default search action
NaNA 2022: Urumqi, China
- International Conference on Networking and Network Applications, NaNA 2022, Urumqi, China, December 3-5, 2022. IEEE 2022, ISBN 978-1-6654-6131-3
- Zening Li, Pin-Han Ho, Yan Jiao, Bingbing Li, Yuren You:
Design of an OTN-based Failure/Alarm Propagation Simulator. 1-5 - Yichuan Wang, Yanhua Feng, Yanning Du, Xinhong Hei, Yuying Tian, Xiangjie Cui:
Block-Streaming Service Loading Optimization of Android Dalvik Executable File for Cloud-End Collaboration. 1-6 - Yongqiang Xia, Luping Tang, Hairui Wang, Yijun Wang, Jialong Hou:
A Resource Allocation Scheme Based on Memetic Algorithm for D2D Communication. 1-6 - Xiaofeng Rong, Chang Wang, Zijian Cao:
A LSTM Forecasting Model Based on ASSOMA. 1-6 - Sugang Ma, Ningbo Li, Guansheng Peng, Yanping Chen, Wang Ying, Zhiqiang Hou:
Object detection algorithm based on cosine similarity IoU. 1-6 - Kaijun Wu, Bo Tian, Xue Wang, Qi Zhao:
A secure and anonymous communication scheme based on Internet public service environment. 1-4 - Cheng Sheng, Haizheng Yu:
An optimized prediction algorithm based on XGBoost. 1-6 - Shi Xiangnan, Yanbo Yang, Qiwei Xu, Teng Li, Jiawei Zhang:
Research on grassland grazing environment planning based on GA-ACO hybrid algorithm. 1-6 - Ruixin Li, Zhihong Liu, Yong Zeng, Jianfeng Ma:
Representing the Topology of Complex Networks Based on Graph Embedding. 1-7 - Shitong Fu, Zhiqiang Yao:
Privacy risk estimation of online social networks. 1-8 - Sandhya Sharma, Kazuhiko Sato, Bishnu Prasad Gautam:
Bioacoustics Monitoring of Wildlife using Artificial Intelligence: A Methodological Literature Review. 1-9 - Yeqiu Xiao, Yichuan Wang, Wenjiang Ji, Lei Zhu, Xinhong Hei:
Effective Secrecy Throughput Analysis for Communication Systems with a DF Satellite Relay. 1-5 - Haining Meng, Jiawei Zhang, Yi Zheng, Wenjiang Ji, Xinyu Tong, Xinhong Hei:
Track Irregularity Prediction Based on DWT-DLSTM Model. 1-5 - Aiguo Wang, Yue Meng, Liang Zhao, Jinjun Liu, Guilin Chen:
Comparison of Feature Extraction Techniques for Ambient Sensor-based In-home Activity Recognition. 1-6 - Xinghui Zhu, Yalong Lv, Jia Liu, Xuewen Dong, Lin Li, Jiandong Wang:
A Study of Service Registration and Discovery Techniques in Microservice Architecture. 1-6 - Fan Fan, Hongbin Zhang, Dongmei Zhao, Yanxia Wang, Bin Liu, Jian Liu:
Trust Evaluation Model of Social Internet of Things Based on Multi-relationships. 1-6 - Yihuai Yang, Shikai Shen, Yumei She, Wu Wang, Bin Yang, Yangshui Gao:
On IRS-Aided Covert Communications of D2D-Enabled Cellular Networks. 1-6 - Shengli Liao, Yumei Zhang, Honghong Yang, Xuening Liao:
Spatiotemporal Emotion Recognition Method Based on EEG Signals During Music Listening Using 1D-CNN & Stacked-LSTM. 7-12 - Yifan Li, Chunjie Cao, Hong Zhang, Xiuhua Wen, Yang Sun, Keqi Zhan:
Feature Extraction and Identification of Specific Radiation Sources Based on Axial Integral Bispectrum and Deep Residual Shrinkage Network. 13-18 - Yi Tian, Lin Zhang:
Joint Channel Assignment and Routing Using Partially Overlapped Channels in Multi-radio Multi-channel Wireless Mesh Networks. 19-22 - Zhen Jia, Lisheng Ma, Shigen Shen, Xiaohong Jiang:
Capacity Analysis of Diffusive Molecular Communication System with an Interfering Receiver. 23-28 - Dingyang Liang, Jianing Sun, Yizhi Zhang, Jun Yan:
Lightweight Neural Network-based Web Fingerprinting Model. 29-34 - Zewei Guo, Shuangrui Zhao, Jiandong Wang, Haipeng Lit, Yulong Shen:
Optimal Location Design for UAV Covert Communications with a Full-Duplex Receiver. 35-40 - Junning Zhu, Xuening Liao, Zhenqiang Wu:
Channel Capacity Analysis for Diffusive Molecular Communication with a Partly Covered Comprehensive Reactive Receiver. 41-46 - Wu Wang, Sibo Wang, Kaiguo Qian, Shaojun Yu, Bin Yang:
Covert Monitoring for D2D-enabled Cellular Networks. 47-51 - Yuanxin Yan, Yang Xu, Li Wang, Jianbo Shao, Honggang He, Shanshan Zhang:
Paris Subway Pricing-based Link Selection in Air-Space-Ground Networks. 52-57 - Sunyan Hong, Shikai Shen, Bin Yang, Jun He, Fei Deng, Yunfei Zhang, Qinbiao Yang:
Cooperative Jamming for Eavesdropping Surveillance in Wireless Networks. 58-61 - Kaixin Li, Ke Zhao, Muhammad Fawad Khan, Pin-Han Ho, Limei Peng:
UAV-mounted Intelligent Reflecting Surface (IRS) MISO Communications. 62-66 - Haifeng Peng, Chunjie Cao, Yang Sun, Haoran Li, Xiuhua Wen:
Blind Identification of Channel Codes under AWGN and Fading Conditions via Deep Learning. 67-73 - Yasheng Zhou, Li Yang, Zhixin Wang, Guohao Li, Xuemei Ning:
DNS Attack Detection Based on Multi-Dimensional Fusion Model. 74-81 - Yongjie Zhou, Jinbo Xiong, Renwan Bi, Youliang Tian:
Secure YOLOv3-SPP: Edge-Cooperative Privacy-preserving Object Detection for Connected Autonomous Vehicles. 82-89 - Jiawei Du, Yang Kai, Zhentao Huang, Lingjie Jiang, Huang Lei, Haixia Yu:
Research on Intrusion Detection Algorithm Based on Optimized CNN-LSTM. 96-101 - Yiming Pan, Zhen Shao, Goujin Huang, Yiming Li, Fangfang Zuo:
The test and evaluation method for the effect of WLAN network quality on hosted services. 102-106 - Han Yu, Jie Zhan, Libin Jiao, Jun-mei Han:
Load balancing strategy for wireless multi-hotspot networks based on improved NSGA-II algorithm. 107-112 - Shenghui Zhao, Bao Gui, Guilin Chen, Bin Yang:
On Rate Fairness Maximization of Vehicular Networks: A Deep Reinforcement Learning Approach. 113-118 - Yiting Huang, Shujie Yang, Tengchao Ma, Zhaoyang Liu, Zhongyi Ding, Qingzhao An:
A Low-cost Active Defense Mechanism against DDoS Attacks in Streaming Media Scenarios. 130-135 - Wenning Lu, Bingbing Li:
An Energy-Efficient and Obstruction-Free Design Scheme for FSO-based Data Center Network. 136-143 - Lei Yu, Shuai Gao, Ningchun Liu, Hongchao Wang, Wei Su:
A Cache-enabled NDN Forwarding Plane based on Programmable Switches. 152-156 - Wenyong Yuan, Ruifeng Li, Zhengge Yi, Pei Chen, Haibin Yang, Xiaoyuan Yang:
Secure Cloud Data Storage with Selecting Auditors. 157-162 - Yuan Cheng, Shuai Gao, Xindi Hou:
A Secure Authentication Mechanism for Multi-Dimensional Identifier Network. 163-168 - Zuobin Ying, Yangzong Zhang, Shengmin Xu, Guowen Xu, Wenjian Liu:
Anteater: Malware Injection Detection with Program Network Traffic Behavior. 169-175 - Dapeng Huang, Haoran Chen, Kai Wang, Chen Chen, Weili Han:
A Traceability Method for Bitcoin Transactions Based on Gateway Network Traffic Analysis. 176-183 - Wanqi Zhao, Haoyue Sun, Dawei Zhang:
Research on DDoS Attack Detection Method Based on Deep Neural Network Model inSDN. 184-188 - Pin Chen, Naijie Gu, Daxing Liu, Qianqian Yu:
A Game Theory Perspective on TCP Congestion Control Evaluation. 189-193 - Qi-Pei Qian, Hui Li, Yuefeng Ji, Qiang Wu, Yan Shao, Zheng-da Ma:
Planning Method of PON Based on Traffic Analysis. 194-197 - Xinghong Jiang, Xuan Li, Chenyang Lv, Yong Ma, Yulong Shen, Meibin He, Guozheng Li:
An Encrypted Abnormal Stream Detection Method Based on Improved Skyline Computation. 198-204 - Yuxiang Chen, Yao Hao, Zhongqiang Yi, Xiaoyu Guo, Chunxiang Xu:
Ciphertext storage scheme supporting data hierarchical management and control. 205-212 - Dongmei Zhao, Yaxing Wu, Qingru Li:
Network Security Situation Prediction Implemented by Attention and BiLSTM. 213-219 - Zhe Wang, Baihe Ma, Yong Zeng, Xiaojie Lin, Kaichao Shi, Ziwen Wang:
Differential Preserving in XGBoost Model for Encrypted Traffic Classification. 220-225 - Kaichao Shi, Baihe Ma, Yong Zeng, Xiaojie Lin, Zhe Wang, Ziwen Wang:
Layered classification method for darknet traffic based on Weighted K-NN. 226-231 - Hengwei Zhang, Xiaoning Zhang, Pengyu Sun, Xiaohu Liu, Junqiang Ma, Yuchen Zhang:
Traceability Method of Network Attack Based on Evolutionary Game. 232-236 - Zhan Liu, Xiaojie Zhu, Peng Li, Jinlan Ma, Xiaozhi Yuan, Yuxiang Jiang, Qingyang Wang:
User-centric Service System for Network beyond IMT-2020 (5G). 237-240 - Zhaoyang Li, Zhiwei Zhang, Zehan Chen, Hao Duan, Hongjun Li, Baoquan Ren:
Lightweight and Efficient Distributed Cooperative Intrusion Detection System for Intelligent Swarms. 241-246 - Zhidong Ma, Zhiwei Zhang, Chengliang Liu, Tianzhu Hu, Hongjun Li, Baoquan Ren:
Visualizable Malware Detection based on Multi-dimension Dynamic Behaviors. 247-252 - Xinghui Zhu, Yongzhen Chen, Xiaodong Zhang, Zhiwei Zhang, Baoquan Ren:
Feature Matching for Indoor-Oriented Visual Odometry. 253-258 - Hong Xia, Qingyi Dong, Yanping Chen, Jiahao Zheng, Cong Gao, Zhongmin Wang:
QoS Prediction based on the Low-rank Autoregressive Tensor Completion. 265-269 - Tong Zhang, Xiangjie Cui, Yichuan Wang, Yanning Du, Wen Gao:
TCS Security Analysis in Intel SGX Enclave MultiThreading. 276-281 - Khadija Sultana, Khandakar Ahmed, Bruce Gu, Hua Wang:
Elastic Optimized Edge Federated Learning. 288-294 - Jing Han, Yizhi Zhang, Kenan Qin:
An Attributed Network Anomaly Detection Method Based on Dual Autoencoder Joint Embedding. 295-299 - Yan He, Zhongmin Wang, Yupeng Zhao:
EEG-Based Fatigue Detection Using PLI Brain Network and Relief Algorithm. 300-305 - Yue Cui, Alvin Lim, Yufei Yan, Abhishek Kulkarni, Tianhang Lan:
Resilient and Reliable Communication for First Responders with Ad-Hoc Network and MPTCP. 306-310 - Luheng Yang, Zhihui Wang, Tingting Zhu, Jianrui Chen:
Relation Transformation based on Graph Convolution Network for Entity Alignment. 311-315 - Zhuoyuan Li, Zan Zhou, Tao Zhang, Xiaolin Xing:
MARL-MOTAG: Multi-Agent Reinforcement Learning Based Moving Target Defense to thwart DDoS attacks. 316-321 - Bishnu Prasad Gautam, Amit Batajoo, Norio Shiratori:
A Proposal of ClouEdge (Cloud-Edge) Architecture by Using JYAGUCHI Computing Framework. 338-344 - Wang Tao, Haiyan Zeng, Shenghui Zhao:
Parallel Algorithm of Geomagnetic Localization in Fire Compartment Based on MapReduce. 345-348 - Dalia Nashat, Loay Mamdouh:
A Novel Least Significant Bit Steganographic Method Based on Hough Transform. 349-353 - Hirofumi Miyajima, Noritaka Shigei, Hiromi Miyajima, Norio Shiratori:
Secure Distributed Processing of NG with Updatable Decomposition Data and Parameters. 354-360 - Koomson Patrick, Weidong Yang, Erbo Shen:
Optimization Model for Predicting Stored Grain Temperature Using Deep Learning LSTMs. 361-368 - Kui Liu, Bin Wang, Ziwei Shi, Jiadong Chen, Zhiwei Zhang:
Hey! You Photographed My Screen without Approved: A Practical Screen Content Protection Scheme Based on Visual Cryptography. 369-375 - Yingxin Shan, Peng Liao, Zhuo Wang, Lingling An:
Partial Computation Offloading and Resource Allocation via Deep Deterministic Policy Gradient. 376-383 - Chunyan Yu, Linfeng Gu, Guilin Chen, Aiguo Wang:
Identifying Those Who Really Need Subsidies: A Data-Driven Approach. 384-390 - Tao Zhang, Zhe Zhang, Xiang Li, Yulin Wu, Bo Peng, Yurong Qian, Mengnan Ma, Hongyong Leng:
Short Text Semantic Matching Model based on Bert and Adversarial Network. 397-401 - Liumei Zhang, Yu Han, Yichuan Wang, Ruiqin Quan:
Petri Net Model of MITM Attack Based on NDP Protocol. 402-405 - Leyu Lin, Bo Tian, Yue Zhao, Yiru Niu:
A Privacy-Preserving Gait Recognition Scheme Under Homomorphic Encryption. 406-410 - Muhammad Fawad Khan, Haoran Mei, Shahnila Rahim, Limei Peng, Pin-Han Ho:
Multi-RIS Deployment for High Data-Rate Communications. 411-414 - Bowen Deng, Lele Zheng, Ze Tong, Jing Gao, Tao Zhang, Qi Li:
OKV: Optimized Key-Value Data Collection with Local Differential Privacy. 421-426 - Hengwei Zhang, Zheming Li, Hao Liu, Bo Yang, Chenwei Li, Jindong Wang:
Rotation Model Enhancement for Adversarial Attack. 431-436 - Ke Zhao, Mian Muaz Razaq, Kaixin Li, Limei Peng, Pin-Han Ho:
3D Deployment of UAVs for Communications under Multiple Eavesdroppers. 437-441 - Wenbo Zhang, Ruoxia Yao, Xiaoteng Yang, Kaiguang Wang:
An Improved Gray Wolf Optimization Algorithm Based on Levy Flight and Adaptive Strategies. 448-453 - Wanghao Mo, Yan Ke, Qingao Huo, Ruyi Cao, Guochang Song, Wendong Zhang:
ADN: ATSS-based Deep Network for Pedestrian Detection on High-Resolution Images. 454-458 - Yan Wang, Li Li, ZhaoHua Wang, XiaoHua Zheng:
An efficient method for restraining negative information cascades in online social networks. 459-464 - Fang Ren, Haiyan Xiu, Anqi Gao, Xuan Shi:
Blind Signature Scheme Based on QC-MDPC Codes. 465-470 - XinDi Ma, Cunzhu Su, Jianfeng Ma, Qi Jiang, Ning Xi, Sheng Gao, Kang Xie:
Self-Anomaly-Detection Model Training via Initialized Meta Model. 471-476 - Jiaomei Zhang, Ayong Ye, Zhiqiang Yao, Minghui Sun:
A Fair Federated Learning Framework based on Clustering. 477-482 - Mengfan Xu:
FedDBG: Privacy-Preserving Dynamic Benchmark Gradient in Federated Learning Against Poisoning Attacks. 483-488 - Jiandong Wang, Xiang Xia, Zhiwei Zhang, Yuanyu Zhang, Yulong Shen, Baoquan Ren:
Class Continuous LOD Algorithm for Lightweight WebGL Rendering Optimization. 489-494 - Wang Ke, YaLing He, He Yuhuang:
Research on Blockchain Usage for 5G Message Service. 501-505 - Taiki Tomita, Keiichi Inohara, Yota Kurokawa, Masaru Fukushi:
A Dynamic Reconfiguration Method of Communication Groups for Parallel Volunteer Computing. 506-510 - Shiyang Ma, Yahui Li, Zhonghua Wang, Di Lu, Xuewen Dong, Wei Tong, Lingxiao Yang:
Link-ability: A Prediction Method of Web Service Compatibility based on Markov Process. 511-516 - Xiao Liu, Zhao Huang, Quan Wang, Nan Luo:
An Optimized Key-Value Raft Algorithm for Satisfying Linearizable Consistency. 522-527 - Zeyu Li, Junjie Wang, Zhao Huang, Quan Wang:
EA-based Mitigation of Hardware Trojan Attacks in NoC of Coarse-Grained Reconfigurable Arrays. 528-533 - Mei Wang, Zhengyi An, Yu Yao, Xiyu Song:
Feature-level Attention Pooling for Overlapping Sound Event Detection. 534-539 - Shuai Lyu, Haoran Mei, Limei Peng, Shih Yu Chang, Jian Mo:
Multivariate-aided Power-consumption Prediction Based on LSTM-Kalman Filter. 545-549 - Yunchuan Wu, Cheng Chen, Bo Wang:
Pedestrian Detection Based on Improved SSD Object Detection Algorithm. 550-555 - Hongbin Gao, Shangxing Wang, Hongbin Zhang, Bin Liu, Dongmei Zhao, Zhen Liu:
Network Security Situation Assessment Method Based on Absorbing Markov Chain. 556-561
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.