Stop the war!
Остановите войну!
for scientists:
default search action
27th ICCCN 2018: Hangzhou, China
- 27th International Conference on Computer Communication and Networks, ICCCN 2018, Hangzhou, China, July 30 - August 2, 2018. IEEE 2018, ISBN 978-1-5386-5156-8
- Kang Chen, Jianwei Liu, James Martin, Kuang-Ching Wang, Hongxin Hu:
Improving Integrated LTE-WiFi Network Performance with SDN Based Flow Scheduling. 1-9 - Xianliang Jiang, Guang Jin, Haiming Chen:
HFCC: An Adaptive Congestion Control Algorithm Based on Explicit Hybrid Feedbacks. 1-8 - Xiaofei He, Wei Yu, Hansong Xu, Jie Lin, Xinyu Yang, Chao Lu, Xinwen Fu:
Towards 3D Deployment of UAV Base Stations in Uneven Terrain. 1-9 - Yi Ji, Juncheng Jia, Jin Wang, Jingya Zhou, Shukui Zhang:
Group Based Strategy to Accelerate Rendezvous in Cognitive Radio Networks. 1-9 - Babak Mafakheri, Leonardo Goratti, Roberto Riggio, Chiara Buratti, Sam Reisenfeld:
LTE Transmission in Unlicensed Bands: Evaluating the Impact over Clear Channel Assessment. 1-8 - Kun Tang, Xubin He, Saurabh Gupta, Sudharshan S. Vazhkudai, Devesh Tiwari:
Exploring the Optimal Platform Configuration for Power-Constrained HPC Workflows. 1-9 - Tiago B. G. Perez, Wei Chen, Raymond Ji, Liu Liu, Xiaobo Zhou:
PETS: Bottleneck-Aware Spark Tuning with Parameter Ensembles. 1-9 - Fei Peng, Le Qin, Min Long:
CCoLBP: Chromatic Co-Occurrence of Local Binary Pattern for Face Presentation Attack Detection. 1-9 - Dominik Schäfer, Janick Edinger, Martin Breitbach, Christian Becker:
Workload Partitioning and Task Migration to Reduce Response Times in Heterogeneous Computing Environments. 1-11 - Yuan Zhuang, Xiaohui Wei, Hongliang Li, Yongfang Wang, Xubin He:
An Optimal Checkpointing Model with Online OCI Adjustment for Stream Processing Applications. 1-9 - Xu Chen, Wenzhong Li, Tong Zhan, Sanglu Lu:
MMCode: Enhancing Color Channels for Screen-Camera Communication with Semi-Supervised Clustering. 1-9 - Guang Yang, Yong Jiang, Qing Li, Xuya Jia, Mingwei Xu:
Cross-Layer Self-Similar Coflow Scheduling for Machine Learning Clusters. 1-9 - Shiyan Chen, Dagang Li, Xiaogang Chen, Wenbing Han, Deze Zeng:
Storage-Aware Network Stack for NVM-Assisted Key-Value Store. 1-9 - Hamed Rezaei, Mojtaba MalekpourShahraki, Balajee Vamanan:
Slytherin: Dynamic, Network-Assisted Prioritization of Tail Packets in Datacenter Networks. 1-9 - Ryan Blake Jackson, Tracy Camp:
Amazon Echo Security: Machine Learning to Classify Encrypted Traffic. 1-10 - Philip Lundrigan, Sneha Kumar Kasera, Neal Patwari:
STRAP: Secure TRansfer of Association Protocol. 1-9 - Yuan Gong, Christian Poellabauer:
Protecting Voice Controlled Systems Using Sound Source Identification Based on Acoustic Cues. 1-9 - Zhiyuan Zheng, Allen Webb, A. L. Narasimha Reddy, Riccardo Bettati:
IoTAegis: A Scalable Framework to Secure the Internet of Things. 1-9 - Gonca Gürsun, Murat Sensoy, Melih Kandemir:
On Context-Aware DDoS Attacks Using Deep Generative Networks. 1-9 - Hong Zhong, Bo Huang, Jie Cui, Jiang Li, Kewei Sha:
Efficient Conditional Privacy-Preserving Authentication Scheme Using Revocation Messages for VANET. 1-8 - Shujie Cui, Sana Belguith, Ming Zhang, Muhammad Rizwan Asghar, Giovanni Russello:
Preserving Access Pattern Privacy in SGX-Assisted Encrypted Search. 1-9 - Ihsan H. Abdulqadder, Deqing Zou, Israa T. Aziz, Bin Yuan:
Enhanced Attack Aware Security Provisioning Scheme in SDN/NFV Enabled over 5G Network. 1-9 - Rui Xiao, Hui Zhu, Chao Song, Ximeng Liu, Jian Dong, Hui Li:
Attacking Network Isolation in Software-Defined Networks: New Attacks and Countermeasures. 1-9 - Yan Sun, Shambhu J. Upadhyaya:
Synthetic Forgery Attack against Continuous Keystroke Authentication Systems. 1-7 - Samuel Mergendahl, Devkishen Sisodia, Jun Li, Hasan Cam:
FR-WARD: Fast Retransmit as a Wary but Ample Response to Distributed Denial-of-Service Attacks from the Internet of Things. 1-9 - Ahmed Boubrima, Walid Bechkit, Hervé Rivano, Lionel Soulhac:
Leveraging the Potential of WSN for an Efficient Correction of Air Pollution Fine-Grained Simulations. 1-9 - Sheng Tan, Linghan Zhang, Jie Yang:
Sensing Fruit Ripeness Using Wireless Signals. 1-9 - Han Zou, Jianfei Yang, Yuxun Zhou, Lihua Xie, Costas J. Spanos:
Robust WiFi-Enabled Device-Free Gesture Recognition via Unsupervised Adversarial Domain Adaptation. 1-8 - Yufeng Deng, Dong Wang, Qian Zhang, Run Zhao, Bo Chen:
ReaderTrack: Reader-Book Interaction Reasoning Using RFID and Smartwatch. 1-9 - Yuan Cao, Yunyi Guo, Benyu Liu, Wei Ge, Min Zhu, Chip-Hong Chang:
A Fully Digital Physical Unclonable Function Based Temperature Sensor for Secure Remote Sensing. 1-8 - Weichao Gao, William G. Hatcher, Wei Yu:
A Survey of Blockchain: Techniques, Applications, and Challenges. 1-11 - You Sun, Rui Zhang, Xin Wang, Kaiqiang Gao, Ling Liu:
A Decentralizing Attribute-Based Signature for Healthcare Blockchain. 1-9 - Ruozhou Yu, Guoliang Xue, Vishnu Teja Kilari, Dejun Yang, Jian Tang:
CoinExpress: A Fast Payment Routing Mechanism in Blockchain-Based Payment Channel Networks. 1-9 - Yutao Huang, Yifei Zhu, Xiaoyi Fan, Xiaoqiang Ma, Fangxin Wang, Jiangchuan Liu, Ziyi Wang, Yong Cui:
Task Scheduling with Optimized Transmission Time in Collaborative Cloud-Edge Learning. 1-9 - Yu-Jen Ku, Po-Han Chiang, Sujit Dey:
Quality of Service Optimization for Vehicular Edge Computing with Solar-Powered Road Side Units. 1-10 - Hongyue Wu, Shuiguang Deng, Wei Li, Samee U. Khan, Jianwei Yin, Albert Y. Zomaya:
Request Dispatching for Minimizing Service Response Time in Edge Cloud Systems. 1-9 - Alimzhan Sultangazin, Suhas N. Diggavi, Paulo Tabuada:
Protecting the Privacy of Networked Multi-Agent Systems Controlled over the Cloud. 1-7 - Seungwon Shin, Zhaoyan Xu, Yeonkeun Kim, Guofei Gu:
CloudRand: Building Heterogeneous and Moving-Target Network Interfaces. 1-11 - Xiaokun Li, Siyang Wang, Weigang Wu, Xu Chen, Bin Xiao:
Interest Tree Based Information Dissemination via Vehicular Named Data Networking. 1-9 - Fan Wu, Wang Yang, Zhenyu Fan, Kaijin Tian:
Multicast Rate Adaptation in WLAN via NDN. 1-8 - Aleksei Fedorov, Haibo Zhang, Yawen Chen:
User Localization Using Random Access Channel Signals in LTE Networks with Massive MIMO. 1-9 - Yao Ma, William F. Young, Eric Anderson, Jason B. Coder:
Probability of Coexistence of LTE-LAA and WLAN Systems Based on Delay Constraints. 1-9 - Tianyuan Sun, Yongcai Wang, Deying Li, Wenping Chen, Zhaoquan Gu:
Robust Component-Based Network Localization with Noisy Range Measurements. 1-9 - Hemin Yang, George F. Riley:
Machine Learning Based Flow Entry Eviction for OpenFlow Switches. 1-8 - Zhijie Zhu, Qing Li, Shu-Tao Xia, Mingwei Xu:
CAFFE: Congestion-Aware Fast Failure Recovery in Software Defined Networks. 1-9 - Deepak Singh, Bryan Ng, Yuan-Cheng Lai, Ying-Dar Lin, Winston K. G. Seah:
Modelling Switches with Internal Buffering in Software-Defined Networks. 1-9 - Lei Wang, Qing Li, Yang Liu, Yong Jiang, Jianping Wu:
Simplifying Network Updates in SDN and NFV Networks Using GUM. 1-9 - Minshen Wang, Jinbo Xiong, Rong Ma, Qi Li, Biao Jin:
A Novel Data Secure Deletion Scheme for Mobile Devices. 1-8 - Fei Yan, Yijia Li, Liqiang Zhang:
ActivityShielder: An Activity Hijacking Defense Scheme for Android Devices. 1-9 - Zhen Li, Qi Liao:
Harnessing Uncertainty in Vulnerability Market. 1-9 - Yu Zhang, Huan Wu, Jianzhong Zhang, Jingjing Wang, Xueqiang Zou:
TW-FCM: An Improved Fuzzy-C-Means Algorithm for SPIT Detection. 1-9 - Jia-Hao Xu, Zhen Wang, Guanghai Cui, Yizhi Ren, Hong Ding, Kim-Kwang Raymond Choo:
An Extended Exploration to the Epidemic Containment Game. 1-7 - Zengwen Yuan, Yuanjie Li, Chunyi Peng, Songwu Lu, Haotian Deng, Zhaowei Tan, Taqi Raza:
A Machine Learning Based Approach to Mobile Network Analysis. 1-9 - Bryan Hall, Manimaran Govindarasu:
An Assured Deletion Technique for Cloud-Based IoT. 1-9 - Anuj Kaul, Li Xue, Katia Obraczka, Mateus A. S. Santos, Thierry Turletti:
Handover and Load Balancing for Distributed Network Control: Applications in ITS Message Dissemination. 1-8 - Ashwin Bahulkar, Boleslaw K. Szymanski:
Interaction Patterns in a Multilayer Social Network. 1-8 - Hanshang Li, Ting Li, Fan Li, Yue Wu, Yu Wang:
Cumulative Participant Selection with Switch Costs in Large-Scale Mobile Crowd Sensing. 1-9 - Huiling Shi, Wei Zhang, Xinchang Zhang:
Xspider: A Multi-Switch Testbed for Software Defined Networks. 1-2 - Zhenguang Yu, Jingyu Wang, Qi Qi, Haifeng Sun, Jian Zou:
A Boundless Resource Orchestrator Based on Container Technology in Edge Computing. 1-2 - Ligang Dong, Long Chen, Bohan He, Weiming Wang:
The Research on Designs of Multiple Flow Tables in the OpenFlow Protocol. 1-2 - Shujie Cui, Muhammad Rizwan Asghar, Giovanni Russello:
Towards Blockchain-Based Scalable and Trustworthy File Sharing. 1-2 - Jian Zou, Jingyu Wang, Qi Qi, Haifeng Sun, Zhenguang Yu, Jun Xu:
EVN: An Elastic Virtual Network Supporting NFV Customized and Rapid Migration. 1-2 - Dejiao Niu, Bo Chen, Tao Cai, ZhiPeng Chen:
The Classified and Active Caching Strategy for Iterative Application in Spark. 1-2 - Ragaharini Jawaharan, Purnima Murali Mohan, Tamal Das, Mohan Gurusamy:
Empirical Evaluation of SDN Controllers Using Mininet/Wireshark and Comparison with Cbench. 1-2 - Lim Yong Zhi, Purnima Murali Mohan, Vignesh Sridharan, Mohan Gurusamy:
Secondary Controller Mapping for Reliable Control Traffic Forwarding in SDN. 1-2 - Donghyeok An, Dohyung Kim:
ICN-Based Light-Weighted Mobility Support in IoT. 1-2 - Ying Qian, Prabir Bhattacharya, Wanqing You, Kai Qian:
Security Threat Analysis of SDN Switch Flow Table. 1-2 - Jiaqi Wang, Xinlei He, Qingyuan Gong, Yang Chen, Tianyi Wang, Xin Wang:
Deep Learning-Based Malicious Account Detection in the Momo Social Network. 1-2 - Yang Yu, Jian Wang, Jiqiang Liu, Lei Han, Xudong He, ShaoHua Lv:
Multi-Dimension Threat Situation Assessment Based on Network Security Attributes. 1-2 - Yongshun Zhang, Xin Jia, Weigang Zhu, Jianquan Zhao, Shuya Kong:
Chirp Interference Mitigation for FHSS Communication Based on Compressive Sensing. 1-2 - Degan Zhang, Xiaohua Liu, Yuya Cui, Hong-tao Peng:
New Big Data Collecting Method Based on Compressive Sensing in WSN. 1-2 - Chi-Shih Chao:
A Feasible Anomaly Diagnosis Mechanism for Stateful Firewall Rules. 1-2 - He Li, Tian Xiao, Yihua Lan, Qinglei Qi, Quan Liu, Jinjiang Liu:
A Stop-Wait Collaborative Charging Scheme for Mobile Wireless Rechargeable Sensor Networks. 1-2 - Aung Kaung Myat, Masaru Onodera, Yoshito Tobe:
FastQ: QoS Control Based on the Time Sequence of First Few Packets. 1-2 - Eliana Neuza Silva, Fernando Mira da Silva, Rui Manuel Rocha:
Crowdsensing Approach to Monitoring and Optimize Wi-Fi Networks in Adversarial Environments. 1-2 - Meng Sun, Xinchang Zhang, Jianwei Zhang:
A Distributed Approach Based on Hierarchical Decompostion for Network Coded Group Multicast. 1-2 - Liudong Zuo, Chase Q. Wu, Nageswara S. V. Rao, Aiqin Hou, Chia-Han Chang:
Bandwidth Preemption for High-Priority Data Transfer on Dedicated Channels. 1-8 - Desta Haileselassie Hagos, Paal E. Engelstad, Anis Yazidi, Øivind Kure:
Towards a Robust and Scalable TCP Flavors Prediction Model from Passive Traffic. 1-11 - Jing Xie, Wenxue Cheng, Tong Zhang, Danfeng Shan, Fengyuan Ren:
Estimating Short Connection Capacity on High Performance User Level Network Stack. 1-9 - Ningjia Fu, Yuwei Xu, Jianzhong Zhang, Rongkang Wang, Jingdong Xu:
FlowCop: Detecting "Stranger" in Network Traffic Classification. 1-9 - Leijun Huang, Hailin Feng, Ying Le, Chaofan Shen:
Redundancy Elimination on Unidirectional Lossy Links. 1-9 - Soklong Lim, Jun Hao, Zaixin Lu, Xuechen Zhang, Zhao Zhang:
Approximating the k-Minimum Distance Rumor Source Detection in Online Social Networks. 1-9 - Yang Zhang, Daniel Zhang, Nathan Vance, Dong Wang:
Optimizing Online Task Allocation for Multi-Attribute Social Sensing. 1-9 - Guanghai Cui, Yizhi Ren, Shengwen Tian, Ting Wu, Kim-Kwang Raymond Choo:
Evolution of Resource Sharing Cooperation Based on Reciprocity in Social Networks. 1-9 - Seng-Kyoun Jo, Lin Wang, Jussi Kangasharju, Max Mühlhäuser:
Cost-Effective and Eco-Friendly Green Routing Using Renewable Energy. 1-8 - Kun Huang, Xuelin Chen:
A Power-Efficient Approach to TCAM-Based Regular Expression Matching. 1-9 - Taruna Seth, Chao Feng, Murali Ramanathan, Vipin Chaudhary:
Exploring Scalable Computing Architectures for Interactions Analysis. 1-9 - Teng Wang, Son Nam Nguyen, Jiayin Wang, Tengpeng Li, Xiaoqian Zhang, Ningfang Mi, Bin Zhao, Bo Sheng:
RoVEr: Robust and Verifiable Erasure Code for Hadoop Distributed File Systems. 1-9 - Jiazhen Zhou, Cory C. Beard, Yi Qian:
Distributed Device Caching for Information Updating in Emergency Communications. 1-9 - Joaquin Chung, Rajkumar Kettimuthu, Nageswara S. V. Rao, Ian T. Foster:
Democratizing Network Reservations through Application-Aware Orchestration. 1-9 - Bingqian Lu, Sai Santosh Dayapule, Fan Yao, Jingxin Wu, Guru Venkataramani, Suresh Subramaniam:
PopCorns: Power Optimization Using a Cooperative Network-Server Approach for Data Centers. 1-9 - Ziji Guo, Yong Guan:
Active Probing-Based Schemes and Data Analytics for Investigating Malicious Fast-Flux Web-Cloaking Based Domains. 1-9 - Malek Athamnah, Amitangshu Pal, Krishna Kant:
A Framework for Misconfiguration Diagnosis in Interconnected Multiparty Systems. 1-9 - Ligang Dong, Long Chen, Yunfei Zhang, Bohan He, Jing Zhou, Weiming Wang, Victor C. M. Leung:
Dynamic Policy Deployment in SDN Switch Based on Monitoring and Analysis of User Behaviors. 1-8 - Phani Krishna Penumarthi, Aaron Pecora, Jason M. O'Kane, Srihari Nelakuditi:
Failure-Inference-Based Fast Reroute with Progressive Link Metric Increments. 1-7 - Sigit Aryo Pambudi, Jie Wang, Wenye Wang, Min Song, Xiaoyan Zhu:
The Aftermath of Broken Links: Resilience of IoT Systems from a Networking Perspective. 1-9 - Jie Cui, Sheng Zhou, Hong Zhong, Yan Xu, Kewei Sha:
Transaction-Based Flow Rule Conflict Detection and Resolution in SDN. 1-9 - Thierry Arrabal, Dominique Dhoutaut, Eugen Dedu:
Efficient Density Estimation Algorithm for Ultra Dense Wireless Networks. 1-9 - Fenghua Li, Yongjun Li, Zhengkun Yang, Yunchuan Guo, Lihua Yin, Zhen Wang:
Selecting Combined Countermeasures for Multi-Attack Paths in Intrusion Response System. 1-9 - Eyuphan Bulut, Steven M. Hernandez, Aashish Dhungana, Boleslaw K. Szymanski:
Is Crowdcharging Possible? 1-9 - Julien Gedeon, Michael Stein, Lin Wang, Max Mühlhäuser:
On Scalable In-Network Operator Placement for Edge Computing. 1-9 - Yanni Yang, Jiannong Cao, Xuefeng Liu, Xiulong Liu:
Wi-Count: Passing People Counting with COTS WiFi Devices. 1-9 - Jiaying Kou, Xiaoming Fu, Jiahua Du, Hua Wang, Geordie Z. Zhang:
Understanding Housing Market Behaviour from a Microscopic Perspective. 1-9 - Dan Zhu, Hui Zhu, Ximeng Liu, Hui Li, Fengwei Wang, Hao Li:
Achieve Efficient and Privacy-Preserving Medical Primary Diagnosis Based on kNN. 1-9 - Weidong Yang, Xuyu Wang, Shui Cao, Hui Wang, Shiwen Mao:
Multi-Class Wheat Moisture Detection with 5GHz Wi-Fi: A Deep LSTM Approach. 1-9 - En Wang, Yongjian Yang, Jie Wu, Dongming Luan, Hengzhi Wang:
Worker Recruitment Strategy for Self-Organized Mobile Social Crowdsensing. 1-9 - Rajesh Bajracharya, John N. Daigle:
Centralized versus Distributed Efficient Route Computation with Multiply-Constrained Link Costs. 1-9 - Chowdhury Sayeed Hyder, Li Xiao, Guoliang Xing:
Coalition-Based Cooperative Routing in Cognitive Radio Networks. 1-9 - James Mariani, Spencer Ottarson, Li Xiao:
HSNet: Energy Conservation in Heterogeneous Smartphone Ad Hoc Networks. 1-9 - Feiran You, Jun Li, Jinhui Lu, Feng Shu, Tingting Liu, Zhu Han:
A Multi-Rounds Double Auction Based Resource Trading for Small-Cell Caching System. 1-7 - Stefano Basagni, Georgia Koutsandria, Chiara Petrioli:
A Comparative Performance Evaluation of Wake-Up Radio-Based Data Forwarding for Green Wireless Networks. 1-9 - Lei Deng, Jing Deng, Po-Ning Chen, Yunghsiang S. Han:
On the Asymptotic Performance of Delay-Constrained Slotted ALOHA. 1-8 - Yue Zheng, Zheng Yang, Junjie Yin, Chenshu Wu, Kun Qian, Fu Xiao, Yunhao Liu:
Combating Cross-Technology Interference for Robust Wireless Sensing with COTS WiFi. 1-9 - Abdulhamid Adebayo, Danda B. Rawat, Lina Ni, Min Song:
Group-Query-as-a-Service for Secure Low-Latency Opportunistic RF Spectrum Access in Mobile Edge Computing Enabled Wireless Networks. 1-7 - Lixing Song, Aaron Striegel:
A Lightweight Scheme for Rapid and Accurate WiFi Path Characterization. 1-9 - Guanglin Zhang, Yan Chen, Zhirong Shen, Lin Wang:
Energy Management for Multi-User Mobile-Edge Computing Systems with Energy Harvesting Devices and QoS Constraints. 1-6