Program
Click here to download the conference brief
Click here to download the conference proceedings
Monday, February 19
Monday, February 19 8:20 - 8:30
Opening Remarks
Room: Keauhou II
Chair: Ruidong Li
Monday, February 19 8:30 - 9:30
Keynote I:
On Label Efficient Learning
Prof. Aggelos Katsaggelos
Room: Keauhou IIChair: Haohong Wang
Monday, February 19 9:30 - 10:00
Coffee Break
Monday, February 19 10:00 - 12:00
Distinguished Lectures:
Prof.: Georgios Giannakis
Prof. Xiuzhen Cheng
Room: Keauhou IIProf. Xiuzhen Cheng
Chair: Sooyoung Kim
CNS-1: CNS I
Room: Keauhou III
Chair: Min Chen
- Adaptive Honeypot Defense Deployment: A Stackelberg Game Approach with Decentralized DRL for AMI Protection
- pp. 1-5
- Visual Question Answering
- pp. 6-10
- On the Experimental Performance Measurement of Quantum Teleportation
- pp. 11-15
- A High-fidelity Partial Face Manipulation Dataset for Enhanced Deepfake Detection
- pp. 16-20
- Algorithm for Server Allocation in Delay-Sensitive Internet-of-Things Monitoring Services
- pp. 21-25
- Credit Card Transactions Fraud Detection for Multiple Consumer Behaviors
- pp. 26-32
- Revisiting Multi-Factor Authentication Token Cybersecurity: A TLS Identity Module Use Case
- pp. 33-38
CNS-2: CNS II
Room: Keauhou IV
Chair: Michal Aibin
- Dragonfly Algorithm Application for Solving the Nurse Scheduling Problem
- pp. 39-43
- Multi-task optical performance monitoring using a transfer learning assisted cascaded deep neural network in WDM systems
- pp. 44-47
- Synergized QoE-centric Streaming for Telerobotics
- pp. 48-54
- Regulating Covert Communication Capacity with Full-Duplex Receiver Against Location-Uncertain Eavesdropper
- pp. 55-59
- Optimal Balancing of Data Transfer Time and Cost in High-Performance Networks
- pp. 60-64
- Path Computation in Multi-switching Multi-layer Networks
- pp. 65-69
- Security Dataset Augmentation Invariance and Distribution Independence
- pp. 70-75
CNS-3: CNS III
Room: Mauna Kea
Chair: Ahmed A Ahmed
- Performance Evaluation of MIMO-FTN Signaling under Multipath Fading Channels with PA Non-linearity
- pp. 76-80
- Multi-armed Bandit Algorithm for Online Offloading and Scheduling in Edge Computing Environment
- pp. 81-87
- Ensuring a Semantically Effective IoT Network Through Blockchain with Delayed Feedback
- pp. 88-92
- An Impression-Based Video Analysis Method for Video Recommender Systems
- pp. 93-99
- Reliable and Low-Latency Communications for Critical Infrastructures Utilizing Wireless Mesh Networks
- pp. 100-105
- Selfish Mining Attacks in Sharded Blockchains
- pp. 106-110
- A Game Theory Based Rational Mining Strategy in Blockchains With Multiple Rational Miners
- pp. 111-115
CNS-4: CNS IV
Room: Mauna Loa
Chair: Xinyue Zhang
- Prompt Fix: Vulnerability Automatic Repair Technology Based on Prompt Engineering
- pp. 116-120
- A segmentation-based data contention resolution method for optical named data networking
- pp. 121-126
- Capacity Improvement with NOMA-CI Precoding for MU-MISO Downlink Systems
- pp. 127-132
- Delayed broadcast-based data forwarding strategy for vehicular named data networks
- pp. 133-138
- Smart-Watcher: An AI-Powered IoT Monitoring System for Small-Medium Scale Premises
- pp. 139-143
- Measurements of Shadowing Loss at 3 and 7 GHz for Small-Cell Planning in University Building
- pp. 144-146
- Research on SSL/TLS Security Differences Based on RFC Documents
- pp. 147-151
Monday, February 19 12:00 - 13:30
Lunch
Monday, February 19 13:30 - 15:30
CNS-5: CNS V
Room: Keauhou II
Chair: Razvan Cristian Voicu
- Weighted Multi-Task Vision Transformer for Distraction and Emotion Detection in Driving Safety
- pp. 152-156
- A Product Feature Mentioned Timestamp Extraction Method in Review Videos for Online Shopping
- pp. 157-162
- Semi-blind Channel Estimation on 802.11 OFDM Data Symbols
- pp. 163-167
- Foundational Models for Malware Embeddings Using Spatio-Temporal Parallel Convolutional Networks
- pp. 168-174
- Communication Interchange For Artificial Intelligence Systems
- pp. 175-181
- Semantic-Aware and Goal-Oriented Communications for Object Detection in Wireless End-to-End Image Transmission
- pp. 182-187
- Deception-based IDS against ARP Spoofing Attacks in Software-Defined Networks
- pp. 188-192
CNS-6: CNS VI
Room: Keauhou III
Chair: Yong Wang
- An Image-based Plant Weed Detector using Machine Learning
- pp. 193-197
- Social Media Development and Multi-modal Input for Stock Market Prediction: A Review
- pp. 198-202
- Advanced Cyber Deception Framework (ACDF): A Comprehensive Study
- pp. 203-208
- Variable Code Size Autoencoder (VCSA) Meets CSI Compression in Model Generalization
- pp. 209-214
- Guaranteeing Partial State Synchronization for UAV Platoon under Message or UAV Loss
- pp. 215-220
- A Comprehensive Study of Supervised Machine Learning Assisted Approaches for IoT Device Identification
- pp. 221-227
- Performance of SPAD-Detector in The Presence of Atmospheric Turbulence
- pp. 228-232
CNS-7: CNS VII
Room: Keauhou IV
Chair: Jiahui Jin
- Towards Automatically Matching Security Advisories to CPEs: String Similarity-based Vendor Matching
- pp. 233-238
- A Lightweight Obfuscated Malware Multi-class Classifier for IoT Using Machine Learning
- pp. 239-243
- Edge Computing Ransomware Detection in IoT using Machine Learning
- pp. 244-248
- Real-time Detection of Optical Cross-talk for Autonomous Network Diagnosis
- pp. 249-253
- Towards Effective Network Intrusion Detection in Imbalanced Datasets: A Hierarchical Approach
- pp. 254-258
- Machine Learning for Caching Placement in Edge Computing Networks
- pp. 259-264
- Enhancing Walking Experience: A Walking Route Recommendation System Considering Nearby Spots
- pp. 265-270
CNS-8: CNS VIII
Room: Mauna Kea
Chair: Ahmed A Ahmed
- Cloud Load Balancing Algorithms Performance Evaluation Using a Unified Testing Platform
- pp. 271-277
- Wireless Instant Fault Detection through Finite-Element Trained Machine Learning
- pp. 278-283
- Nanocommunication: PHY Advancements in Electromagnetic and Molecular Approaches
- pp. 284-290
- Machine Learning in Sensors for Collision Avoidance
- pp. 291-295
- Low-Cost Tree Health Categorization and Localization Using Drones and Machine Learning
- pp. 296-300
- AI-based Road Inspection Framework using Drones with GPS-less Navigation
- pp. 301-305
- Classification of BLE packet according to AGC index with detection of non-ideal reception cases
- pp. 306-310
CNS-9: CNS IX
Room: Mauna Loa
Chair: Abdullatif Albaseer
- Proof-of-QoE NOMA Token: A Crypto Rewarding Concept To Incentivize Local Relay In Non-Orthogonal Multiple Access Wireless Networks
- pp. 311-315
- AoI-Aware Adaptive Relaying in Buffer-Aided Wireless-Powered NOMA Network with Random Arrivals
- pp. 316-322
- Performance Evaluation of Loose Beamforming Using Direct-Binary Search in Massive MIMO Systems
- pp. 323-328
- Performance Analysis of High-dimensional NOMA system with In-Phase/ Quadrature Index Modulation
- pp. 329-333
- Effect of Beam Broadening in Directional Beamforming-Based Cellular Networks
- pp. 334-338
- An Efficient PLS Scheme for Coded MIMO Systems under Imperfect Channel Estimation
- pp. 339-343
- Edge computing that utilizes in-network CPUs to achieve high capacity and interruption tolerance with fewer edge servers
- pp. 344-348
Monday, February 19 15:30 - 16:00
Coffee Break
Monday, February 19 16:00 - 18:00
DL: Distinguished Lectures
Prof. Honggang Wang
Prof. Xinbin Wang
Room: Keauhou IIProf. Xinbin Wang
Chair: Xinwen Fu
CNS-10: CNS X
Room: Keauhou III
Chair: JingTao Yao
- Incorporating Game Theory with Soft Sets
- pp. 349-354
- DRL-Based Energy Efficient Power Adaptation for Fast HARQ in the Finite Blocklength Regime
- pp. 355-360
- Peak Cancellation Signal-Based Parallel PAPR Reduction Method Using Low-Dimensional Null Space in Massive MIMO-OFDM
- pp. 361-365
- Transmitter Filtering-aided Sparse Activity Detection for TDD-based Random Access
- pp. 366-370
- DCCTA: Age of Information in Slotted ALOHA under Duty Cycle Constraints
- pp. 371-375
- Multi-Objective Cognitive Routing in Space DTNs
- pp. 376-381
- Power-scheduled Routing Strategy for Quantum Key Distribution over Classical Optical Networks
- pp. 382-386
CNS-11: CNS XI
Room: Keauhou IV
Chair: Xinyue Zhang
- Bayesian Game for Cyber Deception Against Remote Attack on Automotive Systems
- pp. 387-393
- Measuring Data Similarity for Efficient Federated Learning: A Feasibility Study
- pp. 394-400
- Infrastructure Cost Analysis for Running Timetabling Software Using Various Deployment Architectures in the Cloud
- pp. 401-406
- Parameter tuning for accurate heart rate measurement using Wi-Fi signals
- pp. 407-411
- Dynamic Online Modulation Recognition using Incremental Learning
- pp. 412-416
- Deep Learning-based Malicious Energy Attack Detection in Sustainable IoT Network
- pp. 417-422
CNS-12: CNS XII
Room: Mauna Kea
Chair: Nadieh Moghadam
- Cross-temporal Detection of Novel Ransomware Campaigns: A Multi-Modal Alert Approach
- pp. 423-429
- Demystifying Cyberattacks: Potential for Securing Energy Systems With Explainable AI
- pp. 430-434
- Managing Failures and Service Quality in the Context of NFV
- pp. 435-440
- Generating Synthetic Time-Series Data on Edge Devices Using Generative Adversarial Networks
- pp. 441-445
- Speed Testing for measuring Network Traffic in a Smart Network Switch
- pp. 446-450
- Adaptive Channel Switching for Connected Vehicles under Extreme Weather Conditions: A Reinforcement Learning Based Approach
- pp. 451-455
- Detecting Deepfakes Using GAN Manipulation Defects in Human Eyes
- pp. 456-462
CNS-13: CNS XIII
Room: Mauna Loa
Chair: Junxiu Zhou
- Enhancing UAV Security Through Zero Trust Architecture: An Advanced Deep Learning and Explainable AI Analysis
- pp. 463-467
- Towards Cycle-accurate Simulation of xBGAS
- pp. 468-472
- GRASP and ILS Based Meta-Heuristic Approximation Algorithms for Optimal Virtual Network Synthesis (VNS) in Multi-AS Environment
- pp. 473-479
- WGAN-based Oversampling for QoS-Aware M2M Network Power Allocation
- pp. 480-484
- Sentiment Analysis With Lipschitz Recurrent Neural Networks Based Generative Adversarial Networks
- pp. 485-489
- Deep Explainable Content-Aware Per-Scene Video Encoding
- pp. 490-494
Tuesday, February 20
Tuesday, February 20 8:30 - 9:30
Keynote II:
Integrated Sensing and Communications: Tradeoffs and Designs
Prof. Vincent Poor
Room: Keauhou IIChair: Jian Ren
Tuesday, February 20 9:30 - 10:00
Coffee Break
Tuesday, February 20 10:00 - 12:00
IT-1: Invited Talks I
Xinwen Fu
Ender Ayanoglu
Eiji Oki
Sergei Gorlatch
Room: Keauhou IIEnder Ayanoglu
Eiji Oki
Sergei Gorlatch
Chair: Duong Thuy Anh Nguyen
- Unified View of IoT and CPS Security and Privacy
- pp. 495-499
AMCN-1: AMCN I
Room: Keauhou III
Chair: Hongwei Li
- AnDet: ML-Based Anomaly Detection of UEs in a Multi-cell B5G Mobile Network for Improved QoS
- pp. 500-505
- Targeted Transfer Learning: Leveraging Optimal Transport for Enhanced Knowledge Transfer
- pp. 506-510
- Beamforming with Free Energy Principle under Hierarchical Codebook
- pp. 511-517
- Trend Encoder with Attentive Neural Process: Node Performance Extrapolation for Non-Time-Series Datasets
- pp. 518-522
- Heterogeneous GNN with Express Edges for Intrusion Detection in Cyber-Physical Systems
- pp. 523-529
CIS-1: CIS I
Room: Keauhou IV
Chair: Christian Esposito
- Black-Box Attacks against Signed Graph Analysis via Balance Poisoning
- pp. 530-535
- On Building Automation Systems and Attacks
- pp. 536-542
- On the Importance of Trust in Next-Generation Networked Cyber-Physical Systems
- pp. 543-548
- Privacy-Preserving Characterization and Data Publishing
- pp. 549-553
- OBSERVE: Blockchain-based Zero Trust Security Protocol for Connected and Autonomous Vehicles (CAVs) Data Using Simple Machine Learning
- pp. 554-559
ECB-1: ECB I
Room: Mauna Kea
Chair: Yangyang Tao
- Fed2Com: Towards Efficient Compression in Federated Learning
- pp. 560-566
- Straggler Mitigation in Edge Computing with Coded Compressed Sensing
- pp. 567-572
- Cooperative Load Balancing of Neighboring Edge Clouds with LISP
- pp. 573-578
- A Surrogate Tiny Machine Learning Model of Variational Autoencoder For Real-Time Baseline Correction of Magnetometer Data
- pp. 579-583
- Comparison of FHE Schemes and Libraries for Efficient Cryptographic Processing
- pp. 584-590
MCC: MCC
Room: Mauna Loa
Chair: Tianyuan Yu
- Characteristics Aware Video Packet Dropping and Packet Wash
- pp. 591-597
- Quality of Experience Modelling and Analysis for Live Holographic Teleportation
- pp. 598-604
- Implicit Neural Representation-based Hybrid Digital-Analog Image Delivery
- pp. 605-610
- Context-Aware Edge-Cloud Collaborative Scene Text Recognition
- pp. 611-617
- A Secure and Robust ECG Signal Transmission System for Cardiac Arrhythmia Identification
- pp. 618-623
Tuesday, February 20 12:00 - 13:30
Lunch
Tuesday, February 20 13:30 - 15:30
Plenary Talks I:
Heterogeneous Integration and Packaging of RF electronics and components for 5G+ Wireless Communication Systems Using Additive Manufacturing Techniques;
Collaborative Secure Edge Intelligence for 6G IoT
Prof. John Papapolymerou
Prof. Victor Leung
Room: Keauhou IIProf. Victor Leung
Chair: Falko Dressler
Tuesday, February 20 15:30 - 16:00
Coffee Break
Tuesday, February 20 16:00 - 18:00
IT-2: Invited Talks II
Marwan Krunz
Jie Wang
Shucheng Yu
Zhipeng Cai
Room: Keauhou IIJie Wang
Shucheng Yu
Zhipeng Cai
Chair: Sergei Gorlatch
AMCN-2: AMCN II
Room: Keauhou III
Chair: Nadieh Moghadam
- Stereo-Aided Blockage Prediction for mmWave V2X Communications
- pp. 624-628
- CyPA: A Cyclic Prefix Assisted DNN for Protocol Classification in Shared Spectrum
- pp. 629-634
- MIA-BAD: An Approach for Enhancing Membership Inference Attack and its Mitigation with Federated Learning
- pp. 635-640
- Accelerating Autonomous Cyber Operations: A Symbolic Logic Planner Guided Reinforcement Learning Approach
- pp. 641-647
- Design of Smoothed L0 UnfoldingNet Architecture for OFDM Channel Estimation
- pp. 648-652
CIS-2: CIS II
Room: Keauhou IV
Chair: Tan-Jan Ho
- RMF-GPT --- OpenAI GPT-3.5 LLM, Blockchain, NFT, Model Cards and OpenScap Enabled Intelligent RMF Automation System
- pp. 653-658
- Trustful Blockchain-Enabled Identity Management for VANET with Short-Latency Authentication
- pp. 659-663
- When ChatGPT Meets Vulnerability Management: the Good, the Bad, and the Ugly
- pp. 664-670
- Could Min-Max Optimization Be A General Defense Against Adversarial Attacks?
- pp. 671-676
- An SDN-enabled Elliptic-curve Diffie-Hellman Key Exchange towards Secure P2P Networking
- pp. 677-683
ECB-2: ECB II
Room: Mauna Kea
Chair: Junaid Ahmed Khan
- Decentralized Authentication for Web of Things: a Self-Sovereign Identity (SSI)-based solution
- pp. 684-688
- Synthetic Power Consumption Data Generation For Appliance Operation Modes
- pp. 689-694
- Mitigating Pessimism for Guaranteeing Safety Despite Physical Errors in CPS's
- pp. 695-699
- Optimal Workload Allocation for Distributed Edge Clouds With Renewable Energy and Battery Storage
- pp. 700-705
- Accelerator-Aware Computation Offloading under Timing Constraints
- pp. 706-710
CIS-3: CIS III
Room: Mauna Loa
Chair: Christian Esposito
- A Multi-Chaotic Key Expansion for Advanced Encryption Standard (AES) Algorithm
- pp. 711-717
- Security-Enhanced WireGuard Protocol Design using Quantum Key Distribution
- pp. 718-723
- Correlation-Aware and Personalized Privacy-Preserving Data Collection
- pp. 724-729
- SEPPI: Secure and Privacy-Preserving Invitation for Unified Communication Meetings
- pp. 730-736
- DRL-based Latency-Aware Network Slicing in O-RAN with Time-Varying SLAs
- pp. 737-743
Tuesday, February 20 19:00 - 21:00
Welcome Reception
Wednesday, February 21
Wednesday, February 21 8:30 - 9:30
Keynote III:
Entanglement Management over Quantum Internet
Prof. Yuanyuan Yang
Room: Keauhou IIChair: Jian Ren
Wednesday, February 21 9:30 - 10:00
Coffee Break
Wednesday, February 21 10:00 - 12:00
IT-3: Invited Talks III
Rose Hu
Manos Tentzeris
Jelena Misic
Naoaki Yamanaka
Room: Keauhou IIManos Tentzeris
Jelena Misic
Naoaki Yamanaka
Chair: Yuto Lim
AMCN-3: AMCN III
Room: Keauhou III
Chair: Xinyue Zhang
- QoE-aware Airborne Communication Infrastructure for Surveillance in Wildfires
- pp. 749-753
- DL-SIC: Deep Learning Aided Successive Interference Cancellation in Shared Spectrum
- pp. 754-760
- An Attention-based AI Model for 3D Beam Prediction in THz Unmanned Aerial Vehicle Communication
- pp. 761-766
- Design and Implementation of a Smart Agricultural Robot bullDOG (SARDOG)
- pp. 767-771
- Multi-agent DQN with sample-efficient updates for large inter-slice orchestration problems
- pp. 772-777
CIS-4: CIS IV
Room: Keauhou IV
Chair: Jingyi Wang
- Malware Detection for Portable Executables Using a Multi-input Transformer-based Approach
- pp. 778-782
- QE-DBA: Query-Efficient Decision-Based Adversarial Attacks via Bayesian Optimization
- pp. 783-788
- Graph Isomorphism — Characterization and Efficient Algorithms
- pp. 789-793
- Resource-efficient Parallel Split Learning in Heterogeneous Edge Computing
- pp. 794-798
- Reinforcement Learning With Large Language Models (LLMs) Interaction For Network Services
- pp. 799-803
NGNI-1: NGNI I
Room: Mauna Kea
Chair: Tianyuan Yu
- Hyperclique: A Novel P2P Network Structure for Blockchain Systems
- pp. 804-809
- Hydra: A Scalable Decentralized P2P Storage Federation for Large Scientific Datasets
- pp. 810-816
- Tamperproof Data Transmission to Offline IoT Devices in a Zero-Trust Environment
- pp. 817-822
- A Reconstruction Forest-Based Interest Flooding Attack Detection Method in Named Data Networking
- pp. 823-829
- Multicast Service Deployment using Information Centric Cloud-Native Network Functions
- pp. 830-835
MWN-1: MWN I
Room: Mauna Loa
Chair: Ines Carole Kombou Sihomnou
- Distributed Beamforming by Multi-Agent Active Inference
- pp. 836-842
- Battery Life: Performance Analysis and Comparison between Wi-Fi, CBRS and Macro Deployment System
- pp. 843-849
- A Routing Method with Link Information-based Rule Selection in Non-Terrestrial Networks
- pp. 850-855
- Reliability-Aware Offloading in UAV-Aided Mobile Edge Network by Lyapunov Optimization
- pp. 856-861
- Performance Evaluation of DSRC and C-V2X Coexistence in the 5.895-5.925 GHz Spectrum
- pp. 862-867
Wednesday, February 21 12:00 - 13:30
Lunch
Wednesday, February 21 13:30 - 15:30
Plenary Talks II:
Computing In-X for Supporting Big Data Applications;
ACA Bayes with Wi-PHY Apps - Asymptotically Correct Approximate Bayes with Wireless PHY Applications
Prof. David Du
Prof. Dirk Slock
Room: Keauhou IIProf. Dirk Slock
Chair: Sergei Gorlatch
Wednesday, February 21 15:30 - 16:00
Coffee Break
Wednesday, February 21 16:00 - 18:00
IT-4: Invited Talks IV
Yu Cheng Chin-Tser Huang David Matolak Wei Wang
Room: Keauhou IIChair: Chin-Tser Huang
AMCN-4: AMCN IV
Room: Keauhou III
Chair: Hao Xu
- Distributed LSTM-based Slice Resource Allocation for Beyond 5G Networks
- pp. 868-874
- Federated Learning-Based Solution for DDoS Detection in SDN
- pp. 875-880
- Optimal Dynamic Resource Allocation for Multi-RIS Assisted Wireless Network: A Causal Reinforcement Learning Approach
- pp. 881-885
- Self-Supervised Learning for User Localization
- pp. 886-890
- An Actor-Critic Approach for Resource Allocation in Energy Harvesting-Powered Wireless Body Area Network
- pp. 891-897
SCDM: SCDM
Room: Keauhou IV
Chair: Ines Carole Kombou Sihomnou
- Participation Selection in Mobile Crowd Sensing with Diversity Ensures
- pp. 898-902
- An Authorizable Threshold Signature Scheme for Secure Sharing and Mining of Power IoT Data
- pp. 903-909
- Cross-tier Coordination in Spectrum Sharing: A Blockchain Approach
- pp. 910-914
- Blockchain-Assisted Cross-Domain Data Governance for Social Computing
- pp. 915-920
- mmWave Beam Selection in Dynamic Multi-Path Environments: A POMDP Approach
- pp. 921-926
NGNI-2: NGNI II
Room: Mauna Kea
Chair: Xinyu Ma
- PythonRepo: Persistent In-Network Storage for Named Data Networking
- pp. 927-931
- Mass Configuration of Heterogeneous IIoT Nodes: A Proposal and Experimental Evaluation
- pp. 932-937
- Implementation of Proxy to Make Content Shared on BitTorrent Retrievable from CCN
- pp. 938-943
- Roaming Performance Analysis and Comparison between Wi-Fi and Private Cellular Network
- pp. 944-950
- A Hybrid Fiber-Femtocell Indoor Network to Support Low-Latency and High-Bandwidth Indoor Communication Applications
- pp. 951-956
MWN-2: MWN II
Room: Mauna Loa
Chair: Tan-Jan Ho
- Radio Propagation Environment Prediction Method for UAV-assisted Cellular Networks with Millimeter-wave Beamforming
- pp. 957-961
- A Mobile App-based Indoor Mobility Detection Approach using Bluetooth Signal Strength
- pp. 962-968
- A Min-Max Approximation-Based SDP Approach to Robust Vehicle Location Estimation in VANETS
- pp. 969-973
- Detecting and Counteracting Adversaries in Wireless Multicast over Fading Channels
- pp. 974-977
- Data-Driven Joint Demodulation and Decoding in THz Communication Systems
- pp. 978-983
Wednesday, February 21 19:00 - 21:00
Banquet & Award Ceremony
Thursday, February 22
Thursday, February 22 8:30 - 9:30
Keynote IV:
Learning to Communicate
Prof. Robert Calderbank
Chair: Shiwen Mao
Thursday, February 22 9:30 - 10:00
Coffee Break
Thursday, February 22 10:00 - 12:00
IT-5: Invited Talks V
Song Ci
Yingfei Dong
Shervin Shirmohammadi
Michele Zorzi
Room: Keauhou IIYingfei Dong
Shervin Shirmohammadi
Michele Zorzi
Chair: Yingfei Dong
AMCN-5: AMCN V
Room: Keauhou III
Chair: Junaid Ahmed Khan
- AI-powered Emergency Keyword Detection for Autonomous Vehicles
- pp. 984-988
- Client Selection in Federated Learning: A Dynamic Matching-Based Incentive Mechanism
- pp. 989-993
- A Cluster-based Privacy-Enhanced Hierarchical Federated Learning Framework with Secure Aggregation
- pp. 994-999
- Constrained Bayesian Optimization of VANET Safety Messaging Using Deep Learning Neural Networks
- pp. 1000-1005
- Enhancing Federated Learning with Self-Determining Mechanism in MEC
- pp. 1006-1010
WC-1: WC I
Room: Keauhou IV
Chair: Hyuck Kwon
- 5G-and-Beyond Positioning against Amplify-and-Forward Relay Jamming
- pp. 1011-1015
- Comparisons of TDM and FDM Pilot Signals for Phase Noise Estimation with High-Order QAM for DFT-Spread OFDM
- pp. 1016-1021
- Intermittent Markov Frequency-Hopping Entropy Rate
- pp. 1022-1026
- Analysis and Empirical Validation of Visible Light Path Loss Model for Vehicular Sensing and Communication
- pp. 1027-1031
- Beamforming Design for MIMO DFRC Systems with Transmit Covariance Constraints
- pp. 1032-1036
NAPE: NAPE
Room: Mauna Kea
Chair: Hideki Tode
- Joint Task Offloading and Service Migration in RIS assisted Vehicular Edge Computing Network Based on Deep Reinforcement Learning
- pp. 1037-1042
- Extended Physarum Solver for Capacity-Constraint Routing
- pp. 1043-1047
- User Grouping with Fairness Consideration in Massive MIMO System with Varying Channel Quality
- pp. 1048-1053
- MEGATRON: Machine Learning in 5G with Analysis of Traffic in Open Radio Access Networks
- pp. 1054-1058
- Time Gating Control Approaches for Time Critical Applications from Perspective of Wireless LANs and All Optical Networks
- pp. 1059-1064
SPC: SPC
Room: Mauna Loa
Chair: Nie Xiaowei
- A Dual Transfer Framework for Cooperative Spectrum Sensing in Cognitive Radio
- pp. 1065-1070
- Fast Frequency-Direction Mapping Design for Data Communication With True-Time-Delay Array Architecture
- pp. 1071-1076
- DTL-Based CSI Feedback Combined With Continual Learning in FDD Massive MIMO Systems
- pp. 1077-1081
- A Deep Reinforcement Learning-based Contention Window Avoidance Scheme for Distinguishing Network Service Priorities
- pp. 1082-1086
- Performance Assessment of Intent Sharing in Infrastructure-assisted Cooperative Perception Services
- pp. 1087-1091
Thursday, February 22 12:00 - 13:30
Lunch
Thursday, February 22 13:30 - 15:30
Plenary Talks III:
AIGC for RF Sensing;
Leveraging ML for Traffic Engineering in Large-scale Networks
Prof. Shiwen Mao
Prof. Yusheng Ji
Room: Keauhou IIProf. Yusheng Ji
Chair: Jian Ren
Thursday, February 22 15:30 - 16:00
Coffee Break
Thursday, February 22 16:00 - 18:00
IT-6: Invited Talks VI
Panos Nasiopoulos
Yu Wang
Cedric Westphal
Room: Keauhou IIYu Wang
Cedric Westphal
Chair: Yu Wang
WASN: WASN
Room: Keauhou III
Chair: Hao Xu
- A Secure Hierarchical Federated Learning Using Dirichlet-based Trust Management
- pp. 1098-1103
- Energy-Efficient Multi-hop LoRaWAN with Transmission and Synchronization Control
- pp. 1104-1108
- LBT-based Resource Allocation Methods Utilizing Periodicity of Traffic in LPWAN
- pp. 1109-1113
- Game-Theoretic Defense Strategies for Mitigating Gray Hole Attacks on Energy-Limited Sensors in Wireless Sensor Networks
- pp. 1114-1120
- Decentralized Learning based Optimal Design for RIS-assisted Multi-user Ad-Hoc Network: A Multi-Player Multi-Armed Bandits Approach
- pp. 1121-1125
WC-2: WC II
Room: Keauhou IV
Chair: Md Sahabul Alam
- Computation Rate Maximization in STAR-RIS aided Wireless Powered Mobile Edge Computing Networks with NOMA
- pp. 1126-1131
- 5GPS: 5G Femtocell Placement Strategies for Ultra-Precise Indoor Localization in the Metaverse
- pp. 1132-1138
- Performance Analysis of LDPC coded Outdoor Long-Distance Imaging MIMO System
- pp. 1139-1143
- Cuckoos United: Extending Cuckoo Filters for Message Dissemination in Vehicular Networks
- pp. 1144-1148
OGN: OGN
Room: Mauna Kea
Chair: Yuto Lim
- Quantum Error Corrected Fidelity Routing Design for Long-distance Quantum Networks
- pp. 1149-1153
- Contention-Based Operation in TDM-Type Passive Optical Networks
- pp. 1154-1157
- Area4U: Predicting Interaction Hotspots for Large Public Displays
- pp. 1158-1163
- A Measurement Investigation of ERC-4337 Smart Contracts on Ethereum BlockChain
- pp. 1164-1170
- Cooperative Mobility Control for Maintaining Required Throughput in Multiple Ad Hoc Networks with Autonomous Mobile Robots
- pp. 1171-1176