


default search action
24th MobiHoc 2023: Washington, DC, USA
- Jie Wu, Suresh Subramaniam, Bo Ji, Carla-Fabiana Chiasserini:

Proceedings of the Twenty-fourth International Symposium on Theory, Algorithmic Foundations, and Protocol Design for Mobile Networks and Mobile Computing, MobiHoc 2023, Washington, DC, USA, October 23-26, 2023. ACM 2023, ISBN 978-1-4503-9926-5
Federated Learning
- Yuezhou Liu

, Lili Su
, Carlee Joe-Wong
, Stratis Ioannidis
, Edmund Yeh
, Marie Siew
:
Cache-Enabled Federated Learning Systems. 1-11 - Ningning Ding

, Zhenyu Sun
, Ermin Wei
, Randall Berry
:
Incentive Mechanism Design for Federated Learning and Unlearning. 11-20 - Dongsheng Li

, Xiaowen Gong
:
Anarchic Federated learning with Delayed Gradient Averaging. 21-30 - Rohit Parasnis

, Seyyedali Hosseinalipour
, Yun-Wei Chu
, Mung Chiang
, Christopher G. Brinton
:
Connectivity-Aware Semi-Decentralized Federated Learning over Time-Varying D2D Networks. 31-40
Wireless Systems and Experimentation
- Yiwen Song

, Changhan Ge
, Lili Qiu
, Yin Zhang
:
2ACE: Spectral Profile-driven Multi-resolutional Compressive Sensing for mmWave Channel Estimation. 41-50 - Sergi Alcalá-Marín

, Antonio Bazco Nogueras
, Albert Banchs
, Marco Fiore
:
kaNSaaS: Combining Deep Learning and Optimization for Practical Overbooking of Network Slices. 51-60 - Yu-Tai Lin

, Karthikeyan Sundaresan
:
A New Paradigm of Communication-Aware Collaborative Positioning for FutureG Wireless Systems. 61-70 - Guillem Reus Muns

, Kubra Alemdar
, Sara Garcia Sanchez
, Debashri Roy
, Kaushik R. Chowdhury
:
AirFC: Designing Fully Connected Layers for Neural Networks with Wireless Signals. 71-80
Overcoming Delays and Age of Information
- Songhua Li

, Lingjie Duan
:
Age of Information Diffusion on Social Networks: Optimizing Multi-Stage Seeding Strategies. 81-90 - Tasmeen Zaman Ornee

, Yin Sun
:
A Whittle Index Policy for the Remote Estimation of Multiple Continuous Gauss-Markov Processes over Parallel Channels. 91-100 - Guidan Yao

, Chih-Chun Wang
, Ness B. Shroff
:
Age Minimization with Energy and Distortion Constraints. 101-110 - Sima Mehri

, Florin Ciucu
:
On a Continuous-Time Martingale and Two Applications. 111-120
Network Resource Allocation
- Sanidhay Bhambay

, Arpan Mukhopadhyay
, Thirupathaiah Vasantam
:
The Power of Two Choices with Load Comparison Errors. 121-130 - Kaiyi Ji

, Lei Ying
:
Network Utility Maximization with Unknown Utility Functions: A Distributed, Data-Driven Bilevel Optimization Approach. 131-140 - Panagiotis Promponas

, Tingjun Chen
, Leandros Tassiulas
:
Optimizing Sectorized Wireless Networks: Model, Analysis, and Algorithm. 141-150 - Yudi Huang

, Ting He
:
Overlay Routing Over an Uncooperative Underlay. 151-160 - Jingdi Chen

, Tian Lan
, Nakjung Choi
:
Distributional-Utility Actor-Critic for Network Slice Performance Guarantee. 161-170
Online Learning and Optimization
- Jiandong Liu

, Lan Zhang
, Xiaojing Yu
, Xiang-Yang Li
:
Differentially Private Distributed Online Convex Optimization Towards Low Regret and Communication Cost. 171-180 - Quang Minh Nguyen

, Eytan H. Modiano
:
Learning to Schedule in Non-Stationary Wireless Networks With Unknown Statistics. 181-190
Learning on the Edge
- Zhuqing Liu

, Xin Zhang
, Songtao Lu
, Jia Liu
:
PRECISION: Decentralized Constrained Min-Max Learning with Low Communication and Sample Complexities. 191-200 - Jing Qiao

, Shikun Shen
, Shuzhen Chen
, Xiao Zhang
, Tian Lan
, Xiuzhen Cheng
, Dongxiao Yu
:
Communication Resources Limited Decentralized Learning with Privacy Guarantee through Over-the-Air Computation. 201-210 - Hansong Zhou

, Shaoying Wang
, Chutian Jiang
, Xiaonan Zhang
, Linke Guo
, Yukun Yuan
:
Waste Not, Want Not: Service Migration-Assisted Federated Intelligence for Multi-Modality Mobile Edge Computing. 211-220 - Kun Woo Cho

, Marco Cominelli
, Francesco Gringoli
, Joerg Widmer
, Kyle Jamieson
:
Scalable Multi-Modal Learning for Cross-Link Channel Prediction in Massive IoT Networks. 221-229
Security and Sensing
- Huanqi Yang

, Mingda Han
, Shuyao Shi
, Zhenyu Yan
, Guoliang Xing
, Jianping Wang
, Weitao Xu
:
Wave-for-Safe: Multisensor-based Mutual Authentication for Unmanned Delivery Vehicle Services. 230-239 - Xin Li

, Yilin Yang
, Zhengkun Ye
, Yan Wang
, Yingying Chen
:
EarCase: Sound Source Localization Leveraging Mini Acoustic Structure Equipped Phone Cases for Hearing-challenged People. 240-249 - Jun Zhao

, Xinyu Zhou
, Yang Li
, Liangxin Qian
:
Optimizing Utility-Energy Efficiency for the Metaverse over Wireless Networks under Physical Layer Security. 250-259
Internet of Things
- Zhihui Gao

, Yiran Chen
, Tingjun Chen
:
Swirls: Sniffing Wi-Fi Using Radios with Low Sampling Rates. 260-269 - Jialuo Du

, Yidong Ren
, Zhui Zhu
, Chenning Li
, Zhichao Cao
, Qiang Ma
, Yunhao Liu
:
SRLoRa: Neural-enhanced LoRa Weak Signal Decoding with Multi-gateway Super Resolution. 270-279 - Hossein Pirayesh

, Shichen Zhang
, Huacheng Zeng
:
mReader: Concurrent UHF RFID Tag Reading. 280-289 - Muhammad Sarmad Mir

, Minhao Cui
, Borja Genovés Guzmán
, Qing Wang
, Jie Xiong
, Domenico Giustiniano
:
LeakageScatter: Backscattering LiFi-leaked RF Signals. 290-299
POSTER SESSION: Posters Session
- Ruide Cao

, Jiao Ye
, Qian You
, Jianghan Xu
, Yi Wang
, Shiyu Jiang
, Yaomin Li
:
Poster: A Novel Region-of-Interest Based UAV Planning Strategy for Mitigating Urban Peak Demand. 300-301 - Shyam Krishnan Venkateswaran

, Ching-Lun Tai
, Raghupathy Sivakumar
:
Poster: Accordion: Toward a Limited Contention Protocol for Wi-Fi 6 Scheduling. 302-303 - Tzuo Hann Law

, Selman Erol
, Lewis Tseng
:
Poster: Timestamp Verifiability in Proof-of-Work. 304-305 - Cong Shi

, Tianfang Zhang
, Zhaoyi Xu
, Shuping Li
, Donglin Gao
, Changming Li
, Athina P. Petropulu
, Chung-Tse Michael Wu
, Yingying Chen
:
Poster: Extracting Speech from Subtle Room Object Vibrations Using Remote mmWave Sensing. 306-307 - Tianfang Zhang

, Zhengkun Ye
, Ahmed Tanvir Mahdad
, Md Mojibur Rahman Redoy Akanda
, Cong Shi
, Nitesh Saxena
, Yan Wang
, Yingying Chen
:
Poster: Unobtrusively Mining Vital Sign and Embedded Sensitive Info via AR/VR Motion Sensors. 308-309
Demos Session
- Xiaoyi Wu

, Jiangong Chen
, Rui Tang
, Kefan Wu
, Bin Li
:
Demo: Immersive Remote Monitoring and Control for Internet of Things. 310-311 - Qinpei Luo

, Ziang Yang
, Boya Di
, Chenren Xu
:
Demo: Meta2Locate: Meta Surface Enabled Indoor Localization in Dynamic Environments. 312-313 - Xiangyu Ju

, Biao Han
, Yitang Chen
, Jinrong Li
:
Demo: A Prototype for Detecting and Localizing Hidden Devices in Unfamiliar Environments. 314-315
WORKSHOP SESSION: 6G-PDN Workshop
- Pietro G. Giardina

, Péter Szilágyi
, Carla-Fabiana Chiasserini
, Jose Luis Carcel
, Luis Velasco
, Salvatore Spadaro
, Fernando Agraz
, Sebastian Robitzsch
, Rafael Rosales
, Valerio Frascolla
, Roya Doostnejad
, Alejandro Calvillo-Fernandez
, Giacomo Bernini
:
A hierarchical AI-based control plane solution for multi-technology deterministic networks. 316-321 - Minh-Thuyen Thi

, Siwar Ben Hadj Said
, Adrien Roberty
, Fadlallah Chbib, Rida Khatoun, Leonardo Linguaglossa
:
Enabling Programmable Deterministic Communications in 6G. 322-327 - Carlos J. Bernardos

, Alain Mourad
, Milan Groshev
, Luis M. Contreras
, Marc Mollà Roselló
, Otilia Bularca
, Valerio Frascolla
, Péter Szilágyi
, Sebastian Robitzsch
:
Using RAW as Control Plane for Wireless Deterministic Networks: Challenges Ahead. 328-333 - Csaba Györgyi

, Károly Kecskeméti
, Péter Vörös
, Sándor Laki
, Géza Szabó
:
In-Network Quality Control of IP Camera Streams. 334-339 - Gergely Pongrácz

, Attila Mihály
, István Gódor
, Sándor Laki
, Anastassios Nanos
, Chrysa Papagianni
:
Towards extreme network KPIs with programmability in 6G. 340-345 - Károly Kecskeméti

, Csaba Györgyi
, Péter Vörös
, Sándor Laki
:
In-Network Security Applications with P4RROT. 346-351 - Carlos Barroso-Fernández

, Jorge Martín-Pérez
, Constantine Ayimba
, Antonio de la Oliva
:
Aligning rTWT with 802.1Qbv: a Network Calculus Approach. 352-354 - Domenico Uomo

, Andrea Sgambelluri
, Piero Castoldi
, Emiliano De Paoli
, Francesco Paolucci
, Filippo Cugini
:
Failure Prediction in Software Defined Flying Ad-hoc Network. 355-357
WORKSHOP SESSION: AIoT Workshop
- Benjamín Arratia

, Javier Prades
, Salvador Peña-Haro
, José Maria Cecilia
, Pietro Manzoni
:
BODOQUE: An Energy-Efficient Flow Monitoring System for Ephemeral Streams. 358-363 - Eric Samikwa

, Jakob Schärer
, Torsten Braun
, Antonio Di Maio
:
Machine Learning-based Energy Optimisation in Smart City Internet of Things. 364-369 - Yuba Raj Siwakoti

, Danda B. Rawat
:
Detect-IoT: A Comparative Analysis of Machine Learning Algorithms for Detecting Compromised IoT Devices. 370-375 - Antonio Di Maio

, Mina Aghaei Dinani
, Gianluca Rizzo
:
The Upsides of Turbulence: Baselining Gossip Learning in Dynamic Settings. 376-381 - Zelin Wan

, Jin-Hee Cho
, Mu Zhu
, Ahmed H. Anwar
, Charles A. Kamhoua
, Munindar P. Singh
:
Deception in Drone Surveillance Missions: Strategic vs. Learning Approaches. 382-387 - Hideya Ochiai

, Riku Nishihata
, Eisuke Tomiyama
, Yuwei Sun
, Hiroshi Esaki
:
Detection of Global Anomalies on Distributed IoT Edges with Device-to-Device Communication. 388-393
WORKSHOP SESSION: IoST-5GB Workshop
- Giorgia Maria Cappello

, Gabriella Colajanni
, Patrizia Daniele
, Laura Galluccio
, Christian Grasso
, Giovanni Schembra
, Laura Scrimali
:
ODEL: an On-Demand Edge-Learning framework exploiting Flying Ad-hoc NETworks (FANETs). 394-399 - Pushpita Chatterjee

, Debashis Das
, Sourav Banerjee
, Uttam Ghosh
, Armando B. Mpembele
, Tamara Rogers
:
An Approach Towards the Security Management for Sensitive Medical Data in the IoMT Ecosystem. 400-405 - Sidheswar Routray

, Amrit Suman
, Preetam Suman
, Sasmita Padhy
, Pushpita Chatterjee
, Sachin Shetty
:
Vehicular Safety Revolution: A Cutting-Edge Communication Paradigm for Accident Prevention. 406-411
WORKSHOP SESSION: REUNS Workshop
- Ashkan Arabi

, Michael Straus
, Zijie Tang
, Zhengkun Ye
, Yan Wang
:
Phone-based CSI Hand Gesture Recognition with Lightweight Image-Classification Model. 412-417 - Dennis Yeom

, Nadia Niknami
, Jie Wu
:
Evaluating Performance of Intrusion Detection Systems under Different Configurations in SDN. 418-423 - Maya McDonough

, Thomas Moomaw
, Md Touhiduzzaman
, Eyuphan Bulut
:
Wi-Alert: WiFi Sensing for Real-time Package Theft Alerts at Residential Doorsteps. 424-429 - Sean Folan

, Yunsheng Wang
:
Cybersecurity Simulator for Connected and Autonomous Vehicles. 430-435 - Minh Le Kim Tran

, William King
, Harvey P. Siy
:
Exploring the Potential of Frama-C in IoT Static Analysis. 436-441 - Jesus Rodriguez

, Jong-Hoon Youn
:
PACE: Providing Authentication through Computational Gait Evaluation with Deep learning. 442-446 - Brandon Dominic Vilela

, Kshitij Kokkera
, Amirahmad Chapnevis
, Eyuphan Bulut
:
UAV Control Using Eye Gestures: Exploring the Skies Through Your Eyes. 447-452 - Golan Khen

, Detim Zhao
, José Baca
:
Intuitive Human-Swarm Interaction with Gesture Recognition and Machine Learning. 453-456 - Jack Farley

, Amirahmad Chapnevis
, Eyuphan Bulut
:
Generalized Path Planning for Collaborative UAVs using Reinforcement and Imitation Learning. 457-462 - Holly Hunter

, Jamie Payton
, Christine Julien
:
Expanding Elementary School Computer Science Education with an Introduction to Machine Learning Through Rhythmic Studies. 463-467 - Edwin Antonio Sanchez

, Anthony Weyer
, Joseph Palackal
, Kai Wang
, Tyler Phillips
, Xukai Zou
:
Advancing Active Authentication for User Privacy and Revocability with BioCapsules. 468-473 - Sean Chen

, Jaelyn McCracken
, Kevin Lu
, Tao Wang
, Tao Hou
:
Taking a Look into the Cookie Jar: A Comprehensive Study towards the Security of Web Cookies. 474-479 - Paul Jiang

, Ellie Fassman
, Amit Singha
, Yimin Chen
, Tao Li
:
Evaluating the Impact of Noisy Point Clouds on Wireless Gesture Recognition Systems. 480-485 - Henry Michaelson

, Nolan Pettit
, Vaishnavi Annabhemoju
, Shuai Nie
, Justin M. Bradley
:
Link Budgeting and Interference Management for UAV Networks in 5G and Beyond. 486-491 - Joseph Brewington

, Dulal C. Kar
:
UAV GPS Spoofing Detection via Neural Generative One-Class Classification. 492-497 - Seth Johnson

, Ray Donner
, Alfredo J. Perez
:
Comparing Classifiers: A Look at Machine-Learning and the Detection of Mobile Malware in COVID-19 Android Mobile Applications. 498-503 - Michael Evans

, Dominik Soós
, Ethan Landers
, Jian Wu
:
MSVEC: A Multidomain Testing Dataset for Scientific Claim Verification. 504-509 - Anushka Desai

, Oscar G. Bautista
, Kemal Akkaya
:
Privacy-Preserving Collision Detection for Drone-based Aerial Package Delivery using Secure Multi-Party Computation. 510-515 - Joshua Schoenbachler

, Vinay Krishnan
, Garvit Agarwal
, Feng Li
:
Sorting Ransomware from Malware Utilizing Machine Learning Methods with Dynamic Analysis. 516-521 - Abdullah Kamal

, Jeremy Vidaurri
, Carlos E. Rubio-Medrano
:
No-Fly-Zone: Regulating Drone Fly-Overs Via Government and User-Controlled Authorization Zones. 522-527 - Jieying Chen

, Abdalaziz Sawwan
, Shuhui Yang
, Jie Wu
:
Wireless Channel Prediction in Different Locations Using Transfer Learning. 528-533 - David Chen

, Kehan Wang
, Agnideven Palanisamy Sundar
, Feng Li
:
TrustNetFL: Enhancing Federated Learning with Trusted Client Aggregation for Improved Security. 534-539 - Anne Marie Perrotti

, Isabelle Puwo
, Sampath Jayarathna
:
Exploring TikTok as an Educational Tool for Speech-Language Pathologists, Special Education, and General Education. 540-544 - Eleanor Lin

, James Hale
, Jonathan Gratch
:
Toward a Better Understanding of the Emotional Dynamics of Negotiation with Large Language Models. 545-550 - Matthew Ybarra

, Mahmoud Eldefrawy
, Scott A. King
:
UGVs in Agriculture: Steering control system to navigate through fields via waypoints. 551-555 - Julian Abhari

, Ashwin Ashok
:
Mitigating Racial Biases for Machine Learning Based Skin Cancer Detection. 556-561 - Gianna Voce

, Marbella Castillo
, Henry Griffith
, Heena Rathore
:
Poster: Opinion Dynamics for Enhancing Trust and Security in Connected Vehicle Networks. 562-564 - Aidan Kwok

, Richard Owoputi
, Sandip Ray
:
Poster: Scenario Creation for Immersive Automotive Security Exploration. 565-567 - Alec Kyritsis

, Scott Wynn
, Stephora Cesar Alberi
, Enyue Lu
:
Poster: Dynamic and NM1-Right Selection for the Parallel Iterative Improvement Stable Matching Algorithm. 568-570 - Patrick M. Mendoza

, Tashfique Hasnine Choudhury
, Sandip Ray
:
Poster: Vehicle-to-Infrastructure Security for Reduced Speed Work Zone. 571-573 - Marbella Castillo

, Gianna Voce
, Henry Griffith
, Heena Rathore
:
Poster: Decentralized Simulation Workflow for Enhancing Connected Vehicle Security. 574-576 - Daniel Gallegos

, Elaine Raymond
, Lu Wang
:
Poster: Binge drinking risk factors ranking using multi-task learning. 577-579 - Johnovon Richards

, Saumya Dabhi
, Faryaneh Poursardar
, Sampath Jayarathna
:
Poster: Leveraging Data Analysis and Machine Learning to Authenticate Yelp Reviews through User Metadata Patterns. 580-582 - Nathan Chen

, Genevieve Bartlett
:
Poster: Emotional Language in News: Detection and Intervention. 583-585 - Arturo Gonzalez

, Amani Davidson
, Carlos E. Rubio-Medrano
:
Poster: No Fly-Zone: Drone Policies for Ensuring Safe Operations in Restricted Areas. 586-588 - Jack Carter

, Bhagawat Baanav Yedla Ravi
, Md Rafiul Kabir
, Sandip Ray
:
Poster: Efficient Exploration of Automotive Ranging Sensor Attacks. 589-591 - Allen Tian

, Eddy Guerra John
, Kecheng Yang
:
Poster: Unraveling Reward Functions for Head-to-Head Autonomous Racing in AWS DeepRacer. 592-594 - Oriana Matney

, Parker Wilmoth
, Solomon Markowitz
, Connor Rieth
, Batsheva Gil
, Jared Hermans
, George Sklivanitis
, Dimitris A. Pados
:
Poster: Simulation and Experimental Evaluation of Wireless Remote Controlled Underwater Vehicles. 595-597

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














