Default Cover Image

2023 IEEE International Performance, Computing, and Communications Conference (IPCCC)

Nov. 17 2023 to Nov. 19 2023

Anaheim, CA, USA

ISBN: 979-8-3503-0293-6

Table of Contents

Low-Latency High-Reliability Industrial MAC Protocol for 6G NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Heuristic Fast Routing in Large-Scale Deterministic NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 9-17
STAD: A Traffic Anomaly Detection Technology Based on Siamese Neural NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 18-23
Optimal Task Offloading for Edge Computing with Stochastic Task ArrivalsFull-text access may be available. Sign in or learn about subscription options.pp. 24-31
Denoising Network of Dynamic Features for Enhanced Malware ClassificationFull-text access may be available. Sign in or learn about subscription options.pp. 32-39
How to Adapt RDMA Congestion Control Algorithm Based on Local ConditionsFull-text access may be available. Sign in or learn about subscription options.pp. 40-45
IoT Botnet Classification using CNN-based Deep LearningFull-text access may be available. Sign in or learn about subscription options.pp. 46-51
CORN: Cloud-optimized RDMA NetworkingFull-text access may be available. Sign in or learn about subscription options.pp. 52-59
Fuzzy Hierarchy Analysis Based Microservice Splitting Result EvaluationFull-text access may be available. Sign in or learn about subscription options.pp. 60-65
Performance Modeling of Blockchains with Fixed Block IntervalsFull-text access may be available. Sign in or learn about subscription options.pp. 66-73
Reducing Cloud Expenditures and Carbon Emissions via Virtual Machine Migration and DownsizingFull-text access may be available. Sign in or learn about subscription options.pp. 74-81
UID-Auto-Gen: Extracting Device Fingerprinting from Network TrafficFull-text access may be available. Sign in or learn about subscription options.pp. 82-90
TBP: Tree structure Burst-sequence Padding Defense Against Website FingerprintingFull-text access may be available. Sign in or learn about subscription options.pp. 99-108
UDAD: An Accurate Unsupervised Database Anomaly Detection MethodFull-text access may be available. Sign in or learn about subscription options.pp. 109-115
AggTree: A Routing Tree With In-Network Aggregation for Distributed TrainingFull-text access may be available. Sign in or learn about subscription options.pp. 116-122
FuzzyCAT: A Framework for Network Configuration Verification Based on FuzzingFull-text access may be available. Sign in or learn about subscription options.pp. 123-131
iWriter: An Offloading Method for Indirectly Writing Remote DataFull-text access may be available. Sign in or learn about subscription options.pp. 132-139
Shrink: Identification of Encrypted Video Traffic Based on QUICFull-text access may be available. Sign in or learn about subscription options.pp. 140-149
Evaluating the Carbon Impact of Large Language Models at the Inference StageFull-text access may be available. Sign in or learn about subscription options.pp. 150-157
Autonomy and Fatigue in Human-Robot TeamsFull-text access may be available. Sign in or learn about subscription options.pp. 158-159
Pathloss Analysis and Modelling for 5G Communication in U-SPACEFull-text access may be available. Sign in or learn about subscription options.pp. 160-165
Redesigning Mobile Crowd Sensing’s Selection Logic to Ensure Participant’s DiversityFull-text access may be available. Sign in or learn about subscription options.pp. 166-167
A Comprehensive Defense Approach Targeting The Computer Vision Based Cheating Tools in FPS Video GamesFull-text access may be available. Sign in or learn about subscription options.pp. 168-177
Predicting the GNSS Pseudo-Measurement with a Hybrid Multi-Head Attention for Tightly-Coupled NavigationFull-text access may be available. Sign in or learn about subscription options.pp. 178-185
ChainDet: A Traffic-Based Detection Method of Microservice ChainsFull-text access may be available. Sign in or learn about subscription options.pp. 194-201
Machine Learning Load Balancing Algorithms in SDN-enabled Massive IoT NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 202-203
Dynamic and Load-Aware Flowlet for Load-Balancing in Data Center NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 204-209
Identifying Exposed ICS Remote Management Device using Multimodal Feature in the WildFull-text access may be available. Sign in or learn about subscription options.pp. 220-227
Towards Flexible and Compact encoded DNS Messages using CBOR Structures.Full-text access may be available. Sign in or learn about subscription options.pp. 228-235
UAV-Assisted Computation Offloading in Vehicular NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 236-241
Placement Optimization and Resource Allocation in UxNB-Enabled Sliced 5G NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 242-248
An Adaptive Sampling Strategy for Federal Graph Neural Networks in Internet of ThingsFull-text access may be available. Sign in or learn about subscription options.pp. 249-258
Performance of Software-based Encrypted MPI Communication over Container ClustersFull-text access may be available. Sign in or learn about subscription options.pp. 259-264
Routing for Intermittently-Powered Sensing SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 274-282
HCPP: A Data-Oriented Framework to Preserve Privacy during Interactions with Healthcare ChatbotFull-text access may be available. Sign in or learn about subscription options.pp. 283-290
Enhancing ADHD Detection Using Diva Interview-Based Audio Signals and A Two-Stream NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 291-296
AEWF: Autoencoder-based Website Fingerprinting in Data-limited ScenariosFull-text access may be available. Sign in or learn about subscription options.pp. 297-303
Theory vs. Practice in Modeling Edge Storage SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 313-322
Can MPTCP Proxy Practically Improve Cellular Communication?Full-text access may be available. Sign in or learn about subscription options.pp. 323-330
Evaluation of Pruning TechniquesFull-text access may be available. Sign in or learn about subscription options.pp. 331-336
Sparse Sequential Recommendation with Interactions and Intentions Contrastive LearningFull-text access may be available. Sign in or learn about subscription options.pp. 337-342
A Dual-view Semi-supervised Learning Framework for Combinatorial Few-shot Fault DiagnosisFull-text access may be available. Sign in or learn about subscription options.pp. 343-350
GPU-based Parallel Computing for VANETs: Current State and Future ProspectsFull-text access may be available. Sign in or learn about subscription options.pp. 351-356
Parity Shadow Stack: Dynamic Instrumentation based Control Flow Security for IoT DevicesFull-text access may be available. Sign in or learn about subscription options.pp. 357-364
DynaES: Dynamic Energy Scheduling for Energy Harvesting Environmental SensorsFull-text access may be available. Sign in or learn about subscription options.pp. 365-374
An Artificial Neural Network Model for Mapping Extreme Precipitation EventsFull-text access may be available. Sign in or learn about subscription options.pp. 1-2
Location-Based Prefix Aggregation in Satellite-Ground NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 377-384
Trade-off Between Completion Time and Cost of Data Transfers in Dedicated HPNsFull-text access may be available. Sign in or learn about subscription options.pp. 385-390
A Scheme to Introduce New Reachability Domains on the InternetFull-text access may be available. Sign in or learn about subscription options.pp. 391-396
Adaptive Edge-Level Personalization on Hierarchical Federated LearningFull-text access may be available. Sign in or learn about subscription options.pp. 397-402
BCN: A Fast Notified Backpressure Congestion ManagementFull-text access may be available. Sign in or learn about subscription options.pp. 422-429
Bi-level Sampling: Improved Clients Selection in Heterogeneous Settings for Federated LearningFull-text access may be available. Sign in or learn about subscription options.pp. 430-435
SAR Ship Target Detection Using SAR ImagesFull-text access may be available. Sign in or learn about subscription options.pp. 436-440
Intrusion Detection in IoT leveraged by Multi-Access Edge Computing using Machine LearningFull-text access may be available. Sign in or learn about subscription options.pp. 441-446
Anomaly Detection and Attack Classification in IoT Networks Using Machine LearningFull-text access may be available. Sign in or learn about subscription options.pp. 453-458
Empowering Local Wood Detection with YOLO5 and Convolutional Neural Network ArchitectureFull-text access may be available. Sign in or learn about subscription options.pp. 459-464
On the fly Deep Neural Network Optimization Control for Low-Power Computer VisionFull-text access may be available. Sign in or learn about subscription options.pp. 465-469
Holistic Security Approach in Cybersecurity Services for Datacenters and Telecommunication OperatorsFull-text access may be available. Sign in or learn about subscription options.pp. 470-474
Deep Reinforcement Learning Based Task Offloading and Resource Allocation in Small Cell MECFull-text access may be available. Sign in or learn about subscription options.pp. 475-480
A Model Compression Method Using Significant Data and Knowledge DistillationFull-text access may be available. Sign in or learn about subscription options.pp. 481-487
Collaborative Edge Caching for Panoramic Video StreamingFull-text access may be available. Sign in or learn about subscription options.pp. 488-494
Showing 69 out of 69