Abstract is missing.
- Combating Distance Limitation in Sub-Terahertz Frequency Band for Physical Layer Security in UAV CommunicationsAbdulaziz Alali, Danda B. Rawat. 1-6 [doi]
- FLeX: Trading Edge Computing Resources for Federated Learning via BlockchainYang Deng, Tao Han, Ning Zhang. 1-2 [doi]
- A controlled, reproducible, and extensible experiment for evaluating the impact of Tor latencyBintia Keita, Ashutosh Srivastava, Fraida Fund, Shivendra S. Panwar. 1-2 [doi]
- On the Distribution of ML Workloads to the Network Edge and BeyondGeorgios Drainakis, Panagiotis Pantazopoulos, Konstantinos V. Katsaros, Vasilis Sourlas, Angelos Amditis. 1-6 [doi]
- A Consensus Protocol With Deterministic FinalityYahya Hassanzadeh-Nazarabadi, Sanaz Taheri-Boshrooyeh. 1-2 [doi]
- Frequency-aware Trajectory and Power Control for Multi-UAV SystemsJason Ma, Michael H. Ostertag, Dinesh Bharadia, Tajana Rosing. 1-6 [doi]
- Poster Abstract: BounceBack - A DDoS Attack Using Unsuspecting Accomplices in the NetworkSaffana Alshangiti, Mawada Alahmadi, Mohammed Alkhatib, Rashid Tahir, Fareed Zaffar. 1-2 [doi]
- Poster Abstract: Insecticidal Performance Simulation of Solar Insecticidal Lamps Internet of Things Using the Number of Falling Edge TriggerXing Yang, Lei Shu 0001, Kai Huang, Kailiang Li, Heyang Yao. 1-2 [doi]
- Spectral Graph Theory Based Resource Allocation for IRS-Assisted Multi-Hop Edge ComputingHuilian Zhang, Xiaofan He, Qingqing Wu, Huaiyu Dai. 1-6 [doi]
- Implementation of Block-Wise-Transform-Reduction Method for Image Reconstruction in Ultrasound Transmission TomographyMariusz Mazurek, Konrad Kania, Tomasz Rymarczyk, Dariusz Wójcik, Tomasz Cieplak, Piotr Golabek. 1-2 [doi]
- An Experimentation Platform for Automated Assessment of Multimedia Services over Mobile NetworksPanagiotis Kostakis, Anastasios-Stavros Charismiadis, Dimitris Tsolkas, Harilaos Koumaras. 1-2 [doi]
- A Network Intrusion Detection Method Based on CNN and CBAMYang Liu, Jian Kang, Yiran Li, bin Ji. 1-6 [doi]
- Enabling Lightweight Network Performance Monitoring and Troubleshooting in Data CenterQinglin Xun, Weichao Li, Haorui Guo, Yi Wang. 1-2 [doi]
- Privacy-Preserving Decentralized Aggregation for Federated LearningBeomyeol Jeon, S. M. Ferdous, Muntasir Raihan Rahman, Anwar Walid. 1-6 [doi]
- Sensing Quality Constrained Packet Rate Optimization via Multi-UAV Collaborative Compression and RelayKaitao Meng, Xiaofan He, Deshi Li, Mingliu Liu, Chan Xu. 1-6 [doi]
- DeepSafe: A Hybrid Kitchen Safety Guarding System with Stove Fire Recognition Based on the Internet of ThingsLien-Wu Chen, Hsing-Fu Tseng. 1-2 [doi]
- An FPGA-based High-Throughput Packet Classification Architecture Supporting Dynamic Updates for Large-Scale Rule SetsYao Xin, Wenjun Li, Yi Wang, Song Yao. 1-2 [doi]
- Poster Abstract: A Semi-Supervised Approach for Network Intrusion Detection Using Generative Adversarial NetworksHyejeong Jeong, Jieun Yu, Wonjun Lee. 1-2 [doi]
- Virtual Credit Framework in the Remote Work EraYongjin Kim. 1-2 [doi]
- Age-constrained Energy Minimization in UAV-Assisted Wireless Powered Sensor Networks: A DQN-based ApproachLingshan Liu, Ke Xiong 0001, Yang Lu 0008, Pingyi Fan, Khaled Ben Letaief. 1-2 [doi]
- Computing-aided Update for Information Freshness in the Internet of ThingsMinghao Fang, Xijun Wang, Chao Xu, Howard H. Yang, Tony Q. S. Quek. 1-7 [doi]
- Evaluating Contact Tracing Apps for Privacy Preservation and EffectivenessMd. Rashed Iqbal Nekvi, Anwar Haque. 1-6 [doi]
- Age of Information: An Indirect Way To Improve Control System PerformanceOnur Ayan, Anthony Ephremides, Wolfgang Kellerer. 1-7 [doi]
- Monitoring Video Resolution of Adaptive Encrypted Video Traffic Based on HTTP/2 FeaturesHua Wu, Xin Li, Guang Cheng, Xiaoyan Hu. 1-6 [doi]
- Demonstrating a Bayesian Online Learning for Energy-Aware Resource Orchestration in vRANsJose A. Ayala-Romero, Andres Garcia-Saavedra, Xavier Costa-Pérez, George Iosifidis. 1-2 [doi]
- Predicting Throughput of Cloud Network Infrastructure Using Neural NetworksDerek Phanekham, Suku Nair, Nageswara Rao, Mike Truty. 1-6 [doi]
- Automated Fast-flux Detection using Machine Learning and Genetic AlgorithmsSachin Rana, Ahmet Aksoy. 1-6 [doi]
- Secrecy in Aerial Networking: a Stochastic Geometry ApproachXian Liu. 1-6 [doi]
- Demonstrating Physical Layer Security Via Weighted Fractional Fourier TransformXiaojie Fang, Xinyu Yin, Ning Zhang, Xuejun Sha, Hongli Zhang 0001, Zhu Han. 1-2 [doi]
- Is it 5G or not? Investigating doubts about the 5G icon and network performanceEmeka Obiodu, Abdullahi K. Abubakar, Nishanth Sastry. 1-6 [doi]
- Monitoring Android Communications for SecurityJosé Antonio Gómez-Hernández, Pedro García Teodoro, Juan Antonio Holgado Terriza, Gabriel Maciá-Fernández, José Camacho-Páez, J. M. Noguera-Comino. 1-2 [doi]
- On the Reliability of State-of-the-art Network Testbed ComponentsRunsen Gong, Weichao Li, Fuliang Li, Yi Wang. 1-2 [doi]
- Interest Users Cumulatively in Your Ads: A Near Optimal Study for Wi-Fi Advertisement SchedulingWanru Xu, Xiaochen Fan, Tao Wu, Yue Xi, Panlong Yang, Chang Tian. 1-6 [doi]
- UAV-Assisted 5G/6G Networks: Joint Scheduling and Resource Allocation Based on Asynchronous Reinforcement LearningHelin Yang, Jun Zhao 0007, Jiangtian Nie, Neeraj Kumar 0001, Kwok-Yan Lam, Zehui Xiong. 1-6 [doi]
- Resource Allocation for Heterogeneous Traffic with Power Consumption ConstraintsEmmanouil Fountoulakis, Nikolaos Pappas 0001, Anthony Ephremides. 1-2 [doi]
- A Novel Negative and Positive Selection Algorithm to Detect Unknown Malware in the IoTHadeel Alrubayyi, Gokop Goteng, Mona Jaber, James Kelly. 1-6 [doi]
- Demo Abstract: "See the Radio Waves" via VR and Its Application in Wireless CommunicationsPan Tang, Jianhua Zhang, Yuxiang Zhang, Yicheng Guan, Pan Qi, Fangyu Wang, Li Yu, Ping Zhang. 1-2 [doi]
- Incremental Learning Based Radio Frequency Fingerprint Identification Using Intelligent RepresentationMingqian Liu, Jiakun Wang, Cheng Qian 0001. 1-6 [doi]
- Evaluating V2V Security on an SDR TestbedGeoff Twardokus, Hanif Rahbari. 1-3 [doi]
- Minimizing the Cost of 5G Network Slice BrokerAli Gohar, Gianfranco Nencioni. 1-6 [doi]
- Task Partitioning and User Association for Latency Minimization in Mobile Edge Computing NetworksMingjie Feng, Marwan Krunz, Wenhan Zhang. 1-6 [doi]
- Vmemcpy: Parallelizing Memory Copy with Multi-core in the CloudKaixin Lin, Yuguo Li, Dawei Jian, Shengquan Hu, Dingding Li. 1-6 [doi]
- Timely Transmissions Using Optimized Variable Length CodingAhmed Arafa, Richard D. Wesel. 1-6 [doi]
- Quality Assessment of VANETs-Supported Video Dissemination of Critical Urban EventsEveraldo Andrade, Fernando Matos 0001, Paulo D. Maciel, Michele Nogueira, Aldri Santos. 1-6 [doi]
- Security Vulnerability Detection Using Deep Learning Natural Language ProcessingNoah Ziems, Shaoen Wu. 1-6 [doi]
- Poster Abstract: mmWave on the Road - Field Testing IEEE 802.11ad WLAN at 60 GHzFlorian Klingler, Max Schettler, Sigrid Dimce, Muhammad Sohaib Amjad, Falko Dressler. 1-2 [doi]
- Aerial Wireless Networks: Proposed Solution for Coverage OptimisationShadi Eltanani, Ibrahim Ghafir. 1-6 [doi]
- Joint Resource Optimization in Two-way Relaying Energy Harvesting Cognitive Sensor NetworkYuan Gao 0003, Cheng Yang, Weidang Lu, Yiming Wenchen, Yu Zhang, Guoxing Huang, Jiang Cao. 1-6 [doi]
- Secure Sharing of Spatio-Temporal Data through Name-based Access ControlLaqin Fan, Lan Wang. 1-7 [doi]
- Multi-domain MEC orchestration platform for enhanced Back Situation AwarenessNina Slamnik-Krijestorac, Girma M. Yilma, Faqir Zarrar Yousaf, Marco Liebsch, Johann M. Márquez-Barja. 1-2 [doi]
- A lightweight Data Sharing Scheme with Resisting Key Abuse in Mobile Edge ComputingJianhong Zhang, Menglong Wu, Qijia Zhang, Chenggen Peng. 1-6 [doi]
- P2PNIC: High-Speed Packet Forwarding by Direct Communication between NICsYukito Ueno, Ryo Nakamura, Yohei Kuga, Hiroshi Esaki. 1-6 [doi]
- BoTM: Basestation-on-the-move, a Radio Access Network Management PrimitiveAashish Gottipati, Jacobus E. van der Merwe. 1-6 [doi]
- Improving Adversarial Attacks Against Executable Raw Byte ClassifiersJustin Burr, Shengjie Xu. 1-2 [doi]
- Zero trust using Network Micro SegmentationNabeel Sheikh, Mayur Pawar, Victor Lawrence. 1-6 [doi]
- Task Caching in Vehicular Edge ComputingChaogang Tang, Chunsheng Zhu, Xianglin Wei, Qing Li, Joel J. P. C. Rodrigues. 1-6 [doi]
- An ns3-based Energy Module of 5G NR User Equipments for Millimeter Wave NetworksArgha Sen, Abhijit Mondal, Basabdatta Palit, Jay Jayatheerthan, Krishna Paul, Sandip Chakraborty. 1-2 [doi]
- High Precision Time Synchronization on Wi-Fi based Multi-Hop NetworkMuhammad Aslam 0006, Wei Liu 0019, Xianjun Jiao, Jetmir Haxhibeqiri, Jeroen Hoebeke, Ingrid Moerman, Esteban Municio, Pedro Heleno Isolani, Gilson Miranda Júnior, Johann Márquez-Barja. 1-2 [doi]
- Intelligent Gateway Placement in Satellite-Terrestrial Integrated NetworkCui-Qin Dai, Qinqin Yang, Jinsong Wu 0001, Qianbin Chen. 1-6 [doi]
- IPv6 Flow-Label based Application Aware Routing in SDNsAniruddha Kushwaha, Naveen Bazard, Ashwin Gumaste. 1-6 [doi]
- A Network Resource Aware Federated Learning Approach using Knowledge DistillationRahul Mishra, Hari Prabhat Gupta, Tanima Dutta. 1-2 [doi]
- Topology-Theoretic Approach To Address Attribute Linkage Attacks In Differential PrivacyJincheng Wang, Zhuohua Li, John C. S. Lui, Mingshen Sun. 1-6 [doi]
- EdgeNet: the Global Kubernetes Cluster TestbedBerat Can Senel, Maxime Mouchet, Justin Cappos, Olivier Fourmaux, Timur Friedman, Rick McGeer. 1-2 [doi]
- AutoCEW: An Autonomous Cyberspace Early Warning Framework via Ensemble LearningQiang Liu, Yifei Gao, Runhao Liu, Jiayao Wang. 1-6 [doi]
- Detecting Malicious Hosts in SDN through System Call LearningDanai Chasaki, Christopher Mansour. 1-2 [doi]
- POI Recommendation with Federated Learning and Privacy Preserving in Cross Domain RecommendationLi e Wang, Yihui Wang, Yan Bai, Peng Liu 0044, Xianxian Li. 1-6 [doi]
- Design and Testbed Experiments of Public Blockchain-Based Security Framework for IoT-Enabled Drone-Assisted Wildlife MonitoringAnkush Mitra, Basudeb Bera, Ashok Kumar Das. 1-6 [doi]
- Enabling Virtual Network Functions in Named Data NetworkingPuming Fang, Tilman Wolf. 1-6 [doi]
- OPAR: Optimized Predictive and Adaptive Routing for Cooperative UAV NetworksMohammed Gharib, Fatemeh Afghah, Elizabeth S. Bentley. 1-6 [doi]
- Adaptive IoT Service Configuration Optimization in Edge NetworksMengyu Sun, ZhangBing Zhou, Walid Gaaloul. 1-2 [doi]
- An Open Experimental Platform for Ranging, Proximity and Contact Event Tracking using Ultra-Wide-Band and Bluetooth Low-EnergyRoudy Dagher, François-Xavier Molina, Alexandre Abadie, Nathalie Mitton, Emmanuel Baccelli. 1-6 [doi]
- Transferable Adversarial Defense by Fusing Reconstruction Learning and Denoising LearningSong Gao, Shaowen Yao, Ruidong Li. 1-6 [doi]
- Intermittent Status Updating Through Joint Scheduling of Sensing and RetransmissionsOmur Ozel, Parisa Rafiee. 1-6 [doi]
- Achieving Variable 5G Uplink Bandwidth for IoT ApplicationsYuxiang Lin, Jiamei Lv, Yi Gao, Wei Dong 0001. 1-2 [doi]
- Decentralized Max-Min Resource Allocation for Monotonic Utility FunctionsShuang Wu, Xi Peng, Guangjian Tian. 1-6 [doi]
- Poster Abstract: Neighbor-aware Queue-based Random AccessQian Xia, Wei Wang 0021, Lin Chen, Kang G. Shin, Zhaoyang Zhang 0001. 1-2 [doi]
- 1024-QAM Analog Waveform Transmission Over a Seamless Fiber-Wireless System in W BandPham Tien Dat, Atsushi Kanno, Naokatsu Yamamoto, Tetsuya Kawanishi. 1-2 [doi]
- Performance Analysis for Correlated AoI and Energy Efficiency in Heterogeneous CR-IoT SystemXiaoyu Hao, Tao Yang 0008, Yulin Hu, Bo Hu. 1-8 [doi]
- PGA: A Priority-aware Genetic Algorithm for Task Scheduling in Heterogeneous Fog-Cloud ComputingFarooq Hoseiny, Sadoon Azizi, Mohammad Shojafar, Fardin Ahmadiazar, Rahim Tafazolli. 1-6 [doi]
- SSLCheckerHaya Shulman, Michael Waidner. 1-2 [doi]
- LPDBN: A Privacy Preserving Scheme for Deep Belief NetworkYong Zeng 0002, Tong Dong, Qingqi Pei, Jiale Liu, Jianfeng Ma 0001. 1-6 [doi]
- Multipath In-band Network TelemetryYan Zheng, Tian Pan 0001, Yan Zhang, Enge Song, Tao Huang, Yunjie Liu 0001. 1-2 [doi]
- Disaster-Resilient Service Function Chain Embedding Based on Multi-Path RoutingSixu Cai, Fen Zhou, Zonghua Zhang, Ahmed Meddahi. 1-7 [doi]
- Data Privacy Security Guaranteed Network Intrusion Detection System Based on Federated LearningJibo Shi, Bin Ge, Yang Liu, Yu Yan, Shuang Li. 1-6 [doi]
- A Lightweight Residual Networks Framework for DDoS Attack Classification Based on Federated LearningQin Tian, Cheng Guang, Chen Wenchao, Wu Si. 1-6 [doi]
- Ensemble Machine Learning for Intrusion Detection in Cyber-Physical SystemsHongwei Li, Danai Chasaki. 1-2 [doi]
- Joint Trajectory and Power Optimization for Energy Efficient UAV Communication Using Deep Reinforcement LearningYuling Cui, Danhao Deng, Chaowei Wang, Weidong Wang. 1-6 [doi]
- Towards using the POWDER platform for RF propagation validationJose Monterroso, Jacobus E. van der Merwe, Kirk Webb, Gary Wong. 1-6 [doi]
- Adversarial Machine Learning for Inferring Augmented Cyber Agility PredictionEric Muhati, Danda B. Rawat. 1-6 [doi]
- Opera: Scalable Simulator for Distributed SystemsYahya Hassanzadeh-Nazarabadi, Moayed Haji Ali, Nazir Nayal. 1-2 [doi]
- UAV Placement and Resource Allocation for Multi-hop UAV Assisted Backhaul SystemYating Dai, Yijun Guo, Jianjun Hao. 1-6 [doi]
- C-ITS Communications using Heterogeneous Wireless TechnologiesMuhammad Naeem Tahir, Marcos Katz. 1-2 [doi]
- Deep Reinforcement Learning for Intelligent Cloud Resource ManagementZhi Zhou 0006, Ke Luo, Xu Chen 0004. 1-6 [doi]
- Pedestrian Trajectory based Calibration for Multi-Radar NetworkShuai Li, Junchen Guo, Rui Xi, Chunhui Duan, Zhengang Zhai, Yuan He. 1-2 [doi]
- Secret Key Generation Scheme Based on Generative Adversarial Networks in FDD SystemsZongyue Hou, Xinwei Zhang. 1-6 [doi]
- Anomaly Detection in Smart Home Networks Using Kalman FilterNasser Alsabilah, Danda B. Rawat. 1-6 [doi]
- QoE-aware Assignment and Scheduling of Video Streams in Heterogeneous Cellular NetworksAdita Kulkarni, Anand Seetharam. 1-6 [doi]
- A Metric for Machine Learning Vulnerability to Adversarial ExamplesMatthew Bradley, Shengjie Xu. 1-2 [doi]
- A Deep Learning based Traffic Flow Classification with Just a Few PacketsAshish Gupta 0012, Hari Prabhat Gupta, Tanima Dutta. 1-2 [doi]
- Learning Coflow AdmissionsAsif Hasnain, Holger Karl. 1-6 [doi]
- SwiftS: A Dependency-Aware and Resource Efficient Scheduling for High Throughput in CloudsJinwei Liu, Long Cheng 0003. 1-2 [doi]
- Secure Decentralized Access Control Policy for Data Sharing in Smart GridYadi Ye, Leyou Zhang, Wenting You, Yi Mu 0001. 1-6 [doi]
- An Empirical Study of Ageing in the CloudTanya Shreedhar, Sanjit K. Kaul, Roy D. Yates. 1-6 [doi]
- Optimal Channel Sharing assisted Multi-user Computation Offloading via NOMATianshun Wang, Yang Li, Yuan Wu, Liping Qian, Lin Bin, Weijia Jia. 1-6 [doi]
- A Core-Stateless L4S Scheduler for P4-enabled hardware switches with emulated HQoSFerenc Fejes, Szilveszter Nádas, Gergo Gombos, Sándor Laki. 1-2 [doi]
- Optimal Peak-Minimizing Online Algorithms for Large-Load Users with Energy StorageYanfang Mo, Qiulin Lin, Minghua Chen, Si-Zhao Joe Qin. 1-2 [doi]
- Experimenting in a Global Multi-Domain TestbedEsteban Municio, Mert Cevik, Paul Ruth, Johann M. Márquez-Barja. 1-2 [doi]
- GenPath - A Genetic Multi-Round Path Planning Algorithm for Aerial VehiclesNovella Bartolini, Andrea Coletta, Gaia Maselli, Mauro Piva, Domenicomichele Silvestri. 1-6 [doi]
- Tackling the latency divide with CopaDaisy Roberts, Ashutosh Srivastava, Fraida Fund, Shivendra S. Panwar. 1-2 [doi]
- A Privacy-Aware Framework Integration into a Human-in-the-Loop IoT SystemJorge Eduardo Rivadeneira, Jorge Sá Silva, Ricardo Colomo Palacios, André Rodrigues 0001, José Marcelo Fernandes, Fernando Boavida. 1-6 [doi]
- Performance Analysis of Multipath BGPJie Li, Shi Zhou, Vasileios Giotsas. 1-6 [doi]
- Enabling Random Access in Universal CompressorsRasmus Vestergaard, Qi Zhang, Daniel E. Lucani. 1-6 [doi]
- An Interactive and Immersive Remote Education Platform based on Commodity DevicesJiangong Chen, Feng Qian, Bin Li. 1-2 [doi]
- A Mobile Edge Computing Framework for Task Offloading and Resource Allocation in UAV-assisted VANETsYixin He, Daosen Zhai, Ruonan Zhang, Jianbo Du, Gagangeet Singh Aujla, Haotong Cao. 1-6 [doi]
- Machine Learning Toolkit for System Log File Reduction and Detection of Malicious BehaviorRalph P. Ritchey, Richard Perry. 1-2 [doi]
- PrivInferVis: Towards Enhancing Transparency over Attribute Inference in Online Social NetworksHervais Simo, Haya Shulman, Marija Schufrin, Steven Lamarr Reynolds, Jörn Kohlhammer. 1-2 [doi]
- A lightweight Compression-based Energy-Efficient Smart Metering System in Long-Range NetworkPreti Kumari, Hari Prabhat Gupta, Tanima Dutta. 1-2 [doi]
- Resource-Aware Service Function Chain Deployment in Cloud-Edge EnvironmentHao Li, Xin Li 0017, Zhuzhong Qian, Xiaolin Qin. 1-6 [doi]
- Timely Tracking of Infection Status of Individuals in a PopulationMelih Bastopcu, Sennur Ulukus. 1-7 [doi]
- Demo Abstract: WLAN Standard-based Non-Coherent FSO Transmission over 100m Indoor and Outdoor EnvironmentsJong-Min Kim, Ju Hyung Lee, Young-Chai Ko. 1-2 [doi]
- DCQUIC: Flexible and Reliable Software-defined Data Center TransportLizhuang Tan, Wei Su, Yanwen Liu, Xiaochuan Gao, Wei Zhang. 1-8 [doi]
- Poster Abstract: HiL meets Commodity Hardware - SimbaR for coupling IEEE 802.11 Radio ChannelsMario Franke, Florian Klingler. 1-2 [doi]
- A Novel Energy Aware Secure Internet of Drones Design: ESIoDSayani Sarkar, Shivanjali Khare, Michael W. Totaro, Ashok Kumar. 1-6 [doi]
- Reinforcement Learning for Energy-efficient Edge Caching in Mobile Edge NetworksHantong Zheng, Huan Zhou 0002, Ning Wang 0018, Peng Chen, Shouzhi Xu. 1-6 [doi]
- Drone-MAP: A Novel Authentication Scheme for Drone-Assisted 5G NetworksTejasvi Alladi, Vishnu Venkatesh, Vinay Chamola, Nitin Chaturvedi. 1-6 [doi]
- Achieving End-to-End Connectivity in Global Multi-Domain NetworksEsteban Municio, Mert Cevik, Paul Ruth, Johann M. Márquez-Barja. 1-6 [doi]
- Decentralised Internet Infrastructure: Securing Inter-Domain Routing (DEMO)Miquel Ferriol Galmés, Albert Cabellos-Aparicio. 1-2 [doi]
- Not All Conflicts Are Created Equal: Automated Error Resolution in RPKI DeploymentsTomas Hlavacek, Haya Shulman, Michael Waidner. 1-2 [doi]
- Timely Communication in Federated LearningBaturalp Buyukates, Sennur Ulukus. 1-6 [doi]
- Age Debt: A General Framework for Minimizing Age of InformationVishrant Tripathi, Eytan H. Modiano. 1-6 [doi]
- Trust-based Model for Securing Vehicular Networks Against RSU AttacksAljawharah Alnasser, Hongjian Sun. 1-6 [doi]
- Towards Secure Communication in CR-VANETs Through a Trust-Based Routing ProtocolSharmin Akter, Mohammad Shahriar Rahman, Md. Zakirul Alam Bhuiyan, Nafees Mansoor. 1-6 [doi]
- Large-Scale Deterministic IP Networks on CENIShuo Wang, Binwei Wu, Chen Zhang, Yudong Huang, Tao Huang, Yunjie Liu. 1-6 [doi]
- Using Dynamic Analysis to Automatically Detect Anti-Adblocker on the WebJingxue Sun, Ting Yang, Zhiqiu Huang, Wengjie Wang, Yuqing Zhang. 1-6 [doi]
- SPA: Harnessing Availability in the AWS Spot MarketWalter Wong, Aleksandr Zavodovski, Lorenzo Corneo, Nitinder Mohan, Jussi Kangasharju. 1-6 [doi]
- Sharing the Surface: RIS-aided Distributed Mechanism Design for Hybrid Beamforming in Multi-cell Multi-user NetworksBoya Di. 1-2 [doi]
- A UAV based Multi-hop D2D Network for Disaster ManagementSayanti Ghosh, Abhijit Bhowmick, Sanjay Dhar Roy, Sumit Kundu. 1-6 [doi]
- Optimized BGP Simulator for Evaluation of Internet HijacksMarkus Brandt, Haya Shulman. 1-2 [doi]
- The Age of Correlated Features in Supervised Learning based ForecastingMd Kamran Chowdhury Shisher, Heyang Qin, Lei Yang 0001, Feng Yan 0001, Yin Sun. 1-8 [doi]
- Real-time Packet Loss Detection for TCP and UDP Based on Feature-SketchHua Wu, Ya Liu, Guang Cheng, Xiaoyan Hu. 1-6 [doi]
- A Credible Service Level Agreement Enforcement Framework for 5G EdgeRamneek, Sangheon Pack. 1-2 [doi]
- Leveraging Notebooks on Testbeds: the Grid'5000 CaseLuke Bertot, Lucas Nussbaum. 1-6 [doi]
- *: Evaluating Privacy Risks Against Large-Scale Facial Search and Data CollectionBahadir Durmaz, Erman Ayday. 1-6 [doi]
- Resource Allocation for Low-Latency NOMA-V2X Networks Using Reinforcement LearningHuiyi Ding, Ka-Cheong Leung. 1-6 [doi]
- Experimental Analysis of Cross-Layer Sensing for Protocol-Agnostic Packet Boundary RecognitionMaxwell McManus, Zhangyu Guan, Elizabeth Serena Bentley, Scott Pudlewski. 1-6 [doi]
- Privacy Policies of Mobile Apps - A Usability StudyMaxim Anikeev, Haya Shulman, Hervais Simo. 1-2 [doi]
- OctoBot: An Open-Source Orchestration System for a Wide Range Network Activity GenerationAris Cahyadi Risdianto, Ee-Chien Chang. 1-3 [doi]
- A Request Scheduling Optimization Mechanism Based on Deep Q-Learning in Edge Computing EnvironmentsYaqiang Zhang, RenGang Li, Yaqian Zhao, Ruyang Li. 1-2 [doi]
- Toward Automatically Generating Privacy Policy for Smart Home AppsYouqun Li, Yichi Zhang, Haojin Zhu, Suguo Du. 1-7 [doi]
- Over-the-Air Federated Learning and Non-Orthogonal Multiple Access Unified by Reconfigurable Intelligent SurfaceWanli Ni, Yuanwei Liu, Zhaohui Yang 0001, Hui Tian. 1-6 [doi]
- TULVCAN: Terahertz Ultra-broadband Learning Vehicular Channel-Aware NetworkingChia-Hung Lin, Shih-Chun Lin, Erik Blasch. 1-6 [doi]
- A Federated Machine Learning Protocol for Fog NetworksFotis Foukalas, Athanasios Tziouvaras. 1-6 [doi]
- SDR-based Testbed for Real-time CQI Prediction for URLLCKirill Glinskiy, Aleksey Kureev, Evgeny Khorov. 1-2 [doi]
- Trading Privacy through Randomized ResponseMohammad Mahdi Khalili, Iman Vakilinia. 1-6 [doi]
- Demo: AIML-as-a-Service for SLA management of a Digital Twin Virtual Network ServiceJorge Baranda, Josep Mangues-Bafalluy, Engin Zeydan, Claudio Casetti, Carla-Fabiana Chiasserini, Marco Malinverno, Corrado Puligheddu, M. Groshev, C. Guimarães, Konstantin Tomakh, D. Kucherenko, O. Kolodiazhnyi. 1-2 [doi]
- Multi-Job Multi-Edge Allocation in Edge Computing EnvironmentsShihao Li, Weiwei Miao, Zeng Zeng, Lei Wei, Chengling Jiang, Chuanjun Wang, Mingxuan Zhang. 1-2 [doi]
- DeepMix: A Real-time Adaptive Virtual Content Registration System with Intelligent DetectionYongjie Guan, Xueyu Hou, Tao Han, Sheng Zhang. 1-2 [doi]
- Measurement Analysis of Co-occurrence Degree of Web ObjectsNoriaki Kamiyama, Kouki Sakurai, Akihiro Nakao. 1-6 [doi]
- Multi-UAV-enabled AoI-aware WPCN: A Multi-agent Reinforcement Learning StrategyOmar Sami Oubbati, Mohammed Atiquzzaman, Abderrahmane Lakas, Abdullah Baz, Hosam Alhakami, Wajdi Alhakami. 1-6 [doi]
- A First Look at the Network Turbulence for Google Stadia Cloud-based Game StreamingXiaokun Xu, Mark Claypool. 1-5 [doi]
- FIND: an SDR-based Tool for Fine Indoor LocalizationEvgeny M. Khorov, Aleksey Kureev, Vladislav Molodtsov. 1-2 [doi]
- WiFi Dynoscope: Interpretable Real-Time WLAN OptimizationJonatan Krolikowski, Ovidiu Iacoboaiea, Zied Ben-Houidi, Dario Rossi. 1-2 [doi]
- Engineering A Large-Scale Traffic Signal Control: A Multi-Agent Reinforcement Learning ApproachYue Chen, Changle Li, Wenwei Yue, Hehe Zhang, Guoqiang Mao. 1-6 [doi]
- QoS-aware Controller and Hypervisor Placement in vSDN-enabled 5G Networks for Time-critical ApplicationsDeborsi Basu, Abhishek Jain, Uttam Ghosh, Raja Datta. 1-6 [doi]
- Voice Recovery from Human Surroundings with Millimeter Wave RadarYinian Zhou, Awais Ahmad Siddiqi, Jia Zhang, Junchen Guo, Rui Xi, Meng Jin, Zhengang Zhai, Yuan He 0004. 1-2 [doi]
- Remote Tracking of Dynamic Sources under Sublinear Communication CostsJihyeon Yun, Atilla Eryilmaz, Changhee Joo. 1-6 [doi]
- ACTracker: A Fast and Efficient Attack Investigation Method Based on Event CausalityErteng Hu, Anmin Fu, Zhiyi Zhang, Linjie Zhang, Yantao Guo, Yin Liu. 1-6 [doi]
- Overcast: Running Controlled Experiments Spanning Research and Commercial CloudsPaul Ruth, Kate Keahey, Mert Cevik, Zhuo Zhen, Cong Wang, Jason Anderson. 1-6 [doi]
- Efficient Immersive Surveillance of Inaccessible Regions using UAV NetworkAnuj Bist, Chetna Singhal. 1-6 [doi]
- Dynamic Economic Models for MMO MarketsHarald Øverby. 1-6 [doi]
- Robot Behavior-Based User Authentication for Motion-Controlled Robotic SystemsLong Huang, Zhen Meng, Zeyu Deng, Chen Wang, Liying Li, Guodong Zhao 0001. 1-6 [doi]
- Application-aware G-SRv6 network enabling 5G servicesCheng Li, Jianwei Mao, Shuping Peng, Yang Xia, Zhibo Hu, Zhenbin Li. 1-2 [doi]
- Support for Differentiated Airtime in Wireless NetworksDaniel J. Kulenkamp, Violet R. Syrotiuk. 1-6 [doi]
- Enhancing the Handover Performance in Heterogeneous High-speed Railway Communication Networks: A Bayesian-based MethodRui Ma, Ke Xiong, Yang Lu. 1-2 [doi]
- Security Service Pricing Model for UAV Swarms: A Stackelberg Game ApproachGaurang Bansal, Biplab Sikdar. 1-6 [doi]
- Autonomous Maintenance in IoT Networks via AoI-driven Deep Reinforcement LearningGeorge Stamatakis 0001, Nikolaos Pappas 0001, Alexandros G. Fragkiadakis, Apostolos Traganitis. 1-7 [doi]
- Lightweight and Reliable Decentralized Reward System using BlockchainJiawei Yuan, Laurent Njilla. 1-6 [doi]
- WiMatch: Wireless Resource MatchmakingKirk Webb, Sneha Kumar Kasera, Neal Patwari, Jacobus E. van der Merwe. 1-6 [doi]
- VXLAN-based INT: In-band Network Telemetry for Overlay Network MonitoringYan Zhang, Tian Pan, Yan Zheng, Enge Song, Tao Huang, Yunjie Liu. 1-2 [doi]
- A system for detecting third-party tracking through the combination of dynamic analysis and static analysisJingxue Sun, Zhiqiu Huang, Ting Yang, Wengjie Wang, Yuqing Zhang. 1-6 [doi]
- S2: a Small Delta and Small Memory Differencing Algorithm for Reprogramming Resource-constrained IoT DevicesBorui Li, Chenghao Tong, Yi Gao, Wei Dong 0001. 1-2 [doi]
- Scaling Federated Network Services: Managing SLAs in Multi-Provider Industry 4.0 ScenariosJorge Baranda, Josep Mangues-Bafalluy, Luca Vettori, Ricardo Martínez, Engin Zeydan. 1-2 [doi]
- Adaptive Federated Dropout: Improving Communication Efficiency and Generalization for Federated LearningNader Bouacida, Jiahui Hou, Hui Zang, Xin Liu. 1-6 [doi]
- DA-WDGN: Drone-Assisted Weed Detection using GLCM-M features and NDIRT indicesGunasekaran Raja, Kapal Dev, Nisha Deborah Philips, S. A. Mohamed Suhaib, M. Deepakraj, Ramesh Krishnan Ramasamy. 1-6 [doi]
- Building an Information-Centric and LoRa-Based Sensing Platform for IoTAnthony Dowling, Yaoqing Liu, Lauren Huie, Kang Chen. 1-6 [doi]
- Kwollect: Metrics Collection for Experiments at ScaleSimon Delamare, Lucas Nussbaum. 1-6 [doi]
- Visualization of Deep Reinforcement Autonomous Aerial Mobility Learning SimulationsGusang Lee, Won Joon Yun, Soyi Jung, Joongheon Kim, Jae-Hyun Kim. 1-2 [doi]
- Demo Abstract: A HIL Emulator-Based Cyber Security Testbed for DC MicrogridsMengxiang Liu, Zexuan Jin, Jinhui Xia, Mingyang Sun, Ruilong Deng, Peng Cheng 0001. 1-2 [doi]
- Performance Evaluation of Radar and Communication Integrated System for Autonomous Driving VehiclesQixun Zhang, Zhenhao Li, Xinye Gao, Zhiyong Feng 0001. 1-2 [doi]
- Smart Contract-enabled LightChain Test NetworkYahya Hassanzadeh-Nazarabadi, Kedar Kshatriya, Öznur Özkasap. 1-2 [doi]
- Quality-Aware Distributed Computation and User Selection for Cost-Effective Federated LearningYuxi Zhao, Xiaowen Gong. 1-6 [doi]
- ITSY: Initial Trigger-Based PFC Deadlock Detection in the Data PlaneXinyu Crystal Wu, T. S. Eugene Ng. 1-8 [doi]
- Can AoI and Delay be Minimized Simultaneously with Short-Packet Transmission?Jie Cao, Xu Zhu 0001, Yufei Jiang, Zhongxiang Wei. 1-6 [doi]
- A Cloud-Edge-Terminal Collaborative System for Temperature Measurement in COVID-19 PreventionZheyi Ma, Hao Li, Wen Fang, Qingwen Liu, Bin Zhou, Zhiyong Bu. 1-6 [doi]