Default Cover Image

2020 International Conference on Networking and Network Applications (NaNA)

Dec. 10 2020 to Dec. 13 2020

Haikou City, China

ISBN: 978-1-7281-8954-3

Table of Contents

[Copyright notice]Freely available from IEEE.pp. 1-1
Table of ContentsFreely available from IEEE.pp. v-xvi
Greeting Message from General Conference ChairsFreely available from IEEE.pp. 1-1
CommitteesFreely available from IEEE.pp. xviii-xix
Data-Driven Security Analysis of Machine Learning SystemsFull-text access may be available. Sign in or learn about subscription options.pp. xxi-xxi
Private and Fast Routing in Credit NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
Physical Layer Authentication Utilizing Carrier Frequency Offset in Dynamic MIMO SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 16-21
Incremental-Compensation based Robust Topology Control for Micro/Nano Satellite NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 22-28
On Eavesdropping Region Characterization in Hybrid Wireless CommunicationsFull-text access may be available. Sign in or learn about subscription options.pp. 29-34
Improve IoT Streaming QoS by Determining the Message Propotion in CoAPFull-text access may be available. Sign in or learn about subscription options.pp. 35-40
Design of A Time Synchronization Mechanism for Underwater Acoustic NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 41-46
On CPRI based Front-hauling over Residential Power LinesFull-text access may be available. Sign in or learn about subscription options.pp. 47-52
Deep Learning as a Service Based on Encrypted DataFull-text access may be available. Sign in or learn about subscription options.pp. 53-58
Traffic Flow Modeling for UAV-Enabled Wireless NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 59-64
Online Placing and Pricing for Cloud Container Clusters: An Auction ApproachFull-text access may be available. Sign in or learn about subscription options.pp. 65-72
CPWF: Cross-Platform Website Fingerprinting Based on Multi-Similarity LossFull-text access may be available. Sign in or learn about subscription options.pp. 73-80
Differential Privacy Preserving Naive Bayes Classification via Wavelet TransformFull-text access may be available. Sign in or learn about subscription options.pp. 81-85
K-modes Based Categorical Data Clustering Algorithms Satisfying Differential PrivacyFull-text access may be available. Sign in or learn about subscription options.pp. 86-91
Time Constrained Emergency Data Backup and Service Migration in Cloud Data CentersFull-text access may be available. Sign in or learn about subscription options.pp. 92-95
Intra-Datacenter Bandwidth Resource Allocation for Bursty Large-Scale Traffic in Polled OLTFull-text access may be available. Sign in or learn about subscription options.pp. 96-101
Adaptive Meek Technology for Anti-Traffic AnalysisFull-text access may be available. Sign in or learn about subscription options.pp. 102-107
Energy-saving Hybrid Network Integrating WSNs and Crowd SensingFull-text access may be available. Sign in or learn about subscription options.pp. 108-113
Research on SDN intrusion detection based on online ensemble learning algorithmFull-text access may be available. Sign in or learn about subscription options.pp. 114-118
On security of UAV integrated system with network codingFull-text access may be available. Sign in or learn about subscription options.pp. 119-123
Rational Delegation Learning Outsourcing Scheme Based on Game TheoryFull-text access may be available. Sign in or learn about subscription options.pp. 130-135
Pulse-detecting Approach with Adjustable PRIs Using Interferences Blanking in TACAN SystemFull-text access may be available. Sign in or learn about subscription options.pp. 141-146
Adaptive Beamforming Planning for Multicast mmWave CommunicationFull-text access may be available. Sign in or learn about subscription options.pp. 147-151
Concentration-Shifting-based Modulation Scheme for Molecular Communication System with a Mobile TransmitterFull-text access may be available. Sign in or learn about subscription options.pp. 152-156
Protection method of continuous location uploading based on local differential privacyFull-text access may be available. Sign in or learn about subscription options.pp. 157-161
On Jamming Power Optimization for Secure and QoS-Aware Routing in Ad Hoc NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 162-166
A Unified Trust Service Scheme for Heterogeneous Identity AllianceFull-text access may be available. Sign in or learn about subscription options.pp. 167-173
Study on Learner's Facial Expression RecognitionFull-text access may be available. Sign in or learn about subscription options.pp. 174-179
Message Delivery Probability of 3D MANETs Under Erasure CodingFull-text access may be available. Sign in or learn about subscription options.pp. 180-185
A Blockchain based model for Curbing Doctors Shopping and Ensuring Provenance ManagementFull-text access may be available. Sign in or learn about subscription options.pp. 186-192
Covert Outage Analysis for Random Wireless Networks Under Warden CollusionFull-text access may be available. Sign in or learn about subscription options.pp. 193-197
UniRoam: An Anonymous and Accountable Authentication Scheme for Cross-Domain AccessFull-text access may be available. Sign in or learn about subscription options.pp. 198-205
B-SDN: A Novel Blockchain-based Software Defined Network ArchitectureFull-text access may be available. Sign in or learn about subscription options.pp. 206-212
Nesterov Accelerated Gradient-based Algorithm for the Allocation Problem of NFV ServiceFull-text access may be available. Sign in or learn about subscription options.pp. 213-220
Secure Spatial Query Scheme with Access Pattern ObfuscationFull-text access may be available. Sign in or learn about subscription options.pp. 221-228
Anomaly detection frameworks for outlier and pattern anomaly of time series in wireless sensor networksFull-text access may be available. Sign in or learn about subscription options.pp. 229-232
Security Analysis and Design of Authentication Key Agreement Protocol in Medical Internet of ThingsFull-text access may be available. Sign in or learn about subscription options.pp. 233-240
VPN Traffic Classification Based on Payload Length SequenceFull-text access may be available. Sign in or learn about subscription options.pp. 241-247
Simulated Annealing Algorithm Based Temperature-Aware Routing Scheme for Intrabody NanonetworksFull-text access may be available. Sign in or learn about subscription options.pp. 248-253
Evolutionary dynamics games based on edge diversity in complex networksFull-text access may be available. Sign in or learn about subscription options.pp. 254-258
Secure Off-chain Payment in Consortium Blockchain SystemFull-text access may be available. Sign in or learn about subscription options.pp. 259-264
QMPS: Q-learning based Message Prioritizing and Scheduling Algorithm for Flying Ad hoc NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 265-270
Network Flow Analytics: Multi-Class Classification of DDoS Attacks Based on OKNNFull-text access may be available. Sign in or learn about subscription options.pp. 271-276
An Invocation Chain Test and Evaluation Method Based on Knowledge GraphFull-text access may be available. Sign in or learn about subscription options.pp. 277-281
Adversarial Examples Detection Using Random Projections of ResidualsFull-text access may be available. Sign in or learn about subscription options.pp. 282-285
Optimal Asynchronous FHMA System with Generalized Orthogonal Hopping PatternsFull-text access may be available. Sign in or learn about subscription options.pp. 286-291
A Framework for Audit Analysis of Heterogeneous Logs from PaaSFull-text access may be available. Sign in or learn about subscription options.pp. 292-297
Emotion-Related Rich-Club Organization in Dynamic Brain NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 298-303
Fault Diagnosis and Location based on Graph Neural Network in Telecom NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 304-309
Evaluation of Random Forest for Complex Human Activity Recognition Using Wearable SensorsFull-text access may be available. Sign in or learn about subscription options.pp. 310-315
MagNet with Randomization Defense against Adversarial ExamplesFull-text access may be available. Sign in or learn about subscription options.pp. 316-320
An Adaptive Model Update Object Tracking Algorithm based on DenseNet FeaturesFull-text access may be available. Sign in or learn about subscription options.pp. 321-325
k-Anonymity Based Location Data Query Privacy Protection Method in Mobile Social NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 326-334
Crowdsourcing Answer Integration Algorithm For Big Data EnvironmentFull-text access may be available. Sign in or learn about subscription options.pp. 335-341
TMPTCP: A Lightweight Trust Extension for Multipath-TCPFull-text access may be available. Sign in or learn about subscription options.pp. 342-347
Do Not Perturb Me: A Secure Byzantine-Robust Mechanism for Machine Learning in IoTFull-text access may be available. Sign in or learn about subscription options.pp. 348-354
A Study of Learned KD Tree Based on Learned IndexFull-text access may be available. Sign in or learn about subscription options.pp. 355-360
High capacity reversible data hiding algorithm based on central predictionFull-text access may be available. Sign in or learn about subscription options.pp. 361-367
Android Malware Detection Based on Call Graph via Graph Neural NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 368-374
Efficient partially policy-hidden with multi-authority for access control scheme in Internet of ThingsFull-text access may be available. Sign in or learn about subscription options.pp. 375-380
JSTIFuzz: Type-Inference-based JavaScript Engine FuzzingFull-text access may be available. Sign in or learn about subscription options.pp. 381-387
Spatial Ciphertext Aggregation Computing Scheme for Mobile Crowd Sensing Privacy ProtectionFull-text access may be available. Sign in or learn about subscription options.pp. 388-393
A Conceptual Framework for Top- N Recommendation Using Attributed Bipartite Graph EmbeddingFull-text access may be available. Sign in or learn about subscription options.pp. 400-404
Predict Onset Age of Hypertension Using CatBoost and Medical Big DataFull-text access may be available. Sign in or learn about subscription options.pp. 405-409
Online Teaching Gestures Recognition Model Based on Deep LearningFull-text access may be available. Sign in or learn about subscription options.pp. 410-416
Dynamic Action Recognition Under Simulated Prosthetic VisionFull-text access may be available. Sign in or learn about subscription options.pp. 417-421
Searchable encryption scheme with limited search scope for group usersFull-text access may be available. Sign in or learn about subscription options.pp. 430-435
Design of Educational Resources-oriented Fair Recommendation System Based on Consortium BlockchainFull-text access may be available. Sign in or learn about subscription options.pp. 448-453
A Fault Diagnosis Model of Pumping Unit Based on BP Neural NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 454-458
A PUF-based Scheme for Identify Trusted Mobile Phone AccessoriesFull-text access may be available. Sign in or learn about subscription options.pp. 459-463
Resilient Data Retrieval in Vehicular Named Data NetworkingFull-text access may be available. Sign in or learn about subscription options.pp. 464-469
Author IndexFreely available from IEEE.pp. 1-4
Showing 86 out of 86