Abstract is missing.
- Low-Latency High-Reliability Industrial MAC Protocol for 6G NetworksAhmed M. Salama, Bin Xie 0001, Jayanta Debnath, Anup Kumar. 1-8 [doi]
- An Artificial Neural Network Model for Mapping Extreme Precipitation EventsHela Hammami, Sadok Elasmi. 1-2 [doi]
- Heuristic Fast Routing in Large-Scale Deterministic NetworkMengyu Wang, Shuyong Zhu, Linghao Wang, Wenxiao Li 0006, Yujun Zhang 0001. 9-17 [doi]
- STAD: A Traffic Anomaly Detection Technology Based on Siamese Neural NetworkZinuo Yin, Hailong Ma, Tao Hu. 18-23 [doi]
- Optimal Task Offloading for Edge Computing with Stochastic Task ArrivalsJun Xu, Dejun Yang. 24-31 [doi]
- Denoising Network of Dynamic Features for Enhanced Malware ClassificationSiyuan Li, Hui-Wen, Liting Deng, Yu Zhou, Wenyuan Zhang, Zhi Li 0018, Limin Sun 0001. 32-39 [doi]
- How to Adapt RDMA Congestion Control Algorithm Based on Local ConditionsYizhou Gong, Wei Zhang, Yunfang Chen, Chao Tu, Wanting Tian, Yunqu Liu. 40-45 [doi]
- IoT Botnet Classification using CNN-based Deep LearningNahid Ebrahimi Majd, Dhatri Sai Kumar Reddy Gudipelly. 46-51 [doi]
- CORN: Cloud-optimized RDMA NetworkingJung-Hwan Cha, Shinhyeok Kang, Yewon Kang, Hansaem Seo, Jungeun Lee, Jongsung Kim, Minsung Jang. 52-59 [doi]
- Fuzzy Hierarchy Analysis Based Microservice Splitting Result EvaluationKe Zhao, Junfeng Zhao 0005. 60-65 [doi]
- Performance Modeling of Blockchains with Fixed Block IntervalsBo Li, Hanwen Zhang 0001, Chenhao Jiang, Zhongcheng Li, Yi Sun 0004. 66-73 [doi]
- Reducing Cloud Expenditures and Carbon Emissions via Virtual Machine Migration and DownsizingNathan Huang, Anthony Li, Sophia Zhang, Ziliang Zong. 74-81 [doi]
- UID-Auto-Gen: Extracting Device Fingerprinting from Network TrafficHaoyu Bin, Sen Zhao, Zhi Li 0018, Nan Yu, Rongrong Xi, Hongsong Zhu, Limin Sun 0001. 82-90 [doi]
- Based on Deep Reinforcement Learning with Context Network and Experience pool optimization for Mix-Flow Scheduling in SD-DCNChao-Xuan Zheng, Wai-Xi Liu, Zhen-Zheng Guo, Jian-yu Zhang. 91-98 [doi]
- TBP: Tree structure Burst-sequence Padding Defense Against Website FingerprintingYankun Wang, Yongjun Wang, Jun-Jie Huang, Yongxin Chen. 99-108 [doi]
- UDAD: An Accurate Unsupervised Database Anomaly Detection MethodHuazhen Zhong, Fan Zhang, Yining Zhao, Weifang Zhang, Wenjie Xiao, Xuehai Tang, Liangjun Zang. 109-115 [doi]
- AggTree: A Routing Tree With In-Network Aggregation for Distributed TrainingJianglong Nie, Wenfei Wu. 116-122 [doi]
- FuzzyCAT: A Framework for Network Configuration Verification Based on FuzzingJianfei Cai, Guozheng Yang, Jingju Liu, Yi Xie. 123-131 [doi]
- iWriter: An Offloading Method for Indirectly Writing Remote DataYuting Li, Yang Yi, Yun Xu, Pengcheng Wang, Yonghui Xu, Weiguang Wang. 132-139 [doi]
- Shrink: Identification of Encrypted Video Traffic Based on QUICWeitao Tang, Meijie Du, Zhao Li 0010, Shu Li, Zhou Zhou 0007, Qingyun Liu 0001. 140-149 [doi]
- Evaluating the Carbon Impact of Large Language Models at the Inference StageBrad Everman, Trevor Villwock, Dayuan Chen, Noe Soto, Oliver Zhang, Ziliang Zong. 150-157 [doi]
- Autonomy and Fatigue in Human-Robot TeamsMax Parks, Mark Allison. 158-159 [doi]
- Pathloss Analysis and Modelling for 5G Communication in U-SPACEStanley Chukwuebuka Nwabuona, Radheshyam Singh, Michael S. Berger, Sarah Ruepp, Lars Dittmann. 160-165 [doi]
- Redesigning Mobile Crowd Sensing's Selection Logic to Ensure Participant's DiversityJiahui Jin, Yijun Liu, Ting Li. 166-167 [doi]
- A Comprehensive Defense Approach Targeting The Computer Vision Based Cheating Tools in FPS Video GamesAnh Nhu, Hieu Phan, Chang Liu, Xianglong Feng. 168-177 [doi]
- Predicting the GNSS Pseudo-Measurement with a Hybrid Multi-Head Attention for Tightly-Coupled NavigationHongfu Xu, Haiyong Luo, Zijian Wu, Fang Zhao 0003. 178-185 [doi]
- OS Packet Processing Mechanism Simulation Architecture for Enabling Digital Twins of Networks in ns-3Keyang Chang, Yimin Du, Min Liu 0001, Jinglin Shi, Yiqing Zhou 0001, Yongkang Li. 186-193 [doi]
- ChainDet: A Traffic-Based Detection Method of Microservice ChainsChunyang Zheng, Jinfa Wang, Shuaizong Si, Weidong Zhang, Limin Sun. 194-201 [doi]
- Machine Learning Load Balancing Algorithms in SDN-enabled Massive IoT NetworksAaron Harbin, Kane Baldwin, Jui Mhatre, Ahyoung Lee, Hoseon Lee. 202-203 [doi]
- Dynamic and Load-Aware Flowlet for Load-Balancing in Data Center NetworksCarol K. Song, Haoyu Song, Chen Qian. 204-209 [doi]
- Bitcoin Mixing Service Detection Based on Spatio-Temporal Information Representation of Transaction GraphHanzhi Yang, Zhenzhen Li, Gaopeng Gou, Junzheng Shi, Gang Xiong 0001, Zhen Li 0011. 210-219 [doi]
- Identifying Exposed ICS Remote Management Device using Multimodal Feature in the WildLiuxing Su, Zhenzhen Li, Gaopeng Gou, Zhen Li, Gang Xiong, Chengshang Hou. 220-227 [doi]
- Towards Flexible and Compact encoded DNS Messages using CBOR StructuresArnol Lemogue, Ivan Martinez, Laurent Toutain, Ahmed Bouabdallah. 228-235 [doi]
- UAV-Assisted Computation Offloading in Vehicular NetworksInsaf Rzig, Wael Jaafar, Maha Jebalia, Sami Tabbane. 236-241 [doi]
- Placement Optimization and Resource Allocation in UxNB-Enabled Sliced 5G NetworksNesrine El Ghoul, Wael Jaafar, Jihene Ben Abderrazak. 242-248 [doi]
- An Adaptive Sampling Strategy for Federal Graph Neural Networks in Internet of ThingsTingqi Wang, Xu Zheng 0001, Liyun Yang, Rong Xiang. 249-258 [doi]
- Performance of Software-based Encrypted MPI Communication over Container ClustersMohsen Gavahi, Abu-Naser, Mehran Sadeghi Lahijani, Cong Wu, Zhi Wang 0004, Xin Yuan 0001. 259-264 [doi]
- The Potential Utility of Image Descriptions: User Identity Linkage across Social Networks Based on MultiModal Self-Attention FusionYunfeng Li, Gaopeng Gou, Gang Xiong, Zhen Li, Mingxin Cui. 265-273 [doi]
- Routing for Intermittently-Powered Sensing SystemsGaosheng Liu, Lin Wang. 274-282 [doi]
- HCPP: A Data-Oriented Framework to Preserve Privacy during Interactions with Healthcare ChatbotZiyan Cai, Xin Chang, Ping Li. 283-290 [doi]
- Enhancing ADHD Detection Using Diva Interview-Based Audio Signals and A Two-Stream NetworkShuanglin Li, Yang Sun 0003, Rajesh Nair, Syed Mohsen Naqvi. 291-296 [doi]
- AEWF: Autoencoder-based Website Fingerprinting in Data-limited ScenariosJianjun Lin, Bo Sun. 297-303 [doi]
- Achieving Zero-copy Serialization for Datacenter RPCTianfan Zhang, Huaping Zhou, Chengyuan Huang, Chen Tian 0001, Wei Zhang, Xiaoliang Wang 0001, Yi Wang, Ahmed M. Abdelmoniem, Matthew Tan, Wanchun Dou, Guihai Chen. 304-312 [doi]
- Theory vs. Practice in Modeling Edge Storage SystemsOleg Kolosov, Mehmet Fatih Aktas, Emina Soljanin, Gala Yadgar. 313-322 [doi]
- Can MPTCP Proxy Practically Improve Cellular Communication?Reza Poorzare, Oliver P. Waldhorst. 323-330 [doi]
- Evaluation of Pruning TechniquesShvetha S. Kumar, Reshma R. Nayak, Jismi S. Kannampuzha, Jeeho Ryoo, Sahil Rai, Lizy K. John. 331-336 [doi]
- Sparse Sequential Recommendation with Interactions and Intentions Contrastive LearningHengxia Wang, Jinghua Zhu. 337-342 [doi]
- A Dual-view Semi-supervised Learning Framework for Combinatorial Few-shot Fault DiagnosisYumeng Liu, Wenzhang Zhong, Ke Yan, Ling Tian. 343-350 [doi]
- GPU-based Parallel Computing for VANETs: Current State and Future ProspectsAbinash Borah, Anirudh Paranjothi. 351-356 [doi]
- Parity Shadow Stack: Dynamic Instrumentation based Control Flow Security for IoT DevicesQing Charles Cao. 357-364 [doi]
- DynaES: Dynamic Energy Scheduling for Energy Harvesting Environmental SensorsJianwei Hao, Emmanuel Oni, In Kee Kim, Lakshmish Ramaswamy. 365-374 [doi]
- Location-Based Prefix Aggregation in Satellite-Ground NetworksSitian Huang, Dongchao Ma, Yuzhu Jin, Mingwei Xu. 377-384 [doi]
- Trade-off Between Completion Time and Cost of Data Transfers in Dedicated HPNsLiudong Zuo, Daqing Yun. 385-390 [doi]
- A Scheme to Introduce New Reachability Domains on the InternetSouvik Das, Kamil Saraç. 391-396 [doi]
- Adaptive Edge-Level Personalization on Hierarchical Federated LearningLihua Song, Jing Li, Honglu Jiang, Shuhua Wei, Yufei Guo. 397-402 [doi]
- Karasu: A Collaborative Approach to Efficient Cluster Configuration for Big Data AnalyticsDominik Scheinert, Philipp Wiesner, Thorsten Wittkopp, Lauritz Thamsen, Jonathan Will, Odej Kao. 403-412 [doi]
- PERF-Expert: Novel Approach for Dynamically Forecasting the Performance of Cloud-Based Integrations with Zero Performance TestsNadheesh Jihan, Malith Jayasinghe, Srinath Perera, Caucidheesan Krishnamoorthy. 413-421 [doi]
- BCN: A Fast Notified Backpressure Congestion ManagementXingyu Hu, Dinghuang Hu, Dezun Dong, Yang Bai, Yuan Lu, Yong Dong. 422-429 [doi]
- Bi-level Sampling: Improved Clients Selection in Heterogeneous Settings for Federated LearningDanyang Xiao, Congcong Zhan, Jialun Li, Weigang Wu. 430-435 [doi]
- SAR Ship Target Detection Using SAR ImagesMuhammad Yasir, Jianhua Wan, Shanwei Liu, Mingming Xu. 436-440 [doi]
- Intrusion Detection in IoT leveraged by Multi-Access Edge Computing using Machine LearningDongjin Li, Nahid Ebrahimi Majd. 441-446 [doi]
- Customized Hybrid Deep Learning Model for Road Accident Detection Based on CCTV ImagesP. C. Sherimon, Vinu Sherimon, Yousuf Nasser Al Husaini, Ambily Merlin Kuruvilla, Ajit Mammen Varghese, Harikrishnan D. 447-452 [doi]
- Anomaly Detection and Attack Classification in IoT Networks Using Machine LearningKyungbin Lee, Nahid Ebrahimi Majd. 453-458 [doi]
- Empowering Local Wood Detection with YOLO5 and Convolutional Neural Network ArchitectureAbdulaziz Alshammari. 459-464 [doi]
- On the fly Deep Neural Network Optimization Control for Low-Power Computer VisionIshmeet Kaur, Adwaita Janardhan Jadhav. 465-469 [doi]
- Holistic Security Approach in Cybersecurity Services for Datacenters and Telecommunication OperatorsKasim Öztoprak, Yusuf Kursat Tuncel. 470-474 [doi]
- Deep Reinforcement Learning Based Task Offloading and Resource Allocation in Small Cell MECHan Li, Ke Xiong 0001, Pingyi Fan, Khaled Ben Letaief. 475-480 [doi]
- A Model Compression Method Using Significant Data and Knowledge DistillationFan Zhang, Beibei Xu, Kai Cui. 481-487 [doi]
- Collaborative Edge Caching for Panoramic Video StreamingZheng Wan, Mingyang Ma, Xuelin Liu. 488-494 [doi]