Abstract is missing.
- WIP: Performance Metrics of PUF-based Authentication Protocols for Smart Grid: A ReviewTaylah Griffiths, Mohiuddin Ahmed, Shihao Yan. 1-4 [doi]
- An Enhanced Threat Intelligence Driven Hybrid Model for Information Security Risk ManagementHabib El Amin, Abed Ellatif Samhat, Maroun Chamoun, Lina Oueidat, Antoine Feghali. 5-12 [doi]
- Survey and Experimentation to Compare IoT Device Model Identification MethodsNorihiro Okui, Masataka Nakahara, Ayumu Kubota. 13-17 [doi]
- Preserving Data Integrity and Detecting Toxic Recordings in Machine Learning using BlockchainBechir Alaya, Tarek Moulahi, Salim el Khediri, Suliman Aladhadh. 18-23 [doi]
- Enhancing Cybersecurity Training Efficacy: A Comprehensive Analysis of Gamified Learning, Behavioral Strategies and Digital TwinsYagmur Yigit, Kitty Kioskli, Laura Bishop, Nestoras Chouliaras, Leandros Maglaras, Helge Janicke. 24-32 [doi]
- Efficient Binary Task Offloading Optimization in Large-Scale IoT Networks via UAV-Enhanced Mobile Edge ComputingXiangdong Yang, Huaiwen He, Hong Shen 0001, Aiguo Chen, Hui Tian 0001. 33-38 [doi]
- Unveiling Behavioral Transparency of Protocols Communicated by IoT Networked AssetsSavindu Wannigama, Arunan Sivanathan, Ayyoob Hamza, Hassan Habibi Gharakheili. 39-44 [doi]
- Is Edge Computing Always Suitable for Image Analysis? An Experimental AnalysisFrancesca Righetti, Carlo Vallati, Nirmalya Roy, Giuseppe Anastasi. 45-50 [doi]
- Performance Analysis of a Cognitive Radio Assisted Cooperative NOMA UAV SystemThi My Chinh Chu, Hans-Jürgen Zepernick. 51-56 [doi]
- Minimizing Age of Information: Adaptive Spectrum Sharing in Ultra-Reliable and Low-Latency eVTOL CommunicationsIshan Aryendu, Sudhanshu Arya, Ying Wang. 57-63 [doi]
- Advancing Federated Learning: Optimizing Model Accuracy through Privacy-Conscious Data SharingRihab Saidi, Tarek Moulahi, Suliman Aladhadh, Salah Zidi. 64-69 [doi]
- Effect of Duration and Delay on the Identifiability of VR MotionMark Roman Miller, Vivek Nair, Eugy Han, Cyan DeVeaux, Christian Rack, Rui Wang, Brandon Huang, Marc Erich Latoschik, James F. O'Brien, Jeremy N. Bailenson. 70-75 [doi]
- Threats of Extended Reality (XR) Applications to Teaching and Learning: Instructors' perspectivesAidrina Mohamed Sofiadin. 76-78 [doi]
- Protecting Privacy: A Gateway to Freedom of Opinion and Expression in Virtual RealityHinako Sugiyama, Curtis Ferrarini, Eric Lau. 79-84 [doi]
- Effect of Data Degradation on Motion Re-IdentificationVivek Nair, Mark Roman Miller, Rui Wang, Brandon Huang, Christian Rack, Marc Erich Latoschik, James F. O'Brien. 85-90 [doi]
- Towards Privacy-Preserving Mixed Reality: Legal and Technical ImplicationsJuliane Mendelsohn, Stephan Werner 0003, Philipp Richter, Thomas Köllmer, Tobias Schwandt, Wolfgang Broll. 91-96 [doi]
- Multiclass AUC for Comparison of Identification Effectiveness Across Classification Set SizesMark Roman Miller. 97-98 [doi]
- A hybrid NFV/In-Network Computing MANO Architecture for provisioning Holographic Applications in the MetaverseFarzaneh Ghasemi Javid, Mouhamad Dieye, Felipe Estrada Solano, Roch H. Glitho, Halima Elbiaze, Wessam Ajib. 99-104 [doi]
- First Steps Towards Game and Activity Inference on Encrypted VR DatastreamsYushan Yang, Simon Hanisch, Mingyu Ma 0006, Stefanie Roos, Thorsten Strufe, Giang T. Nguyen 0002. 105-110 [doi]
- Securing the Metaverse: Traffic Application Classification and Anomaly DetectionVishal Murgai, Venkata Rama Raju Lolabhattu, Roxy Stimpson, Eishita Tripathi, Shiva Chickala. 111-117 [doi]
- LSTM-GRU Based Efficient Intrusion Detection in 6G-Enabled Metaverse EnvironmentsBrij B. Gupta, Akshat Gaurav, Varsha Arya, Kwok Tai Chui. 118-123 [doi]
- Enhanced Virtual Try-On in the Metaverse Leveraging Unet Model for Improved Cloth DetectionAkshat Gaurav, Varsha Arya, Kwok Tai Chui, Brij B. Gupta. 124-129 [doi]
- Signal as Point: Deep Learning Signal Detector on Time DomainChengzhi Ji, Xin Zhou. 130-137 [doi]
- A Graph Neural Network Power Allocation Algorithm Based on Fully Unrolled WMMSEChunwei Miao, Jian Zhang, Jiaqi Huang, Jinhong Yang. 138-146 [doi]
- Dependable Distributed Training of Compressed Machine Learning ModelsFrancesco Malandrino, Giuseppe Di Giacomo, Marco Levorato, Carla-Fabiana Chiasserini. 147-156 [doi]
- ADDER: Service-Specific Adaptive Data-Driven Radio Resource Control for Cellular-IoTYingjing Wu, Ahmed Elmokashfi, Foivos Michelinakis, Jacobus E. van der Merwe, Shandian Zhe. 157-166 [doi]
- Cluster-then-Match: Efficient Management of Human-Centric, Cell-Less 6G NetworksEmma Chiaramello, Carla-Fabiana Chiasserini, Francesco Malandrino, Alessandro Nordio, Marta Parazzini, Alvaro Valcarce. 167-176 [doi]
- On the Impact of 5G User Equipments on Latency across Chipset GenerationsMauri Seidel, Andreas Ingo Grohmann, Christopher Lehmann, Justus Rischke, Frank H. P. Fitzek. 177-185 [doi]
- DC-PPO for Joint User Association and Power Allocation in Dynamic Indoor Hybrid VLC/RF NetworksPeijun Hou, Nan Cen. 186-195 [doi]
- NaviSplit: Dynamic Multi-Branch Split DNNs for Efficient Distributed Autonomous NavigationTimothy K. Johnsen, Ian Harshbarger, Zixia Xia, Marco Levorato. 196-201 [doi]
- RiSi: Spectro-temporal RAN-agnostic Modulation Identification for OFDMA SignalsDaulet Kurmantayev, Dohyun Kwun, Hyoil Kim, Sung Whan Yoon. 202-208 [doi]
- Landmark-based Localization using Stereo Vision and Deep Learning in GPS-Denied Battlefield EnvironmentGanesh Sapkota, Sanjay Madria. 209-215 [doi]
- Effects of Lossy Compression on the Value of Information in a Low Powered NetworkFrederick M. Chache, Caden J. Pici, Ramesh Bharadwaj. 216-221 [doi]
- Evaluation and Optimization of Positional Accuracy for Maritime Positioning SystemsAtilla Alpay Nalcaci, Fidan Mehmeti, Wolfgang Kellerer, Florian A. Schiegg. 222-228 [doi]
- Spectrum Painting for On-Device Signal ClassificationBingyang Li, Weiqing Huang, Wen Wang, Qing Wang. 229-238 [doi]
- Optimizing Ray Tracing Techniques for Generating Large-Scale 3D Radio Frequency MapsBernard Tamba Sandouno, Chadi Barakat, Thierry Turletti, Walid Dabbous. 239-248 [doi]
- Predictability of LoRaWAN Link Quality based on Weather Data: Insights from a Long-Term StudyDaniel Szafranski. 249-258 [doi]
- EABC: Energy-aware Centrality-based Caching for Named Data Networking in the IoTXingyun He, Hu Liu, Wuyungerile Li, Alvin C. Valera, Winston K. G. Seah. 259-268 [doi]
- DCP: a TCP-Inspired Method for Online Domain Adaptation under Dynamic Data DriftAlessandro Buratto, Marco Levorato, Leonardo Badia. 269-278 [doi]
- Improving TCP Slow Start Performance in Wireless Networks with SEARCHMaryam Ataei Kachooei, Jae Chung, Feng Li, Benjamin Peters, Joshua Chung, Mark Claypool. 279-288 [doi]
- Deep Reinforcement Learning Based Resource Allocation Method in Future Wireless Networks with Blockchain Assisted MEC NetworkPrakhar Consul, Ishan Budhiraja, Deepak Garg 0002, Sachin Sharma, Ammar Muthanna. 289-294 [doi]
- Poster: Unified Fog Node Utilization for Multiple Content Providers through Cluster-Based Cooperative CachingFerdous Sharifi, Young Choon Lee, Shaahin Hessabi. 295-297 [doi]
- Poster: Cloud Computing with AI-empowered Trends in Software-Defined Radios: Challenges and OpportunitiesEkta Sharma, Ravinesh C. Deo, Christopher P. Davey, Brad D. Carter, Sancho Salcedo-Sanz. 298-300 [doi]
- Poster: Integration of Wearable and Affective Computing via Abstraction and Decision Fusion ArchitectureMohammadreza Najafi, Mohammad K. Fallah, Saeid Gorgin 0001, Ghassem Jaberipur, Jeong-A Lee. 301-303 [doi]
- Demo: P4 Based In-network ML with Federated Learning to Secure and Slice IoT NetworksChamara Madarasingha, Thilini Dahanayaka, Kanchana Thilakarathna, Suranga Seneviratne, Young Choon Lee, Salil S. Kanhere, Albert Y. Zomaya, Aruna Seneviratne, Phil Ridley. 304-306 [doi]
- Optimizing Ray Tracing Techniques for Generating Large-Scale 3D Radio Frequency MapsBernard Tamba Sandouno, Chadi Barakat, Thierry Turletti, Walid Dabbous. 307-316 [doi]
- Ph.D. Forum: Multi-Agent Reinforcement Learning in Wireless Network CommunicationSabrina Pochaba, Peter Dorfinger, Matthias Herlich, Roland Kwitt, Simon Hirlaender. 317-318 [doi]
- Leveraging the Movements of Occupants to Generate Indoor Maps Using RF SignalsUsman Mahmood Khan, Muhammad Shahzad 0001. 319-328 [doi]
- Informative and Communication-Efficient Multi-Agent Path Planning for Pollution Plume MonitoringMohamed Sami Assenine, Walid Bechkit, Hervé Rivano. 329-338 [doi]
- Noisy Labels Make Sense: Data-Driven Smartphone Inertial Tracking without Tedious AnnotationsYuefan Tong, Jiankun Wang 0003, Zenghua Zhao, Jiayang Cui, Bin Wu 0001. 339-348 [doi]
- ALI-DPFL: Differentially Private Federated Learning with Adaptive Local IterationsXinpeng Ling, Jie Fu, Kuncan Wang, Haitao Liu, Zhili Chen. 349-358 [doi]
- WIP: An Open Data Set about Multi-Provider Redundancy in Cellular NetworksSabrina Pochaba, Christian Maier, Matthias Herlich, Peter Dorfinger. 359-362 [doi]
- Queueing Theoretical Performance Assessment of Mobile Virtual Reality Video StreamingThi My Chinh Chu, Hans-Jürgen Zepernick. 363-369 [doi]
- PROMPT: Prediction of Channel Metrics for Proactive Optimization in Cellular NetworksSubhramoy Mohanti, Akshay Malhotra, Muhammad Umar Bin Farooq, Jaideep Chandrashekar. 370-376 [doi]
- TuplePick: A High Stability Packet Classification based on Neural NetworkZhuo Li 0009, Tongtong Wang, Jindian Liu, Yu Zhang, Tianxiang Ma, Kaihua Liu. 377-382 [doi]
- On the k-weak Coverage of Random Mobile SensorsSajal K. Das 0001, Rafal Kapelko. 383-389 [doi]