


default search action
39th INFOCOM 2020: Toronto, ON, Canada - Workshops
- 39th IEEE Conference on Computer Communications, INFOCOM Workshops 2020, Toronto, ON, Canada, July 6-9, 2020. IEEE 2020, ISBN 978-1-7281-8695-5
- Clement Kam, Sastry Kompella
, Anthony Ephremides:
Age of Incorrect Information for Remote Estimation of a Binary Markov Source. 1-6 - Jaya Prakash Champati, Mikael Skoglund, James Gross:
Detecting State Transitions of a Markov Source: Sampling Frequency and Age Trade-off. 7-12 - Shaoling Hu, Wei Chen:
Balancing Data Freshness and Distortion in Real-time Status Updating with Lossy Compression. 13-18 - He Ma, Shidong Zhou, Xiujun Zhang, Limin Xiao:
Transmission Scheduling for Multi-loop Wireless Networked Control Based on LQ Cost Offset. 19-25 - Bo Chang, Liying Li
, Guodong Zhao
, Zhen Meng, Muhammad Ali Imran
, Zhi Chen:
Age of Information for Actuation Update in Real-Time Wireless Control Systems. 26-30 - Parisa Rafiee, Peng Zou, Omur Ozel, Suresh Subramaniam:
Maintaining Information Freshness in Power-Efficient Status Update Systems. 31-36 - M. Arun, Saminathan Balamurali, Bharat S. Rawal, Qiang Duan, Lakshmana Kumar Ramasamy, Balamurugan Baluswamy
:
Mutual Authentication and Authorized Data Access Between Fog and User Based on Blockchain Technology. 37-42 - Dilu Zhang, Lei Fan:
Cerberus: Privacy-Preserving Computation in Edge Computing. 43-49 - Libin Liu
, Hong Xu
, Chengxi Gao, Peng Wang:
Bottleneck-Aware Coflow Scheduling Without Prior Knowledge. 50-55 - Yuan Wu, Xu Xu, Liping Qian, Bo Ji, Zhiguo Shi, Weijia Jia:
Revenue-Sharing based Computation-Resource Allocation for Mobile Blockchain. 56-61 - Duo Zhang, Youliang Tian, Linjie Wang
, Sheng Gao, Jianfeng Ma:
Cooperative Game Model of Delegation Computing: Verifier Separated from Calculators. 62-67 - Chenming Yang, Liang Zhou, Hui Wen, Yue Wu:
U-ASG: A Universal Method to Perform Adversarial Attack on Autoencoder based Network Anomaly Detection Systems. 68-73 - Hua Wu, Zhenhua Yu, Guang Cheng, Shuyi Guo:
Identification of Encrypted Video Streaming Based on Differential Fingerprints. 74-79 - Chong Liu, Xiangyang Luo, Fuxiang Yuan, Fenlin Liu:
RNBG: A Ranking Nodes Based IP Geolocation Method. 80-84 - Lin Han, Yingzhen Qu, Lijun Dong, Richard Li
:
A Framework for Bandwidth and Latency Guaranteed Service in New IP Network. 85-90 - Gang Liu
, Wei Quan, Nan Cheng, Ning Lu, Hongke Zhang, Xuemin Shen
:
P4NIS: Improving network immunity against eavesdropping with programmable data planes. 91-96 - Fan Wu
, Wang Yang, Ju Ren, Feng Lyu
, Xiaojie Ding, Yaoxue Zhang:
Adaptive Video Streaming Using Dynamic NDN Multicast in WLAN. 97-102 - Ao Li, Xin Liu, Qiang Guan, Deyun Chen, Guanglu Sun:
A View-Invariant Feature Learning Model for Cross-View Security Authentication in Mobile Smart Devices. 103-108 - Hina Batool, Ammar Masood:
Enterprise Mobile Device Management Requirements and Features. 109-114 - Sheng Wang, Linning Peng, Hua Fu, Aiqun Hu, Xinyu Zhou:
A Convolutional Neural Network-Based RF Fingerprinting Identification Scheme for Mobile Phones. 115-120 - Nattanon Wongwiwatchai, Phannawhat Pongkham, Kunwadee Sripanidkulchai:
Comprehensive Detection of Vulnerable Personal Information Leaks in Android Applications. 121-126 - Akinsola Akinsanya
, Manish Nair
, Yijin Pan, Jiangzhou Wang:
A Dynamic Resource Allocation Scheme in Vehicular Communications. 127-131 - Tianqi Chen, Jian He, Huiling Zhu, Lin Cai, Peng Yue, Jiangzhou Wang:
Resource Allocation in Drone-Assisted Emergency Communication Systems. 132-137 - Yuan Gao, Jiang Cao, Ping Wang, Junsong Yin, Ming He, Ming Zhao, Mugen Peng
, Su Hu, Yunchuan Sun, Jing Wang, Shaochi Cheng, Yang Guo, Yanchang Du, Yanxi Cai, Jinhui Huang, Kai Qiu:
Intelligent UAV Based Flexible 5G Emergency Networks: Field Trial and System Level Results. 138-143 - Hongming Zhang
, Li Wang, Aiguo Fei:
An Integrated Platoon and UAV System for 3D Localization in Search and Rescue. 144-149 - Xiangwang Hou
, Zhiyuan Ren, Jingjing Wang, Shuya Zheng, Hailin Zhang:
Latency and Reliability Oriented Collaborative Optimization for Multi-UAV Aided Mobile Edge Computing System. 150-156 - Cong Xu, Tingqiu Yuan, Haibo Zhang, Tao Huang, Feilong Tang:
Dual Channel Per-packet Load Balancing for Datacenters. 157-164 - Kaihui Gao, Dan Li, Li Chen, Jinkun Geng, Fei Gui, Yang Cheng, Yue Gu:
Predicting Traffic Demand Matrix by Considering Inter-flow Correlations. 165-170 - Minghan Jia, Weifeng Sun, Zun Wang, Yaohua Yan, Hongyu Qin, Kelong Meng:
MFBBR: An Optimized Fairness-aware TCP-BBR Algorithm in Wired-cum-wireless Network. 171-176 - Jiao Li, Li Chen:
A Concurrent Weighted Communication Scheme for Blockchain Transaction. 177-182 - Muhammad Habib Ur Rehman
, Khaled Salah, Ernesto Damiani, Davor Svetinovic:
Towards Blockchain-Based Reputation-Aware Federated Learning. 183-188 - Sriram S, Vinayakumar R., Mamoun Alazab
, K. P. Soman:
Network Flow based IoT Botnet Attack Detection using Deep Learning. 189-194 - Amit Dua, Akash Dutta, Nishat Zaman, Neeraj Kumar
:
Blockchain-based E-waste Management in 5G Smart Communities. 195-200 - Changshuo Hu, Dong Ma
, Mahbub Hassan, Wen Hu:
NLC: Natural Light Communication using Switchable Glass. 201-206 - Jingjie Zong, Shuangzhi Li, Di Zhang, Gangtao Han, Xiaomin Mu, Ali Kashif Bashir, Joel J. P. C. Rodrigues:
Smart User Pairing for Massive MIMO Enabled Industrial IoT Communications. 207-212 - Wali Ullah Khan
, Ju Liu, Furqan Jameel, Muhammad Toaha Raza Khan, Syed Hassan Ahmed
, Riku Jäntti
:
Secure Backscatter Communications in Multi-Cell NOMA Networks: Enabling Link Security for Massive IoT Networks. 213-218 - Ayan Mondal
, Sudip Misra
:
BIND: Blockchain-Based Flow-Table Partitioning in Distributed Multi-Tenant Software-Defined Networks. 219-224 - Ephraim Moges, Tao Han:
DecOp: Decentralized Network Operations in Software Defined Networking using Blockchain. 225-230 - Siyi Liao, Jun Wu, Jianhua Li, Ali Kashif Bashir:
Proof-of-Balance: Game-Theoretic Consensus for Controller Load Balancing of SDN. 231-236 - Durbadal Chattaraj
, Sourav Saha
, Basudeb Bera
, Ashok Kumar Das:
On the Design of Blockchain-Based Access Control Scheme for Software Defined Networks. 237-242 - Parisa Foroughi, Hamzeh Beyranvand, Maurice Gagnaire, Sawsan Al Zahr:
User Association in Hybrid UAV-cellular Networks for Massive Real-time IoT Applications. 243-248 - Maninderpal Singh
, Gagangeet Singh Aujla
, Rasmeet Singh Bali:
ODOB: One Drone One Block-based Lightweight Blockchain Architecture for Internet of Drones. 249-254 - Rajesh Gupta
, Arpit Shukla, Parimal Mehta
, Pronaya Bhattacharya
, Sudeep Tanwar
, Sudhanshu Tyagi, Neeraj Kumar
:
VAHAK: A Blockchain-based Outdoor Delivery Scheme using UAV for Healthcare 4.0 Services. 255-260 - Vikas Hassija, Vikas Saxena, Vinay Chamola:
A Blockchain-based Framework for Drone-Mounted Base Stations in Tactile Internet Environment. 261-266 - Jifan Tang, Wanli Zhang, Xiangyang Gong, Guangpeng Li, Delei Yu, Ye Tian, Bowen Liu, Lei Zhao:
A Flexible Hierarchical Network Architecture with Variable-Length IP Address. 267-272 - Sheng Jiang, Guangpeng Li, Brian E. Carpenter:
A New Approach to a Service Oriented Internet Protocol. 273-278 - Morteza Kheirkhah
, Truong Khoa Phan, XinPeng Wei, David Griffin, Miguel Rio:
UCIP: User Controlled Internet Protocol. 279-284 - Yuhong Li, Peng Zhang, Yingchao Zhou, Di Jin:
A Data Forwarding Mechanism based on Deep Reinforcement Learning for Deterministic Networks. 285-290 - Stefano Angieri, Marcelo Bagnulo
, Alberto García-Martínez
, Bingyang Liu, Xinpeng Wei:
InBlock4: Blockchain-based Route Origin Validation. 291-296 - Yoshiaki Inoue:
The Probability Distribution of the AoI in Queues with Infinitely Many Servers. 297-302 - Mohammad Moltafet, Markus Leinonen, Marian Codreanu:
Average Age of Information in a Multi-Source M/M/1 Queueing Model with LCFS Prioritized Packet Management. 303-308 - Zhongdong Liu, Liang Huang
, Bin Li
, Bo Ji:
Anti-Aging Scheduling in Single-Server Queues: A Systematic and Comparative Study. 309-316 - Jingzhou Sun, Zhiyuan Jiang, Sheng Zhou, Zhisheng Niu:
Age-Optimal Scheduling for Heterogeneous Traffic with Timely-Throughput Constraint. 317-322 - Haitao Huang, Deli Qiao, Mustafa Cenk Gursoy:
Age-Energy Tradeoff in Fading Channels with Packet-Based Transmissions. 323-328 - Mangang Xie, Jie Gong, Xiao Ma:
Is the Packetized Transmission Efficient? An Age-Energy Perspective. 329-333 - Haina Zheng, Ke Xiong, Pingyi Fan
, Zhangdui Zhong, Khaled Ben Letaief
:
Age-Energy Region in Wireless Powered Communication Networks. 334-339 - Piotr Gawlowicz, Elnaz Alizadeh Jarchlo, Anatolij Zubow:
WiFi over VLC using COTS Devices. 340-345 - Merkebu Girmay
, Vasilis Maglogiannis
, Dries Naudts, Jaron Fontaine, Adnan Shahid, Eli De Poorter, Ingrid Moerman:
Adaptive CNN-based Private LTE Solution for Fair Coexistence with Wi-Fi in Unlicensed Spectrum. 346-351 - Ashutosh Srivastava, Fraida Fund, Shivendra S. Panwar:
An Experimental Evaluation of Low Latency Congestion Control for mmWave Links. 352-357 - Xiaoyong Yuan
, Pan He
, Xiaolin Li, Dapeng Wu
:
Adaptive Adversarial Attack on Scene Text Recognition. 358-363 - Yu Lu, Ju Liu, Xueyin Zhao, Xiaoxi Liu, Weiqiang Chen, Xuesong Gao:
Image Translation with Attention Mechanism based on Generative Adversarial Networks. 364-369 - Siqin Fang, Sean Kennedy, Chenggang Wang, Boyang Wang, Qingqi Pei, Xuefeng Liu:
Sparser: Secure Nearest Neighbor Search with Space-filling Curves. 370-375 - Rabeya Bosri, Abdur Razzak Uzzal, Abdullah Al Omar
, Md. Zakirul Alam Bhuiyan, Mohammad Shahriar Rahman
:
HIDEchain: A User-Centric Secure Edge Computing Architecture for Healthcare IoT Devices. 376-381 - Hong Su, Bing Guo, Yan Shen, Tao Li, Chaoxia Qing, Zhen Zhang:
A Solution for State Conflicts of Smart Contract in Interaction with Non-blockchain. 382-387 - Xiao Wu, Han Qiu, Shuyi Zhang, Gérard Memmi, Keke Gai, Wei Cai
:
ChainIDE 2.0: Facilitating Smart Contract Development for Consortium Blockchain. 388-393 - Zhaoyan Song, Ruiting Zhou, Shihan Zhao, Shixin Qin, John C. S. Lui, Zongpeng Li:
Edge Emergency Demand Response Control via Scheduling in Cloudlet Cluster. 394-399 - Wei Feng, Wan Tang, Ximin Yang, Lu Liu
:
MEM: A Multi-Staged Eviction Mechanism of Flowtable for Software-Defined Datacenters. 400-405 - Guoping Tan, Huipeng Zhang, Siyuan Zhou:
Resource Allocation in MEC-enabled Vehicular Networks: A Deep Reinforcement Learning Approach. 406-411 - Federico Mason
, Federico Chiariotti
, Martina Capuzzo, Davide Magrin, Andrea Zanella
, Michele Zorzi:
Combining LoRaWAN and a New 3D Motion Model for Remote UAV Tracking. 412-417 - Paresh Saxena
, Thomas Dreibholz
, Harald Skinnemoen, Özgü Alay, M. A. Vazquez-Castro, Simone Ferlin, Güray Açar:
Resilient Hybrid SatCom and Terrestrial Networking for Unmanned Aerial Vehicles. 418-423 - Xin Wang, Shuhui Chen, Jinshu Su:
App-Net: A Hybrid Neural Network for Encrypted Mobile Traffic Classification. 424-429 - Libin Liu
, Li Chen, Hong Xu
, Hua Shao:
Automated Traffic Engineering in SDWAN: Beyond Reinforcement Learning. 430-435 - Xiang Chen, Yuxin Chen, Qun Huang, Haifeng Zhou, Dong Zhang, Chunming Wu, Junchi Xing:
FastScale: Fast Scaling Out of Network Functions. 436-442 - Fuyou Li
, Zitian Zhang, Yunpeng Zhu, Jie Zhang:
Prediction of Twitter Traffic Based on Machine Learning and Data Analytics. 443-448 - Jianyu Wang, Wenchi Cheng, Hailin Zhang:
Statistical QoS Provisioning Based Caching Placement for D2D Communications Based Emergency Networks. 449-454 - Xin Liu, Xueyan Zhang:
Green Cognitive Internet of Things with Self Supply of Energy and Spectrum in Emergency Communications. 455-459 - Weifeng Sun, Guanghao Zhang, Yuankui Zhang, Chi Lin:
RAT-NHP: Radio Access Technology Selection Based on N-hop Prediction. 460-465 - Yu Liu, Qinghe Du:
Security Enhancement and Evaluation for Noise Aggregation over Wireless Fading Channels. 466-471 - Philippe Jacquet, Dalia Popescu, Bernard Mans
:
Connecting flying backhauls of drones to enhance vehicular networks with fixed 5G NR infrastructure. 472-477 - Zhaohua Lv, Jianjun Hao, Yijun Guo:
Energy Minimization for MEC-enabled Cellular-Connected UAV: Trajectory Optimization and Resource Scheduling. 478-483 - Olga G. Vikhrova
, Sara Pizzi, Antonella Molinaro, Giuseppe Araniti:
Paging Group Size Distribution for Multicast Services in 5G Networks. 484-489 - Sudip Misra
, Pallav Kumar Deb, Nidhi Pathak, Anandarup Mukherjee:
Blockchain-Enabled SDN for Securing Fog-Based Resource-Constrained IoT. 490-495 - Lei Liu, Wei Feng, Chen Chen, Yuru Zhang, Dapeng Lan, Xiaoming Yuan, Sahil Vashisht:
BS-IoT: Blockchain Based Software Defined Network Framework for Internet of Things. 496-501 - Syed Bilal Hussain Shah, Lei Wang, Prakasha Reddy
, Chettupally Anil Carie:
Non-Cooperative Game to Balance Energy and Security in Resource Constrained IoT Networks. 502-507 - Dawid Polap
, Gautam Srivastava, Alireza Jolfaei
, Reza M. Parizi:
Blockchain Technology and Neural Networks for the Internet of Medical Things. 508-513 - Ying Gao
, Yijian Chen, Hongliang Lin, Joel J. P. C. Rodrigues:
Blockchain based secure IoT data sharing framework for SDN-enabled smart communities. 514-519 - Qiao Tian, Pengwan Qin, Meiyu Wang, Yang Liu:
D-S based Fusion Method for Against Malicious Nodes in Wireless Sensor Networks. 520-525 - Zhexian Shen, Kui Xu:
Location-Aided Secure Transmission for Uplink Massive MIMO System Against Full-Duplex Jammer. 526-531 - Pengfei Zhu, Konglin Zhu, Lin Zhang:
Security Analysis of LTE-V2X and A Platooning Case Study. 532-537 - Hanxun Ren, Qinghe Du, Yijie Ou, Pinyi Ren:
Fountain-Coding-Aided Secure Delivery via Cross-locking Between Payload Data and Control Information. 538-543 - Inam Ullah Khan
, Nadeem Javaid
, C. James Taylor
, Kelum A. A. Gamage, Xiandong Ma
:
Big Data Analytics Based Short Term Load Forecasting Model for Residential Buildings in Smart Grids. 544-549 - Zhengping Luo
, Tao Hou, Tung Thanh Nguyen, Hui Zeng, Zhuo Lu:
Log Analytics in HPC: A Data-driven Reinforcement Learning Framework. 550-555 - Yongyong Wei, Rong Zheng:
Handling Device Heterogeneity in Wi-Fi based Indoor Positioning Systems. 556-561 - Zhenhui Situ, Ivan Wang Hei Ho, Yun Hou, Peiya Li:
The Feasibility of NOMA in C-V2X. 562-567 - Mikhail Krasnoselskii, Grigorii Melnikov, Yury Yanovich
:
No-Dealer: Byzantine Fault-Tolerant Random Number Generator. 568-573 - Yongge Wang
, Jingwen Sun, Xin Wang, Yunchuan Wei, Hao Wu, Zhou Yu, Gillian Chu:
Sperax: An Approach To Defeat Long Range Attacks In Blockchains. 574-579 - Yuxing Li, Hu Zheng, Chengqiang Huang, Ke Pei, Jinghui Li, Longbo Huang:
Terminator: An Efficient and Light-weight Fault Localization Framework. 580-585 - Yunpeng Cao, Haifeng Wang, Shuqing He:
Dynamic deployment model for large-scale compute-intensive clusters. 586-591 - Lemei Huang, Sheng Cheng, Yu Guan, Xinggong Zhang, Zongming Guo:
Consistent User-Traffic Allocation and Load Balancing in Mobile Edge Caching. 592-597 - Alaa Awad Abdellatif
, Carla-Fabiana Chiasserini, Francesco Malandrino:
Active Learning-based Classification in Automated Connected Vehicles. 598-603 - Minghui LiWang, Zhibin Gao, Seyyedali Hosseinalipour, Huaiyu Dai, Xianbin Wang
:
Energy-aware Allocation of Graph Jobs in Vehicular Cloud Computing-enabled Software-defined IoV. 604-609 - Marica Amadeo
, Giuseppe Ruggeri, Claudia Campolo, Antonella Molinaro, Giuseppe Mangiullo:
Caching Popular and Fresh IoT Contents at the Edge via Named Data Networking. 610-615 - Chenghan Jia, Kai Lin, Jing Deng:
A Multi-property Method to Evaluate Trust of Edge Computing Based on Data Driven Capsule Network. 616-621 - Li Ding, Biao Han, Xiaoyan Wang, Peng Li, Baosheng Wang:
Distributed Intelligence Empowered Data Aggregation and Distribution for Multi-robot Cooperative Communication. 622-627 - Adil Ali Raja, Muhammad Ali Jamshed, Haris Pervaiz
, Syed Ali Hassan
:
Performance Analysis of UAV-assisted Backhaul Solutions in THz enabled Hybrid Heterogeneous Network. 628-633 - Omid Esrafilian, Rajeev Gangula, David Gesbert:
Autonomous UAV-aided Mesh Wireless Networks. 634-640 - Yuan Liu, Ke Xiong, Bo Gao, Yu Zhang, Pingyi Fan
, Khaled Ben Letaief
:
Multi-UAV Assisted Communication Networks: Towards Max-Min Secrecy Rate. 641-646 - Tharindu D. Ponnimbaduge Perera
, Stefan Panic
, Dushantha Nalin K. Jayakody, P. Muthuchidambaranathan
:
UAV-assisted Data Collection in Wireless Powered Sensor Networks over Multiple Fading Channels. 647-652 - Hui Wen, Yue Wu, Chenming Yang, Hancong Duan, Shui Yu
:
A Unified Federated Learning Framework for Wireless Communications: towards Privacy, Efficiency, and Security. 653-658 - Sixian Sun, Xiao Fu, Bin Luo, Xiaojiang Du:
Detecting and Mitigating ARP Attacks in SDN-Based Cloud Environment. 659-664 - Haili Yu, Guangshun Li, Junhua Wu, Xinrong Ren, Jiabin Cao:
A Location-Based Path Privacy Protection Scheme in Internet of Vehicles. 665-670 - Fabio Busacca
, Laura Galluccio, Sergio Palazzo
:
Drone-assisted Edge Computing: a game-theoretical approach. 671-676 - Mahsa Keshavarz, Alireza Shamsoshoara, Fatemeh Afghah, Jonathan D. Ashdown:
A Real-time Framework for Trust Monitoring in a Network of Unmanned Aerial Vehicles. 677-682 - Sayed Amir Hoseini
, Jahan Hassan
, Ayub Bokani
, Salil S. Kanhere
:
Trajectory Optimization of Flying Energy Sources using Q-Learning to Recharge Hotspot UAVs. 683-688 - Xu Wang, Randall A. Berry
:
MAC Trade-offs Between Age and Reachability of Information in Vehicular Safety Applications. 689-695 - Melih Bastopcu
, Sennur Ulukus:
Who Should Google Scholar Update More Often? 696-701 - Zhengxiong Yuan, Bin Li
, Jia Liu:
Can We Improve Information Freshness with Predictions in Mobile Crowd-Learning? 702-709 - Chao Xu, Xijun Wang
, Howard H. Yang, Hongguang Sun, Tony Q. S. Quek
:
AoI and Energy Consumption Oriented Dynamic Status Updating in Caching Enabled IoT Networks. 710-715 - Mengjie Yi, Xijun Wang
, Juan Liu, Yan Zhang, Bo Bai:
Deep Reinforcement Learning for Fresh Data Collection in UAV-assisted IoT Networks. 716-721 - Hantao Feng, Xiaotong Fu, Hongyu Sun, He Wang, Yuqing Zhang:
Efficient Vulnerability Detection based on abstract syntax tree and Deep Learning. 722-727 - Pierre Danhier, Clément Massart, François-Xavier Standaert
:
Fidelity Leakages: Applying Membership Inference Attacks to Preference Data. 728-733 - Junchi Xing, Chunming Wu:
Detecting Anomalies in Encrypted Traffic via Deep Dictionary Learning. 734-739 - Sriram S, Vinayakumar R., V. Sowmya
, Mamoun Alazab
, K. P. Soman:
Multi-scale Learning based Malware Variant Detection using Spatial Pyramid Pooling Network. 740-745 - Poongodi M
, Mounir Hamdi, Vijayakumar Varadarajan, Bharat S. Rawal, Maode Ma:
Building an Authentic and Ethical Keyword Search by applying Decentralised (Blockchain) Verification. 746-753 - Lifeng Liu, Jian Li, Tim Tingqiu Yuan:
TEE-Based Mutual Proofs of Transmission Services in Decentralized Systems. 754-759 - Jianyi Zhang
, Pengju Li, Zhili Xu, Anqi Wang, Jin Liu, Zhiqiang Wang:
Gemini-Chain: A Regulatable Digital Currency Model based on Blockchain. 760-765 - Prabhu Janakaraj, Pinyarash Pinyoanuntapong, Pu Wang
, Minwoo Lee:
Towards In-Band Telemetry for Self Driving Wireless Networks. 766-773 - Filip Krasniqi, Jocelyne Elias, Jérémie Leguay, Alessandro E. C. Redondi
:
End-to-end Delay Prediction Based on Traffic Matrix Sampling. 774-779 - Mohamed Moulay
, Rafael A. García Leiva, Pablo J. Rojo Maroni, Javier Lazaro, Vincenzo Mancuso, Antonio Fernández Anta:
A Novel Methodology for the Automated Detection and Classification of Networking Anomalies. 780-786 - Nikita Trivedi, Bighnaraj Panigrahi, Hemant Kumar Rath:
WiNetSense: Sensing and Analysis Model for Large-scale Wireless Networks. 787-792 - Ziyi Shen, Shuyu He, Qing Yang:
QuickWalk: Quick Trust Assessment for Vehicular Social Networks. 793-798 - Bin Jiang, Jiachen Yang, Houbing Song
:
Protecting Privacy From Aerial photography: State of the Art, Opportunities, and Challenges. 799-804 - Di Tang, Jian Gu, Weijia Han, Xiao Ma:
Quantitative Analysis on Source-Location Privacy for Wireless Sensor Networks. 805-809 - Weiqiang Xie, Xiao Yu, Yuqing Zhang, He Wang:
An Improved Shapley Value Benefit Distribution Mechanism in Cooperative Game of Cyber Threat Intelligence Sharing. 810-815 - Mattia Milani, Marco Nesler, Michele Segata
, Luca Baldesi, Leonardo Maccari
, Renato Lo Cigno
:
Improving BGP Convergence with Fed4FIRE+ Experiments. 816-823 - Yuanjun Yao, Qiang Cao, Paul Ruth, Mert Cevik, Cong Wang, Jeffrey S. Chase:
Logical Peering for Interdomain Networking on Testbeds. 824-829 - Luke Bertot, Lucas Nussbaum, David Margery:
Implementing SFA Support on an Established HPC-flavored Testbed: Lessons Learned. 830-835 - Qian Qu, Ronghua Xu, Seyed Yahya Nikouei, Yu Chen:
An Experimental Study on Microservices based Edge Computing Platforms. 836-841 - Floriano De Rango, Mauro Tropea, Peppino Fazio:
Mitigating DoS attacks in IoT EDGE Layer to preserve QoS topics and nodes' energy. 842-847 - Gianluca Aloi
, Giancarlo Fortino, Raffaele Gravina, Pasquale Pace, Claudio Savaglio
:
E-ALPHA: Edge-based Assisted Living Platform for Home cAre. 848-853 - Batyr Charyyev, Mehmet Hadi Gunes:
IoT Event Classification Based on Network Traffic. 854-859 - Madhusudan Singh
:
Tri-Blockchain Based Intelligent Vehicular Networks. 860-864 - Gunasekaran Raja
, Yelisetty Manaswini, Gaayathri Devi Vivekanandan, Harish Sampath, Kapal Dev
, Ali Kashif Bashir:
AI-Powered Blockchain - A Decentralized Secure Multiparty Computation Protocol for IoV. 865-870 - Gaurang Bansal
, Vinay Chamola:
Lightweight Authentication Protocol for Inter Base Station Communication in Heterogeneous Networks. 871-876 - Ishan Budhiraja
, Neeraj Kumar
, Sudhanshu Tyagi, Quoc-Viet Pham
, Sudeep Tanwar
:
Energy Efficient Mode Selection Scheme for Wireless Powered D2D Communications with NOMA Underlaying UAV. 877-882 - Dingde Jiang, Zhihao Wang
, Zhihan Lv
, Wenpan Li:
Smart Antenna-based Multi-hop Highly-Energy-Efficient DSA Approach to Drone-assisted Backhaul Networks for 5G. 883-887 - Mohammad Wazid, Ashok Kumar Das, Sachin Shetty
, Joel J. P. C. Rodrigues:
On the Design of Secure Communication Framework for Blockchain-Based Internet of Intelligent Battlefield Things Environment. 888-893 - Huilian Zhang
, Xiaofan He, Huaiyu Dai:
Secure UAV Communication Networks via Friendly Jamming and Bandwidth Allocation. 894-899 - Jiaxin Liu, Wei Zhao
, Ye Hong, Sheng Gao, Xi Huang, Yingjie Zhou:
Learning Features of Brain Network for Anomaly Detection. 900-905 - Zhenyu Wang, Honglin Hu, Xianfu Chen
, Ting Zhou, Tianheng Xu:
A Novel SSVEP-Based Brain-Computer Interface Using Joint Frequency and Space Modulation. 906-911 - Doga Can Atabay, Elif Uysal
, Onur Kaya:
Improving Age of Information in Random Access Channels. 912-917 - Emmanouil Fountoulakis, Nikolaos Pappas, Marian Codreanu, Anthony Ephremides:
Optimal Sampling Cost in Wireless Networks with Age of Information Constraints. 918-923 - Sneihil Gopal, Sanjit K. Kaul
, Rakesh Chaturvedi, Sumit Roy:
A Non-Cooperative Multiple Access Game for Timely Updates. 924-929 - He Chen
, Yifan Gu
, Soung-Chang Liew:
Age-of-Information Dependent Random Access for Massive IoT Networks. 930-935 - Qining Zhang, Haoyue Tang
, Jintao Wang:
Minimizing the Age of Synchronization in Power-Constrained Wireless Networks with Unreliable Time-Varying Channels. 936-941 - Kumar Saurav
, Rahul Vaze:
Game of Ages. 942-947 - Rajshekhar Vishweshwar Bhat, Rahul Vaze, Mehul Motani:
Age of Information Minimization in Fading Multiple Access Channels. 948-953 - Ngombo Armando, José Marcelo Fernandes
, André Rodrigues
, Jorge Sá Silva
, Fernando Boavida:
Exploring Approaches to the Management of Physical, Virtual, and Social Sensors. 954-959 - Xiaole Li, Hongyun Zheng, Yuchun Guo:
Migrating to SDN for Mobile Core Networks: A Dynamic and Global Perspective. 960-965 - Chang Su, Jin Wang, Xianzhong Xie:
Point-of-Interest Recommendation based on Geographical Influence and Extended Pairwise Ranking. 966-971 - Paulo Silva
, Carolina Gonçalves
, Carolina Godinho, Nuno Antunes
, Marília Curado
:
Using NLP and Machine Learning to Detect Data Privacy Violations. 972-977 - Hongning Li, Jiexiong Chen, Le Wang, Qingqi Pei, Hao Yue
:
Privacy-preserving Data Aggregation for Big Data in Financial Institutions. 978-983 - Yan Sun, Lihua Yin, Zhe Sun
, Zhihong Tian, Xiaojiang Du:
An IoT data sharing privacy preserving scheme. 984-990 - Shuli Zheng, Lixuan Pan, Donghui Hu, Meng Li
, Yuqi Fan:
A Blockchain-Based Trading Platform for Big Data. 991-996 - Zhiqiang Wang, Pingchuan Ma, Xiaoxiang Zou, Jianyi Zhang
, Tao Yang:
Security of Medical Cyber-physical Systems: An Empirical Study on Imaging Devices. 997-1002 - Liuqing Yang, Xiao-Yang Liu, Wenbo Gong:
Secure Smart Home Systems: A Blockchain Perspective. 1003-1008 - David H. S. Lima, André L. L. de Aquino, Marília Curado:
An NFV MANO Architecture with a Resource Allocation Mechanism Based on Game Theory. 1009-1014 - Fang Fu, Yunpeng Kang, Zhicai Zhang, F. Richard Yu:
Transcoding for Live Streaming-based on Vehicular Fog Computing: An Actor-Critic DRL Approach. 1015-1020 - Mengni Ruan, Huan Zhou, Dawei Li
, Xuxun Liu, Qingyong Deng:
Detection of Temporal Communities in Mobile Social Networks. 1021-1026 - Wenjie Kang, Peidong Zhu, Xuchong Liu:
Integrated Defense Mechanism Based on Attack Goals against Three Attack Strategies in Smart Grid. 1027-1032 - Federico Chiariotti
, Alberto Signori
, Filippo Campagnaro
, Michele Zorzi:
Underwater Jamming Attacks as Incomplete Information Games. 1033-1038 - Sabarish Krishna Moorthy
, Zhangyu Guan:
LeTera: Stochastic Beam Control Through ESN Learning in Terahertz-Band Wireless UAV Networks. 1039-1044 - Hao Liang, Aijun Liu, Xinhai Tong, Chao Gong:
Raptor-like Rateless Spinal Codes using Outer Systematic Polar Codes for Reliable Deep Space Communications. 1045-1050 - Aparna Kumari, Arpit Shukla, Rajesh Gupta
, Sudeep Tanwar
, Sudhanshu Tyagi, Neeraj Kumar
:
ET-DeaL: A P2P Smart Contract-based Secure Energy Trading Scheme for Smart Grid Systems. 1051-1056 - Haotong Cao, Yue Hu, Qin Wang, Shengchen Wu, Longxiang Yang:
A Blockchain-Based Virtual Network Embedding Algorithm for Secure Software Defined Networking. 1057-1062 - Sudip Misra
, Kounteya Sarkar
, Nurzaman Ahmed
:
Blockchain-Based Controller Recovery in SDN. 1063-1068 - Furqan Jameel, Wali Ullah Khan
, Muhammad Ali Jamshed, Haris Pervaiz
, Qammer H. Abbasi, Riku Jäntti
:
Reinforcement Learning for Scalable and Reliable Power Allocation in SDN-based Backscatter Heterogeneous Network. 1069-1074 - Liping Zhang, Rong Chai, Tiantian Yang, Qianbin Chen:
Min-Max Worst-Case Design for Computation Offloading in Multi-user MEC System. 1075-1080 - Peiying Zhang, Fanglin Liu, Neeraj Kumar
, Gagangeet Singh Aujla:
Information Classification Strategy for Blockchain-based Secure SDN in IoT Scenario. 1081-1086 - Roberto Torre Arranz, Robert-Steve Schmoll, Florian Kemser, Hani Salah, Ievgenii Tsokalo, Frank H. P. Fitzek
:
Demo: Benchmarking Live Migration Performance of Two Trendy Virtualization Technologies. 1087-1088 - Gauravdeep Shami, Marc Lyonnais, Rodney Wilson:
Real Time Adaptive Networking using Programmable 100Gbps NIC on Data Transfer Nodes. 1089-1090 - Shahzeb Mustafa, Prasun Kanti Dey, Murat Yuksel:
GENIX: A GENI-based IXP Emulation. 1091-1092 - Gunasekaran Raja
, Priyanka Dhanasekaran
, Sudha Anbalagan
, Aishwarya Ganapathisubramaniyan, Ali Kashif Bashir:
SDN-enabled Traffic Alert System for IoV in Smart Cities. 1093-1098 - Chunsheng Lin, Juanjuan Huang, Sai Huang, Yuanyuan Yao, Xin Guo:
Features Fusion based Automatic Modulation Classification Using Convolutional Neural Network. 1099-1104 - Jibo Shi, Haojun Zhao, Meiyu Wang, Qiao Tian:
Signal Recognition Based On Federated Learning. 1105-1110 - Hua Wu, Qiuyan Wu, Guang Cheng, Shuyi Guo:
Instagram User Behavior Identification Based on Multidimensional Features. 1111-1116 - Yihan Liang, Yejun He, Jian Qiao:
Optimal Power Splitting for Simultaneous Wireless Information and Power Transfer in Millimeter-wave Networks. 1117-1122 - Su Wang, Shuo Wang, Ru Huo, Tao Huang
, Jiang Liu, Yunjie Liu:
DeepAalo: Auto-adjusting Demotion Thresholds for Information-agnostic Coflow Scheduling. 1123-1128 - Xiaoyang Zhao, Chuan Wu
, Franck Le:
Improving Inter-domain Routing through Multi-agent Reinforcement Learning. 1129-1134 - Pingping Tang, Yuning Dong, Shiwen Mao:
Online Traffic Classification Using Granules. 1135-1140 - Su Wang, Shuo Wang, Dong Zhou, Yiran Yang, Wenjie Zhang, Tao Huang
, Ru Huo, Yunjie Liu:
Large-Scale and Rapid Flow Size Estimation for Improving Flow Scheduling. 1141-1146 - Xiaofan He, Richeng Jin, Huaiyu Dai:
Glide and Zap Q-Learning. 1147-1152 - Gaetano Somma, Constantine Ayimba, Paolo Casari, Simon Pietro Romano
, Vincenzo Mancuso:
When Less is More: Core-Restricted Container Provisioning for Serverless Computing. 1153-1159 - German Sviridov, Cedric Beliard, Andrea Bianco, Paolo Giaccone, Dario Rossi:
Removing human players from the loop: AI-assisted assessment of Gaming QoE. 1160-1165 - Xiang Li, Yuchun Guo, Ye Sheng, Yishuai Chen:
Characterizing Social Marketing Behavior of E-commerce Celebrities and Predicting Their Value. 1166-1171 - Johannes Pflugmacher, Stephan Escher, Jan Reubold, Thorsten Strufe:
The German-Speaking Twitter Community Reference Data Set. 1172-1177 - Tung V. Doan, Zhongyi Fan, Giang T. Nguyen
, Hani Salah, Dongho You
, Frank H. P. Fitzek
:
Follow Me, If You Can: A Framework for Seamless Migration in Mobile Edge Cloud. 1178-1183 - Luning Liu, Luhan Wang, Xiangming Wen:
Joint Network Selection and Traffic Allocation in Multi-Access Edge Computing-Based Vehicular Crowdsensing. 1184-1189 - Juan Fang, Yong Chen, Shuaibing Lu:
A Scheduling Strategy for Reduced Power Consumption in Mobile Edge Computing. 1190-1195 - Lihan Zhang, Zhuo Li, Xin Chen:
Incentive Mechanism Design for Edge-Cloud Collaboration in Mobile Crowd Sensing. 1196-1201 - Liang Zhao
, Areeb Saldin, Jia Hu, Luwei Fu, Junling Shi, Yunchong Guan:
A Novel Simulated Annealing based Routing Algorithm in F-SDNs. 1202-1207 - Mithun Mukherjee, Vikas Kumar
, Ankit Lat, Mian Guo, Rakesh Matam, Yunrong Lv:
Distributed Deep Learning-based Task Offloading for UAV-enabled Mobile Edge Computing. 1208-1212 - Nikhil Kumar, Monalisa Ghosh, Chetna Singhal
:
UAV Network for Surveillance of Inaccessible Regions with Zero Blind Spots. 1213-1218 - Sunil Jacob, Varun G. Menon
, P. G. Shynu, Fathima Shemim KS, Bandana Mahapatra, Saira Joseph:
Bidirectional Multi-tier Cognitive Swarm Drone 5G Network. 1219-1224 - Pritom Gogoi, Joy Dutta, Rakesh Matam, Mithun Mukherjee:
An UAV assisted Multi-Sensor based Smart Parking System. 1225-1230 - Alok Ranjan, Himanshu Bhushan Sahu, Prasant Misra, Yanxiao Zhao, Hui Sun:
RSSI or LQI: Insights from Real-Time Deployments for Underground Sensing and Applications. 1231-1236 - Rui Chen, Xiyuan Huang, Wei Liu, Yan Zhou:
RFID-Based Vehicle Localization Scheme in GPS-Less Environments. 1237-1241 - Juan Xu, Yan Zhang, Yakun Zhao, Jiali Kan, Lin Lin:
A TDMA Protocol Based on Data Priority for In-Vivo Wireless NanoSensor Networks. 1242-1247 - Kun Yang, Cong Shen, Tie Liu:
Deep Reinforcement Learning based Wireless Network Optimization: A Comparative Study. 1248-1253 - Yiwen Wu, Sipei Zhou, Yunkai Wei, Supeng Leng:
Deep Reinforcement Learning for Controller Placement in Software Defined Network. 1254-1259 - Jing Jiang, Junyu Chen, Yongbin Xie, Hongjiang Lei
, Ling Zheng:
Modified-PBIL Based User Selection for Multi-user Massive MIMO Systems with Massive Connectivity. 1260-1265 - Kai Huang, Kailiang Li
, Lei Shu, Xing Yang
:
Demo Abstract: High Voltage Discharge Exhibits Severe Effect on ZigBee-based Device in Solar Insecticidal Lamps Internet of Things. 1266-1267 - Miao Huang, Haihan Duan, Yanru Chen, Yanbing Yang, Jie Hao, Liangyin Chen:
Demo Abstract: FingerLite: Finger Gesture Recognition Using Ambient Light. 1268-1269 - Wei Zhang, Siyu Fu
, Zixu Cao, Zhiyuan Jiang, Shunqing Zhang, Shugong Xu
:
An SDR-in-the-Loop Carla Simulator for C-V2X-Based Autonomous Driving. 1270-1271 - Piotr Gawlowicz, Anatolij Zubow, Suzan Bayhan:
Demo Abstract: Cross-Technology Communication between LTE-U/LAA and WiFi. 1272-1273 - Zequn Chen, Runji Lin, Haihan Duan, Yanru Chen, Yanbing Yang, Rengmao Wu, Liangyin Chen:
Increasing the Data Rate for Reflected Optical Camera Communication Using Uniform LED Light. 1274-1275 - Daniel F. Perez-Ramirez, Rebecca Steinert, Natalia Vesselinova, Dejan Kostic:
Demo Abstract: Elastic Deployment of Robust Distributed Control Planes with Performance Guarantees. 1276-1277 - Qixun Zhang, Huan Sun, Zhiqing Wei, Zhiyong Feng:
Sensing and Communication Integrated System for Autonomous Driving Vehicles. 1278-1279 - Pavlos Basaras
, Stepán Kucera, Kariem Fahmi, Holger Claussen
, George Iosifidis:
Demo: Seamless Mobile Video Streaming in Multicast Multi-RAT Communications. 1280-1281 - German Sviridov, Cedric Beliard, Gwendal Simon
, Andrea Bianco, Paolo Giaccone, Dario Rossi:
Demo abstract: Leveraging AI players for QoE estimation in cloud gaming. 1282-1283 - Peter Willis, Nirmala Shenoy, Hrishikesh B. Acharya:
Demo Abstract: Loop Avoidance in Computer Networks Using a Meshed Tree Protocol. 1284-1285 - Zhu Tang, Sudan Li, Peng Xun, Chengsong Wang, Wenping Deng, Baosheng Wang:
Demo Abstract: AutoPCT: An Agile Protocol Conformance Automatic Test Platform Based on Editable EFSM. 1286-1287 - Ningning Hou
, Yuanqing Zheng:
Demo Abstract: CLoRa-A Covert Channel over LoRa PHY. 1288-1289 - Zaheer Khan, Janne Lehtomäki, Adnan Shahid, Ingrid Moerman:
DEMO: Real-time Edge Analytics and Concept Drift Computation for Efficient Deep Learning From Spectrum Data. 1290-1291 - Cedric Beliard, Alessandro Finamore, Dario Rossi:
Opening the Deep Pandora Box: Explainable Traffic Classification. 1292-1293 - Ran Ben Basat, Gil Einziger, Bilal Tayh
:
Near Optimal Network-wide Per-Flow Measurement. 1294-1295 - Gonglong Chen, Wei Dong, Fujian Qiu, Gaoyang Guan, Yi Gao, Siyu Zeng:
Scalable and Interactive Simulation for IoT Applications with TinySim. 1296-1297 - Itamar Cohen
, Gil Einziger, Maayan Goldstein, Yaniv Sa'ar, Gabriel Scalosub, Erez Waisbard:
Poster Abstract: Parallel VM Placement with Provable Guarantees. 1298-1299 - Lei Ding, Yang Li
, Haiyang Wang, Ke Xu:
Measurement and Analysis of Cloud User Interest: A Glance From BitTorrent. 1300-1301 - Yi Zhao, Wei Bao, Dan Wang
, Ke Xu, Liang Lv:
Connection-based Pricing for IoT Devices: Motivation, Comparison, and Potential Problems. 1302-1303 - Jing Chen, Zili Meng
, Mingwei Xu:
Poster Abstract: Always Heading for the Peak: Learning to Route with Domain Knowledge. 1304-1305 - Weihan Chen, Zhiliang Wang, Han Zhang, Xia Yin, Xingang Shi, Lei Sun:
Poster Abstract: Joint Optimization of Service Function Chain Elastic Scaling and Routing. 1306-1307 - Su Wang
, Zhiliang Wang, Xia Yin, Xingang Shi:
Poster Abstract: An Unsupervised Two-Layer Multi-Step Network Attack Detector. 1308-1309 - Wonwoo Jang, Wonjun Lee:
Poster Abstract: Towards Ambient Backscatter as an Anti-jamming Solution for IoT Devices. 1310-1311 - Florian Klingler
, Fynn Hauptmeier, Christoph Sommer
, Falko Dressler:
Poster Abstract: An Open Source Approach to Field Testing of WLAN up to IEEE 802.11ad at 60 GHz Using Commodity Hardware. 1312-1313 - Lei Feng, Xiaoyu Que, Peng Yu, Wenjing Li, Xuesong Qiu:
IRS Assisted Multiple User Detection for Uplink URLLC Non-Orthogonal Multiple Access. 1314-1315 - Yeming Li, Wei Dong, Yuxiang Lin:
Poster Abstract: Environment-Independent Electronic Device Detection using Millimeter-Wave. 1316-1317 - Jorge Baranda, Josep Mangues-Bafalluy, Luca Vettori, Ricardo Martínez
, Giuseppe Avino, Carla-Fabiana Chiasserini, Corrado Puligheddu
, Claudio Casetti, Juan Brenes Baranzano, Giada Landi
, Koteswararao Kondepu
, Francesco Paolucci, Silvia Fichera, Luca Valcarenghi:
Arbitrating Network Services in 5G Networks for Automotive Vertical Industry. 1318-1319 - Jorge Baranda, Josep Mangues-Bafalluy, Luca Vettori, Ricardo Martínez
, Kiril Antevski, Luigi Girletti, Carlos J. Bernardos
, Konstantin Tomakh, Denys Kucherenko, Giada Landi
, Juan Brenes Baranzano, Xi Li, Xavier Costa-Pérez
, Fabio Ubaldi, G. Imbarlina, Molka Gharbaoui:
NFV Service Federation: enabling Multi-Provider eHealth Emergency Services. 1322-1323 - Achille Salaün, Anne Bouillard, Marc-Olivier Buob:
Demo Abstract: End-to-end Root Cause Analysis of a Mobile Network. 1324-1325 - Jie Li
, Cong Zhang, Zhi Liu, Wei Sun, Wei Hu, Qiyue Li:
Demo Abstract: Narwhal: a DASH-based Point Cloud Video Streaming System over Wireless Networks. 1326-1327 - Ke Lin, Siyao Cheng, Jianzhong Li:
Demo Abstract: iCrutch: A Smartphone-based Intelligent Crutch for Smart Home Applications. 1328-1329 - Shuping Peng, Jianwei Mao, Ruizhao Hu, Zhenbin Li:
Demo Abstract: APN6: Application-aware IPv6 Networking. 1330-1331 - Evgeny M. Khorov, Aleksey A. Kureev
, Ilya Levitsky, Ian F. Akyildiz:
Prototyping NOMA Constellation Rotation in Wi-Fi. 1332-1333 - Zhao Zhao, Yanzhao Hou, Xiaosheng Tang, Xiaofeng Tao:
Demo Abstract: Cross-layer Authentication Based on Physical Channel Information using OpenAirInterface. 1334-1335 - Esteban Municio, Steven Latré, Johann M. Márquez-Barja
:
Whispering to Industrial IoT for converging multi-domain Network Programmability. 1336-1337 - Nina Slamnik-Krijestorac, Johann M. Márquez-Barja
:
Demo Abstract: Assessing MANO Performance based on VIM Platforms within MEC Context. 1338-1339 - Md. Tahmid Rashid
, Daniel Zhang, Dong Wang:
Demo Abstract: Social Media-Driven UAV Sensing Frameworks in Disaster Response Applications. 1340-1341 - Shengen Wei, Jiankun Wang, Zenghua Zhao:
Poster Abstract: LocTag: Passive WiFi Tag for Robust Indoor Localization via Smartphones. 1342-1343 - Wei Xiong, Lin Zhang, Maxwell McNeil, Petko Bogdanov, Mariya Zheleva:
Fractals in the Air: Under-determined modulation recognition for MIMO communication. 1344-1345 - Yuetong Yang, Zhiquan Lai, Lei Cai, Dongsheng Li:
Poster Abstract: Model Average-based Distributed Training for Sparse Deep Neural Networks. 1346-1347 - Insup Lee
, Heejun Roh
, Wonjun Lee:
Poster Abstract: Encrypted Malware Traffic Detection Using Incremental Learning. 1348-1349 - Xiaoyu Zhang, Yongzhi Wang, Yu Zou:
Reconsidering Leakage Prevention in MapReduce. 1350-1351 - Yu Zou, Yongzhi Wang, Xiaoyu Zhang:
Enforcing Control Flow Confidentiality with SGX. 1352-1353 - Tian Pan
, Enge Song, Chenhao Jia, Wendi Cao, Tao Huang
, Bin Liu:
Lightweight Network-Wide Telemetry Without Explicitly Using Probe Packets. 1354-1355 - Kien Nguyen, Hiroo Sekiya:
Poster Abstract: Relaxing Network Selection for TCP Short Flows Using SYN Duplication. 1356-1357 - Yuchao Zhang, Ye Tian, Wendong Wang, Peizhuang Cong
, Chao Chen, Dan Li, Ke Xu:
Federated Routing Scheme for Large-scale Cross Domain Network. 1358-1359 - Bin Han
, Siyu Yuan
, Zhiyuan Jiang, Yao Zhu, Hans D. Schotten:
Robustness Analysis of Networked Control Systems with Aging Status. 1360-1361 - Md. Tahmid Rashid
, Daniel Zhang, Dong Wang:
Poster Abstract: A Computational Model-Driven Hybrid Social Media and Drone-Based Wildfire Monitoring Framework. 1362-1363 - Seoungbin Bae, Youngki Kim, Heejun Roh
, Wonjun Lee:
Poster Abstract: Suppressing CSI Leakage in Multi-user MIMO Networks via Precoding. 1364-1365

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.