default search action
ICNC 2023: Honolulu, HI, USA
- International Conference on Computing, Networking and Communications, ICNC 2023, Honolulu, HI, USA, February 20-22, 2023. IEEE 2023, ISBN 978-1-6654-5719-4
- Shang-Huan Wu, Ren-Hung Hwang, Chih-Yu Wang, Ching-Hsuan Chou:
Deep Reinforcement Learning Based Resource Allocation for 5G V2V Groupcast Communications. 1-6 - Xian Liu, Changcheng Huang, Wilsun Xu:
A Refined Energy Optimization Model for Edge Computing with Machine Learning. 7-11 - Tatsuya Otoshi, Masayuki Murata, Hideyuki Shimonishi, Tetsuya Shimokawa:
Hierarchical Bayesian Attractor Model for Dynamic Task Allocation in Edge-Cloud Computing. 12-18 - Kimia Ameri, Michael Hempel, Hamid Sharif, Juan Lopez Jr., Kalyan Perumalla:
Impact of Grammar on Language Model Comprehension. 19-24 - Van-Hai Bui, Fangyuan Chang, Wencong Su, Mengqi Wang, Yi Lu Murphey, Felipe Leno da Silva, Can Huang, Lingxiao Xue, Ruben Glatt:
Deep Reinforcement Learning-Based Optimal Parameter Design of Power Converters. 25-29 - Aninda Roy Ani, Sabir Saheel, Tarem Ahmed, Mohammad Faisal Uddin:
Neural Network based Unsupervised Face and Mask Detection in Surveillance Networks. 30-34 - Michael Cash, Christopher Morales-Gonzalez, Shan Wang, Xipeng Jin, Alex Parlato, Jason Zhu, Qun Zhou Sun, Xinwen Fu:
On False Data Injection Attack against Building Automation Systems. 35-41 - Jian Ren, Jian Li, Tongtong Li:
Optimal Codes for Distributed Storage. 42-46 - Chukwuebuka Ezelu, Ulrich Buehler:
Membership Management in Collaborative Intrusion Detection Systems. 47-53 - Connor Dickey, Christopher Smith, Quentin Johnson, Jingcheng Li, Ziqi Xu, Loukas Lazos, Ming Li:
Wiggle: Physical Challenge-Response Verification of Vehicle Platooning. 54-60 - Patrice Kisanga, Isaac Woungang, Issa Traoré, Glaucio H. S. Carvalho:
Network Anomaly Detection Using a Graph Neural Network. 61-65 - Olusola Tolulope Odeyomi, Gergely Zaruba:
Byzantine-Resilient Federated Learning With Differential Privacy Using Online Mirror Descent. 66-70 - Rakpong Kaewpuang, Minrui Xu, Dusit Niyato, Han Yu, Zehui Xiong, Xuemin Sherman Shen:
Adaptive Resource Allocation in Quantum Key Distribution (QKD) for Federated Learning. 71-76 - Norman Kong Koon Kit, Michal Aibin:
Study on High Availability and Fault Tolerance. 77-82 - Rohan Sharma, Michal Aibin:
Real-Time Search and Rescue using Remotely Piloted Aircraft System with Frame Dropping. 83-88 - Cuiting Huang, Sicong Ye, Shi Shuai, Mengdi Wei, Yehong Zhou, Anna Aibin, Michal Aibin:
Emergency Surgical Scheduling Model Based on Moth-flame Optimization Algorithm. 89-94 - Haytham Qushtom, Jelena V. Misic, Vojislav B. Misic, Xiaolin Chang:
Trust and Rewards in a Two-Tier Consensus Architecture. 95-100 - Chinh Tran, Mustafa Mehmet-Ali:
Analysis of Job Completion Time in Vehicular Cloud Under Concurrent Task Execution. 101-105 - Xian Liu:
LEO Satellite Communication in IoRT: a Virtual MISO Model. 106-110 - Razvan Cristian Voicu, Yusun Chang:
Towards Programmable Networking With CoopNet: A Horizontal Parallel Multipath Approach. 111-116 - Puming Fang, Tilman Wolf:
Implementing Virtual Network Functions in Named Data Networking and Web 3.0. 117-123 - Soumya Banerjee, Sarada Prasad Gochhayat, Sachin Shetty:
Performance Analysis of Fixed Broadband Wireless Access in mmWave Band in 5G. 124-129 - Alicia Esquivel Morel, Prasad Calyam, Chengyi Qu, Durbek Gafurov, Cong Wang, Komal Thareja, Anirban Mandal, Eric Lyons, Michael Zink, George Papadimitriou, Ewa Deelman:
Network Services Management using Programmable Data Planes for Visual Cloud Computing. 130-136 - William Brockelsby, Rudra Dutta:
Augmenting Campus Wireless Architectures with SDN. 137-142 - Hovannes Kulhandjian, Elizabeth Batz, Eduardo Garcia, Selena Vega, Sanjana Velma, Michel Kulhandjian, Claude D'Amours, Burak Kantarci, Tathagata Mukherjee:
AI-based RF-Fingerprinting Framework and Implementation using Software-Defined Radios. 143-147 - Yuzhu Zhang, Lijun Qian, Abdullah Eroglu, Binbin Yang, Hao Xu:
Reinforcement Learning based Optimal Dynamic Resource Allocation for RIS-aided MIMO Wireless Network with Hardware Limitations. 148-152 - Chenhao He, Qing Li, Rui Cheng, Jun Wang, Jinghua Tan:
The Hysteresis Effect of Momentum Spillover in Asset Pricing via Spatial-Temporal Graph Learning. 153-158 - Mingjie Feng, Wenhan Zhang, Marwan Krunz:
Dynamic Spectrum Access in Non-stationary Environments: A DRL-LSTM Integrated Approach. 159-164 - Hovannes Kulhandjian, Jeremiah Barron, Megan Tamiyasu, Mateo Thompson, Michel Kulhandjian:
Pedestrian Detection and Avoidance at Night Using Multiple Sensors and Machine Learning. 165-169 - Yao Du, Zehua Wang, Cyril Leung, Victor C. M. Leung:
Blockchain-based Data Quality Assessment to Improve Distributed Machine Learning. 170-175 - Mengjie Jia, Ashok Raja, Jiawei Yuan:
A Hybrid Delay-aware Approach Towards UAV Flight Data Anomaly Detection. 176-180 - Md Ariful Haque, Sachin Shetty, Charles A. Kamhoua, Kimberly Gold:
Adversarial Technique Validation & Defense Selection Using Attack Graph & ATT&CK Matrix. 181-187 - Aakash Shrestha, Yantian Hou, Min Long, Jiawei Yuan:
Virtual Curtain: A Communicative Fine-grained Privacy Control Framework for Augmented Reality. 188-194 - Anand Surendra Masurkar, Xiaoyan Sun, Jun Dai:
Using Blockchain for Decentralized Artificial Intelligence with Data Privacy. 195-201 - Narges Alipourjeddi, Ali Miri:
Evaluating Generative Adversarial Networks: A Topological Approach. 202-206 - Fatima Chahal, Hacène Fouchal, Dominique Gaïti:
Consensus algorithms for Opt-in/Opt-out and proximity marketing context. 207-213 - Afsaneh Mahanipour, Hana Khamfroush:
Wrapper-Based Federated Feature Selection for IoT Environments. 214-219 - Kouichi Genda:
Deep learning inference time guarantee in near future edge computing. 220-225 - Caitlin Sim, Kesheng Wu, Alex Sim, Inder Monga, Chin Guok, Frank Würthwein, Diego Davila, Harvey B. Newman, Justas Balcas:
Effectiveness and predictability of in-network storage cache for Scientific Workflows. 226-230 - Vincent Latzko, Osel Lhamo, Mahshid Mehrabi, Christian Vielhaus, Frank H. P. Fitzek:
Energy-Aware and Fair Multi-User Multi-Task Computation Offloading. 231-236 - Nayreet Islam, Akramul Azim:
An edge computing-based monitoring framework for situation-aware embedded real-time systems. 237-241 - Vanlin Sathya, Lyutianyang Zhang, Mohit Goyal, Mehmet Yavuz:
Warehouse Deployment: A Comparative Measurement Study of Commercial Wi-Fi and CBRS Systems. 242-248 - Proyash Podder, Azin Neishaboori, Somak Datta Gupta, Alexander Afanasyev:
SPA: A Scalable Pedestrian-awareness Application using NDN over CV2X. 249-253 - Sean Cannan, Andrew Jones, Robert Simon:
Hyperbolic Routing for Cache Privacy in Information Centric Networking. 254-260 - Navid Ordouie, Ramesh K. Karne, Alexander L. Wijesinha, Nirmala Soundararajan:
A Simple UDP-Based Web Server on a Bare PC with 64-bit Multicore Processors: Design and Implementation. 261-265 - Lijun Dong, Richard Li:
Enable Computation in the Network for Driver Assistance with Object Notification and Augmentation. 266-272 - Junghwan Lee, Seongsu Jang:
Metaverse-based education service adoption and preference study using conjoint analysis. 273-277 - Jian Liu, Chin-Tser Huang:
Evaluation of Different Time Series Forecasting Models for 5G V2V Networks. 278-282 - Mehrtash Mehrabi, Mostafa Mohammadkarimi, Masoud Ardakani:
Activity Detection for Grant-Free NOMA in Massive IoT Networks. 283-287 - Eyad Shtaiwi, Ahmed Refaey Hussein, Awais Khawar, Ahmed Alkhateeb, Ahmed Abdelhadi, Zhu Han:
Implementation of Real-Time Adversarial Attacks on DNN-based Modulation Classifier. 288-292 - Joshua Price, Hadjar Ould Slimane, Khair Al Shamaileh, Vijay Kumar Devabhaktuni, Naima Kaabouch:
A Machine Learning Approach for the Detection of Injection Attacks on ADS-B Messaging Systems. 293-297 - Ahmed El Ouadrhiri, Ahmed Abdelhadi, Phu H. Phung:
Hensel's Compression-Based Dimensionality Reduction Approach for Privacy Protection in Federated Learning. 298-303 - Mohamed G. Abd El Ghafour, Ahmed H. Abd El-Malek, Mohammed Abo-Zahhad:
Secrecy Performance and Power Allocation for Cooperative Vehicular Relaying Networks in the Presence of Interference. 304-310 - Hao Wu, Aiqin Hou, Weike Nie, Chase Qishi Wu:
On an Integrated Security Framework for Defense Against Various DDoS Attacks in SDN. 311-317 - Yanyan Li, Felix Ferreira, Mengjun Xie:
Flick me once and I know it's you! Flicking-based Implicit Authentication for Smartwatch. 318-323 - Roshan Lal Neupane, Pravin Bhandari, Prasad Calyam, Reshmi Mitra:
SGChain: Blockchain Platform for Availability Attack Mitigation in Smart Grid Environments. 324-330 - Adel Atieh, Priyadarsi Nanda, Manoranjan Mohanty:
A Zero-Trust Framework for Industrial Internet of Things. 331-335 - Wei-Yang Chiu, Weizhi Meng, Wenjuan Li:
TPMWallet: Towards Blockchain Hardware Wallet using Trusted Platform Module in IoT. 336-342 - Amr Aly, Ender Ayanoglu:
Estimation of Cellular Wireless User Coordinates via Channel Charting and MUSIC. 343-347 - Tomohiro Korikawa, Chikako Takasaki, Kyota Hattori, Hidenari Oowada:
Time-Topology Routing in 3D Networks. 348-352 - Chikako Takasaki, Tomohiro Korikawa, Kyota Hattori, Hidenari Ohwada:
Traffic Behavior-based Device Type Classification. 353-357 - Xiaomei Zhang:
Enabling PeerCloud in Vehicular Networks: Feasibility and Reliability of Vehicle-to-Vehicle Offloading. 358-364 - Wei Mao, Shu-Ping Yeh, Jing Zhu, Hosein Nikopour, Shilpa Talwar:
Transmission-Cost Minimization for Packet-level Coding on Multi-path Wireless Networks. 365-371 - Jing Deng, Po-Ning Chen, Yunghsiang S. Han:
perMAC: Perturbation-based MAC for Dense Wireless Networks with Periodic Traffic. 372-376 - Jalal Jalali, Ata Khalili, Atefeh Rezaei, Jeroen Famaey:
Is Active IRS Useful for mmWave Wireless Networks or Not? 377-382 - Tongtong Li, Jinxian Deng, Jian Ren:
Can We Have a Better System than OFDM? 383-387 - Sabila Newaz, Xingya Liu:
ECEA Based Joint Circular Design of Reconfigurable Intelligent Surfaces with Drone During Disaster. 388-392 - Xian Liu:
Ergodic Capacity of the Cloud Radio Access Network: A General Solution. 393-397 - I. Zakir Ahmed, Hamid R. Sadjadpour, Shahram Yousefi:
A Novel Information-Directed Tree-Search Algorithm for RIS Phase Optimization in Massive MIMO. 398-402 - Yoichi Matsuo, Yuusuke Nakano, Keishiro Watanabe:
CMRCV: Causal Modeling to Localize Failed Equipment by Representative Nodes and Contribution Values. 403-408 - Sarhad Arisdakessian, Omar Abdel Wahab, Azzam Mourad, Hadi Otrok:
Towards Instant Clustering Approach for Federated Learning Client Selection. 409-413 - Giovanni Pettorru, Mauro Fadda, Roberto Girau, Mariella Sole, Matteo Anedda, Daniele D. Giusto:
Using Artificial Intelligence and IoT Solution for Forest Fire Prevention. 414-418 - Samih Fadli, Bharat S. Rawal, Andrew Mentges:
Hybrid Quantum Machine learning using Quantum Integrated Cloud Architecture (QICA). 419-425 - James H. Nguyen, Weixian Liao, Wei Yu:
Towards Secure Communications in Heterogeneous Internet of Things. 426-430 - Dorottya Zelenyanszki, Zhé Hóu, Kamanashis Biswas, Vallipuram Muthukkumarasamy:
A privacy awareness framework for NFT avatars in the metaverse. 431-435 - Dakota S. Dale, Kylie McClanahan, Qinghua Li:
AI-based Cyber Event OSINT via Twitter Data. 436-442 - Moinul Islam Sayed, Sajal Saha, Anwar Haque:
Deep Learning Based Malapps Detection in Android Powered Mobile Cyber-Physical System. 443-449 - Pascal Urien:
On Line Secure Elements: Deploying High Security Keystores and Personal HSMs. 450-455 - Junaid Ahmed Khan, Kaan Ozbay:
AFFIRM: Privacy-by-Design Blockchain for Mobility Data in Web3 using Information Centric Fog Networks with Collaborative Learning. 456-462 - Junjie Liu, Min Chen:
COVID-19 Fake News Detector. 463-467 - Junbin Zhang, Hamid Reza Tohidypour, Yixiao Wang, Panos Nasiopoulos:
Shallow- and Deep- fake Image Manipulation Localization Using Deep Learning. 468-472 - Junbin Zhang, Yixiao Wang, Hamid Reza Tohidypour, Mahsa T. Pourazad, Panos Nasiopoulos:
A Generative Adversarial Network Based Tone Mapping Operator for 4K HDR Images. 473-477 - Celina L. Ma, Haohong Wang, Mea Wang:
Guiding Interactive Film With Emotion-Profiling Chatbots. 478-483 - Kyle Jorgensen, Haohong Wang, Mea Wang:
From Screenplay to Screen: A Natural Language Processing Approach to Animated Film Making. 484-490 - Ariel José Aizpurúa, Errin W. Fulp, Daniel Cañas:
Using Diversity to Evolve More Secure and Efficient Virtual Local Area Networks. 491-495 - Haotian Liu, Shiyun Wang, Hui Huang, Qiang Ye:
On the Placement of Edge Servers in Mobile Edge Computing. 496-500 - Xu Wang, Yuanzhu Chen, Octavia A. Dobre:
Malicious Model Detection for Federated Learning Empowered Energy Storage Systems. 501-505 - Ahmed Taha, Alexander Lawall, Neeraj Suri:
Cloud Security Requirement Based Threat Analysis. 506-510 - Ranwa Al Mallah, David López, Talal Halabi:
Blockchain-enabled Efficient and Secure Federated Learning in IoT and Edge Computing Networks. 511-515 - Niteesh Reddy Thota, Xiaoyan Sun, Jun Dai:
Early Rumor Detection in Social Media Based on Graph Convolutional Networks. 516-522 - Iran F. Ribeiro, Vitor F. Calmon, Thiago H. Silva, Celso A. S. Santos, Vinícius Fernandes Soares Mota:
Evaluating Weather Influence on User Participation in a Crowd-sensing Application. 523-528 - Takanobu Omura, Felix Dollack, Panote Siriaraya, Da Li, Katsumi Tanaka, Yukiko Kawai, Shinsuke Nakajima:
Verification of a method for latent interest estimation based on user behavior analysis and POI attributes. 529-535 - Takuya Yamanaka, Da Li, Shinsuke Nakajima:
Preliminary Analysis of Dietary Management Support Method for Improving the Symptoms in Irritable Bowel Syndrome. 536-540 - Soosan Naderi Mighan, Jelena V. Misic, Vojislav B. Misic:
Prioritizing transaction delivery in Ethereum network. 541-546 - Yen-Chin Wang, Danijela Cabric:
Distributed UAV Swarm Placement Optimization for Compressive Sensing based Target Localization. 547-551 - Junya Shiraishi, Hiroyuki Yomo:
Wake-up Control for Energy-efficient Identifications of Multiple Emission Sources in Wireless Sensor Networks. 552-557 - Alaa Awad Abdellatif, Aya A. Amer, Khaled Bashir Shaban, Ahmed M. Massoud:
A Novel Multivariate and Accurate Detection Scheme for Electricity Theft Attacks in Smart Grids. 558-562 - Yuzhu Zhang, Hao Xu:
Two-Stage Online Reinforcement Learning based Distributed Optimal Resource Allocation for Multiple RIS-assisted Mobile Ad-Hoc Network. 563-567 - Naoki Fujiyama, Shoma Izuhara, Shoma Nishigami, Eiji Nii, Hiroyuki Yomo, Yasuhisa Takizawa:
Mobile Sensing Cluster with Orbiting Mutant for Indistinguishable Events in Noisy Environments. 568-574 - Shreyas Devaraju, Alexander Ihler, Sunil Kumar:
A Deep Q-Learning Connectivity-Aware Pheromone Mobility Model for Autonomous UAV Networks. 575-580 - Cédric Westphal, Alexander Clemm:
Optimization Framework for Green Networking (Invited Paper). 581-585 - Proyash Podder, Alexander Afanasyev:
SEANAC: Schema Enforced Automation of Name-based Access Control. 586-590 - Ruiran Wang, Laurent Njilla, Shucheng Yu:
A-C: An NDN-based Blockchain Network With Erasure Coding. 591-595 - Tatsuya Otoshi, Masayuki Murata:
Evolutionary Algorithm with Phenotype Diversity for Virtual Network Embedding. 596-602 - José Fernando de Lacerda Machado, Marco Aurélio Spohn, Lisandro Zambenedetti Granville:
Client-Transparent and Self-Managed MQTT Broker Federation at the Application Layer. 603-607 - Anna Arestova, Lisa Maile, Nurbek Halikulov, Kai-Steffen Hielscher, Reinhard German:
Joint Task and Flow Scheduling for Time-Triggered and Strict-Priority Networks. 608-614 - Muhammad Ali, Iryna Andriyanova, Jérôme David:
VM consolidation considering cores, memory, load for energy-constrained data centers. 615-620 - Yoichiro Arii, Katsunori Yamaoka, Ken-ichi Baba:
A Two-stage Trunk Reservation Control Method corresponding to General Call Priority using Switch Outside Disaster Area. 621-625 - Surajit Bhattacherjee, Dipankar Pal:
IP Transformation Initiatives to Generate Scalable Functional Verification Collaterals for Smart Reusability and Reduced Effort for Sign-off. 626-629 - Anderson M. Da Rocha, Marcos Antonio De Oliveira, Pauletti José F. M., Gerson Geraldo H. Cavalheiro:
ABP vs. OTAA activation of LoRa devices: an Experimental Study in a Rural Context. 630-634 - Mustafa Tosun, Umut Can Çabuk, Orhan Dagdeviren, Yusuf Ozturk:
DAWN-Sim: A Distributed Algorithm Simulator for Wireless Ad-hoc Networks in Python. 635-639 - Sara Falleni, Tommaso Melodia, Stefano Basagni:
A Reservation-based Adaptive MAC Protocol for OFDM Physical Layers in Underwater Networks. 640-645 - Qilei Ren, Jun Zheng:
Simulation-based Performance Analysis of an NR-U and WiFi Coexistence System in the Presence of Hidden Nodes. 646-651 - Matteo Pagin, Tommaso Zugno, Marco Giordani, Louis-Adrien Dufrene, Quentin Lampin, Michele Zorzi:
5G NR-Light at Millimeter Waves: Design Guidelines for Mid-Market IoT Use Cases. 652-658 - Brigitte Jaumard, Adham Mohammed, Quang Anh Nguyen:
Decomposition Models for the Routing and Slot Provisioning Problem. 659-665 - Edoardo Biagioni:
Secure Anonymous Acknowledgments in a Delay-Tolerant Network. 666-671 - Intan Nabina Azmi, Yusnani Mohd Yussoff, Norashikin M. Thamrin, Fadhlan Hafizhelmi Kamaru Zaman, Nooritawati Md Tahir:
Flying Ad Hoc Coverage Area Mobility Model for Post-Disaster Area based on Two Drones. 672-676 - Jin Wang, Xiaofeng Zhong, Shidong Zhou:
Channel Allocation Algorithm Of Wi-Fi. 677-682 - Ramya Vasist, Vladica Sark, Meysam Goodarzi, Jesús Gutiérrez, Eckhard Grass:
Localization System Architecture for Enhanced Positioning in Industry 4.0 Applications. 683-688 - Xiaoqian Zhang, Allen Yang, Danlin Jia, Li Wang, Mahsa Bayati, Pradeep Subedi, Xuebin Yao, Bo Sheng, Ningfang Mi:
DIRS: Dynamic Initial Rate Setting in Congestion Control for Disaggregated Storage Systems. 689-693 - Daichi Shimizu, Norihiko Shinomiya:
A load balancing method using load factor on unsplittable flow edges in information and communication networks. 694-697 - Juzi Zhao, Varsha Kohirkar, Poonam Nigade, Ramanuja Kalkunte, Lenine Posham, Suresh Subramaniam:
Static Virtual Network Mapping With Advance Reservation In Elastic Optical Networks. 698-703 - Shuen-Yu Tsai, Wei-Chang Chen, Char-Dir Chung:
Iterative Symbol Decision Schemes for CP-OTFS on Static Multipath Channels. 704-709 - Salime Bameri, Khalid A. Almahorg, Ramy H. Gohary, Amr El-Keyi, Yahia Ahmed:
Uplink-to-Downlink Covariance Matrix Estimation in ULA-equipped FDD Massive MIMO Systems. 710-715
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.