default search action
31st ICCCN 2022: Honolulu, HI, USA
- 31st International Conference on Computer Communications and Networks, ICCCN 2022, Honolulu, HI, USA, July 25-28, 2022. IEEE 2022, ISBN 978-1-6654-9726-8
- Ronghua Xu, Yu Chen, Xiaohua Li, Erik Blasch:
A Secure Dynamic Edge Resource Federation Architecture for Cross-Domain IoT Systems. 1-7 - Zahra Jadidi, Shantanu Pal, Nithesh Nayak K, Arawinkumaar Selvakkumar, Chih-Chia Chang, Maedeh Beheshti, Alireza Jolfaei:
Security of Machine Learning-Based Anomaly Detection in Cyber Physical Systems. 1-7 - Miguel Belém, Pedro Fouto, Taras Lykhenko, João Leitão, Nuno M. Preguiça, Luís Rodrigues:
Engage: Session Guarantees for the Edge. 1-10 - Yujian Zhang, Mingde Li, Fei Tong:
An Energy-Efficient Load Balancing Scheme in Heterogeneous Clusters by Linear Programming. 1-10 - Rajkumar Buyya, Krishna Kant, Ting He:
Conference Information: Message from the Program Co-Chairs. 1-2 - Stuart Baxley, Deniz Gurkan, Hamidreza Validi, Illya V. Hicks:
Graph Representation of Computer Network Resources for Precise Allocations. 1-10 - Gordon Werner, Shanchieh Yang:
Discovery of Rare yet Co-occurring Actions with Temporal Characteristics in Episodic Cyberattack Streams. 1-10 - Yi Yue, Wencong Yang, Xuebei Zhang, Rong Huang, Xiongyan Tang:
A QoS Guarantee Mechanism for Service Function Chains in NFV-enabled Networks. 1-2 - Tripti Samal, Rudra Dutta, Ismail Güvenç, Mihail L. Sichitiu, Brian A. Floyd, Thomas Zajkowski:
Automating Operator Oversight in an Autonomous, Regulated, Safety-Critical Research Facility. 1-10 - Yi Qin, Tianming Zheng, Yue Wu, Futai Zou:
Tracing Tor Hidden Service Through Protocol Characteristics. 1-9 - Nadia Niknami, Abdalaziz Sawwan, Jie Wu:
A Defense-Attack Game under Multiple Preferences and Budget Constraints with Equilibrium. 1-10 - Sheng Pan, Xin Ming Zhang, Dan Keun Sung:
Intelligent Reflecting Surface-Aided Centralized Scheduling for mmWave V2V Networks. 1-10 - Ningchun Liu, Shuai Gao, Teng Liang, Xindi Hou, Sajal K. Das:
An ICN-based Secure Task Cooperation Scheme in Challenging Wireless Edge Networks. 1-7 - Weixiang Chen, Bo Gu, Xiaojun Tan, Chenhua Wei:
Radio Resource Selection in C-V2X Mode 4: A Multiagent Deep Reinforcement Learning Approach. 1-8 - Hasibul Jamil, Lavone Rodolph, Jacob Goldverg, Tevfik Kosar:
Energy-Efficient Data Transfer Optimization via Decision-Tree Based Uncertainty Reduction. 1-10 - Haolin Tang, Salih Sarp, Yanxiao Zhao, Wei Wang, Chunsheng Xin:
Security and Threats of Intelligent Reflecting Surface Assisted Wireless Communications. 1-9 - Junyang Shi, Mo Sha:
Localizing Campus Shuttles from One Single Base Station Using LoRa Link Characteristics. 1-10 - Diego O. Rodrigues, Torsten Braun, Guilherme Maia, Leandro Villas:
Mobility-aware Software-Defined Service-Centric Networking. 1-10 - Simon Keller, Rainer Mueller:
Server Workload Assignment for Real-Time Range Queries in Adaptive Quad Streaming Sensor Environments. 1-10 - Fangping Lan, Sanchari Biswas, Bin Gui, Jie Wu, Anduo Wang:
Design and Implementation of a Strong Representation System for Network Policies. 1-10 - Fengjiao He, Wenchuan Yang, Baojiang Cui, Jia Cui:
Intelligent Fuzzing Algorithm for 5G NAS Protocol Based on Predefined Rules. 1-7 - Lucas Bréhon-Grataloup, Rahim Kacimi, André-Luc Beylot:
Context-aware task offloading with QoS-provisioning for MEC multi-RAT vehicular networks. 1-9 - Shantanu Pal, Ambrose Hill, Tahiry M. Rabehaja, Michael Hitchens:
VeriBlock: A Blockchain-Based Verifiable Trust Management Architecture with Provable Interactions. 1-7 - Sunghyun Moon, Youngho Kim, Hyunjong Lee, Donghoon Kim, Doosung Hwang:
Evolved IoT Malware Detection using Opcode Category Sequence through Machine Learning. 1-7 - Kasidis Arunruangsirilert, Bo Wei, Hang Song, Jiro Katto:
Performance Evaluation of Low-Latency Live Streaming of MPEG-DASH UHD video over Commercial 5G NSA/SA Network. 1-6 - Yucheng Xie, Ruizhe Jiang, Xiaonan Guo, Yan Wang, Jerry Cheng, Yingying Chen:
mmFit: Low-Effort Personalized Fitness Monitoring Using Millimeter Wave. 1-10 - Ziad Kassam, Paulo Sérgio Almeida, Ali Shoker:
Exon: An Oblivious Exactly-Once Messaging Protocol. 1-10 - Fiona Carroll, Rhyd Lewis:
Internet Security Aesthetics: Can internet transparency afford social trust? 1-2 - Matthias Grundmann, Otto von Zastrow-Marcks, Hannes Hartenstein:
On the Applicability of Payment Channel Networks for Allocation of Transport Ticket Revenues. 1-7 - Jie Lu, Hongchang Chen, Zhen Zhang:
LUSketch: A Fast and Precise Sketch for top-k Finding in Data Streams. 1-10 - Xin Xu, Wei Wang, Jingqiang Lin, Zhen Yang, Haoling Fan, Qiongxiao Wang:
LiTIV: A Lightweight Traceable Data Integrity Verification Scheme for Version Control Systems. 1-10 - Mert Cevik, Michael J. Stealey, Cong Wang, Jeronimo Bezerra, Julio Ibarra, Vasilka Chergarova, Heidi Morgan, Yufeng Xin:
Towards Production Deployment of a SDX Control Framework. 1-10 - Jim Martin, Manveen Kaur, Long Cheng, Abolfazi Razi:
Towards Connecting the Disconnected Internet. 1-7 - Kamrul Hasan, Sachin Shetty, Tariqul Islam, Imtiaz Ahmed:
Predictive Cyber Defense Remediation against Advanced Persistent Threat in Cyber-Physical Systems. 1-10 - Wenxu Jia, Yipeng Wang, Yingxu Lai, Huijie He, Ruiping Yin:
FITIC: A Few-shot Learning Based IoT Traffic Classification Method. 1-10 - Samir Si-Mohammed, Thomas Begin, Isabelle Guérin Lassous, Pascale Vicat-Blanc:
ADIperf: A Framework for Application-driven IoT Network Performance Evaluation. 1-8 - Zhewei Tang, Tong Zhang, Kun Zhu:
ORSM: Online Routing and Scheduling Mechanism for Mix-flows in Data Center Networks. 1-10 - Enrique Rodicio, Deng Pan, Jason Liu, Bin Tang:
Achieving High End-to-End Availability in VNF Networks. 1-10 - Tianxiang Tan, Yibo Wu, Zida Liu, Guohong Cao:
Worker Selection for On-Demand Crowdsourcing. 1-10 - Li-Hsing Yang, Shin-Shan Huang, Tsai-Ling Cheng, Yi-Ching Kuo, Jian-Jhih Kuo:
Socially-aware Collaborative Defense System against Bit-Flip Attack in Social Internet of Things and Its Online Assignment Optimization. 1-10 - Najmeh Abedzadeh, Matthew Jacobs:
Using Markov Chain Monte Carlo Algorithm for Sampling Imbalance Binary IDS Datasets. 1-7 - Danyang Zheng, Chengzong Peng, Ben Wang, Xiaojun Cao:
Towards Deterministic Fault-Tolerant Service Function Slicing in Edge Networks. 1-8 - Giuseppe Tricomi, Luca D'Agati, Zakaria Benomar, Francesco Longo, Giovanni Merlino, Antonio Puliafito:
Interfacing Intelligent Personal Assistant to SDI/O with one click. 1-8 - Zewen Huang, Kui Wu, Shengqiang Huang, Yang Zhou, Ronnie Salvador Giagone:
Automatic Field Extraction of Extended TLV for Binary Protocol Reverse Engineering. 1-10 - Hui Zhuang, Tao He, Qun Niu, Ning Liu:
Efficient Indoor Localization with Multiple Consecutive Geomagnetic Sequences. 1-9 - Cameron Hickert, Ali Tekeoglu, Joseph Maurio, Ryan Watson, Daniel P. Syed, Jeffrey S. Chavis, Gill Brown, Tamim Sookoor:
Distributed Ledgers for Enhanced Machine-to-Machine Trust in Smart Cities. 1-7 - Prasesh Adina, Muhammad Shahzad:
A Distributed & Lightweight Framework to Secure IoT Networks Against Network Layer Attacks. 1-9 - Caroline Rublein, Fidan Mehmeti, Taha D. Gunes, Sebastian Stein, Thomas F. La Porta:
Scalable Resource Allocation Techniques for Edge Computing Systems. 1-10 - Shivam Garg, Nandini Venkatraman, Elizabeth Serena Bentley, Sunil Kumar:
An Asynchronous Multi-Beam MAC Protocol for Multi-Hop Wireless Networks. 1-9 - Purboday Ghosh, Shashank Shekhar, Yashen Lin, Ulrich Münz, Gabor Karsai:
Peer-to-Peer Communication Trade-Offs for Smart Grid Applications. 1-10 - Muztaba Fuad, Debzani Deb, Brixx-John G. Panlaqui, Charles F. Mickle:
Using RSSI to Form Path in an Indoor Space. 1-2 - Adam Duby, Teryl Taylor, Gedare Bloom, Yanyan Zhuang:
Evaluating Feature Robustness for Windows Malware Family Classification. 1-10 - Kaizhong Jin, Xiang Cheng, Yuchao Ma:
Differentially Private Distributed Multi-Task Relationship Learning. 1-10 - Mirko Zichichi, Luca Serena, Stefano Ferretti, Gabriele D'Angelo:
DLT-based Data Mules for Smart Territories. 1-7 - Xuanli Lin, Yinxin Wan, Kuai Xu, Feng Wang, Guoliang Xue:
Inferring User Activities from IoT Device Events in Smart Homes: Challenges and Opportunities. 1-10 - Thilina N. Weerasinghe, Vicente Casares Giner, Indika A. M. Balapuwaduge, Frank Y. Li, Marius-Constantin Vochin:
A Pseudo-Bayesian Subframe based Framework for Grant-Free Massive Random Access in 5G NR Networks. 1-7 - Kealan Dunnett, Shantanu Pal, Zahra Jadidi, Guntur Dharma Putra, Raja Jurdak:
A Democratically Anonymous and Trusted Architecture for CTI Sharing using Blockchain. 1-7 - Dongxin Liu, Tarek F. Abdelzaher, Tianshi Wang, Yigong Hu, Jinyang Li, Shengzhong Liu, Matthew Caesar, Deepti Kalasapura, Joydeep Bhattacharyya, Nassy Srour, Jae Kim, Guijun Wang, Greg Kimberly, Shouchao Yao:
IoBT-OS: Optimizing the Sensing-to-Decision Loop for the Internet of Battlefield Things. 1-10 - Jasper Sha, Nathaniel Basara, Joseph Freedman, Hailu Xu:
FLOR: A Federated Learning-based Music Recommendation Engine. 1-2 - Zhongdong Liu, Bin Li, Zizhan Zheng, Y. Thomas Hou, Bo Ji:
Towards Optimal Tradeoff Between Data Freshness and Update Cost in Information-update Systems. 1-10 - Xiaogang Dong, Zheng Wan, Changshou Deng:
Optimization of Wireless Power Transfer for Wireless-Powered Mobile Edge Computing. 1-7 - Neha Joshi, Rishabh Kumar, Abhishek Thakur, A. Antony Franklin, N. V. Narendra Kumar:
PPAS: Privacy-preserving Resource Discovery for Multi-domain SFC orchestration. 1-7 - Luca Barsellotti, Faris Alhamed, Juan Jose Vegas Olmos, Francesco Paolucci, Piero Castoldi, Filippo Cugini:
Introducing Data Processing Units (DPU) at the Edge [Invited]. 1-6 - Hua Wu, Chengfei Zhu, Guang Cheng, Xiaoyan Hu:
Real-time Application Identification of RTC Media Streams via Encrypted Traffic Analysis. 1-10 - Qinghua Sima, Guoju Gao, He Huang, Yu-e Sun, Yang Du, Xiaoyu Wang, Jie Wu:
Multi-Armed Bandits Based Task Selection of A Mobile Crowdsensing Worker. 1-10 - Khandaker Mamun Ahmed, Samuel Muvdi, Jason Liu, M. Hadi Amini:
A Federated Learning Framework for Automated Decision Making with Microscopic Traffic Simulation. 1-9 - Jiacong Li, Hang Lv, Bo Lei, Yunpeng Xie:
A Computing Power Resource Modeling Approach for Computing Power Network. 1-2 - Haoran Jiao, Qing Wang, Zhaoshan Fan, Junrong Liu, Dan Du, Ning Li, Yuling Liu:
DGGCN: Dictionary based DGA detection method based on DomainGraph and GCN. 1-10 - Thomas Neumann, Kyle Welsh, Caden Perez, Kewei Sha, Yalong Wu:
R2 P3: Renewal-Reward Process-Based Password Protection in Internet of Things. 1-7 - Luis Felipe Florenzan Reyes, Francesco Smarra, Roland Ryf, Tetsuya Hayashi, Andrea Marotta, Cristian Antonelli, Alessandro D'Innocenzo:
Data-driven efficient digital signal processing over a field trial space-division multiplexed fiber-optic transmission. 1-8 - Aixin Xu, Shimin Sun, Ze Wang, Xiaofan Wang, Li Han:
Multi-Controller Load Balancing Mechanism Based on Improved Genetic Algorithm. 1-8 - Changwei Wan, Songtao Guo, Yuanyuan Yang:
Deep Reinforcement Learning Based Computation Offloading in SWIPT-assisted MEC Networks. 1-10 - Rhyd Lewis, Fiona Carroll:
Exact Algorithms for Finding Fixed-Length Cycles in Edge-Weighted Graphs. 1-2 - Zakaria Ait Hmitti, Hamza Ben Ammar, Ece Gelal Soyak, Youcef Kardjadja, Sepideh Malektaji, Soukaina Ouledsidi Ali, Marsa Rayani, Muhammad Saqib, Seyedreza Taghizadeh, Wessam Ajib, Halima Elbiaze, Özgür Erçetin, Yacine Ghamri-Doudane, Roch H. Glitho:
SCORING: Towards Smart Collaborative cOmputing, caching and netwoRking paradIgm for Next Generation communication infrastructures. 1-10 - Marek Michalski:
Elements of Architecture of Simulator Realized on NetFPGA10G Card. 1-2 - Arvin Hekmati, Eugenio Grippo, Bhaskar Krishnamachari:
Neural Networks for DDoS Attack Detection using an Enhanced Urban IoT Dataset. 1-8 - Ying Li, Changling Li, Jiyao Chen, Christine Roinou:
Energy-Aware Multi-Agent Reinforcement Learning for Collaborative Execution in Mission-Oriented Drone Networks. 1-9
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.