default search action
26th ISCC 2021: Athens, Greece
- IEEE Symposium on Computers and Communications, ISCC 2021, Athens, Greece, September 5-8, 2021. IEEE 2021, ISBN 978-1-6654-2744-9
- Penghui Lv, Yu Wang, Yazhe Wang, Qihui Zhou:
Potential Risk Detection System of Hyperledger Fabric Smart Contract based on Static Analysis. 1-7 - Rustem Dautov, Hui Song, Nicolas Ferry:
Towards a Sustainable IoT with Last-Mile Software Deployment. 1-6 - Gabriel R. Castanhel, Tiago Heinrich, Fabrício Ceschin, Carlos Maziero:
Taking a Peek: An Evaluation of Anomaly Detection Using System calls for Containers. 1-6 - Gabriele Penzotti, Stefano Caselli, Michele Amoretti:
An N-Tier Fog Architecture for Smart Farming. 1-7 - Dinesh R. Gawade, Roy B. V. B. Simorangkir, Dimitrios Zorbas, Sanjeev Kumar, Steffen Ziemann, Daniela Iacopino, John Barton, Katharina Schuhmann, Manfred Anders, Brendan O'Flynn, John L. Buckley:
A Museum Artefact Monitoring Testbed using LoRaWAN. 1-3 - Jixin Zhao, Shukui Zhang, Yang Zhang, Li Zhang, Hao Long:
Deep Reinforcement Learning-Based Routing Optimization Algorithm for Edge Data Center. 1-7 - Ashwin Kannoth, Cungang Yang, Manuel Angel Guanipa Larice:
Hand Gesture Recognition Using CNN & Publication of World's Largest ASL Database. 1-6 - Haitian Yang, Xuan Zhao, Degang Sun, Yan Wang, He Zhu, Chao Ma, Weiqing Huang:
Multi-Modal fake news Detection on Social Media with Dual Attention Fusion Networks. 1-6 - Ruizhong Du, Shuang Li:
Identification of IoT Devices Based on Feature Vector Split. 1-6 - Abdallah Belkaaloul, Boucif Amar Bensaber:
Anonymous Authentication Protocol for Efficient Communications in Vehicle to Grid Networks. 1-5 - Micael Pedrosa, Rui Lebre, Carlos Costa:
Holder-of-key threshold access token for anonymous data resources. 1-7 - Moheddine Smari, Saber Dakhli, Jean-Marie Floc'h, Fethi Choubani:
Design of Frequency-Reconfigurable UWB Filtenna with Independently Controllable Two Rejected Bands. 1-6 - Matteo Carbonari, Greta Vallasciani, Lucia Migliorelli, Emanuele Frontoni, Sara Moccia:
End-to-end semantic joint detection and limb-pose estimation from depth images of preterm infants in NICUs. 1-6 - Gustavo Pantuza, Marcos A. M. Vieira, Luiz Filipe M. Vieira:
eQUIC Gateway: Maximizing QUIC Throughput using a Gateway Service based on eBPF + XDP. 1-6 - Michele Albano, Stefano Chessa, Kim Guldstrand Larsen:
A Model-Checking Static Analysis of Task-Based Energy Neutrality for Energy Harvesting IoT. 1-7 - Anastasios N. Bikos, Sathish Kumar:
Reinforcement Learning-Based Anomaly Detection for Internet of Things Distributed Ledger Technology. 1-7 - Andrea Sabbioni, Lorenzo Rosa, Armir Bujari, Luca Foschini, Antonio Corradi:
A Shared Memory Approach for Function Chaining in Serverless Platforms. 1-6 - Xiaohui Zhang, Shunliang Zhang, Zhuang Qiao:
A Chaos-Based Encryption Scheme for OFDM-IM Systems. 1-6 - Oumaima El Joubari, Jalel Ben-Othman, Véronique Vèque:
TA- TDMA: A traffic aware TDMA MAC protocol for safety applications in VANET. 1-8 - Franco Callegati, Aldo Campi, Chiara Contoli, Silvio Di Santi, Nicola Ghiselli, Carlo Giannelli, Alessandro Pernafini, Riccardo Zamagna:
SDN-based Differentiated Traffic Flow Management for Industrial Internet of Things Environments. 1-6 - Yuanyuan Shen, Md. Akbar Hossain, Sayan Kumar Ray:
Supporting Elderly People During Medical Emergencies: An Informal Caregiver-based Approach. 1-6 - Francisco Jose Dos Santos Reist, Mateus Assis Veloso, Filipe Mateus Moraes Rodrigues, Vitória de Carvalho Brito, Patrick Ryan Sales dos Santos, José Denes Lima Araújo, Ricardo de Andrade Lira Rabelo, Antonio Oseas de Carvalho Filho:
BacillusNet: An automated approach using RetinaNet for segmentation of pulmonary Tuberculosis bacillus. 1-4 - Ahmed Abbas Mohsin Al-Saedi, Veselka Boeva, Emiliano Casalicchio:
Reducing Communication Overhead of Federated Learning through Clustering Analysis. 1-7 - Alexandre Martins G. De Deus, Eduardo P. Julio, Marcelo F. Moreno:
Join-Me: A Framework for integrating Service Providers and Mobile Network Operators. 1-7 - Patrick Elfert, Enes Tiryaki, Marco Eichelberg, Norbert Rösch, Andreas Hein:
A Deep Learning Assisted Digital Nutrition Diary to Support Nutrition Counseling for People Affected by the Geriatric Frailty Syndrome. 1-7 - Courtney Potts, Raymond R. Bond, Maurice D. Mulvenna, Edel Ennis, Andrea Bickerdike, Edward K. Coughlan, Thomas Broderick, Con Burns, Michael F. McTear, Lauri Kuosmanen, Heidi Nieminen, Kyle A. Boyd, Brian Cahill, Alex Vakaloudis, Indika S. A. Dhanapala, Anna-Kaisa Vartiainen, Catrine Kostenius, Martin Malcolm:
Insights and lessons learned from trialling a mental health chatbot in the wild. 1-6 - Mengdi Xu, Jiandong Cheng, Yirong Liu, Wei Huang:
DeepGAN: Generating Molecule for Drug Discovery Based on Generative Adversarial Network. 1-6 - Matheus Torquato, Marco Vieira:
VM Migration Scheduling as Moving Target Defense against Memory DoS Attacks: An Empirical Study. 1-6 - André R. C. Saraiva, Diego G. Passos, Célio Vinicius N. Albuquerque:
Evaluation of the reduction of NDT in WSN with asymmetric schedule-based asynchronous duty cycle mechanisms. 1-6 - Xiaojie Tao, Liming Wang, Zhen Xu, Ru Xie:
Secure and Efficient Allocation of Virtual Machines in Cloud Data Center. 1-7 - Weiqing Huang, Chenggang Jia, Min Yu, Gang Li, Chao Liu, Jianguo Jiang:
UTANSA: Static Approach for Multi-Language Malicious Web Scripts Detection. 1-7 - Renato Caminha Juaçaba-Neto, Pascal Mérindol, Fabrice Theoleyre:
Data Aggregation for Privacy Protection of Data Streams Between Autonomous IoT Networks. 1-6 - Ester Vidaña-Vila, Rosa Maria Alsina-Pagès, Joan Navarro:
Improving classification accuracy of acoustic real-world urban data using sensors physical redundancy. 1-4 - Luvi Sun, Bian Yang:
Your Privacy Preference Matters: A Qualitative Study Envisioned for Homecare. 1-7 - Guillaume Gingras, Mehdi Adda, Abdenour Bouzouane, Hussein Ibrahim, Clémence Dallaire:
Forecasting Trends in an Ambient Assisted Living Environment Using Deep Learning. 1-4 - Chenhao Xu, Youyang Qu, Peter W. Eklund, Yong Xiang, Longxiang Gao:
BAFL: An Efficient Blockchain-Based Asynchronous Federated Learning Framework. 1-6 - Gang Liu, Yichao Dong, Guangxi Li:
Cross-Language Plagiarism Detection Model Based On Multiple Features. 1-7 - Ramy Maarouf, Danish Sattar, Ashraf Matrawy:
Evaluating Resilience of Encrypted Traffic Classification against Adversarial Evasion Attacks. 1-6 - David Cavalcanti, Ranieri Carvalho, Nelson S. Rosa:
Adaptive Middleware of Things. 1-6 - Stephanie Anderson, Suma Veeravenkatappa, Priyanka Pola, Seyedamin Pouriyeh, Meng Han:
Automatic Face Mask Detection Using Deep Learning. 1-4 - Dumitru Roman, Nikolay Nikolov, Ahmet Soylu, Brian Elvesæter, Hui Song, Radu Prodan, Dragi Kimovski, Andrea Marrella, Francesco Leotta, Mihhail Matskin, Giannis Ledakis, Konstantinos Theodosiou, Anthony Simonet-Boulogne, Fernando Perales, Evgeny Kharlamov, Alexandre Ulisses, Arnor Solberg, Raffaele Ceccarelli:
Big Data Pipelines on the Computing Continuum: Ecosystem and Use Cases Overview. 1-4 - Matheus Henrique Junqueira Saldanha, Adriano Kamimura Suzuki:
Determining the Probability Distribution of Execution Times. 1-6 - Ahmed Khoumsi:
An Efficient Blockchain-based Electric Vehicle Charging Management System. 1-7 - Kameswar Rao Vaddina, Laurent Lefèvre, Anne-Cécile Orgerie:
Experimental Workflow for Energy and Temperature Profiling on HPC Systems. 1-7 - Haitian Yang, Degang Sun, Yan Wang, He Zhu, Ning Li, Weiqing Huang:
FKTAN: Fusion Keystroke Time-Textual Attention Networks for Continuous Authentication. 1-6 - Liuqun Zhai, Zhuang Qiao, Zhongfang Wang, Dong Wei:
Identify What You are Doing: Smartphone Apps Fingerprinting on Cellular Network Traffic. 1-7 - Marcelo E. Pellenz, Rosana Lachowski, Edgard Jamhour, Glauber Brante, Guilherme Luiz Moritz, Richard Demo Souza:
In-Network Data Aggregation for Information-Centric WSNs using Unsupervised Machine Learning Techniques. 1-7 - Yanheng Liu, Tingting Zheng, Geng Sun, Jing Zhang, Jiahui Li:
A Joint Optimization Approach for UAV-enabled Collaborative Beamforming. 1-6 - Bradley Durden, Mathew Shulman, Andy Reynolds, Thomas Phillips, Demontae Moore, Indya Andrews, Seyedamin Pouriyeh:
Using Machine Learning Techniques to Predict RT- PCR Results for COVID-19 Patients. 1-4 - Siqi Liu, Yanni Han, Yanjie Hu, Qian Tan:
FA-net: Attention-based Fusion Network For Malware HTTPs Traffic Classification. 1-7 - Shaon Bhatta Shuvo, Bonaventure Chidube Molokwu, Samaneh Miri Rostami, Ziad Kobti, Anne W. Snowdon:
Simulating and Predicting the Active Cases and Hospitalization Considering the Second Wave of COVID-19. 1-6 - Ran Tian, Zulong Diao, Haiyang Jiang, Gaogang Xie:
NeVe: A Log-based Fast Incremental Network Feature Embedding Approach. 1-7 - Mohamed Redha Bouakouk, Abdelkrim Abdelli, Lynda Mokdad:
ODM-RPL: Optimized Dual MOP RPL. 1-6 - Shili Hu, Jiangfeng Li, Qinpei Zhao, Chenxi Zhang, Zijian Zhang, Yang Shi:
BlockDL: Privacy-Preserving and Crowd-Sourced Deep Learning Through Blockchain. 1-7 - Yao Hu:
MiniCAR: Minimal Congestion-Aware Routing Method in Fine-Grained Circuit-Switched Networks for Parallel Computing Systems. 1-8 - Zhi Wang, Chaoge Liu, Xiang Cui:
EvilModel: Hiding Malware Inside of Neural Network Models. 1-7 - Michele La Manna, Pericle Perazzo, Luigi Treccozzi, Gianluca Dini:
Assessing the Cost of Quantum Security for Automotive Over -The-Air Updates. 1-6 - Gonçalo Vítor, Pedro Rito, Susana Sargento:
Smart City Data Platform for Real-Time Processing and Data Sharing. 1-7 - Cassandra Frances Laffan, Robert Kozin, James Elliott Coleshill, Alexander Ferworn, Michael Stanfield, Brodie Stanfield:
ARAIG And Minecraft: A COVID-19 Workaround. 1-7 - Lan Huang, Xiaofang Zhang, Yan Wang, Xuping Xie:
Research and Application of Reinforcement Learning Recommendation Method for Taobao. 1-6 - Agata Romano, Rosaria Lanza, Fabrizio Celesti, Antonio Celesti, Maria Fazio, Francesco Martella, Antonino Galletta, Massimo Villari:
Towards Smart Tele-Biomedical Laboratory: Where We Are, Issues, and Future Challenges. 1-4 - Andreas Guillot, Fabrice Theoleyre, Cristel Pelsser:
Fair Delegation of Digital Services Without Third Parties. 1-7 - Christian Sicari, Valeria Lukaj, Antonio Celesti, Maria Fazio, Massimo Villari:
GAVIN: A new platform for enriching 3D virtual indoor navigation with social-based geotags. 1-6 - Hind Mukhtar, Melike Erol-Kantarci:
Machine Learning-Enabled Localization in 5G using LIDAR and RSS Data. 1-6 - Muhammed Choudhury, Guanting Li, Junwei Li, Ke Zhao, Mengyan Dong, Khaled Harfoush:
Power Efficiency in Communication Networks with Power-Proportional Devices. 1-6 - Min Li, Linghan Li, Ruwen Bai, Junxing Ren, Bo Meng, Yang Yang:
A Motion-based Seq-bbox Matching Method for Video Object Detection. 1-7 - Menghan Pan, Daojing He, Xuru Li, Sammy Chan, Emmanouil Panaousis, Yun Gao:
A Lightweight Certificateless Non-interactive Authentication and Key Exchange Protocol for IoT Environments. 1-7 - Daniel Flores-Martín, José García-Alonso, Javier Berrocal, Luca Foschini, Juan Manuel Murillo Rodríguez:
Context-Dependent Services Selection in Smart Environments. 1-6 - Marcel Oliveira Alves, Daniel Oliveira Dantas:
Mobile Augmented Reality for Craniotomy Planning. 1-6 - Asad Ullah Khan, Nadeem Javaid, Jalel Ben-Othman:
A Secure Authentication and Data Sharing Scheme for Wireless Sensor Networks based on Blockchain. 1-5 - Houssem Sagaama, Nourchene Ben Slimane, Maher Marwani, Sabri Skhiri:
Automatic Parameter Tuning for Big Data Pipelines with Deep Reinforcement Learning. 1-7 - Lucas Rodrigues Frank, Roberto Massi de Oliveira, Alex Borges Vieira, Edelberto Franco Silva:
Improving a Smart Environment with Wireless Network User Load Prediction. 1-6 - Runhao Wang, Yuhong Zhang, Haiying Sun, Jing Liu:
Dependable Reinforcement Learning via Timed Differential Dynamic Logic. 1-6 - Yanghai Wang, Dezun Dong, Yemao Xu, Shuo Ouyang, Xiangke Liao:
FastHorovod: Expediting Parallel Message-Passing Schedule for Distributed DNN Training. 1-7 - Edson Damasceno Carvalho, Romuere Rôdrigues Veloso e Silva, Mano Joseph Mathew, Flávio Henrique Duarte de Araújo, Antonio Oseas de Carvalho Filho:
Tumor Segmentation in Breast DCE- MRI Slice Using Deep Learning Methods. 1-6 - Dali Zhu, Hongju Sun, Nan Li, Baoxin Mi, Tong Xi:
BS-Net: A Behavior Sequence Network for Insider Threat Detection. 1-6 - Paolo Zampognaro, Giovanni Paragliola, Vincenzo Falanga:
A FHIR based architecture of a multiprotocol IoT Home Gateway supporting dynamic plug of new devices within instrumented environments. 1-7 - Tomás Fukac, Jan Korenek, Jirí Matousek:
Scalability of Hash-Based Pattern Matching for High-Speed Network Security and Monitoring. 1-6 - Yanheng Liu, Hongyang Pan, Geng Sun, Aimin Wang:
Scheduling Optimization of Charging UAV in Wireless Rechargeable Sensor Networks. 1-7 - Guto Leoni Santos, Patricia Takako Endo, Theo Lynn, Djamel Sadok, Judith Kelner:
Automating the Service Function Chain Availability Assessment. 1-7 - Gustavo Pantuza, Lucas A. C. Bleme, Marcos A. M. Vieira, Luiz Filipe M. Vieira:
Danian: tail latency reduction of networking application through an O(1) scheduler. 1-6 - Hakan Yildiz, Christopher Ritter, Lan Thao Nguyen, Berit Frech, Maria Mora-Martinez, Axel Küpper:
Connecting Self-Sovereign Identity with Federated and User-centric Identities via SAML Integration. 1-7 - Shadi Eltanani, Tjeerd Olde Scheper, Helen Dawes:
K - Nearest Neighbor Algorithm: Proposed Solution for Human Gait Data Classification. 1-5 - Colm Sweeney, Edel Ennis, Raymond R. Bond, Maurice D. Mulvenna, Siobhan O'Neill:
Understanding a happiness dataset: How the machine learning classification accuracy changes with different demographic groups. 1-4 - Panteleimon Rodis, Panagiotis Papadimitriou:
Intelligent Network Service Embedding using Genetic Algorithms. 1-7 - Fabien Viton, Clémence Mauger, Gilles Dequen, Jean-Luc Guérin, Gaël Le Mahec:
Proportional representation to increase data utility in k-anonymous tables. 1-7 - Zhuang Qiao, Liuqun Zhai, Shunliang Zhang, Xiaohui Zhang:
Encrypted 5G Over- The- Top Voice Traffic Identification Based on Deep Learning. 1-7 - Kang Yin, Chengpei Tang, Xie Zhang, Hele Yao:
Robust Human Activity Recognition System with Wi-Fi Using Handcraft Feature. 1-8 - Hanna Kavalionak, Emanuele Carlini, Patrizio Dazzi, Luca Ferrucci, Matteo Mordacchini, Massimo Coppola:
Impact of Network Topology on the Convergence of Decentralized Federated Learning Systems. 1-6 - Mariana Rodrigues, Kalinka R. L. J. C. Branco:
Enabling UAV Services in the IoT with HAMSTER. 1-6 - Hsung-Pin Chang, Wei-Ming Su, Da-Wei Chang:
A Cross-Layered Readahead Architecture for Multi-Tiered Storage Systems. 1-3 - Imen Abidi, Maha Cherif, Moez Hizem, Iness Ahriz, Ridha Bouallegue:
A novel MLP based on compensation method for the effects of High Power Amplifier N onlinearities in Non-Linear SCMA systems. 1-6 - André Ramos Carneiro, Matheus S. Serpa, Philippe O. A. Navaux:
Lightweight Deep Learning Applications on AVX-512. 1-6 - Jianguo Jiang, Xu Wang, Yan Wang, Qiujian Lv, Meichen Liu, Tingting Wang, Leiqi Wang:
GSketch: A Comprehensive Graph Analytic Approach for Masquerader Detection Based on File Access Graph. 1-6 - Chao Liu, Shuai Yu, Min Yu, Baole Wei, Boquan Li, Gang Li, Weiqing Huang:
Adaptive Smooth L1 Loss: A Better Way to Regress Scene Texts with Extreme Aspect Ratios. 1-7 - Pinelopi Kyranoud, Eleni-Maria Kalogeraki, Alexandra K. Michota, Nineta Polemi:
Cybersecurity Certification Requirements for Supply Chain Services. 1-7 - Tania Panayiotou, Hafsa Maryam, Georgios Ellinas:
Deep Quantile Regression for QoT Inference and Confident Decision Making. 1-6 - Sanaz Gheibi, Tania Banerjee, Sanjay Ranka, Sartaj Sahni:
An Effective Data Structure for Contact Sequence Temporal Graphs. 1-8 - Mariano Basile, Giovanni Nardini, Pericle Perazzo, Gianluca Dini:
On Improving SimBlock Blockchain Simulator. 1-6 - Hacène Fouchal, Ramzi Boutehalla:
Comparison of Pseudonym Change Strategies for C-ITS. 1-6 - Zhixin Shi, Yuru Ma, Xiaoyan Yu:
An Effective and Efficient Method for Word-Level Textual Adversarial Attack. 1-6 - Paolo Bottoni, Remo Pareschi, Domenico Tortola, Nicola Gessa, Gilda Massa:
Distributed ledgers to support revenue-sharing business consortia: a Hyperledger-based implementation. 1-6 - George Manias, Harm op den Akker, Ainhoa Azqueta-Alzúaz, Diego Burgos-Sancho, Nikola Dino Capocchiano, Borja Llobell Crespo, Athanasios Dalianis, Andrea Damiani, Krasimir Filipov, Giorgos Giotis, Maritini Kalogerini, Rostislav Kostadinov, Pavlos Kranas, Dimosthenis Kyriazis, Artitaya Lophatananon, Shwetambara Malwade, George Marinos, Fabio Melillo, Vicent Moncho Mas, Kenneth Muir, Marzena Nieroda, Antonio De Nigro, Claudia Pandolfo, Marta Patiño-Martínez, Florin Picioroaga, Aristodemos Pnevmatikakis, Shabbir Syed-Abdul, Tanja Tomson, Dilyana Vicheva, Usman Wajid:
iHELP: Personalised Health Monitoring and Decision Support Based on Artificial Intelligence and Holistic Health Records. 1-8 - Yanan Liu, Huiping Sun, Xu Song, Zhong Chen:
OverlapShard: Overlap-based Sharding Mechanism. 1-7 - Michele Fraccaroli, Giulia Mazzuchelli, Alice Bizzarri:
Machine Learning Techniques for Extracting Relevant Features from Clinical Data for COVID-19 Mortality Prediction. 1-7 - Shuai Su, Fangyuan Yuan, Yulin Yuan, Li Zeng, Chi Chen:
VoFSQ: An Efficient File-Sharing Interactive Verification Protocol. 1-7 - Alessio Catalfamo, Armando Ruggeri, Antonio Celesti, Maria Fazio, Massimo Villari:
A Microservices and Blockchain Based One Time Password (MBB-OTP) Protocol for Security-Enhanced Authentication. 1-6 - Athanasios Tsipis, Konstantinos Oikonomou:
Player Assignment in MEC Gaming for Social Interactivity and Server Provisioning Optimization. 1-7 - Yingchao Yu, Shuitao Gan, Xiaojun Qin:
firm VulSeeker: BERT and Siamese based Vulnerability for Embedded Device Firmware Images. 1-7 - João Pedro Barros, Pedro Brandão:
End-Stage Renal Disease Self-management: mobile app development. 1-4 - Ivanoe De Falco, Antonio Della Cioppa, Tomas Koutny, Umberto Scafuri, Ernesto Tarantino, Martin Ubl:
Grammatical Evolution-Based Approach for Extracting Interpretable Glucose-Dynamics Models. 1-6 - Anas Knari, Mohammed-Amine Koulali, Ahmed Khoumsi:
Deep Reinforcement Learning for Content Caching Optimization in the Internet of Vehicles. 1-6 - Carlo Metta, Riccardo Guidotti, Yuan Yin, Patrick Gallinari, Salvatore Rinzivillo:
Exemplars and Counterexemplars Explanations for Image Classifiers, Targeting Skin Lesion Labeling. 1-7 - Zhezhou Kang, Yi Liu, Guanqun Bi, Fang Fang, Pengfei Yin:
No news is an island: Joint heterogeneous graph network for news classification. 1-7 - Qingkai Meng, Kun Qian, Wenxue Cheng, Fengyuan Ren:
RBA: Adaptive TCP Receive Buffer Sizing. 1-7 - Matilde Tanaglia, Valentina Ientile, Luca L'Abbate, Carlo Combi, Salvatore Scondotto, Gianluca Trifirò:
Multidimensional Design and Analysis of a Data Mart Related to Healthcare Treatments with Biologic Drugs. 1-7 - Luis Augusto Dias Knob, Carlos Henrique Kayser, Tiago Ferreto:
Improving Container Deployment in Edge Computing Using the Infrastructure Aware Scheduling Algorithm. 1-6 - David Monschein, José Antonio Peregrina Pérez, Tim Piotrowski, Zoltán Nochta, Oliver P. Waldhorst, Christian Zirpins:
Towards a Peer-to-Peer Federated Machine Learning Environment for Continuous Authentication. 1-6 - Fabiana Rossi, Simone Falvo, Valeria Cardellini:
GOFS: Geo-distributed Scheduling in OpenFaaS. 1-6 - Yinuo Li, Touria Ait El Mekki, Jin-Kao Hao:
Adverse Event Report Classification in Social and Medico-Social Sector. 1-6 - Mi Chen, Lynda Mokdad, Jalel Ben-Othman, Jean-Michel Fourneau:
MULANE - A Lightweight Extendable Agent-oriented LoRaWAN Simulator with GUI. 1-6 - Alexandre Colombo, Roberta Spolon Ulson, Renata Spolon Lobato, Aleardo Manacero, Marcos Antônio Cavenaghi:
Apriori-Roaring-Parallel: Frequent pattern mining based on compressed bitmaps with OpenMP. 1-6 - Ying Zhong, Ziqi Gao, Rui Li, Citong Que, Xinjie Yang, Zhiliang Wang, Jiahai Yang, Xia Yin, Xingang Shi, Keqin Li:
STRAD: Network Intrusion Detection Algorithm Based on Zero-Positive Learning in Real Complex Network Environment. 1-8 - Jean-Michel Fourneau:
Modeling sensor networks with ON-OFF energy harvesting using Energy Packets. 1-6 - Thiago Correia Medeiros, Elton F. S. Soares, Carlos Alberto Vieira Campos:
An Intelligent Transportation System Application using Mobile Edge Computing. 1-6 - Yúri Faro Dantas De Sant' Anna, José Elwyslan Maurício de Oliveira, Daniel Oliveira Dantas:
Lightweight Classification of Normal Versus Leukemic Cells Using Feature Extraction. 1-7 - Lorenzo Carnevale, Armando Ruggeri, Francesco Martella, Antonio Celesti, Maria Fazio, Massimo Villari:
Multi Hop Reconfiguration of End-Devices in Heterogeneous Edge-IoT Mesh Networks. 1-6 - Francesco Bruschi, Tommaso Paulon, Vincenzo Rana, Donatella Sciuto:
A privacy preserving identification protocol for smart contracts. 1-6 - Khaoula Ammar, Oussama Ben Hai Belkacem, Ridha Bouallegue:
OQAM-FBMC Based Radar Sensing and Wireless Communication in V2V Context. 1-6 - Wei Xiong, Haiyang Jiang, Hongtao Guan, Fengrui Liu:
DSQNet: Domain SeQuence based Deep Neural Network for AGDs Detection. 1-7 - Hengrui Wang, Yahui Yang, Hongzhang Yang:
Hard Disk Failure Prediction Based on Lightgbm with CID. 1-7 - Jie Cui, Lingbiao Kong, Hong Zhong, Xiuwen Sun, Chengjie Gu, Jianfeng Ma:
Scalable QoS-Aware Multicast for SVC Streams in Software-Defined Networks. 1-7 - Beibei Li, Peiran Wang, Hanyuan Huang, Shang Ma, Yukun Jiang:
FLPhish: Reputation-based Phishing Byzantine Defense in Ensemble Federated Learning. 1-6 - Fengchao Wang, Yanwei Liu, Jinxia Liu, Antonios Argyriou, Liming Wang, Zhen Xu:
Output Security for Multi-user Augmented Reality using Federated Reinforcement Learning. 1-7 - Xichen Tang, Jinlong Wang, Ye Zhu, Robin Doss, Xin Han:
Systematic evaluation of abnormal detection methods on gas well sensor data. 1-6 - Tanveer Khan, Alexandros Bakas, Antonis Michalas:
Blind Faith: Privacy-Preserving Machine Learning using Function Approximation. 1-7 - Paul Cotae, Myong H. Kang, Alexander Velazquez:
A Scalable Real-Time Multiagent Decision Making Algorithm with Cost. 1-6 - Francesco Mogavero, Ivan Visconti, Andrea Vitaletti, Marco Zecchini:
The Blockchain Quadrilemma: When Also Computational Effectiveness Matters. 1-6 - Ali Ebrahimi, Uffe Kock Wiil, Marjan Mansourvar, Amin Naemi, Kjeld Andersen, Anette Søgaard Nielsen:
Analysis of Comorbidities of Alcohol Use Disorder. 1-7 - Dimitri Saingre, Thomas Ledoux, Jean-Marc Menaud:
The cost of immortality: A Time To Live for smart contracts. 1-7 - Moustafa Faheem, Adrian Murphy, Carlos Reaño:
GPU-Accelerated Discrete Event Simulations: Towards Industry 4.0 Manufacturing. 1-7 - Yi Ma, Tian Bai, Wenyu Zhang, Shuang Li, Jian Hu, Mingzhe Lu:
Multi-Scale Relation Network for Person Re-identification. 1-7 - Zeyuan Yang, Rentao Gu, Yuefeng Ji:
Virtual Network Function Placement Based on Differentiated Weight Graph Convolutional Neural Network and Maximal Weight Matching. 1-7 - Eric Klieme, Philipp Trenz, Daniel Paeschke, Christian Tietz, Christoph Meinel:
DoorCollect: Towards a Smart Door Handle for User Identification based on a Data Collection System for unsupervised Long-Term Experiments. 1-7 - Ya Chen, Chao Liu, Yu Wang, Yazhe Wang:
A Self-Sovereign Decentralized Identity Platform Based on Blockchain. 1-7 - Francesca Alloatti, Riccardo Tasso, Andrea Bolioli, Elena Messina, Daria Cantù, Elena Guidorzi, Chiara Agamennone, Enrico Brunetti, Renata Marinello:
"Can You Help Me Measure My Blood Sugar?" Co-design of a Voice Interface to Assist Patients and Caregivers at Home. 1-4 - Luis Gustavo Araujo Rodriguez, Daniel Macêdo Batista:
Towards Improving Fuzzer Efficiency for the MQTT Protocol. 1-7 - Alessio Catalfamo, Maria Fazio, Francesco Martella, Antonio Celesti, Massimo Villari:
MuoviMe: Secure Access to Sustainable Mobility Services in Smart City. 1-5 - Chaoqun Li, Qian Tan, Zhen Xu, Xi Luo, Liang Dai:
Security Analysis of DNS Open Resolvers by Continuous and Ambulatory Detection. 1-7 - Armando Ruggeri, Rosa Di Salvo, Maria Fazio, Antonio Celesti, Massimo Villari:
Blockchain-Based Strategy to Avoid Fake AI in eHealth Scenarios with Reinforcement Learning. 1-7 - Luis Felipe Borges Morão De Oliveira, João Deluca Figueiro Costa, João Vitor de Carvalho Fontes:
An Extended Comparison of RSSI-based Position Estimation Algorithms for LoRa Devices. 1-6 - Mateus T. Kawazoe, André G. Lauer, Natassya B. F. Silva:
UrbanVG: A Gamification Encouraging Urban Vegetable Garden Platform. 1-6 - Anuj Jain, Sartaj Sahni:
Min Hop and Foremost Paths in Interval Temporal Graphs. 1-7 - Weiqing Huang, Yiqing Liu, Wen Wang, Jingru Geng:
A GSO Protected Area Calculation Model based on Controllable NGSO System Parameters. 1-6 - Yixi Zhang, Xueliang Sun, Xiang Qin, Chaoran Li, Siwei Wang, Yi Xie:
Tripod: Use Data Augmentation to Enhance Website Fingerprinting. 1-7 - Yubraj Gupta, Carlos Costa, Eduardo Pinho, Luís A. Bastião Silva:
A DICOM Standard Pipeline for Microscope Imaging Modalities. 1-6 - Tamoghna Ojha, Theofanis P. Raptis, Marco Conti, Andrea Passarella:
MobiWEB: Mobility-Aware Energy Balancing for P2P Wireless Power Transfer. 1-6 - Hisham A. Kholidy, Andrew Karam, James L. Sidoran, Mohammad Ashiqur Rahman:
5G Core Security in Edge Networks: A Vulnerability Assessment Approach. 1-6 - Hongyu Liu, Bo Lang, Shaojie Chen, Mengyang Yuan:
Interpretable deep learning method for attack detection based on spatial domain attention. 1-6 - José Anatiel Gonçalves Santos Landim, Flávio Henrique Duarte de Araújo, Mano Joseph Mathew, Antonio Oseas de Carvalho Filho:
An automated method for segmentation of COVID-19 lesions based on Computed Tomography using deep learning methods. 1-6 - Isadora Cardoso-Pereira, Gisele Lobo Pappa, Heitor S. Ramos:
Neural Architecture Search for Resource-Constrained Internet of Things Devices. 1-6 - Binal Tejani, Robson E. De Grande:
Virtual Resource Composition for Allocation Management in VCC Networks. 1-6 - Weiqing Huang, He Zhu, Ce Li, Qiujian Lv, Yan Wang, Haitian Yang:
ITDBERT: Temporal-semantic Representation for Insider Threat Detection. 1-7 - Bertrand Mathieu, Stéphane Tuffin:
Evaluating the L4S Architecture in Cellular Networks with a Programmable Switch. 1-6 - Franklin Magalhães Ribeiro Junior, Carlos Alberto Kamienski:
TW-Fogginess: A Trustworthy IoT System based on Mist and Fog Computing. 1-6 - Yichen Wan, Youyang Qu, Longxiang Gao, Yong Xiang:
Differentially Privacy-Preserving Federated Learning Using Wasserstein Generative Adversarial Network. 1-6 - Mara Caldeira, Miguel Correia:
Blockchain Address Transparency with DNS. 1-7 - Hana Krichene, Paul Dubrulle, Raphael Millet:
DSM: Data Sharing Management system for in-vehicle communication. 1-7 - Chris Brogly, Daniel J. Lizotte, Michael A. Bauer:
Ecological Momentary Assessment extensions 3 (EMAX3) Proposal: An app for EMA-type research. 1-4 - Jingbo Miao, Yanwei Liu, Jinxia Liu, Antonios Argyriou, Zhen Xu, Yanni Han:
Improved Face Detector on Fisheye Images via Spherical-Domain Attention. 1-7 - Matthew Ding:
An Analysis of Multi-hop Iterative Approximate Byzantine Consensus with Local Communication. 1-6 - Mohamed Anis Fekih, Walid Bechkit, Hervé Rivano:
On the Data Analysis of Participatory Air Pollution Monitoring Using Low-cost Sensors. 1-7 - John Violos, Stylianos Tsanakas, Theodoros Theodoropoulos, Aris Leivadeas, Konstantinos Tserpes, Theodora A. Varvarigou:
Hypertuming GRU Neural Networks for Edge Resource Usage Prediction. 1-8 - Xiaoqing Ma, Chao Zheng, Zhao Li, Qingyun Liu, Xunxun Chen:
CDNFinder: Detecting CDN-hosted Nodes by Graph-Based Semi-Supervised Classification. 1-7 - Danilo Carastan-Santos, Anderson Andrei Da Silva, Alfredo Goldman, Angan Mitra, Yanik Ngoko, Clément Mommessin, Denis Trystram:
Short-Term Ambient Temperature Forecasting for Smart Heaters. 1-6 - Simranpreet Kaur, Pooya Moradian Zadeh:
An Agent-Based Model to Study the Impact of Non-Pharmaceutical Interventions During Covid-19 Pandemic on Social Isolation. 1-6
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.