default search action
23rd APNOMS 2022: Takamatsu, Japan
- 23rd Asia-Pacific Network Operations and Management Symposium, APNOMS 2022, Takamatsu, Japan, September 28-30, 2022. IEEE 2022, ISBN 978-4-885-52339-7
- Eishin Nagaoka, Ryohei Banno, Osamu Mizuno:
Implementation and Node Load Evaluation of Cloud-based Load Distribution Model in ICSN. 1-4 - Wan-Chien Yang:
Interoperability Testing Tool for Operations and Maintenance Interfaces of 5G Open RAN Base Station. 1-4 - Liang-Yu Chen, Chien Chen, Jyh-Cheng Chen, Pei-Yu Ho, Chia-Cheng Wang:
Design and Implementation of a Redundant Transmission Technique for Ultra-Reliable Communication in 5G Core Networks. 1-4 - Shingo Omata, Satoshi Kondoh:
Evaluation of the application of Seq2Seq towards the automatic derivation of a set of APIs that satisfy requirements from only ambiguous requirements. 1-4 - Seiji Sakuma, Ryosuke Sato, Mizuto Nakamura, Kyoko Yamagoe:
Method for Extracting Suspected Faulty Equipment Through Recursive Use of GNN Model. 1-6 - Junhyeong Ryu, Aeri Kim, Meryam Essaid, Hongtaek Ju:
Development of Wireshark Dissector for Ethereum Node Discovery Protocol/v5. 1-4 - Lirong Chen, Qiang Li:
How Does fake review Influence E-Commerce Platform Revenue? 1-4 - Yueh-Hsien Lin, Ting-Che Chuang, Yong-Zen Huang:
A 5G Synchronous Optical Networking Management System. 1-4 - Min Seok Kim, Jong Hoon Shin, Choong Seon Hong:
Network Intrusion Detection System using 2D Anomaly Detection. 1-4 - Yupeng Li, Qi Xie, Weixu Wang, Xiaobo Zhou, Keqiu Li:
GCN-Based Topology Design for Decentralized Federated Learning in IoV. 1-6 - Yuusuke Hashimoto, Yuya Seki, Kosuke Kubota, Akihiro Fujimoto, Yosuke Tanigawa, Yusuke Hirota, Hideki Tode:
Experimental Demonstration of Dynamic Service Function Chaining Based on Server Load Information in Optical Packet Switching Networks. 1-4 - Jihua Wu, Lei Zhang, Cong Liu, Qi Qi, Jingyu Wang, Tong Xu, Jianxin Liao:
Probability Correlation Learning for Anomaly Detection based on Distribution-Constrained Autoencoder. 1-6 - Juliana Liman, Li-Hsing Yen:
Reinforcement Learning for Channel and Radio Allocations to Wireless Backhaul Links. 1-4 - Ping-Chang Tsai, Pang-Chen Liu, Wen-Chien Chan, Fei-Hua Kuo, Kuo-Hsiang Lai:
Double-layer access network architecture for intelligent building services. 1-4 - Mir Muhammad Suleman Sarwar, Javier Jose Diaz Rivera, Muhammad Afaq, Wang-Cheol Song:
GENEVE@TEIN: A Sophisticated Tunneling Technique for Communication between OpenStack-based Multiple Clouds at TEIN. 1-4 - Meryam Essaid, Changhyun Lee, JungYeon Kim, Aeri Kim, Hongteak Ju:
Community Structure in Public Blockchain network. 1-6 - Pang-Wei Tsai, Aris Cahyadi Risdianto, Teck Chaw Ling:
Design, Development, and Operation of a SDN-Based BGP Playground for Networkers. 1-4 - You-Chiun Wang, Shang-Hao Wu:
Efficient Deployment of Virtual Network Functions to Achieve Load Balance in Cloud Networks. 1-6 - Haiyang Wang, Tongge Xu, Jian Yang, Lijin Wu, Liqun Yang:
Sessionvideo: A Novel Approach for Encrypted Traffic Classification via 3D-CNN Model. 1-6 - Ryosuke Sato, Mizuto Nakamura, Chiriro Sato, Seiji Sakuma, Motomu Nakajima:
Vectorization Method for Device Alarms Achieving High General Ability for AI Application to Network Operations. 1-6 - Haoru Su, Meng-Shiuan Pan, Shao-Wei Kao:
A Subchannel Collision Reduction Method for 3GPP C- V2X Mode 4 Network Based on Vehicular Moving Status. 1-6 - Jiacheng Guo, Jinbin Tu, Yun Wang:
Multi-network Transmission Mechanism in Narrow-band Weak Connection Environment. 1-4 - Shohei Maruyama, Yoshiaki Nishikawa, Takeo Onishi, Eiji Takahashi:
Identifying Root Cause of 5G Radio Quality Deterioration Using Machine Learning. 1-6 - Leyi Shi, Yifan Miao, Jiahao Ren, Huiwen Hou, Qiang Han:
A defense mechanism analysis for Dynamic Heterogeneous Redundancy. 1-4 - Yuya Hata, Naoki Hayashi, Yusuke Makino, Atsushi Takada, Kyoko Yamagoe:
Alarm Correlation Method Using Bayesian Network in Telecommunications Networks. 1-4 - Yun-Zhan Cai, Ting-Yu Lin, Yu-Ting Wang, Ya-Pei Tuan, Meng-Hsun Tsai:
Mitigating New-Flow Attack with SDNSnapshot in P4-based SDN. 1-4 - DongNyeong Heo, Doyoung Lee, Heegon Kim, Suhyun Park, Heeyoul Choi:
Reinforcement Learning of Graph Neural Networks for Service Function Chaining in Computer Network Management. 1-6 - Heng He, Zhezhe Peng, Xiaohu Zhou, Jia Wang:
LFOD: A Lightweight Flow Table Optimization Scheme in SDN Based on Flow Length Distribution in the Internet. 1-6 - Hyeonjun Jo, Kyungbaek Kim:
Security Service-aware Reinforcement Learning for Efficient Network Service Provisioning. 1-4 - Jiacong Li, Hang Lv, Bo Lei:
A Cross-Domain Data Security Sharing Approach for Edge Computing based on CP-ABE. 1-6 - Yun-Jie Li, Jhao-Yin Li:
An NLP-Based Model for the Dispatching Problem of Network Operation. 1-4 - Shinya Horimoto, Eiji Oki:
Virtual Network Function Placement Model Considering Both Service Delay and Availability. 1-6 - Cheng Zhang:
Time Based Concave Cache Pricing for Information-centric Networks. 1-4 - Jee-Tae Park, Ui-Jun Baek, Myung-Sup Kim, Min-Seong Lee, Chang-Yui Shin:
Rule-based User Behavior Detection System for SaaS Application. 1-4 - Talha Ahmed Khan, Waleed Akbar, Muhammad Afaq, Wang-Cheol Song:
Proactive Intent Policy Activation: An ML-Assisted Resource Forecasting Approach. 1-6 - Masahiro Hayashi:
End-to-end Method to Evaluate One-to-all Reliabilities of Telecommunications Networks. 1-4 - Sungwoong Yeom, Shivani Sanjay Kolekar, Kyungbaek Kim:
Effective Edge Server Placement for Efficient Federated Clustering. 1-4 - Jichang Wang, Gaofeng Lv, Zhongpei Liu, Xiangrui Yang:
QUIC Cryption Offloading Based on NanoBPF. 1-4 - Sheikh Salman Hassan, Dong Uk Kim, Seok Won Kang, Choong Seon Hong:
Energy-Efficient IoE Networks Deployment for Future Smart Cities. 1-6 - Beom-Su Lee, Jong-Wouk Kim, Mi-Jung Choi:
Experimental Comparison of Hybrid Sampling Methods for an Efficient NIDS. 1-4 - Javier Jose Diaz Rivera, Talha Ahmed Khan, Waleed Akbar, Muhammad Afaq, Wang-Cheol Song:
Secure enrollment token delivery for Zero Trust networks using blockchain. 1-6 - Linwei Yang, Jing Li, Kuanzhi Shi, Songlin Yang, Qingfu Yang, Jiangang Sun:
MicroMILTS: Fault Location for Microservices Based Mutual Information and LSTM Autoencoder. 1-6 - Kitae Kim, Choong Seon Hong:
Pruned Autoencoder based mmWave Channel Estimation in RIS-Assisted Wireless Networks. 1-4 - Namjin Seo, DongNyeong Heo, Jibum Hong, Heegon Kim, Jae-Hyoung Yoo, James Won-Ki Hong, Heeyoul Choi:
Updating VNF deployment with Scaling Actions using Reinforcement Algorithms. 1-4 - Luyao Zou, Md. Shirajum Munir, Ye Lin Tun, Choong Seon Hong:
Clustering-Based Serverless Edge Computing Assisted Federated Learning for Energy Procurement. 1-6 - Cheng-Yu Wu, Li-Hsing Yen, Ping-Chun Hsieh, Chien-Chao Tseng:
Deterministic Bandwidth-Based Packet-Level Traffic Splitting for Datacenter Networks. 1-6 - Kiwook Kim, JaiSeung Kwak, Woojin Seok:
Milimeter Wave Short Distance Communication for Scientific Research Equipment. 1-3 - Kuan-Heng Shen, Seng-Da Tu, Jian-Kai Huang:
An Optical DWDM Transmission Architecture for High Capacity Based on Heterogeneous Submarine Cable System. 1-4 - Shuangqing Li, Zhihao Li, Weiqi Zhang:
A Dynamic Association Strategy for Controller Load Balancing in Software-Defined Networks. 1-6 - Rong Xie:
Construction of Mobile Agents' Dynamic Collaboration Network for Unmanned Systems. 1-4 - Raihaanjun Kushiyama, Ryo Yamamoto, Satoshi Ohzahata:
VNE-HAGBE: A Hybrid Approach to Improve VNR Request Acceptance Rate for Wireless Virtual Network Embedding. 1-4 - Kuan-Hsiang Chen, Huai-Sheng Huang:
Meta-NWDAF: A Meta-Learning based Network Data Analytic Function for Internet Traffic Prediction. 1-4 - Hsing-Chen Chi, Wu-Hsien Chang, Min-Chi Tseng, Yu-Ping Yu, Kuo-Hsiang Lai:
SDN-enabled Framework for Resilient Traffic Routing in 5G Networks. 1-4 - Feng Jiang, Yongyang Cheng, Zhao Hui, Boqin Qin, Ruibo Yan:
A Data Availability Modeling Approach Towards Cloud Storage Systems Based on Client Perspective. 1-4 - Takuma Yamazaki, Eri Hosonuma, Taku Yamazaki, Takumi Miyoshi:
Fast Confirmation of Link Symmetry in Backoff-based Opportunistic Routing. 1-4 - Nway Nway Ei, Ji Su Yoon, Choong Seon Hong:
Energy-Aware Task Offloading and Resource Allocation in Space-Aerial-Integrated MEC System. 1-6 - Ming-Yen Wu, Jiun-Cheng Huang, Yuan-Mao Hung, Cheng-Yi Chien, Jack Shi-Jie Luo, Shuo-Peng Liang:
The Edge Cloud Implementation and Application of Transnational Smart Factory of 5G Private Network. 1-6 - Takashi Satake, Yoshiaki Narusue, Hiroyuki Morikawa:
An Effective Location Registration Method Under Many User Equipments in IoT. 1-4 - Yanchao Sun, Yuanfeng Han, Yue Zhang, Mingsong Chen, Shui Yu, Yimin Xu:
DDoS Attack Detection Combining Time Series-based Multi-dimensional Sketch and Machine Learning. 1-6 - Waleed Akbar, Javier Jose Diaz Rivera, Talha Ahmed Khan, Muhammad Afaq, Wang-Cheol Song:
Software Defined Perimeter Monitoring and Blockchain-Based Verification of Policy Mapping. 1-4 - Haruka Osanai, Masaru Sakai, Sho Kanemaru, Kensuke Takahashi, Satoshi Kondou:
Study of Information Identification Technology Considering of Overlapping and Synonyms Words in Information Distribution. 1-4 - Ui-Jun Baek, Boseon Kim, Jee-Tae Park, Jeong-Woo Choi, Myung-Sup Kim:
MISCNN: A Novel Learning Scheme for CNN-Based Network Traffic Classification. 1-6 - Anish Hirwe, Nikita Makharia, Tanmay Renugunta, Kotaro Kataoka:
ResiConnect - Fault Detection and Resilience for Multi-Stage AWGR-based Optical Networks. 1-6 - Shengchao Deng, Hui Gao, Xin Su, Bei Liu:
Intelligent Representation of Wireless Network States: A Multi-Layer Correlation Approach. 1-4 - Chia-Chun Yen, Yu-Chen Cheng, Guan-Wen Chen, Tsì-Uí Ik:
Script-based traffic signal management for arterial road section group on Mobile. 1-4 - Guan-Wen Chen, Yi-Hsiu Lin, Min-Te Sun, Tsì-Uí Ik:
Managing Edge AI Cameras for Traffic Monitoring. 1-4 - Lei Zhang, Hui Li, Jingguo Ge, Yulei Wu, Liangxiong Li, Bingzhen Wu, Haojiang Deng:
EDP: An eBPF-based Dynamic Perimeter for SDP in Data Center. 1-6 - Hua Wu, Yuping Sui, Guang Cheng, Xiaoyan Hu, Qinghua Shang:
Service classification of high-speed network traffic based on Two-Stage Clustering. 1-6 - Tomoki Takahashi, Takehiro Sato, Eiji Oki:
Simultaneous Update Model of Multiple Service Function Chains Guaranteeing State Consistency. 1-4 - Tongyan Wei, Ying Wang, Wenjing Li:
The Deep Flow Inspection Framework Based on Horizontal Federated Learning. 1-4 - JungYeon Kim, Meryam Essaid, Hongtaek Ju:
Inter-Blockchain Communication Message Relay Time Measurement and Analysis in Cosmos. 1-6 - Sangwoo Ryu, Kyungchan Ko, James Won-Ki Hong:
Stabilizing Deep Reinforcement Learning Model Training for Video Conferencing. 1-6 - Xinyu Zhu, Yue Zhang:
Machine-learning-assisted Traffic Classification of User Activities at Programmable Data Plane. 1-4 - Asif Mehmood, Talha Ahmed Khan, Muhammad Afaq, Wang-Cheol Song:
Multi-Class Traffic Density Forecasting in IoV using Spatio-Temporal Graph Neural Networks. 1-6 - Chien-Liang Kuo, Jin-Wei Kuo, Xuan-Zhe Chen, Li-Hsing Yen:
Learning-Based Algorithms for Channel Allocations in Wireless Mesh Network. 1-4 - Kai Zhang, Libin Liu, Lizhuang Tan, Ye Zhang, Wei Gao, Wei Zhang:
Efficient Clustered Network Telemetry based on Failure Awareness. 1-4 - Loc X. Nguyen, Luyao Zou, Huy Q. Le, Choong Seon Hong:
An Encouraging Design for Data Owners to Join Multiple Co-existing Federated Learning. 1-4 - Feng Jiang, Yongyang Cheng, Boqin Qin, Zhao Hui:
Who owns the address? A performant block storage model for hybrid cloud. 1-6 - Kyungchan Ko, Taeyeol Jeong, Jongsoo Woo, James Won-Ki Hong:
An Analysis of Crypto Gas Wars in Ethereum. 1-6 - Kazuki Tanabe, Takayuki Kuroda, Kozo Satoda:
FACTORY: A Fully Automated Evaluation Platform for ICT System Components. 1-4 - Yu Min Park, Sheikh Salman Hassan, Choong Seon Hong:
Maximizing Throughput of Aerial Base Stations via Resources-based Multi-Agent Proximal Policy Optimization: A Deep Reinforcement Learning Approach. 1-4 - Liang-Jian Deng, Yubing Chen, Lichen Zhang:
Construction Method of Overlay Network for Cyber-Physical System. 1-4 - Yu-Hsien Huang, Yung-Chang Huang, Hao Syuan Lee, Tsì-Uí Ik, Chih-Chuan Wang:
S2-Labeling: Shot-By-Shot Microscopic Badminton Singles Tactical Dataset. 1-6 - Ryo Uchida, Fumihiro Yokose, Taisuke Wakasugi, Kimio Tsuchikawa, Haruo Oishi, Yuki Urabe:
Applicability Evaluation of Task Clustering Method Using Co-occurrence of Operations. 1-4 - Bo Wu, Qian Xu, Zhenjie Yao, Yanhui Tu, Yixin Chen:
VAE-TCN hybrid model for KPI Anomaly Detection. 1-6 - Keigo Akahoshi, Eiji Oki:
Service Deployment with Per-Flow-Priority-Based Virtual Network Function Resizing. 1-6 - Youqiong Zhuang, Hua Wu, Songtao Liu, Guang Cheng, Xiaoyan Hu:
HDS: A Hierarchical Scheme for Accurate and Efficient DDoS Flooding Attack Detection. 1-6 - Min-Han Hung, Che-Chun Teng, Chin-Ping Chuang, Chi-Sheng Hsu, Jai-Wei Gong, Mei-Chun Chen:
A SDN Controller Monitoring Architecture for 5G Backhaul Networks. 1-4 - Makoto Misumi, Masashi Naoe, Noriaki Kamiyama:
Activity-Monitoring System for Harmful Wildlife Using WuR Multi Stage Sensor Array. 1-4 - Ryosuke Sato, Yoshikazu Nakamura, Tomonari Fujimoto, Yuji Shinozaki, Motomu Nakajima:
Methods for Providing Resilience from Electric Power Side to Communications Network Side. 1-4 - Badis Hammi, Yacine Mohamed Idir, Rida Khatoun:
A machine learning based approach for the detection of sybil attacks in C-ITS. 1-4 - Khizar Abbas, Jae-Hyoung Yoo, James Won-Ki Hong:
Adaptive Ensemble Learning-based Network Resource Workload Prediction for VNF Lifecycle Management. 1-4 - Yannian Niu, Minghua Zhu:
Assembler: A Throughput-Efficient Module for Network Driver of Edge Computing Gateways. 1-4 - Zhijiao Xiao, Song Hu:
DScaler: A Horizontal Autoscaler of Microservice Based on Deep Reinforcement Learning. 1-6 - Yu Zhang, Xiangyu Bai, Lei Yao:
Research on Vertical Handover Strategy in Heterogeneous Vehicular Networks on Expressway. 1-4 - Manami Nakahara, Noriaki Kamiyama:
Detecting Crossfire-Attack Hosts in Search Phase. 1-4 - Takahiro Hirayama, Masahiro Jibiki:
SFC Path Selection based on Combination of Topological Analysis and Demand Prediction. 1-4 - Kazuhiko Kinoshita, Yoshiki Aihara, Masami Kishida:
A Distributed Wi-Fi Channel Assignment Method with Channel Bonding Considering the Number of Associated Users. 1-4 - Sajida Karim, Hui He:
Optimization: data-driven management using deep learning in cloud computing. 1-4
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.