias, Jérémie Leguay, Alessandro E. C. Redondi. 774-779 [doi]
- A Novel Methodology for the Automated Detection and Classification of Networking AnomaliesMohamed Moulay, Rafael A. García Leiva, Pablo J. Rojo Maroni, Javier Lazaro, Vincenzo Mancuso, Antonio Fernández Anta. 780-786 [doi]
- WiNetSense: Sensing and Analysis Model for Large-scale Wireless NetworksNikita Trivedi, Bighnaraj Panigrahi, Hemant Kumar Rath. 787-792 [doi]
- QuickWalk: Quick Trust Assessment for Vehicular Social NetworksZiyi Shen, Shuyu He, Qing Yang. 793-798 [doi]
- Protecting Privacy From Aerial photography: State of the Art, Opportunities, and ChallengesBin Jiang 0003, Jiachen Yang, Houbing Song. 799-804 [doi]
- Quantitative Analysis on Source-Location Privacy for Wireless Sensor NetworksDi Tang, Jian Gu, Weijia Han, Xiao Ma. 805-809 [doi]
- An Improved Shapley Value Benefit Distribution Mechanism in Cooperative Game of Cyber Threat Intelligence SharingWeiqiang Xie, Xiao Yu, Yuqing Zhang, He Wang. 810-815 [doi]
- Improving BGP Convergence with Fed4FIRE+ ExperimentsMattia Milani, Marco Nesler, Michele Segata, Luca Baldesi, Leonardo Maccari, Renato Lo Cigno. 816-823 [doi]
- Logical Peering for Interdomain Networking on TestbedsYuanjun Yao, Qiang Cao, Paul Ruth, Mert Cevik, Cong Wang, Jeffrey S. Chase. 824-829 [doi]
- Implementing SFA Support on an Established HPC-flavored Testbed: Lessons LearnedLuke Bertot, Lucas Nussbaum, David Margery. 830-835 [doi]
- An Experimental Study on Microservices based Edge Computing PlatformsQian Qu, Ronghua Xu, Seyed Yahya Nikouei, Yu Chen 0002. 836-841 [doi]
- Mitigating DoS attacks in IoT EDGE Layer to preserve QoS topics and nodes' energyFloriano De Rango, Mauro Tropea, Peppino Fazio. 842-847 [doi]
- E-ALPHA: Edge-based Assisted Living Platform for Home cAreGianluca Aloi, Giancarlo Fortino, Raffaele Gravina, Pasquale Pace, Claudio Savaglio. 848-853 [doi]
- IoT Event Classification Based on Network TrafficBatyr Charyyev, Mehmet Hadi Gunes. 854-859 [doi]
- Tri-Blockchain Based Intelligent Vehicular NetworksMadhusudan Singh. 860-864 [doi]
- AI-Powered Blockchain - A Decentralized Secure Multiparty Computation Protocol for IoVGunasekaran Raja, Yelisetty Manaswini, Gaayathri Devi Vivekanandan, Harish Sampath, Kapal Dev, Ali Kashif Bashir. 865-870 [doi]
- Lightweight Authentication Protocol for Inter Base Station Communication in Heterogeneous NetworksGaurang Bansal, Vinay Chamola. 871-876 [doi]
- Energy Efficient Mode Selection Scheme for Wireless Powered D2D Communications with NOMA Underlaying UAVIshan Budhiraja, Neeraj Kumar 0001, Sudhanshu Tyagi, Quoc-Viet Pham, Sudeep Tanwar. 877-882 [doi]
- Smart Antenna-based Multi-hop Highly-Energy-Efficient DSA Approach to Drone-assisted Backhaul Networks for 5GDingde Jiang, ZhiHao Wang, Zhihan Lv, Wenpan Li. 883-887 [doi]
- On the Design of Secure Communication Framework for Blockchain-Based Internet of Intelligent Battlefield Things EnvironmentMohammad Wazid, Ashok Kumar Das, Sachin Shetty, Joel J. P. C. Rodrigues. 888-893 [doi]
- Secure UAV Communication Networks via Friendly Jamming and Bandwidth AllocationHuilian Zhang, Xiaofan He, Huaiyu Dai. 894-899 [doi]
- Learning Features of Brain Network for Anomaly DetectionJiaxin Liu, Wei Zhao, Ye Hong, Sheng Gao, Xi Huang, Yingjie Zhou. 900-905 [doi]
- A Novel SSVEP-Based Brain-Computer Interface Using Joint Frequency and Space ModulationZhenyu Wang, Honglin Hu, Xianfu Chen, Ting Zhou, Tianheng Xu. 906-911 [doi]
- Improving Age of Information in Random Access ChannelsDoga Can Atabay, Elif Uysal, Onur Kaya. 912-917 [doi]
- Optimal Sampling Cost in Wireless Networks with Age of Information ConstraintsEmmanouil Fountoulakis, Nikolaos Pappas 0001, Marian Codreanu, Anthony Ephremides. 918-923 [doi]
- A Non-Cooperative Multiple Access Game for Timely UpdatesSneihil Gopal, Sanjit K. Kaul, Rakesh Chaturvedi, Sumit Roy 0001. 924-929 [doi]
- Age-of-Information Dependent Random Access for Massive IoT NetworksHe Chen, Yifan Gu, Soung Chang Liew. 930-935 [doi]
- Minimizing the Age of Synchronization in Power-Constrained Wireless Networks with Unreliable Time-Varying ChannelsQining Zhang, Haoyue Tang, Jintao Wang. 936-941 [doi]
- Game of AgesKumar Saurav, Rahul Vaze. 942-947 [doi]
- Age of Information Minimization in Fading Multiple Access ChannelsRajshekhar Vishweshwar Bhat, Rahul Vaze, Mehul Motani. 948-953 [doi]
- Exploring Approaches to the Management of Physical, Virtual, and Social SensorsNgombo Armando, José Marcelo Fernandes, André Rodrigues 0001, Jorge Sá Silva, Fernando Boavida. 954-959 [doi]
- Migrating to SDN for Mobile Core Networks: A Dynamic and Global PerspectiveXiaole Li, Hongyun Zheng, Yuchun Guo. 960-965 [doi]
- Point-of-Interest Recommendation based on Geographical Influence and Extended Pairwise RankingChang Su, Jin Wang, Xianzhong Xie. 966-971 [doi]
- Using NLP and Machine Learning to Detect Data Privacy ViolationsPaulo Silva, Carolina Gonçalves, Carolina Godinho, Nuno Antunes, Marília Curado. 972-977 [doi]
- Privacy-preserving Data Aggregation for Big Data in Financial InstitutionsHongning Li, Jiexiong Chen, Le Wang, Qingqi Pei, Hao Yue. 978-983 [doi]
- An IoT data sharing privacy preserving schemeYan Sun, Lihua Yin, Zhe Sun, Zhihong Tian, Xiaojiang Du. 984-990 [doi]
- A Blockchain-Based Trading Platform for Big DataShuli Zheng, Lixuan Pan, Donghui Hu, Meng Li 0006, Yuqi Fan. 991-996 [doi]
- Security of Medical Cyber-physical Systems: An Empirical Study on Imaging DevicesZhiqiang Wang 0006, Pingchuan Ma 0004, Xiaoxiang Zou, Jianyi Zhang, Tao Yang. 997-1002 [doi]
- Secure Smart Home Systems: A Blockchain PerspectiveLiuqing Yang, Xiao-Yang Liu, Wenbo Gong 0003. 1003-1008 [doi]
- An NFV MANO Architecture with a Resource Allocation Mechanism Based on Game TheoryDavid H. S. Lima, André L. L. de Aquino, Marília Curado. 1009-1014 [doi]
- Transcoding for Live Streaming-based on Vehicular Fog Computing: An Actor-Critic DRL ApproachFang Fu, Yunpeng Kang, Zhicai Zhang, F. Richard Yu. 1015-1020 [doi]
- Detection of Temporal Communities in Mobile Social NetworksMengni Ruan, Huan Zhou 0002, Dawei Li 0002, Xuxun Liu, Qingyong Deng. 1021-1026 [doi]
- Integrated Defense Mechanism Based on Attack Goals against Three Attack Strategies in Smart GridWenjie Kang, Peidong Zhu, Xuchong Liu. 1027-1032 [doi]
- Underwater Jamming Attacks as Incomplete Information GamesFederico Chiariotti, Alberto Signori, Filippo Campagnaro, Michele Zorzi. 1033-1038 [doi]
- LeTera: Stochastic Beam Control Through ESN Learning in Terahertz-Band Wireless UAV NetworksSabarish Krishna Moorthy, Zhangyu Guan. 1039-1044 [doi]
- Raptor-like Rateless Spinal Codes using Outer Systematic Polar Codes for Reliable Deep Space CommunicationsHao Liang 0004, Aijun Liu, Xinhai Tong, Chao Gong. 1045-1050 [doi]
- ET-DeaL: A P2P Smart Contract-based Secure Energy Trading Scheme for Smart Grid SystemsAparna Kumari, Arpit Shukla, Rajesh Gupta 0007, Sudeep Tanwar, Sudhanshu Tyagi, Neeraj Kumar 0001. 1051-1056 [doi]
- A Blockchain-Based Virtual Network Embedding Algorithm for Secure Software Defined NetworkingHaotong Cao, Yue Hu, Qin Wang, Shengchen Wu, Longxiang Yang. 1057-1062 [doi]
- Blockchain-Based Controller Recovery in SDNSudip Misra, Kounteya Sarkar, Nurzaman Ahmed. 1063-1068 [doi]
- Reinforcement Learning for Scalable and Reliable Power Allocation in SDN-based Backscatter Heterogeneous NetworkFurqan Jameel, Wali Ullah Khan, Muhammad Ali Jamshed, Haris Pervaiz, Qammer Abbasi, Riku Jäntti. 1069-1074 [doi]
- Min-Max Worst-Case Design for Computation Offloading in Multi-user MEC SystemLiping Zhang 0007, Rong Chai, Tiantian Yang, Qianbin Chen. 1075-1080 [doi]
- Information Classification Strategy for Blockchain-based Secure SDN in IoT ScenarioPeiying Zhang, Fanglin Liu, Neeraj Kumar 0001, Gagangeet Singh Aujla. 1081-1086 [doi]
- Demo: Benchmarking Live Migration Performance of Two Trendy Virtualization TechnologiesRoberto Torre Arranz, Robert-Steve Schmoll, Florian Kemser, Hani Salah, Ievgenii Tsokalo, Frank H. P. Fitzek. 1087-1088 [doi]
- Real Time Adaptive Networking using Programmable 100Gbps NIC on Data Transfer NodesGauravdeep Shami, Marc Lyonnais, Rodney Wilson. 1089-1090 [doi]
- GENIX: A GENI-based IXP EmulationShahzeb Mustafa, Prasun Kanti Dey, Murat Yuksel. 1091-1092 [doi]
- SDN-enabled Traffic Alert System for IoV in Smart CitiesGunasekaran Raja, Priyanka Dhanasekaran, Sudha Anbalagan, Aishwarya Ganapathisubramaniyan, Ali Kashif Bashir. 1093-1098 [doi]
- Features Fusion based Automatic Modulation Classification Using Convolutional Neural NetworkChunsheng Lin, Juanjuan Huang, Sai Huang, Yuanyuan Yao, Xin Guo. 1099-1104 [doi]
- Signal Recognition Based On Federated LearningJibo Shi, Haojun Zhao, Meiyu Wang, Qiao Tian. 1105-1110 [doi]
- Instagram User Behavior Identification Based on Multidimensional FeaturesHua Wu, Qiuyan Wu, Guang Cheng, Shuyi Guo. 1111-1116 [doi]
- Optimal Power Splitting for Simultaneous Wireless Information and Power Transfer in Millimeter-wave NetworksYihan Liang, Yejun He, Jian Qiao. 1117-1122 [doi]
- DeepAalo: Auto-adjusting Demotion Thresholds for Information-agnostic Coflow SchedulingSu Wang, Shuo Wang 0006, Ru Huo, Tao Huang 0005, Jiang Liu 0010, Yunjie Liu. 1123-1128 [doi]
- Improving Inter-domain Routing through Multi-agent Reinforcement LearningXiaoyang Zhao 0005, Chuan Wu, Franck Le. 1129-1134 [doi]
- Online Traffic Classification Using GranulesPingping Tang, Yuning Dong, Shiwen Mao. 1135-1140 [doi]
- Large-Scale and Rapid Flow Size Estimation for Improving Flow SchedulingSu Wang, Shuo Wang, Dong Zhou, Yiran Yang, Wenjie Zhang, Tao Huang, Ru Huo, Yunjie Liu. 1141-1146 [doi]
- Glide and Zap Q-LearningXiaofan He, Richeng Jin, Huaiyu Dai. 1147-1152 [doi]
- When Less is More: Core-Restricted Container Provisioning for Serverless ComputingGaetano Somma, Constantine Ayimba, Paolo Casari, Simon Pietro Romano, Vincenzo Mancuso. 1153-1159 [doi]
- Removing human players from the loop: AI-assisted assessment of Gaming QoEGerman Sviridov, Cedric Beliard, Andrea Bianco, Paolo Giaccone, Dario Rossi. 1160-1165 [doi]
- Characterizing Social Marketing Behavior of E-commerce Celebrities and Predicting Their ValueXiang Li, Yuchun Guo, Ye Sheng, Yishuai Chen. 1166-1171 [doi]
- The German-Speaking Twitter Community Reference Data SetJohannes Pflugmacher, Stephan Escher, Jan Reubold, Thorsten Strufe. 1172-1177 [doi]
- Follow Me, If You Can: A Framework for Seamless Migration in Mobile Edge CloudTung V. Doan, Zhongyi Fan, Giang T. Nguyen 0002, Hani Salah, Dongho You, Frank H. P. Fitzek. 1178-1183 [doi]
- Joint Network Selection and Traffic Allocation in Multi-Access Edge Computing-Based Vehicular CrowdsensingLuning Liu, Luhan Wang, Xiangming Wen. 1184-1189 [doi]
- A Scheduling Strategy for Reduced Power Consumption in Mobile Edge ComputingJuan Fang, Yong Chen, Shuaibing Lu. 1190-1195 [doi]
- Incentive Mechanism Design for Edge-Cloud Collaboration in Mobile Crowd SensingLihan Zhang, Zhuo Li, Xin Chen. 1196-1201 [doi]
- A Novel Simulated Annealing based Routing Algorithm in F-SDNsLiang Zhao, Areeb Saldin, Jia Hu, Luwei Fu, Junling Shi, Yunchong Guan. 1202-1207 [doi]
- Distributed Deep Learning-based Task Offloading for UAV-enabled Mobile Edge ComputingMithun Mukherjee 0001, Vikas Kumar, Ankit Lat, Mian Guo, Rakesh Matam, Yunrong Lv. 1208-1212 [doi]
- UAV Network for Surveillance of Inaccessible Regions with Zero Blind SpotsNikhil Kumar, Monalisa Ghosh, Chetna Singhal. 1213-1218 [doi]
- Bidirectional Multi-tier Cognitive Swarm Drone 5G NetworkSunil Jacob, Varun G. Menon, Shynu P. G, Fathima Shemim KS, Bandana Mahapatra, Saira Joseph. 1219-1224 [doi]
- An UAV assisted Multi-Sensor based Smart Parking SystemPritom Gogoi, Joy Dutta, Rakesh Matam, Mithun Mukherjee 0001. 1225-1230 [doi]
- RSSI or LQI: Insights from Real-Time Deployments for Underground Sensing and ApplicationsAlok Ranjan, Himanshu Bhushan Sahu, Prasant Misra, Yanxiao Zhao, Hui Sun. 1231-1236 [doi]
- RFID-Based Vehicle Localization Scheme in GPS-Less EnvironmentsRui Chen 0007, Xiyuan Huang, Wei Liu, Yan Zhou. 1237-1241 [doi]
- A TDMA Protocol Based on Data Priority for In-Vivo Wireless NanoSensor NetworksJuan Xu, Yan Zhang, Yakun Zhao, Jiali Kan, Lin Lin. 1242-1247 [doi]
- Deep Reinforcement Learning based Wireless Network Optimization: A Comparative StudyKun Yang, Cong Shen, Tie Liu. 1248-1253 [doi]
- Deep Reinforcement Learning for Controller Placement in Software Defined NetworkYiwen Wu, Sipei Zhou, Yunkai Wei, Supeng Leng. 1254-1259 [doi]
- Modified-PBIL Based User Selection for Multi-user Massive MIMO Systems with Massive ConnectivityJing Jiang, Junyu Chen, Yongbin Xie, Hongjiang Lei, Ling Zheng. 1260-1265 [doi]
- Demo Abstract: High Voltage Discharge Exhibits Severe Effect on ZigBee-based Device in Solar Insecticidal Lamps Internet of ThingsKai Huang, Kailiang Li, Lei Shu 0001, Xing Yang. 1266-1267 [doi]
- Demo Abstract: FingerLite: Finger Gesture Recognition Using Ambient LightMiao Huang, Haihan Duan, Yanru Chen, Yanbing Yang, Jie Hao, Liangyin Chen. 1268-1269 [doi]
- An SDR-in-the-Loop Carla Simulator for C-V2X-Based Autonomous DrivingWei Zhang, Siyu Fu, Zixu Cao, Zhiyuan Jiang, Shunqing Zhang, Shugong Xu. 1270-1271 [doi]
- Demo Abstract: Cross-Technology Communication between LTE-U/LAA and WiFiPiotr Gawlowicz, Anatolij Zubow, Suzan Bayhan. 1272-1273 [doi]
- Increasing the Data Rate for Reflected Optical Camera Communication Using Uniform LED LightZequn Chen, Runji Lin, Haihan Duan, Yanru Chen, Yanbing Yang, Rengmao Wu, Liangyin Chen. 1274-1275 [doi]
- Demo Abstract: Elastic Deployment of Robust Distributed Control Planes with Performance GuaranteesDaniel F. Perez-Ramirez, Rebecca Steinert, Natalia Vesselinova, Dejan Kostic. 1276-1277 [doi]
- Sensing and Communication Integrated System for Autonomous Driving VehiclesQixun Zhang, Huan Sun, Zhiqing Wei, Zhiyong Feng 0001. 1278-1279 [doi]
- Demo: Seamless Mobile Video Streaming in Multicast Multi-RAT CommunicationsPavlos Basaras, Stepán Kucera, Kariem Fahmi, Holger Claussen, George Iosifidis. 1280-1281 [doi]
- Demo abstract: Leveraging AI players for QoE estimation in cloud gamingGerman Sviridov, Cedric Beliard, Gwendal Simon, Andrea Bianco, Paolo Giaccone, Dario Rossi. 1282-1283 [doi]
- Demo Abstract: Loop Avoidance in Computer Networks Using a Meshed Tree ProtocolPeter Willis, Nirmala Shenoy, Hrishikesh B. Acharya. 1284-1285 [doi]
- Demo Abstract: AutoPCT: An Agile Protocol Conformance Automatic Test Platform Based on Editable EFSMZhu Tang, Sudan Li, Peng Xun, Chengsong Wang, Wenping Deng, Baosheng Wang. 1286-1287 [doi]
- Demo Abstract: CLoRa-A Covert Channel over LoRa PHYNingning Hou, Yuanqing Zheng. 1288-1289 [doi]
- DEMO: Real-time Edge Analytics and Concept Drift Computation for Efficient Deep Learning From Spectrum DataZaheer Khan 0001, Janne Lehtomäki, Adnan Shahid, Ingrid Moerman. 1290-1291 [doi]
- Opening the Deep Pandora Box: Explainable Traffic ClassificationCedric Beliard, Alessandro Finamore, Dario Rossi. 1292-1293 [doi]
- Near Optimal Network-wide Per-Flow MeasurementRan Ben-Basat, Gil Einziger, Bilal Tayh. 1294-1295 [doi]
- Scalable and Interactive Simulation for IoT Applications with TinySimGonglong Chen, Wei Dong 0001, Fujian Qiu, Gaoyang Guan, Yi Gao, Siyu Zeng. 1296-1297 [doi]
- Poster Abstract: Parallel VM Placement with Provable GuaranteesItamar Cohen, Gil Einziger, Maayan Goldstein, Yaniv Sa'ar, Gabriel Scalosub, Erez Waisbard. 1298-1299 [doi]
- Measurement and Analysis of Cloud User Interest: A Glance From BitTorrentLei Ding, Yang Li, Haiyang Wang, Ke Xu. 1300-1301 [doi]
- Connection-based Pricing for IoT Devices: Motivation, Comparison, and Potential ProblemsYi Zhao 0011, Wei Bao, Dan Wang 0002, Ke Xu 0002, Liang Lv. 1302-1303 [doi]
- Poster Abstract: Always Heading for the Peak: Learning to Route with Domain KnowledgeJing Chen, Zili Meng, Mingwei Xu. 1304-1305 [doi]
- Poster Abstract: Joint Optimization of Service Function Chain Elastic Scaling and RoutingWeihan Chen, Zhiliang Wang, Han Zhang 0009, Xia Yin, Xingang Shi, Lei Sun. 1306-1307 [doi]
- Poster Abstract: An Unsupervised Two-Layer Multi-Step Network Attack DetectorSu Wang, Zhiliang Wang, Xia Yin, Xingang Shi. 1308-1309 [doi]
- Poster Abstract: Towards Ambient Backscatter as an Anti-jamming Solution for IoT DevicesWonwoo Jang, Wonjun Lee. 1310-1311 [doi]
- Poster Abstract: An Open Source Approach to Field Testing of WLAN up to IEEE 802.11ad at 60 GHz Using Commodity HardwareFlorian Klingler, Fynn Hauptmeier, Christoph Sommer 0001, Falko Dressler. 1312-1313 [doi]
- IRS Assisted Multiple User Detection for Uplink URLLC Non-Orthogonal Multiple AccessLei Feng, Xiaoyu Que, Peng Yu, Wenjing Li, Xuesong Qiu. 1314-1315 [doi]
- Poster Abstract: Environment-Independent Electronic Device Detection using Millimeter-WaveYeming Li, Wei Dong 0001, Yuxiang Lin. 1316-1317 [doi]
- Arbitrating Network Services in 5G Networks for Automotive Vertical IndustryJorge Baranda, Josep Mangues-Bafalluy, Luca Vettori, Ricardo Martínez, Giuseppe Avino, Carla-Fabiana Chiasserini, C. Puligheddu, Claudio Casetti, Juan Brenes Baranzano, Giada Landi, Koteswararao Kondepu, Francesco Paolucci, Silvia Fichera, Luca Valcarenghi. 1318-1319 [doi]
- HURRA! Human-Readable Router Anomaly DetectionJosé M. Navarro, Dario Rossi. 1320-1321 [doi]
- NFV Service Federation: enabling Multi-Provider eHealth Emergency ServicesJorge Baranda, Josep Mangues-Bafalluy, Luca Vettori, Ricardo Martínez, Kiril Antevski, L. Girletti, Carlos J. Bernardos, Konstantin Tomakh, D. Kucherenko, Giada Landi, Juan Brenes Baranzano, Xi Li, Xavier Costa-Pérez, Fabio Ubaldi, G. Imbarlina, Molka Gharbaoui. 1322-1323 [doi]
- Demo Abstract: End-to-end Root Cause Analysis of a Mobile NetworkAchille Salaün, Anne Bouillard, Marc-Olivier Buob. 1324-1325 [doi]
- Demo Abstract: Narwhal: a DASH-based Point Cloud Video Streaming System over Wireless NetworksJie Li, Cong Zhang, Zhi Liu, Wei Sun, Wei Hu, Qiyue Li. 1326-1327 [doi]
- Demo Abstract: iCrutch: A Smartphone-based Intelligent Crutch for Smart Home ApplicationsKe Lin, Siyao Cheng, Jianzhong Li. 1328-1329 [doi]
- Demo Abstract: APN6: Application-aware IPv6 NetworkingShuping Peng, Jianwei Mao, Ruizhao Hu, Zhenbin Li. 1330-1331 [doi]
- Prototyping NOMA Constellation Rotation in Wi-FiEvgeny M. Khorov, Aleksey Kureev, Ilya Levitsky, Ian F. Akyildiz. 1332-1333 [doi]
- Demo Abstract: Cross-layer Authentication Based on Physical Channel Information using OpenAirInterfaceZhao Zhao, Yanzhao Hou, Xiaosheng Tang, Xiaofeng Tao. 1334-1335 [doi]
- Whispering to Industrial IoT for converging multi-domain Network ProgrammabilityEsteban Municio, Steven Latré, Johann M. Márquez-Barja. 1336-1337 [doi]
- Demo Abstract: Assessing MANO Performance based on VIM Platforms within MEC ContextNina Slamnik-Krijestorac, Johann M. Márquez-Barja. 1338-1339 [doi]
- Demo Abstract: Social Media-Driven UAV Sensing Frameworks in Disaster Response ApplicationsMd. Tahmid Rashid, Daniel Zhang 0001, Dong Wang. 1340-1341 [doi]
- Poster Abstract: LocTag: Passive WiFi Tag for Robust Indoor Localization via SmartphonesShengen Wei, Jiankun Wang, Zenghua Zhao. 1342-1343 [doi]
- Fractals in the Air: Under-determined modulation recognition for MIMO communicationWei Xiong 0013, Lin Zhang, Maxwell McNeil, Petko Bogdanov, Mariya Zheleva. 1344-1345 [doi]
- Poster Abstract: Model Average-based Distributed Training for Sparse Deep Neural NetworksYuetong Yang, Zhiquan Lai, Lei Cai, Dongsheng Li. 1346-1347 [doi]
- Poster Abstract: Encrypted Malware Traffic Detection Using Incremental LearningInsup Lee, Heejun Roh, Wonjun Lee. 1348-1349 [doi]
- Reconsidering Leakage Prevention in MapReduceXiaoyu Zhang, Yongzhi Wang, Yu Zou. 1350-1351 [doi]
- Enforcing Control Flow Confidentiality with SGXYu Zou, Yongzhi Wang, Xiaoyu Zhang. 1352-1353 [doi]
- Lightweight Network-Wide Telemetry Without Explicitly Using Probe PacketsTian Pan, Enge Song, Chenhao Jia, Wendi Cao, Tao Huang, Bin Liu. 1354-1355 [doi]
- Poster Abstract: Relaxing Network Selection for TCP Short Flows Using SYN DuplicationKien Nguyen, Hiroo Sekiya. 1356-1357 [doi]
- Federated Routing Scheme for Large-scale Cross Domain NetworkYuchao Zhang, Ye Tian, Wendong Wang, Peizhuang Cong, Chao Chen, Dan Li, Ke Xu. 1358-1359 [doi]
- Robustness Analysis of Networked Control Systems with Aging StatusBin Han 0004, Siyu Yuan, Zhiyuan Jiang, Yao Zhu, Hans D. Schotten. 1360-1361 [doi]
- Poster Abstract: A Computational Model-Driven Hybrid Social Media and Drone-Based Wildfire Monitoring FrameworkMd. Tahmid Rashid, Daniel Zhang 0001, Dong Wang. 1362-1363 [doi]
- Poster Abstract: Suppressing CSI Leakage in Multi-user MIMO Networks via PrecodingSeoungbin Bae, Youngki Kim, Heejun Roh, Wonjun Lee. 1364-1365 [doi]