default search action
ISCC 2022: Rhodes, Greece
- IEEE Symposium on Computers and Communications, ISCC 2022, Rhodes, Greece, June 30 - July 3, 2022. IEEE 2022, ISBN 978-1-6654-9792-3
- Seyedali Tabaeiaghdaei, Adrian Perrig:
Data-Plane Energy Efficiency of a Next-Generation Internet Architecture. 1-8 - Wisam Abbasi, Paolo Mori, Andrea Saracino, Valerio Frascolla:
Privacy vs Accuracy Trade-Off in Privacy Aware Face Recognition in Smart Systems. 1-8 - Masih Abedini, Irfan S. Al-Anbagi:
Active Eavesdroppers Detection System in Multi-hop Wireless Sensor Networks. 1-6 - Leah Kazenmayer, Gabriela Ford, Jiechao Zhang, Rezaur Rahman, Furkan Cimen, Damla Turgut, Samiul Hasan:
Traffic Volume Prediction with Automated Signal Performance Measures (ATSPM) Data. 1-6 - Jiawei Liang, Juan Li, Kun Zhu, Changyan Yi:
Learning Auction in Coded Distributed Computing with Heterogeneous User Demands. 1-6 - Yuejun Li, Huajun Cui, Jiyan Sun, Yan Zhang, Yueqi Li, Guozhu Meng, Weiping Wang:
Automated Privacy Network Traffic Detection via Self-labeling and Learning. 1-8 - Andreia Pinto, João Viana, Diogo Martinho, Vítor Crista, José Miguel Diniz, Joana Reis, João Matos, David Greer, Goreti Marreiros, Alberto Freitas:
Improving the lifestyle behavior of type 2 diabetes mellitus patients using a mobile application. 1-5 - Kei Oshio, Satoshi Takada, Chansu Han, Akira Tanaka, Jun'ichi Takeuchi:
Poster: Flexible Function Estimation of IoT Malware Using Graph Embedding Technique. 1-3 - Yuanhao Liu, Fen Zhou, Michal Pióro, Tao Shang, Juan-Manuel Torres-Moreno, Abderrahim Benslimane:
On Flow-based Directed p-Cycle Design in Elastic Optical Networks. 1-7 - Tianhao Miao, Qinghua Wu, Ting Liu, Penglai Cui, Rui Ren, Zhenyu Li, Gaogang Xie:
MD-Roofline: A Training Performance Analysis Model for Distributed Deep Learning. 1-8 - Guanghui Ma, Rajendran Parthiban, Nemai Karmakar:
Novel Handover Algorithms Using Pattern Recognition for Hybrid LiFi Networks. 1-7 - Chafiq Titouna, Farid Naït-Abdesselam:
A False Data Injection Attack Detection Approach Using Convolutional Neural Networks in Unmanned Aerial Systems. 1-6 - Andrea Sabbioni, Carlo Mazzocca, Michele Colajanni, Rebecca Montanari, Antonio Corradi:
A Fully Decentralized Architecture for Access Control Verification in Serverless Environments. 1-6 - Valeria Lukaj, Francesco Martella, Antonino Quattrocchi, Maria Fazio, Roberto Montanini, Massimo Villari, Antonio Celesti:
Towards IoT Rejuvenation: a Study on HY-SRF05 Ultrasonic Sensor Ageing for Intelligent Street Pole Lamp Control in a Smart City. 1-8 - Esmaeil Amiri, Ning Wang, Serdar Vural, Rahim Tafazolli:
Dynamic Anchor Point Selection in Software Defined Distributed Mobility Management. 1-7 - Michaël Mahamat, Ghada Jaber, Abdelmadjid Bouabdallah:
A Deep Reinforcement Learning-Based Context-Aware Wireless Mobile Charging Scheme for the Internet of Things. 1-6 - Shareeful Islam, Spyridon Papastergiou, Stefano Silvestri:
Cyber Threat Analysis Using Natural Language Processing for a Secure Healthcare System. 1-7 - Wei Gao, Meihong Yang, Wei Zhang, Libin Liu:
Efficient OFDM Channel Estimation with RRDBNet. 1-5 - Eduardo Nuno Almeida, Rui Campos, Manuel Ricardo:
Traffic-Aware UAV Placement using a Generalizable Deep Reinforcement Learning Methodology. 1-6 - Chen Chen, Lars Nagel, Lin Cui, Fung Po Tso:
B-Scale: Bottleneck-aware VNF Scaling and Flow Routing in Edge Clouds. 1-6 - Armando Ruggeri, Antonino Galletta, Lorenzo Carnevale, Massimo Villari:
An Energy Efficiency Analysis of the Blockchain-Based extended Triple Diffie-Hellman Protocol for IoT. 1-6 - Farhad Arpanaei, Shayan Hajipour, Hamzeh Beyranvand, José Alberto Hernández, David Larrabeiti:
A Comparative Study on Shared Precomputed Restoration and Shared Backup Path Protection in EONs. 1-6 - Claudia Ferraris, Giuseppe Pettiti, Gianluca Amprimo, Debora Desideri, Roberto Pratola, Katiuscia Sacco, Irene Ronga, Guido Coppo, Danilo Soprani, Jacopo Barbagallo, Santina Antinoro, Paolo Ariano, Luigi Privitera:
Telerehabilitation of cognitive, motor and sleep disorders in neurological pathologies: the REHOME project. 1-6 - Zhao Li, Shijun Zhang, Jiangyi Yin, Meijie Du, Zhongyi Zhang, Qingyun Liu:
Fighting Against Piracy: An Approach to Detect Pirated Video Websites Enhanced by Third-party Services. 1-7 - Weiwei Hu, Bo Gu, Jinming Li, Zhen Qin:
BC-MCSDT: A Blockchain-based Trusted Mobile Crowdsensing Data Trading Framework. 1-7 - Islam Ahmed Moursy, Sahar Mohamed Ghanem, Mohamed Nazih ElDerini:
A Blockchain-Based Architecture for Access Control Management of IoT Applications. 1-6 - Rúben Queirós, Eduardo Nuno Almeida, Helder Fontes, José Ruela, Rui Campos:
Wi-Fi Rate Adaptation using a Simple Deep Reinforcement Learning Approach. 1-3 - Edward L. Amoruso, Stephen P. Johnson, Raghu Nandan Avula, Cliff C. Zou:
A Web Infrastructure for Certifying Multimedia News Content for Fake News Defense. 1-7 - Peter Sossalla, Justus Rischke, Fabian Baier, Sebastian Itting, Giang T. Nguyen, Frank H. P. Fitzek:
Private 5G Solutions for Mobile Industrial Robots: A Feasibility Study. 1-6 - Mohamed Irfanulla Mohamed Abdulla, Audrey Queudet, Maryline Chetto, Lamia Belouaer:
Real-time Resource Management in Smart Energy-Harvesting Systems. 1-7 - Tianyu Meng, Dali Zhu, Xiaodong Xie, Hualin Zeng:
Non-Contact Heart Rate Signal Extraction and Identification Based on Speckle Image. 1-6 - Huajun Cui, Guozhu Meng, Yueqi Li, Yuejun Li, Yan Zhang, Jiyan Sun, Dali Zhu, Weiping Wang:
LibHunter: An Unsupervised Approach for Third-party Library Detection without Prior Knowledge. 1-7 - Siyu Yuan, Bin Han, Dennis Krummacker, Hans D. Schotten:
Massive Twinning to Enhance Emergent Intelligence. 1-4 - Francesco Martella, Maria Fazio, Antonio Celesti, Valeria Lukaj, Antonino Quattrocchi, Massimo Di Gangi, Massimo Villari:
Federated Edge for Tracking Mobile Targets on Video Surveillance Streams in Smart Cities. 1-6 - Luigi De Dominicis, Spyridion Kolovos, Kakia Panagidi, Ralph Hedel, Ilias Mitsoulas, Karim Boudergui, Argiro Boziari, Stathes Hadjiefthymiades:
The INCLUDING platform for Radiological and Nuclear exercises and training: the Joint Action at the Piraeus port. 1-6 - Isaac Briggs, Vincent Ivy, David Berdik, Fadi Wedyan, Yaser Jararweh:
Modeling and Simulation of 5G-based Edge Networks for Lightweight Machine Learning Applications. 1-6 - Evangelos A. Stathopoulos, Alexander V. Shvets, Roberto Carlini, Sotiris Diplaris, Stefanos Vrochidis, Leo Wanner, Ioannis Kompatsiaris:
Social Media and Web Sensing on Interior and Urban Design. 1-6 - Zhiwei Wei, Bing Li, Rongqing Zhang, Xiang Cheng, Liuqing Yang:
OCVC: An Overlapping-Enabled Cooperative Computing Protocol in Vehicular Fog Computing. 1-6 - Christos Liaskos, Georgios G. Pyrialakos, Alexandros Pitilakis, Ageliki Tsioliaridou, Michail Christodoulou, Nikolaos V. Kantartzis, Sotiris Ioannidis, Andreas Pitsillides, Ian F. Akyildiz:
Integrating Software-Defined Metasurfaces into Wireless Communication Systems: Design and Prototype Evaluation. 1-6 - Argyro Mavrogiorgou, Spyridon Kleftakis, Nikolaos Zafeiropoulos, Konstantinos Mavrogiorgos, Athanasios Kiourtis, Dimosthenis Kyriazis:
A Comparative Study of ML Algorithms for Scenario-agnostic Predictions in Healthcare. 1-7 - Elham Arshad, Giuliano Turri, Bruno Crispo:
Mollywood: Subtitles as an attack vector. 1-7 - Lijun Dong, Richard Li:
Precise Latency Guarantee with Mobility and Handover in 5G and Beyond. 1-7 - Marios Adam Sirgiannis, Charalampos Manifavas, Ioannis Papaefstathiou:
Making Citizens' systems more Secure: Practical Encryption Bypassing and Countermeasures. 1-7 - Juan Vargas, Cédric Thienot, Xavier Lagrange:
MBSFN and SC-PTM as Solutions to Reduce Energy Consumption in Cellular Networks. 1-6 - Yichuan Li, Mohammed El-Hajjar:
Intelligent Analog Radio Over Fiber aided C-RAN for Mitigating Nonlinearity and Improving Robustness. 1-6 - Wei Huang, Andrea Araldo, Hind Castel-Taleb, Badii Jouaber:
Dimensioning resources of Network Slices for energy-performance trade-off. 1-6 - Diogo Machado, Vítor Santos Costa, Pedro Brandão:
Impact of the glycaemic sampling method in diabetes data mining. 1-6 - Hind Boukhairat, Mohammed-Amine Koulali:
Deep-Learning for Cooperative Spectrum Sensing Optimization in Cognitive Internet of Things. 1-7 - Jiaqi Kang, Huiran Yang, Yan Zhang, Yueyue Dai, Mengqi Zhan, Weiping Wang:
ActDetector: A Sequence-based Framework for Network Attack Activity Detection. 1-7 - Robert Zakrzewski, Trevor Martin, George Oikonomou:
Anomaly Detection in Logical Sub-Views of WSNs. 1-7 - Isadora P. Possebon, Bruno Castro da Silva, Alberto E. Schaeffer-Filho:
Look-Ahead Reinforcement Learning for Load Balancing Network Traffic. 1-6 - Lorenzo De Lauretis, Fabio Persia, Stefania Costantini:
A Smart Ecosystem to improve Patient Monitoring using Wearables, Intelligent Agents, Complex Event Processing and Image Processing. 1-7 - Gizem Sümen, Burak Ahmet Çelebi, Günes Karabulut-Kurt, Ali Görçin, Semiha Tedik Basaran:
Multi-Channel Learning with Preprocessing for Automatic Modulation Order Separation. 1-5 - Jinlong Xu, Dong Wei, Weiqing Huang:
Specific Emitter Identification via Spatial Characteristic of Polarization Fingerprint. 1-7 - Yujie Yao, Hao Zhou, Melike Erol-Kantarci:
Deep Reinforcement Learning-based Radio Resource Allocation and Beam Management under Location Uncertainty in 5G mm Wave Networks. 1-6 - Konstantinos Oikonomou:
A Spectrum Analysis Approach for the Median Problem in Modern Network Environments. 1-6 - Yaqiang Zhang, Rengang Li, Yaqian Zhao, Ruyang Li:
Deep Reinforcement Learning based Mobility-Aware Service Migration for Multi-access Edge Computing Environment. 1-6 - Ester Zumpano, Pasquale Iaquinta, Luciano Caroprese, Giuseppe Lucio Cascini, Francesco Dattola, Ivana Pellegrino, Miriam Iusi, Pierangelo Veltri, Eugenio Vocaturo:
Poster SIMPATICO 3D. 1-3 - Ana M. B. C. Quevedo, Carlos H. O. O. Quevedo, Rafael L. Gomes, Samuel F. Camara, Joaquim Celestino Jr.:
A Reputation and Security Mechanism for Heterogeneous Vehicular Networks. 1-6 - Sarantis Kalafatidis, Vassilis Demiroglou, Sotiris Skaperas, Georgios Tsoulouhas, Polychronis Valsamas, Lefteris Mamatas, Vassilis Tsaoussidis:
Experiments with SDN-based Adaptable Non-IP Protocol Stacks in Smart-City Environments. 1-3 - Francesco Witz, Baptiste Buchi, Hakim Mabed, Frédéric Lassabe, Jaafar Gaber, Wahabou Abdou:
Deep Learning for the selection of the best modular robots self-reconfiguration algorithm. 1-6 - Shamisa Kaspour, Abdulsalam Yassine:
A Federated Learning Model With Short Sequence To Point Mechanism For Smart Home Energy Disaggregation. 1-6 - Yaqiang Zhang, Ruyang Li, Yaqian Zhao, Rengang Li, Xuelei Li, Tuo Li:
Online Decentralized Task Allocation Optimization for Edge Collaborative Networks. 1-6 - Stelios Andreadis, Nick Pantelidis, Ilias Gialampoukidis, Stefanos Vrochidis, Ioannis Kompatsiaris:
Water quality issues: Can we detect a creeping crisis with social media data? 1-6 - G. Dimopoulos, G. Megas, Evangelos Papapetrou, Christos Liaskos:
Ant Colony Optimization for Programmable Wireless Environments: Enabling Model and Initial Results. 1-6 - Guozhi Lin, Jingguo Ge, Yulei Wu, Hui Li, Liangxiong Li:
Digital Twin Networks: Learning Dynamic Network Behaviors from Network Flows. 1-6 - Jaime Galán-Jiménez, Alejandro González Vegas, Javier Berrocal:
Reduction of latency of microservice based loT applications in rural areas with lack of connectivity using UAV-based networks. 1-6 - Yan Wang, Qianqian Ren:
Dynamic Graph Convolutional Network for Long Short-term Traffic Flow Prediction. 1-6 - Hao Wang, Hui Kang, Geng Sun, Jiahui Li, Jingwu Xiao, Ning Lit:
Position Errors Analysis, Prediction and Recovery for UAV-enabled Virtual Antenna Array. 1-6 - Hang Shen, Yilong Heng, Ning Shi, Tianjing Wang, Guangwei Bai:
Drone-Small-Cell-Assisted Spectrum Management for 5G and Beyond Vehicular Networks. 1-8 - Siyuan Leng, Yingke Xie, Yifan Zhang, Yunchuan Guo, Liang Fang, Fenghua Li:
DICOF: A Distributed and Collaborative Framework for Hybrid DDoS Attack Detection. 1-7 - Nicholas Lurski, Andrew Monica, Brooke Peterson, Stergios Papadakis:
Rapid Identification and Characterization of Laser Injected Clock Faults through OBIC Mapping. 1-6 - Leandro M. Dallanora, Ariel Góes de Castro, Roberto Irajá Tavares da Costa Filho, Fábio D. Rossi, Arthur Francisco Lorenzon, Marcelo Caggiani Luizelli:
DyPro: Dynamic Probing Planning for In-Band Network Telemetry. 1-6 - Joanna Georgiou, Moysis Symeonides, Michalis Kasioulis, Demetris Trihinas, George Pallis, Marios D. Dikaiakos:
BenchPilot: Repeatable & Reproducible Benchmarking for Edge Micro-DCs. 1-6 - Geng Sun, Xiaoya Zheng, Yuying Lian, Jiahui Li, Fang Mei:
Reliable UAV Communication via Collaborative Beamforming: A Multi-objective Optimization Approach. 1-7 - Rui Mao, Heming Ji, Xiaoyu Wang:
Dynamic Authentication Mechanism Research and Security Protocol Design of HIOT. 1-8 - Gengbiao Yue, Yumei Wang, Yu Liu:
Rule Placement and Switch Migration-based Scheme for Controller Load Balancing in SDN. 1-6 - Nithish Velagala, Leandros Maglaras, Nick Ayres, Sotiris Moschoyiannis, Leandros Tassiulas:
Enhancing Privacy of Online Chat Apps Utilising Secure Node End-to-End Encryption (SNE2EE). 1-3 - Shangyuan Zhuang, Jiyan Sun, Hangsheng Zhang, Xiaohui Kuang, Ling Pang, Haitao Liu, Yinlong Liu:
StinAttack: A Lightweight and Effective Adversarial Attack Simulation to Ensemble IDSs for Satellite- Terrestrial Integrated Network. 1-8 - Lucas M. A. de Souza, Célio Albuquerque, Fernanda G. O. Passos, Diego G. Passos:
Convergence-Time Analysis for the HTE Link Quality Estimator. 1-7 - Taimoor Ul Islam, Fahd Ahmed Khan:
Sorted Channel Based User Search for Initial Access in 5G and Beyond Cellular Networks. 1-6 - Rui Jesus, Yubraj Gupta, Luís Bastião Silva, Carlos Costa:
Vendor Neutral Cloud Platform for 4D Digital Pathology. 1-6 - Alaa A. Algamal, Ahmed H. Abd El-Malek, Hossam M. H. Shalaby:
Reliable Free-Space Optical Communication System Performance for Matching Multi-level Customer Needs: Using Hybrid Modulation System with Deep Reinforcement Learning. 1-7 - Marlon Cordeiro Domenech, André Ricardo Abed Grégio, Luis Carlos Erpen De Bona:
On Metadata Privacy in Instant Messaging. 1-7 - Jianhua Wang, Xiaolin Chang, Ricardo J. Rodríguez, Yixiang Wang:
Assessing Anonymous and Selfish Free-rider Attacks in Federated Learning. 1-6 - Benedetta Bolis, Lorenzo Fratini, Mirko Salaris, Marco D. Santambrogio:
GRETA: erGonomic stREss Tracking pAd. 1-6 - Muhammad Salman Haleem, Leandro Pecchia:
A Deep Learning Based ECG Segmentation Tool for Detection of ECG Beat Parameters. 1-4 - Marco Furini, Emilia Flisi:
Opinion Leaders and Twitter: Metric Proposal and Psycholinguistic Analysis. 1-5 - Sulyman Age Abdulkareem, Chuan Heng Foh, François Carrez, Klaus Moessner:
SMOTE-Stack for Network Intrusion Detection in an IoT Environment. 1-6 - Yuemei Wu, Dong Wei, Jing Li, Weiqing Huang, Xiang Meng:
Physical Layer Authentication Based on Full Channel Information under Dual-polarized Antenna Communication Systems. 1-7 - Matteo Mendula, Armir Bujari, Luca Foschini, Paolo Bellavista:
A Data-Driven Digital Twin for Urban Activity Monitoring. 1-6 - Yichao Wu, Chenglong Li, Jiahai Yang, Zhiliang Wang, Wei Hu, Ang Xia, Yong Jiang, Yao Wang, Liuli Wu:
WebIoT: Classifying Internet of Things Devices at Internet Scale through Web Characteristics. 1-7 - Md. Akbar Hossain, Sayan Kumar Ray, Geri Harris, Shakil Ahmed:
An Emergency Response System to Support Early Stage Dementia Patients. 1-4 - Philipp Zißner, Paulo H. L. Rettore, Bruno P. Santos, Roberto Rigolin Ferreira Lopes, Peter Sevenich:
Road Traffic Density Estimation Based on Heterogeneous Data Fusion. 1-6 - Ivanoe De Falco, Antonio Della Cioppa, Tomas Koutny, Umberto Scafuri, Ernesto Tarantino, Martin Ubl:
An Evolution-based Machine Learning Approach for Inducing Glucose Prediction Models. 1-6 - Xiaoyan Liu, Zhiwei Xu, Yana Qin, Jie Tian:
A Discrete-event-based Simulator for Distributed Deep Learning. 1-7 - Claudia Ferraris, Gianluca Amprimo, Giuseppe Pettiti, Giulia Masi, Lorenzo Priano:
Automatic Detector of Gait Alterations using RGB-D sensor and supervised classifiers: a preliminary study. 1-6 - Ruizhong Du, Yuan Wang, ZiYuan Wang:
Real-time Audit Scheme Based on Multilevel Roles in a Medical Cloud Environment. 1-7 - Mohammad Mahzoun, Liliya Kraleva, Raluca Posteuca, Tomer Ashur:
Differential Cryptanalysis of K-Cipher. 1-7 - Giulia Guarino, Ivan Bernabucci, Daniele Bibbo, Marta Caviglia, Amara J. Ambai, Giovanni Putoto, Luca Ragazzoni, Francesca Tognon, Matthew Jusu Vandy, Francesco Barone-Adesi, Maurizio Schmid:
A Data-Based System for the Optimization of Emergency Medical Services Allocation in Rural Countries. 1-4 - Mingzhu Qiang, Changyan Yi, Juan Li, Kun Zhu, Jun Cai:
Joint Task Offloading and VM Placement for Edge Computing with Time-Sequential IIoT Applications. 1-6 - Linda Senigagliesi, Manola Ricciuti, Gianluca Ciattaglia, Ennio Gambi:
Physiological Parameters Extraction by Accelerometric Signal Analysis During Sleep. 1-4 - Bin Han, Hans D. Schotten:
Multi-Sensory HMI for Human-Centric Industrial Digital Twins: A 6G Vision of Future Industry. 1-7 - Tibério Baptista, Rui Jesus, Luís Bastião Silva, Carlos Costa:
Scalable Digital Pathology Platform Over Standard Cloud Native Technologies. 1-6 - Jorge F. Schmidt, Udo Schilcher, Siddhartha S. Borkotoky, Christian A. Schmidt:
Energy Consumption in LoRa IoT: Benefits of Adding Relays to Dense Networks. 1-6 - Guangjun Wu, Bingqing Zhu, Jun Li:
BMKS: A Blockchain Based Multi-Keyword Search Scheme for Medical Data Sharing. 1-7 - Ioanna Angeliki Kapetanidou, Stavros Malagaris, Vassilis Tsaoussidis:
Avoiding Notorious Content Sources: A Content-Poisoning Attack Mitigation Approach. 1-6 - Hongyue Kang, Wei Li, Jelena V. Misic, Vojislav B. Misic, Xiaolin Chang:
Dual-UAV Aided Secure Dynamic G2U Communication. 1-6 - Antonio Celesti, Maria Fazio, Lorenzo Carnevale, Massimo Villari:
A NLP-based Approach to Improve Speech Recognition Services for People with Speech Disorders. 1-6 - Eray Güven, Günes Karabulut-Kurt:
CNN-aided Channel and Carrier Frequency Offset Estimation for HAPS-LEO Links. 1-6 - Donghui Ding, Bo Long, Feng Zhuo, Zhongcheng Li, Hanwen Zhang, Chen Tian, Yi Sun:
Lilac: Parallelizing Atomic Cross-Chain Swaps. 1-8 - Mahdi Sharara, Sahar Hoteit, Véronique Vèque, Francesca Bassi:
Minimizing Power Consumption by Joint Radio and Computing Resource Allocation in Cloud-Ran. 1-6 - Dimitris Koutras, Christos Grigoriadis, Michalis Papadopoullos, Panayiotis Kotzanikolaou, Christos Douligeris:
Automating environmental vulnerability analysis for network services. 1-7 - Adrien Gougeon, François Lemercier, Anne Blavette, Anne-Cécile Orgerie:
Modeling the End-to-End Energy Consumption of a Nation-Wide Smart Metering Infrastructure. 1-7 - Valeria Lukaj, Francesco Martella, Antonio Celesti, Maria Fazio, Massimo Villari:
An Enriched Visualization Tool based on Google Maps for Water Distribution Networks in Smart Cities. 1-6 - Arpad Müller, Wisam Abbasi, Andrea Saracino:
Demo: Usage Control using Controlled Privacy Aware Face Recognition. 1-3 - Hao-Kai Hong, Fan-Hsun Tseng:
Ring-based Intelligent Reflecting Surface Placement for 5G and Beyond. 1-6 - Antonio Lioy, Ignazio Pedone, Silvia Sisinni:
(POSTER) Using MACsec to protect a Network Functions Virtualisation infrastructure. 1-3 - Ryu Kazama, Hirotake Abe, Chunghan Lee:
Evaluating TCP Throughput Predictability from Packet Traces using Recurrent Neural Network. 1-6 - Panagiotis C. Kokkinos:
Towards the Realization of Converged Cloud, Edge and Networking Infrastructures in Smart MegaCities. 1-5 - Giovanni Delnevo, Arber Kazazi, Elio Amadori, Silvia Mirri:
Social Sensing for Monuments Recognition using Convolutional Neural Networks: A Case Study. 1-6 - Md Tahmid Hossain, Robson E. De Grande:
Adaptive Q-leaming-supported Resource Allocation Model in Vehicular Fogs. 1-6 - Nan Xiang, Xuebin Ma:
TKDA: An Improved Method for K-degree Anonymity in Social Graphs. 1-6 - Eftychia Lakka, George Hatzivasilis, Stylianos Karagiannis, Andreas Alexopoulos, Manos Athanatos, Sotiris Ioannidis, Manolis Chatzimpyrros, Grigoris Kalogiannis, George Spanoudakis:
Incident Handling for Healthcare Organizations and Supply-Chains. 1-7 - Edward W. Chandler:
Expanded Excel-Based Simulator Tool for Resource-Allocation Optimization for Distributed Network Protocols. 1-6 - Alessio Catalfamo, Antonio Celesti, Maria Fazio, Giovanni Randazzo, Massimo Villari:
A Platform for Federated Learning on the Edge: a Video Analysis Use Case. 1-7 - Maria Diamanti, Nikolaos Fryganiotis, Symeon Papavassiliou, Christos Pelekis, Eirini-Eleni Tsiropoulou:
On the Minimum Collisions Assignment Problem in Interdependent Networked Systems. 1-6 - Jorge Baranda, Luca Vettori, Josep Mangues-Bafalluy, Ricardo Martinez, Engin Zeydan:
Demo: Automated Multi-Site E2E Orchestration of Hybrid Network Services Mixing PNF, VNF and CNFs. 1-3 - Thomas Dimakis, Malamati D. Louta, Thomas Kyriakides, Alexandros-Apostolos A. Boulogeorgos, Konstantina Banti, Ioanna Karampelia, Nikos Papadimitriou:
GreenLoRaWAN: An energy efficient and resilient LoRaWAN communication protocol. 1-7 - Sayed Amir Hoseini, Parastoo Sadeghi, Faycal Bouhafs, Neda Aboutorab, Frank T. H. den Hartog:
Network-Controlled Physical-Layer Security: Enhancing Secrecy through Friendly Jamming. 1-7 - Yukun Zhou, Dezun Dong, Zhengbin Pang, Junhong Ye, Feng Jin:
Fast-Converging Congestion Control in Datacenter Networks. 1-7 - Zijun Cheng, Degang Sun, Leiqi Wang, Qiujian Lv, Yan Wang:
MMSP: A LSTM Based Framework for Multi-Step Attack Prediction in Mixed Scenarios. 1-6 - Christos Tselikis, Christos Douligeris, Sarandis Mitropoulos, Leandros Maglaras:
Re-configuration from the Edge: alternative Software Models for time-sensitive IoT Applications. 1-3 - Bruno Chianca Ferreira, Guillaume Dufour, Guthemberg Silvestre:
A Lightweight Fluid Model for Mobile Ad hoc Distributed Systems. 1-7 - Matias R. P. dos Santos, Marcel K. R. Mei, Antonio C. Oliveira, Ricardo de A. L. Rabelo, Gustavo B. Figueiredo:
A New Soccer Game Optimization Modeling For Flexible Functional Splitting Dimensioning in CF-RAN Networks. 1-6 - Guojian Luo, Jianfeng Qu, Lina Zhang, Xiaoyu Fang, Yi Zhang, Tong Zhou:
Spatial-based Bayesian Hidden Markov Models with Dirichlet Mixtures for Video Anomaly Detection. 1-6 - Binal Tejani, Robson E. De Grande:
Fair Connectivity-Oriented Allocation for Combined Resources in VCC Networks. 1-6 - Pengcheng Liu, Zhen Han, Zhixin Shi, Meimei Li, Meichen Liu:
Frequency Hopping Signal Recognition Based on Horizontal Spatial Attention. 1-8 - Giampaolo Bovenzi, Francesco Cerasuolo, Antonio Montieri, Alfredo Nascita, Valerio Persico, Antonio Pescapè:
A Comparison of Machine and Deep Learning Models for Detection and Classification of Android Malware Traffic. 1-6 - Lucas N. Silva, Paulo H. L. Rettore, Vinícius F. S. Mota, Bruno P. Santos:
MobVis: A Framework for Analysis and Visualization of Mobility Traces. 1-6 - Kevin Hoarau, Pierre-Ugo Tournoux, Tahiry Razafindralambo:
BGNN: Detection of BGP Anomalies Using Graph Neural Networks. 1-6 - Iakovos Pittaras, Nikos Fotiou, Christos Karapapas, Vasilios A. Siris, George C. Polyzos:
Secure, Mass Web of Things Actuation Using Smart Contracts-Based Digital Twins. 1-6 - Junjun Si, Zejiang Chen, Bo Tu, Shuaifu Dai, Xiangqun Chen:
City-Scale Fingerprint Positioning Framework based on MDT Data. 1-6 - Duc V. Nguyen, Le Ngan, Lai Huyen Thuong, Truong Thu Huong:
LL-VAS: Adaptation Method for Low-Latency 360-degree Video Streaming over Mobile Networks. 1-6 - Jorge Baranda, Josep Mangues-Bafalluy, Luca Vettori, Ricardo Martínez, Engin Zeydan:
Enabling the SLA Management of Federated Network Services through Scaling Operations. 1-6 - Margarida Silva, André Mourato, Gonçalo Marques, Susana Sargento, André Reis:
A Platform for Autonomous Swarms of UAVs. 1-6 - Aneesh Bhattacharya, Risav Rana, Venkanna Udutalapally, Debanjan Das:
CoviFL: Edge-Assisted Federated Learning for Remote COVID-19 Detection in an AIoMT Framework. 1-6 - Clemens-Konrad Mueller, Steffen Steiner, Volker Kuehn:
Information Bottleneck Optimization of a Finite Bit Resolution Fast Fourier Transform. 1-6 - Yuanhong Zhang, Zhiwen Wang, Junquan Liu, Haipeng Du, Qinghua Zheng, Weizhan Zhang:
Deep Reinforcement Learning Based Adaptive 360-degree Video Streaming with Field of View Joint Prediction. 1-8 - Marisangila Alves, Guilherme Piêgas Koslovski:
Joint Cache Placement and Request Routing Optimization in Heterogeneous Cellular Networks. 1-6 - Mitsuhiro Umizaki, Tomohiro Morikawa, Akira Fujita, Takeshi Takahashi, Tsung-Nan Lin, Daisuke Inoue:
Understanding the Characteristics of Public Blocklist Providers. 1-7 - Fuyi Wang, Leo Yu Zhang, Lei Pan, Shengshan Hu, Robin Doss:
Towards Privacy-Preserving Neural Architecture Search. 1-6 - Parya Haji Mirzaee, Mohammad Shojafar, Haitham S. Cruickshank, Rahim Tafazolli:
CHFL: A Collaborative Hierarchical Federated Intrusion Detection System for Vehicular Networks. 1-7 - Yintan Ai, Hua Li, Xianrong Wang, Jiafeng Wang, Yaru Ding:
The Design and Specification of Path Adjustable SFC Using YANG Data Model. 1-6 - Shuang Liang, Zhiyi Fang, Geng Sun, Jiahui Li:
Reducing Hovering and Motion Energy Consumptions for UAV-enabled Collaborative Beamforming. 1-7 - Ziwen An, Yanheng Liu, Geng Sun, Hongyang Pan, Aimin Wang:
UAV-enabled Wireless Powered Communication Networks: A Joint Scheduling and Trajectory Optimization Approach. 1-7 - Rui Mao, Heming Ji, Di Cheng, Xiaoyu Wang, Yan Wang, Degang Sun:
Implicit Continuous Authentication Model Based on Mobile Terminal Touch Behavior. 1-7 - Marco Avvenuti, Marco Bongiovanni, Luca Ciampi, Fabrizio Falchi, Claudio Gennaro, Nicola Messina:
A Spatio- Temporal Attentive Network for Video-Based Crowd Counting. 1-6 - Farzad Veisi, Julien Montavont, Fabrice Theoleyre:
SDN-TSCH: Enabling Software Defined Networking for Scheduled Wireless Networks with Traffic Isolation. 1-7 - Moysis Symeonides, Demetris Trihinas, Joanna Georgiou, Michalis Kasioulis, George Pallis, Marios D. Dikaiakos, Theodoros Toliopoulos, Anna-Valentini Michailidou, Anastasios Gounaris:
Demo: The RAINBOW Analytics Stack for the Fog Continuum. 1-3 - Xiaohui Chen, Ying Tong, Chunlai Du, Yongji Liu, Zhenquan Ding, Qingyun Ran, Yi Zhang, Lei Cui, Zhiyu Hao:
MalPro: Learning on Process-Aware Behaviors for Malware Detection. 1-7 - Ruonan Li, Aimin Wang, Geng Sun, Jiahui Li, Xiaoya Zheng:
Bi-objective Optimization for Collaborative UAV Secure Communication under Forest Channel. 1-7 - Carmela Comito:
Sensing Social Media to Forecast COVID-19 Cases. 1-6 - Adrià Mallorquí, Agustín Zaballos, Daniel Serra:
The Antarctic Delay Tolerant Network. 1-7 - Jing Li, Shunliang Zhang, Mengyan Xing, Zhuang Qiao, Xiaohui Zhang:
Mobile Device Identification Based on Two-dimensional Representation of RF Fingerprint with Deep Learning. 1-6 - Sowmya Rasipuram, Junaid Hamid Bhat, Anutosh Maitra, Bishal Shaw, Sriparna Saha:
Multimodal Depression Detection Using Task-oriented Transformer-based Embedding. 1-4 - Yi Qin, Jiahe Wu, Futai Zou, Yue Wu:
Breaking Tor's Anonymity by Modifying Cell's Command. 1-7 - Harshit Srivastava, Ravi Sankar:
Cooperation Model for Optimized Classification on Social Data. 1-5 - Andrea De Salve, Andrea Lisi, Paolo Mori, Laura Ricci:
Selective Disclosure in Self-Sovereign Identity based on Hashed Values. 1-8 - Hua Wu, Chaoqun Cui, Guang Cheng, Xiaoyan Hu:
PSCM: Towards Practical Encrypted Unknown Protocol Classification. 1-6 - Homin Kang, Soon-Ju Kang:
Sensor Fusion and Device Collaboration based Smart Plug Hub Architecture for Precise Identification of ADL in Real-Time. 1-7 - Mnassar Alyami, Mohammed Alkhowaiter, Mansour Al Ghanim, Cliff C. Zou, Yan Solihin:
MAC-Layer Traffic Shaping Defense Against WiFi Device Fingerprinting Attacks. 1-7 - Giuseppe Aceto, Ciro Guida, Antonio Montieri, Valerio Persico, Antonio Pescapè:
A First Look at Accurate Network Traffic Generation in Virtual Environments. 1-6 - Foivos Allayiotis, Christos Bouras, Vasileios Kokkinos:
A Machine Learning Mechanism for Improved Energy Consumption in 5G Small Cells. 1-6 - Antonio Caruso, Stefano Chessa, Soledad Escolar, Fernando Rincón, Juan C. López:
Task Scheduling Stabilization for Solar Energy Harvesting Internet of Things Devices. 1-6 - Wassila Lalouani, Mohamed F. Younis:
A Federated Learning Framework for Resource Constrained Fog Networks. 1-6
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.