default search action
45th LCN 2020: Sydney, Australia
- Hwee-Pink Tan, Lyes Khoukhi, Sharief Oteafy:
45th IEEE Conference on Local Computer Networks, LCN 2020, Sydney, Australia, November 16-19, 2020. IEEE 2020, ISBN 978-1-7281-7158-6
Best paper candidates
- Yuchen Liu, Douglas M. Blough:
Blockage Robustness in Access Point Association for mmWave Wireless LANs with Mobility. 1-12 - Hossein Shirazi, Shashika Ranga Muramudalige, Indrakshi Ray, Anura P. Jayasumana:
Improved Phishing Detection Algorithms using Adversarial Autoencoder Synthesized Data. 24-32
Full papers
- Saber Jafarizadeh:
Pinning Control of Dynamical Networks with Optimal Cost. 33-41 - Jing Li, Weifa Liang, Zichuan Xu, Wanlei Zhou:
Service Provisioning for IoT Applications with Multiple Sources in Mobile Edge Computing. 42-53 - Imran Makhdoom, Farzad Tofigh, Ian Zhou, Mehran Abolhasan, Justin Lipman:
PLEDGE: An IoT-oriented Proof-of-Honesty based Blockchain Consensus Protocol. 54-64 - Thilini Dahanayaka, Guillaume Jourjon, Suranga Seneviratne:
Understanding Traffic Fingerprinting CNNs. 65-76 - Mahdi Arghavani, Haibo Zhang, David M. Eyers, Abbas Arghavani:
StopEG: Detecting when to stop exponential growth in TCP slow-start. 77-87 - Mohammed Al-Shaboti, Gang Chen, Ian Welch:
Achieving IoT Devices Secure Sharing in Multi-User Smart Space. 88-99 - Jagnyashini Debadarshini, Sudipta Saha, Olaf Landsiedel, Mun Choon Chan:
Start of Frame Delimiters (SFDs) for Simultaneous Intra-Group One-to-All Dissemination. 100-111 - Sumitro Bhaumik, Sandip Chakraborty:
Managing Container QoS with Network and Storage Workloads over a Hyperconverged Platform. 112-123 - Madhurima Buragohain, Chinmoy Jyoti Kathar, Chinmoy Kachari, Sunit Kumar Nandi, Sukumar Nandi:
SCAN: Smart Collaborative Attack in Named Data Networking. 124-133 - Min Chen, Thomas Dreibholz, Xing Zhou, Xuelei Yang:
Improvement and Implementation of a Multi-Path Management Algorithm based on MPTCP. 134-143 - Martin Langer, Kai Heine, Dieter Sibold, Rainer Bermbach:
A Network Time Security Based Automatic Key Management for PTPv2.1. 144-153 - Pavlo Gaiduk, Kumar Rajeev Ranjan, Thomas Basmer, Florian Tschorsch:
Privacy-Preserving Public Key Infrastructure for Vehicular Networks. 154-163 - Bouziane Brik, Adlen Ksentini:
On Predicting Service-oriented Network Slices Performances in 5G: A Federated Learning Approach. 164-171 - Christian Killer, Bruno Rodrigues, Eder John Scheid, Muriel Figueredo Franco, Moritz Eck, Nik Zaugg, Alex Scheitlin, Burkhard Stiller:
Provotum: A Blockchain-based and End-to-end Verifiable Remote Electronic Voting System. 172-183 - Théo Docquier, Ye-Qiong Song, Vincent Chevrier, Ludovic Pontnau, Abdelaziz Ahmed Nacer:
Determining a tight worst-case delay of switched Ethernet network in IEC 61850 architectures. 184-194 - José Mauricio Perdomo, Mårten Ericson, Mats Nordberg, Karl Andersson:
User Performance in a 5G Multi-connectivity Ultra-Dense Network City Scenario. 195-203 - Flavio Cirillo, Bin Cheng, Raffaele Porcellana, Marco Russo, Gürkan Solmaz, Hisashi Sakamoto, Simon Pietro Romano:
IntentKeeper: Intent-oriented Data Usage Control for Federated Data Analytics. 204-215 - Mohamed Hamnache, Rahim Kacimi, André-Luc Beylot:
L3SFA: Load Shifting Strategy for Spreading Factor Allocation in LoRaWAN Systems. 216-224 - Sina Keshvadi, Mehdi Karamollahi, Carey Williamson:
Traffic Characterization of Instant Messaging Apps: A Campus-Level View. 225-232 - Amirahmad Chapnevis, Ismail Güvenç, Eyuphan Bulut:
Traffic Shifting based Resource Optimization in Aggregated IoT Communication. 233-243 - Shruti Gandhi, Yannis Viniotis:
Guarantees for Mix-flows in Inter-Datacenter WANs in Single and Federated Clouds. 244-255 - Gunjan Mahindre, Rasika Karkare, Randy C. Paffenroth, Anura P. Jayasumana:
Inference in Social Networks from Ultra-Sparse Distance Measurements via Pretrained Hadamard Autoencoders. 256-266 - Nuray Baltaci Akhuseyinoglu, Maryam Karimi, Mai Abdelhakim, Prashant Krishnamurthy:
On Automated Trust Computation in IoT with Multiple Attributes and Subjective Logic. 267-278 - Abdullah Aydeger, Nico Saputro, Kemal Akkaya:
Cloud-based Deception against Network Reconnaissance Attacks using SDN and NFV. 279-285 - Salma Matoussi, Ilhem Fajjari, Nadjib Aitsaadi, Rami Langar:
Deep Learning based User Slice Allocation in 5G Radio Access Networks. 286-296 - Peter Willis, Nirmala Shenoy, Yin Pan, John F. Hamilton:
Root Redundancy in Meshed Tree Bridged Networks. 297-308 - Rreze Halili, Faqir Zarrar Yousaf, Nina Slamnik-Krijestorac, Girma M. Yilma, Marco Liebsch, Erik de Britto e Silva, Seilendria A. Hadiwardoyo, Rafael Berkvens, Maarten Weyn:
Leveraging MEC in a 5G System for Enhanced Back Situation Awareness. 309-320
Short papers
- Minglu Yan, Jiankun Wang, Zenghua Zhao:
Online Detection of Wi-Fi Fingerprint Alteration Strength via Deep Learning. 321-324 - Fei Ge, Liansheng Tan, Wei Zhang, Ming Liu, Xun Gao, Juan Luo:
Transmission Scheduling and End-to-end Throughput of Multi-hop Paths in Full-duplex Embedded Wireless Networks. 325-328 - Yuanyuan Cao, Bin Dai, Yijun Mo, Yang Xu:
IQoR: An Intelligent QoS-aware Routing Mechanism with Deep Reinforcement Learning. 329-332 - Chenglin Lee, Hidenori Nakazato:
Congestion Control Using Diffusion Method in Named Data Networking. 333-336 - Samuel Brack, Leonie Reichert, Björn Scheuermann:
CAUDHT: Decentralized Contact Tracing Using a DHT and Blind Signatures. 337-340 - Khalil Guibene, Marwane Ayaida, Lyes Khoukhi, Nadhir Messai:
Black-box System Identification of CPS Protected by a Watermark-based Detector. 341-344 - Eryk Schiller, Elfat Esati, Sina Rafati Niya, Burkhard Stiller:
Blockchain on MSP430 with IEEE 802.15.4. 345-348 - Rima Benelmir, Salim Bitam, Abdelhamid Mellouk:
An efficient autonomous vehicle navigation scheme based on LiDAR sensor in vehicular network. 349-352 - Ina Berenice Fink, Martin Serror, Klaus Wehrle:
Extending MUD to Smartphones. 353-356 - Ramtin Aryan, Anis Yazidi, Adel Bouhoula, Paal Einar Engelstad:
Net Auto-Solver: A formal approach for automatic resolution of OpenFlow anomalies. 357-360 - Amina Bensalem, Djallel Eddine Boubiche, Fen Zhou, Abderrezak Rachedi, Abdelhamid Mellouk:
Impact of Mobility Models on Energy Consumption in Unmanned Aerial Ad-Hoc Network. 361-364 - Tao Li, Christoph Hofmann, Elke Franz:
Secure and Reliable Data Transmission in SDN-based Backend Networks of Industrial IoT. 365-368 - Ali Dorri, Raja Jurdak:
Tree-Chain: A Fast Lightweight Consensus Algorithm for IoT Applications. 369-372 - Kalana Abeywardena, Jiawei Zhao, Lexi Brent, Suranga Seneviratne, Ralph Holz:
Triplet Mining-based Phishing Webpage Detection. 377-380 - Weixian Yao, Yexuan Li, Weiye Lin, Tianhui Hu, Imran Chowdhury, Rahat Masood, Suranga Seneviratne:
Security Apps under the Looking Glass: An Empirical Analysis of Android Security Apps. 381-384 - Samad Saadatmand, Salil S. Kanhere:
ACOMTA: An Ant Colony Optimisation based Multi-Task Assignment Algorithm for Reverse Auction based Mobile Crowdsensing. 385-388 - Kwon Nung Choi, Achintha Wijesinghe, Chamara Manoj Madarasingha Kattadige, Kanchana Thilakarathna, Suranga Seneviratne, Guillaume Jourjon:
SETA: Scalable Encrypted Traffic Analytics in Multi-Gbps Networks. 389-392 - Muhammad Ahmad Raza, Mehran Abolhasan, Justin Lipman, Negin Shariati, Wei Ni:
Statistical Learning-Based Dynamic Retransmission Mechanism for Mission Critical Communication: An Edge-Computing Approach. 393-396 - Summera Nosheen, Jamil Y. Khan:
An Adaptive TXOP Sharing Algorithm for Multimedia Traffic in IEEE802.11ac Networks. 397-400 - Renato Caminha Juaçaba-Neto, Pascal Mérindol, Fabrice Theoleyre:
A Multi-Domain Framework to Enable Privacy for Aggregated IoT Streams. 401-404 - Aljoscha Dietrich, Dominik Leibenger, Christoph Sorge:
On the Lack of Anonymity of Anonymized Smart Meter Data: An Empiric Study. 405-408 - Fabian Marquardt, Christopher Schmidt:
Don't Stop at the Top: Using Certificate Transparency Logs to Extend Domain Lists for Web Security Studies. 409-412 - Samira Chouikhi, Lyes Khoukhi, Samiha Ayed, Marc Lemercier:
An Efficient Reputation Management Model based on Game Theory for Vehicular Networks. 413-416 - Maximilian Bachl, Joachim Fabini, Tanja Zseby:
LFQ: Online Learning of Per-flow Queuing Policies using Deep Reinforcement Learning. 417-420 - Ahmed Alutaibi, Sudhakar Ganti:
Network Traffic Prediction using Quantile Regression with linear, Tree, and Deep Learning Models. 421-424 - Yu Liu, Craig A. Shue:
Beyond the VPN: Practical Client Identity in an Internet with Widespread IP Address Sharing. 425-428 - Jason Posner, Lewis Tseng, Moayad Aloqaily, Mohsen Guizani:
Federated Vehicular Networks: Design, Applications, Routing, and Evaluation. 429-432 - Fatih Yucel, Eyuphan Bulut:
Time-dependent Stable Task Assignment in Participatory Mobile Crowdsensing. 433-436 - Connor Egbert, Fawaz Alhenaki, Daryl Johnson:
Leveraging a Music Streaming Platform in Establishing a Novel Storage Covert Channel. 437-440 - Syed Usman Jamil, M. Arif Khan, Sabih ur Rehman:
Intelligent Task Off-Loading and Resource Allocation for 6G Smart City Environment. 441-444 - Jonathan Kua, Philip Branch, Grenville Armitage:
Detecting Bottleneck Use of PIE or FQ-CoDel Active Queue Management During DASH-like Content Streaming. 445-448 - Carlos A. Rivera Alvarez, Arash Shaghaghi, Salil S. Kanhere:
Towards a Distributed Defence Mechanism Against IoT-based Bots. 449-452 - Ryosuke Nagayoshi, Yosuke Tanigawa, Hideki Tode:
A Collision-Protected Multihop Frame Transmission Method with Wireless LAN Communication Supported by Longer-Distance Wireless Communication. 453-456 - Inaam Ilahi, Muhammad Usama, Muhammad Omer Farooq, Muhammad Umar Janjua, Junaid Qadir:
LoRaDRL: Deep Reinforcement Learning Based Adaptive PHY Layer Transmission Parameters Selection for LoRaWAN. 457-460 - Madhav Tummala, Sudipta Saha:
Concurrent Transmission Based Data Sharing with Run-Time Variation of TDMA Schedule. 461-464 - Jianmin Liu, Qi Wang, Chentao He, Yongjun Xu:
ARdeep: Adaptive and Reliable Routing Protocol for Mobile Robotic Networks with Deep Reinforcement Learning. 465-468 - Arkadeep Sen, Krishna M. Sivalingam:
Rate Adaptation Techniques Using Contextual Bandit Approach for Mobile Wireless LAN Users. 469-472
Doctoral-track papers
- Ekaterina Volodina, Erwin P. Rathgeb:
Flow Control in the Context of the Multiplexed Transport Protocol QUIC. 473-478 - Aya Koyama, Yosuke Tanigawa, Hideki Tode:
Transmission Timing Control to Avoid Collisions Among Both Aperiodic and Periodic Packets in Wireless Sensor Networks. 479-484 - Sina Rafati Niya, Benjamin Jeffrey, Burkhard Stiller:
KYoT: Self-sovereign IoT Identification with a Physically Unclonable Function. 485-490 - Jiarui Song, Beibei Li, Yuhao Wu, Yaxin Shi, Aohan Li:
ReAL: A New ResNet-ALSTM Based Intrusion Detection System for the Internet of Energy. 491-496 - Bharat Agarwal, Mohammed Amine Togou, Marco Ruffini, Gabriel-Miro Muntean:
Mitigating the Impact of Cross-Tier Interference on Quality in Heterogeneous Cellular Networks. 497-502 - Abdulsalam Basabaa, Ehab S. Elmallah:
Bounding Path Exposure in Energy Harvesting Wireless Sensor Networks Using Pathsets and Cutsets. 503-508 - Tomás Fukac, Vlastimil Kosar, Jan Korenek, Jirí Matousek:
Increasing Throughput of Intrusion Detection Systems by Hash-Based Short String Pre-filter. 509-514
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.