Abstract is missing.
- Fast and Secure Key Generation with Channel Obfuscation in Slowly Varying EnvironmentsGuyue Li, Haiyu Yang, Junqing Zhang, Hongbo Liu, Aiqun Hu. 1-10 [doi]
- MILLIEAR: Millimeter-wave Acoustic Eavesdropping with Unconstrained VocabularyPengfei Hu, Yifan Ma, Panneer Selvam Santhalingam, Parth H. Pathak, Xiuzhen Cheng 0001. 11-20 [doi]
- The Hanging ROA: A Secure and Scalable Encoding Scheme for Route Origin AuthorizationYanbiao Li, Hui Zou, Yuxuan Chen, Yinbo Xu, Zhuoran Ma, Di Ma, Ying Hu, Gaogang Xie. 21-30 [doi]
- Thwarting Unauthorized Voice Eavesdropping via Touch Sensing in Mobile SystemsWenbin Huang, Wenjuan Tang, Kuan Zhang, Haojin Zhu, Yaoxue Zhang. 31-40 [doi]
- ComAI: Enabling Lightweight, Collaborative Intelligence by Retrofitting Vision DNNsKasthuri Jayarajah, Dhanuja Wanniarachchige, Tarek F. Abdelzaher, Archan Misra. 41-50 [doi]
- Dual-track Protocol Reverse Analysis Based on Share LearningWeiyao Zhang, Xuying Meng, Yujun Zhang. 51-60 [doi]
- FedFPM: A Unified Federated Analytics Framework for Collaborative Frequent Pattern MiningZibo Wang, Yifei Zhu, Dan Wang 0002, Zhu Han 0001. 61-70 [doi]
- Layer-aware Collaborative Microservice Deployment toward Maximal Edge ThroughputLin Gu 0002, Zirui Chen, Honghao Xu, Deze Zeng, Bo Li 0001, Hai Jin 0001. 71-79 [doi]
- Amaging: Acoustic Hand Imaging for Self-adaptive Gesture RecognitionPengHao Wang, Ruobing Jiang, Chao Liu 0008. 80-89 [doi]
- mmECG: Monitoring Human Cardiac Cycle in Driving Environments Leveraging Millimeter WaveXiangyu Xu, Jiadi Yu, Chengguang Ma, Yanzhi Ren, Hongbo Liu, Yanmin Zhu, Yingying Chen 0001, Feilong Tang. 90-99 [doi]
- Mudra: A Multi-Modal Smartwatch Interactive System with Hand Gesture Recognition and User IdentificationKaiwen Guo, Hao Zhou 0001, Ye Tian, Wangqiu Zhou, Yusheng Ji, Xiang-Yang Li. 100-109 [doi]
- Sound of Motion: Real-time Wrist Tracking with A Smart Watch-Phone PairTianyue Zheng, Chao Cai, Zhe Chen, Jun Luo 0001. 110-119 [doi]
- 2BF - Data-Driven Beamforming in MU-MIMO with Channel Estimation UncertaintyShaoran Li, Nan Jiang, Yongce Chen, Y. Thomas Hou, Wenjing Lou, Weijun Xie 0001. 120-129 [doi]
- 3: A Sub-Millisecond Scheduler for Multi-Cell MIMO Networks under C-RAN ArchitectureYongce Chen, Y. Thomas Hou, Wenjing Lou, Jeffrey H. Reed, Sastry Kompella. 130-139 [doi]
- MUSTER: Subverting User Selection in MU-MIMO NetworksTao Hou, Shengping Bi, Tao Wang 0026, Zhuo Lu, Yao Liu, Satyajayant Misra, Yalin E. Sagduyu. 140-149 [doi]
- Semi-Online Precoding with Information Parsing for Cooperative MIMO Wireless NetworksJuncheng Wang, Ben Liang, Min Dong 0001, Gary Boudreau, Hatem Abou-zeid. 150-159 [doi]
- FlowShark: Sampling for High Flow Visibility in SDNsSogand SadrHaghighi, Mahdi Dolati, Majid Ghaderi, Ahmad Khonsari. 160-169 [doi]
- Joint Resource Management and Flow Scheduling for SFC Deployment in Hybrid Edge-and-Cloud NetworkYingling Mao, Xiaojun Shang, Yuanyuan Yang 0001. 170-179 [doi]
- NFlow and MVT Abstractions for NFV ScalingZiyan Wu, Yang Zhang, Wendi Feng, Zhi-Li Zhang. 180-189 [doi]
- The Information Velocity of Packet-Erasure LinksElad Domanovitz, Tal Philosof, Anatoly Khina. 190-199 [doi]
- Distributed Bandits with Heterogeneous AgentsLin Yang, Yu-Zhen Janice Chen, Mohammad H. Hajiemaili, John C. S. Lui, Don Towsley. 200-209 [doi]
- Experimental Design Networks: A Paradigm for Serving Heterogeneous Learners under Networking ConstraintsYuezhou Liu, Yuanyuan Li, Lili Su, Edmund Yeh, Stratis Ioannidis. 210-219 [doi]
- MC-Sketch: Enabling Heterogeneous Network Monitoring Resolutions with Multi-Class SketchKate Ching-Ju Lin, Wei-Lun Lai. 220-229 [doi]
- Stream Iterative Distributed Coded Computing for Learning Applications in Heterogeneous SystemsHoma Esfahanizadeh, Alejandro Cohen, Muriel Médard. 230-239 [doi]
- ChARM: NextG Spectrum Sharing Through Data-Driven Real-Time O-RAN Dynamic ControlLuca Baldesi, Francesco Restuccia, Tommaso Melodia. 240-249 [doi]
- MARISA: A Self-configuring Metasurfaces Absorption and Reflection Solution Towards 6GAntonio Albanese 0001, Francesco Devoti, Vincenzo Sciancalepore, Marco Di Renzo, Xavier Costa-Pérez. 250-259 [doi]
- OnionCode: Enabling Multi-priority Coding in LED-based Optical Camera CommunicationsHaonan Wu, Yingying Chen 0001, Guangtao Xue, Yuehu Jiang, Ming Wang, Shiyou Qian, Jiadi Yu, Pai-Yen Chen. 260-269 [doi]
- OrchestRAN: Network Automation through Orchestrated Intelligence in the Open RANSalvatore D'Oro, Leonardo Bonati, Michele Polese, Tommaso Melodia. 270-279 [doi]
- Backdoor Defense with Machine UnlearningYang Liu, Mingyuan Fan, Cen Chen, Ximeng Liu, Zhuo Ma, Li Wang, Jianfeng Ma 0001. 280-289 [doi]
- Revisiting Frequency Analysis against Encrypted Deduplication via Statistical DistributionJingwei Li 0001, Guoli Wei, Jiacheng Liang, Yanjing Ren, Patrick P. C. Lee, Xiaosong Zhang. 290-299 [doi]
- Switching Gaussian Mixture Variational RNN for Anomaly Detection of Diverse CDN WebsitesLiang Dai, Wenchao Chen, Yanwei Liu, Antonios Argyriou, Chang Liu, Tao Lin, Penghui Wang, Zhen Xu, Bo Chen. 300-309 [doi]
- Towards an Efficient Defense against Deep Learning based Website FingerprintingZhen Ling, Gui Xiao, Wenjia Wu, Xiaodan Gu, Ming Yang 0001, Xinwen Fu. 310-319 [doi]
- Addressing Network Bottlenecks with Divide-and-Shuffle Synchronization for Distributed DNN TrainingWeiyan Wang, Cengguang Zhang, Liu Yang, Kai Chen 0005, Kun Tan. 320-329 [doi]
- Distributed Inference with Deep Learning Models across Heterogeneous Edge DevicesChenghao Hu, Baochun Li. 330-339 [doi]
- Efficient Pipeline Planning for Expedited Distributed DNN TrainingZiyue Luo, Xiaodong Yi 0001, Guoping Long, Shiqing Fan, Chuan Wu 0001, Jun Yang, Wei Lin 0016. 340-349 [doi]
- Mercury: A Simple Transport Layer Scheduler to Accelerate Distributed DNN TrainingQingyang Duan, Zeqin Wang, Yuedong Xu, Shaoteng Liu, Jun Wu. 350-359 [doi]
- DBAC: Directory-Based Access Control for Geographically Distributed IoT SystemsLuoyao Hao, Vibhas Naik, Henning Schulzrinne. 360-369 [doi]
- IoTMosaic: Inferring User Activities from IoT Network Traffic in Smart HomesYinxin Wan, Kuai Xu, Feng Wang 0002, Guoliang Xue. 370-379 [doi]
- Physical-Level Parallel Inclusive Communication for Heterogeneous IoT DevicesSihan Yu, Xiaonan Zhang, Pei Huang 0005, Linke Guo. 380-389 [doi]
- RF-Protractor: Non-Contacting Angle Tracking via COTS RFID in Industrial IoT EnvironmentTingjun Liu, Chuyu Wang, Lei Xie 0004, Jingyi Ning, Tie Qiu, Fu Xiao 0001, Sanglu Lu. 390-399 [doi]
- Physical-World Attack towards WiFi-based Behavior RecognitionJianwei Liu, Yinghui He, Chaowei Xiao, Jinsong Han, Le Cheng, Kui Ren 0001. 400-409 [doi]
- Push the Limit of WiFi-based User Authentication towards Undefined GesturesHao Kong, Li Lu 0008, Jiadi Yu, Yanmin Zhu, Feilong Tang, Yingying Chen 0001, Linghe Kong, Feng Lyu 0001. 410-419 [doi]
- Target-oriented Semi-supervised Domain Adaptation for WiFi-based HARZhipeng Zhou, Feng Wang, Jihong Yu, Ju Ren, Zhi Wang, Wei Gong 0001. 420-429 [doi]
- WiRa: Enabling Cross-Technology Communication from WiFi to LoRa with IEEE 802.11axDan Xia, Xiaolong Zheng 0002, Fu Yu, Liang Liu 0001, Huadong Ma. 430-439 [doi]
- Mag-E4E: Trade Efficiency for Energy in Magnetic MIMO Wireless Power Transfer SystemXiang Cui, Hao Zhou 0001, Jialin Deng, Wangqiu Zhou, Xing Guo, Yu Gu. 440-449 [doi]
- Minimal Total Deviation in TCAM Load BalancingYaniv Sadeh, Ori Rottenstreich, Haim Kaplan. 450-459 [doi]
- Performance and Scaling of Parallel Systems with Blocking Start and/or Departure BarriersBrenton D. Walker, Stefan Bora, Markus Fidler. 460-469 [doi]
- Short-Term Memory Sampling for Spread Measurement in High-Speed NetworksYang Du 0006, He Huang 0001, Yu-e Sun, Shigang Chen, Guoju Gao, Xiaoyu Wang, Shenghui Xu. 470-479 [doi]
- E2E Fidelity Aware Routing and Purification for Throughput Maximization in Quantum NetworksYangming Zhao, Gongming Zhao, Chunming Qiao. 480-489 [doi]
- Opportunistic Routing in Quantum NetworksAli Farahbakhsh, Chen Feng 0001. 490-499 [doi]
- Optimal Routing for Stream Learning SystemsXinzhe Fu, Eytan H. Modiano. 500-509 [doi]
- Multi-Entanglement Routing Design over Quantum NetworksYiming Zeng, Jiarui Zhang, Ji Liu 0001, Zhenhua Liu 0002, Yuanyuan Yang. 510-519 [doi]
- CurveALOHA: Non-linear Chirps Enabled High Throughput Random Channel Access for LoRaChenning Li, Zhichao Cao, Li Xiao 0001. 520-529 [doi]
- Don't Miss Weak Packets: Boosting LoRa Reception with Antenna DiversitiesNingning Hou, Xianjin Xia, Yuanqing Zheng. 530-539 [doi]
- LoRadar: An Efficient LoRa Channel Occupancy Acquirer based on Cross-channel ScanningFu Yu, Xiaolong Zheng 0002, Liang Liu 0001, Huadong Ma. 540-549 [doi]
- PolarScheduler: Dynamic Transmission Control for Floating LoRa NetworksRuinan Li, Xiaolong Zheng, YuTing Wang, Liang Liu 0001, Huadong Ma. 550-559 [doi]
- Otus: A Gaze Model-based Privacy Control Framework for Eye Tracking ApplicationsMiao Hu, Zhenxiao Luo, Yipeng Zhou, Xuezheng Liu, Di Wu 0001. 560-569 [doi]
- Privacy-Preserving Online Task Assignment in Spatial Crowdsourcing: A Graph-based ApproachHengzhi Wang, En Wang, Yongjian Yang, Jie Wu 0001, Falko Dressler. 570-579 [doi]
- Protect Privacy from Gradient Leakage Attack in Federated LearningJunxiao Wang, Song Guo 0001, Xin Xie, Heng Qi. 580-589 [doi]
- When Deep Learning Meets Steganography: Protecting Inference Privacy in the DarkQin Liu 0001, Jiamin Yang, Hongbo Jiang 0001, Jie Wu 0001, Tao Peng 0011, Tian Wang 0001, Guojun Wang 0001. 590-599 [doi]
- Cutting Tail Latency in Commodity Datacenters with CloudburstGaoxiong Zeng, Li Chen, Bairen Yi, Kai Chen. 600-609 [doi]
- EdgeMatrix: A Resources Redefined Edge-Cloud System for Prioritized ServicesYuanming Ren, Shihao Shen, Yanli Ju, Xiaofei Wang 0001, Wenyu Wang, Victor C. M. Leung. 610-619 [doi]
- TRUST: Real-Time Request Updating with Elastic Resource Provisioning in CloudsJingzhou Wang, Gongming Zhao, Hongli Xu, Yangming Zhao, Xuwei Yang, He Huang 0001. 620-629 [doi]
- VITA: Virtual Network Topology-aware Southbound Message Delivery in CloudsLuyao Luo, Gongming Zhao, Hongli Xu, Liguang Xie, Ying Xiong. 630-639 [doi]
- Boosting Internet Card Cellular Business via User Portraits: A Case of Churn PredictionFan Wu, Ju Ren, Feng Lyu 0001, Peng Yang 0004, Yongmin Zhang, Deyu Zhang, Yaoxue Zhang. 640-649 [doi]
- Lumos: towards Better Video Streaming QoE through Accurate Throughput PredictionGerui Lv, Qinghua Wu, Weiran Wang, Zhenyu Li 0001, Gaogang Xie. 650-659 [doi]
- Poisoning Attacks on Deep Learning based Wireless Traffic PredictionTianhang Zheng, Baochun Li. 660-669 [doi]
- PreGAN: Preemptive Migration Prediction Network for Proactive Fault-Tolerant Edge ComputingShreshth Tuli, Giuliano Casale, Nicholas R. Jennings. 670-679 [doi]
- Encoding-based Range Detection in Commodity RFID SystemsXi Yu, Jia Liu, Shigeng Zhang, Xingyu Chen, Xu Zhang, Lijun Chen. 680-689 [doi]
- RC6D: An RFID and CV Fusion System for Real-time 6D Object Pose EstimationBojun Zhang, Mengning Li, Xin Xie, Luoyi Fu, Xinyu Tong, Xiulong Liu. 690-699 [doi]
- RCID: Fingerprinting Passive RFID Tags via Wideband BackscatterJiawei Li, Ang Li, Dianqi Han, Yan Zhang, Tao Li, Yanchao Zhang. 700-709 [doi]
- Revisiting RFID Missing Tag IdentificationKanghuai Liu, Lin Chen, Junyi Huang, Shiyuan Liu, Jihong Yu. 710-719 [doi]
- CoToRu: Automatic Generation of Network Intrusion Detection Rules from CodeHeng Chuan Tan, Carmen Cheh, Binbin Chen. 720-729 [doi]
- Learning Buffer Management Policies for Shared Memory SwitchesMowei Wang, Sijiang Huang, Yong Cui 0001, Wendong Wang, Zhenhua Li 0001. 730-739 [doi]
- Learning Optimal Antenna Tilt Control Policies: A Contextual Linear Bandit ApproachFilippo Vannella, Alexandre Proutière, Yassir Jedra, Jaeseong Jeong. 740-749 [doi]
- Policy-Induced Unsupervised Feature Selection: A Networking Case StudyJalil Taghia, Farnaz Moradi, Hannes Larsson, Xiaoyu Lan, Masoumeh Ebrahimi, Andreas Johnsson. 750-759 [doi]
- AutoByte: Automatic Configuration for Optimal Communication Scheduling in DNN TrainingYiqing Ma, Hao Wang, Yiming Zhang 0003, Kai Chen 0005. 760-769 [doi]
- Joint Near-Optimal Age-based Data Transmission and Energy Replenishment Scheduling at Wireless-Powered Network EdgeQuan Chen 0003, Zhipeng Cai 0001, Lianglun Cheng, Feng Wang, Hong Gao 0001. 770-779 [doi]
- Kalmia: A Heterogeneous QoS-aware Scheduling Framework for DNN Tasks on Edge ServersZiyan Fu, Ju Ren, Deyu Zhang, Yuezhi Zhou, Yaoxue Zhang. 780-789 [doi]
- Subset Selection for Hybrid Task Scheduling with General Cost ConstraintsYu Sun, Chi Lin, Jiankang Ren, Peng-fei Wang, Lei Wang 0005, Guowei Wu, Qiang Zhang 0008. 790-799 [doi]
- A Comparative Measurement Study of Commercial 5G mmWave DeploymentsArvind Narayanan, Muhammad Iqbal Rochman, Ahmad Hassan, Bariq S. Firmansyah, Vanlin Sathya, Monisha Ghosh, Feng Qian 0001, Zhi-Li Zhang. 800-809 [doi]
- AI in 5G: The Case of Online Distributed Transfer Learning over Edge NetworksYulan Yuan, Lei Jiao, Konglin Zhu, Xiaojun Lin, Lin Zhang 0013. 810-819 [doi]
- mmPhone: Acoustic Eavesdropping on Loudspeakers via mmWave-characterized Piezoelectric EffectChao Wang, Feng Lin 0004, Tiantian Liu 0002, Ziwei Liu, Yijie Shen, Zhongjie Ba, Li Lu 0008, Wenyao Xu, Kui Ren 0001. 820-829 [doi]
- Optimizing Coverage with Intelligent Surfaces for Indoor mmWave NetworksJingyuan Zhang, Douglas M. Blough. 830-839 [doi]
- DiFi: A Go-as-You-Pay Wi-Fi Access SystemLianjie Shi, Runxin Tian, Xin Wang 0040, Richard T. B. Ma. 840-849 [doi]
- Online Data Valuation and Pricing for Machine Learning Tasks in Mobile HealthAnran Xu, Zhenzhe Zheng, Fan Wu 0006, Guihai Chen. 850-859 [doi]
- Online Pricing with Limited Supply and Time-Sensitive ValuationsShaoang Li, Lan Zhang, Xiang-Yang Li. 860-869 [doi]
- Optimal Pricing Under Vertical and Horizontal Interaction Structures for IoT NetworksNingning Ding, Lin Gao 0001, Jianwei Huang, Xin Li, Xin Chen. 870-879 [doi]
- EdgeTuner: Fast Scheduling Algorithm Tuning for Dynamic Edge-Cloud Workloads and ResourcesRui Han 0001, Shilin Wen, Chi Harold Liu, Ye Yuan 0001, Guoren Wang, Lydia Y. Chen. 880-889 [doi]
- Optimizing Task Placement and Online Scheduling for Distributed GNN Training AccelerationZiyue Luo, Yixin Bao, Chuan Wu 0001. 890-899 [doi]
- Payment Channel Networks: Single-Hop Scheduling for Throughput MaximizationNikolaos Papadis, Leandros Tassiulas. 900-909 [doi]
- Shield: Safety Ensured High-efficient Scheduling for Magnetic MIMO Wireless Power Transfer SystemWangqiu Zhou, Hao Zhou 0001, Xiaoyu Wang, Kaiwen Guo, Haisheng Tan, Xiang-Yang Li 0001. 910-919 [doi]
- Copa+: Analysis and Improvement of the Delay-based Congestion Control Algorithm CopaWanchun Jiang, Haoyang Li, Zheyuan Liu, Jia Wu, Jiawei Huang, Danfeng Shan, Jianxin Wang 0001. 920-929 [doi]
- Learning for Robust Combinatorial Optimization: Algorithm and ApplicationZhihui Shao, Jianyi Yang, Cong Shen, Shaolei Ren. 930-939 [doi]
- Polynomial-Time Algorithm for the Regional SRLG-disjoint Paths ProblemBalázs Vass, Erika R. Bérczi-Kovács, Ábel Barabás, Zsombor L. Hajdú, János Tapolcai. 940-949 [doi]
- Provably Efficient Algorithms for Traffic-sensitive SFC Placement and Flow RoutingYingling Mao, Xiaojun Shang, Yuanyuan Yang 0001. 950-959 [doi]
- DeepEar: Sound Localization with Binaural MicrophonesQiang Yang, Yuanqing Zheng. 960-969 [doi]
- Impact of Later-Stages COVID-19 Response Measures on Spatiotemporal Mobile Service UsageAndré Felipe Zanella, Orlando Martínez-Durive, Sachit Mishra, Zbigniew Smoreda, Marco Fiore. 970-979 [doi]
- SAH: Fine-grained RFID Localization with Antenna CalibrationXu Zhang, Jia Liu, Xingyu Chen, Wenjie Li, Lijun Chen. 980-988 [doi]
- Separating Voices from Multiple Sound Sources using 2D Microphone ArrayXinran Lu, Lei Xie 0004, Fang Wang, Tao Gu, Chuyu Wang, Wei Wang 0002, Sanglu Lu. 989-998 [doi]
- A Theory of Second-Order Wireless Network Optimization and Its Application on AoIDaojing Guo, Khaled Nakhleh, I-Hong Hou, Sastry Kompella, Clement Kam. 999-1008 [doi]
- Age-Based Scheduling for Monitoring and Control Applications in Mobile Edge Computing SystemsXingqiu He, Sheng Wang 0006, Xiong Wang 0001, Shizhong Xu, Jing Ren. 1009-1018 [doi]
- AoI-centric Task Scheduling for Autonomous Driving SystemsChengyuan Xu, Qian Xu, Jianping Wang 0001, Kui Wu 0001, Kejie Lu, Chunming Qiao. 1019-1028 [doi]
- AoI-minimal UAV Crowdsensing by Model-based Graph Convolutional Reinforcement LearningZipeng Dai, Chi Harold Liu, Yuxiao Ye, Rui Han 0001, Ye Yuan 0001, Guoren Wang, Jian Tang 0008. 1029-1038 [doi]
- Caching-based Multicast Message Authentication in Time-critical Industrial Control SystemsUtku Tefek, Ertem Esiner, Daisuke Mashima, Binbin Chen, Yih-Chun Hu. 1039-1048 [doi]
- Distributed Cooperative Caching in Unreliable Edge EnvironmentsYu Liu, Yingling Mao, Xiaojun Shang, Zhenhua Liu 0002, Yuanyuan Yang 0001. 1049-1058 [doi]
- Online File Caching in Latency-Sensitive Systems with Delayed Hits and BypassingChi Zhang 0043, Haisheng Tan, Guopeng Li, Zhenhua Han, Shaofeng H.-C. Jiang, Xiangyang Li 0001. 1059-1068 [doi]
- Retention-Aware Container Caching for Serverless Edge ComputingLi Pan, Lin Wang, Shutong Chen, Fangming Liu. 1069-1078 [doi]
- A Unified Model for Bi-objective Online Stochastic Bipartite Matching with Two-sided Limited PatienceGaofei Xiao, Jiaqi Zheng, Haipeng Dai. 1079-1088 [doi]
- Lazy Self-Adjusting Bounded-Degree Networks for the Matching ModelEvgeniy Feder, Ichha Rathod, Punit Shyamsukha, Robert Sama, Vitaly Aksenov, Iosif Salem, Stefan Schmid 0001. 1089-1098 [doi]
- Maximizing h-hop Independently Submodular Functions Under Connectivity ConstraintWenzheng Xu, Dezhong Peng, Weifa Liang, Xiaohua Jia, Zichuan Xu, Pan Zhou, Weigang Wu, Xiang Chen. 1099-1108 [doi]
- Optimal Shielding to Guarantee Region-Based Connectivity under Geographical FailuresBinglin Tao, Mingyu Xiao, Bakhadyr Khoussainov, Junqiang Peng. 1109-1118 [doi]
- Big Brother is Listening: An Evaluation Framework on Ultrasonic Microphone JammersYike Chen, Ming Gao, Yimin Li, LingFeng Zhang, Li Lu 0001, Feng Lin 0004, Jinsong Han, Kui Ren 0001. 1119-1128 [doi]
- InertiEAR: Automatic and Device-independent IMU-based Eavesdropping on SmartphonesMing Gao, Yajie Liu, Yike Chen, Yimin Li, Zhongjie Ba, Xian Xu, Jinsong Han. 1129-1138 [doi]
- JADE: Data-Driven Automated Jammer Detection Framework for Operational Mobile NetworksCaner Kilinc, Mahesh K. Marina, Muhammad Usama, Salih Ergüt, Jon Crowcroft, Tugrul Gundogdu, Ilhan Akinci. 1139-1148 [doi]
- MDoC: Compromising WRSNs through Denial of Charge by Mobile ChargerChi Lin, Pengfei Wang, Qiang Zhang, Hao Wang, Lei Wang, Guowei Wu. 1149-1158 [doi]
- MoDEMS: Optimizing Edge Computing Migrations for User MobilityTaejin Kim, Sandesh Dhawaskar Sathyanarayana, Siqi Chen, Youngbin Im, Xiaoxi Zhang, Sangtae Ha, Carlee Joe-Wong. 1159-1168 [doi]
- Optimal Admission Control Mechanism Design for Time-Sensitive Services in Edge ComputingShutong Chen, Lin Wang, Fangming Liu. 1169-1178 [doi]
- Towards Online Privacy-preserving Computation Offloading in Mobile Edge ComputingXiaoyi Pang, Zhibo Wang, Jingxin Li, Ruiting Zhou, Ju Ren, Zhetao Li. 1179-1188 [doi]
- Two Time-Scale Joint Service Caching and Task Offloading for UAV-assisted Mobile Edge ComputingRuiting Zhou, Xiaoyi Wu, Haisheng Tan, Renli Zhang. 1189-1198 [doi]
- Decentralized Task Offloading in Edge Computing: A Multi-User Multi-Armed Bandit ApproachXiong Wang, Jiancheng Ye, John C. S. Lui. 1199-1208 [doi]
- Deep Learning on Mobile Devices Through Neural Processing Units and Edge ComputingTianxiang Tan, Guohong Cao. 1209-1218 [doi]
- Learning-based Multi-Drone Network Edge Orchestration for Video AnalyticsChengyi Qu, Rounak Singh, Alicia Esquivel Morel, Prasad Calyam. 1219-1228 [doi]
- Online Model Updating with Analog Aggregation in Wireless Edge LearningJuncheng Wang, Min Dong 0001, Ben Liang, Gary Boudreau, Hatem Abou-zeid. 1229-1238 [doi]
- An RFID and Computer Vision Fusion System for Book Inventory using Mobile RobotJiuwu Zhang, Xiulong Liu, Tao Gu, Bojun Zhang, Dongdong Liu, Zijuan Liu, Keqiu Li. 1239-1248 [doi]
- GASLA: Enhancing the Applicability of Sign Language TranslationJiao Li, Yang Liu 0101, Weitao Xu, Zhenjiang Li. 1249-1258 [doi]
- Tackling Multipath and Biased Training Data for IMU-Assisted BLE Proximity DetectionTianlang He, Jiajie Tan, Weipeng Zhuo, Maximilian Printz, S.-H. Gary Chan. 1259-1268 [doi]
- VR Viewport Pose Model for Quantifying and Exploiting Frame CorrelationsYing Chen, Hojung Kwon, Hazer Inaltekin, Maria Gorlatova. 1269-1278 [doi]
- Adaptive Bitrate with User-level QoE Preference for Video StreamingXutong Zuo, Jiayu Yang, Mowei Wang, Yong Cui 0001. 1279-1288 [doi]
- Enabling QoE Support for Interactive Applications over Mobile Edge with High User MobilityXiaojun Shang, Yaodong Huang, Yingling Mao, Zhenhua Liu 0002, Yuanyuan Yang 0001. 1289-1298 [doi]
- On Uploading Behavior and Optimizations of a Mobile Live Streaming ServiceJinyang Li, Zhenyu Li 0001, Qinghua Wu, Gareth Tyson. 1299-1308 [doi]
- VSiM: Improving QoE Fairness for Video Streaming in Mobile EnvironmentsYali Yuan, Weijun Wang, Yuhan Wang, Sripriya Srikant Adhatarao, Bangbang Ren, Kai Zheng, Xiaoming Fu 0001. 1309-1318 [doi]
- Dino: A Block Transmission Protocol with Low Bandwidth Consumption and Propagation LatencyZhenxing Hu, Zhen Xiao. 1319-1328 [doi]
- Enabling Low-latency-capable Satellite-Ground Topology for Emerging LEO Satellite NetworksYaoying Zhang, Qian Wu, Zeqi Lai, Hewu Li. 1329-1338 [doi]
- SpaceRTC: Unleashing the Low-latency Potential of Mega-constellations for Real-Time CommunicationsZeqi Lai, Weisen Liu, Qian Wu, Hewu Li, Jingxi Xu, Jianping Wu. 1339-1348 [doi]
- Torp: Full-Coverage and Low-Overhead Profiling of Host-Side LatencyXiang Chen, Hongyan Liu, Junyi Guo, Xinyue Jiang, Qun Huang 0001, Dong Zhang, Chunming Wu 0001, Haifeng Zhou. 1349-1358 [doi]
- 2I: Minimizing Age of Outdated Information to Improve Freshness in Data CollectionQingyu Liu, Chengzhang Li, Y. Thomas Hou, Wenjing Lou, Jeffrey H. Reed, Sastry Kompella. 1359-1368 [doi]
- CausalRD: A Causal View of Rumor Detection via Eliminating Popularity and Conformity BiasesWeifeng Zhang, Ting Zhong, Ce Li, Kunpeng Zhang, Fan Zhou 0002. 1369-1378 [doi]
- Learning from Delayed Semi-Bandit Feedback under Strong Fairness GuaranteesJuaren Steiger, Bin Li, Ning Lu. 1379-1388 [doi]
- Optimizing Sampling for Data Freshness: Unreliable Transmissions with Random Two-way DelayJiayu Pan, Ahmed M. Bedewy, Yin Sun, Ness B. Shroff. 1389-1398 [doi]
- Connectivity Maintenance in Uncertain Networks under Adversarial AttackJianzhi Tang, Luoyi Fu, Jiaxin Ding, Xinbing Wang, Guihai Chen. 1399-1408 [doi]
- FeCo: Boosting Intrusion Detection Capability in IoT Networks via Contrastive LearningNing Wang 0022, Yimin Chen, Yang Hu, Wenjing Lou, Y. Thomas Hou. 1409-1418 [doi]
- PhoneyTalker: An Out-of-the-Box Toolkit for Adversarial Example Attack on Speaker RecognitionMeng Chen, Li Lu 0008, Zhongjie Ba, Kui Ren 0001. 1419-1428 [doi]
- TrojanFlow: A Neural Backdoor Attack to Deep Learning-based Network Traffic ClassifiersRui Ning, Chunsheng Xin, Hongyi Wu. 1429-1438 [doi]
- A Profit-Maximizing Model Marketplace with Differentially Private Federated LearningPeng Sun, Xu Chen 0004, Guocheng Liao, Jianwei Huang. 1439-1448 [doi]
- Communication-Efficient Device Scheduling for Federated Learning Using Stochastic OptimizationJake Perazzone, Shiqiang Wang 0001, Mingyue Ji, Kevin S. Chan. 1449-1458 [doi]
- Optimal Rate Adaption in Federated Learning with Compressed CommunicationsLaizhong Cui, Xiaoxin Su, Yipeng Zhou, Jiangchuan Liu. 1459-1468 [doi]
- Towards Optimal Multi-Modal Federated Learning on Non-IID Data with Hierarchical Gradient BlendingSijia Chen, Baochun Li. 1469-1478 [doi]
- A Comparative Approach to Resurrecting the Market of MOD Vehicular CrowdsensingChaocan Xiang, Yaoyu Li, Yanlin Zhou, Suining He, Yuben Qu, Zhenhua Li 0001, Liangyi Gong, Chao Chen. 1479-1488 [doi]
- Real-Time Execution of Trigger-Action Connection for Home Internet-of-ThingsKai Dong, Yakun Zhang, Yuchen Zhao, Daoming Li, Zhen Ling, Wenjia Wu, Xiaorui Zhu. 1489-1498 [doi]
- Spatiotemporal Fracture Data Inference in Sparse Urban CrowdSensingEn Wang, Mijia Zhang, Yuanbo Xu, Haoyi Xiong, Yongjian Yang. 1499-1508 [doi]
- Worker Selection Towards Data Completion for Online Sparse CrowdsensingWenbin Liu, En Wang, Yongjian Yang, Jie Wu 0001. 1509-1518 [doi]
- An Efficient Two-Layer Task Offloading Scheme for MEC System with Multiple Services ProvidersJu Ren, Jiani Liu 0005, Yongmin Zhang, Zhaohui Li, Feng Lyu 0001, Zhibo Wang, Yaoxue Zhang. 1519-1528 [doi]
- Dyssect: Dynamic Scaling of Stateful Network FunctionsFabrício B. Carvalho, Ronaldo A. Ferreira, Ítalo Cunha, Marcos A. M. Vieira, Murali Krishna Ramanathan. 1529-1538 [doi]
- Network Synthesis under Delay Constraints: The Power of Network Calculus DifferentiabilityFabien Geyer, Steffen Bondorf. 1539-1548 [doi]
- User Experience Oriented Task Computation for UAV-Assisted MEC SystemLutian Shen. 1549-1558 [doi]
- Energy-Efficient Trajectory Optimization for Aerial Video Surveillance under QoS ConstraintsCheng Zhan, Han Hu 0003, Shiwen Mao, Jing Wang. 1559-1568 [doi]
- GADGET: Online Resource Optimization for Scheduling Ring-All-Reduce Learning JobsMenglu Yu, Ye Tian, Bo Ji 0001, Chuan Wu, Hridesh Rajan, Jia Liu 0002. 1569-1578 [doi]
- Midpoint Optimization for Segment RoutingAlexander Brundiers, Timmy Schüller, Nils Aschenbruck. 1579-1588 [doi]
- On Designing Secure Cross-user Redundancy Elimination for WAN OptimizationYuan Zhang, Ziwei Zhang, Minze Xu, Chen Tian 0001, Sheng Zhong. 1589-1598 [doi]
- ANTIGONE: Accurate Navigation Path Caching in Dynamic Road Networks leveraging Route APIsXiaojing Yu, Xiang-Yang Li 0001, Jing Zhao, Guobin Shen, Nikolaos M. Freris, Lan Zhang 0002. 1599-1608 [doi]
- Cutting Through the Noise to Infer Autonomous System TopologyKirtus G. Leyba, Joshua J. Daymude, Jean-Gabriel Young, M. E. J. Newman, Jennifer Rexford, Stephanie Forrest. 1609-1618 [doi]
- Joint Order Dispatch and Charging for Electric Self-Driving Taxi SystemsGuiyun Fan, Haiming Jin, Yiran Zhao, Yiwen Song, Xiaoying Gan, Jiaxin Ding, Lu Su, Xinbing Wang. 1619-1628 [doi]
- Vehicle-to-Nothing? Securing C-V2X Against Protocol-Aware DoS AttacksGeoff Twardokus, Hanif Rahbari. 1629-1638 [doi]
- Constrained In-network Computing with Low Congestion in Datacenter NetworksRaz Segal, Chen Avin, Gabriel Scalosub. 1639-1648 [doi]
- Fast and Heavy Disjoint Weighted Matchings for Demand-Aware Datacenter TopologiesKathrin Hanauer, Monika Henzinger, Stefan Schmid 0001, Jonathan Trummer. 1649-1658 [doi]
- Jingwei: An Efficient and Adaptable Data Migration Strategy for Deduplicated Storage SystemsGeyao Cheng, Deke Guo, Lailong Luo, Junxu Xia, YuChen Sun. 1659-1668 [doi]
- Optimal Data Placement for Stripe Merging in Locally Repairable CodesSi Wu 0003, Qingpeng Du, Patrick P. C. Lee, Yongkun Li, Yinlong Xu. 1669-1678 [doi]
- 6Forest: An Ensemble Learning-based Approach to Target Generation for Internet-wide IPv6 ScanningTao Yang, Zhiping Cai, Bingnan Hou, Tongqing Zhou. 1679-1688 [doi]
- Auter: Automatically Tuning Multi-layer Network Buffers in Long-Distance Shadowsocks NetworksXu He, Jiahao Cao, Shu Wang, Kun Sun 0001, Lisong Xu, Qi Li 0002. 1689-1698 [doi]
- FUME: Fuzzing Message Queuing Telemetry Transport BrokersBryan Pearson, Yue Zhang 0025, Cliff C. Zou, Xinwen Fu. 1699-1708 [doi]
- Large-scale Evaluation of Malicious Tor Hidden Service Directory DiscoveryChunmian Wang, Zhen Ling, Wenjia Wu, Qi Chen, Ming Yang 0001, Xinwen Fu. 1709-1718 [doi]
- FLASH: Federated Learning for Automated Selection of High-band mmWave SectorsBatool Salehi, Jerry Gu, Debashri Roy, Kaushik R. Chowdhury. 1719-1728 [doi]
- Joint Superposition Coding and Training for Federated Learning over Multi-Width Neural NetworksHankyul Baek, Won Joon Yun, Yunseok Kwak, Soyi Jung, Mingyue Ji, Mehdi Bennis, Jihong Park, Joongheon Kim. 1729-1738 [doi]
- Tackling System and Statistical Heterogeneity for Federated Learning with Adaptive Client SamplingBing Luo, Wenli Xiao, Shiqiang Wang 0001, Jianwei Huang 0001, Leandros Tassiulas. 1739-1748 [doi]
- The Right to be Forgotten in Federated Learning: An Efficient Realization with Rapid RetrainingYi Liu, Lei Xu, Xingliang Yuan, Cong Wang, Bo Li. 1749-1758 [doi]
- Can We Obtain Fine-grained Heartbeat Waveform via Contact-free RF-sensing?Shujie Zhang, Tianyue Zheng, Zhe Chen, Jun Luo 0001. 1759-1768 [doi]
- DroneSense: Leveraging Drones for Sustainable Urban-scale Sensing of Open Parking SpacesDong Zhao 0001, Mingzhe Cao, Lige Ding, Qiaoyue Han, Yunhao Xing, Huadong Ma. 1769-1778 [doi]
- RF-Wise: Pushing the Limit of RFID-based SensingCui Zhao, Zhenjiang Li, Han Ding, Ge Wang 0003, Wei Xi, Jizhong Zhao. 1779-1788 [doi]
- TeethPass: Dental Occlusion-based User Authentication via In-ear Acoustic SensingYadong Xie, Fan Li 0001, Yue Wu, Huijie Chen, Zhiyuan Zhao, Yu Wang. 1789-1798 [doi]
- Online Learning-Based Rate Selection for Wireless Interactive Panoramic Scene DeliveryHarsh Gupta, Jiangong Chen, Bin Li 0014, R. Srikant 0001. 1799-1808 [doi]
- Schedule or Wait: Age-Minimization for IoT Big Data Processing in MEC via Online LearningZichuan Xu, Wenhao Ren, Weifa Liang, Wenzheng Xu, Qiufen Xia, Pan Zhou, MingChu Li. 1809-1818 [doi]
- Sending Timely Status Updates through Channel with Random Delay via Online LearningHaoyue Tang, Yuchao Chen, Jingzhou Sun, Jintao Wang, Jian Song 0004. 1819-1827 [doi]
- Socially-Optimal Mechanism Design for Incentivized Online LearningZhiyuan Wang, Lin Gao 0001, Jianwei Huang 0001. 1828-1837 [doi]
- Energy Saving in Heterogeneous Wireless Rechargeable Sensor NetworksRiheng Jia, Jinhao Wu, Jianfeng Lu 0002, Minglu Li 0001, Feilong Lin, Zhonglong Zheng. 1838-1847 [doi]
- Escala: Timely Elastic Scaling of Control Channels in Network MeasurementHongyan Liu, Xiang Chen, Qun Huang 0001, Dezhang Kong, Jinbo Sun, Dong Zhang, Haifeng Zhou, Chunming Wu 0001. 1848-1857 [doi]
- LSAB: Enhancing Spatio-Temporal Efficiency of AoA Tracking SystemsQingrui Pan, Zhenlin An, Qiongzheng Lin, Lei Yang. 1858-1867 [doi]
- StepConf: SLO-Aware Dynamic Resource Configuration for Serverless Function WorkflowsZhaojie Wen, Yishuo Wang, Fangming Liu. 1868-1877 [doi]
- ArmSpy: Video-assisted PIN Inference Leveraging Keystroke-induced Arm Posture ChangesYuefeng Chen, Yicong Du, Chunlong Xu, Yanghai Yu, Hongbo Liu, Huan Dai, Yanzhi Ren, Jiadi Yu. 1878-1887 [doi]
- DNN-Driven Compressive Offloading for Edge-Assisted Semantic Video SegmentationXuedou Xiao, Juecheng Zhang, Wei Wang, Jianhua He, Qian Zhang 0001. 1888-1897 [doi]
- FlexPatch: Fast and Accurate Object Detection for On-device High-Resolution Live Video AnalyticsKichang Yang, Juheon Yi, Kyungjin Lee, Youngki Lee. 1898-1907 [doi]
- Learning for Crowdsourcing: Online Dispatch for Video Analytics with GuaranteeYu Chen 0038, Sheng Zhang 0001, Yibo Jin 0001, Zhuzhong Qian, Mingjun Xiao, Ning Chen, Zhi Ma. 1908-1917 [doi]
- Add/Drop Flexibility and System Complexity Tradeoff in ROADM DesignsLexin Pan, Tong Ye. 1918-1927 [doi]
- Detecting and Resolving PFC Deadlocks with ITSY Entirely in the Data PlaneXinyu Crystal Wu, T. S. Eugene Ng. 1928-1937 [doi]
- Mousika: Enable General In-Network Intelligence in Programmable Switches by Knowledge DistillationGuorui Xie, Qing Li 0006, Yutao Dong, Guanglin Duan, Yong Jiang 0001, Jingpu Duan. 1938-1947 [doi]
- Persistent Items Tracking in Large Data Streams Based on Adaptive SamplingLin Chen, Raphael C.-W. Phan, Zhili Chen, Dan Huang. 1948-1957 [doi]
- Blockchain Based Non-repudiable IoT Data Trading: Simpler, Faster, and CheaperFei Chen 0003, Jiahao Wang, Changkun Jiang, Tao Xiang, Yuanyuan Yang 0001. 1958-1967 [doi]
- BrokerChain: A Cross-Shard Blockchain Protocol for Account/Balance-based State ShardingHuawei Huang, Xiaowen Peng, Jianzhou Zhan, Shenyang Zhang, Yue Lin, Zibin Zheng, Song Guo 0001. 1968-1977 [doi]
- S-Store: A Scalable Data Store towards Permissioned Blockchain ShardingXiaodong Qi. 1978-1987 [doi]
- Optimal Oblivious Routing for Structured NetworksSucha Supittayapornpong, Pooria Namyar, Mingyang Zhang 0005, Minlan Yu, Ramesh Govindan. 1988-1997 [doi]
- MalGraph: Hierarchical Graph Neural Networks for Robust Windows Malware DetectionXiang Ling 0001, Lingfei Wu, Wei Deng, Zhenqing Qu, Jiangyu Zhang, Sheng Zhang, Tengfei Ma 0001, Bin Wang, Chunming Wu 0001, Shouling Ji. 1998-2007 [doi]
- Nadege: When Graph Kernels meet Network Anomaly DetectionHicham Lesfari, Frédéric Giroire. 2008-2017 [doi]
- RouteNet-Erlang: A Graph Neural Network for Network Performance EvaluationMiquel Ferriol Galmés, Krzysztof Rusek, José Suárez-Varela, Shihan Xiao, Xiang Shi, Xiangle Cheng, Bo Wu, Pere Barlet-Ros, Albert Cabellos-Aparicio. 2018-2027 [doi]
- xNet: Improving Expressiveness and Granularity for Network Modeling with Graph Neural NetworksMowei Wang, Linbo Hui, Yong Cui 0001, Ru Liang, Zhenhua Li 0001. 2028-2037 [doi]
- ABS: Adaptive Buffer Sizing via Augmented Programmability with Machine LearningJiaxin Tang, Sen Liu, Yang Xu, Zehua Guo 0001, Junjie Zhang 0001, Peixuan Gao, Yang Chen, Xin Wang, H. Jonathan Chao. 2038-2047 [doi]
- Network Link Weight Setting: A Machine Learning Based ApproachMurali S. Kodialam, T. V. Lakshman. 2048-2057 [doi]
- NeuroMessenger: Towards Error Tolerant Distributed Machine Learning Over Edge NetworksSong Wang, Xinyu Zhang. 2058-2067 [doi]
- Real-time Machine Learning for Symbol Detection in MIMO-OFDM SystemsYibin Liang, Lianjun Li, Yang Yi 0002, Lingjia Liu 0001. 2068-2077 [doi]
- Cost Effective MLaaS Federation: A Combinatorial Reinforcement Learning ApproachShuzhao Xie, Yuan Xue, Yifei Zhu, Zhi Wang. 2078-2087 [doi]
- Landing Reinforcement Learning onto Smart Scanning of The Internet of ThingsJian Qu, Xiaobo Ma, Wenmao Liu, Hongqing Sang, Jianfeng Li, Lei Xue 0001, Xiapu Luo, Zhenhua Li 0001, Li Feng, Xiaohong Guan. 2088-2097 [doi]
- Multi-Agent Distributed Reinforcement Learning for Making Decentralized Offloading DecisionsJing Tan, Ramin Khalili, Holger Karl, Artur Hecker. 2098-2107 [doi]
- Reinforcement Learning for Dynamic Dimensioning of Cloud Caches: A Restless Bandit ApproachGuojun Xiong, Shufan Wang, Gang Yan, Jian Li. 2108-2117 [doi]
- Accelerating Deep Learning Classification with Error-controlled Approximate-key CachingAlessandro Finamore, James Roberts, Massimo Gallo, Dario Rossi. 2118-2127 [doi]
- Lightweight Trilinear Pooling based Tensor Completion for Network Traffic MonitoringYudian Ouyang, Kun Xie 0001, Xin Wang 0001, Jigang Wen, Guangxing Zhang. 2128-2137 [doi]
- LossLeaP: Learning to Predict for Intent-Based NetworkingAlan Collet, Albert Banchs, Marco Fiore. 2138-2147 [doi]
- Network Tomography based on Adaptive Measurements in Probabilistic RoutingHiroki Ikeuchi, Hiroshi Saito, Kotaro Matsuda. 2148-2157 [doi]
- Batch Adaptative Streaming for Video AnalyticsLei Zhang 0066, Yuqing Zhang, Ximing Wu, Fangxin Wang 0001, Laizhong Cui, Zhi Wang, Jiangchuan Liu. 2158-2167 [doi]
- CASVA: Configuration-Adaptive Streaming for Live Video AnalyticsMiao Zhang, Fangxin Wang 0001, Jiangchuan Liu. 2168-2177 [doi]
- Deadline-aware Multipath Transmission for Streaming BlocksXutong Zuo, Yong Cui 0001, Xin Wang 0001, Jiayu Yang. 2178-2187 [doi]
- LSync: A Universal Event-synchronizing Solution for Live StreamingYifan Xu, Fan Dang 0001, Rongwu Xu, Xinlei Chen, Yunhao Liu. 2188-2197 [doi]
- AoDNN: An Auto-Offloading Approach to Optimize Deep Inference for Fostering Mobile WebYakun Huang, Xiuquan Qiao, Schahram Dustdar, Yan Li. 2198-2207 [doi]
- Muses: Enabling Lightweight Learning-Based Congestion Control for Mobile DevicesZhiren Zhong, Wei Wang 0334, Yiyang Shao, Zhenyu Li 0001, Heng Pan, Hongtao Guan, Gareth Tyson, Gaogang Xie, Kai Zheng. 2208-2217 [doi]
- NMMF-Stream: A Fast and Accurate Stream-Processing Scheme for Network Monitoring Data RecoveryKun Xie 0001, Ruotian Xie, Xin Wang 0001, Gaogang Xie, Dafang Zhang, Jigang Wen. 2218-2227 [doi]
- PACC: Proactive and Accurate Congestion Feedback for RDMA Congestion ControlXiaolong Zhong, Jiao Zhang 0002, Yali Zhang, Zixuan Guan, Zirui Wan. 2228-2237 [doi]