September 13, 2020 |
September 14, 2020 |
September 15, 2020 |
[8:30 AM] to [8:50 AM] Opening Remarks [8:50 AM] to [9:50 AM] Keynote I: Prof. Xuemin Lin |
[8:30 AM] to [9:30 AM] Keynote III: Prof. Ness B. Shroff |
[8:30 AM] to [9:50 AM] Session 16: IoT and Edge Computing II Session 17: Various Applications Session 18: Visual Computing for IoT |
[9:50 AM] to [10:50AM] Keynote II: Prof. Qian Zhang |
[9:30 AM] to [10:30 AM] Keynote IV: Prof. Zhi Tian |
[9:50 AM] to [10:00 AM] Break |
[10:50AM] to [11:00 AM] Break |
[10:30 AM] to [10:40 AM] Break |
[10:00 AM] to [11:00 AM] Session 19: Mobile Ad-Hoc Networks I Session 20: Mobile Ad-Hoc Networks II Session 21: Cognitive Radio Networks |
[11:00 AM] to [12:20 PM] Session 1: Wireless Communications Session 2: Blockchain I Session 3: Algorithms |
[10:40 AM] to [12:00 AM] Session 10: Blockchain III Session 11: Security II
|
|
[14:00 PM] to [15:20 PM] Session 4: IoT and Edge Computing I Session 5: Scheduling & Optimization Session 6: Security I |
[14:00 PM] to [15:20 PM] Session 12: Wireless Sensor Networks Session 13: Crowdsensing |
|
[15:20 PM] to [15:40 PM] Break |
[15:20 PM] to [15:40 PM] Break |
|
[15:40 PM] to [17:00 PM] Session 7: Blockchain II Session 8: Data Center Networks and Cloud Computing Session 9: Privacy-Aware Computing |
[15:40 PM] to [17:00 PM] Session 14: Location-Based Computing and Services Session 15: Internet of Vehicles |
|
September 13, 2020 |
|
[8:30 AM] to [8:50 AM] |
Opening Remarks |
[8:50 AM] to [9:50 AM] |
Keynote I: Prof. Xuemin Lin |
[9:50 AM] to [10:50AM] |
Keynote II: Prof. Qian Zhang |
[10:50 AM] to [11:00 AM] |
Break |
[11:00 AM] to [12:20 PM] |
Technical Sessions |
Session 1: Wireless Communications |
Capacity Analysis of Ambient Backscatter System with Bernoulli Distributed Excitation Pengfei Li, Xin He, Nikolaos M. Freris and Panlong Yang A Social Relationship Enabled Cooperative Jamming Scheme for Wireless Communications Jingjing Fan, Yan Huo, Qinghe Gao and Tao Jing The Throughput Optimization for Multi-hop MIMO Networks Based on Joint IA and SIC Peng Zhang, Xu Ding, Jing Wang, Zengwei Lyu and Lei Shi Research on 5G Internet of Vehicles Facilities based on Coherent Beamforming Juan Xu, Lan Wu, Lei Shi, Yi Shi and Wenwen Zhou |
Session 2: Blockchain I |
A Novel Blockchain Network Structure Based on Logical Nodes Jiancheng Chi, Tie Qiu, Chaokun Zhang and Laiping Zhao Sync or Fork: Node-Level Synchronization Analysis of Blockchain Qin Hu, Minghui Xu, Shengling Wang and Shaoyong Guo Verifiable Encrypted Search with Forward Secure Updates for Blockchain-based System Han Li, Hongliang Zhou, Hejiao Huang and Xiaohua Jia Blockchain-based Privacy-preserving Dynamic Spectrum Sharing Zhitian Tu, Kun Zhu, Changyan Yi and Ran Wang |
Session 3: Algorithms |
Approximation Algorithm for the Offloading Problem in Edge Computing Xinxin Han, Guichen Gao, Li Ning, Yang Wang and Yong Zhang Maximizing The Expected Influence in Face of The Non-Progressive Adversary T-H. Hubert Chan, Li Ning and Yong Zhang Can the Max-Min Fair Allocation be Trustful in a Centralized Resource System? Zheng Chen, Zhaoquan Gu and Yuexuan Wang Multiset Synchronization with Counting Cuckoo Filters Shangsen Li, Lailong Luo, Deke Guo and Yawei Zhao |
[14:00 PM] to [15:20 PM] |
Technical Sessions |
Session 4: IoT and Edge Computing I |
Quality of Service Optimization in Mobile Edge Computing Networks via Deep Reinforcement Learning Li-Tse Hsieh, Hang Liu, Yang Guo and Robert Gazda Multi-user Cooperative Computation Offloading in Mobile Edge Computing Wei Jiang, Molin Li, Xiaobo Zhou, Wenyu Qu and Tie Qiu Privacy-Aware Online Task Offloading for Mobile-Edge Computing Ting Li, Haitao Liu, Jie Liang, Hangsheng Zhang, Liru Geng and Yinlong Liu A Survey: Applications of Blockchains in the Internet of Vehicles Chao Wang, Xiaoman Cheng, Jitong Li, Yunhua He and Ke Xiao |
Session 5: Scheduling & Optimization |
Multi-Job Associated Task Scheduling based on Task Duplication and Insertion for Cloud Computing Yuqi Fan, Lunfei Wang, Jie Chen, Zhifeng Jin, Lei Shi and Juan Xu OSCD: An Online Charging Scheduling Algorithm to Optimize Cost and Smoothness Yanhua Cao, Shiyou Qian, Qiushi Wang, Hanwen Hu, Weidong Zhu, Jian Cao, Guangtao Xue, Yanmin Zhu and Minglu Li Optimal Node Placement for Magnetic Relay and MIMO Wireless Power Transfer Network Yubin Zhao, Junjian Huang, Xiaofan Li and Cheng-Zhong Xu A Real-time Recommendation Algorithm for Task Allocation in Mobile Crowd Sensing Guisong Yang, Yanting Li, Yan Song, Jun Li, Xingyu He, Linghe Kong and Ming Liu |
Session 6: Security I |
Outsourced Multi-Authority ABE with White-box Traceability for Cloud-IoT Suhui Liu, Jiguo Yu, Chunqiang Hu and Mengmeng Li Deep Learning Enabled Quickest Detection of Identity Spoofing Attacks Yongxin Liu, Jian Wang, Shuteng Niu and Houbing Song An improved parallel network traffic anomaly detection method based on Bagging and GRU Xiaoling Tao, Yang Peng, Feng Zhao, Sufang Wang and Ziyi Liu A Secure Topology Control Mechanism for SDWSNs Using Identity-based Cryptography Rui Wang, Donglan Liu, Jianfei Chen, Lei Ma, Xin Liu and Hao Zhang |
[15:20 PM] to [15:40 PM] |
Break |
[15:40 PM] to [17:00 PM] |
Technical Sessions |
Session 7: Blockchain II |
A Novel Anti-attack Revenue Optimization Algorithm in the Proof-of-work based Blockchain Hao Chen, Yourong Chen, Meng Han, Banteng Liu, Qiuxia Chen and Zhenghua Ma HotDAG: Hybrid Consensus via Sharding in the Permissionless Model Chunxuan Zhou, Qiang-Sheng Hua and Hai Jin C-DAG: Community-assisted DAG Mechanism with High throughput and Eventual Consistency Zhujun Zhang, Dali Zhu and Baoxin Mi Consensus in Wireless Blockchain System Qiang Xu, Yifei Zou, Dongxiao Yu, Minghui Xu, Shikun Shen and Feng Li |
Session 8: Data Center Networks and Cloud Computing |
Joint Server Selection and SFC Routing for Anycast in NFV-enabled SDNs Huaqing Tu, Hongli Xu, Liusheng Huang, Xuwei Yang and Da Yao Multi-objective disaster backup in inter-datacenter using reinforcement learning Jiaxin Yan, Hua Wang, Xiaole Li, Shanwen Yi and Yao Qin Data integrity checking supporting reliable data migration in cloud storage Changsong Yang, Xiaoling Tao, Sufang Wang and Feng Zhao Joint Switch Upgrade and VNF Placement for NFV-Based SDNs Minli Zhang, Hongli Xu, Xingpeng Fan, Da Yao and Liusheng Huang |
Session 9: Privacy-Aware Computing |
Communication-Efficient and Privacy-Preserving Protocol for Computing Over-Threshold Set-Union Xuhui Gong, Qiang-Sheng Hua and Hai Jin K-Anonymous Privacy Preserving Scheme Based on Bilinear Pairings over Medical Data Linghang Meng, Xueshu Hong, Yingwen Chen, Yuke Ding and Chengzhuo Zhang CPBA: An Efficient Conditional Privacy-preserving Batch Authentication Scheme for VANETs Jieyao Xu, Dongmei Zhang, Gaoyuan Xiong and Han Zhang LPE-RCM: Lightweight Privacy-Preserving Edge-Based Road Condition Monitoring for VANETs Yan Xu, Meng Wang, Jie Cui, Jing Zhang and Hong Zhong |
September 14, 2020 |
|
[8:30 AM] to [9:30 AM] |
Keynote III: Prof. Ness B. Shroff |
[9:30 AM] to [10:30 AM] |
Keynote IV: Prof. Zhi Tian |
[10:30 AM] to [10:40 AM] |
Break |
[10:40 AM] to [12:00 AM] |
Technical Sessions |
Session 10: Blockchain III |
A Blockchain-Based Decentralized Public Auditing Scheme for Cloud Storage Ying Wang, Conghao Ruan and Chunqiang Hu A Blockchain based Privacy-Preserving Cloud Service Level Agreement Auditing Scheme Ke Xiao, Ziye Geng, Yunhua He, Gang Xu, Chao Wang and Wei Cheng Blockchain-based Service Recommendation Supporting Data Sharing Biwei Yan, Jiguo Yu and Yue Wang A Blockchain-Based Privacy-Preserving Mechanism for Attribute Matching in Social Networks Feihong Yang, Yuwen Pu, Chunqiang Hu and Yan Zhou |
Session 11: Security II |
A New Fully Homomorphic Signatures from Standard Lattices Yukun Wang and Mingqiang Wang Detecting Internet-scale NATs for IoT Devices Based on Tri-net Zhaoteng Yan, Nan Yu, Hui Wen, Zhi Li, Hongsong Zhu and Limin Sun An Adversarial Learning Model for Intrusion Detection in Real Complex Network Environments Ying Zhong, Yiran Zhu, Zhiliang Wang, Xia Yin, Xingang Shi and Keqin Li VES: A Component Version Extracting System for Large-Scale IoT Firmwares Xulun Hu, Hong Li, Yan Hu, Zhaoteng Yan, Xiyue Wang, Limin Sun and Weidong Zhang |
[14:00 PM] to [15:20 PM] |
Technical Sessions |
Session 12: Wireless Sensor Networks |
Learning-Aided Mobile Charging for Rechargeable Sensor Networks Xinpeng Duan, Feng Li, Dongxiao Yu, Huan Yang and Hao Sheng A Class Incremental Temporal-Spatial Model Based on Wireless Sensor Networks for Activity Recognition Xue Li, Xiandong Si, Lanshun Nie and Dechen Zhan Sensor Deployment for Composite Event Monitoring in Battery-free Sensor Networks Ke Lin and Jianzhong Li Distributed Data Aggregation in Dynamic Sensor Networks Yifei Zou, Minghui Xu, Yicheng Xu, Yong Zhang, Bei Gong and Xiaoshuang Xing |
Session 13: Crowdsensing |
Incentive Mechanism for Socially-Aware Mobile Crowdsensing: A Bayesian Stackelberg Game Jiangtian Nie, Jun Luo, Zehui Xiong, Dusit Niyato, Ping Wang and Yang Zhang An Efficient Malicious User Detection Mechanism for Crowdsensing System Xiaocan Wu, Yu-E Sun, Yang Du, Xiaoshuang Xing, Guoju Gao and He Huang A Reliable Multi-task Allocation Based on Reverse Auction for Mobile Crowdsensing Junlei Xiao, Peng Li and Lei Nie A Novel Solution to Quality of Service Dilemma in Crowdsourcing Systems Rui Zhang, Hui Xia, Ju-Fu Cui and Xiang-Guo Cheng |
[15:20 PM] to [15:40 PM] |
Break |
[15:40 PM] to [17:00 PM] |
Technical Sessions |
Session 14: Location-Based Computing and Services |
A Trajectory-Privacy Protection Method based on Location Similarity of Query Destinations in Continuous LBS Queries Lu Zhang, Saide Zhu, Fengyin Li, Ruinian Li, Jing Meng and Wei Li From When to Where: A Multi-task Learning Approach for Next Point-of-Interest Recommendation Jinwen Zhong, Can Ma, Weiping Wang and Jiang Zhou Attention-based Dynamic Preference Model for Next Point-of-Interest Recommendation Chenwang Zheng and Dan Tao Virtual Location Generation for Location Privacy Protection in VANET Zhihong Li, Xiaoshuang Xing, Gaofei Sun, Zhenjiang Qian and Jin Qian |
Session 15: Internet of Vehicles |
A Deep Spatial-Temporal Network for Vehicle Trajectory Prediction Zhiqiang Lv, Jianbo Li, Chuanhao Dong and Wei Zhao A Real-time Vehicle Logo Detection Method Based on Improved YOLOv2 Kangning Yin, Shaoqi Hou, Ye Li, Guangqiang Yin and Chao Li Estimation of Short-term Online Taxi Travel Time Based on Neural Network Liping Fu, Jianbo Li, Zhiqiang Lv, Ying Li and Qing Lin On-Road Vehicle Detection Algorithm Based on Mathematical Morphology Wei Chen, Zusheng Zhang, Xiaoling Wu and Jianguang Den |
September 15, 2020 |
|
[8:30 AM] to [9:50 AM] |
Technical Sessions |
Session 16: IoT and Edge Computing II |
Reliable Visible Light-Based Underground Localization Utilizing a New Mechanism: Reverse Transceiver Position Mingzhi Pang, Kuiyuan Zhang, Xu Yang, Yuqing Yin, Shouwan Gao and Pengpeng Chen Adaptive Task Scheduling via End-Edge-Cloud Cooperation in Vehicular Networks Hualing Ren, Kai Liu, Penglin Dai, Yantao Li, Ruitao Xie and Songtao Guo EdgeCC: An authentication framework for the fast migration of edge services under mobile clients Zhihui Zhao, Weizhong Wang, Hongsong Zhu, Hong Li, Limin Sun, Sen Zhao and Yan Hu GaitID: Robust Wi-Fi Based Gait Recognition Yi Zhang, Yue Zheng, Guidong Zhang, Kun Qian, Chen Qian and Zheng Yang |
Session 17: Various Applications |
Reliable Potential Friends Identification Based on Trust Circuit for Social Recommendation. Shuo Zhang and Zhu Jinghua Reinforcement Learning based Group Event Invitation Algorithm Chunyu Ai, Wei Zhong and Longjiang Guo SDTCNs: A Symmetric Double Temporal Convolutional Network for Chinese NER Wei Jiang, Yuan Wang and Yan Tang SEM: App Usage Prediction with Session-based Embedding Zepeng Yu, Wenzhong Li, Pinhao Wang and Sanglu Lu |
Session 18: Visual Computing for IoT |
Optimizing Motion Estimation With an ReRAM-based PIM Architecture Bing Liu, Zhaoyan Shen, Zhiping Jia and Xiaojun Cai Camera Style Guided Feature Generation for Person Re-Identification Hantao Hu, Yang Liu, Kai Lv, Yanwei Zheng, Wei Zhang and Hao Sheng A Dual Scale Matching Model For Long-Term Association Zhen Ye, Yubin Wu, Shuai Wang, Yang Zhang, Yanbing Chen and Hao Sheng Non-pre-trained Mine Pedestrian Detection Based on Automatic Generation of Anchor box Xing Wei, Changguang Wang, Haitao Zhang, Shaofan Liu and Yang Lu |
[9:50 AM] to [10:00 AM] |
Break |
[10:00 AM] to [11:00 AM] |
Technical Sessions |
Session 19: Mobile Ad-Hoc Networks I |
Dynamic Distribution Routing Algorithm Based on Probability for Maritime Delay Tolerant Networks Xuerong Cui, Tong Xu, Juan Li, Meiqi Ji, Qiqi Qi and Shibao Li Trajectory-based Data Delivery Algorithm in Maritime Vessel Networks based on Bi-LSTM Chao Liu, Yingbin Li, Ruobing Jiang, Qian Lu and Zhongwen Guo Research on Algorithms for Finding Top-k Nodes in Campus Collaborative Learning Community under Mobile Social Network Guohui Qi, Peng Li, Hong Liu, Longjiang Guo, Lichen Zhang, Xiaoming Wang and Xiaojun Wu |
Session 20: Mobile Ad-Hoc Networks II |
Cold start and Learning Resource Recommendation Mechanism Based on Opportunistic network in the context of campus collaborative learning Hong Liu, Peng Li, Yuanru Cui, Qian Liu, Lichen Zhang, Longjiang Guo, Xiaojun Wu and Xiaoming Wang Implementation of Video Transmission over Maritime Ad Hoc Network Hua Xiao, Ying Wang, Shulong Peng and Bin Lin Cluster-based Basic Safety Message Dissemination in VANETs Lin Chen, Xiaoshuang Xing, Gaofei Sun, Jiang Xu and Jie Zhang |
Session 21: Cognitive Radio Networks |
On-Line Learning-Based Allocation of Base Stations and Channels in Cognitive Radio Networks Zhengyang Liu, Feng Li, Dongxiao Yu, Holger Karl and Hao Sheng Beamforming for MISO Cognitive Radio Networks Based on Successive Convex Approximation Ruina Mao, Anming Dong and Jiguo Yu Intelligent Dynamic Spectrum Access for Uplink Underlay Cognitive Radio Networks Based on Q-Learning Jing-Jing Zhang, Anming Dong and Jiguo Yu |