Abstract is missing.
- NeVe: A Log-based Fast Incremental Network Feature Embedding ApproachRan Tian, Zulong Diao, Haiyang Jiang, Gaogang Xie. 1-7 [doi]
- Automatic Parameter Tuning for Big Data Pipelines with Deep Reinforcement LearningHoussem Sagaama, Nourchene Ben Slimane, Maher Marwani, Sabri Skhiri. 1-7 [doi]
- Dependable Reinforcement Learning via Timed Differential Dynamic LogicRunhao Wang, Yuhong Zhang, Haiying Sun, Jing Liu. 1-6 [doi]
- Data Aggregation for Privacy Protection of Data Streams Between Autonomous IoT NetworksRenato Caminha Juaçaba-Neto, Pascal Mérindol, Fabrice Theoleyre. 1-6 [doi]
- Output Security for Multi-user Augmented Reality using Federated Reinforcement LearningFengchao Wang, Yanwei Liu, Jinxia Liu, Antonios Argyriou, Liming Wang, Zhen Xu. 1-7 [doi]
- OverlapShard: Overlap-based Sharding MechanismYanan Liu, Huiping Sun, Xu Song, Zhong Chen 0001. 1-7 [doi]
- Towards Smart Tele-Biomedical Laboratory: Where We Are, Issues, and Future ChallengesAgata Romano, Rosaria Lanza, Fabrizio Celesti, Antonio Celesti, Maria Fazio, Francesco Martella, Antonino Galletta, Massimo Villari. 1-4 [doi]
- Proportional representation to increase data utility in k-anonymous tablesFabien Viton, Clémence Mauger, Gilles Dequen, Jean-Luc Guérin, Gaël Le Mahec. 1-7 [doi]
- A Joint Optimization Approach for UAV-enabled Collaborative BeamformingYanheng Liu, Tingting Zheng, Geng Sun, Jing Zhang, Jiahui Li. 1-6 [doi]
- Virtual Network Function Placement Based on Differentiated Weight Graph Convolutional Neural Network and Maximal Weight MatchingZeyuan Yang, Rentao Gu, Yuefeng Ji. 1-7 [doi]
- Identification of IoT Devices Based on Feature Vector SplitRuizhong Du, Shuang Li. 1-6 [doi]
- Towards Improving Fuzzer Efficiency for the MQTT ProtocolLuis Gustavo Araujo Rodriguez, Daniel Macêdo Batista. 1-7 [doi]
- BS-Net: A Behavior Sequence Network for Insider Threat DetectionDali Zhu, Hongju Sun, Nan Li, Baoxin Mi, Tong Xi. 1-6 [doi]
- A novel MLP based on compensation method for the effects of High Power Amplifier N onlinearities in Non-Linear SCMA systemsImen Abidi, Maha Cherif, Moez Hizem, Iness Ahriz, Ridha Bouallegue. 1-6 [doi]
- Deep Reinforcement Learning for Content Caching Optimization in the Internet of VehiclesAnas Knari, Mohammed-Amine Koulali, Ahmed Khoumsi. 1-6 [doi]
- FLPhish: Reputation-based Phishing Byzantine Defense in Ensemble Federated LearningBeibei Li, Peiran Wang, Hanyuan Huang, Shang Ma, Yukun Jiang. 1-6 [doi]
- Hard Disk Failure Prediction Based on Lightgbm with CIDHengrui Wang, Yahui Yang, Hongzhang Yang. 1-7 [doi]
- A Microservices and Blockchain Based One Time Password (MBB-OTP) Protocol for Security-Enhanced AuthenticationAlessio Catalfamo, Armando Ruggeri, Antonio Celesti, Maria Fazio, Massimo Villari. 1-6 [doi]
- A DICOM Standard Pipeline for Microscope Imaging ModalitiesYubraj Gupta, Carlos Costa 0001, Eduardo Pinho, Luís A. Bastião Silva. 1-6 [doi]
- Analysis of Comorbidities of Alcohol Use DisorderAli Ebrahimi, Uffe Kock Wiil, Marjan Mansourvar, Amin Naemi, Kjeld Andersen, Anette Søgaard Nielsen. 1-7 [doi]
- Join-Me: A Framework for integrating Service Providers and Mobile Network OperatorsAlexandre Martins G. De Deus, Eduardo P. Julio, Marcelo F. Moreno. 1-7 [doi]
- An Extended Comparison of RSSI-based Position Estimation Algorithms for LoRa DevicesLuis Felipe Borges Morão De Oliveira, João Deluca Figueiro Costa, João Vitor de Carvalho Fontes. 1-6 [doi]
- Cross-Language Plagiarism Detection Model Based On Multiple FeaturesGang Liu, Yichao Dong, Guangxi Li. 1-7 [doi]
- On Improving SimBlock Blockchain SimulatorMariano Basile, Giovanni Nardini, Pericle Perazzo, Gianluca Dini. 1-6 [doi]
- Lightweight Deep Learning Applications on AVX-512André Ramos Carneiro, Matheus da Silva Serpa, Philippe O. A. Navaux. 1-6 [doi]
- Encrypted 5G Over- The- Top Voice Traffic Identification Based on Deep LearningZhuang Qiao, Liuqun Zhai, Shunliang Zhang, Xiaohui Zhang. 1-7 [doi]
- An N-Tier Fog Architecture for Smart FarmingGabriele Penzotti, Stefano Caselli, Michele Amoretti. 1-7 [doi]
- Holder-of-key threshold access token for anonymous data resourcesMicael Pedrosa, Rui Lebre, Carlos Costa 0001. 1-7 [doi]
- Systematic evaluation of abnormal detection methods on gas well sensor dataXichen Tang, JinLong Wang, Ye Zhu 0002, Robin Doss, Xin Han. 1-6 [doi]
- RBA: Adaptive TCP Receive Buffer SizingQingkai Meng, Kun Qian 0004, Wenxue Cheng, Fengyuan Ren. 1-7 [doi]
- Min Hop and Foremost Paths in Interval Temporal GraphsAnuj Jain, Sartaj Sahni. 1-7 [doi]
- Simulating and Predicting the Active Cases and Hospitalization Considering the Second Wave of COVID-19Shaon Bhatta Shuvo, Bonaventure Chidube Molokwu, Samaneh Miri Rostami, Ziad Kobti, Anne W. Snowdon. 1-6 [doi]
- Potential Risk Detection System of Hyperledger Fabric Smart Contract based on Static AnalysisPenghui Lv, Yu Wang, Yazhe Wang, Qihui Zhou. 1-7 [doi]
- Big Data Pipelines on the Computing Continuum: Ecosystem and Use Cases OverviewDumitru Roman, Nikolay Nikolov, Ahmet Soylu, Brian Elvesæter, Hui Song, Radu Prodan, Dragi Kimovski, Andrea Marrella, Francesco Leotta, Mihhail Matskin, Giannis Ledakis, Konstantinos Theodosiou, Anthony Simonet-Boulogne, Fernando Perales, Evgeny Kharlamov, Alexandre Ulisses, Arnor Solberg, Raffaele Ceccarelli. 1-4 [doi]
- FastHorovod: Expediting Parallel Message-Passing Schedule for Distributed DNN TrainingYanghai Wang, Dezun Dong, Yemao Xu, Shuo Ouyang, Xiangke Liao. 1-7 [doi]
- Improving classification accuracy of acoustic real-world urban data using sensors physical redundancyEster Vidaña-Vila, Rosa Maria Alsina-Pagès, Joan Navarro. 1-4 [doi]
- Determining the Probability Distribution of Execution TimesMatheus Henrique Junqueira Saldanha, Adriano Kamimura Suzuki. 1-6 [doi]
- UrbanVG: A Gamification Encouraging Urban Vegetable Garden PlatformMateus T. Kawazoe, André G. Lauer, Natassya B. F. Silva. 1-6 [doi]
- Apriori-Roaring-Parallel: Frequent pattern mining based on compressed bitmaps with OpenMPAlexandre Colombo, Roberta Spolon Ulson, Renata Spolon Lobato, Aleardo Manacero, Marcos Antônio Cavenaghi. 1-6 [doi]
- Blind Faith: Privacy-Preserving Machine Learning using Function ApproximationTanveer Khan, Alexandros Bakas, Antonis Michalas. 1-7 [doi]
- UTANSA: Static Approach for Multi-Language Malicious Web Scripts DetectionWeiqing Huang, Chenggang Jia, Min Yu, Gang Li, Chao Liu 0020, Jianguo Jiang. 1-7 [doi]
- Differentially Privacy-Preserving Federated Learning Using Wasserstein Generative Adversarial NetworkYichen Wan, Youyang Qu, Longxiang Gao, Yong Xiang 0001. 1-6 [doi]
- firm VulSeeker: BERT and Siamese based Vulnerability for Embedded Device Firmware ImagesYingchao Yu, Shuitao Gan, Xiaojun Qin. 1-7 [doi]
- GOFS: Geo-distributed Scheduling in OpenFaaSFabiana Rossi, Simone Falvo, Valeria Cardellini. 1-6 [doi]
- Hypertuming GRU Neural Networks for Edge Resource Usage PredictionJohn Violos, Stylianos Tsanakas, Theodoros Theodoropoulos, Aris Leivadeas, Konstantinos Tserpes, Theodora A. Varvarigou. 1-8 [doi]
- An Agent-Based Model to Study the Impact of Non-Pharmaceutical Interventions During Covid-19 Pandemic on Social IsolationSimranpreet Kaur, Pooya Moradian Zadeh. 1-6 [doi]
- A Motion-based Seq-bbox Matching Method for Video Object DetectionMin Li, Linghan Li, Ruwen Bai, Junxing Ren, Bo Meng, Yang Yang. 1-7 [doi]
- DSM: Data Sharing Management system for in-vehicle communicationHana Krichene, Paul Dubrulle, Raphael Millet. 1-7 [doi]
- An automated method for segmentation of COVID-19 lesions based on Computed Tomography using deep learning methodsJosé Anatiel Gonçalves Santos Landim, Flávio Henrique Duarte de Araújo, Mano Joseph Mathew, Antonio Oseas de Carvalho Filho. 1-6 [doi]
- A FHIR based architecture of a multiprotocol IoT Home Gateway supporting dynamic plug of new devices within instrumented environmentsPaolo Zampognaro, Giovanni Paragliola, Vincenzo Falanga. 1-7 [doi]
- Using Machine Learning Techniques to Predict RT- PCR Results for COVID-19 PatientsBradley Durden, Mathew Shulman, Andy Reynolds, Thomas Phillips, Demontae Moore, Indya Andrews, Seyedamin Pouriyeh. 1-4 [doi]
- Secure and Efficient Allocation of Virtual Machines in Cloud Data CenterXiaojie Tao, Liming Wang, Zhen Xu, Ru Xie. 1-7 [doi]
- Adaptive Middleware of ThingsDavid Cavalcanti, Ranieri Carvalho, Nelson S. Rosa. 1-6 [doi]
- Supporting Elderly People During Medical Emergencies: An Informal Caregiver-based ApproachYuanyuan Shen, Md. Akbar Hossain, Sayan Kumar Ray. 1-6 [doi]
- Deep Reinforcement Learning-Based Routing Optimization Algorithm for Edge Data CenterJixin Zhao, Shukui Zhang, Yang Zhang, Li Zhang, Hao Long. 1-7 [doi]
- GAVIN: A new platform for enriching 3D virtual indoor navigation with social-based geotagsChristian Sicari, Valeria Lukaj, Antonio Celesti, Maria Fazio, Massimo Villari. 1-6 [doi]
- A GSO Protected Area Calculation Model based on Controllable NGSO System ParametersWeiqing Huangt, Yiqing Liu, Wen Wang, Jingru Geng. 1-6 [doi]
- Towards a Sustainable IoT with Last-Mile Software DeploymentRustem Dautov, Hui Song, Nicolas Ferry 0001. 1-6 [doi]
- Player Assignment in MEC Gaming for Social Interactivity and Server Provisioning OptimizationAthanasios Tsipis, Konstantinos Oikonomou. 1-7 [doi]
- A Secure Authentication and Data Sharing Scheme for Wireless Sensor Networks based on BlockchainAsad Ullah Khan, Nadeem Javaid, Jalel Ben-Othman. 1-5 [doi]
- Automating the Service Function Chain Availability AssessmentGuto Leoni Santos, Patricia Takako Endo, Theo Lynn, Djamel Sadok, Judith Kelner. 1-7 [doi]
- OQAM-FBMC Based Radar Sensing and Wireless Communication in V2V ContextKhaoula Ammar, Oussama Ben Hai Belkacem, Ridha Bouallegue. 1-6 [doi]
- The Blockchain Quadrilemma: When Also Computational Effectiveness MattersFrancesco Mogavero, Ivan Visconti, Andrea Vitaletti, Marco Zecchini. 1-6 [doi]
- STRAD: Network Intrusion Detection Algorithm Based on Zero-Positive Learning in Real Complex Network EnvironmentYing Zhong, Ziqi Gao, Rui Li, Citong Que, Xinjie Yang, Zhiliang Wang, Jiahai Yang, Xia Yin, Xingang Shi, Keqin Li 0001. 1-8 [doi]
- Multi-Scale Relation Network for Person Re-identificationYi Ma, Tian Bai, Wenyu Zhang, Shuang Li, Jian Hu, Mingzhe Lu. 1-7 [doi]
- Identify What You are Doing: Smartphone Apps Fingerprinting on Cellular Network TrafficLiuqun Zhai, Zhuang Qiao, Zhongfang Wang, Dong Wei. 1-7 [doi]
- A Cross-Layered Readahead Architecture for Multi-Tiered Storage SystemsHsung-Pin Chang, Wei-Ming Su, Da-Wei Chang. 1-3 [doi]
- Interpretable deep learning method for attack detection based on spatial domain attentionHongyu Liu, Bo Lang, Shaojie Chen, Mengyang Yuan. 1-6 [doi]
- BacillusNet: An automated approach using RetinaNet for segmentation of pulmonary Tuberculosis bacillusFrancisco Jose Dos Santos Reist, Mateus Assis Veloso, Filipe Mateus Moraes Rodrigues, Vitória de Carvalho Brito, Patrick Ryan Sales dos Santos, José Denes Lima Araújo, Ricardo de Andrade Lira Rabelo, Antonio Oseas de Carvalho Filho. 1-4 [doi]
- An Effective and Efficient Method for Word-Level Textual Adversarial AttackZhixin Shi, Yuru Ma, Xiaoyan Yu. 1-6 [doi]
- An Analysis of Multi-hop Iterative Approximate Byzantine Consensus with Local CommunicationMatthew Ding. 1-6 [doi]
- "Can You Help Me Measure My Blood Sugar?" Co-design of a Voice Interface to Assist Patients and Caregivers at HomeFrancesca Alloatti, Riccardo Tasso, Andrea Bolioli, Elena Messina, Daria Cantù, Elena Guidorzi, Chiara Agamennone, Enrico Brunetti, Renata Marinello. 1-4 [doi]
- GSketch: A Comprehensive Graph Analytic Approach for Masquerader Detection Based on File Access GraphJianguo Jiang, Xu Wang, Yan Wang, Qiujian Lv, Meichen Liu, Tingting Wang, Leiqi Wang. 1-6 [doi]
- Scheduling Optimization of Charging UAV in Wireless Rechargeable Sensor NetworksYanheng Liu, Hongyang Pan, Geng Sun, Aimin Wang. 1-7 [doi]
- On the Data Analysis of Participatory Air Pollution Monitoring Using Low-cost SensorsMohamed Anis Fekih, Walid Bechkit, Hervé Rivano. 1-7 [doi]
- End-Stage Renal Disease Self-management: mobile app developmentJoão Pedro Barros, Pedro Brandão. 1-4 [doi]
- Smart City Data Platform for Real-Time Processing and Data SharingGonçalo Vítor, Pedro Rito, Susana Sargento. 1-7 [doi]
- End-to-end semantic joint detection and limb-pose estimation from depth images of preterm infants in NICUsMatteo Carbonari, Greta Vallasciani, Lucia Migliorelli, Emanuele Frontoni, Sara Moccia. 1-6 [doi]
- ODM-RPL: Optimized Dual MOP RPLMohamed redha Bouakouk, Abdelkrim Abdelli, Lynda Mokdad. 1-6 [doi]
- Lightweight Classification of Normal Versus Leukemic Cells Using Feature ExtractionYúri Faro Dantas De Sant' Anna, José Elwyslan Maurício de Oliveira, Daniel Oliveira Dantas. 1-7 [doi]
- Your Privacy Preference Matters: A Qualitative Study Envisioned for HomecareLuvi Sun, Bian Yang. 1-7 [doi]
- Reinforcement Learning-Based Anomaly Detection for Internet of Things Distributed Ledger TechnologyAnastasios N. Bikos, Sathish Kumar. 1-7 [doi]
- Improved Face Detector on Fisheye Images via Spherical-Domain AttentionJingbo Miao, Yanwei Liu, Jinxia Liu, Antonios Argyriou, Zhen Xu, Yanni Han. 1-7 [doi]
- In-Network Data Aggregation for Information-Centric WSNs using Unsupervised Machine Learning TechniquesMarcelo E. Pellenz, Rosana Lachowski, Edgard Jamhour, Glauber Brante, Guilherme Luiz Moritz, Richard Demo Souza. 1-7 [doi]
- Deep Quantile Regression for QoT Inference and Confident Decision MakingTania Panayiotou, Hafsa Maryam, Georgios Ellinas. 1-6 [doi]
- Improving a Smart Environment with Wireless Network User Load PredictionLucas Rodrigues Frank, Roberto M. De Oliveira, Alex Borges Vieira, Edelberto Franco Silva. 1-6 [doi]
- Security Analysis of DNS Open Resolvers by Continuous and Ambulatory DetectionChaoqun Li, Qian Tan, Zhen Xu, Xi Luo, Liang Dai. 1-7 [doi]
- VM Migration Scheduling as Moving Target Defense against Memory DoS Attacks: An Empirical StudyMatheus Torquato 0001, Marco Vieira. 1-6 [doi]
- Forecasting Trends in an Ambient Assisted Living Environment Using Deep LearningGuillaume Gingras, Mehdi Adda, Abdenour Bouzouane, Hussein Ibrahim, Clémence Dallaire. 1-4 [doi]
- Taking a Peek: An Evaluation of Anomaly Detection Using System calls for ContainersGabriel R. Castanhel, Tiago Heinrich, Fabrício Ceschin, Carlos Maziero. 1-6 [doi]
- 5G Core Security in Edge Networks: A Vulnerability Assessment ApproachHisham A. Kholidy, Andrew Karam, James L. Sidoran, Mohammad Ashiqur Rahman. 1-6 [doi]
- Modeling sensor networks with ON-OFF energy harvesting using Energy PacketsJean-Michel Fourneau. 1-6 [doi]
- Design of Frequency-Reconfigurable UWB Filtenna with Independently Controllable Two Rejected BandsMoheddine Smari, Saber Dakhli, Jean-Marie Floc'h, Fethi Choubani. 1-6 [doi]
- DoorCollect: Towards a Smart Door Handle for User Identification based on a Data Collection System for unsupervised Long-Term ExperimentsEric Klieme, Philipp Trenz, Daniel Paeschke, Christian Tietz, Christoph Meinel. 1-7 [doi]
- BlockDL: Privacy-Preserving and Crowd-Sourced Deep Learning Through BlockchainShili Hu, Jiangfeng Li, Qinpei Zhao, Chenxi Zhang, Zijian Zhang, Yang Shi 0002. 1-7 [doi]
- FA-net: Attention-based Fusion Network For Malware HTTPs Traffic ClassificationSiqi Liu, Yanni Han, Yanjie Hu, Qian Tan. 1-7 [doi]
- A Deep Learning Assisted Digital Nutrition Diary to Support Nutrition Counseling for People Affected by the Geriatric Frailty SyndromePatrick Elfert, Enes Tiryaki, Marco Eichelberg, Norbert Rösch, Andreas Hein. 1-7 [doi]
- Improving Container Deployment in Edge Computing Using the Infrastructure Aware Scheduling AlgorithmLuis Augusto Dias Knob, Carlos Henrique Kayser, Tiago Ferreto. 1-6 [doi]
- Short-Term Ambient Temperature Forecasting for Smart HeatersDanilo Carastan-Santos, Anderson Andrei Da Silva, Alfredo Goldman, Angan Mitra, Yanik Ngoko, Clément Mommessin, Denis Trystram. 1-6 [doi]
- Intelligent Network Service Embedding using Genetic AlgorithmsPanteleimon Rodis, Panagiotis Papadimitriou. 1-7 [doi]
- The cost of immortality: A Time To Live for smart contractsDimitri Saingre, Thomas Ledoux, Jean-Marc Menaud. 1-7 [doi]
- MuoviMe: Secure Access to Sustainable Mobility Services in Smart CityAlessio Catalfamo, Maria Fazio, Francesco Martella, Antonio Celesti, Massimo Villari. 1-5 [doi]
- A Scalable Real-Time Multiagent Decision Making Algorithm with CostPaul Cotae, Myong H. Kang, Alexander Velazquez. 1-6 [doi]
- Research and Application of Reinforcement Learning Recommendation Method for TaobaoLan Huang, Xiaofang Zhang, Yan Wang 0028, Xuping Xie. 1-6 [doi]
- Tripod: Use Data Augmentation to Enhance Website FingerprintingYixi Zhang, Xueliang Sun, Xiang Qin, Chaoran Li, Siwei Wang, Yi Xie. 1-7 [doi]
- Hand Gesture Recognition Using CNN & Publication of World's Largest ASL DatabaseAshwin Kannoth, Cungang Yang, Manuel Angel Guanipa Larice. 1-6 [doi]
- Cybersecurity Certification Requirements for Supply Chain ServicesPinelopi Kyranoud, Eleni-Maria Kalogeraki, Alexandra Michota, Nineta Polemi. 1-7 [doi]
- MULANE - A Lightweight Extendable Agent-oriented LoRaWAN Simulator with GUIMi Chen, Lynda Mokdad, Jalel Ben-Othman, Jean-Michel Fourneau. 1-6 [doi]
- No news is an island: Joint heterogeneous graph network for news classificationZhezhou Kang, Yi Liu, Guanqun Bi, Fang Fang 0009, Pengfei Yin. 1-7 [doi]
- Insights and lessons learned from trialling a mental health chatbot in the wildCourtney Potts, Raymond R. Bond, Maurice D. Mulvenna, Edel Ennis, Andrea Bickerdike, Edward K. Coughlan, Thomas Broderick, Con Burns, Michael F. McTear, Lauri Kuosmanen, Heidi Nieminen, Kyle A. Boyd, Brian Cahill, Alex Vakaloudis, Indika Dhanapala, Anna-Kaisa Vartiainen, Catrine Kostenius, Martin Malcolm. 1-6 [doi]
- eQUIC Gateway: Maximizing QUIC Throughput using a Gateway Service based on eBPF + XDPGustavo Pantuza, Marcos A. M. Vieira, Luiz Filipe M. Vieira. 1-6 [doi]
- A Model-Checking Static Analysis of Task-Based Energy Neutrality for Energy Harvesting IoTMichele Albano, Stefano Chessa, Kim Guldstrand Larsen. 1-7 [doi]
- TA- TDMA: A traffic aware TDMA MAC protocol for safety applications in VANETOumaima El Joubari, Jalel Ben-Othman, Véronique Vèque. 1-8 [doi]
- Multidimensional Design and Analysis of a Data Mart Related to Healthcare Treatments with Biologic DrugsMatilde Tanaglia, Valentina Ientile, Luca L'Abbate, Carlo Combi, Salvatore Scondotto, Gianluca Trifirò. 1-7 [doi]
- Machine Learning Techniques for Extracting Relevant Features from Clinical Data for COVID-19 Mortality PredictionMichele Fraccaroli, Giulia Mazzuchelli, Alice Bizzarri. 1-7 [doi]
- GPU-Accelerated Discrete Event Simulations: Towards Industry 4.0 ManufacturingMoustafa Faheem, Adrian Murphy, Carlos Reaño. 1-7 [doi]
- Distributed ledgers to support revenue-sharing business consortia: a Hyperledger-based implementationPaolo Bottoni, Remo Pareschi, Domenico Tortola, Nicola Gessa, Gilda Massa. 1-6 [doi]
- K - Nearest Neighbor Algorithm: Proposed Solution for Human Gait Data ClassificationShadi Eltanani, Tjeerd Olde Scheper, Helen Dawes. 1-5 [doi]
- Context-Dependent Services Selection in Smart EnvironmentsDaniel Flores-Martín, José García-Alonso, Javier Berrocal, Luca Foschini, Juan Manuel Murillo Rodriguez. 1-6 [doi]
- Mobile Augmented Reality for Craniotomy PlanningMarcel Oliveira Alves, Daniel Oliveira Dantas. 1-6 [doi]
- Scalable QoS-Aware Multicast for SVC Streams in Software-Defined NetworksJie Cui 0004, Lingbiao Kong, Hong Zhong 0001, Xiuwen Sun, Chengjie Gu, Jianfeng Ma 0001. 1-7 [doi]
- TW-Fogginess: A Trustworthy IoT System based on Mist and Fog ComputingFranklin Magalhães Ribeiro, Carlos Alberto Kamienski. 1-6 [doi]
- Assessing the Cost of Quantum Security for Automotive Over -The-Air UpdatesMichele La Manna, Pericle Perazzo, Luigi Treccozzi, Gianluca Dini. 1-6 [doi]
- Machine Learning-Enabled Localization in 5G using LIDAR and RSS DataHind Mukhtar, Melike Erol-Kantarci. 1-6 [doi]
- Grammatical Evolution-Based Approach for Extracting Interpretable Glucose-Dynamics ModelsI. De Falco, Antonio Della Cioppa, Tomas Koutny, Umberto Scafuri, Ernesto Tarantino, Martin Ubl. 1-6 [doi]
- Comparison of Pseudonym Change Strategies for C-ITSHacène Fouchal, Ramzi Boutehalla. 1-6 [doi]
- Understanding a happiness dataset: How the machine learning classification accuracy changes with different demographic groupsColm Sweeney, Edel Ennis, Raymond R. Bond, Maurice D. Mulvenna, Siobhan O'Neill. 1-4 [doi]
- A Chaos-Based Encryption Scheme for OFDM-IM SystemsXiaohui Zhang, Shunliang Zhang, Zhuang Qiao. 1-6 [doi]
- DeepGAN: Generating Molecule for Drug Discovery Based on Generative Adversarial NetworkMengdi Xu, Jiandong Cheng, Yirong Liu, Wei Huang. 1-6 [doi]
- An Intelligent Transportation System Application using Mobile Edge ComputingThiago Correia Medeiros, Elton F. S. Soares, Carlos Alberto Vieira Campos. 1-6 [doi]
- A Museum Artefact Monitoring Testbed using LoRaWANDinesh R. Gawade, Roy B. V. B. Simorangkir, Dimitrios Zorbas, Sanjeev Kumar, Steffen Ziemann, Daniela Iacopino, John Barton, Katharina Schuhmann, Manfred Anders, Brendan O'Flynn, John L. Buckley. 1-3 [doi]
- Evaluating the L4S Architecture in Cellular Networks with a Programmable SwitchBertrand Mathieu, Stéphane Tuffin. 1-6 [doi]
- Reducing Communication Overhead of Federated Learning through Clustering AnalysisAhmed A. Al-Saedi, Veselka Boeva, Emiliano Casalicchio. 1-7 [doi]
- Impact of Network Topology on the Convergence of Decentralized Federated Learning SystemsHanna Kavalionak, Emanuele Carlini, Patrizio Dazzi, Luca Ferrucci, Matteo Mordacchini, Massimo Coppola. 1-6 [doi]
- BAFL: An Efficient Blockchain-Based Asynchronous Federated Learning FrameworkChenhao Xu, Youyang Qu, Peter W. Eklund, Yong Xiang 0001, Longxiang Gao. 1-6 [doi]
- Automatic Face Mask Detection Using Deep LearningStephanie Anderson, Suma Veeravenkatappa, Priyanka Pola, Seyedamin Pouriyeh, Meng Han. 1-4 [doi]
- iHELP: Personalised Health Monitoring and Decision Support Based on Artificial Intelligence and Holistic Health RecordsGeorge Manias, Harm op den Akker, Ainhoa Azqueta-Alzúaz, Diego Burgos, Nikola Dino Capocchiano, Borja Llobell Crespo, Athanasios Dalianis, Andrea Damiani, Krasimir Filipov, Giorgos Giotis, Maritini Kalogerini, Rostislav Kostadinov, Pavlos Kranas, Dimosthenis Kyriazis, Artitaya Lophatananon, Shwetambara Malwade, George Marinos, Fabio Melillo, Vicent Moncho Mas, Kenneth Muir, Marzena Nieroda, Antonio De Nigro, Claudia Pandolfo, Marta Patiño-Martínez, Florin Picioroaga, Aristodemos Pnevmatikakis, Shabbir Syed-Abdul, Tanja Tomson, Dilyana Vicheva, Usman Wajid. 1-8 [doi]
- Power Efficiency in Communication Networks with Power-Proportional DevicesMuhammed Choudhury, Guanting Li, Junwei Li, Ke Zhao, Mengyan Dong, Khaled Harfoush. 1-6 [doi]
- Exemplars and Counterexemplars Explanations for Image Classifiers, Targeting Skin Lesion LabelingCarlo Metta, Riccardo Guidotti, Yuan Yin, Patrick Gallinari, Salvatore Rinzivillo. 1-7 [doi]
- Tumor Segmentation in Breast DCE- MRI Slice Using Deep Learning MethodsEdson Damasceno Carvalho, Romuere Rôdrigues Veloso e Silva, Mano Joseph Mathew, Flávio Henrique Duarte de Araújo, Antonio Oseas de Carvalho Filho. 1-6 [doi]
- MiniCAR: Minimal Congestion-Aware Routing Method in Fine-Grained Circuit-Switched Networks for Parallel Computing SystemsYao Hu. 1-8 [doi]
- Fair Delegation of Digital Services Without Third PartiesAndreas Guillot, Fabrice Theoleyre, Cristel Pelsser. 1-7 [doi]
- Evaluating Resilience of Encrypted Traffic Classification against Adversarial Evasion AttacksRamy Maarouf, Danish Sattar, Ashraf Matrawy. 1-6 [doi]
- FKTAN: Fusion Keystroke Time-Textual Attention Networks for Continuous AuthenticationHaitian Yang, Degang Sun, Yan Wang, He Zhu, Ning Li, Weiqing Huang. 1-6 [doi]
- DSQNet: Domain SeQuence based Deep Neural Network for AGDs DetectionWei Xiong, Haiyang Jiang, Hongtao Guan, Fengrui Liu. 1-7 [doi]
- Danian: tail latency reduction of networking application through an O(1) schedulerGustavo Pantuza, Lucas A. C. Bleme, Marcos A. M. Vieira, Luiz Filipe M. Vieira. 1-6 [doi]
- ARAIG And Minecraft: A COVID-19 WorkaroundCassandra Frances Laffan, Robert Kozin, James Elliott Coleshill, Alexander Ferworn, Michael Stanfield, Brodie Stanfield. 1-7 [doi]
- Adverse Event Report Classification in Social and Medico-Social SectorYinuo Li, Touria Ait El Mekki, Jin-Kao Hao. 1-6 [doi]
- Connecting Self-Sovereign Identity with Federated and User-centric Identities via SAML IntegrationHakan Yildiz, Christopher Ritter, Lan Thao Nguyen, Berit Frech, Maria Mora-Martinez, Axel Küpper. 1-7 [doi]
- A privacy preserving identification protocol for smart contractsFrancesco Bruschi, Tommaso Paulon, Vincenzo Rana, Donatella Sciuto. 1-6 [doi]
- Towards a Peer-to-Peer Federated Machine Learning Environment for Continuous AuthenticationDavid Monschein, José Antonio Peregrina Pérez, Tim Piotrowski, Zoltán Nochta, Oliver P. Waldhorst, Christian Zirpins. 1-6 [doi]
- An Effective Data Structure for Contact Sequence Temporal GraphsSanaz Gheibi, Tania Banerjee, Sanjay Ranka, Sartaj Sahni. 1-8 [doi]
- An Efficient Blockchain-based Electric Vehicle Charging Management SystemAhmed Khoumsi. 1-7 [doi]
- SDN-based Differentiated Traffic Flow Management for Industrial Internet of Things EnvironmentsFranco Callegati, Aldo Campi, Chiara Contoli, Silvio Di Santi, Nicola Ghiselli, Carlo Giannelli, Alessandro Pernafini, Riccardo Zamagna. 1-6 [doi]
- Neural Architecture Search for Resource-Constrained Internet of Things DevicesIsadora Cardoso-Pereira, Gisele Lobo Pappa, Heitor S. Ramos. 1-6 [doi]
- VoFSQ: An Efficient File-Sharing Interactive Verification ProtocolShuai Su, Fangyuan Yuan, Yulin Yuan, Li Zeng, Chi Chen. 1-7 [doi]
- Multi Hop Reconfiguration of End-Devices in Heterogeneous Edge-IoT Mesh NetworksLorenzo Carnevale, Armando Ruggeri, Francesco Martella, Antonio Celesti, Maria Fazio, Massimo Villari. 1-6 [doi]
- Virtual Resource Composition for Allocation Management in VCC NetworksBinal Tejani, Robson E. De Grande. 1-6 [doi]
- Evaluation of the reduction of NDT in WSN with asymmetric schedule-based asynchronous duty cycle mechanismsAndré R. C. Saraiva, Diego G. Passos, Célio Vinicius N. Albuquerque. 1-6 [doi]
- Anonymous Authentication Protocol for Efficient Communications in Vehicle to Grid NetworksAbdallah Belkaaloul, Boucif Amar Bensaber. 1-5 [doi]
- Enabling UAV Services in the IoT with HAMSTERMariana Rodrigues, Kalinka R. L. J. C. Branco. 1-6 [doi]
- Adaptive Smooth L1 Loss: A Better Way to Regress Scene Texts with Extreme Aspect RatiosChao Liu, Shuai Yu, Min Yu, Baole Wei, Boquan Li, Gang Li, Weiqing Huang. 1-7 [doi]
- EvilModel: Hiding Malware Inside of Neural Network ModelsZhi Wang, Chaoge Liu, Xiang Cui. 1-7 [doi]
- Blockchain-Based Strategy to Avoid Fake AI in eHealth Scenarios with Reinforcement LearningArmando Ruggeri, Rosa Di Salvo, Maria Fazio, Antonio Celesti, Massimo Villari. 1-7 [doi]
- CDNFinder: Detecting CDN-hosted Nodes by Graph-Based Semi-Supervised ClassificationXiaoqing Ma, Chao Zheng, Zhao Li, Qingyun Liu, Xunxun Chen. 1-7 [doi]
- ITDBERT: Temporal-semantic Representation for Insider Threat DetectionWeiqing Huang, He Zhu, Ce Li, Qiujian Lv, Yan Wang, Haitian Yang. 1-7 [doi]
- Ecological Momentary Assessment extensions 3 (EMAX3) Proposal: An app for EMA-type researchChris Brogly, Daniel J. Lizotte, Michael A. Bauer. 1-4 [doi]
- Multi-Modal fake news Detection on Social Media with Dual Attention Fusion NetworksHaitian Yang, Xuan Zhao, Degang Sun, Yan Wang, He Zhu, Chao Ma, Weiqing Huang. 1-6 [doi]
- MobiWEB: Mobility-Aware Energy Balancing for P2P Wireless Power TransferTamoghna Ojha, Theofanis P. Raptis, Marco Conti, Andrea Passarella. 1-6 [doi]
- Experimental Workflow for Energy and Temperature Profiling on HPC SystemsKameswar Rao Vaddina, Laurent Lefèvre, Anne-Cécile Orgerie. 1-7 [doi]
- Blockchain Address Transparency with DNSMara Caldeira, Miguel Correia. 1-7 [doi]
- A Self-Sovereign Decentralized Identity Platform Based on BlockchainYa Chen, Chao Liu, Yu Wang 0134, Yazhe Wang. 1-7 [doi]
- Scalability of Hash-Based Pattern Matching for High-Speed Network Security and MonitoringTomás Fukac, Jan Korenek, Jirí Matousek 0002. 1-6 [doi]
- Robust Human Activity Recognition System with Wi-Fi Using Handcraft FeatureKang Yin, Chengpei Tang, Xie Zhang, Hele Yao. 1-8 [doi]
- A Lightweight Certificateless Non-interactive Authentication and Key Exchange Protocol for IoT EnvironmentsMenghan Pan, Daojing He, Xuru Li, Sammy Chan, Emmanouil Panaousis, Yun Gao. 1-7 [doi]
- A Shared Memory Approach for Function Chaining in Serverless PlatformsAndrea Sabbioni, Lorenzo Rosa, Armir Bujari, Luca Foschini, Antonio Corradi. 1-6 [doi]