Abstract is missing.
- Energy Efficiency on Edge Computing: Challenges and VisionTyler Holmes, Charlie McLarty, Yong Shi, Patrick Bobbie, Kun Suo. 1-6 [doi]
- Keep Clear of the Edges : An Empirical Study of Artificial Intelligence Workload Performance and Resource Footprint on Edge DevicesKun Suo, Tu N. Nguyen 0001, Yong Shi, Jing Selena He, Chih-Cheng Hung. 7-16 [doi]
- Unsupervised Anomaly Detection in RS-485 Traffic using Autoencoders with Unobtrusive MeasurementPawissakan Chirupphapa, Md. Delwar Hossain, Hiroshi Esaki, Hideya Ochiai. 17-23 [doi]
- RCM: Residue-aware Consolidation for Heterogeneous MLaaS ClusterKefeng Wu, Chunlei Xu, Mingming Zhang, Xiongfeng Hu, Yibo Jin 0001, Zhuzhong Qian. 24-31 [doi]
- Privacy-Preserving Closest Point Determination Based on Ciphertext ComparisonYahan Hu, Kewei Lv, Jie Ma, Bin Qi. 32-40 [doi]
- Exploring Adversarial Attacks on Neural Networks: An Explainable ApproachJustus Renkhoff, Wenkai Tan, Alvaro Velasquez, William Yichen Wang, Yongxin Liu, Jian Wang, Shuteng Niu, Lejla Begic Fazlic, Guido Dartmann, Houbing Song. 41-42 [doi]
- A Trusted Distributed Crowdsourcing Framework Based on User PreferencesShulin Sun, Lijun Sun, Xinran Ma, Zhenzhen Pan, Hongxin Jin. 43-48 [doi]
- LSEGNN: Encode Local Topology Structure in Graph Neural NetworksMing Xu 0014, Baoming Zhang, Meng Cao, Hualei Yu, Chongjun Wang. 49-56 [doi]
- zk-PCN: A Privacy-Preserving Payment Channel Network Using zk-SNARKsWenxuan Yu, Minghui Xu 0001, Dongxiao Yu, Xiuzhen Cheng 0001, Qin Hu 0001, Zehui Xiong. 57-64 [doi]
- Reinforced Contrastive Graph Neural Networks (RCGNN) for Anomaly DetectionZenan Sun, Jingyi Su, Donghyun Jeon, Alvaro Velasquez, Houbing Song, Shuteng Niu. 65-72 [doi]
- Phishing Detection Based on Multi-Feature Neural NetworkShuaicong Yu, Changqing An, Tao Yu, Ziyi Zhao, Tianshu Li, Jilong Wang 0001. 73-79 [doi]
- Video traffic identification with a distribution distance-based feature selectionShuaili Liu, Licheng Zhang, Peifa Sun, Yingshuo Bao, Lizhi Peng. 80-86 [doi]
- Eliminating Communication Bottlenecks in Consensus Protocols using NDNYuxi Sun 0008, Wang Yang, Lihuan Hui. 87-93 [doi]
- Tropical Geometric Route Decision-Making in Simulated Lunar Gateway CommunicationsJacob Cleveland, Robert Short, Alan Hylton. 94-100 [doi]
- Digital Twin in Safety-Critical Robotics Applications: Opportunities and ChallengesSabur Baidya, Sumit K. Das, Mohammad Helal Uddin, Chase Kosek, Chris Summers. 101-107 [doi]
- A Scalable Nested Blockchain Framework with Dynamic Node Selection Approach for IoTXiaofeng He, Yuchao Zhang, Xiaotian Wang. 108-113 [doi]
- DTS: A Dual Transport Switching Scheme for RDMA-based ApplicationsYuxin Chen, Dongyang Wang, Gang Lu, Junhong Ye, Feng Jin, Zhiqiang He, Bei Hua. 114-119 [doi]
- PickyMan: A Preemptive Scheduler for Deep Learning Jobs on GPU ClustersChen Chen, Yingwen Chen 0001, Zhaoyun Chen, Jianchen Han, Guangtao Xue. 120-129 [doi]
- PaWLA: PPG-based Weight Lifting AssessmentA. B. M. Mohaimenur Rahman, Pu Wang, Weichao Wang, Yu Wang 0003. 130-137 [doi]
- Toward a Shared Sense of Time for a Network of Batteryless, Intermittently-powered NodesVishal Deep, Mathew L. Wymore, Daji Qiao, Henry Duwe. 138-146 [doi]
- PECS: A Pareto-efficient and Envy-free Cloud Resource SchedulerQing Cao, Weisheng Si. 147-152 [doi]
- Higher-order Markov Graph based Bug Detection in Cloud-based DeploymentsQing Cao, Haoran Niu. 153-160 [doi]
- An Efficient Adaptive Denoising Sketch for Per-flow Traffic MeasurementChen Lou, Yu-e Sun, He Huang 0001, Yang Du 0006, Shigang Chen, Guoju Gao, Hongli Xu. 161-168 [doi]
- TForm-RF: An Efficient Data Augmentation for Website Fingerprinting AttackYongxin Chen, Yongjun Wang, Lumming Yang, Yuchuan Luo, Mantun Chen. 169-178 [doi]
- MFIP: Multi-Factor Interlinked Point-of-Interest Recommendation in Location-Based Social NetworkQiaojie Lu, Nan Wang, Kun Li. 179-184 [doi]
- Empirical Estimation of ETSI ITS-G5 Performance Over an IPv6-based PlatformAshkan Gholamhosseinian, Jochen Seitz 0001. 185-193 [doi]
- A Secure and Efficient Data Deduplication Scheme with Dynamic Ownership Management in Cloud ComputingXuewei Ma, Wenyuan Yang, Yuesheng Zhu, Zhiqiang Bai. 194-201 [doi]
- Deep Convolutional Autoencoder for Energy-efficient Smart Health Wearables In the Era of Big DataJunhua Wong, Qingxue Zhang. 202-206 [doi]
- APEX: Characterizing Attack Behaviors from Network AnomaliesKushan Sudheera Kalupahana Liyanage, Tian Zixu, Dinil Mon Divakaran, Mun Choon Chan, Mohan Gurusamy. 207-216 [doi]
- MARS: Malleable Actor-Critic Reinforcement Learning SchedulerBetis Baheri, Jacob Tronge, Bo Fang, Ang Li 0006, Vipin Chaudhary, Qiang Guan. 217-226 [doi]
- A Novel Approach to Energy Efficiency Optimization in NOMA-Aided V2X NetworksLiqing Shan, Ming Chen, Fenghui Zhang, Yuntao Hu, Aici Wei. 227-232 [doi]
- An Enhanced Representation Method for Pedestrian Trajectory Prediction based on Adaptive GCNLizong Zhang, Yutao Jiang, Bei Hui, Zhe Liu, Guisong Liu. 233-239 [doi]
- A Multi-Controllers Architecture for Software-Defined Underwater Acoustic Sensor NetworksYaliang Shi, Xiwen Huang, Qihang Jiang, Qiuling Yang. 240-245 [doi]
- Libra: A Stateful Layer-4 Load Balancer with Fair Load DistributionXingong Guo, Longlong Zhu, Dong Zhang, Chunming Wu. 246-253 [doi]
- KylinTune: DQN-based Energy-efficient Model for Browser in Mobile DevicesHao Xu, Long Peng, Xiaodong Liu, Menglin Zhang, Jun Ma 0015, Jie Yu 0008, Zibo Yi. 254-262 [doi]
- Pricing in the Open Market of Crowdsourced Video Edge Caching: A Newcomer PerspectiveXueqing Wang, Liang Wang, Zhiwen Yu 0001, Zichuan Xu, Yao Zhang, Weibo Chu. 263-268 [doi]
- Reshi: Recommending Resources for Scientific Workflow Tasks on Heterogeneous InfrastructuresJonathan Bader, Fabian Lehmann, Alexander Groth, Lauritz Thamsen, Dominik Scheinert, Jonathan Will, Ulf Leser, Odej Kao. 269-274 [doi]
- SMPI: Scalable Serverless MPI ComputingYuxin Yuan, Xiao Shi, Zhengyu Lei, Xiaohong Wang, Xiaofang Zhao. 275-282 [doi]
- Iterative Qubits Management for Quantum Index Searching in a Hybrid SystemWenrui Mu, Ying Mao, Long Cheng, Qingle Wang, Weiwen Jiang, Pin-Yu Chen. 283-289 [doi]
- SIFOL: Solving Implicit Flows in Loops for Concolic ExecutionYicheng Zeng, Jiaqian Peng, Zhihui Zhao, Zhanwei Song, Hongsong Zhu, Limin Sun. 290-297 [doi]
- UltraCDC:A Fast and Stable Content-Defined Chunking Algorithm for Deduplication-based Backup Storage SystemsPeng Zhou, Zhenyu Wang, Wen Xia, Haotong Zhang 0003. 298-304 [doi]
- FATSS: Filter-Assisted Tuple Space Search for Packet ClassificationJiayao Wang, Ziling Wei, Baosheng Wang, Jincheng Zhong, Shuhui Chen. 305-312 [doi]
- Data Query Routing Algorithm with Cluster Bridge for Wireless Sensor NetworkJianpo Li, Kun Liu, Jun Wang. 313-318 [doi]
- MODLSTM: A Method to Recognize DoS Attacks on Modbus/TCPHao Zhang, Yuandong Min, Sanya Liu, Hang Tong, Yaopeng Li. 319-324 [doi]
- The Effects of a Performance Enhancing Proxy on TCP Congestion Control over a Satellite NetworkMingxi Liu, Yongcheng Liu, Zhifei Ma, Zachary Porter, Jae Chung, Saahil Claypool, Feng Li, Jacob Tutlis, Mark Claypool. 325-331 [doi]
- Trace Characterization based Cache Replacement PolicyShafayat Mowla Anik, Byeong Kil Lee. 332-337 [doi]
- NOMA-based Power Control for Machine-Type Communications: A Mean Field Game ApproachAmani Benamor, Oussama Habachi, Inès Kammoun 0001, Jean-Pierre Cances. 338-343 [doi]
- FedMC: Federated Reinforcement Learning on the Edge with Meta-Critic NetworksDerun Zou, Xusheng Liu, Lintan Sun, Jian-Hui Duan, Ruichen Li, Yeting Xu, Wenzhong Li, Sanglu Lu. 344-351 [doi]
- An Abnormal Traffic Detection Method for IoT Devices Based on Federated Learning and Depthwise Separable Convolutional Neural NetworksQinyu Xia, Shi Dong, Tao Peng 0006. 352-359 [doi]
- 2FO: Distributed Dynamic Offloading Mechanism for Time-Sensitive Tasks in Fog-Cloud IoT-based SystemsIsmail Ataie, Tania Taami, Sadoon Azizi, Md Mainuddin, Daniel Schwartz. 360-366 [doi]
- Optimal Incentive Mechanisms for Fair and Equitable Rewards in PoS BlockchainsHadi Sahin, Kemal Akkaya, Sukumar Ganapati. 367-373 [doi]
- Cross-domain Resemblance Detection based on Meta-learning for Cloud StorageBaisong Li, Wenlong Tian, Ruixuan Li, Weijun Xiao, Zhongming Fu, Xuming Ye, Renjiao Duan, Yusheng Li, Zhiyong Xu 0003. 374-379 [doi]
- HRCache: Edge-End Collaboration for Mobile Deep Vision Based on H.264 and Approximated ReuseXiaohui Wei, Xiukun Wei, Xingwang Wang, Yundi Wang, Yan Niu. 380-388 [doi]
- Max-Min Fairness based Scheduling Optimization Mechanism on SwitchesXijia Lu, Xingwei Wang 0001, Jie Jia, Xue Wang, Min Huang 0001. 389-396 [doi]
- HEX-BLOOM: An Efficient Method for Authenticity and Integrity Verification in Privacy-preserving ComputingRipon Patgiri, Malaya Dutta Borah. 397-403 [doi]
- HetGLM: Lateral Movement Detection by Discovering Anomalous Links with Heterogeneous Graph Neural NetworkXiaoqing Sun, Jiahai Yang. 404-411 [doi]
- Dynamic Reinforcement Learning based Scheduling for Energy-Efficient Edge-Enabled LoRaWANJui Mhatre, Ahyoung Lee. 412-413 [doi]
- Performance Evaluation of Resource Management Schemes for Cloud Native Platforms with Computing ContainersYuqi Fu, Naseem Machlovi, Ying Mao, Jiayin Wang, Long Cheng 0003, Qingzhi Liu. 414-415 [doi]
- DeepThrottle: Deep Reinforcement Learning for Router Throttling to Defend Against DDoS Attack in SDNShuhan Chen, Congqi Shen, Chunming Wu 0001, Yi Shen. 416-417 [doi]
- Performance Evaluation of an Out-of-Order RISC-V CPU: A SPEC INT 2017 StudyAmin Sarihi, Michael A. Schoenfelder, Abdel-Hameed A. Badawy. 418-419 [doi]