Stop the war!
Остановите войну!
for scientists:
default search action
INFOCOM 2022: New York, NY, USA - Workshops
- IEEE INFOCOM 2022 - IEEE Conference on Computer Communications Workshops, INFOCOM 2022 - Workshops, New York, NY, USA, May 2-5, 2022. IEEE 2022, ISBN 978-1-6654-0926-1
- Xiaolong Deng, Tiejun Lv, LinMing Song:
Novel Efficient Block Chain and Rule-based Intelligent Privacy Share System in Future Network. 1-8 - Gurjashan Singh Pannu, Seyhan Ucar, Takamasa Higuchi, Onur Altintas, Falko Dressler:
Vehicular Virtual Edge Computing using Heterogeneous V2V and V2C Communication. 1-2 - Guowen Wu, Yuhan Zhao, Yizhou Shen, Hong Zhang, Shigen Shen, Shui Yu:
DRL-based Resource Allocation Optimization for Computation Offloading in Mobile Edge Computing. 1-6 - Alena Chang, Guoliang Xue:
Order Matters: On the Impact of Swapping Order on an Entanglement Path in a Quantum Network. 1-6 - Nalam Venkata Abhishek, Muhammad Naveed Aman, Teng Joon Lim, Biplab Sikdar:
PIC: Preserving Data Integrity in UAV Assisted Communication. 1-6 - Zhenning Wang, Mingze Li, Liang Zhao, Huan Zhou, Ning Wang:
A3C-based Computation Offloading and Service Caching in Cloud-Edge Computing Networks. 1-2 - Diego A. Cuji, Zhengnan Li, Milica Stojanovic:
ACT: an Acoustic Communications Testbed. 1-6 - Leandros Maglaras, Nick Ayres, Sotiris Moschoyiannis, Leandros Tassiulas:
The end of Eavesdropping Attacks through the Use of Advanced End to End Encryption Mechanisms. 1-2 - Umesh Bodkhe, Sudeep Tanwar:
P2 COMM: A Secure and Low-Cost Message Dissemination Scheme for Connected Vehicles. 1-6 - Anmol Kumar, Gaurav Somani:
DDoS attack mitigation in cloud targets using scale-inside out assisted container separation. 1-6 - Ying Ju, Yuchao Chen, Zhiwei Cao, Haoyu Wang, Lei Liu, Qingqi Pei, Neeraj Kumar:
Learning Based and Physical-layer Assisted Secure Computation Offloading in Vehicular Spectrum Sharing Networks. 1-6 - Varun Kohli, Amit Chougule, Vinay Chamola, F. Richard Yu:
MbRE IDS: An AI and Edge Computing Empowered Framework for Securing Intelligent Transportation Systems. 1-6 - Mehbub Alam, Nurzaman Ahmed, Rakesh Matam, Ferdous Ahmed Barbhuiya:
L3Fog: Fog Node Selection and Task Offloading Framework for Mobile IoT. 1-6 - Prateek Mahajan, Anusha Kumar, G. Sai Sesha Chalapathi, Rajkumar Buyya:
EFTA: An Energy-efficient, Fault-Tolerant, and Area-optimized UAV Placement Scheme for Search Operations. 1-6 - Abdalaziz Sawwan, Jie Wu:
Unreliable Multi-hop Networks Routing Protocol For Age of Information-Sensitive Communication. 1-2 - Chao Yang, Lingxiao Wang, Xuyu Wang, Shiwen Mao:
Demo Abstract: Environment-adaptive 3D Human Pose Tracking with RFID. 1-2 - Xiaolin Zhu, Yong Zhang, Zhao Zhang, Da Guo, Qi Li, Zhao Li:
Interpretability Evaluation of Botnet Detection Model based on Graph Neural Network. 1-6 - Yanlang Zheng, Huan Zhou, Rui Chen, Kai Jiang, Yue Cao:
SAC-based Computation Offloading and Resource Allocation in Vehicular Edge Computing. 1-6 - Dongyang Yang, Yifan Han, Yang Du, He Huang, Yu-E Sun, Shiping Chen:
LSE: A Learning-based Per-flow Spread Estimation Framework for Network Data Streams. 1-6 - Chao Yang, Xuyu Wang, Shiwen Mao:
Demo Abstract: Technology-agnostic Approach to RF based Human Activity Recognition. 1-2 - Lingxiao Chen, Guoqiang Gong, Kai Jiang, Huan Zhou, Rui Chen:
DDPG-based Computation Offloading and Service Caching in Mobile Edge Computing. 1-6 - Meng Wang, Qinghe Du, Likang Zhang:
Minimum-SNR Maximization for Robust IRS-assisted Legitimate Monitoring System. 1-6 - Hervais Simo, Michael Kreutzer:
REGRETS: A New Corpus of Regrettable (Self-)Disclosures on Social Media. 1-2 - Sara Jafarbeiki, Amin Sakzad, Shabnam Kasra Kermanshahi, Ron Steinfeld, Raj Gaire:
PRESSGenDB: PRivacy-prEserving Substring Search on Encrypted Genomic DataBase. 1-6 - Sarantis Kalafatidis, Vassilis Demiroglou, Lefteris Mamatas, Vassilis Tsaoussidis:
Experimenting with an SDN-Based NDN Deployment over Wireless Mesh Networks. 1-6 - Jiabao Wang, Haoran Zha, Jiangzhi Fu:
Evaluation of deep learning model in the field of electromagnetic signal recognition. 1-6 - Ebuka Oguchi, Nirnimesh Ghose, Mehmet C. Vuran:
STUN: Secret-Free Trust-Establishment For Underground Wireless Networks. 1-6 - Wendi Feng, Ranzheng Cao, Zhi-Li Zhang:
STATOEUVER: State-aware Load Balancing for Network Function Virtualization. 1-2 - Joseph Bolarinwa, Alex Smith, Adnan Aijaz, Aleksandar Stanoev, Manuel Giuliani:
Demo: Untethered Haptic Teleoperation for Nuclear Decommissioning using a Low-Power Wireless Control Technology. 1-2 - Zahra Aref, Narayan B. Mandayam:
Impact of Subjectivity in Deep Reinforcement Learning based Defense of Cloud Storage. 1-6 - Igor Bisio, Chiara Garibotto, Fabio Lavagetto, Andrea Sciarrone:
A Novel IoT-based Edge Sensing Platform for Structure Health Monitoring. 1-6 - Vincent Charpentier, Nina Slamnik-Krijestorac, Johann Márquez-Barja:
Assessing the impact of CAM messages in vehicular communications in real highway environments. 1-2 - Ruichen Zhang, Ke Xiong, Xingcong Tian, Yang Lu, Pingyi Fan, Khaled Ben Letaief:
Inverse Reinforcement Learning Meets Power Allocation in Multi-user Cellular Networks. 1-2 - Ying Ju, Haoyu Wang, Yuchao Chen, Lei Liu, Tong-Xing Zheng, Qingqi Pei, Ming Xiao:
DRL-based Beam Allocation in Relay-aided Multi-user MmWave Vehicular Networks. 1-6 - Christos Liaskos, Konstantinos Alexandris, Siyu Tang, Anindya Das:
End-to-end TCP-compatible Backpressure Routing. 1-6 - Ruyu Luo, Wanli Ni, Hui Tian:
Visualizing Multi-Agent Reinforcement Learning for Robotic Communication in Industrial IoT Networks. 1-2 - Qixun Zhang, Xinye Gao:
Joint Communication and Sensing Enabled Cooperative Perception Testbed for Connected Automated Vehicles. 1-2 - Pablo Avila-Campos, Jetmir Haxhibeqiri, Ingrid Moerman, Jeroen Hoebeke:
Beacon-Based Wireless TSN Association. 1-2 - Yuguo Li, Shaoheng Tan, Zhiwen Wang, Dingding Li:
A NUMA-aware Key-Value Store for Hybrid Memory Architecture. 1-6 - Silin Feng, Jiajun Chen, Zhiwei Zhao:
Cost Effective Routing in Large-scale Multi-hop LoRa Networks. 1-6 - Theodoros Tsourdinis, Ilias Chatzistefanidis, Nikos Makris, Thanasis Korakis:
AI-driven Service-aware Real-time Slicing for beyond 5G Networks. 1-6 - Wei Liu, Li Chen, Weidong Wang:
General Decentralized Federated Learning for Communication-Computation Tradeoff. 1-6 - Yahya Hassanzadeh-Nazarabadi, Sanaz Taheri Boshrooyeh, Öznur Özkasap:
DHT-based Edge and Fog Computing Systems: Infrastructures and Applications. 1-6 - Xin Shen, Zhuo Li, Xin Chen:
Online Node Cooperation Strategy Design for Hierarchical Federated Learning. 1-6 - Bhargav Gokalgandhi, Ivan Seskar:
Channel Estimation for Massive MIMO systems using Tensor Cores in GPU. 1-6 - Rajesh Gupta, Sudeep Tanwar:
Interference Mitigation and Secrecy-ensured D2D Resource Allocation Scheme using Game Theory. 1-6 - Haina Zheng, Ke Xiong, Mengying Sun, Zhangdui Zhong, Khaled Ben Letaief:
Age-Energy Efficiency in WPCNs: A Deep Reinforcement Learning Approach. 1-2 - Vishal Venkatraman, Shantanu Pal, Zahra Jadidi, Alireza Jolfaei:
A Conceptual Trust Management Framework under Uncertainty for Smart Vehicular Networks. 1-7 - Eloi Cruz Harillo, Felix Freitag:
LoRaCoin: Towards a blockchain-based platform for managing LoRa devices. 1-2 - Jie Cao, Xu Zhu, Sumei Sun, Petar Popovski, Shaohan Feng, Yufei Jiang:
Age of Loop Oriented Wireless Networked Control System: Communication and Control Co-Design in the FBL Regime. 1-6 - Zhihao Wang, Dingde Jiang, Zhihan Lv, Houbing Song:
A Deep Reinforcement Learning based Intrusion Detection Strategy for Smart Vehicular Networks. 1-6 - Wanli Ni, Xufeng Liu, Hui Tian:
Battery-less Massive Access for Simultaneous Information Transmission and Federated Learning in WPT Networks. 1-2 - Venkata Praveen Kumar Madhavarapu, Shameek Bhattacharjee, Sajal K. Das:
A Generative Model for Evasion Attacks in Smart Grid. 1-6 - Mohamed A. Abd-Elmagid, Harpreet S. Dhillon:
Distribution of AoI in EH-powered Multi-source Systems under Non-preemptive and Preemptive Policies. 1-8 - Chunming Qiao, Yangming Zhao, Gongming Zhao, Hongli Xu:
Quantum Data Networking for Distributed Quantum Computing: Opportunities and Challenges. 1-6 - Yuan Gao, Yang Guo, Ping Wang, Siming Yang, Jing Wang, Xiaonan Wang, Yu Ding, Weidang Lu, Yu Zhang, Guoxing Huang, Jiang Cao:
Secure Enhancement in NOMA-based UAV-MEC Networks. 1-6 - Jalil Taghia, Farnaz Moradi, Hannes Larsson, Xiaoyu Lan, Masoumeh Ebrahimi, Andreas Johnsson:
Demonstration of Policy-Induced Unsupervised Feature Selection in a 5G network. 1-2 - Gilson Miranda, Esteban Municio, Jetmir Haxhibeqiri, Daniel F. Macedo, Jeroen Hoebeke, Ingrid Moerman, Johann M. Márquez-Barja:
Evaluating Time-Sensitive Networking Features on Open Testbeds. 1-2 - Cihang Cheng, Ming Liu, Ke Xiong:
A Dual-RFID-Tag Based Indoor Localization Method with Multiple Apertures. 1-2 - Qiuming Zhu, Yi Zhao, Yang Huang, Zhipeng Lin, Lu Han, Jie Wang, Yunpeng Bai, Tianxu Lan, Fuhui Zhou, Qihui Wu:
DEMO Abstract: An UAV-based 3D Spectrum Real-time Mapping System. 1-2 - Haotong Cao, Yue Hu, Shengchen Wu, Yongan Guo:
Dynamic and Secure Resource Allocation Framework of Slices for 5G-Enabled Cyber Physical Systems. 1-6 - Jagnyashini Debadarshini, Sudipta Saha:
Efficient Coordination among Electrical Vehicles: An IoT-Assisted Approach. 1-2 - Yu Huang, Pengfei Liu, Jie Yang:
Radio Frequency Fingerprint Identification Method Based on Ensemble Learning. 1-6 - Haonan Zhang, Chuanchuan Yang, Bin Dai:
When Wireless Federated Learning Meets Physical Layer Security: The Fundamental Limits. 1-6 - Peng Qian, Ning Wang, Rahim Tafazolli:
User Intent Driven Path Switching in Video Delivery - An Edge Computing Based Approach. 1-6 - Le Xia, Yao Sun, Xiaoqian Li, Gang Feng, Muhammad Ali Imran:
Wireless Resource Management in Intelligent Semantic Communication Networks. 1-6 - Magreth Mushi, Harshvardhan P. Joshi, Rudra Dutta, Ismail Güvenç, Mihail L. Sichitiu, Brian A. Floyd, Thomas Zajkowski:
The AERPAW Experiment Workflow - Considerations for Designing Usage Models for a Computing-supported Physical Research Platform. 1-8 - Beibei Li, Yaxin Shi, Yuqing Guo, Qinglei Kong, Yukun Jiang:
Incentive and Knowledge Distillation Based Federated Learning for Cross-Silo Applications. 1-6 - Haoyu Zhu, Ninghao Zhou, Jia Hou:
Security Performance Analysis of NOMA System Based on Multi-Slot Combined Reception. 1-6 - Ying Chen, Hazer Inaltekin, Maria Gorlatova:
Demo Abstract: Pixel Similarity-Based Content Reuse in Edge-Assisted Virtual Reality. 1-2 - Argha Sen, Sashank Bonda, Jay Jayatheerthan, Sandip Chakraborty:
An ns3-based Energy Module for 5G mmWave Base Stations. 1-2 - Roman Zlobin, Aleksey Kureev, Evgeny M. Khorov:
Receiver Design and Frame Format for Uplink NOMA in Wi-Fi. 1-2 - Tao Wang, Xiangquan Shi, Jing Tao, Xiaoyan Wang, Biao Han:
Efficient Synchronous MAC Protocols for Terahertz Networking in Wireless Data Center. 1-6 - Alfredo Nascita, Francesco Cerasuolo, Davide Di Monda, Jonas Thern Aberia Garcia, Antonio Montieri, Antonio Pescapè:
Machine and Deep Learning Approaches for IoT Attack Classification. 1-6 - Riya Kakkar, Smita Agrawal, Rajesh Gupta, Sudeep Tanwar:
Blockchain and Zero-Sum Game-based Dynamic Pricing Scheme for Electric Vehicle Charging. 1-6 - Jian Fang, Zhiyi Zhou, Sunhaoran Jin, Lei Wang, Bingxian Lu, Zhenquan Qin:
Exploring LoRa for Drone Detection. 1-2 - Sarvesh Sanjay Wanode, Milind Anand, Barsha Mitra:
Optimal Feature Set Selection for IoT Device Fingerprinting on Edge Infrastructure using Machine Intelligence. 1-6 - Wei Guan, Bo Gao, Ke Xiong, Yang Lu:
Spectrum Sharing in UAV-Assisted HetNet Based on CMB-AM Multi-Agent Deep Reinforcement Learning. 1-2 - Mianxue Gu, Hantao Feng, Hongyu Sun, Peng Liu, Qiuling Yue, Jinglu Hu, Chunjie Cao, Yuqing Zhang:
Hierarchical Attention Network for Interpretable and Fine-Grained Vulnerability Detection. 1-6 - Sergei Chuprov, Leon Reznik, Antoun Obeid, Srujan Shetty:
How Degrading Network Conditions Influence Machine Learning End Systems Performance? 1-6 - Xiaojiang Zuo, Xiao Wang, Rui Han:
An Empirical Analysis of CAPTCHA Image Design Choices in Cloud Services. 1-6 - Tung-Wei Kuo:
Competitive Analyses of Online Minimum Age of Information Transmission Scheduling. 1-8 - Dengfeng Yao, Minghui Dai, Tianshun Wang, Yuan Wu, Zhou Su:
Intelligent Sensing and Communication assisted Pedestrians Recognition in Vehicular Networks: An Effective Throughput Maximization Approach. 1-6 - Baidi Xiao, Yan Shao, Rongpeng Li, Zhifeng Zhao, Honggang Zhang:
Demo: Deep Reinforcement Learning for Resource Management in Cellular Network Slicing. 1-2 - Naivedya Lath, Kaustubh Thapliyal, Kartik Kandpal, Mohammad Wazid, Ashok Kumar Das, Devesh Pratap Singh:
BDESF-ITS: Blockchain-Based Secure Data Exchange and Storage Framework for Intelligent Transportation System. 1-6 - Praveen Rao, Arun Zachariah:
Enabling Large-Scale Human Genome Sequence Analysis on CloudLab. 1-2 - Xu Zheng, Qihao Dong, Anmin Fu:
WMDefense: Using Watermark to Defense Byzantine Attacks in Federated Learning. 1-6 - Xiu Susie Fang, Quan Z. Sheng, Jian Yang, Guohao Sun, Xianzhi Wang, Yihong Zhang:
Resolving Conflicts among Unbalanced Multi-Source Data When Multi-Value Objects Exist. 1-2 - Terry N. Guo:
Connectivity-Aware Fast Network Forming Aided By Digital Twin For Emergency Use. 1-6 - Paolo Medagliani, Sébastien Martin, Jérémie Leguay, Shengming Cai, Feng Zeng, Nicolas Huin:
Resource Defragmentation for Network Slicing. 1-2 - Bharat S. Rawal, Sudhanshu Patel, Mithileysh Sathiyanarayanan:
Identifying DDoS Attack using Split-Machine Learning System in 5G and Beyond Networks. 1-6 - Hassaan Hydher, Dushantha Nalin K. Jayakody, Kasun T. Hemachandra, Tharaka Samarasinghe:
UAV Deployment for Data Collection in Energy Constrained WSN System. 1-6 - Abhishek Majumder, Joy Lal Sarkar, Bibudhendu Pati, Chhabi Rani Panigrahi, V. Ramasamy, Sudipta Roy, Vikas Kumar:
MERIT: Multi-Itinerary Tourist Recommendation Engine for Industrial Internet of Things. 1-6 - Yash Deshpande, Onur Ayan, Wolfgang Kellerer:
Improving AoI via Learning-based Distributed MAC in Wireless Networks. 1-8 - Nasimul Hasan, Zhenxiang Chen, Chuan Zhao, Yuhui Zhu, Cong Liu:
IoT Botnet Detection framework from Network Behavior based on Extreme Learning Machine. 1-6 - Songlin Chen, Sijing Wang, Xingchen Xu, Long Jiao, Hong Wen:
Physical Layer Security Authentication Based Wireless Industrial Communication System for Spoofing Detection. 1-2 - Runze Tang, Gaolei Duan, Lei Xie, Yanling Bu, Ming Zhao, Zhenjie Lin, Qiang Lin:
Static Obstacle Detection based on Acoustic Signals. 1-2 - Jian Fang, Lei Wang, Zhenquan Qin, Bingxian Lu:
LoRa-based Outdoor 3D Localization. 1-2 - Balázs Vass, Csaba Sarkadi, Gábor Rétvári:
Programmable Packet Scheduling With SP-PIFO: Theory, Algorithms and Evaluation. 1-6 - Haoran Zhao, Bo He, He Zhou, Jiangyin Zhou, Qi Qi, Jingyu Wang, Haifeng Sun, Jianxin Liao:
QUIC-Enabled Data Aggregation for Short Packet Communication in mMTC. 1-2 - Rahul Mishra, Hari Prabhat Gupta, Tanima Dutta:
Noise-Resilient Federated Learning: Suppressing Noisy Labels in the Local Datasets of Participants. 1-2 - Chengxiao Yu, Wei Quan, Kang Liu, Mingyuan Liu, Ziheng Xu, Hongke Zhang:
DRL-Based Fountain Codes for Concurrent Multipath Transfer in 6G Networks. 1-6 - Ilias Siniosoglou, Vasileios Argyriou, Thomas Lagkas, Ioannis D. Moscholios, George F. Fragulis, Panagiotis G. Sarigiannidis:
Unsupervised Bias Evaluation of DNNs in non-IID Federated Learning Through Latent micro-Manifolds. 1-6 - Hussam Abdellatif, Viduneth Ariyarathna, Sergey Petrushkevich, Arjuna Madanayake, Josep Miquel Jornet:
A Real-Time Ultra-broadband Software-Defined Radio Platform for Terahertz Communications. 1-2 - Himanshu Sharma, Ishan Budhiraja, Neeraj Kumar, Rajkumar Tekchandani:
Secrecy Rate Maximization for THz-Enabled Femto Edge Users using Deep Reinforcement Learning in 6G. 1-6 - Shuze Shen, Zheyi Ma, Mingqing Liu, Qingwen Liu, Yunfeng Bai, Mingliang Xiong:
A Cloud-Terminal Collaborative System for Crowd Counting and Localization Using Multi-UAVs. 1-6 - Ahan Kak, Van-Quan Pham, Huu-Trung Thieu, Nakjung Choi:
Demo: A Disaggregated O-RAN Platform for Network Slice Deployment and Assurance. 1-2 - Yaoyao Wang, Xiaoguang Chen:
Joint modulation of 3-PPM and quantum squeezed states in communication systems. 1-5 - Henry Clausen, Aditya Manocha, Michael Scott Gibson:
Detecting Proxies Relaying Streaming Internet Traffic. 1-6 - Chen Wang, Daosen Zhai, Ruonan Zhang, Huan Li, Haotong Cao, Anish Jindal:
Joint UAVs Position Optimization and Offloading Decision for Blockchain-enabled Intelligent Transportation. 1-6 - Anuja R. Nair, Nilesh Kumar Jadav, Rajesh Gupta, Sudeep Tanwar:
AI-empowered Secure Data Communication in V2X Environment with 6G Network. 1-6 - Mingqian Liu, Zhenju Zhang, Nan Zhao, Yunfei Chen:
Adversarial Attacks on Deep Neural Networks Based Modulation Recognition. 1-6 - Husnain Rafiq, Nauman Aslam, Biju Issac, Rizwan Hamid Randhawa:
An Investigation on Fragility of Machine Learning Classifiers in Android Malware Detection. 1-6 - Xiaoming Yuan, Jiahui Chen, Ning Zhang, Chunsheng Zhu, Qiang Ye, Xuemin Sherman Shen:
FedTSE: Low-Cost Federated Learning for Privacy-Preserved Traffic State Estimation in IoV. 1-6 - Ali Akbar Mohammadi, Rasheed Hussain, Alma Oracevic, Syed Muhammad Ahsan Raza Kazmi, Fatima Hussain, Moayad Aloqaily, Junggab Son:
A Novel TCP/IP Header Hijacking Attack on SDN. 1-2 - Ziwei Liu, Lei Xie, Jingyi Ning, Ming Zhao, Liming Wang, Hao Peng:
Remote Meter Reading based on Lightweight Edge Devices. 1-2 - Yulong He, Xiaofan He:
Location Privacy-Aware Coded Offloading for Distributed Edge Computing. 1-6