2018 IEEE International Conference on Communications (ICC)

20-24 May 2018

Filter Results

Displaying Results 1 - 25 of 975
  • [Title page]

    Publication Year: 2018, Page(s): i
    Request permission for reuse | PDF file iconPDF (135 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2018, Page(s): i
    Request permission for reuse | PDF file iconPDF (217 KB)
    Freely Available from IEEE
  • Welcome Message General Chairs

    Publication Year: 2018, Page(s):i - ii
    Request permission for reuse | PDF file iconPDF (140 KB)
    Freely Available from IEEE
  • Welcome Message TPC Chairs

    Publication Year: 2018, Page(s):i - ii
    Request permission for reuse | PDF file iconPDF (135 KB)
    Freely Available from IEEE
  • Organizing Committee

    Publication Year: 2018, Page(s):i - ii
    Request permission for reuse | PDF file iconPDF (128 KB)
    Freely Available from IEEE
  • Technical Program Committee

    Publication Year: 2018, Page(s):i - xlv
    Request permission for reuse | PDF file iconPDF (465 KB)
    Freely Available from IEEE
  • Symposium Chairs

    Publication Year: 2018, Page(s):i - iv
    Request permission for reuse | PDF file iconPDF (169 KB)
    Freely Available from IEEE
  • Reviewers

    Publication Year: 2018, Page(s): i
    Request permission for reuse | PDF file iconPDF (158 KB)
    Freely Available from IEEE
  • Keynotes

    Publication Year: 2018, Page(s):i - viii
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (429 KB)

    Provides an abstract for each of the keynote presentations and may include a brief professional biography of each presenter. The complete presentations were not made available for publication as part of the conference proceedings. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Patrons

    Publication Year: 2018, Page(s):i - iii
    Request permission for reuse | PDF file iconPDF (397 KB)
    Freely Available from IEEE
  • CISS.01 - Network Security 
  • Enhanced Session Table Architecture for Stateful Firewalls

    Publication Year: 2018, Page(s):1 - 7
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (1295 KB) | HTML iconHTML

    Stateful firewall keeps track of the state of network connections. The performance of stateful firewall determines by both the performance of its session table and the mechanism used for packet filtering. This paper presents a stateful session table architecture then integrates it with Splay tree firewall. Splay tree firewall organizes policy rules in a designated prefix length splay tree data str... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Prompt Lightweight VPN Session Resumption for Rapid Client Mobility and MTD Enablement for VPN Servers

    Publication Year: 2018, Page(s):1 - 6
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (188 KB) | HTML iconHTML

    TLS-based VPN are increasingly used to establish a secure communication channel between VPN clients and server. However, they are not designed to handle the mobility VPN clients in efficient manner. OpenVPN, a widely deployed TLS VPN, binds VPN sessions with the clients and server IP addresses. A vertical handover will require an inactivity timeout to be triggered and full TLS handshake thereafter... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Monsieur Poirot: Detecting Botnets Using Re-Identification Algorithm and Nontrivial Feature Selection Technique

    Publication Year: 2018, Page(s):1 - 6
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (1027 KB) | HTML iconHTML

    Modern botnets are progressively migrating to P2P network to resist against take-down attempts. In addition, new botnets use randomization in their behavior to evade detection. In this paper, we propose a new method for detecting stealthy P2P bots. We formulate the problem as a re-identification problem. This opens the possibility of powerful instantiations of detection algorithms to address the b... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • eyeDNS: Monitoring a University Campus Network

    Publication Year: 2018, Page(s):1 - 7
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (408 KB) | HTML iconHTML

    The Domain Name System (DNS) is responsible for mapping human readable domain names to internet protocol (IP) addresses. DNS is a ubiquitous part of internet and intranet communication, making it a convenient and comprehensive source for data to infer network health, performance, and security. A victim of its own success, monitoring real-time DNS traffic is a challenge due to sheer volume: huge am... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modeling Malware as a Language

    Publication Year: 2018, Page(s):1 - 6
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (179 KB) | HTML iconHTML

    Malware detection and malware construction are evolving in parallel. As malware authors incorporate evasive techniques into malware construction, antivirus software developers incorporate new static and dynamic analysis techniques into malware detection and classification with the aim of thwarting such evasive techniques. In this paper, we propose a new approach to static malware analysis, aiming ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • P2P Lending Platform Risk Observing Method Based on Short-Time Multi-Source Regression Algorithm

    Publication Year: 2018, Page(s):1 - 6
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (370 KB) | HTML iconHTML

    Peer-to-Peer (P2P) lending is a popular way of lending in contemporary Internet financial filed. Comparing with the traditional bank lending, the annual risk evaluation is no longer applicable for P2P platform because of the short life cycle and a lot of transaction records. This paper presents a method to dynamically evaluate the operation risk of P2P plat- forms based on a short-time multi-sourc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • CT.01 - Communication Theory 
  • Relay-Centric Two-Hop Networks with Asymmetric Wireless Energy Transfer: A Multi-Leader-Follower Stackelberg Game

    Publication Year: 2018, Page(s):1 - 6
    Cited by:  Papers (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (251 KB) | HTML iconHTML

    This paper studies a two-hop network with wireless energy transfer consisting of one source, multiple relays, and multiple destinations. The relays' main objective is to communicate their own messages to their own destinations. The message of each relay is transmitted to its associated destination along with the source's information that is intended for the same destination. As an incentive for re... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Age-Minimal Online Policies for Energy Harvesting Sensors with Random Battery Recharges

    Publication Year: 2018, Page(s):1 - 6
    Cited by:  Papers (7)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (363 KB) | HTML iconHTML

    We consider an energy harvesting sensor that is sending measurement updates regarding some physical phenomenon to a destination. The sensor relies on energy harvested from nature to measure and send its updates, and is equipped with a battery of finite size to collect its harvested energy. The energy harvesting process is Poisson with unit rate, and arrives in amounts that fully recharge the batte... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Finite Blocklength Rates over a Fading Channel with CSIT and CSIR

    Publication Year: 2018, Page(s):1 - 7
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (831 KB) | HTML iconHTML

    In this work, we obtain lower and upper bounds on the maximal transmission rate at a given codeword length n, average probability of error ϵ and power constraint P̅, over a finite valued, block fading additive white Gaussian noise (AWGN) channel with channel state information (CSI) at the transmitter and the receiver. These bounds characterize deviation of the finite blocklength coding rates from ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Optimal Resource Scheduling for Energy Harvesting Communications under Strict Delay Constraint

    Publication Year: 2018, Page(s):1 - 6
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (462 KB) | HTML iconHTML

    This paper investigates the resource scheduling minimizing the packet loss when the wireless communication system operates with Energy Harvesting (EH) based devices. The packet loss occurs when the buffer is overflowed and when the queued packet is older than a certain pre-defined threshold. We so consider a strict delay constraint rather than an average delay constraint. The associated optimizati... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Scheduling on the Gaussian Broadcast Channel with Hard Deadlines

    Publication Year: 2018, Page(s):1 - 7
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (667 KB) | HTML iconHTML

    This paper, motivated by mission-critical and latency-constrained traffic, focuses on delivering different messages to various end-users within hard deadlines on the downlink of a wireless system. A novel deadline outage performance criterion is introduced, which accounts for both the violation of the hard deadline by any of the messages as well as for channel decoding errors due to finite block-l... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Energy-Harvesting Irregular Repetition Slotted ALOHA with Unit-Sized Battery

    Publication Year: 2018, Page(s):1 - 6
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (353 KB) | HTML iconHTML

    We propose an irregular repetition slotted ALOHA (IRSA) based uncoordinated random access scheme for energy harvesting (EH) nodes. Specifically, we consider the case in which each user has a unit- sized battery that is recharged with energy harvested from the environment in a probabilistic manner. We analyze this scheme by deriving asymptotic throughput expressions, and obtain optimized probabilit... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • GCSN.01 - Energy Harvesting and Wireless Powered Communications I 
  • Differential Game for Resource Allocation in Energy Harvesting Sensor Networks

    Publication Year: 2018, Page(s):1 - 6
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (362 KB) | HTML iconHTML

    In this paper, we consider power control and data scheduling in an energy-harvesting (EH) multi-hop wireless-sensor-network (WSN). The network consists of M sensor nodes aiming to send their data to a sink node. Each sensor node has a battery of limited capacity to save the harvested energy and a buffer of limited size to store both the sensed and relayed data from neighboring nodes, each sensor n... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Structural Properties of Optimal Transmission Policies for Delay-Sensitive Energy Harvesting Wireless Sensors

    Publication Year: 2018, Page(s):1 - 7
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (339 KB) | HTML iconHTML

    We consider an energy harvesting sensor transmit- ting latency-sensitive data over a fading channel. We aim to find the optimal transmission scheduling policy that minimizes the packet queuing delay given the available harvested energy. We formulate the problem as a Markov decision process (MDP) over a state-space spanned by the transmitter's buffer, battery, and channel states, and analyze the st... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Model Predictive Cell Zooming for Energy-Harvesting Small Cell Networks

    Publication Year: 2018, Page(s):1 - 6
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (462 KB) | HTML iconHTML

    This paper addresses the real-time control of transmission power for small cell base stations (SBSs) exploiting energy- harvesting sources. We employ model predictive control and optimize an objective function that contains the number of users with a given quality of experience and the average state of charge. We first determine the number of active SBSs in the viewpoint of energy efficiency and t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.