


Остановите войну!
for scientists:


default search action
36th ICOIN 2022: Jeju Island, South Korea
- International Conference on Information Networking, ICOIN 2022, Jeju-si, Republic of Korea, January 12-15, 2022. IEEE 2022, ISBN 978-1-6654-1332-9
- Sajad Homayoun, Kaspar Hageman
, Sam Afzal-Houshmand, Christian Damsgaard Jensen, Jens Myrup Pedersen
:
Detecting Ambiguous Phishing Certificates using Machine Learning. 1-6 - Dereje Regassa, Heon Young Yeom, Yongseok Son:
Efficient Attacker Node(s) Detection and Isolation Schemes in MANETs OLSR Protocol. 7-12 - Razafimahatratra Fenohasina Lova, Rakotomandimby Miora Fifaliana, Wajira Prasad De Silva:
Intrusion Detection Toward Feature Reconstruction using Huber Conditional Variational AutoEncoder. 13-17 - Zhenning Xu, Hassan Khan, Radu Muresan:
TMorph: A Traffic Morphing Framework to Test Network Defenses Against Adversarial Attacks. 18-23 - Ajit Kumar, Bong Jun Choi:
Benchmarking Machine Learning based Detection of Cyber Attacks for Critical Infrastructure. 24-29 - Ijaz Ahmad
, Seokjoo Shin:
Encryption-then-Compression System for Cloud-based Medical Image Services. 30-33 - Tobias Mueller:
Let's Re-Sign! Analysis and Equivocation-Resistant Distribution of OpenPGP Revocations. 34-39 - Ripon Patgiri
, Dolendro Singh Laiphrakpam:
An Analysis on the Variants of the RSA Cryptography. 40-45 - Chalee Thammarat, Chian Techapanupreeda:
Secure Key Establishment Protocol for Smart Homes Based on Symmetric Cryptography. 46-51 - Thai-Hung Nguyen, Truong Giang Vu, Huong-Lan Tran, Kok-Seng Wong
:
Emerging Privacy and Trust Issues for Autonomous Vehicle Systems. 52-57 - Haemin Lee, Youngkee Kim, Hyunhee Cho, Soyi Jung, Joongheon Kim:
The Credibility Cryptocurrency Valuation: Statistical Learning Analysis for Influencer Tweets. 58-61 - Christos Bouras, Evangelos Michos:
An online real-time face recognition system for police purposes. 62-67 - Jai Singhal, Ankit Singh Gautam, Ashutosh Bhatia, Ankit Agrawal, Rekha Kaushik
:
DD-Locker: Blockchain-based Decentralized Personal Document Locker. 68-73 - Rudraraju Sacin Varma, Ankit Agrawal, Ashutosh Bhatia, Kamlesh Tiwari:
Multi-vendor IoT-based Resource Sharing using OAuth and Blockchain. 74-77 - Mukhammaddiyor Khaydaraliev, Min-Hyung Rhie, Ki-Hyung Kim:
Blockchain-enabled Access Control with Fog Nodes for Independent IoTs. 78-83 - Ozan Tarlan, Ilgin Safak, Kübra Kalkan:
DiBLIoT: A Distributed Blacklisting Protocol for IoT Device Classification Using the Hashgraph Consensus Algorithm. 84-89 - Saad El Jaouhari, Eric Bouvet
:
Toward a generic and secure bootloader for IoT device firmware OTA update. 90-95 - Gabriel Avelino R. Sampedro
, Ryanne Gail Kim, Jose Mari Cobar, Keith Daniel Abaja, Ronnie Baluis:
Development of an Internet of Things (IoT)-Based Automated Bag-Valve-Mask. 96-100 - Yu-Cheng Chien, Yi-Chun Yeh, Nen-Fu Huang:
Deep Learning Based Route Information Extraction from Satellite Imagery for Agricultural Machinery Management. 101-106 - Jia-Cheng Zhang, Daniel Ho Teck Khieng, Nen-Fu Huang:
A Long Range Reliable Precise Irrigation System Based on LoRaP2P Protocol. 107-112 - Takumi Yanagisawa:
DASH rate control using game theory to consider user video preference. 113-118 - Truong-Xuan Do, Ha Phan Khanh Nguyen, Thai Binh Nguyen, Huu Tung Dang:
A Neural-Network Distortion Estimation-based Adaptive Video Streaming in Wireless Networks. 119-123 - Natsumi Nishizawa, Tatsuya Otoshi, Masayuki Murata:
Modeling of Cognitive Bias of Video Viewing Users Based on Quantum Decision Making. 124-130 - Nurul I Sarkar
, Sonia Gul:
The Impact of Wireless Nodes on the Performance of Video Streaming over a Gigabit Backbone Network. 131-135 - Yang Yu, Sanghwan Lee:
Measurement-Based Evaluation of Video Streaming Method for Remote Driving Systems. 136-139 - Rashini K. Liyanarachchi, Manujaya Premathilaka, Hirumi Samarawickrama, Nuwana Thilakasiri, Nanduni U. Hettiarachchi, Sasini Wellalage, Janaka L. Wijekoon
:
InCOV Chamber: Intelligent Chamber to Detect Potential COVID-19 Positive Patients. 140-145 - Anita Ramachandran, Apoorva Bajaj, Anupama Karuppiah:
Correlation between SpO2 and Heart Rate in Sleep Apnea Detection. 146-151 - Mingshan Jia, Maité Van Alboom, Liesbet Goubert, Piet Bracke, Bogdan Gabrys
, Katarzyna Musial
:
Analysing Egocentric Networks via Local Structure and Centrality Measures: A Study on Chronic Pain Patients. 152-157 - Jamshaid Iqbal Janjua, Tahir Abbas Khan, Mehwish Nadeem:
Chest X-Ray Anomalous Object Detection and Classification Framework for Medical Diagnosis. 158-163 - Ilyoung Chong, Sanghong Lee:
Deep Learning based Semantic Ontology Alignment Process and Predictive Analysis of Depressive Disorder. 164-167 - Hokeun Lim, Younghan Kim:
A Design of Network Mobility Management on Cloud Native Tactical Edge Cloud. 168-170 - Peter Sossalla, Justus Rischke, Frank H. P. Fitzek:
Enhanced One-Way Delay Monitoring with OpenFlow. 171-176 - Che-Wei Hsu, Yu-Hsiang Huang, Nen-Fu Huang:
Real-time Dragonfruit's Ripeness Classification System with Edge Computing Based on Convolution Neural Network. 177-182 - Quoc Vinh Ta, Minho Park:
Economic Denial of Sustainability (EDoS) attack detection by attention on flow-based in Software Defined Network (SDN). 183-185 - Eduardo Castilho Rosa, Flávio de Oliveira Silva
:
A Hash-Free method for FIB and LNPM in ICN programmable data planes. 186-191 - Shougo Matsuo, Sunao Miyamoto, Keita Katagiri, Takeo Fujii:
Radio Propagation Extrapolation by Using Multiple Separated Propagation Paths Estimated by Radio Map. 192-197 - Keita Katagiri, Takeo Fujii:
Partitioned Path Loss Models Based on Coefficient of Determination. 198-203 - Eunkyung Kim
:
Cross-Beam Retransmission in mmWave Networks. 204-206 - Andrej Stefanov:
Distortion Performance of MIMO Mobile Underwater Acoustic Networks with Retransmissions. 207-209 - Muhammad Usman Sheikh, Jukka Lempiäinen, Riku Jäntti:
Capacity Limitation of Small Cell Densification. 210-214 - Takeaki Iwata, Keita Kitaura, Ryotaro Matsuo, Hiroyuki Ohsaki:
A Solution for Finding Quasi-Shortest Path with Graph Coarsening. 215-219 - Fabricio Cravo, Thomas Nowak:
Stochastic Multi-Distribution Modeling of Inter-Contact Times. 220-225 - Clément Cassé, Pascal Berthou, Philippe Owezarski, Sébastien Josset:
A Tracing Based Model to Identify Bottlenecks in Physically Distributed Applications. 226-231 - Keita Kitaura, Ryotaro Matsuo, Hiroyuki Ohsaki:
Random Walk on a Graph with Vicinity Avoidance. 232-237 - Jo Hagikura, Ryotaro Matsuo, Hiroyuki Ohsaki:
On Accelerating Multiple Random Walks with Loose Cooperation. 238-243 - Takeshi Kaneko, Kazuyuki Shudo:
Broadcast with Tree Selection on An Overlay Network. 244-249 - Taesung Choi, Dongkun Lee, Yuchae Jung, Ho-Jin Choi:
Multivariate Time-series Anomaly Detection using SeqVAE-CNN Hybrid Model. 250-253 - Yunchi Gong:
Adaptive Self-Supervised Graph Representation Learning. 254-259 - Taisei Suzuki, Hiroyuki Ohsaki:
On Inferring Communication Delays Using Semi-Supervised Learning. 260-265 - Made Adi Paramartha Putra, Dong-Seong Kim, Jae-Min Lee:
Composite Multi-Directional LSTM for Accurate Prediction of Energy Consumption. 266-269 - Yuto Lim, Chenmian Zhou, Yasuo Tan, Yuan Fang, Manmeet Mahinderjit Singh:
Personal Thermal Comfort Model for Cyber-Physical Human Centric Systems using Incomplete Supervised Learning Method. 270-275 - Beopgwon Jung, Joonwoo Kim, Sangheon Pack:
Deep Reinforcement Learning-based Context-Aware Redundancy Mitigation for Vehicular Collective Perception Services. 276-279 - Raheleh Samadi, Jochen Seitz
:
EEC-GA: Energy-Efficient Clustering Approach Using Genetic Algorithm for Heterogeneous Wireless Sensor Networks. 280-286 - Megumi Mizuto, Hideya So, Kazuki Maruta
, Yu Nakayama:
Penalized Approach for Wide Coverage in Gamified Participatory D2D Communication. 287-291 - Eisei Yoshida, Suzuka Kobayashi, Hiroaki Mukai, Natthaphol Uthumphirat, Yuki Nakamura, Nao Ogino, Tetsuya Yokotani:
Proposal and prototyping on wildlife tracking system using infrared sensors. 292-297 - Afonso Oliveira, Teresa Vazão:
Mapping Network Performance to Radio Resources. 298-303 - JongBeom Jeong, Soonbin Lee
, Eun-Seok Ryu:
Rethinking Fatigue-Aware 6DoF Video Streaming: Focusing on MPEG Immersive Video. 304-309 - Soonbin Lee
, JongBeom Jeong, Eun-Seok Ryu:
Efficient Group-Based Packing Strategy for 6DoF Immersive Video Streaming. 310-314 - Jongmin Lee, Gunjae Koo:
Restore Buffer Overflow Attacks: Breaking Undo-Based Defense Schemes. 315-318 - Thanh Phung Truong
, Anh-Tien Tran, Thi My Tuyen Nguyen, The-Vi Nguyen, Arooj Masood, Sungrae Cho:
MEC-Enhanced Aerial Serving Networks via HAP: A Deep Reinforcement Learning Approach. 319-323 - Muncheon Yoo, Hyundo Yoon, Changhee Hahn
, Dongyoung Koo, Junbeom Hur:
Downgrading Backward Privacy of Searchable Encryption. 324-328 - Marco A. Coutinho, Evandro L. C. Macedo
, Luís F. M. de Moraes, Victor Cracel Messner, Diego Leonel Cadette Dutra, Claudio Luis de Amorim, Valeriana Gomes Roncero, Nilton Alves Júinior, Marita Maestrelli, Márcio Portes de Albuquerque, Sandro Silva:
A New Interest-Based Protocol to Hide and Protect Servers in IP Networks. 329-334 - Seongju Kang, Jaegi Hwang, Kwangsue Chung:
DLNet: Domain-specific Lightweight Network for On-Device Object Detection. 335-339 - Issaree Srisomboon, Sanghwan Lee:
A Round-Robin Position Change Algorithm in Vehicle Platooning. 340-344 - Van Vi Vo, Duc Tai Le, Moonseong Kim, Hyunseung Choo:
Data Aggregation Latency Minimization in Multichannel Duty-cycled WSNs. 345-348 - Yun-Young Hwang, Sumi Shin:
A Spatial Common Datasets for Linkage between Dataset Values. 349-351 - Junlin Yin, Syed Faraz Hasan:
Passive Localization for Comparing Physical Activities in Indoor Environments. 352-355 - Van-Dat Tuong, Nhu-Ngoc Dao, Wonjong Noh, Sungrae Cho:
Dynamic Time Division Duplexing for Green Internet of Things. 356-358 - Duc Thien Hua, Demeke Shumeye Lakew, Sungrae Cho:
DRL-based Energy Efficient Communication Coverage Control in Hierarchical HAP-LAP Network. 359-362 - Anisa Rahmanti, Fajar Setiawan, I Wayan Mustika, Selo:
Case Study of Moth Flame Optimization Implementation for Network Challenges. 363-367 - Toufiq Aziz, Heung-Gyoon Ryu:
ESPAR Antenna Design for the Interference Mitigation in WSN Communication System. 368-371 - Rezoan Ahmed Nazib, Safdar Hussain Bouk
, Zeeshan Hameed Mir, Young-Bae Ko:
Unplanned UAV Trajectory-based Data Collection in Large-scale Sensor Networks. 372-377 - Tae Hyun Eom, Hyukjoon Lee:
A WTTE-RNN Based Hypoglycemic Event Prediction. 378-379 - Simeon Okechukwu Ajakwe
, Vivian Ukamaka Ihekoronye, Rubina Akter, Dong-Seong Kim, Jae-Min Lee:
Adaptive Drone Identification and Neutralization Scheme for Real-Time Military Tactical Operations. 380-384 - Dong Uk Won, Hwa Sung Kim:
A Prediction Scheme For Movie Preference Rating Based on DeepFM Model. 385-390 - Esmot Ara Tuli, Jae-Min Lee, Dong-Seong Kim:
Improved Partial Transmit Sequence Based PAPR Reduction of UFMC Systems. 391-395 - Ta Phuong Bac, Minh-Ngoc Tran, Young-Han Kim:
Serverless Computing Approach for Deploying Machine Learning Applications in Edge Layer. 396-401 - Todd Murray, Syed Faraz Hasan:
Received Signal Strength Indicator for Device Localization in Post Disaster Scenarios. 402-407 - Sang Il Kim, Hwa Sung Kim:
Ontology-based NSD Modeling for NFV Service Management. 408-412 - Chien Nguyen Nhu, Minho Park:
Optimizing Resource Scaling in Network Slicing. 413-416 - Apurba Adhikary
, Saydul Akbar Murad
, Md. Shirajum Munir
, Choong Seon Hong:
Edge Assisted Crime Prediction and Evaluation Framework for Machine Learning Algorithms. 417-422 - Soo Jung Moon, Wonjun Lee:
Friendly Jamming in LoRa Physical Layer Using Imperfect Orthogonality of Spreading Factor. 423-428 - Suyoung Ahn, Joonpyo Hong, Yun Hee Cho, Jeehyeon Na, Jeongho Kwak:
Sequential Beam, User, and Power Allocation for Interference Management in 5G mmWave Networks. 429-434 - Junhee Kwon, Bien Aime Mugabarigira
, Jaehoon Paul Jeong:
Web-Based Car Control and Monitoring for Safe Driving of Autonomous Vehicles. 435-440 - Hyeonjin Kim, Woobeen Jin, Hyukjoon Lee:
mmWave path loss modeling for urban scenarios based on 3D-convolutional neural networks. 441-445 - Sung-Hyun Kim, Sung-Woo Moon, Dae-Gyeom Kim, Myeongjin Ko, Yong-Hoon Choi:
A Neural Network-based Path Loss Model for Bluetooth Transceivers. 446-449 - Anh Tuan Nguyen, Minho Park:
Detection of DoH Tunneling using Semi-supervised Learning method. 450-453 - Jeonghyeon Joshua Kim, Patrick Lingga, Jaehoon Paul Jeong, Yunchul Choi, Jung-Soo Park:
A Web-Based Monitoring System of Network Security Functions in Blockchain-Based Cloud Security Systems. 454-459 - Aunas Manzoor, S. M. Ahsan Kazmi, Choong Seon Hong:
Efficient Content Delivery to Vehicles Passing Through a Wireless-enabled Traffic Signal System. 460-463 - Michael Hosein, Karunesh Ramdass:
Wi-fi Direct Applications within a Post Covid Classroom - Bridging the Gap between Fully Online and Face to Face Learning. 464-469 - Minseok Choi:
Survey on Reinforcement Learning Approaches for Cache-Assisted Video Streaming System. 470-473 - Hyunsoo Lee, Haemin Lee, Soyi Jung, Joongheon Kim:
Stable Marriage Matching for Traffic-Aware Space-Air-Ground Integrated Networks: A Gale-Shapley Algorithmic Approach. 474-477 - Min-Ha Kim, Dae-Sung Wang
, Sheng-Tsai Wang, Seo-Hyeon Park, Chan-Gun Lee:
Improving the Robustness of the Bug Triage Model through Adversarial Training. 478-481 - Jooyoung Park, Seunghwan Jeong, Honguk Woo:
Reinforcement Learning based Load Balancing in a Distributed Heterogeneous Storage System. 482-485 - Rohit Bharadwaj
, Ashutosh Bhatia, Laxmi Divya Chhibbar, Kamlesh Tiwari, Ankit Agrawal:
Is this URL Safe: Detection of Malicious URLs Using Global Vector for Word Representation. 486-491 - Hangyeol Hong, Hyerin Kim, Chong-Kwon Kim:
VHAS: Video Highlight based Adaptive Streaming. 492-497 - Tri Minh Nguyen, Myungsik Yoo:
PatchGAN-Based Depth Completion in Autonomous Vehicle. 498-501 - Khalid A. Darabkh, Bayan Z. Alkhader:
Fog Computing- and Software Defined Network-Based Routing Protocol for Vehicular Ad-hoc Network. 502-506 - Syed Maaz Shahid, Sunghoon Ko, Sungoh Kwon:
Performance Comparison of 1D and 2D Convolutional Neural Networks for Real-Time Classification of Time Series Sensor Data. 507-511

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.