default search action
INFOCOM 2023: Hoboken, NJ, USA - Workshops
- IEEE INFOCOM 2023 - IEEE Conference on Computer Communications Workshop, Hoboken, NJ, USA, May 20, 2023. IEEE 2023, ISBN 978-1-6654-9427-4
- Yuexiu Xing, Xiaoxing Chen, Junqing Zhang, Aiqun Hu, Dengyin Zhang:
A Noise-Robust Radio Frequency Fingerprint Identification Scheme for Internet of Things Devices. 1-6 - Jakub Cabal, Vladislav Válek, Martin Spinler, Daniel Kondys, Jan Korenek:
400G Ethernet Packet Capture Demo Based on Network Development Kit for FPGAs. 1-2 - Gustavo Zanatta Bruno, Vikas Krishnan Radhakrishnan, Gabriel Matheus de Almeida, Alexandre Huff, Aloizio Pereira da Silva, Kleber Vieira Cardoso, Luiz A. DaSilva, Cristiano Bonato Both:
RIC-O: An Orchestrator for the Dynamic Placement of a Disaggregated RAN Intelligent Controller. 1-2 - Mario Chahoud, Azzam Mourad, Hadi Otrok, Mohsen Guizani:
Towards Trust Driven On-Demand Client Deployment in Federated Learning. 1-6 - Prithwi Bagchi, Basudeb Bera, Raj Maheshwari, Ashok Kumar Das, David K. Y. Yau, Biplab Sikdar:
An Efficient and Secure Post-Quantum Multi-Authority Ciphertext-Policy Attribute-Based Encryption Method Using Lattice. 1-6 - Venkata Srirama Rohit Kantheti, Shih-Chun Lin, Liang C. Chu:
SPELS: Scalable and Programmable Testbed for Evaluating LEO Satellite Swarm Communications. 1-6 - Naresh Babu Kakarla, V. Mahendran:
Lyapunov Meets Thompson: Learning-Based Energy-Efficient UAV Communication with Queuing Stability Constraints. 1-7 - Wenhan Yu, Terence Jie Chua, Jun Zhao:
Multi-Agent Deep Reinforcement Learning for Digital Twin over 6G Wireless Communication in the Metaverse. 1-6 - Lanier A. Watkins, Denzel Hamilton, Chad Mello, Tyler A. Young, Sebastián A. Zanlongo, Barbara Kobzik-Juul, Randall Sleight:
A Hasty Grid S&R Prototype Using Autonomous UTM and AI-Based Mission Coordination. 1-6 - Zakaria Abou El Houda, Hajar Moudoud, Bouziane Brik, Lyes Khoukhi:
Securing Federated Learning through Blockchain and Explainable AI for Robust Intrusion Detection in IoT Networks. 1-6 - Chen Peng, Quanyan Zhu:
Trust-Aware Resource Management for Secure and Optimal Network Slicing in 5G Mobile Edge Networks. 1-6 - Fangfang Yang, Shijin Duan, Xiaolin Xu, Shaolei Ren:
Achieving Certified Robustness for Brain-Inspired Low-Dimensional Computing Classifiers. 1-6 - Pratchaya Jaisudthi, Shadi Moazzeni, Xenofon Vasilakos, Reza Nejabati, Dimitra Simeonidou:
i-Profiler: Towards Multi-Objective Autonomous VNF Profiling with Reinforcement Learning. 1-6 - Linh-An Phan, Dirk Pesch, Utz Roedig, Cormac J. Sreenan:
Demonstration of LAN-type Communication for an Industrial 5G Network. 1-2 - Yuwei Long, Nan Cen:
Q-Learning for Sum-Throughput Optimization in Wireless Visible-Light UAV Networks. 1-6 - Shupeng Zhang, Yibin Zhang, Xixi Zhang, Yang Peng, Jinlong Sun, Guan Gui, Tomoaki Ohtsuki:
Radio Frequency Signal Dataset Generation Based on LTE System and Variable Channels. 1-5 - Antonio Cianfrani, Davide Aureli, Marco Listanti, Marco Polverini:
Multi Agent Reinforcement Learning Based Local Routing Strategy to Reduce End-to-End Delays in Segment Routing Networks. 1-6 - Cezary Adamczyk, Adrian Kliks:
Detection and mitigation of indirect conflicts between xApps in Open Radio Access Networks. 1-2 - Riya Kakkar, Aparna Kumari, Rajesh Gupta, Smita Agrawal, Sudeep Tanwar:
Artificial Neural Network and Game Theory for Secure Optimal Charging Station Selection for EVs. 1-6 - Chong Chen, Ying Gao, Siquan Huang, Xingfu Yan:
Avoid attacks: A Federated Data Sanitization Defense in IoMT Systems. 1-6 - Chao Sun, Jianxin Liao, Jiangong Zheng, Xiaotong Guo, Tongyu Song, Jing Ren, Ping Zhang, Yongjie Nie, Siyang Liu:
ADAPTER: A DRL-Based Approach to Tune Routing in WSNs. 1-6 - Tingting Yang, Yujia Huo, Chengzhuo Han, Xin Sun:
Multi-Agent Distributed Cooperative Routing for Maritime Emergency Communication. 1-6 - Mohiuddin Ahmed, Clark Pagutaisidro, Apichart Alexander Pike, Yuting Yang, Al-Sakib Khan Pathan:
RansomCoin: A New Dataset for Analysing Cryptocurrency Transactions - Addressing a Gap in the Literature. 1-6 - Jianmeng Guo, Huan Zhou, Liang Zhao, Wei Chang, Tingyao Jiang:
Incentive-driven and SAC-based Resource Allocation and Offloading Strategy in Vehicular Edge Computing Networks. 1-6 - Tianqi Zhou, Jian Shen, Pandi Vijayakumar, Md. Zakirul Alam Bhuiyan, Sivaraman Audithan:
Anonymous Authentication Scheme for Federated Learning. 1-6 - Zihao Xiong, Kaisa Zhang, Gang Chuai, Xu Yang, Yichao Xu:
Intelligent Cellular Traffic Prediction in Open-RAN Based on Cross-Domain Data Fusion. 1-6 - Francesco Betti Sorbelli, Punyasha Chatterjee, Federico Coro, Lorenzo Palazzetti, Cristina M. Pinotti:
A Novel Multi-Layer Framework for BVLoS Drone Operation: A Preliminary Study. 1-6 - Xiao Chen:
A Scalable Byzantine Consensus Parallelism and its Practical Implementation. 1-2 - Zhengqiang Wang, Zhen Zhang, Xiaoyu Wan, Zi-fu Fan:
Resource Allocation for UAV-assisted Two-way Relay System Under Hardware Impairments. 1-6 - Yunfei Ge, Tao Li, Quanyan Zhu:
Scenario-Agnostic Zero-Trust Defense with Explainable Threshold Policy: A Meta-Learning Approach. 1-6 - Alicia Esquivel Morel, Durbek Gafurov, Prasad Calyam, Cong Wang, Komal Thareja, Anirban Mandal, Eric Lyons, Michael Zink, George Papadimitriou, Ewa Deelman:
Experiments on Network Services for Video Transmission using FABRIC Instrument Resources. 1-6 - Jiarun Yu, Zhongqiu He, Sicheng Zhang, Yu Han, Hang Jiang:
Homomorphic Filtering Adversarial Defense for Automatic Modulation Classification. 1-6 - Narayana Murari Gowrishetty, Sai Sree Laya Chukkapalli, Anupam Joshi:
Bewitching the Battlefield: Repurposing the MouseJack Attack for Crazyflie Drones. 1-6 - Ricardo Harrilal-Parchment, Isabela Fernandez Pujol, Kemal Akkaya:
Performance Evaluation of Quantum-Resistant Open Fronthaul Communications in 5G. 1-6 - Zheng Zhou, Xiong Ling, Feng Xu, Xianhua Niu, Peng Chen:
An Appointed Access Control Scheme for Distributed-Cloud Environment. 1-7 - Harshit Ambalkar, Tianya Zhao, Xuyu Wang, Shiwen Mao:
Adversarial Attack and Defense for WiFi-based Apnea Detection System. 1-2 - Cuidi Wei, Ahan Kak, Nakjung Choi, Timothy Wood:
Towards a Scalable 5G RAN Central Unit. 1-2 - Aakriti Adhikari, Siri Avula, Sanjib Sur:
MatGAN: Sleep Posture Imaging using Millimeter-Wave Devices. 1-2 - Xinyuan Zeng, Chao Wang, Cheng-Cai Wang, Zan Li:
CVCA: A Complex-Valued Classifiable Autoencoder for MmWave Massive MIMO Physical Layer Authentication. 1-6 - Chen Qiu, Xianbin Wang, Weiming Shen, Richard Lee:
Dynamic Construction and Adaptation of 3D Virtual Network Topology for UAV-Assisted Data Collection. 1-6 - Mosab Hamdan, Arwa M. Eldhai, Samah Abdelsalam, Kifayat Ullah, Ali Kashif Bashir, Muhammad N. Marsono, Fabio Kon, Daniel Macêdo Batista:
A Two-Tier Anomaly-based Intrusion Detection Approach for IoT-Enabled Smart Cities. 1-7 - Neha Mishra, Yamini V. Iyengar, Akshay C. Raikar, Nikitha Thomas, Sabarish Krishna Moorthy, Jiangqi Hu, Zhiyuan Zhao, Nicholas Mastronarde, Elizabeth S. Bentley, Michael J. Medley, Zhangyu Guan:
Demo Abstract: Scaling Out srsRAN Through Interfacing Wirelessly srsENB with srsEPC. 1-2 - Pietro Talli, Francesco Pase, Federico Chiariotti, Andrea Zanella, Michele Zorzi:
Semantic and Effective Communication for Remote Control Tasks with Dynamic Feature Compression. 1-6 - Wenwu Li, Shuping Dang, Zhenrong Zhang, Zhihui Ge:
Combined Bulk and Per-subcarrier Relay Selection Enabled by Cascaded Neural Computing. 1-6 - Ilknur Aydin, Fraida Fund, Shivendra S. Panwar:
A Data Set and Reference Experiments for Multipath Wireless Emulation on Public Testbeds. 1-2 - Enrique Mármol Campos, Aurora González-Vidal, José Luis Hernández Ramos, Antonio F. Skarmeta:
Federated Transfer Learning for Energy Efficiency in Smart Buildings. 1-6 - Mohammad Asif Habibi, Adrián Gallego Sánchez, Ignacio Labrador Pavón, Bin Han, Pablo Serrano, Jesús Pérez-Valero, Antonio Virdis, Hans D. Schotten:
The Architectural Design of Service Management and Orchestration in 6G Communication Systems. 1-2 - Li Sun, Jing Hou, Richard Chapman:
Multi-Agent Deep Reinforcement Learning for Access Point Activation Strategy in Cell-Free Massive MIMO Networks. 1-6 - Huu-Trung Thieu, Van-Quan Pham, Ahan Kak, Nakjung Choi:
Demystifying the Near-real Time RIC: Architecture, Operations, and Benchmarking Insights. 1-8 - Yutao Chen, Anthony Ephremides:
Analysis of Age of Incorrect Information Under Generic Transmission Delay. 1-8 - Ferran Cañellas, Daniel Camps-Mur, Adriana Fernández-Fernández, Ivan Boyano, Miguel Urias, Jorge Navarro-Ortiz, Jaun J. Ramos-Muñoz:
Demo: 5G NR, Wi-Fi and LiFi multi-connectivity for Industry 4.0. 1-3 - Purbesh Mitra, Sennur Ulukus:
Timely Opportunistic Gossiping in Dense Networks. 1-6 - Xujin Zhou, Irem Koprulu, Atilla Eryilmaz:
Age-Optimal Multi-Channel-Scheduling Under Energy and Tolerance Constraints. 1-8 - Ziheng Liu, Zhilong Liu, Jiayi Zhang, Huahua Xiao, Bo Ai, Derrick Wing Kwan Ng:
Uplink Power Control for Extremely Large-Scale MIMO with Multi-Agent Reinforcement Learning and Fuzzy Logic. 1-6 - Kiranpreet Kaur, Fabrice Guillemin, Françoise Sailhan:
Live migration of containerized microservices between remote Kubernetes Clusters. 1-6 - Yunhe Xu, Min Ma, Xue Fu, Yu Wang, Guan Gui, Tomoaki Ohtsuki:
Automatic Modulation Classification Based on Decentralized Learning and Model Averaging. 1-5 - Xueyi Wang, Yifan Liu, Shancang Li:
Deep Learning Enabled Keystroke Eavesdropping Attack Over Videoconferencing Platforms. 1-2 - Diana Pineda, Ricardo Harrilal-Parchment, Kemal Akkaya, Ahmed S. Ibrahim, Alexander Perez-Pons:
Design and Analysis of an Open-Source SDN-based 5G Standalone Testbed. 1-6 - João Francisco Nunes Pinheiro, Chia-Yu Chang, Tom Collins, Eric Smekens, Revaz Berozashvili, Adnan Shahid, Danny De Vleeschauwer, Paola Soto, Ingrid Moerman, Johann Márquez-Barja, Jens Buysse, Miguel Camelo:
5GECO: A Cross-domain Intelligent Neutral Host Architecture for 5G and Beyond. 1-6 - Bin Dai, Wenrui Huang, Xinbin Shi, Mengda Lv, Yijun Mo:
Towards AI-Driven on-Demand Routing in 6G Wide-Area Networks. 1-6 - Gabriel Avelino R. Sampedro, Franklin Dañas, Mideth B. Abisado, Dong-Seong Kim, Jae-Min Lee:
Strategic Unmanned Aerial Vehicle (UAV) Routing: An Energy-Efficient Approach. 1-5 - Jun-Hong Huang, Shin-Ming Cheng, Rafael Kaliski, Cheng-Feng Hung:
Developing xApps for Rogue Base Station Detection in SDR-Enabled O-RAN. 1-6 - Sarwan Ali:
Information We Can Extract About a User from 'One Minute Mobile Application Usage'. 1-6 - Zhaoyang Han, Suranga Handagala, Kalyani Patle, Michael Zink, Miriam Leeser:
A Framework to Enable Runtime Programmable P4-enabled FPGAs in the Open Cloud Testbed. 1-6 - Qinpei Luo, Boya Di:
Meta Learning for Meta-Surface: A Fast Beamforming Method for RIS-Assisted Communications Adapting to Dynamic Environments. 1-2 - Xiaoyi Shi, Yifan Li, Chengjun Jia, Xiaohe Hu, Jun Li:
L7LB: High Performance Layer-7 Load Balancing on Heterogeneous Programmable Platforms. 1-2 - Jaswanth S. R. Mallu, Joao F. Santos, Aloizio Pereira da Silva, Prateek Sethi, Vikas Radhakrishnan, Luiz A. DaSilva:
AI/ML Data-driven Control Loop for Managing O-RAN SDR-based RANs. 1-2 - Man-Hsin Chen, Chiung-I Wu, Yin-Chi Li, Chi-Yu Li, Guan-Hua Tu:
Remote Detection of 4G/5G UEs Vulnerable to Stealthy Call DoS. 1-2 - Yan Zheng, Lin Qi, Zhida Bao, Jiangzhi Fu, Hang Jiang:
MDPD: Mapping-based Data Processing Defense against Adversarial Attacks in Automatic Modulation Classification. 1-6 - Sandeep Verma, Aneek Adhya:
DAAPEO: Detect and Avoid Path Planning for UAV-Assisted 5G Enabled Energy-Optimized IoT. 1-6 - Alekha Kumar Mishra, Deepak Puthal, Asis Kumar Tripathy:
A Secure RPL Rank Computation and Distribution Mechanism for Preventing Sinkhole Attack in IoT-based Systems. 1-6 - Xutong Yang, Li Wang, Lianming Xu, Yuming Zhang, Aiguo Fei:
Boids Swarm-based UAV Networking and Adaptive Routing Schemes for Emergency Communication. 1-6 - Hao Chang, Alva Kosasih, Wibowo Hardjawana, Xinwei Qu, Branka Vucetic:
Untrained Neural Network based Bayesian Detector for OTFS Modulation Systems. 1-6 - Blaz Bertalanic, Mihael Mohorcic, Carolina Fortuna:
GNN for Wireless Link Anomaly Detection. 1-2 - Gang Liu, Meng Jiang:
Explaining AI-Informed Network Intrusion Detection with Counterfactuals. 1-2 - Matevz Vucnik, Carolina Fortuna, Mihael Mohorcic:
Dimensioning Wireless Embedded Test Environments to Support Continuous Integration. 1-6 - Dongsheng Li, Xiaowen Gong:
Anarchic Convex Federated Learning. 1-6 - Wiktor Sedkowski, Rakshesh P. Bhatt, Clifton Fernandes, Kodandram Ranganath:
Vulnerability Exploit Pattern Generation and Analysis for proactive security risk mitigation for 5G networks. 1-6 - Xiaofeng Wang, Taiqian Shen, Yi Zhang, Xinyu Chen:
An Efficient Topology Emulation Technology for the Space-Air-Ground Integrated Network. 1-8 - Lu Chen, Suzhi Bi, Xiaohui Lin, Zheyuan Yang, Yuan Wu, Qiang Ye:
Learning-Aided Multi-UAV Online Trajectory Coordination and Resource Allocation for Mobile WSNs. 1-6 - Sunitha Safavat, Danda B. Rawat:
Asynchronous Federated Learning for Intrusion Detection in Vehicular Cyber-Physical Systems. 1-6 - Xingwang Li, Mingyu Zhang, Hui Chen, Dinh-Thuan Do, Shahid Mumtaz, Arumugam Nallanathan:
Spectral Efficiency of Multi-Pair mMIMO-NOMA UAV-Relaying with Low-Resolution ADCs/DACs. 1-6 - Priyesh Ranjan, Ashish Gupta, Federico Coro, Sajal K. Das:
Robust Federated Learning against Backdoor Attackers. 1-6 - Kunpeng Liu, Aimin Li, Shaohua Wu:
Deep Reinforcement Learning-Assisted Age-optimal Transmission Policy for HARQ-aided NOMA Networks. 1-6 - Juan Marcelo Parra Ullauri, Luis F. Gonzalez, Anderson Bravalheri, Rasheed Hussain, Xenofon Vasilakos, Iván Vidal, Francisco Valera, Reza Nejabati, Dimitra Simeonidou:
Privacy Preservation in Kubernetes-based Federated Learning: A Networking Approach. 1-7 - Haolin Tang, Yanxiao Zhao, Guodong Wang, Changqing Luo, Wei Wang:
Wireless Signal Denoising Using Conditional Generative Adversarial Networks. 1-6 - Zhuo Li, Hao Xun, Yang Miao, Weizhe Zhang, Peng Luo, Kaihua Liu:
FleCom: A Flexible Congestion Control Protocol in Named Data Networking. 1-6 - Fatemeh Mosaiyebzadeh, Seyedamin Pouriyeh, Reza M. Parizi, Meng Han, Daniel Macêdo Batista:
Intrusion Detection System for IoHT Devices using Federated Learning. 1-6 - Yuxia Zhan, Yan Meng, Lu Zhou, Haojin Zhu:
Vetting Privacy Policies in VR: A Data Minimization Principle Perspective. 1-2 - Muratcan Ayik, Elif Tugce Ceran, Elif Uysal:
Optimization of AoII and QAoII in Multi-User Links. 1-6 - Shunyu Chang, Zhaoming Lu, Xinghe Chu, Di Zhang, Luhan Wang, Xiangming Wen:
Positioning and Dynamic Tracking under 3GPP Cellular Network on GNURadio Testbed. 1-6 - Oluwaseun T. Ajayi, Shuai Zhang, Yu Cheng:
Machine Learning Assisted Capacity Optimization for B5G/6G Integrated Access and Backhaul Networks. 1-6 - Alakesh Kalita, Abhishek Hazra, Mohan Gurusamy:
Efficient Schemes for Improved Performance in 6TiSCH Networks. 1-6 - Han Li, Ming Liu, Bo Gao, Ke Xiong, Pingyi Fan, Khaled B. Letaief:
Sum Computation Rate Maximization in Self-Sustainable RIS-Assisted MEC. 1-2 - Anusha Vangala, Raj Maheshwari, Ashok Kumar Das, Shantanu Pal:
Cloud-Assisted Security Framework for Drone-Enabled Offshore Communications. 1-6 - Roshan Lal Neupane, Trevor Zobrist, Kiran Neupane, Shaynoah Bedford, Shreyas Prabhudev, Trevontae Haughton, Jianli Pan, Prasad Calyam:
CICADA: Cloud-based Intelligent Classification and Active Defense Approach for IoT Security. 1-6 - Nilesh Kumar Jadav, Rajesh Gupta, Riya Kakkar, Sudeep Tanwar:
Intelligent Onion Routing and UAV-based Electronic Health Record Sharing Framework for Healthcare 4.0. 1-6 - Taorui Liu, Jingzhi Hu, Hongliang Zhang, Lingyang Song:
Meta-material Sensors-enabled Internet of Things: Angular Range Extension. 1-2 - Saeid Sadeghi Vilni, Mohammad Moltafet, Markus Leinonen, Marian Codreanu:
AoI-Constrained Transmission Scheduling with HARQ and Heterogeneous Sampling Processes. 1-6 - Mustafa Daraghmeh, Anjali Agarwal, Yaser Jararweh:
Ensemble Learning for Predicting Task Connectivity Over Time in Cloud Data Centers. 1-6 - Jordi Marias i Parella, Adrián Pino, Bruno Cordero, Jordi Casademont, Estela Carmona Cejudo, Francisco Vazquez Gallego:
Demo: Interoperability between Cellular and V2X Networks (802.11p / LTE-PC5) under a Cloud Native Edge Scenario. 1-2 - Michele Gucciardo, Aristide Tanyi-Jong Akem, Beyza Bütün, Marco Fiore:
Demonstrating Flow-Level In-Switch Inference. 1-2 - Saige Dacuycuy, Zachary Dela Cruz, Yanjun Pan, Yao Zheng, Aaron T. Ohta, Wayne A. Shiroma:
Critical Element First: Enhance C-V2X Signal Coverage using Power-Efficient Liquid Metal-Based Intelligent Reflective Surfaces. 1-2 - Anat Bremler-Barr, Michael Czeizler:
Tandem Attack: DDoS Attack on Microservices Auto-scaling Mechanisms. 1-2 - Yinghe Miao, Yuxiang Zhang, Jianhua Zhang, Yutong Sun, Yixuan Tian, Li Yu, Guangyi Liu:
Demo Abstract: Predictive Radio Environment for Digital Twin Communication Platform via Enhanced Sensing. 1-2 - Oren Rodney Collaco, Mayukh Roy Chowdhury, Aloizio Pereira da Silva, Luiz A. DaSilva:
Enabling CBRS Experimentation through an OpenSAS and SDR-based CBSD. 1-2 - Ryan D. Restivo, Laurel C. Dodson, Jian Wang, Wenkai Tan, Yongxin Liu, Huihui Wang, Houbing Song:
GPS Spoofing on UAV: A Survey. 1-6 - Dheeraj Raja Kumar, Carles Antón-Haro, Xavier Mestre:
Shallow Neural Networks for Channel Estimation in Multi-Antenna Systems. 1-6 - Tong Li, Bowen Hu, Guanjie Tu, Jinwen Shuai, Jiaxin Liang, Yukuan Ding, Ziwei Li, Ke Xu:
Accelerating BLE Neighbor Discovery via Wi-Fi Fingerprints. 1-2 - Prodromos-Vasileios Mekikis, Pavlos S. Bouzinis, Nikos A. Mitsiou, Sotiris A. Tegos, Vasilis K. Papanikolaou, Dimitrios Tyrovolas, Panagiotis D. Diamantoulakis, George K. Karagiannidis:
Powering Inaccessible IoT Devices Through a WPT-enabled Sustainable UAV Network. 1-2