Default Cover Image

2021 International Conference on Networking and Network Applications (NaNA)

Oct. 29 2021 to Nov. 1 2021

Lijiang City, China

ISBN: 978-1-6654-4158-2

Table of Contents

Title Page IFreely available from IEEE.pp. 1-1
Title Page IIIFreely available from IEEE.pp. 3-3
CopyrightFreely available from IEEE.pp. 4-4
Table of ContentsFreely available from IEEE.pp. 5-18
Message from the General Conference ChairsFreely available from IEEE.pp. 19-19
CommitteesFreely available from IEEE.pp. 20-21
ReviewersFreely available from IEEE.pp. 22-25
KeynotesFreely available from IEEE.pp. 26-29
Spectrum Utilization Improvement for Multi-Channel Cognitive Radio Networks with Energy HarvestingFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
Wiretapping or Jamming: On Eavesdropper Attacking Strategy in mmWave Ad Hoc NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 8-14
Covert Communication in D2D Underlaying Cellular NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 15-22
Calibrating Privacy Budgets for Locally Private Graph Neural NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 23-29
Physical Layer Authentication Using MmWave Channel State InformationFull-text access may be available. Sign in or learn about subscription options.pp. 30-33
Tetris: Near-optimal Scheduling for Multi-path Deadline-aware Transport ProtocolFull-text access may be available. Sign in or learn about subscription options.pp. 34-40
Covert Authentication at the Physical LayerFull-text access may be available. Sign in or learn about subscription options.pp. 41-46
Beam Selection Algorithm for Beamspace HAP-MIMO Systems Based on Statistical CSIFull-text access may be available. Sign in or learn about subscription options.pp. 47-51
Towards Attack and Defense Views to (t, n)-threshold Secret Sharing Scheme Using Information TheoryFull-text access may be available. Sign in or learn about subscription options.pp. 52-58
Energy-efficient UAV Trajectory Planning Based On Flexible Data RateFull-text access may be available. Sign in or learn about subscription options.pp. 59-62
Covert MIMO Communication in Two-hop Relay SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 63-68
Buffer-Aided Relay Selection for Wireless Cooperative Relay Networks with Untrusted RelaysFull-text access may be available. Sign in or learn about subscription options.pp. 69-74
Privacy-Preserving Federated Generative Adversarial Network for IoTFull-text access may be available. Sign in or learn about subscription options.pp. 75-80
Improved Anonymous Hybrid Authentication Scheme for Body Area Network Utilizing Channel CharacteristicsFull-text access may be available. Sign in or learn about subscription options.pp. 81-87
Random verifiable multi-server searchable encryption schemeFull-text access may be available. Sign in or learn about subscription options.pp. 88-93
Detecting Http Flooding Attacks Based on Uniform ModelFull-text access may be available. Sign in or learn about subscription options.pp. 94-98
Privacy-Preserving Proximity Detection Framework for Location-Based ServicesFull-text access may be available. Sign in or learn about subscription options.pp. 99-106
Comparative study of symmetric cryptographic algorithmsFull-text access may be available. Sign in or learn about subscription options.pp. 107-112
Research on PDCCH Channel in 5G NR SystemFull-text access may be available. Sign in or learn about subscription options.pp. 113-118
Exact Evaluation of Total Variation Distance in Covert CommunicationsFull-text access may be available. Sign in or learn about subscription options.pp. 119-124
A Secure Identifier-to-Locator Mapping Mechanism in Smart Identifier NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 437-442
Privacy protection scheme for edge computing based on function encryptionFull-text access may be available. Sign in or learn about subscription options.pp. 131-135
Online Scheduling of Machine Learning Jobs in Edge-Cloud NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 136-143
Emergency Virtual Machine Online Migration in Cloud Data CentersFull-text access may be available. Sign in or learn about subscription options.pp. 144-149
Energy-saving mechanism based on tidal characteristic in computing power networkFull-text access may be available. Sign in or learn about subscription options.pp. 150-154
Petri net modeling and vulnerability analysis of the HeartbleedFull-text access may be available. Sign in or learn about subscription options.pp. 155-160
A fine-grained petri model for SQL time-blind injectionFull-text access may be available. Sign in or learn about subscription options.pp. 161-167
A Modified Vehicular Handover Scheme in Non-standalone 5G Networks With the Assistance of Multi-access Edge ComputingFull-text access may be available. Sign in or learn about subscription options.pp. 174-180
A Game Theory Perspective on IP Routing Protocols EvaluationFull-text access may be available. Sign in or learn about subscription options.pp. 181-185
Research on Data Security of Unmanned Aerial VehiclesFull-text access may be available. Sign in or learn about subscription options.pp. 186-193
CD-SR: A Real-time Anomaly Detection Framework for Continuous Concept DriftFull-text access may be available. Sign in or learn about subscription options.pp. 194-199
On the Applicability of Multi-Characteristics for the Continuous Authentication in IIoT ScenariosFull-text access may be available. Sign in or learn about subscription options.pp. 200-205
Performance Analysis for Dual-Hop Covert Communication System with Outdated CSIFull-text access may be available. Sign in or learn about subscription options.pp. 206-211
The Cooperative Authentication Mechanism and Performance Evaluation for Unmanned SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 212-216
Monitoring System of Carbon Neutralization Forestland in Plateau based on Edge ComputingFull-text access may be available. Sign in or learn about subscription options.pp. 217-221
Review of Research on the Curriculum for Artificial Intelligence and Industrial Automation based on Edge ComputingFull-text access may be available. Sign in or learn about subscription options.pp. 222-226
Heterogeneous Network Embedding With Enhanced Event Awareness Via Triplet NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 231-235
A Method for Fast Outlier Detection in High Dimensional Database LogFull-text access may be available. Sign in or learn about subscription options.pp. 236-241
Shellshock Bash Vulnerability Modeling Analysis Based on Petri NetFull-text access may be available. Sign in or learn about subscription options.pp. 242-247
Transmission Characteristics of Photonic Crystal Fiber Filled with Magnetic FluidFull-text access may be available. Sign in or learn about subscription options.pp. 248-253
Multi-domain Feature Extraction for Human Activity Recognition Using Wearable SensorsFull-text access may be available. Sign in or learn about subscription options.pp. 254-259
CLSDRL:A routing optimization method for traffic feature extractionFull-text access may be available. Sign in or learn about subscription options.pp. 260-264
A Proposal of Large Scale Network Route Optimization Technique Based on Genetic AlgorithmFull-text access may be available. Sign in or learn about subscription options.pp. 265-271
Fatigue Detection Technology for Online LearningFull-text access may be available. Sign in or learn about subscription options.pp. 272-277
Cryptanalysis of Double-trapdoor Hash Function and Multi-Trapdoor Hash Function SchemesFull-text access may be available. Sign in or learn about subscription options.pp. 278-281
A Modified K-means User Grouping Design for HAP Massive MIMO SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 288-292
A New Symmetric Information Hiding Scheme Based on Cover RandomnessFull-text access may be available. Sign in or learn about subscription options.pp. 293-300
Network Traffic Oriented Malware Detection in IoT (Internet-of-Things)Full-text access may be available. Sign in or learn about subscription options.pp. 301-307
An Improved Method of Median Filtering Forensics for Enhanced Image Security DetectionFull-text access may be available. Sign in or learn about subscription options.pp. 308-312
A Recommendation Scheme with Reputation-Based Incentive Mechanism on Consortium BlockchainFull-text access may be available. Sign in or learn about subscription options.pp. 313-318
A survey on security and privacy threats to federated learningFull-text access may be available. Sign in or learn about subscription options.pp. 319-326
NLEU: A Semantic-based Taint Analysis for Vetting Apps in AndroidFull-text access may be available. Sign in or learn about subscription options.pp. 327-333
Research on A Vulnerability Detection Technology for Network Topology SecurityFull-text access may be available. Sign in or learn about subscription options.pp. 334-337
Network Intrusion Detection based of Semi-Supervised Ensemble Learning Algorithm for Imbalanced DataFull-text access may be available. Sign in or learn about subscription options.pp. 338-344
TPLI:A Traceable Privacy-preserving Logistics Information Scheme via BlockchainFull-text access may be available. Sign in or learn about subscription options.pp. 345-350
Network application vulnerability detection based on fuzzing technologyFull-text access may be available. Sign in or learn about subscription options.pp. 351-355
An efficient authentication scheme based on Zero Trust for UAV swarmFull-text access may be available. Sign in or learn about subscription options.pp. 356-360
Expression Tree-based Policy Conflict Detection AlgorithmFull-text access may be available. Sign in or learn about subscription options.pp. 361-366
On the Robustness of Complex System With Percolation Theory Under Node AttackFull-text access may be available. Sign in or learn about subscription options.pp. 367-372
The Trade-off Between Privacy and Utility in Local Differential PrivacyFull-text access may be available. Sign in or learn about subscription options.pp. 373-378
Access Control Scheme Supporting Attribute Revocation in Cloud ComputingFull-text access may be available. Sign in or learn about subscription options.pp. 379-384
The Nearest Neighbor Algorithm for Balanced and Connected k-Center Problem under Modular DistanceFull-text access may be available. Sign in or learn about subscription options.pp. 385-389
Implementation and Analysis of Hybrid DRAM PUFs on FPGAFull-text access may be available. Sign in or learn about subscription options.pp. 390-394
Graph Neural Networks for Privacy-Preserving Recommendation with Secure HardwareFull-text access may be available. Sign in or learn about subscription options.pp. 395-400
Exploration of Simulation Teaching Mode for Intelligent Information Network CourseFull-text access may be available. Sign in or learn about subscription options.pp. 401-407
Design of Binocular Stereo Vision System Via CNN-based Stereo Matching AlgorithmFull-text access may be available. Sign in or learn about subscription options.pp. 426-431
Heterogeneous Flow Scheduling using Deep Reinforcement Learning in Partially Observable NFV EnvironmentFull-text access may be available. Sign in or learn about subscription options.pp. 432-436
A Fine-tuning-based Adversarial Network for Member Privacy PreservingFull-text access may be available. Sign in or learn about subscription options.pp. 437-442
Signature Scheme Based on The SM2 Algorithm in FabricFull-text access may be available. Sign in or learn about subscription options.pp. 443-448
Novel Firewall Application for Mitigating Flooding Attacks on an SDN NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 449-455
UAV Deployment with Flexible Height Under SINR ConstraintFull-text access may be available. Sign in or learn about subscription options.pp. 456-460
Cold-start Recommendation Method Based on Homomorphic EncryptionFull-text access may be available. Sign in or learn about subscription options.pp. 461-465
Network Construction Using Overlapping Histogram under Local Differential PrivacyFull-text access may be available. Sign in or learn about subscription options.pp. 472-479
AttentionAE: Autoencoder for Anomaly Detection in Attributed NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 480-484
Construction of MDS Matrices Based on the Primitive Elements of the Finite FieldFull-text access may be available. Sign in or learn about subscription options.pp. 485-488
Privacy-Preserving and Efficient Range Counting in IoT NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 489-494
Deep Learning for GPS Spoofing Detection in Cellular-Enabled UAV SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 501-506
ConvCatb: An Attention-based CNN-CATBOOST Risk Prediction Model for Driving SafetyFull-text access may be available. Sign in or learn about subscription options.pp. 513-519
Author IndexFreely available from IEEE.pp. 533-536
Showing 98 out of 98