default search action
ICC 2020: Dublin, Ireland
- 2020 IEEE International Conference on Communications, ICC 2020, Dublin, Ireland, June 7-11, 2020. IEEE 2020, ISBN 978-1-7281-5089-5
- Lingshuang Cai, Di Lin, Jiale Zhang, Shui Yu:
Dynamic Sample Selection for Federated Learning with Heterogeneous Data in Fog Computing. 1-6 - Mattia Brambilla, Daniele Pardo, Monica Nicoli:
Location-assisted Subspace-based Beam Alignment in LOS/NLOS mm-wave V2X Communications. 1-6 - Sheng Cao, Jiecheng Zou, Xiaojiang Du, Xiaosong Zhang:
A Successive Framework: Enabling Accurate Identification and Secure Storage for Data in Smart Grid. 1-6 - Ali Muhammad, Long Qu, Chadi Assi:
Delay-Aware Multi-Source Multicast Resource optimization in NFV-Enabled Network. 1-7 - Shengtian Yang, Jun Chen:
A Maximin Optimal Online Power Control Policy for Energy Harvesting Communications. 1-6 - Abdelwahab Boualouache, Ridha Soua, Thomas Engel:
Toward an SDN-based Data Collection Scheme for Vehicular Fog Computing. 1-6 - Mohammad Javad Salehi, Antti Tölli, Seyed Pooya Shariatpanahi:
A Multi-Antenna Coded Caching Scheme with Linear Subpacketization. 1-6 - Behzad Khamidehi, Elvino S. Sousa:
A Double Q-Learning Approach for Navigation of Aerial Vehicles with Connectivity Constraint. 1-6 - Yue Jin, Zengshan Tian, Yong Li, Ze Li, Zhenyuan Zhang:
A Novel Device-Free Tracking System Using WiFi: Turning Fading Channel From Foe to Friend. 1-6 - Abubakar U. Makarfi, Khaled M. Rabie, Omprakash Kaiwartya, Osamah S. Badarneh, Xingwang Li, Rupak Kharel:
Reconfigurable Intelligent Surface Enabled IoT Networks in Generalized Fading Channels. 1-6 - Takuya Fujihashi, Toshiaki Koike-Akino, Takashi Watanabe, Philip V. Orlik:
High-Quality Soft Image Delivery with Deep Image Denoising. 1-6 - Yu Guo, Chen Zhang, Xiaohua Jia:
Verifiable and Forward-secure Encrypted Search Using Blockchain Techniques. 1-7 - Jie Du, Zhengchuan Chen, Yunjian Jia, Liang Liang, Danping Liu:
Maximum Throughput of Two-Hop Half-Duplex Relaying in Ultra-Reliable and Low-Latency Communications. 1-6 - Bochun Wu, Tianyi Chen, Xin Wang:
An MAB Approach for MEC-centric Task-offloading Control in Multi-RAT HetNets. 1-6 - Minghong Fang, Jia Liu:
Toward Low-Cost and Stable Blockchain Networks. 1-6 - Tianqi Mao, Qi Wang, Zhaocheng Wang:
Receiver Design for the Low-Cost TeraHertz Communication System with Hardware Impairment. 1-5 - Attayeb Mohsen, Muftah Al-Mahdawi, Mostafa M. Fouda, Mikihiko Oogane, Yasuo Ando, Zubair Md. Fadlullah:
AI Aided Noise Processing of Spintronic Based IoT Sensor for Magnetocardiography Application. 1-6 - Simeng Fan, Jing Xu:
Single-Group Multicast Secure Beamforming via Learning the Eavesdropper's Channel Correlation. 1-6 - Lixing Song, Alamin Mohammed, Aaron Striegel:
A Passive Client Side Control Packet-based WiFi Traffic Characterization Mechanism. 1-7 - Haipeng Weng, Lixin Li, Qianqian Cheng, Wei Chen, Zhu Han:
Content Caching Policy Based on GAN and Distributional Reinforcement Learning. 1-5 - Aishwariya Chakraborty, Sudip Misra, Ayan Mondal, Mohammad S. Obaidat:
SensOrch: QoS-Aware Resource Orchestration for Provisioning Sensors-as-a-Service. 1-6 - Masaki Takahashi, Yuichi Kawamoto, Nei Kato, Amane Miura, Morio Toyoshima:
Adaptive Multi-Beam Arrangement for Improving Throughput in an HTS Communication System. 1-6 - Bin Zhao, Kai Fan, Wei You, Kan Yang, Zilong Wang, Hui Li:
A Weight-based k-prototypes Algorithm for Anomaly Detection in Smart Grid. 1-6 - Amani Benamor, Oussama Habachi, Inès Kammoun, Jean-Pierre Cances:
Game Theoretical Framework for Joint Channel Selection and Power Control in Hybrid NOMA. 1-6 - Sihua Wang, Mingzhe Chen, Walid Saad, Changchuan Yin:
Federated Learning for Energy-Efficient Task Computing in Wireless Networks. 1-6 - Jalal Khamse-Ashari, Ioannis Lambadaris, Yiqiang Q. Zhao:
A game-theoretic approach to proportional fair resource sharing in 5G mobile networks. 1-5 - Xuying Zhou, Wei Wang, Zhaoyang Zhang:
Bandwidth-Cache Pricing for Caching-Assisted Video Streaming Delivery. 1-6 - Xianglong Zhang, Anmin Fu, Huaqun Wang, Chunyi Zhou, Zhenzhu Chen:
A Privacy-Preserving and Verifiable Federated Learning Scheme. 1-6 - Huaguang Shi, Meng Zheng, Wei Liang, Jialin Zhang, Martin Kasparick:
AODR: A Novel Retransmission Scheme for WIA-FA Networks. 1-6 - Ly Van Nguyen, Duy H. N. Nguyen, A. Lee Swindlehurst:
SVM-based Channel Estimation and Data Detection for Massive MIMO Systems with One-Bit ADCs. 1-6 - Naveed A. Abbasi, Arjun Hariharan, Arun Moni Nair, Ahmed Almaiman, François Rottenberg, Alan E. Willner, Andreas F. Molisch:
Double Directional Channel Measurements for THz Communications in an Urban Environment. 1-6 - Danni Yuan, Kaoru Ota, Mianxiong Dong, Xiaoyan Zhu, Tao Wu, Linjie Zhang, Jianfeng Ma:
Intrusion Detection for Smart Home Security Based on Data Augmentation with Edge Computing. 1-6 - Sid Ahmed Hichame Belkhira, Sofiane Boukli Hacene, Pascal Lorenz, Mohamed Belkheir, Marc Gilg, Abdelhalim Zerroug:
A new mechanism for MPR selection in mobile ad hoc and sensor wireless networks. 1-6 - Sezer Can Tokgoz, Saud Althunibat, Khalid A. Qaraqe:
A Link-Selection Mechanism for Hybrid FSO-mmWave Systems based on Index Modulation. 1-7 - Ahmed Elbery, Hossam S. Hassanein, Nizar Zorba:
Vehicular Crowd Management: An IoT-Based Departure Control and Navigation System. 1-6 - Francisco Carpio, Marta Delgado, Admela Jukan:
Engineering and Experimentally Benchmarking a Container-based Edge Computing System. 1-6 - Muhammad Sohaib Amjad, Falko Dressler:
Integrated Communications and Non-Invasive Vibrations Sensing using Strobing Light. 1-6 - Luyang Xu, Xu Zhou, Xifeng Lin, Yongmao Ren, Yifang Qin, Jun Liu:
A New Loss Function for Traffic Classification Task on Dramatic Imbalanced Datasets. 1-7 - Ruifan Yang, Zheng Zhou, Lewis Tseng, Moayad Aloqaily, Azzedine Boukerche:
Efficient and Robust Top-k Algorithms for Big Data IoT. 1-6 - Minchae Jung, Walid Saad, Mérouane Debbah, Choong Seon Hong:
Asymptotic Optimality of Reconfigurable Intelligent Surfaces: Passive Beamforming and Achievable Rate. 1-6 - Linjie Zhang, Xiaoyan Zhu, Jianfeng Ma, Zhuo Ma, Danni Yuan:
Medical Privacy-preserving Service Recommendation. 1-6 - Nicholas Woolsey, Rong-Rong Chen, Mingyue Ji:
Coded Distributed Computing with Heterogeneous Function Assignments. 1-6 - Rainer Strobel, Thushara Hewavithana:
Advanced Coding and Modulation for 3 GHz Extended Spectrum DOCSIS. 1-6 - Yupeng Li, Ben Liang, Ali Tizghadam:
Robust Network Flow Classification against Malicious Feature Manipulation. 1-6 - Konstantin Mikhaylov, Martin Stusek, Pavel Masek, Radek Fujdiak, Radek Mozny, Sergey Andreev, Jiri Hosek:
Communication Performance of a Real-Life Wide-Area Low-Power Network Based on Sigfox Technology. 1-6 - Siddhartha S. Borkotoky, Udo Schilcher, Christian Raffelsberger:
Application-Layer Coding with Intermittent Feedback Under Delay and Duty-Cycle Constraints. 1-6 - Weifeng Zhu, Meixia Tao, Xiaojun Yuan, Yunfeng Guan:
Asynchronous Massive Connectivity with Deep-Learned Approximate Message Passing. 1-6 - Dian Shi, Jixiang Lu, Jie Wang, Lixin Li, Kaikai Liu, Miao Pan:
No One Left Behind: Avoid Hot Car Deaths via WiFi Detection. 1-6 - Amrita Ghosal, Subir Halder, Mauro Conti:
STRIDE: Scalable and Secure Over-The-Air Software Update Scheme for Autonomous Vehicles. 1-6 - Takuya Fujihashi, Toshiaki Koike-Akino, Takashi Watanabe, Philip V. Orlik:
Overhead Reduction in Graph-Based Point Cloud Delivery. 1-6 - Yunsenxiao Lin, Yu Zhou, Zhengzheng Liu, Ke Liu, Yangyang Wang, Mingwei Xu, Jun Bi, Ying Liu, Jianping Wu:
NetView: Towards On-Demand Network-Wide Telemetry in the Data Center. 1-6 - Robin-Joshua Meinke, Hongiian Sun, Jing Jiang:
Optimising Demand and Bid Matching in a Peer-to-Peer Energy Trading Model. 1-6 - Xu Chen, Wei Feng, Ning Ge, Xianbin Wang:
Defending Link Flooding Attacks under Incomplete Information: A Bayesian Game Approach. 1-6 - Dadja Anade, Jean-Marie Gorce, Philippe Mary, Samir M. Perlaza:
On the saddlepoint approximation of the dependence testing bound in memoryless channels. 1-5 - Zan Zhou, Changqiao Xu, Tengchao Ma, Xiaohui Kuang:
Multi-vNIC Intelligent Mutation: A Moving Target Defense to thwart Client-side DNS Cache Attack. 1-6 - Hanyu Xue, Bo Liu, Ming Ding, Li Song, Tianqing Zhu:
Hiding Private Information in Images From AI. 1-6 - Anqi Wei, Tong Ye, Guangqiang He, Jianing He:
A Hybrid DBA Algorithm for EPON-based Mobile Front-haul Networks. 1-6 - Abdallah Ouhab, Thiago Abreu, Hachem Slimani, Abdelhamid Mellouk:
Energy-efficient clustering and routing algorithm for large-scale SDN-based IoT monitoring. 1-6 - Pasika Ranaweera, Vashish N. Imrith, Madhusanka Liyanage, Anca Delia Jurcut:
Security as a Service Platform Leveraging Multi-Access Edge Computing Infrastructure Provisions. 1-6 - Fujun He, Eiji Oki:
Load Balancing Model against Multiple Controller Failures in Software Defined Networks. 1-6 - Yuwen Cao, Tomoaki Ohtsuki:
Multi-Configuration Selection Mechanisms and Analog Precoding for Signature Spatial Modulation. 1-6 - Yue Zhao, Zan Li, Nan Cheng, Danyang Wang, Wei Quan, Xuemin Sherman Shen:
Joint Power and Position Optimization for the Full-Duplex Receiver in Covert Communication. 1-6 - Hans Walter Behrens, K. Selçuk Candan:
Pando: Efficient Byzantine-Tolerant Distributed Sensor Fusion using Forest Ensembles. 1-6 - Nazih Salhab, Rana Rahim, Rami Langar, Raouf Boutaba:
Offloading Network Data Analytics Function to the Cloud with Minimum Cost and Maximum Utilization. 1-6 - Yuhang Jia, Chencheng Ye, Ying Cui:
Analysis and optimization of an Intelligent Reflecting Surface-assisted System with Interference. 1-6 - Xudong Han, Yushan Liu, Hongyan Li, Shun Zhang, Feifei Gao:
High Mobility Channel Parameter Acquisition over Massive MIMO System. 1-6 - Vasileios Miliotis, Nikos Makris, Virgilios Passas, Thanasis Korakis:
Portfolio Theory Application for 5G Heterogeneous Cloud-RAN Infrastructure. 1-6 - Haomiao Yang, Shaopeng Liang, Qixian Zhou, Hongwei Li:
Privacy-preserving HE-based clustering for load profiling over encrypted smart meter data. 1-6 - Salwa Abougamila, Mohammed Elmorsy, Ehab S. Elmallah:
On Connected Components in Multistate Wireless Sensor Network Probabilistic Models. 1-7 - Soheil Rostami, Hoang Duy Trinh, Sandra Lagén, Mário Costa, Mikko Valkama, Paolo Dini:
Proactive Wake-up Scheduler based on Recurrent Neural Networks. 1-6 - Ninghao Chen, Weiwei Xing, Di Zhang, Min Guo, Limin Gao:
Multi-Bitrate Video Caching and Processing in Edge Computing: A Stackelberg Game Approach. 1-6 - Lei Zhou, Anmin Fu, Jingyu Feng, Chunyi Zhou:
An Efficient and Secure Data Integrity Auditing Scheme with Traceability for Cloud-Based EMR. 1-6 - Takumi Takahashi, Shinsuke Ibi, Antti Tölli, Seiichi Sampei:
Subspace Marginalized Belief Propagation for mmWave Overloaded MIMO Signal Detection. 1-6 - Alexis Alfredo Dowhuszko, Mehmet Cagri Ilter, Jyri Hämäläinen:
Visible Light Communication System in Presence of Indirect Lighting and Illumination Constraints. 1-6 - Mostafa Gheryani, Osman Salem, Ahmed Mehaoua:
Epileptic Seizures Detection based on Inertial and Physiological Data from Wireless Body Sensors. 1-6 - Sahar Idrees, Xiangyun Zhou, Salman Durrani, Dusit Niyato:
A Retrodirective Wireless Power Transfer Scheme for Ambient Backscatter Systems. 1-6 - Vaibhav Kumar, Barry Cardiff, Shankar Prakriya, Mark F. Flanagan:
Link-Layer Capacity of Downlink NOMA with Generalized Selection Combining Receivers. 1-7 - Alireza Haqiqatnejad, Farbod Kayhan, Shahram Shahbazpanahi, Björn E. Ottersten:
One-Bit Quantized Constructive Interference Based Precoding for Massive Multiuser MIMO Downlink. 1-6 - Jiequ Ji, Kun Zhu, Dusit Niyato, Ran Wang:
Joint Cache and Trajectory Optimization for Secure UAV-relaying with Underlaid D2D Communications. 1-6 - Scott Fowler, Gabriel Baravdish, George Baravdish:
3D Imaging of Sparse Wireless Signal Reconstructions via Machine Learning. 1-6 - Cuneyd Ozturk, Sinan Gezici:
Eavesdropper Selection Strategies in Wireless Source Localization Networks. 1-6 - Paolo Bellavista, Roberto Della Penna, Luca Foschini, Domenico Scotece:
Machine Learning for Predictive Diagnostics at the Edge: an IIoT Practical Example. 1-7 - Susanna Schwarzmann, Clarissa Cassales Marquezan, Riccardo Trivisonno, Shinichi Nakajima, Thomas Zinner:
Accuracy vs. Cost Trade-off for Machine Learning Based QoE Estimation in 5G Networks. 1-6 - Dezhi Wang, Wei Wang, Zhaoyang Zhang:
Delay-Optimal Random Access for Massive Heterogeneous IoT Devices. 1-6 - Asit Kumar Pradhan, Vamsi K. Amalladinne, Krishna R. Narayanan, Jean-François Chamberland:
Polar Coding and Random Spreading for Unsourced Multiple Access. 1-6 - Augustin-Alexandru Saucan, Moe Z. Win:
On the Labeled Multi-Bernoulli Filter with Merged Measurements. 1-5 - Luis Fernando Abanto-Leon, Gek Hong (Allyson) Sim:
Fairness-Aware Hybrid Precoding for mmWave NOMA Unicast/Multicast Transmissions in Industrial IoT. 1-7 - Anjana Ambika Mahesh, Tushara Swapna Malladi, B. Sundar Rajan:
Two Private Secure Distributed Coded Computation Schemes Using Extension Fields. 1-7 - Melissa Duarte, George C. Alexandropoulos:
Full Duplex MIMO Digital Beamforming with Reduced Complexity AUXTX Analog Cancellation. 1-6 - Zheng Wang, Brian L. Mark:
Game-Theoretic Framework for Cooperative Relaying in Cognitive Radio Networks. 1-6 - Amr Abdelnasser, Lutz Lampe, Gustav Vos:
A New Resynchronization Signal Design for Re1-15 LTE-M. 1-7 - Haijun Zhang, Jianmin Zhang, Keping Long, Arumugam Nallanathan, Victor C. M. Leung:
Resource Allocation for Energy Efficient NOMA UAV Network under Imperfect CSI. 1-6 - Utku Tefek, Ertem Esiner:
Coverage Analysis of Cooperative Relaying for Urban Transportation Systems in Tunnels. 1-6 - Penghao Sun, Julong Lan, Zehua Guo, Di Zhang, Xianfu Chen, Yuxiang Hu, Zhi Liu:
DeepMigration: Flow Migration for NFV with Graph-based Deep Reinforcement Learning. 1-6 - Yuting Wu, Yanxiang Jiang, Mehdi Bennis, Fuchun Zheng, Xiqi Gao, Xiaohu You:
Content Popularity Prediction in Fog Radio Access Networks: A Federated Learning Based Approach. 1-6 - Yali Chen, Bo Ai, Yong Niu, Zhangdui Zhong, Zhu Han:
Energy Efficient Resource Allocation and Computation Offloading in Millimeter-Wave based Fog Radio Access Networks. 1-7 - Lixiang Lian, Vincent K. N. Lau:
Compressive Channel Estimation in mmWave Systems with Flexible Hybrid Beamforming Architecture. 1-6 - Omran Ayoub, Faryal Fatima, Andrea Bovio, Francesco Musumeci, Massimo Tornatore:
Traffic-Adaptive Re-Configuration of Programmable Filterless Optical Networks. 1-6 - Thanh-Hai To, Andrzej Duda:
Timemaps for Improving Performance of LoRaWAN. 1-7 - Fei Wang, Xi Zhang:
Secure Resource Allocation for Polarization-Based Non-Linear Energy Harvesting Over 5G Cooperative Cognitive Radio Networks. 1-6 - Xiang Pan, Ruimin Hu, Dengshi Li:
Social-IFD: Personalized Influential Friends Discovery Based on Semantics in LBSN. 1-6 - Jianqiao Chen, Xi Zhang, Ping Zhang:
Bayesian Learning for BPSO-Based Pilot Pattern Design Over Sparse OFDM Channels. 1-6 - Walid R. Ghanem, Vahid Jamali, Robert Schober:
Resource Allocation for Secure Multi-User Downlink MISO-URLLC Systems. 1-7 - Konstantinos Dovelos, Michail Matthaiou, Hien Quoc Ngo, Boris Bellalta:
Massive MIMO with Multi-Antenna Users under Jointly Correlated Ricean Fading. 1-6 - Junjie Wu, Wei Chen:
Delay-Optimal Scheduling for Energy Harvesting Aided mmWave Communications with Random Blocking. 1-6 - Hadeel Elayan, Andrew W. Eckford, Raviraj Adve:
Regulating Molecular Interactions Using Terahertz Communication. 1-6 - Haotong Cao, Shengchen Wu, Yue Hu, Gagangeet Singh Aujla, Longxiang Yang:
Virtual Resource Allocation for Tactile and Flexible Services in UAVs-Integrated 5G Networks. 1-6 - Abida Perveen, Mohammad N. Patwary, Adel Aneiba:
End-use Aware Optimized Control Signaling for User Admission within 5G and Beyond Networks. 1-7 - Medhat H. M. Elsayed, Kevin Shimotakahara, Melike Erol-Kantarci:
Machine Learning-based Inter-Beam Inter-Cell Interference Mitigation in mmWave. 1-6 - Georgios Fragkos, Nathan Patrizi, Eirini-Eleni Tsiropoulou, Symeon Papavassiliou:
Socio-aware Public Safety Framework Design: A Contract Theory based Approach. 1-7 - Haotian Wu, Jun Tao, Bin Xiao:
Towards a Stable and Truthful Incentive Mechanism for Task Delegation in Hierarchical Crowdsensing. 1-6 - Yijing Liu, Gang Feng, Zhuo Chen, Shuang Qin, Guanqun Zhao:
Network Function Migration in Softwarization Based Networks with Mobile Edge Computing. 1-6 - Chien Chen, Hoa-Chuan Fang, Muhammad Shahid Iqbal:
QoSTCP: Provide Consistent Rate Guarantees to TCP flows in Software Defined Networks. 1-6 - Akram Shafie, Nan Yang, Chong Han:
Multi-Connectivity for Indoor Terahertz Communication with Self and Dynamic Blockage. 1-7 - Nurefsan Sertbas Bülbül, Mathias Fischer:
SDN/NFV-based DDoS Mitigation via Pushback. 1-6 - Turki G. Alghamdi, Dhaou Said, Hussein T. Mouftah:
Decentralized Game-Theoretic Approach for D-EVSE based on Renewable Energy in Smart Cities. 1-6 - Hongqing Huang, Lin Zhang, Zhiqiang Wu:
Secure and Reliable Multidimensional Orthogonal Code aided RF Watermark Design for NB-IoT Systems. 1-6 - Lam-Thanh Tu, Abbas Bradai, Yannis Pousset:
A New Closed-Form Expression of the Coverage Probability for Different QoS in LoRa Networks. 1-6 - Sheng Guo, Guanchong Niu, Zewei Wang, Man-On Pun:
Magnetic Field Strength Sequence-based Indoor Localization Using Multi-level Link-node Models. 1-6 - Charilaos C. Zarakovitis, Su Fong Chien, Haris Pervaiz, Qiang Ni, John Cosmas, Nawar Jawad, Michail-Alexandros Kourtis, Harilaos Koumaras, Themistoklis Anagnostopoulos:
Three-dimensional Access Point Assignment in Hybrid VLC, mmWave and WiFi Wireless Access Networks. 1-6 - Beiyuan Liu, Chen Gong, Julian Cheng, Zhengyuan Xu:
Data-Aided Channel Estimation for Poisson Channels With Inter-Symbol Interference. 1-6