default search action
9th ISNCC 2022: Shenzhen, China
- International Symposium on Networks, Computers and Communications, ISNCC 2022, Shenzhen, China, July 19-22, 2022. IEEE 2022, ISBN 978-1-6654-8544-9
- Shen Qian, Xin He, Xiaobo Zhou:
Physical Layer Security in Untrusted Diamond Relay Networks With Imperfect Source-Relay Links. 1-6 - Md. Mainul Islam Mamun, Cory C. Beard, Deep Medhi:
A UAV-Assisted Multiuser Non-terrestrial Cyclic Postfixed Windowed OFDM System. 1-6 - Reza Kazemikord, Mohammadali Sebghati, Hassan Zareian:
Channel Estimation for Industrial Internet of Things Using Particle Filter with Adaptive Pilots. 1-6 - Bo Zhang, Bingjun Yan, Mingzhe Liu, Bo Hu, Aidong Xu, Kai Wang:
Development of an Industrial Real-time Ethernet Protocol Stack Based on SoC. 1-6 - Yuanxue Xin, Xuan Yang, Runkang Zhou, Ting Liu:
Coverage Probability Analysis in Multi-cell Multi-user System with Random Number of Users. 1-6 - Lijun Dong, Lin Han, Richard Li:
New IP Enabled End-to-End Latency Guarantee for Downlink Traffic in 5G. 1-6 - Yu Xu, Hongfeng Tian, Tiankui Zhang, Dingcheng Yang, Lin Xiao:
Stochastic Resource Management and Trajectory Optimization for Cellular-Connected Multi-UAV Mobile Edge Computing Systems. 1-6 - Hamid Shimal Aldulaimi, Bassem Ben Hamed:
Smart and Novel Algorithm for Highway Overtaking Classification. 1-6 - Ying Yang, Lidong Zhu, Qihui He, Xu Deng:
A Simple High-performance Generation Method for Spoofing Jamming Signals. 1-5 - Peter Voege, Abdelkader Ouda:
An Innovative Multi-Factor Authentication Approach. 1-6 - Xiumei Yang, Bo Hong:
Cost-Efficient Task Offloading for Satellite Edge Computing Systems. 1-5 - Nana Qi, Zhengqian Zhang, Nini Dong, Meng Guo, Meng Kong:
A Design of Conformal Anti-Jamming Antenna System. 1-3 - Cherifa Nakkach, Amira Zrelli, Tahar Ezzedine:
Smart Border Surveillance System Based on Deep Learning Methods. 1-6 - Ehab M. Shaheen, Mohammad Reza Soleymani:
Performance Analyses of SWIPT-NOMA Enabled IoT Relay Networks. 1-6 - Amira Zrelli, Cherifa Nakkach, Tahar Ezzedine:
Cyber-Security for IoT Applications based on ANN Algorithm. 1-5 - Albert H. Carlson, Sai Ranganath Mikkilineni, Michael W. Totaro, Christopher Briscoe:
A Venona Style Attack to Determine Block Size, Language, and Attacking Ciphers. 1-6 - Kinan Ghanem, Stephen Ugwuanyi, Jidapa Hansawangkit, Ross McPherson, Rabia Khan, James Irvine:
Security vs Bandwidth: Performance Analysis Between IPsec and OpenVPN in Smart Grid. 1-5 - Iman I. M. Abu Sulayman, Abdelkader Ouda:
Real-Time Data Generation and Anomaly Detection for Security User Profiles. 1-6 - Albert H. Carlson, Sai Ranganath Mikkilineni, Michael W. Totaro, Richard B. Wells, Robert E. Hiromoto:
Equivalence of Product Ciphers to Substitution Ciphers and their Security Implications. 1-6 - Selma Dilek, Alma Oracevic, Suleyman Tosun, Suat Ozdemir:
Towards QoS-Aware Resource Allocation in Fog Computing: A Theoretical Model. 1-6 - Aleksey S. Gvozdarev, Tatiana K. Artemova, Dmitry M. Murin, Pavel E. Patralov:
Reconfigurable Intelligent Surfaces' Impact on the Physical Layer Security of the Beaulieu-Xie Shadowed Fading Channel. 1-5 - Michele Luglio, Mattia Quadrini, Cesare Roseti, Lorenzo Serranti, Francesco Zampognaro:
Analytics support in the 5G Core Network for data-driven management of a supplementary backhaul. 1-6 - Sulyman Age Abdulkareem, Chuan Heng Foh, François Carrez, Klaus Moessner:
FI-PCA for IoT Network Intrusion Detection. 1-6 - Guangyu Tian, Wenbing Cai, Hancheng Zhao, Yiwen Chen, Teng Yang, Xuehui Yu:
Research and Implementation of the Early-late Gate Bit Synchronization Algorithm in the Non-coherent Spread Spectrum System. 1-4 - Jianfang Zhang, Yaxi Liu, Wei Huangfu:
UAV Trajectory Optimization Considering User Pattern and Communication Coverage Fairness. 1-6 - Chenxi Zhong, Huiyuan Yang, Xiaojun Yuan:
Multi-Task Federated Learning with Over-the-Air Computation for MIMO Interference Channels. 1-6 - Junhao Ding, Honghao Shi, Zhiyong Luo:
Joint SB/NMS and Genetic Optimization for High Performance LDPC Decoding. 1-6 - Jingshun Lv, Bo Li, Xiao Wang, Hao Liu, Jiehong Gu:
An Analysis on the Characteristics and Challenges of Global Satellite Internet Development. 1-5 - Wang Jun, Zhu Jinzhou:
Q-learning Based Radio Resources Allocation in Cognitive Satellite Communication. 1-5 - Chiara Grasselli, Andrea Melis, Lorenzo Rinieri, Davide Berardi, Giacomo Gori, Amir Al Sadi:
An Industrial Network Digital Twin for enhanced security of Cyber-Physical Systems. 1-7 - Mauro Conti, Francesco Trolese, Federico Turrin:
ICSpot: A High-Interaction Honeypot for Industrial Control Systems. 1-4 - tHaibo Wu, Yanqing Lu, Ting Zhang, Lei Wang:
Performance Evaluation of the Dynamic Multi-hop in Proximity Radio Access Network. 1-6 - Qisheng Chen, Kazumasa Omote:
A Three-Step Framework for Detecting Malicious URLs. 1-6 - Giacomo Gori, Andrea Melis, Lorenzo Rinieri, Marco Prandini, Amir Al Sadi, Franco Callegati:
Metrics for Cyber-Physical Security: a call to action. 1-4 - Jacopo Iannacci, H. Vincent Poor:
A Vision of 6G from the Perspective of Low-Complexity Hardware Micro/Nano Components. 1-5 - Zhiguang Jia, Zhenlong Xu, Lijian Zhang:
Simulation of forming process of stainless-steel plate heat sink for thermal test of spacecraft. 1-6 - Pablo Ximenes, Patrícia Mello:
Applying the Diamond Model of Intrusion Analysis: Brazil's Operation "Car Wash" Cyberattack. 1-6 - Lukas Steffen, Benjamin Beichler, Michael Rethfeldt, Dirk Timmermann, Christian Haubelt:
A Novel Interface Between the Linux Kernel and ns-3 for Assessing Target Software in WLAN-Systems. 1-8 - Guangjun He, Han Fu, Pengming Feng, Shishuo Liu, Jiang Chang, Shichao Jin:
Real-time detection of flying aircraft using hyperspectral satellite imges. 1-8 - Shichao Jin, Dunge Liu, Zhe Cui, Chenyu Mei, Yuqian Yang, Bing Wu:
A Scalable Ka-Band 256-Element Transmit Dual-Circularly-Polarized Planar Phased Array for SATCOM Application. 1-4 - Xiang Li, Wei Huang, Xiaozhang Zhu, Zhiqin Zhao:
MEMS-IMU Error Modelling and Compensation by 3D turntable with temperature chamber. 1-5 - Shichao Jin, Dunge Liu, Chenyu Mei, Yuqian Yang, Bing Wu, Zhe Cui:
A Scalable K-Band 256-Element Receive Dual-Circularly-Polarized Planar Phased Array for SATCOM Application. 1-4 - Nini Dong, Nana Qi, Meng Guo, Chao Wang, Lu Chen:
An Optimal Design of High Gain Beidou Anti-Jamming Antenna. 1-4 - Qichong Chen, Lei Zhao, Yueyan Chu, Wenbin Guo:
Research on Multipath Reception and Soft Decision Algorithms for Frequency Shift Chirp Modulation. 1-6 - Mohamed Sofiane Batta, Zibouda Aliouat, Hakim Mabed, Malha Merah:
An Improved Lifetime Optimization Clustering using Kruskal's MST and Batteries Aging for IoT Networks. 1-6 - Hong Wang, Zhenyan Wang, Yanzhao He, Zhichao Liu, Quanwu Wang, Jufeng Dai:
Compensation Circuit and Buck Converter based Wireless Power Transmission. 1-4 - Branislav Mladenov, Georgi Iliev:
Studying the effect of internal DOS attacks over SDN controller during switch registration process. 1-4 - ZhongShuai Qin, Yanyong Su, Ruiran Liu, Chenglin Liu:
Codebook Optimization Design of Serial Encoding SCMA System. 1-4 - Shaofu Zhang, Zongwu Dai, Honglun He, Wenhao Zhang, Naiqiang Liu, Changli Shi:
A Study on One Fast Acquisition Method for DS/FH Hybrid Spread Spectrum Signal in Physical Layer of Aircraft Communication Network. 1-5 - Hao Liu, Fan Qin, Qian Yang, Jingshun Lv, Biao Peng:
Orbital Error Analysis and Correction Method based on Data Mining for Multiple Kinetic Energy Impactors. 1-5 - Chongda Huang, Yue Xiao, Lilin Dan:
N-continuous Signaling for Constant Envelope OFDM. 1-4 - Albert H. Carlson, Sai Ranganath Mikkilineni, Michael W. Totaro, Robert E. Hiromoto, Richard B. Wells:
An Introduction to Local Entropy and Local Unicity. 1-7 - Yongning Zhuo, Xiaoxue Zhou, Qin Wang:
A Sliding Window Method for BATS Code in Space Communication. 1-5 - Peng Wang, Mei Huang:
Technological and Organizational Model of IoT Anti-Corruption System: Evidence from China. 1-5 - Ge Guo:
A Novel Intrusion Detection Framework for Internet of Things Based on Machine Learning Techniques. 1-6 - Neil Tellez, J. Serra, U. Ebreso, K. Opara, Yulia Kumar, J. Jenny Li, Patricia Morreale:
An Assure AI Bot (AAAI bot). 1-5 - Shizhuo Zhang, Baoyin Bian, Yehua Zhang, Lang Li, Jing Jiang, Cheng Zeng, Jun-Bo Wang, Hua Zhang:
Joint Precoding of eMBB and URLLC services in MISO System. 1-6 - Ziad El-Khatib, Adel Ben Mnaouer, Sherif Moussa, Mohd Azman Bin Abas, Nor Azman Ismail, Fuad Abdulgaleel, Ibrahim Elmasri, Loay Ashraf:
LoRa-enabled GPU-based CubeSat Yolo Object Detection with Hyperparameter Optimization. 1-4 - Zedong Zhang, Hao-Tong Shen, Songjie Wei:
Network Anomaly Detection based on Traffic Clustering with Group-Entropy Similarity. 1-5 - Hooshang Abbaspour, Milad Hadadnejad, Ghazal Najafi:
Tracking Micro Aerial Vehicles with High Maneuverability and Sudden Rotation in Complex Indoor Environments Using Deep Neural Networks in Three Dimensions based on the Received Signal Strength. 1-5 - Sanket Vilas Salunke, Abdelkader Ouda, Jonathan Gagne:
Transfer Learning for Behavioral Biometrics-based Continuous User Authentication. 1-6 - Shuang Li, Yuan Zhao, Honglun He, Xiaoxi Li, Wei Wang:
The Design and Implementation of Data Link Terminal Based on Two Modes Satellite Communication. 1-5 - Yinqiao Li, Haocong Ji, Li Yang, Song Jin:
Verification of Dual Circularly Polarized Diversity Mobile Satellite Communication System. 1-4 - Yongning Zhuo, Baowei Li, Hanyi Huang:
A Signal Detection Method Based on Compressive Sensing for Polarized Antenna System. 1-4 - Yunfei Tai, Kezhen Li, Liang Zhou, Shu Liu, Xilin Zhang:
An Improved CA-SCL Decoding Algorithm for Polar Code. 1-5 - Khawla A. Alnajjar:
Low Complexity Detectors for MIMO Molecular Communications Under Channel Estimation. 1-4 - Saeede Enayati, Dennis L. Goeckel, Amir Houmansadr, Hossein Pishro-Nik:
Privacy-Preserving Path-Planning for UAVs. 1-6 - Heyun Yan, Lidong Zhu, Xiaoyan Kuai, Yilun Liu:
Physical Layer Security Enhancement for LEO Satellite Communications: Handoff Scheme. 1-5 - Penghua Zhong, Tian Tan, Yao Yu:
Enlightenment for China's LEO Internet Satellite Industry from Typical Development Model of European Commercial Satellite. 1-6 - Jayroop Ramesh, Donthi Sankalpa, Raafat Aburukba, Mohamed Elsakhawy:
Cloud Infrastructure-as-a-Service Testbed Implementation using OpenStack. 1-8 - Sajal Saha, Anwar Haque, Greg Sidebottom:
Towards an Ensemble Regressor Model for ISP Traffic Prediction with Anomaly Detection and Mitigation. 1-6 - Mu Li, Yong Meng, Xiaofei Liu, Yaning Guo, Jiali Li, Qidi You:
Secure and Efficient Support for DVB-S2/DVB-RCS2 System with Distributed Gateways. 1-5 - Jianlong Li, Siyuan Wang, Zhihang Zhu, Minghao Liu, Changjiang Zhang, Bingyan Han:
Stock Prediction Based on Deep Learning and its Application in Pairs Trading. 1-7 - Xinjie Gu, Lilin Dan, Yue Xiao:
Offset Constant Envelope OFDM Toward Efficient mmWave Transmission. 1-5 - Yunfeng Wang, Xiaojin Ding, Jun Li, Tao Hong, Gengxin Zhang:
Blind Noise Floor Estimation aided Spectrum Sensing for Satellite Communication Systems. 1-5 - Yixuan Liu, Shuai Yuan, Mingchuan Yang, Guanchang Xue, Yanyong Su:
Underlay based Spectrum Sharing Algorithm in Cognitive Satellite-5G Networks. 1-5 - Muna Al-Hawawreh, Ibrahim Elgendi, Kumudu S. Munasinghe:
Ultra Light-weight Encryption for Securing D2D Communication of ESP8266 IoT devices in Wireless Mesh Networks. 1-6 - Toshiro Nunome:
Video and Audio Transmission Quality Enhancement over CCN by means of Access Timing and Media Synchronization Control. 1-4 - Wenwen Zhou, Yang Yongzhi, Jiejuan Wang:
Dynamic Class Generating and Loading Technology in Android Web Application. 1-6 - Bo Wang, Lixiang Liu, Shuaijun Liu, Shan Wu, Hailong Hu:
Performance analysis of OSPF in integrated satellite and terrestrial network. 1-4 - Zhen Li, Mingchuan Yang, Gang Wang:
Performance Analysis of SWIPT aided Integrated Remote Wireless Sensor and Satellite Network. 1-6 - Binghui Jin, Yang Sun, Wenjun Wu, Qiang Gao, Pengbo Si:
3D Environment-based Multiobjective Path Planning for Unmanned Ground Vehicles. 1-6 - Rodrique Chi Fon, Frank Nonso Igboamalu, Alain Richard Ndjiongue, Khmaies Ouahada, Collins Leke, Adnan M. Abu-Mahfouz:
Outage Probability of an Underwater Wireless System Based on the CSK Transmission. 1-6 - Zefu Gao, Yiwen Jiao, Dong Li, Feilong Mao, Yu Xin Wang, Yi Tong Si, Yi Fan Wu:
A novel algorithm for accurate UWB positioning based on CNN and hybrid locating method. 1-8 - Harshaprabha N. Shetty, Prabhu Vara Prasad Bonam, Tanusree De:
Predictive Maintenance with Explainability in Wind Farms for Sustainable Development. 1-5 - Yamba Dabone, Frédéric Tounwendyam Ouédraogo, Pengwendé Justin Kouraogo:
Impact Of Internet Exchange Points On ISPs Speeds And Latency. 1-6 - Priya Bansal, Abdelkader Ouda:
Study on Integration of FastAPI and Machine Learning for Continuous Authentication of Behavioral Biometrics. 1-6 - Ebru Uçgun Ergün, Ibrahim Kök, Suat Özdemir:
Impact of Missing Data on Classification Success in Health and Comparative Analysis of Imputation Methods. 1-6 - Qin Fan, Zhu Tielin, Liu Hao, Zhang Yuying:
CMA Blind Equalization Algorithm Based on Linear Fitting. 1-5 - Qingmiao Zhang, Lidong Zhu:
A Deep Learning Approach for Downlink Sum Rate Maximization in Satellite-Terrestrial Integrated Network. 1-5 - Chengjie Li, Lidong Zhu, Xianfeng Guo, Zhen Zhang, Ying Yang:
A Novel Greedy Sparse Underdetermined Blind Separation Algorithm for LEO Satellite Communication System. 1-5 - Yasir Uthman, Dudu Watsai, Daniel Nwude, Grace Oletu:
Design and Implementation of an Automatic Gas and Smoke Detector. 1-4 - Kunrui Cao, Buhong Wang:
NOMA aided Semi-Grant-Free Transmission: A Security Perspective. 1-7 - Thai Son Chu, Weisheng Si, Simeon Simoff, Quang Vinh Nguyen:
A Machine Learning Classification Model Using Random Forest for Detecting DDoS Attacks. 1-7 - Qiaonan Zhu, Xinyuan Zhang, Yue Xiao, Yulan Gao, Xianfu Lei, Zehui Xiong:
Optimization of Intelligent Reflecting Surface Aided Wireless Networks with User Mobility. 1-6 - Abdinasir Hirsi Abdi, Haroon Rasheed:
Performance Analysis of Outdoor Massive MIMO on Ultra-High Frequency Bands (73 GHz and 100 GHz). 1-6 - Michele Luglio, Mattia Quadrini, Cesare Roseti, Domenico Verde, Francesco Zampognaro:
Performance evaluation of untrusted non-3GPP Access to a 5G Core Network via satellite. 1-6 - Zhong Tang, Ming Zhan, Chenchang Gao, Dafa Wen:
Reduced-Complexity T-EMS Algorithm with Elitist Selection for Non-Binary LDPC Codes. 1-6 - Xinyu Zhao, Haichen Zhang, Jiyuan Sun, Jun Zou:
Power Allocation Strategy Based on Approximation Bound in High-dimensional Modulation Superposition NOMA. 1-5 - Xinwei Xu, Zhixing Hu, Dengsheng Lin, Yue Xiao:
Optimization of Power Allocation for LDPC Coded Modulation on Fading Channels. 1-5 - Avinash Kumar, Ye Zhu:
Generalizing Direct Sequence Spread-Spectrum to Mitigate Autocorrelation-Based Attacks. 1-6 - Metehan Güzel, Feyza Yildirim Okay, Ibrahim Kök, Suat Özdemir:
QNSGA-II: A Quantum Computing-Inspired Approach to Multi-Objective Optimization. 1-4 - Ugur Saritac, Xingya Liu, Sabila Newaz, Ruhai Wang, Hasan Md Imran:
A Joint Design of Deployment and Routing for Lifetime Maximization in Pipeline Sensor Networks. 1-6 - Wafaa Anani, Abdelkader Ouda:
Wireless Meter Bus: Secure Remote Metering within the IoT Smart Grid. 1-6 - Xiaojing Wu, Yue Xiao, Liuliu Li:
Efficient Design of Intercarrier Interference Self-Cancellation for OFDM Systems. 1-5 - Jaber Jemai, Marouane Chaieb, Anis Zarrad:
A Big Data Mining Approach for Credit Risk Analysis. 1-6 - Ripon Patgiri, Naresh Babu Muppalaneni:
Stealth: A Highly Secured End-to-End Symmetric Communication Protocol. 1-8 - Phithak Thaenkaew, Bruno Quoitin, Ahmed Meddahi:
Evaluating the cost of beyond AES-128 LoRaWAN security. 1-6 - Raafat Aburukba, Yara Kaddoura, Maya Hiba:
Cloud Computing Infrastructure Security: Challenges and Solutions. 1-7 - Hai Fang, Yangyang Jia, Yuanle Wang, Yang Zhao, Yuan Gao, Xu Yang:
Matching Game based Task Offloading and Resource Allocation Algorithm for Satellite Edge Computing Networks. 1-5 - Xu Luo, Haifen Yang, Zhiyong Guo:
Deep Learning-Aided Quantizer Design for Non-Volatile Memories with Unknown Offset. 1-5 - Tianshun Fang, Hao Xue, Zhenni Pan, Shigeru Shimamoto:
A Lightweight Network Slicing Scheme for 5G Coexistence Network in Multitenant and Services. 1-6 - Na Qin, Yantao Liu:
The Security Hierarchy of Network Coding System against Wiretap Attacks. 1-4 - Jiangjiang Huang, Kuoxiang Zhang, Yueting Zhang:
Telecommunication system with high-rate downlink for deep space exploration. 1-4 - Dovydas Paulauskas, Amna Eleyan:
Knock pattern based door lock with Amazon Alexa on Raspberry Pi. 1-4 - Lucca Ruhland, Mari Schmidt, Jan Bauer, Elmar Padilla:
Keeping the Baddies Out and the Bridge Calm: Embedded Authentication for Maritime Networks. 1-6
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.