default search action
36th ICOIN 2022: Jeju Island, South Korea
- International Conference on Information Networking, ICOIN 2022, Jeju-si, Republic of Korea, January 12-15, 2022. IEEE 2022, ISBN 978-1-6654-1332-9
- Sajad Homayoun, Kaspar Hageman, Sam Afzal-Houshmand, Christian Damsgaard Jensen, Jens Myrup Pedersen:
Detecting Ambiguous Phishing Certificates using Machine Learning. 1-6 - Dereje Regassa, Heon Young Yeom, Yongseok Son:
Efficient Attacker Node(s) Detection and Isolation Schemes in MANETs OLSR Protocol. 7-12 - Razafimahatratra Fenohasina Lova, Rakotomandimby Miora Fifaliana, Wajira Prasad De Silva:
Intrusion Detection Toward Feature Reconstruction using Huber Conditional Variational AutoEncoder. 13-17 - Zhenning Xu, Hassan Khan, Radu Muresan:
TMorph: A Traffic Morphing Framework to Test Network Defenses Against Adversarial Attacks. 18-23 - Ajit Kumar, Bong Jun Choi:
Benchmarking Machine Learning based Detection of Cyber Attacks for Critical Infrastructure. 24-29 - Ijaz Ahmad, Seokjoo Shin:
Encryption-then-Compression System for Cloud-based Medical Image Services. 30-33 - Tobias Mueller:
Let's Re-Sign! Analysis and Equivocation-Resistant Distribution of OpenPGP Revocations. 34-39 - Ripon Patgiri, Dolendro Singh Laiphrakpam:
An Analysis on the Variants of the RSA Cryptography. 40-45 - Chalee Thammarat, Chian Techapanupreeda:
Secure Key Establishment Protocol for Smart Homes Based on Symmetric Cryptography. 46-51 - Thai-Hung Nguyen, Truong Giang Vu, Huong-Lan Tran, Kok-Seng Wong:
Emerging Privacy and Trust Issues for Autonomous Vehicle Systems. 52-57 - Haemin Lee, Youngkee Kim, Hyunhee Cho, Soyi Jung, Joongheon Kim:
The Credibility Cryptocurrency Valuation: Statistical Learning Analysis for Influencer Tweets. 58-61 - Christos Bouras, Evangelos Michos:
An online real-time face recognition system for police purposes. 62-67 - Jai Singhal, Ankit Singh Gautam, Ashutosh Bhatia, Ankit Agrawal, Rekha Kaushik:
DD-Locker: Blockchain-based Decentralized Personal Document Locker. 68-73 - Rudraraju Sacin Varma, Ankit Agrawal, Ashutosh Bhatia, Kamlesh Tiwari:
Multi-vendor IoT-based Resource Sharing using OAuth and Blockchain. 74-77 - Mukhammaddiyor Khaydaraliev, Min-Hyung Rhie, Ki-Hyung Kim:
Blockchain-enabled Access Control with Fog Nodes for Independent IoTs. 78-83 - Ozan Tarlan, Ilgin Safak, Kübra Kalkan:
DiBLIoT: A Distributed Blacklisting Protocol for IoT Device Classification Using the Hashgraph Consensus Algorithm. 84-89 - Saad El Jaouhari, Eric Bouvet:
Toward a generic and secure bootloader for IoT device firmware OTA update. 90-95 - Gabriel Avelino R. Sampedro, Ryanne Gail Kim, Jose Mari Cobar, Keith Daniel Abaja, Ronnie Baluis:
Development of an Internet of Things (IoT)-Based Automated Bag-Valve-Mask. 96-100 - Yu-Cheng Chien, Yi-Chun Yeh, Nen-Fu Huang:
Deep Learning Based Route Information Extraction from Satellite Imagery for Agricultural Machinery Management. 101-106 - Jia-Cheng Zhang, Daniel Ho Teck Khieng, Nen-Fu Huang:
A Long Range Reliable Precise Irrigation System Based on LoRaP2P Protocol. 107-112 - Takumi Yanagisawa:
DASH rate control using game theory to consider user video preference. 113-118 - Truong-Xuan Do, Ha Phan Khanh Nguyen, Thai Binh Nguyen, Huu Tung Dang:
A Neural-Network Distortion Estimation-based Adaptive Video Streaming in Wireless Networks. 119-123 - Natsumi Nishizawa, Tatsuya Otoshi, Masayuki Murata:
Modeling of Cognitive Bias of Video Viewing Users Based on Quantum Decision Making. 124-130 - Nurul I Sarkar, Sonia Gul:
The Impact of Wireless Nodes on the Performance of Video Streaming over a Gigabit Backbone Network. 131-135 - Yang Yu, Sanghwan Lee:
Measurement-Based Evaluation of Video Streaming Method for Remote Driving Systems. 136-139 - Rashini K. Liyanarachchi, Manujaya Premathilaka, Hirumi Samarawickrama, Nuwana Thilakasiri, Nanduni U. Hettiarachchi, Sasini Wellalage, Janaka L. Wijekoon:
InCOV Chamber: Intelligent Chamber to Detect Potential COVID-19 Positive Patients. 140-145 - Anita Ramachandran, Apoorva Bajaj, Anupama Karuppiah:
Correlation between SpO2 and Heart Rate in Sleep Apnea Detection. 146-151 - Mingshan Jia, Maité Van Alboom, Liesbet Goubert, Piet Bracke, Bogdan Gabrys, Katarzyna Musial:
Analysing Egocentric Networks via Local Structure and Centrality Measures: A Study on Chronic Pain Patients. 152-157 - Jamshaid Iqbal Janjua, Tahir Abbas Khan, Mehwish Nadeem:
Chest X-Ray Anomalous Object Detection and Classification Framework for Medical Diagnosis. 158-163 - Ilyoung Chong, Sanghong Lee:
Deep Learning based Semantic Ontology Alignment Process and Predictive Analysis of Depressive Disorder. 164-167 - Hokeun Lim, Younghan Kim:
A Design of Network Mobility Management on Cloud Native Tactical Edge Cloud. 168-170 - Peter Sossalla, Justus Rischke, Frank H. P. Fitzek:
Enhanced One-Way Delay Monitoring with OpenFlow. 171-176 - Che-Wei Hsu, Yu-Hsiang Huang, Nen-Fu Huang:
Real-time Dragonfruit's Ripeness Classification System with Edge Computing Based on Convolution Neural Network. 177-182 - Quoc Vinh Ta, Minho Park:
Economic Denial of Sustainability (EDoS) attack detection by attention on flow-based in Software Defined Network (SDN). 183-185 - Eduardo Castilho Rosa, Flávio de Oliveira Silva:
A Hash-Free method for FIB and LNPM in ICN programmable data planes. 186-191 - Shougo Matsuo, Sunao Miyamoto, Keita Katagiri, Takeo Fujii:
Radio Propagation Extrapolation by Using Multiple Separated Propagation Paths Estimated by Radio Map. 192-197 - Keita Katagiri, Takeo Fujii:
Partitioned Path Loss Models Based on Coefficient of Determination. 198-203 - Eunkyung Kim:
Cross-Beam Retransmission in mmWave Networks. 204-206 - Andrej Stefanov:
Distortion Performance of MIMO Mobile Underwater Acoustic Networks with Retransmissions. 207-209 - Muhammad Usman Sheikh, Jukka Lempiäinen, Riku Jäntti:
Capacity Limitation of Small Cell Densification. 210-214 - Takeaki Iwata, Keita Kitaura, Ryotaro Matsuo, Hiroyuki Ohsaki:
A Solution for Finding Quasi-Shortest Path with Graph Coarsening. 215-219 - Fabricio Cravo, Thomas Nowak:
Stochastic Multi-Distribution Modeling of Inter-Contact Times. 220-225 - Clément Cassé, Pascal Berthou, Philippe Owezarski, Sébastien Josset:
A Tracing Based Model to Identify Bottlenecks in Physically Distributed Applications. 226-231 - Keita Kitaura, Ryotaro Matsuo, Hiroyuki Ohsaki:
Random Walk on a Graph with Vicinity Avoidance. 232-237 - Jo Hagikura, Ryotaro Matsuo, Hiroyuki Ohsaki:
On Accelerating Multiple Random Walks with Loose Cooperation. 238-243 - Takeshi Kaneko, Kazuyuki Shudo:
Broadcast with Tree Selection on An Overlay Network. 244-249 - Taesung Choi, Dongkun Lee, Yuchae Jung, Ho-Jin Choi:
Multivariate Time-series Anomaly Detection using SeqVAE-CNN Hybrid Model. 250-253 - Yunchi Gong:
Adaptive Self-Supervised Graph Representation Learning. 254-259 - Taisei Suzuki, Hiroyuki Ohsaki:
On Inferring Communication Delays Using Semi-Supervised Learning. 260-265 - Made Adi Paramartha Putra, Dong-Seong Kim, Jae-Min Lee:
Composite Multi-Directional LSTM for Accurate Prediction of Energy Consumption. 266-269 - Yuto Lim, Chenmian Zhou, Yasuo Tan, Yuan Fang, Manmeet Mahinderjit Singh:
Personal Thermal Comfort Model for Cyber-Physical Human Centric Systems using Incomplete Supervised Learning Method. 270-275 - Beopgwon Jung, Joonwoo Kim, Sangheon Pack:
Deep Reinforcement Learning-based Context-Aware Redundancy Mitigation for Vehicular Collective Perception Services. 276-279 - Raheleh Samadi, Jochen Seitz:
EEC-GA: Energy-Efficient Clustering Approach Using Genetic Algorithm for Heterogeneous Wireless Sensor Networks. 280-286 - Megumi Mizuto, Hideya So, Kazuki Maruta, Yu Nakayama:
Penalized Approach for Wide Coverage in Gamified Participatory D2D Communication. 287-291 - Eisei Yoshida, Suzuka Kobayashi, Hiroaki Mukai, Natthaphol Uthumphirat, Yuki Nakamura, Nao Ogino, Tetsuya Yokotani:
Proposal and prototyping on wildlife tracking system using infrared sensors. 292-297 - Afonso Oliveira, Teresa Vazão:
Mapping Network Performance to Radio Resources. 298-303 - JongBeom Jeong, Soonbin Lee, Eun-Seok Ryu:
Rethinking Fatigue-Aware 6DoF Video Streaming: Focusing on MPEG Immersive Video. 304-309 - Soonbin Lee, JongBeom Jeong, Eun-Seok Ryu:
Efficient Group-Based Packing Strategy for 6DoF Immersive Video Streaming. 310-314 - Jongmin Lee, Gunjae Koo:
Restore Buffer Overflow Attacks: Breaking Undo-Based Defense Schemes. 315-318 - Thanh Phung Truong, Anh-Tien Tran, Thi My Tuyen Nguyen, The-Vi Nguyen, Arooj Masood, Sungrae Cho:
MEC-Enhanced Aerial Serving Networks via HAP: A Deep Reinforcement Learning Approach. 319-323 - Muncheon Yoo, Hyundo Yoon, Changhee Hahn, Dongyoung Koo, Junbeom Hur:
Downgrading Backward Privacy of Searchable Encryption. 324-328 - Marco A. Coutinho, Evandro L. C. Macedo, Luís F. M. de Moraes, Victor Cracel Messner, Diego Leonel Cadette Dutra, Claudio Luis de Amorim, Valeriana Gomes Roncero, Nilton Alves Júinior, Marita Maestrelli, Márcio Portes de Albuquerque, Sandro Silva:
A New Interest-Based Protocol to Hide and Protect Servers in IP Networks. 329-334 - Seongju Kang, Jaegi Hwang, Kwangsue Chung:
DLNet: Domain-specific Lightweight Network for On-Device Object Detection. 335-339 - Issaree Srisomboon, Sanghwan Lee:
A Round-Robin Position Change Algorithm in Vehicle Platooning. 340-344 - Van Vi Vo, Duc-Tai Le, Moonseong Kim, Hyunseung Choo:
Data Aggregation Latency Minimization in Multichannel Duty-cycled WSNs. 345-348 - Yun-Young Hwang, Sumi Shin:
A Spatial Common Datasets for Linkage between Dataset Values. 349-351 - Junlin Yin, Syed Faraz Hasan:
Passive Localization for Comparing Physical Activities in Indoor Environments. 352-355 - Van-Dat Tuong, Nhu-Ngoc Dao, Wonjong Noh, Sungrae Cho:
Dynamic Time Division Duplexing for Green Internet of Things. 356-358 - Duc Thien Hua, Demeke Shumeye Lakew, Sungrae Cho:
DRL-based Energy Efficient Communication Coverage Control in Hierarchical HAP-LAP Network. 359-362 - Anisa Rahmanti, Fajar Setiawan, I Wayan Mustika, Selo:
Case Study of Moth Flame Optimization Implementation for Network Challenges. 363-367 - Toufiq Aziz, Heung-Gyoon Ryu:
ESPAR Antenna Design for the Interference Mitigation in WSN Communication System. 368-371 - Rezoan Ahmed Nazib, Safdar Hussain Bouk, Zeeshan Hameed Mir, Young-Bae Ko:
Unplanned UAV Trajectory-based Data Collection in Large-scale Sensor Networks. 372-377 - Tae Hyun Eom, Hyukjoon Lee:
A WTTE-RNN Based Hypoglycemic Event Prediction. 378-379 - Simeon Okechukwu Ajakwe, Vivian Ukamaka Ihekoronye, Rubina Akter, Dong-Seong Kim, Jae-Min Lee:
Adaptive Drone Identification and Neutralization Scheme for Real-Time Military Tactical Operations. 380-384 - Dong Uk Won, Hwa Sung Kim:
A Prediction Scheme For Movie Preference Rating Based on DeepFM Model. 385-390 - Esmot Ara Tuli, Jae-Min Lee, Dong-Seong Kim:
Improved Partial Transmit Sequence Based PAPR Reduction of UFMC Systems. 391-395 - Ta Phuong Bac, Minh-Ngoc Tran, Young-Han Kim:
Serverless Computing Approach for Deploying Machine Learning Applications in Edge Layer. 396-401 - Todd Murray, Syed Faraz Hasan:
Received Signal Strength Indicator for Device Localization in Post Disaster Scenarios. 402-407 - Sang Il Kim, Hwa Sung Kim:
Ontology-based NSD Modeling for NFV Service Management. 408-412 - Chien Nguyen Nhu, Minho Park:
Optimizing Resource Scaling in Network Slicing. 413-416 - Apurba Adhikary, Saydul Akbar Murad, Md. Shirajum Munir, Choong Seon Hong:
Edge Assisted Crime Prediction and Evaluation Framework for Machine Learning Algorithms. 417-422 - Soo Jung Moon, Wonjun Lee:
Friendly Jamming in LoRa Physical Layer Using Imperfect Orthogonality of Spreading Factor. 423-428 - Suyoung Ahn, Joonpyo Hong, Yun Hee Cho, Jeehyeon Na, Jeongho Kwak:
Sequential Beam, User, and Power Allocation for Interference Management in 5G mmWave Networks. 429-434 - Junhee Kwon, Bien Aime Mugabarigira, Jaehoon Paul Jeong:
Web-Based Car Control and Monitoring for Safe Driving of Autonomous Vehicles. 435-440 - Hyeonjin Kim, Woobeen Jin, Hyukjoon Lee:
mmWave path loss modeling for urban scenarios based on 3D-convolutional neural networks. 441-445 - Sung-Hyun Kim, Sung-Woo Moon, Dae-Gyeom Kim, Myeongjin Ko, Yong-Hoon Choi:
A Neural Network-based Path Loss Model for Bluetooth Transceivers. 446-449 - Anh Tuan Nguyen, Minho Park:
Detection of DoH Tunneling using Semi-supervised Learning method. 450-453 - Jeonghyeon Joshua Kim, Patrick Lingga, Jaehoon Paul Jeong, Yunchul Choi, Jung-Soo Park:
A Web-Based Monitoring System of Network Security Functions in Blockchain-Based Cloud Security Systems. 454-459 - Aunas Manzoor, S. M. Ahsan Kazmi, Choong Seon Hong:
Efficient Content Delivery to Vehicles Passing Through a Wireless-enabled Traffic Signal System. 460-463 - Michael Hosein, Karunesh Ramdass:
Wi-fi Direct Applications within a Post Covid Classroom - Bridging the Gap between Fully Online and Face to Face Learning. 464-469 - Minseok Choi:
Survey on Reinforcement Learning Approaches for Cache-Assisted Video Streaming System. 470-473 - Hyunsoo Lee, Haemin Lee, Soyi Jung, Joongheon Kim:
Stable Marriage Matching for Traffic-Aware Space-Air-Ground Integrated Networks: A Gale-Shapley Algorithmic Approach. 474-477 - Min-Ha Kim, Dae-Sung Wang, Sheng-Tsai Wang, Seo-Hyeon Park, Chan-Gun Lee:
Improving the Robustness of the Bug Triage Model through Adversarial Training. 478-481 - Jooyoung Park, Seunghwan Jeong, Honguk Woo:
Reinforcement Learning based Load Balancing in a Distributed Heterogeneous Storage System. 482-485 - Rohit Bharadwaj, Ashutosh Bhatia, Laxmi Divya Chhibbar, Kamlesh Tiwari, Ankit Agrawal:
Is this URL Safe: Detection of Malicious URLs Using Global Vector for Word Representation. 486-491 - Hangyeol Hong, Hyerin Kim, Chong-Kwon Kim:
VHAS: Video Highlight based Adaptive Streaming. 492-497 - Tri Minh Nguyen, Myungsik Yoo:
PatchGAN-Based Depth Completion in Autonomous Vehicle. 498-501 - Khalid A. Darabkh, Bayan Z. Alkhader:
Fog Computing- and Software Defined Network-Based Routing Protocol for Vehicular Ad-hoc Network. 502-506 - Syed Maaz Shahid, Sunghoon Ko, Sungoh Kwon:
Performance Comparison of 1D and 2D Convolutional Neural Networks for Real-Time Classification of Time Series Sensor Data. 507-511
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.