


default search action
9th ISNCC 2022: Shenzhen, China
- International Symposium on Networks, Computers and Communications, ISNCC 2022, Shenzhen, China, July 19-22, 2022. IEEE 2022, ISBN 978-1-6654-8544-9

- Shen Qian, Xin He, Xiaobo Zhou:

Physical Layer Security in Untrusted Diamond Relay Networks With Imperfect Source-Relay Links. 1-6 - Md. Mainul Islam Mamun, Cory C. Beard, Deep Medhi:

A UAV-Assisted Multiuser Non-terrestrial Cyclic Postfixed Windowed OFDM System. 1-6 - Reza Kazemikord, Mohammadali Sebghati

, Hassan Zareian:
Channel Estimation for Industrial Internet of Things Using Particle Filter with Adaptive Pilots. 1-6 - Bo Zhang

, Bingjun Yan, Mingzhe Liu, Bo Hu, Aidong Xu, Kai Wang:
Development of an Industrial Real-time Ethernet Protocol Stack Based on SoC. 1-6 - Yuanxue Xin, Xuan Yang, Runkang Zhou, Ting Liu:

Coverage Probability Analysis in Multi-cell Multi-user System with Random Number of Users. 1-6 - Lijun Dong, Lin Han, Richard Li

:
New IP Enabled End-to-End Latency Guarantee for Downlink Traffic in 5G. 1-6 - Yu Xu, Hongfeng Tian, Tiankui Zhang, Dingcheng Yang, Lin Xiao:

Stochastic Resource Management and Trajectory Optimization for Cellular-Connected Multi-UAV Mobile Edge Computing Systems. 1-6 - Hamid Shimal Aldulaimi, Bassem Ben Hamed

:
Smart and Novel Algorithm for Highway Overtaking Classification. 1-6 - Ying Yang, Lidong Zhu, Qihui He, Xu Deng:

A Simple High-performance Generation Method for Spoofing Jamming Signals. 1-5 - Peter Voege, Abdelkader Ouda:

An Innovative Multi-Factor Authentication Approach. 1-6 - Xiumei Yang, Bo Hong:

Cost-Efficient Task Offloading for Satellite Edge Computing Systems. 1-5 - Nana Qi, Zhengqian Zhang, Nini Dong, Meng Guo, Meng Kong:

A Design of Conformal Anti-Jamming Antenna System. 1-3 - Cherifa Nakkach, Amira Zrelli, Tahar Ezzedine:

Smart Border Surveillance System Based on Deep Learning Methods. 1-6 - Ehab M. Shaheen

, Mohammad Reza Soleymani:
Performance Analyses of SWIPT-NOMA Enabled IoT Relay Networks. 1-6 - Amira Zrelli, Cherifa Nakkach, Tahar Ezzedine:

Cyber-Security for IoT Applications based on ANN Algorithm. 1-5 - Albert H. Carlson, Sai Ranganath Mikkilineni, Michael W. Totaro, Christopher Briscoe:

A Venona Style Attack to Determine Block Size, Language, and Attacking Ciphers. 1-6 - Kinan Ghanem, Stephen Ugwuanyi

, Jidapa Hansawangkit, Ross McPherson, Rabia Khan, James Irvine
:
Security vs Bandwidth: Performance Analysis Between IPsec and OpenVPN in Smart Grid. 1-5 - Iman I. M. Abu Sulayman, Abdelkader Ouda:

Real-Time Data Generation and Anomaly Detection for Security User Profiles. 1-6 - Albert H. Carlson, Sai Ranganath Mikkilineni, Michael W. Totaro, Richard B. Wells, Robert E. Hiromoto:

Equivalence of Product Ciphers to Substitution Ciphers and their Security Implications. 1-6 - Selma Dilek

, Alma Oracevic
, Suleyman Tosun, Suat Ozdemir:
Towards QoS-Aware Resource Allocation in Fog Computing: A Theoretical Model. 1-6 - Aleksey S. Gvozdarev

, Tatiana K. Artemova, Dmitry M. Murin, Pavel E. Patralov:
Reconfigurable Intelligent Surfaces' Impact on the Physical Layer Security of the Beaulieu-Xie Shadowed Fading Channel. 1-5 - Michele Luglio, Mattia Quadrini

, Cesare Roseti, Lorenzo Serranti, Francesco Zampognaro
:
Analytics support in the 5G Core Network for data-driven management of a supplementary backhaul. 1-6 - Sulyman Age Abdulkareem, Chuan Heng Foh, François Carrez, Klaus Moessner:

FI-PCA for IoT Network Intrusion Detection. 1-6 - Guangyu Tian, Wenbing Cai, Hancheng Zhao, Yiwen Chen, Teng Yang, Xuehui Yu:

Research and Implementation of the Early-late Gate Bit Synchronization Algorithm in the Non-coherent Spread Spectrum System. 1-4 - Jianfang Zhang, Yaxi Liu, Wei Huangfu:

UAV Trajectory Optimization Considering User Pattern and Communication Coverage Fairness. 1-6 - Chenxi Zhong, Huiyuan Yang, Xiaojun Yuan

:
Multi-Task Federated Learning with Over-the-Air Computation for MIMO Interference Channels. 1-6 - Junhao Ding, Honghao Shi, Zhiyong Luo

:
Joint SB/NMS and Genetic Optimization for High Performance LDPC Decoding. 1-6 - Jingshun Lv, Bo Li, Xiao Wang, Hao Liu, Jiehong Gu:

An Analysis on the Characteristics and Challenges of Global Satellite Internet Development. 1-5 - Wang Jun, Zhu Jinzhou:

Q-learning Based Radio Resources Allocation in Cognitive Satellite Communication. 1-5 - Chiara Grasselli, Andrea Melis, Lorenzo Rinieri

, Davide Berardi, Giacomo Gori
, Amir Al Sadi:
An Industrial Network Digital Twin for enhanced security of Cyber-Physical Systems. 1-7 - Mauro Conti

, Francesco Trolese, Federico Turrin
:
ICSpot: A High-Interaction Honeypot for Industrial Control Systems. 1-4 - tHaibo Wu, Yanqing Lu, Ting Zhang, Lei Wang

:
Performance Evaluation of the Dynamic Multi-hop in Proximity Radio Access Network. 1-6 - Qisheng Chen

, Kazumasa Omote:
A Three-Step Framework for Detecting Malicious URLs. 1-6 - Giacomo Gori

, Andrea Melis, Lorenzo Rinieri
, Marco Prandini, Amir Al Sadi
, Franco Callegati:
Metrics for Cyber-Physical Security: a call to action. 1-4 - Jacopo Iannacci

, H. Vincent Poor:
A Vision of 6G from the Perspective of Low-Complexity Hardware Micro/Nano Components. 1-5 - Zhiguang Jia, Zhenlong Xu, Lijian Zhang:

Simulation of forming process of stainless-steel plate heat sink for thermal test of spacecraft. 1-6 - Pablo Ximenes, Patrícia Mello:

Applying the Diamond Model of Intrusion Analysis: Brazil's Operation "Car Wash" Cyberattack. 1-6 - Lukas Steffen, Benjamin Beichler, Michael Rethfeldt, Dirk Timmermann, Christian Haubelt:

A Novel Interface Between the Linux Kernel and ns-3 for Assessing Target Software in WLAN-Systems. 1-8 - Guangjun He, Han Fu, Pengming Feng, Shishuo Liu, Jiang Chang, Shichao Jin:

Real-time detection of flying aircraft using hyperspectral satellite imges. 1-8 - Shichao Jin, Dunge Liu, Zhe Cui, Chenyu Mei, Yuqian Yang, Bing Wu:

A Scalable Ka-Band 256-Element Transmit Dual-Circularly-Polarized Planar Phased Array for SATCOM Application. 1-4 - Xiang Li, Wei Huang, Xiaozhang Zhu, Zhiqin Zhao:

MEMS-IMU Error Modelling and Compensation by 3D turntable with temperature chamber. 1-5 - Shichao Jin, Dunge Liu, Chenyu Mei, Yuqian Yang, Bing Wu, Zhe Cui:

A Scalable K-Band 256-Element Receive Dual-Circularly-Polarized Planar Phased Array for SATCOM Application. 1-4 - Nini Dong, Nana Qi, Meng Guo, Chao Wang, Lu Chen:

An Optimal Design of High Gain Beidou Anti-Jamming Antenna. 1-4 - Qichong Chen, Lei Zhao, Yueyan Chu, Wenbin Guo:

Research on Multipath Reception and Soft Decision Algorithms for Frequency Shift Chirp Modulation. 1-6 - Mohamed Sofiane Batta, Zibouda Aliouat

, Hakim Mabed, Malha Merah:
An Improved Lifetime Optimization Clustering using Kruskal's MST and Batteries Aging for IoT Networks. 1-6 - Hong Wang, Zhenyan Wang, Yanzhao He, Zhichao Liu, Quanwu Wang, Jufeng Dai:

Compensation Circuit and Buck Converter based Wireless Power Transmission. 1-4 - Branislav Mladenov, Georgi Iliev:

Studying the effect of internal DOS attacks over SDN controller during switch registration process. 1-4 - ZhongShuai Qin, Yanyong Su, Ruiran Liu, Chenglin Liu:

Codebook Optimization Design of Serial Encoding SCMA System. 1-4 - Shaofu Zhang, Zongwu Dai, Honglun He, Wenhao Zhang, Naiqiang Liu, Changli Shi:

A Study on One Fast Acquisition Method for DS/FH Hybrid Spread Spectrum Signal in Physical Layer of Aircraft Communication Network. 1-5 - Hao Liu, Fan Qin, Qian Yang, Jingshun Lv, Biao Peng:

Orbital Error Analysis and Correction Method based on Data Mining for Multiple Kinetic Energy Impactors. 1-5 - Chongda Huang

, Yue Xiao, Lilin Dan:
N-continuous Signaling for Constant Envelope OFDM. 1-4 - Albert H. Carlson, Sai Ranganath Mikkilineni, Michael W. Totaro, Robert E. Hiromoto, Richard B. Wells:

An Introduction to Local Entropy and Local Unicity. 1-7 - Yongning Zhuo, Xiaoxue Zhou, Qin Wang:

A Sliding Window Method for BATS Code in Space Communication. 1-5 - Peng Wang

, Mei Huang:
Technological and Organizational Model of IoT Anti-Corruption System: Evidence from China. 1-5 - Ge Guo:

A Novel Intrusion Detection Framework for Internet of Things Based on Machine Learning Techniques. 1-6 - Neil Tellez, J. Serra, U. Ebreso, K. Opara, Yulia Kumar

, J. Jenny Li, Patricia Morreale:
An Assure AI Bot (AAAI bot). 1-5 - Shizhuo Zhang, Baoyin Bian, Yehua Zhang, Lang Li, Jing Jiang, Cheng Zeng, Jun-Bo Wang, Hua Zhang:

Joint Precoding of eMBB and URLLC services in MISO System. 1-6 - Ziad El-Khatib, Adel Ben Mnaouer

, Sherif Moussa, Mohd Azman Bin Abas, Nor Azman Ismail, Fuad Abdulgaleel, Ibrahim Elmasri, Loay Ashraf:
LoRa-enabled GPU-based CubeSat Yolo Object Detection with Hyperparameter Optimization. 1-4 - Zedong Zhang, Hao-Tong Shen, Songjie Wei:

Network Anomaly Detection based on Traffic Clustering with Group-Entropy Similarity. 1-5 - Hooshang Abbaspour

, Milad Hadadnejad, Ghazal Najafi:
Tracking Micro Aerial Vehicles with High Maneuverability and Sudden Rotation in Complex Indoor Environments Using Deep Neural Networks in Three Dimensions based on the Received Signal Strength. 1-5 - Sanket Vilas Salunke, Abdelkader Ouda, Jonathan Gagne:

Transfer Learning for Behavioral Biometrics-based Continuous User Authentication. 1-6 - Shuang Li, Yuan Zhao, Honglun He, Xiaoxi Li, Wei Wang:

The Design and Implementation of Data Link Terminal Based on Two Modes Satellite Communication. 1-5 - Yinqiao Li, Haocong Ji, Li Yang, Song Jin:

Verification of Dual Circularly Polarized Diversity Mobile Satellite Communication System. 1-4 - Yongning Zhuo, Baowei Li, Hanyi Huang:

A Signal Detection Method Based on Compressive Sensing for Polarized Antenna System. 1-4 - Yunfei Tai, Kezhen Li, Liang Zhou, Shu Liu, Xilin Zhang:

An Improved CA-SCL Decoding Algorithm for Polar Code. 1-5 - Khawla A. Alnajjar

:
Low Complexity Detectors for MIMO Molecular Communications Under Channel Estimation. 1-4 - Saeede Enayati, Dennis L. Goeckel, Amir Houmansadr, Hossein Pishro-Nik:

Privacy-Preserving Path-Planning for UAVs. 1-6 - Heyun Yan, Lidong Zhu, Xiaoyan Kuai, Yilun Liu:

Physical Layer Security Enhancement for LEO Satellite Communications: Handoff Scheme. 1-5 - Penghua Zhong, Tian Tan, Yao Yu:

Enlightenment for China's LEO Internet Satellite Industry from Typical Development Model of European Commercial Satellite. 1-6 - Jayroop Ramesh

, Donthi Sankalpa, Raafat Aburukba, Mohamed Elsakhawy:
Cloud Infrastructure-as-a-Service Testbed Implementation using OpenStack. 1-8 - Sajal Saha, Anwar Haque

, Greg Sidebottom:
Towards an Ensemble Regressor Model for ISP Traffic Prediction with Anomaly Detection and Mitigation. 1-6 - Mu Li, Yong Meng, Xiaofei Liu, Yaning Guo, Jiali Li, Qidi You:

Secure and Efficient Support for DVB-S2/DVB-RCS2 System with Distributed Gateways. 1-5 - Jianlong Li, Siyuan Wang, Zhihang Zhu, Minghao Liu, Changjiang Zhang, Bingyan Han:

Stock Prediction Based on Deep Learning and its Application in Pairs Trading. 1-7 - Xinjie Gu, Lilin Dan, Yue Xiao:

Offset Constant Envelope OFDM Toward Efficient mmWave Transmission. 1-5 - Yunfeng Wang, Xiaojin Ding, Jun Li, Tao Hong, Gengxin Zhang:

Blind Noise Floor Estimation aided Spectrum Sensing for Satellite Communication Systems. 1-5 - Yixuan Liu, Shuai Yuan, Mingchuan Yang, Guanchang Xue, Yanyong Su:

Underlay based Spectrum Sharing Algorithm in Cognitive Satellite-5G Networks. 1-5 - Muna Al-Hawawreh

, Ibrahim Elgendi, Kumudu S. Munasinghe
:
Ultra Light-weight Encryption for Securing D2D Communication of ESP8266 IoT devices in Wireless Mesh Networks. 1-6 - Toshiro Nunome:

Video and Audio Transmission Quality Enhancement over CCN by means of Access Timing and Media Synchronization Control. 1-4 - Wenwen Zhou, Yongzhi Yang, Jiejuan Wang:

Dynamic Class Generating and Loading Technology in Android Web Application. 1-6 - Bo Wang, Lixiang Liu, Shuaijun Liu, Shan Wu, Hailong Hu:

Performance analysis of OSPF in integrated satellite and terrestrial network. 1-4 - Zhen Li, Mingchuan Yang, Gang Wang:

Performance Analysis of SWIPT aided Integrated Remote Wireless Sensor and Satellite Network. 1-6 - Binghui Jin, Yang Sun, Wenjun Wu, Qiang Gao, Pengbo Si:

3D Environment-based Multiobjective Path Planning for Unmanned Ground Vehicles. 1-6 - Rodrique Chi Fon, Frank Nonso Igboamalu, Alain Richard Ndjiongue, Khmaies Ouahada

, Collins Leke, Adnan M. Abu-Mahfouz:
Outage Probability of an Underwater Wireless System Based on the CSK Transmission. 1-6 - Zefu Gao

, Yiwen Jiao, Dong Li, Feilong Mao, Yu Xin Wang, Yi Tong Si, Yi Fan Wu:
A novel algorithm for accurate UWB positioning based on CNN and hybrid locating method. 1-8 - Harshaprabha N. Shetty, Prabhu Vara Prasad Bonam, Tanusree De:

Predictive Maintenance with Explainability in Wind Farms for Sustainable Development. 1-5 - Yamba Dabone, Frédéric Tounwendyam Ouédraogo, Pengwendé Justin Kouraogo:

Impact Of Internet Exchange Points On ISPs Speeds And Latency. 1-6 - Priya Bansal, Abdelkader Ouda:

Study on Integration of FastAPI and Machine Learning for Continuous Authentication of Behavioral Biometrics. 1-6 - Ebru Uçgun Ergün, Ibrahim Kök, Suat Özdemir:

Impact of Missing Data on Classification Success in Health and Comparative Analysis of Imputation Methods. 1-6 - Qin Fan, Zhu Tielin, Liu Hao, Zhang Yuying:

CMA Blind Equalization Algorithm Based on Linear Fitting. 1-5 - Qingmiao Zhang, Lidong Zhu:

A Deep Learning Approach for Downlink Sum Rate Maximization in Satellite-Terrestrial Integrated Network. 1-5 - Chengjie Li, Lidong Zhu, Xianfeng Guo, Zhen Zhang, Ying Yang:

A Novel Greedy Sparse Underdetermined Blind Separation Algorithm for LEO Satellite Communication System. 1-5 - Yasir Uthman, Dudu Watsai, Daniel Nwude, Grace Oletu:

Design and Implementation of an Automatic Gas and Smoke Detector. 1-4 - Kunrui Cao, Buhong Wang:

NOMA aided Semi-Grant-Free Transmission: A Security Perspective. 1-7 - Thai Son Chu, Weisheng Si

, Simeon Simoff
, Quang Vinh Nguyen
:
A Machine Learning Classification Model Using Random Forest for Detecting DDoS Attacks. 1-7 - Qiaonan Zhu, Xinyuan Zhang, Yue Xiao, Yulan Gao, Xianfu Lei, Zehui Xiong

:
Optimization of Intelligent Reflecting Surface Aided Wireless Networks with User Mobility. 1-6 - Abdinasir Hirsi Abdi

, Haroon Rasheed:
Performance Analysis of Outdoor Massive MIMO on Ultra-High Frequency Bands (73 GHz and 100 GHz). 1-6 - Michele Luglio, Mattia Quadrini

, Cesare Roseti, Domenico Verde
, Francesco Zampognaro
:
Performance evaluation of untrusted non-3GPP Access to a 5G Core Network via satellite. 1-6 - Zhong Tang, Ming Zhan, Chenchang Gao, Dafa Wen:

Reduced-Complexity T-EMS Algorithm with Elitist Selection for Non-Binary LDPC Codes. 1-6 - Xinyu Zhao, Haichen Zhang, Jiyuan Sun, Jun Zou:

Power Allocation Strategy Based on Approximation Bound in High-dimensional Modulation Superposition NOMA. 1-5 - Xinwei Xu, Zhixing Hu, Dengsheng Lin, Yue Xiao:

Optimization of Power Allocation for LDPC Coded Modulation on Fading Channels. 1-5 - Avinash Kumar, Ye Zhu:

Generalizing Direct Sequence Spread-Spectrum to Mitigate Autocorrelation-Based Attacks. 1-6 - Metehan Güzel

, Feyza Yildirim Okay, Ibrahim Kök, Suat Özdemir:
QNSGA-II: A Quantum Computing-Inspired Approach to Multi-Objective Optimization. 1-4 - Ugur Saritac, Xingya Liu, Sabila Newaz, Ruhai Wang, Hasan Md Imran

:
A Joint Design of Deployment and Routing for Lifetime Maximization in Pipeline Sensor Networks. 1-6 - Wafaa Anani

, Abdelkader Ouda:
Wireless Meter Bus: Secure Remote Metering within the IoT Smart Grid. 1-6 - Xiaojing Wu, Yue Xiao, Liuliu Li:

Efficient Design of Intercarrier Interference Self-Cancellation for OFDM Systems. 1-5 - Jaber Jemai

, Marouane Chaieb, Anis Zarrad:
A Big Data Mining Approach for Credit Risk Analysis. 1-6 - Ripon Patgiri

, Naresh Babu Muppalaneni
:
Stealth: A Highly Secured End-to-End Symmetric Communication Protocol. 1-8 - Phithak Thaenkaew, Bruno Quoitin, Ahmed Meddahi:

Evaluating the cost of beyond AES-128 LoRaWAN security. 1-6 - Raafat Aburukba, Yara Kaddoura

, Maya Hiba:
Cloud Computing Infrastructure Security: Challenges and Solutions. 1-7 - Hai Fang, Yangyang Jia, Yuanle Wang, Yang Zhao, Yuan Gao, Xu Yang:

Matching Game based Task Offloading and Resource Allocation Algorithm for Satellite Edge Computing Networks. 1-5 - Xu Luo, Haifen Yang, Zhiyong Guo:

Deep Learning-Aided Quantizer Design for Non-Volatile Memories with Unknown Offset. 1-5 - Tianshun Fang, Hao Xue, Zhenni Pan, Shigeru Shimamoto:

A Lightweight Network Slicing Scheme for 5G Coexistence Network in Multitenant and Services. 1-6 - Na Qin, Yantao Liu:

The Security Hierarchy of Network Coding System against Wiretap Attacks. 1-4 - Jiangjiang Huang, Kuoxiang Zhang, Yueting Zhang:

Telecommunication system with high-rate downlink for deep space exploration. 1-4 - Dovydas Paulauskas, Amna Eleyan:

Knock pattern based door lock with Amazon Alexa on Raspberry Pi. 1-4 - Lucca Ruhland, Mari Schmidt, Jan Bauer, Elmar Padilla:

Keeping the Baddies Out and the Bridge Calm: Embedded Authentication for Maritime Networks. 1-6

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














