Abstract is missing.
- Cache-Enabled Federated Learning SystemsYuezhou Liu, Lili Su, Carlee Joe-Wong, Stratis Ioannidis, Edmund Yeh, Marie Siew. 1-11 [doi]
- Incentive Mechanism Design for Federated Learning and UnlearningNingning Ding, Zhenyu Sun, Ermin Wei, Randall Berry. 11-20 [doi]
- Anarchic Federated learning with Delayed Gradient AveragingDongsheng Li 0003, Xiaowen Gong. 21-30 [doi]
- Connectivity-Aware Semi-Decentralized Federated Learning over Time-Varying D2D NetworksRohit Parasnis, Seyyedali Hosseinalipour, Yun-Wei Chu, Mung Chiang, Christopher G. Brinton. 31-40 [doi]
- 2ACE: Spectral Profile-driven Multi-resolutional Compressive Sensing for mmWave Channel EstimationYiwen Song, Changhan Ge, Lili Qiu, Yin Zhang 0001. 41-50 [doi]
- kaNSaaS: Combining Deep Learning and Optimization for Practical Overbooking of Network SlicesSergi Alcalá-Marín, Antonio Bazco Nogueras, Albert Banchs, Marco Fiore. 51-60 [doi]
- A New Paradigm of Communication-Aware Collaborative Positioning for FutureG Wireless SystemsYu-Tai Lin, Karthikeyan Sundaresan. 61-70 [doi]
- AirFC: Designing Fully Connected Layers for Neural Networks with Wireless SignalsGuillem Reus Muns, Kubra Alemdar, Sara Garcia Sanchez, Debashri Roy, Kaushik R. Chowdhury. 71-80 [doi]
- Age of Information Diffusion on Social Networks: Optimizing Multi-Stage Seeding StrategiesSonghua Li, Lingjie Duan. 81-90 [doi]
- A Whittle Index Policy for the Remote Estimation of Multiple Continuous Gauss-Markov Processes over Parallel ChannelsTasmeen Zaman Ornee, Yin Sun. 91-100 [doi]
- Age Minimization with Energy and Distortion ConstraintsGuidan Yao, Chih-Chun Wang, Ness B. Shroff. 101-110 [doi]
- On a Continuous-Time Martingale and Two ApplicationsSima Mehri, Florin Ciucu. 111-120 [doi]
- The Power of Two Choices with Load Comparison ErrorsSanidhay Bhambay, Arpan Mukhopadhyay, Thirupathaiah Vasantam. 121-130 [doi]
- Network Utility Maximization with Unknown Utility Functions: A Distributed, Data-Driven Bilevel Optimization ApproachKaiyi Ji, Lei Ying 0001. 131-140 [doi]
- Optimizing Sectorized Wireless Networks: Model, Analysis, and AlgorithmPanagiotis Promponas, Tingjun Chen, Leandros Tassiulas. 141-150 [doi]
- Overlay Routing Over an Uncooperative UnderlayYudi Huang, Ting He 0001. 151-160 [doi]
- Distributional-Utility Actor-Critic for Network Slice Performance GuaranteeJingdi Chen, Tian Lan, Nakjung Choi. 161-170 [doi]
- Differentially Private Distributed Online Convex Optimization Towards Low Regret and Communication CostJiandong Liu, Lan Zhang 0002, Xiaojing Yu, Xiang-Yang Li 0001. 171-180 [doi]
- Learning to Schedule in Non-Stationary Wireless Networks With Unknown StatisticsQuang Minh Nguyen, Eytan H. Modiano. 181-190 [doi]
- PRECISION: Decentralized Constrained Min-Max Learning with Low Communication and Sample ComplexitiesZhuqing Liu, Xin Zhang, Songtao Lu, Jia Liu 0001. 191-200 [doi]
- Communication Resources Limited Decentralized Learning with Privacy Guarantee through Over-the-Air ComputationJing Qiao, Shikun Shen, Shuzhen Chen 0001, Xiao Zhang 0015, Tian Lan, Xiuzhen Cheng 0001, Dongxiao Yu. 201-210 [doi]
- Waste Not, Want Not: Service Migration-Assisted Federated Intelligence for Multi-Modality Mobile Edge ComputingHansong Zhou, Shaoying Wang, Chutian Jiang, Xiaonan Zhang, Linke Guo, Yukun Yuan. 211-220 [doi]
- Scalable Multi-Modal Learning for Cross-Link Channel Prediction in Massive IoT NetworksKun Woo Cho, Marco Cominelli, Francesco Gringoli, Joerg Widmer, Kyle Jamieson. 221-229 [doi]
- Wave-for-Safe: Multisensor-based Mutual Authentication for Unmanned Delivery Vehicle ServicesHuanqi Yang, Mingda Han, Shuyao Shi, Zhenyu Yan 0002, Guoliang Xing, Jianping Wang, Weitao Xu. 230-239 [doi]
- EarCase: Sound Source Localization Leveraging Mini Acoustic Structure Equipped Phone Cases for Hearing-challenged PeopleXin Li, Yilin Yang, Zhengkun Ye, Yan Wang, Yingying Chen 0001. 240-249 [doi]
- Optimizing Utility-Energy Efficiency for the Metaverse over Wireless Networks under Physical Layer SecurityJun Zhao 0007, Xinyu Zhou, Yang Li, Liangxin Qian. 250-259 [doi]
- Swirls: Sniffing Wi-Fi Using Radios with Low Sampling RatesZhihui Gao, Yiran Chen 0001, Tingjun Chen. 260-269 [doi]
- SRLoRa: Neural-enhanced LoRa Weak Signal Decoding with Multi-gateway Super ResolutionJialuo Du, Yidong Ren, Zhui Zhu, Chenning Li, Zhichao Cao 0001, Qiang Ma, Yunhao Liu 0001. 270-279 [doi]
- mReader: Concurrent UHF RFID Tag ReadingHossein Pirayesh, Shichen Zhang, Huacheng Zeng. 280-289 [doi]
- LeakageScatter: Backscattering LiFi-leaked RF SignalsMuhammad Sarmad Mir, Minhao Cui, Borja Genovés Guzmán, Qing Wang 0007, Jie Xiong 0001, Domenico Giustiniano. 290-299 [doi]
- Poster: A Novel Region-of-Interest Based UAV Planning Strategy for Mitigating Urban Peak DemandRuide Cao, Jiao Ye, Qian You, Jianghan Xu, Yi Wang, Shiyu Jiang, Yaomin Li. 300-301 [doi]
- Poster: Accordion: Toward a Limited Contention Protocol for Wi-Fi 6 SchedulingShyam Krishnan Venkateswaran, Ching-Lun Tai, Raghupathy Sivakumar. 302-303 [doi]
- Poster: Timestamp Verifiability in Proof-of-WorkTzuo Hann Law, Selman Erol, Lewis Tseng. 304-305 [doi]
- Poster: Extracting Speech from Subtle Room Object Vibrations Using Remote mmWave SensingCong Shi 0004, Tianfang Zhang, Zhaoyi Xu, Shuping Li, Donglin Gao, Changming Li, Athina P. Petropulu, Chung-Tse Michael Wu, Yingying Chen 0001. 306-307 [doi]
- Poster: Unobtrusively Mining Vital Sign and Embedded Sensitive Info via AR/VR Motion SensorsTianfang Zhang, Zhengkun Ye, Ahmed Tanvir Mahdad, Md Mojibur Rahman Redoy Akanda, Cong Shi 0004, Nitesh Saxena, Yan Wang, Yingying Chen 0001. 308-309 [doi]
- Demo: Immersive Remote Monitoring and Control for Internet of ThingsXiaoyi Wu, Jiangong Chen, Rui Tang, Kefan Wu, Bin Li 0014. 310-311 [doi]
- Demo: Meta2Locate: Meta Surface Enabled Indoor Localization in Dynamic EnvironmentsQinpei Luo, Ziang Yang, Boya Di, Chenren Xu. 312-313 [doi]
- Demo: A Prototype for Detecting and Localizing Hidden Devices in Unfamiliar EnvironmentsXiangyu Ju, Biao Han, Yitang Chen, Jinrong Li. 314-315 [doi]
- A hierarchical AI-based control plane solution for multi-technology deterministic networksPietro G. Giardina, Péter Szilágyi, Carla-Fabiana Chiasserini, Jose Luis Carcel, Luis Velasco, Salvatore Spadaro, Fernando Agraz, Sebastian Robitzsch, Rafael Rosales, Valerio Frascolla, Roya Doostnejad, Alejandro Calvillo, Giacomo Bernini. 316-321 [doi]
- Enabling Programmable Deterministic Communications in 6GMinh-Thuyen Thi, Siwar Ben Hadj Said, Adrien Roberty, Fadlallah Chbib, Rida Khatoun, Leonardo Linguaglossa. 322-327 [doi]
- Using RAW as Control Plane for Wireless Deterministic Networks: Challenges AheadCarlos J. Bernardos, Alain Mourad, Milan Groshev, Luis M. Contreras 0001, Marc Mollà Roselló, Otilia Bularca, Valerio Frascolla, Péter Szilágyi, Sebastian Robitzsch. 328-333 [doi]
- In-Network Quality Control of IP Camera StreamsCsaba Györgyi, Károly Kecskeméti, Péter Vörös, Sándor Laki, Géza Szabó. 334-339 [doi]
- Towards extreme network KPIs with programmability in 6GGergely Pongrácz, Attila Mihály, István Gódor, Sándor Laki, Anastasios Nanos, Chrysa Papagianni. 340-345 [doi]
- In-Network Security Applications with P4RROTKároly Kecskeméti, Csaba Györgyi, Péter Vörös, Sándor Laki. 346-351 [doi]
- Aligning rTWT with 802.1Qbv: a Network Calculus ApproachCarlos Barroso-Fernández, Jorge Martín-Pérez, Constantine Ayimba, Antonio de la Oliva. 352-354 [doi]
- Failure Prediction in Software Defined Flying Ad-hoc NetworkDomenico Uomo, Andrea Sgambelluri, Piero Castoldi, Emiliano De Paoli, Francesco Paolucci, Filippo Cugini. 355-357 [doi]
- BODOQUE: An Energy-Efficient Flow Monitoring System for Ephemeral StreamsBenjamín Arratia, Javier Prades, Salvador Peña-Haro, José Maria Cecilia, Pietro Manzoni. 358-363 [doi]
- Machine Learning-based Energy Optimisation in Smart City Internet of ThingsEric Samikwa, Jakob Schärer, Torsten Braun, Antonio Di Maio. 364-369 [doi]
- Detect-IoT: A Comparative Analysis of Machine Learning Algorithms for Detecting Compromised IoT DevicesYuba Raj Siwakoti, Danda B. Rawat. 370-375 [doi]
- The Upsides of Turbulence: Baselining Gossip Learning in Dynamic SettingsAntonio Di Maio, Mina Aghaei Dinani, Gianluca Rizzo. 376-381 [doi]
- Deception in Drone Surveillance Missions: Strategic vs. Learning ApproachesZelin Wan, Jin-Hee Cho, Mu Zhu, Ahmed H. Anwar, Charles A. Kamhoua, Munindar P. Singh. 382-387 [doi]
- Detection of Global Anomalies on Distributed IoT Edges with Device-to-Device CommunicationHideya Ochiai, Riku Nishihata, Eisuke Tomiyama, Yuwei Sun, Hiroshi Esaki. 388-393 [doi]
- ODEL: an On-Demand Edge-Learning framework exploiting Flying Ad-hoc NETworks (FANETs)Giorgia Maria Cappello, Gabriella Colajanni, Patrizia Daniele, Laura Galluccio, Christian Grasso, Giovanni Schembra, Laura Scrimali 0001. 394-399 [doi]
- An Approach Towards the Security Management for Sensitive Medical Data in the IoMT EcosystemPushpita Chatterjee, Debashis Das, Sourav Banerjee, Uttam Ghosh, Armando B. Mpembele, Tamara Rogers. 400-405 [doi]
- Vehicular Safety Revolution: A Cutting-Edge Communication Paradigm for Accident PreventionSidheswar Routray, Amrit Suman, Preetam Suman, Sasmita Padhy, Pushpita Chatterjee, Sachin Shetty. 406-411 [doi]
- Phone-based CSI Hand Gesture Recognition with Lightweight Image-Classification ModelAshkan Arabi, Michael Straus, Zijie Tang, Zhengkun Ye, Yan Wang. 412-417 [doi]
- Evaluating Performance of Intrusion Detection Systems under Different Configurations in SDNDennis Yeom, Nadia Niknami, Jie Wu 0001. 418-423 [doi]
- Wi-Alert: WiFi Sensing for Real-time Package Theft Alerts at Residential DoorstepsMaya McDonough, Thomas Moomaw, Md Touhiduzzaman, Eyuphan Bulut. 424-429 [doi]
- Cybersecurity Simulator for Connected and Autonomous VehiclesSean Folan, Yunsheng Wang. 430-435 [doi]
- Exploring the Potential of Frama-C in IoT Static AnalysisMinh Le Kim Tran, William King, Harvey P. Siy. 436-441 [doi]
- PACE: Providing Authentication through Computational Gait Evaluation with Deep learningJesus Rodriguez, Jong-Hoon Youn. 442-446 [doi]
- UAV Control Using Eye Gestures: Exploring the Skies Through Your EyesBrandon Dominic Vilela, Kshitij Kokkera, Amirahmad Chapnevis, Eyuphan Bulut. 447-452 [doi]
- Intuitive Human-Swarm Interaction with Gesture Recognition and Machine LearningGolan Khen, Detim Zhao, José Baca. 453-456 [doi]
- Generalized Path Planning for Collaborative UAVs using Reinforcement and Imitation LearningJack Farley, Amirahmad Chapnevis, Eyuphan Bulut. 457-462 [doi]
- Expanding Elementary School Computer Science Education with an Introduction to Machine Learning Through Rhythmic StudiesHolly Hunter, Jamie Payton, Christine Julien 0001. 463-467 [doi]
- Advancing Active Authentication for User Privacy and Revocability with BioCapsulesEdwin Antonio Sanchez, Anthony Weyer, Joseph Palackal, Kai Wang, Tyler Phillips, Xukai Zou. 468-473 [doi]
- Taking a Look into the Cookie Jar: A Comprehensive Study towards the Security of Web CookiesSean Chen, Jaelyn McCracken, Kevin Lu, Tao Wang, Tao Hou. 474-479 [doi]
- Evaluating the Impact of Noisy Point Clouds on Wireless Gesture Recognition SystemsPaul Jiang, Ellie Fassman, Amit Singha, Yimin Chen, Tao Li. 480-485 [doi]
- Link Budgeting and Interference Management for UAV Networks in 5G and BeyondHenry Michaelson, Nolan Pettit, Vaishnavi Annabhemoju, Shuai Nie, Justin Bradley. 486-491 [doi]
- UAV GPS Spoofing Detection via Neural Generative One-Class ClassificationJoseph Brewington, Dulal Kar. 492-497 [doi]
- Comparing Classifiers: A Look at Machine-Learning and the Detection of Mobile Malware in COVID-19 Android Mobile ApplicationsSeth Johnson, Ray Donner, Alfredo J. Perez. 498-503 [doi]
- MSVEC: A Multidomain Testing Dataset for Scientific Claim VerificationMichael Evans, Dominik Soós, Ethan Landers, Jian Wu 0006. 504-509 [doi]
- Privacy-Preserving Collision Detection for Drone-based Aerial Package Delivery using Secure Multi-Party ComputationAnushka Desai, Oscar G. Bautista, Kemal Akkaya. 510-515 [doi]
- Sorting Ransomware from Malware Utilizing Machine Learning Methods with Dynamic AnalysisJoshua Schoenbachler, Vinay Krishnan, Garvit Agarwal, Feng Li. 516-521 [doi]
- No-Fly-Zone: Regulating Drone Fly-Overs Via Government and User-Controlled Authorization ZonesAbdullah Kamal, Jeremy Vidaurri, Carlos Rubio-Medrano. 522-527 [doi]
- Wireless Channel Prediction in Different Locations Using Transfer LearningJieying Chen, Abdalaziz Sawwan, Shuhui Yang, Jie Wu. 528-533 [doi]
- TrustNetFL: Enhancing Federated Learning with Trusted Client Aggregation for Improved SecurityDavid Chen, Kehan Wang, Agnideven Palanisamy Sundar, Feng Li. 534-539 [doi]
- Exploring TikTok as an Educational Tool for Speech-Language Pathologists, Special Education, and General EducationAnne Marie Perrotti, Isabelle Puwo, Sampath Jayarathna. 540-544 [doi]
- Toward a Better Understanding of the Emotional Dynamics of Negotiation with Large Language ModelsEleanor Lin, James Hale, Jonathan Gratch. 545-550 [doi]
- UGVs in Agriculture: Steering control system to navigate through fields via waypointsMatthew Ybarra, Mahmoud Eldefrawy, Scott A. King. 551-555 [doi]
- Mitigating Racial Biases for Machine Learning Based Skin Cancer DetectionJulian Abhari, Ashwin Ashok. 556-561 [doi]
- Poster: Opinion Dynamics for Enhancing Trust and Security in Connected Vehicle NetworksGianna Voce, Marbella Castillo, Henry Griffith, Heena Rathore. 562-564 [doi]
- Poster: Scenario Creation for Immersive Automotive Security ExplorationAidan Kwok, Richard Owoputi, Sandip Ray. 565-567 [doi]
- Poster: Dynamic and NM1-Right Selection for the Parallel Iterative Improvement Stable Matching AlgorithmAlec Kyritsis, Scott Wynn, Stephora Cesar Alberi, Enyue Lu. 568-570 [doi]
- Poster: Vehicle-to-Infrastructure Security for Reduced Speed Work ZonePatrick M. Mendoza, Tashfique Hasnine Choudhury, Sandip Ray. 571-573 [doi]
- Poster: Decentralized Simulation Workflow for Enhancing Connected Vehicle SecurityMarbella Castillo, Gianna Voce, Henry Griffith, Heena Rathore. 574-576 [doi]
- Poster: Binge drinking risk factors ranking using multi-task learningDaniel Gallegos, Elaine Raymond, Lu Wang. 577-579 [doi]
- Poster: Leveraging Data Analysis and Machine Learning to Authenticate Yelp Reviews through User Metadata PatternsJohnovon Richards, Saumya Dabhi, Faryaneh Poursardar, Sampath Jayarathna. 580-582 [doi]
- Poster: Emotional Language in News: Detection and InterventionNathan Chen, Genevieve Bartlett. 583-585 [doi]
- Poster: No Fly-Zone: Drone Policies for Ensuring Safe Operations in Restricted AreasArturo Gonzalez, Amani Davidson, Carlos Rubio-Medrano. 586-588 [doi]
- Poster: Efficient Exploration of Automotive Ranging Sensor AttacksJack Carter, Bhagawat Baanav Yedla Ravi, Md Rafiul Kabir, Sandip Ray. 589-591 [doi]
- Poster: Unraveling Reward Functions for Head-to-Head Autonomous Racing in AWS DeepRacerAllen Tian, Eddy Guerra John, Kecheng Yang 0001. 592-594 [doi]
- Poster: Simulation and Experimental Evaluation of Wireless Remote Controlled Underwater VehiclesOriana Matney, Parker Wilmoth, Solomon Markowitz, Connor Rieth, Batsheva Gil, Jared Hermans, George Sklivanitis, Dimitris A. Pados. 595-597 [doi]