


default search action
30th ICCCN 2021: Athens, Greece
- 30th International Conference on Computer Communications and Networks, ICCCN 2021, Athens, Greece, July 19-22, 2021. IEEE 2021, ISBN 978-1-6654-1278-0

- Yangguang Lu, Xin Chen, Ranran Xi, Ying Chen:

Research on User Access Selection Mechanism Based on Maximum Throughput for 5G Network Slicing. 1-8 - Laurent Chasserat, Nicola Accettura, Balakrishna J. Prabhu, Pascal Berthou

:
TREMA: A traffic-aware energy efficient MAC protocol to adapt the LoRaWAN capacity. 1-6 - Dongxin Liu, Tianshi Wang

, Shengzhong Liu, Ruijie Wang, Shuochao Yao, Tarek F. Abdelzaher:
Contrastive Self-Supervised Representation Learning for Sensing Signals from the Time-Frequency Perspective. 1-10 - Vivek Adarsh, Michael Nekrasov, Udit Paul, Tarun Mangla, Arpit Gupta, Morgan Vigil-Hayes, Ellen Zegura, Elizabeth M. Belding:

Coverage is Not Binary: Quantifying Mobile Broadband Quality in Urban, Rural, and Tribal Contexts. 1-9 - Venkatraman Balasubramanian

, Moayad Aloqaily
, Martin Reisslein:
FedCo: A Federated Learning Controller for Content Management in Multi-party Edge Systems. 1-9 - Nathaniel Hudson

, Hana Khamfroush, Daniel E. Lucani
:
QoS-Aware Placement of Deep Learning Services on the Edge with Multiple Service Implementations. 1-8 - Leila Askari, Mohammadhassan Tamizi, Omran Ayoub

, Massimo Tornatore:
Protection Strategies for Dynamic VNF Placement and Service Chaining. 1-9 - Dimitra Simeonidou:

Human-Centric Networking and why it should be a key focus for the Next Generation Internet and 6G research? 1-14 - Md Ashiqur Rahman, Beichuan Zhang:

On Data-centric Forwarding in Mobile Ad-hoc Networks: Baseline Design and Simulation Analysis. 1-9 - Mirko Zichichi

, Luca Serena
, Stefano Ferretti, Gabriele D'Angelo:
Towards Decentralized Complex Queries over Distributed Ledgers: a Data Marketplace Use-case. 1-6 - Cheng Huang, Zeng Huy Tay, Khaled Harfoush:

MASS Communication for Constrained Devices. 1-9 - Md Mainuddin

, Zhenhai Duan, Yingfei Dong:
Network Traffic Characteristics of IoT Devices in Smart Homes. 1-11 - Aekta Sharma, Arunita Jaekel:

Machine Learning Approach for Detecting Location Spoofing in VANET. 1-6 - Ran Zhu, Tianlong Li, Tian Song:

iGate: NDN Gateway for Tunneling over IP World. 1-9 - Aristotelis Kretsis, Polyzois Soumplis, Panagiotis C. Kokkinos, Emmanouel A. Varvarigos

:
An SDN Emulation Platform for Converged Fiber-Wireless 5G Networks. 1-7 - Yanzhi Ren, Zhourong Zheng, Hongbo Liu, Yingying Chen, Hongwei Li, Chen Wang:

Breathing Sound-based Exercise Intensity Monitoring via Smartphones. 1-10 - Romain Barbau, Vincent Deslandes, Gentian Jakllari

, André-Luc Beylot:
An Analytical Model for Evaluating the Interplay Between Capacity and Energy Efficiency in NB-IoT. 1-9 - Manohar Raavi

, Pranav Chandramouli, Simeon Wuthier
, Xiaobo Zhou, Sang-Yoon Chang:
Performance Characterization of Post-Quantum Digital Certificates. 1-9 - Martin Maier:

6G as if People Mattered: From Industry 4.0 toward Society 5.0 : (Invited Paper). 1-10 - Anna Kobusinska

, Dionisis Margaris
, Jakub Peikert:
Trust- and Rating- based Recommendations for On-line Social Networks. 1-11 - Jianping Huang, Feng Shan, Runqun Xiong, Yuchao Shao, Junzhou Luo:

Energy-Efficient UAV Flight Planning for a General PoI-Visiting Problem with a Practical Energy Model. 1-10 - Eranga Bandara, Xueping Liang, Peter Foytik, Sachin Shetty

, Kasun De Zoysa:
A Blockchain and Self-Sovereign Identity Empowered Digital Identity Platform. 1-7 - Bruno Chianca Ferreira, Guillaume Dufour, Guthemberg Silvestre:

MACE: A Mobile Ad-hoc Computing Emulation Framework. 1-6 - Tania Panayiotou, Georgios Ellinas:

A Reward-Based Fair Resource Allocation in EONs Considering Traffic Demand Behavior. 1-8 - Mostafizur Rahman, Mohammad Arif Hossain

, Murat Yuksel:
Multi-Operator Cell Tower Locations Prediction from Crowdsourced Data. 1-9 - Ping Jiang, Shuo Zhang, Qingyun Liu, Chao Zheng:

A P4-Based Packet Scheduling Approach for Clustered Deep Packet Inspection Appliances. 1-9 - Reza Nejabati

, Shadi Moazzeni, Pratchaya Jaisudthi, Dimitra Simeonidou:
Zero-Touch Network Orchestration At The Edge. 1-5 - Shideh Yavary Mehr, Byrav Ramamurthy:

Protection Techniques For Wavelength Division Multiplexing Networks using Resource Delayed Release Strategy. 1-6 - Mohammed Almekhlafi

, Mohamed Amine Arfaoui, Mohamed Kadry Elhattab, Chadi Assi, Ali Ghrayeb
:
Joint Scheduling of eMBB and URLLC Services in RIS-Aided Downlink Cellular Networks. 1-9 - Abhiram Singh, Sidharth Sharma, Ashwin Gumaste:

Using Deep Reinforcement Learning for Routing in IP Networks. 1-9 - Debajyoti Halder

, Prashant Kumar, Saksham Bhushan, Anand M. Baswade:
fybrrStream: A WebRTC based Efficient and Scalable P2P Live Streaming Platform. 1-9 - Alem Fitwi, Yu Chen:

Secure and Privacy-Preserving Stored Surveillance Video Sharing atop Permissioned Blockchain. 1-8 - Haorui Peng, William Tärneberg, Maria Kihl:

Latency-aware Radio Resource Allocation over Cloud RAN for Industry 4.0. 1-8 - Yu-Ting Liu, Jen-Jee Chen, Yu-Chee Tseng, Frank Y. Li

:
Combining Auto-Encoder with LSTM for WiFi-Based Fingerprint Positioning. 1-6 - Octavian Cuibus, Kuderna-Iulian Benta, Sebastian Alpers:

Designing an Affective States Input Tool for Biking. 1-5 - Sana Imtiaz

, Muhammad Arsalan, Vladimir Vlassov, Ramin Sadre:
Synthetic and Private Smart Health Care Data Generation using GANs. 1-7 - Christopher Scherb

, Pascal Bürklin, Christian F. Tschudin:
SCoIoT: Swarm-Computations for the Internet of Things. 1-6 - Ken-ichi Sato:

How Optical Technologies Can Innovate Intra Data Center Networks. 1-8 - Jeffrey S. Chase, Ilya Baldin

:
Federated Authorization for Managed Data Sharing: Experiences from the ImPACT Project. 1-10 - Xueting Liao, Danyang Zheng

, Yubao Wu, Xiaojun Cao
:
Should We Trust Influencers on Social Networks? On Instagram Sponsored Post Analysis. 1-8 - Takwa Attia, Martin Heusse, Andrzej Duda

:
Message in Message for Improved LoRaWAN Capacity. 1-9 - Nikos Fotiou, Vasilios A. Siris, George C. Polyzos:

Capability-based access control for multi-tenant systems using OAuth 2.0 and Verifiable Credentials. 1-9 - Jianyu Wang, Jianli Pan, Ismail AlQerm, Yuanni Liu:

Def-IDS: An Ensemble Defense Mechanism Against Adversarial Attacks for Deep Learning-based Network Intrusion Detection. 1-9 - V. S. Ch Lakshmi Narayana, Mohit Agarwala, Nikhil Karamchandani, Sharayu Moharir:

Online Partial Service Hosting at the Edge. 1-9 - Giovanni Barbieri, Mauro Conti

, Nils Ole Tippenhauer, Federico Turrin
:
Assessing the Use of Insecure ICS Protocols via IXP Network Traffic Analysis. 1-9 - Grigorios Kakkavas

, Michail Kalntis, Vasileios Karyotis, Symeon Papavassiliou:
Future Network Traffic Matrix Synthesis and Estimation Based on Deep Generative Models. 1-8 - Mohammed Hirzallah, Marwan Krunz:

Sense-Bandits: AI-based Adaptation of Sensing Thresholds for Heterogeneous-technology Coexistence Over Unlicensed Bands. 1-9 - Batuhan Mekiker, Mike P. Wittie, Jefferson Jones, Michael Monaghan:

Beartooth Relay Protocol: Supporting Real-Time Application Streams with Dynamically Allocated Data Reservations over LoRa. 1-9 - Lata Narayanan, Cristian Rodriguez:

Timetable-based Routing in Fixed Schedule Dynamic Networks. 1-8 - Igor Kadota

, Muhammad Shahir Rahman, Eytan H. Modiano:
WiFresh: Age-of-Information from Theory to Implementation. 1-11 - Shuyu Chen, Haopeng Chen, Jinteng Ruan, Ziming Wang:

Context-Aware Online Offloading Strategy with Mobility Prediction for Mobile Edge Computing. 1-9 - Haiyang Zhang, Fang Qi, Xiaomeng Liu:

A Physarum-based Boost Algorithm for Network Optimization in Dense Wireless Sensor Networks. 1-9 - Runbo Su

, Arbia Riahi
, Enrico Natalizio
, Pascal Moyal
, Ye-Qiong Song:
PDTM: Phase-based dynamic trust management for Internet of things. 1-7 - Cyrill Krähenbühl

, Markus Legner, Silvan Bitterli, Adrian Perrig:
Pervasive Internet-Wide Low-Latency Authentication. 1-9 - HamidReza Arkian, Guillaume Pierre, Johan Tordsson, Erik Elmroth:

Model-based Stream Processing Auto-scaling in Geo-Distributed Environments. 1-10 - Caylin A. Hartshorn, Waleed Al-Shaikhli, Sheyda Kiani Mehr, Daniel Cummins, Venkatesh Tamarapalli

, Deep Medhi:
Developing Models from Measurements in a Noisy Environment: Lessons from an Indoor Wi-Fi Measurement Study on Application Performance. 1-9 - Chunmeng Zhong, Hongyu Jia, Hai Wan, Xibin Zhao:

DRLS: A Deep Reinforcement Learning Based Scheduler for Time-Triggered Ethernet. 1-11 - Hao Cheng, Bin Jin, Yu Qiao, Lei Zhang, Chongjun Wang:

False-name-proof mechanism for time window coverage tasks in mobile crowdsensing. 1-10 - Rasool Seyghaly, Jordi Garcia, Xavi Masip-Bruin:

An Edge-based Strategy for Smart Advertising. 1-8 - Jian Yang, Christian Poellabauer

:
SATSS: A Self-Adaptive Task Scheduling Scheme for Mobile Edge Computing. 1-9 - Vajiheh Farhadi

, Sai Gopal Vennelaganti, Ting He, Nilanjan Ray Chaudhuri, Thomas La Porta:
Budget-Constrained Reinforcement of SCADA for Cascade Mitigation. 1-9 - Yureng Li, Shouzhi Xu:

Collaborative optimization of Edge-Cloud Computation Offloading in Internet of Vehicles. 1-6 - Ali Malik

, Ruairí de Fréin
, Chih-Heng Ke, Hasanen Alyasiri
, Obinna Izima:
Bayesian Adaptive Path Allocation Techniques for Intra-Datacenter Workloads. 1-8 - Xiangyu Wang, Jian Zhang

, Shiwen Mao, Senthilkumar C. G. Periaswamy, Justin Patton:
MulTLoc: RF Hologram Tensor Filtering and Upscaling for Locating Multiple RFID Tags. 1-9 - Mirko Zichichi

, Stefano Ferretti, Gabriele D'Angelo:
MOVO: a dApp for DLT-based Smart Mobility. 1-6 - Anirudh Ganji, Muhammad Shahzad:

Characterizing the Performance of QUIC on Android and Wear OS Devices. 1-11 - Tingting Wang

, Qiujian Lv, Bo Hu, Degang Sun:
A Few-Shot Class-Incremental Learning Approach for Intrusion Detection. 1-8 - Henner Heck, Arno Wacker:

Applying Harary Graph Structures to the Overlay Network Kademlia. 1-8 - Hao Yan, Qianzhen Zhang, Deming Mao, Ziyue Lu, Deke Guo, Sheng Chen:

Anomaly Detection of Network Streams via Dense Subgraph Discovery. 1-9 - Vaibhav Akashe, Roshan Lal Neupane, Mauro Lemus Alarcon, Songjie Wang, Prasad Calyam:

Network-based Active Defense for Securing Cloud-based Healthcare Data Processing Pipelines. 1-9 - Jasenka Dizdarevic, Admela Jukan:

Engineering an IoT-Edge-Cloud Computing System Architecture: Lessons Learnt from An Undergraduate Lab Course. 1-11 - Abdulsalam Basabaa, Ehab S. Elmallah:

Extension Algorithms for Path Exposure in Energy Harvesting Wireless Sensor Networks. 1-8 - Danyang Zheng

, Chengzong Peng, Xueting Liao, Xiaojun Cao
:
Parallelism-aware Service Function Chaining and Embedding for 5G Networks. 1-9 - Radhakrishna Rajaram Kamath, Krishna M. Sivalingam:

Machine Learning based Flow Classification in DCNs using P4 Switches. 1-10 - Xiaotao Li, Shujuan You, Wai Chen:

Automatic Recognition of Identification Schemes for IoT Identifiers based on A Hybrid DNN Model. 1-8 - Ning Wang, Yubin Duan, Jie Wu:

Accelerate Cooperative Deep Inference via Layer-wise Processing Schedule Optimization. 1-9 - Christopher Kohlstruck, Reinhard Gotzhein:

cTEx - A Configurable Topology Explorer for Wireless Ad-hoc Networks. 1-9 - Yu Wang

, Alhussein A. Abouzeid
:
RCP: A Reinforcement Learning-Based Retransmission Control Protocol for Delivery and Latency Sensitive Applications. 1-9 - Satyaki Roy, Prithwiraj Roy, Venkata Sriram Siddhardh Nadendla, Sajal K. Das:

Influence Spread Control in Complex Networks via Removal of Feed Forward Loops. 1-9 - Shabnam Sultana, Philippe Dooze, Vijay Venkatesh Kumar:

Realization of an Intrusion Detection use-case in ONAP with Acumos. 1-6 - Yu Zheng, Chao Yang, Yanzhou Yang, Qixian Ren

, Yue Li, Jianfeng Ma:
ShadowDGA: Toward Evading DGA Detectors with GANs. 1-8 - Hasanen Alyasiri

, John A. Clark, Ali Malik
, Ruairí de Fréin
:
Grammatical Evolution for Detecting Cyberattacks in Internet of Things Environments. 1-6 - Simon Fernandez

, Michele Amoretti, Fabrizio Restori, Maciej Korczynski, Andrzej Duda
:
Semantic Identifiers and DNS Names for IoT. 1-9 - Sebastian Alpers, Kuderna-Iulian Benta:

SenseGraph: Affect Self-monitoring and Tagging Tool with Wearable Devices. 1-6 - Pavel Chuprikov

, Vitalii Demianiuk, Sergey Gorinsky:
PREDICAT: Efficient Packet Classification via Prefix Disjointness. 1-11 - Jinwei Liu, Long Cheng

, Hongmei Chi, Cong Liu
, Richard A. Aló:
CDetector: Extracting Textual Features of Financial Social Media to Detect Cyber Attacks. 1-6 - Faheed A. F. Alenezi

, Sejun Song, Baek-Young Choi
:
CAMEL: Centrality-Aware Multitemporal Discovery Protocol for Software-defined Networks. 1-8 - Waltenegus Dargie, Jianjun Wen:

A Link Quality Estimation Model for a Joint Deployment of Unmanned Aerial Vehicles and Wireless Sensor Networks. 1-9 - Ye Zhang, Yong Tang, Wenyong Wang:

Service Deployment and Service Request Optimization Scheduling in MEC enabled LEO Networks. 1-6 - Jiaquan Zhang

, Xin Gao
, Hui Chen
, Lei Chen, Liang Wang, Jar-Der Luo
, Xiaoming Fu
:
A Data-Driven Analysis of K-12 Students' Participation and Learning Performance on an Online Supplementary Learning Platform. 1-9 - Marziyeh Soltani, Mahtab Mirmohseni, Panos Papadimitratos

:
Massive MIMO-NOMA Systems Secrecy in the Presence of Active Eavesdroppers. 1-11 - Krzysztof Walkowiak, Róza Goscien, Piotr Lechowicz, Adam Wlodarczyk

:
Comparison of Various Sharing Approaches in Survivable Translucent Optical Networks. 1-6 - Huazhe Wang, Puneet Sharma, Faraz Ahmed, Joon-Myung Kang, Chen Qian, Mihalis Yannakakis:

Epinoia: Intent Checker for Stateful Networks. 1-9 - Xiaoxiao Luan, Bojun Zhang, Dongdong Liu, Xiulong Liu, Xinyu Tong, Keqiu Li:

A Lightweight Heatmap-based Eye Tracking System. 1-9 - Kun Huang, Tong Yang:

Tagged Cuckoo Filters. 1-10 - Cheng Peng, Qin Hu, Jianan Chen, Kyubyung Kang, Feng Li, Xukai Zou:

Energy-Efficient Device Selection in Federated Edge Learning. 1-9 - Behzad Mirkhanzadeh, Tianliang Zhang

, Miguel Razo-Razo, Marco Tacca, Andrea Fumagalli:
Super-Cloudlet: Rethinking Edge Computing in the Era of Open Optical Networks. 1-11 - Xiang Zhang, Yuan Yang, Mingwei Xu:

SARACA: Demand-Driven Satellite Network Resource Allocation for Civil Aviation. 1-9 - Akito Suzuki, Ryoichi Kawahara, Shigeaki Harada:

Cooperative Multi-Agent Deep Reinforcement Learning for Dynamic Virtual Network Allocation. 1-11 - Penglei Song, Ce Chi, Kaixuan Ji, Zhiyong Liu, Fa Zhang, Shikui Zhang, Dehui Qiu, Xiaohua Wan:

A Deep Reinforcement Learning-based Task Scheduling Algorithm for Energy Efficiency in Data Centers. 1-9 - Yazhe Tian, Sheng Chen, Jiuwu Zhang, Zijuan Liu, Xiulong Liu, Keqiu Li:

Localization of Tagged Objects on Shelf via a Portable Camera-augmented RFID Reader. 1-9 - Chiara Ceccarini

, Ka Kei Chan, I Lei Lok, Rita Tse, Su-Kit Tang
, Catia Prandi
:
Fostering user's awareness about indoor air quality through an IoT-enabled home garden system. 1-4 - Jian Liu

, Chin-Tser Huang:
Efficient and Trustworthy Authentication in 5G Networks Based on Blockchain. 1-6 - Jordi Paillisse

, Alejandro Barcia, Albert López, Alberto Rodríguez-Natal, Fabio Maino, Albert Cabellos:
A Control Plane for WireGuard. 1-8 - Mulugeta Ayalew Tamiru, Guillaume Pierre, Johan Tordsson, Erik Elmroth:

mck8s: An orchestration platform for geo-distributed multi-cluster environments. 1-10 - Vassilis Papaspirou, Leandros Maglaras

, Mohamed Amine Ferrag
, Ioanna Kantzavelou
, Helge Janicke, Christos Douligeris:
A novel Two-Factor HoneyToken Authentication Mechanism. 1-7 - Abdullah M. Almasoud

, Mohamed Y. Selim
, Ahmad Alsharoa, Ahmed E. Kamal:
Improvement of Bi-directional Communications using Solar Powered Reconfigurable Intelligent Surfaces. 1-8 - Gabriele Proietti Mattia

, Roberto Beraldi
:
Towards Testbed as-a-Service: design and implementation of an unattended SoC cluster. 1-8 - Carlos Natalino, Ahmad Rostami, Paolo Monti:

Storage Protection with Connectivity and Processing Restoration for Survivable Cloud Services. 1-9 - Pinyi Shi, Yongwook Song, Zongming Fei, James Griffioen:

Checking Network Security Policy Violations via Natural Language Questions. 1-9 - Cheng-Wei Ching

, Hung-Sheng Huang, Chun-An Yang, Yu-Chun Liu, Jian-Jhih Kuo
:
Efficient Communication Topology via Partially Differential Privacy for Decentralized Learning. 1-9 - Divya D. Kulkarni, Shruti Rathore, Raj K. Jaiswal:

Intrusion Detection System For IoT Networks Using Neural Networks With Extended Kalman Filter. 1-7 - Matteo Cardaioli, Mauro Conti

, Andrea Di Sorbo
, Enrico Fabrizio, Sonia Laudanna
, Corrado Aaron Visaggio:
It's a Matter of Style: Detecting Social Bots through Writing Style Consistency. 1-9 - Ayten Kahya, Anusha Avyukt, Gowri Sankar Ramachandran

, Bhaskar Krishnamachari:
Blockchain-enabled Personalized Incentives for Sustainable Behavior in Smart Cities. 1-6 - Shaofei Tang, Hui Liang, Min Wang, Tingyu Li, Zuqing Zhu:

Closed-loop Network Automation with Generic Programmable Data Plane (G-PDP) : (Invited Paper). 1-9 - Gonzalo J. Martínez, Grigoriy Dubrovskiy, Shangyue Zhu, Alamin Mohammed, Hai Lin, J. Nicholas Laneman, Aaron D. Striegel, Ravikumar V. Pragada, Douglas R. Castor:

An Open, Real-World Dataset of Cellular UAV Communication Properties. 1-6 - Jie Lian, Xin Ding, Jianguo Pan:

Community Detection and Analysis in Air Pollution Complex Network Based on LPA. 1-7 - Kariem Fahmi, Douglas J. Leith

:
Smart replication for seamless and efficient real time communication in underground railway train. 1-8 - Panagiotis Papanastasiou, Carlo Ottaviani, Stefano Pirandola:

Security of continuous-variable quantum key distribution against canonical attacks. 1-6 - Guillaume Gaillard, Gentian Jakllari

:
Interference-Aware Sector Design in IEEE 802.11ad Networks. 1-9 - Filippo Cugini, Davide Scano, Alessio Giorgetti, Andrea Sgambelluri

, Piero Castoldi, Francesco Paolucci
:
P4 Programmability at the Network Edge: the BRAINE Approach [Invited]. 1-9 - Raghav H. Venkatnarayan

, Muhammad Shahzad:
Accurately Decoding MIMO Streams in VLC. 1-10 - Guohua Wei, Hui Li

, Yongiie Bai, Xin Yang, Huayu Zhang, Jianming Que, Wenjun Li:
Co-governed Space-Terrestrial Integrated Network Architecture and Prototype Based on MIN. 1-6 - Adrián Pino

, Pouria Sayyad Khodashenas, Xavier Hesselbach
, Estefanía Coronado
, Shuaib Siddiqui:
Validation and Benchmarking of CNFs in OSM for pure Cloud Native applications in 5G and beyond. 1-9 - Ronghua Xu, Yu Chen:

Fed-DDM: A Federated Ledgers based Framework for Hierarchical Decentralized Data Marketplaces. 1-8 - Nathaniel Hudson

, Md. Jakir Hossain, Minoo Hosseinzadeh, Hana Khamfroush, Mahshid Rahnamay-Naeini, Nasir Ghani:
A Framework for Edge Intelligent Smart Distribution Grids via Federated Learning. 1-9 - Zhenning Wang

, Tong Wu
, Zhenyu Zhang, Huan Zhou:
A Game theory-based Computation Offloading Method in Cloud-Edge Computing Networks. 1-6 - Guoyuan Yuan, Renjie Zhou, Dezun Dong, Shan Huang

:
Breaking One-RTT Barrier: Ultra-Precise and Efficient Congestion Control in Datacenter Networks. 1-9

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














