Default Cover Image

2022 International Conference on Information Networking (ICOIN)

Jan. 12 2022 to Jan. 15 2022

Jeju-si, Korea, Republic of

ISSN: 1976-7684

ISBN: 978-1-6654-1332-9

Table of Contents

Publication & CopyrightFreely available from IEEE.pp. 2-2
Organizing Committee MembersFreely available from IEEE.pp. 4-10
Table of ContentsFreely available from IEEE.pp. 3-3
Conference Room MapFreely available from IEEE.pp. 26-30
ICOIN 2022 Conference ProgramFreely available from IEEE.pp. i-xxxii
Efficient Attacker Node(s) Detection and Isolation Schemes in MANETs OLSR ProtocolFull-text access may be available. Sign in or learn about subscription options.pp. 7-12
TMorph: A Traffic Morphing Framework to Test Network Defenses Against Adversarial AttacksFull-text access may be available. Sign in or learn about subscription options.pp. 18-23
Benchmarking Machine Learning based Detection of Cyber Attacks for Critical InfrastructureFull-text access may be available. Sign in or learn about subscription options.pp. 24-29
The Credibility Cryptocurrency Valuation: Statistical Learning Analysis for Influencer TweetsFull-text access may be available. Sign in or learn about subscription options.pp. 58-61
An online real-time face recognition system for police purposesFull-text access may be available. Sign in or learn about subscription options.pp. 62-67
DD-Locker: Blockchain-based Decentralized Personal Document LockerFull-text access may be available. Sign in or learn about subscription options.pp. 68-73
Multi-vendor IoT-based Resource Sharing using OAuth and BlockchainFull-text access may be available. Sign in or learn about subscription options.pp. 74-77
Blockchain-enabled Access Control with Fog Nodes for Independent IoTsFull-text access may be available. Sign in or learn about subscription options.pp. 78-83
DASH rate control using game theory to consider user video preferenceFull-text access may be available. Sign in or learn about subscription options.pp. 113-118
Modeling of Cognitive Bias of Video Viewing Users Based on Quantum Decision MakingFull-text access may be available. Sign in or learn about subscription options.pp. 124-130
The Impact of Wireless Nodes on the Performance of Video Streaming over a Gigabit Backbone NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 131-135
Measurement-Based Evaluation of Video Streaming Method for Remote Driving SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 136-139
A Design of Network Mobility Management on Cloud Native Tactical Edge CloudFull-text access may be available. Sign in or learn about subscription options.pp. 168-170
Enhanced One-Way Delay Monitoring with OpenFlowFull-text access may be available. Sign in or learn about subscription options.pp. 171-176
Economic Denial of Sustainability (EDoS) attack detection by attention on flow-based in Software Defined Network (SDN)Full-text access may be available. Sign in or learn about subscription options.pp. 183-185
A Hash-Free method for FIB and LNPM in ICN programmable data planesFull-text access may be available. Sign in or learn about subscription options.pp. 186-191
A Solution for Finding Quasi-Shortest Path with Graph CoarseningFull-text access may be available. Sign in or learn about subscription options.pp. 215-219
Stochastic Multi-Distribution Modeling of Inter-Contact TimesFull-text access may be available. Sign in or learn about subscription options.pp. 220-225
A Tracing Based Model to Identify Bottlenecks in Physically Distributed ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 226-231
Random Walk on a Graph with Vicinity AvoidanceFull-text access may be available. Sign in or learn about subscription options.pp. 232-237
On Accelerating Multiple Random Walks with Loose CooperationFull-text access may be available. Sign in or learn about subscription options.pp. 238-243
Broadcast with Tree Selection on An Overlay NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 244-249
EEC-GA: Energy-Efficient Clustering Approach Using Genetic Algorithm for Heterogeneous Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 280-286
Penalized Approach for Wide Coverage in Gamified Participatory D2D CommunicationFull-text access may be available. Sign in or learn about subscription options.pp. 287-291
Mapping Network Performance to Radio ResourcesFull-text access may be available. Sign in or learn about subscription options.pp. 298-303
Encryption-then-Compression System for Cloud-based Medical Image ServicesFull-text access may be available. Sign in or learn about subscription options.pp. 30-33
Let’s Re-Sign! Analysis and Equivocation-Resistant Distribution of OpenPGP RevocationsFull-text access may be available. Sign in or learn about subscription options.pp. 34-39
An Analysis on the Variants of the RSA CryptographyFull-text access may be available. Sign in or learn about subscription options.pp. 40-45
Secure Key Establishment Protocol for Smart Homes Based on Symmetric CryptographyFull-text access may be available. Sign in or learn about subscription options.pp. 46-51
Emerging Privacy and Trust Issues for Autonomous Vehicle SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 52-57
Toward a generic and secure bootloader for IoT device firmware OTA updateFull-text access may be available. Sign in or learn about subscription options.pp. 90-95
A Long Range Reliable Precise Irrigation System Based on LoRaP2P ProtocolFull-text access may be available. Sign in or learn about subscription options.pp. 107-112
Correlation between SpO2 and Heart Rate in Sleep Apnea DetectionFull-text access may be available. Sign in or learn about subscription options.pp. 146-151
Chest X-Ray Anomalous Object Detection and Classification Framework for Medical DiagnosisFull-text access may be available. Sign in or learn about subscription options.pp. 158-163
Deep Learning based Semantic Ontology Alignment Process and Predictive Analysis of Depressive DisorderFull-text access may be available. Sign in or learn about subscription options.pp. 164-167
Partitioned Path Loss Models Based on Coefficient of DeterminationFull-text access may be available. Sign in or learn about subscription options.pp. 198-203
Cross-Beam Retransmission in mmWave NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 204-206
Distortion Performance of MIMO Mobile Underwater Acoustic Networks with RetransmissionsFull-text access may be available. Sign in or learn about subscription options.pp. 207-209
Capacity Limitation of Small Cell DensificationFull-text access may be available. Sign in or learn about subscription options.pp. 210-214
Multivariate Time-series Anomaly Detection using SeqVAE-CNN Hybrid ModelFull-text access may be available. Sign in or learn about subscription options.pp. 250-253
Adaptive Self-Supervised Graph Representation LearningFull-text access may be available. Sign in or learn about subscription options.pp. 254-259
On Inferring Communication Delays Using Semi-Supervised LearningFull-text access may be available. Sign in or learn about subscription options.pp. 260-265
Composite Multi-Directional LSTM for Accurate Prediction of Energy ConsumptionFull-text access may be available. Sign in or learn about subscription options.pp. 266-269
Rethinking Fatigue-Aware 6DoF Video Streaming: Focusing on MPEG Immersive VideoFull-text access may be available. Sign in or learn about subscription options.pp. 304-309
Efficient Group-Based Packing Strategy for 6DoF Immersive Video StreamingFull-text access may be available. Sign in or learn about subscription options.pp. 310-314
Restore Buffer Overflow Attacks: Breaking Undo-Based Defense SchemesFull-text access may be available. Sign in or learn about subscription options.pp. 315-318
Downgrading Backward Privacy of Searchable EncryptionFull-text access may be available. Sign in or learn about subscription options.pp. 324-328
DLNet: Domain-specific Lightweight Network for On-Device Object DetectionFull-text access may be available. Sign in or learn about subscription options.pp. 335-339
A Round-Robin Position Change Algorithm in Vehicle PlatooningFull-text access may be available. Sign in or learn about subscription options.pp. 340-344
Data Aggregation Latency Minimization in Multichannel Duty-cycled WSNsFull-text access may be available. Sign in or learn about subscription options.pp. 345-348
A Spatial Common Datasets for Linkage between Dataset ValuesFull-text access may be available. Sign in or learn about subscription options.pp. 349-351
Passive Localization for Comparing Physical Activities in Indoor EnvironmentsFull-text access may be available. Sign in or learn about subscription options.pp. 352-355
Dynamic Time Division Duplexing for Green Internet of ThingsFull-text access may be available. Sign in or learn about subscription options.pp. 356-358
DRL-based Energy Efficient Communication Coverage Control in Hierarchical HAP-LAP NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 359-362
Case Study of Moth Flame Optimization Implementation for Network ChallengesFull-text access may be available. Sign in or learn about subscription options.pp. 363-367
ESPAR Antenna Design for the Interference Mitigation in WSN Communication SystemFull-text access may be available. Sign in or learn about subscription options.pp. 368-371
Unplanned UAV Trajectory-based Data Collection in Large-scale Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 372-377
A WTTE-RNN Based Hypoglycemic Event PredictionFull-text access may be available. Sign in or learn about subscription options.pp. 378-379
A Prediction Scheme For Movie Preference Rating Based on DeepFM ModelFull-text access may be available. Sign in or learn about subscription options.pp. 385-390
Improved Partial Transmit Sequence Based PAPR Reduction of UFMC SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 391-395
Serverless Computing Approach for Deploying Machine Learning Applications in Edge LayerFull-text access may be available. Sign in or learn about subscription options.pp. 396-401
Received Signal Strength Indicator for Device Localization in Post Disaster ScenariosFull-text access may be available. Sign in or learn about subscription options.pp. 402-407
Ontology-based NSD Modeling for NFV Service ManagementFull-text access may be available. Sign in or learn about subscription options.pp. 408-412
Optimizing Resource Scaling in Network SlicingFull-text access may be available. Sign in or learn about subscription options.pp. 413-416
Friendly Jamming in LoRa Physical Layer Using Imperfect Orthogonality of Spreading FactorFull-text access may be available. Sign in or learn about subscription options.pp. 423-428
Sequential Beam, User, and Power Allocation for Interference Management in 5G mmWave NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 429-434
Web-Based Car Control and Monitoring for Safe Driving of Autonomous VehiclesFull-text access may be available. Sign in or learn about subscription options.pp. 435-440
mmWave path loss modeling for urban scenarios based on 3D-convolutional neural networksFull-text access may be available. Sign in or learn about subscription options.pp. 441-445
A Neural Network-based Path Loss Model for Bluetooth TransceiversFull-text access may be available. Sign in or learn about subscription options.pp. 446-449
Detection of DoH Tunneling using Semi-supervised Learning methodFull-text access may be available. Sign in or learn about subscription options.pp. 450-453
Efficient Content Delivery to Vehicles Passing Through a Wireless-enabled Traffic Signal SystemFull-text access may be available. Sign in or learn about subscription options.pp. 460-463
Survey on Reinforcement Learning Approaches for Cache-Assisted Video Streaming SystemFull-text access may be available. Sign in or learn about subscription options.pp. 470-473
Improving the Robustness of the Bug Triage Model through Adversarial TrainingFull-text access may be available. Sign in or learn about subscription options.pp. 478-481
Reinforcement Learning based Load Balancing in a Distributed Heterogeneous Storage SystemFull-text access may be available. Sign in or learn about subscription options.pp. 482-485
Showing 100 out of 104