


default search action
31st ICCCN 2022: Honolulu, HI, USA
- 31st International Conference on Computer Communications and Networks, ICCCN 2022, Honolulu, HI, USA, July 25-28, 2022. IEEE 2022, ISBN 978-1-6654-9726-8

- Ronghua Xu, Yu Chen, Xiaohua Li, Erik Blasch:

A Secure Dynamic Edge Resource Federation Architecture for Cross-Domain IoT Systems. 1-7 - Zahra Jadidi

, Shantanu Pal, Nithesh Nayak K, Arawinkumaar Selvakkumar, Chih-Chia Chang, Maedeh Beheshti, Alireza Jolfaei
:
Security of Machine Learning-Based Anomaly Detection in Cyber Physical Systems. 1-7 - Miguel Belém, Pedro Fouto, Taras Lykhenko, João Leitão

, Nuno M. Preguiça
, Luís Rodrigues:
Engage: Session Guarantees for the Edge. 1-10 - Yujian Zhang, Mingde Li, Fei Tong:

An Energy-Efficient Load Balancing Scheme in Heterogeneous Clusters by Linear Programming. 1-10 - Rajkumar Buyya, Krishna Kant, Ting He:

Conference Information: Message from the Program Co-Chairs. 1-2 - Stuart Baxley

, Deniz Gurkan, Hamidreza Validi
, Illya V. Hicks:
Graph Representation of Computer Network Resources for Precise Allocations. 1-10 - Gordon Werner, Shanchieh Yang:

Discovery of Rare yet Co-occurring Actions with Temporal Characteristics in Episodic Cyberattack Streams. 1-10 - Yi Yue

, Wencong Yang, Xuebei Zhang, Rong Huang, Xiongyan Tang:
A QoS Guarantee Mechanism for Service Function Chains in NFV-enabled Networks. 1-2 - Tripti Samal

, Rudra Dutta
, Ismail Güvenç
, Mihail L. Sichitiu
, Brian A. Floyd
, Thomas Zajkowski:
Automating Operator Oversight in an Autonomous, Regulated, Safety-Critical Research Facility. 1-10 - Yi Qin, Tianming Zheng, Yue Wu, Futai Zou:

Tracing Tor Hidden Service Through Protocol Characteristics. 1-9 - Nadia Niknami, Abdalaziz Sawwan

, Jie Wu:
A Defense-Attack Game under Multiple Preferences and Budget Constraints with Equilibrium. 1-10 - Sheng Pan, Xin Ming Zhang

, Dan Keun Sung:
Intelligent Reflecting Surface-Aided Centralized Scheduling for mmWave V2V Networks. 1-10 - Ningchun Liu, Shuai Gao, Teng Liang, Xindi Hou, Sajal K. Das:

An ICN-based Secure Task Cooperation Scheme in Challenging Wireless Edge Networks. 1-7 - Weixiang Chen, Bo Gu

, Xiaojun Tan, Chenhua Wei:
Radio Resource Selection in C-V2X Mode 4: A Multiagent Deep Reinforcement Learning Approach. 1-8 - Hasibul Jamil, Lavone Rodolph, Jacob Goldverg, Tevfik Kosar

:
Energy-Efficient Data Transfer Optimization via Decision-Tree Based Uncertainty Reduction. 1-10 - Haolin Tang, Salih Sarp, Yanxiao Zhao, Wei Wang, Chunsheng Xin:

Security and Threats of Intelligent Reflecting Surface Assisted Wireless Communications. 1-9 - Junyang Shi, Mo Sha

:
Localizing Campus Shuttles from One Single Base Station Using LoRa Link Characteristics. 1-10 - Diego O. Rodrigues, Torsten Braun

, Guilherme Maia, Leandro Villas
:
Mobility-aware Software-Defined Service-Centric Networking. 1-10 - Simon Keller, Rainer Mueller:

Server Workload Assignment for Real-Time Range Queries in Adaptive Quad Streaming Sensor Environments. 1-10 - Fangping Lan, Sanchari Biswas

, Bin Gui, Jie Wu, Anduo Wang:
Design and Implementation of a Strong Representation System for Network Policies. 1-10 - Fengjiao He, Wenchuan Yang, Baojiang Cui, Jia Cui:

Intelligent Fuzzing Algorithm for 5G NAS Protocol Based on Predefined Rules. 1-7 - Lucas Bréhon-Grataloup

, Rahim Kacimi, André-Luc Beylot:
Context-aware task offloading with QoS-provisioning for MEC multi-RAT vehicular networks. 1-9 - Shantanu Pal, Ambrose Hill, Tahiry M. Rabehaja, Michael Hitchens

:
VeriBlock: A Blockchain-Based Verifiable Trust Management Architecture with Provable Interactions. 1-7 - Sunghyun Moon, Youngho Kim, Hyunjong Lee, Donghoon Kim, Doosung Hwang:

Evolved IoT Malware Detection using Opcode Category Sequence through Machine Learning. 1-7 - Kasidis Arunruangsirilert

, Bo Wei
, Hang Song, Jiro Katto
:
Performance Evaluation of Low-Latency Live Streaming of MPEG-DASH UHD video over Commercial 5G NSA/SA Network. 1-6 - Yucheng Xie, Ruizhe Jiang, Xiaonan Guo, Yan Wang

, Jerry Cheng, Yingying Chen:
mmFit: Low-Effort Personalized Fitness Monitoring Using Millimeter Wave. 1-10 - Ziad Kassam

, Paulo Sérgio Almeida
, Ali Shoker:
Exon: An Oblivious Exactly-Once Messaging Protocol. 1-10 - Fiona Carroll

, Rhyd Lewis:
Internet Security Aesthetics: Can internet transparency afford social trust? 1-2 - Matthias Grundmann, Otto von Zastrow-Marcks, Hannes Hartenstein:

On the Applicability of Payment Channel Networks for Allocation of Transport Ticket Revenues. 1-7 - Jie Lu, Hongchang Chen, Zhen Zhang:

LUSketch: A Fast and Precise Sketch for top-k Finding in Data Streams. 1-10 - Xin Xu, Wei Wang, Jingqiang Lin, Zhen Yang, Haoling Fan, Qiongxiao Wang:

LiTIV: A Lightweight Traceable Data Integrity Verification Scheme for Version Control Systems. 1-10 - Mert Cevik, Michael J. Stealey

, Cong Wang, Jeronimo Bezerra, Julio Ibarra, Vasilka Chergarova, Heidi Morgan, Yufeng Xin
:
Towards Production Deployment of a SDX Control Framework. 1-10 - Jim Martin, Manveen Kaur, Long Cheng, Abolfazi Razi:

Towards Connecting the Disconnected Internet. 1-7 - Kamrul Hasan, Sachin Shetty

, Tariqul Islam, Imtiaz Ahmed:
Predictive Cyber Defense Remediation against Advanced Persistent Threat in Cyber-Physical Systems. 1-10 - Wenxu Jia, Yipeng Wang, Yingxu Lai, Huijie He, Ruiping Yin:

FITIC: A Few-shot Learning Based IoT Traffic Classification Method. 1-10 - Samir Si-Mohammed, Thomas Begin, Isabelle Guérin Lassous, Pascale Vicat-Blanc:

ADIperf: A Framework for Application-driven IoT Network Performance Evaluation. 1-8 - Zhewei Tang, Tong Zhang, Kun Zhu:

ORSM: Online Routing and Scheduling Mechanism for Mix-flows in Data Center Networks. 1-10 - Enrique Rodicio, Deng Pan, Jason Liu

, Bin Tang:
Achieving High End-to-End Availability in VNF Networks. 1-10 - Tianxiang Tan, Yibo Wu, Zida Liu, Guohong Cao:

Worker Selection for On-Demand Crowdsourcing. 1-10 - Li-Hsing Yang, Shin-Shan Huang, Tsai-Ling Cheng, Yi-Ching Kuo, Jian-Jhih Kuo

:
Socially-aware Collaborative Defense System against Bit-Flip Attack in Social Internet of Things and Its Online Assignment Optimization. 1-10 - Najmeh Abedzadeh, Matthew Jacobs:

Using Markov Chain Monte Carlo Algorithm for Sampling Imbalance Binary IDS Datasets. 1-7 - Danyang Zheng

, Chengzong Peng, Ben Wang, Xiaojun Cao
:
Towards Deterministic Fault-Tolerant Service Function Slicing in Edge Networks. 1-8 - Giuseppe Tricomi, Luca D'Agati

, Zakaria Benomar, Francesco Longo, Giovanni Merlino, Antonio Puliafito:
Interfacing Intelligent Personal Assistant to SDI/O with one click. 1-8 - Zewen Huang, Kui Wu, Shengqiang Huang, Yang Zhou, Ronnie Salvador Giagone:

Automatic Field Extraction of Extended TLV for Binary Protocol Reverse Engineering. 1-10 - Hui Zhuang, Tao He, Qun Niu

, Ning Liu:
Efficient Indoor Localization with Multiple Consecutive Geomagnetic Sequences. 1-9 - Cameron Hickert, Ali Tekeoglu

, Joseph Maurio, Ryan Watson, Daniel P. Syed, Jeffrey S. Chavis, Gill Brown, Tamim Sookoor
:
Distributed Ledgers for Enhanced Machine-to-Machine Trust in Smart Cities. 1-7 - Prasesh Adina, Muhammad Shahzad:

A Distributed & Lightweight Framework to Secure IoT Networks Against Network Layer Attacks. 1-9 - Caroline Rublein

, Fidan Mehmeti, Taha D. Gunes, Sebastian Stein, Thomas F. La Porta:
Scalable Resource Allocation Techniques for Edge Computing Systems. 1-10 - Shivam Garg, Nandini Venkatraman, Elizabeth Serena Bentley, Sunil Kumar:

An Asynchronous Multi-Beam MAC Protocol for Multi-Hop Wireless Networks. 1-9 - Purboday Ghosh, Shashank Shekhar

, Yashen Lin
, Ulrich Münz, Gabor Karsai:
Peer-to-Peer Communication Trade-Offs for Smart Grid Applications. 1-10 - Muztaba Fuad

, Debzani Deb
, Brixx-John G. Panlaqui, Charles F. Mickle:
Using RSSI to Form Path in an Indoor Space. 1-2 - Adam Duby, Teryl Taylor, Gedare Bloom, Yanyan Zhuang:

Evaluating Feature Robustness for Windows Malware Family Classification. 1-10 - Kaizhong Jin, Xiang Cheng, Yuchao Ma:

Differentially Private Distributed Multi-Task Relationship Learning. 1-10 - Mirko Zichichi, Luca Serena

, Stefano Ferretti, Gabriele D'Angelo:
DLT-based Data Mules for Smart Territories. 1-7 - Xuanli Lin, Yinxin Wan, Kuai Xu

, Feng Wang, Guoliang Xue:
Inferring User Activities from IoT Device Events in Smart Homes: Challenges and Opportunities. 1-10 - Thilina N. Weerasinghe, Vicente Casares Giner, Indika A. M. Balapuwaduge, Frank Y. Li

, Marius-Constantin Vochin
:
A Pseudo-Bayesian Subframe based Framework for Grant-Free Massive Random Access in 5G NR Networks. 1-7 - Kealan Dunnett, Shantanu Pal, Zahra Jadidi

, Guntur Dharma Putra, Raja Jurdak
:
A Democratically Anonymous and Trusted Architecture for CTI Sharing using Blockchain. 1-7 - Dongxin Liu, Tarek F. Abdelzaher, Tianshi Wang

, Yigong Hu, Jinyang Li, Shengzhong Liu, Matthew Caesar, Deepti Kalasapura, Joydeep Bhattacharyya, Nassy Srour, Jae Kim, Guijun Wang, Greg Kimberly, Shouchao Yao:
IoBT-OS: Optimizing the Sensing-to-Decision Loop for the Internet of Battlefield Things. 1-10 - Jasper Sha, Nathaniel Basara, Joseph Freedman, Hailu Xu

:
FLOR: A Federated Learning-based Music Recommendation Engine. 1-2 - Zhongdong Liu, Bin Li

, Zizhan Zheng, Y. Thomas Hou
, Bo Ji:
Towards Optimal Tradeoff Between Data Freshness and Update Cost in Information-update Systems. 1-10 - Xiaogang Dong, Zheng Wan

, Changshou Deng:
Optimization of Wireless Power Transfer for Wireless-Powered Mobile Edge Computing. 1-7 - Neha Joshi, Rishabh Kumar, Abhishek Thakur, A. Antony Franklin, N. V. Narendra Kumar:

PPAS: Privacy-preserving Resource Discovery for Multi-domain SFC orchestration. 1-7 - Luca Barsellotti, Faris Alhamed, Juan Jose Vegas Olmos, Francesco Paolucci

, Piero Castoldi, Filippo Cugini:
Introducing Data Processing Units (DPU) at the Edge [Invited]. 1-6 - Hua Wu, Chengfei Zhu, Guang Cheng, Xiaoyan Hu:

Real-time Application Identification of RTC Media Streams via Encrypted Traffic Analysis. 1-10 - Qinghua Sima, Guoju Gao, He Huang, Yu-e Sun, Yang Du, Xiaoyu Wang, Jie Wu:

Multi-Armed Bandits Based Task Selection of A Mobile Crowdsensing Worker. 1-10 - Khandaker Mamun Ahmed

, Samuel Muvdi, Jason Liu
, M. Hadi Amini
:
A Federated Learning Framework for Automated Decision Making with Microscopic Traffic Simulation. 1-9 - Jiacong Li, Hang Lv, Bo Lei, Yunpeng Xie:

A Computing Power Resource Modeling Approach for Computing Power Network. 1-2 - Haoran Jiao, Qing Wang, Zhaoshan Fan, Junrong Liu, Dan Du, Ning Li, Yuling Liu:

DGGCN: Dictionary based DGA detection method based on DomainGraph and GCN. 1-10 - Thomas Neumann, Kyle Welsh, Caden Perez, Kewei Sha

, Yalong Wu:
R2 P3: Renewal-Reward Process-Based Password Protection in Internet of Things. 1-7 - Luis Felipe Florenzan Reyes, Francesco Smarra, Roland Ryf, Tetsuya Hayashi, Andrea Marotta, Cristian Antonelli, Alessandro D'Innocenzo:

Data-driven efficient digital signal processing over a field trial space-division multiplexed fiber-optic transmission. 1-8 - Aixin Xu, Shimin Sun, Ze Wang, Xiaofan Wang, Li Han:

Multi-Controller Load Balancing Mechanism Based on Improved Genetic Algorithm. 1-8 - Changwei Wan, Songtao Guo, Yuanyuan Yang:

Deep Reinforcement Learning Based Computation Offloading in SWIPT-assisted MEC Networks. 1-10 - Rhyd Lewis, Fiona Carroll

:
Exact Algorithms for Finding Fixed-Length Cycles in Edge-Weighted Graphs. 1-2 - Zakaria Ait Hmitti, Hamza Ben Ammar, Ece Gelal Soyak, Youcef Kardjadja, Sepideh Malektaji, Soukaina Ouledsidi Ali, Marsa Rayani

, Muhammad Saqib, Seyedreza Taghizadeh, Wessam Ajib, Halima Elbiaze, Özgür Erçetin, Yacine Ghamri-Doudane, Roch H. Glitho:
SCORING: Towards Smart Collaborative cOmputing, caching and netwoRking paradIgm for Next Generation communication infrastructures. 1-10 - Marek Michalski

:
Elements of Architecture of Simulator Realized on NetFPGA10G Card. 1-2 - Arvin Hekmati, Eugenio Grippo, Bhaskar Krishnamachari:

Neural Networks for DDoS Attack Detection using an Enhanced Urban IoT Dataset. 1-8 - Ying Li, Changling Li, Jiyao Chen, Christine Roinou:

Energy-Aware Multi-Agent Reinforcement Learning for Collaborative Execution in Mission-Oriented Drone Networks. 1-9

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














