infocom39

infocom 2020 论文列表

39th IEEE Conference on Computer Communications, INFOCOM Workshops 2020, Toronto, ON, Canada, July 6-9, 2020.

Poster Abstract: Suppressing CSI Leakage in Multi-user MIMO Networks via Precoding.
Poster Abstract: A Computational Model-Driven Hybrid Social Media and Drone-Based Wildfire Monitoring Framework.
Robustness Analysis of Networked Control Systems with Aging Status.
Federated Routing Scheme for Large-scale Cross Domain Network.
Poster Abstract: Relaxing Network Selection for TCP Short Flows Using SYN Duplication.
Lightweight Network-Wide Telemetry Without Explicitly Using Probe Packets.
Enforcing Control Flow Confidentiality with SGX.
Reconsidering Leakage Prevention in MapReduce.
Poster Abstract: Encrypted Malware Traffic Detection Using Incremental Learning.
Poster Abstract: Model Average-based Distributed Training for Sparse Deep Neural Networks.
Fractals in the Air: Under-determined modulation recognition for MIMO communication.
Poster Abstract: LocTag: Passive WiFi Tag for Robust Indoor Localization via Smartphones.
Demo Abstract: Social Media-Driven UAV Sensing Frameworks in Disaster Response Applications.
Demo Abstract: Assessing MANO Performance based on VIM Platforms within MEC Context.
Whispering to Industrial IoT for converging multi-domain Network Programmability.
Demo Abstract: Cross-layer Authentication Based on Physical Channel Information using OpenAirInterface.
Prototyping NOMA Constellation Rotation in Wi-Fi.
Demo Abstract: APN6: Application-aware IPv6 Networking.
Demo Abstract: iCrutch: A Smartphone-based Intelligent Crutch for Smart Home Applications.
Demo Abstract: Narwhal: a DASH-based Point Cloud Video Streaming System over Wireless Networks.
Demo Abstract: End-to-end Root Cause Analysis of a Mobile Network.
NFV Service Federation: enabling Multi-Provider eHealth Emergency Services.
HURRA! Human-Readable Router Anomaly Detection.
Arbitrating Network Services in 5G Networks for Automotive Vertical Industry.
Poster Abstract: Environment-Independent Electronic Device Detection using Millimeter-Wave.
IRS Assisted Multiple User Detection for Uplink URLLC Non-Orthogonal Multiple Access.
Poster Abstract: An Open Source Approach to Field Testing of WLAN up to IEEE 802.11ad at 60 GHz Using Commodity Hardware.
Poster Abstract: Towards Ambient Backscatter as an Anti-jamming Solution for IoT Devices.
Poster Abstract: An Unsupervised Two-Layer Multi-Step Network Attack Detector.
Poster Abstract: Joint Optimization of Service Function Chain Elastic Scaling and Routing.
Poster Abstract: Always Heading for the Peak: Learning to Route with Domain Knowledge.
Connection-based Pricing for IoT Devices: Motivation, Comparison, and Potential Problems.
Measurement and Analysis of Cloud User Interest: A Glance From BitTorrent.
Poster Abstract: Parallel VM Placement with Provable Guarantees.
Scalable and Interactive Simulation for IoT Applications with TinySim.
Near Optimal Network-wide Per-Flow Measurement.
Opening the Deep Pandora Box: Explainable Traffic Classification.
DEMO: Real-time Edge Analytics and Concept Drift Computation for Efficient Deep Learning From Spectrum Data.
Demo Abstract: CLoRa-A Covert Channel over LoRa PHY.
Demo Abstract: AutoPCT: An Agile Protocol Conformance Automatic Test Platform Based on Editable EFSM.
Demo Abstract: Loop Avoidance in Computer Networks Using a Meshed Tree Protocol.
Demo abstract: Leveraging AI players for QoE estimation in cloud gaming.
Demo: Seamless Mobile Video Streaming in Multicast Multi-RAT Communications.
Sensing and Communication Integrated System for Autonomous Driving Vehicles.
Demo Abstract: Elastic Deployment of Robust Distributed Control Planes with Performance Guarantees.
Increasing the Data Rate for Reflected Optical Camera Communication Using Uniform LED Light.
Demo Abstract: Cross-Technology Communication between LTE-U/LAA and WiFi.
An SDR-in-the-Loop Carla Simulator for C-V2X-Based Autonomous Driving.
Demo Abstract: FingerLite: Finger Gesture Recognition Using Ambient Light.
Demo Abstract: High Voltage Discharge Exhibits Severe Effect on ZigBee-based Device in Solar Insecticidal Lamps Internet of Things.
Modified-PBIL Based User Selection for Multi-user Massive MIMO Systems with Massive Connectivity.
Deep Reinforcement Learning for Controller Placement in Software Defined Network.
Deep Reinforcement Learning based Wireless Network Optimization: A Comparative Study.
A TDMA Protocol Based on Data Priority for In-Vivo Wireless NanoSensor Networks.
RFID-Based Vehicle Localization Scheme in GPS-Less Environments.
RSSI or LQI: Insights from Real-Time Deployments for Underground Sensing and Applications.
An UAV assisted Multi-Sensor based Smart Parking System.
Bidirectional Multi-tier Cognitive Swarm Drone 5G Network.
UAV Network for Surveillance of Inaccessible Regions with Zero Blind Spots.
Distributed Deep Learning-based Task Offloading for UAV-enabled Mobile Edge Computing.
A Novel Simulated Annealing based Routing Algorithm in F-SDNs.
Incentive Mechanism Design for Edge-Cloud Collaboration in Mobile Crowd Sensing.
A Scheduling Strategy for Reduced Power Consumption in Mobile Edge Computing.
Joint Network Selection and Traffic Allocation in Multi-Access Edge Computing-Based Vehicular Crowdsensing.
Follow Me, If You Can: A Framework for Seamless Migration in Mobile Edge Cloud.
The German-Speaking Twitter Community Reference Data Set.
Characterizing Social Marketing Behavior of E-commerce Celebrities and Predicting Their Value.
Removing human players from the loop: AI-assisted assessment of Gaming QoE.
When Less is More: Core-Restricted Container Provisioning for Serverless Computing.
Glide and Zap Q-Learning.
Large-Scale and Rapid Flow Size Estimation for Improving Flow Scheduling.
Online Traffic Classification Using Granules.
Improving Inter-domain Routing through Multi-agent Reinforcement Learning.
DeepAalo: Auto-adjusting Demotion Thresholds for Information-agnostic Coflow Scheduling.
Optimal Power Splitting for Simultaneous Wireless Information and Power Transfer in Millimeter-wave Networks.
Instagram User Behavior Identification Based on Multidimensional Features.
Signal Recognition Based On Federated Learning.
Features Fusion based Automatic Modulation Classification Using Convolutional Neural Network.
SDN-enabled Traffic Alert System for IoV in Smart Cities.
GENIX: A GENI-based IXP Emulation.
Real Time Adaptive Networking using Programmable 100Gbps NIC on Data Transfer Nodes.
Demo: Benchmarking Live Migration Performance of Two Trendy Virtualization Technologies.
Information Classification Strategy for Blockchain-based Secure SDN in IoT Scenario.
Min-Max Worst-Case Design for Computation Offloading in Multi-user MEC System.
Reinforcement Learning for Scalable and Reliable Power Allocation in SDN-based Backscatter Heterogeneous Network.
Blockchain-Based Controller Recovery in SDN.
A Blockchain-Based Virtual Network Embedding Algorithm for Secure Software Defined Networking.
ET-DeaL: A P2P Smart Contract-based Secure Energy Trading Scheme for Smart Grid Systems.
Raptor-like Rateless Spinal Codes using Outer Systematic Polar Codes for Reliable Deep Space Communications.
LeTera: Stochastic Beam Control Through ESN Learning in Terahertz-Band Wireless UAV Networks.
Underwater Jamming Attacks as Incomplete Information Games.
Integrated Defense Mechanism Based on Attack Goals against Three Attack Strategies in Smart Grid.
Detection of Temporal Communities in Mobile Social Networks.
Transcoding for Live Streaming-based on Vehicular Fog Computing: An Actor-Critic DRL Approach.
An NFV MANO Architecture with a Resource Allocation Mechanism Based on Game Theory.
Secure Smart Home Systems: A Blockchain Perspective.
Security of Medical Cyber-physical Systems: An Empirical Study on Imaging Devices.
A Blockchain-Based Trading Platform for Big Data.
An IoT data sharing privacy preserving scheme.
Privacy-preserving Data Aggregation for Big Data in Financial Institutions.
Using NLP and Machine Learning to Detect Data Privacy Violations.
Point-of-Interest Recommendation based on Geographical Influence and Extended Pairwise Ranking.
Migrating to SDN for Mobile Core Networks: A Dynamic and Global Perspective.
Exploring Approaches to the Management of Physical, Virtual, and Social Sensors.
Age of Information Minimization in Fading Multiple Access Channels.
Game of Ages.
Minimizing the Age of Synchronization in Power-Constrained Wireless Networks with Unreliable Time-Varying Channels.
Age-of-Information Dependent Random Access for Massive IoT Networks.
A Non-Cooperative Multiple Access Game for Timely Updates.
Optimal Sampling Cost in Wireless Networks with Age of Information Constraints.
Improving Age of Information in Random Access Channels.
A Novel SSVEP-Based Brain-Computer Interface Using Joint Frequency and Space Modulation.
Learning Features of Brain Network for Anomaly Detection.
Secure UAV Communication Networks via Friendly Jamming and Bandwidth Allocation.
On the Design of Secure Communication Framework for Blockchain-Based Internet of Intelligent Battlefield Things Environment.
Smart Antenna-based Multi-hop Highly-Energy-Efficient DSA Approach to Drone-assisted Backhaul Networks for 5G.
Energy Efficient Mode Selection Scheme for Wireless Powered D2D Communications with NOMA Underlaying UAV.
Lightweight Authentication Protocol for Inter Base Station Communication in Heterogeneous Networks.
AI-Powered Blockchain - A Decentralized Secure Multiparty Computation Protocol for IoV.
Tri-Blockchain Based Intelligent Vehicular Networks.
IoT Event Classification Based on Network Traffic.
E-ALPHA: Edge-based Assisted Living Platform for Home cAre.
Mitigating DoS attacks in IoT EDGE Layer to preserve QoS topics and nodes' energy.
An Experimental Study on Microservices based Edge Computing Platforms.
Implementing SFA Support on an Established HPC-flavored Testbed: Lessons Learned.
Logical Peering for Interdomain Networking on Testbeds.
Improving BGP Convergence with Fed4FIRE+ Experiments.
An Improved Shapley Value Benefit Distribution Mechanism in Cooperative Game of Cyber Threat Intelligence Sharing.
Quantitative Analysis on Source-Location Privacy for Wireless Sensor Networks.
Protecting Privacy From Aerial photography: State of the Art, Opportunities, and Challenges.
QuickWalk: Quick Trust Assessment for Vehicular Social Networks.
WiNetSense: Sensing and Analysis Model for Large-scale Wireless Networks.
A Novel Methodology for the Automated Detection and Classification of Networking Anomalies.
End-to-end Delay Prediction Based on Traffic Matrix Sampling.
Towards In-Band Telemetry for Self Driving Wireless Networks.
Gemini-Chain: A Regulatable Digital Currency Model based on Blockchain.
TEE-Based Mutual Proofs of Transmission Services in Decentralized Systems.
Building an Authentic and Ethical Keyword Search by applying Decentralised (Blockchain) Verification.
Multi-scale Learning based Malware Variant Detection using Spatial Pyramid Pooling Network.
Detecting Anomalies in Encrypted Traffic via Deep Dictionary Learning.
Fidelity Leakages: Applying Membership Inference Attacks to Preference Data.
Efficient Vulnerability Detection based on abstract syntax tree and Deep Learning.
Deep Reinforcement Learning for Fresh Data Collection in UAV-assisted IoT Networks.
AoI and Energy Consumption Oriented Dynamic Status Updating in Caching Enabled IoT Networks.
Can We Improve Information Freshness with Predictions in Mobile Crowd-Learning?
Who Should Google Scholar Update More Often?
MAC Trade-offs Between Age and Reachability of Information in Vehicular Safety Applications.
Trajectory Optimization of Flying Energy Sources using Q-Learning to Recharge Hotspot UAVs.
A Real-time Framework for Trust Monitoring in a Network of Unmanned Aerial Vehicles.
Drone-assisted Edge Computing: a game-theoretical approach.
A Location-Based Path Privacy Protection Scheme in Internet of Vehicles.
Detecting and Mitigating ARP Attacks in SDN-Based Cloud Environment.
A Unified Federated Learning Framework for Wireless Communications: towards Privacy, Efficiency, and Security.
UAV-assisted Data Collection in Wireless Powered Sensor Networks over Multiple Fading Channels.
Multi-UAV Assisted Communication Networks: Towards Max-Min Secrecy Rate.
Autonomous UAV-aided Mesh Wireless Networks.
Performance Analysis of UAV-assisted Backhaul Solutions in THz enabled Hybrid Heterogeneous Network.
Distributed Intelligence Empowered Data Aggregation and Distribution for Multi-robot Cooperative Communication.
A Multi-property Method to Evaluate Trust of Edge Computing Based on Data Driven Capsule Network.
Caching Popular and Fresh IoT Contents at the Edge via Named Data Networking.
Energy-aware Allocation of Graph Jobs in Vehicular Cloud Computing-enabled Software-defined IoV.
Active Learning-based Classification in Automated Connected Vehicles.
Consistent User-Traffic Allocation and Load Balancing in Mobile Edge Caching.
Dynamic deployment model for large-scale compute-intensive clusters.
Terminator: An Efficient and Light-weight Fault Localization Framework.
Sperax: An Approach To Defeat Long Range Attacks In Blockchains.
No-Dealer: Byzantine Fault-Tolerant Random Number Generator.
The Feasibility of NOMA in C-V2X.
Handling Device Heterogeneity in Wi-Fi based Indoor Positioning Systems.
Log Analytics in HPC: A Data-driven Reinforcement Learning Framework.
Big Data Analytics Based Short Term Load Forecasting Model for Residential Buildings in Smart Grids.
Fountain-Coding-Aided Secure Delivery via Cross-locking Between Payload Data and Control Information.
Security Analysis of LTE-V2X and A Platooning Case Study.
Location-Aided Secure Transmission for Uplink Massive MIMO System Against Full-Duplex Jammer.
D-S based Fusion Method for Against Malicious Nodes in Wireless Sensor Networks.
Blockchain based secure IoT data sharing framework for SDN-enabled smart communities.
Blockchain Technology and Neural Networks for the Internet of Medical Things.
Non-Cooperative Game to Balance Energy and Security in Resource Constrained IoT Networks.
BS-IoT: Blockchain Based Software Defined Network Framework for Internet of Things.
Blockchain-Enabled SDN for Securing Fog-Based Resource-Constrained IoT.
Paging Group Size Distribution for Multicast Services in 5G Networks.
Energy Minimization for MEC-enabled Cellular-Connected UAV: Trajectory Optimization and Resource Scheduling.
Connecting flying backhauls of drones to enhance vehicular networks with fixed 5G NR infrastructure.
Security Enhancement and Evaluation for Noise Aggregation over Wireless Fading Channels.
RAT-NHP: Radio Access Technology Selection Based on N-hop Prediction.
Green Cognitive Internet of Things with Self Supply of Energy and Spectrum in Emergency Communications.
Statistical QoS Provisioning Based Caching Placement for D2D Communications Based Emergency Networks.
Prediction of Twitter Traffic Based on Machine Learning and Data Analytics.
FastScale: Fast Scaling Out of Network Functions.
Automated Traffic Engineering in SDWAN: Beyond Reinforcement Learning.
App-Net: A Hybrid Neural Network for Encrypted Mobile Traffic Classification.
Resilient Hybrid SatCom and Terrestrial Networking for Unmanned Aerial Vehicles.
Combining LoRaWAN and a New 3D Motion Model for Remote UAV Tracking.
Resource Allocation in MEC-enabled Vehicular Networks: A Deep Reinforcement Learning Approach.
MEM: A Multi-Staged Eviction Mechanism of Flowtable for Software-Defined Datacenters.
Edge Emergency Demand Response Control via Scheduling in Cloudlet Cluster.
ChainIDE 2.0: Facilitating Smart Contract Development for Consortium Blockchain.
A Solution for State Conflicts of Smart Contract in Interaction with Non-blockchain.
HIDEchain: A User-Centric Secure Edge Computing Architecture for Healthcare IoT Devices.
Sparser: Secure Nearest Neighbor Search with Space-filling Curves.
Image Translation with Attention Mechanism based on Generative Adversarial Networks.
Adaptive Adversarial Attack on Scene Text Recognition.
An Experimental Evaluation of Low Latency Congestion Control for mmWave Links.
Adaptive CNN-based Private LTE Solution for Fair Coexistence with Wi-Fi in Unlicensed Spectrum.
WiFi over VLC using COTS Devices.
Age-Energy Region in Wireless Powered Communication Networks.
Is the Packetized Transmission Efficient? An Age-Energy Perspective.
Age-Energy Tradeoff in Fading Channels with Packet-Based Transmissions.
Age-Optimal Scheduling for Heterogeneous Traffic with Timely-Throughput Constraint.
Anti-Aging Scheduling in Single-Server Queues: A Systematic and Comparative Study.
Average Age of Information in a Multi-Source M/M/1 Queueing Model with LCFS Prioritized Packet Management.
The Probability Distribution of the AoI in Queues with Infinitely Many Servers.
InBlock4: Blockchain-based Route Origin Validation.
A Data Forwarding Mechanism based on Deep Reinforcement Learning for Deterministic Networks.
UCIP: User Controlled Internet Protocol.
A New Approach to a Service Oriented Internet Protocol.
A Flexible Hierarchical Network Architecture with Variable-Length IP Address.
A Blockchain-based Framework for Drone-Mounted Base Stations in Tactile Internet Environment.
VAHAK: A Blockchain-based Outdoor Delivery Scheme using UAV for Healthcare 4.0 Services.
ODOB: One Drone One Block-based Lightweight Blockchain Architecture for Internet of Drones.
User Association in Hybrid UAV-cellular Networks for Massive Real-time IoT Applications.
On the Design of Blockchain-Based Access Control Scheme for Software Defined Networks.
Proof-of-Balance: Game-Theoretic Consensus for Controller Load Balancing of SDN.
DecOp: Decentralized Network Operations in Software Defined Networking using Blockchain.
BIND: Blockchain-Based Flow-Table Partitioning in Distributed Multi-Tenant Software-Defined Networks.
Secure Backscatter Communications in Multi-Cell NOMA Networks: Enabling Link Security for Massive IoT Networks.
Smart User Pairing for Massive MIMO Enabled Industrial IoT Communications.
NLC: Natural Light Communication using Switchable Glass.
Blockchain-based E-waste Management in 5G Smart Communities.
Network Flow based IoT Botnet Attack Detection using Deep Learning.
Towards Blockchain-Based Reputation-Aware Federated Learning.
A Concurrent Weighted Communication Scheme for Blockchain Transaction.
MFBBR: An Optimized Fairness-aware TCP-BBR Algorithm in Wired-cum-wireless Network.
Predicting Traffic Demand Matrix by Considering Inter-flow Correlations.
Dual Channel Per-packet Load Balancing for Datacenters.
Latency and Reliability Oriented Collaborative Optimization for Multi-UAV Aided Mobile Edge Computing System.
An Integrated Platoon and UAV System for 3D Localization in Search and Rescue.
Intelligent UAV Based Flexible 5G Emergency Networks: Field Trial and System Level Results.
Resource Allocation in Drone-Assisted Emergency Communication Systems.
A Dynamic Resource Allocation Scheme in Vehicular Communications.
Comprehensive Detection of Vulnerable Personal Information Leaks in Android Applications.
A Convolutional Neural Network-Based RF Fingerprinting Identification Scheme for Mobile Phones.
Enterprise Mobile Device Management Requirements and Features.
A View-Invariant Feature Learning Model for Cross-View Security Authentication in Mobile Smart Devices.
Adaptive Video Streaming Using Dynamic NDN Multicast in WLAN.
P4NIS: Improving network immunity against eavesdropping with programmable data planes.
A Framework for Bandwidth and Latency Guaranteed Service in New IP Network.
RNBG: A Ranking Nodes Based IP Geolocation Method.
Identification of Encrypted Video Streaming Based on Differential Fingerprints.
U-ASG: A Universal Method to Perform Adversarial Attack on Autoencoder based Network Anomaly Detection Systems.
Cooperative Game Model of Delegation Computing: Verifier Separated from Calculators.
Revenue-Sharing based Computation-Resource Allocation for Mobile Blockchain.
Bottleneck-Aware Coflow Scheduling Without Prior Knowledge.
Cerberus: Privacy-Preserving Computation in Edge Computing.
Mutual Authentication and Authorized Data Access Between Fog and User Based on Blockchain Technology.
Maintaining Information Freshness in Power-Efficient Status Update Systems.
Age of Information for Actuation Update in Real-Time Wireless Control Systems.
Transmission Scheduling for Multi-loop Wireless Networked Control Based on LQ Cost Offset.
Balancing Data Freshness and Distortion in Real-time Status Updating with Lossy Compression.
Detecting State Transitions of a Markov Source: Sampling Frequency and Age Trade-off.
Age of Incorrect Information for Remote Estimation of a Binary Markov Source.