List of Accepted Papers in IFIP Networking 2022 Main Conference

  1. Inter-Networking and Function Optimization for Mega-Constellations

    Zitong Lin, Hewu Li, Jun Liu, Zeqi Lai and Guojie Fan (Tsinghua University, China)

  2. Routing on the Shortest Pairs of Disjoint Paths

    Péter Babarczi and Gábor Rétvári (Budapest University of Technology and Economics, Hungary); Lajos Rónyai (Budapest University of Technology and Economics (BME), Hungary); János Tapolcai (Budapest University of Technology and Economics, Hungary)

  3. FACL: A Flexible and High Performance ACL Engine on FPGA-Based SmartNIC

    Chengjun Jia, Chenglong Li, Yifan Li, Xiaohe Hu and Jun Li (Tsinghua University, China)

  4. CArDS: Dealing a New Hand in Reducing Service Request Completion Times

    Dirk Trossen (Huawei Technologies Düsseldorf GmbH, Germany); Karima S Khandaker (Huawei Research & Technische Universität München, Germany); Ramin Khalili and Zoran Despotovic (Huawei Technologies, Germany); Artur Hecker (Huawei, Germany); Georg Carle (Technische Universität München, Germany)

  5. CloudPilot: Flow Acceleration in the Cloud

    Kfir Toledo (Technion - Israel Institute of Technology, Israel); David Breitgand (IBM Research -- Haifa, Israel); Dean H Lorenz (IBM Research - Haifa, Israel); Isaac Keslassy (Technion, Israel)

  6. Overload Balancing in Single-Hop Networks With Bounded Buffers

    Xinyu Wu and Dan Wu (Massachusetts Institute of Technology, USA); Eytan Modiano (MIT, USA)

  7. Exploring Proxying QUIC and HTTP/3 for Satellite Communication

    Mike Kosek and Hendrik Cech (Technical University of Munich, Germany); Vaibhav Bajpai (CISPA Helmholtz Center for Information Security, Germany); Jörg Ott (Technische Universität München, Germany)

  8. Multiscale Energy Network Tomography

    Yixiao Feng and Nick Duffield (Texas A&M University, USA)
  9. Performance and Improvements of TCP CUBIC in Low-Delay Cellular Networks

    Philipp Bruhn and Mirja Kuehlewind (Ericsson Research, Germany); Maciej Muehleisen (Ericsson GmbH, Germany)

  10. IPswen: A Long Term Evolution Approach for the IPv4 Internet Architecture

    Bing Swen Sun (Peking University, China)
  11. Query-Efficient and Imperceptible Attacks on Multivariate Time Series DNN Models

    Haiying Shen, Fan Yao, Tanmoy Sen, Gustavo Moreira and Ankur Sarker (University of Virginia, USA)

  12. On the Incremental Reconfiguration of Time-Sensitive Networks at Runtime

    Christoph Gärtner (Technical University of Darmstadt, Germany); Amr Rizk (University of Duisburg-Essen, Germany); Boris Koldehofe (University of Groningen, The Netherlands); Rene Guillaume (Robert Bosch GmbH, Germany); Ralf Kundel (Technical University of Darmstadt, Germany); Ralf Steinmetz (Technische Universität Darmstadt, Germany)

  13. Long-Range ICN for the IoT: Exploring a LoRa System Design

    Peter Kietzmann and José Ignacio Álamos (Hamburg University of Applied Sciences, Germany); Dirk Kutscher (University of Applied Sciences Emden/Leer, Germany); Matthias Wählisch (Freie Universität Berlin, Germany); Thomas C. Schmidt (Hamburg University of Applied Sciences, Germany)


  14. EZPath: Expediting Container Network Traffic via Programmable Switches

    Zili Zha (George Mason University, USA); An Wang (Case Western Reserve University, USA); Yang Guo (NIST, USA); Qun Li (William & Mary, USA); Kun Sun and Songqing Chen (George Mason University, USA)

  15. An Eight Years Perspective on the Internet Broadband Infrastructure in the USA

    Justus Fries, Trinh Viet Doan and Rohit Gupta (Technical University of Munich, Germany); Vaibhav Bajpai (CISPA Helmholtz Center for Information Security, Germany)

  16. Tiramisu: Fast and Scalable Traffic Splitting on Commodity Switches

    Kun Huang (Peng Cheng Laboratory, China); Qianpeng Su (Southern University of Science and Technology, China)
  17. Global-Aware Prototypical Network for Few-Shot Encrypted Traffic Classification

    Jingyu Guo and Mingxin Cui (Institute of Information Engineering, Chinese Academy of Sciences, China); Chengshang Hou (Schools of of Cyber Security, University of Chinese Academy of Sciences & Institute of Information Engineering, Chinese Academy of Sciences, China); Gaopeng Gou (Institute of Information Engineering,Chinese Academy of Sciences, China); Zhen Li, Gang Xiong and Chang Liu (Institute of Information Engineering, Chinese Academy of Sciences, China)
  18. Revisiting Application Offloads on Programmable Switches

    Cha Hwan Song and Xin Zhe Khooi (National University of Singapore, Singapore); Dinil Mon Divakaran (Trustwave, Singapore); Mun Choon Chan (National University of Singapore, Singapore)

  19. SNAPS: Seamless Network-Assisted Publish-Subscribe

    Hyunseok Chang (Nokia Bell Labs, USA); Fang Hao (Bell Labs, Nokia, USA); Murali Kodialam (Nokia Bell Labs, USA); T. V Lakshman (Bell Labs, Nokia, USA); Sarit Mukherjee (Nokia Bell Labs, USA); Matteo Varvello (Nokia, Bell Labs, USA)

  20. Veritaa-IoT: A Distributed Public Key Infrastructure for the Internet of Things

    Jakob Schaerer (University of Bern, Switzerland); Severin Zumbrunn (Abilium GmbH, Switzerland); Torsten Ingo Braun (University of Bern, Switzerland)

  21. Local and Public DNS Resolvers: Do You Trade off Performance Against Security?

    Antonia Affinito and Alessio Botta (University of Napoli Federico II, Italy); Giorgio Ventre (University of Naples Federico II, Italy)

  22. A Global Study of the Risk of Earthquakes to IXPs

    Jorik Oostenbrink (TU Delft, The Netherlands); Fernando A. Kuipers (Delft University of Technology, The Netherlands)

  23. DCoflow: Deadline-Aware Scheduling Algorithm for Coflows in Datacenter Networks

    Quang-Trung Luu (LAAS-CNRS, France); Olivier Brun (Laboratoire d'Analyse et d'Architecture des Systemes & CNRS, France); Rachid El-Azouzi and Francesco De Pellegrini (University of Avignon, France); Balakrishna Prabhu (LAAS-CNRS, France); Cedric Richier (University of Avignon, France)

  24. Network Traffic Prediction Based on the Feature of Newly-Generated Network Flows

    Shaohe Li (Computer Network Information Center, Chinese Academy of Sciences & University of Chinese Academy of Sciences, China); Junping Song (Computer Network Information Center, Chinese Academy of Sciences, China); Luyang Xu (Chinese Academy of Sciences, China); Yahui Hu (China University of Mining & Technology, Beijing, China); Wanming Luo (Chinese Acedemy of Sciences, China); Xu Zhou (Computer Network Information Center, Chinese Academy of Sciences, China)

  25. Malicious Attack Detection Based on Traffic-Flow Information Fusion

    Ye Chen, Yingxu Lai, Zhaoyi Zhang, Hanmei Li and Yuhang Wang (Beijing University of Technology, China)

  26. Online Caching With Optimistic Learning

    Naram Mhaisen and George Iosifidis (Delft University of Technology, The Netherlands); Douglas Leith (Trinity College Dublin, Ireland)

  27. KIRA: Distributed Scalable ID-Based Routing With Fast Forwarding

    Roland Bless (Karlsruhe Institute of Technology (KIT), Germany); Zoran Despotovic (Huawei Technologies, Germany); Artur Hecker (Huawei, Germany); Martina Zitterbart (KIT, Germany)

  28. Improving Performance Bounds for WRR Schedulers Under Constrained Cross-Traffic

    Vlad-Cristian Constantin, Paul Nikolaus and Jens Schmitt (TU Kaiserslautern, Germany)

  29. Joint Consensus Matrix Design and Resource Allocation for Decentralized Learning

    Jingrong Wang and Ben Liang (University of Toronto, Canada); Zhongwen Zhu (Ericsson Canada, Canada); Emmanuel Thepie Fapi and Hardik Dalal (Ericsson, Canada)

  30. NetStack: A Game Approach to Synthesizing Consistent Network Updates

    Stefan Schmid and Bernhard C Schrenk (University of Vienna, Austria); Alvaro Torralba (Aalborg University, Denmark)

  31. Constant Delay Switching: Asynchronous Traffic Shaping With Jitter Control

    Alexej Grigorjew (University of Wuerzburg, Germany); Florian Metzger and Tobias Hoßfeld (University of Würzburg, Germany); Johannes Specht (University of Duisburg-Essen, Germany); Franz-Josef Goetz, Feng Chen and Juergen Schmitt (Siemens AG, Germany)


  32. Lightweight Fingerprint Attack and Encrypted Traffic Analysis on News Articles

    David Hasselquist (Linköping University & Sectra Communications, Sweden); Martin Lindblom and Niklas Carlsson (Linköping University, Sweden)


  33. Hierarchical Congestion Control (HCC): Fairness and Fast Convergence

    Shiva Ketabi and Yashar Ganjali (University of Toronto, Canada)

  34. A Highly Parallelizable Algorithm for Routing With Automatic Tunneling

    Noureddine Mouhoub and Mohamed Lamine Lamali (Université de Bordeaux, France); Damien Magoni (University of Bordeaux, France)

  35. gPHI: Lightweight Anonymity Protocol for Anonymity at Host and AS Levels

    Yutaro Yoshinaka, Junji Takemasa, Yuki Koizumi and Toru Hasegawa (Osaka University, Japan)

  36. PNT Sketch: A Generic Sketch Algorithm for Periodic Network Telemetry

    Quan Yuan, Fenghua Li, Jessie Hui Wang, Shuanghong Yu, Allen Hong and Xingkun Yao (Tsinghua University, China)

  37. CL-ETC: A Contrastive Learning Method for Encrypted Traffic Classification

    Ziyi Zhao (Tsinghua University, China); Yingya Guo (Fuzhou University, China); Jessie Hui Wang (Tsinghua University, China); Haibo Wang (TsingHua University, China); Chengyuan Zhang and Changqing An (Tsinghua University, China)

  38. Herding the FLOQ: Flow Optimised Queueing

    Mihail A Yanev (University of Glasgow, United Kingdom (Great Britain)); Paul Harvey (Rakuten Mobile, Japan)

  39. A Longitudinal Characterization of the Third-Party Authentication Landscape

    Oscar Järpehult, Fredrik Josefsson Ågren, Madeleine Bäckström, Linn Hallonqvist and Niklas Carlsson (Linköping University, Sweden)

  40. Clustering Payloads: Grouping Randomized Scan Probes Into Campaign Templates

    Vincent Ghiette (Delft University of Technology, The Netherlands); Christian Doerr (Hasso Plattner Institute, Germany)

  41. Preventing the Flood: Incentive-Based Collaborative Mitigation for DRDoS Attacks

    Matan Sabag and Anat Bremler-Barr (Interdisciplinary Center Herzliya, Israel)
  42. Accelerator-Aware In-Network Load Balancing for Improved Application Performance

    Hesam Tajbakhsh (Dalhousie University, Canada); Ricardo Parizotto (UFRGS, Brazil); Miguel Neves (Dalhousie University, Canada); Alberto E. Schaeffer-Filho (Federal University of Rio Grande do Sul (UFRGS), Brazil); Israat Haque (Dalhousie University, Canada)

  43. Shoehorn: Towards Portable P4 for Low Cost Hardware

    Christopher Lorier, Richard Nelson, Matthew Luckie and Marinho Barcellos (University of Waikato, New Zealand)

  44. Improving Inter-Protocol Fairness Based on Estimated Behavior of Competing Flows

    Satoshi Utsumi (Fukushima University, Japan); Go Hasegawa (Tohoku University, Japan)

  45. Data Drift in DL: Lessons Learned From Encrypted Traffic Classification

    Navid Malekghaini, Elham Akbari, Mohammad Ali Salahuddin, Noura Limam and Raouf Boutaba (University of Waterloo, Canada); Bertrand Mathieu (Orange Innovation, France); Stephanie Moteau (Orange Labs Research, France); Stephane Tuffin (Orange Innovation, France)