


default search action
34th ICCCN 2025: Tokyo, Japan
- 34th International Conference on Computer Communications and Networks, ICCCN 2025, Tokyo, Japan, August 4-7, 2025. IEEE 2025, ISBN 979-8-3315-0898-2

 - Constant Rohmer, Pierre Alain, Mohamed Aymen Chalouf, Guillaume Doyen:

On the relevance of Blockchains for DDoS Mitigation: a Methodological Assessment and Performance Evaluation of Hyperledger Fabric. 1-9 - Yifan Luo, Meng Zhang, Jin Xu, Junting Chen, Jianwei Huang:

Correlated-Sequence Differential Privacy. 1-9 - Andrea Sabbioni, Luca Foschini:

SFIOC: a Platform to Support Service Dependency Injection in Serverless Functions. 1-6 - Ai Zhong, Gongming Zhao, Hongli Xu, Jin Fang, Jiawei Liu, Peng Yang:

Network Resource-Aware Multi-Job Deployment in Deep Learning Clusters. 1-9 - Yanke Li, Shuo Wang, Guoyu Peng, Guizhen Li, Siyu Han, Jiao Zhang, Yi Li, Tao Huang:

Achieving Adaptive Multi-Path Routing and Order-Preserving Time Slot Planning in TSN. 1-6 - Dachun Sun, Jinning Li, Xinyi Liu, You Lyu, Hongjue Zhao, Denizhan Kara, Tarek F. Abdelzaher:

Perturbation-Based Graph Active Learning for Semi-Supervised Belief Representation Learning. 1-9 - Shuaibing Lu, Bojin Xiang, Jie Wu, Philipp Andelfinger, Wentong Cai:

Multi-Timescale Hierarchical Prefetching for Online Caching in Vehicular Edge Networks. 1-9 - Naba Raj Khatiwoda, Babu R. Dawadi, Shashidhar R. Joshi, Carlos T. Calafate, Pietro Manzoni:

Performance Evaluation of MQTT and ZeroMQ for V2X Communications over 5G Networks. 1-9 - Xueyan Yao, Yuji Dong

, Matilda Isaac:
HAFE: Hierarchical Attention-based Frontier Exploration for Multi-Robot Mapping. 1-6 - Jingbo Dun, Zhuo Li:

Dynamic Node Scheduling for Delay Optimization in Federated Large Language Model Training. 1-6 - Shu-Ming Tseng, Jer-Wei Chang:

Deep Reinforcement Learining for Video Quality in RIS-Enabled Mobile Edge Computing. 1-2 - Jiahao Zhang, Shulan Guo, Shangda Xiao, Mingxuan He, Hequn Xian, Zesheng Cheng:

A Gaussian Temporal Based Graph Convolutional Network for Traffic Operation Flow Forecasting. 1-6 - Jun Xu, Jianchun Liu, Hongli Xu, Yangming Zhao, Zhuolong Yu:

Towards High-Performance and Compatible RDMA Networks with Receiver-Based and Fine-Grained Congestion Control. 1-9 - Yuki Ito, Naoya Sato, Yuma Katsuki, Anan Sawabe, Yusuke Shinohara, Ryogo Kubo:

Detection and Mitigation of False Data Injection Attacks for MEC-based Leader-Follower CACC. 1-2 - Vajiheh Farhadi:

A DRL-Based Scheduler for FaaS in Smart Grids: Balancing URLLC Reliability - mMTC Connectivity. 1-6 - Wael Alsabbagh, Diego Urrego, Peter Langendörfer:

Smart Traps for Smart Systems: Scalable Honeynets for IIoT Cybersecurity. 1-6 - Hsiang-Jen Hong, Ge-Ming Chiu, Shiow-Yang Wu, Bagus Jati Santoso, Tien-Ruey Hsiang, Tai-Lin Chin:

Optimal Allocation for Rank-Consistent Grouping Services. 1-9 - Zhaohua Zheng, Junhui Du:

Fed-LyAHP: A Client Selection Method for Federated Learning based on Analytic Hierarchy Process and Lyapunov Optimization in Mobile Edge. 1-9 - Yifan Cao, Yuheng Li, Zhipei Huang, Xuewu Dai, Wuxiong Zhang, Fei Qin:

The Adaptive GMM for Rician Parameters Estimation in Industrial IoT Systems with Reverse KLD to Distinguish Redundant Kernels. 1-6 - Yu Zhang

, Yanmin Gong, Lei Fan, Yu Wang, Zhu Han, Yuanxiong Guo
:
Efficient Entanglement Routing for Satellite-Aerial-Terrestrial Quantum Networks. 1-9 - Jihuan Jin, Kaoru Ota, Mianxiong Dong:

DRL-Based UAV Trajectory and Bandwidth Optimization for Emergency Semantic Communication. 1-8 - Weiwei Yang, Xiaoyi Zeng, Jinkai Zheng, Yanfeng Zhang, Xiaoyan Li, Kaihui Liu, Kangle Mu:

Resource Trading for Vehicular Edge Computing Networks: A Trust-Based Double Auction Approach. 1-6 - Javier Palomares, Estefanía Coronado, Cristina Cervelló-Pastor, Muhammad Shuaib Siddiqui:

AI-Driven NFV Service Chaining Across the Edge-to-Cloud Continuum: Placement, Fairness, and Coordination. 1-9 - Yuqiang Wen, K. L. Eddie Law:

Cell-Expansion and Region-Cut-Split Algorithms for Steiner Tree Problem in HAPS Networks. 1-6 - Taghreed Alanazi, Abdulrahman Fahim, Muntaka Ibnath, Basak Guler, Amit K. Roy-Chowdhury, Ananthram Swami, Evangelos E. Papalexakis, Srikanth V. Krishnamurthy:

FedBand: Adaptive Federated Learning Under Strict Bandwidth Constraints. 1-9 - Mauro Femminella, Gianluca Reali:

Edge Serverless Autoscaling managed via Proximal Policy Optimization. 1-6 - Haruma Shiraishi, Ryoichi Shinkuma, Gabriele Trovato:

Detection and size estimation of small objects using multi-LiDAR sensor network. 1-2 - Jiahong Xiao, Jianhong Chu, Zhi Zhang, Min Liang, Yuyao Wang, Xingyu Zhang:

A Multi-Features-fused AP Selection Strategy for Wide-Range Indoor Localization System with Sparse Deployment. 1-4 - Wei Fan, JinYi Yoon, Xiaochang Li, Huajie Shao, Bo Ji:

P3SL: Personalized Privacy-Preserving Split Learning on Heterogeneous Edge Devices. 1-9 - Zheyi Chen, Yujie Xue, Yunjing Ren, Hongting Zheng, Hansong Xu, Kun Hua, Dongfeng Fang, Hailin Feng:

MaEA: A Secure Aggregation Defense Method Against Poisoning Attacks in Federated Learning. 1-6 - Eiji Oki, Ryotaro Taniguchi, Kazuya Anazawa, Takeru Inoue:

Design of Folded/Unfolded Clos Networks for Data Centers with Extended Stages Guaranteeing Admissible Blocking Probability. 1-9 - Tianyi Xu, Hao Zhou, Kaiwen Guo, Xiaoyan Wang, Zhi Liu:

SEGUS: A Semantic Element Gesture Understanding System via Symbol-Path Decoupling. 1-9 - Yosha Mundhra, Riti Gour, Genya Ishigaki:

An Incentivization Strategy toward E2E Network Slice as a Service. 1-5 - Xiangbin Wang, Qiang Wu, Meng Yuan:

Proactive Task Migration with Server Grouping for Co-Resident Mitigation in AI Computing Clusters. 1-6 - Yali Wang, Yuan Zhang, Jingwen Lu, Dairu Han, Ruijin Sun, Zhisheng Yin, Nan Cheng:

How Can I Check Your Certificate Status in Dead Zones? A Secure Solution for Satellite Networks. 1-9 - Bo Wei, Hang Song, Jiro Katto:

Adaptive Data Transmission Management by Incorporating Sensing in mmWave V2V Communication. 1-2 - Jiale Quan, Xudong Wang, Tianhang Sun, Wenjing Li:

GDM enhanced CNN-based first arrival path delay estimation framework. 1-6 - Yingying Huangfu, Tian Bai:

A Cooperative Statistical Approach for Abnormal Node Detection with Adversary Resistance. 1-6 - Akira Ito, Toru Furusawa, Lei Zhong, Takuro Sakai, Tatsuki Agastsuma:

Load Balancing in Connected Vehicle Services via Dynamic Edge Server Selection with Telco API. 1-6 - Robin Laidig, Fatima Shibli, Burak Tufekci, Frank Dürr, Cihan Tunc:

Improving Drone Communication QoS Through Adaptive Redundancy. 1-9 - Ziv Weissman, Jiamo Liu, Elizabeth Belding:

The Impact of GEO Satellite Latency on Twitch Live Streams. 1-6 - Ken Kameoka, Ryoichi Shinkuma, Gabriele Trovato:

Face-Direction estimation system using multi-LiDAR sensor network. 1-2 - Sida Huang, Jialuoyi Tan, Xie He, Jingxuan Liu, Zhiran Wang, Wenzhang Zhang, Yuji Dong

:
A Blockchain-Enhanced Deep Learning Platform for Secure Semantic Alignment and Sharing of Chemical-Biological Data. 1-6 - Zhiquan Wang, Congcong Miao, Yiren Zhao, Kunling He, Jilong Wang:

Flexnetic: Cost-Effective and Smooth Evolution of Optical Backbone. 1-9 - Peng Zhao, Hua Wu, Deyu Zhao, Siyuan Zhou, Xianlong Dai, Yuyu Zhao, Guang Cheng:

Round Sketch: A Generic and Efficient Network Measurement Framework over Sliding Window. 1-9 - Lucas Bréhon-Grataloup

, Rahim Kacimi:
Predictive QoS for Tele-Operated Driving over 5G SA Networks: an Experimental Study. 1-6 - Madhukrishna Priyadarsini:

Edge-Enabled Resource Optimization for Smart Grids: A Load Balancing Approach. 1-6 - Sai Shi, Vahid Mahzoon, Xuyu Wang

, Shiwen Mao, Jie Wu, Slobodan Vucetic:
Towards a Unified Few-Shot Learning Evaluation Framework for RF Fingerprinting. 1-9 - Songchen Dai, Yunlong Yu, Zhao Wang, Chenguang Liu, Yulin Zhou:

Lightweight Semantic Segmentation Network for End-to-End Learning-based Communication. 1-8 - Nianhang Hu, Tate Koziol, Witawas Srisa-an, Lisong Xu:

Enabling Symbolic Execution for Hardware TCP/IP Stack based on AMD Vitis HLS. 1-6 - Akeem Bayo Kareem, Jang-Wook Hur:

MODL-CM: Metaheuristic-Optimized Deep Learning Frameworks for IoT-Based Condition Monitoring. 1-6 - Takafumi Fu, Takumi Miyoshi, Taku Yamazaki:

Preliminary Study on Adaptive Task and Resource Allocation for Digital Twin-Enabled Urban Services. 1-2 - Gloria Mollah, Majumder Haider, Imtiaz Ahmed, Danda B. Rawat:

AI-enabled Resource Allocation with PHY-Layer Twin for RIS-Aided Cell-Free Wireless Systems. 1-6 - Shangyue Zhu, Alamin Mohammed, Aaron Striegel, Theo Karagioules, Emir Halepovic:

KBL: Kettle-style Buffer Loading Algorithm for Short Videos. 1-9 - Wenli Zheng, Xiaorui Wang:

Exploiting Virtual Energy Storage to Improve Power Oversubscription in Colocation Data Centers. 1-6 - Weihao Wang, Hequn Xian:

Adaptive Selective Encryption for Surveillance Videos via Hierarchical Grading and YOLO Detection. 1-6 - Kasidis Arunruangsirilert, Pasapong Wongprasert, Jiro Katto:

Evaluations of High Power User Equipment (HPUE) in Urban Environment. 1-6 - Wen Yang:

MLRW: Minimal Link-usage Routing and Reusable Wavelength Assignment for Multiple Multicasts in Ring-based Optical Network-on-Chip. 1-6 - Garvit Agarwal, Yousef Mohammed Y. Alomayri, Agnideven Palanisamy Sundar, Feng Li:

Data-Free Backdoor Attack on Malware Image Classification Models. 1-8 - Haojie Jia, Zhenhao Li, Gen Li, Minxian Xu, Kejiang Ye:

SealOS+: A Sealos-based Approach for Adaptive Resource Optimization Under Dynamic Workloads for Securities Trading System. 1-9 - Sangwon Lim, Hyeonmin Lee

, Gyeongheon Jeong, Ted Taekyoung Kwon:
PQTLS-AD: Post-Quantum TLS Accelerated with DNS. 1-6 - Md Touhiduzzaman, Eyuphan Bulut

:
MockiFi: CSI Imitation using Context-Aware Conditional Neural Process for Zero-shot Learning. 1-6 - Bingsheng Zhang, Wuyunsiqin Wuyunsiqin, Xun Zhang, Markulf Kohlweiss, Kui Ren:

Efficient Batch Opening Schemes for Merkle Tree Commitment with Applications to Trustless Cross-chain Bridge. 1-9 - Huu Nghia Nguyen, Edgardo Montes de Oca, Frank Dürr, José Costa-Requena, Marilet De Andrade:

A Security Framework leveraging Programmable Data Planes for Detecting PTP Time-delay Attacks. 1-9 - Takashi Miyamura, Satoru Okamoto, Masahiko Jinno, Naoaki Yamanaka:

M3 Wavenet: Multiband Massive Wavelength-Multiplexing Metro Networks Enabling User Direct Wavelength Connection. 1-8 - Long Dang

, Thushari Hapuarachchi, Kaiqi Xiong, Yi Li:
SDN-Based False Data Detection With Its Mitigation and Machine Learning Robustness for In-Vehicle Networks. 1-9 - Suraiya Tairin, Zeyu Zhang, Haiying Shen:

Revisiting the Straggling Problem in GPU-based Distributed Deep Learning Training. 1-9 - Lijie Zhou, Shiyi Gu, Yu Zhou, Wenjing Li:

Joint Optimization for Semantic-Awared Communication and Control: A GDM-Empowered DRL Approach. 1-6 - Chun-An Yang, Guo-Wei Huang, Kuan-Hsiang Lo, Shao-Lun Sun, Yu-Wen Chen, Jian-Jhih Kuo, Ming-Jer Tsai:

Online Dual-Resolution 3D Map Caching Algorithm Using MILP as a Neural Network Proxy. 1-9 - Ali Nadar, Jérôme Härri, Mohammad Irfan Khan, Seyhan Uçar:

NDN4VKN: A Simulation Framework for Supporting Vehicular Knowledge Networks. 1-9 - Yue Cao, Murugaraj Odiathevar, Winston K. G. Seah, Gang Xu, Feng Zhang:

Secure Personalized Federated Learning Based on Oblivious Transfer. 1-6 - Kang Li, Jiaxing Fang, Yan Wang, Pengcheng Zhu:

Cross-Layer Latency Compression and Spectrum Compaction Framework for Event-Triggered Traffic in HRLLC Industrial Network. 1-6 - Pragya Sharma, Hang Qiu, Mani B. Srivastava:

Cloud Is Closer Than It Appears: Revisiting the Tradeoffs of Distributed Real-Time Inference. 1-9 - Fan Liu, Behrooz Farkiani, John D. DeHart, Jyoti Parwatikar, Patrick Crowley

:
Performance Comparison of HTTP/3 and HTTP/2 with Proxy Integration. 1-6 - Yuxiang Wang, Jiao Zhang, Zirui Wan, Leixin Cai, Shuo Wang, Tao Huang:

Mercury: A Dynamic Multi-path Packet Spraying Scheme for RDMA Networks. 1-6 - Xian Xiu, Licheng Ye, Lin Gao, Jingjing Luo, Tong Wang, Yufei Jiang:

A Multi-Leader Multi-Follower Game-Theoretic Approach for Delay-constrained Mining Task Offloading in MEC-assisted Blockchain Networks. 1-6 - Yun-Cheng Tsai, Samuel Yen-Chi Chen:

Quantum Feature Optimization for Enhanced Clustering of Blockchain Transaction Data. 1-6 - Shiguo Wang, Jun Zhang, Yun Zhao, Xiukai Ruan:

An Equivalent Channel-based Hybrid Precoding Scheme for Multi-user Massive MIMO Systems. 1-6 - Federica Perrone, Laura Lemmi, Carlo Puliafito, Antonio Virdis, Enzo Mingozzi:

A Computing-Aware Framework for Dynamic Traffic Steering in the Edge-Cloud Computing Continuum. 1-9 - Kuon Akiyama, Yoshiki Tsuruta, Ryoichi Shinkuma, Aram Mine:

Blockchain framework for registering 3D machine-learning models with disclosed training datasets. 1-2 - Tomoya Shinozuka, Takumi Miyoshi, Taku Yamazaki:

Sensing Data Allocation in Blockchain-Enabled Dynamic Spectrum Sharing with Distributed Storage. 1-2 - J. J. Garcia-Luna-Aceves, Morteza Moghaddassian:

Attaining Loop-Free Routing with Coordinated Updates Carrying Minimum Link-State Information. 1-9 - Huong Nguyen, Hong-Tri Nguyen, Praveen Kumar Donta, Susanna Pirttikangas, Lauri Lovén:

Graph-based Gossiping for Communication Efficiency in Decentralized Federated Learning. 1-9 - Faezeh Dehghan Tarzjani, Bhaskar Krishnamachari:

Computing the Saturation Throughput for Heterogeneous p-CSMA in a General Wireless Network. 1-7 - Lukas Froschauer, Jonatan Langlet, Andreas Kassler:

Direct Feature Access - Scaling Network Traffic Feature Collection to Terabit Speed. 1-9 - Ahmad M. Nazar, Mohamed Y. Selim, Daji Qiao, Hongwei Zhang:

NextG-GPT: Leveraging GenAI for Advancing Wireless Networks and Communication Research. 1-9 - You-Chiun Wang, Wei-Ting Chen:

Efficient Resource Allocation and Power Control for D2D Communication with RAN Sharing. 1-6 - Souradeep Bhattacharya, Manimaran Govindarasu:

Real-time Cybersecurity Situational Awareness Framework for Agriculture Machinery-based IoT Networks. 1-9 - Mengjuan Li, Zhengguang Chen, Huan Zhou, Zhipeng Wang, Yingwen Chen, Baokang Zhao, Xue Ouyang, Jinshu Su:

Can LLMs only talk? Experimental studies on task scheduling with Large Language Models. 1-6 - Yang Zhao, Hanjiang Luo, Hang Tao, Jinyin Li, Chao Liu, Jiehan Zhou:

Large Language Model Enhanced Multi-UAV Direct Cross-boundary Maritime Data Collection Scheme. 1-9 - Kiran Neupane, Kevin Kostage, Sean Peppers, Ashish Pandey, Prasad Calyam, Chengyi Qu:

NetPrompt: LLM-driven Programmable Network Policy Management and Optimization. 1-9 - Vajiheh Farhadi, James Giffen:

DRL-Based Backup Power Scheduling for Resilient Smart Grid Recovery. 1-2 - Yuan Feng, Jun Tao, Yifan Xu, Jiangtao Wang

, Jiaqi Wei, Yu Fang:
A DGA Detection Method Based on Spatiotemporal Features of DNS and NetFlow Traffic. 1-8 - Waltenegus Dargie, Sajad Farrokhi, Abiy Tasissa, Christian Poellabauer

:
Identification of Deployment Environments Based on Link Quality Fluctuation Patterns. 1-9 - Hikaru Sudo, Shunsuke Sato, Ryoichi Shinkuma, Gabriele Trovato:

Feasibility study on anomaly detection in multi-LiDAR sensor network. 1-2 - Chenlin Ding, Mingjun Xiao, Yin Xu, Jie Wu:

Federated Learning Framework with Personalized Model Compression and Privacy Protection. 1-9 - Thushari Hapuarachchi, Long Dang

, Kaiqi Xiong:
Securing Traffic Sign Recognition Systems in Autonomous Vehicles. 1-6 - Hongyang Lin, Jiabei Wang, Tiancheng Zhu, Yiwen Gao, Quan Yang, Yongbin Zhou:

Parallel Cuckoo Hashing: Accelerating Secure Encrypted Data Search in Cloud Environments. 1-9 - Jun Wang, Yuchao Zhang, Wendong Wang:

Resolving Congestion Packet Losses for Small Flows in Datacenter Networks with Link-local Retransmission. 1-9 - Tatsuya Kobayashi, Ryoichi Shinkuma, Gabriele Trovato:

Automated classification system for object detection using multi-LiDAR sensor network. 1-2 - Chen Ying, Baochun Li:

Pegasus: Efficient Asynchronous Three-Layer Federated Learning. 1-9 - Min Xue, Xiaoqiao Tian:

Wheeled Robot SLAM in Degenerate Environments under IoT and SDN: Multi-Sensor Fusion Based on Multi-Feature Loop Closure Optimization. 1-6 - Shuo Jia, Songlin Chen, Fuliang Li, Jiaxing Shen, Xingwei Wang:

WiCell: Multipath-Enabled Application-Transparent Enhancement for Hybrid Wireless Networks. 1-9 - Agnideven Palanisamy Sundar, Feng Li, Xukai Zou, Yucheng Xie, Ryan Hosler:

Vigilante Defender: A Vaccination-based Defense Against Backdoor Attacks on 3D Point Clouds Using Particle Swarm Optimization. 1-6 - Jinli Zhang, Yikun Zhao, Jiakai Hao, Haoyang Bai, Zheng Dong, Wenjing Li:

Leveraging Generative Diffusion Models for Enhanced Beam Alignment in Cell-Free MIMO Systems. 1-6 - Sepideh Abdollah, Craig Partridge, Susmit Shannigrahi:

MDTP - An Adaptive Multi-Source Data Transfer Protocol. 1-9 - Varun Magotra, Sirani M. Perera, Arjuna Madanayake

, Houbing Herbert Song:
Explainable AI for Spectrum Sensing. 1-6 - Jinyue Song, Hansol Ku, Jayneel Van, Nelson Lee, Ahmad Kamari, Prasant Mohapalra, Parth Palhak:

CoVeRaP: Cooperative Vehicular Perception through mmWave FMCW Radars. 1-9 - Zeyang Zhang, Jialu Tan, Shuchen Wang, Yanjun Chen, Fei Qin:

A 3-D Ray Inversion Method for Regional Channel Impulse Response Restoration. 1-7 - Kai Chen, Jinlei Xu, Na Deng, Wei Wang, Nan Zhao, Xianbin Wang:

Robust Secure Beamforming for IRS-Aided ISAC via D2D Jamming. 1-6 - Tingyang Sun, Tuan Nguyen, Ting He:

Communication Optimization for Decentralized Learning atop Bandwidth-limited Edge Networks. 1-9 - Qing Ren, Hui Wang, Yue Yin:

Low-Altitude Economy-Oriented Multi-Layer UAV NOMA Caching Networks: Deployment and Resource Optimization. 1-6 - Yanfei Xu, Zhexiong Li, Deze Zeng, Lin Gu:

Common DNN Layer Sharing aware Task Scheduling for Inference Acceleration in Serverless Edge Computing. 1-9 - Shota Osada, Norihiko Shinomiya:

An Approximate Solution Using Graph Convolutional Network for a Load Balancing Problem in Communication Networks. 1-5 - Thanh Son Pham, Phi Hung Nguyen, Quan Huan Vu, Duc Hai Nguyen:

Autonomous Access Traffic Splitting via 5G Core: Balancing QoS and ROI with Multi-Objective Reinforcement Learning. 1-8 - Serge Fdida, Panayiotis Andreou, Nikos Makris, Damien Saucez, Sebastian Gallenmüller, Brecht Vermeulen:

SLICES-RI Pre-Operation Methodology and Services. 1-9 - Carlos B. Rosa-Remedios, Jezabel Molina-Gil, Pino Caballero-Gil:

Protection of Critical Emergency Response Infrastructures through Machine Learning. 1-9 - Zizheng Wang, Zhaohua Zheng, Qiquan Chen:

A Contextual Client Selection Method for Volatile Federated Learning. 1-6 - Carlos Guerra-Yánez, Antonio Mederos-Barrera, Zabih Ghassemlooy, Stanislav Zvánovec:

Improving Image Transmission with VAE-based Semantic Communication Using HQAM. 1-5 - Yuanpu Zheng, Hanxiao Su, Chen Xu, Shuangyao Huang, Guangyu Ren, Wenzhang Zhang:

Misalignment Discussion of an Eight-Coil Wireless Power Transfer System. 1-5 - Jian Liu, Chin-Tser Huang:

Weather-Aware Power Control for Decentralized V2V Communication. 1-9 - Fanhao Meng, Qianqian Su:

DABE-PU: Decentralized Attribute-Based Data Sharing Scheme with Policy Update Privacy. 1-6 - Shu Yang, Dantong Chen, Laizhong Cui, Mingwei Xu:

WISTRO: Towards Efficient Weather-Aware Routing for Integrated Satellite-Terrestrial Networks. 1-9 - Xiaoyu Wang

, Hao Zhou, Yusheng Ji:
UNITY: Semi-supervised Meta-learning Load Monitoring for Resource-restricted Smart Grids. 1-9 - Yufeng Xin, Sajith Sasidharan, Cong Wang, Mert Cevik:

Taming Imbalance and Complexity in Resilient WAN Traffic Engineering. 1-6 - Jakob Rühlow, Joana Angjo, Sascha Rösler, Falko Dressler, Anatolij Zubow:

Random Access in IRS-assisted 802.11 Networks. 1-9 - Ying Li, Nithun Selva, Ruihan Zhu:

Energy-Aware Multi-Agent K-hop Proximal Policy Optimization for Mission-Oriented Drone Networks. 1-6 - Komala Subramanyam Cherukuri, Kewei Sha

, Junhua Ding:
Enabling Federated Learning for Object Detection in Connected Autonomous Driving Using YOLO with the Flower Framework. 1-6 - Kuang-Ching Wang

, Paul Ruth, James Griffioen, Anita Nikolich
, Inder Monga
, Zongming Fei, Yongwook Song, Mami Hayashida, Pinyi Shi, Komal Thareja, Tom Lehman, Ezra Kissel, Yatish Kumar, Xi Yang, Ilya Baldin, Benjamin Formby, Acheme Acheme:
A Glimpse of Emerging Networking and Distributed Computing Research via Experiments on the Fabric Testbed. 1-9 - Fangshuai Zhu, Deze Zeng, Lin Gu, Yuepeng Li, Hongmin Geng:

PASS: A Priority-based Model Assignment for Minimal Inference Time in Serverless Edge Cloud. 1-6 - Tenghan Guo, Kunyi Xie, Wenjing Li:

HAtt3EGNN: An Unsupervised Power Allocation Method for Cell-Free Massive MIMO. 1-6 - Francis A. Gatsi

, Muhammad Iqbal Rochman, Monisha Ghosh, Aaron D. Striegel:
Robust Determination of Wi-Fi Throughput Tests Being Indicative of Broadband Bottlenecks. 1-6 - Wesley Duclos, Jian Wang, Yongxin Liu, Huihui Wang:

Strategizing for Cyber Security Enhancement Autonomous Intersection Management (AIM). 1-8 - Qunshu Wang, Chengwen Xing, Nan Zhao, Dusit Niyato:

Air-Ground Covert Cooperative Cognitive Radio Networks. 1-6 - Xin Dong, Lizhuang Tan, Huiling Shi, Wei Zhang, Peiying Zhang:

CFcoQUIC: CPU/FPGA Co-design Accelerated QUIC for Low-Power IoT Communication. 1-5 - Xuehan Chen, Wenzhang Zhang, Guangyu Ren, Shanshan Zhao:

Voice-Activated Control System for Drone-Mounted PTZ Cameras. 1-5 - Masaki Oda, Akio Kawabata, Eiji Oki:

Consistency-Aware Multi-Server Network Design under Server Failures in Delay-Sensitive Applications. 1-6 - Endri Goshi, Hongyu Guo, Fidan Mehmeti, Wolfgang Kellerer:

Maximizing Profit With Energy-Efficient 5G Edge Orchestration. 1-9 - Zibin Chen, Wuyang Zhang, Lixin Gao:

SDN Controller Design for LEO Satellite Networks with Three-Phase Traffic Engineering. 1-6 - Francesco Tusa, Antonis Michalas, James Bowden, Tamás Kiss:

FaaS and Furious: Accelerating Privacy-Preserving ML with Function as a Service at the Edge. 1-6 - Xiang Liu, Jason P. Jue, Genya Ishigaki:

Resource Coordination Learning for End-to-End Network Slicing Under Limited State Visibility. 1-6 - Francesco Tusa

:
Privacy-Preserving FaaS: A Marketplace for the Serverless Edge-Cloud Continuum. 1-2 - Quoc-Viet Nguyen, Zih-Yu Wong, Khanh-Duy Nguyen, Min-Te Sun, Wu-Yuin Hwang, Kazuya Sakai, Wei-Shinn Ku:

An Advanced Hybrid Model for Network Traffic Classification. 1-6 - Fidan Mehmeti, Wolfgang Kellerer:

Admission Control for mMTC Traffic With Computation Requirements in 5G Networks. 1-9 - Frank Yeong-Sung Lin, Si-Yuan Zhang, Chiu-Han Hsiao:

Efficient Optimization-based Routing Strategies for Large-Scale Multi-Layer LEO Satellite Networks. 1-9 - Tong Sun, Qian Lu, Hanlin Zhang, Qianqian Su, Xinrui Ge:

SMART: a practical and robust client-side RAP detection approach. 1-6 - Ali Alqarni, Ellen Fei, Zongming Fei:

A Proactive Shredding Approach for Secure Deletion of Content in the Multi-Cloud Environment. 1-6 - Kaixiang Yu, Songlin Chen, Fuliang Li, Jiaxing Shen, Xingwei Wang:

SRv6-ALINT: SRv6-based Efficient In-band Network-Wide Telemetry across LANs. 1-9 - Jemin Ahn, Zuobin Xiong, Homook Cho, Kyungtae Kang, Junggab Son:

Efficient Phishing Website Detection via HTML Tag Sequence Analysis Using Encoder Models. 1-9 - Yixiang Hu

, Han Tian, Yifang Zhao, Feng Wu, Xiang-Yang Li:
TOPO-X: Co-optimize Flow Scheduling, Topology, and ML Training Parallelism. 1-6 - Devnath, Manoneet Mahesh Sikhwal, Basant Subba:

MalVIS: A pyramid vision transformer V2 (PVTv2) based framework for android malware detection. 1-9 - Masaki Kobayashi, Akito Suzuki, Masahiro Kobayashi:

Optimizing Availability Decomposition for Network Slicing using Bandit Algorithms. 1-9 - Zhengyu Wan, Chengpeng Guo, Bintao Hu, Jianbo Du, Xiaolin Mou, Junwei Zhang:

LLM-Based V2X Multi-Model Sensor Data Fusion for Improved Road Safety and Data Privacy. 1-6 - Pengfei Wu, Xinyu Liu, Hong Zhu, Haiping Huang, Chao Sha:

UAV-Enabled Dynamic Data Collection and Energy Replenishment in Large-Scale IoT Networks. 1-9 - Nassim Sehad

, Jashanjot Singh Sidhu
, Abdelhak Bentaleb, Hamed Hellaoui, Riku Jäntti, Mérouane Debbah:
Learning Based Rate Adapter for UAV Streaming. 1-6 - Shiva Acharya, Shaoran Li, Wenjing Lou, Y. Thomas Hou:

Savitar: A Multi-Timescale Spectrum-Efficient Scheduler for O-RAN. 1-8 - Kosuke Kuruba, Kai Sakamoto, Yusaku Hayamizu, Masaki Bandai, Miki Yamamoto:

User-perceived QoE Improvement by Differentiated ECN based on Video Semantics. 1-2 - Ye Zhang, Zhishu Shen

, Dawen Jiang, Xiangrui Liu, Qiushi Zheng, Jiong Jin:
CCRSat: A Collaborative Computation Reuse Framework for Satellite Edge Computing Networks. 1-9 - Manmohanbabu Rupanagudi, Genya Ishigaki:

Link-level Blocking Prediction for Dynamic Network Slicing using Graph Neural Networks. 1-6 - Yihan Huang, Jingxuan Liu, Sida Huang, Jialuoyi Tan, Xie He, Shuangyao Huang, Yuji Dong

:
Blockchain-Enabled Personalized Travel Recommendations with Semantic Search and Transparent Data. 1-6 - Hoa Tran-Dang, Dong-Seong Kim:

Bayesian Deep Neural Network-empowered Thompson Sampling for Context-aware Task Offloading in Dynamic Fog Computing. 1-6 - Vineet Kumar Dwivedi, Vivek Shukla, Chandrashekar Jatoth, Rajkumar Buyya:

Energy Efficient Quantum Entanglement Generation Optimizing Resource Utilization in Large Network. 1-6 - Weizhao Jin, Erik Kline, T. K. Satish Kumar, Lincoln Thurlow, Srivatsan Ravi:

Efficient Privacy-Preserving Network Path Validation. 1-9 - Pablo Donate

, Julio A. Sanguesa, Piedad Garrido, Vicente Torres-Sanz:
Enhancing Vehicular Charging Systems with a Natural Language HMI Solution. 1-6 - Yuqiang Wen, K. L. Eddie Law:

Modified Gamma and Hyper-Erlang Distribution Models for Group Broadcasting. 1-6 - Yin Li, Bo Liu

, Rajalakshmi Nandakumar:
CoPlay: Audio-agnostic Cognitive Scaling for Acoustic Sensing. 1-9 - Kim Kim, Katerina Koutlia, Biljana Bojovic, Amir Ashtari, Gabriel Carvalho:

DRILL-Q: Delay-Responsive Intelligent Learning for Latency-sensitive QoS. 1-9 - Zheyuan Liu, Qian Guo, Yidan Hu, Aisha Aseeri, Depeng Li, Rui Zhang:

Byzantine-Robust Federated Learning. 1-9 - Zhiyu Wen, Pei Zhang, Yanxu Fu, Xiaohong Huang, Yan Ma, Qian Zhang, Han Zhang, Ming Zhao:

Log-Based Anomaly Detection with Multi-level Progressive Temporal-Semantic Fusion. 1-6 - Juncen Zhu, Huizi Han, Jiannong Cao, Julie Ann McCann, Ho-Yin Michael Ma, Xiaoyun Liu:

LiquidAuth: Reliable and Accurate Liquid Authentication Using GAN-enhanced Acoustic-to-Mass-Spectrum Mapping. 1-9 - Denizhan Kara, Tomoyoshi Kimura, Dachun Sun, Jinyang Li, Yizhuo Chen, Yigong Hu, Hongjue Zhao, Joydeep Bhattacharyya, Tarek F. Abdelzaher:

DiffPhys: Differential Physics Augmentations for Enhanced Representations. 1-9 - Dachun Sun, You Lyu, Jinning Li, Xinyi Liu, Denizhan Kara, Christian Lebiere, Tarek F. Abdelzaher:

The Irrational LLM: Implementing Cognitive Agents with Weighted Retrieval-Augmented Generation. 1-9 - Chenrui Zeng, Yuan Zhang, Yaqing Song, Xinyu He, Pengfei Liu, Yuanyuan He, Hongwei Li:

Verifiable Weighted Electronic Voting against Tally Leakage for Popular Voting Methods. 1-9 - Chi Wan Sung, Jiajun Chen:

Analog Zigzag-Decodable Codes for Secure and Numerically-Stable Distributed Computing. 1-6 - Pralhad Magadum, Sourabh Singh, Aniruddha Singh Kushwaha:

CT-PIFO: A Congruity Tree Based Packet Scheduler to Improve Flow Completion Time. 1-9 - Mahin Ahmed, Lucas Haug

, Raheeb Muzaffar, Damir Hamidovic, Armin Hadziaganovic, Hans-Peter Bernhard, Marilet De Andrade, János Farkas:
Analysis of Time Synchronization for 6G-TSN Networks with Hot Standby. 1-6 - Sakib Shahriar Shafin, Gour C. Karmakar, Iven Mareels, Ramachandra Rao Kolluri:

BL-DKF: A Robust IoT Sensor Data Anomaly Detection Method. 1-9 - Hiroaki Harai:

Building Innovative Networks towards Beyond 5G. 1-8 - Meng Yuan, Qiang Wu, Xiangbin Wang, Siyang Sun:

Diffusion Model-aided Resource Scheduling for Multiple GAI Training Jobs. 1-6 - Vicente Torres-Sanz, Pablo Donate

, Julio A. Sanguesa, Piedad Garrido:
LoRaWAN for ITS: Overcoming Connectivity Challenges in Remote Areas. 1-6 - Zerui Zhen, Fanqin Zhou, Xuesong Qiu, Sheng Hong:

Dynamic Cell Association for Hierarchical Over-the-Air Federated Learning with Non-IID Data. 1-6 

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














