Abstract is missing.
- WF-GAN: Fighting Back Against Website Fingerprinting Attack Using Adversarial LearningChengshang Hou, Gaopeng Gou, Junzheng Shi, Peipei Fu, Gang Xiong. 1-7 [doi]
- Reducing Sensor Failure and Ensuring Scheduling Fairness for Online Charging in Heterogeneous Rechargeable Sensor NetworksJiaxian Wu, Shuangjuan Li, Qiong Huang. 1-6 [doi]
- Flush-Detector: More Secure API Resistant to Flush-Based Spectre Attacks on ARM Cortex-A9Min He, Cunqing Ma, Jingquan Ge, Neng Gao, Chenyang Tu. 1-6 [doi]
- Mobile Edge Computing Performance Evaluation using Stochastic Petri NetsDaniel Carvalho, Laécio Rodrigues, Patricia Takako Endo, Sokol Kosta, Francisco Airton Silva. 1-6 [doi]
- Cognitive-LoRa: adaptation-aware of the physical layer in LoRa-based networksLucas Martins Figueiredo, Edelberto Franco Silva. 1-6 [doi]
- SVM Assisted Primary User-Detection for Non-Cooperative Cognitive Radio NetworksKais Bouallegue, Matthieu Crussière, Sofiane Kharbech. 1-5 [doi]
- An E-Health system for data stream analysisDiego A. B. Moreira, Levy G. Chaves, Rafael L. Gomes, Joaquim Celestino Jr.. 1-6 [doi]
- Adaptive Model for Network Resources Prediction in Modern Internet Service ProvidersDyego H. L. Oliveira, Francisco M. V. Filho, Thelmo P. de Araujo, Joaquim Celestino Jr., Rafael L. Gomes. 1-6 [doi]
- An Algorithm to Satisfy the QoS Requirements in a Heterogeneous LoRaWAN NetworkDmitry Bankov, Evgeny M. Khorov, Andrey I. Lyakhov. 1-6 [doi]
- Power Range: Forward Private Multi-Client Symmetric Searchable Encryption with Range Queries SupportAlexandros Bakas, Antonis Michalas. 1-7 [doi]
- Thorough Investigation of multipath Techniques in RPL based Wireless NetworksAna Czarnitzki Estrin, Tomás Lagos Jenschke, Georgios Z. Papadopoulos, J. Ignacio Alvarez-Hamelin, Nicolas Montavont. 1-7 [doi]
- Routing, Modulation, Spectrum and Core Allocation Based on Mapping SchemeEdson Rodrigues, Denis do Rosário, Eduardo Cerqueira, Helder M. N. S. Oliveira. 1-6 [doi]
- Secure Identity Management Framework for Vehicular Ad-hoc Network using BlockchainSonia Alice George, Arunita Jaekel, Ikjot Saini. 1-6 [doi]
- Evaluating the autonomy of children with autism spectrum disorder in washing hands: a deep-learning approachDaniele Berardini, Lucia Migliorelli, Sara Moccia, Marcello Naldini, Gioia De Angelis, Emanuele Frontoni. 1-7 [doi]
- SR-TPP: Extending IPv6 Segment Routing to enable Trusted and Private Network PathsJiang Zhou, Hewu Li, Qian Wu, Zeqi Lai, Jun Liu. 1-6 [doi]
- An Enhanced Scheduling Framework for Elephant Flows in SDN-Based Data Center NetworksBing Huang, Shouling Dong. 1-7 [doi]
- Distributed Time Slots Assignment Protocol in Dynamic NetworksHicham Lakhlef, Ghada Jaber, Abdelmadjid Bouabdallah, Fabio D'Andreagiovanni, Ahmed Lounis. 1-6 [doi]
- The Service Node Placement Problem in Software-Defined Fog NetworksJuan Luis Herrera, Luca Foschini, Jaime Galán-Jiménez, Javier Berrocal. 1-6 [doi]
- 2ch-TCN: A Website Fingerprinting Attack over Tor Using 2-channel Temporal Convolutional NetworksMeiqi Wang, Yanzeng Li, Xuebin Wang, Tingwen Liu, Jinqiao Shi, Muqian Chen. 1-7 [doi]
- A Capsule Network-based for identification of Glaucoma in retinal imagesPatrick Ryan Sales dos Santos, Vitória de Carvalho Brito, Antonio Oseas de Carvalho Filho, Flávio Henrique Duarte de Araújo, Ricardo de Andrade Lira Rabelo, Mano Joseph Mathew. 1-6 [doi]
- Food Grading System Using Support Vector Machine and YOLOv3 MethodsLili Zhu, Petros Spachos. 1-6 [doi]
- Group Key Management in constrained IoT SettingsAlessandro Piccoli, Marc-Oliver Pahl, Lars Wüstrich. 1-6 [doi]
- A Continuous Data Imputation Mechanism based on Streams CorrelationPanagiotis Fountas, Kostas Kolomvatsos. 1-6 [doi]
- Enabling IEEE 802.15.4-2015 TSCH based Wireless Network for Electric Vehicle Battery ManagementGuillaume Le Gall, Nicolas Montavont, Georgios Z. Papadopoulos. 1-6 [doi]
- Energy Efficiency in SDDC: Considering Server and Network UtilitiesBeakal Gizachew Assefa, Öznur Özkasap, Ipek Kizil, Moayad Aloqaily, Ouns Bouachir. 1-6 [doi]
- Anomaly Detection with Deep Graph Autoencoders on Attributed NetworksDali Zhu, Yuchen Ma, YinLong Liu. 1-6 [doi]
- Efficient and Secure Keyed Hash Function Scheme Based on RC4 Stream CipherHassan N. Noura, Ola Salman, Ali Chehab, Raphaël Couturier. 1-7 [doi]
- Domain-Embeddings Based DGA Detection with Incremental Training MethodXin Fang, Xiaoqing Sun, Jiahai Yang, Xinran Liu. 1-6 [doi]
- Towards an Ambient Estimation of Stool Types to Support Nutrition Counseling for People affected by the Geriatric Frailty SyndromePatrick Elfert, Simon Siggelkow, Marco Eichelberg, Andreas Hein. 1-6 [doi]
- Gamification, mHealth and user adherenceRui Carvalho, Diogo Machado, Pedro Brandão. 1-6 [doi]
- A secure domain name resolution and management architecture based on blockchainWenfeng Liu, Yu Zhang 0036, Lu Liu, Shuyan Liu, Hongli Zhang 0001, Binxing Fang. 1-7 [doi]
- An AI-based Visual Attention Model for Vehicle Make and Model RecognitionXiren Ma, Azzedine Boukerche. 1-6 [doi]
- Not Afraid of the Unseen: a Siamese Network based Scheme for Unknown Traffic DiscoveryYutong Chen, Zhen Li, Junzheng Shi, Gaopeng Gou, Chang Liu, Gang Xiong. 1-7 [doi]
- NeuralPot: An Industrial Honeypot Implementation Based On Deep Neural NetworksIlias Siniosoglou, Georgios Efstathopoulos, Dimitrios Pliatsios, Ioannis D. Moscholios, Antonios Sarigiannidis, Georgia Sakellari, Georgios Loukas, Panagiotis G. Sarigiannidis. 1-7 [doi]
- Comparison of secure communication with AES between embedded system and general purpose computerAugusto C. Ferreira, Natassya B. F. Silva. 1-6 [doi]
- Automation of Vulnerability Classification from its Description using Machine LearningMasaki Aota, Hideaki Kanehara, Masaki Kubo, Noboru Murata, Bo Sun, Takeshi Takahash 0001i. 1-7 [doi]
- Telegram Scheduling for the Multifunction Vehicle Bus (MVB): Algorithms and EvaluationMustafa Çaglar Güldiken, Ece Güran Schmidt, Klaus Werner Schmidt. 1-6 [doi]
- Blockchain for Reliability in Collaborative Scientific Workflows on Cloud PlatformsRaiane Coelho, Regina M. M. Braga, José Maria N. David, Mario A. R. Dantas, Victor Ströele, Fernanda Campos. 1-7 [doi]
- COVID-19 Outbreak through Tweeters' Words: Monitoring Italian Social Media Communication about COVID-19 with Text Mining and Word EmbeddingsAndrea Sciandra. 1-6 [doi]
- Exploit Multilingual Language Model at Scale for ICD-10 Clinical Text ClassificationStefano Silvestri, Francesco Gargiulo 0001, Mario Ciampi, Giuseppe De Pietro. 1-7 [doi]
- Joulin: Blockchain-based P2P Energy Trading Using Smart ContractsBerrak Perk, Can Bayraktaroglu, Engin Deniz Dogu, Faizan Safdar Ali, Öznur Özkasap. 1-6 [doi]
- Efficient File Collections for Embedded DevicesSudarshan S. Chawathe. 1-6 [doi]
- A High-Throughput LDPC Decoder Based on GPUs for 5G New RadioRongchun Li, Xin Zhou, Hengyue Pan, Huayou Su, Yong Dou. 1-7 [doi]
- AWMF: All-Weighted Metric Factorization for Collaborative RankingZijin Chen, Hui Tian 0003, Gaofeng Nie, Baoling Liu. 1-6 [doi]
- Exploiting AS-level Routing Properties to Locate Traffic Differentiation in the InternetThiago Garrett, Luis C. E. Bona, Elias P. Duarte. 1-6 [doi]
- Performance Overhead of Atomic Crosschain TransactionsPeter Robinson 0007. 1-6 [doi]
- Speed Based Distributed Congestion Control Scheme for Vehicular NetworksCaitlin Facchina, Arunita Jaekel. 1-4 [doi]
- Fog and IoT-based Remote Patient Monitoring Architecture Using Speech RecognitionMarc Jayson Baucas, Petros Spachos. 1-6 [doi]
- Improving Machine Learning Algorithm Processing Time in Tele-Rehabilization Through a NoSQL Graph Database Approach: A Preliminary StudyAntonio Celesti, Fabrizio Celesti, Antonino Galletta, Maria Fazio, Massimo Villari. 1-6 [doi]
- Dynamic User Count Aware Resource Allocation for Network Slicing in Virtualized Radio Access NetworksCeren Canpolat, Ece Güran Schmidt. 1-6 [doi]
- A cloud-based REST platform for real-time health resources availability registering, discovering and matching in pandemic crisis conditionsEvangelos Boutas, Charalambia Boulougari, Vasileios Anastasopoulos, Ismini Veneti, George Kousiouris. 1-6 [doi]
- An Efficient and Anonymous Blockchain-Based Data Sharing Scheme for Vehicular NetworksDjamel Eddine Kouicem, Abdelmadjid Bouabdallah, Hicham Lakhlef. 1-6 [doi]
- Ensemble Learning Based Sleeping Cell Detection in Cloud Radio Access NetworksZhao Ming, Chuan Sun, Xiuhua Li, Qilin Fan, Xiaofei Wang, Victor C. M. Leung. 1-6 [doi]
- Foiling Sybils with HAPS in Permissionless Systems: An Address-based Peer Sampling ServiceAmaury Bouchra Pilet, Davide Frey, François Taïani. 1-6 [doi]
- A Dynamic Approach for Managing Heterogeneous Wireless Networks in Smart EnvironmentsYara Mahfood Haddad, Hesham H. Ali. 1-7 [doi]
- Untangling between fake-news and truth in social media to understand the Covid-19 CoronavirusMarco Furini, Silvia Mirri, Manuela Montangero, Catia Prandi. 1-6 [doi]
- A Computational Model and Algorithm to Identify Social Isolation in Elderly PopulationPooya Moradian Zadeh, Saghi Khani, Kathryn Pfaff, Saeed Samet. 1-6 [doi]
- A Performance Analysis of Adaptive Streaming Algorithms in 5G Vehicular Communications in Urban ScenariosCarlos Renato Storck, Fatima de L. P. Duarte-Figueiredo. 1-7 [doi]
- Evaluation of Strategies for Emergency Message Dissemination in VANETsMónica Marques, Carlos R. Senna, Susana Sargento. 1-6 [doi]
- Improving the Recognition of Sign Language from Acquired Data by Wireless Body Area NetworkAymen Shaafi, Osman Salem, Ahmed Mehaoua. 1-6 [doi]
- HS-AUTOFIT: a highly scalable AUTOFIT application for Cloud and HPC environmentsAntonio Corradi, Giuseppe Di Modica, Luca Evangelisti, Anna Fiorini, Luca Foschini, Luca Zerbini. 1-6 [doi]
- Obstacle Detection based on Cooperative-Intelligent Transport System DataBrice Leblanc, Hacène Fouchal, Cyril De Runz. 1-6 [doi]
- Using DenseNet for IoT multivariate time series classificationJoseph Azar, Abdallah Makhoul, Raphaël Couturier. 1-6 [doi]
- CES2Vec: A Confidentiality-Oriented Word Embedding for Confidential Information DetectionJianguo Jiang, Yue Lu, Min Yu, Gang Li 0009, Chao Liu, Shaohua An, Weiqing Huang. 1-7 [doi]
- A Decentralized System for Fair Token Distribution and Seamless Users OnboardingFrancesco Bruschi, Manuel Tumiati, Vincenzo Rana, Mattia Bianchi, Donatella Sciuto. 1-6 [doi]
- Inference Time Optimization Using BranchyNet PartitioningRoberto Goncalves Pacheco, Rodrigo S. Couto. 1-6 [doi]
- Improving charging performance for wireless rechargeable sensor networks based on charging UAVs: a joint optimization approachSongyang Li, Aimin Wang, Geng Sun, Lingling Liu. 1-7 [doi]
- Bandwidth Aggregation over Multihoming LinksAdrian Sterca, Darius Bufnea, Virginia Niculescu. 1-7 [doi]
- Incremental Deployment of Programmable Switches for Sketch-based Network MeasurementYang Shi, Mei Wen, Chunyuan Zhang. 1-7 [doi]
- Block-Diagonal Zero-Forcing Beamforming for Weighted Sum-Rate Maximization in Multi-User Massive MIMO SystemsSiyuan Lu, Shengjie Zhao, Qingjiang Shi. 1-6 [doi]
- Dynamic Routing with Online Traffic Estimation for Video Streaming over Software Defined NetworksRiqiang Liu, Melike Erol-Kantarci. 1-6 [doi]
- A Feedback Mechanism for Prediction-based Anomaly Detection In Content Delivery NetworksZhilei Liu, Tao Lin, Liang Dai, Jiyan Sun, Yanjie Hu, Yan Zhang, Zhen Xu. 1-7 [doi]
- Attesting L-3 General Program Anomaly Detection Efficiency with SPADAFrancis B. Moreira, Danilo Carastan-Santos, Philippe O. A. Navaux. 1-6 [doi]
- A Vehicle-Centric Probabilistic Approach to Virtual Cell Management in Ultra-Dense 5G NetworksCarlos Renato Storck, Guilherme G. de O. Silva, Fatima de L. P. Duarte-Figueiredo. 1-7 [doi]
- Real-Time Automatic Air Pollution Services from IOT Data NetworkClaudio Badii, Stefano Bilotta, Daniele Cenni, Angelo Difino, Paolo Nesi, Irene Paoli, Michela Paolucci. 1-6 [doi]
- Tokenization and Blockchain Tokens Classification: a morphological frameworkPierluigi Freni, Enrico Ferro, Roberto Moncada. 1-6 [doi]
- A network performance view of a biobanking system for diagnostic imagesGiusy Esposito, Giulio Pagliari, Gianluca Coppola, Marco Aiello 0003, Marco Salvatore, Giuseppe Aceto, Antonio Pescapè. 1-7 [doi]
- Finding Persistent Elements of Anomalous Flows in Distributed Monitoring SystemsZhen Cao, Yu-e Sun, He Huang 0001, Hansong Guo, Yang Du 0006, An Liu, Le Lu 0007. 1-7 [doi]
- MalFinder: An Ensemble Learning-based Framework For Malicious Traffic DetectionCandong Rong, Gaopeng Gou, Mingxin Cui, Gang Xiong, Zhen Li, Li Guo. 1-7 [doi]
- Context-Aware Operation for Unmanned Systems with HAMSTERMariana Rodrigues, Daniel F. Pigatto, Kalinka R. L. J. C. Branco. 1-6 [doi]
- Exploratory Analysis of Public Transportation Data of Curitiba, BrazilKarla K. Hashiguchi, Bruno de F. Gai, Daniel F. Pigatto, Keiko V. O. Fonseca. 1-6 [doi]
- A mHealth solution for contact-less self-monitoring of blood oxygen saturationGabriella Casalino, Giovanna Castellano, Gianluca Zaza. 1-7 [doi]
- Data Driven Network Performance Inference From Within The BrowserImane Taibi, Yassine Hadjadj Aoul, Chadi Barakat. 1-6 [doi]
- Increasing the efficiency of Fog Nodes through of Priority-based Load BalancingEder Paulo Pereira, Edson Luiz Padoin, Roseclea Duarte Medina, Jean-François Méhaut. 1-6 [doi]
- Improving Survivability of LEO Satellite Network with Guaranteed Based ApproachesShaoqing Wang, Youjian Zhao, Hui Xie. 1-6 [doi]
- ResTor: A Pre-Processing Model for Removing the Noise Pattern in Flow CorrelationZhong Guan, Gang Xiong, Zhen Li, Gaopeng Gou. 1-6 [doi]
- Bringing Fairness in LoRaWAN through SF Allocation OptimizationChristelle Caillouet, Martin Heusse, Franck Rousseau. 1-6 [doi]
- Predictive Models for Mitigating COVID-19 OutbreakAntoine B. Bagula, Hloniphani Maluleke, Olasupo Ajayi, Amani Bagula, Nancy Bagula, Moise Bagula. 1-7 [doi]
- Knowledge-Based Machine Learning Boosting for Adversarial Task Detection in Mobile CrowdsensingMurat Simsek, Burak Kantarci, Azzedine Boukerche. 1-7 [doi]
- Identifying Impacts of Protocol and Internet Development on the Bitcoin NetworkRyunosuke Nagayama, Ryohei Banno, Kazuyuki Shudo. 1-6 [doi]
- Sensitive Data Exchange Protocol Suite for HealthcareThibaud Ecarot, Benoît Fraikin, Francis Ouellet, Luc Lavoie, Mark M. McGilchrist, Jean-François Ethier. 1-7 [doi]
- Towards Comprehensive Detection of DNS TunnelsMeng Luo, Qiuyun Wang, Yepeng Yao, Xuren Wang, Peian Yang, Zhengwei Jiang. 1-7 [doi]
- A Multivariate Time Series Prediction Schema based on Multi-attention in recurrent neural networkXiang Yin, Yanni Han, Hongyu Sun, Zhen Xu, Haibo Yu, Xiaoyu Duan. 1-7 [doi]
- On securing IoT from Deep Learning perspectiveYazan Otoum, Amiya Nayak. 1-7 [doi]
- Priority Based Traffic Pre-emption System for Medical Emergency Vehicles in Smart CitiesOlasupo Ajayi, Antoine B. Bagula, Ifeoma Chukwubueze, Hloniphani Maluleke. 1-7 [doi]
- A Decision Support System for Therapy Prescription in a Hospital CentreArmando Ruggeri, Maria Fazio, Antonino Galletta, Antonio Celesti, Massimo Villari. 1-4 [doi]
- On the Efficiency of Decentralized File Storage for Personal Information Management SystemsMirko Zichichi, Stefano Ferretti, Gabriele D'Angelo. 1-6 [doi]
- On the Robustness of Deep Learning-predicted Contention Models for Network CalculusFabien Geyer, Steffen Bondorf. 1-7 [doi]
- A Parallel Graph Partitioning Approach to Enhance Community Detection in Social NetworksTales Lopes, Victor Ströele, Mario A. R. Dantas, Regina M. M. Braga, Jean-François Méhaut. 1-6 [doi]
- On the Applicability of Secret Share Algorithms for Osmotic ComputingAntonino Galletta, Maria Fazio, Antonio Celesti, Massimo Villari. 1-6 [doi]
- Parkinson's Disease Diagnosis: Towards Grammar-based Explainable Artificial IntelligenceF. Cavaliere, Antonio Della Cioppa, Angelo Marcelli, Antonio Parziale, Rosa Senatore. 1-6 [doi]
- Service Migration for Connected Autonomous VehiclesLucas Pacheco, Helder M. N. S. Oliveira, Denis do Rosário, Eduardo Cerqueira, Leandro Villas, Torsten Braun. 1-6 [doi]
- Remote Speech Extraction from Speckle Image by Convolutional Neural NetworkDali Zhu, Long Yang, Zhanxun Li, Hualin Zeng. 1-6 [doi]
- On Scalable Delay Bound Evaluation with Stochastic Network CalculusYue Han, Mingwu Yao, Jungang Yang, Yongjian luo, Xuefang Liu. 1-6 [doi]
- Task Distribution Based on Variable-Order Markov Position Estimation in Mobile Sensor NetworksLi Zhang, Shukui Zhang, Yang Zhang, Wei Tuo, Ye Tao, Mengli Dang. 1-7 [doi]
- A Predictive Machine Learning Model to Determine Alcohol Use DisorderAli Ebrahimi, Uffe Kock Wiil, Kjeld Andersen, Marjan Mansourvar, Anette Søgaard Nielsen. 1-7 [doi]
- RenewLedger : Renewable energy management powered by Hyperledger FabricNikita Karandikar, Antorweep Chakravorty, Chunming Rong. 1-6 [doi]
- SLA-Aware Routing Strategy for Multi-Tenant Software-Defined NetworksAli Malik, Ruairí de Fréin. 1-7 [doi]
- A data visualization interactive exploration of human mobility data during the COVID-19 outbreak: a case studyMiguel Ribeiro, Valentina Nisi, Catia Prandi, Nuno Nunes 0001. 1-6 [doi]
- Evaluation of data balancing techniques in 3D CNNs for the classification of pulmonary nodules in CT imagesThiago José Barbosa Lima, Flávio Henrique Duarte de Araiújo, Antonio Oseas de Carvalho Filho, Ricardo de Andrade Lira Rabelo, Rodrigo de Melo Souza Veras, Mano Joseph Mathew. 1-6 [doi]
- Experimental testing of the performance of packet dropping schemesMarek Barczyk, Andrzej Chydzinski. 1-7 [doi]
- Efficient Malware Originated Traffic Classification by Using Generative Adversarial NetworksZhicheng Liu, Shuhao Li, Yongzheng Zhang 0002, Xiaochun Yun, Zhenyu Cheng 0001. 1-7 [doi]
- Managing Consensus-Based Cooperative Task Allocation for IIoT NetworksCarlos Pedroso, Yan Uehara de Moraes, Michele Nogueira, Aldri Santos. 1-6 [doi]
- Mapping Network Traffic Dynamics in the Complexity-Entropy PlaneCristopher G. S. Freitas, Osvaldo A. Rosso, André L. L. de Aquino. 1-6 [doi]
- SILU: Strategy Involving Large-scale Unlabeled Logs for Improving Malware DetectorTaishi Nishiyama, Atsutoshi Kumagai, Kazunori Kamiya, Kenji Takahashi. 1-7 [doi]
- Spatial Modulation under Vehicular Rayleigh Fading ChannelsYazid M. Khattabi, Salim Abdelkareem Alkhawaldeh. 1-6 [doi]
- Binding of Endpoints to Identifiers by On-Chain ProofsDiego Pennino, Maurizio Pizzonia, Andrea Vitaletti, Marco Zecchini. 1-6 [doi]
- Task Offloading for Automatic Speech Recognition in Edge-Cloud Computing Based Mobile NetworksShitong Cheng, Zhenghui Xu, Xiuhua Li, Xiongwei Wu, Qilin Fan, Xiaofei Wang 0001, Victor C. M. Leung. 1-6 [doi]
- Performance of New Monitoring Architectures for Underwater Oil/Gas Pipeline using Hyper-SensorsHuda Aldosari, Raafat S. Elfouly, Reda Ammar, Mohammad Alsulami. 1-6 [doi]
- GIN: Better going safe with personalized routesLucas Zanco Ladeira, Allan Mariano de Souza, Heitor S. Ramos, Leandro Aparecido Villas. 1-6 [doi]
- AFT-Anon: A scaling method for online trace anonymization based on anonymous flow tablesChunjing Han, Kunkun Sun, Haina Tang, Yulei Wu, Xiaodan Zhang. 1-7 [doi]
- An Incentive Mechanism for Improving Energy Efficiency of Colocation Data Centers Based on Power PredictionCe Chi, Kaixuan Ji, Avinab Marahatta, Fa Zhang, Youshi Wang, Zhiyong Liu 0002. 1-6 [doi]
- Cache Efficient Louvain with Local RCMSanaz Gheibi, Tania Banerjee, Sanjay Ranka, Sartaj Sahni. 1-6 [doi]
- Air Quality Control through Bike Sharing FleetsStefan Ciprian Voinea, Armir Bujari, Claudio Enrico Palazzi. 1-4 [doi]
- Intelligent Malicious URL Detection with Feature AnalysisYu-Chen Chen, Yi-Wei Ma, Jiann-Liang Chen. 1-5 [doi]
- Edge Virtualization in Multihomed Vehicular NetworksMiguel Silva, Miguel Luís, Susana Sargento. 1-6 [doi]
- Server-Based Secure Key Management for the IEEE 802.15.6 standardTariq Benmansour, Samira Moussaoui, Toufik Ahmed, Oussama Boutaghou. 1-6 [doi]
- A Novel Caching Strategy in Social Content-Centric Networking with Mobile Edge ComputingDali Zhu, Jie Liang, Haitao Liu, Heng Ping, Ting Li, Hangsheng Zhang, Liru Geng, YinLong Liu. 1-6 [doi]
- On the Computation of Integrals of Bivariate Gaussian DistributionVincent Savaux, Luc Le Magoarou. 1-6 [doi]
- Hierarchical Path Computation With Flexible Ethernet In Multi-layer Multi-domain NetworksDahina Koulougli, Kim Khoa Nguyen, Mohamed Cheriet. 1-6 [doi]
- Performance and Cost-aware HPC in Clouds: A Network Interconnection AssessmentAnderson M. Maliszewski, Eduardo Roloff, Emmanuell D. Carreño, Dalvan Griebler, Luciano Paschoal Gaspary, Philippe O. A. Navaux. 1-6 [doi]
- CoMP: Efficient Monitoring for Constrained Embedded DevicesYago Fontoura do Rosário, Xenofon Fafoutis. 1-7 [doi]
- Semantic Fusion-based Pedestrian Detection for Supporting Autonomous VehiclesMingzhi Sha, Azzedine Boukerche. 1-6 [doi]
- Trail: A Blockchain Architecture for Light NodesRyunosuke Nagayama, Ryohei Banno, Kazuyuki Shudo. 1-7 [doi]
- HARQ-aware allocation of computing resources in C-RANFrancesca Bassi, Hatem Ibn-Khedher. 1-6 [doi]
- A proximity-based indoor navigation system tackling the COVID-19 social distancing measuresMaria Fazio, Alina Buzachis, Antonino Galletta, Antonio Celesti, Massimo Villari. 1-6 [doi]
- Defense Against Advanced Persistent Threats: Optimal Network Security Hardening Using Multi-stage Maze Network GameHangsheng Zhang, Haitao Liu, Jie Liang, Ting Li, Liru Geng, YinLong Liu, Shujuan Chen. 1-6 [doi]
- Pushing 6TiSCH Minimal Scheduling Function (MSF) to the LimitsDavid Hauweele, Remous-Aris Koutsiamanis, Bruno Quoitin, Georgios Z. Papadopoulos. 1-7 [doi]
- JumpEstimate: a Novel Black-box Countermeasure to Website Fingerprint Attack Based on Decision-boundary ConfusionWei Cai, Gaopeng Gou, Peipei Fu, Minghao Jiang, Zhen Li 0011, Gang Xiong. 1-7 [doi]
- On the Performance Evaluation of LoRaWAN with Re-transmissions under JammingIvan Martinez, Fabienne Nouvel, Samer Lahoud, Philippe Tanguy, Melhem El Helou. 1-7 [doi]
- Opportunistic Data Gathering in IoT Networks using Discrete OptimizationEdvar Afonso, Miguel Elias M. Campista. 1-6 [doi]
- Data Mining applied to the navigation task in autonomous robotsCarlos Fransley Scatambulo Costa, Eduardo Alexandre Franciscon. 1-6 [doi]
- Game Theory Approach in Multi-agent Resources SharingTangui Le Gléau, Xavier Marjou, Tayeb Lemlouma, Benoit Radier. 1-6 [doi]
- The Understanding and Forecast of AS-Level Anycast Path InflationYan Yang, Xingang Shi, Xia Yin, Zhiliang Wang, Xingyu Zhou. 1-7 [doi]
- A secure and lightweight three-factor authentication and key generation scheme for direct communication between healthcare professionals and patient's WMSNAmal Sammoud, Mohamed Aymen Chalouf, Omessaad Hamdi, Nicolas Montavont, Ammar Bouallègue. 1-6 [doi]
- High-Resolution Physiological Stress Prediction Models based on Ensemble Learning and Recurrent Neural NetworksFlavio Di Martino, Franca Delmastro. 1-6 [doi]
- The Bisq DAO: On the Privacy Cost of ParticipationLiam Hickey, Martin Harrigan. 1-6 [doi]
- A Proactive-Restoration Technique for SDNsAli Malik, Ruairí de Fréin. 1-6 [doi]
- Towards an Extensible IoT Security TaxonomyLars Wüstrich, Marc-Oliver Pahl, Stefan Liebald. 1-6 [doi]
- MOP: A Novel Mobility-Aware Opportunistic Routing Protocol for Connected VehiclesClayson Celes, Azzedine Boukerche, Antonio A. F. Loureiro. 1-6 [doi]
- A Novel Method for the Synthetic Generation of Non-I.I.D Workloads for Cloud Data CentersFurkan Koltuk, Ece Güran Schmidt. 1-6 [doi]
- What influences sentiment analysis on social networks: a case studyGiacomo Mambelli, Catia Prandi, Silvia Mirri. 1-6 [doi]
- STUART: ReSilient archiTecture to dynamically manage Unmanned aeriAl vehicle networks under atTackIsadora G. Ferrão, Daniel F. Pigatto, João V. C. Fontes, Natassya B. F. Silva, David Espes, Catherine Dezan, Kalinka R. L. J. C. Branco. 1-6 [doi]
- Smart Contract Designs on Blockchain ApplicationsAlkhansaa Abuhashim, Chiu C. Tan 0001. 1-4 [doi]
- DRIVE: A Digital Network Oracle for Cooperative Intelligent Transportation SystemsIoannis Mavromatis, Robert J. Piechocki, Mahesh Sooriyabandara, Arjun Parekh. 1-7 [doi]
- From Name-Centric to Information-Centric NetworkingSimona Colucci, Luigi Alfredo Grieco, Agnese V. Ventrella, Eugenio Di Sciascio. 1-6 [doi]
- Drift Correction for the Software-based Clock Synchronization on Controller Area NetworkMurat Akpinar, Ece Güran Schmidt, Klaus Werner Schmidt. 1-6 [doi]
- A fog architecture for privacy-preserving data provenance using blockchainsFilipe Lautert, Daniel F. Pigatto, Luiz Celso Gomes Jr.. 1-6 [doi]
- Reluplex made more practical: Leaky ReLUJin Xu, ZiShan Li, Bowen Du, Miaomiao Zhang, Jing Liu 0012. 1-7 [doi]
- Security and Performance Evaluation of Master Node Protocol in the Bitcoin Peer-to-Peer NetworkMuntadher Fadhil Sallal, Gareth Owenson, Mo Adda. 1-6 [doi]
- PIV4DB: Probabilistic Integrity Verification for Cloud DatabaseLi Zhu, Pingjian Wang, Xiaozhuo Gu, Yuewu Wang, Jingqiang Lin. 1-7 [doi]
- Reducing Sparse Motion Artifacts in MR-Thermometry Using Robust Principal Component AnalysisAlaleh Alivar, Pegah Faridi, Balasubramaniam Natarajan, Punit Prakash. 1-4 [doi]
- EdgeKV: Distributed Key-Value Store for the Network EdgeKarim Sonbol, Öznur Özkasap, Ibrahim Al-Oqily, Moayad Aloqaily. 1-6 [doi]
- Dicoogle Framework for Medical Imaging Teaching and ResearchRui Lebre, Eduardo Pinho, Jorge Miguel Silva, Carlos Costa 0001. 1-7 [doi]
- A Web-based Information System for the Management of ICU Beds During the Coronavirus OutbreakItamir de Morais Barroca Filho, Silvio Costa Sampaio, Anderson Paiva Cruz, Victor Hugo Freire Ramalho, Jefferson Augusto Rodrigues de Azevedo, Átila Caetano da Silveira. 1-4 [doi]
- NDM: Network Driving IP Mobility Support in Large Scale LEO Satellite NetworkWenying Dai, Hewu Li, Qian Wu, Xiaomo Wang. 1-7 [doi]
- Adaptive Sensing Algorithm for IoT Applications with Data and Temporal Accuracy RequirementsTayeb Lemlouma. 1-7 [doi]
- Reliability and Low Latency: Impact of The ArchitectureTania Alhajj, Xavier Lagrange. 1-6 [doi]
- A Hardware/Software Collaborative SM4 Implementation Resistant to Side-channel Attacks on ARM-FPGA Embedded SoCPing Peng, Cunqing Ma, Jingquan Ge, Neng Gao, Chenyang Tu. 1-7 [doi]
- In-Network Placement of Security VNFs in Multi-Tenant Data CentersAbeer Ali, Christos Anagnostopoulos, Dimitrios P. Pezaros. 1-6 [doi]
- A Stackelberg Game Approach for Incentive V2V Caching in Software-Defined 5G-enabled VANETAhmed Alioua, Samiha Simoud, Sihem Bourema, Manel Khelifi, Sidi-Mohammed Senouci. 1-6 [doi]
- IANVS: A Moving Target Defense Framework for a Resilient Internet of ThingsRenzo E. Navas, Håkon Sandaker, Frédéric Cuppens, Nora Cuppens, Laurent Toutain, Georgios Z. Papadopoulos. 1-6 [doi]
- Decentralized Social Media Applications as a Service: a Car-Sharing PerspectiveAnandhakumar Palanisamy, Mirsat Sefidanoski, Spiros Koulouzis, Carlos Rubia, Nishant Saurabh, Radu Prodan. 1-7 [doi]
- NCZKP Based Privacy-Preserving Authentication Scheme for the Untrusted Gateway Node Smart Home EnvironmentWenzheng Liu, Xiaofeng Wang 0002, Wei Peng 0005. 1-6 [doi]
- High Precision Deep Learning-Based Tabular Position DetectionJiChu Jiang, Murat Simsek, Burak Kantarci, Shahzad Khan. 1-7 [doi]
- An Efficient Heuristic LoRaWAN Adaptive Resource Allocation for IoT ApplicationsJean Moraes, Nagib Matni, André Riker, Helder M. N. S. Oliveira, Eduardo Cerqueira, Cristiano Both, Denis do Rosário. 1-6 [doi]
- Efficient Cloud-based Secret Shuffling via Homomorphic EncryptionKilian Becher, Thorsten Strufe. 1-7 [doi]
- Contactless Walking Recognition based on mmWave RADARLinda Senigagliesi, Gianluca Ciattaglia, Ennio Gambi. 1-4 [doi]
- UAV-based Surveillance System: an Anomaly Detection ApproachAmira Chriki, Haifa Touati, Hichem Snoussi, Farouk Kamoun. 1-6 [doi]
- Using Deep Learning to Replace Domain KnowledgeChristian Lübben, Marc-Oliver Pahl, Mohammad Irfan Khan. 1-6 [doi]
- K-Cipher: A Low Latency, Bit Length Parameterizable CipherMichael E. Kounavis, Sergej Deutsch, Santosh Ghosh, David Durham. 1-7 [doi]
- Scheduling of Wireless Charging Tasks with Precedence ConstraintsLanlan Li, Linfeng Yue, Haipeng Dai, Nan Yu, Guihai Chen. 1-6 [doi]
- DPVGeo: Delay-based Public Verification of Cloud Data GeolocationDongzheng Jia, Yang Zhang, Shijie Jia, Limin Liu, Jingqiang Lin. 1-7 [doi]
- Covid-19: A Digital Transformation Approach to a Public Primary Healthcare EnvironmentMateus Gonçalo do Nascimento, Gabriel Iorio, Thiago G. Thomé, Alvaro A. M. Medeiros, Fabricio M. Mendonça, Fernanda C. A. Campos, José M. David, Victor Ströele, Mario A. R. Dantas. 1-6 [doi]
- Survey on the Cloud-IoT paradigms: Taxonomy and architecturesMohamed redha Bouakouk, Abdelkrim Abdelli, Lynda Mokdad. 1-6 [doi]
- Efficient Model Solving for Markov Decision ProcessesAdrian E. Sapio, Shuvra S. Bhattacharyya, Marilyn Wolf. 1-5 [doi]
- Reliability through modulation diversity: can combining multiple IEEE 802.15.4-2015 SUN modulations improve PDR?Pere Tuset-Peiró, Ferran Adelantado, Xavier Vilajosana, Ruan Delgado Gomes. 1-6 [doi]
- Diagnosis of COVID-19 in CT image using CNN and XGBoostEdson Damasceno Carvalho, Antônio Oséas de Carvalho Filho, Flávio Henrique Duarte de Araújo, Ricardo de Andrade Lira Rabelo. 1-6 [doi]
- Performance Comparisons of NB-IoT, LTE Cat-M1, Sigfox, and LoRa Moving at High Speeds in the AirShie-Yuan Wang, Jui-En Chang, Hsin Fan, Yi-Hsiu Sun. 1-6 [doi]