Abstract is missing.
- Dimensioning Wireless Embedded Test Environments to Support Continuous IntegrationMatevz Vucnik, Carolina Fortuna, Mihael Mohorcic. 1-6 [doi]
- Blockchain Topology Optimization Based on Node ClusteringPeiyun Ran, Yipeng Ji, Mingsheng Liu, Peng Zhao, Shiyuan Yu, Yongjian Huang, Du Wang, Md. Zakirul Alam Bhuiyan, Gang Li. 1-6 [doi]
- A Two-Tier Anomaly-based Intrusion Detection Approach for IoT-Enabled Smart CitiesMosab Hamdan, Arwa M. Eldhai, Samah Abdelsalam, Kifayat Ullah 0002, Ali Kashif Bashir, Muhammad N. Marsono, Fabio Kon, Daniel Macêdo Batista. 1-7 [doi]
- OREOS: Demonstrating E2E Orchestration in 5G Networks with Open-Source ComponentsNoé Godinho, Paulo Duarte, Paulo Martins 0006, David Perez Abreu, Raul Barbosa, Bruno Mendes, João Pedro Fonseca, Marco Silva, Marco Araújo, João Silva, Karima Velasquez, Bruno Sousa, Marília Curado, Adriano Almeida Góes. 1-2 [doi]
- Accelerating BLE Neighbor Discovery via Wi-Fi FingerprintsTong Li 0014, Bowen Hu, Guanjie Tu, Jinwen Shuai, Jiaxin Liang, Yukuan Ding, Ziwei Li, Ke Xu. 1-2 [doi]
- Achieving Certified Robustness for Brain-Inspired Low-Dimensional Computing ClassifiersFangfang Yang, Shijin Duan, Xiaolin Xu, Shaolei Ren. 1-6 [doi]
- Recurrent Neural Network Based RACH Scheme Minimizing Collisions in 5G and Beyond NetworksSiba Narayan Swain, Ashit Subudhi. 1-7 [doi]
- Wireless Time-Triggered Federated Learning with Adaptive Local Training OptimizationXiaokang Zhou, Yansha Deng, Huiyun Xia, Shaochuan Wu. 1-6 [doi]
- Data Transport for the Orbiting InternetAiden Valentine, George Parisis. 1-2 [doi]
- Enhance Detection of SSVEPs through a Sinusoidal-Referenced Task-Related Component Analysis MethodZhenyu Wang, Tianheng Xu, Xianfu Chen, Ting Zhou, Honglin Hu, Celimuge Wu. 1-6 [doi]
- Artificial Neural Network and Game Theory for Secure Optimal Charging Station Selection for EVsRiya Kakkar, Aparna Kumari, Rajesh Gupta 0007, Smita Agrawal, Sudeep Tanwar. 1-6 [doi]
- Adversarial Attack and Defense for WiFi-based Apnea Detection SystemHarshit Ambalkar, Tianya Zhao, Xuyu Wang, Shiwen Mao. 1-2 [doi]
- Bs-SpMM:Accelerate Sparse Matrix-Matrix Multiplication by Balanced Split Strategy on the GPUMingfeng Guo, Yaobin Wang, Yajun Gu, Yufang Chen, Huan Liu, Huarong Chen, Dongxuan Han, Hengyang Xu, Chunhua Deng, Pingping Tang, Qi Huang. 1-6 [doi]
- Multi-Agent Deep Reinforcement Learning for Digital Twin over 6G Wireless Communication in the MetaverseWenhan Yu, Terence Jie Chua, Jun Zhao 0007. 1-6 [doi]
- Efficient VM Migration for Multiple Destination Sites Across a Japan-US OpenFlow TestbedKazumi Igarashi, Akira Nagata, Yohei Okamoto, Masahiro Shibata, Kenichi Kourai, Masato Tsuru. 1-5 [doi]
- Asynchronous Federated Learning for Intrusion Detection in Vehicular Cyber-Physical SystemsSunitha Safavat, Danda B. Rawat. 1-6 [doi]
- Information We Can Extract About a User from 'One Minute Mobile Application Usage'Sarwan Ali. 1-6 [doi]
- Hyperledger based Verifiable and Secure Cloud Data DeletionSrijita Basu, Shubhasri Roy, Debasish Bera, Sandip Karmakar. 1-6 [doi]
- Anonymous Authentication Scheme for Federated LearningTianqi Zhou, Jian Shen 0001, Pandi Vijayakumar, Md. Zakirul Alam Bhuiyan, Sivaraman Audithan. 1-6 [doi]
- Design and Analysis of an Open-Source SDN-based 5G Standalone TestbedDiana Pineda, Ricardo Harrilal-Parchment, Kemal Akkaya, Ahmed Ibrahim, Alexander Perez-Pons. 1-6 [doi]
- A Finite Blocklength Approach for Wireless Hierarchical Federated Learning in the Presence of Physical Layer SecurityHaonan Zhang, Chuanchuan Yang, Bin Dai 0003. 1-6 [doi]
- Demo: 5G NR, Wi-Fi and LiFi multi-connectivity for Industry 4.0Ferran Cañellas, Daniel Camps-Mur, Adriana Fernández-Fernández, Ivan Boyano, Miguel Urias, Jorge Navarro-Ortiz, Jaun J. Ramos-Muñoz. 1-3 [doi]
- Attack Evaluations of Deep Learning Empowered WiFi Sensing in IoT SystemsJianchao Song, Cheng Qian, Yifan Guo, Kun Hua, Wei Yu 0002. 1-6 [doi]
- Trust-Aware Resource Management for Secure and Optimal Network Slicing in 5G Mobile Edge NetworksChen Peng, Quanyan Zhu. 1-6 [doi]
- A Novel Hierarchically Decentralized Federated Learning Framework in 6G Wireless NetworksJie Zhang, Li Chen, Xiaohui Chen, Guo Wei. 1-6 [doi]
- Time-Constrained UAV-Aided Data Collection for IoT Networks with Energy HarvestingPengfei Du, Fan Xie 0009, Shijia Chen, Xuejun Zhang. 1-6 [doi]
- An Efficient and Secure Post-Quantum Multi-Authority Ciphertext-Policy Attribute-Based Encryption Method Using LatticePrithwi Bagchi, Basudeb Bera, Raj Maheshwari, Ashok Kumar Das, David K. Y. Yau, Biplab Sikdar 0001. 1-6 [doi]
- SPELS: Scalable and Programmable Testbed for Evaluating LEO Satellite Swarm CommunicationsVenkata Srirama Rohit Kantheti, Shih-Chun Lin, Liang C. Chu. 1-6 [doi]
- Live migration of containerized microservices between remote Kubernetes ClustersKiranpreet Kaur, Fabrice Guillemin, Françoise Sailhan. 1-6 [doi]
- Demo: Interoperability between Cellular and V2X Networks (802.11p / LTE-PC5) under a Cloud Native Edge ScenarioJordi Marias I Parella, Adrián Pino, Bruno Cordero, Jordi Casademont, Estela Carmona Cejudo, Francisco Vazquez Gallego. 1-2 [doi]
- Cyberbullying Detection on Social Media Using Machine LearningBiodoumoye George Bokolo, Qingzhong Liu. 1-6 [doi]
- Automatic Modulation Classification Based on Decentralized Learning and Model AveragingYunhe Xu, Min Ma, Xue Fu, Yu Wang 0078, Guan Gui, Tomoaki Ohtsuki. 1-5 [doi]
- Meta-material Sensors-enabled Internet of Things: Angular Range ExtensionTaorui Liu, Jingzhi Hu, Hongliang Zhang, Lingyang Song. 1-2 [doi]
- Demo: Missed An Exit? Confusion Zone DetectionSeyhan Ucar, Takamasa Higuchi, Onur Altintas. 1-2 [doi]
- Powering Inaccessible IoT Devices Through a WPT-enabled Sustainable UAV NetworkProdromos-Vasileios Mekikis, Pavlos S. Bouzinis, Nikos A. Mitsiou, Sotiris A. Tegos, Vasilis K. Papanikolaou, Dimitrios Tyrovolas, Panagiotis D. Diamantoulakis, George K. Karagiannidis. 1-2 [doi]
- Deep Learning Enabled Keystroke Eavesdropping Attack Over Videoconferencing PlatformsXueyi Wang, Yifan Liu, Shancang Li. 1-2 [doi]
- GPS Spoofing on UAV: A SurveyRyan D. Restivo, Laurel C. Dodson, Jian Wang, Wenkai Tan, Yongxin Liu, Huihui Wang, Houbing Song. 1-6 [doi]
- A QoE-Fair Synchronized Transmission Scheme for Edge-Assisted Interactive Virtual RealityHuitong Liu, Peng Yang, Xi Wang, Wei Liu. 1-6 [doi]
- Meta Learning for Meta-Surface: A Fast Beamforming Method for RIS-Assisted Communications Adapting to Dynamic EnvironmentsQinpei Luo, Boya Di. 1-2 [doi]
- Towards Robust Pedestrian Detection with Roadside Millimeter-Wave InfrastructureHem Regmi, Vansh Nagpal, Sanjib Sur. 1-2 [doi]
- A Novel Multi-Layer Framework for BVLoS Drone Operation: A Preliminary StudyFrancesco Betti Sorbelli, Punyasha Chatterjee, Federico Coro, Lorenzo Palazzetti, Cristina M. Pinotti. 1-6 [doi]
- Age of Actuation in a Wireless Power Transfer SystemAli Nikkhah, Anthony Ephremides, Nikolaos Pappas 0001. 1-6 [doi]
- Wireless Signal Denoising Using Conditional Generative Adversarial NetworksHaolin Tang, Yanxiao Zhao, Guodong Wang 0002, Changqing Luo, Wei Wang. 1-6 [doi]
- Dynamic Construction and Adaptation of 3D Virtual Network Topology for UAV-Assisted Data CollectionChen Qiu, Xianbin Wang 0001, Weiming Shen 0001, Richard Lee 0004. 1-6 [doi]
- Machine Learning Assisted Capacity Optimization for B5G/6G Integrated Access and Backhaul NetworksOluwaseun T. Ajayi, Shuai Zhang 0013, Yu Cheng 0003. 1-6 [doi]
- Detection and mitigation of indirect conflicts between xApps in Open Radio Access NetworksCezary Adamczyk, Adrian Kliks. 1-2 [doi]
- Edge Oriented Redistribution of Computational Load for Authentication SystemsZakaria EI-Awadi, Manki Min. 1-6 [doi]
- A Secure RPL Rank Computation and Distribution Mechanism for Preventing Sinkhole Attack in IoT-based SystemsAlekha Kumar Mishra, Deepak Puthal, Asis Kumar Tripathy. 1-6 [doi]
- Distributionally Robust Chance-Constrained Optimization for Hierarchical UAV-based MECCan Cui, Ziye Jia, Chao Dong 0001, Zhuang Ling, Jiahao You, QiHui Wu. 1-6 [doi]
- Optimization of AoII and QAoII in Multi-User LinksMuratcan Ayik, Elif Tugce Ceran, Elif Uysal. 1-6 [doi]
- Analysis of Age of Incorrect Information Under Generic Transmission DelayYutao Chen, Anthony Ephremides. 1-8 [doi]
- Enabling Security Research Through Efficient Partial Deployment Topology Configuration and ValidationBashayer Alharbi, Karl Olson, Eric Keller. 1-6 [doi]
- The Architectural Design of Service Management and Orchestration in 6G Communication SystemsMohammad Asif Habibi, Adrián Gallego Sánchez, Ignacio Labrador Pavón, Bin Han 0004, Pablo Serrano 0001, Jesús Pérez-Valero, Antonio Virdis, Hans D. Schotten. 1-2 [doi]
- Uplink Power Control for Extremely Large-Scale MIMO with Multi-Agent Reinforcement Learning and Fuzzy LogicZiheng Liu, Zhilong Liu, Jiayi Zhang 0001, Huahua Xiao, Bo Ai 0001, Derrick Wing Kwan Ng. 1-6 [doi]
- Demonstration of LAN-type Communication for an Industrial 5G NetworkLinh-An Phan, Dirk Pesch, Utz Roedig, Cormac J. Sreenan. 1-2 [doi]
- Pragmatic Communication: Bridging Neural Networks for Distributed AgentsTianhao Guo. 1-6 [doi]
- Towards Trust Driven On-Demand Client Deployment in Federated LearningMario Chahoud, Azzam Mourad, Hadi Otrok, Mohsen Guizani. 1-6 [doi]
- i-Profiler: Towards Multi-Objective Autonomous VNF Profiling with Reinforcement LearningPratchaya Jaisudthi, Shadi Moazzeni, Xenofon Vasilakos, Reza Nejabati, Dimitra Simeonidou. 1-6 [doi]
- Value of Updates: Which Packets Are Worth Transmitting?Polina Kutsevol, Onur Ayan, Wolfgang Kellerer. 1-2 [doi]
- Lay Importance on the Layer: Federated Learning for Non-IID data with Layer-based RegularizationEleftherios Charteros, Iordanis Koutsopoulos. 1-6 [doi]
- Q-Learning for Sum-Throughput Optimization in Wireless Visible-Light UAV NetworksYuwei Long, Nan Cen. 1-6 [doi]
- CVCA: A Complex-Valued Classifiable Autoencoder for MmWave Massive MIMO Physical Layer AuthenticationXinyuan Zeng, Chao Wang, Cheng-Cai Wang, Zan Li. 1-6 [doi]
- Evaluating a multicast backhaul protocol for reliable low latency communication over mmWave linksDimitrios S. Mastrogiannis, Fraida Fund, Shivendra S. Panwar. 1-2 [doi]
- Ensemble Learning for Predicting Task Connectivity Over Time in Cloud Data CentersMustafa Daraghmeh, Anjali Agarwal, Yaser Jararweh. 1-6 [doi]
- A Hasty Grid S&R Prototype Using Autonomous UTM and AI-Based Mission CoordinationLanier A. Watkins, Denzel Hamilton, Chad Mello, Tyler A. Young, Sebastián A. Zanlongo, Barbara Kobzik-Juul, Randall Sleight. 1-6 [doi]
- Digital Twin Enabled Intelligent Network Orchestration for 6G: A Dual-Layered ApproachPengyi Jia, Xianbin Wang 0001, Xuemin Sherman Shen. 1-6 [doi]
- Bewitching the Battlefield: Repurposing the MouseJack Attack for Crazyflie DronesNarayana Murari Gowrishetty, Sai Sree Laya Chukkapalli, Anupam Joshi. 1-6 [doi]
- Age of Information of a Power Constrained Scheduler in the Presence of a Power Constrained AdversarySubhankar Banerjee, Sennur Ulukus, Anthony Ephremides. 1-6 [doi]
- Blockchain and DQN Enabled Co-Evolutionary Routing Scheme in UAV NetworksPengcheng Zhao, Yuxin Lu, Yunkai Wei, Supeng Leng. 1-6 [doi]
- Performance Evaluation of Quantum-Resistant Open Fronthaul Communications in 5GRicardo Harrilal-Parchment, Isabela Fernandez Pujol, Kemal Akkaya. 1-6 [doi]
- A Framework to Enable Runtime Programmable P4-enabled FPGAs in the Open Cloud TestbedZhaoyang Han, Suranga Handagala, Kalyani Patle, Michael Zink, Miriam Leeser. 1-6 [doi]
- Federated Transfer Learning for Energy Efficiency in Smart BuildingsEnrique Mármol Campos, Aurora González-Vidal, José Luis Hernández Ramos, Antonio F. Skarmeta. 1-6 [doi]
- Timely Mobile Routing: An Experimental StudyVishakha Ramani, Jiachen Chen, Roy D. Yates. 1-6 [doi]
- DAAPEO: Detect and Avoid Path Planning for UAV-Assisted 5G Enabled Energy-Optimized IoTSandeep Verma, Aneek Adhya. 1-6 [doi]
- Millimeter-Wave Software-Defined Radio Testbed with Programmable DirectionalityMarc Jean, Murat Yuksel, Xun Gong. 1-8 [doi]
- Demo Abstract: Demonstrating Resource-Efficient SLAM in Virtual Spacecraft EnvironmentsYing Chen, John Sarik, Hazer Inaltekin, Maria Gorlatova. 1-2 [doi]
- Radio Frequency Signal Dataset Generation Based on LTE System and Variable ChannelsShupeng Zhang, Yibin Zhang, Xixi Zhang 0001, Yang Peng, Jinlong Sun, Guan Gui, Tomoaki Ohtsuki. 1-5 [doi]
- A Data Set and Reference Experiments for Multipath Wireless Emulation on Public TestbedsIlknur Aydin, Fraida Fund, Shivendra S. Panwar. 1-2 [doi]
- AR-Span: A Multi-Screen Adaptive Displaying System Using Smart Handheld Devices Based on Mobile NetworksLien-Wu Chen, Ai-Ni Li, Yu-An Shi. 1-2 [doi]
- MDPD: Mapping-based Data Processing Defense against Adversarial Attacks in Automatic Modulation ClassificationYan Zheng, Lin Qi, Zhida Bao, Jiangzhi Fu, Hang Jiang. 1-6 [doi]
- Offloading Tasks to Unknown Edge Servers: A Contextual Multi-Armed Bandit ApproachShu Zhang, Mingjun Xiao, Guoju Gao, Yin Xu, He Sun. 1-6 [doi]
- Accurate Anomaly Interval Recognition and Fault Classification by Pattern Mining and ClusteringNingyuan Sun, Hongyun Zheng, Yishuai Chen, Yajun Liu, Jinuo Fang. 1-6 [doi]
- Multi-Agent Distributed Cooperative Routing for Maritime Emergency CommunicationTingting Yang 0001, Yujia Huo, Chengzhuo Han, Xin Sun. 1-6 [doi]
- A Scalable Asynchronous Federated Learning for Privacy-Preserving Real-Time Surveillance SystemsDesta Haileselassie Hagos, Earl Tankard, Danda B. Rawat. 1-6 [doi]
- Multi Agent Reinforcement Learning Based Local Routing Strategy to Reduce End-to-End Delays in Segment Routing NetworksAntonio Cianfrani, Davide Aureli, Marco Listanti, Marco Polverini. 1-6 [doi]
- Drone-Assisted Behavior Recognition via Key Frame Extraction for Efficient 5G CommunicationHui Li, Tongao Ge, Ruidi Ma, Ying Guo, Guowei Zhao, Jiaming Pei, Lukun Wang, Lingwei Xu. 1-7 [doi]
- WiWm-EP: Wi-Fi CSI-based Wheat Moisture Detection Using Equivalent PermittivityPengming Hu, Weidong Yang, Xuyu Wang, Shiwen Mao, Erbo Shen. 1-6 [doi]
- Keep It Simple: CNN Model Complexity Studies for Interference Classification TasksTaiwo Oyedare, Vijay K. Shah, Daniel J. Jakubisin, Jeffrey H. Reed. 1-6 [doi]
- Combined Bulk and Per-subcarrier Relay Selection Enabled by Cascaded Neural ComputingWenwu Li, Shuping Dang, Zhenrong Zhang, Zhihui Ge. 1-6 [doi]
- Sum Computation Rate Maximization in Self-Sustainable RIS-Assisted MECHan Li, Ming Liu 0010, Bo Gao, Ke Xiong 0001, Pingyi Fan, Khaled B. Letaief. 1-2 [doi]
- Efficient Schemes for Improved Performance in 6TiSCH NetworksAlakesh Kalita, Abhishek Hazra, Mohan Gurusamy. 1-6 [doi]
- MatGAN: Sleep Posture Imaging using Millimeter-Wave DevicesAakriti Adhikari, Siri Avula, Sanjib Sur. 1-2 [doi]
- Towards AI-Driven on-Demand Routing in 6G Wide-Area NetworksBin Dai 0002, Wenrui Huang, Xinbin Shi, Mengda Lv, Yijun Mo. 1-6 [doi]
- RIS-Empowered MEC for URLLC Systems with Digital-Twin-Driven ArchitectureSravani Kurma, Keshav Singh, Mayur Katwe, Shahid Mumtaz, Chih-Peng Li. 1-6 [doi]
- Anarchic Convex Federated LearningDongsheng Li 0003, Xiaowen Gong. 1-6 [doi]
- Lyapunov Meets Thompson: Learning-Based Energy-Efficient UAV Communication with Queuing Stability ConstraintsNaresh Babu Kakarla, V. Mahendran. 1-7 [doi]
- Demo Abstract: Predictive Radio Environment for Digital Twin Communication Platform via Enhanced SensingYinghe Miao, Yuxiang Zhang, Jianhua Zhang, Yutong Sun, Yixuan Tian, Li Yu, Guangyi Liu. 1-2 [doi]
- Demonstrating Flow-Level In-Switch InferenceMichele Gucciardo, Aristide Tanyi-Jong Akem, Beyza Bütün, Marco Fiore. 1-2 [doi]
- EMP-GAN: Encoder-Decoder Generative Adversarial Network for Mobility PredictionSammy Yap Xiang Bang, Syed M. Raza, Huigyu Yang, Hyunseung Choo. 1-6 [doi]
- Untrained Neural Network based Bayesian Detector for OTFS Modulation SystemsHao Chang, Alva Kosasih, Wibowo Hardjawana, Xinwei Qu, Branka Vucetic. 1-6 [doi]
- Towards a Network Aware Model of the Time Uncertainty Bound in Precision Time ProtocolYash Deshpande, Philip Diederich, Wolfgang Kellerer. 1-2 [doi]
- On the Secrecy Performance of RIS-Enhanced Aerial Communication Under Imperfect CSIKhawaja Muhammad Hamza, Sarah Basharat, Syed Ali Hassan 0001, Haejoon Jung. 1-6 [doi]
- Homomorphic Filtering Adversarial Defense for Automatic Modulation ClassificationJiarun Yu, Zhongqiu He, Sicheng Zhang, Yu Han, Hang Jiang. 1-6 [doi]
- Age of Information in Deep Learning-Driven Task-Oriented CommunicationsYalin E. Sagduyu, Sennur Ulukus, Aylin Yener. 1-6 [doi]
- Trustworthy and Load-Balancing Routing Scheme for Satellite Services with Multi-Agent DRLJiaxin Song, Ying Ju, Lei Liu 0031, Qingqi Pei, Celimuge Wu, Mian Ahmad Jan, Shahid Mumtaz. 1-6 [doi]
- Communication-Efficient Reinforcement Learning in Swarm Robotic Networks for Maze ExplorationEhsan Latif, Wen-Zhan Song 0001, Ramviyas Parasuraman. 1-6 [doi]
- Content-Aware Semantic Communication for Goal-Oriented Wireless CommunicationsYuzhou Fu, Wenchi Cheng, Wei Zhang. 1-6 [doi]
- 5GECO: A Cross-domain Intelligent Neutral Host Architecture for 5G and BeyondJoão Francisco Nunes Pinheiro, Chia-Yu Chang, Tom Collins, Eric Smekens, Revaz Berozashvili, Adnan Shahid, Danny De Vleeschauwer, Paola Soto, Ingrid Moerman, Johann Márquez-Barja, Jens Buysse, Miguel Camelo. 1-6 [doi]
- Signaling Storm Detection in IIoT Network based on the Open RAN ArchitectureMarcin Hoffmann, Pawel Kryszkiewicz. 1-2 [doi]
- Empirical Mode Decomposition and Stationary Wavelet Transformation in Internet Traffic PredictionSajal Saha, Moinul Islam Sayed, Anwar Haque. 1-6 [doi]
- Demo Abstract: Scaling Out srsRAN Through Interfacing Wirelessly srsENB with srsEPCNeha Mishra, Yamini V. Iyengar, Akshay C. Raikar, Nikitha Thomas, Sabarish Krishna Moorthy, Jiangqi Hu, Zhiyuan Zhao, Nicholas Mastronarde, Elizabeth S. Bentley, Michael J. Medley, Zhangyu Guan. 1-2 [doi]
- A Millimeter-Wave Software-Defined Radio for Wireless ExperimentationAlphan Sahin, Mihail L. Sichitiu, Ismail Güvenç. 1-6 [doi]
- Intelligent Cellular Traffic Prediction in Open-RAN Based on Cross-Domain Data FusionZihao Xiong, Kaisa Zhang, Gang Chuai, Xu Yang, Yichao Xu. 1-6 [doi]
- Cloud-Assisted Security Framework for Drone-Enabled Offshore CommunicationsAnusha Vangala, Raj Maheshwari, Ashok Kumar Das, Shantanu Pal. 1-6 [doi]
- Demo: Collaborative Mixed-Reality-Based Firefighter TrainingZhanchen Dong, Jiangong Chen, Bin Li. 1-2 [doi]
- Time-Varying Real-Time Online Multi-Resource Allocation for Scaling the Slices and VNF IsolationAkbar Majidi, Nazila Jahanbakhsh, Siobhán Clarke. 1-6 [doi]
- O-RAN and RIC Compliant Solutions for Next Generation NetworksMarco Silva, João Pedro Fonseca, David Perez Abreu, Paulo Romero Martins Maciel, Paulo Duarte, Raul Barbosa, Bruno Mendes, João Silva, Adriano Almeida Góes, Marco Araújo, Bruno Sousa, Marília Curado, José Santos. 1-7 [doi]
- FeDiSa: A Semi-asynchronous Federated Learning Framework for Power System Fault and Cyberattack DiscriminationMuhammad Akbar Husnoo, Adnan Anwar, Haftu Tasew Reda, Nasser Hosseinzadeh, Shama Naz Islam, Abdun Naser Mahmood, Robin Doss. 1-6 [doi]
- Securing Federated Learning through Blockchain and Explainable AI for Robust Intrusion Detection in IoT NetworksZakaria Abou El Houda, Hajar Moudoud, Bouziane Brik, Lyes Khoukhi. 1-6 [doi]
- A Lightweight Preprocessing Scheme for Secret Key Generation from MmWave Massive MIMO Channel MeasurementsLijun Yang, Xinchao Ge, Qianyi Zhu, Lin Guo. 1-6 [doi]
- Joint User Association, Power Allocation and ABS Deployment Optimization in Air-Ground Cooperative NetworksHuan Li, Daosen Zhai, Ruonan Zhang, Haotong Cao, Wenxin Tang, Zhangjie Cai. 1-6 [doi]
- Positioning and Dynamic Tracking under 3GPP Cellular Network on GNURadio TestbedShunyu Chang, Zhaoming Lu, Xinghe Chu, Di Zhang, Luhan Wang, Xiangming Wen. 1-6 [doi]
- W-State as a OHE Scheme for Efficient Path Selection on Quantum Random WalksJulie Germain, Ram Dantu. 1-6 [doi]
- 400G Ethernet Packet Capture Demo Based on Network Development Kit for FPGAsJakub Cabal, Vladislav Válek, Martin Spinler, Daniel Kondys, Jan Korenek. 1-2 [doi]
- AI/ML Data-driven Control Loop for Managing O-RAN SDR-based RANsJaswanth S. R. Mallu, Joao F. Santos, Aloizio Pereira da Silva, Prateek Sethi, Vikas Radhakrishnan, Luiz A. DaSilva. 1-2 [doi]
- Poster Abstract: Performance of Scalable Cell-Free Massive MIMO in Practical Network TopologiesYunlu Xiao, Petri Mähönen, Ljiljana Simic. 1-2 [doi]
- Some of the Internet may be Heading Towards BBR Dominance: An Experimental StudyAshutosh Srivastava, Fraida Fund, Shivendra S. Panwar. 1-7 [doi]
- Vetting Privacy Policies in VR: A Data Minimization Principle PerspectiveYuxia Zhan, Yan Meng, Lu Zhou, Haojin Zhu. 1-2 [doi]
- Joint Power Control and Bandwidth Allocation for UAV-Assisted Integrated Communication and Localization NetworksXiaoman Li, Li Wang, Liang Li, Lianming Xu, Aiguo Fei. 1-6 [doi]
- Deep Reinforcement Learning-Assisted Age-optimal Transmission Policy for HARQ-aided NOMA NetworksKunpeng Liu, Aimin Li, Shaohua Wu. 1-6 [doi]
- Few Shot Learning Approaches for Classifying Rare Mobile-App Encrypted Traffic SamplesGiampaolo Bovenzi, Davide Di Monda, Antonio Montieri, Valerio Persico, Antonio Pescapè. 1-6 [doi]
- Robust Federated Learning against Backdoor AttackersPriyesh Ranjan, Ashish Gupta 0012, Federico Coro, Sajal K. Das 0001. 1-6 [doi]
- GNN for Wireless Link Anomaly DetectionBlaz Bertalanic, Mihael Mohorcic, Carolina Fortuna. 1-2 [doi]
- RIC-O: An Orchestrator for the Dynamic Placement of a Disaggregated RAN Intelligent ControllerGustavo Zanatta Bruno, Vikas Krishnan Radhakrishnan, Gabriel Matheus de Almeida, Alexandre Huff, Aloizio Pereira da Silva, Kleber Vieira Cardoso, Luiz A. DaSilva, Cristiano Bonato Both. 1-2 [doi]
- Experiments on Network Services for Video Transmission using FABRIC Instrument ResourcesAlicia Esquivel Morel, Durbek Gafurov, Prasad Calyam, Cong Wang 0014, Komal Thareja, Anirban Mandal, Eric Lyons 0001, Michael Zink, George Papadimitriou 0002, Ewa Deelman. 1-6 [doi]
- Task Offloading Using Multi-Armed Bandit Optimization in Autonomous Mobile RobotsAnis Ur Rahman 0001, Asad Waqar Malik, Hasan Ali Khattak, Moayad Aloqaily. 1-7 [doi]
- An Efficient Topology Emulation Technology for the Space-Air-Ground Integrated NetworkXiaofeng Wang, Taiqian Shen, Yi Zhang, Xinyu Chen. 1-8 [doi]
- Efficient Communication-Assisted Sensing based on Federated Transfer LearningWenjiang Ouyang, Junsheng Mu, Jingyan Wu, Bohan Li 0005, Xiaojun Jing. 1-6 [doi]
- Towards a Scalable 5G RAN Central UnitCuidi Wei, Ahan Kak, Nakjung Choi, Timothy Wood 0001. 1-2 [doi]
- SFC Deployment in Space-Air-Ground Integrated Networks Based on Matching GameYilu Cao, Ziye Jia, Chao Dong 0001, Yanting Wang, Jiahao You, QiHui Wu. 1-6 [doi]
- Spectral Efficiency of Multi-Pair mMIMO-NOMA UAV-Relaying with Low-Resolution ADCs/DACsXingwang Li 0001, Mingyu Zhang, Hui Chen, Dinh-Thuan Do, Shahid Mumtaz, Arumugam Nallanathan. 1-6 [doi]
- A Scalable Byzantine Consensus Parallelism and its Practical ImplementationXiao Chen. 1-2 [doi]
- Strategic Unmanned Aerial Vehicle (UAV) Routing: An Energy-Efficient ApproachGabriel Avelino R. Sampedro, Franklin Dañas, Mideth B. Abisado, Dong-Seong Kim 0002, Jae-Min Lee. 1-5 [doi]
- On Enhancing Transport & Logistics Sectors with 5G Testbeds and Edge Network Applications (EdgeApps)Vincent Charpentier, Nina Slamnik-Krijestorac, Xiangyu Lian, João Francisco Nunes Pinheiro, Cristina Costa, Johann Márquez-Barja. 1-6 [doi]
- A Multi-Agent Deep Reinforcement Learning Approach for RAN Resource Allocation in O-RANFarhad Rezazadeh, Lanfranco Zanzi, Francesco Devoti, Sergio Barrachina-Muñoz, Engin Zeydan, Xavier Costa-Pérez, Josep Mangues-Bafalluy. 1-2 [doi]
- Controller-Assisted Adaptive Video Streaming Experimented in Cloud-Native ICN PlatformYusaku Hayamizu, Atsushi Ooka, Kazuhisa Matsuzono, Hitoshi Asaeda. 1-6 [doi]
- Entanglement Distribution in Quantum Repeater with Purification and Optimized Buffer TimeAllen Zang, Xinan Chen, Alexander Kolar, Joaquín Chung, Martin Suchara, Tian Zhong, Rajkumar Kettimuthu. 1-6 [doi]
- Demystifying the Near-real Time RIC: Architecture, Operations, and Benchmarking InsightsHuu-Trung Thieu, Van-Quan Pham, Ahan Kak, Nakjung Choi. 1-8 [doi]
- Quantifying the Impact of Base Station Metrics on LTE Resource Block Prediction AccuracyDarijo Raca, Jason J. Quinlan, Ahmed H. Zahran, Cormac J. Sreenan, Riten Gupta, Abhishek Tiwari. 1-2 [doi]
- Vulnerability Exploit Pattern Generation and Analysis for proactive security risk mitigation for 5G networksWiktor Sedkowski, Rakshesh P. Bhatt, Clifton Fernandes, Kodandram Ranganath. 1-6 [doi]
- Securing PUFs Against ML Modeling Attacks via an Efficient Challenge-Response ApproachMieszko Ferens, Edlira Dushku, Sokol Kosta. 1-6 [doi]
- Enabling CBRS Experimentation through an OpenSAS and SDR-based CBSDOren Rodney Collaco, Mayukh Roy Chowdhury, Aloizio Pereira da Silva, Luiz A. DaSilva. 1-2 [doi]
- Intelligent Onion Routing and UAV-based Electronic Health Record Sharing Framework for Healthcare 4.0Nilesh Kumar Jadav, Rajesh Gupta 0007, Riya Kakkar, Sudeep Tanwar. 1-6 [doi]
- L7LB: High Performance Layer-7 Load Balancing on Heterogeneous Programmable PlatformsXiaoyi Shi, Yifan Li, Chengjun Jia, Xiaohe Hu, Jun Li 0003. 1-2 [doi]
- Remote Detection of 4G/5G UEs Vulnerable to Stealthy Call DoSMan-Hsin Chen, Chiung-I Wu, Yin-Chi Li, Chi-Yu Li, Guan-Hua Tu. 1-2 [doi]
- A Fully Distributed Training for Class Incremental Learning in Multihead NetworksMingjun Dai, Yonghao Kong, Junpei Zhong, Shengli Zhang, Hui Wang. 1-6 [doi]
- Developing xApps for Rogue Base Station Detection in SDR-Enabled O-RANJun-Hong Huang, Shin-Ming Cheng, Rafael Kaliski, Cheng-Feng Hung. 1-6 [doi]
- A GAF and CNN based Wi-Fi Network Intrusion Detection SystemRayed S. Ahmad, Asmer H. Ali, Syed M. Kazim, Quamar Niyaz. 1-6 [doi]
- Poster: Digital Network Twin via Learning-Based SimulatorYuru Zhang, Yongjie Xue, Qiang Liu 0013, Nakjung Choi. 1-2 [doi]
- Privacy Preservation in Kubernetes-based Federated Learning: A Networking ApproachJuan Marcelo Parra Ullauri, Luis F. Gonzalez, Anderson Bravalheri, Rasheed Hussain, Xenofon Vasilakos, Iván Vidal, Francisco Valera, Reza Nejabati, Dimitra Simeonidou. 1-7 [doi]
- Semantic and Effective Communication for Remote Control Tasks with Dynamic Feature CompressionPietro Talli, Francesco Pase, Federico Chiariotti, Andrea Zanella, Michele Zorzi. 1-6 [doi]
- Boids Swarm-based UAV Networking and Adaptive Routing Schemes for Emergency CommunicationXutong Yang, Li Wang, Lianming Xu, YuMing Zhang, Aiguo Fei. 1-6 [doi]
- A Runtime Anomaly Detector via Service Communication Proxy for 5G Mobile NetworksYin-Chi Li, Ping-Tsan Liu, Yi-An Tai, Che-Hung Liu, Man-Hsin Chen, Chi-Yu Li, Guan-Hua Tu. 1-2 [doi]
- Federated Learning at the Edge: An Interplay of Mini-batch Size and Aggregation FrequencyWeijie Liu, Xiaoxi Zhang, Jingpu Duan, Carlee Joe-Wong, Zhi Zhou, Xu Chen. 1-6 [doi]
- Age-Optimal Multi-Channel-Scheduling Under Energy and Tolerance ConstraintsXujin Zhou, Irem Koprulu, Atilla Eryilmaz. 1-8 [doi]
- Resource Allocation for UAV-assisted Two-way Relay System Under Hardware ImpairmentsZhengqiang Wang, Zhen Zhang, Xiaoyu Wan, Zi-fu Fan 0001. 1-6 [doi]
- Attention-Guided Synthetic Data Augmentation for Drone-based Wildfire DetectionJulia Boone, Bryce Hopkins, Fatemeh Afghah. 1-6 [doi]
- Jamming Attacks on Decentralized Federated Learning in General Multi-Hop Wireless NetworksYi Shi 0001, Yalin E. Sagduyu, Tugba Erpek. 1-6 [doi]
- Implementing an Open 5G Standalone Testbed: Challenges and Lessons LearntMaryam Amini, Ahmed El-Ashmawy, Catherine Rosenberg. 1-2 [doi]
- ARES-WiGR: An Attention-enhanced ResNet based Wi-Fi Gesture RecognitionKexin Yao, Han Li, Ming Liu 0010, Bo Gao, Ke Xiong 0001, Pingyi Fan. 1-2 [doi]
- A Noise-Robust Radio Frequency Fingerprint Identification Scheme for Internet of Things DevicesYuexiu Xing, Xiaoxing Chen, Junqing Zhang, Aiqun Hu, Dengyin Zhang. 1-6 [doi]
- Timely Opportunistic Gossiping in Dense NetworksPurbesh Mitra, Sennur Ulukus. 1-6 [doi]
- Intrusion Detection System for IoHT Devices using Federated LearningFatemeh Mosaiyebzadeh, Seyedamin Pouriyeh, Reza M. Parizi, Meng Han, Daniel Macêdo Batista. 1-6 [doi]
- Coding-Aware Rate Splitting for Distributed Coded Edge LearningTianheng Li, Jingzhe Zhang, Xiaofan He. 1-6 [doi]
- FleCom: A Flexible Congestion Control Protocol in Named Data NetworkingZhuo Li 0009, Hao Xun, Yang Miao, Weizhe Zhang, Peng Luo, Kaihua Liu. 1-6 [doi]
- ADAPTER: A DRL-Based Approach to Tune Routing in WSNsChao Sun, Jianxin Liao, Jiangong Zheng, Xiaotong Guo, Tongyu Song, Jing Ren, Ping Zhang 0003, Yongjie Nie, Siyang Liu. 1-6 [doi]
- An Appointed Access Control Scheme for Distributed-Cloud EnvironmentZheng Zhou, Xiong Ling, Feng Xu, Xianhua Niu, Chen Peng. 1-7 [doi]
- Explaining AI-Informed Network Intrusion Detection with CounterfactualsGang Liu, Meng Jiang. 1-2 [doi]
- Avoid attacks: A Federated Data Sanitization Defense in IoMT SystemsChong Chen, Ying Gao 0004, Siquan Huang, Xingfu Yan. 1-6 [doi]
- Scenario-Agnostic Zero-Trust Defense with Explainable Threshold Policy: A Meta-Learning ApproachYunfei Ge, Tao Li, Quanyan Zhu. 1-6 [doi]
- Federated Radio Frequency Fingerprinting with Model Transfer and AdaptationChuanting Zhang, Shuping Dang, Junqing Zhang, Haixia Zhang 0001, Mark A. Beach. 1-6 [doi]
- Deep Reinforcement Learning Based Energy Consumption Minimization for Intelligent Reflecting Surfaces Assisted D2D Users Underlaying UAV NetworkVineet Vishnoi, Prakhar Consul, Ishan Budhiraja, Suneet Gupta, Neeraj Kumar 0001. 1-6 [doi]
- Tandem Attack: DDoS Attack on Microservices Auto-scaling MechanismsAnat Bremler-Barr, Michael Czeizler. 1-2 [doi]
- Critical Element First: Enhance C-V2X Signal Coverage using Power-Efficient Liquid Metal-Based Intelligent Reflective SurfacesSaige Dacuycuy, Zachary Dela Cruz, Yanjun Pan, Yao Zheng, Aaron T. Ohta, Wayne A. Shiroma. 1-2 [doi]
- Sum-Rate Maximization for Active RIS-Aided Downlink RSMA SystemXinhao Li, Tao Wang, Haonan Tong, Zhaohui Yang 0001, Yijie Mao, Changchuan Yin. 1-6 [doi]
- Throughput Measurements and Capacity Estimates for Quantum ConnectionsNageswara S. V. Rao, Muneer Alshowkan, Joseph C. Chapman, Nicholas A. Peters, Joseph M. Lukens. 1-6 [doi]
- Learning-Aided Multi-UAV Online Trajectory Coordination and Resource Allocation for Mobile WSNsLu Chen, Suzhi Bi, Xiaohui Lin 0001, Zheyuan Yang, Yuan Wu 0001, Qiang Ye. 1-6 [doi]
- Trajectory Design for Unmanned Aerial Vehicles via Meta-Reinforcement LearningZiyang Lu, Xueyuan Wang, Mustafa Cenk Gursoy. 1-6 [doi]
- Android Malware Classification and Optimisation Based on BM25 Score of Android APIRahul Yumlembam, Biju Issac 0001, Longzhi Yang, Seibu Mary Jacob. 1-6 [doi]
- AoI-Constrained Transmission Scheduling with HARQ and Heterogeneous Sampling ProcessesSaeid Sadeghi Vilni, Mohammad Moltafet, Markus Leinonen, Marian Codreanu. 1-6 [doi]
- CICADA: Cloud-based Intelligent Classification and Active Defense Approach for IoT SecurityRoshan Lal Neupane, Trevor Zobrist, Kiran Neupane, Shaynoah Bedford, Shreyas Prabhudev, Trevontae Haughton, Jianli Pan, Prasad Calyam. 1-6 [doi]
- Information Recycling Assisted Collaborative Edge Computing for Distributed LearningWanlin Liang, Tianheng Li, Xiaofan He. 1-6 [doi]
- Shallow Neural Networks for Channel Estimation in Multi-Antenna SystemsDheeraj Raja Kumar, Carles Antón-Haro, Xavier Mestre. 1-6 [doi]
- Multi-Agent Deep Reinforcement Learning for Access Point Activation Strategy in Cell-Free Massive MIMO NetworksLi Sun, Jing Hou, Richard Chapman. 1-6 [doi]
- FPGA-based Deterministic and Low-Latency Control for Distributed Quantum ComputingRomerson Deiny Oliveira, Sima Bahrani, Ekin Arabul, Rui Wang 0053, Reza Nejabati, Dimitra Simeonidou. 1-6 [doi]
- Incentive-driven and SAC-based Resource Allocation and Offloading Strategy in Vehicular Edge Computing NetworksJianmeng Guo, Huan Zhou 0002, Liang Zhao, Wei Chang, Tingyao Jiang. 1-6 [doi]
- RansomCoin: A New Dataset for Analysing Cryptocurrency Transactions - Addressing a Gap in the LiteratureMohiuddin Ahmed, Clark Pagutaisidro, Apichart Alexander Pike, Yuting Yang, Al-Sakib Khan Pathan. 1-6 [doi]