Abstract is missing.
- A VNF-Chaining Approach for Enhancing Ground Network with UAVs in a Crowd-Based EnvironmentDavide Montagno Bozzone, Stefano Chessa, Michele Girolami, Federica Paganelli. 1-6 [doi]
- Formal Analysis of an IoT-Based Healthcare ApplicationMaissa Elleuch, Sofiène Tahar. 1-5 [doi]
- Predicting Patient Sexual Function After Prostate Surgery Using Machine LearningSayna Rotbei, Luigi Napolitano, Stefania Zinno, Paolo Verze, Alessio Botta. 1-6 [doi]
- Business Models in Digital Health: Bibliometric Analysis and Systematic Literature ReviewClaudio Pascarelli, Chiara Colucci, Gianvito Mitrano, Angelo Corallo. 1-4 [doi]
- Spatial 4PPM Correlation with Successive Interference Cancellation for Low-Luminance WDM/SDM Screen to Camera UplinkAlisa Kawade, Wataru Chujo, Kentaro Kobayashi. 1-7 [doi]
- Comparative Study of LBP and HOG Feature Extraction Techniques for COVID-19 Pneumonia ClassificationNourin Ahmed, Namarta Vij, Ziad Kobti. 1-6 [doi]
- E-Health in Tuscany Inner Areas: The PROXIMITY-CARE ApproachAlessandro Pacini, Francesca Pennucci, Giorgio Leonarduzzi, Andrea Sgambelluri, Luca Valcarenghi, Molka Gharbaoui, Piero Castoldi, Gianluca Paparatto, Erica De Vita, Alberto Arcuri, Claudio Passino, Stefano Dalmiani, Michele Emdin, Sabina Nuti. 1-7 [doi]
- Demo: a LoRaWAN Emulator TestbedInabat Akanova, Dnislam Urazayev, Yerassyl Kadirzhanov, Dimitrios Zorbas. 1-3 [doi]
- PRISM: Privacy Preserving Healthcare Internet of Things Security ManagementSavvas Hadjixenophontos, Anna Maria Mandalari, Yuchen Zhao, Hamed Haddadi. 1-5 [doi]
- A Deep Learning Approach to Remotely Monitor People's Frailty StatusLinda Senigagliesi, Antonio Nocera, Matteo Angelini, Davide De Grazia, Gianluca Ciattaglia, Fabiola Olivieri, Maria Rita Rippo, Ennio Gambi. 1-4 [doi]
- Performance of Intelligent Reflecting Surface Based-FSO Link Under Strong Turbulence and Spatial JitterTakumi Ishida, Chedlia Ben Naila, Hiraku Okada, Masaaki Katayama. 1-5 [doi]
- (POSTER) Advanced LTCC-Integrated Technologies for mmWave 5G/Satellite Communication AntennasAmmar Kouki. 1-2 [doi]
- Human Face Detection Improvement using Subclass Learning and Low Variance DirectionsSoumaya Nheri. 1-5 [doi]
- Internet of Things (IoT) for Elderly's Healthcare and Wellbeing: Applications, Prospects and ChallengesAchraf Othman, Ahmed Elsheikh, Amnah Mohammed Al-Mutawaa. 1-8 [doi]
- SMOTE Oversampling and Near Miss Undersampling Based Diabetes Diagnosis from Imbalanced Dataset with XAI VisualizationNasim Mahmud Nayan, Ashraful Islam, Muhammad Usama Islam, Eshtiak Ahmed, Mohammad Mobarak Hossain, Md Zahangir Alam. 1-6 [doi]
- A Novel Framework for Distribution Power Lines DetectionDamos Ayobo Abongo, Mohamed Gaha, Safa Cherif, Wael Jaafar, Guillaume Houle, Christian Buteau. 1-4 [doi]
- A Scalable Intrusion Detection Approach for Industrial Internet of Things Based on Federated Learning and Attention MechanismMudhafar Nuaimi, Lamia Chaari Fourati, Bassem Ben Hamed. 1-4 [doi]
- A Multicloud Observability Support Based on ElasticSearch for Cloud-native Smart Cities ServicesSofia Montebugnoli, Luca Foschini 0001. 1-6 [doi]
- Bayesian-Based Symptom Screening for Medical Dialogue DiagnosisZhong Cao, Yuchun Guo, Yishuai Chen, Daoqin Lin. 1-6 [doi]
- Empowering Caregivers of Alzheimer's Disease and Related Dementias (ADRD) with a GPT-Powered Voice Assistant: Leveraging Peer Insights from Social MediaKimia Tuz Zaman, Wordh Ul Hasan, Juan Li, Cui Tao. 1-7 [doi]
- Glioma Tumor's Detection and Classification Using Joint YOLOv7 and Active Contour ModelAmal Jlassi, Khaoula ElBedoui, Walid Barhoumi. 1-5 [doi]
- Assessing the Security Risks of Medical Mobile ApplicationsGeorge Chatzisofroniou, Chris Markellos, Panayiotis Kotzanikolaou. 1-7 [doi]
- Deploying Digital Twins Over the Cloud-to-Thing ContinuumSergio Laso, Lorenzo Tore-Gálvez, Javier Berrocal, Carlos Canal, Juan Manuel Murillo. 1-6 [doi]
- Poster: Conceptual Design for FPGA Based Artifical Intelligence Model for HIL ApplicationsFarshideh Kordi, Christian Barnard, Paul Fortier, Amine Miled 0001. 1-3 [doi]
- 2-D Numerical Modeling of Fluid-Structure Interaction Analysis and Absorption Study of the Red Blood Cell Inside the CapillaryMouna Dhmiri, Yassine Manai, Tahar Ezzedine. 1-6 [doi]
- Designing Healthcare Relational Agents: A Conceptual Framework with User-Centered Design GuidelinesAshraful Islam, Beenish Moalla Chaudhry, Aminul Islam. 1-4 [doi]
- Honoring Heritage, Managing Health: A Mobile Diabetes Self-Management App for Native Americans with Cultural Sensitivity and Local FactorsWordh Ul Hasan, Juan Li 0004, Shadi Alian, Tianyi Liang, Vikram Pandey, Kimia Tuz Zaman, Jun Kong, Cui Tao. 1-6 [doi]
- An IoT-Based Solution for Monitoring Young People with Emotional Behavioral Disorders in a Residential Childcare SettingBharat Paudyal, Chris Creed, Sherelle Knowles, Hilton Mutariswa, Ian Williams 0001. 1-6 [doi]
- Predicting Out-of-Hospital Vital Sign Measurements through Deep LearningKhalid Alghatani, Abdelmounaam Rezgui, Nariman Ammar. 1-4 [doi]
- A Framework for Few-Shot Network Threats Based on Generative Adversarial NetworksLong Chen, Yanqing Song, Jianguo Chen. 1-6 [doi]
- Poster: A Simulator for Time-Slotted LoRa NetworksZhansaya Bagdauletkyzy, Madiyar Galymgereyev, Assel Abzalova, Abylay Kairatbek, Dimitrios Zorbas. 1-3 [doi]
- Influence of Convolutional Neural Network Depth on the Efficacy of Automated Breast Cancer Screening SystemsVineela Nalla, Seyedamin Pouriyeh, Reza M. Parizi, Inchan Hwang, Beatrice Brown-Mulry, Linglin Zhang, Minjae Woo. 1-4 [doi]
- Neonate Heart Rate Variability Monitoring Using Optical Wireless LinkAmel Chehbani, Stephanie Sahuguede, Anne Julien-Vergonjanne. 1-6 [doi]
- Early Heart Disease Detection Using Mel-Spectrograms and Deep LearningSricharan Donkada, Seyedamin Pouriyeh, Reza M. Parizi, Chloe Yixin Xie, Hossain Shahriar. 1-6 [doi]
- EFCC: a flexible Emulation Framework to evaluate network, computing and application deployments in the Cloud ContinuumLuis Jesús Martín León, Juan Luis Herrera, Javier Berrocal, Jaime Galán-Jiménez. 1-6 [doi]
- A Machine Learning Approach for Predicting Lung Metastases and Three-Month Prognostic Factors in Hepatocellular Carcinoma Patients Using SEER DataIbraheem M. Alkhawaldeh, Ghada Awad Altarawneh, Mohammad Al-Jafari, Mahmoud S. Abdelgalil, Ahmad S. Tarawneh, Ahmad B. A. Hassanat. 1-5 [doi]
- Low-Mobility Complementary Tool for Patient Follow-Up: A Proof of Concept for E-HealthAimé Cedric Muhoza, Emmanuel Bergeret, Corinne Brdys, Francis Gary. 1-4 [doi]
- Ambient Sound Analysis for Non-Invasive Indoor Activity Detection in Edge Computing EnvironmentsCheolhwan Lee, Ho-Min Kang, Yeong Jun Jeon, Soon-Ju Kang. 1-6 [doi]
- A Blockchain-Based Personal Health Knowledge Graph for Secure Integrated Health Data ManagementJuan Li 0004, Vikram Pandey, Rasha Hendawi. 1-7 [doi]
- Emotional Artificial Intelligence Enabled Facial Expression Recognition for Tele-Rehabilitation: A Preliminary StudyDavide Ciraolo, Antonio Celesti, Maria Fazio, Mirjam Bonanno, Massimo Villari, Rocco Salvatore Calabrò. 1-6 [doi]
- TEMA: Event Driven Serverless Workflows Platform for Natural Disaster ManagementChristian Sicari, Alessio Catalfamo, Lorenzo Carnevale, Antonino Galletta, Daniel Balouek-Thomert, Manish Parashar, Massimo Villari. 1-6 [doi]
- When Robotics Meets Distributed Learning: the Federated Learning Robotic Network FrameworkRoberto Marino, Lorenzo Carnevale, Massimo Villari. 1-6 [doi]
- The Jeopardy of Learning from Over-Sampled Class-Imbalanced Medical DatasetsAhmad B. A. Hassanat, Ghada Awad Altarawneh, Ibraheem M. Alkhawaldeh, Yasmeen Jamal Alabdallat, Amir F. Atiya, Ahmad Abujaber, Ahmad S. Tarawneh. 1-7 [doi]
- Poster: Link-level Performance Analysis of a LoRa SystemChristos Milarokostas, Katerina Giannopoulou, Ioannis Fotis, Dimitris Tsolkas, Nikos I. Passas, Lazaros F. Merakos. 1-3 [doi]
- An Improved GIFT Lightweight Encryption Algorithm to Protect Medical Data In IoTAymen Mudheher Badr, Lamia Chaari Fourati, Samiha Ayed. 1-7 [doi]
- Neuro Intel: A System for Clinical Diagnosis of Attention Deficit Hyperactivity Disorder (ADHD) Using Artificial IntelligenceSotirios Batsakis, Emmanuel Papadakis 0002, Ilias Tachmazidis, Tianhua Chen, Grigoris Antoniou, Marios Adamou. 1-6 [doi]
- Light Automatic Authentication of Data Transmission in 6G/IoT Healthcare SystemSarra Jebri, Arij Ben Amor, Mohamed Abid, Ammar Bouallegue. 1-4 [doi]
- Wavelength Selection Considerations for Optical Wireless Positioning SystemsJorik De Bruycker, Frédéric B. Leloup, Nobby Stevens. 1-6 [doi]
- NETEDGE MEP: A CNF-based Multi-access Edge Computing PlatformVinicius Ferreira, João Bastos, André Martins, Paulo Araújo, Nicolás F. Lori, João Faria, António Costa 0001, Helena Fernández-López. 1-6 [doi]
- DAMUS: Adaptively Updating Hardware Performance Counter Based Malware Detector Under System Resource CompetitionYanfei Hu, Shuai Li, Shuailou Li, Boyang Zhang, Yu Wen. 1-7 [doi]
- Demo: Implementation of a Train-Arrival Notification SystemAida Eduard, Dnislam Urazayev, Yermakhan Magzym, Dimitrios Zorbas. 1-3 [doi]
- AppBox: A Black-Box Application Sandboxing Technique for Mobile App Management SolutionsMaqsood Ahmad 0001, Francesco Bergadano, Valerio Costamagna, Bruno Crispo, Giovanni Russello. 1-7 [doi]
- A Testbed to Integrate Private 5G Networks with Visible Light Communication for Service Area ExpansionJinxing Zheng, Takaya Yamazato, Katsuhiro Naito. 1-5 [doi]
- Design of a Blockchain-Based Secure Storage Architecture for Resource-Constrained HealthcareLaura Rodrigues Soares, Jéferson Campos Nobre, Gabriel Kerschner. 1-6 [doi]
- Docflow: Supervised Multi-Method Document Anonymization EngineGabriele Morabito, Valeria Lukaj, Armando Ruggeri, Maria Fazio, Maria Annunziata Astone, Massimo Villari. 1-6 [doi]
- Exploring the Performance and Efficiency of Transformer Models for NLP on Mobile DevicesIoannis Panopoulos, Sokratis Nikolaidis, Stylianos I. Venieris, Iakovos S. Venieris. 1-4 [doi]
- The Effect of Feature Selection on Diabetes Prediction Using Machine LearningRania Alhalaseh, Dhuha Ali Ghani AL-Mashhadany, Mohammad Abbadi. 1-7 [doi]
- Adopting Machine Learning-Based Pose Estimation as Digital Biomarker in Motor Tele-RehabilitationAntonio Celesti, Maria Fazio, Armando Ruggeri, Fabrizio Celesti, Massimo Villari, Mirjam Bonanno, Rocco Salvatore Calabrò. 1-4 [doi]
- Large-Scale Agent-Based Transport Model for the Metropolitan City of MessinaAnnamaria Ficara, Maria Fazio, Antonino Galletta, Antonio Celesti, Massimo Villari. 1-6 [doi]
- COVID-19 Analysis in Canada using Deep Learning and Multi-Factor Data-Driven Approach with a Novel DatasetShaon Bhatta Shuvo, Swastik Bagga, Ziad Kobti. 1-4 [doi]
- A Web-Based Application for Screening Alzheimer's Disease in the Preclinical PhaseFlavio Bertini 0001, Daniela Beltrami, Pegah Barakati, Laura Calzà, Enrico Ghidoni, Danilo Montesi. 1-6 [doi]
- RL-CEALS: Reinforcement Learning for Collaborative Edge Assisted Live StreamingIlyes Mrad, Emna Baccour, Ridha Hamila, Muhammad Asif Khan 0001, Aiman Erbad, Mounir Hamdi. 193-199 [doi]
- A Hybrid Algorithm for Service Bursting Based on GA and BPSO in Hybrid CloudsWissem Abbes, Hamdi Kchaou, Zied Kechaou, Adel M. Alimi. 200-205 [doi]
- Performance Improvements Through Recommendations for a PLC Network with Collaborative Caching in Remote AreasZunera Umar, Michela Meo. 206-212 [doi]
- Prediction of RTT Through Radio-Layer Parameters in 4G/5G Dual-Connectivity Mobile NetworksStefania Zinno, Antonia Affinito, Nicola Pasquino, Giorgio Ventre, Alessio Botta. 213-218 [doi]
- Modeling Digital Twins of Kubernetes-Based ApplicationsDavide Borsatti, Walter Cerroni, Luca Foschini 0001, Genady Ya. Grabarnik, Filippo Poltronieri, Domenico Scotece, Larisa Shwartz, Cesare Stefanelli, Mauro Tortonesi, Mattia Zaccarini. 219-224 [doi]
- A Cognitive Module for Secondary Radios Operating at the 2.5 GHz LTE Band on Indoor EnvironmentsMarilson Duarte Soares, Diego G. Passos 0001, Pedro V. Gonzalez Castellanos. 225-231 [doi]
- A Novel Approach of ESN Reservoir Structure Learning for Improved Predictive PerformanceSamar Bouazizi, Emna Benmohamed, Hela Ltifi. 232-237 [doi]
- Effects of secured DNS transport on resolver performanceEtienne LE Louet, Antoine Blin, Julien Sopena, Ahmed Amamou, Kamel Haddadou. 238-244 [doi]
- Improved Flaky Test Detection with Black-Box Approach and Test SmellsDavid Carmo, Luísa Gonçalves, Ana Dias, Nuno Pombo. 245-251 [doi]
- Multi-Stage Flow Table Caching: From Theory to AlgorithmYing Wan, Haoyu Song 0001, Tian Pan 0001, Bin Liu 0001, Yu Jia, Ling Qian. 252-258 [doi]
- Proactive Resource Orchestration Framework for Cloud/Fog PlatformSomnath Mazumdar, Thomas Dreibholz. 259-265 [doi]
- Online Bargaining Scheme Based Dynamic Resource Allocation for Soft-Deadline Tasks in Edge ComputingXuebo Sun, Hui Wang, Sheng Pan, Tongfei Liu. 266-271 [doi]
- Cross-Regional Task Offloading with Multi-Agent Reinforcement Learning for Hierarchical Vehicular Fog ComputingYukai Hou, Zhiwei Wei, Shiyang Liu, Bing Li 0025, Rongqing Zhang 0001, Xiang Cheng 0001, Liuqing Yang 0001. 272-277 [doi]
- A URL-based Computing Power Scheduling Method and SystemWenjuan Xing. 278-283 [doi]
- Collecting Sensor Data from WSNs on the Ground by UAVs: Assessing Mismatches from Real-World Experiments and Their Corresponding SimulationsBruno José Olivieri de Souza, Thiago Lamenza, Marcelo Paulon, Victor Bastos Rodrigues, Vítor Couvêa Andrezo Carneiro, Markus Endler. 284-290 [doi]
- Attack Analysis on Two-party Signature and Threshold Signature Based on DilithiumXiang Wu, BoHao Li, Boyang Zhang, Xiaofan Liu, Wei Ren, Kim-Kwang Raymond Choo. 291-297 [doi]
- A Robust Prototype-Free Retrieval Method for Automatic Check-OutHuijie Huangfu, Ziyuan Yang, Maosong Ran, Weihua Zhang, Jingfeng Lu, Yi Zhang 0018. 298-303 [doi]
- Streaming Session Recommendation Based on User's Global AttributesXuechang Zhao, Qing Yu, Yifan Wang. 304-309 [doi]
- Finding Potential Pneumoconiosis Patients with Commercial Acoustic DeviceXuehan Zhang, Zhongxu Bao, Yuqing Yin, Xu Yang, Xiao Xu, Qiang Niu. 310-315 [doi]
- Traffic Matrix Estimation based on Denoising Diffusion Probabilistic ModelXinyu Yuan, Yan Qiao, Pei Zhao, Rongyao Hu, Benchu Zhang. 316-322 [doi]
- Learning-Based Congestion Control Assisted by Recurrent Neural Networks for Real-Time CommunicationJingshun Du, Chaokun Zhang, Shen He, Wenyu Qu. 323-328 [doi]
- TAMCQF: Hybrid Traffic Scheduling Mechanism Integrating TAS and Multi-CQF in TSNHongrui Nie, Shaosheng Li, Yong Liu 0027. 329-334 [doi]
- DTRadar: Accelerating Search Process of Decision Trees in Packet ClassificationJiashuo Yu, Long Huang, Longlong Zhu, Dong Zhang, Chunming Wu 0001. 335-341 [doi]
- P4CTM: Compressed Traffic Pattern Matching Based on Programmable Data PlaneHang Lint, Weiwei Lint, Jing Lint, Longlong Zhu, Dong Zhang, Chunming Wu 0001. 342-347 [doi]
- FACC: Flow-Size-Aware Congestion Control in Data Center NetworksGuanglei Chen, Jiangping Han, Xiwen Jie, Peilin Hong, Kaiping Xue. 348-353 [doi]
- F2-HPCC: Achieve Faster Convergence and Better Fairness for HPCCXiwen Jie, Hang Wang, Runzhou Li, Guanglei Chen, Peilin Hong. 354-359 [doi]
- Examining the Centralization of Email Industry: A Landscape Analysis for IPv4 and IPv6Luciano Zembruzki, Arthur Selle Jacobs, Lisandro Zambenedetti Granville, Ricardo José Pfitscher. 360-366 [doi]
- An E-Commerce Conversational Virtual Assistant in Service of Mild Cognitive Impairment PatientsIoannis-Aris Kostis, Dimitris Sarafis, Konstantinos Karamitsios, Magda Tsolaki, Anthoula Tsolaki. 367-372 [doi]
- BVSNO: Binary Code Vulnerability Detection Based on Slice Semantic and Node OrderNingning Cui, Liwei Chen, Gang Shi. 373-379 [doi]
- A Discriminative Multi-task Learning for Autism Classification Based on Speech SignalsXiaotian Yin, Chao Zhang, Wei Wang. 386-391 [doi]
- Optimal Walks in Contact Sequence Temporal Graphs with No Zero Duration CycleAnuj Jain, Sartaj Sahni. 392-398 [doi]
- WELID: A Weighted Ensemble Learning Method for Network Intrusion DetectionYuanchen Gao, Guosheng Xu 0001, Guoai Xu. 399-404 [doi]
- AGE: Automatic Performance Evaluation of API GatewaysPedro Moreira, António Ribeiro, João Marco Silva. 405-410 [doi]
- MultiTASC: A Multi-Tenancy-Aware Scheduler for Cascaded DNN Inference at the Consumer EdgeSokratis Nikolaidis, Stylianos I. Venieris, Iakovos S. Venieris. 411-416 [doi]
- AdapPF: Self-Adaptive Scrape Interval for Monitoring in Geo-Distributed Cluster FederationsChih-Kai Huang 0001, Guillaume Pierre. 417-423 [doi]
- Collaborative Fuzzy Clustering Approach for Scientific Cloud WorkflowsHamdi Kchaou, Wissem Abbes, Zied Kechaou, Adel M. Alimi. 424-429 [doi]
- A NoSQL DBMS Transparent Data Encryption Approach for Cloud/Edge ContinuumValeria Lukaj, Alessio Catalfamo, Francesco Martella, Maria Fazio, Massimo Villari, Antonio Celesti. 430-435 [doi]
- Accelerating IDS Using TLS Pre-Filter in FPGAVlastimil Kosar, Lukas Sismis, Jirí Matousek 0002, Jan Korenek. 436-442 [doi]
- Federated Byzantine Agreement Protocol Robustness to Targeted Network AttacksVytautas Tumas, Sean Rivera, Damien Magoni, Radu State. 443-449 [doi]
- Quick Notification of Block Generation Using Bloom Filter in a BlockchainTsuyoshi Hasegawa, Akira Sakurai, Kazuyuki Shudo. 457-463 [doi]
- Automated WiFi Incident Detection Attack Tool on 802.11 NetworksDimitris Koutras, Panos Dimitrellos, Panayiotis Kotzanikolaou, Christos Douligeris. 464-469 [doi]
- A GRASP-Based Algorithm for Virtual Network EmbeddingAmine Rguez, Yassine Hadjadj Aoul, Farah Slim, Gerardo Rubino, Asma Selmi. 470-473 [doi]
- Device Behavioral Profiling for Autonomous Protection Using Deep Neural NetworksSandeep Gupta, Bruno Crispo. 474-478 [doi]
- Refinement and Verification for IoT Service CompositionSarah Hussein Toman, Lazhar Hamel, Mohamed Graiet. 483-486 [doi]
- Path Loss Modeling at 26 GHz in Indoor and Outdoor Tunisian Environments for B5G/6G wireless networksMamadou Bagayogo, Soumaya Hamouda, Rim Barrak. 487-490 [doi]
- Performance Enhancement of Stream-Based Decompression Process by Notifying Compression Buffer SizeTaiki Kato, Shinichi Yamagiwa, Koichi Marumo. 491-494 [doi]
- A Hybrid 2D-1D CNN for Scanner Device Linking Based on Scanning NoiseChaima Ben Rabah, Gouenou Coatrieux, Riadh Abdelfattah. 495-498 [doi]
- Mobile LoRa Gateway for Communication and Sensing on the RailwayJoão Soares, Miguel Luís, Susana Sargento. 499-502 [doi]
- IBAM: IPFS and Blockchain based Authentication for MQTT protocol in IoTTolga Karadas, Kübra Kalkan. 537-542 [doi]
- Locating the Diffusion Source in Networks by Critical ObserversHamouma Moumen, Badreddine Benreguia, Leila Saadi, Ahcène Bounceur. 543-548 [doi]
- On the Efficacy of Differential Cryptanalysis Attacks on K-CipherMichael Kounavis. 549-555 [doi]
- Formal Modeling and Verification of ERC Smart Contracts: Application to NFTRim Ben Fekih, Mariem Lahami, Mohamed Jmaiel, Salma Bradai. 556-561 [doi]
- Natural Face Anonymization via Latent Space Layers SwappingEmna BenSaid, Mohamed Neji, Adel M. Alimi. 562-567 [doi]
- Every Time Can Be Different: A Data Dynamic Protection Method Based on Moving Target DefenseZhimin Tang, Duohe Ma, Xiaoyan Sun 0003, Kai Chen, Liming Wang, Junye Jiang. 568-574 [doi]
- Deep Reinforcement Learning-Based Intelligent Task Offloading and Dynamic Resource Allocation in 6G Smart CityWang Li, Xin Chen, Libo Jiao, Yijie Wang. 575-581 [doi]
- Sky's the Limit: Navigating 6G with ASTAR-RIS for UAVs Optimal Path PlanningShakil Ahmed, Ahmed E. Kamal 0001. 582-587 [doi]
- A Transmission Power Distribution Method Based on Lyapunov for Scraper Chain Tension Monitoring NetworkXiaodong Yan, Gongbo Zhou, Ping Zhou, Wei Wang 0302, Lianfeng Han, Zhenzhi He. 588-593 [doi]
- Intelligent and Stable Resource Allocation for Delay-Sensitive MEC in 6G NetworksYalin Zhang, Hui Gao 0001, Bei Liu 0002, Xin Su 0001, Xibin Xu. 594-599 [doi]
- A Low-overhead Network Monitoring for SDN-Based Edge ComputingHou-Yeh Tao, Chih-Kai Huang 0001, Shan-Hsiang Shen. 600-606 [doi]
- Multi-objective Optimization for Dynamic Service Placement Strategy for Real-Time Applications in Fog InfrastructureMayssa Trabelsi, Nadjib Mohamed Mehdi Bendaoud, Samir Ben Ahmed. 607-612 [doi]
- DepthWise Attention: Towards Individual Channels AttentionZhilei Zhu, Wanli Dong, Xiaoming Gao, Anjie Peng. 613-618 [doi]
- FedEF: Federated Learning for Heterogeneous and Class Imbalance DataHongyan Peng, Tongtong Wu, Zhenkui Shi, Xianxian Li. 619-624 [doi]
- Cluster, Reconstruct and Prune: Equivalent Filter Pruning for CNNs without Fine-TuningTao Niu, Yinglei Teng, Panpan Zou, Yiding Liu. 625-630 [doi]
- Detecting Ethereum Phishing Scams with Temporal Motif Features of SubgraphYunfei Wang, Hao Wang, Xiaozhen Lu, Lu Zhou, Liang Liu. 631-636 [doi]
- Deep Reinforcement Learning for Joint Service Placement and Request Scheduling in Mobile Edge Computing NetworksYuxuan Deng, Xiuhua Li, Chuan Sun, Jinlong Hao, Xiaofei Wang 0001, Victor C. M. Leung. 637-642 [doi]
- A Model-Driven Quasi-ResNet Belief Propagation Neural Network Decoder for LDPC CodesLiangsi Ma, Bei Liu 0002, Xin Su 0001, Xibin Xu. 643-648 [doi]
- Subcarrier-Index Modulation for OFDM-based PLC SystemsAymen Omri, Javier Hernandez Fernandez, Roberto Di Pietro. 649-655 [doi]
- Metis: Detecting Fake AS-PATHs Based on Link PredictionChengwan Zhang, Congcong Miao, Changqing An, Anlun Hong, Ning Wang, Zhiquan Wang, Jilong Wang 0001. 656-662 [doi]
- Limiting the Spread of Fake News on Social Networks by Users as WitnessesHamouma Moumen, Badreddine Benreguia, Ahcène Bounceur, Leila Saadi. 663-668 [doi]
- Downlink Traffic Demand-Based Gateway Activation in LoRaWANShahzeb Javed, Dimitrios Zorbas. 669-674 [doi]
- Solving Band Diagonally Dominant Linear Systems Using Gaussian Elimination: Shared-Memory Parallel Programming with OpenMPSirine Marrakchi, Heni Kaaniche. 675-680 [doi]
- Network Traffic Classification for Detecting Multi-Activity SituationsAhcene Boumhand, Kamal Deep Singh, Yassine Hadjadj Aoul, Matthieu Liewig, César Viho. 681-687 [doi]
- The Effect of Non-Reference Point Cloud Quality Assessment (NR-PCQA) Loss on 3D Scene Reconstruction from a Single ImageMohamed Zaytoon, Marwan Torki. 721-726 [doi]
- An Automatic Vision Transformer Pruning Method Based on Binary Particle Swarm OptimizationJihene Tmamna, Emna Ben Ayed, Rahma Fourati, Mounir Ben Ayed. 727-732 [doi]
- A Hybrid P4/NFV Architecture for Cloud Gaming Traffic Detection with Unsupervised MLJoël Roman Ky, Philippe Graff, Bertrand Mathieu, Thibault Cholez. 733-738 [doi]
- Deep learning approach for Tunisian hate Speech detection on FacebookMariem Abbes, Zied Kechaou, Adel M. Alimi. 739-744 [doi]
- An eXplainable Artificial Intelligence Method for Deep Learning-Based Face Detection in PaintingsSiwar Ben Gamra, Ezzeddine Zagrouba, André Bigand. 745-751 [doi]
- The Importance of Robust Features in Mitigating Catastrophic ForgettingHikmat Khan, Nidhal C. Bouaynaya, Ghulam Rasool 0001. 752-757 [doi]
- Autoencoder-SAD: An Autoencoder-based Model for Security Attacks DetectionDiana Gratiela Berbecaru, Stefano Giannuzzi, Daniele Canavese. 758-763 [doi]
- Pump Up the JARM: Studying the Evolution of Botnets Using Active TLS FingerprintingEva Papadogiannaki, Sotiris Ioannidis. 764-770 [doi]
- Exploiting Emercoin Blockchain and Trusted Computing for IoT Scenarios: A Practical ApproachDiana Gratiela Berbecaru, Lorenzo Pintaldi. 771-776 [doi]
- Performance Analysis of Physical Layer Security in Power Line Communication NetworksJavier Hernandez Fernandez, Aymen Omri, Roberto Di Pietro. 777-782 [doi]
- Evaluation of PTP Security Controls on gPTPMahdi Fotouhi, Alessio Buscemi, Florian Jomrich, Christian Köbel, Thomas Engel 0001. 783-789 [doi]
- Knocking Cells: Latency-Based Identification of IPv6 Cellular Addresses on the InternetMing Wang, YaHui Li, Han Zhang, Anlun Hong, Jun He, Jilong Wang 0001. 790-796 [doi]
- Seed Node Selection Algorithm Based on Node Influence in Opportunistic OffloadingQi Tang, Ruijie Hang, Gang Xu, Gaofeng Zhang, Shuai Li, Baoqi Huang. 797-803 [doi]
- Communication Interference Recognition Based on Improved Deep Residual Shrinkage NetworkXiaojun Wu, Yaya Lu, Zhenghan Tang, Daolong Wu, Haitao Xiao, Zhongzheng Sun. 804-809 [doi]
- SCON: A Secure Cooperative Framework Against Gossip Dissemination in Opportunistic NetworkJinlong E, Chaokun Zhang. 810-815 [doi]
- FindSpy: A Wireless Camera Detection System Based on Pre-Trained TransformersZhixin Shi, Hao Wu, Jing Zhang, Meng Zhang, Weiqing Huang. 816-822 [doi]
- Energy-efficient IoT Communications: A Comparative Study of Long-Term Evolution for Machines (LTE-M) and Narrowband Internet of Things (NB-IoT) TechnologiesNassim Labdaoui, Fabienne Nouvel, Stephanie Dutertre. 823-830 [doi]
- LoFall: LoRa-Based Long-Range Through-Wall Fall DetectionXuehan Zhang, Zhongxu Bao, Yuqing Yin, Xu Yang 0011, Xiao Xu, Qiang Niu. 831-836 [doi]
- Physical Layer Identity Information Protection against Malicious Millimeter Wave SensingZhen Meng, Yiming Shi, Yumeng Liang, Xinzhe Wen, Anfu Zhou, Huadong Ma, Hairong Qian. 837-843 [doi]
- BPCluster: An Anomaly Detection Algorithm for RFID Trajectory Based on ProbabilityFei Liang, Siye Wang, Ziwen Cao, Yue Feng, Shang Jiang, Yanfang Zhang. 844-850 [doi]
- Antenna For Early Detection Of Skin Sarcoma By Resonant Frequency ShiftDozohoua Silue, Mondher Labidi, Fethi Choubani. 851-856 [doi]
- Efficient Privacy-Preserving Multi-Functional Data Aggregation Scheme for Multi-Tier IoT SystemYunting Tao, Fanyu Kong, Yuliang Shi, Jia Yu 0005, Hanlin Zhang, Huiyi Liu. 857-863 [doi]
- Square tessellation for stochastic connected k- coverage in planar wireless sensor networksKalyan Nakka, Habib M. Ammari. 864-867 [doi]
- Auto-Scalable Software Defined Networking Control Plane for Internet of ThingsIntidhar Bedhief, Meriem Kassar, Taoufik Aguili, Rania Boughanmi, Oumaima Nijaoui. 868-871 [doi]
- RGB-2-Hyper-Spectral Image Reconstruction for Food Science Using Encoder/Decoder Neural ArchitecturesRobert Williamson, Jesús Martínez del Rincón, Anastasios Koidis, Carlos Reaño. 872-875 [doi]
- A Beta Multi-Objective Whale Optimization AlgorithmAhlem Aboud, Nizar Rokbani, Adel M. Alimi. 876-879 [doi]
- Backhaul Assessment in Dual Band WiFi MeshJoão Soares, Miguel Luís, Duarte M. G. Raposo, Pedro Rito, Susana Sargento. 880-883 [doi]
- Data Analysis of Electromyostimulation Training Effect on Muscles and Sports PerformanceSyrine Kallel, Rahma Fourati. 884-888 [doi]
- An Integrated Framework for Bird Recognition Using Dynamic Machine Learning-Based ClassificationWiam Rabhi, Fatima El Jaimi, Walid Amara, Zakaria Charouh, Amal Ezzouhri, Hafssa Benaboud, Moudathirou Ben Saindou, Fatima Ouardi. 889-892 [doi]
- A GNN-Based Rate Limiting Framework for DDoS Attack Mitigation in Multi-Controller SDNAli El Kamel. 893-896 [doi]
- High Gain and Compact Microstrip Patch Antenna Array Design for 26 GHz Broadband Wireless SystemsSirine Ghenjeti, Rim Barrak, Soumaya Hamouda. 932-937 [doi]
- Throughput Enhancement in Hybrid Vehicular Networks Using Deep Reinforcement LearningBadreddine Yacine Yacheur, Toufik Ahmed, Mohamed Mosbah 0001. 938-943 [doi]
- On the Network Characterization of Nano-Satellite SwarmsEvelyne Akopyan, Riadh Dhaou, Emmanuel Lochin, Bernard Pontet, Jacques Sombrin. 944-949 [doi]
- Evaluation of a Collision Prediction System for VRUs Using V2X and Machine Learning: Intersection Collision Avoidance for MotorcyclesBruno Ribeiro 0002, Alexandre J. T. Santos, Maria João Nicolau. 950-955 [doi]
- Infrastructure-Less Long-Range Train-Arrival Notification SystemAida Eduard, Dnislam Urazayev, Aruzhan Sabyrbek, Yermakhan Magzym, Dimitrios Zorbas. 956-962 [doi]
- Edge-Based IPFS for Content Distribution of City ServicesJosé Oliveira, Duarte M. G. Raposo, Susana Sargento. 963-969 [doi]
- Which2learn: A Vulnerability Dataset Complexity Measurement Method for Data-Driven DetectorsHuozhu Wang, Ziyuan Zhu, Dan Meng. 970-976 [doi]
- Multiple Information Extraction and Interaction for Emotion Recognition in Multi-Party ConversationFeifei Xu, Guangzhen Li. 977-982 [doi]
- UAV-Assisted Mobile Edge Computing Task Offloading Strategy for Minimizing Terminal Energy ConsumptionWu Wenjiao, Rongzuo Guo, Fan Xiangkui. 983-988 [doi]
- Lightweight Video Frame Interpolation Based on Bidirectional Attention ModuleYige Li, Han Yang. 989-994 [doi]
- Driving into Danger: Adversarial Patch Attack on End-to-End Autonomous Driving Systems Using Deep LearningTong Wang, Xiaohui Kuang, Hu Li, Qianjin Du, Zhanhao Hu, Huan Deng, Gang Zhao. 995-1000 [doi]
- How Does Oversampling Affect the Performance of Classification Algorithms?Zhizhen Xiang, Yingying Xu, Zhenzhou Tang. 1001-1006 [doi]
- Using Long-Short-Term Memory to Effectively Identify Persistent Routes Under Stealthy Link Flooding Attacks in Software-Defined NetworksWenjie Yu, Boyang Zhou. 1007-1012 [doi]
- RVDSE: Efficient Result Verifiable Searchable Encryption in Redactable BlockchainRuizhong Du, Na Liu, Mingyue Li, Junfeng Tian. 1013-1019 [doi]
- HUND: Enhancing Hardware Performance Counter Based Malware Detection Under System Resource Competition Using Explanation MethodYanfei Hu, Shuailou Li, Boyang Zhang, Xu Cheng, Yu Wen. 1020-1026 [doi]
- UAG: User Action Graph Based on System Logs for Insider Threat DetectionXu Wang, Jianguo Jiang, Yan Wang, Qiujian Lv, Leiqi Wang. 1027-1032 [doi]
- GCFL: Blockchain-based Efficient Federated Learning for Heterogeneous DevicesXiang Ying, Chenxi Liu, Dengcheng Hu. 1033-1038 [doi]
- RegexClassifier: A GNN-Based Recognition Method for State-Explosive Regular ExpressionsYuhai Lu, Xiaolin Wang, Fangfang Yuan, Cong Cao 0001, Xiaoliang Zhang, Yanbing Liu. 1039-1045 [doi]
- A Novel Method for Arabic Text Detection with Interactive VisualizationImene Ouali, Rahma Fourati, Mohamed Ben Halima, Ali Wali. 1046-1050 [doi]
- Enhancing Fingerprinting Indoor Positioning Systems Through Hierarchical Clustering and GAN-Based CNNHajer Grira, Ikbal Chammakhi Msadaa, Khaled Grayaa. 1054-1057 [doi]
- A Stackelberg Game for Multi-Tenant RAN Slicing in 5G NetworksZeina Awada, Kinda Khawam, Samer Lahoud, Melhem El Helou. 1058-1061 [doi]
- Aggregating Multiple Embeddings: A Novel Approach to Enhance Reliability and Reduce Complexity in Facial RecognitionHoussam Benaboud, Walid Amara, Amal Ezzouhri, Fatima El Jaimi, Wiam Rabhi, Zakaria Charouh. 1062-1065 [doi]
- A Deep Learning Approach For Airport Runway Detection and Localization From Satellite ImageryAmine Khelifi, Mahmut Gemici, Giuseppina Carannante, Charles Cliff Johnson, Nidhal C. Bouaynaya. 1066-1069 [doi]
- Energy-efficient Wireless Mesh Networks with IEEE 802.11ba: A New ArchitectureRoger Sanchez Vital, Carles Gomez, Eduard Garcia Villegas. 1070-1074 [doi]
- Adaptive Deep Reinforcement Learning Approach for Service Migration in MEC-Enabled Vehicular NetworksSabri Khamari, Rachedi Abdennour, Toufik Ahmed, Mohamed Mosbah 0001. 1075-1079 [doi]
- Towards Microservices-Aware Autoscaling: A ReviewMohamed Hedi Fourati, Soumaya Marzouk, Mohamed Jmaiel. 1080-1083 [doi]
- Accelerating Block Propagation with Sender Switchover in a BlockchainAkira Sakurai, Kazuyuki Shudo. 1086-1089 [doi]
- A Fast Failure Recovery Mechanism using On-Premise/Cloud-based NAS in SDNAli El Kamel. 1090-1093 [doi]
- Large-Scale Virtual BBU Pool Implementation: the First Step Towards a Realistic RAN VirtualizationMihia Kassi, Soumaya Hamouda. 1094-1097 [doi]
- Reinforcement Learning-Based Approach for Microservices-Based Application Placement in Edge EnvironmentKaouther Gasmi, Kamel Abassi, Lamia Romdhani, Olivier Debauche. 1098-1103 [doi]
- Robustness Analysis of Hybrid Machine Learning Model for Anomaly Forecasting in Radio Access NetworksSara Kassan, Imed Hadj-Kacem, Sana Ben Jemaa, Sylvain Allio. 1104-1109 [doi]
- Variational Auto-Encoder Model and Federated Approach for Non-Intrusive Load Monitoring in Smart HomesShamisa Kaspour, Abdulsalam Yassine. 1110-1115 [doi]
- TEBAKA: Territorial Basic Knowledge Acquisition. An Agritech Project for Italy: Results on Self-Supervised Semantic SegmentationLorenzo Epifani, Vincenzo D'Avino, Antonio Caruso 0001. 1116-1121 [doi]
- HiNoVa: A Novel Open-Set Detection Method for Automating RF Device AuthenticationLuke Puppo, Weng-Keen Wong, Bechir Hamdaoui, Abdurrahman Elmaghbub. 1122-1128 [doi]
- High Throughput Routing Path Selection for Payment Channel NetworkQingqing Cai, Gang Sun, Hongfang Yu, Long Luo. 1129-1134 [doi]
- S-PFC: Enabling Semi-Lossless RDMA Network with Selective Response to PFCJiang Shao, Xinyi Li, Minglin Li, Sen Liu 0002, Yang Xu. 1135-1141 [doi]
- 6Former: Transformer-Based IPv6 Address GenerationQiankun Liu, Xing Li. 1142-1148 [doi]
- Before Toasters Rise Up: A View into the Emerging DoH Resolver's Deployment RiskYuqi Qiu, Baiyang Li, Zhiqian Li, Liang Jiao, Yujia Zhu, Qingyun Liu. 1149-1155 [doi]
- Effective Coflow Scheduling in Hybrid Circuit and Packet Switching Networks Renjie Jiang, Tong Zhang, Changyan Yi. 1156-1161 [doi]
- AlgoID: A Blockchain Reliant Self-Sovereign Identity Framework on AlgorandAndrea De Salve, Damiano Di Francesco Maesa, Fabio Federico, Paolo Mori, Laura Ricci. 1162-1168 [doi]
- A Dual Self-supervised Deep Trajectory Clustering MethodJunjun Si, Yang Xiang, Jin Yang, Li Li, Bo Tu, Xiangqun Chen, Rongqing Zhang 0001. 1169-1172 [doi]
- An Assistant Diagnosis System for Parkinson Disease Based on Mutual Information and Genetic AlgorithmJunhong Guo, Peiran Wu, Lingyun Xiao. 1173-1176 [doi]
- Semi-supervised Multivariate Time Series Classification by Subsample Correlation PredictionYun Su. 1177-1180 [doi]
- Feature Relevance in NAT Detection Using Explainable AIReem Nassar, Imad H. Elhajj, Ayman I. Kayssi, Samer Salam. 1181-1184 [doi]
- Improving Traffic Scheduling Based on Per-flow Virtual Queues in Time-Sensitive NetworkingHaokai Jing, Tong Zhang. 1185-1188 [doi]
- Deep Reinforcement Learning-Based SFC Deployment Scheme for 6G IoT ScenarioShuting Long, Bei Liu 0002, Hui Gao 0001, Xin Su 0001, Xibin Xu. 1189-1192 [doi]
- A Network Function Virtualization Resource Allocation Model Based on Heterogeneous ComputingHanze Chen, Feng Xiao, Lingfei Cheng, Longlong Zhu, Dong Zhang. 1193-1196 [doi]
- End-to-End Deep Learning assisted by Reconfigurable Intelligent Surface for uplink MU massive MIMO under PA Non-LinearitiesAhlem Arfaoui, Maha Cherif, Ridha Bouallegue. 1203-1206 [doi]
- Semi-CT: Certificates Transparent to Identity Owners but Opaque to SnoopersAozhuo Sun, Bingyu Li, Qiongxiao Wang, Huiqing Wan, Jingqiang Lin, Wei Wang 0314. 1207-1213 [doi]
- An Enhanced Vulnerability Detection in Software Using a Heterogeneous Encoding EnsembleHao Sun, Yongji Liu, Zhenquan Ding, Yang Xiao, Zhiyu Hao, Hongsong Zhu. 1214-1220 [doi]
- Komorebi: A DAG-based Asynchronous BFT Consensus via ShardingSong Peng, Yang Liu, Jingwen Chen, Jinlong He, Yaoqi Wang. 1221-1227 [doi]
- CuckChain: A Cuckoo Rule Based Secure, High Incentive and Low Latency Blockchain System via ShardingJunfeng Tian, Caishi Jing, Jin Tian. 1228-1234 [doi]
- Dynamic PBFT with Active RemovalYulun Wu, Zhujun Zhang, Dali Zhu, Wei Fan. 1235-1241 [doi]
- Malicious Relay Detection for Tor Network Using Hybrid Multi-Scale CNN-LSTM with AttentionQiaozhi Feng, Yamei Xia, Wenbin Yao, Tianbo Lu, Xiaoyan Zhang. 1242-1247 [doi]
- DRDoSHunter: A Novel Approach Based on FDA and Inter-flow Features for DRDoS DetectionYifei Cheng, Yujia Zhu, Rui Qin, Jiang Xie 0004, Yitong Cai. 1248-1254 [doi]
- Facing Unknown: Open-World Encrypted Traffic Classification Based on Contrastive Pre-TrainingXiang Li, Beibei Feng, Tianning Zang, Xiaolin Xu, Shuyuan Zhao, Jingrun Ma. 1255-1260 [doi]
- Revisiting Data Poisoning Attacks on Deep Learning Based Recommender SystemsZhiye Wang, Baisong Liu, Chennan Lin, Xueyuan Zhang, Ce Hu, Jiangcheng Qin, Linze Luo. 1261-1267 [doi]
- Spatiotemporal-Enhanced Recurrent Neural Network for Network Traffic PredictionZhiyong Chen, Junyu Lai, Junhong Zhu, Wanyi Ma, Lianqiang Gan, Tian Xia. 1268-1273 [doi]
- MESCAL: Malicious Login Detection Based on Heterogeneous Graph Embedding with Supervised Contrastive LearningWeiqing Huang, Yangyang Zong, Zhixin Shi, Puzhuo Liu. 1274-1279 [doi]
- Anomaly Detection in Heterogeneous Time Series Data for Server-Monitoring TasksRui Yu 0003, Fei Xiao, Zhiliang Wang, Jiahai Yang 0001, Dongqi Han, Zhihua Wang, Minghui Jin, Chenglong Li, Enhuan Dong, Shutao Xia. 1280-1286 [doi]
- A Novel Low Power and High Speed 9- Transistors Dynamic Full-Adder Cell Simulation and DesignParisa Rahimi, Myasar R. Tabany, Seyedali Pourmoafi. 1287-1292 [doi]
- CANL LoRa: Collision Avoidance by Neighbor Listening for Dense LoRa NetworksGuillaume Gaillard, CongDuc Pham. 1293-1298 [doi]
- A Correct by Construction Model for CBPS Systems VerificationSarah Hussein Toman, Aida Lahouij, Lazhar Hamel, Zinah Hussein Toman, Mohamed Graiet. 1299-1304 [doi]
- The Sight for Hearing: An IoT-Based System to Assist Drivers with Hearing DisabilityOsman Salem, Ahmed Mehaoua, Raouf Boutaba. 1305-1310 [doi]
- Asynchronous and Heterogeneous Wake-Up Schedules for IoT Neighbor CommunicationAlexandre F. Cardoso, Célio Vinicius N. de Albuquerque, Cledson de Souza, Diego G. Passos 0001. 1311-1316 [doi]
- Simulation Of Optimized Cluster Based PBFT Blockchain Validation ProcessRabeb Ben Othmen, Wassim Abbessi, Sofiane Ouni, Wafa Badreddine, Gilles Dequen. 1317-1322 [doi]
- Threat Modeling with Mitre ATT&CK Framework Mapping for SD-IOT Security Assessment and MitigationsWissem Chorfa, Nihel Ben Youssef, Abderrazak Jemai. 1323-1326 [doi]
- CCSv6: A Detection Model for DNS-over-HTTPS Tunnel Using Attention Mechanism over IPv6Liang Jiao, Yujia Zhu, Xingyu Fu, Yi Zhou, Fenglin Qin, Qingyun Liu. 1327-1330 [doi]
- Still Not Aware of the Loophole of Unintentional Access to Docker? A Proof of ConceptLuyi Li, Yueyang Li, Ruxue Luo, Yuzhen Chen, Wenjun Fan. 1331-1334 [doi]
- Contrastive Learning with Attention Mechanism and Multi-Scale Sample Network for Unpaired Image-to-Image TranslationYunhao Liu 0004, Songyi Zhong, Zhenglin Li, Yang Zhou. 1335-1339 [doi]
- ESCORT: Efficient Status Check and Revocation Transparency for Linkage-Based Pseudonym Certificates in VANETsHuiqing Wan, Qiongxiao Wang, Cunqing Ma, Yajun Teng, Jingqiang Lin, Dingfeng Ye. 1340-1343 [doi]
- A Covert TLS Encryption Transmission Method Based on Network Covert ChannelWeikang Yao, Tian Song. 1344-1347 [doi]
- Optical Intra- and Inter-Rack Switching Architecture for Scalable, Low-Latency Data Center NetworksGeorgios Drainakis, Peristera A. Baziana, Adonis Bogris. 1348-1351 [doi]
- Spatio-temporal Behavior in Cyber-Physical Systems from a Natural Phenomena PerspectiveHouda Khlif, Hatem Hadj Kacem, Saúl E. Pomares Hernández, Ojilvie Avila-Cortés. 1358-1361 [doi]
- Multi-Client Searchable Symmetric Encryption in Redactable Blockchain for Conjunctive QueriesRuizhong Du, Na Liu, Mingyue Li, Caixia Ma. 1362-1368 [doi]
- A Comprehensive Evaluation of the Impact on Tor Network Anonymity Caused by ShadowRelayQingfeng Zhang, Jiawei Zhu, Muqian Chen, Xuebin Wang, Qingyun Liu, Jinqiao Shi. 1369-1375 [doi]
- Balancing Robustness and Covertness in NLP Model Watermarking: A Multi-Task Learning ApproachLong Dai, Jiarong Mao, Liaoran Xu, Xuefeng Fan, Xiaoyi Zhou. 1376-1382 [doi]
- A Novel Malware Classification Method Based on Memory Image RepresentationWenjie Liu, Liming Wang. 1404-1409 [doi]
- Color-coded Attribute Graph: Visual Exploration of Distinctive Traits of IoT-Malware FamiliesJiaxing Zhou, Tao Ban, Tomohiro Morikawa, Takeshi Takahashi 0001, Daisuke Inoue. 1410-1416 [doi]
- MFG-R: Chinese Text Matching with Multi-Information Fusion Graph Embedding and Residual ConnectionsGang Liu, Tongli Wang, Yichao Dong, Kai Zhan, Wenli Yang. 1417-1422 [doi]
- Deep Knowledge Tracking Based on Double Attention Mechanism and Cognitive DifficultyJunhong Guo, Yonggang Ding, Ying Li, Lingling Zheng, Xinyue Ma, Lingyun Xiao. 1423-1428 [doi]
- Cryptanalysis of a Lightweight Privacy Enhancing Authentication Scheme for Internet of VehiclesArijit Karati, Li-Chun Chang. 1429-1434 [doi]
- Multi-Agent Deep Reinforcement Learning Based Computation Offloading Approach for LEO Satellite Broadband NetworksJunyu Lai, Huashuo Liu, Yusong Sun, Junhong Zhu, Wanyi Ma, Lianqiang Gan. 1435-1440 [doi]
- DRSDetector: Detecting Gambling Websites by Multi-level Feature FusionYuxin Zhang, Xingyu Fu, Rong Yang, Yangxi Li. 1441-1447 [doi]
- Hunting for Hidden RDP-MITM: Analyzing and Detecting RDP MITM Tools Based on Network FeaturesHao Miao, Zhou Zhou, Renjie Li, Fengyuan Shi, Wei Yang, Shu Li, Qingyun Liu. 1448-1453 [doi]
- FedCrowdSensing: Incentive Mechanism for Crowdsensing Based on Reputation and Federated LearningJianquan Ouyang, Wenke Wang. 1454-1461 [doi]
- GoGDDoS: A Multi-Classifier for DDoS Attacks Using Graph Neural NetworksYuzhen Li, Zhou Zhou, Renjie Li, Fengyuan Shi, Jiang Guo, Qingyun Liu. 1462-1467 [doi]
- Analysis of One-Bit DAC for RIS-Assisted MU Massive MIMO Systems with Efficient Autoencoder Based Deep LearningAhlem Arfaoui, Maha Cherif, Ridha Bouallegue. 1468-1473 [doi]
- Differentially Private Functional Mechanism for Broad Learning SystemJingwen Li, Yingpeng Sang, Hui Tian 0001. 1474-1479 [doi]