Accepted Papers
The following set of papers have been accepted for the LCN. See the Technical Program for detailed information about the papers and schedule.
Regular Papers
Combining Midpoint Optimization and Conventional End-To-End Segment Routing for Traffic Engineering Alexander Brundiers(Osnabrück University, Germany); Timmy Schüller (Deutsche Telekom Technik GmbH & Osnabrück University, Germany); Nils Aschenbruck (Osnabrück University, Germany) |
Adaptive Neuro-Fuzzy Inference System-Based Lightweight Intrusion Detection System for UAVs Alvi Ataur Khalil and Mohammad Ashiqur Rahman (Florida International University, USA) |
The ACK Policy Optimization Algorithm for QUI Ekaterina Volodina and Erwin P Rathgeb (University of Duisburg-Essen, Germany) |
HomeScout: Anti-Stalking Mobile App for Bluetooth Low Energy Devices Katharina O. E. Müller, Bruno Rodrigues, Chao Feng and Louis F. Bienz (University of Zurich, Switzerland); Burkhard Stiller (University of Zürich, Switzerland) |
SyNIG: Synthetic Network Traffic Generation Through Time Series Imaging Sivarooopan Nirhoshan (University of Moratuwa, Australia); Chamara Manoj Madarasingha Kattadige (University of New South Wales, Australia); Shashika Muramudalige (Colorado State University, USA); Guillaume Jourjon (Data61-CSIRO, Australia); Anura P Jayasumana (Colorado State University, USA); Kanchana Thilakarathna (The University of Sydney, Australia) |
Optimizing the Deployment of UAV for Mesh Access Network Coverage Fatih Senel and Nils Aschenbruck (Osnabrück University, Germany) |
Constrained Dynamic Virtual Network Embedding Junkai He (Telecom SudParis, France); Makhlouf Hadji (IRT SystemX, France); Djamal Zeghlache (Institut Mines-Telecom, Telecom SudParis, Samovar & Institut Polytechnique de Paris, France) |
Trade-Off Between Compression and FEC in Image Transmission over Wifibroadcast Nikolas Wintering, Jannis Mast, Thomas Hänel and Nils Aschenbruck (Osnabrück University, Germany) |
Towards Automatic Annotation and Detection of Fake News Mohammad Majid Akhtar, Ishan Karunanayake, Bibhas Sharma and Rahat Masood (University of New South Wales, Australia); Muhammad Ikram (Macquarie University, Australia); Salil S Kanhere (UNSW Sydney, Australia) |
Green Traffic Engineering by Line Card Minimization Daniel Otten (Osnabrück University, Germany); Max Ilsen (Osnabrueck University, Germany); Markus Chimani (University of Osnabrück, Germany); Nils Aschenbruck (Osnabrück University, Germany) |
Multipath TCP Scheduling in the Age of Buffer Bloat Optimizations Daniel Weber (Fraunhofer FKIE & Osnabrück University, Germany); Christoph Fuchs and Nils Auler (Fraunhofer FKIE, Germany); Bertram Schütz (Fraunhofer FKIE & Osnabrück University, Germany); Nils Aschenbruck (Osnabrück University, Germany) |
Autonomic Cybersecurity Enhanced with Survival Analysis (ACSeSA) Taylor Bradley (JHU, USA); Lanier Watkins (Johns Hopkins University Information Security Institute, USA); Elie Alhajjar (Engineering and Applied Sciences, RAND Corporation, USA) |
Effective Resource Allocation and Pricing Mechanism for MEC Under Two-Price Equilibrium Ying Li, Junwu Zhu and Xu Liu (Yangzhou University, China) |
QRadar: A Deployable Quantum Euclidean Similarity Large-Scale Localization System Ahmed Shokry and Moustafa Youssef (Alexandria University, Egypt) |
Coverage Analysis for Multi-Hop Communication in Intelligent-Surface-Assisted mmWave WLANs Jingyuan Zhang and Douglas Blough (Georgia Institute of Technology, USA) |
A Meta-Reinforcement Learning Framework for Threat Mitigation in Software-Defined Networks Hauton J Tsang, Mohammad Ali Salahuddin, Noura Limam and Raouf Boutaba (University of Waterloo, Canada) |
UAV Swarms for Joint Data Ferrying and Dynamic Cell Coverage via Optimal Transport Descent and Quadratic Assignment Kai Cui, Lars Baumgärtner, Mustafa Burak Yilmaz, Mengguang Li and Christian Fabian (Technische Universität Darmstadt, Germany); Benjamin Becker and Lin Xiang (Technical University of Darmstadt, Germany); Maximilian Bauer and Heinz Koeppl (Technische Universität Darmstadt, Germany) |
EGAN: Evolutional GAN for Ransomware Evasion Daniel Commey (Texas A&M University & Kwame Nkrumah University of Science and Technology, USA); Benjamin Appiah, Bill Kissi Frimpong and Isaac Osei (Ho Technical University, Ghana); Ebenezer N. A Hammond (Building and Road Research Institute, Ghana); Garth V Crosby (Texas A&M University, USA) |
Mobility-Aware Service Function Chaining Orchestration for Multi-User Augmented Reality Hugo Leonardo Melo dos Santos (Federal University of Pará, Brazil & University of Bern, Switzerland); Bruno Santos Martins (Universidade Federal do Pará, Brazil); Denis Lima Rosário (Federal University of Para, Brazil); Eduardo Cerqueira (Federal University of Para & UCLA & UFPA & UCLA, Brazil); Torsten Ingo Braun (University of Bern, Switzerland) |
Green Segment Routing for Improved Sustainability of Backbone Networks Daniel Otten and Alexander Brundiers (Osnabrück University, Germany); Timmy Schüller (Deutsche Telekom Technik GmbH & Osnabrück University, Germany); Nils Aschenbruck (Osnabrück University, Germany) |
Field Trial for Enhanced V2X Multi-RAT Handover in Autonomous Vehicle Networks Lucas J Bréhon--Grataloup (Université Toulouse III Paul Sabatier & IRIT, France); Rahim Kacimi (IRIT/UPS, University of Toulouse, France); André-Luc Beylot (University of Toulouse, France) |
Sustainable Cooperation in Peer-To-Peer Networks Bulat Nasrulin, Rowdy M Chotkan and Johan Pouwelse (Delft University of Technology, The Netherlands) |
Towards Energy Efficiency in RAN Network Slicing Hnin Pann Phyu (ETS, Canada); Diala Naboulsi (École de Technologie Supérieure, Canada); Razvan Stanica (INSA Lyon, France); Gwenael Poitau (Dell Technologies, Canada) |
A Heuristic Approach for Scalable Quantum Repeater Deployment Modeling Engin Arslan (University of Texas Arlington, USA); Tasdiqul Islam (University of Nevada Reno, USA) |
FedForce: Network-Adaptive Federated Learning for Reinforced Mobility Prediction Negar Emami (Universität Bern, Switzerland); Antonio Di Maio and Torsten Ingo Braun (University of Bern, Switzerland) |
Retrofitting Integrity Protection into Unused Header Fields of Legacy Industrial Protocols Eric Wagner and Nils Rothaug (RWTH Aachen University, Germany); Konrad Wolsing (Fraunhofer FKIE & RWTH Aachen University, Germany); Lennart Bader (Fraunhofer FKIE, Germany); Klaus Wehrle (RWTH Aachen University, Germany); Martin Henze (RWTH Aachen University & Fraunhofer FKIE, Germany) |
An Accuracy Study of Emulation Daemons for IEEE802.11 Networks Jonas Alois Martin Andre (Technical University of Munich, Germany); Stephan M. Günther (Technische Universität München & Chair for Network Architectures and Services, Germany); Georg Carle (Technical University of Munich, Germany) |
Joint Source-And-Channel Coding for Small Satellite Applications Olga Kondrateva (Humboldt-Universität zu Berlin, Germany); Stefan Dietzel (Merantix Momentum GmbH, Germany); Björn Scheuermann (TU Darmstadt, Germany) |
Short Papers
RPM: Reverse Path Congestion Marking on P4 Programmable Switches Nehal Baganal-Krishna and Tuan-Dat Tran (University of Duisburg-Essen, Germany); Ralf Kundel (Technical University of Darmstadt, Germany); Amr Rizk (University of Duisburg-Essen, Germany) |
Transparent Autoencoding of Network Packets with Self-Attention-Based Transformers André Kummerow, Esrom Abrha and Steffen Nicolai (Advanced System Technology (AST) Branch of Fraunhofer IOSB, Germany); Peter Bretschneider (Fraunhofer IOSB & Institutsteil Angewandte Systemtechnik AST, Germany) |
Detecting DoH-Based Data Exfiltration: FluBot Malware Case Study Roman Rader, Kamil Jeřábek and Ondrej Rysavy (Brno University of Technology, Czech Republic) |
Leveraging Explainable AI Methods Towards Identifying Classification Issues on IDS Datasets Eric Lanfer (Osnabrück University, Germany); Sophia Sylvester (Osnabrueck University, Germany); Nils Aschenbruck (Osnabrück University, Germany); Martin Atzmüller (Osnabrück University and DFKI German Research Center for AI, Germany) |
Energy-Efficient Broadcast Trees for Decentralized Data Dissemination in Wireless Networks Artur Sterz (Philipps-Universität Marburg, Germany); Robin Klose (Technische Universität Darmstadt & Secure Mobile Networking Lab, Germany); Markus Sommer (Philipps-Universität Marburg, Germany); Jonas Höchst (University of Marburg, Germany & Technical University of Darmstadt, Germany); Jakob Link (Technische Universität Darmstadt, Germany); Bernd Simon and Anja Klein (TU Darmstadt, Germany); Matthias Hollick (Technische Universität Darmstadt & Secure Mobile Networking Lab, Germany); Bernd Freisleben (Philipps-Universität Marburg, Germany) |
Secure Plaintext Acquisition of Homomorphically Encrypted Results for Remote Processing Pia Baumstark, David Monschein and Oliver P. Waldhorst (Karlsruhe University of Applied Sciences, Germany) |
msTEACUP - Running Repeatable Experiments with TCP, UDP and MPTCP over Complex Network Topologies Farinaz Jowkarishasaltaneh (Swinburne University of Technology, Australia); Jason But (Swinburne University, Australia) |
Antifreeze: High-Quality Adaptive Live Streaming with Real-Time Transcoder Asif Mehmuda, Mea Wang, Reza Hedayati Majdabadi and Diwakar Krishnamurthy (University of Calgary, Canada) |
On the Limits of Lossy Compression for Human Activity Recognition in Sensor Networks Jonas Schulz and Hristina Radak (TU Dresden, Germany); Phuong Nguyen (University of L'Aquila, Italy); Giang T. Nguyen (Technische Universität Dresden, Germany); Frank H.P. Fitzek (Technische Universität Dresden & ComNets - Communication Networks Group, Germany) |
Cellular Network Offloading Through Drone Cooperation Gatien Roujanski (Telecom SudParis, France); Adel Mounir Said (National Telecommunication Institute (NTI), Egypt); Michel Marot (Institut TELECOM Telecom SudParis, France); Hossam Afifi (Télécom SudParis, Institut Telecom,, France) |
Priority-Based Scheduling for Continuous and Consistent Network Updates in SDN Mehdi Nobakht (University of New South Wales, Australia); Arshiya Rezaie Hezaveh (Sharif University of Technology, Iran) |
Humidity Estimation Using WiFi Channel State Information Michael J Burke IV (University of Maryland Baltimore County & Army Research Lab, USA); Mohamed Younis (University of Maryland Baltimore County, USA) |
Diversity Maximized Scheduling in RoadSide Units for Traffic Monitoring Applications Ahmad Sarlak, Abolfazl Razi and Xiwen Chen (Clemson University, USA); Rahul Amin (MIT Lincoln Laboratories, USA) |
Mobility-Aware Digital Twin Replica Placements in Edge Computing Yuncan Zhang (City University of Hong Kong, China); Weifa Liang (City University of Hong Kong, Hong Kong); Zichuan Xu (Dalian University of Technology, China); Xiaohua Jia (City University of Hong Kong, Hong Kong) |
Measurement Based Evaluation and Mitigation of Flood Attacks on a LAN Test-Bed Mohammed Nasereddin and Mert Nakip (Institute of Theoretical and Applied Informatics, Polish Academy of Sciences, Poland); Erol Gelenbe (Institute of Theoretical and Applied Informatics, Polish Academy of Sciences, Poland & University of Cote d'Azur, France) |
QUIC(k) Enough in the Long Run? Sustained Throughput Performance of QUIC Implementations Michael Günther König (Karlsruhe Institute of Technology, Germany); Oliver P. Waldhorst (Karlsruhe University of Applied Sciences, Germany); Martina Zitterbart (KIT, Germany) |
Optimal Resource Placement in 5G/6G MEC for Connected Autonomous Vehicles Routes Powered by Deep Reinforcement Learning Carlos Ruiz de Mendoza and Cristina Cervelló-Pastor (Universitat Politècnica de Catalunya, Spain); Sebastia Sallent Ribes (Universitat Politecnica de Catalunya, Spain) |
SEARCH: Robust TCP Slow-Start Performance on High BDP Networks Maryam Ataei Kachooei (Worcester Polytechnic Institute, USA); Feng Li and Jae Chung (Viasat, USA); Mark Claypool (Worcester Polytechnic Institute, USA); Benjamin Peters (Viasat, USA) |
A Steganographic Method for Color Images Using the Salp Swarm Algorithm and Chaotic Maps Aya Jaradat, Moad Y Mowafi and Eyad Taqieddin (Jordan University of Science and Technology, Jordan) |
Innovative Parking Management System for Medical Cities Based on Novel Grouping Routine Mahdi Jemmali (Majmaah University & College of Science, Saudi Arabia); Loai Bani Melhim (Majmaah University, Saudi Arabia); Hajer Amdouni (Tunis University, Tunisia); Hani Alquhayz (Majmaah University, Saudi Arabia); Talel Ladhari (Unité de Recherche ROI, Ecole Polytechnique de Tunisie, Tunisia); Alanezi Shadaid (University of Hafr Al Batin, Saudi Arabia) |
Improving Bitswap Privacy with Forwarding and Source Obfuscation Erik Daniel, Marcel Ebert and Florian Tschorsch (Technische Universität Berlin, Germany) |
Trusted Sharing of Data Under Cloud-Edge-End Collaboration and Its Formal Verification Xuejian Li and Mingguang Wang (Anhui University, China) |
The Virtual Test Bed for EON FPGA Controllers Based on UVM Mechanisms and Tools Marek Michalski (Poznan University of Technology, Poland & Institute of Communications and Computer Networks, Poland) |
Characterizing Changes in Self-Similarity Between Edge and Core Network Traffic Bryan Martin and Chad A Bollmann (Naval Postgraduate School, USA) |
Outsourcing Privacy-Preserving Federated Learning on Malicious Networks Through MPC Richard Hernandez and Oscar G. Bautista (Florida International University, USA); Mohammad Hossein Manshaei (University of Arizona, USA); Abdulhadi Sahin and Kemal Akkaya (Florida International University, USA) |
HoLMES: A Comprehensive EMS to Unleash the Power of Holistic NFV Management Vinícius Fülber Garcia and José Flauzino (Federal University of Paraná, Brazil); Carlos Raniery Paula Dos Santos (Federal University of Santa Maria, Brazil); Elias P. Duarte, Jr. (Federal University of Parana (UFPR), Brazil) |
AEWF: Autoencoder-Based Website Fingerprinting in Data-Limited Scenarios Jianjun Lin (University of Chinese Academy of Sciences, China) |
FORS: Fault-Adaptive Optimized Routing and Scheduling for Data Acquisition Networks Eloise Noelle Stein (University of Strasbourg & CERN, France); Cristel Pelsser and Quentin Bramas (University of Strasbourg, France); Tommaso Colombo (CERN, France) |
Beyond the Field of View: Neglected Audio Part in VR Video Transmission Framework Luyao Chen and Yong Tang (University of Electronic Science and Technology of China, China); Siyang Chen (University of Electronic Science and Technology of China, Singapore); Jingwen Xia, Ting Yang and WenYong Wang (University of Electronic Science and Technology of China, China) |
Quicksolver: A Lightweight Malicious Domains Detection System Based on Adaptive Autoencoder Ke Wang, Wei Wan, Jinxia Wei, Liangyi Gong, Pan Huang, Hao Fu and Yuhao Fu (Computer Network Information Center, Chinese Academy of Sciences, China) |
IVAS: An Intelligent Video Analysis System Based on Edge Computing Huapeng Yang, Zhangqin Huang, Yu Liang, Xiaobo Zhang, Ling Huang and Shen Qiu (Beijing University of Technology, China) |
Investigate and Improve the Certificate Revocation in Web PKI Chengyuan Zhang and Changqing An (Tsinghua University, China); Tao Yu (Tsinghua University & Netwwok, China); Zhiyan Zheng and Jilong Wang (Tsinghua University, China) |
Cyberbullying Messages Detection: A Comparative Study of Machine Learning Algorithms Philippe Ea and Paul Vidart (Université Paris Cité, France); Osman Salem (University of Paris Cité, France); Ahmed Mehaoua (University of Paris City, France) |
Unified Multi-Step Preload Strategy for Short Video Wanchun Jiang, Zhicheng Ren and Yongxin Shan (Central South University, China); Danfeng Shan (Xi'an Jiaotong University, China); Jianxin Wang (Central South University, China) |
MERLINS -- Moving Target Defense Enhanced with Deep-RL for Network Slice Security Wissem Soussi (Zurich University of Applied Sciences (ZHAW) & University of Zürich (UZH), Switzerland); Maria Christopoulou (NCSR Demokritos, Greece); Gürkan Gür (Zurich University of Applied Sciences (ZHAW), Switzerland); Burkhard Stiller (University of Zürich, Switzerland) |
Decision Tree-Based Confidentiality Self-Management in the Internet of Things Abdelhamid Garah, Nader Mbarek and Sergey Kirgizov (LIB, University of Burgundy, France) |
Tree-IDS: An Incremental Intrusion Detection System for Connected Vehicles Yuxin Zhao, Zixiang Bi, Guosheng Xu and Chenyu Wang (Beijing University of Posts and Telecommunications, China); Guoai Xu (Harbin Institute of Technology, Shenzhen, China) |
Enhancing Encrypted Traffic Classification with Deep Adaptation Networks Cuong Dao (Hanoi University of Civil Engineering, Vietnam); Van Tong (Hanoi University of Science and Technology, Vietnam); Thang Nam Hoang (Hanoi University of Civil Engineering & SoICT, Hanoi University of Science and Technology, Vietnam); Hai Anh Tran (Hanoi University of Science and Technology, Vietnam); Truong Tran (Penn State University, USA) |
BotGSL: Twitter Bot Detection with Graph Structure Learning Chuancheng Wei (Sichuan University, China) |
Early Detection of DDoS Attacks in Networks Leveraging Data Plane Programming Smriti Smriti, Lingesh Kumaar, K Haribabu and Rahul Kumar (BITS Pilani, India) |
Affective Communication of Sensorimotor Emotional Synthesis over URLLC Ibrahim M. Amer (Queen's University, Canada); Sharief Oteafy (DePaul University, USA); Hossam S. Hassanein (Queen's University, Canada) |
Doctoral Track Papers
From C-Band to mmWave-Band: Ray-Tracing-Assisted 5G-Based Indoor Positioning in Industrial Scenario Karthik Muthineni (Universitat Politècnica de Catalunya & Robert Bosch GmbH, Germany); Alexander Artemenko (Robert Bosch GmbH, Germany) |
DarkHorse: A UDP-Based Framework to Improve the Latency of Tor Onion Services Md Washik Al Azad (University of Notre Dame, USA); Hasniuj Zahan (University of Nebraska at Omaha, USA); Sifat Ut Taki and Spyridon Mastorakis (University of Notre Dame, USA) |
AoI-Optimal Cellular-Connected UAV Trajectory Planning for IoT Data Collection Amirahmad Chapnevis and Eyuphan Bulut (Virginia Commonwealth University, USA) |
Non-Optimal is Good! Resource Allocation in Presence of Dynamic Obstacles in D2D Networks Rathindra Nath Dutta and Sasthi C. Ghosh (Indian Statistical Institute, India) |
Energy Efficient Resource Allocation for D2D Communications Using Reinforcement Learning Rathindra Nath Dutta and Sasthi C. Ghosh (Indian Statistical Institute, India) |