


default search action
INFOCOM 2021: Vancouver, BC, Canada - Workshops
- 2021 IEEE Conference on Computer Communications Workshops, INFOCOM Workshops 2021, Vancouver, BC, Canada, May 10-13, 2021. IEEE 2021, ISBN 978-1-6654-0443-3
- Ramneek, Sangheon Pack:
A Credible Service Level Agreement Enforcement Framework for 5G Edge. 1-2 - Matthew Bradley, Shengjie Xu
:
A Metric for Machine Learning Vulnerability to Adversarial Examples. 1-2 - Rui Ma, Ke Xiong, Yang Lu:
Enhancing the Handover Performance in Heterogeneous High-speed Railway Communication Networks: A Bayesian-based Method. 1-2 - Mariusz Mazurek, Konrad Kania
, Tomasz Rymarczyk
, Dariusz Wójcik, Tomasz Cieplak
, Piotr Golabek
:
Implementation of Block-Wise-Transform-Reduction Method for Image Reconstruction in Ultrasound Transmission Tomography. 1-2 - Maxim Anikeev, Haya Schulmann, Hervais Simo:
Privacy Policies of Mobile Apps - A Usability Study. 1-2 - Geoff Twardokus
, Hanif Rahbari
:
Evaluating V2V Security on an SDR Testbed. 1-3 - Farooq Hoseiny, Sadoon Azizi, Mohammad Shojafar, Fardin Ahmadiazar, Rahim Tafazolli
:
PGA: A Priority-aware Genetic Algorithm for Task Scheduling in Heterogeneous Fog-Cloud Computing. 1-6 - Beomyeol Jeon
, S. M. Ferdous
, Muntasir Raihan Rahman, Anwar Walid:
Privacy-Preserving Decentralized Aggregation for Federated Learning. 1-6 - Sixu Cai, Fen Zhou, Zonghua Zhang, Ahmed Meddahi:
Disaster-Resilient Service Function Chain Embedding Based on Multi-Path Routing. 1-7 - Yao Xin, Wenjun Li, Yi Wang, Song Yao:
An FPGA-based High-Throughput Packet Classification Architecture Supporting Dynamic Updates for Large-Scale Rule Sets. 1-2 - Aniruddha Kushwaha, Naveen Bazard, Ashwin Gumaste:
IPv6 Flow-Label based Application Aware Routing in SDNs. 1-6 - Xiaojie Fang, Xinyu Yin, Ning Zhang
, Xuejun Sha, Hongli Zhang, Zhu Han:
Demonstrating Physical Layer Security Via Weighted Fractional Fourier Transform. 1-2 - Jihyeon Yun, Atilla Eryilmaz, Changhee Joo:
Remote Tracking of Dynamic Sources under Sublinear Communication Costs. 1-6 - Aashish Gottipati, Jacobus E. van der Merwe:
BoTM: Basestation-on-the-move, a Radio Access Network Management Primitive. 1-6 - Bintia Keita, Ashutosh Srivastava, Fraida Fund, Shivendra S. Panwar:
A controlled, reproducible, and extensible experiment for evaluating the impact of Tor latency. 1-2 - Muhammad Naeem Tahir, Marcos Katz:
C-ITS Communications using Heterogeneous Wireless Technologies. 1-2 - Yue Chen, Changle Li, Wenwei Yue, Hehe Zhang, Guoqiang Mao:
Engineering A Large-Scale Traffic Signal Control: A Multi-Agent Reinforcement Learning Approach. 1-6 - Mengxiang Liu, Zexuan Jin, Jinhui Xia, Mingyang Sun, Ruilong Deng, Peng Cheng:
Demo Abstract: A HIL Emulator-Based Cyber Security Testbed for DC Microgrids. 1-2 - Onur Ayan, Anthony Ephremides, Wolfgang Kellerer
:
Age of Information: An Indirect Way To Improve Control System Performance. 1-7 - Jianhong Zhang, Menglong Wu, Qijia Zhang, Chenggen Peng:
A lightweight Data Sharing Scheme with Resisting Key Abuse in Mobile Edge Computing. 1-6 - Qiang Liu, Yifei Gao, Runhao Liu, Jiayao Wang:
AutoCEW: An Autonomous Cyberspace Early Warning Framework via Ensemble Learning. 1-6 - Zongyue Hou, Xinwei Zhang
:
Secret Key Generation Scheme Based on Generative Adversarial Networks in FDD Systems. 1-6 - Aljawharah Alnasser, Hongjian Sun:
Trust-based Model for Securing Vehicular Networks Against RSU Attacks. 1-6 - Jinwei Liu, Long Cheng
:
SwiftS: A Dependency-Aware and Resource Efficient Scheduling for High Throughput in Clouds. 1-2 - Rasmus Vestergaard, Qi Zhang
, Daniel E. Lucani
:
Enabling Random Access in Universal Compressors. 1-6 - Sayani Sarkar, Shivanjali Khare, Michael W. Totaro, Ashok Kumar:
A Novel Energy Aware Secure Internet of Drones Design: ESIoD. 1-6 - Gusang Lee, Won Joon Yun, Soyi Jung
, Joongheon Kim, Jae-Hyun Kim:
Visualization of Deep Reinforcement Autonomous Aerial Mobility Learning Simulations. 1-2 - Qixun Zhang, Zhenhao Li, Xinye Gao, Zhiyong Feng:
Performance Evaluation of Radar and Communication Integrated System for Autonomous Driving Vehicles. 1-2 - Boya Di:
Sharing the Surface: RIS-aided Distributed Mechanism Design for Hybrid Beamforming in Multi-cell Multi-user Networks. 1-2 - Mengyu Sun, Zhangbing Zhou, Walid Gaaloul:
Adaptive IoT Service Configuration Optimization in Edge Networks. 1-2 - Wanli Ni
, Yuanwei Liu
, Zhaohui Yang, Hui Tian:
Over-the-Air Federated Learning and Non-Orthogonal Multiple Access Unified by Reconfigurable Intelligent Surface. 1-6 - Adita Kulkarni, Anand Seetharam:
QoE-aware Assignment and Scheduling of Video Streams in Heterogeneous Cellular Networks. 1-6 - Ankush Mitra, Basudeb Bera
, Ashok Kumar Das:
Design and Testbed Experiments of Public Blockchain-Based Security Framework for IoT-Enabled Drone-Assisted Wildlife Monitoring. 1-6 - Jose Monterroso, Jacobus E. van der Merwe, Kirk Webb, Gary Wong:
Towards using the POWDER platform for RF propagation validation. 1-6 - Shihao Li, Weiwei Miao, Zeng Zeng, Lei Wei, Chengling Jiang, Chuanjun Wang, Mingxuan Zhang:
Multi-Job Multi-Edge Allocation in Edge Computing Environments. 1-2 - Eric Muhati, Danda B. Rawat
:
Adversarial Machine Learning for Inferring Augmented Cyber Agility Prediction. 1-6 - Kaixin Lin, Yuguo Li, Dawei Jian, Shengquan Hu, Dingding Li:
Vmemcpy: Parallelizing Memory Copy with Multi-core in the Cloud. 1-6 - Borui Li, Chenghao Tong, Yi Gao, Wei Dong:
S2: a Small Delta and Small Memory Differencing Algorithm for Reprogramming Resource-constrained IoT Devices. 1-2 - Yadi Ye, Leyou Zhang, Wenting You, Yi Mu:
Secure Decentralized Access Control Policy for Data Sharing in Smart Grid. 1-6 - Berat Can Senel
, Maxime Mouchet, Justin Cappos, Olivier Fourmaux, Timur Friedman
, Rick McGeer:
EdgeNet: the Global Kubernetes Cluster Testbed. 1-2 - Jorge Baranda, Josep Mangues-Bafalluy, Luca Vettori, Ricardo Martínez
, Engin Zeydan:
Scaling Federated Network Services: Managing SLAs in Multi-Provider Industry 4.0 Scenarios. 1-2 - Ashish Gupta, Hari Prabhat Gupta, Tanima Dutta:
A Deep Learning based Traffic Flow Classification with Just a Few Packets. 1-2 - Mohammad Mahdi Khalili, Iman Vakilinia
:
Trading Privacy through Randomized Response. 1-6 - Hongwei Li, Danai Chasaki:
Ensemble Machine Learning for Intrusion Detection in Cyber-Physical Systems. 1-2 - Xiaokun Xu, Mark Claypool:
A First Look at the Network Turbulence for Google Stadia Cloud-based Game Streaming. 1-5 - Evgeny M. Khorov, Aleksey A. Kureev
, Vladislav Molodtsov:
FIND: an SDR-based Tool for Fine Indoor Localization. 1-2 - Hadeel Alrubayyi, Gokop Goteng, Mona Jaber, James Kelly:
A Novel Negative and Positive Selection Algorithm to Detect Unknown Malware in the IoT. 1-6 - Omur Ozel, Parisa Rafiee:
Intermittent Status Updating Through Joint Scheduling of Sensing and Retransmissions. 1-6 - Fotis Foukalas, Athanasios Tziouvaras
:
A Federated Machine Learning Protocol for Fog Networks. 1-6 - Yongjin Kim:
Virtual Credit Framework in the Remote Work Era. 1-2 - Lingshan Liu, Ke Xiong, Yang Lu, Pingyi Fan
, Khaled Ben Letaief
:
Age-constrained Energy Minimization in UAV-Assisted Wireless Powered Sensor Networks: A DQN-based Approach. 1-2 - Mohammed Gharib
, Fatemeh Afghah, Elizabeth S. Bentley:
OPAR: Optimized Predictive and Adaptive Routing for Cooperative UAV Networks. 1-6 - Yuling Cui, Danhao Deng, Chaowei Wang, Weidong Wang:
Joint Trajectory and Power Optimization for Energy Efficient UAV Communication Using Deep Reinforcement Learning. 1-6 - Cui-Qin Dai, Qinqin Yang, Jinsong Wu
, Qianbin Chen:
Intelligent Gateway Placement in Satellite-Terrestrial Integrated Network. 1-6 - Jiangong Chen, Feng Qian, Bin Li
:
An Interactive and Immersive Remote Education Platform based on Commodity Devices. 1-2 - Argha Sen, Abhijit Mondal, Basabdatta Palit
, Jay Jayatheerthan, Krishna Paul, Sandip Chakraborty:
An ns3-based Energy Module of 5G NR User Equipments for Millimeter Wave Networks. 1-2 - Yan Zheng, Tian Pan
, Yan Zhang, Enge Song, Tao Huang
, Yunjie Liu:
Multipath In-band Network Telemetry. 1-2 - Puming Fang, Tilman Wolf:
Enabling Virtual Network Functions in Named Data Networking. 1-6 - Omar Sami Oubbati, Mohammed Atiquzzaman
, Abderrahmane Lakas
, Abdullah Baz
, Hosam Alhakami, Wajdi Alhakami:
Multi-UAV-enabled AoI-aware WPCN: A Multi-agent Reinforcement Learning Strategy. 1-6 - Baturalp Buyukates
, Sennur Ulukus:
Timely Communication in Federated Learning. 1-6 - Chaogang Tang, Chunsheng Zhu, Xianglin Wei, Qing Li
, Joel J. P. C. Rodrigues:
Task Caching in Vehicular Edge Computing. 1-6 - Jincheng Wang, Zhuohua Li
, John C. S. Lui, Mingshen Sun:
Topology-Theoretic Approach To Address Attribute Linkage Attacks In Differential Privacy. 1-6 - Noah Ziems, Shaoen Wu:
Security Vulnerability Detection Using Deep Learning Natural Language Processing. 1-6 - Luke Bertot, Lucas Nussbaum:
Leveraging Notebooks on Testbeds: the Grid'5000 Case. 1-6 - Shuang Wu
, Xi Peng, Guangjian Tian:
Decentralized Max-Min Resource Allocation for Monotonic Utility Functions. 1-6 - Georgios Drainakis, Panagiotis Pantazopoulos
, Konstantinos V. Katsaros
, Vasilis Sourlas
, Angelos Amditis:
On the Distribution of ML Workloads to the Network Edge and Beyond. 1-6 - Melih Bastopcu
, Sennur Ulukus:
Timely Tracking of Infection Status of Individuals in a Population. 1-7 - Novella Bartolini, Andrea Coletta, Gaia Maselli
, Mauro Piva, Domenicomichele Silvestri:
GenPath - A Genetic Multi-Round Path Planning Algorithm for Aerial Vehicles. 1-6 - Ahmed Arafa, Richard D. Wesel:
Timely Transmissions Using Optimized Variable Length Coding. 1-6 - Nasser Alsabilah, Danda B. Rawat
:
Anomaly Detection in Smart Home Networks Using Kalman Filter. 1-6 - Yan Zhang, Tian Pan
, Yan Zheng, Enge Song, Tao Huang
, Yunjie Liu:
VXLAN-based INT: In-band Network Telemetry for Overlay Network Monitoring. 1-2 - Hua Wu, Xin Li, Guang Cheng, Xiaoyan Hu
:
Monitoring Video Resolution of Adaptive Encrypted Video Traffic Based on HTTP/2 Features. 1-6 - Li-e Wang, Yihui Wang, Yan Bai, Peng Liu, Xianxian Li:
POI Recommendation with Federated Learning and Privacy Preserving in Cross Domain Recommendation. 1-6 - Yanfang Mo
, Qiulin Lin, Minghua Chen
, Si-Zhao Joe Qin
:
Optimal Peak-Minimizing Online Algorithms for Large-Load Users with Energy Storage. 1-2 - Yaqiang Zhang, Rengang Li, Yaqian Zhao, Ruyang Li
:
A Request Scheduling Optimization Mechanism Based on Deep Q-Learning in Edge Computing Environments. 1-2 - Harald Øverby:
Dynamic Economic Models for MMO Markets. 1-6 - Jiawei Yuan, Laurent Njilla:
Lightweight and Reliable Decentralized Reward System using Blockchain. 1-6 - Sharmin Akter, Mohammad Shahriar Rahman
, Md. Zakirul Alam Bhuiyan, Nafees Mansoor
:
Towards Secure Communication in CR-VANETs Through a Trust-Based Routing Protocol. 1-6 - Xian Liu:
Secrecy in Aerial Networking: a Stochastic Geometry Approach. 1-6 - Paul Ruth, Kate Keahey, Mert Cevik, Zhuo Zhen, Cong Wang, Jason Anderson:
Overcast: Running Controlled Experiments Spanning Research and Commercial Clouds. 1-6 - Jie Cao, Xu Zhu
, Yufei Jiang, Zhongxiang Wei:
Can AoI and Delay be Minimized Simultaneously with Short-Packet Transmission? 1-6 - Emeka Obiodu, Abdullahi Abubakar, Nishanth Sastry
:
Is it 5G or not? Investigating doubts about the 5G icon and network performance. 1-6 - Derek Phanekham
, Suku Nair, Nageswara S. V. Rao, Mike Truty:
Predicting Throughput of Cloud Network Infrastructure Using Neural Networks. 1-6 - Minghao Fang, Xijun Wang
, Chao Xu, Howard H. Yang, Tony Q. S. Quek
:
Computing-aided Update for Information Freshness in the Internet of Things. 1-7 - Md. Rashed Iqbal Nekvi, Anwar Haque
:
Evaluating Contact Tracing Apps for Privacy Preservation and Effectiveness. 1-6 - Jie Li, Shi Zhou, Vasileios Giotsas:
Performance Analysis of Multipath BGP. 1-6 - Yahya Hassanzadeh-Nazarabadi, Moayed Haji Ali, Nazir Nayal:
Opera: Scalable Simulator for Distributed Systems. 1-2 - Yinian Zhou, Awais Ahmad Siddiqi, Jia Zhang, Junchen Guo, Rui Xi
, Meng Jin, Zhengang Zhai, Yuan He:
Voice Recovery from Human Surroundings with Millimeter Wave Radar. 1-2 - Nader Bouacida, Jiahui Hou, Hui Zang, Xin Liu:
Adaptive Federated Dropout: Improving Communication Efficiency and Generalization for Federated Learning. 1-6 - Yahya Hassanzadeh-Nazarabadi, Sanaz Taheri Boshrooyeh
:
A Consensus Protocol With Deterministic Finality. 1-2 - Panagiotis Kostakis, Anastasios-Stavros Charismiadis, Dimitris Tsolkas, Harilaos Koumaras:
An Experimentation Platform for Automated Assessment of Multimedia Services over Mobile Networks. 1-2 - Huiyi Ding, Ka-Cheong Leung:
Resource Allocation for Low-Latency NOMA-V2X Networks Using Reinforcement Learning. 1-6 - Youqun Li, Yichi Zhang, Haojin Zhu, Suguo Du:
Toward Automatically Generating Privacy Policy for Smart Home Apps. 1-7 - Muhammad Aslam, Wei Liu, Xianjun Jiao, Jetmir Haxhibeqiri
, Jeroen Hoebeke, Ingrid Moerman, Esteban Municio, Pedro Heleno Isolani, Gilson Miranda, Johann Márquez-Barja
:
High Precision Time Synchronization on Wi-Fi based Multi-Hop Network. 1-2 - Erteng Hu, Anmin Fu
, Zhiyi Zhang, Linjie Zhang, Yantao Guo, Yin Liu:
ACTracker: A Fast and Efficient Attack Investigation Method Based on Event Causality. 1-6 - Preti Kumari, Hari Prabhat Gupta, Tanima Dutta:
A lightweight Compression-based Energy-Efficient Smart Metering System in Long-Range Network. 1-2 - Esteban Municio, Mert Cevik, Paul Ruth, Johann M. Márquez-Barja
:
Achieving End-to-End Connectivity in Global Multi-Domain Networks. 1-6 - Haya Schulmann, Michael Waidner
:
SSLChecker. 1-2 - Aris Cahyadi Risdianto, Ee-Chien Chang:
OctoBot: An Open-Source Orchestration System for a Wide Range Network Activity Generation. 1-3 - Kirk Webb, Sneha Kumar Kasera, Neal Patwari, Jacobus E. van der Merwe:
WiMatch: Wireless Resource Matchmaking. 1-6 - Anuj Bist, Chetna Singhal
:
Efficient Immersive Surveillance of Inaccessible Regions using UAV Network. 1-6 - Simon Delamare, Lucas Nussbaum:
Kwollect: Metrics Collection for Experiments at Scale. 1-6 - Song Gao, Shaowen Yao, Ruidong Li
:
Transferable Adversarial Defense by Fusing Reconstruction Learning and Denoising Learning. 1-6 - Jonatan Krolikowski, Ovidiu Iacoboaiea, Zied Ben-Houidi, Dario Rossi:
WiFi Dynoscope: Interpretable Real-Time WLAN Optimization. 1-2 - Deborsi Basu, Abhishek Jain, Uttam Ghosh, Raja Datta
:
QoS-aware Controller and Hypervisor Placement in vSDN-enabled 5G Networks for Time-critical Applications. 1-6 - Jibo Shi, Bin Ge, Yang Liu, Yu Yan, Shuang Li:
Data Privacy Security Guaranteed Network Intrusion Detection System Based on Federated Learning. 1-6 - Daniel J. Kulenkamp, Violet R. Syrotiuk:
Support for Differentiated Airtime in Wireless Networks. 1-6 - Lien-Wu Chen, Hsing-Fu Tseng:
DeepSafe: A Hybrid Kitchen Safety Guarding System with Stove Fire Recognition Based on the Internet of Things. 1-2 - Jong-Min Kim
, Ju-Hyung Lee, Young-Chai Ko:
Demo Abstract: WLAN Standard-based Non-Coherent FSO Transmission over 100m Indoor and Outdoor Environments. 1-2 - Maxwell McManus, Zhangyu Guan, Elizabeth Serena Bentley, Scott Pudlewski
:
Experimental Analysis of Cross-Layer Sensing for Protocol-Agnostic Packet Boundary Recognition. 1-6 - Bahadir Durmaz, Erman Ayday:
Entering Watch Dogs*: Evaluating Privacy Risks Against Large-Scale Facial Search and Data Collection. 1-6 - Everaldo Andrade, Fernando Matos, Paulo Ditarso Maciel, Michele Nogueira, Aldri Santos:
Quality Assessment of VANETs-Supported Video Dissemination of Critical Urban Events. 1-6 - Jason Ma, Michael H. Ostertag, Dinesh Bharadia, Tajana Rosing:
Frequency-aware Trajectory and Power Control for Multi-UAV Systems. 1-6 - Yang Liu, Jian Kang, Yiran Li, Bin Ji:
A Network Intrusion Detection Method Based on CNN and CBAM. 1-6 - Kirill Glinskiy, Aleksey A. Kureev
, Evgeny M. Khorov:
SDR-based Testbed for Real-time CQI Prediction for URLLC. 1-2 - Hao Li, Xin Li, Zhuzhong Qian, Xiaolin Qin:
Resource-Aware Service Function Chain Deployment in Cloud-Edge Environment. 1-6 - George Stamatakis, Nikolaos Pappas, Alexandros G. Fragkiadakis, Apostolos Traganitis:
Autonomous Maintenance in IoT Networks via AoI-driven Deep Reinforcement Learning. 1-7 - Laqin Fan, Lan Wang:
Secure Sharing of Spatio-Temporal Data through Name-based Access Control. 1-7 - Mario Franke
, Florian Klingler:
Poster Abstract: HiL meets Commodity Hardware - SimbaR for coupling IEEE 802.11 Radio Channels. 1-2 - Abdulaziz Alali
, Danda B. Rawat
:
Combating Distance Limitation in Sub-Terahertz Frequency Band for Physical Layer Security in UAV Communications. 1-6 - Qinglin Xun, Weichao Li, Haorui Guo, Yi Wang:
Enabling Lightweight Network Performance Monitoring and Troubleshooting in Data Center. 1-2 - Shuai Li, Junchen Guo, Rui Xi
, Chunhui Duan, Zhengang Zhai, Yuan He:
Pedestrian Trajectory based Calibration for Multi-Radar Network. 1-2 - Markus Brandt, Haya Schulmann:
Optimized BGP Simulator for Evaluation of Internet Hijacks. 1-2 - Jingxue Sun, Zhiqiu Huang, Ting Yang, Wengjie Wang, Yuqing Zhang:
A system for detecting third-party tracking through the combination of dynamic analysis and static analysis. 1-6 - Mingqian Liu, Jiakun Wang, Cheng Qian:
Incremental Learning Based Radio Frequency Fingerprint Identification Using Intelligent Representation. 1-6 - Zhi Zhou, Ke Luo, Xu Chen:
Deep Reinforcement Learning for Intelligent Cloud Resource Management. 1-6 - Tanya Shreedhar, Sanjit K. Kaul
, Roy D. Yates:
An Empirical Study of Ageing in the Cloud. 1-6 - Hyejeong Jeong, Jieun Yu, Wonjun Lee:
Poster Abstract: A Semi-Supervised Approach for Network Intrusion Detection Using Generative Adversarial Networks. 1-2 - Xing Yang
, Lei Shu, Kai Huang, Kailiang Li
, Heyang Yao:
Poster Abstract: Insecticidal Performance Simulation of Solar Insecticidal Lamps Internet of Things Using the Number of Falling Edge Trigger. 1-2 - Daisy Roberts
, Ashutosh Srivastava, Fraida Fund, Shivendra S. Panwar:
Tackling the latency divide with Copa. 1-2 - Ralph P. Ritchey, Richard Perry:
Machine Learning Toolkit for System Log File Reduction and Detection of Malicious Behavior. 1-2 - Runsen Gong, Weichao Li, Fuliang Li, Yi Wang:
On the Reliability of State-of-the-art Network Testbed Components. 1-2 - José Antonio Gómez-Hernández, Pedro García-Teodoro, Juan Antonio Holgado Terriza
, Gabriel Maciá-Fernández, José Camacho-Páez, J. M. Noguera-Comino:
Monitoring Android Communications for Security. 1-2 - Emmanouil Fountoulakis, Nikolaos Pappas, Anthony Ephremides:
Resource Allocation for Heterogeneous Traffic with Power Consumption Constraints. 1-2 - Gaurang Bansal, Biplab Sikdar
:
Security Service Pricing Model for UAV Swarms: A Stackelberg Game Approach. 1-6 - Huilian Zhang
, Xiaofan He, Qingqing Wu
, Huaiyu Dai:
Spectral Graph Theory Based Resource Allocation for IRS-Assisted Multi-Hop Edge Computing. 1-6 - Roudy Dagher, François-Xavier Molina, Alexandre Abadie, Nathalie Mitton, Emmanuel Baccelli:
An Open Experimental Platform for Ranging, Proximity and Contact Event Tracking using Ultra-Wide-Band and Bluetooth Low-Energy. 1-6 - Ferenc Fejes, Szilveszter Nádas, Gergo Gombos, Sándor Laki:
A Core-Stateless L4S Scheduler for P4-enabled hardware switches with emulated HQoS. 1-2 - Pan Tang, Jianhua Zhang, Yuxiang Zhang, Yicheng Guan, Pan Qi, Fangyu Wang, Li Yu, Ping Zhang:
Demo Abstract: "See the Radio Waves" via VR and Its Application in Wireless Communications. 1-2 - Yongjie Guan, Xueyu Hou, Tao Han, Sheng Zhang:
DeepMix: A Real-time Adaptive Virtual Content Registration System with Intelligent Detection. 1-2 - Jose A. Ayala-Romero, Andres Garcia-Saavedra, Xavier Costa-Pérez
, George Iosifidis:
Demonstrating a Bayesian Online Learning for Energy-Aware Resource Orchestration in vRANs. 1-2 - Danai Chasaki, Christopher Mansour:
Detecting Malicious Hosts in SDN through System Call Learning. 1-2 - Noriaki Kamiyama, Kouki Sakurai, Akihiro Nakao:
Measurement Analysis of Co-occurrence Degree of Web Objects. 1-6 - Esteban Municio, Mert Cevik, Paul Ruth, Johann M. Márquez-Barja
:
Experimenting in a Global Multi-Domain Testbed. 1-2 - Long Huang, Zhen Meng, Zeyu Deng, Chen Wang, Liying Li
, Guodong Zhao:
Robot Behavior-Based User Authentication for Motion-Controlled Robotic Systems. 1-6 - Ali Gohar
, Gianfranco Nencioni:
Minimizing the Cost of 5G Network Slice Broker. 1-6 - Yong Zeng, Tong Dong, Qingqi Pei, Jiale Liu, Jianfeng Ma:
LPDBN: A Privacy Preserving Scheme for Deep Belief Network. 1-6 - Hua Wu, Ya Liu, Guang Cheng, Xiaoyan Hu
:
Real-time Packet Loss Detection for TCP and UDP Based on Feature-Sketch. 1-6 - Tejasvi Alladi
, Vishnu Venkatesh, Vinay Chamola, Nitin Chaturvedi:
Drone-MAP: A Novel Authentication Scheme for Drone-Assisted 5G Networks. 1-6 - Hervais Simo, Haya Schulmann, Marija Schufrin, Steven Lamarr Reynolds, Jörn Kohlhammer:
PrivInferVis: Towards Enhancing Transparency over Attribute Inference in Online Social Networks. 1-2 - Lizhuang Tan, Wei Su, Yanwen Liu, Xiaochuan Gao, Wei Zhang:
DCQUIC: Flexible and Reliable Software-defined Data Center Transport. 1-8 - Rahul Mishra, Hari Prabhat Gupta, Tanima Dutta:
A Network Resource Aware Federated Learning Approach using Knowledge Distillation. 1-2 - Gunasekaran Raja
, Kapal Dev
, Nisha Deborah Philips, S. A. Mohamed Suhaib, M. Deepakraj, Ramesh Krishnan Ramasamy:
DA-WDGN: Drone-Assisted Weed Detection using GLCM-M features and NDIRT indices. 1-6 - Asif Hasnain, Holger Karl:
Learning Coflow Admissions. 1-6 - Xinyu Crystal Wu, T. S. Eugene Ng:
ITSY: Initial Trigger-Based PFC Deadlock Detection in the Data Plane. 1-8 - Sayanti Ghosh
, Abhijit Bhowmick, Sanjay Dhar Roy
, Sumit Kundu:
A UAV based Multi-hop D2D Network for Disaster Management. 1-6 - Helin Yang, Jun Zhao, Jiangtian Nie, Neeraj Kumar
, Kwok-Yan Lam, Zehui Xiong
:
UAV-Assisted 5G/6G Networks: Joint Scheduling and Resource Allocation Based on Asynchronous Reinforcement Learning. 1-6 - Mingjie Feng, Marwan Krunz, Wenhan Zhang
:
Task Partitioning and User Association for Latency Minimization in Mobile Edge Computing Networks. 1-6 - Tomas Hlavacek, Haya Schulmann, Michael Waidner:
Not All Conflicts Are Created Equal: Automated Error Resolution in RPKI Deployments. 1-2 - Cheng Li, Jianwei Mao, Shuping Peng, Yang Xia, Zhibo Hu, Zhenbin Li:
Application-aware G-SRv6 network enabling 5G services. 1-2 - Shadi Eltanani
, Ibrahim Ghafir:
Aerial Wireless Networks: Proposed Solution for Coverage Optimisation. 1-6 - Jorge Baranda, Josep Mangues-Bafalluy, Engin Zeydan, Claudio Casetti, Carla-Fabiana Chiasserini, Marco Malinverno, Corrado Puligheddu
, Milan Groshev, Carlos Guimarães, Konstantin Tomakh, Denys Kucherenko, Oleksii Kolodiazhnyi:
Demo: AIML-as-a-Service for SLA management of a Digital Twin Virtual Network Service. 1-2 - Saffana Alshangiti, Mawada Alahmadi, Mohammed Alkhatib, Rashid Tahir
, Fareed Zaffar:
Poster Abstract: BounceBack - A DDoS Attack Using Unsuspecting Accomplices in the Network. 1-2 - Justin Burr, Shengjie Xu
:
Improving Adversarial Attacks Against Executable Raw Byte Classifiers. 1-2 - Chia-Hung Lin, Shih-Chun Lin
, Erik Blasch:
TULVCAN: Terahertz Ultra-broadband Learning Vehicular Channel-Aware Networking. 1-6 - Sachin Rana, Ahmet Aksoy:
Automated Fast-flux Detection using Machine Learning and Genetic Algorithms. 1-6 - Anthony Dowling, Yaoqing Liu, Lauren Huie, Kang Chen:
Building an Information-Centric and LoRa-Based Sensing Platform for IoT. 1-6 - Zheyi Ma, Hao Li, Wen Fang
, Qingwen Liu, Bin Zhou, Zhiyong Bu:
A Cloud-Edge-Terminal Collaborative System for Temperature Measurement in COVID-19 Prevention. 1-6 - Yuan Gao, Cheng Yang, Weidang Lu, Yiming Wenchen, Yu Zhang, Guoxing Huang, Jiang Cao:
Joint Resource Optimization in Two-way Relaying Energy Harvesting Cognitive Sensor Network. 1-6 - Xiaoyu Hao, Tao Yang, Yulin Hu
, Bo Hu:
Performance Analysis for Correlated AoI and Energy Efficiency in Heterogeneous CR-IoT System. 1-8 - Pham Tien Dat, Atsushi Kanno
, Naokatsu Yamamoto, Tetsuya Kawanishi:
1024-QAM Analog Waveform Transmission Over a Seamless Fiber-Wireless System in W Band. 1-2 - Vishrant Tripathi
, Eytan H. Modiano:
Age Debt: A General Framework for Minimizing Age of Information. 1-6 - Tian Qin
, Guang Cheng, Wenchao Chen, Si Wu:
A Lightweight Residual Networks Framework for DDoS Attack Classification Based on Federated Learning. 1-6 - Qian Xia, Wei Wang, Lin Chen, Kang G. Shin, Zhaoyang Zhang:
Poster Abstract: Neighbor-aware Queue-based Random Access. 1-2 - Kaitao Meng, Xiaofan He, Deshi Li, Mingliu Liu, Chan Xu
:
Sensing Quality Constrained Packet Rate Optimization via Multi-UAV Collaborative Compression and Relay. 1-6 - Shuo Wang, Binwei Wu, Chen Zhang, Yudong Huang, Tao Huang
, Yunjie Liu:
Large-Scale Deterministic IP Networks on CENI. 1-6 - Yang Deng, Tao Han, Ning Zhang
:
FLeX: Trading Edge Computing Resources for Federated Learning via Blockchain. 1-2 - Miquel Ferriol Galmés
, Albert Cabellos-Aparicio:
Decentralised Internet Infrastructure: Securing Inter-Domain Routing (DEMO). 1-2 - Yahya Hassanzadeh-Nazarabadi, Kedar Kshatriya, Öznur Özkasap:
Smart Contract-enabled LightChain Test Network. 1-2 - Yuxiang Lin, Jiamei Lv, Yi Gao, Wei Dong:
Achieving Variable 5G Uplink Bandwidth for IoT Applications. 1-2 - Nina Slamnik-Krijestorac, Girma M. Yilma
, Faqir Zarrar Yousaf, Marco Liebsch, Johann M. Márquez-Barja
:
Multi-domain MEC orchestration platform for enhanced Back Situation Awareness. 1-2 - Wanru Xu, Xiaochen Fan, Tao Wu, Yue Xi, Panlong Yang, Chang Tian:
Interest Users Cumulatively in Your Ads: A Near Optimal Study for Wi-Fi Advertisement Scheduling. 1-6 - Jorge Eduardo Rivadeneira
, Jorge Sá Silva, Ricardo Colomo Palacios, André Rodrigues
, José Marcelo Fernandes
, Fernando Boavida:
A Privacy-Aware Framework Integration into a Human-in-the-Loop IoT System. 1-6 - Hantong Zheng, Huan Zhou, Ning Wang, Peng Chen, Shouzhi Xu:
Reinforcement Learning for Energy-efficient Edge Caching in Mobile Edge Networks. 1-6 - Florian Klingler, Max Schettler, Sigrid Dimce, Muhammad Sohaib Amjad, Falko Dressler:
Poster Abstract: mmWave on the Road - Field Testing IEEE 802.11ad WLAN at 60 GHz. 1-2 - Yating Dai, Yijun Guo, Jianjun Hao:
UAV Placement and Resource Allocation for Multi-hop UAV Assisted Backhaul System. 1-6 - Jingxue Sun, Ting Yang, Zhiqiu Huang, Wengjie Wang, Yuqing Zhang:
Using Dynamic Analysis to Automatically Detect Anti-Adblocker on the Web. 1-6 - Md Kamran Chowdhury Shisher
, Heyang Qin, Lei Yang, Feng Yan, Yin Sun
:
The Age of Correlated Features in Supervised Learning based Forecasting. 1-8 - Yukito Ueno, Ryo Nakamura, Yohei Kuga, Hiroshi Esaki:
P2PNIC: High-Speed Packet Forwarding by Direct Communication between NICs. 1-6 - Yuxi Zhao, Xiaowen Gong:
Quality-Aware Distributed Computation and User Selection for Cost-Effective Federated Learning. 1-6 - Yixin He, Daosen Zhai, Ruonan Zhang, Jianbo Du, Gagangeet Singh Aujla, Haotong Cao:
A Mobile Edge Computing Framework for Task Offloading and Resource Allocation in UAV-assisted VANETs. 1-6 - Tianshun Wang
, Yang Li, Yuan Wu, Liping Qian, Lin Bin, Weijia Jia:
Optimal Channel Sharing assisted Multi-user Computation Offloading via NOMA. 1-6 - Nabeel Sheikh, Mayur Pawar, Victor B. Lawrence:
Zero trust using Network Micro Segmentation. 1-6 - Walter Wong, Aleksandr Zavodovski
, Lorenzo Corneo
, Nitinder Mohan
, Jussi Kangasharju
:
SPA: Harnessing Availability in the AWS Spot Market. 1-6

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.