


default search action
35th ICOIN 2021: Jeju Island, South Korea
- International Conference on Information Networking, ICOIN 2021, Jeju Island, South Korea, January 13-16, 2021. IEEE 2021, ISBN 978-1-7281-9101-0

- Soonbin Lee

, JongBeom Jeong, Inae Kim, Eun-Seok Ryu:
Learned Image Compression with Frequency Domain Loss. 1-4 - Subin Kwak, Joohyung Lee:

Implementation of Blockchain based P2P Energy Trading Platform. 5-7 - JongBeom Jeong, Soonbin Lee

, Inae Kim, Eun-Seok Ryu:
Implementing Viewport Tile Extractor for Viewport-Adaptive 360-Degree Video Tiled Streaming. 8-12 - Rojeena Bajracharya, Haejoon Jung:

Contextual Bandits Approach for Selecting the Best Channel in Industry 4.0 Network. 13-16 - Yang Yu, Sanghwan Lee:

A Measurement Based Feasibility Study on Remote Driving System. 17-19 - Syed Qamar Zulqarnain, Sanghwan Lee:

An Efficient Driver Selection Algorithm for Controlling Multiple Vehicles in Remote Driving. 20-23 - Issaree Srisomboon, Sanghwan Lee:

A Sequence Change Algorithm in Vehicle Platooning for Longer Driving Range. 24-27 - Hodong Kim, Changhee Hahn

, Junbeom Hur:
Real-time Detection of Cache Side-channel Attack Using Non-cache Hardware Events. 28-31 - Heemin Lee, Sungyeong Jang, Han-Yee Kim, Taeweon Suh:

Hardware-Based FLUSH+RELOAD Attack on Armv8 System via ACP. 32-35 - Hoyong Jeong

, Dohyun Ryu, Junbeom Hur:
Neural Network Stealing via Meltdown. 36-38 - Taehun Kim, Jaehan Kim, Youngjoo Shin

:
Constructing Covert Channel on Intel CPU-iGPU platform. 39-42 - Dohyun Kim, Joongheon Kim

:
Non-Local Self-Attention Mechanism for Real-Time Context Embedding Deep Shadow Removal Network. 43-45 - Jaeho Choi

, Seunghyeok Oh, Joongheon Kim
:
A Tutorial on Quantum Graph Recurrent Neural Network (QGRNN). 46-49 - Seunghyeok Oh, Jaeho Choi

, Jong-Kook Kim, Joongheon Kim
:
Quantum Convolutional Neural Network for Resource-Efficient Image Classification: A Quantum Random Access Memory (QRAM) Approach. 50-52 - Hyomin Ahn, Junghyun Kim, Joongheon Kim

:
Auction-based Truthful Distributed Resource Allocation for Smart Grid Systems. 53-55 - Joongheon Kim

, Myungjae Shin, Dohyun Kim, Soohyun Park, Yeongeun Kang, Junghyun Kim, Haemin Lee, Won Joon Yun, Jaeho Choi, Seunghoon Park, Seunghyeok Oh, Jaesung Yoo:
Performance Comparison of SRCNN, VDSR, and SRDenseNet Deep Learning Models in Embedded Autonomous Driving Platforms. 56-58 - Yeunwoong Kyung

:
Mobility-Aware Prioritized Flow Rule Placement in Software-Defined Access Networks. 59-61 - Haneul Ko, Jaewook Lee, Sangheon Pack:

Priority-Based Dynamic Resource Allocation Scheme in Network Slicing. 62-64 - Youbin Jeon, Hosung Baek, Sangheon Pack:

Mobility-Aware Optimal Task Offloading in Distributed Edge Computing. 65-68 - Minok Kim, Joonwoo Kim, Sangheon Pack:

Adaptive Beacon Transmission for Reducing Inter-Reception Time in Vehicle Platooning. 69-71 - Minjeong Lee, Jaewook Lee, Hochan Lee, Taeyun Kim, Sangheon Pack:

On Performance of Deep Reinforcement Learning-based Listen-Before-Talk (LBT) Scheme. 72-75 - Anwar Alyatama:

Relative Cost Routing, Modulation and Spectrum Allocation in Elastic Optical Networks. 127-131 - Mohammadreza Saadatpour, Touraj Shabanian, Mohammad Behdadfar, Amin Ghalami Osgouei:

QoS Improvement in SDN Using Centralized Routing Based on Feedback. 132-136 - Mohammed Hawari, Thomas H. Clausen

:
OP4T: Bringing Advanced Network Packet Timestamping into the Field. 137-142 - Hiroki Kashiwazaki, Hiroki Takakura, Shinji Shimojo:

A Proposal of Stochastic Quantitative Resilience Index Based on SLAs for Communication Lines. 143-148 - Kazuyuki Yamashita, Hiroyuki Ohsaki:

Effective Node Resistance and its Implication on Network Robustness. 149-153 - Eunsook Kim, Kyungwoon Lee, Chuck Yoo:

On the Resource Management of Kubernetes. 154-158 - Soyi Jung

, Won Joon Yun, Joongheon Kim
, Jae-Hyun Kim:
Infrastructure-Assisted Cooperative Multi-UAV Deep Reinforcement Energy Trading Learning for Big-Data Processing. 159-162 - Yu Takabatake, Yasuo Okabe:

An Anonymous Distributed Electronic Voting System Using Zerocoin. 163-168 - Muhammad Usman Sheikh, Kalle Ruttik, Norshahida Saba, Edward Mutafungwa, Riku Jäntti, Jyri Hämäläinen:

Analysis of Drone Propagation With Ray Tracing From Sub-6 GHz Upto Terahertz Frequencies in a Real World Urban Environment. 169-174 - Sandhya Rathee, Divesh Uttamchandani, K. Haribabu

, Ashutosh Bhatia:
An Efficient Method to Collect Statistics in SDN Using Curvature Based Sampling. 175-180 - Junade Ali, Vladimir Dyo:

Cross Hashing: Anonymizing encounters in Decentralised Contact Tracing Protocols. 181-185 - Christos Bouras, Apostolos Gkamas

, Vasileios Kokkinos
, Nikolaos Papachristos:
Real-Time Geolocation Approach through LoRa on Internet of Things. 186-191 - Kohei Natsume, Mai Ohta, Koichi Adachi, Osamu Takyu, Takeo Fujii:

DCT Compression Scheme for Wireless Sensor Information considering Spatial Correlation. 192-196 - Kurdman Abdulrahman Rasol Rasol

, Jordi Domingo-Pascual:
Joint Latency and Reliability-Aware Controller Placement. 197-202 - Soraya Mitate, Yudai Yamazaki, Takeo Fujii, Shusuke Narieda

:
Wireless System Selection with Spectrum Database for IoT. 203-208 - Eun-Jin Choi, Kyoung Min Kim, Tae-Jin Lee:

Devices and Backscatter Tag MAC Protocol for an Integrated Wireless Network. 209-212 - Nway Nway Ei, Seok Won Kang, Madyan Alsenwi, Yan Kyaw Tun

, Choong Seon Hong:
Multi-UAV-Assisted MEC System: Joint Association and Resource Management Framework. 213-218 - Aunas Manzoor

, Nguyen Dang Tri
, Choong Seon Hong:
UAV Trajectory Design for UAV-2-GV Communication in VANETs. 219-224 - Yoshihiro Higashiura, Hiroshi Yamamoto:

Large-scale farm sensing system using UAV and long-distance wireless communication. 225-230 - Zygmunt J. Haas, Zhong Zheng:

Engineering a Network in the Sky. 237-242 - Tobias Mueller, Erik Sy:

Enhanced Performance and Privacy via Resolver-Less DNS. 243-248 - Chalee Thammarat, Chian Techapanupreeda:

A Secure Mobile Payment Protocol for Handling Accountability with Formal Verification. 249-254 - Kaito Onuma, Sumiko Miyata:

A Proposal for Correlation-based Steganography Using Shamir's Secret Sharing Scheme and DCT Domain. 255-260 - Seshariana Rahma Melati

, Leanna Vidya Yovita, Ratna Mayasari:
Caching Performance of Named Data Networking with NDNS. 261-266 - Sumanth Reddy Cherupally, Srinivas Boga, Prashanth Podili

, Kotaro Kataoka
:
Lightweight and Scalable DAG based distributed ledger for verifying IoT data integrity. 267-272 - Yun Gao

, Hirokazu Hasegawa, Yukiko Yamaguchi, Hajime Shimada:
Malware Detection Using Gradient Boosting Decision Trees with Customized Log Loss Function. 273-278 - Joe Diether Cabelin, Paul Vincent Alpaño, Jhoanna Rhodette Pedrasa:

SVM-based Detection of False Data Injection in Intelligent Transportation System. 279-284 - Keidai Hori, Hiroshi Yamamoto:

Recognition System of Activities in Daily Living Based on Deep Sensing of Water Usage. 285-290 - Arooj Masood, The-Vi Nguyen, Sungrae Cho

:
Deep Regression Model for Videos Popularity Prediction in Mobile Edge Caching Networks. 291-294 - Tsuyoshi Arai, Yasuo Okabe, Yoshinori Matsumoto:

Precursory Analysis of Attack-Log Time Series by Machine Learning for Detecting Bots in CAPTCHA. 295-300 - Ryo Urimoto, Yukinobu Fukushima, Yuya Tarutani, Tutomu Murase

, Tokumi Yokohira:
A Server Migration Method Using Q-Learning with Dimension Reduction in Edge Computing. 301-304 - Pubudu Aravinda, Sulochana Sooriyaarachchi, Chandana Gamage, Navinda Kottege:

Optimization of RSSI based indoor localization and tracking to monitor workers in a hazardous working zone using Machine Learning techniques. 305-310 - Yan-An Chen, Wen-Hao Hsieh, Yu-Shuo Ko, Nen-Fu Huang:

An Ensemble Learning Model for Agricultural Irrigation Prediction. 311-316 - Junghyun Kim, Joongheon Kim

:
Access Management using Vickrey-Clarke-Groves Auction in Terrestrial-Drone Networks. 317-320 - Rodrigo Moreira

, Larissa Ferreira Rodrigues
, Pedro Frosi Rosa, Rui L. Aguiar
, Flávio de Oliveira Silva
:
Enhancing dynamism in management and network slice establishment through deep learning. 321-326 - Mansoor Raza, Nathali Dilshani Jayasinghe, Muhana Magboul Ali Muslam

:
A Comprehensive Review on Email Spam Classification using Machine Learning Algorithms. 327-332 - Philip Branch:

Propagation Measurements and Models of 915 MHz LoRa Radio in a Block Cave Gold Mine. 333-338 - Jongmin Kim, Junbeom Kim, Seok-Hwan Park:

Joint Design of Power Control and SIC Decoding Order for Max-Min Fairness optimization in Uplink NOMA Systems. 339-342 - Atthapol Suwannasa, Matthew Broadbent, Andreas Mauthe:

Effectiveness of Vicinity-based Content Finding in Mobile NDN Environments. 343-348 - Amel Khodmi, Sonia Ben Rejeb

, Nidal Nasser
, Zièd Choukair:
MDP-Based Handover In Heterogeneous Ultra-Dense Networks. 349-352 - Ayumi Yoneyama, Fumiya Kemmochi, Hiroyuki Otsuka:

Pico-eNB Tx Power Optimization for Multiband HetNets with MCS Incorporating 1024-QAM. 353-357 - Hideki Otsuki, Eiji Kawai, Katsuyoshi Setoyama, Hiroyuki Kimiyama, Katsuhiro Sebayashi, Mitsuru Maruyama:

Parallel Monitoring Architecture for 100 Gbps and Beyond Optical Ethernet. 358-360 - Kazuya Anazawa, Toru Mano, Takeru Inoue, Atsushi Taniguchi, Kohei Mizuno:

Reconfigurable Transport Networks to Accommodate Much More Traffic Demand. 361-366 - Bhavesh Toshniwal, Kotaro Kataoka

:
Comparative Performance Analysis of Underlying Network Topologies for Blockchain. 367-372 - Ryotaro Matsuo, Hiroyuki Ohsaki:

A Solution for Recovering Network Topology with Missing Links using Sparse Modeling. 373-378 - Rahul Kumar

, Ankur Gupta
, Harkirat Singh Arora
, Balasubramanian Raman:
GRGE: Detection of Gliomas Using Radiomics, GA Features and Extremely Randomized Trees. 379-384 - Ajit Kumar, Neetesh Saxena, Bong Jun Choi:

Machine Learning Algorithm for Detection of False Data Injection Attack in Power System. 385-390 - Indraneel Ghosh, Subham Kumar, Ashutosh Bhatia, Deepak Kumar Vishwakarma:

Using Auxiliary Inputs in Deep Learning Models for Detecting DGA-based Domain Names. 391-396 - Muhammad Usman Sheikh, Kalle Ruttik, Riku Jäntti, Jyri Hämäläinen:

Blockage and Ray Tracing Propagation Model in 3GPP Specified Industrial Environment. 397-402 - Eng-Kee Tan, Yung-Wey Chong, Raden Arief Setyawan

, Muhammad Niswar, Khin Than Mya:
Lightweight messaging protocol for precision agriculture. 403-407 - Eisei Yoshida, Tetsuya Yokotani, Koichi Ishibashi, Hiroaki Mukai:

Proposals on the Root Data Domain Gateway and System Operations for IoT Data Interoperability. 408-412 - Chaeeun Jeong, Seongju Kang, Kwangsue Chung:

Real-Time Recommendation System for Online Broadcasting Advertisement. 413-416 - Yoonhee Kim, Eunwoo Kim:

Clustering-Guided Incremental Learning of Tasks. 417-421 - JooYong Shim, Joongheon Kim

, Jong-Kook Kim:
On the Tradeoff between Computation-Time and Learning-Accuracy in GAN-based Super-Resolution Deep Learning. 422-424 - Kazuyuki Yamashita, Hiroyuki Ohsaki:

On the Correlation between Spectral Measures of Network Topology and Flow-Level QoS. 425-428 - Andrej Stefanov:

Impact of ARQ on the Distortion Performance of Underwater Acoustic Mobile Networks. 429-431 - Piyush Ghasiya, Koji Okamura:

Investigating Cybersecurity News Articles by Applying Topic Modeling Method. 432-438 - Adityan Gurunarayanan, Ankit Agrawal, Ashutosh Bhatia, Deepak Kumar Vishwakarma:

Improving the performance of Machine Learning Algorithms for TOR detection. 439-444 - Mohammadreza Pourkiani, Masoud Abedi:

Using Machine Learning for Task Distribution in Fog-Cloud Scenarios: A Deep Performance Analysis. 445-450 - Isato Oishi, Yuya Tarutani, Yukinobu Fukushima, Tokumi Yokohira:

Proposal of device control method based on consensus building using reinforcement learning. 451-456 - Haemin Lee, Soohyun Park, Junghyun Kim, Joongheon Kim

:
Auction-based Deep Learning Computation Offloading for Truthful Edge Computing: A Myerson Auction Approach. 457-459 - Min Jun Lee, Jungmin So:

Metric-Based Learning for Nearest-Neighbor Few-Shot Image Classification. 460-464 - Taeyun Ha, Donghyun Lee, Chunghyun Lee, Sungrae Cho

:
VCG Auction Mechanism based on Block Chain in Smart Grid. 465-468 - Jaeho Choi

, Seunghyeok Oh, Soohyun Park, Jong-Kook Kim, Joongheon Kim:
Proper Cost Hamiltonian Design for Combinatorial Optimization Problems: A Boolean Function Approach. 469-472 - Jin-Oh Park, Dae-Young Lee, Young-Seok Choi:

Robust Epileptic Seizure Detection Using Multiscale Distribution Entropy Analysis for Short EEG Recordings. 473-476 - Jong Soo Baik, Jae-Hyun Kim:

Analysis of the Earth Fixed Beam Duration in the LEO. 477-479 - Woo-Cheol Jin, Kyungtae Kim, Ji-Woong Choi:

Adaptive Jamming Considering Location Information Inaccuracy for Anti-UAV System. 480-482 - Hee won Kwon, Jae-Won Nam, Joongheon Kim

, Youn Kyu Lee:
Generative Adversarial Attacks on Fingerprint Recognition Systems. 483-485 - Sichul Kevin Noh, Minjae Kang, Minho Park:

Protection against Flow Table Overflow Attack in Software Defined Networks. 486-490 - Joonpyo Hong, Yun Hee Cho, Sung Kyung Kim, Jeehyeon Na, Jeongho Kwak:

Spatio-Temporal Degree of Freedom: Interference Management in 5G Edge SON Networks. 491-494 - Moonsung Huh, Daesung Yu, Seok-Hwan Park:

Signal Processing Optimization for Federated Learning over Multi-User MIMO Uplink Channel. 495-498 - Trong-Hop Do, Dang-Khoa Tran, Dinh-Quang Hoang, Dat Vuong

, Trong-Minh Hoang
, Nhu-Ngoc Dao
, Chunghyun Lee, Sungrae Cho
:
A Novel Algorithm for Estimating Fast-Moving Vehicle Speed in Intelligent Transport Systems. 499-503 - Syed Farhan Alam Zaidi, Chan-Gun Lee:

Learning Graph Representation of Bug Reports to Triage Bugs using Graph Convolution Network. 504-507 - Seungjoo Lim, Min-Hyung Rhie, DongYeop Hwang, Ki-Hyung Kim:

A Subject-Centric Credential Management Method based on the Verifiable Credentials. 508-510 - Taek-Young Youn, Joongheon Kim

, Seog Chung Seo:
Efficient Data Delivery in Content-Centric Network with Stronger Privacy of Publisher. 511-513 - Jae-Woo Kim, Cosmas Ifeanyi Nwakanma

, Dong-Seong Kim, Jae-Min Lee:
Intelligent Face Recognition on the Edge Computing using Neuromorphic Technology. 514-516 - Min-Hyung Rhie, Kyung-Hoon Kim, DongYeop Hwang, Ki-Hyung Kim:

Vulnerability Analysis of DID Document's Updating Process in the Decentralized Identifier Systems. 517-520 - Riski Nur Azizah, Yeasom Lee, Jason J. Jung, Bong-Soo Sohn:

Gesture Recognition for Note Generation in VR Rhythm Game. 521-524 - Koung-Suk Ko, Woo-Jin Ahn, Geon-Hee Kim, Myo-Taeg Lim, Tae-Koo Kang, Dong-Sung Pae:

Re-Identification for Multi-Object Tracking Using Triplet Loss. 525-527 - Hokeun Lim, Young-Han Kim, Kyoungjae Sun:

Service Management in Virtual Machine and Container Mixed Environment using Service Mesh. 528-530 - Masafumi Katoh, Tomonori Kubota, Takeshi Yasuie, Yukihiro Watanabe, Yuji Nomura:

Proposal of Management Agent for Delay Sensitive IoT Communication. 531-536 - Kaito Akaki

, Praphan Pavarangkoon
, Nattapong Kitsuwan
:
Large L-shape Fit Spectrum Allocation for Elastic Optical Network with Spectrum Slicing. 537-540 - Jaehyun Han, Guangyu Zhu

, Eunseo Lee, Sangmook Lee, Yongseok Son:
An Empirical Evaluation and Analysis of Performance of Multiple Optane SSDs. 541-545 - Meng-Ju Lee, Jhong-Ting Luo, Jia-Jung Shao, Nen-Fu Huang:

A Trustworthy Food Resume Traceability System Based on Blockchain Technology. 546-552 - Cheng-Che Huang, Yu-Cheng Chien, Jia-Cheng Zhang, Nen-Fu Huang:

Reliable and Delay Tolerant Transmission Protocols for LPWAN IoT Sensors. 553-558 - Guangyu Zhu

, Jaehyun Han, Sangjin Lee, Yongseok Son:
An Empirical Evaluation of NVM-aware File Systems on Intel Optane DC Persistent Memory Modules. 559-564 - Sheikh Salman Hassan

, Umer Majeed
, Choong Seon Hong:
Reliable Integrated Space-Oceanic Network Profit Maximization by Bender Decomposition Approach. 565-570 - Muhamad Rizka Maulana, Hsiao-Yin Peng, Ying-Cen Lai, Li-Der Chou:

Traffic-aware Dynamic Container Deployment on the Network Edge. 571-576 - Anh-Tien Tran, Demeke Shumeye Lakew, The-Vi Nguyen, Van-Dat Tuong, Thanh Phung Truong, Nhu-Ngoc Dao

, Sungrae Cho
:
Hit Ratio and Latency Optimization for Caching Systems: A Survey. 577-581 - Aaron Fernandes, Karan Garg, Ankit Agrawal

, Ashutosh Bhatia:
Decentralized Online Voting using Blockchain and Secret Contracts. 582-587 - Umer Majeed

, Sheikh Salman Hassan
, Choong Seon Hong:
Cross-Silo Model-Based Secure Federated Transfer Learning for Flow-Based Traffic Classification. 588-593 - Changyoung An, Hyeong Min Kwon, Heung-Gyoon Ryu:

Lowest-In First-Service System for the Efficient MPT (Microwave Power Transfer) to Multiple Receivers. 594-596 - Chit Wutyee Zaw, Choong Seon Hong:

Loss and Energy Tradeoff in Multi-access Edge Computing Enabled Federated Learning. 597-602 - Myungjae Shin, David Mohaisen

, Joongheon Kim
:
Bitcoin Price Forecasting via Ensemble-based LSTM Deep Learning Networks. 603-608 - Shota Nishiura, Hiroshi Yamamoto:

Large-term sensing system for agriculture utilizing UAV and wireless power transfer. 609-614 - Kota Tohno, Ryo Nakamura, Noriaki Kamiyama:

On Design of Caching Threshold of Caching Strategy CDO for ICN. 615-620 - Stephan Hohmann, Tobias Mueller, Marius Stübs:

Bridge Me If You Can! Evaluating the Latency of Securing Profinet. 621-626 - Jeong Min Jeon, Choong Seon Hong:

Scalable Private P2P network for distributed and Hierarchical Machine Learning in VANETs. 627-629 - Woongsoo Na:

Deep-learning Based Deafness Aware Scheme for mmWave D2D Communications. 630-632 - Kimoon Kang, Kiwon Rhee, Hyun-Chool Shin:

A Precise Muscle Activity Onset/Offset Detection via EMG Signal. 633-635 - Ho-Ik Choi, Jongwun Seul, Hyun-Chool Shin:

Vital information extraction using FMCW radar. 636-639 - Kimoon Kang, Hyun-Chool Shin:

EMG Based Gesture Recognition Using Noise Removal. 640-643 - Heemang Song, Youngkeun Yoo, Hyun-Chool Shin:

In-Vehicle Passenger Detection Using FMCW Radar. 644-647 - Ripon Patgiri

, Sabuzima Nayak
, Naresh Babu Muppalaneni
:
Is Bloom Filter a Bad Choice for Security and Privacy? 648-653 - Ashar Ahmad, Muhammad Saad, Joongheon Kim

, DaeHun Nyang, David Mohaisen
:
Performance Evaluation of Consensus Protocols in Blockchain-based Audit Systems. 654-656 - Seongju Kang, Chaeeun Jeong, Kwangsue Chung:

Context-aware Model Selection for On-Device Object Detection. 662-666 - Cong Tran, Won-Yong Shin:

Network Completion: Beyond Matrix Completion. 667-670 - Yuna Han, Bilel Derbel, Byung-Woo Hong:

Convolutional Neural Networks based on Random Kernels in the Frequency Domain. 671-673 - Hoa Tran-Dang, Dong-Seong Kim

:
Task Priority-based Resource Allocation Algorithm for Task Offloading in Fog-enabled IoT Systems. 674-679 - Seunghyun Lee, Changhee Joo:

On the CDN Pricing Strategies in the Internet Traffic Delivery Chain. 680-682 - Hyeon Kyu Lee, Ji-Hack Lee, Jin-Oh Park, Young-Seok Choi:

Data-driven Data Augmentation for Motor Imagery Brain-Computer Interface. 683-686 - Jae-Seok Yoo, Kwang-Hyun Park:

Skeleton Silhouette Based Disentangled Feature Extraction Network for Invariant Gait Recognition. 687-692 - Yue Wang, Choonhwa Lee:

A Role-Based Orchestration Approach for Cloud Applications. 693-698 - Junyao Chen, Rajib Paul

, Young-June Choi:
An Efficient Neural Network-Based Next -Hop Selection Strategy for Multi-hop VANETs. 699-702 - Najam Us Saqib

, Kyung-Yul Cheon, Seungkeun Park, Sang-Woon Jeon:
Joint Optimization of 3D Hybrid Beamforming and User Scheduling for 2D Planar Antenna Systems. 703-707 - Haziq Hamzah, Duc-Tai Le, Moonseong Kim, Hyunseung Choo:

Location-Aware Task Offloading for MEC-based High Mobility Service. 708-711 - Seoyoung Yu, Yun Jae Jeong, Jeong Woo Lee:

Resource Allocation Scheme Based on Deep Reinforcement Learning for Device-to-Device Communications. 712-714 - Janggoon Lee, Chanhee Park, Heejun Roh

:
Revisiting Bluetooth Adaptive Frequency Hopping Prediction with a Ubertooth. 715-717 - Jeongmin Chae, Songnam Hong

:
Stream-Based Active Learning with Multiple Kernels. 718-722 - Suyeong Yang, Minhee Lee, Hyosu Kim:

Deep Learning-based Syllable Recognition Framework for Korean Children. 723-726 - Donghyun Lee, Gunhee Jang, Taeyun Ha, Junsuk Oh, Sungrae Cho

:
BS Deployment Strategy and Energy Efficient BS Switching in Heterogeneous Networks for 5G. 727-729 - Jaehwan Kim, Bilel Derbel, Byung-Woo Hong:

Motion Estimation via Scale-Space in Unsupervised Deep Learning. 730-731 - Rubina Akter, Jae-Min Lee, Dong-Seong Kim

:
Analysis and Prediction of Hourly Energy Consumption Based on Long Short-Term Memory Neural Network. 732-734 - Mingi Jeong, Sangyeoun Lee, Myungnam Bae, Kang Bok Lee:

Accident Type Definition for Implementation of Pedestrian Accident Recognition Algorithm. 735-737 - Syed Farhan Alam Zaidi

, Chan-Gun Lee:
One-Class Classification Based Bug Triage System to Assign a Newly Added Developer. 738-741 - Tae-Yoon Kim, Jun-Woo Cho, Jae-Hyun Kim:

Performance Evaluation of Wireless LAN for UAS Communication. 742-744 - Kyung-Hoon Kim, Seungjoo Lim, DongYeop Hwang, Ki-Hyung Kim:

Analysis on the Privacy of DID Service Properties in the DID Document. 745-748 - Kyo-Min Hwang, Sang-Chul Kim:

A Study of CNN-Based Human Behavior Recognition with Channel State Information. 749-751 - Kazuma Uemoto, Toshiya Takami:

Information Sharing System Adapted to Disaster Phase. 752-754 - The-Vi Nguyen

, Van-Dat Tuong, Anh-Tien Tran, Thanh Phung Truong, Demeke Shumeye Lakew, Chunghyun Lee, Yunseong Lee, Sungrae Cho
:
User-Preference-based Proactive Caching in Edge Networks. 755-757 - Tobias Mueller:

Let's Attest! Multi-modal Certificate Exchange for the Web of Trust. 758-763 - Min Wei, Xueqin Xiang, Cheng Li:

A Traffic Scheduling Mechanism for Industrial Wireless Network Accessing IPv6 Internet. 764-769 - Umar Sa'ad

, Demeke Shumeye Lakew, Sungrae Cho
:
Edge Caching for Content Sharing in Vehicular Networks: Technical Challenges, Existing Approaches, and Future Directions. 770-775 - Woo-Ju Lee

, Seoung-Jun Oh:
Remote Sensing Image Registration Using Equivariance Features. 776-781 - Muhammad Diyan, Murad Khan, Zhenbo Cao, Bhagya Nathali Silva

, Jihun Han, Ki Jun Han:
Intelligent Home Energy Management System based on Bi-directional Long-short Term Memory and Reinforcement Learning. 782-787 - Tri Minh Nguyen, Myungsik Yoo:

Fusing LIDAR sensor and RGB camera for object detection in autonomous vehicle with fuzzy logic approach. 788-791 - Lilian Charles Mutalemwa, Seokjoo Shin:

Energy Balancing and Source Node Privacy Protection in Event Monitoring Wireless Networks. 792-797 - Sungmin Cho, Jinwook Paeng, Taehong Kim, Chanil Kim, Ji Soo Kim, Hyeseong Kim, Junseok Kwon:

Dog Noseprint Identification Algorithm. 798-800 - Yuta Kuwahara, Naoki Aihara

, Satoshi Yamazaki, Kouji Ohuchi, Hideki Mizuno:
Energy-Efficiency Comparison of Ad-hoc Routings in a Shadowing Environment for Smart IoT. 801-804 - Heejae Park, Seongryool Wee, Laihyuk Park:

Learning-based Frequency Synchronization with NTP for Low-cost Phasor Measurement Units. 805-807 - Daichi Ozaki, Hiroshi Yamamoto, Eiji Utsunomiya, Kiyohito Yoshihara:

Harmful Animals Detection System Utilizing Cooperative Actuation of Multiple Sensing Devices. 808-813 - Hyunjun Mun, Seonggwan Seo, Joobeom Yun:

Recycling of Adversarial Attacks on the DNN of Autonomous Cars. 814-817 - Ankur Gupta

, Harkirat Singh Arora
, Rahul Kumar
, Balasubramanian Raman:
DMHZ: A Decision Support System Based on Machine Computational Design for Heart Disease Diagnosis Using Z-Alizadeh Sani Dataset. 818-823 - Gyu-min Lee, Cheol-woong Lee

, Byeong-Hee Roh
:
Riverbed Modeler Reinforcement Learning M&S Framework Supported by Supervised Learning. 824-827 - Donghee Kim, Inshil Doh, Kijoon Chae:

Improved Raft Algorithm exploiting Federated Learning for Private Blockchain performance enhancement. 828-832 - Hyejin An, Jongwun Seul, Hyun-Chool Shin:

Tactile Perception Modulation by Transcutaneous Electrical Stimulation. 833-836 - Nethmi N. Nanayakkara Vithanage, Sangeeth S. Hetti Thanthrige, Malsha C. K. Paththini Kapuge, Tharindu H. Malwenna, Chethana Liyanapathirana

, Janaka L. Wijekoon
:
A Secure Corroboration Protocol for Internet of Things (IoT) Devices Using MQTT Version 5 and LDAP. 837-841 - Chang Bae Moon, Jong Yeol Lee, Dong-Seong Kim

, Byeong Man Kim:
Multimedia Contents Retrieval based on 12-Mood Vector. 842-844 - Beomseok Kim, Woonseob Shin, DongYeop Hwang, Ki-Hyung Kim:

Attribute-Based Access Control(ABAC) with Decentralized Identifier in the Blockchain-Based Energy Transaction Platform. 845-848 - Myungjae Shin, Joongheon Kim

:
Joint Behavioral Cloning and Reinforcement Learning Method for Propofol and Remifentanil Infusion in Anesthesia. 849-852 - Trong-Hop Do, Dang-Khoa Tran, Dinh-Quang Hoang, Minh Quan Pham

, Quang-Dung Pham
, Nhu-Ngoc Dao
, Chunghyun Lee, Sungrae Cho
:
Night-Time Vehicle Distance Estimation Using Camera Geometry and Deep Learning. 853-857 - Quang-Dung Pham

, Trong-Hop Do, Nhu-Ngoc Dao
, Woongsoo Na, Chunghyun Lee, Sungrae Cho
:
A Feasible Study of Cube Sensing Organization Map for Cognitive Spectrum Allocation. 858-863 - Sang Il Kim, Hwa Sung Kim:

A VNF Placement Method based on VNF Characteristics. 864-869 - Md. Faisal Ahmed, Md. Osman Ali, Md. Habibur Rahman, Yeong Min Jang:

Real-time health monitoring system design based on optical camera communication. 870-873 - Jae-Won Nam, Youn Kyu Lee:

Machine-Learning based Analog and Mixed-signal Circuit Design and Optimization. 874-876 - Hojoon Won, Younghan Kim:

Performance Analysis of Machine Learning Based Fault Detection for Cloud Infrastructure. 877-880

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














