Abstract is missing.
- A Blockchain-Based Architecture for Access Control Management of IoT ApplicationsIslam Ahmed Moursy, Sahar Mohamed Ghanem, Mohamed Nazih ElDerini. 1-6 [doi]
- Expanded Excel-Based Simulator Tool for Resource-Allocation Optimization for Distributed Network ProtocolsEdward W. Chandler. 1-6 [doi]
- An Energy Efficiency Analysis of the Blockchain-Based extended Triple Diffie-Hellman Protocol for IoTArmando Ruggeri, Antonino Galletta, Lorenzo Carnevale, Massimo Villari. 1-6 [doi]
- CoviFL: Edge-Assisted Federated Learning for Remote COVID-19 Detection in an AIoMT FrameworkAneesh Bhattacharya, Risav Rana, Venkanna Udutalapally, Debanjan Das. 1-6 [doi]
- A Platform for Autonomous Swarms of UAVsMargarida Silva, André Mourato, Gonçalo Marques, Susana Sargento, André Reis. 1-6 [doi]
- Sensing Social Media to Forecast COVID-19 CasesCarmela Comito. 1-6 [doi]
- MMSP: A LSTM Based Framework for Multi-Step Attack Prediction in Mixed ScenariosZijun Cheng, Degang Sun, Leiqi Wang, Qiujian Lv, Yan Wang. 1-6 [doi]
- Fighting Against Piracy: An Approach to Detect Pirated Video Websites Enhanced by Third-party ServicesZhao Li, Shijun Zhang, Jiangyi Yin, Meijie Du, Zhongyi Zhang, Qingyun Liu. 1-7 [doi]
- A Federated Learning Framework for Resource Constrained Fog NetworksWassila Lalouani, Mohamed F. Younis. 1-6 [doi]
- Deep Learning for the selection of the best modular robots self-reconfiguration algorithmFrancesco Witz, Baptiste Buchi, Hakim Mabed, Frédéric Lassabe, Jaafar Gaber, Wahabou Abdou. 1-6 [doi]
- Reduction of latency of microservice based loT applications in rural areas with lack of connectivity using UAV-based networksJaime Galán-Jiménez, Alejandro González Vegas, Javier Berrocal. 1-6 [doi]
- On Flow-based Directed p-Cycle Design in Elastic Optical NetworksYuanhao Liu, Fen Zhou 0001, Michal Pióro, Tao Shang, Juan Manuel Torres Moreno, Abderrahim Benslimane. 1-7 [doi]
- Anomaly Detection in Logical Sub-Views of WSNsRobert Zakrzewski, Trevor Martin, George Oikonomou. 1-7 [doi]
- BC-MCSDT: A Blockchain-based Trusted Mobile Crowdsensing Data Trading FrameworkWeiwei Hu, Bo Gu, Jinming Li, Zhen Qin. 1-7 [doi]
- Multi-Sensory HMI for Human-Centric Industrial Digital Twins: A 6G Vision of Future IndustryBin Han 0004, Hans D. Schotten. 1-7 [doi]
- Assessing Anonymous and Selfish Free-rider Attacks in Federated LearningJianhua Wang, Xiaolin Chang, Ricardo J. Rodríguez, Yixiang Wang. 1-6 [doi]
- Digital Twin Networks: Learning Dynamic Network Behaviors from Network FlowsGuozhi Lin, Jingguo Gel, Yulei Wu, Hui Li, Liangxiong Li. 1-6 [doi]
- Reducing Hovering and Motion Energy Consumptions for UAV-enabled Collaborative BeamformingShuang Liang, Zhiyi Fang, Geng Sun 0001, Jiahui Li 0002. 1-7 [doi]
- StinAttack: A Lightweight and Effective Adversarial Attack Simulation to Ensemble IDSs for Satellite- Terrestrial Integrated NetworkShangyuan Zhuang, Jiyan Sun, Hangsheng Zhang, Xiaohui Kuang, Ling Pang, Haitao Liu, YinLong Liu. 1-8 [doi]
- GreenLoRaWAN: An energy efficient and resilient LoRaWAN communication protocolThomas Dimakis, Malamati D. Louta, Thomas Kyriakides, Alexandros-Apostolos A. Boulogeorgos, Konstantina Banti, Ioanna Karampelia, Nikos Papadimitriou. 1-7 [doi]
- Modeling and Simulation of 5G-based Edge Networks for Lightweight Machine Learning ApplicationsIsaac Briggs, Vincent Ivy, David Berdik, Fadi Wedyan, Yaser Jararweh. 1-6 [doi]
- Bi-objective Optimization for Collaborative UAV Secure Communication under Forest ChannelRuonan Li, Aimin Wang, Geng Sun 0001, Jiahui Li 0002, Xiaoya Zheng. 1-7 [doi]
- Vendor Neutral Cloud Platform for 4D Digital PathologyRui Jesus, Yubraj Gupta, Luís Bastião Silva, Carlos Costa 0001. 1-6 [doi]
- A NLP-based Approach to Improve Speech Recognition Services for People with Speech DisordersAntonio Celesti, Maria Fazio, Lorenzo Carnevale, Massimo Villari. 1-6 [doi]
- Learning Auction in Coded Distributed Computing with Heterogeneous User DemandsJiawei Liang, Juan Li, Kun Zhu 0001, Changyan Yi. 1-6 [doi]
- Modeling the End-to-End Energy Consumption of a Nation-Wide Smart Metering InfrastructureAdrien Gougeon, François Lemercier, Anne Blavette, Anne-Cécile Orgerie. 1-7 [doi]
- A Comparison of Machine and Deep Learning Models for Detection and Classification of Android Malware TrafficGiampaolo Bovenzi, Francesco Cerasuolo, Antonio Montieri, Alfredo Nascita, Valerio Persico, Antonio Pescapè. 1-6 [doi]
- OCVC: An Overlapping-Enabled Cooperative Computing Protocol in Vehicular Fog ComputingZhiwei Wei, Bing Li, Rongqing Zhang 0001, Xiang Cheng 0001, Liuqing Yang 0001. 1-6 [doi]
- The Design and Specification of Path Adjustable SFC Using YANG Data ModelYintan Ai, Hua Li, Xianrong Wang, Jiafeng Wang, Yaru Ding. 1-6 [doi]
- Private 5G Solutions for Mobile Industrial Robots: A Feasibility StudyPeter Sossalla, Justus Rischke, Fabian Baier, Sebastian Itting, Giang T. Nguyen 0002, Frank H. P. Fitzek. 1-6 [doi]
- A Machine Learning Mechanism for Improved Energy Consumption in 5G Small CellsFoivos Allayiotis, Christos Bouras, Vasileios Kokkinos. 1-6 [doi]
- An Emergency Response System to Support Early Stage Dementia PatientsMd. Akbar Hossain, Sayan Kumar Ray, Geri Harris, Shakil Ahmed. 1-4 [doi]
- Online Decentralized Task Allocation Optimization for Edge Collaborative NetworksYaqiang Zhang, Ruyang Li, Yaqian Zhao, RenGang Li, Xuelei Li, Tuo Li. 1-6 [doi]
- Water quality issues: Can we detect a creeping crisis with social media data?Stelios Andreadis, Nick Pantelidis, Ilias Gialampoukidis, Stefanos Vrochidis, Ioannis Kompatsiaris. 1-6 [doi]
- Secure, Mass Web of Things Actuation Using Smart Contracts-Based Digital TwinsIakovos Pittaras, Nikos Fotiou, Christos Karapapas, Vasilios A. Siris, George C. Polyzos. 1-6 [doi]
- GRETA: erGonomic stREss Tracking pAdBenedetta Bolis, Lorenzo Fratini, Mirko Salaris, Marco D. Santambrogio. 1-6 [doi]
- Poster: Flexible Function Estimation of IoT Malware Using Graph Embedding TechniqueKei Oshio, Satoshi Takada, Chansu Han, Akira Tanaka, Jun'ichi Takeuchi. 1-3 [doi]
- Towards Privacy-Preserving Neural Architecture SearchFuyi Wang, Leo Yu Zhang, Lei Pan 0002, Shengshan Hu, Robin Doss. 1-6 [doi]
- Incident Handling for Healthcare Organizations and Supply-ChainsEftychia Lakka, George Hatzivasilis, Stylianos Karagiannis, Andreas Alexopoulos, Manos Athanatos, Sotiris Ioannidis, Manolis Chatzimpyrros, Grigoris Kalogiannis, George Spanoudakis. 1-7 [doi]
- Federated Edge for Tracking Mobile Targets on Video Surveillance Streams in Smart CitiesFrancesco Martella, Maria Fazio, Antonio Celesti, Valeria Lukaj, Antonino Quattrocchi, Massimo Di Gangi, Massimo Villari. 1-6 [doi]
- Automating environmental vulnerability analysis for network servicesDimitris Koutras, Christos Grigoriadis, Michalis Papadopoullos, Panayiotis Kotzanikolaou, Christos Douligeris. 1-7 [doi]
- LL-VAS: Adaptation Method for Low-Latency 360-degree Video Streaming over Mobile NetworksDuc Nguyen, Le Ngan, Lai Huyen Thuong, Truong Thu Huong. 1-6 [doi]
- DICOF: A Distributed and Collaborative Framework for Hybrid DDoS Attack DetectionSiyuan Leng, Yingke Xie, Yifan Zhang, Yunchuan Guo, Liang Fang, FengHua Li. 1-7 [doi]
- Specific Emitter Identification via Spatial Characteristic of Polarization FingerprintJinlong Xu, Dong Wei 0002, Weiqing Huang. 1-7 [doi]
- Efficient OFDM Channel Estimation with RRDBNetWei Gao, Meihong Yang, Wei Zhang, Libin Liu. 1-5 [doi]
- Deep Reinforcement Learning based Mobility-Aware Service Migration for Multi-access Edge Computing EnvironmentYaqiang Zhang, RenGang Li, Yaqian Zhao, Ruyang Li. 1-6 [doi]
- Real-time Audit Scheme Based on Multilevel Roles in a Medical Cloud EnvironmentRuizhong Du, Yuan Wang, Ziyuan Wang. 1-7 [doi]
- Rule Placement and Switch Migration-based Scheme for Controller Load Balancing in SDNGengbiao Yue, Yumei Wang, Yu Liu. 1-6 [doi]
- Towards the Realization of Converged Cloud, Edge and Networking Infrastructures in Smart MegaCitiesPanagiotis Kokkinos. 1-5 [doi]
- Social Media and Web Sensing on Interior and Urban DesignEvangelos A. Stathopoulos, Alexander V. Shvets, Roberto Carlini, Sotiris Diplaris, Stefanos Vrochidis, Leo Wanner, Ioannis Kompatsiaris. 1-6 [doi]
- Social Sensing for Monuments Recognition using Convolutional Neural Networks: A Case StudyGiovanni Delnevo, Arber Kazazi, Elio Amadori, Silvia Mirri. 1-6 [doi]
- Physiological Parameters Extraction by Accelerometric Signal Analysis During SleepLinda Senigagliesi, Manola Ricciuti, Gianluca Ciattaglia, Ennio Gambi. 1-4 [doi]
- Traffic-Aware UAV Placement using a Generalizable Deep Reinforcement Learning MethodologyEduardo Nuno Almeida, Rui Campos, Manuel Ricardo 0001. 1-6 [doi]
- A First Look at Accurate Network Traffic Generation in Virtual EnvironmentsGiuseppe Aceto, Ciro Guida, Antonio Montieri, Valerio Persico, Antonio Pescapè. 1-6 [doi]
- MD-Roofline: A Training Performance Analysis Model for Distributed Deep LearningTianhao Miao, Qinghua Wu, Ting Liu, Penglai Cui, Rui Ren, Zhenyu Li 0001, Gaogang Xie. 1-8 [doi]
- A Data-Driven Digital Twin for Urban Activity MonitoringMatteo Mendula, Armir Bujari, Luca Foschini 0001, Paolo Bellavista. 1-6 [doi]
- MobVis: A Framework for Analysis and Visualization of Mobility TracesLucas N. Silva, Paulo H. L. Rettore, Vinicius F. S. Mota, Bruno P. Santos. 1-6 [doi]
- A Federated Learning Model With Short Sequence To Point Mechanism For Smart Home Energy DisaggregationShamisa Kaspour, Abdulsalam Yassine. 1-6 [doi]
- Poster SIMPATICO 3DEster Zumpano, Pasquale Iaquinta, Luciano Caroprese, Giuseppe Lucio Cascini, Francesco Dattola, Ivana Pellegrino, Miriam Iusi, Pierangelo Veltri, Eugenio Vocaturo. 1-3 [doi]
- Multimodal Depression Detection Using Task-oriented Transformer-based EmbeddingSowmya Rasipuram, Junaid Hamid Bhat, Anutosh Maitra, Bishal Shaw, Sriparna Saha 0001. 1-4 [doi]
- Energy Consumption in LoRa IoT: Benefits of Adding Relays to Dense NetworksJorge F. Schmidt, Udo Schilcher, Siddhartha S. Borkotoky, Christian A. Schmidt. 1-6 [doi]
- Scalable Digital Pathology Platform Over Standard Cloud Native TechnologiesTibério Baptista, Rui Jesus, Luís Bastião Silva, Carlos Costa 0001. 1-6 [doi]
- Spatial-based Bayesian Hidden Markov Models with Dirichlet Mixtures for Video Anomaly DetectionGuojian Luo, Jianfeng Qu, Lina Zhang, Xiaoyu Fang, Yi Zhang, Tong Zhou. 1-6 [doi]
- Data-Plane Energy Efficiency of a Next-Generation Internet ArchitectureSeyedali Tabaeiaghdaei, Adrian Perrig. 1-8 [doi]
- CNN-aided Channel and Carrier Frequency Offset Estimation for HAPS-LEO LinksEray Güven, Günes Karabulut-Kurt. 1-6 [doi]
- Towards IoT Rejuvenation: a Study on HY-SRF05 Ultrasonic Sensor Ageing for Intelligent Street Pole Lamp Control in a Smart CityValeria Lukaj, Francesco Martella, Antonino Quattrocchi, Maria Fazio, Roberto Montanini, Massimo Villari, Antonio Celesti. 1-8 [doi]
- Differential Cryptanalysis of K-CipherMohammad Mahzoun, Liliya Kraleva, Raluca Posteuca, Tomer Ashur. 1-7 [doi]
- Dual-UAV Aided Secure Dynamic G2U CommunicationHongyue Kang, Wei Li, Jelena V. Misic, Vojislav B. Misic, Xiaolin Chang. 1-6 [doi]
- Intelligent Analog Radio Over Fiber aided C-RAN for Mitigating Nonlinearity and Improving RobustnessYichuan Li 0003, Mohammed El-Hajjar. 1-6 [doi]
- Physical Layer Authentication Based on Full Channel Information under Dual-polarized Antenna Communication SystemsYuemei Wu, Dong Wei, Jing Li, Weiqing Huang, Xiang Meng. 1-7 [doi]
- Dynamic Authentication Mechanism Research and Security Protocol Design of HIOTRui Mao 0004, Heming Ji, Xiaoyu Wang. 1-8 [doi]
- Road Traffic Density Estimation Based on Heterogeneous Data FusionPhilipp Zißner, Paulo H. L. Rettore, Bruno P. Santos, Roberto Rigolin F. Lopes, Peter Sevenich. 1-6 [doi]
- On Metadata Privacy in Instant MessagingMarlon Cordeiro Domenech, André Ricardo Abed Grégio, Luis Carlos Erpen De Bona. 1-7 [doi]
- Dimensioning resources of Network Slices for energy-performance trade-offWei Huang, Andrea Araldo, Hind Castel-Taleb, Badii Jouaber. 1-6 [doi]
- Massive Twinning to Enhance Emergent IntelligenceSiyu Yuan, Bin Han 0004, Dennis Krummacker, Hans D. Schotten. 1-4 [doi]
- Minimizing Power Consumption by Joint Radio and Computing Resource Allocation in Cloud-RanMahdi Sharara, Sahar Hoteit, Véronique Vèque, Francesca Bassi. 1-6 [doi]
- Mollywood: Subtitles as an attack vectorElham Arshad, Giuliano Turri, Bruno Crispo. 1-7 [doi]
- Convergence-Time Analysis for the HTE Link Quality EstimatorLucas M. A. de Souza, Célio Albuquerque 0001, Fernanda G. O. Passos, Diego Passes. 1-7 [doi]
- TKDA: An Improved Method for K-degree Anonymity in Social GraphsNan Xiang, Xuebin Ma. 1-6 [doi]
- A Deep Learning Based ECG Segmentation Tool for Detection of ECG Beat ParametersMuhammad Salman Haleem, Leandro Pecchia. 1-4 [doi]
- Precise Latency Guarantee with Mobility and Handover in 5G and BeyondLijun Dong, Richard Li. 1-7 [doi]
- SDN-TSCH: Enabling Software Defined Networking for Scheduled Wireless Networks with Traffic IsolationFarzad Veisi, Julien Montavont, Fabrice Theoleyre. 1-7 [doi]
- An Evolution-based Machine Learning Approach for Inducing Glucose Prediction ModelsIvanoe De Falco, Antonio Della Cioppa, Tomas Koutny, Umberto Scafuri, Ernesto Tarantino, Martin Ubl. 1-6 [doi]
- Impact of the glycaemic sampling method in diabetes data miningDiogo Machado, Vítor Santos Costa, Pedro Brandão. 1-6 [doi]
- A Lightweight Fluid Model for Mobile Ad hoc Distributed SystemsBruno Chianca Ferreira, Guillaume Dufour, Guthemberg Silvestre. 1-7 [doi]
- Active Eavesdroppers Detection System in Multi-hop Wireless Sensor NetworksMasih Abedini, Irfan Al-Anbagi. 1-6 [doi]
- UAV-enabled Wireless Powered Communication Networks: A Joint Scheduling and Trajectory Optimization ApproachZiwen An, Yanheng Liu, Geng Sun 0001, Hongyang Pan, Aimin Wang. 1-7 [doi]
- Enhancing Privacy of Online Chat Apps Utilising Secure Node End-to-End Encryption (SNE2EE)Nithish Velagala, Leandros A. Maglaras, Nick Ayres 0001, Sotiris Moschoyiannis, Leandros Tassiulas. 1-3 [doi]
- Re-configuration from the Edge: alternative Software Models for time-sensitive IoT ApplicationsChristos Tselikis, Christos Douligeris, Sarandis Mitropoulos, Leandros A. Maglaras. 1-3 [doi]
- (POSTER) Using MACsec to protect a Network Functions Virtualisation infrastructureAntonio Lioy, Ignazio Pedone, Silvia Sisinni. 1-3 [doi]
- City-Scale Fingerprint Positioning Framework based on MDT DataJunjun Si, Zejiang Chen, Bo Tu, Shuaifu Dai, Xiangqun Chen. 1-6 [doi]
- Joint Cache Placement and Request Routing Optimization in Heterogeneous Cellular NetworksMarisangila Alves, Guilherme Picgas Koslovski. 1-6 [doi]
- Fair Connectivity-Oriented Allocation for Combined Resources in VCC NetworksBinal Tejani, Robson E. De Grande. 1-6 [doi]
- Telerehabilitation of cognitive, motor and sleep disorders in neurological pathologies: the REHOME projectClaudia Ferraris, Giuseppe Pettiti, Gianluca Amprimo, Debora Desideri, Roberto Pratola, Katiuscia Sacco, Irene Ronga, Guido Coppo, Danilo Soprani, Jacopo Barbagallo, Santina Antinoro, Paolo Ariano, Luigi Privitera. 1-6 [doi]
- Real-time Resource Management in Smart Energy-Harvesting SystemsMohamed Irfanulla Mohamed Abdulla, Audrey Queudet, Maryline Chetto, Lamia Belouaer. 1-7 [doi]
- Lilac: Parallelizing Atomic Cross-Chain SwapsDonghui Ding, Bo Long, Feng Zhuo, Zhongcheng Li, Hanwen Zhang, Chen Tian 0002, Yi Sun 0004. 1-8 [doi]
- A Data-Based System for the Optimization of Emergency Medical Services Allocation in Rural CountriesGiulia Guarino, Ivan Bernabucci, Daniele Bibbo, Marta Caviglia, Amara J. Ambai, Giovanni Putoto, Luca Ragazzoni, Francesca Tognon, Matthew Jusu Vandy, Francesco Barone-Adesi, Maurizio Schmid. 1-4 [doi]
- On the Minimum Collisions Assignment Problem in Interdependent Networked SystemsMaria Diamanti, Nikolaos Fryganiotis, Symeon Papavassiliou, Christos Pelekis, Eirini-Eleni Tsiropoulou. 1-6 [doi]
- Understanding the Characteristics of Public Blocklist ProvidersMitsuhiro Umizaki, Tomohiro Morikawa, Akira Fujita, Takeshi Takahashi 0001, Tsung-Nan Lin, Daisuke Inoue. 1-7 [doi]
- Cooperation Model for Optimized Classification on Social DataHarshit Srivastava, Ravi Sankar. 1-5 [doi]
- Multi-Channel Learning with Preprocessing for Automatic Modulation Order SeparationGizem Sümen, Burak Ahmet Çelebi, Günes Karabulut-Kurt, Ali Görçin, Semiha Tedik Basaran. 1-5 [doi]
- Fast-Converging Congestion Control in Datacenter NetworksYukun Zhou, Dezun Dong, Zhengbin Pang, Junhong Ye, Feng Jin. 1-7 [doi]
- Deep-Learning for Cooperative Spectrum Sensing Optimization in Cognitive Internet of ThingsHind Boukhairat, Mohammed-Amine Koulali. 1-7 [doi]
- A Platform for Federated Learning on the Edge: a Video Analysis Use CaseAlessio Catalfamo, Antonio Celesti, Maria Fazio, Giovanni Randazzo, Massimo Villari. 1-7 [doi]
- The INCLUDING platform for Radiological and Nuclear exercises and training: the Joint Action at the Piraeus portLuigi de Dominicis, Spyridion Kolovos, Kakia Panagidi, Ralph Hedel, Ilias Mitsoulas, Karim Boudergui, Argiro Boziari, Stathes Hadjiefthymiades. 1-6 [doi]
- Rapid Identification and Characterization of Laser Injected Clock Faults through OBIC MappingNicholas Lurski, Andrew Monica, Brooke Peterson, Stergios Papadakis. 1-6 [doi]
- MAC-Layer Traffic Shaping Defense Against WiFi Device Fingerprinting AttacksMnassar Alyami, Mohammed Alkhowaiter, Mansour Al Ghanim, Cliff C. Zou, Yan Solihin. 1-7 [doi]
- A Comparative Study of ML Algorithms for Scenario-agnostic Predictions in HealthcareArgyro Mavrogiorgou, Spyridon Kleftakis, Nikolaos Zafeiropoulos, Konstantinos Mavrogiorgos, Athanasios Kiourtis, Dimosthenis Kyriazis. 1-7 [doi]
- Look-Ahead Reinforcement Learning for Load Balancing Network TrafficIsadora P. Possebon, Bruno Castro da Silva, Alberto E. Schaeffer Filho. 1-6 [doi]
- An Enriched Visualization Tool based on Google Maps for Water Distribution Networks in Smart CitiesValeria Lukaj, Francesco Martella, Antonio Celesti, Maria Fazio, Massimo Villari. 1-6 [doi]
- Avoiding Notorious Content Sources: A Content-Poisoning Attack Mitigation ApproachIoanna Angeliki Kapetanidou, Stavros Malagaris, Vassilis Tsaoussidis. 1-6 [doi]
- Sorted Channel Based User Search for Initial Access in 5G and Beyond Cellular NetworksTaimoor Ul Islam, Fahd Ahmed Khan. 1-6 [doi]
- Joint Task Offloading and VM Placement for Edge Computing with Time-Sequential IIoT ApplicationsMingzhu Qiang, Changyan Yi, Juan Li, Kun Zhu 0001, Jun Cai 0001. 1-6 [doi]
- Enabling the SLA Management of Federated Network Services through Scaling OperationsJorge Baranda, Josep Mangues-Bafalluy, Luca Vettori, Ricardo Martínez 0001, Engin Zeydan. 1-6 [doi]
- Evaluating TCP Throughput Predictability from Packet Traces using Recurrent Neural NetworkRyu Kazama, Hirotake Abe, Chunghan Lee. 1-6 [doi]
- Ant Colony Optimization for Programmable Wireless Environments: Enabling Model and Initial ResultsG. Dimopoulos, G. Megas, Evangelos Papapetrou, Christos Liaskos. 1-6 [doi]
- CHFL: A Collaborative Hierarchical Federated Intrusion Detection System for Vehicular NetworksParya Haji Mirzaee, Mohammad Shojafar, Haitham S. Cruickshank, Rahim Tafazolli. 1-7 [doi]
- BenchPilot: Repeatable & Reproducible Benchmarking for Edge Micro-DCsJoanna Georgiou, Moysis Symeonides, Michalis Kasioulis, Demetris Trihinas, George Pallis 0001, Marios D. Dikaiakos. 1-6 [doi]
- PSCM: Towards Practical Encrypted Unknown Protocol ClassificationHua Wu 0004, Chaoqun Cui, Guang Cheng 0001, Xiaoyan Hu. 1-6 [doi]
- Demo: Usage Control using Controlled Privacy Aware Face RecognitionArpad Müller, Wisam Abbasi, Andrea Saracino. 1-3 [doi]
- Making Citizens' systems more Secure: Practical Encryption Bypassing and CountermeasuresMarios Adam Sirgiannis, Charalampos Manifavas, Ioannis Papaefstathiou. 1-7 [doi]
- Adaptive Q-leaming-supported Resource Allocation Model in Vehicular FogsMd Tahmid Hossain, Robson E. De Grande. 1-6 [doi]
- Information Bottleneck Optimization of a Finite Bit Resolution Fast Fourier TransformClemens-Konrad Mueller, Steffen Steiner, Volker Kuehn 0001. 1-6 [doi]
- The Antarctic Delay Tolerant NetworkAdrià Mallorquí, Agustín Zaballos, Daniel Serra. 1-7 [doi]
- Network-Controlled Physical-Layer Security: Enhancing Secrecy through Friendly JammingSayed Amir Hoseini, Parastoo Sadeghi, Faycal Bouhafs, Neda Aboutorab, Frank T. H. den Hartog. 1-7 [doi]
- BGNN: Detection of BGP Anomalies Using Graph Neural NetworksKevin Hoarau, Pierre-Ugo Tournoux, Tahiry Razafindralambo. 1-6 [doi]
- Automated Privacy Network Traffic Detection via Self-labeling and LearningYuejun Li, Huajun Cui, Jiyan Sun, Yan Zhang, Yueqi Li, Guozhu Meng, Weiping Wang. 1-8 [doi]
- Opinion Leaders and Twitter: Metric Proposal and Psycholinguistic AnalysisMarco Furini, Emilia Flisi. 1-5 [doi]
- A Spatio- Temporal Attentive Network for Video-Based Crowd CountingMarco Avvenuti, Marco Bongiovanni, Luca Ciampi, Fabrizio Falchi, Claudio Gennaro, Nicola Messina. 1-6 [doi]
- Non-Contact Heart Rate Signal Extraction and Identification Based on Speckle ImageTianyu Meng, Dali Zhu, Xiaodong Xie, Hualin Zeng. 1-6 [doi]
- Ring-based Intelligent Reflecting Surface Placement for 5G and BeyondHao-Kai Hong, Fan-Hsun Tseng. 1-6 [doi]
- A Deep Reinforcement Learning-Based Context-Aware Wireless Mobile Charging Scheme for the Internet of ThingsMichaël Mahamat, Ghada Jaber, Abdelmadjid Bouabdallah. 1-6 [doi]
- A Web Infrastructure for Certifying Multimedia News Content for Fake News DefenseEdward L. Amoruso, Stephen P. Johnson, Raghu Nandan Avula, Cliff C. Zou. 1-7 [doi]
- Integrating Software-Defined Metasurfaces into Wireless Communication Systems: Design and Prototype EvaluationChristos Liaskos, Georgios G. Pyrialakos, Alexandros Pitilakis, Ageliki Tsioliaridou, Michail Christodoulou, Nikolaos V. Kantartzis, Sotiris Ioannidis, Andreas Pitsillides, Ian F. Akyildiz. 1-6 [doi]
- Task Scheduling Stabilization for Solar Energy Harvesting Internet of Things DevicesAntonio Caruso 0001, Stefano Chessa, Soledad Escolar, Fernando Rincón, Juan C. López 0001. 1-6 [doi]
- Implicit Continuous Authentication Model Based on Mobile Terminal Touch BehaviorRui Mao 0004, Heming Ji, Di Cheng, Xiaoyu Wang, Yan Wang, Degang Sun. 1-7 [doi]
- A Fully Decentralized Architecture for Access Control Verification in Serverless EnvironmentsAndrea Sabbioni, Carlo Mazzocca, Michele Colajanni, Rebecca Montanari, Antonio Corradi. 1-6 [doi]
- Wi-Fi Rate Adaptation using a Simple Deep Reinforcement Learning ApproachRúben Queirós, Eduardo Nuno Almeida, Helder Fontes, José Ruela, Rui Campos. 1-3 [doi]
- Reliable UAV Communication via Collaborative Beamforming: A Multi-objective Optimization ApproachGeng Sun 0001, Xiaoya Zheng, Yuying Lian, Jiahui Li 0002, Fang Mei. 1-7 [doi]
- Cyber Threat Analysis Using Natural Language Processing for a Secure Healthcare SystemShareeful Islam, Spyridon Papastergiou, Stefano Silvestri. 1-7 [doi]
- Dynamic Graph Convolutional Network for Long Short-term Traffic Flow PredictionYan Wang, Qianqian Ren. 1-6 [doi]
- MalPro: Learning on Process-Aware Behaviors for Malware DetectionXiaohui Chen, Ying Tong, Chunlai Du, Yongji Liu, Zhenquan Ding, Qingyun Ran, Yi Zhang, Lei Cui 0003, Zhiyu Hao. 1-7 [doi]
- Demo: The RAINBOW Analytics Stack for the Fog ContinuumMoysis Symeonides, Demetris Trihinas, Joanna Georgiou, Michalis Kasioulis, George Pallis 0001, Marios D. Dikaiakos, Theodoros Toliopoulos, Anna-Valentini Michailidou, Anastasios Gounaris. 1-3 [doi]
- Automatic Detector of Gait Alterations using RGB-D sensor and supervised classifiers: a preliminary studyClaudia Ferraris, Gianluca Amprimo, Giuseppe Pettiti, Giulia Masi, Lorenzo Priano. 1-6 [doi]
- Experiments with SDN-based Adaptable Non-IP Protocol Stacks in Smart-City EnvironmentsSarantis Kalafatidis, Vassilis Demiroglou, Sotiris Skaperas, Georgios Tsoulouhas, Polychronis Valsamas, Lefteris Mamatas, Vassilis Tsaoussidis. 1-3 [doi]
- Deep Reinforcement Learning-based Radio Resource Allocation and Beam Management under Location Uncertainty in 5G mm Wave NetworksYujie Yao, Hao Zhou, Melike Erol-Kantarci. 1-6 [doi]
- Selective Disclosure in Self-Sovereign Identity based on Hashed ValuesAndrea De Salve, Andrea Lisi, Paolo Mori, Laura Ricci. 1-8 [doi]
- Reliable Free-Space Optical Communication System Performance for Matching Multi-level Customer Needs: Using Hybrid Modulation System with Deep Reinforcement LearningAlaa A. Algamal, Ahmed H. Abd El-Malek, Hossam M. H. Shalaby. 1-7 [doi]
- A Reputation and Security Mechanism for Heterogeneous Vehicular NetworksAna M. B. C. Quevedo, Carlos H. O. O. Quevedo, Rafael L. Gomes, Samuel F. Camara, Joaquim Celestino Jr.. 1-6 [doi]
- Traffic Volume Prediction with Automated Signal Performance Measures (ATSPM) DataLeah Kazenmayer, Gabriela Ford, Jiechao Zhang, Rezaur Rahman, Furkan Cimen, Damla Turgut, Samiul Hasan. 1-6 [doi]
- Frequency Hopping Signal Recognition Based on Horizontal Spatial AttentionPengcheng Liu, Zhen Han, Zhixin Shi, Meimei Li, Meichen Liu. 1-8 [doi]
- Drone-Small-Cell-Assisted Spectrum Management for 5G and Beyond Vehicular NetworksHang Shen 0001, Yilong Heng, Ning Shi, Tianjing Wang, Guangwei Bai. 1-8 [doi]
- Position Errors Analysis, Prediction and Recovery for UAV-enabled Virtual Antenna ArrayHao Wang, Hui Kang, Geng Sun 0001, Jiahui Li 0002, Jingwu Xiao, Ning Lit. 1-6 [doi]
- Sensor Fusion and Device Collaboration based Smart Plug Hub Architecture for Precise Identification of ADL in Real-TimeHomin Kang, SoonJu Kang. 1-7 [doi]
- BMKS: A Blockchain Based Multi-Keyword Search Scheme for Medical Data SharingGuangjun Wu, Bingqing Zhu, Jun Li 0085. 1-7 [doi]
- Privacy vs Accuracy Trade-Off in Privacy Aware Face Recognition in Smart SystemsWisam Abbasi, Paolo Mori, Andrea Saracino, Valerio Frascolla. 1-8 [doi]
- LibHunter: An Unsupervised Approach for Third-party Library Detection without Prior KnowledgeHuajun Cui, Guozhu Meng, Yueqi Li, Yuejun Li, Yan Zhang, Jiyan Sun, Dali Zhu, Weiping Wang. 1-7 [doi]
- DyPro: Dynamic Probing Planning for In-Band Network TelemetryLeandro M. Dallanora, Ariel G. de Castro, Roberto Irajá Tavares da Costa Filho, Fábio D. Rossi, Arthur Francisco Lorenzon, Marcelo Caggiani Luizelli. 1-6 [doi]
- MBSFN and SC-PTM as Solutions to Reduce Energy Consumption in Cellular NetworksJuan Vargas, Cédric Thienot, Xavier Lagrange. 1-6 [doi]
- SMOTE-Stack for Network Intrusion Detection in an IoT EnvironmentSulyman Age Abdulkareem, Chuan Heng Foh, François Carrez, Klaus Moessner. 1-6 [doi]
- A False Data Injection Attack Detection Approach Using Convolutional Neural Networks in Unmanned Aerial SystemsChafiq Titouna, Farid Naït-Abdesselam. 1-6 [doi]
- A Spectrum Analysis Approach for the Median Problem in Modern Network EnvironmentsKonstantinos Oikonomou. 1-6 [doi]
- Mobile Device Identification Based on Two-dimensional Representation of RF Fingerprint with Deep LearningJing Li, Shunliang Zhang, Mengyan Xing, Zhuang Qiao, Xiaohui Zhang. 1-6 [doi]
- A New Soccer Game Optimization Modeling For Flexible Functional Splitting Dimensioning in CF-RAN NetworksMatias R. P. dos Santos, Marcel K. R. Mei, Antonio C. Oliveira, Ricardo A. L. Rabelo, Gustavo B. Figueiredo. 1-6 [doi]
- Improving the lifestyle behavior of type 2 diabetes mellitus patients using a mobile applicationAndreia Pinto, João Viana, Diogo Martinho, Vítor Crista, José Miguel Diniz, Joana Reis, João Matos, David Greer, Goreti Marreiros, Alberto Freitas. 1-5 [doi]
- Demo: Automated Multi-Site E2E Orchestration of Hybrid Network Services Mixing PNF, VNF and CNFsJorge Baranda, Luca Vettori, Josep Mangues-Bafalluy, Ricardo Martinez 0001, Engin Zeydan. 1-3 [doi]
- A Comparative Study on Shared Precomputed Restoration and Shared Backup Path Protection in EONsFarhad Arpanaei, Shayan Hajipour, Hamzeh Beyranvand, José Alberto Hernández 0001, David Larrabeiti. 1-6 [doi]
- A Discrete-event-based Simulator for Distributed Deep LearningXiaoyan Liu, Zhiwei Xu, Yana Qin, Jie Tian. 1-7 [doi]
- WebIoT: Classifying Internet of Things Devices at Internet Scale through Web CharacteristicsYichao Wu, Chenglong Li, Jiahai Yang, Zhiliang Wang, Wei Hu, Ang Xia, Yong Jiang 0001, Yao Wang, Liuli Wu. 1-7 [doi]
- A Smart Ecosystem to improve Patient Monitoring using Wearables, Intelligent Agents, Complex Event Processing and Image ProcessingLorenzo De Lauretis, Fabio Persia, Stefania Costantini. 1-7 [doi]
- B-Scale: Bottleneck-aware VNF Scaling and Flow Routing in Edge CloudsChen Chen, Lars Nagel 0001, Lin Cui 0001, Fung Po Tso 0001. 1-6 [doi]
- ActDetector: A Sequence-based Framework for Network Attack Activity DetectionJiaqi Kang, Huiran Yang, Yan Zhang, Yueyue Dai, Mengqi Zhan, Weiping Wang. 1-7 [doi]
- Dynamic Anchor Point Selection in Software Defined Distributed Mobility ManagementEsmaeil Amiri, Ning Wang 0001, Serdar Vural, Rahim Tafazolli. 1-7 [doi]
- Novel Handover Algorithms Using Pattern Recognition for Hybrid LiFi NetworksGuanghui Ma, Rajendran Parthiban, Nemai Karmakar. 1-7 [doi]
- Deep Reinforcement Learning Based Adaptive 360-degree Video Streaming with Field of View Joint PredictionYuanhong Zhang, Zhiwen Wang, Junquan Liu, Haipeng Du, Qinghua Zheng, Weizhan Zhang. 1-8 [doi]
- Breaking Tor's Anonymity by Modifying Cell's CommandYi Qin, Jiahe Wu, Futai Zou, Yue Wu 0010. 1-7 [doi]