Default Cover Image

2018 International Conference on Information Networking (ICOIN)

Jan. 10 2018 to Jan. 12 2018

Chiang Mai, Thailand

Table of Contents

[Copyright notice]Freely available from IEEE.pp. 2-2
Organizing committee membersFreely available from IEEE.pp. 4-9
Table of contentsFreely available from IEEE.pp. 3-3
Conference room mapFreely available from IEEE.pp. 25-32
[Front matter]Freely available from IEEE.pp. 1-32
Document level polarity classification with attention gated recurrent unitFull-text access may be available. Sign in or learn about subscription options.pp. 7-12
Improved UGRNN for short-term traffic flow prediction with multi-feature sequence inputsFull-text access may be available. Sign in or learn about subscription options.pp. 13-17
Multi-finger motion inference using M1 neural decodingFull-text access may be available. Sign in or learn about subscription options.pp. 18-20
Proactive detection of algorithmically generated malicious domainsFull-text access may be available. Sign in or learn about subscription options.pp. 21-24
A comparative study of failover schemes for IaaS recoveryFull-text access may be available. Sign in or learn about subscription options.pp. 25-30
Secured outsourcing towards a cloud computing environment based on DNA cryptographyFull-text access may be available. Sign in or learn about subscription options.pp. 31-36
Downlink sum-rate optimization leveraging hungarian method in fog radio access networksFull-text access may be available. Sign in or learn about subscription options.pp. 56-60
User scenario based video contents creation systemFull-text access may be available. Sign in or learn about subscription options.pp. 61-63
A transformation analysis of 3D virtual object for projection mappingFull-text access may be available. Sign in or learn about subscription options.pp. 64-66
A study on trust factors in a multimedia service environmentFull-text access may be available. Sign in or learn about subscription options.pp. 67-69
A study on near-real-time geometric correction system of drones imageFull-text access may be available. Sign in or learn about subscription options.pp. 70-72
Trustworthiness management in sharing CDN infrastructureFull-text access may be available. Sign in or learn about subscription options.pp. 73-75
A study on smart IoT hub for intelligent signage services using trust informationFull-text access may be available. Sign in or learn about subscription options.pp. 76-79
History-enhanced focused website segment crawlerFull-text access may be available. Sign in or learn about subscription options.pp. 80-85
Individualized electric power management system using BLE tag at a shared houseFull-text access may be available. Sign in or learn about subscription options.pp. 86-91
DTNDocs: A delay tolerant peer-to-peer collaborative editing systemFull-text access may be available. Sign in or learn about subscription options.pp. 92-97
On similarities of string and query sequence for DGA botnet detectionFull-text access may be available. Sign in or learn about subscription options.pp. 104-109
Fireplug: Flexible and robust N-version geo-replication of graph databasesFull-text access may be available. Sign in or learn about subscription options.pp. 110-115
REST web service composition: A survey of automation and techniquesFull-text access may be available. Sign in or learn about subscription options.pp. 116-121
Analyzing darknet TCP traffic stability at different timescalesFull-text access may be available. Sign in or learn about subscription options.pp. 128-133
Wake-up schedule modification for shorter-delay intermittent wireless sensor networksFull-text access may be available. Sign in or learn about subscription options.pp. 134-139
Depth perception prediction of 3D video QoE for future internet servicesFull-text access may be available. Sign in or learn about subscription options.pp. 146-149
Quality control scheme based on VBR characteristics for improving QoE of UHD streaming serviceFull-text access may be available. Sign in or learn about subscription options.pp. 150-155
Strategic defense and attack in deception based network securityFull-text access may be available. Sign in or learn about subscription options.pp. 156-161
A new multi classifier system using entropy-based features in DDoS attack detectionFull-text access may be available. Sign in or learn about subscription options.pp. 162-167
Cryptanalysis and improvement of a mutual user authentication scheme for the Internet of ThingsFull-text access may be available. Sign in or learn about subscription options.pp. 168-173
A secure WebRTC/WoT-based health-care architecture enhanced with access controlFull-text access may be available. Sign in or learn about subscription options.pp. 182-187
Malicious browser extensions: A growing threat: A case study on Google Chrome: Ongoing work in progressFull-text access may be available. Sign in or learn about subscription options.pp. 188-193
Bypassing DRM protection in e-book applications on AndroidFull-text access may be available. Sign in or learn about subscription options.pp. 194-198
Analyzing information availability in ICN under link failuresFull-text access may be available. Sign in or learn about subscription options.pp. 199-204
A DTN routing algorithm adopting the “Community” and “Centrality” parameters used in social networksFull-text access may be available. Sign in or learn about subscription options.pp. 211-216
Effect of channel bonding and parallel data transmission with IEEE802.11n wireless LAN in a small sewer pipeFull-text access may be available. Sign in or learn about subscription options.pp. 223-228
Analysis of message delivery delay in large-scale geographic DTN routingFull-text access may be available. Sign in or learn about subscription options.pp. 235-240
Cognition for enhanced biometrie authenticationFull-text access may be available. Sign in or learn about subscription options.pp. 241-244
MAEC-X: DDoS prevention leveraging multi-access edge computingFull-text access may be available. Sign in or learn about subscription options.pp. 245-248
A method for estimating process maliciousness with Seq2Seq modelFull-text access may be available. Sign in or learn about subscription options.pp. 255-260
Implementation and optimization of image acquisition with smartphones in computer visionFull-text access may be available. Sign in or learn about subscription options.pp. 261-266
OVS-DPDK with TSO feature running under dockerFull-text access may be available. Sign in or learn about subscription options.pp. 270-273
Realization of flexible and scalable VANETs through SDN and virtualizationFull-text access may be available. Sign in or learn about subscription options.pp. 280-282
Software defined status aware routing in content-centric networkingFull-text access may be available. Sign in or learn about subscription options.pp. 283-288
Analysis of deployment approaches for virtual customer premises equipmentFull-text access may be available. Sign in or learn about subscription options.pp. 289-291
Link failure aware capacitated controller placement in software defined networksFull-text access may be available. Sign in or learn about subscription options.pp. 292-297
A method of ECU software updatingFull-text access may be available. Sign in or learn about subscription options.pp. 298-303
Vehicle approaching model for T-junction during transition to autonomous vehiclesFull-text access may be available. Sign in or learn about subscription options.pp. 304-309
Reliable vehicle-to-vehicle communication using spectrum environment mapFull-text access may be available. Sign in or learn about subscription options.pp. 310-315
A trust based secure communication for software defined VANETsFull-text access may be available. Sign in or learn about subscription options.pp. 316-321
The deployment of mobile edges in vehicular environmentsFull-text access may be available. Sign in or learn about subscription options.pp. 322-324
A distributed cooperative MAC protocol with relay collision avoidance for wireless ad hoc networksFull-text access may be available. Sign in or learn about subscription options.pp. 325-330
Throughput analysis of multi-antenna based SWIPT relay networkFull-text access may be available. Sign in or learn about subscription options.pp. 336-340
Exploring LTE-V link level performance by geometry enhanced winner II channel modelFull-text access may be available. Sign in or learn about subscription options.pp. 346-351
Influence of phase error on OFDM-based 4096-QAM with turbo codingFull-text access may be available. Sign in or learn about subscription options.pp. 352-355
FTN-based MIMO transmission for efficient coexistence of broadband and sporadic trafficsFull-text access may be available. Sign in or learn about subscription options.pp. 356-358
SINR-ordered cross link interference control scheme for dynamic TDD in 5G systemFull-text access may be available. Sign in or learn about subscription options.pp. 359-361
Joint clustering and routing protocol for static 3D wireless sensor networksFull-text access may be available. Sign in or learn about subscription options.pp. 368-373
Optimization of LTE uplink performance in multivendor heterogeneous networksFull-text access may be available. Sign in or learn about subscription options.pp. 374-379
Fair slot assignment in elastic optical networks under dynamic trafficFull-text access may be available. Sign in or learn about subscription options.pp. 386-390
Secure cloud computing algorithm using homomorphic encryption and multi-party computationFull-text access may be available. Sign in or learn about subscription options.pp. 391-396
The effect of datagram size and susceptible population on the epidemiology of fast self-propagating malwareFull-text access may be available. Sign in or learn about subscription options.pp. 397-401
Identity based security for authentication and mobility in future ID oriented networksFull-text access may be available. Sign in or learn about subscription options.pp. 402-407
Intelligent sensor network for fence protectionFull-text access may be available. Sign in or learn about subscription options.pp. 408-413
Data trustworthiness in IoTFull-text access may be available. Sign in or learn about subscription options.pp. 414-419
3TAAV: A three-tier architecture for pseudonym-based anonymous authentication in VANETsFull-text access may be available. Sign in or learn about subscription options.pp. 420-425
An airborne communication relay scheme for IEEE 802.11 WLAN based networkFull-text access may be available. Sign in or learn about subscription options.pp. 426-431
Cryptanalysis of a chaotic chebyshev polynomials based remote user authentication schemeFull-text access may be available. Sign in or learn about subscription options.pp. 438-441
Response driven efficient task load assignment in mobile crowdsourcingFull-text access may be available. Sign in or learn about subscription options.pp. 442-446
Cloud of things based on linked dataFull-text access may be available. Sign in or learn about subscription options.pp. 447-449
Beam Division Multiple Access (BDMA) and modulation formats for 5G: Heir of OFDM?Full-text access may be available. Sign in or learn about subscription options.pp. 450-455
Reservation-based cooperative traffic management at an intersection of multi-lane roadsFull-text access may be available. Sign in or learn about subscription options.pp. 456-460
Video streaming service and CD salesFull-text access may be available. Sign in or learn about subscription options.pp. 464-469
Broadcast MAC protocol using relative distance for periodic safety messages in vehicular networksFull-text access may be available. Sign in or learn about subscription options.pp. 470-472
Blockchain: Challenges and applicationsFull-text access may be available. Sign in or learn about subscription options.pp. 473-475
Weighted frequency hopping control in TDL for coexistence of satellite spectrumFull-text access may be available. Sign in or learn about subscription options.pp. 476-481
Mobile augmented reality on web-based for the tourism using HTML5Full-text access may be available. Sign in or learn about subscription options.pp. 482-485
An efficient rate adaptation algorithm for streaming over HTTPFull-text access may be available. Sign in or learn about subscription options.pp. 486-491
Design of marine environment monitoring system based on open source softwaresFull-text access may be available. Sign in or learn about subscription options.pp. 492-494
Showing 100 out of 200