


default search action
40th INFOCOM 2021: Vancouver, BC, Canada
- 40th IEEE Conference on Computer Communications, INFOCOM 2021, Vancouver, BC, Canada, May 10-13, 2021. IEEE 2021, ISBN 978-1-6654-0325-2 
- Borui Li, Wei Dong, Yi Gao: 
 WiProg: A WebAssembly-based Approach to Integrated IoT Programming. 1-10
- Yang Du, He Huang, Yu-e Sun, Shigang Chen, Guoju Gao: 
 Self-Adaptive Sampling for Network Traffic Measurement. 1-10
- Phil K. Mu, Jinkai Zheng  , Tom H. Luan , Tom H. Luan , Lina Zhu, Mianxiong Dong, Zhou Su: , Lina Zhu, Mianxiong Dong, Zhou Su:
 AMIS: Edge Computing Based Adaptive Mobile Video Streaming. 1-10
- In-Sop Cho, Seung Jun Baek: 
 Optimal Multicast Scheduling for Millimeter Wave Networks Leveraging Directionality and Reflections. 1-10
- Songzhou Yang  , Yuan He, Meng Jin: , Yuan He, Meng Jin:
 vGaze: Implicit Saliency-Aware Calibration for Continuous Gaze Tracking on Mobile Devices. 1-10
- Yongyong Wei, Rong Zheng: 
 Multi-Robot Path Planning for Mobile Sensing through Deep Reinforcement Learning. 1-10
- Lukasz Wojciechowski, Krzysztof Opasiak, Jakub Latusek, Maciej Wereski, Victor Morales, Taewan Kim, Moonki Hong: 
 NetMARKS: Network Metrics-AwaRe Kubernetes Scheduler Powered by Service Mesh. 1-9
- Seonghoon Park  , Yonghun Choi, Hojung Cha: , Yonghun Choi, Hojung Cha:
 WebMythBusters: An In-depth Study of Mobile Web Experience. 1-10
- Ningning Ding, Zhixuan Fang, Lingjie Duan  , Jianwei Huang: , Jianwei Huang:
 Incentive Mechanism Design for Distributed Coded Machine Learning. 1-10
- Jhonatan Tavori  , Hanoch Levy: , Hanoch Levy:
 Tornadoes In The Cloud: Worst-Case Attacks on Distributed Resources Systems. 1-10
- Dheeraj Narasimha, Srinivas Shakkottai, Lei Ying: 
 Age-Dependent Distributed MAC for Ultra-Dense Wireless Networks. 1-10
- Jingzhou Wang  , Gongming Zhao, Hongli Xu, He Huang, Luyao Luo, Yongqiang Yang: , Gongming Zhao, Hongli Xu, He Huang, Luyao Luo, Yongqiang Yang:
 Robust Service Mapping in Multi-Tenant Clouds. 1-10
- Xiaobo Ma, Mawei Shi, Bingyu An, Jianfeng Li, Daniel Xiapu Luo, Junjie Zhang, Xiaohong Guan: 
 Context-aware Website Fingerprinting over Encrypted Proxies. 1-10
- Armin Okic, Lanfranco Zanzi, Vincenzo Sciancalepore, Alessandro Redondi  , Xavier Costa-Pérez , Xavier Costa-Pérez : :
 π-ROAD: a Learn-as-You-Go Framework for On-Demand Emergency Slices in V2X Scenarios. 1-10
- Zhe Zhang, Chuan Wu  , Zongpeng Li: , Zongpeng Li:
 Near-Optimal Topology-adaptive Parameter Synchronization in Distributed DNN Training. 1-10
- Bing Luo  , Xiang Li, Shiqiang Wang, Jianwei Huang, Leandros Tassiulas: , Xiang Li, Shiqiang Wang, Jianwei Huang, Leandros Tassiulas:
 Cost-Effective Federated Learning Design. 1-10
- Itamar Cohen  , Gil Einziger, Gabriel Scalosub: , Gil Einziger, Gabriel Scalosub:
 Self-adjusting Advertisement of Cache Indicators with Bandwidth Constraints. 1-10
- Sharare Zehtabian, Siavash Khodadadeh, Ladislau Bölöni, Damla Turgut: 
 Privacy-Preserving Learning of Human Activity Predictors in Smart Environments. 1-10
- Yichao Cheng, Ning Luo, Jingxuan Zhang, Timos Antonopoulos, Ruzica Piskac  , Qiao Xiang: , Qiao Xiang:
 Looking for the Maximum Independent Set: A New Perspective on the Stable Path Problem. 1-10
- Bishakh Chandra Ghosh, Tanay Bhartia, Sourav Kanti Addya, Sandip Chakraborty: 
 Leveraging Public-Private Blockchain Interoperability for Closed Consortium Interfacing. 1-10
- Yongce Chen, Yubo Wu, Y. Thomas Hou  , Wenjing Lou: , Wenjing Lou:
 mCore: Achieving Sub-millisecond Scheduling for 5G MU-MIMO Systems. 1-10
- Chengzhang Li, Qingyu Liu, Shaoran Li, Yongce Chen, Y. Thomas Hou  , Wenjing Lou: , Wenjing Lou:
 On Scheduling with AoI Violation Tolerance. 1-9
- Xin Zhang, Jia Liu, Zhengyuan Zhu  , Elizabeth Serena Bentley: , Elizabeth Serena Bentley:
 Low Sample and Communication Complexities in Decentralized Learning: A Triple Hybrid Approach. 1-10
- Jingwen Fan, Yi He, Bo Tang, Qi Li, Ravi S. Sandhu: 
 Ruledger: Ensuring Execution Integrity in Trigger-Action IoT Platforms. 1-10
- Yetong Cao, Huijie Chen, Fan Li, Song Yang, Yu Wang: 
 AWash: Handwashing Assistance for the Elderly with Dementia via Wearables. 1-10
- Guihua Zhou, Guo Chen, Fusheng Lin, Tingting Xu, Dehui Wei, Jianbing Wu, Li Chen, Yuanwei Lu, Andrew Qu, Hua Shao, Hongbo Jiang: 
 Primus: Fast and Robust Centralized Routing for Large-scale Data Center Networks. 1-10
- Alec F. Diallo  , Paul Patras: , Paul Patras:
 Adaptive Clustering-based Malicious Traffic Classification at the Network Edge. 1-10
- Cuiying Feng  , Jianwei An, Kui Wu, Jianping Wang: , Jianwei An, Kui Wu, Jianping Wang:
 Bound Inference and Reinforcement Learning-based Path Construction in Bandwidth Tomography. 1-10
- Weirong Chen, Jiaqi Zheng, Haoyu Yu: 
 Dynamically Choosing the Candidate Algorithm with Ostasos in Online Optimization. 1-10
- Danyang Li, Jingao Xu, Zheng Yang, Yumeng Lu, Qian Zhang, Xinglin Zhang: 
 Train Once, Locate Anytime for Anyone: Adversarial Learning based Wireless Localization. 1-10
- Jiahui Ye, Zichun Li, Zhi Wang, Zhuobin Zheng, Han Hu, Wenwu Zhu: 
 Joint Cache Size Scaling and Replacement Adaptation for Small Content Providers. 1-10
- Zhenqiang Xu, Pengjin Xie  , Jiliang Wang: , Jiliang Wang:
 Pyramid: Real-Time LoRa Collision Decoding with Peak Tracking. 1-9
- Chong Zhang, Qiang Guo, Luoyi Fu, Xiaoying Gan, Xinbing Wang: 
 ITE: A Structural Entropy Based Approach for Source Detection. 1-10
- Tian Xie, Ting He, Patrick D. McDaniel, Namitha Nambiar: 
 Attack Resilience of Cache Replacement Policies. 1-10
- Juncheng Wang  , Ben Liang , Ben Liang , Min Dong, Gary Boudreau, Hatem Abou-zeid: , Min Dong, Gary Boudreau, Hatem Abou-zeid:
 Delay-Tolerant Constrained OCO with Application to Network Resource Allocation. 1-10
- Changue Jung, Suhwan Kim, Ikjun Yeom, Honguk Woo, Younghoon Kim  : :
 GPU-Ether: GPU-native Packet I/O for GPU Applications on Commodity Ethernet. 1-10
- Mijanur R. Palash, Voicu Popescu, Amit Sheoran  , Sonia Fahmy , Sonia Fahmy : :
 Robust 360° Video Streaming via Non-Linear Sampling. 1-10
- Yiwen Han, Shihao Shen  , Xiaofei Wang, Shiqiang Wang, Victor C. M. Leung: , Xiaofei Wang, Shiqiang Wang, Victor C. M. Leung:
 Tailored Learning-Based Scheduling for Kubernetes-Oriented Edge-Cloud System. 1-10
- Xingran Chen  , Xinyu Liao, Shirin Saeedi Bidokhti: , Xinyu Liao, Shirin Saeedi Bidokhti:
 Real-time Sampling and Estimation on Random Access Channels: Age of Information and Beyond. 1-10
- Haiming Cheng, Wei Lou: 
 Push the Limit of Device-Free Acoustic Sensing on Commercial Mobile Devices. 1-10
- Apostolos Galanopoulos, Jose A. Ayala-Romero, Douglas J. Leith  , George Iosifidis: , George Iosifidis:
 AutoML for Video Analytics with Edge Computing. 1-10
- Ming Tang, Vincent W. S. Wong: 
 An Incentive Mechanism for Cross-Silo Federated Learning: A Public Goods Perspective. 1-10
- Jianyu Niu, Fangyu Gai, Mohammad M. Jalalzai, Chen Feng: 
 On the Performance of Pipelined HotStuff. 1-10
- Junzhong Jia, Lei Yang, Jiannong Cao: 
 Reliability-aware Dynamic Service Chain Scheduling in 5G Networks based on Reinforcement Learning. 1-10
- Ashish Kashinath, Monowar Hasan  , Rakesh Kumar, Sibin Mohan , Rakesh Kumar, Sibin Mohan , Rakesh B. Bobba , Rakesh B. Bobba , Smruti Padhy: , Smruti Padhy:
 Safety Critical Networks using Commodity SDNs. 1-10
- Bin Li  : :
 Efficient Learning-based Scheduling for Information Freshness in Wireless Networks. 1-10
- Guanghong Lu, Chunhui Duan, Guohao Zhou, Xuan Ding, Yunhao Liu: 
 Privacy-Preserving Outlier Detection with High Efficiency over Distributed Datasets. 1-10
- Zhiyuan Jiang: 
 Analyzing Age of Information in Multiaccess Networks by Fluid Limits. 1-10
- Rong Ding, Zhaoxing Yang  , Yifei Wei, Haiming Jin, Xinbing Wang: , Yifei Wei, Haiming Jin, Xinbing Wang:
 Multi-Agent Reinforcement Learning for Urban Crowd Sensing with For-Hire Vehicles. 1-10
- Yuting Wang, Xiaolong Zheng, Liang Liu, Huadong Ma: 
 PolarTracker: Attitude-aware Channel Access for Floating Low Power Wide Area Networks. 1-10
- Khashayar Kamran, Armin Moharrer, Stratis Ioannidis  , Edmund M. Yeh: , Edmund M. Yeh:
 Rate Allocation and Content Placement in Cache Networks. 1-10
- Qiwei Wang, Si Chen, Jia Zhao, Wei Gong: 
 RapidRider: Efficient WiFi Backscatter with Uncontrolled Ambient Signals. 1-10
- Feng Shan, Jiaxin Zeng, Zengbao Li, Junzhou Luo, Weiwei Wu: 
 Ultra-Wideband Swarm Ranging. 1-10
- Jiuwu Zhang, Xiulong Liu, Tao Gu  , Xinyu Tong, Sheng Chen, Keqiu Li: , Xinyu Tong, Sheng Chen, Keqiu Li:
 SILoc: A Speed Inconsistency-Immune Approach to Mobile RFID Robot Localization. 1-10
- Yuntao Wang, Zhou Su, Qichao Xu, Ruidong Li  , Tom H. Luan , Tom H. Luan : :
 Lifesaving with RescueChain: Energy-Efficient and Partition-Tolerant Blockchain Based Secure Information Sharing for UAV-Aided Disaster Rescue. 1-10
- Theodoros Giannakas, Anastasios Giovanidis  , Thrasyvoulos Spyropoulos: , Thrasyvoulos Spyropoulos:
 SOBA: Session optimal MDP-based network friendly recommendations. 1-10
- Hao Song, Lingjia Liu, Bodong Shang, Scott Pudlewski  , Elizabeth Serena Bentley: , Elizabeth Serena Bentley:
 Enhanced Flooding-Based Routing Protocol for Swarm UAV Networks: Random Network Coding Meets Clustering. 1-10
- Penghao Zhang, Heng Pan, Zhenyu Li, Peng He, Zhibin Zhang, Gareth Tyson, Gaogang Xie: 
 Accelerating LSH-based Distributed Search with In-network Computation. 1-10
- Anran Li  , Lan Zhang, Juntao Tan, Yaxuan Qin, Junhao Wang, Xiang-Yang Li: , Lan Zhang, Juntao Tan, Yaxuan Qin, Junhao Wang, Xiang-Yang Li:
 Sample-level Data Selection for Federated Learning. 1-10
- Qin Wang  , Rujia Li: , Rujia Li:
 A Weak Consensus Algorithm and Its Application to High-Performance Blockchain. 1-10
- En Wang, Yuanbo Xu, Yongjian Yang, Fukang Yang, Chunyu Liu, Yiheng Jiang  : :
 ToP: Time-dependent Zone-enhanced Points-of-interest Embedding-based Explainable Recommender system. 1-10
- Jona Beysens  , Qing Wang , Qing Wang , Maxim Van den Abeele, Sofie Pollin: , Maxim Van den Abeele, Sofie Pollin:
 BlendVLC: A Cell-free VLC Network Architecture Empowered by Beamspot Blending. 1-10
- Douglas J. Leith  , Stephen Farrell: , Stephen Farrell:
 Contact Tracing App Privacy: What Data Is Shared By Europe's GAEN Contact Tracing Apps. 1-10
- Haoran Yuan, Xiaofeng Chen, Guowen Xu  , Jianting Ning, Joseph K. Liu, Robert H. Deng , Jianting Ning, Joseph K. Liu, Robert H. Deng : :
 Efficient and Verifiable Proof of Replication with Fast Fault Localization. 1-10
- Tianhang Zheng  , Baochun Li: , Baochun Li:
 First-Order Efficient General-Purpose Clean-Label Data Poisoning. 1-10
- Bahman Abolhassani, John Tadrous, Atilla Eryilmaz, Edmund Yeh: 
 Fresh Caching for Dynamic Content. 1-10
- Xiang Chen, Qun Huang, Peiqiao Wang, Hongyan Liu, Yuxin Chen, Dong Zhang, Haifeng Zhou, Chunming Wu: 
 MTP: Avoiding Control Plane Overload with Measurement Task Placement. 1-10
- Yibo Jin, Lei Jiao  , Zhuzhong Qian, Sheng Zhang, Sanglu Lu: , Zhuzhong Qian, Sheng Zhang, Sanglu Lu:
 Learning for Learning: Predictive Online Control of Federated Learning with Edge Provisioning. 1-10
- Hongyi Huang, Wenfei Wu, Yongchao He, Bangwen Deng, Ying Zhang, Yongqiang Xiong, Guo Chen, Yong Cui, Peng Cheng: 
 NFD: Using Behavior Models to Develop Cross-Platform Network Functions. 1-10
- Li Li, Xiaorui Wang, Wenli Zheng  , Cheng-Zhong Xu , Cheng-Zhong Xu : :
 SmartDistance: A Mobile-based Positioning System for Automatically Monitoring Social Distance. 1-10
- Chenyi Liu, Mingwei Xu, Yuan Yang, Nan Geng: 
 DRL-OR: Deep Reinforcement Learning-based Online Routing for Multi-type Service Requirements. 1-10
- Weiye Xu, Jianwei Liu, Shimin Zhang, Yuanqing Zheng, Feng Lin  , Jinsong Han, Fu Xiao, Kui Ren: , Jinsong Han, Fu Xiao, Kui Ren:
 RFace: Anti-Spoofing Facial Authentication Using COTS RFID. 1-10
- Wenbo He  , Shusheng Li, Wenbo Wang, Muheng Wei, Bohua Qiu: , Shusheng Li, Wenbo Wang, Muheng Wei, Bohua Qiu:
 CryptoEyes: Privacy Preserving Classification over Encrypted Images. 1-10
- Shusheng Li, Wenbo He: 
 VideoLoc: Video-based Indoor Localization with Text Information. 1-10
- Aakash Khochare, Yogesh Simmhan, Francesco Betti Sorbelli  , Sajal K. Das: , Sajal K. Das:
 Heuristic Algorithms for Co-scheduling of Edge Analytics and Routes for UAV Fleet Missions. 1-10
- Mengxi Hanyao, Yibo Jin, Zhuzhong Qian, Sheng Zhang, Sanglu Lu: 
 Edge-assisted Online On-device Object Detection for Real-time Video Analytics. 1-10
- Iordanis Koutsopoulos: 
 The Impact of Baseband Functional Splits on Resource Allocation in 5G Radio Access Networks. 1-10
- Yongheng Deng, Feng Lyu, Ju Ren, Yi-Chao Chen, Peng Yang, Yuezhi Zhou, Yaoxue Zhang: 
 FAIR: Quality-Aware Federated Learning with Precise User Incentive and Model Aggregation. 1-10
- Michael J. Neely: 
 Reversible Models for Wireless Multi-Channel Multiple Access. 1-10
- Kumar Saurav  , Rahul Vaze: , Rahul Vaze:
 Minimizing the Sum of Age of Information and Transmission Cost under Stochastic Arrival Model. 1-10
- Zicong Hong, Song Guo, Peng Li, Wuhui Chen: 
 Pyramid: A Layered Sharding Blockchain System. 1-10
- Zhuan Shi  , Shanyang Jiang, Lan Zhang, Yang Du, Xiang-Yang Li: , Shanyang Jiang, Lan Zhang, Yang Du, Xiang-Yang Li:
 Crowdsourcing System for Numerical Tasks based on Latent Topic Aware Worker Reliability. 1-10
- Guorui Yu, Shibin Zhao, Chao Zhang, Zhiniang Peng, Yuandong Ni, Xinhui Han: 
 Code is the (F)Law: Demystifying and Mitigating Blockchain Inconsistency Attacks Caused by Software Bugs. 1-10
- Doganalp Ergenç  , Mathias Fischer: , Mathias Fischer:
 On the Reliability of IEEE 802.1CB FRER. 1-10
- Vitalii Demianiuk, Chen Hajaj  , Kirill Kogan: , Kirill Kogan:
 PCL: Packet Classification with Limited Knowledge. 1-10
- Luoyao Hao, Henning Schulzrinne: 
 GOLDIE: Harmonization and Orchestration Towards a Global Directory for IoT. 1-10
- Shan Qu, Luoyi Fu, Xinbing Wang: 
 MIERank: Co-ranking Individuals and Communities with Multiple Interactions in Evolving Networks. 1-10
- Fengting Li, Xuankai Liu, Xiaoli Zhang, Qi Li, Kun Sun, Kang Li: 
 Detecting Localized Adversarial Examples: A Generic Approach using Critical Region Analysis. 1-10
- Ming Sun, Ya Su, Shenglin Zhang, Yuanpu Cao, Yuqing Liu, Dan Pei, Wenfei Wu, Yongsu Zhang, Xiaozhou Liu, Junliang Tang: 
 CTF: Anomaly Detection in High-Dimensional Time Series with Coarse-to-Fine Model Transfer. 1-10
- Zhiyuan Wang  , Hongli Xu, Jianchun Liu, He Huang, Chunming Qiao, Yangming Zhao: , Hongli Xu, Jianchun Liu, He Huang, Chunming Qiao, Yangming Zhao:
 Resource-Efficient Federated Learning with Hierarchical Aggregation in Edge Computing. 1-10
- Anirudh Sabnis, Tareq Si Salem  , Giovanni Neglia, Michele Garetto, Emilio Leonardi, Ramesh K. Sitaraman: , Giovanni Neglia, Michele Garetto, Emilio Leonardi, Ramesh K. Sitaraman:
 GRADES: Gradient Descent for Similarity Caching. 1-10
- Ying Wan  , Haoyu Song, Yang Xu , Haoyu Song, Yang Xu , Chuwen Zhang, Yi Wang, Bin Liu: , Chuwen Zhang, Yi Wang, Bin Liu:
 Adaptive Batch Update in TCAM: How Collective Optimization Beats Individual Ones. 1-10
- Kris Shrishak, Haya Schulmann: 
 Privacy Preserving and Resilient RPKI. 1-10
- Guoming Tang, Hao Yuan, Deke Guo, Kui Wu, Yi Wang: 
 Reusing Backup Batteries as BESS for Power Demand Reshaping in 5G and Beyond. 1-10
- Danfeng Shan, Peng Zhang, Wanchun Jiang, Hao Li, Fengyuan Ren: 
 Towards the Fairness of Traffic Policer. 1-10
- Junseon Kim, Youngbin Im, Kyunghan Lee  : :
 ECLAT: An ECN Marking System for Latency Guarantee in Cellular Networks. 1-10
- Shivang Aggarwal  , Moinak Ghoshal, Piyali Banerjee, Dimitrios Koutsonikolas, Joerg Widmer: , Moinak Ghoshal, Piyali Banerjee, Dimitrios Koutsonikolas, Joerg Widmer:
 802.11ad in Smartphones: Energy Efficiency, Spatial Reuse, and Impact on Applications. 1-10
- Daniel Uvaydov, Salvatore D'Oro, Francesco Restuccia, Tommaso Melodia  : :
 DeepSense: Fast Wideband Spectrum Sensing Through Real-Time In-the-Loop Deep Learning. 1-10
- Guoju Gao, He Huang, Mingjun Xiao, Jie Wu, Yu-e Sun, Sheng Zhang: 
 Auction-Based Combinatorial Multi-Armed Bandit Mechanisms with Strategic Arms. 1-10
- Ming Shi, Xiaojun Lin  , Lei Jiao , Lei Jiao : :
 Combining Regularization with Look-Ahead for Competitive Online Convex Optimization. 1-10
- Chen Gu, Ahmed Shokry  , Moustafa Youssef: , Moustafa Youssef:
 The Effect of Ground Truth Accuracy on the Evaluation of Localization Systems. 1-10
- Chao Liu  , Penghao Wang, Ruobing Jiang , Penghao Wang, Ruobing Jiang , Yanmin Zhu: , Yanmin Zhu:
 AMT: Acoustic Multi-target Tracking with Smartphone MIMO System. 1-10
- Jiajie Tan, S.-H. Gary Chan: 
 Efficient Association of Wi-Fi Probe Requests under MAC Address Randomization. 1-10
- Qi Wang  , Jianmin Liu, Katia Jaffrès-Runser, Yongqing Wang, Chentao He, Cunzhuang Liu, Yongjun Xu: , Jianmin Liu, Katia Jaffrès-Runser, Yongqing Wang, Chentao He, Cunzhuang Liu, Yongjun Xu:
 INCdeep: Intelligent Network Coding with Deep Reinforcement Learning. 1-10
- Jiangong Chen  , Xudong Qin, Guangyu Zhu, Bo Ji, Bin Li , Xudong Qin, Guangyu Zhu, Bo Ji, Bin Li : :
 Motion-Prediction-based Wireless Scheduling for Multi-User Panoramic Video Streaming. 1-10
- Apoorv Shukla, Kevin Nico Hudemann, Zsolt Vági, Lily Hügerich, Georgios Smaragdakis  , Artur Hecker, Stefan Schmid , Artur Hecker, Stefan Schmid , Anja Feldmann , Anja Feldmann : :
 Fix with P6: Verifying Programmable Switches at Runtime. 1-10
- Yongchao He, Wenfei Wu, Xuemin Wen, Haifeng Li, Yongqiang Yang: 
 Scalable On-Switch Rate Limiters for the Cloud. 1-10
- Ningning Hou  , Xianjin Xia, Yuanqing Zheng: , Xianjin Xia, Yuanqing Zheng:
 Jamming of LoRa PHY and Countermeasure. 1-10
- Xin Xie, Xiulong Liu, Song Guo, Heng Qi, Keqiu Li: 
 A Lightweight Integrity Authentication Approach for RFID-enabled Supply Chains. 1-10
- Daniel Yue Zhang, Ziyi Kou, Dong Wang: 
 FedSens: A Federated Learning Approach for Smart Health Sensing with Class Imbalance in Resource Constrained Edge Computing. 1-10
- Sunjung Kang, Atilla Eryilmaz, Changhee Joo: 
 Comparison of Decentralized and Centralized Update Paradigms for Remote Tracking of Distributed Dynamic Sources. 1-10
- Kapil Agrawal, Viral Mehta, Sundararajan Renganathan, Sreangsu Acharyya, Venkata N. Padmanabhan, Chakri Kotipalli, Liting Zhao: 
 Monitoring Cloud Service Unreachability at Scale. 1-10
- Lin Gu, Deze Zeng, Jie Hu, Bo Li, Hai Jin: 
 Layer Aware Microservice Placement and Request Scheduling at the Edge. 1-9
- Gaurang Naik, Jung-Min Jerry Park: 
 Coexistence of Wi-Fi 6E and 5G NR-U: Can We Do Better in the 6 GHz Bands? 1-10
- Qingyu Liu, Chengzhang Li, Y. Thomas Hou  , Wenjing Lou, Sastry Kompella , Wenjing Lou, Sastry Kompella : :
 Aion: A Bandwidth Optimized Scheduler with AoI Guarantee. 1-10
- Klaus-Tycho Foerster, Andrzej Kamisinski, Yvonne-Anne Pignolet, Stefan Schmid  , Gilles Trédan: , Gilles Trédan:
 Grafting Arborescences for Extra Resilience of Fast Rerouting Schemes. 1-10
- Verónica Toro-Betancur  , Gopika Premsankar , Gopika Premsankar , Mariusz Slabicki, Mario Di Francesco: , Mariusz Slabicki, Mario Di Francesco:
 Modeling Communication Reliability in LoRa Networks with Device-level Accuracy. 1-10
- Li Liu, Yuguang Yao, Zhichao Cao  , Mi Zhang: , Mi Zhang:
 DeepLoRa: Learning Accurate Path Loss Model for Long Distance Links in LPWAN. 1-10
- Daojing Guo  , Ping-Chun Hsieh , Ping-Chun Hsieh , I-Hong Hou: , I-Hong Hou:
 Optimal Wireless Scheduling for Remote Sensing through Brownian Approximation. 1-10
- Rajkarn Singh, Cengis Hasan, Xenofon Foukas, Marco Fiore, Mahesh K. Marina, Yue Wang  : :
 Energy-Efficient Orchestration of Metro-Scale 5G Radio Access Networks. 1-10
- Guiyun Fan, Yiran Zhao, Zilang Guo, Haiming Jin, Xiaoying Gan, Xinbing Wang: 
 Towards Fine-Grained Spatio-Temporal Coverage for Vehicular Urban Sensing Systems. 1-10
- Zhen Ling, Ruizhao Liu, Yue Zhang  , Kang Jia, Bryan Pearson, Xinwen Fu , Kang Jia, Bryan Pearson, Xinwen Fu , Junzhou Luo: , Junzhou Luo:
 Prison Break of Android Reflection Restriction and Defense. 1-10
- Mohammad Arif Ul Alam  , Md Mahmudur Rahman , Md Mahmudur Rahman , Jared Q. Widberg: , Jared Q. Widberg:
 PALMAR: Towards Adaptive Multi-inhabitant Activity Recognition in Point-Cloud Technology. 1-10
- Yan Huang, Y. Thomas Hou  , Wenjing Lou: , Wenjing Lou:
 A Deep-Learning-based Link Adaptation Design for eMBB/URLLC Multiplexing in 5G NR. 1-10
- Zipeng Dai, Hao Wang, Chi Harold Liu  , Rui Han, Jian Tang, Guoren Wang: , Rui Han, Jian Tang, Guoren Wang:
 Mobile Crowdsensing for Data Freshness: A Deep Reinforcement Learning Approach. 1-10
- Erwan Le Merrer, Benoît Morgan, Gilles Trédan: 
 Setting the Record Straighter on Shadow Banning. 1-10
- Guanxiong Shen, Junqing Zhang, Alan Marshall, Linning Peng, Xianbin Wang  : :
 Radio Frequency Fingerprint Identification for LoRa Using Spectrogram and CNN. 1-10
- Bingnan Hou, Zhiping Cai, Kui Wu, Jinshu Su, Yinqiao Xiong: 
 6Hit: A Reinforcement Learning-based Approach to Target Generation for Internet-wide IPv6 Scanning. 1-10
- Wonbin Park, Dokyun Ryoo, Changhee Joo, Saewoong Bahk: 
 BLESS: BLE-aided Swift Wi-Fi Scanning in Multi-protocol IoT Networks. 1-10
- Shicheng Wang  , Menghao Zhang , Menghao Zhang , Guanyu Li, Chang Liu, Ying Liu, Xuya Jia, Mingwei Xu: , Guanyu Li, Chang Liu, Ying Liu, Xuya Jia, Mingwei Xu:
 Making Multi-String Pattern Matching Scalable and Cost-Efficient with Programmable Switching ASICs. 1-10
- Gyeongsik Yang  , Yeonho Yoo , Yeonho Yoo , Minkoo Kang, Heesang Jin, Chuck Yoo: , Minkoo Kang, Heesang Jin, Chuck Yoo:
 Bandwidth Isolation Guarantee for SDN Virtual Networks. 1-10
- Yong Huang, Xiang Li, Wei Wang, Tao Jiang, Qian Zhang  : :
 Towards Cross-Modal Forgery Detection and Localization on Live Surveillance Videos. 1-10
- Enge Song, Tian Pan  , Chenhao Jia, Wendi Cao, Jiao Zhang, Tao Huang , Chenhao Jia, Wendi Cao, Jiao Zhang, Tao Huang , Yunjie Liu: , Yunjie Liu:
 INT-label: Lightweight In-band Network-Wide Telemetry via Interval-based Distributed Labelling. 1-10
- Yiwen Song  , Haiming Jin: , Haiming Jin:
 Minimizing Entropy for Crowdsourcing with Combinatorial Multi-Armed Bandit. 1-10
- Yiding Wang  , Weiyan Wang , Weiyan Wang , Duowen Liu, Xin Jin, Junchen Jiang, Kai Chen: , Duowen Liu, Xin Jin, Junchen Jiang, Kai Chen:
 Enabling Edge-Cloud Video Analytics for Robotics Applications. 1-10
- Kaiyan Cui, Yanwen Wang  , Yuanqing Zheng, Jinsong Han: , Yuanqing Zheng, Jinsong Han:
 ShakeReader: 'Read' UHF RFID using Smartphone. 1-10
- Shaohuai Shi, Xiaowen Chu, Bo Li: 
 Exploiting Simultaneous Communications to Accelerate Data Parallel Distributed Deep Learning. 1-10
- Adrian-Cristian Nicolaescu  , Spyridon Mastorakis, Ioannis Psaras: , Spyridon Mastorakis, Ioannis Psaras:
 Store Edge Networked Data (SEND): A Data and Performance Driven Edge Storage Framework. 1-10
- Xia Cheng, Junyang Shi, Mo Sha  , Linke Guo: , Linke Guo:
 Launching Smart Selective Jamming Attacks in WirelessHART Networks. 1-10
- Long Chen, Feilong Tang, Xu Li: 
 Mobility- and Load-Adaptive Controller Placement and Assignment in LEO Satellite Networks. 1-10
- Jiasi Weng, Jian Weng  , Hongwei Huang, Chengjun Cai , Hongwei Huang, Chengjun Cai , Cong Wang: , Cong Wang:
 FedServing: A Federated Prediction Serving Framework Based on Incentive Mechanism. 1-10
- Shujun Zhuang, Jian Zhao, Jian Li, Ping Yu, Yuwei Zhang, Haibing Guan: 
 HAVS: Hardware-accelerated Shared-memory-based VPP Network Stack. 1-10
- Hao Zhou, Zhao Chen, Wangqiu Zhou, Haisheng Tan, Panlong Yang, Xiang-Yang Li: 
 Camel: Context-Aware Magnetic MIMO Wireless Power Transfer with In-band Communication. 1-10
- Ahmed M. Abdelmoniem  , Marco Canini , Marco Canini : :
 DC2: Delay-aware Compression Control for Distributed Machine Learning. 1-10
- Yadong Xie, Fan Li, Yue Wu, Yu Wang: 
 HearFit: Fitness Monitoring on Smart Speakers via Active Acoustic Sensing. 1-10
- Liyi Zeng  , Yang Chen, Shuo Chen, Xian Zhang, Zhongxin Guo, Wei Xu, Thomas Moscibroda: , Yang Chen, Shuo Chen, Xian Zhang, Zhongxin Guo, Wei Xu, Thomas Moscibroda:
 Characterizing Ethereum's Mining Power Decentralization at a Deeper Level. 1-10
- Guowen Gong, Zhirong Shen, Suzhen Wu, Xiaolu Li, Patrick P. C. Lee: 
 Optimal Rack-Coordinated Updates in Erasure-Coded Data Centers. 1-10
- Wanyu Lin, Baochun Li: 
 Medley: Predicting Social Trust in Time-Varying Online Social Networks. 1-10
- Jian Xu  , Shao-Lun Huang, Linqi Song , Shao-Lun Huang, Linqi Song , Tian Lan: , Tian Lan:
 Live Gradient Compensation for Evading Stragglers in Distributed Learning. 1-10
- Eunju Yang, Chan-Hyun Youn: 
 Individual Load Forecasting for Multi-Customers with Distribution-aware Temporal Pooling. 1-10
- Zeyu Meng, Hongli Xu, Min Chen, Yang Xu, Yangming Zhao, Chunming Qiao: 
 Learning-Driven Decentralized Machine Learning in Resource-Constrained Wireless Edge Computing. 1-10
- Junshan Zhang, Na Li, Mehmet Dedeoglu: 
 Federated Learning over Wireless Networks: A Band-limited Coordinated Descent Approach. 1-10
- Zichuan Xu, Haozhe Ren, Weifa Liang  , Qiufen Xia, Wanlei Zhou , Qiufen Xia, Wanlei Zhou , Guowei Wu, Pan Zhou: , Guowei Wu, Pan Zhou:
 Near Optimal and Dynamic Mechanisms Towards a Stable NFV Market in Multi-Tier Cloud Networks. 1-10
- Yang Wang, Yong Zhang, Xinxin Han, Pengfei Wang, Chengzhong Xu  , Joseph Horton, Joseph C. Culberson: , Joseph Horton, Joseph C. Culberson:
 Cost-Driven Data Caching in the Cloud: An Algorithmic Approach. 1-10
- Xudong Qin, Bin Li  , Lei Ying , Lei Ying : :
 Distributed Threshold-based Offloading for Large-Scale Mobile Cloud Computing. 1-10
- Linwei Niu: 
 Fault-Tolerant Energy Management for Real-Time Systems with Weakly Hard QoS Assurance. 1-10
- Jingdi Chen  , Yimeng Wang, Tian Lan: , Yimeng Wang, Tian Lan:
 Bringing Fairness to Actor-Critic Reinforcement Learning for Network Utility Optimization. 1-10
- Maciej Pacut, Mahmoud Parham, Stefan Schmid  : :
 Optimal Online Balanced Graph Partitioning. 1-9
- Ben Niu, Yahong Chen, Boyang Wang, Zhibo Wang, Fenghua Li, Jin Cao: 
 AdaPDP: Adaptive Personalized Differential Privacy. 1-10
- Keerthi Priya Dasala, Josep Miquel Jornet, Edward W. Knightly: 
 Uplink Multi-User Beamforming on Single RF Chain mmWave WLANs. 1-10
- Jiahui Li, Hui Kang, Geng Sun, Shuang Liang, Yanheng Liu, Ying Zhang: 
 Physical Layer Secure Communications Based on Collaborative Beamforming for UAV Networks: A Multi-objective Optimization Approach. 1-10
- Vishwaraj Doshi  , Shailaja Mallick, Do Young Eun: , Shailaja Mallick, Do Young Eun:
 Competing Epidemics on Graphs - Global Convergence and Coexistence. 1-10
- Florin Ciucu, Felix Poloczek, Lydia Y. Chen, Martin Chan: 
 Practical Analysis of Replication-Based Systems. 1-10
- Luyang Liu, Marco Gruteser: 
 EdgeSharing: Edge Assisted Real-time Localization and Object Sharing in Urban Streets. 1-10
- Yuhui Zhang, Dejun Yang  , Guoliang Xue, Ruozhou Yu , Guoliang Xue, Ruozhou Yu : :
 Counter-Collusion Smart Contracts for Watchtowers in Payment Channel Networks. 1-10
- Giulio Grassi, Renata Teixeira, Chadi Barakat, Mark Crovella: 
 Leveraging Website Popularity Differences to Identify Performance Anomalies. 1-10
- Wenquan Xu, Haoyu Song, Linyang Hou, Hui Zheng  , Xinggong Zhang, Chuwen Zhang, Wei Hu, Yi Wang, Bin Liu: , Xinggong Zhang, Chuwen Zhang, Wei Hu, Yi Wang, Bin Liu:
 SODA: Similar 3D Object Detection Accelerator at Network Edge for Autonomous Driving. 1-10
- Wenhan Zhang  , Mingjie Feng, Marwan Krunz, Amirhossein Yazdani Abyaneh: , Mingjie Feng, Marwan Krunz, Amirhossein Yazdani Abyaneh:
 Signal Detection and Classification in Shared Spectrum: A Deep Learning Approach. 1-10
- Erma Perenda, Sreeraj Rajendran, Gérôme Bovet, Sofie Pollin, Mariya Zheleva: 
 Learning the unknown: Improving modulation classification performance in unseen scenarios. 1-10
- Xi Zhang, Jingqing Wang, H. Vincent Poor  : :
 Statistical Delay and Error-Rate Bounded QoS Provisioning for 6G mURLLC Over AoI-Driven and UAV-Enabled Wireless Networks. 1-10
- Jiaqi Zheng, Yimeng Xu, Li Wang, Haipeng Dai  , Guihai Chen , Guihai Chen : :
 Online Joint Optimization on Traffic Engineering and Network Update in Software-defined WANs. 1-10
- Johannes Blobel, Tran Huy Vu, Archan Misra  , Falko Dressler: , Falko Dressler:
 Low-Power Downlink for the Internet of Things using IEEE 802.11-compliant Wake-Up Receivers. 1-10
- Liang Li, Dian Shi, Ronghui Hou, Hui Li, Miao Pan, Zhu Han: 
 To Talk or to Work: Flexible Communication Compression for Energy Efficient Federated Learning over Heterogeneous Mobile Edge Devices. 1-10
- Bruno Missi Xavier, Rafael Silva Guimarães, Giovanni Comarela, Magnos Martinello: 
 Programmable Switches for in-Networking Classification. 1-10
- Yunxiang Cai  , Hongzi Zhu, Xiao Wang, Shan Chang, Jiangang Shen, Minyi Guo: , Hongzi Zhu, Xiao Wang, Shan Chang, Jiangang Shen, Minyi Guo:
 Distributed Neighbor Distribution Estimation with Adaptive Compressive Sensing in VANETs. 1-10
- Ismael Castell-Uroz  , Josep Solé-Pareta, Pere Barlet-Ros: , Josep Solé-Pareta, Pere Barlet-Ros:
 TrackSign: Guided Web Tracking Discovery. 1-10
- Xu Wang, Zheng Yang, Jiahang Wu, Yi Zhao, Zimu Zhou: 
 EdgeDuet: Tiling Small Object Detection for Edge Assisted Autonomous Mobile Vision. 1-10
- Matthew Bradbury  , Arshad Jhumka, Tim Watson: , Arshad Jhumka, Tim Watson:
 Trust Trackers for Computation Offloading in Edge-Based IoT Networks. 1-10
- Jose A. Ayala-Romero, Andres Garcia-Saavedra, Xavier Costa-Pérez  , George Iosifidis: , George Iosifidis:
 Bayesian Online Learning for Energy-Aware Resource Orchestration in Virtualized RANs. 1-10
- Yakun Huang, Hongru Zhao, Xiuquan Qiao, Jian Tang, Ling Liu  : :
 Towards Video Streaming Analysis and Sharing for Multi-Device Interaction with Lightweight DNNs. 1-10
- Yongquan Fu  , Lun An, Siqi Shen, Kai Chen, Pere Barlet-Ros: , Lun An, Siqi Shen, Kai Chen, Pere Barlet-Ros:
 Jellyfish: Locality-Sensitive Subflow Sketching. 1-10
- Hongbo Liu, Yan Wang  , Yanzhi Ren, Yingying Chen: , Yanzhi Ren, Yingying Chen:
 Bipartite Graph Matching Based Secret Key Generation. 1-10
- Sijiang Huang, Mowei Wang, Yong Cui: 
 Traffic-aware Buffer Management in Shared Memory Switches. 1-10
- Yangming Zhao, Chunming Qiao: 
 Redundant Entanglement Provisioning and Selection for Throughput Maximization in Quantum Networks. 1-10
- Alessio Sacco, Matteo Flocco, Flavio Esposito, Guido Marchetto: 
 Owl: Congestion Control with Partially Invisible Networks via Reinforcement Learning. 1-10
- Yetong Cao, Huijie Chen, Fan Li, Yu Wang: 
 CanalScan: Tongue-Jaw Movement Recognition via Ear Canal Deformation Sensing. 1-10
- Chao Huang, Haoran Yu, Jianwei Huang, Randall A. Berry: 
 Strategic Information Revelation in Crowdsourcing Systems Without Verification. 1-10
- Marie Siew  , Kun Guo , Kun Guo , Desmond W. H. Cai, Lingxiang Li, Tony Q. S. Quek , Desmond W. H. Cai, Lingxiang Li, Tony Q. S. Quek : :
 Let's Share VMs: Optimal Placement and Pricing across Base Stations in MEC Systems. 1-10
- Long Chen, Feilong Tang, Zhetao Li, Laurence T. Yang, Jiadi Yu, Bin Yao: 
 Time-Varying Resource Graph Based Resource Model for Space-Terrestrial Integrated Networks. 1-10
- Xianda Chen, Tianxiang Tan, Guohong Cao: 
 Popularity-Aware 360-Degree Video Streaming. 1-10
- Christopher Leet, Robert Soulé  , Yang Richard Yang, Ying Zhang: , Yang Richard Yang, Ying Zhang:
 Flow Algebra: Towards an Efficient, Unifying Framework for Network Management Tasks. 1-10
- Meng Jia, Kun He, Jing Chen, Ruiying Du, Weihang Chen, Zhihong Tian, Shouling Ji: 
 PROCESS: Privacy-Preserving On-Chain Certificate Status Service. 1-10
- Yijie Li, Yi-Chao Chen, Xiaoyu Ji, Hao Pan, Lanqing Yang, Guangtao Xue, Jiadi Yu: 
 ScreenID: Enhancing QRCode Security by Fingerprinting Screens. 1-10
- Dong-Jun Han  , Jy-yong Sohn, Jaekyun Moon: , Jy-yong Sohn, Jaekyun Moon:
 TiBroco: A Fast and Secure Distributed Learning Framework for Tiered Wireless Edge Networks. 1-10
- Jorik Oostenbrink, Fernando A. Kuipers: 
 Going the Extra Mile with Disaster-Aware Network Augmentation. 1-10
- Chonghuan Wang, Yiwen Song, Yifei Wei, Guiyun Fan, Haiming Jin, Fan Zhang: 
 Towards Minimum Fleet for Ridesharing-Aware Mobility-on-Demand Systems. 1-10
- Ying Zheng, Haoyu Chen  , Qingyang Duan , Qingyang Duan , Lixiang Lin, Yiyang Shao, Wei Wang, Xin Wang, Yuedong Xu: , Lixiang Lin, Yiyang Shao, Wei Wang, Xin Wang, Yuedong Xu:
 Leveraging Domain Knowledge for Robust Deep Reinforcement Learning in Networking. 1-10
- Biplav Choudhury  , Vijay K. Shah, Avik Dayal, Jeffrey H. Reed , Vijay K. Shah, Avik Dayal, Jeffrey H. Reed : :
 Joint Age of Information and Self Risk Assessment for Safer 802.11p based V2V Networks. 1-10
- Salvatore D'Oro, Francesco Restuccia, Tommaso Melodia  : :
 Can You Fix My Neural Network? Real-Time Adaptive Waveform Synthesis for Resilient Wireless Signal Classification. 1-10
- Yanzhi Ren, Ping Wen, Hongbo Liu, Zhourong Zheng, Yingying Chen, Pengcheng Huang, Hongwei Li: 
 Proximity-Echo: Secure Two Factor Authentication Using Active Sound Sensing. 1-10
- Livia Elena Chatzieleftheriou  , Apostolos Destounis, Georgios S. Paschos, Iordanis Koutsopoulos: , Apostolos Destounis, Georgios S. Paschos, Iordanis Koutsopoulos:
 Blind Optimal User Association in Small-Cell Networks. 1-10
- Xingyan Chen  , Changqiao Xu, Mu Wang, Zhonghui Wu, Shujie Yang, Lujie Zhong, Gabriel-Miro Muntean: , Changqiao Xu, Mu Wang, Zhonghui Wu, Shujie Yang, Lujie Zhong, Gabriel-Miro Muntean:
 A Universal Transcoding and Transmission Method for Livecast with Networked Multi-Agent Reinforcement Learning. 1-10
- Yuval Emek, Shay Kutten, Mordechai Shalom, Shmuel Zaks: 
 Multicast Communications with Varying Bandwidth Constraints. 1-10
- Xuecheng Liu, Luoyi Fu, Xinbing Wang, John E. Hopcroft: 
 ProHiCo: A Probabilistic Framework to Hide Communities in Large Networks. 1-10
- Zhenlin An  , Qiongzheng Lin, Qingrui Pan , Qiongzheng Lin, Qingrui Pan , Lei Yang: , Lei Yang:
 Turbocharging Deep Backscatter Through Constructive Power Surges with a Single RF Source. 1-10
- Qiang Liu, Tao Han, Jiang (Linda) Xie, BaekGyu Kim  : :
 LiveMap: Real-Time Dynamic Map in Automotive Edge Computing. 1-10
- Tao Li, Dianqi Han, Jiawei Li, Ang Li, Yan Zhang, Rui Zhang, Yanchao Zhang: 
 Your Home is Insecure: Practical Attacks on Wireless Home Alarm Systems. 1-10
- Ning Wang  , Yimin Chen, Yang Hu, Wenjing Lou, Y. Thomas Hou , Yimin Chen, Yang Hu, Wenjing Lou, Y. Thomas Hou : :
 MANDA: On Adversarial Example Detection for Network Intrusion Detection System. 1-10
- Xiaoliang Wang, Hexiang Song, Cam-Tu Nguyen, Dongxu Cheng, Tiancheng Jin: 
 Maximizing the Benefit of RDMA at End Hosts. 1-10
- Syuan-Cheng Chen, Chi-Yu Li  , Chui-Hao Chiu: , Chui-Hao Chiu:
 An Experience Driven Design for IEEE 802.11ac Rate Adaptation based on Reinforcement Learning. 1-10
- Zhicong Zhong, Yipeng Zhou  , Di Wu, Xu Chen, Min Chen, Chao Li, Quan Z. Sheng , Di Wu, Xu Chen, Min Chen, Chao Li, Quan Z. Sheng : :
 P-FedAvg: Parallelizing Federated Learning with Theoretical Guarantees. 1-10
- Aygün Baltaci, Markus Klügel, Fabien Geyer, Svetoslav Duhovnikov, Vaibhav Bajpai  , Jörg Ott, Dominic Schupke: , Jörg Ott, Dominic Schupke:
 Experimental UAV Data Traffic Modeling and Network Performance Analysis. 1-10
- János Tapolcai, Zsombor L. Hajdú, Alija Pasic, Pin-Han Ho, Lajos Rónyai: 
 On Network Topology Augmentation for Global Connectivity under Regional Failures. 1-10
- Jean-Romain Luttringer, Quentin Bramas, Cristel Pelsser  , Pascal Mérindol: , Pascal Mérindol:
 A Fast-Convergence Routing of the Hot-Potato. 1-10
- Haoran Wan  , Shuyu Shi, Wenyu Cao, Wei Wang, Guihai Chen , Shuyu Shi, Wenyu Cao, Wei Wang, Guihai Chen : :
 RespTracker: Multi-user Room-scale Respiration Tracking with Commercial Acoustic Devices. 1-10
- Dianhan Xie, Xudong Wang, Aimin Tang, Hongzi Zhu: 
 POLO: Localizing RFID-Tagged Objects for Mobile Robots. 1-10
- Chuanting Zhang  , Shuping Dang, Basem Shihada , Shuping Dang, Basem Shihada , Mohamed-Slim Alouini , Mohamed-Slim Alouini : :
 Dual Attention-Based Federated Learning for Wireless Traffic Prediction. 1-10
- Zhiyuan Wang, Lin Gao, Jianwei Huang: 
 Taming Time-Varying Information Asymmetry in Fresh Status Acquisition. 1-10
- Pu Wang, Long Jiao, Kai Zeng, Zheng Yan: 
 Physical Layer Key Generation between Backscatter Devices over Ambient RF Signals. 1-10
- Penglin Dai, Kaiwen Hu, Xiao Wu, Huanlai Xing  , Zhaofei Yu: , Zhaofei Yu:
 Asynchronous Deep Reinforcement Learning for Data-Driven Task Offloading in MEC-Empowered Vehicular Networks. 1-10
- Junqi Zhang, Zheng Li, Wenzheng Xu, Jian Peng, Weifa Liang  , Zichuan Xu, Xiaojiang Ren, Xiaohua Jia: , Zichuan Xu, Xiaojiang Ren, Xiaohua Jia:
 Minimizing the Number of Deployed UAVs for Delay-bounded Data Collection of IoT Devices. 1-10
- Jiawei Zhang, Suhong Chen, Xudong Wang, Yifei Zhu: 
 DeepReserve: Dynamic Edge Server Reservation for Connected Vehicles with Deep Reinforcement Learning. 1-10
- Leonardo Bonati  , Salvatore D'Oro, Francesco Restuccia, Stefano Basagni, Tommaso Melodia , Salvatore D'Oro, Francesco Restuccia, Stefano Basagni, Tommaso Melodia : :
 SteaLTE: Private 5G Cellular Connectivity as a Service with Full-stack Wireless Steganography. 1-10
- Yupeng Li, Ben Liang  , Ali Tizghadam: , Ali Tizghadam:
 Robust Online Learning against Malicious Manipulation with Application to Network Flow Classification. 1-10
- Gonglong Chen, Wei Dong, Jiamei Lv: 
 LoFi: Enabling 2.4GHz LoRa and WiFi Coexistence by Detecting Extremely Weak Signals. 1-10
- Lin Chen, Anastasios Giovanidis  , Wei Wang, Shan Lin: , Wei Wang, Shan Lin:
 Sequential Resource Access: Theory and Algorithm. 1-10
- Viviana Arrigoni, Novella Bartolini, Annalisa Massini, Federico Trombetti: 
 Failure Localization through Progressive Network Tomography. 1-10
- Zhongdong Liu, Yu Sang, Bin Li  , Bo Ji: , Bo Ji:
 A Worst-Case Approximate Analysis of Peak Age-of-Information Via Robust Queueing Approach. 1-10
- Jun Ma, Yanxiao Liu, Shenghao Yang: 
 Rate Region of Scheduling a Wireless Network with Discrete Propagation Delays. 1-10
- Jianyi Yang, Shaolei Ren: 
 Bandit Learning with Predicted Context: Regret Analysis and Selective Context Query. 1-10
- Igor Kadota, Eytan H. Modiano: 
 Age of Information in Random Access Networks with Stochastic Arrivals. 1-10
- Arnaud Dethise  , Marco Canini , Marco Canini , Nina Narodytska: , Nina Narodytska:
 Analyzing Learning-Based Networked Systems with Formal Verification. 1-10
- Qingqing Ye  , Haibo Hu, Ninghui Li, Xiaofeng Meng, Huadi Zheng, Haotian Yan: , Haibo Hu, Ninghui Li, Xiaofeng Meng, Huadi Zheng, Haotian Yan:
 Beyond Value Perturbation: Local Differential Privacy in the Temporal Setting. 1-10
- Alberto Martínez Alba, Péter Babarczi, Andreas Blenk, Mu He, Patrick Kalmbach, Johannes Zerwas, Wolfgang Kellerer  : :
 Modeling the Cost of Flexibility in Communication Networks. 1-10
- Rui Ning, Jiang Li, Chunsheng Xin, Hongyi Wu: 
 Invisible Poison: A Blackbox Clean Label Backdoor Attack to Deep Neural Networks. 1-10
- Bangwen Deng, Wenfei Wu: 
 NFReducer: Redundant Logic Elimination for Network Functions with Runtime Configurations. 1-10
- Pengfei Wang  , Matteo Varvello, Chunhe Ni, Ruiyun Yu, Aleksandar Kuzmanovic: , Matteo Varvello, Chunhe Ni, Ruiyun Yu, Aleksandar Kuzmanovic:
 Web-LEGO: Trading Content Strictness for Faster Webpages. 1-10
- Xi Zhang, Jingqing Wang, H. Vincent Poor  : :
 Optimal Resource Allocation for Statistical QoS Provisioning in Supporting mURLLC Over FBC-Driven 6G Terahertz Wireless Nano-Networks. 1-10
- Su Wang, Mengyuan Lee, Seyyedali Hosseinalipour, Roberto Morabito, Mung Chiang, Christopher G. Brinton  : :
 Device Sampling for Heterogeneous Federated Learning: Theory, Algorithms, and Implementation. 1-10
- Kun Xie, Jiazheng Tian, Gaogang Xie, Guangxing Zhang, Dafang Zhang: 
 Low Cost Sparse Network Monitoring Based on Block Matrix Completion. 1-10
- Youri Raaijmakers  , Sem C. Borst, Onno J. Boxma: , Sem C. Borst, Onno J. Boxma:
 Threshold-based rerouting and replication for resolving job-server affinity relations. 1-10
- Tongyu Zong, Chen Li  , Yuanyuan Lei, Guangyu Li, Houwei Cao , Yuanyuan Lei, Guangyu Li, Houwei Cao , Yong Liu , Yong Liu : :
 Cocktail Edge Caching: Ride Dynamic Trends of Content Popularity with Ensemble Learning. 1-10
- Jiapeng Zhang, Luoyi Fu, Xinbing Wang, Guihai Chen  : :
 De-anonymizing Social Networks Under Partial Overlap: An F-score Based Approach. 1-10
- Tianyu Cui  , Gaopeng Gou, Gang Xiong , Gaopeng Gou, Gang Xiong , Chang Liu, Peipei Fu, Zhen Li: , Chang Liu, Peipei Fu, Zhen Li:
 6GAN: IPv6 Multi-Pattern Target Generation via Generative Adversarial Nets with Reinforcement Learning. 1-10
- Farzam Hejazi, Katarina Vuckovic, Nazanin Rahnavard: 
 DyLoc: Dynamic Localization for Massive MIMO Using Predictive Recurrent Neural Networks. 1-9
- JunNyung Hur  , Hahoon Jeon, Hyeon Gy Shon, Young Jae Kim, MyungKeun Yoon , Hahoon Jeon, Hyeon Gy Shon, Young Jae Kim, MyungKeun Yoon : :
 Finding Critical Files from a Packet. 1-10
- Menglu Yu, Chuan Wu  , Bo Ji , Bo Ji , Jia Liu: , Jia Liu:
 A Sum-of-Ratios Multi-Dimensional-Knapsack Decomposition for DNN Resource Scheduling. 1-10
- Christos Tsanikidis, Javad Ghaderi: 
 Randomized Scheduling of Real-Time Traffic in Wireless Networks Over Fading Channels. 1-10
- Lin Gu, Deze Zeng, Jie Hu, Hai Jin, Song Guo, Albert Y. Zomaya  : :
 Exploring Layered Container Structure for Cost Efficient Microservice Deployment. 1-9
- Kun Xie, Siqi Li, Xin Wang, Gaogang Xie, Yudian Ouyang  : :
 Expectile Tensor Completion to Recover Skewed Network Monitoring Data. 1-10
- Weiting Li, Liyao Xiang, Zhou Zhou, Feng Peng: 
 Privacy Budgeting for Growing Machine Learning Datasets. 1-10

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


 Google
Google Google Scholar
Google Scholar Semantic Scholar
Semantic Scholar Internet Archive Scholar
Internet Archive Scholar CiteSeerX
CiteSeerX ORCID
ORCID














