


default search action
25th ISCC 2020: Rennes, France
- IEEE Symposium on Computers and Communications, ISCC 2020, Rennes, France, July 7-10, 2020. IEEE 2020, ISBN 978-1-7281-8086-1
- Zhong Guan, Gang Xiong, Zhen Li, Gaopeng Gou:
ResTor: A Pre-Processing Model for Removing the Noise Pattern in Flow Correlation. 1-6 - Rui Lebre
, Eduardo Pinho, Jorge Miguel Silva
, Carlos Costa
:
Dicoogle Framework for Medical Imaging Teaching and Research. 1-7 - Clayson Celes, Azzedine Boukerche, Antonio A. F. Loureiro:
MOP: A Novel Mobility-Aware Opportunistic Routing Protocol for Connected Vehicles. 1-6 - Meng Luo, Qiuyun Wang
, Yepeng Yao, Xuren Wang, Peian Yang, Zhengwei Jiang:
Towards Comprehensive Detection of DNS Tunnels. 1-7 - Panagiotis Fountas
, Kostas Kolomvatsos:
A Continuous Data Imputation Mechanism based on Streams Correlation. 1-6 - Thiago José Barbosa Lima
, Flávio Henrique Duarte de Araújo, Antonio Oseas de Carvalho Filho, Ricardo de Andrade Lira Rabelo, Rodrigo de Melo Souza Veras
, Mano Joseph Mathew
:
Evaluation of data balancing techniques in 3D CNNs for the classification of pulmonary nodules in CT images. 1-6 - Dyego H. L. Oliveira, Francisco M. V. Filho, Thelmo P. de Araújo, Joaquim Celestino Jr., Rafael L. Gomes
:
Adaptive Model for Network Resources Prediction in Modern Internet Service Providers. 1-6 - Guillaume Le Gall, Nicolas Montavont, Georgios Z. Papadopoulos
:
Enabling IEEE 802.15.4-2015 TSCH based Wireless Network for Electric Vehicle Battery Management. 1-6 - Miguel Ribeiro
, Valentina Nisi
, Catia Prandi
, Nuno Nunes:
A data visualization interactive exploration of human mobility data during the COVID-19 outbreak: a case study. 1-6 - Dahina Koulougli, Kim Khoa Nguyen, Mohamed Cheriet:
Hierarchical Path Computation With Flexible Ethernet In Multi-layer Multi-domain Networks. 1-6 - Anderson M. Maliszewski, Eduardo Roloff, Emmanuell D. Carreño, Dalvan Griebler
, Luciano Paschoal Gaspary, Philippe O. A. Navaux:
Performance and Cost-aware HPC in Clouds: A Network Interconnection Assessment. 1-6 - Yan Yang, Xingang Shi, Xia Yin, Zhiliang Wang, Xingyu Zhou:
The Understanding and Forecast of AS-Level Anycast Path Inflation. 1-7 - Antonio Corradi
, Giuseppe Di Modica
, Luca Evangelisti, Anna Fiorini, Luca Foschini
, Luca Zerbini:
HS-AUTOFIT: a highly scalable AUTOFIT application for Cloud and HPC environments. 1-6 - Shie-Yuan Wang, Jui-En Chang, Hsin Fan, Yi-Hsiu Sun:
Performance Comparisons of NB-IoT, LTE Cat-M1, Sigfox, and LoRa Moving at High Speeds in the Air. 1-6 - Rongchun Li, Xin Zhou, Hengyue Pan, Huayou Su, Yong Dou:
A High-Throughput LDPC Decoder Based on GPUs for 5G New Radio. 1-7 - Cristopher G. S. Freitas, Osvaldo Anibal Rosso, André L. L. de Aquino:
Mapping Network Traffic Dynamics in the Complexity-Entropy Plane. 1-6 - Edvar Afonso, Miguel Elias M. Campista
:
Opportunistic Data Gathering in IoT Networks using Discrete Optimization. 1-6 - Zhicheng Liu, Shuhao Li, Yongzheng Zhang, Xiaochun Yun, Zhenyu Cheng:
Efficient Malware Originated Traffic Classification by Using Generative Adversarial Networks. 1-7 - Caitlin Facchina, Arunita Jaekel:
Speed Based Distributed Congestion Control Scheme for Vehicular Networks. 1-4 - Dongzheng Jia, Yang Zhang, Shijie Jia, Limin Liu, Jingqiang Lin:
DPVGeo: Delay-based Public Verification of Cloud Data Geolocation. 1-7 - Muntadher Fadhil Sallal
, Gareth Owenson, Mo Adda:
Security and Performance Evaluation of Master Node Protocol in the Bitcoin Peer-to-Peer Network. 1-6 - Linda Senigagliesi
, Gianluca Ciattaglia, Ennio Gambi:
Contactless Walking Recognition based on mmWave RADAR. 1-4 - Amal Sammoud, Mohamed Aymen Chalouf, Omessaad Hamdi, Nicolas Montavont, Ammar Bouallègue:
A secure and lightweight three-factor authentication and key generation scheme for direct communication between healthcare professionals and patient's WMSN. 1-6 - Christian Lübben, Marc-Oliver Pahl
, Mohammad Irfan Khan:
Using Deep Learning to Replace Domain Knowledge. 1-6 - Masaki Aota, Hideaki Kanehara, Masaki Kubo, Noboru Murata
, Bo Sun, Takeshi Takahashi:
Automation of Vulnerability Classification from its Description using Machine Learning. 1-7 - Jiaxian Wu, Shuangjuan Li, Qiong Huang:
Reducing Sensor Failure and Ensuring Scheduling Fairness for Online Charging in Heterogeneous Rechargeable Sensor Networks. 1-6 - Taishi Nishiyama, Atsutoshi Kumagai, Kazunori Kamiya, Kenji Takahashi:
SILU: Strategy Involving Large-scale Unlabeled Logs for Improving Malware Detector. 1-7 - Li Zhu, Pingjian Wang, Xiaozhuo Gu, Yuewu Wang, Jingqiang Lin:
PIV4DB: Probabilistic Integrity Verification for Cloud Database. 1-7 - Imane Taibi, Yassine Hadjadj-Aoul, Chadi Barakat
:
Data Driven Network Performance Inference From Within The Browser. 1-6 - Lucas Martins Figueiredo, Edelberto Franco Silva
:
Cognitive-LoRa: adaptation-aware of the physical layer in LoRa-based networks. 1-6 - Eder Paulo Pereira, Edson Luiz Padoin, Roseclea Duarte Medina, Jean-François Méhaut
:
Increasing the efficiency of Fog Nodes through of Priority-based Load Balancing. 1-6 - Furkan Koltuk, Ece Güran Schmidt
:
A Novel Method for the Synthetic Generation of Non-I.I.D Workloads for Cloud Data Centers. 1-6 - Karla K. Hashiguchi, Bruno de F. Gai, Daniel F. Pigatto, Keiko V. O. Fonseca:
Exploratory Analysis of Public Transportation Data of Curitiba, Brazil. 1-6 - Shitong Cheng, Zhenghui Xu, Xiuhua Li, Xiongwei Wu, Qilin Fan, Xiaofei Wang, Victor C. M. Leung:
Task Offloading for Automatic Speech Recognition in Edge-Cloud Computing Based Mobile Networks. 1-6 - Claudio Badii
, Stefano Bilotta, Daniele Cenni
, Angelo Difino, Paolo Nesi, Irene Paoli, Michela Paolucci:
Real-Time Automatic Air Pollution Services from IOT Data Network. 1-6 - Vincent Savaux, Luc Le Magoarou:
On the Computation of Integrals of Bivariate Gaussian Distribution. 1-6 - JiChu Jiang, Murat Simsek, Burak Kantarci, Shahzad Khan:
High Precision Deep Learning-Based Tabular Position Detection. 1-7 - Lars Wüstrich, Marc-Oliver Pahl
, Stefan Liebald:
Towards an Extensible IoT Security Taxonomy. 1-6 - Amira Chriki
, Haifa Touati
, Hichem Snoussi, Farouk Kamoun
:
UAV-based Surveillance System: an Anomaly Detection Approach. 1-6 - Tariq Benmansour, Samira Moussaoui, Toufik Ahmed, Oussama Boutaghou:
Server-Based Secure Key Management for the IEEE 802.15.6 standard. 1-6 - Jin Xu, Zishan Li, Bowen Du, Miaomiao Zhang, Jing Liu:
Reluplex made more practical: Leaky ReLU. 1-7 - Kilian Becher, Thorsten Strufe:
Efficient Cloud-based Secret Shuffling via Homomorphic Encryption. 1-7 - Lili Zhu, Petros Spachos:
Food Grading System Using Support Vector Machine and YOLOv3 Methods. 1-6 - Ce Chi, Kaixuan Ji, Avinab Marahatta
, Fa Zhang, Youshi Wang, Zhiyong Liu:
An Incentive Mechanism for Improving Energy Efficiency of Colocation Data Centers Based on Power Prediction. 1-6 - Ping Peng, Cunqing Ma, Jingquan Ge, Neng Gao, Chenyang Tu:
A Hardware/Software Collaborative SM4 Implementation Resistant to Side-channel Attacks on ARM-FPGA Embedded SoC. 1-7 - Lucas Pacheco, Helder M. N. S. Oliveira, Denis do Rosário, Eduardo Cerqueira, Leandro Villas, Torsten Braun
:
Service Migration for Connected Autonomous Vehicles. 1-6 - Chengshang Hou, Gaopeng Gou, Junzheng Shi, Peipei Fu, Gang Xiong:
WF-GAN: Fighting Back Against Website Fingerprinting Attack Using Adversarial Learning. 1-7 - Diego Pennino
, Maurizio Pizzonia, Andrea Vitaletti, Marco Zecchini
:
Binding of Endpoints to Identifiers by On-Chain Proofs. 1-6 - Andrea Sciandra
:
COVID-19 Outbreak through Tweeters' Words: Monitoring Italian Social Media Communication about COVID-19 with Text Mining and Word Embeddings. 1-6 - Antonino Galletta, Maria Fazio, Antonio Celesti, Massimo Villari:
On the Applicability of Secret Share Algorithms for Osmotic Computing. 1-6 - Ali Malik, Ruairí de Fréin:
A Proactive-Restoration Technique for SDNs. 1-6 - Liam Hickey, Martin Harrigan
:
The Bisq DAO: On the Privacy Cost of Participation. 1-6 - Jean Moraes, Nagib Matni, André Riker
, Helder M. N. S. Oliveira, Eduardo Cerqueira, Cristiano Both, Denis do Rosário:
An Efficient Heuristic LoRaWAN Adaptive Resource Allocation for IoT Applications. 1-6 - Kais Bouallegue, Matthieu Crussière, Sofiane Kharbech:
SVM Assisted Primary User-Detection for Non-Cooperative Cognitive Radio Networks. 1-5 - Tales Lopes, Victor Ströele
, Mario A. R. Dantas, Regina Braga, Jean-François Méhaut
:
A Parallel Graph Partitioning Approach to Enhance Community Detection in Social Networks. 1-6 - Zhilei Liu, Tao Lin, Liang Dai, Jiyan Sun, Yanjie Hu, Yan Zhang, Zhen Xu:
A Feedback Mechanism for Prediction-based Anomaly Detection In Content Delivery Networks. 1-7 - Sanaz Gheibi, Tania Banerjee
, Sanjay Ranka
, Sartaj Sahni:
Cache Efficient Louvain with Local RCM. 1-6 - Beakal Gizachew Assefa
, Öznur Özkasap, Ipek Kizil, Moayad Aloqaily
, Ouns Bouachir:
Energy Efficiency in SDDC: Considering Server and Network Utilities. 1-6 - Amaury Bouchra Pilet
, Davide Frey
, François Taïani
:
Foiling Sybils with HAPS in Permissionless Systems: An Address-based Peer Sampling Service. 1-6 - Diego A. B. Moreira
, Levy G. Chaves
, Rafael L. Gomes
, Joaquim Celestino Jr.:
An E-Health system for data stream analysis. 1-6 - Ahmed Alioua, Samiha Simoud, Sihem Bourema, Manel Khelifi
, Sidi-Mohammed Senouci
:
A Stackelberg Game Approach for Incentive V2V Caching in Software-Defined 5G-enabled VANET. 1-6 - Candong Rong, Gaopeng Gou, Mingxin Cui, Gang Xiong
, Zhen Li, Li Guo:
MalFinder: An Ensemble Learning-based Framework For Malicious Traffic Detection. 1-7 - Chunjing Han, Kunkun Sun, Haina Tang, Yulei Wu, Xiaodan Zhang:
AFT-Anon: A scaling method for online trace anonymization based on anonymous flow tables. 1-7 - Christelle Caillouet
, Martin Heusse, Franck Rousseau
:
Bringing Fairness in LoRaWAN through SF Allocation Optimization. 1-6 - Riqiang Liu, Melike Erol-Kantarci:
Dynamic Routing with Online Traffic Estimation for Video Streaming over Software Defined Networks. 1-6 - Yara Mahfood Haddad, Hesham H. Ali:
A Dynamic Approach for Managing Heterogeneous Wireless Networks in Smart Environments. 1-7 - Evangelos Boutas, Charalambia Boulougari, Vasileios Anastasopoulos, Ismini Veneti, George Kousiouris
:
A cloud-based REST platform for real-time health resources availability registering, discovering and matching in pandemic crisis conditions. 1-6 - Lucas Zanco Ladeira
, Allan Mariano de Souza, Heitor S. Ramos, Leandro Aparecido Villas:
GIN: Better going safe with personalized routes. 1-6 - Federica Cavaliere, Antonio Della Cioppa, Angelo Marcelli, Antonio Parziale
, Rosa Senatore:
Parkinson's Disease Diagnosis: Towards Grammar-based Explainable Artificial Intelligence. 1-6 - Anandhakumar Palanisamy, Mirsat Sefidanoski, Spiros Koulouzis
, Carlos Rubia, Nishant Saurabh
, Radu Prodan:
Decentralized Social Media Applications as a Service: a Car-Sharing Perspective. 1-7 - Stefan Ciprian Voinea, Armir Bujari, Claudio Enrico Palazzi:
Air Quality Control through Bike Sharing Fleets. 1-4 - Alessandro Piccoli, Marc-Oliver Pahl
, Lars Wüstrich:
Group Key Management in constrained IoT Settings. 1-6 - Zijin Chen, Hui Tian, Gaofeng Nie, Baoling Liu:
AWMF: All-Weighted Metric Factorization for Collaborative Ranking. 1-6 - Francesca Bassi, Hatem Ibn-Khedher:
HARQ-aware allocation of computing resources in C-RAN. 1-6 - Alkhansaa A. Abuhashim, Chiu C. Tan:
Smart Contract Designs on Blockchain Applications. 1-4 - Mirko Zichichi
, Stefano Ferretti, Gabriele D'Angelo:
On the Efficiency of Decentralized File Storage for Personal Information Management Systems. 1-6 - Marek Barczyk, Andrzej Chydzinski
:
Experimental testing of the performance of packet dropping schemes. 1-7 - Edson Rodrigues, Denis do Rosário, Eduardo Cerqueira, Helder M. N. S. Oliveira:
Routing, Modulation, Spectrum and Core Allocation Based on Mapping Scheme. 1-6 - Itamir de Morais Barroca Filho
, Silvio Costa Sampaio, Anderson Paiva Cruz
, Victor Hugo Freire Ramalho, Jefferson Augusto Rodrigues de Azevedo, Átila Caetano da Silveira:
A Web-based Information System for the Management of ICU Beds During the Coronavirus Outbreak. 1-4 - Min He, Cunqing Ma, Jingquan Ge, Neng Gao, Chenyang Tu:
Flush-Detector: More Secure API Resistant to Flush-Based Spectre Attacks on ARM Cortex-A9. 1-6 - Olasupo Ajayi
, Antoine B. Bagula, Ifeoma Chukwubueze, Hloniphani Maluleke:
Priority Based Traffic Pre-emption System for Medical Emergency Vehicles in Smart Cities. 1-7 - Brice Leblanc, Hacène Fouchal
, Cyril de Runz:
Obstacle Detection based on Cooperative-Intelligent Transport System Data. 1-6 - Li Zhang, Shukui Zhang, Yang Zhang, Wei Tuo, Ye Tao, Mengli Dang:
Task Distribution Based on Variable-Order Markov Position Estimation in Mobile Sensor Networks. 1-7 - Joseph Azar, Abdallah Makhoul, Raphaël Couturier:
Using DenseNet for IoT multivariate time series classification. 1-6 - Wenfeng Liu, Yu Zhang, Lu Liu, Shuyan Liu, Hongli Zhang, Binxing Fang:
A secure domain name resolution and management architecture based on blockchain. 1-7 - Wei Cai, Gaopeng Gou, Peipei Fu, Minghao Jiang, Zhen Li, Gang Xiong:
JumpEstimate: a Novel Black-box Countermeasure to Website Fingerprint Attack Based on Decision-boundary Confusion. 1-7 - Maria Fazio, Alina Buzachis, Antonino Galletta, Antonio Celesti, Massimo Villari:
A proximity-based indoor navigation system tackling the COVID-19 social distancing measures. 1-6 - Carlos Pedroso, Yan Uehara de Moraes
, Michele Nogueira, Aldri Santos:
Managing Consensus-Based Cooperative Task Allocation for IIoT Networks. 1-6 - Tania Alhajj, Xavier Lagrange:
Reliability and Low Latency: Impact of The Architecture. 1-6 - Yu-Chen Chen, Yi-Wei Ma, Jiann-Liang Chen:
Intelligent Malicious URL Detection with Feature Analysis. 1-5 - Mohamed Redha Bouakouk, Abdelkrim Abdelli
, Lynda Mokdad:
Survey on the Cloud-IoT paradigms: Taxonomy and architectures. 1-6 - Ryunosuke Nagayama, Ryohei Banno, Kazuyuki Shudo:
Identifying Impacts of Protocol and Internet Development on the Bitcoin Network. 1-6 - Stefano Silvestri
, Francesco Gargiulo
, Mario Ciampi
, Giuseppe De Pietro:
Exploit Multilingual Language Model at Scale for ICD-10 Clinical Text Classification. 1-7 - Djamel Eddine Kouicem, Abdelmadjid Bouabdallah, Hicham Lakhlef:
An Efficient and Anonymous Blockchain-Based Data Sharing Scheme for Vehicular Networks. 1-6 - Francesco Bruschi, Manuel Tumiati, Vincenzo Rana, Mattia Bianchi, Donatella Sciuto:
A Decentralized System for Fair Token Distribution and Seamless Users Onboarding. 1-6 - Mateus Gonçalo do Nascimento, Gabriel Iorio, Thiago G. Thomé
, Álvaro Augusto M. de Medeiros
, Fabricio Martins Mendonça, Fernanda C. A. Campos, José Maria N. David, Victor Ströele
, Mario A. R. Dantas:
Covid-19: A Digital Transformation Approach to a Public Primary Healthcare Environment. 1-6 - Ivan Martinez, Fabienne Nouvel, Samer Lahoud
, Philippe Tanguy, Melhem El Helou:
On the Performance Evaluation of LoRaWAN with Re-transmissions under Jamming. 1-7 - Zhen Cao, Yu-e Sun, He Huang, Hansong Guo, Yang Du, An Liu, Le Lu:
Finding Persistent Elements of Anomalous Flows in Distributed Monitoring Systems. 1-7 - Ana Czarnitzki Estrin, Tomás Lagos Jenschke
, Georgios Z. Papadopoulos
, J. Ignacio Alvarez-Hamelin
, Nicolas Montavont:
Thorough Investigation of multipath Techniques in RPL based Wireless Networks. 1-7 - Roberto Gonçalves Pacheco, Rodrigo S. Couto
:
Inference Time Optimization Using BranchyNet Partitioning. 1-6 - Daniele Berardini
, Lucia Migliorelli, Sara Moccia, Marcello Naldini, Gioia De Angelis, Emanuele Frontoni:
Evaluating the autonomy of children with autism spectrum disorder in washing hands: a deep-learning approach. 1-7 - Marc Jayson Baucas
, Petros Spachos:
Fog and IoT-based Remote Patient Monitoring Architecture Using Speech Recognition. 1-6 - Daniel Carvalho, Laécio Rodrigues, Patricia Takako Endo
, Sokol Kosta
, Francisco Airton Silva:
Mobile Edge Computing Performance Evaluation using Stochastic Petri Nets. 1-6 - Nikita Karandikar, Antorweep Chakravorty, Chunming Rong
:
RenewLedger : Renewable energy management powered by Hyperledger Fabric. 1-6 - Dali Zhu, Long Yang, Zhanxun Li, Hualin Zeng:
Remote Speech Extraction from Speckle Image by Convolutional Neural Network. 1-6 - Ali Malik, Ruairí de Fréin:
SLA-Aware Routing Strategy for Multi-Tenant Software-Defined Networks. 1-7 - Yazid M. Khattabi
, Salim Abdelkareem Alkhawaldeh:
Spatial Modulation under Vehicular Rayleigh Fading Channels. 1-6 - Miguel Silva, Miguel Luís, Susana Sargento:
Edge Virtualization in Multihomed Vehicular Networks. 1-6 - Armando Ruggeri
, Maria Fazio, Antonino Galletta, Antonio Celesti, Massimo Villari:
A Decision Support System for Therapy Prescription in a Hospital Centre. 1-4 - Mariana Rodrigues, Daniel F. Pigatto, Kalinka R. L. J. C. Branco:
Context-Aware Operation for Unmanned Systems with HAMSTER. 1-6 - Antoine B. Bagula, Hloniphani Maluleke, Olasupo Ajayi
, Amani Bagula, Nancy Bagula, Moise Bagula:
Predictive Models for Mitigating COVID-19 Outbreak. 1-7 - Giacomo Mambelli, Catia Prandi
, Silvia Mirri
:
What influences sentiment analysis on social networks: a case study. 1-6 - Xiren Ma, Azzedine Boukerche:
An AI-based Visual Attention Model for Vehicle Make and Model Recognition. 1-6 - Murat Simsek, Burak Kantarci, Azzedine Boukerche:
Knowledge-Based Machine Learning Boosting for Adversarial Task Detection in Mobile Crowdsensing. 1-7 - Giusy Esposito, Giulio Pagliari
, Gianluca Coppola, Marco Aiello
, Marco Salvatore
, Giuseppe Aceto, Antonio Pescapè:
A network performance view of a biobanking system for diagnostic images. 1-7 - Marco Furini
, Silvia Mirri, Manuela Montangero, Catia Prandi
:
Untangling between fake-news and truth in social media to understand the Covid-19 Coronavirus. 1-6 - Xin Fang, Xiaoqing Sun, Jiahai Yang, Xinran Liu:
Domain-Embeddings Based DGA Detection with Incremental Training Method. 1-6 - Thiago Garrett
, Luis C. E. Bona, Elias P. Duarte Jr.:
Exploiting AS-level Routing Properties to Locate Traffic Differentiation in the Internet. 1-6 - Mustafa Çaglar Güldiken, Ece Güran Schmidt
, Klaus Werner Schmidt:
Telegram Scheduling for the Multifunction Vehicle Bus (MVB): Algorithms and Evaluation. 1-6 - Karim Sonbol, Öznur Özkasap, Ibrahim Al-Oqily
, Moayad Aloqaily
:
EdgeKV: Distributed Key-Value Store for the Network Edge. 1-6 - Adrian E. Sapio, Shuvra S. Bhattacharyya, Marilyn Wolf:
Efficient Model Solving for Markov Decision Processes. 1-5 - Siyuan Lu, Shengjie Zhao, Qingjiang Shi:
Block-Diagonal Zero-Forcing Beamforming for Weighted Sum-Rate Maximization in Multi-User Massive MIMO Systems. 1-6 - Songyang Li, Aimin Wang, Geng Sun, Lingling Liu:
Improving charging performance for wireless rechargeable sensor networks based on charging UAVs: a joint optimization approach. 1-7 - Yazan Otoum, Amiya Nayak
:
On securing IoT from Deep Learning perspective. 1-7 - Augusto C. Ferreira, Natassya B. F. Silva:
Comparison of secure communication with AES between embedded system and general purpose computer. 1-6 - Ryunosuke Nagayama, Ryohei Banno, Kazuyuki Shudo:
Trail: A Blockchain Architecture for Light Nodes. 1-7 - Rui Carvalho, Diogo Machado, Pedro Brandão
:
Gamification, mHealth and user adherence. 1-6 - Murat Akpinar
, Ece Güran Schmidt
, Klaus Werner Schmidt:
Drift Correction for the Software-based Clock Synchronization on Controller Area Network. 1-6 - Tangui Le Gléau, Xavier Marjou, Tayeb Lemlouma, Benoit Radier:
Game Theory Approach in Multi-agent Resources Sharing. 1-6 - Francis B. Moreira, Danilo Carastan-Santos, Philippe O. A. Navaux:
Attesting L-3 General Program Anomaly Detection Efficiency with SPADA. 1-6 - Dali Zhu, Jie Liang, Haitao Liu, Heng Ping, Ting Li, Hangsheng Zhang, Liru Geng, Yinlong Liu:
A Novel Caching Strategy in Social Content-Centric Networking with Mobile Edge Computing. 1-6 - Mónica Marques, Carlos R. Senna
, Susana Sargento:
Evaluation of Strategies for Emergency Message Dissemination in VANETs. 1-6 - Carlos Renato Storck, Fátima de L. P. Duarte-Figueiredo:
A Performance Analysis of Adaptive Streaming Algorithms in 5G Vehicular Communications in Urban Scenarios. 1-7 - Ioannis Mavromatis
, Robert J. Piechocki, Mahesh Sooriyabandara, Arjun Parekh:
DRIVE: A Digital Network Oracle for Cooperative Intelligent Transportation Systems. 1-7 - Dali Zhu, Yuchen Ma, Yinlong Liu:
Anomaly Detection with Deep Graph Autoencoders on Attributed Networks. 1-6 - Ali Ebrahimi
, Uffe Kock Wiil
, Kjeld Andersen
, Marjan Mansourvar
, Anette Søgaard Nielsen
:
A Predictive Machine Learning Model to Determine Alcohol Use Disorder. 1-7 - Huda Aldosari, Raafat S. Elfouly, Reda Ammar, Mohammad Alsulami:
Performance of New Monitoring Architectures for Underwater Oil/Gas Pipeline using Hyper-Sensors. 1-6 - Bing Huang, Shouling Dong:
An Enhanced Scheduling Framework for Elephant Flows in SDN-Based Data Center Networks. 1-7 - Isadora Garcia Ferrão, Daniel F. Pigatto, João V. C. Fontes, Natassya B. F. Silva, David Espes
, Catherine Dezan, Kalinka R. L. J. C. Branco:
STUART: ReSilient archiTecture to dynamically manage Unmanned aeriAl vehicle networks under atTack. 1-6 - Carlos Renato Storck, Guilherme G. de O. Silva, Fátima de L. P. Duarte-Figueiredo:
A Vehicle-Centric Probabilistic Approach to Virtual Cell Management in Ultra-Dense 5G Networks. 1-7 - David Hauweele, Remous-Aris Koutsiamanis, Bruno Quoitin
, Georgios Z. Papadopoulos
:
Pushing 6TiSCH Minimal Scheduling Function (MSF) to the Limits. 1-7 - Fabien Geyer, Steffen Bondorf:
On the Robustness of Deep Learning-predicted Contention Models for Network Calculus. 1-7 - Juan Luis Herrera
, Luca Foschini
, Jaime Galán-Jiménez
, Javier Berrocal
:
The Service Node Placement Problem in Software-Defined Fog Networks. 1-6 - Yue Han, Mingwu Yao, Jungang Yang, Yongjian Luo, Xuefang Liu:
On Scalable Delay Bound Evaluation with Stochastic Network Calculus. 1-6 - Berrak Perk, Can Bayraktaroglu, Engin Deniz Dogu, Faizan Safdar Ali, Öznur Özkasap:
Joulin: Blockchain-based P2P Energy Trading Using Smart Contracts. 1-6 - Hicham Lakhlef, Ghada Jaber, Abdelmadjid Bouabdallah, Fabio D'Andreagiovanni, Ahmed Lounis
:
Distributed Time Slots Assignment Protocol in Dynamic Networks. 1-6 - Aymen Shaafi, Osman Salem, Ahmed Mehaoua:
Improving the Recognition of Sign Language from Acquired Data by Wireless Body Area Network. 1-6 - Tayeb Lemlouma:
Adaptive Sensing Algorithm for IoT Applications with Data and Temporal Accuracy Requirements. 1-7 - Antonio Celesti, Fabrizio Celesti
, Antonino Galletta, Maria Fazio, Massimo Villari:
Improving Machine Learning Algorithm Processing Time in Tele-Rehabilization Through a NoSQL Graph Database Approach: A Preliminary Study. 1-6 - Zhao Ming
, Chuan Sun, Xiuhua Li, Qilin Fan, Xiaofei Wang, Victor C. M. Leung:
Ensemble Learning Based Sleeping Cell Detection in Cloud Radio Access Networks. 1-6 - Jianguo Jiang, Yue Lu, Min Yu, Gang Li
, Chao Liu, Shaohua An, Weiqing Huang:
CES2Vec: A Confidentiality-Oriented Word Embedding for Confidential Information Detection. 1-7 - Ceren Canpolat, Ece Güran Schmidt
:
Dynamic User Count Aware Resource Allocation for Network Slicing in Virtualized Radio Access Networks. 1-6 - Wenzheng Liu, Xiaofeng Wang, Wei Peng:
NCZKP Based Privacy-Preserving Authentication Scheme for the Untrusted Gateway Node Smart Home Environment. 1-6 - Jiang Zhou, Hewu Li, Qian Wu, Zeqi Lai, Jun Liu
:
SR-TPP: Extending IPv6 Segment Routing to enable Trusted and Private Network Paths. 1-6 - Wenying Dai, Hewu Li, Qian Wu, Xiaomo Wang:
NDM: Network Driving IP Mobility Support in Large Scale LEO Satellite Network. 1-7 - Thibaud Ecarot, Benoît Fraikin, Francis Ouellet, Luc Lavoie, Mark M. McGilchrist, Jean-François Ethier:
Sensitive Data Exchange Protocol Suite for Healthcare. 1-7 - Patrick Ryan Sales dos Santos
, Vitória de Carvalho Brito, Antonio Oseas de Carvalho Filho, Flávio Henrique Duarte de Araújo, Ricardo de Andrade Lira Rabelo, Mano Joseph Mathew
:
A Capsule Network-based for identification of Glaucoma in retinal images. 1-6 - Pierluigi Freni, Enrico Ferro
, Roberto H. Moncada
:
Tokenization and Blockchain Tokens Classification: a morphological framework. 1-6 - Simona Colucci
, Luigi Alfredo Grieco, Agnese V. Ventrella, Eugenio Di Sciascio:
From Name-Centric to Information-Centric Networking. 1-6 - Abeer Ali
, Christos Anagnostopoulos
, Dimitrios P. Pezaros:
In-Network Placement of Security VNFs in Multi-Tenant Data Centers. 1-6 - Ilias Siniosoglou
, Georgios Efstathopoulos, Dimitrios Pliatsios
, Ioannis D. Moscholios, Antonios Sarigiannidis, Georgia Sakellari, Georgios Loukas
, Panagiotis G. Sarigiannidis:
NeuralPot: An Industrial Honeypot Implementation Based On Deep Neural Networks. 1-7 - Patrick Elfert, Simon Siggelkow, Marco Eichelberg, Andreas Hein:
Towards an Ambient Estimation of Stool Types to Support Nutrition Counseling for People affected by the Geriatric Frailty Syndrome. 1-6 - Adrian Sterca, Darius Bufnea, Virginia Niculescu
:
Bandwidth Aggregation over Multihoming Links. 1-7 - Yago Fontoura do Rosário, Xenofon Fafoutis
:
CoMP: Efficient Monitoring for Constrained Embedded Devices. 1-7 - Flavio Di Martino, Franca Delmastro
:
High-Resolution Physiological Stress Prediction Models based on Ensemble Learning and Recurrent Neural Networks. 1-6 - Meiqi Wang, Yanzeng Li
, Xuebin Wang, Tingwen Liu, Jinqiao Shi, Muqian Chen:
2ch-TCN: A Website Fingerprinting Attack over Tor Using 2-channel Temporal Convolutional Networks. 1-7 - Gabriella Casalino
, Giovanna Castellano, Gianluca Zaza
:
A mHealth solution for contact-less self-monitoring of blood oxygen saturation. 1-7 - Pere Tuset-Peiró, Ferran Adelantado, Xavier Vilajosana, Ruan Delgado Gomes:
Reliability through modulation diversity: can combining multiple IEEE 802.15.4-2015 SUN modulations improve PDR? 1-6 - Lanlan Li, Linfeng Yue, Haipeng Dai
, Nan Yu, Guihai Chen
:
Scheduling of Wireless Charging Tasks with Precedence Constraints. 1-6 - Xiang Yin, Yanni Han, Hongyu Sun, Zhen Xu, Haibo Yu, Xiaoyu Duan:
A Multivariate Time Series Prediction Schema based on Multi-attention in recurrent neural network. 1-7 - Hangsheng Zhang, Haitao Liu, Jie Liang, Ting Li, Liru Geng, Yinlong Liu, Shujuan Chen:
Defense Against Advanced Persistent Threats: Optimal Network Security Hardening Using Multi-stage Maze Network Game. 1-6 - Mingzhi Sha, Azzedine Boukerche:
Semantic Fusion-based Pedestrian Detection for Supporting Autonomous Vehicles. 1-6 - Filipe Lautert, Daniel F. Pigatto, Luiz Celso Gomes Jr.
:
A fog architecture for privacy-preserving data provenance using blockchains. 1-6 - Pooya Moradian Zadeh
, Saghi Khani, Kathryn Pfaff, Saeed Samet:
A Computational Model and Algorithm to Identify Social Isolation in Elderly Population. 1-6 - Edson Damasceno Carvalho
, Antônio Oséas de Carvalho Filho, Flávio Henrique Duarte de Araújo, Ricardo de Andrade Lira Rabelo:
Diagnosis of COVID-19 in CT image using CNN and XGBoost. 1-6 - Shaoqing Wang, Youjian Zhao, Hui Xie:
Improving Survivability of LEO Satellite Network with Guaranteed Based Approaches. 1-6 - Raiane Coelho, Regina Braga, José Maria N. David, Mario A. R. Dantas, Victor Ströele
, Fernanda Campos:
Blockchain for Reliability in Collaborative Scientific Workflows on Cloud Platforms. 1-7 - Sudarshan S. Chawathe:
Efficient File Collections for Embedded Devices. 1-6 - Carlos Fransley Scatambulo Costa
, Eduardo Alexandre Franciscon:
Data Mining applied to the navigation task in autonomous robots. 1-6 - Yang Shi, Mei Wen, Chunyuan Zhang:
Incremental Deployment of Programmable Switches for Sketch-based Network Measurement. 1-7 - Alaleh Alivar
, Pegah Faridi, Balasubramaniam Natarajan
, Punit Prakash:
Reducing Sparse Motion Artifacts in MR-Thermometry Using Robust Principal Component Analysis. 1-4 - Yutong Chen, Zhen Li, Junzheng Shi, Gaopeng Gou, Chang Liu, Gang Xiong:
Not Afraid of the Unseen: a Siamese Network based Scheme for Unknown Traffic Discovery. 1-7 - Dmitry Bankov, Evgeny M. Khorov, Andrey I. Lyakhov:
An Algorithm to Satisfy the QoS Requirements in a Heterogeneous LoRaWAN Network. 1-6 - Sonia Alice George, Arunita Jaekel, Ikjot Saini
:
Secure Identity Management Framework for Vehicular Ad-hoc Network using Blockchain. 1-6 - Hassan Noura
, Ola Salman, Ali Chehab
, Raphaël Couturier:
Efficient and Secure Keyed Hash Function Scheme Based on RC4 Stream Cipher. 1-7 - Peter Robinson:
Performance Overhead of Atomic Crosschain Transactions. 1-6 - Alexandros Bakas, Antonis Michalas
:
Power Range: Forward Private Multi-Client Symmetric Searchable Encryption with Range Queries Support. 1-7

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.