Abstract is missing.
- Failed Yet Stored: A First Look at DNS Negative CachingMeng Zeng, Yujia Zhu, Baiyang Li, Yuedong Zhang, Qingyun Liu 0001, Binxing Fang. 1-10 [doi]
- The Robustness of Spiking Neural Networks in Communication and its Application towards Network Efficiency in Federated LearningManh V. Nguyen, Liang Zhao, Bobin Deng, William Severa, Honghui Xu, Shaoen Wu. 1-7 [doi]
- SndGLM-SA: A Social Network Debate Text Generation Model Based on Sentiment AnalysisTao Tian. 1-6 [doi]
- Differentially Private Selection using Smooth SensitivityAkito Yamamoto, Tetsuo Shibuya. 1-10 [doi]
- An Extension of Pathfinding Algorithms for Randomly Determined SpeedsVisvam Rajesh, Chase Q. Wu. 1-8 [doi]
- Less is More: Exploring Sampled Twitter Data Steams for Pandemic Surveillance and MonitoringKuai Xu, Feng Wang 0002, Mitchell Hoikka. 1-6 [doi]
- Lightweight Secure Communication Scheme Based on PUF for In-vehicle Controller Area NetworksHaoran Jiang, Yehua Wei, Wenjia Li, Jiangwei Li. 1-8 [doi]
- Overlooked Backdoors: Investigating 6to4 Tunnel Nodes and Their Exploitation in the WildJiaxing Guo, Lin He, Ying Liu. 1-8 [doi]
- Formulating a Comprehensive Cybersecurity Framework for Uncrewed Aerial VehiclesAnice Kiarra Thompson, Dev D. Patel, M. Ilhan Akbas. 1-6 [doi]
- FlexMRS: Multi-Objective Optimization for Diverse Application Requirements in MPTCP SchedulingZekun Zhang, Lujie Zhong, Xiang Ji. 1-2 [doi]
- Optimized Deliverer Selection in Blockchain-Based P2P Content Delivery NetworksZhenchao Yan, Songlin He, Chase Wu, Aiqin Hou. 1-8 [doi]
- SARP: Service-Aware Routing Protocol in Task-Oriented FANETTao Yang, Wang Yang, Yanbo Wang, Lihuan Hui, Jianwei Yao. 1-8 [doi]
- Adaptive Mitigation of Blackhole Attacks in Blockchain-Enhanced Software Defined NetworksMehmed K. Uludag, Murat Karakus 0001, Evrim Guler, Suleyman Uludag. 1-8 [doi]
- A Dexterous Hybrid Attention Transformer For MRI Super-resolution Of Brain TumorsMingxuan Li, Jinbao Li, Yingchun Cui. 1-8 [doi]
- Resd: High-Performance RDMA-enabled Control Plane for NVMe Shared-Disk ClusterChenming Chang, Jiawei Li, Yucheng Kang, Yupeng Chen, Yi Zhang. 1-7 [doi]
- Formal Modeling of Road Network-Based Autonomous Vehicle Validation Scenarios With Intersections and PedestriansIlke Kutlu, Quentin Goss, Tahir Cetin Akinci, Mustafa Ilhan Akbas. 1-6 [doi]
- Large Language Model guided State Selection Approach for Fuzzing Network ProtocolBo Yu, Qihong Song, Chengnuo Cai. 1-6 [doi]
- Algorithms for the Generalized Network Construction ProblemFei Li. 1-6 [doi]
- Enhanced Outsourced and Secure Inference for Tall Sparse Decision TreesAndrew Quijano, Spyros T. Halkidis, Kevin Gallagher, Kemal Akkaya, Nikolaos Samaras. 1-6 [doi]
- Bad Neighbors? On the Impact of IEEE 802.11p and Cellular 5G on Vehicular Neighbor SetsSimon Welzel, Florian Klingler. 1-2 [doi]
- TYLE: Tile-based Dynamic Quality Enhancement for 360-degree Video StreamingSonali Keshava Murthy Naik, Mea Wang, Diwakar Krishnamurthy. 1-8 [doi]
- DASIV: Directional Acoustic Sensing based Intelligent Vehicle Interaction SystemDinghua Zhao, Juntao Zhou, Dian Ding, Yu Lu, Yijie Li 0002, Hang Yang, Yi-Chao Chen 0001, Guangtao Xue. 1-8 [doi]
- A Multimodal Method for Semi-Biometric Information Based User Identification in AR and VR ApplicationsHan Li, Ke Lyu, Owen Dossett, Xianglong Feng. 1-7 [doi]
- AST-Trans: Detecting Web Tracking using Transformer-based Deep Learning with Abstract Syntax TreeYong Yuan, Ziling Wei, Lin Liu 0018, Shuhui Chen, Jinshu Su. 1-7 [doi]
- Spatiotemporal-DBSCAN: A Density-Based Clustering Method for Analyzing Spatiotemporal Ground-lightning DatasetJames Agresto, Zhuojun Duan, Mace Bentley, Tobias Gerken, Dudley Bonsal. 1-2 [doi]
- Cluster-BPI: Efficient Fine-Grain Blind Power Identification for Defending against Hardware Thermal Trojans in Multicore SoCsMohamed R. Elshamy, Mehdi Elahi, Ahmad Patooghy, Abdel-Hameed A. Badawy. 1-6 [doi]
- Cryptocurrency Price Forecasting Using XGBoost Regressor and Technical IndicatorsAbdelatif Hafid, Maad Ebrahim, Mohamed Rahouti, Diogo Oliveira. 1-6 [doi]
- Policy Enforcement for IoT: Complexities and Emerging SolutionsShuo Zhang, Luoyao Hao, Henning Schulzrinne. 1-2 [doi]
- Optimal Sequencing for a Class of Task Offloading Problems in Edge-Cloud ComputingYe Xia. 1-8 [doi]
- Analysis of Intermediate Mean Opinion Score (MOS) and QoS in a High Definition Voice Call Conference in Mobile NetworksJussif J. Abularach Arnez, Isaac Barros Gomes, Fabrício Falcáo de Souza Oliveira, Lucas Cavalcante Tribuzy, Caio Pedrosa Galvao, Jessica Da Silva Gomes. 1-2 [doi]
- HANNA: Harvesting-Aware Neural Network Architecture Search for Batteryless Intermittent DevicesRohit Sahu, Vishal Deep, Henry Duwe. 1-10 [doi]
- Wital: A Whitelist-Based IoT Firewall for Mitigating Device ExploitationHeeyun Kim, Wei Xiong Toh, Luoyao Hao, Henning Schulzrinne. 1-2 [doi]
- Digital-Twin Architecture of a Spiking Neuron using Carbon Nanotube Field Effect TransistorsShelby Williams, Prosen Kirtonia, Kasem Khalil, Magdy A. Bayoumi. 1-6 [doi]
- Stochastic Network Calculus Based Quality of Service Guarantee for Multi-class TrafficYunlan Wang, Qing Wang, Tianhai Zhao, YongKuo Hu, Jianhua Gu, Zhengxiong Hou. 1-9 [doi]
- Learning-Empowered Resource Allocation in UxNB-Enabled Sliced HetECNsXingchen Wei, Laixian Peng, Renhui Xu, Hai Wang 0007. 1-6 [doi]
- Dynamic Task Offloading in Connected Vehicles: Leveraging a Graph Neural Networks Approach for Multi-hop SearchAsad Waqar Malik, Samee U. Khan. 1-8 [doi]
- CART: Concurrent Asynchronous Ratchet Tree for Group MessagingXinyue Xu, Baosheng Wang, Qianqian Xing, Xiaofeng Wang. 1-9 [doi]
- Dynamic Traffic Load Rebalancing for Hardware-accelerated 6G UPF Resilient ArchitectureDongJin Lee, SeongSu Park, BumJun Lee. 1-7 [doi]
- RecoSelector: Cost-Sensitive Feature Selection for Network Intrusion Detection in Resource-Constrained Internet of ThingsZiqian Chen, Wei Xia, Zhen Li 0011, Gang Xiong 0001, Gaopeng Gou. 1-10 [doi]
- StreamDP: Continual Observation of Real-world Data Streams with Differential PrivacyShuailou Li, Yu Wen, Zhaoyang Wang, Wenbo Wang, Lisong Zhang, Dan Meng. 1-10 [doi]
- HEJet: A Framework for Efficient Machine Learning Inference with Homomorphic EncryptionDavid Monschein, Oliver P. Waldhorst. 1-10 [doi]
- Spreading Computations for Loop-Free Multipath Routing in Computer NetworksJ. J. Garcia-Luna-Aceves, Morteza Moghaddassian, charles hsieh. 1-10 [doi]
- Correlation Analysis for Exploring Large-Scale Latency Variability in WANsYing Zhou, Mingzhen Wu, Fei Song. 1-6 [doi]
- Adaptive Cache Optimization Integrating Spatiotemporal Analysis and Sliding ModulesXinxuan Hang, Quan Zheng 0002, Wenjing Jing, Qisheng Su, Feng Yang 0013, Xiaobin Tan. 1-8 [doi]
- An Analytical Study on the Evolution and Impact of Chatbots in Tourism Over the Past DecadeLamya Benaddi, Charaf Ouaddi, Abdeslam Jakimi, Rachid Saadane, Brahim Ouchao, Mohamed Rahouti, Abdelatif Hafid, Diogo Oliveira. 1-6 [doi]
- FingerMamba: Mamba-based Efficient Multi-tab Website FingerprintingLin Liu 0018, Ziling Wei, Shuhui Chen, Zixuan Dong, Jinshu Su. 1-9 [doi]
- Revolutionizing Wireless Modeling and Simulation with Network-Oriented LLMsJiewen Liu, Zhiyuan Peng, Dongkuan Xu, Yuchen Liu 0001. 1-8 [doi]
- CAUDA: Cloud-assisted Active Unsupervised Domain Adaptation for On-device LearningZefu Wang, Zhenzhe Zheng, Fan Wu 0006. 1-7 [doi]
- Smart Contract Vulnerability Detection Based on AST-Augmented Heterogeneous GraphsHaikuo Li, Gang Xiong, Chengshang Hou, Gaopeng Gou, Ziqian Chen, Zhen Li. 1-10 [doi]
- Locating the Root Cause of Large-scale BGP Anomaly with Routing DependenceShiqi Zhao, Xiaohong Huang, Pei Zhang 0003. 1-7 [doi]
- Characterizing and Understanding the Performance of Small Language Models on Edge DevicesMd. Romyull Islam, Nobel Dhar, Bobin Deng, Tu N. Nguyen 0001, Selena He, Kun Suo. 1-10 [doi]
- Experimental Analysis of LoRaWAN for Optimizing Water Quality Monitoring with Reinforcement Learning-Driven SchedulingJui Mhatre, Minh Nguyen, Ahyoung Lee, Hoseon Lee. 1-6 [doi]
- A Review on Quantum Machine Learning in Different Computer Vision FieldsMd Majedul Islam, Jing Selena He. 1-2 [doi]
- Curse to Blessing: Leveraging Model Inversion Attacks to Detect Backdoor Attacks in Federated LearningZhaowen Chen, Mingze Zhang, Caleb Mostyn, Honglu Jiang, Xianglong Feng. 1-9 [doi]
- DP-Prune: Global Optimal Strategy for Retraining-Free Pruning of Transformer ModelsGuangzhen Yao, Long Zhang, Sandong Zhu, Miao Qi. 1-6 [doi]
- DecMEN: Scalable Measurement and Impairment Framework for Network Characterization in 5G(+)Niladri Mondal, Mario Niggemeyer, Simon Welzel, Florian Klingler. 1-6 [doi]
- ZBanner: Fast Stateless Scanning Capable of Obtaining Responses over TCPChiyu Chen, Yuliang Lu, Guozheng Yang, Yi Xie, Shasha Guo. 1-6 [doi]
- Content Security Policy Deployment Issues Related to Third-party Scripts among Builder-generated Websites and Other WebsitesMengxia Ren, Chuan Yue. 1-10 [doi]
- The Seeker's Dilemma: Realistic Formulation and Benchmarking for Hardware Trojan DetectionAmin Sarihi, Ahmad Patooghy, Abdel-Hameed A. Badawy, Peter Jamieson. 1-8 [doi]
- Optimization of Heterogeneous Coded Distributed Computing with Nonuniform Input File SizesJiasheng Liang, Siyu Zhang, Yong Deng. 1-2 [doi]
- PIB Sketch: Accurately Tracking Persistent and Infrequent Flows with Bursty CharacteristicXuetao Liu, Jing Shao, Sitan Li, Yilin Zhao, Jiawei Huang 0001. 1-8 [doi]
- Statistical and Shapelet Analysis of HPC Application Performance Using Time-Series Heartbeat DataMohammad Al-Tahat, Strahinja Trecakov, Jonathan E. Cook. 1-9 [doi]
- LSAFE: a Lightweight Static Analysis Framework for binary ExecutablesXiao Yue, Guangzhi Qu. 1-6 [doi]
- Activation Sparsity Opportunities for Compressing General Large Language ModelsNobel Dhar, Bobin Deng, Md. Romyull Islam, Kazi Fahim Ahmad Nasif, Liang Zhao, Kun Suo. 1-9 [doi]
- Combining Dynamic Deterministic Latency Bounds and Networked Control SystemsRobin Laidig, Jona Herrmann, David Augustat, Frank Dürr, Kurt Rothermel. 1-9 [doi]
- +tree Indexing with In-Network MemoryYikai Zhao, Yuanpeng Li 0002, Zicang Xu, Tong Yang 0003, Kaicheng Yang 0001, Li Chen 0008, Xin Yao, Gong Zhang 0001. 1-10 [doi]
- P4-FILB: Stateless Load Balancing Mechanism in Firewall and IPv6 Environment with P4Haizhang Zhu, Zhongyi Zhang, Zhou Zhou 0007, Chengwei Peng, Hongfei Zhang, Shu Li, Rong Yang, Qingyun Liu 0001. 1-8 [doi]
- 2Sketch: Finding Persistent Items in Data Streams Based on Periodic ArrivalJiawei Huang 0001, Qi Liang, Jing Shao, Qile Wang, Yilin Zhao, Hui Li, Sitan Li, Shu Lin. 1-8 [doi]
- Integrating Post-Quantum TLS into the Control Plane of 5G NetworksYacoub Hanna, Diana Pineda, Maryna Veksler, Manish Paudel, Kemal Akkaya, Mila Anastasova, Reza Azarderakhsh. 1-8 [doi]
- Precision Tracking in Geofencing Systems using Deep Reinforcement LearningAlireza Famili, Shihua Sun, Tolga O. Atalay, Angelos Stavrou. 1-10 [doi]
- Computation Caching in Mobile Convolutional Neural Network InferenceJames Mariani, Li Xiao 0001. 1-8 [doi]
- Towards A Computational Model for Learning Affective Empathy Responses in Robotic SystemMark Allison. 1-7 [doi]