Navigation

Program


Please refer to this WASA program excel.
Date Time Program Location
2024/6/20 15:00-18:00 Register / Sign-insign-in Hall
18:00-19:00 Dinner Buffet area
2024/6/21 8:30-9:00 Opening Jinjialing Ballroom1+2
9:00-9:50 Keynote 1, Speaker: Rajiv Ranjan, Newcastle University
9:50-10:10 Coffee break
10:10-11:00 Keynote 2, Speaker: Gang Qu, University of Maryland
11:00-11:50 Keynote 3, Speaker: Xue Xiao, Inspur Cloud Information Technology Co., Ltd.
12:00-13:00 Lunch Jinjialing Ballroom3+4
14:00-14:50 Keynote 4, Speaker: Jie Wu, Temple University Jinjialing Ballroom1+2
14:50-15:40 Keynote 5, Speaker: TBD
15:40-15:50 Coffee break
15:50-16:40 Keynote 6, Speaker: My Thai, University of Florida
16:40-17:30 Keynote 7, Speaker: Falko Dressler, TU Berlin
18:00-20:00 Banquet Jinjialing Ballroom3+4
2024/6/22 8:30-10:00 Session A-1: Wireless communications and positioning technology Taishan Function Room, Floor 3
Invited Talk: Autonomous Robotics with Cross-Modal Reasoning
Speaker: Shaoen Wu, Kennesaw State University
FEKNN: A Wi-Fi Indoor Localization Method Based on Feature Enhancement and KNN
Jingqi Wang (Central China Normal University); Jinming Yang (University of Chinese Academy of Sciences); Bowen Li (Chinese Academy of Sciences); Weiliang Meng (University of Chinese Academy of Sciences); Jiguang Zhang (University of Chinese Academy of Sciences); Xiaopeng Zhang (University of Chinese Academy of Sciences)
Smartphone Indoor Fusion Localization with Trust Region-Based Magnetic Matching
Yu Zhu (Wuhan University); Yan Jia (China Telecom Group Co., Ltd.); Kaiyi Zou (Wuhan University); Xiaoguang Niu (Wuhan University)
Enhancing Network Performance Measurement Through Orchestration
Alamin Mohammed (University of Notre Dame); Lixing Song (Rose-Hulman Institute of Technology); Aaron Striegel (University of Notre Dame)
10:00-10:30 Coffee break  
10:30-12:00 Session A-2: Network optimization and communications security Taishan Function Room, Floor 3
Multi-agent Deep Reinforcement Learning-based UAV-enable NOMA Communication Networks Optimization
Xin Dai (Beijing Information Science and Technology University); Xin Chen (Beijing Information Science and Technology University); Libo Jiao (Beijing Information Science and Technology University); Xueqi Ren (Beijing Information Science and Technology University); Zhe Dong (Beijing Information Science and Technology University)
BufferConcede: Conceding Buffer for RoCE Traffic in TCP/RoCE Mix-Flows
Lingxuan Meng (Nanjing University of Posts and Telecommunications); Weibei Fan (Nanjing University of Posts and Telecommunications); Fu Xiao (Nanjing University of Posts and Telecommunications); Mengjie Lv (Nanjing University of Posts and Telecommunications); Lei Han (Nanjing University of Posts and Telecommunications); Xiaoyan Li (Fuzhou University)
An Effective Cooperative Jamming-based Secure Transmission Scheme for a Mobile Scenario
Haidong Huang (Beijing Jiaotong University); Yan Huo (Beijing Jiaotong Univeristy); Qinghe Gao (Beijing Jiaotong University); tao jing (Beijing Jiaotong University); Zhiwei Yang (Tianjin Hailiang Information Technology CO,LTD.)
ID-Gait: Fine-grained Human Gait State Recognition using Wi-Fi Signal
Min Yao (Shandong Normal University); Liyang Zhang (Shandong Normal University); Ran Lai (Shandong Normal University); Mingda Han (Shandong University); linlin guo (Shandong Normal University); Jia Zhang (Shandong Normal University); Jiande Sun (Shandong Normal University)
Anti-Packet-Loss Encrypted Traffic Classification via Masked Autoencoder
Chen Yang (Chinese Academy of Sciences); Li Guo (CAS); Zheyuan Gu (Chinese Academy of Sciences); Gaopeng Gou (CAS); Xinjie Lin (Chinese Academy of Sciences); gang xiong (Chinese Academy of Sciences); Yangyang Guan (Chinese Academy of Sciences)
12:00-13:00 Lunch  
14:00-15:30 Session A-3: Wireless Sensor Networks and IoT Innovation Taishan Function Room, Floor 3
Graph Transformer Hawkes Processes for Causal Structure learning in Telecom Networks
Shiwei Yin (Qingdao university); Ying Li (Qingdao university); Jiandong Wang (Qingdao University); Yu Kong (Qingdao University)
Design of Maritime End-to-End Autoencoder Communication System Based on Compressed Channel Feedback
Xiaoling Han (Dalian Maritime University); Bin Lin (Dalian Maritime University); shuai shao (Dalian Maritime University); Nan Wu (Dalian Maritime University)
ZigRa: Physical-layer Cross-Technology Communication from ZigBee to LoRa
Demin Gao (Nanjing Forestry University); ou li yuan (Nanjing Forestry University); Yongrui Chen (University of Chinese Academy of Sciences); Ye Liu (Nanjing Agricultural University); Qing Yang (University of North Texas)
Wireless Portable Dry Electrode Multi-channel sEMG Acquisition System
Bin Gao (Qilu University of Technology); Yubing Han (Qilu University of Technology); You Zhou (Shandong Haikan New Media Research Institute); Jiguo Yu (Qilu University of Technology); Sufang Li (Qilu University of Technology); Anming Dong (Qilu Univeristy of Technology)
A Double Layer Consensus Optimization Mechanism in DAG-based Blockchain for Carbon Trading
Yu Song (Beijing University of Posts and Telecommunications); ao xiong (Beijing University of Posts and Telecommunications); Dong Wang (State Grid Digital Technology Holding Co. LTD); Da Li (State Grid Digital Technology Holding Co. LTD); Xiaokang Liu (State Grid Jiangsu Electric Power Co. LTD); Hui Shi (State Grid Jiangsu Electric Power Co. LTD); Qinglei Guo (State Grid Digital Technology Holding Co. LTD)
15:30-16:00 Coffee break  
16:00-17:30 Session A-4: Network security, privacy and data sharing Taishan Function Room, Floor 3
Probabilistic offloading algorithm for opportunistic networks integrating node influence prediction
Qi Tang (Inner Mongolia University); GANG XU (INNER MONGOLIA UNIVERSITY); Shuai Li (INNER MONGOLIA UNIVERSITY)
Secret Sharing Based Key Agreement Protocol for Body Area Networks
Weihong Sheng (Chongqing Univeristy); Bin Cai (Chongqing University); Chunqiang Hu (Chongqing University); Ruinian Li (Bowling Green State University)
Active Detection Based NTP Device Attribute Detection
Yilun Liu (Wuhan University); Weiping Zhu (Wuhan University)
Cyber Sentinel: Fortifying Voice Assistant Security with Biometric Template Integration in Neural Networks
Yao Wang (Xidian University); Ping Cao (Xidian University); Zhipeng Si (Xidian University); Pin Lyu (Northwestern Polytechnical University); Haibin Zhang (Xidian University)
Traceable Health Data Sharing Based-on Blockchain
Taochun Wang (Anhui Normal University); Sijie Shen (Anhui Normal University); Qingshan Wu (Anhui Normal University); Fulong Chen (Anhui Normal University); Peng Hu (Anhui Normal University); Chuanxin Zhao; Shuhan Wan (Anhui Normal University)
18:00-19:00 Dinner Jinjialing Ballroom 3+buffet area
2024/6/22 8:30-10:00 Session B-1: Machine Learning and AI Applications Laoshan Function Room, Floor 3
KD-Eye: Lightweight Pupil Segmentation for Eye Tracking on VR Headsets via Knowledge Distillation
Yanlin Li (Shandong University); Ning Chen (Shandong University); Guangrong Zhao (Shandong University); Yiran Shen (Shandong University)
Meta-RFF: Few-Shot Open-Set Incremental Learning for RF Fingerprint Recognition via Multi-phase Meta Task Adaptation
Taotao Li (Zhejiang University of Technology); Zhenyu Wen (Zhejiang University of Technology); Yuting Jiang (Zhejiang University of Technology); Jian Wang (Zhejiang University of Technology); Jie Su (Zhejiang University of Technology); Zhen Hong (Zhejiang University of Technology); Li Yu (Zhejiang University of Technology); Shibo He (Zhejiang University);
Left Ventricular Hypertrophy Detection Algorithm Using Feature Selection and CNN-LSTM
Zhenxing Zhang (Ludong University); Jun Ge (Qfnu Normal University); Yilei Wang (Qfnu Normal University); Zheng Wei (Qfnu Normal University)
Efficient On-Device Training for Lightweight Fall Detection
Shuang Su (Nanjing University of Aeronautics and Astronautics); Xiangmao Chang (Nanjing University of Aeronautics and Astronautics); Yongfeng Shi (Nanjing University of Aeronautics and Astronautics)
Application with Digital Currencies Trading Using Machine Learning
Tengjiao Zheng (The university of Hong Kong); Li Ning (University of Chinese Academy of Science); Yanming Zhao (The university of Hong Kong); Siu Ming Yiu (The University of Hong Kong)
10:00-10:30 Coffee break  
10:30-12:00 Session B-2: Machine Learning and AI Applications Laoshan Function Room, Floor 3
Mobile Crowdsourcing Task Assignment Algorithm Based on ConvNeXt and GRU
Zequn Fan (Yantai University); Qingxian Pan (Yantai University); Zhaolong Gao (Yantai Institute of Technology); Peng Luan (Yantaishan Hospital); kai wei (Yantai university); Jinru Li (Yantai University)
Inferring the Number of Clusters for Radar Emitters via Threshold Segmentation and Information Fusion
Zilong Wu (National University of Defense Technology); Daping Bi (School of Electronic Countermeasures, National University of Defense Technology); Jifei Pan (School of Electronic Countermeasures, National University of Defense Technology)
Enhancing Student Classroom Behavior Detection using Improved SlowFast
Fuzhe Zhao (Central China Normal Unversity); Wen Yang (Central China Normal University); Wenlin Han (California State University, Fullerton)
LV-auth: Lip Motion Fusion for Voiceprint Authentication
Wei Liu (Wuhan University); Xiaojing Zhu (Wuhan University); Qin Liu (Wuhan University); Peng Li (Wuhan University of Science and Technology); Man Zhou (Huazhong University of Science and Technology)
Generative Model-Based Edge-Assisted Object Detection in Bandwidth-Constrained Network
Jiayuan Liu (Sun Yat-sen University); Ke Luo (Sun Yat-sen University); Hao Wang (Sun Yat-sen University); Xu Chen (Sun Yat-sen University)
12:00-13:00 Lunch Jinjialing Ballroom 3+buffet area
14:00-15:30 Session B-3: Graph Learning and Knowledge Discovery Laoshan Function Room, Floor 3
Enhancing Generalized Zero-shot Learning with Dynamic Selective Knowledge Distillation
Weihua Lv (Ocean University of China); Yulong Zheng (Ocean University of China); Chao Liu (Ocean University of China); Yong Du (Ocean University of China)
BehaMiner: System Behavior Mining for Audit Log based on graph learning
Xiu Ma (Institute of Information Engineering, Chinese Academy of Sciences; School of Cyber Security, University of Chinese Academy of Sciences); Xiaoze Liu (Institute of Information Engineering, Chinese Academy of Sciences); Ce Li (Institute of Information Engineering, Chinese Academy of Sciences); Ziyang Yu (Institute of Information Engineering, Chinese Academy of Sciences; School of Cyber Security, University of Chinese Academy of Sciences); Qi Zhang (Institute of Information Engineering, Chinese Academy of Sciences); Qiujian Lv (Institute of Information Engineering, Chinese Academy of Sciences); Yan Wang (Institute of Information Engineering,Chinese Academy of Sciences); Jianguo Jiang (Institute of Information Engineering, Chinese Academy of Sciences)
REHG: A Recommender Engine Based on Heterogeneous Graph
Xiaoyang Xin (Qingdao University); Zesheng Cheng (Qingdao University); mengqiu yan (Qingdao University); Ruixuan Zhao (Qingdao University); Chong Peng (Qingdao University); Jianbo Li (Qingdao University)
Self-Supervised Multi-View Clustering Guided by Multi-Angle Semantic Labels
Yuan Liu (Chengdu University of Information Technology); Junxiu An (Chengdu University of Information Technology); Linwang Yang (Chengdu University of Information Technology)
Step-by-Step and Tailored Teaching: Dynamic Knowledge Distillation
Zhenqiang Zhang (Qilu University of Technology (Shandong Academy of Sciences)); Liting Geng (Qilu University of Technology (Shandong Academy of Sciences)); Wenqing Du (Qilu University of Technology (Shandong Academy of Sciences)); Feng Li (Shandong University); Chunxiao Wang (Qilu University of Technology (Shandong Academy of Sciences)); Zhigang Zhao (SCSC)
15:30-16:00 Coffee break Jinjialing Ballroom 3+buffet area
16:00-17:30 Session B-4: AI Security and Anomaly Detection Laoshan Function Room, Floor 3
TBA-GNN: A Traffic Behavior Analysis Model with Graph Neural Networks for Malicious Traffic Detection
Xinbo Han (Institute of Information Engineering, Chinese Academy of Sciences); Meng Zhang (Institute of Information Engineering, Chinese Academy of Sciences); Zheng Yang (Institute of Information Engineering, Chinese Academy of Sciences)
Enhancing Adversarial Robustness in Automatic Modulation Recognition with Dynamical Systems-Inspired Deep Learning Frameworks
Xiaohu Li (Beijing University of Posts and Telecommunications); Yajian Zhou (Beijing University of Posts and Telecommunications); Hongchao Yan (The 54th Research Institute of China Electronics Technology Group Corporation, HeBei)
E-SAGE: Explainability-based Defense Against Backdoor Attacks on Graph Neural Networks
Dingqiang Yuan (University of Science and Technology of China); Xiaohua Xu (University of Science and Technology of China); Lei Yu (Rensselaer Polytechnic Institute); Tongchang Han (University of Science and Technology of China); Rongchang Li (Zhejiang University); Meng Han (Zhejiang University)
Sophon IDS: Mitigating the Effectiveness of GAN-based Adversarial Attacks via Tailored Misinformation
Zihao Liu (Dalhousie University); Qiang Ye (Dalhousie University); Fangda Cui (Dalhousie University)
An Early Warning Method for Fracturing Accidents Using Joint CNN and LSTM Modeling
Fangxiang Wang (Subsurface Technical Service Branch, Bohai Drilling Engineering Company Limited, China National Petroleum Corporation); Hongbao Tang (Subsurface Technical Service Branch, Bohai Drilling Engineering Company Limited, China National Petroleum Corporation); Long Li (Subsurface Technical Service Branch, Bohai Drilling Engineering Company Limited, China National Petroleum Corporation); Bai Shi (Subsurface Technical Service Branch, Bohai Drilling Engineering Company Limited, China National Petroleum Corporation); Hongtao Cai (Subsurface Technical Service Branch, Bohai Drilling Engineering Company Limited, China National Petroleum Corporation); Yan Sun (Subsurface Technical Service Branch, Bohai Drilling Engineering Company Limited, China National Petroleum Corporation); Cui Xuerong (University of Petroleum)
18:00-19:00 Dinner Jinjialing Ballroom 3+buffet area
2024/6/22 8:30-10:00 Session C-1: Federated Learning and Privacy Meeting Room 5
Defense Strategy in Federated Learning: Unveiling Stealthy Threats and the Similarity Filter Solution
Peng Jiang (Nanjing University of Aeronauticsand Astronautics); Liming Fang (Nanjing University of Aeronautics and Astronautics); Ming Ding (Data61, CSIRO); Lu Zhou (Nanjing University of Aeronautics and Astronautics)
FedScale: A Federated Unlearning Method Mimicking Human Forgetting Processes
Wenshu Huang (Nanjing University of Aeronautics and Astronautics); Huiwen Wu (Zhejiang Lab); Liming Fang (Nanjing University of Aeronautics and Astronautics); Lu Zhou (Nanjing University of Aeronautics and Astronautics)
The Client-level GAN-based Data Reconstruction Attack and Defense in Clustered Federated Learning
Han Wu (Hefei University of Technology); Lei Shi (Hefei University of Technology); Junyu Ye (Hefei University of Technology); Yuqi Fan (Hefei University of Technology); Zengwei Lyu (Hefei University of Technology)
Byzantine-Robust Federated Learning Based on Blockchain
Lihua Song (North China University of Technology); Chenying Cai (North China University of Technology); Shuhua Wei (North China University of Technology); Rochishnu Banerjee (Miami University); Xianglong Feng (Miami University); honglu jiang (Miami University)
FedDue: Optimizing Personalized Federated Learning through Dynamic Update Classifier
Dongrun Li (Qilu University of Technology); Xin Wang (Qilu University of Technology); Yanhan Wang (Qilu University of Technology); Ming Yang (Qilu University of Technology); Xiaoming Wu (Shandong Computer Science Center)
10:00-10:30 Coffee break  
10:30-12:00 Session C-2: Federated Learning and Privacy Meeting Room 5
FedDCT: A Dynamic Cross-Tier Federated Learning Framework in Wireless Networks
Youquan Xian (Guangxi Normal University); Xiaoyun Gan (Guangxi Normal University); Chuanjian Yao (Guangxi Normal University); Dongcheng Li (Guangxi Normal University); Peng Wang (Guangxi Normal University); Peng Liu (Guangxi Normal University); Ying Zhao (Guilin University of Electronic Technology)
FedMQ: Multi-grained Quantization for Heterogeneous Federated Learning
Mei Cao (Shandong University); Tingting Zhang (Shandong University); Bowen Zhang (Shandong University); Jianbo Lu (Shandong University); Zhaoyan Shen (Shandong University); Mengying Zhao (Shandong University)
A Secure and Efficient Privacy Data Aggregation Mechanism
Wenshuo Ma (Zibo Vocational Institutde); Xinru Liu (Weifang Engineering Vocational College); Kan Yu (Macau University of Science and Technology); Chuanwen Luo (Beijing Forestry University); XIaowu Liu (Qufu Normal University)
A Lightweight Method to Survey with Protecting Privacy yet Maintaining Accuracy
Yuxuan Wang (University of Toronto); Xinyu Du (Chongqing University of Technology); Ningbo Liu (China University of Geosciences); Xianchao Zhang (Jiaxing University); Wei Ren (China University of Geosciences)
A Method for Abnormal Detection and Poisoned Data Recovery in Clustered Federated Learning
Lei Shi (Hefei University of Technology); Yingying Chen (Hefei University of Technology)
12:00-13:00 Lunch Jinjialing Ballroom 3+buffet area
14:00-15:30 Session C-3: Federated Learning and Privacy Meeting Room 5
FedDAGC: Dynamic Adaptive Graph Coarsening for Federated Learning on Non-IID Graphs
Chengxi Zhang (Chongqing University); Chunqiang Hu (Chongqing University)
Defending Against Poisoning Attacks in Federated Prototype Learning on Non-IID Data
Jie Zhang (Qilu University of Technology); Hongliang Zhang (Qilu University of Technology); Guijuan Wang (Qilu University of Technology (Shandong Academy of Sciences)); Anming Dong (Qilu Univeristy of Technology)
Federated Learning for Edge Heterogeneous Object Detection Algorithm
Yanxin Hu (Changchun University of Technology); Gang Liu (Changchun University of Technology); Chao Cheng (Changchun University of Technology)
CoR-FHD: Communication-Efficient and Robust Federated Hyperdimensional Computing for Activity Recognition
Yutong Guo (SUN YAT-sen University); Ziwei Zhan (Sun Yat-sen University); Xu Chen (Sun Yat-sen University)
Dynamic Staleness Control for Asynchronous Federated Learning in Decentralized Topology
Qianpiao Ma (Purple Mountain Laboratories); Jianchun Liu (University of Science and Technology of China); Qingmin Jia (Purple Mountain Laboratories); xiaomao zhou (Purple Mountain Laboratories); Yujiao Hu (Purple Mountain Laboratories); Renchao XIE (Beijing University of Posts and Telecommunications)
15:30-16:00 Coffee break  
16:00-17:30 Session C-4: Federated Learning and Privacy Meeting Room 5
Fair and Communication-Efficient Personalized Federated Learning
Yifu Zheng (University of Electronic Science and Technology of China); XU ZHENG (University of Electronic Science and Technology of China); Tingqi Wang (University of Electronic Science and Technology of China); Chong Mu (University of Electronic Science and Technology of China); Nurkhat Zhakiyev (Astana IT University)
Distributed & Personalized Federated Learning in Wireless Ad Hoc Networks
Baogui Huang (Qufu Normal University); Bei Wang (Qufu Normal University); Xiangqian Li (Qufu Normal University); Chunmei Ma (Qufu Normal University); Guangshun Li (Qufu Normal University); Qingliang Lai (Rizhao Huilian Zhongchuang Intelligent Technology Research Institute)
DS-TFP: A Distriuted and Secure Traffic Flow Prediction Framework Based on Federated Graph Learning
Yu Fu (Qingdao University of Science and Technology); Lijun Sun (Qingdao University of Science and Technology); Zhihui Ma (Qingdao University of Science and Technology); Haoxiang Gao (Qingdao University of Science and Technology)
Federated Dynamic Graph Fusion Framework for Remaining Useful Life Prediction
Jun Wang (Shandong University); Qi Wang (shandong university); Mingyi Li (Shandong University); Xiao Zhang (Shandong University); Dongxiao Yu (Shandong University)
FEAttack: A Fast and Efficient Hard-Label Textual Attack Framework
Miaomiao Li (National University of Defense Technology); Jun Ma (National University of Defense Technology); Jie Yu (National University of Defense Technology); Shasha Li (National University of Defense Technology); Jing Wang (National University of Defense Technology); Zhuo Li (National University of Defense Technology); Huijun Liu (National University of Defense Technology); Xi Wang (National University of Defense Technology)
18:00-19:00 Dinner Jinjialing Ballroom 3+buffet area
2024/6/23 8:30-10:00 Session A-5: Integrated technologies and future communications trends Taishan Function Room, Floor 3
Pleno-Sense: An Adaptive Switching Algorithm towards Robust Respiration Monitoring Across Diverse Motion Scenarios
Zhaoda Liu (Tianjin University); Xiaobo Zhou (Tianjin University); Yingying Zhao (Tianjin University); Zhaolong Ning (Chongqing University of Posts and Telecommunications); Tie Qiu (Tianjin University)
Inter-Technology Backscatter Communication: A Bidirectional Zigbee-BLE System
kailai yan (USTC); Zhaoyuan Xu (USTC); Wei Gong (University of Science and Technology of China)
Distributed Dynamic Virtual Network Embedding in Container Networks
Donglai Wang (Nanjing University of Posts and Telecommunications); Weibei Fan (Nanjing University of Posts and Telecommunications); Fu Xiao (Nanjing University of Posts and Telecommunications); Mengjie Lv (Nanjing University of Posts and Telecommunications); Xueli Sun (Nanjing University of Posts and Telecommunications); Lei Han (Nanjing University of Posts and Telecommunications)
Automatic Modulation Recognition Using Parallel Feature Extraction Architecture
Haolin Tang (Virginia Commonwealth University); Yanxiao Zhao (Virginia Commonwealth University); Murat Kuzlu (Old Dominion University); Changqing Luo (Virginia Commonwealth University); Ferhat Ozgur Catak (University of Stavanger); Wei Wang
A Message Routing Algorithm Based on the Importance of Node Social Relationships in Opportunistic Mobile Networks
Yongqiang Shi (Shanxi Univeristy); Feng Zhang (Shanxi Univeristy); GANG XU (Inner Mongolia Univeristy); Guanghui Wei (Shanxi Univeristy)
10:00-10:30 Coffee break  
10:30-12:00 Session A-6: Social Networks and Personalized Services Taishan Function Room, Floor 3
Real-time atmospheric duct height prediction framework based on spatio-temporal to ensure maritime communication security
Ben Zhang (University of Electronic Science and Technology of China); Ke Yan (University of Electronic Science and Technology of China); Bei Hui (University of Electronic Science and Technology of China); Qian Huang (University of Electronic Science and Technology of China); Hui Gao (University of Electronic Science and Technology of China)
An Extra Diagnosis Algorithm for Conditional Recursive Match Networks under the PMC Model
Qianru Zhou (Soochow University); Yan Wang (Soochow University); Baolei Cheng (Soochow University); Guijuan Wang (Qilu University of Technology (Shandong Academy of Sciences)); Jianxi Fan (Soochow University)
Personalized mmWave Signal Synthesis for Human Sensing
Jiaqi Zhang (Tianjin University); Hankai Liu (Tianjin University); XIN XIE (XIN XIE); Xinyu Tong (Tianjin University); Xiulong Liu (Tianjin University); Keqiu Li (Tianjin University)
Remorabook: Privacy-Preserving Mobile Social Networking Based on Remora Computing
Samyuktha Kodumur (Cleveland State University); Ye Zhu (Cleveland State University)
12:00-13:00 Lunch to be announced later
14:00-15:30 Session A-7: Blockchain and decentralization technology Taishan Function Room, Floor 3
DSBA: Dynamic Sharded Blockchain Architecture for Industrial Emergency Data Sharing
Ren Linjie (Tianjin University); Tianyi Xu (Tianjin University); Tie Qiu (Tianjin University); Xiaobo Zhou (Tianjin University); Zhaolong Ning (Chongqing University of Posts and Telecommunications)
A Novel Merging Framework for Homogeneous and Heterogeneous Blockchain Systems
Liehuang Zhu (Beijing Institute of Technology); Sadaf Bukhari (Beijing Institute of Technology); Kashif Sharif (Beijing Institute of Technology ); Fan Li (Beijing Institute of Technology); Shumaila Fardous (Beijing Institute of Technology); Sujit Biswas (City University of London)
Active defense simulation evaluation of industrial control systems based on attack-defense graph
Qun Xiao (University of Chinese Academy of Sciences); Shouguo Yang (Zhongguancun Laboratory); Jiaqian Peng (University of Chinese Academy of Sciences); Jingfei Bian (XI AN Huawei Technologies Co., Ltd.); Zhiwen Pan (University of Chinese Academy of Sciences); Shichao Lv (University of Chinese Academy of Sciences); Limin Sun (Chinese Academy of Sciences); Zhiqiang Shi (University of Chinese Academy of Sciences)
Hybrid Heterogeneous Wireless Chargers Placement
Sujin Hou (Wuhan University); Peng Deng (Wuhan University); Meixuan Ren (Nanjing University); Yun Xu (Nanjing University); Yuzhang Zhu (Nanjing University); Haipeng Dai (Nanjing University); Libing Wu (Wuhan University)
An efficient fault-tolerant communication scheme in 3-ary n-cube networks
Yuzhen Xu (Nanjing University of Posts and Telecommunications); Weibei Fan (Nanjing University of Posts and Telecommunications); Mengjie Lv (Nanjing University of Posts and Telecommunications); Xueli Sun (Nanjing University of Posts and Telecommunications); Xiaoyan Li (Fuzhou University); Fu Xiao (Nanjing University of Posts and Telecommunications)
15:30-16:00 Coffee break  
16:00-17:30 Session A-8: UAV and mobile communication system Taishan Function Room, Floor 3
3D Physical Layer Secure Transmission for UAV-assisted Mobile Communications without locations of Eavesdroppers
Wenlu Yu (Beijing Forestry University); Jianqiang Li (National Computer Network Emergency Response Technical Team/Coordination Center of China); Xin Fan (Beijing Forestry University); Chuanwen Luo (Beijing Forestry University); Yi Hong (Beijing Forestry University); Guangkai Li (National Computer Network Emergency Response Technical Team/Coordination Center of China); Ting Chen (UESTC)
Adaptive Self-healing Routing for Heterogeneous Ambient Backscatter Wireless Sensor Networks
Huanyu Guo (Harbin Institute of Technology); Hong Gao (Zhejiang Normal University); Hong Gao (Harbin Institute of Technology); Donghua Yang (Harbin Institute of Technology)
Joint Optimization of Maximum Achievable Rate in SWIPT Systems Assisted by Active STAR-RIS
Yang Junlong (Xinjiang university); Xizhong Qin (Xinjiang university); Lamu Mao (Xinjiang University); Zhenhong Jia (Xinjiang University)
Anonymity on Byzantine-Resilient Decentralized Computing
Kehao Ma (Shandong University); Minghui Xu (Shandong University); Yihao Guo (Shandong University); Lukai Cui (Shandong University); Shiping Ni (Shandong University); Shan Zhang (Beihang University); Weibing Wang (Cloud Inspur Information Technology Co., Ltd.); Haiyong Yang (Cloud Inspur Information Technology Co., Ltd.); Xiuzhen Cheng (Shandong University)
A DRL-Based Edge Intelligent Servo Control with Semi-Closed-Loop Feedbacks in Industrial IoT
Hao Zheng (Nanjing University of Aeronautics and Astronautics); Haifeng Zhu (Servo Technology Institute of China Aerospace Science and Industry Corporation); Hao Wu (Nanjing University of Aeronautics and Astronautics); Changyan Yi (Nanjing University of Aeronautics and Astronautics); Keke Zhu (Servo Technology Institute of China Aerospace Science and Industry Corporation); Xingan Dai (Servo Technology Institute of China Aerospace Science and Industry Corporation)
18:00-19:00 Dinner to be announced later
2024/6/23 8:45-10:00 Session B-5: AI Security and Anomaly Detection Laoshan Function Room, Floor 3
Anomaly Detection under Normality-Shifted IoT Scenario: Filter, Detection, and Adaption
Mengying Pan (Sichuan University); Wenyi Tang (Sichuan University); Zaobo He (Jinan University); Bingyu Chen (Sichuan University)
DevDet: Detecting IoT Device Impersonation Attacks via Traffic Based Identification
Hongliang Yong (Shanghai Jiao Tong University); Le Yu (Shanghai Jiao Tong University); Tian Dong (Shanghai Jiao Tong University); Yan Meng (Shanghai Jiao Tong University); Guoxing Chen (Shanghai Jiao Tong University); Haojin Zhu (Shanghai Jiao Tong University)
Multiscale Adversarial Domain Adaptation Approach for Cloud-Edge Collaborative Fault Diagnosis of Industrial Equipment
Yuanyuan Yang (Guangxi University); Liang Zhao (Taihe Hospital); Ningjiang Chen (Guangxi University)
Detection and Localization of Malicious Nodes in Internet of Things Based on SDN
Jingxu Xiao (Information Engineering University of the Army Strategic Support Force); Chaowen Chang (Information Engineering University of the Army Strategic Support Force); Lu Yuan (Information Engineering University of the Army Strategic Support Force); Ping Wu (Information Engineering University of the Army Strategic Support Force)
10:00-10:30 Coffee break  
10:30-12:00 Session B-6: Edge Computing and Collaborative Networks Laoshan Function Room, Floor 3
Enhancing Scalability: A Complete Tree Sharding Architecture towards IoT
luyi zhang (Guilin University of Electronic Technology); Yujue Wang (Hangzhou Innovation Institute, Beihang University); Yong Ding (Guilin University of Electronic Technology); Hai Liang (Guilin University of Electronic Technology); Changsong Yang (Guilin University of Electronic Technology); Haibin Zheng (Hangzhou Innovation Institute, Beihang University)
A Cloud-Edge Integrated Water Body Extraction Using Superpixel Segmentation
Qingmin Zhang (Xidian University); Chen Chen (Xidian University); Yang Zhou (Ministry of Water Resources of China); Zhiyi Wang (State Grid); Fan Jin (National Key Laboratory of Science and Technology on Space Microwave); Haitao Lu (Joynext); Shaohua Wan (University of Electronic Science and Technology of China)
Layer-Aware Microservice Deployment for Edge Computing with Service Reliability Provisioning
You Shi (Nanjing University of Aeronautics and Astronautics); Yuye Yang (Nanjing University of Aeronautics and Astronautics); Changyan Yi (Nanjing University of Aeronautics and Astronautics); Junyi Wang ( Nanjing University of Aeronautics and Astronautics)
FusionFlow: Neural Fusion and Compression for Communication-Efficient Edge-Cloud Collaborative Computing
Ningkang Zhang (University of Science and Technology of China); Guangyu Wu (University of Science and Technology of China); Chao Gu (University of Science and Technology of China); Mu Yuan (University of Science and Technology of China); Xiangyang Li (University of Science and Technology of China)
12:00-13:00 Lunch to be announced later
14:00-15:30 Session B-7: Edge Computing and Collaborative Networks Laoshan Function Room, Floor 3
Toward Low Overhead and Real-time Multi-vehicle Collaborative Perception via V2V Communication
Minxuan Huang (Chongqing University); Hualing Ren (Chongqing University); Yixin Xiong (Chongqing University); Zhibo Qiu (Chongqing University); Qiaoling Xiong (Chongqing University); Kai Liu (Chongqing University)
Efficient Online Path Selection and Workload Allocation for In-network Computing in MEC
Sheng Ouyang (Guangdong University of Technology); Fanlong Zhang (Guangdong University of Technology); Junyu Mai (Guangdong University of Technology); Yuan Chai (Guangdong University of Technology); Quan Chen (Guangdong University of Technology); Yongchao Tao (Shenzhen Academy of Aerospace Technolog)
CO-LEACH: Cooperative Data Collection Protocol for Data-Heterogeneous WSNs
Xinyu Zhang (University of Electronic Science and Technology of China); Luwei Fu (University of Electronic Science and Technology of China); Wenliang Mao (University of Electronic Science and Technology of China)
Profinder: Towards Professionals Recognition on Mobile Devices for Users with Cognitive Decline
Yong Wang (College of Computer Science and Technology, Harbin Engineering University); Yi Xiong (College of Computer Science and Technology, Harbin Engineering University); Tianyu Yang (College of Computer Science and Technology, Harbin Engineering University); Yiran Shen (Shandong University)
Truthful Double Auction-Based Resource Allocation Mechanisms for Latency-Sensitive Applications in Edge Clouds
Dongkuo Wu (Northeastern University); Xueyi Wang (Northeastern University); Xingwei Wang (Northeastern University); Zhitong Wang (Northeastern University)
15:30-16:00 Coffee break  
16:00-17:30 Session B-8: Advanced Technologies in Vehicular Networks Laoshan Function Room, Floor 3
V2ICooper: Toward Vehicle-to-Infrastructure Cooperative Perception with Spatiotemporal Asynchronous Fusion
Sheng Yi (Chongqing University); Hao Zhang (Chongqing University of Posts and Telecommunications); Feiyu Jin (Chongqing University); Yiyang Hu (Chongqing University); Rongzhen Li (Chongqing University); Kai Liu (Chongqing University)
Recommendation-Aware Collaborative Edge Caching Strategy in the Internet of Vehicles
Pingjie Ou (Guangxi University); Ningjiang Chen (Guangxi University); Zizhan Huang (Guangxi University)
Efficient Semi-Trusted-Server Privacy-Preserving Implicit Authentication for Internet of Vehicles
Honglang Hu (Central China Normal University); Chingfang Hsu (Central China Normal University); Yining LIU (Guilin University of Electronic Technology); ZHUO ZHAO (Central China Normal University)
Pruning-based Retraining Acceleration Method for Edge Scenarios in Autonomous Driving
Minji Zhao (University of Science and Technology of China); Haisheng Tan (University of Science and Technology of China); Zhiyuan Wang (University of Science and Technology of China)
Towards Robust Internet of Vehicles Security: An Edge Node-Based Machine Learning Framework for Attack Classification
Liehuang Zhu (Beijing Institute of Technology); Awais Bilal (Beijing Institute of Technology); Kashif Sharif (Beijing Institute of Technology ); Fan Li (Beijing Institute of Technology)
18:00-19:00 Dinner to be announced later
2024/6/23 8:45-10:00 Session C-5: Machine Learning and Network Meeting Room 5
Device-edge-cloud Collaborative Video Stream Processing and Scheduling Strategy Based on Deep Reinforcement Learning
Nuanlai Wang (China University of Petroleum (East China)); Shanchen Pang (China University of Petroleum); xiaofeng ji (China university of petroleum); Haiyuan Gui (China University of Petroleum (East China)); Xiao He (China University of Petroleum (East China))
Consistent Low-latency Scheduling for Microsecond-Scale Tasks in Data Centers
Qiuyu Yu (Nanjing University of Aeronautics and Astronautics); Tong Zhang (Nanjing University of Aeronautics and Astronautics); Changyan Yi (Nanjing University of Aeronautics and Astronautics)
Multi-scale data reconstruction based policy optimization algorithm for skill learning
Haoke Zhang (Sun Yat-sen University); Yiyong Huang (National Innovation Institute of Defense Technology); Wei Han (National Innovation Institute of Defense Technology); Dan Xiong (National Innovation Institute of Defense Technology); Chuanfu Zhang (Sun Yat-sen University); Yanjie Yang (National Innovation Institute of Defense Technology)
Joint Optimization Design of Intelligence Reflecting Surface Assisted MU-MISO System Based on Deep Reinforcement Learning
Xiaoyu Wu (Qilu Univeristy of Technology); Anming Dong (Qilu Univeristy of Technology); Jiguo Yu (Qilu University of Technology); Sufang Lii (Qilu University of Technology); Guijuan Wang (Qilu University of Technology (Shandong Academy of Sciences)); You Zhou (Shandong Haikan New Media Research Institute Co., Ltd.)
Secure Motion Verification for High Altitude Platforms with a Hybrid AOA-TDOA-FDOA Scheme
Yuanyuan Wang (University of Science and Technology of China); Chi Zhang (University of Science and Technology of China); Miao Pan (University of Houston)
10:00-10:30 Coffee break  
10:30-12:00 Session C-6: Machine Learning and Network Meeting Room 5
Variational Autoencoder based Automatic Clustering for Multivariate Time Series Anomaly Detection
Li Yan (State Grid Shandong Electrie Power Company Information and Communication Company); Hailin Hu (State Grid Shandong Electrie Power Company Information and Communication Company); Kun Yang (State Grid Shandong Electrie Power Company Information and Communication Company); Gaozhou Wang (State Grid Shandong Electrie Power Company Information and Communication Company); Ti Guan (State Grid Shandong Electrie Power Company); Yanwei Zheng (Shandong University)
Deep Reinforcement Learning based Economic Dispatch with Cost Constraint in Cyber Physical Energy System
Chen Xue (Heilongjiang University); Chen Cui (Heilongjiang University); Ning Wang (State Grid Heilongjiang Electric Power Company Limited); Zhaogong Zhang (Heilongjiang University); Jinghong He (Heilongjiang University); Xin Guan (Heilongjiang University)
InceptionNeXt Network with Relative Position Information for Microexpression Recognition
Zhilong Cao (School of computer science and technology Qilu University of Technology Jinan,Shanong,China ); Anming Dong (Qilu Univeristy of Technology); Jiguo Yu (Qilu University of Technology); Sufang Li (Qilu University of Technology); Xiang Tian (Qilu University of Technology); Li Zhang (Qilu University of Technology)
Hybrid Attention Mechanism for 3D LIDAR Point Clouds Semantic Segmentation
Yujie Miao (National Innovation Institute of Defense Technology); Xiaodong Yi (Artificial Intelligence Research Center, Defense Innovation Institute); Naiyang Guan (National Innovation Institute of Defense Technology); Hailun Lu (National Innovation Institute of Defense Technology)
12:00-13:00 Lunch to be announced later
14:00-15:30 Session C-7: Intelligent Systems and Applications Meeting Room 5
AdMarks: Image Steganography Based on Adversarial Perturbation
Ye Ding (Dongguan University of Technology); Mingyu Shao (Dongguan University of Technology); Jie Wang (Dongguan University of Technology); Qi Wan (Dongguan University of Technology)
A Review on Binary Code Analysis Datasets
Zhijian Huang (National Key Laboratory of Science and Technology on Information System Security); Shuguang Song (Shandong University); Han Liu (Shandong University); JINGJING ZHANG (Army Engineering University of PLA); Hongyu Kuang (National Key Laboratory of Science and Technology on Information System Security); Pengfei Hu (Shandong University)
Low-cost Robot Path Planning Mechanism for Escaping from Dead Ends
Nuanyu Cao (The University of Hong Kong)
Towards Communication-Efficient Collaborative Perception: Harnessing Channel-Spatial Attention and Knowledge Distillation
Fei Wang (Chongqing University); Penglin Dai (Southwest Jiaotong University); Kai Liu (Chongqing University)
Improving Anomaly Scene Recognition with Large Vision-Language Models
Cheng Liu (Chongqing University); Xianlei Long (Chongqing University); Yan Li (Macquarie University); Chao Chen (Chongqing University); Fuqiang Gu (Chongqing University)
15:30-16:00 Coffee break  
16:00-17:30 Session C-8: Intelligent Systems and Applications Meeting Room 5
ReSU-Net: State Space Model for 3D Abdominal Multi-organ Segmentation
Tianle Wang (Donghua University); Shan Chang (Donghua University)
Autocue: Targeted Textual Adversarial Attacks with Adversarial Prompts
He Zhu (Institute of Information Engineering, Chinese Academy of Sciences); Ce Li (Institute of Information Engineering,Chinese Academy of Sciences); haitian yang (Institute of Information Engineering, Chinese Academy of Sciences); Yan Wang (Institute of Information Engineering, Chinese Academy of Sciences); Weiqing Huang (Institute of Information Engineering, Chinese Academy of Sciences)
Universal Sign Language Recognition System Using Gesture Description Generation and Large Language Model
jian zhang (Kennesaw State University); Kanchon Kanti Podder (Kennesaw State University); Lingyan Wangy (Kennesaw State University)
A High-precision Generality Method for Chinese Nested Named Entity Recognition
Xiayan Ji (Zhejiang Normal University); Lina Chen (Zhejiang Normal University); Hong Gao (Zhejiang Normal University); Fangyao Shen (Zhejiang Normal University); Hongjie Guo (Zhejiang Normal University)
Tree of Thought Prompt in Robotic Arm Control
Fan Liang (Sam Houston State University); Linqiang Ge (Columbus State University)
18:00-19:00 Dinner To be announced later