Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
IPCCC
IPCCC 2023
Generate Citations
2023 IEEE International Performance, Computing, and Communications Conference (IPCCC)
Nov. 17 2023 to Nov. 19 2023
Anaheim, CA, USA
ISBN: 979-8-3503-0293-6
Table of Contents
Low-Latency High-Reliability Industrial MAC Protocol for 6G Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Ahmed M. Salama
,
Bin Xie
,
Jayanta Debnath
,
Anup Kumar
Heuristic Fast Routing in Large-Scale Deterministic Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 9-17
by
Mengyu Wang
,
Shuyong Zhu
,
Linghao Wang
,
Wenxiao Li
,
Yujun Zhang
STAD: A Traffic Anomaly Detection Technology Based on Siamese Neural Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 18-23
by
Zinuo Yin
,
Hailong Ma
,
Tao Hu
Optimal Task Offloading for Edge Computing with Stochastic Task Arrivals
Full-text access may be available. Sign in or learn about subscription options.
pp. 24-31
by
Jun Xu
,
Dejun Yang
Denoising Network of Dynamic Features for Enhanced Malware Classification
Full-text access may be available. Sign in or learn about subscription options.
pp. 32-39
by
Siyuan Li
,
Hui Wen
,
Liting Deng
,
Yu Zhou
,
Wenyuan Zhang
,
Zhi Li
,
Limin Sun
How to Adapt RDMA Congestion Control Algorithm Based on Local Conditions
Full-text access may be available. Sign in or learn about subscription options.
pp. 40-45
by
Yizhou Gong
,
Wei Zhang
,
Yunfang Chen
,
Chao Tu
,
Wanting Tian
,
Yunqu Liu
IoT Botnet Classification using CNN-based Deep Learning
Full-text access may be available. Sign in or learn about subscription options.
pp. 46-51
by
Nahid Ebrahimi Majd
,
Dhatri Sai Kumar Reddy Gudipelly
CORN: Cloud-optimized RDMA Networking
Full-text access may be available. Sign in or learn about subscription options.
pp. 52-59
by
Jung-Hwan Cha
,
Shinhyeok Kang
,
Yewon Kang
,
Hansaem Seo
,
Jungeun Lee
,
Jongsung Kim
,
Minsung Jang
Fuzzy Hierarchy Analysis Based Microservice Splitting Result Evaluation
Full-text access may be available. Sign in or learn about subscription options.
pp. 60-65
by
Ke Zhao
,
Junfeng Zhao
Performance Modeling of Blockchains with Fixed Block Intervals
Full-text access may be available. Sign in or learn about subscription options.
pp. 66-73
by
Bo Li
,
Hanwen Zhang
,
Chenhao Jiang
,
Zhongcheng Li
,
Yi Sun
Reducing Cloud Expenditures and Carbon Emissions via Virtual Machine Migration and Downsizing
Full-text access may be available. Sign in or learn about subscription options.
pp. 74-81
by
Nathan Huang
,
Anthony Li
,
Sophia Zhang
,
Ziliang Zong
UID-Auto-Gen: Extracting Device Fingerprinting from Network Traffic
Full-text access may be available. Sign in or learn about subscription options.
pp. 82-90
by
Haoyu Bin
,
Sen Zhao
,
Zhi Li
,
Nan Yu
,
Rongrong Xi
,
Hongsong Zhu
,
Limin Sun
Based on Deep Reinforcement Learning with Context Network and Experience pool optimization for Mix-Flow Scheduling in SD-DCN
Full-text access may be available. Sign in or learn about subscription options.
pp. 91-98
by
Chao-Xuan Zheng
,
Wai-Xi Liu
,
Zhen-Zheng Guo
,
Jian-Yu Zhang
TBP: Tree structure Burst-sequence Padding Defense Against Website Fingerprinting
Full-text access may be available. Sign in or learn about subscription options.
pp. 99-108
by
Yankun Wang
,
Yongjun Wang
,
Jun-Jie Huang
,
Yongxin Chen
UDAD: An Accurate Unsupervised Database Anomaly Detection Method
Full-text access may be available. Sign in or learn about subscription options.
pp. 109-115
by
Huazhen Zhong
,
Fan Zhang
,
Yining Zhao
,
Weifang Zhang
,
Wenjie Xiao
,
Xuehai Tang
,
Liangjun Zang
AggTree: A Routing Tree With In-Network Aggregation for Distributed Training
Full-text access may be available. Sign in or learn about subscription options.
pp. 116-122
by
Jianglong Nie
,
Wenfei Wu
FuzzyCAT: A Framework for Network Configuration Verification Based on Fuzzing
Full-text access may be available. Sign in or learn about subscription options.
pp. 123-131
by
Jianfei Cai
,
Guozheng Yang
,
Jingju Liu
,
Yi Xie
iWriter: An Offloading Method for Indirectly Writing Remote Data
Full-text access may be available. Sign in or learn about subscription options.
pp. 132-139
by
Yuting Li
,
Yang Yi
,
Yun Xu
,
Pengcheng Wang
,
Yonghui Xu
,
Weiguang Wang
Shrink: Identification of Encrypted Video Traffic Based on QUIC
Full-text access may be available. Sign in or learn about subscription options.
pp. 140-149
by
Weitao Tang
,
Meijie Du
,
Zhao Li
,
Shu Li
,
Zhou Zhou
,
Qingyun Liu
Evaluating the Carbon Impact of Large Language Models at the Inference Stage
Full-text access may be available. Sign in or learn about subscription options.
pp. 150-157
by
Brad Everman
,
Trevor Villwock
,
Dayuan Chen
,
Noe Soto
,
Oliver Zhang
,
Ziliang Zong
Autonomy and Fatigue in Human-Robot Teams
Full-text access may be available. Sign in or learn about subscription options.
pp. 158-159
by
Max Parks
,
Mark Allison
Pathloss Analysis and Modelling for 5G Communication in U-SPACE
Full-text access may be available. Sign in or learn about subscription options.
pp. 160-165
by
Stanley C. Nwabuona
,
Radheshyam Singh
,
Michael Berger
,
Sarah Ruepp
,
Lars Dittmann
Redesigning Mobile Crowd Sensing’s Selection Logic to Ensure Participant’s Diversity
Full-text access may be available. Sign in or learn about subscription options.
pp. 166-167
by
Jiahui Jin
,
Yijun Liu
,
Ting Li
A Comprehensive Defense Approach Targeting The Computer Vision Based Cheating Tools in FPS Video Games
Full-text access may be available. Sign in or learn about subscription options.
pp. 168-177
by
Anh Nhu
,
Hieu Phan
,
Chang Liu
,
Xianglong Feng
Predicting the GNSS Pseudo-Measurement with a Hybrid Multi-Head Attention for Tightly-Coupled Navigation
Full-text access may be available. Sign in or learn about subscription options.
pp. 178-185
by
Hongfu Xu
,
Haiyong Luo
,
Zijian Wu
,
Fang Zhao
OS Packet Processing Mechanism Simulation Architecture for Enabling Digital Twins of Networks in ns-3
Full-text access may be available. Sign in or learn about subscription options.
pp. 186-193
by
Keyang Chang
,
Yimin Du
,
Min Liu
,
Jinglin Shi
,
Yiqing Zhou
,
Yongkang Li
ChainDet: A Traffic-Based Detection Method of Microservice Chains
Full-text access may be available. Sign in or learn about subscription options.
pp. 194-201
by
Chunyang Zheng
,
Jinfa Wang
,
Shuaizong Si
,
Weidong Zhang
,
Limin Sun
Machine Learning Load Balancing Algorithms in SDN-enabled Massive IoT Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 202-203
by
Aaron Harbin
,
Kane Baldwin
,
Jui Mhatre
,
Ahyoung Lee
,
Hoseon Lee
Dynamic and Load-Aware Flowlet for Load-Balancing in Data Center Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 204-209
by
Carol K. Song
,
Haoyu Song
,
Chen Qian
Bitcoin Mixing Service Detection Based on Spatio-Temporal Information Representation of Transaction Graph
Full-text access may be available. Sign in or learn about subscription options.
pp. 210-219
by
Hanzhi Yang
,
Zhenzhen Li
,
Gaopeng Gou
,
Junzheng Shi
,
Gang Xiong
,
Zhen Li
Identifying Exposed ICS Remote Management Device using Multimodal Feature in the Wild
Full-text access may be available. Sign in or learn about subscription options.
pp. 220-227
by
Liuxing Su
,
Zhenzhen Li
,
Gaopeng Gou
,
Zhen Li
,
Gang Xiong
,
Chengshang Hou
Towards Flexible and Compact encoded DNS Messages using CBOR Structures.
Full-text access may be available. Sign in or learn about subscription options.
pp. 228-235
by
Arnol Lemogue
,
Ivan Martinez
,
Laurent Toutain
,
Ahmed Bouabdallah
UAV-Assisted Computation Offloading in Vehicular Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 236-241
by
Insaf Rzig
,
Wael Jaafar
,
Maha Jebalia
,
Sami Tabbane
Placement Optimization and Resource Allocation in UxNB-Enabled Sliced 5G Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 242-248
by
Nesrine El Ghoul
,
Wael Jaafar
,
Jihene Ben Abderrazak
An Adaptive Sampling Strategy for Federal Graph Neural Networks in Internet of Things
Full-text access may be available. Sign in or learn about subscription options.
pp. 249-258
by
Tingqi Wang
,
Xu Zheng
,
Liyun Yang
,
Rong Xiang
Performance of Software-based Encrypted MPI Communication over Container Clusters
Full-text access may be available. Sign in or learn about subscription options.
pp. 259-264
by
Mohsen Gavahi
,
Abu Naser
,
Mehran Sadeghi Lahijani
,
Cong Wu
,
Zhi Wang
,
Xin Yuan
The Potential Utility of Image Descriptions: User Identity Linkage across Social Networks Based on MultiModal Self-Attention Fusion
Full-text access may be available. Sign in or learn about subscription options.
pp. 265-273
by
Yunfeng Li
,
Gaopeng Gou
,
Gang Xiong
,
Zhen Li
,
Mingxin Cui
Routing for Intermittently-Powered Sensing Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 274-282
by
Gaosheng Liu
,
Lin Wang
HCPP: A Data-Oriented Framework to Preserve Privacy during Interactions with Healthcare Chatbot
Full-text access may be available. Sign in or learn about subscription options.
pp. 283-290
by
Ziyan Cai
,
Xin Chang
,
Ping Li
Enhancing ADHD Detection Using Diva Interview-Based Audio Signals and A Two-Stream Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 291-296
by
Shuanglin Li
,
Yang Sun
,
Rajesh Nair
,
Syed Mohsen Naqvi
AEWF: Autoencoder-based Website Fingerprinting in Data-limited Scenarios
Full-text access may be available. Sign in or learn about subscription options.
pp. 297-303
by
Jianjun Lin
,
Bo Sun
Achieving Zero-copy Serialization for Datacenter RPC
Full-text access may be available. Sign in or learn about subscription options.
pp. 304-312
by
Tianfan Zhang
,
Huaping Zhou
,
Chengyuan Huang
,
Chen Tian
,
Wei Zhang
,
Xiaoliang Wang
,
Yi Wang
,
Ahmed M. Abdelmoniem
,
Matthew Tan
,
Wanchun Dou
,
Guihai Chen
Theory vs. Practice in Modeling Edge Storage Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 313-322
by
Oleg Kolosov
,
Mehmet Fatih Aktaş
,
Emina Soljanin
,
Gala Yadgar
Can MPTCP Proxy Practically Improve Cellular Communication?
Full-text access may be available. Sign in or learn about subscription options.
pp. 323-330
by
Reza Poorzare
,
Oliver P. Waldhorst
Evaluation of Pruning Techniques
Full-text access may be available. Sign in or learn about subscription options.
pp. 331-336
by
Shvetha S Kumar
,
Reshma R Nayak
,
Jismi S Kannampuzha
,
Jeeho Ryoo
,
Sahil Rai
,
Lizy K John
Sparse Sequential Recommendation with Interactions and Intentions Contrastive Learning
Full-text access may be available. Sign in or learn about subscription options.
pp. 337-342
by
Hengxia Wang
,
Jinghua Zhu
A Dual-view Semi-supervised Learning Framework for Combinatorial Few-shot Fault Diagnosis
Full-text access may be available. Sign in or learn about subscription options.
pp. 343-350
by
Yumeng Liu
,
Wenzhang Zhong
,
Ke Yan
,
Ling Tian
GPU-based Parallel Computing for VANETs: Current State and Future Prospects
Full-text access may be available. Sign in or learn about subscription options.
pp. 351-356
by
Abinash Borah
,
Anirudh Paranjothi
Parity Shadow Stack: Dynamic Instrumentation based Control Flow Security for IoT Devices
Full-text access may be available. Sign in or learn about subscription options.
pp. 357-364
by
Charles Qing Cao
DynaES: Dynamic Energy Scheduling for Energy Harvesting Environmental Sensors
Full-text access may be available. Sign in or learn about subscription options.
pp. 365-374
by
Jianwei Hao
,
Emmanuel Oni
,
In Kee Kim
,
Lakshmish Ramaswamy
An Artificial Neural Network Model for Mapping Extreme Precipitation Events
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-2
by
Hela Hammami
,
Sadok Elasmi
Location-Based Prefix Aggregation in Satellite-Ground Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 377-384
by
Sitian Huang
,
Dongchao Ma
,
Yuzhu Jin
,
Mingwei Xu
Trade-off Between Completion Time and Cost of Data Transfers in Dedicated HPNs
Full-text access may be available. Sign in or learn about subscription options.
pp. 385-390
by
Liudong Zuo
,
Daqing Yun
A Scheme to Introduce New Reachability Domains on the Internet
Full-text access may be available. Sign in or learn about subscription options.
pp. 391-396
by
Souvik Das
,
Kamil Sarac
Adaptive Edge-Level Personalization on Hierarchical Federated Learning
Full-text access may be available. Sign in or learn about subscription options.
pp. 397-402
by
Lihua Song
,
Jing Li
,
Honglu Jiang
,
Shuhua Wei
,
Yufei Guo
Karasu: A Collaborative Approach to Efficient Cluster Configuration for Big Data Analytics
Full-text access may be available. Sign in or learn about subscription options.
pp. 403-412
by
Dominik Scheinert
,
Philipp Wiesner
,
Thorsten Wittkopp
,
Lauritz Thamsen
,
Jonathan Will
,
Odej Kao
PERF-Expert: Novel Approach for Dynamically Forecasting the Performance of Cloud-Based Integrations with Zero Performance Tests
Full-text access may be available. Sign in or learn about subscription options.
pp. 413-421
by
Nadheesh Jihan
,
Malith Jayasinghe
,
Srinath Perera
,
Caucidheesan Krishnamoorthy
BCN: A Fast Notified Backpressure Congestion Management
Full-text access may be available. Sign in or learn about subscription options.
pp. 422-429
by
Xingyu Hu
,
Dinghuang Hu
,
Dezun Dong
,
Yang Bai
,
Yuan Lu
,
Yong Dong
Bi-level Sampling: Improved Clients Selection in Heterogeneous Settings for Federated Learning
Full-text access may be available. Sign in or learn about subscription options.
pp. 430-435
by
Danyang Xiao
,
Congcong Zhan
,
Jialun Li
,
Weigang Wu
SAR Ship Target Detection Using SAR Images
Full-text access may be available. Sign in or learn about subscription options.
pp. 436-440
by
Muhammad Yasir
,
Wan Jianhua
,
Liu Shanwei
,
Xu Mingming
Intrusion Detection in IoT leveraged by Multi-Access Edge Computing using Machine Learning
Full-text access may be available. Sign in or learn about subscription options.
pp. 441-446
by
Dongjin Li
,
Nahid Ebrahimi Majd
Customized Hybrid Deep Learning Model for Road Accident Detection Based on CCTV Images
Full-text access may be available. Sign in or learn about subscription options.
pp. 447-452
by
P.C. Sherimon
,
Vinu Sherimon
,
Yousuf Nasser Al Husaini
,
Ambily Merlin Kuruvilla
,
Ajit Mammen Varghese
,
Harikrishnan D
Anomaly Detection and Attack Classification in IoT Networks Using Machine Learning
Full-text access may be available. Sign in or learn about subscription options.
pp. 453-458
by
Kyungbin Lee
,
Nahid Ebrahimi Majd
Empowering Local Wood Detection with YOLO5 and Convolutional Neural Network Architecture
Full-text access may be available. Sign in or learn about subscription options.
pp. 459-464
by
Abdulaziz Alshammari
On the fly Deep Neural Network Optimization Control for Low-Power Computer Vision
Full-text access may be available. Sign in or learn about subscription options.
pp. 465-469
by
Ishmeet Kaur
,
Adwaita Janardhan Jadhav
Holistic Security Approach in Cybersecurity Services for Datacenters and Telecommunication Operators
Full-text access may be available. Sign in or learn about subscription options.
pp. 470-474
by
Kasım Öztoprak
,
Yusuf Kursat Tuncel
Deep Reinforcement Learning Based Task Offloading and Resource Allocation in Small Cell MEC
Full-text access may be available. Sign in or learn about subscription options.
pp. 475-480
by
Han Li
,
Ke Xiong
,
Pingyi Fan
,
Khaled Ben Letaief
A Model Compression Method Using Significant Data and Knowledge Distillation
Full-text access may be available. Sign in or learn about subscription options.
pp. 481-487
by
Fan Zhang
,
Beibei Xu
,
Kai Cui
Collaborative Edge Caching for Panoramic Video Streaming
Full-text access may be available. Sign in or learn about subscription options.
pp. 488-494
by
Zheng Wan
,
Mingyang Ma
,
Xuelin Liu
Showing 69 out of 69