default search action
32nd ICCCN 2023: Honolulu, HI, USA
- 32nd International Conference on Computer Communications and Networks, ICCCN 2023, Honolulu, HI, USA, July 24-27, 2023. IEEE 2023, ISBN 979-8-3503-3618-4
- Chengyi Qu, Rounak Singh, Sharan Srinivas, Prasad Calyam:
Environmentally-Aware Robotic Vehicle Networks Routing Computation for Last-mile Deliveries. 1-10 - Zolboo Erdenebaatar, Riyad Alshammari, Biswajit Nandy, Nabil Seddigh, Marwa Elsayed, Nur Zincir-Heywood:
Depicting Instant Messaging Encrypted Traffic Characteristics through an Empirical Study. 1-10 - Xinliang Wei, Lei Fan, Yuanxiong Guo, Yanmin Gong, Zhu Han, Yu Wang:
Quantum Assisted Scheduling Algorithm for Federated Learning in Distributed Networks. 1-10 - Xiaozhuang Liu, Zhenxing Niu, Wenye Wang:
Towards Multi-Person Gesture Recognition using Commodity Wi-Fi. 1-10 - Trevor Miller, Bobby Alvarez, Thang Hoang:
VTBC: Privatizing the Volume and Timing of Transactions for Blockchain Applications. 1-10 - Yukun Dong, Yidan Hu, Aisha Aseeri, Depeng Li, Rui Zhang:
Location Inference under Temporal Correlation. 1-10 - Efat Samir Fathalla, Sahar Zargarzadeh, Chunsheng Xin, Hongyi Wu, Peng Jiang, Joao F. Santos, Jacek Kibilda, Aloizio Pereira da Silva:
Beam Profiling and Beamforming Modeling for mmWave NextG Networks. 1-10 - Jinwei Liu, Rui Gong, Long Cheng, Richard A. Aló:
DeepHealth: Geospatial and ML-Based Approach to Identify Health Disparities and Determinants for Improving Pandemic Health Care. 1-10 - Keyang Yu, Dong Chen:
PAROS: The Missing "Puzzle" in Smart Home Router Operating Systems. 1-10 - Qinglin Liu, Zhiyong Lin, Zong-Heng Wei, Jianfeng Wen, Congming Yi, Hai Liu:
A Quinary Coding and Matrix Structure-Based Channel Hopping Algorithm for Blind Rendezvous in Cognitive Radio Networks. 1-10 - Esther Max-Onakpoya, Corey Baker:
Evaluating the Joint Use of Alternate Internet Delivery Models in Deterministic Rural Networks. 1-10 - Emon Dey, Mikolaj Walczak, Mohammad Saeid Anwar, Nirmalya Roy, Jade Freeman, Timothy Gregory, Niranjan Suri, Carl E. Busart:
A Novel ROS2 QoS Policy-Enabled Synchronizing Middleware for Co-Simulation of Heterogeneous Multi-Robot Systems. 1-10 - Roberto Rodrigues Filho, Renato S. Dias, João Seródio, Barry Porter, Fábio M. Costa, Edson Borin, Luiz F. Bittencourt:
A Self-Distributing System Framework for the Computing Continuum. 1-10 - Christopher Kitras, Carter Pollan, Kyle Myers, Camille Wirthlin Tischner, Philip Lundrigan:
Location Verification of Crowd-Sourced Sensors. 1-7 - Aris Leivadeas, Matthias Falkner:
Autonomous Network Assurance in Intent Based Networking: Vision and Challenges. 1-10 - Sultan Alasmari, Weichao Wang, Aidong Lu, Yu Wang:
Protection of Network Security Selector Secrecy in Outsourced Network Testing. 1-10 - Lei Xu, Yangyong Zhang, Phakpoom Chinprutthiwong, Guofei Gu:
Automatic Synthesis of Network Security Services: A First Step. 1-10 - Alan Hylton, Michael Moy, Robert Kassouf-Short, Jacob Cleveland:
Multigraph-Based Routing in Delay Tolerant Networks: An Alternative to Contact Graph Routing. 1-7 - Yuxin Chen, Jiayu Yang, Xuanbo Huang, Jiangping Han, Bobo Wang, Jian Li, Kaiping Xue:
PLR: An In-Network Proactive Loss Recovery Scheme for Named Data Networking. 1-10 - Nazia Sharmin, Jaime C. Acosta, Christopher Kiekintveld:
A Systematic Approach for Temporal Traffic Selection Across Various Applications. 1-7 - Krishna Kant:
Message from the General Chair. 1-2 - Lihua Ruan, Elaine Wong:
Addressing Concept Drift of Dynamic Traffic Environments through Rapid and Self-Adaptive Bandwidth Allocation. 1-7 - Nahid Ebrahimi Majd, Mike Sharko:
Secure and Cost Effective IoT Authentication and Data Storage Framework using Blockchain NFT. 1-7 - Michael Plattner, Gerald Ostermayer:
Camera-based Vehicle-to-Vehicle Visible Light Communication - A Software-Only Solution for Vehicle Manufacturers. 1-7 - So-Eun Jeon, Ye-Sol Oh, Ye-Seul Kil, Yeon-Ji Lee, Il-Gu Lee:
Two-Step Feature Selection Technique for Secure and Lightweight Internet of Things. 1-6 - Yigong Hu, Ila Gokarn, Shengzhong Liu, Archan Misra, Tarek F. Abdelzaher:
Underprovisioned GPUs: On Sufficient Capacity for Real-Time Mission-Critical Perception. 1-10 - Abtahi Reza, Anway Bose, Li Bai:
A Secure Federated Learning Approach to Smart Microgrid Stability Prediction. 1-7 - Shakir Mahmood, Muhammad Shahzad:
Per-Flow Packet Loss Measurement without Probing. 1-10 - Puming Fang, Tilman Wolf:
Value Trees: Multi-Hop and Asynchronous Economic Transactions in Distributed Systems. 1-10 - Angel C. Herrero, Julio A. Sanguesa, Francisco J. Martinez, Piedad Garrido, Carlos T. Calafate:
aDBF: an autonomous electromagnetic noise filtering mechanism for industrial environments. 1-7 - Yuchen Liu, Mingzhe Chen, Dongkuan Xu, Zhaohui Yang, Shangqing Zhao:
E-App: Adaptive mmWave Access Point Planning with Environmental Awareness in Wireless LANs. 1-10 - Pier Paolo Tricomi, Sousan Tarahomi, Christian Cattai, Francesco Martini, Mauro Conti:
Are We All in a Truman Show? Spotting Instagram Crowdturfing through Self-Training. 1-10 - Jie Lian, Xinyu Pan, Jin Guo:
An Improved Fire and Smoke Detection Method Based on YOLOv7. 1-7 - Francesco Tusa, David Griffin, Miguel Rio:
DNS++: Dynamic Name Resolution with Homomorphic Encryption Based Privacy. 1-7 - Long Dang, Thushari Hapuarachchi, Kaiqi Xiong, Jing Lin:
Improving Machine Learning Robustness via Adversarial Training. 1-10 - Heewon Kim, Hochan Lee, Sangheon Pack:
Traffic-Aware In-Network Aggregation Placement for Multi-Tenant Distributed Machine Learning. 1-9 - Keita Aoki, Miki Yamamoto:
A Gateway Proxy with ECN Buffer Control for Inter-Datacenter Congestion Control. 1-2 - Kewei Sha:
Message from the Workshop General Chair. 1-2 - Yunyi Wu, Yongbing Zhang:
Cost-Effective Joint Establishment of Fronthaul and Virtual Base Stations in a Stochastic C-RAN. 1-7 - Baosen Zhao, Wanghong Yang, Wenji Du, Yongmao Ren, Jianan Sun, Xu Zhou:
CPS: A Multipath Scheduling Algorithm for Low-Latency Applications in 5G Edge Networks. 1-10 - Jagnyashini Debadarshini, Sudipta Saha:
LiteCast: Flexible Scalable and Uniform Local Data-Sharing in Real-Time. 1-10 - Jacob Neil Taylor, Ngoc-Thuy Le, Joonsang Baek, Willy Susilo:
Hyron: A New Approach for Automating the Network ACL Delivery Pipeline. 1-10 - Jihyung Kim, Soyoung Yoo, Junghyun Kim:
Residual Attention Assisted Calibrated Beam Training for mmWave Communication Systems. 1-2 - Marek Michalski:
Hardware Controller and Simulator for $log_{2}N$ Switching Fabrics. 1-2 - Jiawei Xu, Ziqian Bi, Amit Singha, Tao Li, Yimin Chen, Yanchao Zhang:
mmLock: User Leaving Detection Against Data Theft via High-Quality mmWave Radar Imaging. 1-10 - Tianming Zhao, Zijie Tang, Tianfang Zhang, Huy Phan, Yan Wang, Cong Shi, Bo Yuan, Yingying Chen:
Stealthy Backdoor Attack on RF Signal Classification. 1-10 - Jihoon Lee, Kyungmin Go, Myungchul Kim:
Building Identification Using Smartphone Sensors and a Map. 1-7 - Deepti Kalasapura, Jinyang Li, Shengzhong Liu, Yizhuo Chen, Ruijie Wang, Tarek F. Abdelzaher, Matthew Caesar, Joydeep Bhattacharyya, Jae Kim, Guijun Wang, Greg Kimberly, Josh D. Eckhardt, Denis Osipychev:
TwinSync: A Digital Twin Synchronization Protocol for Bandwidth-Limited IoT Applications. 1 - Arun Sarma, Geethapriya Thamilarasu:
Inferring Sensitive User Information Through Biosignals Using Deep Learning. 1-2 - Johannes Kässinger, David Rosin, Frank Dürr, Benedikt Mehler, Thomas Hubatscheck, Kurt Rothermel:
Persival: Using Delayed Remote Updates in a Distributed Mobile Simulation. 1-10 - Ruozhou Yu, Huayue Gu, Xiaojian Wang, Fangtong Zhou, Guoliang Xue, Dejun Yang:
EA-Market: Empowering Real-Time Big Data Applications with Short-Term Edge SLA Leases. 1-10 - Yang Yang, Mustafa Cenk Gursoy:
Reliability-Oriented Designs in UAV-assisted NOMA Transmission with Finite Blocklength Codes and Content Caching. 1-8 - Zhouyu Li, Ruozhou Yu, Anupam Das, Shaohu Zhang, Huayue Gu, Xiaojian Wang, Fangtong Zhou, Aafaq Sabir, Dilawer Ahmed, Ahsan Zafar:
INSPIRE: Instance-Level Privacy-Pre Serving Transformation for Vehicular Camera Videos. 1-10 - Ian C. McDowell, Rahul Bulusu, Hem Regmi, Sanjib Sur:
Outdoor Millimeter-Wave Picocell Placement using Drone-based Surveying and Machine Learning. 1-10 - Fidan Mehmeti, Wolfgang Kellerer:
Delay Fairness in 5G Networks with SD-RAN. 1-10 - Huiqing Wan, Qiongxiao Wang, Yajun Teng, Cunqing Ma, Jingqiang Lin, Mingyu Wang:
ImCT: A Feasible Scheme for Deploying Implicit Certificates with Certificate Transparency in IoT. 1-10 - Rui Zhao:
FProbe: The Flow-Centric Detection and a Large-Scale Measurement of Browser Fingerprinting. 1-10 - Philipp Kisters, Heiko Bornholdt, Janick Edinger:
SkABNet: A Data Structure for Efficient Discovery of Streaming Data for IoT. 1-10 - Momoka Yamamoto, Jin Nakazato, Manabu Tsukada, Hiroshi Esaki:
Iterative Resolution with IPv6 Packets Failing. 1-2 - Ali Nikkhah, Scott Jordan:
How Can Equitable Peering be Achieved Between ISPs and Content Providers? 1-10 - Takahiro Yokoyama, Yoshiki Sato, Sho Tsugawa, Kohei Watabe:
An Accurate Graph Generative Model with Tunable Features. 1-2 - Doganalp Ergenc, Florian Schneider, Peter Kling, Mathias Fischer:
Moving Target Defense for Service-Oriented Mission-Critical Networks. 1-10 - Nahid Ebrahimi Majd, Torsha Mazumdar:
Ransomware Classification Using Machine Learning. 1-7 - Maria Camila Gaitan-Cardenas, Mahmoud Abdelsalam, Kaushik Roy:
Explainable AI-Based Intrusion Detection Systems for Cloud and IoT. 1-7 - Fan Liang, Xing Liu, Nuri Alperen Kose, Kubra Gundogan, Wei Yu:
Towards Trajectory Prediction-Based UAV Deployment in Smart Transportation Systems. 1-9 - Jiangnan Li, Yingyuan Yang, Jinyuan Stella Sun, Kevin Tomsovic, Hairong Qi:
Towards Adversarial-Resilient Deep Neural Networks for False Data Injection Attack Detection in Power Grids. 1-10 - Wentao Wang, Jiangping Han, Rui Zhuang, Kaiping Xue, Qibin Sun, Jun Lu:
Early Marking for Controllable Maximum Queue Length in Data Center Networks. 1-10 - Sahil Gupta, Devashish Gosain, Minseok Kwon, Hrishikesh B. Acharya:
Predictable Internet Clients and In-Switch Deep Packet Inspection. 1-10 - Zachary P. Neal, Kewei Sha:
Analysis of Evil Twin, Deauthentication, and Disassociation Attacks on Wi-Fi Cameras. 1-7 - Jianqing Liu, Shangjia Dong, Thomas Morris, Yuguang Fang:
Social Equality-Aware Resource Allocation for Post-Disaster Communication Restoration. 1-10 - Shiyi Liu, Haiying Shen, Brian L. Smith, Volker Fessmann:
Machine Learning Based Intelligent Routing for VDTNs. 1-10 - Mohammed Alkinoon, Abdulrahman Alabduljabbar, Hattan Althebeiti, Rhongho Jang, DaeHun Nyang, David Mohaisen:
Understanding the Security and Performance of the Web Presence of Hospitals: A Measurement Study. 1-10 - Brian Lewandowski, Randy C. Paffenroth:
One-class Classification Using Autoencoder Feature Residuals for Improved IoT Network Intrusion Detection. 1-7 - Yi Zheng, Srivatsan Ravi, Erik Kline, Lincoln Thurlow, Sven Koenig, T. K. Satish Kumar:
Improved Conflict-Based Search for the Virtual Network Embedding Problem. 1-10 - Jiahao Xue, Zhe Qu, Shangqing Zhao, Yao Liu, Zhuo Lu:
Data-Driven Next-Generation Wireless Networking: Embracing AI for Performance and Security. 1-10 - Tanmoy Sen, Haiying Shen:
A Data and Model Parallelism based Distributed Deep Learning System in a Network of Edge Devices. 1-10 - Tianyu Bai, Danyang Shao, Ying He, Song Fu, Qing Yang:
$\mathrm{P}^{3}$: A Privacy-Preserving Perception Framework for Building Vehicle-Edge Perception Networks Protecting Data Privacy. 1-10 - Maurantonio Caprolu, Alireza Sadighian, Roberto Di Pietro:
Characterizing the 2022- Russo-Ukrainian Conflict Through the Lenses of Aspect-Based Sentiment Analysis: Dataset, Methodology, and Key Findings. 1-10 - Huayue Gu, Ruozhou Yu, Zhouyu Li, Xiaojian Wang, Fangtong Zhou:
ESDI: Entanglement Scheduling and Distribution in the Quantum Internet. 1-10 - Anand Mudgerikar, Elisa Bertino:
Intelligent Security Aware Routing: Using Model-Free Reinforcement Learning. 1-10 - Mahmoud Badi, Dinesh Rajan, Joseph Camp:
Experimental Analysis of Phase Error in Centralized and Distributed SDR Systems. 1-7 - Mustafa Mahjeed, Geetha Thamilarasu, Nicole Johnson, Christian Alfonso:
A Deep Learning Approach for ECG Authentication on Implantable Medical Devices. 1-7 - Sijia Cao, Hanlin Zhang, Yuhang Wang, Jie Lin, Fanyu Kong, Leyun Yu:
SecureGAN: Secure Three-Party GAN Training. 1-7 - Thilina Pathirana, Gianfranco Nencioni:
Availability Model of a 5G-MEC System. 1-10 - Nahid Ebrahimi Majd, Mandar Shivaji Hanchate:
Spam SMS Classification Using Machine Learning. 1-7 - Alamin Mohammed, Theo Karagioules, Emir Halepovic, Shangyue Zhu, Aaron Striegel:
On the Harmful Effects of Active Network Probing. 1-8 - Metasebia D. Gemeda, Min S. Han, Ameha T. Abebe, Chung Gu Kang:
Deep Learning-based Transceiver with One-bit ADC Over Fading Channel. 1-6 - Mwasinga Lusungu Josh, Syed M. Raza, Duc-Tai Le, Moonseong Kim, Hyunseung Choo:
PLCD: Policy Learning for Capped Service Mobility Downtime. 1-7 - Kai Sakamoto, Yusaku Hayamizu, Miki Yamamoto:
Improving Fairness of NDN Congestion Control from Resource Pooling Perspective. 1-2 - Dianshi Yang, Abhinav Kumar, Stuart Ray, Wei Wang, Reza Tourani:
IoT Sentinel: Correlation-based Attack Detection, Localization, and Authentication in IoT Networks. 1-10 - Ramin Yarinezhad, Eylem Ekici:
An Efficient and Fair Wireless Resource Allocation Scheme for LTE and Wi-Fi over Unlicensed Bands. 1-10 - Ching-Chi Lin, Bruno Chianca, Leonard David Bereholschi, Jian-Jia Chen, Guthemberg Silvestre:
Cost-Effective Offloading Strategies for UAV Contingency Planning in Smart Cities. 1-7 - Suna Choi, Kyu-Min Kang:
Study on Remote Identification and Integrated Information Management Technology for Unmanned Aerial Vehicles. 1-2
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.