Abstract is missing.
- Sequence-Based Indoor Relocalization for Mobile Augmented RealityKun Wang, Jiaxing Che, Zhejun Shen. 1-5 [doi]
- A Clustering Method of Encrypted Video Traffic Based on Levenshtein DistanceLuMing Yang, Shaojing Fu, Yuchuan Luo, Yongjun Wang, Wentao Zhao. 1-8 [doi]
- A Distributed Hybrid Load Management Model for Anycast CDNsJing'an Xue, Haibo Wang, Jilong Wang 0001, Zhe Chen, Tong Li. 9-16 [doi]
- A Hierarchical Incentive Mechanism for Coded Federated LearningJer Shyuan Ng, Wei Yang Bryan Lim, Zehui Xiong, Xianjun Deng, Yang Zhang 0025, Dusit Niyato, Cyril Leung. 17-24 [doi]
- A Large Inter-satellite Non-dependent Routing Technology - IS-OLSRDongkun Huo, Qiang Liu, Yantao Sun, Huiling Li. 25-31 [doi]
- A Node Importance Ranking Method Based on the Rate of Network Entropy ChangesQian Chen, Xian Zhao, Wenyue Sun, Changda Wang 0001. 32-39 [doi]
- A Novel Deployment Method for UAV-mounted Mobile Base StationsDi Wu, Juan Xu, Jiabin Yuan, Xiangping Zhai. 40-47 [doi]
- A robust fixed path-based routing scheme for protecting the source location privacy in WSNsLingling Hu, Liang Liu, Yulei Liu, Wenbin Zhai, Xinmeng Wang. 48-55 [doi]
- A Scheduling Scheme in a Container-Based Edge Computing Environment Using Deep Reinforcement Learning ApproachTingting Lu, Fanping Zeng, Jingfei Shen, Guozhu Chen, Wenjuan Shu, Weikang Zhang. 56-65 [doi]
- Activity Selection to Distinguish Healthy People from Parkinson's Disease Patients Using I-DALiu Tao, Xiang Wang, Xiyang Peng, Po Yang 0001, Jun Qi 0001, Yun Yang 0003. 66-73 [doi]
- An Improved Online Multiple Pedestrian Tracking Based on Head and Body DetectionZhihong Sun, Jun Chen 0001, Mithun Mukherjee 0001, Haihui Wang, Dang Zhang. 74-80 [doi]
- Analyzing a 5G Dataset and Modeling Metrics of InterestFidan Mehmeti, Thomas F. La Porta. 81-88 [doi]
- AWGAN: Unsupervised Spectrum Anomaly Detection with Wasserstein Generative Adversarial Network along with Random Reverse MappingWeiqing Huang, Bingyang Li, Wen Wang, Meng Zhang, Sixue Lu, Yushan Han. 89-96 [doi]
- BALSAPro: Towards A Security Protocol for Bluetooth Low EnergyMohamad Muwfak Hlal, Weizhi Meng 0001. 97-104 [doi]
- Blockchain-based Access Control Model to Preserve Privacy for Students' Credit InformationQuanwen He, Hui Lin, Fu Xiao, Jia Hu 0001, Xiaoding Wang. 105-111 [doi]
- Caching, Recommendations and Opportunistic Offloading at the Network EdgeMargarita Vitoropoulou, Konstantinos Tsitseklis, Vasileios Karyotis, Symeon Papavassiliou. 112-119 [doi]
- Collecting Spatial Data Under Local Differential PrivacyYutong Ye, Min Zhang, Dengguo Feng. 120-127 [doi]
- CRATES: A Cache Replacement Algorithm for Low Access Frequency Period in Edge ServerPengmiao Li, Yuchao Zhang, Huahai Zhang, Wendong Wang, Ke Xu 0002, Zhili Zhang. 128-135 [doi]
- Deep Transfer Learning for Cross-Device Channel Classification in mmWave WirelessAhmed Almutairi, Suresh Srinivasan, Alireza Keshavarz-Haddad, Ehsan Aryafar. 136-144 [doi]
- Defending Against Byzantine Attacks in Quantum Federated LearningQi Xia, Zeyi Tao, Qun Li. 145-152 [doi]
- Defending against Membership Inference Attacks in Federated learning via Adversarial ExampleYuanyuan Xie, Bing Chen, Jiale Zhang, Di Wu. 153-160 [doi]
- Design and Implementation of a RISC V Processor on FPGALudovico Poli, Sangeet Saha, Xiaojun Zhai, Klaus D. McDonald-Maier. 161-166 [doi]
- DeSMP: Differential Privacy-exploited Stealthy Model Poisoning Attacks in Federated LearningMd Tamjid Hossain, Shafkat Islam, Shahriar Badsha, Haoting Shen. 167-174 [doi]
- Distributed Routing Protocol for Large-Scale Backscatter-enabled Wireless Sensor NetworkFengyu Zhou, Hao Zhou 0001, Shan Wang, Wangqiu Zhou, Zhi Liu, Xiang-Yang Li. 175-182 [doi]
- DPFDT: Decentralized Privacy-preserving Fair Data Trading SystemXiangyu Li, Zhenfu Cao, Jiachen Shen, Xiaolei Dong. 183-190 [doi]
- Efficient Privacy-Preserving Federated Learning for Resource-Constrained Edge DevicesJindi Wu, Qi Xia, Qun Li. 191-198 [doi]
- Evaluating Multimedia Protocols on 5G Edge for Mobile Augmented RealityJacky Cao, Xiang Su, Benjamin Finley, Antti Pauanne, Mostafa H. Ammar, Pan Hui 0001. 199-206 [doi]
- FedHe: Heterogeneous Models and Communication-Efficient Federated LearningChan Yun Hin, Edith C. H. Ngai. 207-214 [doi]
- FIDS: A Federated Intrusion Detection System for 5G Smart Metering NetworkParya Haji Mirzaee, Mohammad Shojafar, Zahra Pooranian, Pedram Asefy, Haitham S. Cruickshank, Rahim Tafazolli. 215-222 [doi]
- Flow Transformer: A Novel Anonymity Network Traffic Classifier with Attention MechanismRuijie Zhao, Yiteng Huang, Xianwen Deng, Zhi Xue, Jiabin Li, Zijing Huang, Yijun Wang. 223-230 [doi]
- FlowFormers: Transformer-based Models for Real-time Network Flow ClassificationRushi Babaria, Sharat Chandra Madanapalli, Himal Kumar, Vijay Sivaraman. 231-238 [doi]
- FNEL: An Evolving Intrusion Detection System Based on Federated Never-Ending LearningTian Qin, Guang Cheng 0001, Wenchao Chen, Xuan Lei. 239-246 [doi]
- Friendship Understanding by Smartphone-based Interactions: A Cross-space PerspectiveLiang Wang 0017, Haixing Xu, Zhiwen Yu 0001, Rujun Guan, Bin Guo 0001, Zhuo Sun. 247-254 [doi]
- From Wired to Wireless BMS in Electric VehiclesFabian A. Rincon Vija, Samuel Cregut, Georgios Z. Papadopoulos, Nicolas Montavont. 255-262 [doi]
- FullSight: Towards Scalable, High-Coverage, and Fine-grained Network TelemetrySen Ling, Waixi Liu, Yinghao Zhu, Miaoquan Tan, Jieming Huang, Zhenzheng Guo, Wen-Hong Lin. 263-270 [doi]
- IDS: An Intelligent Data Semantics System for Communication Link Prediction in SIoTBo Wang 0011, Zunfu Huang, Dongming Zhao, Kun Huang, Meixian Song, Qinxue Jiang, Naixue Xiong. 271-278 [doi]
- IMFi: IMU-WiFi based Cross-modal Gait Recognition System with Hot-DeploymentZengyu Song, Hao Zhou 0001, Shan Wang, Jinmeng Fan, Kaiwen Guo, Wangqiu Zhou, Xiaoyan Wang, Xiang-Yang Li. 279-286 [doi]
- Impact of UAV Mobility on Physical Layer SecurityRukhsana Ruby, Basem M. ElHalawany, Kaishun Wu. 287-295 [doi]
- Joint Task Offloading and Resource Allocation for MEC Networks Considering UAV TrajectoryXiyu Chen, Yangzhe Liao, Qingsong Ai, Ke Zhang. 296-302 [doi]
- Learning Discriminative Features for Adversarial RobustnessRyan Hosler, Tyler Phillips, Xiaoyuan Yu, Agnideven Palanisamy Sundar, Xukai Zou, Feng Li 0001. 303-310 [doi]
- Leveraging blockchain for cross-institution data sharing and authentication in mobile healthcareLe Lai, Tongqing Zhou, Zhiping Cai, Jiaping Yu, Hao Bai, Jinhua Cui. 311-318 [doi]
- Long-Term Visual Localization with Semantic Enhanced Global RetrievalHongrui Chen, Yuan Xiong, Jingru Wang, Zhong Zhou. 319-326 [doi]
- Matching Theory Aided Federated Learning Method for Load Forecasting of Virtual Power PlantMin Yan, Li Wang, Xuanyuan Wang, Liang Li, Lianming Xu, Aiguo Fei. 327-333 [doi]
- Method for Detecting and Analyzing the Compromising Emanations of USB Storage DevicesBo Liu, Yanyun Xu, Weiqing Huang, Shaoying Guo. 334-340 [doi]
- Mining Centralization of Internet Service Infrastructure in the WildBingyang Guo, Fan Shi, Chengxi Xu, Min Zhang, Yang Li. 341-349 [doi]
- Mobility-Aware Efficient Task Offloading with Dependency Guarantee in Mobile Edge Computing NetworksQi Wu, Guolin Chen, Xiaoxia Huang. 350-357 [doi]
- Modeling and Analysis of Medical Resource Sharing and Scheduling for Public Health Emergencies based on Petri NetsWangyang Yu, Menghan Jia, Bo Yuan. 358-365 [doi]
- Modeling Disease Progression Flexibly with Nonlinear Disease Structure via Multi-task LearningMenghui Zhou, Xulong Wang, Yun Yang 0003, Fengtao Nan, Yu Zhang, Jun Qi 0001, Po Yang 0001. 366-373 [doi]
- Multi-Source Data-Driven Route Prediction for Instant DeliveryZhiyuan Zhou, Xiaolei Zhou, Yao Lu, Hua Yan, Baoshen Guo, Shuai Wang. 374-381 [doi]
- Neural Adaptive IoT Streaming Analytics with RL-AdaptBonan Shen, Chenhong Cao, Tong Liu, Jiangtao Li, Yufeng Li. 382-389 [doi]
- One-Class Support Vector Machine with Particle Swarm Optimization for Geo-Acoustic Anomaly DetectionDan Zhang, Yiwen Liang, Zhihong Sun, Mithun Mukherjee 0001. 390-395 [doi]
- Personalized Path Recommendation with Specified Way-points Based on Trajectory RepresentationsBing Wang, Yuchun Guo, Yishuai Chen. 396-403 [doi]
- Publish or Perish: Defending Withholding Attack in Dfinity ConsensusHanzheng Lyu, Jianyu Niu, Fangyu Gai, Chen Feng 0001. 404-411 [doi]
- ReDetect: Reentrancy Vulnerability Detection in Smart Contracts with High AccuracyRutao Yu, Jiangang Shu, Dekai Yan, Xiaohua Jia. 412-419 [doi]
- Reinforcement Learning based Scheduling for Heterogeneous UAV NetworkingJian Wang 0061, Yongxin Liu, Shuteng Niu, Houbing Song. 420-427 [doi]
- Resource Demand Prediction of Cloud Workloads Using an Attention-based GRU ModelWenjuan Shu, Fanping Zeng, Zhen Ling, Junyi Liu, Tingting Lu, Guozhu Chen. 428-437 [doi]
- RF-Vsensing: RFID-based Single Tag Contactless Vibration Sensing and RecognitionBiaokai Zhu, Liyun Tian, Die Wu, Meiya Dong, Sheng Gao, Lu Zhang, Sanman Liu, Deng-ao Li. 438-445 [doi]
- Rosella: A Self-Driving Distributed Scheduler for Heterogeneous ClustersQiong Wu 0008, Zhenming Liu. 446-453 [doi]
- SecQSA: Secure Sampling-Based Quantile Summary Aggregation in Wireless Sensor NetworksAishah Aseeri, Rui Zhang. 454-461 [doi]
- Soft Actor-Critic Algorithm for 360-Degree Video Streaming with Long-Term Viewport PredictionXiaosong Gao, Jiaxin Zeng, Xiaobo Zhou 0003, Tie Qiu 0001, Keqiu Li. 462-469 [doi]
- TAP: A Traffic-Aware Probabilistic Packet Marking for Collaborative DDoS MitigationMingxing Liu, Ying Liu, Ke Xu 0002, Lin He 0004, Xiaoliang Wang, Yangfei Guo, Weiyu Jiang. 470-478 [doi]
- Time-varying Contact Management with Dynamic Programming for LEO Satellite NetworksFeng Wang, Dingde Jiang, Yingjie Chen, Houbing Song, Zhihan Lv. 479-485 [doi]
- Towards DTW-based Unlock Scheme using Handwritten Graphics on SmartphonesLi Wang, Weizhi Meng 0001, Wenjuan Li. 486-493 [doi]
- Towards Efficient Co-audit of Privacy-Preserving Data on Consortium Blockchain via Group Key AgreementXiaoyan Hu, Xiaoyi Song, Guang Cheng 0001, Jian Gong, Lu Yang, Honggang Chen, Zhichao Liang. 494-501 [doi]
- Towards Heap-Based Memory Corruption DiscoveryWenzhi Wang, Meng Fan, Aimin Yu, Dan Meng. 502-511 [doi]
- TraceModel: An Automatic Anomaly Detection and Root Cause Localization Framework for Microservice SystemsYang Cai, Biao Han, Jinshu Su, Xiaoyan Wang. 512-519 [doi]
- Unsupervised Federated Adversarial Domain Adaptation for Heterogeneous Internet of ThingsJinfeng Ma, Mengxuan Du, Haifeng Zheng, Xinxin Feng. 520-527 [doi]
- Wireless Network Abnormal Traffic Detection Method Based on Deep Transfer Reinforcement LearningYuanjun Xia, Shi Dong, Tao Peng 0006, Tao Wang. 528-535 [doi]
- A Location-Aware Cross-Layer MAC Protocol for Vehicular Visible Light CommunicationsAgon Memedi, Falko Dressler. 536-542 [doi]
- Communication-efficient Subspace Methods for High-dimensional Federated LearningZai Shi, Atilla Eryilmaz. 543-550 [doi]
- Deep Learning for Cyber Deception in Wireless NetworksFelix O. Olowononi, Ahmed H. Anwar, Danda B. Rawat, Jaime C. Acosta, Charles A. Kamhoua. 551-558 [doi]
- Deep Learning on Visual and Location Data for V2I mmWave BeamformingGuillem Reus Muns, Batool Salehi, Debashri Roy, Tong Jian, Zifeng Wang 0002, Jennifer G. Dy, Stratis Ioannidis, Kaushik R. Chowdhury. 559-566 [doi]
- Deep Reinforcement Learning-based Edge Caching and Multi-link Cooperative Communication in Internet-of-VehiclesTeng Ma, Xin Chen 0018, Libo Jiao, Ying Chen. 567-574 [doi]
- Distributed Task Offloading based on Multi-Agent Deep Reinforcement LearningShucheng Hu, Tao Ren, Jianwei Niu 0002, Zheyuan Hu, Guoliang Xing. 575-583 [doi]
- DVC: An Deductable Video Coding for Video Broadcast in Highly Dynamic NetworksYunhuai Liu, Yonggui Huang, Sheng Gu. 584-591 [doi]
- Gaming at the Edge: A Weighted Congestion Game Approach for Latency-Sensitive SchedulingXuezheng Liu, Ke Liu, Guoqiao Ye, Miao Hu, Yipeng Zhou, Di Wu 0001. 592-599 [doi]
- Measuring Consumption Changes in Rural Villages based on Satellite Image Data - A Case Study for Thailand and VietnamFabian Wölk, Tingting Yuan, Krisztina Kis-Katos, Xiaoming Fu 0001. 600-607 [doi]
- MM-QUIC: Mobility-aware Multipath QUIC for Satellite NetworksWenjun Yang, Shengjie Shu, Lin Cai 0001, Jianping Pan 0001. 608-615 [doi]
- Network Security by Merging two Robust Tools from the Mathematical FirmamentAndreas Andreou, Constandinos X. Mavromoustakis, George Mastorakis, Jordi Mongay Batalla. 616-621 [doi]
- Performance Comparison of Hybrid Encryption-based Access Control Schemes in NDNHtet Htet Hlaing, Yuki Funamoto, Masahiro Mambo. 622-627 [doi]
- Qualitative Communication for Emerging Network Applications with New IPRichard Li, Lijun Dong, Cédric Westphal, Kiran Makhijani. 628-637 [doi]
- The Algorithm of Multi-source to Multi-sink Traffic schedulingYang Liu, Lei Liu 0003, Zhongmin Yan, Jia Hu 0001. 638-644 [doi]
- Towards an Energy-Efficient DQN-based User Association in Sub6GHz/mmWave Integrated NetworksThi Ha Ly Dinh, Megumi Kaneko, Keisuke Wakao, Kenichi Kawamura, Takatsune Moriyama, Yasushi Takatori. 645-652 [doi]
- Towards High Accuracy Low Latency Real-Time Road Information Collection: An Edge-Assisted Sensor Fusion ApproachYou Luo, Feng Wang, Jiangchuan Liu. 653-660 [doi]
- User Cooperative Mobility for Higher QoS in Ad Hoc Network: Framework and EvaluationTutomu Murase. 661-670 [doi]
- Website Fingerprinting on Access network and Core GatewayHantao Mei, Guang Cheng, Wei Gao, Junqiang Chen. 671-678 [doi]
- Demonstrator Game Showcasing Indoor Positioning via BLE Signal StrengthFelix Beierle, Hai Dinh-Tuan, Yong Wu. 679-680 [doi]
- Indoor Navigation for Users with Mobility Aids Using Smartphones and Neighborhood NetworksBo Hui, Chen Jiang, Pavani Ankireddy, Wenlu Wang, Wei-Shinn Ku. 681-682 [doi]
- L-KPCA: an efficient feature extraction method for network intrusion detectionJinfu Chen 0001, Shang Yin, Saihua Cai, Lingling Zhao, Shengran Wang. 683-684 [doi]
- Optimizing microservices with hyperparameter optimizationHai Dinh-Tuan, Katerina Katsarou, Patrick Herbke. 685-686 [doi]
- Examing and Evaluating Dimension Reduction Algorithms for Classifying Alzheimer's Diseases using Gene Expression DataShunbao Li, Po Yang 0001, Vitaveska Lanfranchi. 687-693 [doi]
- LSTM for Periodic Broadcasting in Green IoT Applications over Energy Harvesting Enabled Wireless Networks: Case Study on ADAPCASTMustapha Khiati, Djamel Djenouri, Jianguo Ding, Youcef Djenouri. 694-699 [doi]
- MsfNet: a novel small object detection based on multi-scale feature fusionZiying Song, Peiliang Wu, Kuihe Yang, Yu Zhang, Yi Liu. 700-704 [doi]
- Under-determined Blind Speech Separation via the Convolutive Transfer Function and lp RegularizationLiu Yang, Junjie Yang, Yi Guo. 705-709 [doi]
- Toward Dispersed Computing: Cases and State-of-The-ArtSen Yuan, GeMing Xia, Jian Chen, Chaodong Yu. 710-717 [doi]
- Trust Evaluation of Computing Power Network Based on Improved Particle Swarm Neural NetworkChaodong Yu, GeMing Xia, Zhaohang Wang. 718-725 [doi]
- 2prong: Adaptive Video Streaming with DNN and MPCYipeng Wang 0010, Tongqing Zhou, Changsheng Hou, Bingnan Hou, Zhiping Cai. 726-731 [doi]
- FDataCollector: A Blockchain Based Friendly Web Data Collection SystemJing Wang, Weiping Zhu, Jianqiao Lai, Zhu Wang. 732-739 [doi]
- Mobile Unattended-Operation Detector for Bulk Dangerous Goods HandlingNicola Zingirian, Federico Botti. 740-745 [doi]
- The Design and Implementation of an Efficient Quaternary Network Flow Watermark TechnologyLusha Mo, Gaofeng Lv, Baosheng Wang, Guanjie Qiao, Jing Tan. 746-751 [doi]
- TSCF: An Efficient Two-Stage Cuckoo Filter for Data DeduplicationTao Liu, Qinshu Chen, Hui Li, Bohui Wang, Xin Yang. 752-757 [doi]
- A DDoS protection method based on traffic scheduling and scrubbing in SDNYiwei Yu, Guang Cheng 0001, Zihan Chen, Haoxuan Ding. 758-765 [doi]
- Adaptive Distributed Beacon Congestion Control with Machine Learning in VANETsMahboubeh Mohammadi, Ali Balador, Zaloa Fernández, Iñaki Val. 766-771 [doi]
- AND: Effective Coupling of Accuracy, Novelty and Diversity in the Recommender SystemDi Han, Yifan Huang, Xiaotian Jing, Junmin Liu. 772-777 [doi]
- Attention-based Bicomponent Synchronous Graph Convolutional Network for traffic flow predictionCheng Shen, Kai Han, Tianyuan Bi. 778-785 [doi]
- Intelligent IDS Chaining for Network Attack Mitigation in SDNMikhail Zolotukhin, Pyry Kotilainen, Timo Hämäläinen 0002. 786-791 [doi]
- Interference and Consultation in Virtual Public Space: The Practice of Intermedia Art in MetaverseRongman Hong, Hao He. 792-797 [doi]
- Large-Area Human Behavior Recognition with Commercial Wi-Fi DevicesTao Liu, Shengli Pan 0003, Peng Li. 798-805 [doi]
- Reliable Routing and Scheduling in Time-Sensitive NetworksHongtao Li, Hao Cheng, Lei Yang. 806-811 [doi]
- Seshat: Decentralizing Oral History Text AnalysisLin Wang, Lehao Lin, Xiao Wu, Rongman Hong. 812-817 [doi]
- A Secure And High Concurrency SM2 Cooperative Signature Algorithm For Mobile NetworkWenfei Qian, Pingjian Wang, Lingguang Lei, Tianyu Chen, Bikuan Zhang. 818-824 [doi]
- On Firefly Synchronization of Sleep Phases in Energy Efficient Meshed NetworksGuido Dietl. 825-830 [doi]
- Power information integrated display system based on interconnection technologyXiazhe Tu, Chao Xun, Xiangyu Wu, Jinbo Li, Lingyi Yang. 831-836 [doi]
- Research and Application of Intelligent Distribution Network Planning for Multi-source Data FusionZhe Wang, Hongda Zhao, Mingxia Zhu. 837-842 [doi]
- Research on Visual Engine of Smart Planning System Based on Internet of ThingsHongda Zhao, Mingxia Zhu, Zhe Wang. 843-848 [doi]