Abstract is missing.
- Connectivity-Aware Fast Network Forming Aided By Digital Twin For Emergency UseTerry N. Guo. 1-6 [doi]
- Physical Layer Security Authentication Based Wireless Industrial Communication System for Spoofing DetectionSonglin Chen, Sijing Wang, Xingchen Xu, Long Jiao, Hong Wen. 1-2 [doi]
- Experimenting with an SDN-Based NDN Deployment over Wireless Mesh NetworksSarantis Kalafatidis, Vassilis Demiroglou, Lefteris Mamatas, Vassilis Tsaoussidis. 1-6 [doi]
- LoRa-based Outdoor 3D LocalizationJian Fang 0003, Lei Wang 0005, Zhenquan Qin, Bingxian Lu. 1-2 [doi]
- Unreliable Multi-hop Networks Routing Protocol For Age of Information-Sensitive CommunicationAbdalaziz Sawwan, Jie Wu. 1-2 [doi]
- Optimal Entanglement Distribution using Satellite Based Quantum NetworksNitish K. Panigrahy, Prajit Dhara, Don Towsley, Saikat Guha 0001, Leandros Tassiulas. 1-6 [doi]
- FedTSE: Low-Cost Federated Learning for Privacy-Preserved Traffic State Estimation in IoVXiaoming Yuan 0002, Jiahui Chen, Ning Zhang 0007, Chunsheng Zhu, Qiang Ye 0002, Xuemin Sherman Shen. 1-6 [doi]
- WMDefense: Using Watermark to Defense Byzantine Attacks in Federated LearningXu Zheng, Qihao Dong, Anmin Fu. 1-6 [doi]
- End-to-end TCP-compatible Backpressure RoutingChristos Liaskos, Konstantinos Alexandris, Siyu Tang, Anindya Das. 1-6 [doi]
- SAC-based Computation Offloading and Resource Allocation in Vehicular Edge ComputingYanlang Zheng, Huan Zhou, Rui Chen, Kai Jiang, Yue Cao. 1-6 [doi]
- Programmable Packet Scheduling With SP-PIFO: Theory, Algorithms and EvaluationBalázs Vass, Csaba Sarkadi, Gábor Rétvári. 1-6 [doi]
- A Generative Model for Evasion Attacks in Smart GridVenkata Praveen Kumar Madhavarapu, Shameek Bhattacharjee, Sajal K. Das 0001. 1-6 [doi]
- Trueno: A Cross-Platform Machine Learning Model Serving Framework in Heterogeneous Edge SystemsDanyang Song, Yifei Zhu, Cong Zhang 0002, Jiangchuan Liu. 1-2 [doi]
- MANTRA: Semantic Mobility Knowledge Analytics Framework for Trajectory AnnotationShreya Ghosh 0002, Soumya K. Ghosh 0001. 1-2 [doi]
- Order Matters: On the Impact of Swapping Order on an Entanglement Path in a Quantum NetworkAlena Chang, Guoliang Xue. 1-6 [doi]
- Experimental Demonstration of RoFSO Transmission Combining WLAN Standard and WDM-FSO over 100m DistanceJong-Min Kim, Ju Hyung Lee, Yeongrok Lee, Hong-Seol Cha, Hyunsu Park, Jincheol Sim, Chulwoo Kim, Young-Chai Ko. 1-2 [doi]
- Demonstrating QoE-aware 5G Network Slicing Emulated with HTB in OMNeT++Marija Gajic, Marcin Bosk, Susanna Schwarzmann, Stanislav Lange, Thomas Zinner. 1-2 [doi]
- Secrecy Rate Maximization for THz-Enabled Femto Edge Users using Deep Reinforcement Learning in 6GHimanshu Sharma, Ishan Budhiraja, Neeraj Kumar 0001, Rajkumar Tekchandani. 1-6 [doi]
- Dynamic Load Combined Prediction Framework with Collaborative Cloud-Edge for MicrogridWenjing Hou, Hong Wen, Ning Zhang 0007, WenXin Lei, Haojie Lin. 1-2 [doi]
- Minimum-SNR Maximization for Robust IRS-assisted Legitimate Monitoring SystemMeng Wang, Qinghe Du, Likang Zhang. 1-6 [doi]
- Demo Abstract: Technology-agnostic Approach to RF based Human Activity RecognitionChao Yang 0025, Xuyu Wang, Shiwen Mao. 1-2 [doi]
- Overlapped Connected Dominating Set for Big Data SecurityLi Yi, Weidong Fang, Wei Chen, Wuxiong Zhang, Guoqing Jia. 1-5 [doi]
- Static Obstacle Detection based on Acoustic SignalsRunze Tang, Gaolei Duan, Lei Xie 0004, Yanling Bu, Ming Zhao, Zhenjie Lin, Qiang Lin. 1-2 [doi]
- A Formal Analysis of the Count-Min Sketch with Conservative UpdatesYounes Ben Mazziane, Sara Alouf, Giovanni Neglia. 1-6 [doi]
- DHT-based Edge and Fog Computing Systems: Infrastructures and ApplicationsYahya Hassanzadeh-Nazarabadi, Sanaz Taheri-Boshrooyeh, Öznur Özkasap. 1-6 [doi]
- L3Fog: Fog Node Selection and Task Offloading Framework for Mobile IoTMehbub Alam, Nurzaman Ahmed, Rakesh Matam, Ferdous Ahmed Barbhuiya. 1-6 [doi]
- Evaluating Time-Sensitive Networking Features on Open TestbedsGilson Miranda, Esteban Municio, Jetmir Haxhibeqiri, Daniel F. Macedo, Jeroen Hoebeke, Ingrid Moerman, Johann M. Márquez-Barja. 1-2 [doi]
- Inverse Reinforcement Learning Meets Power Allocation in Multi-user Cellular NetworksRuichen Zhang, Ke Xiong 0001, Xingcong Tian, Yang Lu 0008, Pingyi Fan, Khaled Ben Letaief. 1-2 [doi]
- Age-Energy Efficiency in WPCNs: A Deep Reinforcement Learning ApproachHaina Zheng, Ke Xiong 0001, Mengying Sun, Zhangdui Zhong, Khaled Ben Letaief. 1-2 [doi]
- Location Privacy-Aware Coded Offloading for Distributed Edge ComputingYulong He, Xiaofan He. 1-6 [doi]
- A Scalable Mixed Reality Platform for Remote Collaborative LEGO DesignXin Yao 0001, Jiangong Chen, Ting He, Jing Yang, Bin Li 0014. 1-2 [doi]
- A Hybrid RF-FSO Offloading Scheme for Autonomous Industrial Internet of ThingsDimitrios Pliatsios, Thomas Lagkas, Vasileios Argyriou, Antonios Sarigiannidis, Dimitrios Margounakis, Theocharis Saoulidis, Panagiotis G. Sarigiannidis. 1-6 [doi]
- Dynamic Data Offloading for Massive Users in Ultra-dense LEO Satellite Networks based on Stackelberg Mean Field GameDezhi Wang, Wei Wang 0021, Yuhan Kang, Zhu Han 0001. 1-6 [doi]
- Quantum Data Networking for Distributed Quantum Computing: Opportunities and ChallengesChunming Qiao, Yangming Zhao, Gongming Zhao, Hongli Xu. 1-6 [doi]
- Social Relationship Mining Based on User Telephone Communication Data for Cooperative Relationship RecommendationWei Zhao, Wenjie Kang, Xuchong Liu, Xin Su, Yue Zhang, Hao Jiang. 1-6 [doi]
- REGRETS: A New Corpus of Regrettable (Self-)Disclosures on Social MediaHervais Simo, Michael Kreutzer. 1-2 [doi]
- A Conceptual Trust Management Framework under Uncertainty for Smart Vehicular NetworksVishal Venkatraman, Shantanu Pal, Zahra Jadidi, Alireza Jolfaei. 1-7 [doi]
- On The Detection Of Adversarial Attacks Through Reliable AIIvan Vaccari, Alberto Carlevaro, Sara Narteni, Enrico Cambiaso, Maurizio Mongelli. 1-6 [doi]
- Demo Abstract: Pixel Similarity-Based Content Reuse in Edge-Assisted Virtual RealityYing Chen, Hazer Inaltekin, Maria Gorlatova. 1-2 [doi]
- Efficient Synchronous MAC Protocols for Terahertz Networking in Wireless Data CenterTao Wang, Xiangquan Shi, Jing Tao, Xiaoyan Wang, Biao Han. 1-6 [doi]
- On Carrier Scheme Convergence: A WFRFT-based Hybrid Carrier Scheme DemonstrationZhuangzhuang Liao, Xiaojie Fang, Ning Zhang 0007, Tao Han 0002, Xuejun Sha. 1-2 [doi]
- Blockchain and Zero-Sum Game-based Dynamic Pricing Scheme for Electric Vehicle ChargingRiya Kakkar, Smita Agrawal, Rajesh Gupta 0007, Sudeep Tanwar. 1-6 [doi]
- PCNsim: A Flexible and Modular Simulator for Payment Channel NetworksGabriel Antonio F. Rebello, Gustavo Franco Camilo, Maria Potop-Butucaru, Miguel Elias M. Campista, Marcelo Dias de Amorim, Luís Henrique M. K. Costa. 1-2 [doi]
- DRL-based Beam Allocation in Relay-aided Multi-user MmWave Vehicular NetworksYing Ju, Haoyu Wang, Yuchao Chen, Lei Liu, Tong-Xing Zheng, Qingqi Pei, Ming Xiao. 1-6 [doi]
- An Investigation on Fragility of Machine Learning Classifiers in Android Malware DetectionHusnain Rafiq, Nauman Aslam, Biju Issac 0001, Rizwan Hamid Randhawa. 1-6 [doi]
- Dynamic Pricing for Idle Resource in Public Clouds: Guarantee Revenue from Strategic UsersJiawei Li, Jessie Hui Wang, Jilong Wang 0001. 1-2 [doi]
- MbRE IDS: An AI and Edge Computing Empowered Framework for Securing Intelligent Transportation SystemsVarun Kohli, Amit Chougule, Vinay Chamola, F. Richard Yu. 1-6 [doi]
- Phishing Attack Detection with ML-Based Siamese Empowered ORB Logo Recognition and IP MapperManish Bhurtel, Yuba Raj Siwakoti, Danda B. Rawat. 1-6 [doi]
- A3C-based Computation Offloading and Service Caching in Cloud-Edge Computing NetworksZhenning Wang, Mingze Li, Liang Zhao, Huan Zhou, Ning Wang. 1-2 [doi]
- Leveraging Spanning Tree to Detect Colluding Attackers in Federated LearningPriyesh Ranjan, Federico Corò, Ashish Gupta 0012, Sajal K. Das 0001. 1-2 [doi]
- User Intent Driven Path Switching in Video Delivery - An Edge Computing Based ApproachPeng Qian, Ning Wang 0001, Rahim Tafazolli. 1-6 [doi]
- Malicious Transaction Identification in Digital Currency via Federated Graph Deep LearningHanbiao Du, Meng Shen, Rungeng Sun, Jizhe Jia, Liehuang Zhu, Yanlong Zhai. 1-6 [doi]
- Simultaneous Intra-Group Communication: Understanding the Problem SpaceJagnyashini Debadarshini, Sudipta Saha. 1-2 [doi]
- Machine learning model for IoT-Edge device based Water Quality MonitoringYogendra Kumar, Siba K. Udgata. 1-6 [doi]
- HVNet: Hardware-Assisted Virtual Networking on a Single Physical HostFlorian Wiedner, Max Helm, Sebastian Gallenmüller, Georg Carle. 1-6 [doi]
- Distribution of AoI in EH-powered Multi-source Systems under Non-preemptive and Preemptive PoliciesMohamed A. Abd-Elmagid, Harpreet S. Dhillon. 1-8 [doi]
- Quality-Aware Incentive Mechanism Design Based on Matching Game for Hierarchical Federated LearningDu Hui, Zhuo Li 0003, Xin Chen 0018. 1-6 [doi]
- An Empirical Analysis of CAPTCHA Image Design Choices in Cloud ServicesXiaojiang Zuo, Xiao Wang, Rui Han. 1-6 [doi]
- Noise-Resilient Federated Learning: Suppressing Noisy Labels in the Local Datasets of ParticipantsRahul Mishra, Hari Prabhat Gupta, Tanima Dutta. 1-2 [doi]
- Receiver Design and Frame Format for Uplink NOMA in Wi-FiRoman Zlobin, Aleksey Kureev, Evgeny M. Khorov. 1-2 [doi]
- Demo: A Disaggregated O-RAN Platform for Network Slice Deployment and AssuranceAhan Kak, Van-Quan Pham, Huu-Trung Thieu, Nakjung Choi. 1-2 [doi]
- Smartphone-Aided Human Activity Recognition Method using Residual Multi-Layer PerceptronShang Shi, Yu Wang 0078, Heng Dong, Guan Gui, Tomoaki Ohtsuki. 1-6 [doi]
- DRL-based Optimization of Privacy Protection and Computation Performance in MEC Computation OffloadingZhengjun Gao, Guowen Wu, Yizhou Shen, Hong Zhang, Shigen Shen, Qiying Cao. 1-6 [doi]
- Heterogeneous Airborne mmWave Cells: Optimal Placement for Power-Efficient Maximum CoverageNima Namvar, Fatemeh Afghah. 1-6 [doi]
- USV Control With Adaptive Compensation Under False Data Injection AttacksPanxin Bai, Heng Zhang, Jian Zhang, Hongran Li. 1-2 [doi]
- Deep CAPTCHA Recognition Using Encapsulated Preprocessing and Heterogeneous DatasetsTurhan Kimbrough, Pu Tian, Weixian Liao, Erik Blasch, Wei Yu. 1-6 [doi]
- Deep learning and Blockchain-based Essential and Parkinson Tremor Classification SchemeJigna J. Hathaliya, Hetav Modi, Rajesh Gupta 0007, Sudeep Tanwar. 1-6 [doi]
- PIC: Preserving Data Integrity in UAV Assisted CommunicationNalam Venkata Abhishek, Muhammad Naveed Aman, Teng Joon Lim, Biplab Sikdar. 1-6 [doi]
- Vehicular Virtual Edge Computing using Heterogeneous V2V and V2C CommunicationGurjashan Singh Pannu, Seyhan Ucar, Takamasa Higuchi, Onur Altintas, Falko Dressler. 1-2 [doi]
- Vision Aided Beam Tracking and Frequency Handoff for mmWave CommunicationsTengyu Zhang, Jun Liu, Feifei Gao. 1-2 [doi]
- Joint modulation of 3-PPM and quantum squeezed states in communication systemsYaoyao Wang, Xiaoguang Chen. 1-5 [doi]
- A virtualization approach to validate services and subsystems of a MALE UASVictor Sanchez-Agüero, Francisco Valera, Iván Vidal, Borja Nogales, Jaime Cabezas, Carlos Vidal. 1-6 [doi]
- Beacon-Based Wireless TSN AssociationPablo Avila-Campos, Jetmir Haxhibeqiri, Ingrid Moerman, Jeroen Hoebeke. 1-2 [doi]
- Demo Abstract: Environment-adaptive 3D Human Pose Tracking with RFIDChao Yang 0025, Lingxiao Wang, Xuyu Wang, Shiwen Mao. 1-2 [doi]
- 2 COMM: A Secure and Low-Cost Message Dissemination Scheme for Connected VehiclesUmesh Bodkhe, Sudeep Tanwar. 1-6 [doi]
- Identifying DDoS Attack using Split-Machine Learning System in 5G and Beyond NetworksBharat S. Rawal, Sudhanshu Patel, Mithileysh Sathiyanarayanan. 1-6 [doi]
- Trusted Storage Architecture for Machine Reasoning based on BlockchainYichuan Wang, Rui Fan, Xinyue Yin, Xinhong Hei 0001. 1-6 [doi]
- Channel Estimation for Massive MIMO systems using Tensor Cores in GPUBhargav Gokalgandhi, Ivan Seskar. 1-6 [doi]
- A NUMA-aware Key-Value Store for Hybrid Memory ArchitectureYuguo Li, Shaoheng Tan, Zhiwen Wang, Dingding Li. 1-6 [doi]
- A Cloud-Terminal Collaborative System for Crowd Counting and Localization Using Multi-UAVsShuze Shen, Zheyi Ma, Mingqing Liu, Qingwen Liu, Yunfeng Bai, Mingliang Xiong. 1-6 [doi]
- MERIT: Multi-Itinerary Tourist Recommendation Engine for Industrial Internet of ThingsAbhishek Majumder, Joy Lal Sarkar, Bibudhendu Pati, Chhabi Rani Panigrahi, V. Ramasamy, Sudipta Roy 0001, Vikas Kumar. 1-6 [doi]
- Efficient and Privacy-Preserving Logistic Regression Scheme based on Leveled Fully Homomorphic EncryptionChengjin Liu, Zoe Lin Jiang, Xin Zhao, Qian Chen 0028, Junbin Fang, Daojing He, Jun Zhang, Xuan Wang. 1-6 [doi]
- Collaborative Learning for Large-Scale Discrete Optimal Transport under Incomplete Populational InformationNavpreet Kaur, Juntao Chen. 1-2 [doi]
- DRL-Based Fountain Codes for Concurrent Multipath Transfer in 6G NetworksChengxiao Yu, Wei Quan 0001, Kang Liu, Mingyuan Liu, Ziheng Xu, Hongke Zhang. 1-6 [doi]
- Intelligent Sensing and Communication assisted Pedestrians Recognition in Vehicular Networks: An Effective Throughput Maximization ApproachDengfeng Yao, Minghui Dai, Tianshun Wang, Yuan Wu, Zhou Su. 1-6 [doi]
- DRL-based Resource Allocation Optimization for Computation Offloading in Mobile Edge ComputingGuowen Wu, Yuhan Zhao, Yizhou Shen, Hong Zhang, Shigen Shen, Shui Yu. 1-6 [doi]
- Network Attached FPGAs in the Open Cloud Testbed (OCT)Suranga Handagala, Miriam Leeser, Kalyani Patle, Michael Zink. 1-6 [doi]
- Assessing the impact of CAM messages in vehicular communications in real highway environmentsVincent Charpentier, Nina Slamnik-Krijestorac, Johann Márquez-Barja. 1-2 [doi]
- Resource Aware Fog Based Remote Health Monitoring SystemDilwar Hussain Barbhuiya, Adittya Dey, Rajdeep Ghosh, Kunal Das, Kumarjit Ray, Nabajyoti Medhi. 1-6 [doi]
- Edge Intelligence-based Privacy Protection Framework for IoT-based Smart Healthcare SystemsMahmuda Akter, Nour Moustafa, Timothy M. Lynar. 1-8 [doi]
- Interference Mitigation and Secrecy-ensured D2D Resource Allocation Scheme using Game TheoryRajesh Gupta 0007, Sudeep Tanwar. 1-6 [doi]
- BDESF-ITS: Blockchain-Based Secure Data Exchange and Storage Framework for Intelligent Transportation SystemNaivedya Lath, Kaustubh Thapliyal, Kartik Kandpal, Mohammad Wazid, Ashok Kumar Das, D. P. Singh. 1-6 [doi]
- A Deep Reinforcement Learning based Intrusion Detection Strategy for Smart Vehicular NetworksZhiHao Wang, Dingde Jiang, Zhihan Lv, Houbing Song. 1-6 [doi]
- QUIC-Enabled Data Aggregation for Short Packet Communication in mMTCHaoran Zhao, Bo He, He Zhou, Jiangyin Zhou, Qi Qi 0001, Jingyu Wang, Haifeng Sun, Jianxin Liao. 1-2 [doi]
- Cost Effective Routing in Large-scale Multi-hop LoRa NetworksSilin Feng, Jiajun Chen, Zhiwei Zhao. 1-6 [doi]
- Detecting Proxies Relaying Streaming Internet TrafficHenry Clausen, Aditya Manocha, Michael S. Gibson. 1-6 [doi]
- STUN: Secret-Free Trust-Establishment For Underground Wireless NetworksEbuka Oguchi, Nirnimesh Ghose, Mehmet C. Vuran. 1-6 [doi]
- Super Resolution for Augmented Reality ApplicationsVladislav Li, George Amponis, Jean-Christophe Nebel, Vasileios Argyriou, Thomas Lagkas, Savvas Ouzounidis, Panagiotis G. Sarigiannidis. 1-6 [doi]
- A Novel IoT-based Edge Sensing Platform for Structure Health MonitoringIgor Bisio, Chiara Garibotto, Fabio Lavagetto, Andrea Sciarrone. 1-6 [doi]
- Joint UAVs Position Optimization and Offloading Decision for Blockchain-enabled Intelligent TransportationChen Wang, Daosen Zhai, Ruonan Zhang, Huan Li, Haotong Cao, Anish Jindal. 1-6 [doi]
- Age of Information in the Presence of an AdversarySubhankar Banerjee, Sennur Ulukus. 1-8 [doi]
- Secure and Trusted Attestation Protocol for UAV FleetsGaurang Bansal, Biplab Sikdar. 1-6 [doi]
- Security Performance Analysis of NOMA System Based on Multi-Slot Combined ReceptionHaoyu Zhu, Ninghao Zhou, Jia Hou. 1-6 [doi]
- When Wireless Federated Learning Meets Physical Layer Security: The Fundamental LimitsHaonan Zhang, Chuanchuan Yang, Bin Dai 0003. 1-6 [doi]
- Online Node Cooperation Strategy Design for Hierarchical Federated LearningXin Shen, Zhuo Li 0003, Xin Chen 0018. 1-6 [doi]
- Resolving Conflicts among Unbalanced Multi-Source Data When Multi-Value Objects ExistXiu Susie Fang, Quan Z. Sheng, Jian Yang, Guohao Sun, Xianzhi Wang 0001, Yihong Zhang 0001. 1-2 [doi]
- A Real-Time Ultra-broadband Software-Defined Radio Platform for Terahertz CommunicationsHussam Abdellatif, Viduneth Ariyarathna, Sergey Petrushkevich, Arjuna Madanayake, Josep Miquel Jornet. 1-2 [doi]
- Testbed and Performance Evaluation of 3D MmWave Beam Tracking in Mobility ScenarioQixun Zhang, Chang Yang. 1-2 [doi]
- UAV Deployment for Data Collection in Energy Constrained WSN SystemHassaan Hydher, Dushantha Nalin K. Jayakody, Kasun T. Hemachandra, Tharaka Samarasinghe. 1-6 [doi]
- Implementation of Service Function Chain Deployment with Allocation Models in KubernetesRui Kang, Mengfei Zhu, Eiji Oki. 1-2 [doi]
- Adversarial Attacks on Deep Neural Networks Based Modulation RecognitionMingqian Liu, Zhenju Zhang, Nan Zhao 0001, Yunfei Chen 0001. 1-6 [doi]
- Radio Frequency Fingerprint Identification Method Based on Ensemble LearningYu Huang, Pengfei Liu, Jie Yang. 1-6 [doi]
- Semi-Federated Learning: An Integrated Framework for Pervasive Intelligence in 6G NetworksJingheng Zheng, Wanli Ni, Hui Tian 0003, Deniz Gündüz, Tony Q. S. Quek. 1-6 [doi]
- Spectrum Sharing in UAV-Assisted HetNet Based on CMB-AM Multi-Agent Deep Reinforcement LearningWei Guan, Bo Gao, Ke Xiong 0001, Yang Lu 0008. 1-2 [doi]
- Joint Communication and Sensing Enabled Cooperative Perception Testbed for Connected Automated VehiclesQixun Zhang, Xinye Gao. 1-2 [doi]
- Game Theoretic Analysis of Age of Information for Slotted ALOHA Access With CaptureLeonardo Badia, Andrea Zanella, Michele Zorzi. 1-6 [doi]
- Resource Defragmentation for Network SlicingPaolo Medagliani, Sébastien Martin, Jérémie Leguay, Shengming Cai, Feng Zeng, Nicolas Huin. 1-2 [doi]
- Lightweight Self-adaptive Cloud-IoT Monitoring across Fed4FIRE+ TestbedsMarco Gaglianese, Stefano Forti 0002, Federica Paganelli, Antonio Brogi. 1-6 [doi]
- The end of Eavesdropping Attacks through the Use of Advanced End to End Encryption MechanismsLeandros A. Maglaras, Nick Ayres, Sotiris Moschoyiannis, Leandros Tassiulas. 1-2 [doi]
- The AERPAW Experiment Workflow - Considerations for Designing Usage Models for a Computing-supported Physical Research PlatformMagreth Mushi, Harshvardhan P. Joshi, Rudra Dutta, Ismail Güvenç, Mihail L. Sichitiu, Brian A. Floyd, Thomas Zajkowski. 1-8 [doi]
- DEMO Abstract: An UAV-based 3D Spectrum Real-time Mapping SystemQiuming Zhu, Yi Zhao, Yang Huang 0001, Zhipeng Lin, Lu HanJie Wang, Yunpeng Bai, Tianxu Lan, Fuhui Zhou, QiHui Wu. 1-2 [doi]
- Efficient Coordination among Electrical Vehicles: An IoT-Assisted ApproachJagnyashini Debadarshini, Sudipta Saha. 1-2 [doi]
- Age of Loop Oriented Wireless Networked Control System: Communication and Control Co-Design in the FBL RegimeJie Cao 0006, Xu Zhu 0001, Sumei Sun, Petar Popovskiz, Shaohan Feng, Yufei Jiang. 1-6 [doi]
- SCSGuard: Deep Scam Detection for Ethereum Smart ContractsHuiwen Hu, Qianlan Bai, Yuedong Xu. 1-6 [doi]
- Ruling Out IoT Devices in LoRaWANPierluigi Locatelli, Pietro Spadaccino, Francesca Cuomo. 1-2 [doi]
- Adaptive, Continuous Entanglement Generation for Quantum NetworksAlexander Kolar, Allen Zang, Joaquín Chung, Martin Suchara, Rajkumar Kettimuthu. 1-6 [doi]
- Computing Power Network: A Testbed and Applications with Edge IntelligenceJunlin Liu, Yukun Sun, Junqi Su, Zhaojiang Li, Xing Zhang, Bo Lei, Wenbo Wang. 1-2 [doi]
- Cyber Attacks Detection using Machine Learning in Smart Grid SystemsSohan Gyawali, Omar Beg. 1-2 [doi]
- How Degrading Network Conditions Influence Machine Learning End Systems Performance?Sergei Chuprov, Leon Reznik, Antoun Obeid, Srujan Shetty. 1-6 [doi]
- Latency-aware C-ITS application for improving the road safety with CAM messages on the Smart Highway testbedVincent Charpentier, Nina Slamnik-Krijestorac, Johann Márquez-Barja. 1-6 [doi]
- An extension of imagechain concept that allows multiple images per blockKatarzyna Koptyra, Marek R. Ogiela. 1-2 [doi]
- Shellcoding: Hunting for Kernel32 Base AddressTarek Ahmed, Shengjie Xu. 1-2 [doi]
- Demo: Deep Reinforcement Learning for Resource Management in Cellular Network SlicingBaidi Xiao, Yan Shao, Rongpeng Li, Zhifeng Zhao, Honggang Zhang 0001. 1-2 [doi]
- Remote Meter Reading based on Lightweight Edge DevicesZiwei Liu, Lei Xie, Jingyi Ning, Ming Zhao, Liming Wang, Hao Peng. 1-2 [doi]
- Dynamic and Secure Resource Allocation Framework of Slices for 5G-Enabled Cyber Physical SystemsHaotong Cao, Yue Hu, Shengchen Wu, Yongan Guo. 1-6 [doi]
- Network Security Situation Awareness Based on Spatio-temporal Correlation of AlarmsZehua Ren, Yang Liu, Huixiang Liu, Baoxiang Jiang, Xiangzhen Yao, Lin Li, Haiwen Yang, Ting Liu. 1-2 [doi]
- STATOEUVER: State-aware Load Balancing for Network Function VirtualizationWendi Feng, Ranzheng Cao, Zhi-Li Zhang. 1-2 [doi]
- Optimal Feature Set Selection for IoT Device Fingerprinting on Edge Infrastructure using Machine IntelligenceSarvesh Sanjay Wanode, Milind Anand, Barsha Mitra. 1-6 [doi]
- EFTA: An Energy-efficient, Fault-Tolerant, and Area-optimized UAV Placement Scheme for Search OperationsPrateek Mahajan, Anusha Kumar, G. Sai Sesha Chalapathi, Rajkumar Buyya. 1-6 [doi]
- Demo: TINGLE: Pushing Edge Intelligence in Synchronization and Useful Data Transfer for Human-Robotic Arm InteractionsXinjie Gu, Xiaolong Wang, Yuchen Feng, Yuzhu Long, Mithun Mukherjee 0001, Zhigeng Pan, Mian Guo, Qi Zhang. 1-2 [doi]
- Novel Efficient Block Chain and Rule-based Intelligent Privacy Share System in Future NetworkXiaolong Deng, Tiejun Lv, LinMing Song. 1-8 [doi]
- IoT Botnet Detection framework from Network Behavior based on Extreme Learning MachineNasimul Hasan, Zhenxiang Chen, Chuan Zhao, Yuhui Zhu, Cong Liu. 1-6 [doi]
- Battery-less Massive Access for Simultaneous Information Transmission and Federated Learning in WPT NetworksWanli Ni, Xufeng Liu, Hui Tian 0003. 1-2 [doi]
- Blockchain and Edge Intelligence-based Secure and Trusted V2V Framework Underlying 6G NetworksNilesh Jadav, Rajesh Gupta 0007, Sudeep Tanwar. 1-6 [doi]
- FedCluster: A Federated Learning Framework for Cross-Device Private ECG ClassificationDaoqin Lin, Yuchun Guo, Huan Sun, Yishuai Chen. 1-6 [doi]
- Learning Based and Physical-layer Assisted Secure Computation Offloading in Vehicular Spectrum Sharing NetworksYing Ju, Yuchao Chen, Zhiwei Cao, Haoyu Wang, Lei Liu, Qingqi Pei, Neeraj Kumar. 1-6 [doi]
- An Observation of Packet Classification: Most Rules are at the TopChengjun Jia, Chenglong Li, Yifan Li, Xiaohe Hu, Jun Li. 1-6 [doi]
- Visualizing Multi-Agent Reinforcement Learning for Robotic Communication in Industrial IoT NetworksRuyu Luo, Wanli Ni, Hui Tian 0003. 1-2 [doi]
- LoRaCoin: Towards a blockchain-based platform for managing LoRa devicesEloi Cruz Harillo, Felix Freitag. 1-2 [doi]
- LSE: A Learning-based Per-flow Spread Estimation Framework for Network Data StreamsDongyang Yang, Yifan Han, Yang Du 0006, He Huang 0001, Yu-e Sun, Shiping Chen 0002. 1-6 [doi]
- A Novel TCP/IP Header Hijacking Attack on SDNAli Akbar Mohammadi, Rasheed Hussain, Alma Oracevic, Syed Muhammad Ahsan Raza Kazmi, Fatima Hussain, Moayad Aloqaily, Junggab Son. 1-2 [doi]
- Demo: Untethered Haptic Teleoperation for Nuclear Decommissioning using a Low-Power Wireless Control TechnologyJoseph Bolarinwa, Alex Smith, Adnan Aijaz, Aleksandar Stanoev, Manuel Giuliani. 1-2 [doi]
- AI-empowered Secure Data Communication in V2X Environment with 6G NetworkAnuja R. Nair, Nilesh Jadav, Rajesh Gupta 0007, Sudeep Tanwar. 1-6 [doi]
- Enabling Large-Scale Human Genome Sequence Analysis on CloudLabPraveen Rao 0001, Arun Zachariah. 1-2 [doi]
- Automatic Selection Attacks Framework for Hard Label Black-Box ModelsXiaolei Liu, Xiaoyu Li, Desheng Zheng, Jiayu Bai, Yu Peng, Shibin Zhang. 1-7 [doi]
- An ns3-based Energy Module for 5G mmWave Base StationsArgha Sen, Sashank Bonda, Jay Jayatheerthan, Sandip Chakraborty. 1-2 [doi]
- Improving AoI via Learning-based Distributed MAC in Wireless NetworksYash Deshpande, Onur Ayan, Wolfgang Kellerer. 1-8 [doi]
- Exploiting Function-level Dependencies for Task Offloading in Edge ComputingJiwei Mo, Jiangshu Liu, Zhiwei Zhao. 1-6 [doi]
- DDPG-based Computation Offloading and Service Caching in Mobile Edge ComputingLingxiao Chen, Guoqiang Gong, Kai Jiang, Huan Zhou, Rui Chen. 1-6 [doi]
- Demonstration of Policy-Induced Unsupervised Feature Selection in a 5G networkJalil Taghia, Farnaz Moradi, Hannes Larsson, Xiaoyu Lan, Masoumeh Ebrahimi, Andreas Johnsson. 1-2 [doi]
- Hierarchical Attention Network for Interpretable and Fine-Grained Vulnerability DetectionMianxue Gu, Hantao Feng, Hongyu Sun, Peng Liu, Qiuling Yue, Jinglu Hu, Chunjie Cao, Yuqing Zhang. 1-6 [doi]
- Are Malware Detection Models Adversarial Robust Against Evasion Attack?Hemant Rathore, Adithya Samavedhi, Sanjay K. Sahay, Mohit Sewak. 1-2 [doi]
- Adaptive Decision-Making Framework for Federated Learning Tasks in Multi-Tier ComputingWenXin Lei, Sijing Wang, Ning Zhang 0007, Hong Wen, Wenjing Hou, Haojie Lin, Zhu Han 0001. 1-2 [doi]
- Interpretability Evaluation of Botnet Detection Model based on Graph Neural NetworkXiaolin Zhu, Yong Zhang, Zhao Zhang, Da Guo, Qi Li, Zhao Li. 1-6 [doi]
- A Dual-RFID-Tag Based Indoor Localization Method with Multiple AperturesCihang Cheng, Ming Liu, Ke Xiong 0001. 1-2 [doi]
- Online Scheduling of Transmission and Processing for AoI Minimization with Edge ComputingJianhang Zhu, Jie Gong. 1-6 [doi]
- Feature-Attended Multi-Flow LSTM for Anomaly Detection in Internet of ThingsLuhan Zou, Yunkai Wei, Lixiang Ma, Supeng Leng. 1-6 [doi]
- Wireless Resource Management in Intelligent Semantic Communication NetworksLe Xia, Yao Sun 0002, Xiaoqian Li, Gang Feng 0004, Muhammad Ali Imran 0001. 1-6 [doi]
- DDoS attack mitigation in cloud targets using scale-inside out assisted container separationAnmol Kumar, Gaurav Somani 0001. 1-6 [doi]
- Impact of Subjectivity in Deep Reinforcement Learning based Defense of Cloud StorageZahra Aref, Narayan B. Mandayam. 1-6 [doi]
- Unsupervised Bias Evaluation of DNNs in non-IID Federated Learning Through Latent micro-ManifoldsIlias Siniosoglou, Vasileios Argyriou, Thomas Lagkas, Ioannis D. Moscholios, George F. Fragulis, Panagiotis G. Sarigiannidis. 1-6 [doi]
- General Decentralized Federated Learning for Communication-Computation TradeoffWei Liu, Li Chen, Weidong Wang. 1-6 [doi]
- Evaluation of deep learning model in the field of electromagnetic signal recognitionJiabao Wang, Haoran Zha, Jiangzhi Fu. 1-6 [doi]
- Machine and Deep Learning Approaches for IoT Attack ClassificationAlfredo Nascita, Francesco Cerasuolo, Davide Di Monda, Jonas Thern Aberia Garcia, Antonio Montieri, Antonio Pescapè. 1-6 [doi]
- Exploring LoRa for Drone DetectionJian Fang 0003, Zhiyi Zhou, Sunhaoran Jin, Lei Wang 0005, Bingxian Lu, Zhenquan Qin. 1-2 [doi]
- ACT: an Acoustic Communications TestbedDiego A. Cuji, Zhengnan Li, Milica Stojanovic. 1-6 [doi]
- AI-driven Service-aware Real-time Slicing for beyond 5G NetworksTheodoros Tsourdinis, Ilias Chatzistefanidis, Nikos Makris, Thanasis Korakis. 1-6 [doi]
- A blockchain-based Privacy-Preserving Framework for Cross-Social Network Photo SharingMing Zhang, Zhe Sun, Hui Li 0006, Ben Niu 0001, FengHua Li, Yuhang Xie, Chunhao Zheng. 1-6 [doi]
- PRESSGenDB: PRivacy-prEserving Substring Search on Encrypted Genomic DataBaseSara Jafarbeiki, Amin Sakzad, Shabnam Kasra Kermanshahi, Ron Steinfeld, Raj Gaire 0001. 1-6 [doi]
- Multi-frame Scheduling for Federated Learning over Energy-Efficient 6G Wireless NetworksMahdi Beitollahi, Ning Lu. 1-6 [doi]
- Coexistence of Age Sensitive Traffic and High Throughput Flows: Does Prioritization Help?Tanya Shreedhar, Sanjit K. Kaul, Roy D. Yates. 1-6 [doi]
- Competitive Analyses of Online Minimum Age of Information Transmission SchedulingTung-Wei Kuo. 1-8 [doi]
- Ultra Reliable and Low Latency Authentication Scheme for Internet of Vehicles Based on BlockchainXiangyue Yang, Haoxiang Luo, Jingshan Duan, Hongfang Yu. 1-5 [doi]
- Incentive and Knowledge Distillation Based Federated Learning for Cross-Silo ApplicationsBeibei Li, Yaxin Shi, Yuqing Guo, Qinglei Kong, Yukun Jiang. 1-6 [doi]
- Secure Enhancement in NOMA-based UAV-MEC NetworksYuan Gao, Yang Guo, Ping Wang, Siming Yang, Jing Wang, Xiaonan Wang, Yu Ding, Weidang Lu, Yu Zhang, Guoxing Huang, Jiang Cao. 1-6 [doi]
- Differentiating Losses in Wireless Networks: A Learning ApproachYuhao Chen, Jinyao Yan, Yuan Zhang, Karin Anna Hummel. 1-2 [doi]
- Time-Sensitive Networking Experimentation on Open TestbedsGilson Miranda, Esteban Municio, Jetmir Haxhibeqiri, Daniel F. Macedo, Jeroen Hoebeke, Ingrid Moerman, Johann M. Márquez-Barja. 1-6 [doi]
- Quantum Networking and Communications at Oak Ridge National LaboratoryNicholas A. Peters, Muneer Alshowkan, Joseph C. Chapman, Philip G. Evans, D. A. Hooper, W. P. Grice, H. H. Lu, J. M. Lukens, Raphael C. Pooser, C. E. Marvinney, A. Miloshevsky, B. P. Williams, B. A. Wilson. 1-6 [doi]
- Experimental Demonstration of Multiple Input Multiple Output Communications above 100 GHzJacob Hall, Duschia Bodet, Josep Miquel Jornet. 1-2 [doi]