default search action
33rd ICCCN 2024: Kailua-Kona, HI, USA
- 33rd International Conference on Computer Communications and Networks, ICCCN 2024, Kailua-Kona, HI, USA, July 29-31, 2024. IEEE 2024, ISBN 979-8-3503-8461-1
- Dylan Cirimelli-Low, J. J. Garcia-Luna-Aceves:
LEMUR: Efficient Multicasting in Ad-hoc Networks Using Label Switching and Unicast Routing. 1-7 - Sopan Sarkar, Mohammad Hossein Manshaei, Marwan Krunz, Hamid Ravaee:
RecuGAN: A Novel Generative AI Approach for Synthesizing RF Coverage Maps. 1-9 - Caroline Rublein, Fidan Mehmeti, Mark Mahon, Thomas F. La Porta:
Impact of Client Choice on Distributed Resource Allocation in Edge Computing. 1-9 - Fannv He, Jice Wang, Yuhang Huang, Xiancui Peng, Yuqing Zhang:
LibGuard: Protecting Sensitive Data In Android Third-Party Libraries From XLDH Attacks. 1-6 - Miao Li, Siyi Qiu, Jiong Liu, Wenping Song:
Content Caching Optimization Based on Improved Bandit Learning Algorithm. 1-4 - Paolo Bellavista, Armir Bujari, Luca Foschini, Andrea Sabbioni, Riccardo Venanzi:
A MECApp-aware Lifecycle Management Approach in 5G Edge-Cloud Deployments. 1-6 - Luke McHale, Paul V. Gratz, Alex Sprintson:
Flow Correlator: A Flow Table Cache Management Strategy. 1-9 - Sk Samiul Reza, Murat Yuksel:
UAV Trajectory Optimization for Air-to-Water Optical Wireless Channels. 1-9 - Vishal Choudhary, Rahul Aggarwal, Hock Beng Lim, Binbin Chen:
ViEdge: An Edge-based Platform for Video Analytics Applications in Smart Estates. 1-2 - Muhamed Alarbi, Robert Belson, Hanan Lutfiyya:
ECO: Edge Continuum Orchestrator Framework for managing serverless chains across the Cloud-Edge Spectrum. 1-6 - Nitin Datta Movva, Genya Ishigaki:
Neural Network-based Blocking Prediction for Dynamic Network Slicing. 1-6 - Mincheol Shin, Sang-Yoon Chang, Jonghyun Kim, Kyungmin Park, Jinoh Kim:
Intelligent Trajectory-based Approach to UAV Location Integrity Checks. 1-9 - Waltenegus Dargie, Zegeye Mekasha Kidane:
Mitigating Cross-Technology Interference in Low-Power Wireless Networks. 1-8 - Fernando Martinez, Mariyam Mapkar, Ali Alfatemi, Mohamed Rahouti, Yufeng Xin, Kaiqi Xiong, Nasir Ghani:
Redefining DDoS Attack Detection Using A Dual-Space Prototypical Network-Based Approach. 1-9 - Chenglong Shao, Kazuya Tsukamoto, Yi-Wei Ma, Yingbo Hua, Xianpeng Wang:
CoWiL: Combating Cross-Technology Interference in LoRaWAN. 1-6 - Satoru Okamoto:
Networking Experiments in the Keio Future Photonic Network Open Laboratory with Field-installed Hollow-Core Optical Fiber Cables. 1-9 - Jinning Li, Ruipeng Han, Chenkai Sun, Dachun Sun, Ruijie Wang, Jingying Zeng, Yuchen Yan, Hanghang Tong, Tarek F. Abdelzaher:
Large Language Model-Guided Disentangled Belief Representation Learning on Polarized Social Graphs. 1-9 - Aitian Ma, Jean C. Tonday Rodriguez, Mo Sha:
Enabling Reliable Environmental Sensing with LoRa, Energy Harvesting, and Domain Adaptation. 1-9 - Wanghong Yang, Wenji Du, Baosen Zhao, Tingting Yuan, Yongmao Ren, Xu Zhou, Qinghua Wu, Xiaoming Fu:
Deadline-oriented Flow Control for Real-time UHD Videos in 5G Edge Networks. 1-9 - David Perez Abreu, Karima Velasquez, Marília Curado, Edmundo Monteiro:
Unlocking Efficiency in B5G Networks: The Need for Adaptive Service Function Chains. 1-8 - Rana D. Hegazy, Laurence B. Milstein, Pamela C. Cosman:
Performance Analysis for Underwater Video Transmission with Imperfect Resampling. 1-9 - Yuliang Chen, Xi Lin, Hansong Xu, Siyi Liao, Jin Guo, Chunming Zou:
Leveraging Blockchain and Coded Computing for Secure Edge Collaborate Learning in Industrial IoT. 1-6 - Sourav Purification, Simeon Wuthier, Jinoh Kim, Jonghyun Kim, Sang-Yoon Chang:
Fake Base Station Detection and Blacklisting. 1-9 - Shaurya Purohit, Manimaran Govindarasu:
FL-EVCS: Federated Learning based Anomaly Detection for EV Charging Ecosystem. 1-9 - Ehsan Ghoreishi, Bahman Abolhassani, Yan Huang, Shiva Acharya, Wenjing Lou, Y. Thomas Hou:
Cyrus: A DRL-based Puncturing Solution to URLLC/eMBB Multiplexing in O-RAN. 1-9 - Marek Michalski:
Switching Fabric Internal State Analyzer. 1-2 - Zuobin Xiong, Wei Li, Zhipeng Cai:
Appro-Fun: Approximate Machine Unlearning in Federated Setting. 1-9 - Phil Aupke, Akihiro Nakao, Andreas Kassler:
Uncertainty-Aware Forecasting of Computational Load in MECs Using Distributed Machine Learning: A Tokyo Case Study. 1-6 - Claudio Cicconetti, Raffaele Bruno, Andrea Passarella:
Energy-Efficient Deployment of Stateful FaaS Vertical Applications on Edge Data Networks. 1-9 - Hyungsub Kim, Hayoung Kim, Somi Baek, Ryan Melenchuk, Jaden Soroka, Anthony Smith:
Hybrid LoRa Network Architecture: Automatic Switching between LoRaWAN and LoRa Mesh Network in Environments with Dynamic Obstacle Variations. 1-6 - Tanmoy Sen, Haiying Shen:
Adversarial Attack Detection for Deep Learning Driving Maneuver Classifiers in Connected Autonomous Vehicles. 1-9 - Ningning Wang, Tianya Zhao, Shiwen Mao, Harrison X. Bai, Zhicheng Jiao, Xuyu Wang:
ECG-grained Cardiac Monitoring Using RFID. 1-9 - Jiang Han, Xiaowei Peng, Hequn Xian, Dalin Yang:
A Distortion Free Watermark Scheme for Relational Databases. 1-6 - DeMarcus Edwards, Danda B. Rawat:
SleepWalker: Constrastive Fine-tuning Technique for Text to Kinematics Models for Human Computer Interaction. 1-7 - Priscila Silva, Gaspard Baye, Alexandre Broggi, Nathaniel D. Bastian, Gökhan Kul, Lance Fiondella:
Predicting F1-Scores of Classifiers in Network Intrusion Detection Systems. 1-6 - Jiyeon Lee, Soonseok Kim:
Implementation and Performance Measurement of the SUHDSA (Secure, Useful, and High-performance Data-Stream Anonymization)+ Algorithm. 1-2 - Kelei Zhang, Sang-Yoon Chang:
Performance or Anonymity? Source-Driven Tor Relay Selection for Performance Enhancement. 1-9 - Shenghang Chen, Zhicheng Xu, Kun Zhou, Xiaoli Zhang, Hongbing Cheng:
RobustETH: Ensuring Economic Fairness in ETH2.0's Distributed Validator Technology. 1-9 - Marek Michalski:
The Hardware and Software Test Bed for MPTCP. 1-2 - Zihao Zhao, Sijia Cao, Hanlin Zhang, Jie Lin, Fanyu Kong, Leyun Yu:
Privacy-Preserving Group Closeness Maximization. 1-6 - Van An Le, Duc Long Nguyen, Phi Le Nguyen, Yusheng Ji:
Traffic Engineering in Large-scale Networks via Multi-Agent Deep Reinforcement Learning with Joint-Training. 1-9 - Tianshi Wang, Yizhuo Chen, Qikai Yang, Dachun Sun, Ruijie Wang, Jinyang Li, Tomoyoshi Kimura, Tarek F. Abdelzaher:
Data Augmentation for Human Activity Recognition via Condition Space Interpolation within a Generative Model. 1-9 - Eiji Oki, Haruto Taka, Takeru Inoue:
Enhancing Capacity of Optical Circuit Switching Clos Network in Data Center: Progress and Challenges. 1-9 - Renascence Tarafder Prapty, Sashidhar Jakkamsetti, Gene Tsudik:
KESIC: Kerberos Extensions for Smart, IoT and CPS Devices. 1-9 - Austin Chen, Genya Ishigaki:
Scaling Container Caching to Larger Networks with Multi-Agent Reinforcement Learning. 1-5 - Sida Huang, Jialuoyi Tan, Yuji Dong, Jie Zhang:
Web3.0 Literary Landscape: Deep Learning and Blockchain for Nobel Prize Predictions. 1-6 - Shuntaro Yanagisawa, Kohki Yamada, Atsushi Sekiguchi, Takao Kondo, Ken Kumakura, Keisuke Maesako, Liang Zhang, Kosuke Mori, Fumio Teraoka:
Sharing Stateless Containers among MEC Applications Composed of Multiple Containers. 1-6 - Jianzhou Mao, Guobin Xu, Eric Sakk, Shuangbao Wang:
Advancing Network Security with Quantum-Safe System Integration. 1-9 - Yu Chan, Pin-Yu Lin, Yu-Yun Tseng, Jen-Jee Chen, Yu-Chee Tseng:
Learning-Based WiFi Fingerprint Inpainting via Generative Adversarial Networks. 1-7 - Xu Tao, Jackson Butcher, Simone Silvestri, Flavio Esposito:
iCrop: Enabling High-Precision Crop Disease Detection via LoRa Technology. 1-9 - Saleh J. Makkawy, Abdalrahman H. Alblwi, Michael J. De Lucia, Kenneth E. Barner:
Improving Android Malware Detection with Entropy Bytecode-to-Image Encoding Framework. 1-9 - Hengyan Liu, Wenzhang Zhang, Tianhong Dai, Longfei Yin, Guangyu Ren:
Multimodal Frequeny Spectrum Fusion Schema for RGB-T Image Semantic Segmentation. 1-6 - Nicholas Skjellum, Mohamed Shaban, Muhammad Ismail:
Secure and Efficient Entanglement Distribution Protocols for Near-Term Quantum Internet. 1-9 - Mustafa Al Lail, Daniela Pinto, Luis Alvarez Almanza, Francisco Salazar, Carolina Rizzi:
Beyond Traditional Methods: Deep Learning with Data Augmentation for Robust Access Control. 1-6 - Dereje Shenkut, B. V. K. Vijaya Kumar:
Impact of Latency and Bandwidth Limitations on the Safety Performance of Collaborative Perception. 1-8 - Joanna Weissenberg, Marek Michalski:
Hardware Simulation of Multi-Service Queues. 1-2 - Kasidis Arunruangsirilert, Jiro Katto:
Evaluation of Hardware-based Video Encoders on Modern GPUs for UHD Live-Streaming. 1-9 - Yalong Wu, Shalini Dhamodharan, Vinuthna Ghattamaneni, Narmada Kokila, Chandrika Pathakamuri, Timothy Carter, Pu Tian, Kewei Sha:
Big Data Quality Scoring for Structured Data Using MapReduce. 1-6 - Marek Michalski:
The Remote Networking Lab Manager. 1-2 - Jiblal Upadhya, Kritagya Upadhyay, Arpan Sainju, Samir Poudel, Md. Nahid Hasan, Khem Poudel, Jaishree Ranganathan:
QuadraCode AI: Smart Contract Vulnerability Detection with Multimodal Representation. 1-9 - Jian Wang, Jack Chuang, Sebastian Semper, Nada Golmie:
Super-resolution Localization and Tracking in WiFi Sensing. 1-9 - Yannik Böck, Holger Boche, Riccardo Bassoli, Frank H. P. Fitzek:
Foundations of In-Network Quantum Computing for Future Communication Networks. 1-9 - Owen Hilyard, Bocheng Cui, Marielle Webster, Abishek Bangalore Muralikrishna, Aleksey Charapko:
Cloudy Forecast: How Predictable is Communication Latency in the Cloud? 1-9 - Hamdi Selim Akin, Mehmet Emin Aktas, Muhammed Ifte Islam, Tanvir Hossain, Esra Akbas:
Exploring Similarity-Based Graph Compression for Efficient Network Analysis and Embedding. 1-6 - Benjamin Birchman, Geethapriya Thamilarasu:
Securing Federated Learning: Enhancing Defense Mechanisms against Poisoning Attacks. 1-6 - Jiyeon Lee:
Private Set Intersection Protocol with Perfect Hashing on OKVS: An Enhanced Approach for Privacy-Preserving Operations. 1-2 - Kshitiz Aryal, Maanak Gupta, Mahmoud Abdelsalam, Moustafa Saleh:
Explainability Guided Adversarial Evasion Attacks on Malware Detectors. 1-9 - Nawras Alkassab, Chin-Tser Huang, Tania Lorido-Botran:
DeePref: Deep Reinforcement Learning For Video Prefetching In Content Delivery Networks. 1-6 - Jiang Han, Hequn Xian, Dalin Yang, Han Jiang:
Location Privacy Protection Method with Route Constraints. 1-6 - Matthias Frei, Reinhard German, Anatoli Djanatliev:
An Edge Resource Selection Scheme Considering QoS and Computational Parameters. 1-9 - Yiyu Yang, Yuqing Zhang:
SHPAC: Fine-grained and Multi-platform Supported Access Control System for Smart Home Scenario. 1-6 - DeMarcus Edwards, Danda B. Rawat:
Agent Deprogramming Finetuning Away Backdoor Triggers for Secure Machine Learning Models/LLMs. 1-6 - Jinyang Li, Yizhuo Chen, Tomoyoshi Kimura, Tianshi Wang, Ruijie Wang, Denizhan Kara, Yigong Hu, Li Wu, Walid A. Hanafy, Abel Souza, Prashant J. Shenoy, Maggie B. Wigness, Joydeep Bhattacharyya, Jae Kim, Guijun Wang, Greg Kimberly, Josh D. Eckhardt, Denis Osipychev, Tarek F. Abdelzaher:
Acies-OS: A Content-Centric Platform for Edge AI Twinning and Orchestration. 1-9 - Abhinav Gupta, Radim Bartos:
Improving Web Content Delivery with HTTP/3 and Non-Incremental EPS. 1-9 - Rita Ingabire, Antonio Bazco Nogueras, Vincenzo Mancuso, Luis M. Contreras, Jesús Folgueira:
Clearing Clouds from the Horizon: Latency Characterization of Public Cloud Service Platforms. 1-9 - Akito Suzuki, Masahiro Kobayashi, Eiji Oki:
Cooperative Task Offloading for Multi-Access Edge-Cloud Networks: A Multi-Group Multi-Agent Deep Reinforcement Learning. 1-9 - Xinliang Wei, Jiyao Liu, Lei Fan, Yuanxiong Guo, Zhu Han, Yu Wang:
Hybrid Quantum-Classical Computing via Dantzig-Wolfe Decomposition for Integer Linear Programming. 1-9 - Ankith Indra Kumar, Genya Ishigaki:
Advanced DDoS Attack Classification using Ensemble Model with Meta-Learner. 1-2 - Felix Savins, Kevin Saric, Gowri Sankar Ramachandran, Raja Jurdak:
Efficient URL and URI Compression. 1-9 - Allan Ko, Thomas H. Shake, Rahul Amin:
Comparing Space Versus Surface Gateways for Internetworking pLEO Satellite Networks. 1-9 - Aparna Ganesan, Kamil Saraç:
In-network Reinforcement Learning for Attack Mitigation using Programmable Data Plane in SDN. 1-9 - Andres Hinojosa, Nahid Ebrahimi Majd:
Edge Computing Network Intrusion Detection System in IoT Using Deep Learning. 1-6 - Shu-Po Tung, Yu-Min Lin, Keng-Lun Chang, Hsu-Chun Hsiao, Tiffany Hyun-Jin Kim:
Detecting IP Prefix Mismatches on SDN Data Plane. 1-9 - Alice Bizzarri, Brian Jalaian, Fabrizio Riguzzi, Nathaniel D. Bastian:
A Neuro-Symbolic Artificial Intelligence Network Intrusion Detection System. 1-9 - Hyeonmin Lee, Taehyun Kang, Sukhun Yang, Jinyong Jun, Taekyoung Kwon:
DDD: A DNS-based DDoS Defense Scheme Using Puzzles. 1-9 - Agnideven Palanisamy Sundar, Feng Li, Xukai Zou, Tianchong Gao:
Toward Multimodal Vertical Federated Learning: A Traffic Analysis Case Study. 1-9 - Cheng Qian, Mian Qian, Kun Hua, Hengshuo Liang, Guobin Xu, Wei Yu:
Digital Twin based Internet of Vehicles. 1-6 - Alireza Famili, Amin Tabrizian, Tolga O. Atalay, Angelos Stavrou, Peng Wei:
RAPID: Reinforcement Learning-Aided Femtocell Placement for Indoor Drone Localization. 1-9 - Zhengkun Ye, Yan Wang, Yingying Chen:
CasePad: Privacy-preserving Finger Activity Sensing via Passive Acoustic Signals Enhanced by Mini-Structures in Smartphone Cases. 1-9 - José Santos, Tim Wauters, Filip De Turck, Peter Steenkiste:
Towards Optimal Load Balancing in Multi-Zone Kubernetes Clusters via Reinforcement Learning. 1-9 - Luca Hernández Acosta, Andreas Reinhardt, Tobias Müller, Delphine Reinhardt:
Beyond Wake Words: Advancing Smart Speaker Protection with Continuous Authentication and Local Profiles. 1-9 - Mohammad Reza Mousavi, Stephan Ludwig:
Performance Analysis of HFrFT Based on Wigner Transform for ISAC Applications. 1-6 - Antonello Barbone, Samuele Burattini, Matteo Martinelli, Marco Picone, Alessandro Ricci, Antonio Virdis:
Digital Twin Continuum: a Key Enabler for Pervasive Cyber-Physical Environments. 1-9 - Mingming Chen, Thomas La Porta, Trent Jaeger, Srikanth V. Krishnamurthy:
Lightweight Coordinated Sampling for Dynamic Flows under Budget Constraints. 1-9 - Xiaotong Zhao, Hanlin Zhang, Jie Lin, Fanyu Kong, Leyun Yu:
Privacy-Preserving Edge Assistance for Solving Matrix Eigenvalue Problem. 1-6 - Yuan Gao, Xinchen Xu, Bintao Hu, Jianbo Du, Wenrui Yang, Yanliang Jin:
Channel Estimation for MIMO-OTFS Satellite Communication: a Deep Learning-Based Approach. 1-6 - Jordi Thijsman, Merlijn Sebrechts, Filip De Turck, Bruno Volckaert:
Trusting the Cloud-Native Edge: Remotely Attested Kubernetes Workers. 1-6 - Md Asif Ishrak Sarder, Murat Yuksel, Elizabeth Bentley:
Eavesdropper-Avoiding Neighbor Discovery for Multi-Sector Directional Wireless Systems. 1-9 - Simon Keller, Rainer Mueller:
Individual Dynamic Real-Time Range Queries in Adaptive Quad Streaming. 1-9 - Yilin Wang, Zi Wang, Jie Yang:
Acoustic-based Alphanumeric Input Interface for Earables. 1-9 - Theofanis P. Raptis, Chiara Boldrini, Marco Conti, Andrea Passarella:
On the Potential of an Independent Avatar to Augment Metaverse Social Networks. 1-9 - Gift Idama, Yifan Guo, Wei Yu:
QATFP-YOLO: Optimizing Object Detection on Non-GPU Devices with YOLO Using Quantization-Aware Training and Filter Pruning. 1-6 - Yongzhi Wang, Venkata Sai Ramya Padmasri Boggaram:
Towards Protecting On-Device Machine Learning with RISC-V based Multi-Enclave TEE. 1-6 - Abhimanyu Venkatraman Sheshashayee, Chiara Petrioli, Stefano Basagni:
On the Impact of Overcoming Wake-up Radio Limitations on the Performance of Energy Aware Routing in Wireless Sensor Networks. 1-9 - Hassan El Alami, Danda B. Rawat:
A Novel Neural Networks-based Framework for APT Detection in Networked Autonomous Systems. 1-6 - Chathumi Samaraweera, Dongming Peng, Adarsha Bhattarai, Yutong Liu:
Poster: Embedded-Based Differentiated Communication for Remote ECG Monitoring with a Multi-Level Blockchain System. 1-2 - Zejian Zhou, Lijun Qian, Hao Xu:
Decentralized Multi-agent Reinforcement Learning for Large-scale Mobile Wireless Sensor Network Control Using Mean Field Games. 1-6 - Md. Kamal Hossain Chowdhury, Purushotham V. Bangalore:
Data Security Approaches to Support Open Science on High-Performance Computing Systems. 1-6 - Lei Zhang, Jingguo Ge, Yulei Wu, Tong Li, Hui Li, Yuepeng E:
On Improved Efficiency and Forward Security of 0-RTT Key Exchange for SDP. 1-9 - Guoping Wang:
A Cost-Effective Long-Distance Industrial IoT System. 1-5 - Quincy Card, Kshitiz Aryal, Maanak Gupta:
Explainability-Informed Targeted Malware Misclassification. 1-8 - Hairuo Xu, Tao Shu:
Hide-and-Seek: Data Sharing with Customizable Machine Learnability and Privacy. 1-9 - Robin Laidig, Jona Herrmann, Frank Dürr, Kurt Rothermel:
Usage-Dependent Quality of Service for Free WiFi Networks. 1-9 - Anindya Bal, Sumit Chowdhury, Haofan Cai:
Downlink STBC-GSSK and STBC-UAV Assisted NOMA for 6G and Beyond. 1-2
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.