default search action
33rd ITNAC 2023: Melbourne, Australia
- 33rd International Telecommunication Networks and Applications Conference, ITNAC 2023, Melbourne, Australia, November 29 - Dec. 1, 2023. IEEE 2023, ISBN 979-8-3503-1713-8
- Mohammed Elsagher, Akram Al-Hourani, Ke Wang:
On the Spatial Correlation of UAV-to-Ground Excess Path-Loss. 1-6 - Mohammed F. Suleiman, Usman Adeel:
Energy Efficient Data Collection Using Predefined Path Constrained Mobility for Mobile Sinks in Wireless Sensor Networks. 1-6 - Jóhannus Kristmundsson, Øystein Patursson, John R. Potter, Qin Xin:
Exploring Cellular Communications for Remote Offshore Aquaculture Monitoring. 7-10 - Kai-Chun Yang, Po-Ching Lin:
Mutual Authentication between Aerial Base Stations and Core Network: A Lightweight Security Scheme. 11-18 - K. T. Arasu, Michael R. Clark, Timothy Michael McManus:
A New Class of Optimal Frequency Hopping Sequences with Applications to Secure Communication Waveforms. 19-24 - Aiman Nait Abbou, Konstantinos Samdanis, Jukka Manner:
URLLC in B5G Networks: Use Cases, TSN/DetNet Extension, and Pending Issues. 25-30 - Aliyu Makama, Koojana Kuladinithi, Andreas Timm-Giel:
Modeling and Evaluation of Geophone Energy Consumption in Wireless Seismic Data Acquisition Networks. 31-37 - Konrad Fuger, Koojana Kuladinithi, Manav Sood, Andreas Timm-Giel:
Feasibility Study on Position Verification in Urban UAV Networks. 38-43 - Sun-Jin Lee, Na-Yeon Shin, Jung-Hyun Moon, Il-Gu Lee:
DANCE: Dynamic Anchor Node-Based Cooperative Enhancement of Wireless Indoor Localization for Internet of Things. 44-50 - Kodai Tanabe, Go Hasegawa, Gen Kitagata:
Adaptive compression of operational commands for remote network management over LPWA. 51-56 - Amjed Abbas Ahmed, Mohammad Kamrul Hasan, Nurhizam Safie Mohd Satar, Nazmus Shaker Nafi, Azana Hafizah Mohd Aman, Shayla Islam, Saif Aamer Fadhil:
Detection of Crucial Power Side Channel Data Leakage in Neural Networks. 57-62 - Bruno Ribeiro, Pedro Gonçalves, Paulo C. Bartolomeu:
Digital Twin Migration using the OKD platform: A Use-Case for Emergency Vehicles. 63-69 - Yu-Ran Jeon, Jung-Hwa Ryu, So-Yeon Kim, Na-Eun Park, Il-Gu Lee:
CaliProb: Probability-based Calibration Model for Robust Predictions in Environments with Data Biases. 70-75 - Yooncheol Choi, Dongyeong Kim, Mingyu Jang, Dongweon Yoon:
Spreading Sequence Blind Estimation in DSSS System Using Gradient Ascent Method. 76-79 - Amjed Abbas Ahmed, Mohammad Kamrul Hasan, Nazmus Shaker Nafi, Azana Hafizah Mohd Aman, Shayla Islam, Mohammad Siab Nahi:
Optimization Technique for Deep Learning Methodology on Power Side Channel Attacks. 80-83 - Ryota Fukuda, Masahiro Shibata, Masato Tsuru:
Optimal Scheduling of Multipath Multicast with In-network Cache for One-to-many Transfer. 84-91 - Makoto Ito, Taiju Mikoshi, Kouichi Genda:
Deep Learning Based Path Planning Using Integer Linear Programming Method to Teacher Signal. 92-97 - RuoYang Gu, Jinlong Fei, Hao Yu, Yuefei Zhu, Kai Yang, Fang Guo:
Meta-TFEN: A Multi-Modal Deep Learning Approach for Encrypted Malicious Traffic Detection. 98-104 - B. Frischkorn, Michael Knitter, Wolfgang Endemann, Rüdiger Kays:
Achieving Sub-meter Accuracy for 5G Localization at FR1 Bandwidth Limitations. 105-109 - Ayush Kumar, Vrizlynn L. L. Thing:
Malicious Lateral Movement in 5G Core With Network Slicing And Its Detection. 110-117 - Deven Panchal, Dan Musgrove, Isilay Baran, David Lu:
Sharing, Licensing, Buying, Selling and Operationalizing ML Models: A Deep Learning based Co-operative and Co-ordinated Security usecase. 118-123 - Kola Thirupathaiah, Montasir Qasymeh, A. Ramakrishna:
Nanoplasmonic Broadband Filters Using Broadside Edge Coupled Coplanar Waveguide. 124-127 - Ashish Rauniyar, Olav N. Østerbø, Jan Erik Håkegård, Paal E. Engelstad:
Ergodic Performance Analysis of Reconfigurable Intelligent Surface Enabled Bidirectional NOMA. 128-133 - Praveen Peiris, Thursha Herath, Roshani Dissanayaka, Kanishka Saranga, Samantha Thelijjagoda, Ishara Weerathunge:
Comprehensive Browser Extension for Analysing YouTube User Engagement, Controversy, User Requirements, and Trending Keywords. 134-139 - Belal Ali, Mark A. Gregory, Shuo Li, Omar Amjad Dib:
Zero Trust Security Framework for 5G MEC Applications: Evaluating UE Dynamic Network Behaviour. 140-144 - Bin Liang, Mark A. Gregory, Shuo Li:
Service-driven User Plane Architecture for Future Cellular Networks and Multi-access Edge Computing. 145-151 - Shaimaa R. Alkaabi, Mark A. Gregory, Shuo Li:
Server Search and Selection Algorithm for a Pre-Handover in Multi-Access Edge Computing. 152-155 - Alexander Frömming, Stefan Diederich, Lars Häring, Andreas Czylwik:
Clipping Noise Mitigation for Coherent OFDM Systems Using Decision-Aided Reconstruction Combined with Neural Networks. 156-161 - Rafee Al Ahsan, Fadhel M. Ghannouchi, Abraham O. Fapojuwo:
Analysis of Adapted Tone Reservation PAPR Reduction Techniques in OTSM System. 162-168 - Mohammad Reza Dibaj, Pouya Mehdizadeh, Mohammad Sadegh Ghasrizadeh, Hamzeh Beyranvand, Juan Carlos Hernandez-Hernandez, José Alberto Hernández, David Larrabeiti, Farhad Arpanaei:
From Strings to Streams: A Multi-Period Analysis of QKD over EONs, Showcasing Multi-Band vs. Multi-Fiber Solutions. 169-175 - Filippos Christou, Andreas Kirstädter:
Using Intent Directed Acyclic Graphs in Multi-Domain IP-Optical Networks. 176-179 - Md. Jahid Faruki, Nemai Karmakar:
Modulation Bandwidth Study on SQW GaN LEDs for High-Speed Visible Light Communication. 180-182 - Yevhenii Shudrenko, Koojana Kuladinithi, Daniel Plöger, Andreas Timm-Giel:
Optimizing Data Latency for Time-Critical Avionic Sensors. 183-189 - Evizal Abdul Kadir, Akram Alomainy, Hanita Daud, Warih Maharani, Noryanti Muhammad, Nesi Syafitri:
Multi Sensor Network System for Early Detection and Prediction of Forest Fires in Southeast Asia. 190-195 - Steven Cumming, Philip Branch:
A LoRa-Based Monitoring System for Agriculture. 196-203 - Shih-Jung Wang, Bo-Jhen Huang, Ming-Hui Hu:
A Deep Learning-based Air Quality Index Prediction Model Using LSTM and Reference Stations: A Real Application in Taiwan. 204-209 - Da-Ren Chen:
Sensor-Centric Link Adaptation and Transmit Power Control for Energy-Efficient and Quality-of-Service WBANs. 210-213 - Philip Branch, Phillip Weinstock:
Functional Programming for the Internet of Things: A LoRa-MQTT Gateway written in Elixir. 214-217 - Camilo Anzola Rojas, Juan Carlos Aguado, Ramón J. Durán Barroso, Ignacio de Miguel, Noemí Merayo, Patricia Fernández, Rubén M. Lorenzo, Evaristo J. Abril:
RSU Placement Considering V2X Services Requirements and Available Radio Resources. 218-221 - Ken T. Murata, Kazutaka Kikuta, Tsutomu Nagatsuma, Hideo Imanaka, Praphan Pavarangkoon:
International Deployment of Visual IoT for Disaster Mitigation. 228-233 - Boris Ramos, Edison Del Rosario, Nelson Tovar:
Assessing the Capability of Random Forest to Estimate Received Power in LoRaWAN for Agricultural Settings Using Climate Data. 234-239 - Jesus Arellano-Uson, Eduardo Magaña, Daniel Morató, Mikel Izal:
Evaluation of RTT as an Estimation of Interactivity Time for QoE Evaluation in Remote Desktop Environments. 240-245 - Sota Uchida, Hikaru Shimada, Tomotaka Wada, Naohisa Hashimoto:
Pedestrian-Vehicle Collision Avoidance Support System Considering the Left and Right Positions of Pedestrians. 246-251 - Hye-Yeon Shim, Tae-Rim Park, Il-Gu Lee:
Hybrid Encryption Technique for Low-Latency Multi-Hop Communications. 252-258 - Marc Vucovich, Amogh Kamat Tarcar, Penjo Rebelo, Abdul Rahman, Dhruv Nandakumar, Christopher Redino, Kevin Choi, Robert Schiller, Sanmitra Bhattacharya, Balaji Veeramani, Alex West, Edward Bowen:
Anomaly Detection via Federated Learning. 259-266 - Sarah Alharbi, Arshiya Khan:
Ensemble Defense System: A Hybrid IDS Approach for Effective Cyber Threat Detection. 267-270 - Nenad Dragun, Nikola Bogunovic:
Enhancing Intent-Driven Networking with Granular and Aspect Approach. 271-276 - Shouthiri Partheepan, Farzad Sanati, Jahan Hassan:
An Analysis of Pre-trained Models Versus Custom Deep Learning Models for Forest Fire Detection. 277-282 - Noureen Islam, Md Fahad Monir, M. M. Mahbubul Syeed, Mahady Hasan, Mohammad Faisal Uddin:
Federated Learning Integration in O- RAN: A Concise Review. 283-288 - Santanam Kasturi, Xiaolong Li, John Pickard, Peng Li:
Understanding Statistical Correlation of Application Security Vulnerability Data from Detection and Monitoring Tools. 289-296 - Shawn A. Prestridge, James G. Dunham, Dinesh Rajan:
Information-Theoretic Security in BB84 QKD. 297-303 - Shijin Liu, Hiroaki Fukuda, Paul Leger:
An RF-based Low Rate DDoS Attack Real-time Detection System. 304-309 - Alessandro Pino, Davide Margaria, Andrea Vesco:
Combining Decentralized IDentifiers with Proof of Membership to Enable Trust in IoT Networks. 310-317 - Hao Yu, Bin Lu, RuoYang Gu, Di Wang, Long Meng, Fang Guo:
TGP-based dynamic traffic camouflage method. 318-324 - Amjed Abbas Ahmed, Mohammad Kamrul Hasan, Nazmus Shaker Nafi, Azana Hafizah Mohd Aman, Shayla Islam, Saif Aamer Fadhil:
Design of Lightweight Cryptography based Deep Learning Model for Side Channel Attacks. 325-328
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.