


default search action
24th MobiHoc 2023: Washington, DC, USA
- Jie Wu, Suresh Subramaniam, Bo Ji, Carla-Fabiana Chiasserini:
Proceedings of the Twenty-fourth International Symposium on Theory, Algorithmic Foundations, and Protocol Design for Mobile Networks and Mobile Computing, MobiHoc 2023, Washington, DC, USA, October 23-26, 2023. ACM 2023, ISBN 978-1-4503-9926-5
Federated Learning
- Yuezhou Liu
, Lili Su
, Carlee Joe-Wong
, Stratis Ioannidis
, Edmund Yeh
, Marie Siew
:
Cache-Enabled Federated Learning Systems. 1-11 - Ningning Ding
, Zhenyu Sun
, Ermin Wei
, Randall Berry
:
Incentive Mechanism Design for Federated Learning and Unlearning. 11-20 - Dongsheng Li
, Xiaowen Gong
:
Anarchic Federated learning with Delayed Gradient Averaging. 21-30 - Rohit Parasnis
, Seyyedali Hosseinalipour
, Yun-Wei Chu
, Mung Chiang
, Christopher G. Brinton
:
Connectivity-Aware Semi-Decentralized Federated Learning over Time-Varying D2D Networks. 31-40
Wireless Systems and Experimentation
- Yiwen Song
, Changhan Ge
, Lili Qiu
, Yin Zhang
:
2ACE: Spectral Profile-driven Multi-resolutional Compressive Sensing for mmWave Channel Estimation. 41-50 - Sergi Alcalá-Marín
, Antonio Bazco Nogueras
, Albert Banchs
, Marco Fiore
:
kaNSaaS: Combining Deep Learning and Optimization for Practical Overbooking of Network Slices. 51-60 - Yu-Tai Lin
, Karthikeyan Sundaresan
:
A New Paradigm of Communication-Aware Collaborative Positioning for FutureG Wireless Systems. 61-70 - Guillem Reus Muns
, Kubra Alemdar
, Sara Garcia Sanchez
, Debashri Roy
, Kaushik R. Chowdhury
:
AirFC: Designing Fully Connected Layers for Neural Networks with Wireless Signals. 71-80
Overcoming Delays and Age of Information
- Songhua Li
, Lingjie Duan
:
Age of Information Diffusion on Social Networks: Optimizing Multi-Stage Seeding Strategies. 81-90 - Tasmeen Zaman Ornee
, Yin Sun
:
A Whittle Index Policy for the Remote Estimation of Multiple Continuous Gauss-Markov Processes over Parallel Channels. 91-100 - Guidan Yao
, Chih-Chun Wang
, Ness B. Shroff
:
Age Minimization with Energy and Distortion Constraints. 101-110 - Sima Mehri
, Florin Ciucu
:
On a Continuous-Time Martingale and Two Applications. 111-120
Network Resource Allocation
- Sanidhay Bhambay
, Arpan Mukhopadhyay
, Thirupathaiah Vasantam
:
The Power of Two Choices with Load Comparison Errors. 121-130 - Kaiyi Ji
, Lei Ying
:
Network Utility Maximization with Unknown Utility Functions: A Distributed, Data-Driven Bilevel Optimization Approach. 131-140 - Panagiotis Promponas
, Tingjun Chen
, Leandros Tassiulas
:
Optimizing Sectorized Wireless Networks: Model, Analysis, and Algorithm. 141-150 - Yudi Huang
, Ting He
:
Overlay Routing Over an Uncooperative Underlay. 151-160 - Jingdi Chen
, Tian Lan
, Nakjung Choi
:
Distributional-Utility Actor-Critic for Network Slice Performance Guarantee. 161-170
Online Learning and Optimization
- Jiandong Liu
, Lan Zhang
, Xiaojing Yu
, Xiang-Yang Li
:
Differentially Private Distributed Online Convex Optimization Towards Low Regret and Communication Cost. 171-180 - Quang Minh Nguyen
, Eytan H. Modiano
:
Learning to Schedule in Non-Stationary Wireless Networks With Unknown Statistics. 181-190
Learning on the Edge
- Zhuqing Liu
, Xin Zhang
, Songtao Lu
, Jia Liu
:
PRECISION: Decentralized Constrained Min-Max Learning with Low Communication and Sample Complexities. 191-200 - Jing Qiao
, Shikun Shen
, Shuzhen Chen
, Xiao Zhang
, Tian Lan
, Xiuzhen Cheng
, Dongxiao Yu
:
Communication Resources Limited Decentralized Learning with Privacy Guarantee through Over-the-Air Computation. 201-210 - Hansong Zhou
, Shaoying Wang
, Chutian Jiang
, Xiaonan Zhang
, Linke Guo
, Yukun Yuan
:
Waste Not, Want Not: Service Migration-Assisted Federated Intelligence for Multi-Modality Mobile Edge Computing. 211-220 - Kun Woo Cho
, Marco Cominelli
, Francesco Gringoli
, Joerg Widmer
, Kyle Jamieson
:
Scalable Multi-Modal Learning for Cross-Link Channel Prediction in Massive IoT Networks. 221-229
Security and Sensing
- Huanqi Yang
, Mingda Han
, Shuyao Shi
, Zhenyu Yan
, Guoliang Xing
, Jianping Wang
, Weitao Xu
:
Wave-for-Safe: Multisensor-based Mutual Authentication for Unmanned Delivery Vehicle Services. 230-239 - Xin Li
, Yilin Yang
, Zhengkun Ye
, Yan Wang
, Yingying Chen
:
EarCase: Sound Source Localization Leveraging Mini Acoustic Structure Equipped Phone Cases for Hearing-challenged People. 240-249 - Jun Zhao
, Xinyu Zhou
, Yang Li
, Liangxin Qian
:
Optimizing Utility-Energy Efficiency for the Metaverse over Wireless Networks under Physical Layer Security. 250-259
Internet of Things
- Zhihui Gao
, Yiran Chen
, Tingjun Chen
:
Swirls: Sniffing Wi-Fi Using Radios with Low Sampling Rates. 260-269 - Jialuo Du
, Yidong Ren
, Zhui Zhu
, Chenning Li
, Zhichao Cao
, Qiang Ma
, Yunhao Liu
:
SRLoRa: Neural-enhanced LoRa Weak Signal Decoding with Multi-gateway Super Resolution. 270-279 - Hossein Pirayesh
, Shichen Zhang
, Huacheng Zeng
:
mReader: Concurrent UHF RFID Tag Reading. 280-289 - Muhammad Sarmad Mir
, Minhao Cui
, Borja Genovés Guzmán
, Qing Wang
, Jie Xiong
, Domenico Giustiniano
:
LeakageScatter: Backscattering LiFi-leaked RF Signals. 290-299
POSTER SESSION: Posters Session
- Ruide Cao
, Jiao Ye
, Qian You
, Jianghan Xu
, Yi Wang
, Shiyu Jiang
, Yaomin Li
:
Poster: A Novel Region-of-Interest Based UAV Planning Strategy for Mitigating Urban Peak Demand. 300-301 - Shyam Krishnan Venkateswaran
, Ching-Lun Tai
, Raghupathy Sivakumar
:
Poster: Accordion: Toward a Limited Contention Protocol for Wi-Fi 6 Scheduling. 302-303 - Tzuo Hann Law
, Selman Erol
, Lewis Tseng
:
Poster: Timestamp Verifiability in Proof-of-Work. 304-305 - Cong Shi
, Tianfang Zhang
, Zhaoyi Xu
, Shuping Li
, Donglin Gao
, Changming Li
, Athina P. Petropulu
, Chung-Tse Michael Wu
, Yingying Chen
:
Poster: Extracting Speech from Subtle Room Object Vibrations Using Remote mmWave Sensing. 306-307 - Tianfang Zhang
, Zhengkun Ye
, Ahmed Tanvir Mahdad
, Md Mojibur Rahman Redoy Akanda
, Cong Shi
, Nitesh Saxena
, Yan Wang
, Yingying Chen
:
Poster: Unobtrusively Mining Vital Sign and Embedded Sensitive Info via AR/VR Motion Sensors. 308-309
Demos Session
- Xiaoyi Wu
, Jiangong Chen
, Rui Tang
, Kefan Wu
, Bin Li
:
Demo: Immersive Remote Monitoring and Control for Internet of Things. 310-311 - Qinpei Luo
, Ziang Yang
, Boya Di
, Chenren Xu
:
Demo: Meta2Locate: Meta Surface Enabled Indoor Localization in Dynamic Environments. 312-313 - Xiangyu Ju
, Biao Han
, Yitang Chen
, Jinrong Li
:
Demo: A Prototype for Detecting and Localizing Hidden Devices in Unfamiliar Environments. 314-315
WORKSHOP SESSION: 6G-PDN Workshop
- Pietro G. Giardina
, Péter Szilágyi
, Carla-Fabiana Chiasserini
, Jose Luis Carcel
, Luis Velasco
, Salvatore Spadaro
, Fernando Agraz
, Sebastian Robitzsch
, Rafael Rosales
, Valerio Frascolla
, Roya Doostnejad
, Alejandro Calvillo-Fernandez
, Giacomo Bernini
:
A hierarchical AI-based control plane solution for multi-technology deterministic networks. 316-321 - Minh-Thuyen Thi
, Siwar Ben Hadj Said
, Adrien Roberty
, Fadlallah Chbib, Rida Khatoun, Leonardo Linguaglossa
:
Enabling Programmable Deterministic Communications in 6G. 322-327 - Carlos J. Bernardos
, Alain Mourad
, Milan Groshev
, Luis M. Contreras
, Marc Mollà Roselló
, Otilia Bularca
, Valerio Frascolla
, Péter Szilágyi
, Sebastian Robitzsch
:
Using RAW as Control Plane for Wireless Deterministic Networks: Challenges Ahead. 328-333 - Csaba Györgyi
, Károly Kecskeméti
, Péter Vörös
, Sándor Laki
, Géza Szabó
:
In-Network Quality Control of IP Camera Streams. 334-339 - Gergely Pongrácz
, Attila Mihály
, István Gódor
, Sándor Laki
, Anastassios Nanos
, Chrysa Papagianni
:
Towards extreme network KPIs with programmability in 6G. 340-345 - Károly Kecskeméti
, Csaba Györgyi
, Péter Vörös
, Sándor Laki
:
In-Network Security Applications with P4RROT. 346-351 - Carlos Barroso-Fernández
, Jorge Martín-Pérez
, Constantine Ayimba
, Antonio de la Oliva
:
Aligning rTWT with 802.1Qbv: a Network Calculus Approach. 352-354 - Domenico Uomo
, Andrea Sgambelluri
, Piero Castoldi
, Emiliano De Paoli
, Francesco Paolucci
, Filippo Cugini
:
Failure Prediction in Software Defined Flying Ad-hoc Network. 355-357
WORKSHOP SESSION: AIoT Workshop
- Benjamín Arratia
, Javier Prades
, Salvador Peña-Haro
, José Maria Cecilia
, Pietro Manzoni
:
BODOQUE: An Energy-Efficient Flow Monitoring System for Ephemeral Streams. 358-363 - Eric Samikwa
, Jakob Schärer
, Torsten Braun
, Antonio Di Maio
:
Machine Learning-based Energy Optimisation in Smart City Internet of Things. 364-369 - Yuba Raj Siwakoti
, Danda B. Rawat
:
Detect-IoT: A Comparative Analysis of Machine Learning Algorithms for Detecting Compromised IoT Devices. 370-375 - Antonio Di Maio
, Mina Aghaei Dinani
, Gianluca Rizzo
:
The Upsides of Turbulence: Baselining Gossip Learning in Dynamic Settings. 376-381 - Zelin Wan
, Jin-Hee Cho
, Mu Zhu
, Ahmed H. Anwar
, Charles A. Kamhoua
, Munindar P. Singh
:
Deception in Drone Surveillance Missions: Strategic vs. Learning Approaches. 382-387 - Hideya Ochiai
, Riku Nishihata
, Eisuke Tomiyama
, Yuwei Sun
, Hiroshi Esaki
:
Detection of Global Anomalies on Distributed IoT Edges with Device-to-Device Communication. 388-393
WORKSHOP SESSION: IoST-5GB Workshop
- Giorgia Maria Cappello
, Gabriella Colajanni
, Patrizia Daniele
, Laura Galluccio
, Christian Grasso
, Giovanni Schembra
, Laura Scrimali
:
ODEL: an On-Demand Edge-Learning framework exploiting Flying Ad-hoc NETworks (FANETs). 394-399 - Pushpita Chatterjee
, Debashis Das
, Sourav Banerjee
, Uttam Ghosh
, Armando B. Mpembele
, Tamara Rogers
:
An Approach Towards the Security Management for Sensitive Medical Data in the IoMT Ecosystem. 400-405 - Sidheswar Routray
, Amrit Suman
, Preetam Suman
, Sasmita Padhy
, Pushpita Chatterjee
, Sachin Shetty
:
Vehicular Safety Revolution: A Cutting-Edge Communication Paradigm for Accident Prevention. 406-411
WORKSHOP SESSION: REUNS Workshop
- Ashkan Arabi
, Michael Straus
, Zijie Tang
, Zhengkun Ye
, Yan Wang
:
Phone-based CSI Hand Gesture Recognition with Lightweight Image-Classification Model. 412-417 - Dennis Yeom
, Nadia Niknami
, Jie Wu
:
Evaluating Performance of Intrusion Detection Systems under Different Configurations in SDN. 418-423 - Maya McDonough
, Thomas Moomaw
, Md Touhiduzzaman
, Eyuphan Bulut
:
Wi-Alert: WiFi Sensing for Real-time Package Theft Alerts at Residential Doorsteps. 424-429 - Sean Folan
, Yunsheng Wang
:
Cybersecurity Simulator for Connected and Autonomous Vehicles. 430-435 - Minh Le Kim Tran
, William King
, Harvey P. Siy
:
Exploring the Potential of Frama-C in IoT Static Analysis. 436-441 - Jesus Rodriguez
, Jong-Hoon Youn
:
PACE: Providing Authentication through Computational Gait Evaluation with Deep learning. 442-446 - Brandon Dominic Vilela
, Kshitij Kokkera
, Amirahmad Chapnevis
, Eyuphan Bulut
:
UAV Control Using Eye Gestures: Exploring the Skies Through Your Eyes. 447-452 - Golan Khen
, Detim Zhao
, José Baca
:
Intuitive Human-Swarm Interaction with Gesture Recognition and Machine Learning. 453-456 - Jack Farley
, Amirahmad Chapnevis
, Eyuphan Bulut
:
Generalized Path Planning for Collaborative UAVs using Reinforcement and Imitation Learning. 457-462 - Holly Hunter
, Jamie Payton
, Christine Julien
:
Expanding Elementary School Computer Science Education with an Introduction to Machine Learning Through Rhythmic Studies. 463-467 - Edwin Antonio Sanchez
, Anthony Weyer
, Joseph Palackal
, Kai Wang
, Tyler Phillips
, Xukai Zou
:
Advancing Active Authentication for User Privacy and Revocability with BioCapsules. 468-473 - Sean Chen
, Jaelyn McCracken
, Kevin Lu
, Tao Wang
, Tao Hou
:
Taking a Look into the Cookie Jar: A Comprehensive Study towards the Security of Web Cookies. 474-479 - Paul Jiang
, Ellie Fassman
, Amit Singha
, Yimin Chen
, Tao Li
:
Evaluating the Impact of Noisy Point Clouds on Wireless Gesture Recognition Systems. 480-485 - Henry Michaelson
, Nolan Pettit
, Vaishnavi Annabhemoju
, Shuai Nie
, Justin M. Bradley
:
Link Budgeting and Interference Management for UAV Networks in 5G and Beyond. 486-491 - Joseph Brewington
, Dulal Kar
:
UAV GPS Spoofing Detection via Neural Generative One-Class Classification. 492-497 - Seth Johnson
, Ray Donner
, Alfredo J. Perez
:
Comparing Classifiers: A Look at Machine-Learning and the Detection of Mobile Malware in COVID-19 Android Mobile Applications. 498-503 - Michael Evans
, Dominik Soós
, Ethan Landers
, Jian Wu
:
MSVEC: A Multidomain Testing Dataset for Scientific Claim Verification. 504-509 - Anushka Desai
, Oscar G. Bautista
, Kemal Akkaya
:
Privacy-Preserving Collision Detection for Drone-based Aerial Package Delivery using Secure Multi-Party Computation. 510-515 - Joshua Schoenbachler
, Vinay Krishnan
, Garvit Agarwal
, Feng Li
:
Sorting Ransomware from Malware Utilizing Machine Learning Methods with Dynamic Analysis. 516-521 - Abdullah Kamal
, Jeremy Vidaurri
, Carlos E. Rubio-Medrano
:
No-Fly-Zone: Regulating Drone Fly-Overs Via Government and User-Controlled Authorization Zones. 522-527 - Jieying Chen
, Abdalaziz Sawwan
, Shuhui Yang
, Jie Wu
:
Wireless Channel Prediction in Different Locations Using Transfer Learning. 528-533 - David Chen
, Kehan Wang
, Agnideven Palanisamy Sundar
, Feng Li
:
TrustNetFL: Enhancing Federated Learning with Trusted Client Aggregation for Improved Security. 534-539 - Anne Marie Perrotti
, Isabelle Puwo
, Sampath Jayarathna
:
Exploring TikTok as an Educational Tool for Speech-Language Pathologists, Special Education, and General Education. 540-544 - Eleanor Lin
, James Hale
, Jonathan Gratch
:
Toward a Better Understanding of the Emotional Dynamics of Negotiation with Large Language Models. 545-550 - Matthew Ybarra
, Mahmoud Eldefrawy
, Scott A. King
:
UGVs in Agriculture: Steering control system to navigate through fields via waypoints. 551-555 - Julian Abhari
, Ashwin Ashok
:
Mitigating Racial Biases for Machine Learning Based Skin Cancer Detection. 556-561 - Gianna Voce
, Marbella Castillo
, Henry Griffith
, Heena Rathore
:
Poster: Opinion Dynamics for Enhancing Trust and Security in Connected Vehicle Networks. 562-564 - Aidan Kwok
, Richard Owoputi
, Sandip Ray
:
Poster: Scenario Creation for Immersive Automotive Security Exploration. 565-567 - Alec Kyritsis
, Scott Wynn
, Stephora Cesar Alberi
, Enyue Lu
:
Poster: Dynamic and NM1-Right Selection for the Parallel Iterative Improvement Stable Matching Algorithm. 568-570 - Patrick M. Mendoza
, Tashfique Hasnine Choudhury
, Sandip Ray
:
Poster: Vehicle-to-Infrastructure Security for Reduced Speed Work Zone. 571-573 - Marbella Castillo
, Gianna Voce
, Henry Griffith
, Heena Rathore
:
Poster: Decentralized Simulation Workflow for Enhancing Connected Vehicle Security. 574-576 - Daniel Gallegos
, Elaine Raymond
, Lu Wang
:
Poster: Binge drinking risk factors ranking using multi-task learning. 577-579 - Johnovon Richards
, Saumya Dabhi
, Faryaneh Poursardar
, Sampath Jayarathna
:
Poster: Leveraging Data Analysis and Machine Learning to Authenticate Yelp Reviews through User Metadata Patterns. 580-582 - Nathan Chen
, Genevieve Bartlett
:
Poster: Emotional Language in News: Detection and Intervention. 583-585 - Arturo Gonzalez
, Amani Davidson
, Carlos E. Rubio-Medrano
:
Poster: No Fly-Zone: Drone Policies for Ensuring Safe Operations in Restricted Areas. 586-588 - Jack Carter
, Bhagawat Baanav Yedla Ravi
, Md Rafiul Kabir
, Sandip Ray
:
Poster: Efficient Exploration of Automotive Ranging Sensor Attacks. 589-591 - Allen Tian
, Eddy Guerra John
, Kecheng Yang
:
Poster: Unraveling Reward Functions for Head-to-Head Autonomous Racing in AWS DeepRacer. 592-594 - Oriana Matney
, Parker Wilmoth
, Solomon Markowitz
, Connor Rieth
, Batsheva Gil
, Jared Hermans
, George Sklivanitis
, Dimitris A. Pados
:
Poster: Simulation and Experimental Evaluation of Wireless Remote Controlled Underwater Vehicles. 595-597

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.