Abstract is missing.
- HearFit: Fitness Monitoring on Smart Speakers via Active Acoustic SensingYadong Xie, Fan Li, Yue Wu, Yu Wang 0003. 1-10 [doi]
- ECLAT: An ECN Marking System for Latency Guarantee in Cellular NetworksJunseon Kim, Youngbin Im, Kyunghan Lee. 1-10 [doi]
- vGaze: Implicit Saliency-Aware Calibration for Continuous Gaze Tracking on Mobile DevicesSongzhou Yang, Yuan He 0004, Meng Jin. 1-10 [doi]
- GRADES: Gradient Descent for Similarity CachingAnirudh Sabnis, Tareq Si Salem, Giovanni Neglia, Michele Garetto, Emilio Leonardi, Ramesh K. Sitaraman. 1-10 [doi]
- Bandwidth Isolation Guarantee for SDN Virtual NetworksGyeongsik Yang, Yeonho Yoo, Minkoo Kang, Heesang Jin, Chuck Yoo. 1-10 [doi]
- Invisible Poison: A Blackbox Clean Label Backdoor Attack to Deep Neural NetworksRui Ning, Jiang Li, Chunsheng Xin, Hongyi Wu. 1-10 [doi]
- Scalable On-Switch Rate Limiters for the CloudYongchao He, Wenfei Wu, Xuemin Wen, Haifeng Li, Yongqiang Yang. 1-10 [doi]
- MIERank: Co-ranking Individuals and Communities with Multiple Interactions in Evolving NetworksShan Qu, Luoyi Fu, Xinbing Wang. 1-10 [doi]
- Joint Cache Size Scaling and Replacement Adaptation for Small Content ProvidersJiahui Ye, Zichun Li, Zhi Wang, Zhuobin Zheng, Han Hu 0003, Wenwu Zhu 0001. 1-10 [doi]
- AMT: Acoustic Multi-target Tracking with Smartphone MIMO SystemChao Liu, PengHao Wang, Ruobing Jiang, Yanmin Zhu. 1-10 [doi]
- Comparison of Decentralized and Centralized Update Paradigms for Remote Tracking of Distributed Dynamic SourcesSunjung Kang, Atilla Eryilmaz, Changhee Joo. 1-10 [doi]
- DeepReserve: Dynamic Edge Server Reservation for Connected Vehicles with Deep Reinforcement LearningJiawei Zhang, Suhong Chen, Xudong Wang 0001, Yifei Zhu. 1-10 [doi]
- Live Gradient Compensation for Evading Stragglers in Distributed LearningJian Xu, Shao-Lun Huang, Linqi Song, Tian Lan. 1-10 [doi]
- Cost-Driven Data Caching in the Cloud: An Algorithmic ApproachYang Wang, Yong Zhang, Xinxin Han, Pengfei Wang, Chengzhong Xu, Joseph Horton, Joseph Culberson. 1-10 [doi]
- Rate Region of Scheduling a Wireless Network with Discrete Propagation DelaysJun Ma, Yanxiao Liu 0003, Shenghao Yang. 1-10 [doi]
- RespTracker: Multi-user Room-scale Respiration Tracking with Commercial Acoustic DevicesHaoran Wan, Shuyu Shi, Wenyu Cao, Wei Wang 0002, Guihai Chen. 1-10 [doi]
- Turbocharging Deep Backscatter Through Constructive Power Surges with a Single RF SourceZhenlin An, Qiongzheng Lin, Qingrui Pan, Lei Yang. 1-10 [doi]
- Bipartite Graph Matching Based Secret Key GenerationHongbo Liu, Yan Wang, Yanzhi Ren, Yingying Chen. 1-10 [doi]
- Signal Detection and Classification in Shared Spectrum: A Deep Learning ApproachWenhan Zhang, Mingjie Feng, Marwan Krunz, Amirhossein Yazdani Abyaneh. 1-10 [doi]
- Enabling Edge-Cloud Video Analytics for Robotics ApplicationsYiding Wang, Weiyan Wang, Duowen Liu, Xin Jin, Junchen Jiang, Kai Chen 0005. 1-10 [doi]
- Minimizing Entropy for Crowdsourcing with Combinatorial Multi-Armed BanditYiwen Song, Haiming Jin. 1-10 [doi]
- A Weak Consensus Algorithm and Its Application to High-Performance BlockchainQin Wang, Rujia Li. 1-10 [doi]
- VideoLoc: Video-based Indoor Localization with Text InformationShusheng Li, Wenbo He. 1-10 [doi]
- PCL: Packet Classification with Limited KnowledgeVitalii Demianiuk, Chen Hajaj, Kirill Kogan. 1-10 [doi]
- INCdeep: Intelligent Network Coding with Deep Reinforcement LearningQi Wang 0025, Jianmin Liu, Katia Jaffrès-Runser, Yongqing Wang, Chentao He, Cunzhuang Liu, Yongjun Xu. 1-10 [doi]
- RapidRider: Efficient WiFi Backscatter with Uncontrolled Ambient SignalsQiwei Wang, Si Chen, Jia Zhao, Wei Gong 0001. 1-10 [doi]
- Leveraging Domain Knowledge for Robust Deep Reinforcement Learning in NetworkingYing Zheng, Haoyu Chen, Qingyang Duan, Lixiang Lin, Yiyang Shao, Wei Wang, Xin Wang, Yuedong Xu. 1-10 [doi]
- Setting the Record Straighter on Shadow BanningErwan Le Merrer, Benoît Morgan, Gilles Trédan. 1-10 [doi]
- Code is the (F)Law: Demystifying and Mitigating Blockchain Inconsistency Attacks Caused by Software BugsGuorui Yu, Shibin Zhao, Chao Zhang, Zhiniang Peng, Yuandong Ni, Xinhui Han. 1-10 [doi]
- AWash: Handwashing Assistance for the Elderly with Dementia via WearablesYetong Cao, Huijie Chen, Fan Li 0001, Song Yang, Yu Wang 0003. 1-10 [doi]
- Learning-Driven Decentralized Machine Learning in Resource-Constrained Wireless Edge ComputingZeyu Meng, Hongli Xu, Min Chen, Yang Xu, Yangming Zhao, Chunming Qiao. 1-10 [doi]
- Threshold-based rerouting and replication for resolving job-server affinity relationsYouri Raaijmakers, Sem C. Borst, Onno J. Boxma. 1-10 [doi]
- Modeling Communication Reliability in LoRa Networks with Device-level AccuracyVerónica Toro-Betancur, Gopika Premsankar, Mariusz Slabicki, Mario Di Francesco. 1-10 [doi]
- Energy-Efficient Orchestration of Metro-Scale 5G Radio Access NetworksRajkarn Singh, Cengis Hasan, Xenofon Foukas, Marco Fiore, Mahesh K. Marina, Yue Wang. 1-10 [doi]
- Self-Adaptive Sampling for Network Traffic MeasurementYang Du 0006, He Huang 0001, Yu-e Sun, Shigang Chen, Guoju Gao. 1-10 [doi]
- Web-LEGO: Trading Content Strictness for Faster WebpagesPengfei Wang, Matteo Varvello, Chunhe Ni, Ruiyun Yu, Aleksandar Kuzmanovic. 1-10 [doi]
- Resource-Efficient Federated Learning with Hierarchical Aggregation in Edge ComputingZhiyuan Wang, Hongli Xu, JianChun Liu, He Huang, Chunming Qiao, Yangming Zhao. 1-10 [doi]
- Train Once, Locate Anytime for Anyone: Adversarial Learning based Wireless LocalizationDanyang Li, Jingao Xu, Zheng Yang, Yumeng Lu, Qian Zhang, Xinglin Zhang. 1-10 [doi]
- The Impact of Baseband Functional Splits on Resource Allocation in 5G Radio Access NetworksIordanis Koutsopoulos. 1-10 [doi]
- 802.11ad in Smartphones: Energy Efficiency, Spatial Reuse, and Impact on ApplicationsShivang Aggarwal, Moinak Ghoshal, Piyali Banerjee, Dimitrios Koutsonikolas, Joerg Widmer. 1-10 [doi]
- Learning for Learning: Predictive Online Control of Federated Learning with Edge ProvisioningYibo Jin 0001, Lei Jiao, Zhuzhong Qian, Sheng Zhang 0001, Sanglu Lu. 1-10 [doi]
- Analyzing Learning-Based Networked Systems with Formal VerificationArnaud Dethise, Marco Canini, Nina Narodytska. 1-10 [doi]
- Reusing Backup Batteries as BESS for Power Demand Reshaping in 5G and BeyondGuoming Tang, Hao Yuan, Deke Guo, Kui Wu, Yi Wang. 1-10 [doi]
- BlendVLC: A Cell-free VLC Network Architecture Empowered by Beamspot BlendingJona Beysens, Qing Wang 0007, Maxim Van Den Abeele, Sofie Pollin. 1-10 [doi]
- Safety Critical Networks using Commodity SDNsAshish Kashinath, Monowar Hasan, Rakesh Kumar, Sibin Mohan, Rakesh B. Bobba, Smruti Padhy. 1-10 [doi]
- Adaptive Clustering-based Malicious Traffic Classification at the Network EdgeAlec F. Diallo, Paul Patras. 1-10 [doi]
- An Incentive Mechanism for Cross-Silo Federated Learning: A Public Goods PerspectiveMing Tang, Vincent W. S. Wong. 1-10 [doi]
- Experimental UAV Data Traffic Modeling and Network Performance AnalysisAygün Baltaci, Markus Klügel, Fabien Geyer, Svetoslav Duhovnikov, Vaibhav Bajpai, Jörg Ott, Dominic Schupke. 1-10 [doi]
- A Lightweight Integrity Authentication Approach for RFID-enabled Supply ChainsXin Xie, Xiulong Liu, Song Guo 0001, Heng Qi, Keqiu Li. 1-10 [doi]
- Minimizing the Sum of Age of Information and Transmission Cost under Stochastic Arrival ModelKumar Saurav, Rahul Vaze. 1-10 [doi]
- Strategic Information Revelation in Crowdsourcing Systems Without VerificationChao Huang, Haoran Yu, Jianwei Huang, Randall A. Berry. 1-10 [doi]
- Optimal Online Balanced Graph PartitioningMaciej Pacut, Mahmoud Parham, Stefan Schmid 0001. 1-9 [doi]
- Competing Epidemics on Graphs - Global Convergence and CoexistenceVishwaraj Doshi, Shailaja Mallick, Do Young Eun. 1-10 [doi]
- Tailored Learning-Based Scheduling for Kubernetes-Oriented Edge-Cloud SystemYiwen Han, Shihao Shen, Xiaofei Wang 0001, Shiqiang Wang, Victor C. M. Leung. 1-10 [doi]
- Context-aware Website Fingerprinting over Encrypted ProxiesXiaobo Ma, Mawei Shi, Bingyu An, Jianfeng Li, Daniel Xiapu Luo, Junjie Zhang 0004, Xiaohong Guan. 1-10 [doi]
- Proximity-Echo: Secure Two Factor Authentication Using Active Sound SensingYanzhi Ren, Ping Wen, Hongbo Liu, Zhourong Zheng, Yingying Chen 0001, Pengcheng Huang, Hongwei Li. 1-10 [doi]
- Individual Load Forecasting for Multi-Customers with Distribution-aware Temporal PoolingEunju Yang, Chan-Hyun Youn. 1-10 [doi]
- Sample-level Data Selection for Federated LearningAnran Li, Lan Zhang 0002, Juntao Tan, Yaxuan Qin, Junhao Wang, Xiang-Yang Li. 1-10 [doi]
- LiveMap: Real-Time Dynamic Map in Automotive Edge ComputingQiang Liu, Tao Han, Jiang (Linda) Xie, BaekGyu Kim. 1-10 [doi]
- Towards Minimum Fleet for Ridesharing-Aware Mobility-on-Demand SystemsChonghuan Wang, Yiwen Song, Yifei Wei, Guiyun Fan, Haiming Jin, Fan Zhang. 1-10 [doi]
- Bound Inference and Reinforcement Learning-based Path Construction in Bandwidth TomographyCuiying Feng, Jianwei An, Kui Wu, Jianping Wang. 1-10 [doi]
- Contact Tracing App Privacy: What Data Is Shared By Europe's GAEN Contact Tracing AppsDouglas J. Leith, Stephen Farrell. 1-10 [doi]
- Characterizing Ethereum's Mining Power Decentralization at a Deeper LevelLiyi Zeng, Yang Chen, Shuo Chen, Xian Zhang, Zhongxin Guo, Wei Xu, Thomas Moscibroda. 1-10 [doi]
- Efficient and Verifiable Proof of Replication with Fast Fault LocalizationHaoran Yuan, Xiaofeng Chen 0001, Guowen Xu, Jianting Ning, Joseph K. Liu, Robert H. Deng. 1-10 [doi]
- Towards Cross-Modal Forgery Detection and Localization on Live Surveillance VideosYong Huang, Xiang Li, Wei Wang, Tao Jiang, Qian Zhang. 1-10 [doi]
- GPU-Ether: GPU-native Packet I/O for GPU Applications on Commodity EthernetChangue Jung, Suhwan Kim, Ikjun Yeom, Honguk Woo, Younghoon Kim. 1-10 [doi]
- Pyramid: A Layered Sharding Blockchain SystemZicong Hong, Song Guo 0001, Peng Li 0017, Wuhui Chen. 1-10 [doi]
- Ultra-Wideband Swarm RangingFeng Shan, Jiaxin Zeng, Zengbao Li, Junzhou Luo, Weiwei Wu 0001. 1-10 [doi]
- Making Multi-String Pattern Matching Scalable and Cost-Efficient with Programmable Switching ASICsShicheng Wang, Menghao Zhang, Guanyu Li, Chang Liu, Ying Liu, Xuya Jia, Mingwei Xu. 1-10 [doi]
- Launching Smart Selective Jamming Attacks in WirelessHART NetworksXia Cheng, Junyang Shi, Mo Sha 0001, Linke Guo. 1-10 [doi]
- Counter-Collusion Smart Contracts for Watchtowers in Payment Channel NetworksYuhui Zhang, Dejun Yang, Guoliang Xue, Ruozhou Yu. 1-10 [doi]
- Physical Layer Key Generation between Backscatter Devices over Ambient RF SignalsPu Wang, Long Jiao, Kai Zeng 0001, Zheng Yan 0002. 1-10 [doi]
- Exploiting Simultaneous Communications to Accelerate Data Parallel Distributed Deep LearningShaohuai Shi, Xiaowen Chu, Bo Li. 1-10 [doi]
- Minimizing the Number of Deployed UAVs for Delay-bounded Data Collection of IoT DevicesJunqi Zhang, Zheng Li, Wenzheng Xu, Jian Peng, Weifa Liang, Zichuan Xu, Xiaojiang Ren, Xiaohua Jia. 1-10 [doi]
- HAVS: Hardware-accelerated Shared-memory-based VPP Network StackShujun Zhuang, Jian Zhao, Jian Li 0021, Ping Yu, Yuwei Zhang, Haibing Guan. 1-10 [doi]
- Efficient Learning-based Scheduling for Information Freshness in Wireless NetworksBin Li. 1-10 [doi]
- Analyzing Age of Information in Multiaccess Networks by Fluid LimitsZhiyuan Jiang. 1-10 [doi]
- POLO: Localizing RFID-Tagged Objects for Mobile RobotsDianhan Xie, Xudong Wang, Aimin Tang, Hongzi Zhu. 1-10 [doi]
- A Deep-Learning-based Link Adaptation Design for eMBB/URLLC Multiplexing in 5G NRYan Huang 0025, Y. Thomas Hou, Wenjing Lou. 1-10 [doi]
- Optimal Rack-Coordinated Updates in Erasure-Coded Data CentersGuowen Gong, Zhirong Shen, Suzhen Wu, Xiaolu Li, Patrick P. C. Lee. 1-10 [doi]
- BLESS: BLE-aided Swift Wi-Fi Scanning in Multi-protocol IoT NetworksWonbin Park, Dokyun Ryoo, Changhee Joo, Saewoong Bahk. 1-10 [doi]
- CanalScan: Tongue-Jaw Movement Recognition via Ear Canal Deformation SensingYetong Cao, Huijie Chen, Fan Li, Yu Wang 0003. 1-10 [doi]
- A Worst-Case Approximate Analysis of Peak Age-of-Information Via Robust Queueing ApproachZhongdong Liu, Yu Sang, Bin Li, Bo Ji. 1-10 [doi]
- NetMARKS: Network Metrics-AwaRe Kubernetes Scheduler Powered by Service MeshLukasz Wojciechowski, Krzysztof Opasiak, Jakub Latusek, Maciej Wereski, Victor Morales, Taewan Kim, Moonki Hong. 1-9 [doi]
- Fix with P6: Verifying Programmable Switches at RuntimeApoorv Shukla, Kevin Nico Hudemann, Zsolt Vági, Lily Hügerich, Georgios Smaragdakis, Artur Hecker, Stefan Schmid 0001, Anja Feldmann. 1-10 [doi]
- DC2: Delay-aware Compression Control for Distributed Machine LearningAhmed M. Abdelmoniem, Marco Canini. 1-10 [doi]
- Distributed Neighbor Distribution Estimation with Adaptive Compressive Sensing in VANETsYunxiang Cai, Hongzi Zhu, Xiao Wang, Shan Chang, Jiangang Shen, Minyi Guo. 1-10 [doi]
- 6Hit: A Reinforcement Learning-based Approach to Target Generation for Internet-wide IPv6 ScanningBingnan Hou, Zhiping Cai, Kui Wu 0001, Jinshu Su, Yinqiao Xiong. 1-10 [doi]
- To Talk or to Work: Flexible Communication Compression for Energy Efficient Federated Learning over Heterogeneous Mobile Edge DevicesLiang Li, Dian Shi, Ronghui Hou, Hui Li, Miao Pan, Zhu Han. 1-10 [doi]
- Optimal Wireless Scheduling for Remote Sensing through Brownian ApproximationDaojing Guo, Ping-Chun Hsieh, I-Hong Hou. 1-10 [doi]
- Camel: Context-Aware Magnetic MIMO Wireless Power Transfer with In-band CommunicationHao Zhou, Zhao Chen, Wangqiu Zhou, Haisheng Tan, Panlong Yang, Xiang-Yang Li. 1-10 [doi]
- ITE: A Structural Entropy Based Approach for Source DetectionChong Zhang, Qiang Guo, Luoyi Fu, Xiaoying Gan, Xinbing Wang. 1-10 [doi]
- MTP: Avoiding Control Plane Overload with Measurement Task PlacementXiang Chen, Qun Huang 0001, Peiqiao Wang, Hongyan Liu, Yuxin Chen, Dong Zhang, Haifeng Zhou, Chunming Wu. 1-10 [doi]
- Edge-assisted Online On-device Object Detection for Real-time Video AnalyticsMengxi Hanyao, Yibo Jin 0001, Zhuzhong Qian, Sheng Zhang 0001, Sanglu Lu. 1-10 [doi]
- NFReducer: Redundant Logic Elimination for Network Functions with Runtime ConfigurationsBangwen Deng, Wenfei Wu. 1-10 [doi]
- Device Sampling for Heterogeneous Federated Learning: Theory, Algorithms, and ImplementationSu Wang 0007, Mengyuan Lee, Seyyedali Hosseinalipour, Roberto Morabito, Mung Chiang, Christopher G. Brinton. 1-10 [doi]
- Age of Information in Random Access Networks with Stochastic ArrivalsIgor Kadota, Eytan H. Modiano. 1-10 [doi]
- DyLoc: Dynamic Localization for Massive MIMO Using Predictive Recurrent Neural NetworksFarzam Hejazi, Katarina Vuckovic, Nazanin Rahnavard. 1-9 [doi]
- Cocktail Edge Caching: Ride Dynamic Trends of Content Popularity with Ensemble LearningTongyu Zong, Chen Li, Yuanyuan Lei, Guangyu Li, Houwei Cao, Yong Liu. 1-10 [doi]
- Maximizing the Benefit of RDMA at End HostsXiaoliang Wang 0001, Hexiang Song, Cam-Tu Nguyen, Dongxu Cheng, Tiancheng Jin. 1-10 [doi]
- Near Optimal and Dynamic Mechanisms Towards a Stable NFV Market in Multi-Tier Cloud NetworksZichuan Xu, Haozhe Ren, Weifa Liang, Qiufen Xia, Wanlei Zhou, Guowei Wu, Pan Zhou. 1-10 [doi]
- Robust Online Learning against Malicious Manipulation with Application to Network Flow ClassificationYupeng Li, Ben Liang, Ali Tizghadam. 1-10 [doi]
- Beyond Value Perturbation: Local Differential Privacy in the Temporal SettingQingqing Ye 0001, Haibo Hu 0001, Ninghui Li, Xiaofeng Meng 0001, Huadi Zheng, Haotian Yan. 1-10 [doi]
- SmartDistance: A Mobile-based Positioning System for Automatically Monitoring Social DistanceLi Li, Xiaorui Wang, Wenli Zheng, Cheng-Zhong Xu 0001. 1-10 [doi]
- GOLDIE: Harmonization and Orchestration Towards a Global Directory for IoTLuoyao Hao, Henning Schulzrinne. 1-10 [doi]
- AMIS: Edge Computing Based Adaptive Mobile Video StreamingPhil K. Mu, Jinkai Zheng, Tom H. Luan, Lina Zhu, Mianxiong Dong, Zhou Su. 1-10 [doi]
- ProHiCo: A Probabilistic Framework to Hide Communities in Large NetworksXuecheng Liu, Luoyi Fu, Xinbing Wang, John E. Hopcroft. 1-10 [doi]
- Trust Trackers for Computation Offloading in Edge-Based IoT NetworksMatthew Bradbury, Arshad Jhumka, Tim Watson. 1-10 [doi]
- Age-Dependent Distributed MAC for Ultra-Dense Wireless NetworksDheeraj Narasimha, Srinivas Shakkottai, Lei Ying. 1-10 [doi]
- Robust 360° Video Streaming via Non-Linear SamplingMijanur R. Palash, Voicu Popescu, Amit Sheoran, Sonia Fahmy. 1-10 [doi]
- MANDA: On Adversarial Example Detection for Network Intrusion Detection SystemNing Wang, Yimin Chen, Yang Hu, Wenjing Lou, Y. Thomas Hou. 1-10 [doi]
- Fault-Tolerant Energy Management for Real-Time Systems with Weakly Hard QoS AssuranceLinwei Niu. 1-10 [doi]
- Towards the Fairness of Traffic PolicerDanfeng Shan, Peng Zhang, Wanchun Jiang, Hao Li, Fengyuan Ren. 1-10 [doi]
- SODA: Similar 3D Object Detection Accelerator at Network Edge for Autonomous DrivingWenquan Xu, Haoyu Song 0001, Linyang Hou, Hui Zheng, Xinggong Zhang, Chuwen Zhang, Wei Hu, Yi Wang, Bin Liu 0001. 1-10 [doi]
- Towards Video Streaming Analysis and Sharing for Multi-Device Interaction with Lightweight DNNsYakun Huang, Hongru Zhao, Xiuquan Qiao, Jian Tang, Ling Liu. 1-10 [doi]
- Expectile Tensor Completion to Recover Skewed Network Monitoring DataKun Xie, Siqi Li, Xin Wang 0001, Gaogang Xie, Yudian Ouyang. 1-10 [doi]
- Joint Age of Information and Self Risk Assessment for Safer 802.11p based V2V NetworksBiplav Choudhury, Vijay K. Shah, Avik Dayal, Jeffrey H. Reed. 1-10 [doi]
- Time-Varying Resource Graph Based Resource Model for Space-Terrestrial Integrated NetworksLong Chen, Feilong Tang, Zhetao Li, Laurence T. Yang, Jiadi Yu, Bin Yao 0002. 1-10 [doi]
- Rate Allocation and Content Placement in Cache NetworksKhashayar Kamran, Armin Moharrer, Stratis Ioannidis, Edmund M. Yeh. 1-10 [doi]
- Blind Optimal User Association in Small-Cell NetworksLivia Elena Chatzieleftheriou, Apostolos Destounis, Georgios S. Paschos, Iordanis Koutsopoulos. 1-10 [doi]
- INT-label: Lightweight In-band Network-Wide Telemetry via Interval-based Distributed LabellingEnge Song, Tian Pan 0001, Chenhao Jia, Wendi Cao, Jiao Zhang 0002, Tao Huang 0005, Yunjie Liu. 1-10 [doi]
- Physical Layer Secure Communications Based on Collaborative Beamforming for UAV Networks: A Multi-objective Optimization ApproachJiahui Li, Hui Kang, Geng Sun, Shuang Liang, Yanheng Liu, Ying Zhang. 1-10 [doi]
- Low-Power Downlink for the Internet of Things using IEEE 802.11-compliant Wake-Up ReceiversJohannes Blobel, Tran Huy Vu, Archan Misra, Falko Dressler. 1-10 [doi]
- Going the Extra Mile with Disaster-Aware Network AugmentationJorik Oostenbrink, Fernando A. Kuipers. 1-10 [doi]
- Self-adjusting Advertisement of Cache Indicators with Bandwidth ConstraintsItamar Cohen, Gil Einziger, Gabriel Scalosub. 1-10 [doi]
- An Experience Driven Design for IEEE 802.11ac Rate Adaptation based on Reinforcement LearningSyuan-Cheng Chen, Chi-Yu Li, Chui-Hao Chiu. 1-10 [doi]
- P-FedAvg: Parallelizing Federated Learning with Theoretical GuaranteesZhicong Zhong, Yipeng Zhou, Di Wu, Xu Chen, Min Chen, Chao Li, Quan Z. Sheng. 1-10 [doi]
- Exploring Layered Container Structure for Cost Efficient Microservice DeploymentLin Gu, Deze Zeng, Jie Hu, Hai Jin 0001, Song Guo 0001, Albert Y. Zomaya. 1-9 [doi]
- Delay-Tolerant Constrained OCO with Application to Network Resource AllocationJuncheng Wang, Ben Liang, Min Dong, Gary Boudreau, Hatem Abou-zeid. 1-10 [doi]
- Asynchronous Deep Reinforcement Learning for Data-Driven Task Offloading in MEC-Empowered Vehicular NetworksPenglin Dai, Kaiwen Hu, Xiao Wu 0001, Huanlai Xing, Zhaofei Yu. 1-10 [doi]
- Randomized Scheduling of Real-Time Traffic in Wireless Networks Over Fading ChannelsChristos Tsanikidis, Javad Ghaderi. 1-10 [doi]
- Flow Algebra: Towards an Efficient, Unifying Framework for Network Management TasksChristopher Leet, Robert Soulé, Yang Richard Yang, Ying Zhang. 1-10 [doi]
- De-anonymizing Social Networks Under Partial Overlap: An F-score Based ApproachJiapeng Zhang, Luoyi Fu, Xinbing Wang, Guihai Chen. 1-10 [doi]
- Finding Critical Files from a PacketJunNyung Hur, Hahoon Jeon, Hyeon Gy Shon, Young-Jae Kim, MyungKeun Yoon. 1-10 [doi]
- Jellyfish: Locality-Sensitive Subflow SketchingYongquan Fu, Lun An, Siqi Shen, Kai Chen, Pere Barlet-Ros. 1-10 [doi]
- Practical Analysis of Replication-Based SystemsFlorin Ciucu, Felix Poloczek, Lydia Y. Chen, Martin Chan. 1-10 [doi]
- PROCESS: Privacy-Preserving On-Chain Certificate Status ServiceMeng Jia, Kun He 0008, Jing Chen, RuiYing Du, Weihang Chen, Zhihong Tian, Shouling Ji. 1-10 [doi]
- Traffic-aware Buffer Management in Shared Memory SwitchesSijiang Huang, Mowei Wang, Yong Cui 0001. 1-10 [doi]
- Real-time Sampling and Estimation on Random Access Channels: Age of Information and BeyondXingran Chen, Xinyu Liao, Shirin Saeedi Bidokhti. 1-10 [doi]
- Statistical Delay and Error-Rate Bounded QoS Provisioning for 6G mURLLC Over AoI-Driven and UAV-Enabled Wireless NetworksXi Zhang, Jingqing Wang, H. Vincent Poor. 1-10 [doi]
- Reliability-aware Dynamic Service Chain Scheduling in 5G Networks based on Reinforcement LearningJunzhong Jia, Lei Yang, Jiannong Cao. 1-10 [doi]
- WebMythBusters: An In-depth Study of Mobile Web ExperienceSeongHoon Park, Yonghun Choi, Hojung Cha. 1-10 [doi]
- DeepSense: Fast Wideband Spectrum Sensing Through Real-Time In-the-Loop Deep LearningDaniel Uvaydov, Salvatore D'Oro, Francesco Restuccia, Tommaso Melodia. 1-10 [doi]
- Enhanced Flooding-Based Routing Protocol for Swarm UAV Networks: Random Network Coding Meets ClusteringHao Song, Lingjia Liu 0001, Bodong Shang, Scott Pudlewski, Elizabeth Serena Bentley. 1-10 [doi]
- DRL-OR: Deep Reinforcement Learning-based Online Routing for Multi-type Service RequirementsChenyi Liu, Mingwei Xu, Yuan Yang 0001, Nan Geng. 1-10 [doi]
- Auction-Based Combinatorial Multi-Armed Bandit Mechanisms with Strategic ArmsGuoju Gao, He Huang, Mingjun Xiao, Jie Wu, Yu-e Sun, Sheng Zhang. 1-10 [doi]
- Layer Aware Microservice Placement and Request Scheduling at the EdgeLin Gu 0002, Deze Zeng, Jie Hu, Bo Li, Hai Jin 0001. 1-9 [doi]
- Attack Resilience of Cache Replacement PoliciesTian Xie, Ting He, Patrick D. McDaniel, Namitha Nambiar. 1-10 [doi]
- Motion-Prediction-based Wireless Scheduling for Multi-User Panoramic Video StreamingJiangong Chen, Xudong Qin, Guangyu Zhu, Bo Ji, Bin Li. 1-10 [doi]
- Low Sample and Communication Complexities in Decentralized Learning: A Triple Hybrid ApproachXin Zhang, Jia Liu 0002, Zhengyuan Zhu, Elizabeth Serena Bentley. 1-10 [doi]
- SOBA: Session optimal MDP-based network friendly recommendationsTheodoros Giannakas, Anastasios Giovanidis, Thrasyvoulos Spyropoulos. 1-10 [doi]
- Detecting Localized Adversarial Examples: A Generic Approach using Critical Region AnalysisFengting Li, Xuankai Liu, Xiaoli Zhang, Qi Li, Kun Sun 0001, Kang Li. 1-10 [doi]
- Reversible Models for Wireless Multi-Channel Multiple AccessMichael J. Neely. 1-10 [doi]
- A Universal Transcoding and Transmission Method for Livecast with Networked Multi-Agent Reinforcement LearningXingyan Chen, Changqiao Xu, Mu Wang, Zhonghui Wu, Shujie Yang, Lujie Zhong, Gabriel-Miro Muntean. 1-10 [doi]
- Dual Attention-Based Federated Learning for Wireless Traffic PredictionChuanting Zhang, Shuping Dang, Basem Shihada, Mohamed-Slim Alouini. 1-10 [doi]
- Lifesaving with RescueChain: Energy-Efficient and Partition-Tolerant Blockchain Based Secure Information Sharing for UAV-Aided Disaster RescueYuntao Wang 0004, Zhou Su, Qichao Xu, Ruidong Li, Tom H. Luan. 1-10 [doi]
- PALMAR: Towards Adaptive Multi-inhabitant Activity Recognition in Point-Cloud TechnologyMohammad Arif Ul Alam, Md. Mahmudur Rahman, Jared Q. Widberg. 1-10 [doi]
- Popularity-Aware 360-Degree Video StreamingXianda Chen, Tianxiang Tan, Guohong Cao. 1-10 [doi]
- On Scheduling with AoI Violation ToleranceChengzhang Li, Qingyu Liu, Shaoran Li, Yongce Chen, Y. Thomas Hou, Wenjing Lou. 1-9 [doi]
- Tornadoes In The Cloud: Worst-Case Attacks on Distributed Resources SystemsJhonatan Tavori, Hanoch Levy. 1-10 [doi]
- First-Order Efficient General-Purpose Clean-Label Data PoisoningTianhang Zheng, Baochun Li. 1-10 [doi]
- Low Cost Sparse Network Monitoring Based on Block Matrix CompletionKun Xie 0001, Jiazheng Tian, Gaogang Xie, Guangxing Zhang, Dafang Zhang. 1-10 [doi]
- Online Joint Optimization on Traffic Engineering and Network Update in Software-defined WANsJiaqi Zheng, Yimeng Xu, Li Wang, Haipeng Dai, Guihai Chen. 1-10 [doi]
- The Effect of Ground Truth Accuracy on the Evaluation of Localization SystemsChen Gu, Ahmed Shokry, Moustafa Youssef 0001. 1-10 [doi]
- Bandit Learning with Predicted Context: Regret Analysis and Selective Context QueryJianyi Yang, Shaolei Ren. 1-10 [doi]
- Bringing Fairness to Actor-Critic Reinforcement Learning for Network Utility OptimizationJingdi Chen, Yimeng Wang, Tian Lan. 1-10 [doi]
- mCore: Achieving Sub-millisecond Scheduling for 5G MU-MIMO SystemsYongce Chen, Yubo Wu, Y. Thomas Hou, Wenjing Lou. 1-10 [doi]
- EdgeDuet: Tiling Small Object Detection for Edge Assisted Autonomous Mobile VisionXu Wang, Zheng Yang, Jiahang Wu, Yi Zhao, Zimu Zhou. 1-10 [doi]
- WiProg: A WebAssembly-based Approach to Integrated IoT ProgrammingBorui Li, Wei Dong 0001, Yi Gao. 1-10 [doi]
- Optimal Resource Allocation for Statistical QoS Provisioning in Supporting mURLLC Over FBC-Driven 6G Terahertz Wireless Nano-NetworksXi Zhang, Jingqing Wang, H. Vincent Poor. 1-10 [doi]
- Programmable Switches for in-Networking ClassificationBruno Missi Xavier, Rafael Silva Guimaraes, Giovanni Comarela, Magnos Martinello. 1-10 [doi]
- Uplink Multi-User Beamforming on Single RF Chain mmWave WLANsKeerthi Priya Dasala, Josep Miquel Jornet, Edward W. Knightly. 1-10 [doi]
- Combining Regularization with Look-Ahead for Competitive Online Convex OptimizationMing Shi, Xiaojun Lin, Lei Jiao. 1-10 [doi]
- On Network Topology Augmentation for Global Connectivity under Regional FailuresJános Tapolcai, Zsombor L. Hajdú, Alija Pasic, Pin-Han Ho, Lajos Rónyai. 1-10 [doi]
- NFD: Using Behavior Models to Develop Cross-Platform Network FunctionsHongyi Huang, Wenfei Wu, Yongchao He, Bangwen Deng, Ying Zhang, Yongqiang Xiong, Guo Chen, Yong Cui, Peng Cheng 0005. 1-10 [doi]
- On the Performance of Pipelined HotStuffJianyu Niu, Fangyu Gai, Mohammad M. Jalalzai, Chen Feng 0001. 1-10 [doi]
- Grafting Arborescences for Extra Resilience of Fast Rerouting SchemesKlaus-Tycho Foerster, Andrzej Kamisinski, Yvonne Anne Pignolet, Stefan Schmid 0001, Gilles Trédan. 1-10 [doi]
- Privacy-Preserving Outlier Detection with High Efficiency over Distributed DatasetsGuanghong Lu, Chunhui Duan, Guohao Zhou, Xuan Ding, Yunhao Liu. 1-10 [doi]
- Efficient Association of Wi-Fi Probe Requests under MAC Address RandomizationJiajie Tan, S.-H. Gary Chan. 1-10 [doi]
- Leveraging Website Popularity Differences to Identify Performance AnomaliesGiulio Grassi, Renata Teixeira, Chadi Barakat, Mark Crovella. 1-10 [doi]
- AdaPDP: Adaptive Personalized Differential PrivacyBen Niu, Yahong Chen, Boyang Wang, Zhibo Wang, FengHua Li, Jin Cao. 1-10 [doi]
- PolarTracker: Attitude-aware Channel Access for Floating Low Power Wide Area NetworksYuTing Wang, Xiaolong Zheng, Liang Liu, Huadong Ma. 1-10 [doi]
- Cost-Effective Federated Learning DesignBing Luo, Xiang Li, Shiqiang Wang, Jianwei Huang, Leandros Tassiulas. 1-10 [doi]
- Can You Fix My Neural Network? Real-Time Adaptive Waveform Synthesis for Resilient Wireless Signal ClassificationSalvatore D'Oro, Francesco Restuccia, Tommaso Melodia. 1-10 [doi]
- Towards Fine-Grained Spatio-Temporal Coverage for Vehicular Urban Sensing SystemsGuiyun Fan, Yiran Zhao, Zilang Guo, Haiming Jin, Xiaoying Gan, Xinbing Wang. 1-10 [doi]
- CryptoEyes: Privacy Preserving Classification over Encrypted ImagesWenbo He, Shusheng Li, Wenbo Wang, Muheng Wei, Bohua Qiu. 1-10 [doi]
- ScreenID: Enhancing QRCode Security by Fingerprinting ScreensYijie Li, Yi-Chao Chen 0001, Xiaoyu Ji, Hao Pan, Lanqing Yang, Guangtao Xue, Jiadi Yu. 1-10 [doi]
- AutoML for Video Analytics with Edge ComputingApostolos Galanopoulos, Jose A. Ayala-Romero, Douglas J. Leith, George Iosifidis. 1-10 [doi]
- Multi-Agent Reinforcement Learning for Urban Crowd Sensing with For-Hire VehiclesRong Ding, Zhaoxing Yang, Yifei Wei, Haiming Jin, Xinbing Wang. 1-10 [doi]
- Accelerating LSH-based Distributed Search with In-network ComputationPenghao Zhang, Heng Pan, Zhenyu Li, Peng He 0003, Zhibin Zhang, Gareth Tyson, Gaogang Xie. 1-10 [doi]
- Distributed Threshold-based Offloading for Large-Scale Mobile Cloud ComputingXudong Qin, Bin Li, Lei Ying. 1-10 [doi]
- SteaLTE: Private 5G Cellular Connectivity as a Service with Full-stack Wireless SteganographyLeonardo Bonati, Salvatore D'Oro, Francesco Restuccia, Stefano Basagni, Tommaso Melodia. 1-10 [doi]
- TiBroco: A Fast and Secure Distributed Learning Framework for Tiered Wireless Edge NetworksDong-Jun Han, Jy-yong Sohn, Jaekyun Moon. 1-10 [doi]
- Adaptive Batch Update in TCAM: How Collective Optimization Beats Individual OnesYing Wan, Haoyu Song 0001, Yang Xu, Chuwen Zhang, Yi Wang, Bin Liu. 1-10 [doi]
- Modeling the Cost of Flexibility in Communication NetworksAlberto Martínez Alba, Péter Babarczi, Andreas Blenk, Mu He, Patrick Kalmbach, Johannes Zerwas, Wolfgang Kellerer. 1-10 [doi]
- FedSens: A Federated Learning Approach for Smart Health Sensing with Class Imbalance in Resource Constrained Edge ComputingDaniel Yue Zhang, Ziyi Kou, Dong Wang. 1-10 [doi]
- EdgeSharing: Edge Assisted Real-time Localization and Object Sharing in Urban StreetsLuyang Liu, Marco Gruteser. 1-10 [doi]
- Leveraging Public-Private Blockchain Interoperability for Closed Consortium InterfacingBishakh Chandra Ghosh, Tanay Bhartia, Sourav Kanti Addya, Sandip Chakraborty. 1-10 [doi]
- Incentive Mechanism Design for Distributed Coded Machine LearningNingning Ding, Zhixuan Fang, Lingjie Duan, Jianwei Huang. 1-10 [doi]
- TrackSign: Guided Web Tracking DiscoveryIsmael Castell-Uroz, Josep Solé-Pareta, Pere Barlet-Ros. 1-10 [doi]
- CTF: Anomaly Detection in High-Dimensional Time Series with Coarse-to-Fine Model TransferMing Sun, Ya Su, Shenglin Zhang, Yuanpu Cao, Yuqing Liu, Dan Pei, Wenfei Wu, Yongsu Zhang, Xiaozhou Liu, Junliang Tang. 1-10 [doi]
- Mobility- and Load-Adaptive Controller Placement and Assignment in LEO Satellite NetworksLong Chen, Feilong Tang, Xu Li 0012. 1-10 [doi]
- Mobile Crowdsensing for Data Freshness: A Deep Reinforcement Learning ApproachZipeng Dai, Hao Wang, Chi Harold Liu, Rui Han 0001, Jian Tang, Guoren Wang. 1-10 [doi]
- Redundant Entanglement Provisioning and Selection for Throughput Maximization in Quantum NetworksYangming Zhao, Chunming Qiao. 1-10 [doi]
- Dynamically Choosing the Candidate Algorithm with Ostasos in Online OptimizationWeirong Chen, Jiaqi Zheng, Haoyu Yu. 1-10 [doi]
- Failure Localization through Progressive Network TomographyViviana Arrigoni, Novella Bartolini, Annalisa Massini, Federico Trombetti. 1-10 [doi]
- Bayesian Online Learning for Energy-Aware Resource Orchestration in Virtualized RANsJose A. Ayala-Romero, Andres Garcia-Saavedra, Xavier Costa-Pérez, George Iosifidis. 1-10 [doi]
- SILoc: A Speed Inconsistency-Immune Approach to Mobile RFID Robot LocalizationJiuwu Zhang, Xiulong Liu, Tao Gu, Xinyu Tong, Sheng Chen, Keqiu Li. 1-10 [doi]
- Near-Optimal Topology-adaptive Parameter Synchronization in Distributed DNN TrainingZhe Zhang, Chuan Wu 0001, Zongpeng Li. 1-10 [doi]
- On the Reliability of IEEE 802.1CB FRERDoganalp Ergenç, Mathias Fischer 0001. 1-10 [doi]
- Multi-Robot Path Planning for Mobile Sensing through Deep Reinforcement LearningYongyong Wei, Rong Zheng. 1-10 [doi]
- Learning the unknown: Improving modulation classification performance in unseen scenariosErma Perenda, Sreeraj Rajendran, Gérôme Bovet, Sofie Pollin, Mariya Zheleva. 1-10 [doi]
- Fresh Caching for Dynamic ContentBahman Abolhassani, John Tadrous, Atilla Eryilmaz, Edmund Yeh. 1-10 [doi]
- Medley: Predicting Social Trust in Time-Varying Online Social NetworksWanyu Lin, Baochun Li. 1-10 [doi]
- Ruledger: Ensuring Execution Integrity in Trigger-Action IoT PlatformsJingwen Fan, Yi He, Bo Tang, Qi Li 0002, Ravi S. Sandhu. 1-10 [doi]
- Taming Time-Varying Information Asymmetry in Fresh Status AcquisitionZhiyuan Wang, Lin Gao 0001, Jianwei Huang. 1-10 [doi]
- Monitoring Cloud Service Unreachability at ScaleKapil Agrawal, Viral Mehta, Sundararajan Renganathan, Sreangsu Acharyya, Venkata N. Padmanabhan, Chakri Kotipalli, Liting Zhao. 1-10 [doi]
- Push the Limit of Device-Free Acoustic Sensing on Commercial Mobile DevicesHaiming Cheng, Wei Lou. 1-10 [doi]
- Privacy Preserving and Resilient RPKIKris Shrishak, Haya Shulman. 1-10 [doi]
- Optimal Multicast Scheduling for Millimeter Wave Networks Leveraging Directionality and ReflectionsIn-Sop Cho, Seung Jun Baek. 1-10 [doi]
- Coexistence of Wi-Fi 6E and 5G NR-U: Can We Do Better in the 6 GHz Bands?Gaurang Naik, Jung-Min Jerry Park. 1-10 [doi]
- π-ROAD: a Learn-as-You-Go Framework for On-Demand Emergency Slices in V2X ScenariosArmin Okic, Lanfranco Zanzi, Vincenzo Sciancalepore, Alessandro Redondi, Xavier Costa-Pérez. 1-10 [doi]
- Let's Share VMs: Optimal Placement and Pricing across Base Stations in MEC SystemsMarie Siew, Kun Guo, Desmond W. H. Cai, Lingxiang Li, Tony Q. S. Quek. 1-10 [doi]
- Heuristic Algorithms for Co-scheduling of Edge Analytics and Routes for UAV Fleet MissionsAakash Khochare, Yogesh Simmhan, Francesco Betti Sorbelli, Sajal K. Das 0001. 1-10 [doi]
- Aion: A Bandwidth Optimized Scheduler with AoI GuaranteeQingyu Liu, Chengzhang Li, Y. Thomas Hou, Wenjing Lou, Sastry Kompella. 1-10 [doi]
- A Fast-Convergence Routing of the Hot-PotatoJean-Romain Luttringer, Quentin Bramas, Cristel Pelsser, Pascal Mérindol. 1-10 [doi]
- ShakeReader: 'Read' UHF RFID using SmartphoneKaiyan Cui, Yanwen Wang, Yuanqing Zheng, Jinsong Han. 1-10 [doi]
- Looking for the Maximum Independent Set: A New Perspective on the Stable Path ProblemYichao Cheng, Ning Luo, Jingxuan Zhang, Timos Antonopoulos, Ruzica Piskac, Qiao Xiang. 1-10 [doi]
- Primus: Fast and Robust Centralized Routing for Large-scale Data Center NetworksGuihua Zhou, Guo Chen, Fusheng Lin, Tingting Xu, Dehui Wei, Jianbing Wu, Li Chen, Yuanwei Lu, Andrew Qu, Hua Shao, Hongbo Jiang 0001. 1-10 [doi]
- A Sum-of-Ratios Multi-Dimensional-Knapsack Decomposition for DNN Resource SchedulingMenglu Yu, Chuan Wu, Bo Ji, Jia Liu. 1-10 [doi]
- Privacy-Preserving Learning of Human Activity Predictors in Smart EnvironmentsSharare Zehtabian, Siavash Khodadadeh, Ladislau Bölöni, Damla Turgut. 1-10 [doi]
- 6GAN: IPv6 Multi-Pattern Target Generation via Generative Adversarial Nets with Reinforcement LearningTianyu Cui, Gaopeng Gou, Gang Xiong, Chang Liu, Peipei Fu, Zhen Li. 1-10 [doi]
- Robust Service Mapping in Multi-Tenant CloudsJingzhou Wang, Gongming Zhao, Hongli Xu, He Huang, Luyao Luo, Yongqiang Yang. 1-10 [doi]
- Privacy Budgeting for Growing Machine Learning DatasetsWeiting Li, Liyao Xiang, Zhou Zhou, Feng Peng. 1-10 [doi]
- FedServing: A Federated Prediction Serving Framework Based on Incentive MechanismJiasi Weng, Jian Weng 0001, Hongwei Huang, Chengjun Cai, Cong Wang 0001. 1-10 [doi]
- Multicast Communications with Varying Bandwidth ConstraintsYuval Emek, Shay Kutten, Mordechai Shalom, Shmuel Zaks. 1-10 [doi]
- Federated Learning over Wireless Networks: A Band-limited Coordinated Descent ApproachJunshan Zhang, Na Li 0002, Mehmet Dedeoglu. 1-10 [doi]
- Jamming of LoRa PHY and CountermeasureNingning Hou, Xianjin Xia, Yuanqing Zheng. 1-10 [doi]
- RFace: Anti-Spoofing Facial Authentication Using COTS RFIDWeiYe Xu, Jianwei Liu, Shimin Zhang, Yuanqing Zheng, Feng Lin 0004, Jinsong Han, Fu Xiao 0001, Kui Ren 0001. 1-10 [doi]
- Your Home is Insecure: Practical Attacks on Wireless Home Alarm SystemsTao Li, Dianqi Han, Jiawei Li, Ang Li, Yan Zhang, Rui Zhang, Yanchao Zhang. 1-10 [doi]
- LoFi: Enabling 2.4GHz LoRa and WiFi Coexistence by Detecting Extremely Weak SignalsGonglong Chen, Wei Dong 0001, Jiamei Lv. 1-10 [doi]
- Owl: Congestion Control with Partially Invisible Networks via Reinforcement LearningAlessio Sacco, Matteo Flocco, Flavio Esposito, Guido Marchetto. 1-10 [doi]
- DeepLoRa: Learning Accurate Path Loss Model for Long Distance Links in LPWANLi Liu, Yuguang Yao, Zhichao Cao, Mi Zhang. 1-10 [doi]
- FAIR: Quality-Aware Federated Learning with Precise User Incentive and Model AggregationYongheng Deng, Feng Lyu 0001, Ju Ren, Yi-Chao Chen, Peng Yang, Yuezhi Zhou, Yaoxue Zhang. 1-10 [doi]
- Pyramid: Real-Time LoRa Collision Decoding with Peak TrackingZhenqiang Xu, Pengjin Xie, Jiliang Wang. 1-9 [doi]
- Prison Break of Android Reflection Restriction and DefenseZhen Ling, Ruizhao Liu, Yue Zhang 0025, Kang Jia, Bryan Pearson, Xinwen Fu, Junzhou Luo. 1-10 [doi]
- Crowdsourcing System for Numerical Tasks based on Latent Topic Aware Worker ReliabilityZhuan Shi, Shanyang Jiang, Lan Zhang, Yang Du, Xiang-Yang Li 0001. 1-10 [doi]
- ToP: Time-dependent Zone-enhanced Points-of-interest Embedding-based Explainable Recommender systemEn Wang, Yuanbo Xu, Yongjian Yang, Fukang Yang, Chunyu Liu, Yiheng Jiang. 1-10 [doi]
- Radio Frequency Fingerprint Identification for LoRa Using Spectrogram and CNNGuanxiong Shen, Junqing Zhang, Alan Marshall 0001, Linning Peng, Xianbin Wang 0001. 1-10 [doi]
- Sequential Resource Access: Theory and AlgorithmLin Chen, Anastasios Giovanidis, Wei Wang 0009, Lin Shan. 1-10 [doi]
- Store Edge Networked Data (SEND): A Data and Performance Driven Edge Storage FrameworkAdrian-Cristian Nicolaescu, Spyridon Mastorakis, Ioannis Psaras. 1-10 [doi]