Abstract is missing.
- LAFS: Learning-Based Application-Agnostic Flow Scheduling for DatacentersFeixue Han, Qing Li, Keke Zhu, Jianer Zhou, Yong Jiang, Zhuyun Qi, Fuliang Li. 1-8 [doi]
- 3DRIMR: 3D Reconstruction and Imaging via mmWave Radar based on Deep LearningYue Sun, Zhuoming Huang, Honggang Zhang, Zhi Cao, Deqiang Xu. 1-8 [doi]
- PUFF: A Passive and Universal Learning-based Framework for Intra-domain Failure DetectionLianjin Ye, Qing Li 0006, Xudong Zuo, Jingyu Xiao, Yong Jiang, Zhuyun Qi, Chunsheng Zhu. 1-8 [doi]
- Two-layer Federated Learning for Scene Text DetectionHaolin Wang, Xiao Xiao, Yilong Hui, Zhisheng Yin, Nan Cheng. 1-6 [doi]
- ALLPC: A Lightweight Block Cipher Based on Generalized Feistel Networks for IoTJunHua Cheng, Songtao Guo, Jing He. 1-8 [doi]
- PMatch: Semantic-based Patch Detection for Binary ProgramsZhe Lang, Shouguo Yang, Yiran Cheng, Xiaoling Zhang, Zhiqiang Shi, Limin Sun. 1-10 [doi]
- A self-adaptive batch request aggregation pattern for improving resource management, response time and costs in microservice and serverless environmentsGeorge Kousiouris. 1-10 [doi]
- Zero-bias Deep Neural Network for Quickest RF Signal SurveillanceYongxin Liu, Yingjie Chen, Jian Wang, Shuteng Niu, Dahai Liu, Houbing Song. 1-8 [doi]
- Enel: Context-Aware Dynamic Scaling of Distributed Dataflow Jobs using Graph PropagationDominik Scheinert, Houkun Zhu, Lauritz Thamsen, Morgan K. Geldenhuys, Jonathan Will, Alexander Acker, Odej Kao. 1-8 [doi]
- MQTT based Wi-Fi communication between Microcontroller and FPGAChiranjibi Subedi, Brendan P. Beauchamp, Nabeeh Kandalaft. 1-4 [doi]
- BigBFT: A Multileader Byzantine Fault Tolerance Protocol for High ThroughputSalem Alqahtani, Murat Demirbas. 1-10 [doi]
- Encrypted All-reduce on Multi-core ClustersMohsen Gavahi, Abu-Naser, Cong Wu, Mehran Sadeghi Lahijani, Zhi Wang 0004, Xin Yuan 0001. 1-7 [doi]
- NOMA-Assisted Wireless Caching in Vehicular Networks: A Online Scheduling StrategyYanglong Sun, Jianxin Zhang, Yuliang Tang. 1-6 [doi]
- Software Defined Radio based Security Analysis For Unmanned Aircraft SystemsHarry Romesburg, Jian Wang, Yushan Jiang, Huihui Wang, Houbing Song. 1-5 [doi]
- JointCloud Cross-chain Verification Model of Decentralized IdentifiersTao Zhong, Peichang Shi, Junsheng Chang. 1-8 [doi]
- RecGraph: Graph Recovery Attack using Variational Graph AutoencodersJing Tian, Chang Liu, Gaopeng Gou, Zhen Li, Gang Xiong 0001, Yangyang Guan. 1-7 [doi]
- One Layer for All: Efficient System Security Monitoring for Edge ServersLele Ma. 1-8 [doi]
- Benchmarking of Pre- and Post-Quantum Group Encryption Schemes with Focus on IoTThomas Prantl, Dominik Prantl, André Bauer, Lukas Iffländer, Alexandra Dmitrienko, Samuel Kounev, Christian Krupitzer. 1-10 [doi]
- Resource allocation algorithm for MEC based on Deep Reinforcement LearningYijie Wang, Xin Chen, Ying Chen, Shougang Du. 1-6 [doi]
- Accelerate Graph Neural Network Training by Reusing Batch Data on GPUsZhejiang Ran, Zhiquan Lai, LiZhi Zhang, Dongsheng Li. 1-8 [doi]
- SMOTE for Wi-Fi Fingerprint Construction in Indoor Positioning SystemsYun Fen Yong, Chee Keong Tan, Ian K. T. Tan. 1-6 [doi]
- Key-Based Input Transformation Defense Against Adversarial ExamplesYi Qin, Chuan Yue. 1-10 [doi]
- Performance Evaluation for a Post-Quantum Public-Key CryptosystemThomas Prantl, Dominik Prantl, Lukas Beierlieb, Lukas Iffländer, Alexandra Dmitrienko, Samuel Kounev, Christian Krupitzer. 1-7 [doi]
- Fast Monotonicity Preserving Text Sorting On GPUHaoke Xu, Xiaoming Li. 1-7 [doi]
- An Efficient Shuffle-Light FFT LibrarySalvatore Servodio, Xiaoming Li. 1-10 [doi]
- Deep Learning-based Face Mask Usage Detection on Low Compute Resource DevicesAbdullah Hussein Al-Ghushami, Dabeeruddin Syed, Ameema Zainab, Moaaz Ahmed, Jadran Sessa. 1-6 [doi]
- Incentive Mechanism Design for Blockchain Enabled Distributed Content CachingJia Guo, Wei Wang, Zuguang Li, Shan Sun. 1-6 [doi]
- SCB: Flexible and Efficient Asymmetric Computations Utilizing Symmetric Cryptosystems Implemented with Intel SGXWenyi Ouyang, Qiongxiao Wang, Wei Wang 0314, Jingqiang Lin, Yaxi He. 1-8 [doi]
- A Traceability System of Livestock Products Based on Blockchain and the Internet of ThingsYuejing Chen, Ailian Zhou, Xiaohe Liang, Nengfu Xie, Huijuan Wang, Xiaoyu Li. 1-5 [doi]
- Efficient Data Trading for Stable and Privacy Preserving Histograms in Internet of ThingsZhipeng Cai 0001, Xu Zheng, Jinbao Wang. 1-10 [doi]
- SNIS: Storage-Network Iterative Simulation for Disaggregated Storage SystemsDanlin Jia, Tengpeng Li, Xiaoqian Zhang, Li Wang, Mahsa Bayati, Ron Lee, Bo Sheng, Ningfang Mi. 1-6 [doi]
- CODS: Cloud-assisted Object Detection for Streaming Videos on Edge DevicesTengpeng Li, Xiaoqian Zhang, Son Nam Nguyen, Bo Sheng. 1-6 [doi]
- Diagnosing the Interference on CPU-GPU Synchronization Caused by CPU Sharing in Multi-Tenant GPU CloudsYoussef Elmougy, Weiwei Jia, Xiaoning Ding, Jianchen Shan. 1-10 [doi]
- Adaptive Video Streaming with Scalable Video Coding using Multipath QUICWang Yang, Jing Cao, Fan Wu. 1-7 [doi]
- Learning to Detect: A Data-driven Approach for Network Intrusion DetectionZachary Tauscher, Yushan Jiang, Kai Zhang, Jian Wang, Houbing Song. 1-6 [doi]
- A Simulation Study of Hardware Parameters for Future GPU-based HPC PlatformsSaptarshi Bhowmik, Nikhil Jain, Xin Yuan 0001, Abhinav Bhatele. 1-10 [doi]
- An air quality prediction model based on deep learning and wavelet analysis considering the COVID-19 pandemic factorsTeng Pu, Honghao Cai, Gang He, Yinghua Luo, MinQi Wu. 1-2 [doi]
- Research on Tag Method for Joint Extraction of Domain-oriented Entity and RelationYuxin Shi, Ailian Zhou, Xiaohe Liang, Nengfu Xie, Saisai Wu, Xiaoyu Li. 1-5 [doi]
- NLP-based Entity Behavior Analytics for Malware DetectionPejman Najafi, Daniel Köhler, Feng Cheng 0002, Christoph Meinel. 1-5 [doi]
- Optimal data sink location for real-time NOMA-based Industrial IoTsYaqi Xie, Chaonong Xu, Chao Li. 1-6 [doi]
- Accelerating DNN Inference by Edge-Cloud CollaborationJianan Chen, Qi Qi 0001, Jingyu Wang 0001, Haifeng Sun, Jianxin Liao. 1-7 [doi]
- MR-tree: A Parametric Family of Multi-Rail Fat-treeYuyang Wang, Dezun Dong, Fei Lei. 1-9 [doi]
- FedVF: Personalized Federated Learning Based on Layer-wise Parameter Updates with Variable FrequencyYuan Mei, Binbin Guo, Danyang Xiao, Weigang Wu. 1-9 [doi]
- Defending Against Adversarial Attacks in Speaker Verification SystemsLi-Chi Chang, Zesheng Chen, Chao Chen, Guoping Wang, Zhuming Bi. 1-8 [doi]
- Identification of Cotton Growing Stage Based on Faster-RCNNZekai Feng, Gaobi Kang, Fanguo Zeng, Xuejun Yue. 1-6 [doi]
- EdgePier: P2P-based Container Image Distribution in Edge Computing EnvironmentsSören Becker, Florian Schmidt 0006, Odej Kao. 1-8 [doi]
- Spectral Data Classification By One-Dimensional Convolutional Neural NetworksFanguo Zeng, Wen Peng, Gaobi Kang, Zekai Feng, Xuejun Yue. 1-6 [doi]
- An End-To-End Method for Teenagers Potential Depression Detection on Social MediaStephanie Lei, Wenyi Su. 1-2 [doi]
- DENNI: Distributed Neural Network Inference on Severely Resource Constrained Edge DevicesRohit Sahu, Ryan Toepfer, Mathew D. Sinclair, Henry Duwe. 1-10 [doi]
- The Diminished Importance of Connection-based Features in Intrusion DetectionJessil Fuhr, Isaac Hanna, Feng Wang, Yongning Tang. 1-10 [doi]
- Unravel: An Anomalistic Crowd Investigation Framework Using Social Airborne SensingMd. Tahmid Rashid, Dong Wang. 1-10 [doi]
- Methodological Principles for Deep Learning in Software EngineeringTao Lin, Fu Chen, Xue Fu. 1-3 [doi]
- MAGINS: Neural Network Inertial Navigation System Corrected by Magnetic InformationChao Qiu, Yuanzhuo Xu, Yu Zhu, Luyao Xie, Da Shen, Junhui Huang, Xiaoguang Niu. 1-8 [doi]
- Data Placement Strategies for Data-Intensive Computing over Edge CloudsXinliang Wei, A. B. M. Mohaimenur Rahman, Yu Wang 0003. 1-8 [doi]
- Three-Party Integer Comparison and ApplicationsJie Ma, Bin Qi, Kewei Lv. 1-8 [doi]
- Differential Shadowing: A Resilience Framework for Extreme-scale, Heterogeneous Environments with Non-Uniform Node Failure DistributionLonghao Li, Taieb Znati, Rami G. Melhem. 1-8 [doi]
- VideoKV: A Fast Key-Value Store For Intelligent Video Surveillance TerminalsZhenli Cui, Yu Luo. 1-9 [doi]
- Transfer Learning Based Crop Disease Identification Using State-of-the-art Deep Learning FrameworkGaobi Kang, Jian Wang, Xuejun Yue, Guofan Zeng, Zekai Feng. 1-6 [doi]
- A Hybrid System for Learning Classical Data in Quantum StatesSamuel A. Stein, Ryan L'Abbate, Wenrui Mu, Yue Liu, Betis Baheri, Ying Mao, Qiang Guan, Ang Li, Bo Fang. 1-7 [doi]
- ELSV: An Effective Anomaly Detection System from Web Access LogsWei Wan, Xin Shi, Jinxia Wei, Jing Zhao, Chun Long. 1-6 [doi]
- Communication-Efficient Quantized SGD for Learning Polynomial Neural NetworkZhanpeng Yang, Yong Zhou 0006, Youlong Wu, Yuanming Shi. 1-6 [doi]
- Q-learning-based Opportunistic Communication for Real-time Mobile Air Quality Monitoring SystemsTrung Thanh Nguyen, Truong Thao Nguyen, Tuan Anh Nguyen Dinh, Thanh-Hung Nguyen, Phi-Le Nguyen. 1-7 [doi]
- Circuit-based PSI for Covid-19 Risk ScoringLeonie Reichert, Marcel Pazelt, Björn Scheuermann 0001. 1-8 [doi]
- A Millimeter-wave Multi-channel MAC with Dynamic Spectrum Access Capability for Mobile Self-organizing Heterogeneous NetworksPeng Feng, Yuebin Bai, Zerui Guo, Xiaolin Wang, Yining Zhang, Bojian Bai, Junmin Zhang. 1-7 [doi]
- QoSP: A Priority-Based Queueing Mechanism in Software-Defined Networking EnvironmentsMohamed Rahouti, Kaiqi Xiong, Yufeng Xin, Nasir Ghani. 1-7 [doi]
- A Service Migration Method for Resource Competition in Mobile Edge ComputingJirun Duan, Ke Ren, Wei Zhou, Yueyue Xu, Wanchun Dou. 1-8 [doi]
- Elastic Scheduling of Virtual Machines in Cloudlet NetworksKangkang Li, Liangmin Wang. 1-7 [doi]
- A Scalable Approach to Service Placement in Fog/Cloud EnvironmentsShehenaz Shaik, Sanjeev Baskiyar. 1-8 [doi]
- A General and Practical Framework for Realization of SDN-based Vehicular NetworksJuan V. Leon, Oscar G. Bautista, Abdullah Aydeger, Suat Mercan, Kemal Akkaya. 1-7 [doi]
- Universal Perturbation for Flow Correlation Attack on TorJing Tian, Gaopeng Gou, Yangyang Guan, Wei Xia, Gang Xiong, Chang Liu. 1-9 [doi]
- Private Distributed K-Means Clustering on Interval DataDingquan Huang, Xin Yao 0002, Senquan An, Shengbing Ren. 1-9 [doi]
- Federated Variational Learning for Anomaly Detection in Multivariate Time SeriesKai Zhang, Yushan Jiang, Lee Seversky, Chengtao Xu, Dahai Liu, Houbing Song. 1-9 [doi]
- Multi-objective Dynamic Auction Mechanism for Online AdvertisingYiqing Wang, Junqi Jin, Zhenzhe Zheng, Haiyang Xu, Fan Wu, Yuning Jiang, Guihai Chen. 1-8 [doi]
- PACTS: Power-Aware Charging Time Scheduling in Wireless Rechargeable UAV NetworksMengqi Li, Liang Liu, Yanlin Wang, Jie Xi, Lisong Wang. 1-10 [doi]