-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathaccepted-papers.php
444 lines (435 loc) · 39.6 KB
/
accepted-papers.php
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
<?php
$page_title="List of Accepted Papers";
include("include/header.php");
?>
<div data-role="content" style="text-align:left;padding-top: 0em;background-color:#e4e5e6">
<div class="ui-block-a" style="width:70%;height:100%;background-color:#ffffff;padding-left: 35px;padding-right:35px;padding-top: 15px;">
<b><h2>List of Accepted Papers </h2></b>
<b><h3 style="color:#005f98 !important">Main Conference</h3></b>
<ol>
<li><b>A Clustering Method of Encrypted Video Traffic Based on Levenshtein Distance </b><br>
Luming Yang, Shaojing Fu, Yuchuan Luo (National University of Defense Technology, China)
</li><br>
<li><b>A Distributed Hybrid Load Management Model for Anycast CDNs </b><br>
Jing‘an Xue (Huawei Technologies, China), Haibo Wang, Jilong Wang (Tsinghua University, China), Zhe Chen, Tong Li (Huawei Technologies, China)
</li><br>
<li><b>A Hierarchical Incentive Mechanism for Coded Federated Learning </b><br>
Jer Shyuan Ng, Wei Yang Bryan Lim (Alibaba-NTU JRI, Singapore), Zehui Xiong (Singapore University of Technology Design, Singapore), Xianjun Deng (Huazhong University of Science and Technology, China), Yang Zhang (Nanjing University of Aeronautics and Astronautics, China), Dusit Niyato, Cyril Leung (Nanyang Technological University, Singapore)
</li><br>
<li><b>A Large Inter-Satellite Non-dependent Routing Technology — IS-OLSR </b><br>
Dongkun Huo, Qiang Liu, Yantao Sun, Huiling Li (Beijing Jiaotong University, China)
</li><br>
<li><b>A Location-Aware Cross-Layer MAC Protocol for Vehicular Visible Light Communications </b><br>
Agon Memedi, Falko Dressler (TU Berlin, Germany)
</li><br>
<li><b>A Node Importance Ranking Method Based on the Rate of Network Entropy Changes </b><br>
Qian Chen, Changda Wang, Qian Chen, Xian Zhao, Wenyue Sun (Jiangsu University, China)
</li><br>
<li><b>A Novel Deployment Method for UAV-mountedMobile Base Stations </b><br>
Di Wu, Juan Xu, Jiabin Yuan, Xiangping Zhai (Nanjing University of Aeronautics and Astronautics, China)
</li><br>
<li><b>A robust fixed path-based routing scheme for protecting the source location privacy in WSNs</b><br>
Lingling Hu, Liang Liu, Yulei Liu, Wenbin Zhai, Xinmeng Wang (Nanjing University of Aeronautics and Astronautics, China)
</li><br>
<li><b>A Scheduling Scheme in a Container-based Edge Computing Environment Using Deep Reinforcement Learning Approach </b><br>
Tingting Lu, Fanping Zeng, Jingfei Shen, Guozhu Chen, Wenjuan Shu, Weikang Zhang (University of Science and Technology of China, China)
</li><br>
<li><b>Activity Selection to Distinguish Healthy People from Parkinson's Disease Patients Using I-DA </b><br>
Liu Tao (Yunnan University, China), Po Yang (University of Sheffield, UK)
</li><br>
<li><b>An Improved Online Multiple Pedestrian Tracking Based on Head and Body Detection </b><br>
Zhihong Sun, Jun Chen (Wuhan University, China), Mithun Mukherjee (Nanjing University of Information Science and Technology, China), Haihui Wang (Wuhan Institute of Technology, China), Dan Zhang (Wuhan University, China)
</li><br>
<li><b>Analyzing a 5G Dataset and Modeling Metrics of Interest </b><br>
Fidan Mehmeti, Thomas La Porta (The Pennsylvania State University, USA)
</li><br>
<li><b>AWGAN: Unsupervised Spectrum Anomaly Detection with Wasserstein Generative Adversarial Network along with Random Reverse </b><br>Mapping
Weiqing Huang, Bingyang Li, Wen Wang, Meng Zhang, Sixue Lu, Yushan Han (Institute of Information Engineering, Chinese Academy of Sciences (CAS), China)
</li><br>
<li><b>BALSAPro: Towards A Security Protocol for Bluetooth Low Energy </b><br>
Mohamad Muwfak Hlal, Weizhi Meng (Technical University of Denmark, Denmark)
</li><br>
<li><b>Blockchain-based Access Control for Privacy Preserving of Students’ Credit Information </b><br>
Quanwen He, Hui Lin (Fujian Normal University, China), Fu Xiao (Nanjing University of Posts and Telecommunications, China), Jia Hu (University of Exeter, UK), Xiaoding Wang (Fujian Normal University, China)
</li><br>
<li><b>Caching, Recommendations and Opportunistic Offloading at the Network Edge </b><br>
Margarita Vitoropoulou, Konstantinos Tsitseklis (National Technical University of Athens, Greece), Vasileios Karyotis (Ionian University, Greece), Symeon Papavassiliou (National Technical University of Athens, Greece)
</li><br>
<li><b>Collecting Spatial Data Under Local Differential Privacy </b><br>
Yutong Ye, Min Zhang, Dengguo Feng (Institute of Software, Chinese Academy of Sciences (CAS), China)
</li><br>
<li><b>Communication-efficient Subspace Methods for High-dimensional Federated Learning </b><br>
Zai Shi, Atilla Eryilmaz (The Ohio State University, USA)
</li><br>
<li><b>CRATES : A Cache Replacement Algorithm for Access Frequency-Low Period in Edge Server</b><br>
Pengmiao Li, Yuchao Zhang, Huahai Zhang, Wendong Wang (Beijing University of Posts and Telecommunications, China), Ke Xu (Tsinghua University, China), Zhili Zhang (University of Minnesota, USA)
</li><br>
<li><b>Deep Learning for Cyber Deception in Wireless Networks </b><br>
Felix Olowononi (Howard University, USA), Ahmed H. Anwar (US Army Research Lab, USA), Danda Rawat (Howard University, USA), Jaime Acosta, Charles Kamhoua (US Army Research Lab, USA)
</li><br>
<li><b>Deep Learning on Visual and Location Data for V2I mmWave Beamforming </b><br>
Guillem Reus-Muns, Batool Salehi, Debashri Roy, Tong Jian, Zifeng Wang, Jennifer Dy, Stratis Ioannidis and Kaushik Chowdhury (Northeastern University, USA)
</li><br>
<li><b>Deep Reinforcement Learning-Based Edge Caching and Multi-link Cooperative Communication in Internet-of-Vehicles </b><br>
Teng Ma, Xin Chen, Libo Jiao, Ying Chen (Beijing Information Science and Technology University, China)
</li><br>
<li><b>Deep Transfer Learning for Cross-Device Channel Classification in mmWave Wireless </b><br>
Ahmed Almutairi, Suresh Srinivasan (Portland State University, USA), Alireza Keshavarz-Haddad (Shiraz University, Iran), Ehsan Aryafar (Portland State University, USA)
</li><br>
<li><b>Defending Against Byzantine Attacks in Quantum Federated Learning </b><br>
Qi Xia, Zeyi Tao, Qun Li (College of William and Mary, USA)
</li><br>
<li><b>Defending against Membership Inference Attacks in Federated learning via Adversarial Example</b><br>
Yuanyuan Xie, Bing Chen (Nanjing University of Aeronautics and Astronautics, China), Jiale Zhang (Yangzhou University, China), Di Wu (Deakin University, Melbourne, Australia)
</li><br>
<li><b>Design and Implementation of a RISC V Processor on FPGA </b><br>
Ludovico Poli, Sangeet Saha, Xiaojun Zhai, Klaus Mcdonald-Maier (University of Essex, UK)
</li><br>
<li><b>DeSMP: Differential Privacy-exploited Stealthy Model Poisoning Attacks in Federated Learning </b><br>
Md Tamjid Hossain, Shafkat Islam, Shahriar Badsha, Haoting Shen (University of Nevada, Reno, USA)
</li><br>
<li><b>Distributed Routing Protocol for Large-Scale Backscatter-enabled Wireless Sensor Network</b><br>
Fengyu Zhou, Hao Zhou, Shan Wang, Wangqiu Zhou (University of Science and Technology of China, China), Zhi Liu (The University of Electro-Communications, Japan), Xiangyang Li (University of Science and Technology of China, China)
</li><br>
<li><b>Distributed Task Offloading based on Multi-Agent Deep Reinforcement Learning</b><br>
Shucheng Hu, Tao Ren, Jianwei Niu (University of Göttingen, Germany), Zheyuan Hu (Zhengzhou University, China), Guoliang Xing (The Chinese University of Hong Kong, Hong Kong)
</li><br>
<li><b>DPFDT: Decentralized Privacy-preserving Fair Data Trading System </b><br>
Xiangyu Li, Zhenfu Cao, Jiachen Shen, Xiaolei Dong (East China Normal University, China)
</li><br>
<li><b>DVC:An Deductable Video Coding for Video Broadcast in Highly Dynamic Networks </b><br>
Yunhuai Liu, Yonggui Huang, Sheng Gu (Peking University, China)
</li><br>
<li><b>Efficient Privacy-Preserving Federated Learning for Resource-Constrained Edge Devices </b><br>
Jindi Wu, Qi Xia, Qun Li (College of William & Mary, USA)
</li><br>
<li><b>Evaluating Multimedia Protocols on 5G Edge for Mobile Augmented Reality </b><br>
Jacky Cao (University of Oulu, Finland), Xiang Su (Norwegian University of Science and Technology, Norway), Benjamin Finley (University of Helsinki, Finland), Antti Pauanne (University of Oulu, Finland), Mostafa Ammar (Georgia Institute of Technology, USA), Pan Hui (University of Helsinki, Finland)
</li><br>
<li><b>FedHe: Heterogeneous Models and Communication-Efficient Federated Learning </b><br>
Yun Hin Chan, Edith C.H. Ngai (The University of Hong Kong, Hong Kong)
</li><br>
<li><b>FIDS: A Federated Intrusion Detection System for 5G Smart Metering Network </b><br>
Parya Haji Mirzaee, Mohammad Shojafar, Zahra Pooranian (University of Surrey, UK), Pedram Asef (University of Hertfordshire, UK), Haitham Cruickshank, Rahim Tafazolli (University of Surrey, UK)
</li><br>
<li><b>Flow Transformer: A Novel Anonymity Network Traffic Classifier with Attention Mechanism</b><br>
Ruijie Zhao, Yiteng Huang, Xianwen Deng, Zhi Xue, Jiabin Li (Shanghai Jiao Tong University, China), Zijing Huang (Fudan University, China), Yijun Wang (Shanghai Jiao Tong University, China)
</li><br>
<li><b>FlowFormers: Transformer-based Models for Real-time Network Flow Classification </b><br>
Rushi Babariya (BITS Pilani, India), Sharat Chandra Madanapalli (UNSW Sydney, Canopus Networks, Australia), Himal Kumar (Canopus Networks, Australia), Vijay Sivaraman (UNSW Sydney, Australia)
</li><br>
<li><b>FNEL:An Evolving Intrusion Detection System Based on Federated Never-Ending Learning </b><br>
Tian Qin, Guang Cheng, Wenchao Chen, Xuan Lei (Southeast University, China)
</li><br>
<li><b>Friendship Understanding by Smartphone-based Interactions: A Cross-space Perspective </b><br>
Liang Wang, Haixing Xu, Zhiwen Yu (Northwestern Polytechnical University, China), Rujun Guan (Xi'an University of Science and Technology, China), Bin Guo, Zhuo Sun (Northwestern Polytechnical University, China)
</li><br>
<li><b>From Wired to Wireless BMS in Electric Vehicles </b><br>
Fabian Antonio Rincon Vija, Samuel Cregut (Renault Group, France), Georgios Papadopoulos, Nicolas Montavont (IMT Atlantique, France)
</li><br>
<li><b>FullSight: Towards Scalable, High-Coverage, and Fine-grained Network Telemetry </b><br>
Sen Ling, Waixi Liu, Yinghao Zhu, Miaoquan Tan, Jieming Huang, Zhenzheng Guo, Wenhong Lin (Guangzhou University, China)
</li><br>
<li><b>Gaming at the Edge: A Weighted Congestion Game Approach for Latency-Sensitive Scheduling</b><br>
Xuezheng Liu, Ke Liu (Sun Yat-Sen University, China), Guoqiao Ye (Tencent Technology Co. Ltd, China), Miao Hu (Sun Yat-Sen University, China), Yipeng Zhou (Macquarie University, Australia), Di Wu (Sun Yat-Sen University, China)
</li><br>
<li><b>IDS: An Intelligent Data Semantics System for Communication Link Prediction in SIoT </b><br>
Bo Wang, Zunfu Huang, Meixian Song (Tianjin University, China), Qinxue Jiang (Newcastle University, China), Naixue Xiong (Northeastern State University, USA)
</li><br>
<li><b>IMFi: IMU-WiFi based Cross-modal Gait Recognition System with Hot-Deployment </b><br>
Zengyu Song, Hao Zhou, Shan Wang, Jinmeng Fan, Kaiwen Guo, Wangqiu Zhou (University of Science and Technology of China, China), Xiaoyan Wang (Ibaraki University, Japan), Xiang-Yang Li (University of Science and Technology of China, China)
</li><br>
<li><b>Impact of UAV Mobility on Physical Layer Security </b><br>
Rukhsana Ruby, Basem M. Elhalawany, Kaishun Wu (Shenzhen University, China)
</li><br>
<li><b>Joint Task Offloading and Resource Allocation for MEC Networks Considering UAV Trajectory </b><br>
Xiyu Chen, Yangzhe Liao, Qingsong Ai (Wuhan University of Technology, China)
</li><br>
<li><b>Learning Discriminative Features for Adversarial Robustness </b><br>
Ryan Hosler, Tyler Phillips, Xiaoyuan Yu, Agnideven Sundar, Xukai Zou, Feng Li (Indiana University Purdue University Indianapolis, USA)
</li><br>
<li><b>Leveraging blockchain for cross-institution data sharing and authentication in mobile healthcare </b><br>
Le Lai, Tongqing Zhou, Zhiping Cai, Jiaping Yu, Hao Bai (National University of Defense Technology, China)
</li><br>
<li><b>Long-Term Visual Localization with Semantic Enhanced Global Retrieval </b><br>
Hongrui Chen, Yuan Xiong, Jingru Wang, Zhong Zhou (State Key Laboratory of Virtual Reality Technology and Systems, China)
</li><br>
<li><b>Matching Theory Aided Federated Learning Method for Load Forecasting of Virtual Power Plant </b><br>
Min Yan, Li Wang (Beijing University of Posts and Telecommunications, China), Xuanyuan Wang (State Grid Jibei Electric Power Company Ltd., China), Liang Li, Lianming Xu, Aiguo Fei (Beijing University of Posts and Telecommunications, China)
</li><br>
<li><b>Measuring Consumption Changes in Rural Villages based on Satellite Image Data - A Case Study for Thailand and Vietnam </b><br>
Fabian Wölk, Tingting Yuan, Krisztina Kis-Katos, Xiaoming Fu (University of Göttingen, Germany)
</li><br>
<li><b>Method for Detecting and Analyzing the Compromising Emanations of USB Storage Devices </b><br>
Bo Liu (Institute of Information Engineering, CAS and University of Chinese Academy of Sciences, China), Yanyun Xu, Weiqing Huang (Institute of Information Engineering, Chinese Academy of Sciences (CAS), China), Shaoying Guo (Institute of Information Engineering, CAS and University of Chinese Academy of Sciences, China)
</li><br>
<li><b>Mining Centralization of Internet Service Infrastructure in the Wild </b><br>
Bingyang Guo, Fan Shi, Chengxi Xu, Min Zhang, Yang Li (National University of Defense Technology, China)
</li><br>
<li><b>MM-QUIC: A mobility-aware multipath QUIC for satellite networks </b><br>
Lin Cai, Wenjun Yang, Shengjie Shu, Jianping Pan (University of Victoria, Canada)
</li><br>
<li><b>Mobility-Aware Efficient Task Offloading with Dependency Guarantee in Mobile Edge Computing Networks </b><br>
Qi Wu, Guolin Chen, Xiaoxia Huang (Sun Yat-Sen University, China)
</li><br>
<li><b>Modeling and Analysis of Medical Resource Sharing and Scheduling for Public Health Emergencies based on Petri Nets </b><br>
Wangyang Yu, Menghan Jia (Shaanxi Normal University, China), Bo Yuan (University of Derby, UK)
</li><br>
<li><b>Modeling Disease Progression Flexibly with Nonlinear Disease Structure via Multi-task Learning</b><br>
Menghui Zhou (Yunnan University, China), Po Yang (University of Sheffield, UK)
</li><br>
<li><b>Multi-Source Date-Driven Route Prediction for Instant Delivery </b><br>
Zhiyuan Zhou (Southeast University, China), Xiaolei Zhou (National University of Defense Technology, China), Yao Lu, Hua Yan, Baoshen Guo, Shuai Wang (Southeast University, China)
</li><br>
<li><b>Network Security by Merging two Robust Tools from the Mathematical Firmament </b><br>
Andreas Andreou (University of Nicosia Research Foundation (UNRF), Cyprus), Constandinos Mavromoustakis (University of Nicosia, Cyprus), George Mastorakis (Hellenic Mediterranean University, Greece), Jordi Mongay Batalla (Warsaw University of Technology and National Institute of Telecommunications, Poland)
</li><br>
<li><b>Neural Adaptive IoT Streaming Analytics with RL-Adapt </b><br>
Bonan Shen, Chenhong Cao, Tong Liu, Jiangtao Li, Yufeng Li (Shanghai University, China)
</li><br>
<li><b>One-Class Support Vector Machine with Particle Swarm Optimization for Geo-Acoustic Anomaly Detection </b><br>
Dan Zhang, Zhihong Sun (Wuhan University, China), Mithun Mukherjee (Nanjing University of Information Science and Technology, China)
</li><br>
<li><b>Performance Comparison of Hybrid Encryption-based Access Control Schemes in NDN </b><br>
Htet Htet Hlaing, Yuki Funamoto, Masahiro Mambo (Kanazawa University, Japan)
</li><br>
<li><b>Personalized Path Recommendation with Specified Way-points Based on Trajectory Representations</b><br>
Wang Bing, Guo Yuchun, Chen Yishuai (Beijing Jiaotong University, China)
</li><br>
<li><b>Publish or Perish: Defending Withholding Attack in Dfinity Consensus </b><br>
Hanzheng Lyu, Jianyu Niu, Fangyu Gai, Chen Feng (University of British Columbia (Okanagan Campus), Canada)
</li><br>
<li><b>Qualitative Communication for Emerging Network Applications with New IP </b><br>
Richard Li, Lijun Dong, Cedric Westphal, Kiran Makhijani (Futurewei Technologies Inc., USA)
</li><br>
<li><b>ReDetect: Reentrancy Vulnerability Detection in Smart Contracts with High Accuracy </b><br>
Rutao Yu (Harbin Institute of Technology, Shenzhen, China), Jiangang Shu (Peng Cheng Laboratory, China), Dekai Yan (Harbin Institute of Technology, Shenzhen, China), Xiaohua Jia (Harbin Institute of Technology, Shenzhen, China and City University of Hong Kong, Hong Kong)
</li><br>
<li><b>Reinforcement Learning based Scheduling for Heterogeneous UAV Networking </b><br>
Jian Wang (Embry-Riddle Aeronautical University, USA), Yongxin Liu (Auburn University at Montgomery, USA), Shuteng Niu (Bowling Green State University, USA), Houbing Song (Embry-Riddle Aeronautical University, USA)
</li><br>
<!-- <li><b>Research on GNSS/DR method based on B-spline and optimized BP neural network </b><br>
Zaihui Fei, Shuangcheng Jia, Qian Li (Mogo Auto Intelligence and Telematics Information Technology Co., Ltd., China)
</li><br> -->
<li><b>Resource Demand Prediction of Cloud Workloads Using an Attention-based GRU Model </b><br>
Wenjuan Shu, Fanping Zeng (University of Science and Technology of China, China), Zhen Ling (Southeast University, China), Junyi Liu, Tingting Lu, Guozhu Chen (University of Science and Technology of China, China)
</li><br>
<li><b>RF-Vsensing: RFID-based Single Tag Contactless Vibration Sensing and Recognition </b><br>
Biaokai Zhu, Liyun Tian (Shanxi Police College, China), Die Wu (Sichuan Normal University, China), Meiya Dong (Taiyuan University of Technology, China), Sheng Gao, Lu Zhang, Sanman Liu (Shanxi Police College, China), Deng-Ao Li (Taiyuan University of Technology, China)
</li><br>
<li><b>Rosella: A Self-Driving Distributed Scheduler for Heterogeneous Clusters </b><br>
Qiong Wu, Zhenming Liu (College of William and Mary, USA)
</li><br>
<li><b>SecQSA: Secure Sampling-Based Quantile Summary Aggregation in Wireless Sensor Networks</b><br>
Aishah Aseeri, Rui Zhang (University of Delaware, USA)
</li><br>
<li><b>Soft Actor-Critic Algorithm for 360-Degree VideoStreaming with Long-Term Viewport Prediction</b><br>
Xiaosong Gao, Jiaxin Zeng, Xiaobo Zhou, Tie Qiu, Keqiu Li (Tianjin University, China)
</li><br>
<li><b>TAP: A Traffic-Aware Probabilistic Packet Markingfor Collaborative DDoS Mitigation </b><br>
Liu Mingxing, Liu Ying, Xu Ke, He Lin, Wang Xiaoliang, Guo Yangfei (Tsinghua University, China), Jiang Weiyu (Huawei Technologies, China)
</li><br>
<li><b>The algorithm of multi-source to multi-sink traffic scheduling </b><br>
Yang Liu, Lei Liu, Zhongmin Yan (Shandong University, China), Jia Hu (University of Exeter, UK)
</li><br>
<li><b>Time-varying Contact Management with Dynamic Programming for LEO Satellite Networks</b><br>
Feng Wang, Dingde Jiang (University of Electronic Science and Technology of China, China), Yingjie Chen (Qingdao University, China), Houbing Song (Embry-Riddle Aeronautical University (ERAU), USA), Zhihan Lv (Qingdao University, China)
</li><br>
<li><b>Towards an Energy-Efficient DQN-based User Association in Sub6GHz/mmWave Integrated Networks</b><br>
Thi Ha Ly Dinh, Megumi Kaneko (National Institute of Informatics, Japan), Keisuke Wakao, Kenichi Kawamura, Takatsune Moriyama, Yasushi Takatori (NTT Corporation, Japan)
</li><br>
<li><b>Towards DTW-based Unlock Scheme using Handwritten Graphics on Smartphones </b><br>
Li Wang, Weizhi Meng (Technical University of Denmark, Denmark), Wenjuan Li (The Hong Kong Polytechnic University, Hong Kong)
</li><br>
<li><b>Towards Efficient Co-aduit of Privacy-Preserving Data on Consortium Blockchain via Group Key Agreement </b><br>
Xiaoyan Hu, Xiaoyi Song, Guang Cheng, Jian Gong (Southeast University, China), Lu Yang, Honggang Chen, Zhichao Liang (JiangSu Peerfintech Technology Co., Ltd., China)
</li><br>
<li><b>Towards Heap-Based Memory Corruption Discovery </b><br>
Wenzhi Wang, Meng Fan (Institute of Information Engineering, Chinese Academy of Sciences (CAS) and University of Chinese Academy of Sciences, China), Aimin Yu, Dan Meng (Institute of Information Engineering, Chinese Academy of Sciences (CAS), China)
</li><br>
<li><b>Towards High Accuracy Low Latency Real-Time Road Information Collection: An Edge-Assisted Sensor Fusion Approach </b><br>
You Luo (Simon Fraser University, Canada), Feng Wang (The University of Mississippi, USA), Jiangchuan Liu (Simon Fraser University, Canada)
</li><br>
<li><b>TraceModel: An Automatic Anomaly Detection and Root Cause Localization Framework for Microservice Systems </b><br>
Yang Cai, Biao Han, Jinshu Su (National University of Defense Technology, China), Xiaoyan Wang (Ibaraki University, Japan)
</li><br>
<li><b>Unsupervised Federated Adversarial Domain Adaptation for Heterogeneous Internet of Things</b><br>
Jinfeng Ma, Mengxuan Du, Haifeng Zheng, Xinxin Feng (Fuzhou University, China)
</li><br>
<li><b>User Cooperative Mobility for Higher QoS in Ad Hoc Network: Framework and Evaluation</b><br>
Tutomu Murase (Nagoya University, Japan)
</li><br>
<li><b>Website Fingerprinting on Access network and Core Gateway </b><br>
Hantao Mei, Guang Cheng, Wei Gao, Junqiang Chen (Southeast University, China)
</li><br>
<li><b>Wireless Network Abnormal Traffic Detection Method Based on Deep Transfer Reinforcement Learning </b><br>
Yuanjun Xia, Shi Dong (Wuhan Textile University, China)
</li>
</ol>
<b><h3 style="color:#005f98 !important">1st International Workshop on Intelligent Data Collection in Cyber-Physical Systems (IDC)</h3></b>
<ol>
<li><b>2prong: Adaptive Video Streaming with DNN and MPC </b><br>
Yipeng Wang, Tongqing Zhou, Zhiping Cai (National University of Defense Technology, China)
</li><br>
<!-- <li><b>Detecting Data Leakage in DNS Traffic based on Time Series Anomaly Detection </b><br>
Futai Zou, Jiachen Zhu, Yundong Ren, Junhua Tang (Shanghai Jiao Tong University, China)
</li><br> -->
<li><b>FDataCollector: A Blockchain Based Friendly Web Data Collection System </b><br>
Jing Wang, Weiping Zhu, Jianqiao Lai, Zhu Wang (Wuhan University, China)
</li><br>
<li><b>Mobile Unattended-Operation Detector for Bulk Dangerous Goods Handling </b><br>
Nicola Zingirian (University of Padova, Italy), Federico Botti (Click & Find s.r.l, Italy)
</li><br>
<li><b>The Design and Implementation of an Efficient Quaternary Network Flow Watermark Technology</b><br>
Lusha Mo, Gaofeng Lv, Baosheng Wang, Guanjie Qiao, Jing Tan (National University of Defense Technology, China)
</li><br>
<!-- <li><b>Traffic Scheduling Algorithm Based on SDN Data Center Network Adapting to Bandwidth Resource</b><br>
Yajie Zuo, Shukui Zhang, Yang Zhang, Li Zhang, Hao Long (Soochow University, China)
</li><br> -->
<li><b>TSCF: An Efficient Two-Stage Cuckoo Filter for Data Deduplication </b><br>
Tao Liu (Peking University, China), Qinshu Chen (Guangdong Communications & Networks Institute, China), Hui Li, Bohui Wang, Xin Yang (Peking University, China)
</li><br>
</ol>
<b><h3 style="color:#005f98 !important">2nd International Workshop on Ubiquitous Electric Internet of Things (UEIoT)</h3></b>
<ol>
<!-- <li><b>A Novel Joint Prediction Model of Atmospheric Attenuation for Co-Frequency Interference Analysis Between LEO Constellations </b><br>
Sun Degang (University of Chinese Academy of Sciences, China), Geng Jingru, Wang Wen, Liu Yiqing (Institute of Information Engineering, Chinese Academy of Sciences, China)
<br></li> -->
<li><b>A Secure And High Concurrency SM2 Cooperative Signature Algorithm For Mobile Network</b><br>
Wenfei Qian, Pingjian Wang, Lingguang Lei, Tianyu Chen, Bikuan Zhang (State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, China)
<br></li>
<!-- <li><b>An efficient WSN Localization Scheme using the Improved Chaos-GBO algorithm </b><br>
Mohammed Amin Khelifa (Mouloud Mammeri University of Tizi-Ouzou (UMMTO), Algeria), Badis Lekouaghet, Abdelkrim Boukabou (Jijel University, Algeria)
<br></li> -->
<li><b>On Firefly Synchronization of Sleep Phases in Energy Efficient Meshed Networks </b><br>
Guido Dietl (Landshut University of Applied Sciences, Germany)
<br></li>
<li><b>Power information integrated display system based on interconnection technology </b><br>
Xiazhe Tu, Chao Xun, Xiangyu Wu, Jinbo Li, Lingyi Yang (Economic and Technological Research Institute State Grid Fujian Electric Power Co., Ltd, China)
<br></li>
<li><b>Research and Application of Intelligent Distribution Network Planning for Multi-source Data Fusion</b><br>
Zhe Wang, Hongda Zhao, Mingxia Zhu (Economic and Technological Research Institute of State Grid Jiangsu Electric Power Co., Ltd, China)
<br></li>
<li><b>Research on Visual Engine of Smart Planning System Based on Internet of Things </b><br>
Hongda Zhao, Mingxia Zhu, Zhe Wang (Economic and Technological Research Institute of State Grid Jiangsu Electric Power Co., Ltd, China)
<br></li>
</ol>
<b><h3 style="color:#005f98 !important">3rd International Workshop on Artificial Intelligence Applications in Internet of Things (AI2OT)</h3></b>
<ol>
<!-- <li><b>A Routing Path Contribution Aware Malicious Node Detection Framework Against Internal attacks in IoT Networks </b><br>
Xiangyu Xu, Liang Liu, Zuchao Ma, Yulei Liu (Nanjing University of Aeronautics and Astronautics, China)
</li><br> -->
<li><b>Eaxming and Evaluating Dimension Reduction Algorithms for Classifying Alzheimer’s Diseases using Gene Expression Data </b><br>
Shunbao Li, Po Yang, Vitaveska Lanfranchi (University of Sheffield, UK), Alzheimer’s Disease Neuroimaging Initiative
</li><br>
<li><b>LSTM for Periodic Broadcasting in Green IoT Applications over Energy Harvesting Enabled Wireless Networks: Case Study on ADAPCAST </b><br>
Mustapha Khiati (USTHB, Algeria), Djamel Djenouri (University of the West of England - UWE Bristol, UK), Jianguo Ding (University of Skovde, Sweden), Youcef Djenouri (SINTEF Digital, Norway)
</li><br>
<li><b>MsfNet: a novel small object detection based on multi-scale feature fusion </b><br>
Ziying Song (Hebei University of Science and Technology, China), Peiliang Wu (Yanshan University, China), Kuihe Yang, Yu Zhang, Yi Liu (Hebei University of Science and Technology, China)
</li><br>
<!-- <li><b>Simultaneous Charger Placement and Power Scheduling for On-Demand Provisioning of RF Wireless Charging Service </b><br>
Huatong Jiang, Yanjun Li, Meihui Gao (Zhejiang University of Technology, China)
</li><br> -->
<li><b>Under-determined Blind Speech Separation via the Convolutive Transfer Function and Lp Regularization </b><br>
Liu Yang (Guangzhou University, China), Yang Junjie (Guangdong University ot Technology, China), Yi Guo (Western Sydney University, Australia)
</li><br>
</ol>
<b><h3 style="color:#005f98 !important">3rd International Workshop on Edge Computing and Artificial Intelligence based Sensor-Cloud System (ECAISS)</h3></b>
<ol>
<!-- <li><b>An Analysis of Blockchain-based Smart Contract Vulnerabilities- A Survey </b><br>
Arwa Ahmed Noman Alabsi, Chunping Wang, Hongbing Cheng (Zhejiang University of Technology, China)
</li><br> -->
<li><b>Continus Finger Tracking System based on Inertial Sensor </b><br>
Yangyang Fang, Qun Fang, Xin He (Anhui Normal University, China)
</li><br>
<!-- <li><b>Edge Caching Method of Internet of Vehicles Based on Multi-agent Deep Reinforcement Learning</b><br>
Degan Zhang, Jinyu Du (Tianjin University of Technology, China), Jie Zhang (Beijing Jiaotong University, China), Ting Zhang, Chun Yang (Tianjin University of Technology, China), Guoqiang Mao (School of Computing and Communications and Center for Real-Time Information Networks, China)
</li><br> -->
<!-- <li><b>Edge DDoS attack detection method based on software defined network </b><br>
Gangsheng Ren (Soochow University, China)
</li><br> -->
<!-- <li><b>End-Edge Cooperative Scheduling Strategy Based on Software-Defined Networks </b><br>
Fan Li, Ying Qiao, Juan Luo, Luxiu Yin, Xin Fan (Engineering Hunan University Changsha, China)
</li><br> -->
<li><b>Sequence-based Indoor Relocalization for Mobile Augmented Reality </b><br>
Kun Wang (Liaoning Police College, China), Jiaxing Che (Beihang University, China), Zhejun Shen (UnionSys Technology Co. Ltd, China)
</li><br>
<li><b>Toward Dispersed Computing: Cases and State-of-The-Art </b><br>
Sen Yuan, Geming Xia, Jian Chen, Chaodong Yu (National University of Defense Technology, China)
</li><br>
<li><b>Trust Evaluation of Computing Power Network Based on Improved Particle Swarm Neural Network</b><br>
Chaodong Yu, Geming Xia, Zhaohang Wang (National University of Defense Technology, China)
</li><br>
</ol>
<b><h3 style="color:#005f98 !important">3rd International Workshop on Network Meets Intelligent Computations (NMIC)</h3></b>
<ol>
<li><b>A DDoS protection method based on traffic scheduling and scrubbing in SDN </b><br>
Yiwei Yu, Guang Cheng, Zihan Chen, Haoxuan Ding (Southeast University, China)
</li><br>
<li><b>Adaptive Distributed Beacon Congestion Control with MachineLearning in VANETs </b><br>
Mahboubeh Mohammadi (Iran University of Science and Technology, Iran), Ali Balador (RISE Research Institute of Sweden, Sweden), Zaloa Fernandez (Vicomtech Foundation, Basque Research and Technology Alliance (BRTA), Spain), Iñaki Val (Ikerlan Technology Research Centre, Spain)
</li><br>
<li><b>AND: Effective Coupling of Accuracy, Novelty and Diversity in the Recommender System </b><br>
Di Han (Guangdong University of Finance, China), Yifan Huang, Xiaotian Jing, Junmin Liu (Xi'an Jiaotong University, China)
</li><br>
<li><b>Attention-based Bicomponent Synchronous Graph Convolutional Network for traffic flow prediction</b><br>
Cheng Shen, Kai Han, Tianyuan Bi (University of Science and Technology of China, China)
</li><br>
<!-- <li><b>CC-Print: A Device Fingerprinting Method Based on Contextual and Content Features in Smart Grid</b><br>
Zhongfeng Jin, Nan Li, Chao Liu, Meimei Li, Shaohua An, Weiqing Huang (Institude of Information Engineering, Chinese Academy of Sciences, China)
</li><br> -->
<li><b>Intelligent IDS Chaining for Network Attack Mitigation in SDN </b><br>
Mikhail Zolotukhin, Pyry Kotilainen, Timo Hämäläinen (University of Jyväskylä, Finland)
</li><br>
<li><b>Interference and Consultation in Virtual Public Space: The Practice of Intermedia Art in Metaverse</b><br>
Rongman Hong (Guangzhou Academy of Fine Arts, China), Hao He (The Chinese University of Hong Kong, Shenzhen, China)
</li><br>
<li><b>Large-Area Human Behavior Recognition withCommercial Wi-Fi Devices </b><br>
Tao Liu (The University of Aizu, Japan), Shengli Pan (Beijing University of Posts and Telecommunications, China), Peng Li (The University of Aizu, Japan)
</li><br>
<li><b>Reliable Routing and Scheduling in Time-Sensitive Networks </b><br>
Hongtao Li, Hao Cheng, Lei Yang (South China University of Technology, China)
</li><br>
<li><b>Seshat: Decentralizing Oral History Text Analysis</b><br>
Lin Wang (Guangzhou Academy of Fine Arts, China), Lehao Lin (The Chinese University of Hong Kong, Shenzhen, China), Xiao Wu (White Matrix Inc., China), Rongman Hong (Guangzhou Academy of Fine Arts, China)
</li><br>
<!-- <li><b>Towards More Accurate and Generalized Network Modeling based on Graph Neural Networks with All or Few Links </b><br>
Yinghao Zhu, Waixi Liu, Sen Lin, Junming Luo, Jieming Huang, Zhenzheng Guo, Jinjie Lu (Guangzhou University, China)
</li><br> -->
<!-- <li><b>Traffic Message Channel prediction based on Graph Convolutional Network </b><br>
Ning Li, Shuangcheng Jia, Qian Li (Mogo Auto Intelligence and Telematics Information Technology Co., Ltd., China)
</li><br> -->
</ol>
<b><h3 style="color:#005f98 !important">Poster Track</h3></b>
<ol>
<!-- <li><b>A Two-Stage Deanonymization Attack Towards Bitcoin Hidden Service Nodes </b><br>
Yue Gao (University of Chinese Academy of Sciences, China), Jinqiao Shi (Beijing University of Posts and Telecommunications, China), Xuebin Wang (University of Chinese Academy of Sciences, China)
</li><br> -->
<li><b>Demonstrator Game Showcasing Indoor Positioning via BLE Signal Strength </b><br>
Felix Beierle (University of Würzburg, Germany), Hai Dinh-Tuan, Yong Wu (Technische Universität Berlin, Germany)
</li><br>
<li><b>Indoor Navigation for Users with Mobility Aids Using Smartphones and Neighborhood Networks</b><br>
Bo Hui, Chen Jiang, Pavani Ankireddy (Auburn University, USA), Wenlu Wang (Texas A&M University-Corpus Christi (TAMUCC), USA), Wei-Shinn Ku (Auburn University, USA)
</li><br>
<li><b>L-KPCA: an efficient feature extraction method for network intrusion detection </b><br>
Jinfu Chen, Shang Yin, Saihua Cai, Lingling Zhao, Shengran Wang (Jiangsu University, China)
</li><br>
<li><b>Optimizing microservices with hyperparameter optimization </b><br>
Hai Dinh-Tuan, Katerina Katsarou, Patrick Herbke (Technische Universität Berlin, China)
</li><br>
</ol>
<br><br><br><br><br><br>
</div>
<div class="ui-block-b" style="width:30%;height:100%;background-color:#e4e5e6;padding:20px 15px 15px 15px">
<h1>News</h1>
<?php
include("include/news.php")
?>
<h1>Important Days</h1>
<?php
include("include/dates.php")
?>
</div>
</div>
<?php include ("include/footer.php"); ?>