


default search action
23rd APNOMS 2022: Takamatsu, Japan
- 23rd Asia-Pacific Network Operations and Management Symposium, APNOMS 2022, Takamatsu, Japan, September 28-30, 2022. IEEE 2022, ISBN 978-4-885-52339-7

- Eishin Nagaoka, Ryohei Banno, Osamu Mizuno:

Implementation and Node Load Evaluation of Cloud-based Load Distribution Model in ICSN. 1-4 - Wan-Chien Yang:

Interoperability Testing Tool for Operations and Maintenance Interfaces of 5G Open RAN Base Station. 1-4 - Liang-Yu Chen, Chien Chen, Jyh-Cheng Chen, Pei-Yu Ho, Chia-Cheng Wang:

Design and Implementation of a Redundant Transmission Technique for Ultra-Reliable Communication in 5G Core Networks. 1-4 - Shingo Omata, Satoshi Kondoh:

Evaluation of the application of Seq2Seq towards the automatic derivation of a set of APIs that satisfy requirements from only ambiguous requirements. 1-4 - Seiji Sakuma, Ryosuke Sato, Mizuto Nakamura, Kyoko Yamagoe:

Method for Extracting Suspected Faulty Equipment Through Recursive Use of GNN Model. 1-6 - Junhyeong Ryu, Aeri Kim, Meryam Essaid

, Hongtaek Ju:
Development of Wireshark Dissector for Ethereum Node Discovery Protocol/v5. 1-4 - Lirong Chen, Qiang Li:

How Does fake review Influence E-Commerce Platform Revenue? 1-4 - Yueh-Hsien Lin, Ting-Che Chuang, Yong-Zen Huang:

A 5G Synchronous Optical Networking Management System. 1-4 - Min Seok Kim, Jong Hoon Shin, Choong Seon Hong:

Network Intrusion Detection System using 2D Anomaly Detection. 1-4 - Yupeng Li, Qi Xie, Weixu Wang, Xiaobo Zhou, Keqiu Li:

GCN-Based Topology Design for Decentralized Federated Learning in IoV. 1-6 - Yuusuke Hashimoto, Yuya Seki, Kosuke Kubota, Akihiro Fujimoto, Yosuke Tanigawa, Yusuke Hirota, Hideki Tode:

Experimental Demonstration of Dynamic Service Function Chaining Based on Server Load Information in Optical Packet Switching Networks. 1-4 - Jihua Wu, Lei Zhang

, Cong Liu, Qi Qi, Jingyu Wang
, Tong Xu, Jianxin Liao:
Probability Correlation Learning for Anomaly Detection based on Distribution-Constrained Autoencoder. 1-6 - Juliana Liman, Li-Hsing Yen:

Reinforcement Learning for Channel and Radio Allocations to Wireless Backhaul Links. 1-4 - Ping-Chang Tsai, Pang-Chen Liu, Wen-Chien Chan, Fei-Hua Kuo, Kuo-Hsiang Lai:

Double-layer access network architecture for intelligent building services. 1-4 - Mir Muhammad Suleman Sarwar, Javier Jose Diaz Rivera, Muhammad Afaq

, Wang-Cheol Song:
GENEVE@TEIN: A Sophisticated Tunneling Technique for Communication between OpenStack-based Multiple Clouds at TEIN. 1-4 - Meryam Essaid

, Changhyun Lee, JungYeon Kim, Aeri Kim, Hongteak Ju:
Community Structure in Public Blockchain network. 1-6 - Pang-Wei Tsai, Aris Cahyadi Risdianto, Teck Chaw Ling:

Design, Development, and Operation of a SDN-Based BGP Playground for Networkers. 1-4 - You-Chiun Wang, Shang-Hao Wu:

Efficient Deployment of Virtual Network Functions to Achieve Load Balance in Cloud Networks. 1-6 - Haiyang Wang, Tongge Xu, Jian Yang, Lijin Wu, Liqun Yang:

Sessionvideo: A Novel Approach for Encrypted Traffic Classification via 3D-CNN Model. 1-6 - Ryosuke Sato, Mizuto Nakamura, Chiriro Sato, Seiji Sakuma, Motomu Nakajima:

Vectorization Method for Device Alarms Achieving High General Ability for AI Application to Network Operations. 1-6 - Haoru Su, Meng-Shiuan Pan, Shao-Wei Kao:

A Subchannel Collision Reduction Method for 3GPP C- V2X Mode 4 Network Based on Vehicular Moving Status. 1-6 - Jiacheng Guo, Jinbin Tu, Yun Wang:

Multi-network Transmission Mechanism in Narrow-band Weak Connection Environment. 1-4 - Shohei Maruyama, Yoshiaki Nishikawa, Takeo Onishi, Eiji Takahashi:

Identifying Root Cause of 5G Radio Quality Deterioration Using Machine Learning. 1-6 - Leyi Shi, Yifan Miao, Jiahao Ren, Huiwen Hou, Qiang Han:

A defense mechanism analysis for Dynamic Heterogeneous Redundancy. 1-4 - Yuya Hata, Naoki Hayashi, Yusuke Makino, Atsushi Takada, Kyoko Yamagoe:

Alarm Correlation Method Using Bayesian Network in Telecommunications Networks. 1-4 - Yun-Zhan Cai, Ting-Yu Lin, Yu-Ting Wang, Ya-Pei Tuan, Meng-Hsun Tsai:

Mitigating New-Flow Attack with SDNSnapshot in P4-based SDN. 1-4 - DongNyeong Heo, Doyoung Lee, Heegon Kim, Suhyun Park, Heeyoul Choi:

Reinforcement Learning of Graph Neural Networks for Service Function Chaining in Computer Network Management. 1-6 - Heng He, Zhezhe Peng, Xiaohu Zhou, Jia Wang:

LFOD: A Lightweight Flow Table Optimization Scheme in SDN Based on Flow Length Distribution in the Internet. 1-6 - Hyeonjun Jo, Kyungbaek Kim

:
Security Service-aware Reinforcement Learning for Efficient Network Service Provisioning. 1-4 - Jiacong Li, Hang Lv, Bo Lei:

A Cross-Domain Data Security Sharing Approach for Edge Computing based on CP-ABE. 1-6 - Yun-Jie Li, Jhao-Yin Li:

An NLP-Based Model for the Dispatching Problem of Network Operation. 1-4 - Shinya Horimoto, Eiji Oki:

Virtual Network Function Placement Model Considering Both Service Delay and Availability. 1-6 - Cheng Zhang:

Time Based Concave Cache Pricing for Information-centric Networks. 1-4 - Jee-Tae Park, Ui-Jun Baek, Myung-Sup Kim, Min-Seong Lee, Chang-Yui Shin:

Rule-based User Behavior Detection System for SaaS Application. 1-4 - Talha Ahmed Khan, Waleed Akbar, Muhammad Afaq

, Wang-Cheol Song:
Proactive Intent Policy Activation: An ML-Assisted Resource Forecasting Approach. 1-6 - Masahiro Hayashi:

End-to-end Method to Evaluate One-to-all Reliabilities of Telecommunications Networks. 1-4 - Sungwoong Yeom, Shivani Sanjay Kolekar, Kyungbaek Kim

:
Effective Edge Server Placement for Efficient Federated Clustering. 1-4 - Jichang Wang, Gaofeng Lv, Zhongpei Liu, Xiangrui Yang:

QUIC Cryption Offloading Based on NanoBPF. 1-4 - Sheikh Salman Hassan, Dong Uk Kim, Seok Won Kang, Choong Seon Hong:

Energy-Efficient IoE Networks Deployment for Future Smart Cities. 1-6 - Beom-Su Lee, Jong-Wouk Kim, Mi-Jung Choi:

Experimental Comparison of Hybrid Sampling Methods for an Efficient NIDS. 1-4 - Javier Jose Diaz Rivera, Talha Ahmed Khan, Waleed Akbar, Muhammad Afaq

, Wang-Cheol Song:
Secure enrollment token delivery for Zero Trust networks using blockchain. 1-6 - Linwei Yang, Jing Li, Kuanzhi Shi, Songlin Yang, Qingfu Yang, Jiangang Sun:

MicroMILTS: Fault Location for Microservices Based Mutual Information and LSTM Autoencoder. 1-6 - Kitae Kim

, Choong Seon Hong:
Pruned Autoencoder based mmWave Channel Estimation in RIS-Assisted Wireless Networks. 1-4 - Namjin Seo, DongNyeong Heo, Jibum Hong, Heegon Kim, Jae-Hyoung Yoo, James Won-Ki Hong, Heeyoul Choi:

Updating VNF deployment with Scaling Actions using Reinforcement Algorithms. 1-4 - Luyao Zou, Md. Shirajum Munir, Ye Lin Tun

, Choong Seon Hong:
Clustering-Based Serverless Edge Computing Assisted Federated Learning for Energy Procurement. 1-6 - Cheng-Yu Wu, Li-Hsing Yen, Ping-Chun Hsieh

, Chien-Chao Tseng
:
Deterministic Bandwidth-Based Packet-Level Traffic Splitting for Datacenter Networks. 1-6 - Kiwook Kim, JaiSeung Kwak, Woojin Seok:

Milimeter Wave Short Distance Communication for Scientific Research Equipment. 1-3 - Kuan-Heng Shen, Seng-Da Tu, Jian-Kai Huang:

An Optical DWDM Transmission Architecture for High Capacity Based on Heterogeneous Submarine Cable System. 1-4 - Shuangqing Li, Zhihao Li, Weiqi Zhang:

A Dynamic Association Strategy for Controller Load Balancing in Software-Defined Networks. 1-6 - Rong Xie:

Construction of Mobile Agents' Dynamic Collaboration Network for Unmanned Systems. 1-4 - Raihaanjun Kushiyama, Ryo Yamamoto

, Satoshi Ohzahata:
VNE-HAGBE: A Hybrid Approach to Improve VNR Request Acceptance Rate for Wireless Virtual Network Embedding. 1-4 - Kuan-Hsiang Chen, Huai-Sheng Huang:

Meta-NWDAF: A Meta-Learning based Network Data Analytic Function for Internet Traffic Prediction. 1-4 - Hsing-Chen Chi, Wu-Hsien Chang, Min-Chi Tseng, Yu-Ping Yu, Kuo-Hsiang Lai:

SDN-enabled Framework for Resilient Traffic Routing in 5G Networks. 1-4 - Feng Jiang, Yongyang Cheng, Zhao Hui, Boqin Qin, Ruibo Yan:

A Data Availability Modeling Approach Towards Cloud Storage Systems Based on Client Perspective. 1-4 - Takuma Yamazaki, Eri Hosonuma, Taku Yamazaki, Takumi Miyoshi:

Fast Confirmation of Link Symmetry in Backoff-based Opportunistic Routing. 1-4 - Nway Nway Ei, Ji Su Yoon, Choong Seon Hong:

Energy-Aware Task Offloading and Resource Allocation in Space-Aerial-Integrated MEC System. 1-6 - Ming-Yen Wu, Jiun-Cheng Huang, Yuan-Mao Hung, Cheng-Yi Chien, Jack Shi-Jie Luo, Shuo-Peng Liang:

The Edge Cloud Implementation and Application of Transnational Smart Factory of 5G Private Network. 1-6 - Takashi Satake, Yoshiaki Narusue, Hiroyuki Morikawa:

An Effective Location Registration Method Under Many User Equipments in IoT. 1-4 - Yanchao Sun, Yuanfeng Han, Yue Zhang, Mingsong Chen, Shui Yu

, Yimin Xu:
DDoS Attack Detection Combining Time Series-based Multi-dimensional Sketch and Machine Learning. 1-6 - Waleed Akbar, Javier Jose Diaz Rivera, Talha Ahmed Khan, Muhammad Afaq

, Wang-Cheol Song:
Software Defined Perimeter Monitoring and Blockchain-Based Verification of Policy Mapping. 1-4 - Haruka Osanai, Masaru Sakai, Sho Kanemaru, Kensuke Takahashi, Satoshi Kondou:

Study of Information Identification Technology Considering of Overlapping and Synonyms Words in Information Distribution. 1-4 - Ui-Jun Baek, Boseon Kim, Jee-Tae Park, Jeong-Woo Choi, Myung-Sup Kim:

MISCNN: A Novel Learning Scheme for CNN-Based Network Traffic Classification. 1-6 - Anish Hirwe

, Nikita Makharia, Tanmay Renugunta, Kotaro Kataoka:
ResiConnect - Fault Detection and Resilience for Multi-Stage AWGR-based Optical Networks. 1-6 - Shengchao Deng, Hui Gao, Xin Su, Bei Liu:

Intelligent Representation of Wireless Network States: A Multi-Layer Correlation Approach. 1-4 - Chia-Chun Yen, Yu-Chen Cheng, Guan-Wen Chen, Tsì-Uí Ik

:
Script-based traffic signal management for arterial road section group on Mobile. 1-4 - Guan-Wen Chen, Yi-Hsiu Lin, Min-Te Sun, Tsì-Uí Ik

:
Managing Edge AI Cameras for Traffic Monitoring. 1-4 - Lei Zhang, Hui Li, Jingguo Ge, Yulei Wu, Liangxiong Li, Bingzhen Wu, Haojiang Deng:

EDP: An eBPF-based Dynamic Perimeter for SDP in Data Center. 1-6 - Hua Wu, Yuping Sui, Guang Cheng, Xiaoyan Hu, Qinghua Shang:

Service classification of high-speed network traffic based on Two-Stage Clustering. 1-6 - Tomoki Takahashi, Takehiro Sato, Eiji Oki:

Simultaneous Update Model of Multiple Service Function Chains Guaranteeing State Consistency. 1-4 - Tongyan Wei, Ying Wang, Wenjing Li:

The Deep Flow Inspection Framework Based on Horizontal Federated Learning. 1-4 - JungYeon Kim, Meryam Essaid

, Hongtaek Ju:
Inter-Blockchain Communication Message Relay Time Measurement and Analysis in Cosmos. 1-6 - Sangwoo Ryu, Kyungchan Ko, James Won-Ki Hong:

Stabilizing Deep Reinforcement Learning Model Training for Video Conferencing. 1-6 - Xinyu Zhu, Yue Zhang:

Machine-learning-assisted Traffic Classification of User Activities at Programmable Data Plane. 1-4 - Asif Mehmood

, Talha Ahmed Khan, Muhammad Afaq
, Wang-Cheol Song:
Multi-Class Traffic Density Forecasting in IoV using Spatio-Temporal Graph Neural Networks. 1-6 - Chien-Liang Kuo, Jin-Wei Kuo, Xuan-Zhe Chen, Li-Hsing Yen:

Learning-Based Algorithms for Channel Allocations in Wireless Mesh Network. 1-4 - Kai Zhang, Libin Liu, Lizhuang Tan, Ye Zhang, Wei Gao, Wei Zhang:

Efficient Clustered Network Telemetry based on Failure Awareness. 1-4 - Loc X. Nguyen, Luyao Zou, Huy Q. Le, Choong Seon Hong:

An Encouraging Design for Data Owners to Join Multiple Co-existing Federated Learning. 1-4 - Feng Jiang, Yongyang Cheng, Boqin Qin, Zhao Hui:

Who owns the address? A performant block storage model for hybrid cloud. 1-6 - Kyungchan Ko, Taeyeol Jeong, Jongsoo Woo, James Won-Ki Hong:

An Analysis of Crypto Gas Wars in Ethereum. 1-6 - Kazuki Tanabe

, Takayuki Kuroda, Kozo Satoda:
FACTORY: A Fully Automated Evaluation Platform for ICT System Components. 1-4 - Yu Min Park, Sheikh Salman Hassan, Choong Seon Hong:

Maximizing Throughput of Aerial Base Stations via Resources-based Multi-Agent Proximal Policy Optimization: A Deep Reinforcement Learning Approach. 1-4 - Liang-Jian Deng, Yubing Chen, Lichen Zhang:

Construction Method of Overlay Network for Cyber-Physical System. 1-4 - Yu-Hsien Huang, Yung-Chang Huang, Hao Syuan Lee, Tsì-Uí Ik

, Chih-Chuan Wang:
S2-Labeling: Shot-By-Shot Microscopic Badminton Singles Tactical Dataset. 1-6 - Ryo Uchida, Fumihiro Yokose, Taisuke Wakasugi, Kimio Tsuchikawa, Haruo Oishi, Yuki Urabe:

Applicability Evaluation of Task Clustering Method Using Co-occurrence of Operations. 1-4 - Bo Wu

, Qian Xu, Zhenjie Yao, Yanhui Tu, Yixin Chen:
VAE-TCN hybrid model for KPI Anomaly Detection. 1-6 - Keigo Akahoshi, Eiji Oki:

Service Deployment with Per-Flow-Priority-Based Virtual Network Function Resizing. 1-6 - Youqiong Zhuang, Hua Wu, Songtao Liu, Guang Cheng, Xiaoyan Hu:

HDS: A Hierarchical Scheme for Accurate and Efficient DDoS Flooding Attack Detection. 1-6 - Min-Han Hung, Che-Chun Teng, Chin-Ping Chuang, Chi-Sheng Hsu, Jai-Wei Gong, Mei-Chun Chen:

A SDN Controller Monitoring Architecture for 5G Backhaul Networks. 1-4 - Makoto Misumi, Masashi Naoe, Noriaki Kamiyama:

Activity-Monitoring System for Harmful Wildlife Using WuR Multi Stage Sensor Array. 1-4 - Ryosuke Sato, Yoshikazu Nakamura, Tomonari Fujimoto, Yuji Shinozaki, Motomu Nakajima:

Methods for Providing Resilience from Electric Power Side to Communications Network Side. 1-4 - Badis Hammi

, Yacine Mohamed Idir, Rida Khatoun:
A machine learning based approach for the detection of sybil attacks in C-ITS. 1-4 - Khizar Abbas

, Jae-Hyoung Yoo, James Won-Ki Hong:
Adaptive Ensemble Learning-based Network Resource Workload Prediction for VNF Lifecycle Management. 1-4 - Yannian Niu, Minghua Zhu:

Assembler: A Throughput-Efficient Module for Network Driver of Edge Computing Gateways. 1-4 - Zhijiao Xiao, Song Hu:

DScaler: A Horizontal Autoscaler of Microservice Based on Deep Reinforcement Learning. 1-6 - Yu Zhang, Xiangyu Bai, Lei Yao:

Research on Vertical Handover Strategy in Heterogeneous Vehicular Networks on Expressway. 1-4 - Manami Nakahara, Noriaki Kamiyama:

Detecting Crossfire-Attack Hosts in Search Phase. 1-4 - Takahiro Hirayama, Masahiro Jibiki:

SFC Path Selection based on Combination of Topological Analysis and Demand Prediction. 1-4 - Kazuhiko Kinoshita

, Yoshiki Aihara, Masami Kishida:
A Distributed Wi-Fi Channel Assignment Method with Channel Bonding Considering the Number of Associated Users. 1-4 - Sajida Karim, Hui He:

Optimization: data-driven management using deep learning in cloud computing. 1-4

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














