Date |
Time |
Program |
Location |
2024/6/20 |
15:00-18:00 |
Register / Sign-insign-in |
Hall |
18:00-19:00 |
Dinner |
Buffet area |
2024/6/21 |
8:30-9:00 |
Opening |
Jinjialing Ballroom1+2 |
9:00-9:50 |
Keynote 1, Speaker: Rajiv Ranjan, Newcastle University |
9:50-10:10 |
Coffee break |
10:10-11:00 |
Keynote 2, Speaker: Gang Qu, University of Maryland
|
11:00-11:50 |
Keynote 3, Speaker: Xue Xiao, Inspur Cloud Information Technology Co., Ltd.
|
12:00-13:00 |
Lunch |
Jinjialing Ballroom3+4 |
14:00-14:50 |
Keynote 4, Speaker: Jie Wu, Temple
University |
Jinjialing Ballroom1+2 |
14:50-15:40 |
Keynote
5, Speaker: TBD |
15:40-15:50 |
Coffee break |
15:50-16:40 |
Keynote
6, Speaker: My Thai, University of Florida |
16:40-17:30 |
Keynote
7, Speaker: Falko Dressler, TU Berlin |
18:00-20:00 |
Banquet |
Jinjialing Ballroom3+4 |
2024/6/22 |
8:30-10:00 |
Session A-1: Wireless communications and positioning technology |
Taishan Function Room, Floor 3
|
Invited Talk: Autonomous Robotics with Cross-Modal Reasoning
|
Speaker: Shaoen Wu, Kennesaw State University
|
FEKNN: A Wi-Fi Indoor Localization Method Based on Feature Enhancement and KNN
|
Jingqi Wang (Central China Normal University); Jinming Yang (University of Chinese Academy of Sciences); Bowen Li (Chinese Academy of Sciences); Weiliang Meng (University of Chinese Academy of Sciences); Jiguang Zhang (University of Chinese Academy of Sciences); Xiaopeng Zhang (University of Chinese Academy of Sciences)
|
Smartphone Indoor Fusion Localization with Trust Region-Based Magnetic Matching
|
Yu Zhu (Wuhan University); Yan Jia (China Telecom Group Co., Ltd.); Kaiyi Zou (Wuhan University); Xiaoguang Niu (Wuhan University)
|
Enhancing Network Performance Measurement Through Orchestration
|
Alamin Mohammed (University of Notre Dame); Lixing Song (Rose-Hulman Institute of Technology); Aaron Striegel (University of Notre Dame)
|
10:00-10:30 |
Coffee break |
|
10:30-12:00 |
Session A-2: Network optimization and communications security |
Taishan Function Room, Floor 3
|
Multi-agent Deep Reinforcement Learning-based UAV-enable NOMA Communication Networks Optimization
|
Xin Dai (Beijing Information Science and Technology University); Xin Chen (Beijing Information Science and Technology University); Libo Jiao (Beijing Information Science and Technology University); Xueqi Ren (Beijing Information Science and Technology University); Zhe Dong (Beijing Information Science and Technology University)
|
BufferConcede: Conceding Buffer for RoCE Traffic in TCP/RoCE Mix-Flows
|
Lingxuan Meng (Nanjing University of Posts and Telecommunications); Weibei Fan (Nanjing University of Posts and Telecommunications); Fu Xiao (Nanjing University of Posts and Telecommunications); Mengjie Lv (Nanjing University of Posts and Telecommunications); Lei Han (Nanjing University of Posts and Telecommunications); Xiaoyan Li (Fuzhou University)
|
An Effective Cooperative Jamming-based Secure Transmission Scheme for a Mobile Scenario
|
Haidong Huang (Beijing Jiaotong University); Yan Huo (Beijing Jiaotong Univeristy); Qinghe Gao (Beijing Jiaotong University); tao jing (Beijing Jiaotong University); Zhiwei Yang (Tianjin Hailiang Information Technology CO,LTD.)
|
ID-Gait: Fine-grained Human Gait State Recognition using Wi-Fi Signal
|
Min Yao (Shandong Normal University); Liyang Zhang (Shandong Normal University); Ran Lai (Shandong Normal University); Mingda Han (Shandong University); linlin guo (Shandong Normal University); Jia Zhang (Shandong Normal University); Jiande Sun (Shandong Normal University)
|
Anti-Packet-Loss Encrypted Traffic Classification via Masked Autoencoder
|
Chen Yang (Chinese Academy of Sciences); Li Guo (CAS); Zheyuan Gu (Chinese Academy of Sciences); Gaopeng Gou (CAS); Xinjie Lin (Chinese Academy of Sciences); gang xiong (Chinese Academy of Sciences); Yangyang Guan (Chinese Academy of Sciences)
|
12:00-13:00 |
Lunch |
|
14:00-15:30 |
Session A-3: Wireless Sensor Networks and IoT Innovation |
Taishan Function Room, Floor 3 |
Graph Transformer Hawkes Processes for Causal Structure learning in Telecom Networks
|
Shiwei Yin (Qingdao university); Ying Li (Qingdao university); Jiandong Wang (Qingdao University); Yu Kong (Qingdao University)
|
Design of Maritime End-to-End Autoencoder Communication System Based on Compressed Channel Feedback
|
Xiaoling Han (Dalian Maritime University); Bin Lin (Dalian Maritime University); shuai shao (Dalian Maritime University); Nan Wu (Dalian Maritime University)
|
ZigRa: Physical-layer Cross-Technology Communication from ZigBee to LoRa
|
Demin Gao (Nanjing Forestry University); ou li yuan (Nanjing Forestry University); Yongrui Chen (University of Chinese Academy of Sciences); Ye Liu (Nanjing Agricultural University); Qing Yang (University of North Texas)
|
Wireless Portable Dry Electrode Multi-channel sEMG Acquisition System
|
Bin Gao (Qilu University of Technology); Yubing Han (Qilu University of Technology); You Zhou (Shandong Haikan New Media Research Institute); Jiguo Yu (Qilu University of Technology); Sufang Li (Qilu University of Technology); Anming Dong (Qilu Univeristy of Technology)
|
A Double Layer Consensus Optimization Mechanism in DAG-based Blockchain for Carbon Trading
|
Yu Song (Beijing University of Posts and Telecommunications); ao xiong (Beijing University of Posts and Telecommunications); Dong Wang (State Grid Digital Technology Holding Co. LTD); Da Li (State Grid Digital Technology Holding Co. LTD); Xiaokang Liu (State Grid Jiangsu Electric Power Co. LTD); Hui Shi (State Grid Jiangsu Electric Power Co. LTD); Qinglei Guo (State Grid Digital Technology Holding Co. LTD)
|
15:30-16:00 |
Coffee break |
|
16:00-17:30 |
Session A-4: Network security, privacy and data sharing |
Taishan Function Room, Floor 3 |
Probabilistic offloading algorithm for opportunistic networks integrating node influence prediction
|
Qi Tang (Inner Mongolia University); GANG XU (INNER MONGOLIA UNIVERSITY); Shuai Li (INNER MONGOLIA UNIVERSITY)
|
Secret Sharing Based Key Agreement Protocol for Body Area Networks
|
Weihong Sheng (Chongqing Univeristy); Bin Cai (Chongqing University); Chunqiang Hu (Chongqing University); Ruinian Li (Bowling Green State University)
|
Active Detection Based NTP Device Attribute Detection
|
Yilun Liu (Wuhan University); Weiping Zhu (Wuhan University)
|
Cyber Sentinel: Fortifying Voice Assistant Security with Biometric Template Integration in Neural Networks
|
Yao Wang (Xidian University); Ping Cao (Xidian University); Zhipeng Si (Xidian University); Pin Lyu (Northwestern Polytechnical University); Haibin Zhang (Xidian University)
|
Traceable Health Data Sharing Based-on Blockchain
|
Taochun Wang (Anhui Normal University); Sijie Shen (Anhui Normal University); Qingshan Wu (Anhui Normal University); Fulong Chen (Anhui Normal University); Peng Hu (Anhui Normal University); Chuanxin Zhao; Shuhan Wan (Anhui Normal University)
|
18:00-19:00 |
Dinner |
Jinjialing Ballroom 3+buffet area |
2024/6/22 |
8:30-10:00 |
Session B-1: Machine Learning and AI Applications |
Laoshan Function Room, Floor 3
|
KD-Eye: Lightweight Pupil Segmentation for Eye Tracking on VR Headsets via Knowledge Distillation
|
Yanlin Li (Shandong University); Ning Chen (Shandong University); Guangrong Zhao (Shandong University); Yiran Shen (Shandong University)
|
Meta-RFF: Few-Shot Open-Set Incremental Learning for RF Fingerprint Recognition via Multi-phase Meta Task Adaptation
|
Taotao Li (Zhejiang University of Technology); Zhenyu Wen (Zhejiang University of Technology); Yuting Jiang (Zhejiang University of Technology); Jian Wang (Zhejiang University of Technology); Jie Su (Zhejiang University of Technology); Zhen Hong (Zhejiang University of Technology); Li Yu (Zhejiang University of Technology); Shibo He (Zhejiang University);
|
Left Ventricular Hypertrophy Detection Algorithm Using Feature Selection and CNN-LSTM
|
Zhenxing Zhang (Ludong University); Jun Ge (Qfnu Normal University); Yilei Wang (Qfnu Normal University); Zheng Wei (Qfnu Normal University)
|
Efficient On-Device Training for Lightweight Fall Detection
|
Shuang Su (Nanjing University of Aeronautics and Astronautics); Xiangmao Chang (Nanjing University of Aeronautics and Astronautics); Yongfeng Shi (Nanjing University of Aeronautics and Astronautics)
|
Application with Digital Currencies Trading Using Machine Learning
|
Tengjiao Zheng (The university of Hong Kong); Li Ning (University of Chinese Academy of Science); Yanming Zhao (The university of Hong Kong); Siu Ming Yiu (The University of Hong Kong)
|
10:00-10:30 |
Coffee break |
|
10:30-12:00 |
Session B-2: Machine Learning and AI Applications |
Laoshan Function Room, Floor 3
|
Mobile Crowdsourcing Task Assignment Algorithm Based on ConvNeXt and GRU
|
Zequn Fan (Yantai University); Qingxian Pan (Yantai University); Zhaolong Gao (Yantai Institute of Technology); Peng Luan (Yantaishan Hospital); kai wei (Yantai university); Jinru Li (Yantai University)
|
Inferring the Number of Clusters for Radar Emitters via Threshold Segmentation and Information Fusion
|
Zilong Wu (National University of Defense Technology); Daping Bi (School of Electronic Countermeasures, National University of Defense Technology); Jifei Pan (School of Electronic Countermeasures, National University of Defense Technology)
|
Enhancing Student Classroom Behavior Detection using Improved SlowFast
|
Fuzhe Zhao (Central China Normal Unversity); Wen Yang (Central China Normal University); Wenlin Han (California State University, Fullerton)
|
LV-auth: Lip Motion Fusion for Voiceprint Authentication
|
Wei Liu (Wuhan University); Xiaojing Zhu (Wuhan University); Qin Liu (Wuhan University); Peng Li (Wuhan University of Science and Technology); Man Zhou (Huazhong University of Science and Technology)
|
Generative Model-Based Edge-Assisted Object Detection in Bandwidth-Constrained Network
|
Jiayuan Liu (Sun Yat-sen University); Ke Luo (Sun Yat-sen University); Hao Wang (Sun Yat-sen University); Xu Chen (Sun Yat-sen University)
|
12:00-13:00 |
Lunch |
Jinjialing Ballroom 3+buffet area |
14:00-15:30 |
Session B-3: Graph Learning and Knowledge Discovery |
Laoshan Function Room, Floor 3 |
Enhancing Generalized Zero-shot Learning with Dynamic Selective Knowledge Distillation
|
Weihua Lv (Ocean University of China); Yulong Zheng (Ocean University of China); Chao Liu (Ocean University of China); Yong Du (Ocean University of China)
|
BehaMiner: System Behavior Mining for Audit Log based on graph learning
|
Xiu Ma (Institute of Information Engineering, Chinese Academy of Sciences; School of Cyber Security, University of Chinese Academy of Sciences); Xiaoze Liu (Institute of Information Engineering, Chinese Academy of Sciences); Ce Li (Institute of Information Engineering, Chinese Academy of Sciences); Ziyang Yu (Institute of Information Engineering, Chinese Academy of Sciences; School of Cyber Security, University of Chinese Academy of Sciences); Qi Zhang (Institute of Information Engineering, Chinese Academy of Sciences); Qiujian Lv (Institute of Information Engineering, Chinese Academy of Sciences); Yan Wang (Institute of Information Engineering,Chinese Academy of Sciences); Jianguo Jiang (Institute of Information Engineering, Chinese Academy of Sciences)
|
REHG: A Recommender Engine Based on Heterogeneous Graph
|
Xiaoyang Xin (Qingdao University); Zesheng Cheng (Qingdao University); mengqiu yan (Qingdao University); Ruixuan Zhao (Qingdao University); Chong Peng (Qingdao University); Jianbo Li (Qingdao University)
|
Self-Supervised Multi-View Clustering Guided by Multi-Angle Semantic Labels
|
Yuan Liu (Chengdu University of Information Technology); Junxiu An (Chengdu University of Information Technology); Linwang Yang (Chengdu University of Information Technology)
|
Step-by-Step and Tailored Teaching: Dynamic Knowledge Distillation
|
Zhenqiang Zhang (Qilu University of Technology (Shandong Academy of Sciences)); Liting Geng (Qilu University of Technology (Shandong Academy of Sciences)); Wenqing Du (Qilu University of Technology (Shandong Academy of Sciences)); Feng Li (Shandong University); Chunxiao Wang (Qilu University of Technology (Shandong Academy of Sciences)); Zhigang Zhao (SCSC)
|
15:30-16:00 |
Coffee break |
Jinjialing Ballroom 3+buffet area |
16:00-17:30 |
Session B-4: AI Security and Anomaly Detection |
Laoshan Function Room, Floor 3 |
TBA-GNN: A Traffic Behavior Analysis Model with Graph Neural Networks for Malicious Traffic Detection
|
Xinbo Han (Institute of Information Engineering, Chinese Academy of Sciences); Meng Zhang (Institute of Information Engineering, Chinese Academy of Sciences); Zheng Yang (Institute of Information Engineering, Chinese Academy of Sciences)
|
Enhancing Adversarial Robustness in Automatic Modulation Recognition with Dynamical Systems-Inspired Deep Learning Frameworks
|
Xiaohu Li (Beijing University of Posts and Telecommunications); Yajian Zhou (Beijing University of Posts and Telecommunications); Hongchao Yan (The 54th Research Institute of China Electronics Technology Group Corporation, HeBei)
|
E-SAGE: Explainability-based Defense Against Backdoor Attacks on Graph Neural Networks
|
Dingqiang Yuan (University of Science and Technology of China); Xiaohua Xu (University of Science and Technology of China); Lei Yu (Rensselaer Polytechnic Institute); Tongchang Han (University of Science and Technology of China); Rongchang Li (Zhejiang University); Meng Han (Zhejiang University)
|
Sophon IDS: Mitigating the Effectiveness of GAN-based Adversarial Attacks via Tailored Misinformation
|
Zihao Liu (Dalhousie University); Qiang Ye (Dalhousie University); Fangda Cui (Dalhousie University)
|
An Early Warning Method for Fracturing Accidents Using Joint CNN and LSTM Modeling
|
Fangxiang Wang (Subsurface Technical Service Branch, Bohai Drilling Engineering Company Limited, China National Petroleum Corporation); Hongbao Tang (Subsurface Technical Service Branch, Bohai Drilling Engineering Company Limited, China National Petroleum Corporation); Long Li (Subsurface Technical Service Branch, Bohai Drilling Engineering Company Limited, China National Petroleum Corporation); Bai Shi (Subsurface Technical Service Branch, Bohai Drilling Engineering Company Limited, China National Petroleum Corporation); Hongtao Cai (Subsurface Technical Service Branch, Bohai Drilling Engineering Company Limited, China National Petroleum Corporation); Yan Sun (Subsurface Technical Service Branch, Bohai Drilling Engineering Company Limited, China National Petroleum Corporation); Cui Xuerong (University of Petroleum)
|
18:00-19:00 |
Dinner |
Jinjialing Ballroom 3+buffet area |
2024/6/22 |
8:30-10:00 |
Session C-1: Federated Learning and Privacy |
Meeting Room 5
|
Defense Strategy in Federated Learning: Unveiling Stealthy Threats and the Similarity Filter Solution
|
Peng Jiang (Nanjing University of Aeronauticsand Astronautics); Liming Fang (Nanjing University of Aeronautics and Astronautics); Ming Ding (Data61, CSIRO); Lu Zhou (Nanjing University of Aeronautics and Astronautics)
|
FedScale: A Federated Unlearning Method Mimicking Human Forgetting Processes
|
Wenshu Huang (Nanjing University of Aeronautics and Astronautics); Huiwen Wu (Zhejiang Lab); Liming Fang (Nanjing University of Aeronautics and Astronautics); Lu Zhou (Nanjing University of Aeronautics and Astronautics)
|
The Client-level GAN-based Data Reconstruction Attack and Defense in Clustered Federated Learning
|
Han Wu (Hefei University of Technology); Lei Shi (Hefei University of Technology); Junyu Ye (Hefei University of Technology); Yuqi Fan (Hefei University of Technology); Zengwei Lyu (Hefei University of Technology)
|
Byzantine-Robust Federated Learning Based on Blockchain
|
Lihua Song (North China University of Technology); Chenying Cai (North China University of Technology); Shuhua Wei (North China University of Technology); Rochishnu Banerjee (Miami University); Xianglong Feng (Miami University); honglu jiang (Miami University)
|
FedDue: Optimizing Personalized Federated Learning through Dynamic Update Classifier
|
Dongrun Li (Qilu University of Technology); Xin Wang (Qilu University of Technology); Yanhan Wang (Qilu University of Technology); Ming Yang (Qilu University of Technology); Xiaoming Wu (Shandong Computer Science Center)
|
10:00-10:30 |
Coffee break |
|
10:30-12:00 |
Session C-2: Federated Learning and Privacy |
Meeting Room 5
|
FedDCT: A Dynamic Cross-Tier Federated Learning Framework in Wireless Networks
|
Youquan Xian (Guangxi Normal University); Xiaoyun Gan (Guangxi Normal University); Chuanjian Yao (Guangxi Normal University); Dongcheng Li (Guangxi Normal University); Peng Wang (Guangxi Normal University); Peng Liu (Guangxi Normal University); Ying Zhao (Guilin University of Electronic Technology)
|
FedMQ: Multi-grained Quantization for Heterogeneous Federated Learning
|
Mei Cao (Shandong University); Tingting Zhang (Shandong University); Bowen Zhang (Shandong University); Jianbo Lu (Shandong University); Zhaoyan Shen (Shandong University); Mengying Zhao (Shandong University)
|
A Secure and Efficient Privacy Data Aggregation Mechanism
|
Wenshuo Ma (Zibo Vocational Institutde); Xinru Liu (Weifang Engineering Vocational College); Kan Yu (Macau University of Science and Technology); Chuanwen Luo (Beijing Forestry University); XIaowu Liu (Qufu Normal University)
|
A Lightweight Method to Survey with Protecting Privacy yet Maintaining Accuracy
|
Yuxuan Wang (University of Toronto); Xinyu Du (Chongqing University of Technology); Ningbo Liu (China University of Geosciences); Xianchao Zhang (Jiaxing University); Wei Ren (China University of Geosciences)
|
A Method for Abnormal Detection and Poisoned Data Recovery in Clustered Federated Learning
|
Lei Shi (Hefei University of Technology); Yingying Chen (Hefei University of Technology)
|
12:00-13:00 |
Lunch |
Jinjialing Ballroom 3+buffet area |
14:00-15:30 |
Session C-3: Federated Learning and Privacy |
Meeting Room 5 |
FedDAGC: Dynamic Adaptive Graph Coarsening for Federated Learning on Non-IID Graphs
|
Chengxi Zhang (Chongqing University); Chunqiang Hu (Chongqing University)
|
Defending Against Poisoning Attacks in Federated Prototype Learning on Non-IID Data
|
Jie Zhang (Qilu University of Technology); Hongliang Zhang (Qilu University of Technology); Guijuan Wang (Qilu University of Technology (Shandong Academy of Sciences)); Anming Dong (Qilu Univeristy of Technology)
|
Federated Learning for Edge Heterogeneous Object Detection Algorithm
|
Yanxin Hu (Changchun University of Technology); Gang Liu (Changchun University of Technology); Chao Cheng (Changchun University of Technology)
|
CoR-FHD: Communication-Efficient and Robust Federated Hyperdimensional Computing for Activity Recognition
|
Yutong Guo (SUN YAT-sen University); Ziwei Zhan (Sun Yat-sen University); Xu Chen (Sun Yat-sen University)
|
Dynamic Staleness Control for Asynchronous Federated Learning in Decentralized Topology
|
Qianpiao Ma (Purple Mountain Laboratories); Jianchun Liu (University of Science and Technology of China); Qingmin Jia (Purple Mountain Laboratories); xiaomao zhou (Purple Mountain Laboratories); Yujiao Hu (Purple Mountain Laboratories); Renchao XIE (Beijing University of Posts and Telecommunications)
|
15:30-16:00 |
Coffee break |
|
16:00-17:30 |
Session C-4: Federated Learning and Privacy |
Meeting Room 5 |
Fair and Communication-Efficient Personalized Federated Learning
|
Yifu Zheng (University of Electronic Science and Technology of China); XU ZHENG (University of Electronic Science and Technology of China); Tingqi Wang (University of Electronic Science and Technology of China); Chong Mu (University of Electronic Science and Technology of China); Nurkhat Zhakiyev (Astana IT University)
|
Distributed & Personalized Federated Learning in Wireless Ad Hoc Networks
|
Baogui Huang (Qufu Normal University); Bei Wang (Qufu Normal University); Xiangqian Li (Qufu Normal University); Chunmei Ma (Qufu Normal University); Guangshun Li (Qufu Normal University); Qingliang Lai (Rizhao Huilian Zhongchuang Intelligent Technology Research Institute)
|
DS-TFP: A Distriuted and Secure Traffic Flow Prediction Framework Based on Federated Graph Learning
|
Yu Fu (Qingdao University of Science and Technology); Lijun Sun (Qingdao University of Science and Technology); Zhihui Ma (Qingdao University of Science and Technology); Haoxiang Gao (Qingdao University of Science and Technology)
|
Federated Dynamic Graph Fusion Framework for Remaining Useful Life Prediction
|
Jun Wang (Shandong University); Qi Wang (shandong university); Mingyi Li (Shandong University); Xiao Zhang (Shandong University); Dongxiao Yu (Shandong University)
|
FEAttack: A Fast and Efficient Hard-Label Textual Attack Framework
|
Miaomiao Li (National University of Defense Technology); Jun Ma (National University of Defense Technology); Jie Yu (National University of Defense Technology); Shasha Li (National University of Defense Technology); Jing Wang (National University of Defense Technology); Zhuo Li (National University of Defense Technology); Huijun Liu (National University of Defense Technology); Xi Wang (National University of Defense Technology)
|
18:00-19:00 |
Dinner |
Jinjialing Ballroom 3+buffet area |
2024/6/23 |
8:30-10:00 |
Session A-5: Integrated technologies and future communications trends |
Taishan Function Room, Floor 3
|
Pleno-Sense: An Adaptive Switching Algorithm towards Robust Respiration Monitoring Across Diverse Motion Scenarios
|
Zhaoda Liu (Tianjin University); Xiaobo Zhou (Tianjin University); Yingying Zhao (Tianjin University); Zhaolong Ning (Chongqing University of Posts and Telecommunications); Tie Qiu (Tianjin University)
|
Inter-Technology Backscatter Communication: A Bidirectional Zigbee-BLE System
|
kailai yan (USTC); Zhaoyuan Xu (USTC); Wei Gong (University of Science and Technology of China)
|
Distributed Dynamic Virtual Network Embedding in Container Networks
|
Donglai Wang (Nanjing University of Posts and Telecommunications); Weibei Fan (Nanjing University of Posts and Telecommunications); Fu Xiao (Nanjing University of Posts and Telecommunications); Mengjie Lv (Nanjing University of Posts and Telecommunications); Xueli Sun (Nanjing University of Posts and Telecommunications); Lei Han (Nanjing University of Posts and Telecommunications)
|
Automatic Modulation Recognition Using Parallel Feature Extraction Architecture
|
Haolin Tang (Virginia Commonwealth University); Yanxiao Zhao (Virginia Commonwealth University); Murat Kuzlu (Old Dominion University); Changqing Luo (Virginia Commonwealth University); Ferhat Ozgur Catak (University of Stavanger); Wei Wang
|
A Message Routing Algorithm Based on the Importance of Node Social Relationships in Opportunistic Mobile Networks
|
Yongqiang Shi (Shanxi Univeristy); Feng Zhang (Shanxi Univeristy); GANG XU (Inner Mongolia Univeristy); Guanghui Wei (Shanxi Univeristy)
|
10:00-10:30 |
Coffee break |
|
10:30-12:00 |
Session A-6: Social Networks and Personalized Services |
Taishan Function Room, Floor 3
|
Real-time atmospheric duct height prediction framework based on spatio-temporal to ensure maritime communication security
|
Ben Zhang (University of Electronic Science and Technology of China); Ke Yan (University of Electronic Science and Technology of China); Bei Hui (University of Electronic Science and Technology of China); Qian Huang (University of Electronic Science and Technology of China); Hui Gao (University of Electronic Science and Technology of China)
|
An Extra Diagnosis Algorithm for Conditional Recursive Match Networks under the PMC Model
|
Qianru Zhou (Soochow University); Yan Wang (Soochow University); Baolei Cheng (Soochow University); Guijuan Wang (Qilu University of Technology (Shandong Academy of Sciences)); Jianxi Fan (Soochow University)
|
Personalized mmWave Signal Synthesis for Human Sensing
|
Jiaqi Zhang (Tianjin University); Hankai Liu (Tianjin University); XIN XIE (XIN XIE); Xinyu Tong (Tianjin University); Xiulong Liu (Tianjin University); Keqiu Li (Tianjin University)
|
Remorabook: Privacy-Preserving Mobile Social Networking Based on Remora Computing
|
Samyuktha Kodumur (Cleveland State University); Ye Zhu (Cleveland State University)
|
12:00-13:00 |
Lunch |
to be announced later |
14:00-15:30 |
Session A-7: Blockchain and decentralization technology |
Taishan Function Room, Floor 3 |
DSBA: Dynamic Sharded Blockchain Architecture for Industrial Emergency Data Sharing
|
Ren Linjie (Tianjin University); Tianyi Xu (Tianjin University); Tie Qiu (Tianjin University); Xiaobo Zhou (Tianjin University); Zhaolong Ning (Chongqing University of Posts and Telecommunications)
|
A Novel Merging Framework for Homogeneous and Heterogeneous Blockchain Systems
|
Liehuang Zhu (Beijing Institute of Technology); Sadaf Bukhari (Beijing Institute of Technology); Kashif Sharif (Beijing Institute of Technology ); Fan Li (Beijing Institute of Technology); Shumaila Fardous (Beijing Institute of Technology); Sujit Biswas (City University of London)
|
Active defense simulation evaluation of industrial control systems based on attack-defense graph
|
Qun Xiao (University of Chinese Academy of Sciences); Shouguo Yang (Zhongguancun Laboratory); Jiaqian Peng (University of Chinese Academy of Sciences); Jingfei Bian (XI AN Huawei Technologies Co., Ltd.); Zhiwen Pan (University of Chinese Academy of Sciences); Shichao Lv (University of Chinese Academy of Sciences); Limin Sun (Chinese Academy of Sciences); Zhiqiang Shi (University of Chinese Academy of Sciences)
|
Hybrid Heterogeneous Wireless Chargers Placement
|
Sujin Hou (Wuhan University); Peng Deng (Wuhan University); Meixuan Ren (Nanjing University); Yun Xu (Nanjing University); Yuzhang Zhu (Nanjing University); Haipeng Dai (Nanjing University); Libing Wu (Wuhan University)
|
An efficient fault-tolerant communication scheme in 3-ary n-cube networks
|
Yuzhen Xu (Nanjing University of Posts and Telecommunications); Weibei Fan (Nanjing University of Posts and Telecommunications); Mengjie Lv (Nanjing University of Posts and Telecommunications); Xueli Sun (Nanjing University of Posts and Telecommunications); Xiaoyan Li (Fuzhou University); Fu Xiao (Nanjing University of Posts and Telecommunications)
|
15:30-16:00 |
Coffee break |
|
16:00-17:30 |
Session A-8: UAV and mobile communication system |
Taishan Function Room, Floor 3 |
3D Physical Layer Secure Transmission for UAV-assisted Mobile Communications without locations of Eavesdroppers
|
Wenlu Yu (Beijing Forestry University); Jianqiang Li (National Computer Network Emergency Response Technical Team/Coordination Center of China); Xin Fan (Beijing Forestry University); Chuanwen Luo (Beijing Forestry University); Yi Hong (Beijing Forestry University); Guangkai Li (National Computer Network Emergency Response Technical Team/Coordination Center of China); Ting Chen (UESTC)
|
Adaptive Self-healing Routing for Heterogeneous Ambient Backscatter Wireless Sensor Networks
|
Huanyu Guo (Harbin Institute of Technology); Hong Gao (Zhejiang Normal University); Hong Gao (Harbin Institute of Technology); Donghua Yang (Harbin Institute of Technology)
|
Joint Optimization of Maximum Achievable Rate in SWIPT Systems Assisted by Active STAR-RIS
|
Yang Junlong (Xinjiang university); Xizhong Qin (Xinjiang university); Lamu Mao (Xinjiang University); Zhenhong Jia (Xinjiang University)
|
Anonymity on Byzantine-Resilient Decentralized Computing
|
Kehao Ma (Shandong University); Minghui Xu (Shandong University); Yihao Guo (Shandong University); Lukai Cui (Shandong University); Shiping Ni (Shandong University); Shan Zhang (Beihang University); Weibing Wang (Cloud Inspur Information Technology Co., Ltd.); Haiyong Yang (Cloud Inspur Information Technology Co., Ltd.); Xiuzhen Cheng (Shandong University)
|
A DRL-Based Edge Intelligent Servo Control with Semi-Closed-Loop Feedbacks in Industrial IoT
|
Hao Zheng (Nanjing University of Aeronautics and Astronautics); Haifeng Zhu (Servo Technology Institute of China Aerospace Science and Industry Corporation); Hao Wu (Nanjing University of Aeronautics and Astronautics); Changyan Yi (Nanjing University of Aeronautics and Astronautics); Keke Zhu (Servo Technology Institute of China Aerospace Science and Industry Corporation); Xingan Dai (Servo Technology Institute of China Aerospace Science and Industry Corporation)
|
18:00-19:00 |
Dinner |
to be announced later |
2024/6/23 |
8:45-10:00 |
Session B-5: AI Security and Anomaly Detection |
Laoshan Function Room, Floor 3
|
Anomaly Detection under Normality-Shifted IoT Scenario: Filter, Detection, and Adaption
|
Mengying Pan (Sichuan University); Wenyi Tang (Sichuan University); Zaobo He (Jinan University); Bingyu Chen (Sichuan University)
|
DevDet: Detecting IoT Device Impersonation Attacks via Traffic Based Identification
|
Hongliang Yong (Shanghai Jiao Tong University); Le Yu (Shanghai Jiao Tong University); Tian Dong (Shanghai Jiao Tong University); Yan Meng (Shanghai Jiao Tong University); Guoxing Chen (Shanghai Jiao Tong University); Haojin Zhu (Shanghai Jiao Tong University)
|
Multiscale Adversarial Domain Adaptation Approach for Cloud-Edge Collaborative Fault Diagnosis of Industrial Equipment
|
Yuanyuan Yang (Guangxi University); Liang Zhao (Taihe Hospital); Ningjiang Chen (Guangxi University)
|
Detection and Localization of Malicious Nodes in Internet of Things Based on SDN
|
Jingxu Xiao (Information Engineering University of the Army Strategic Support Force); Chaowen Chang (Information Engineering University of the Army Strategic Support Force); Lu Yuan (Information Engineering University of the Army Strategic Support Force); Ping Wu (Information Engineering University of the Army Strategic Support Force)
|
10:00-10:30 |
Coffee break |
|
10:30-12:00 |
Session B-6: Edge Computing and Collaborative Networks |
Laoshan Function Room, Floor 3
|
Enhancing Scalability: A Complete Tree Sharding Architecture towards IoT
|
luyi zhang (Guilin University of Electronic Technology); Yujue Wang (Hangzhou Innovation Institute, Beihang University); Yong Ding (Guilin University of Electronic Technology); Hai Liang (Guilin University of Electronic Technology); Changsong Yang (Guilin University of Electronic Technology); Haibin Zheng (Hangzhou Innovation Institute, Beihang University)
|
A Cloud-Edge Integrated Water Body Extraction Using Superpixel Segmentation
|
Qingmin Zhang (Xidian University); Chen Chen (Xidian University); Yang Zhou (Ministry of Water Resources of China); Zhiyi Wang (State Grid); Fan Jin (National Key Laboratory of Science and Technology on Space Microwave); Haitao Lu (Joynext); Shaohua Wan (University of Electronic Science and Technology of China)
|
Layer-Aware Microservice Deployment for Edge Computing with Service Reliability Provisioning
|
You Shi (Nanjing University of Aeronautics and Astronautics); Yuye Yang (Nanjing University of Aeronautics and Astronautics); Changyan Yi (Nanjing University of Aeronautics and Astronautics); Junyi Wang ( Nanjing University of Aeronautics and Astronautics)
|
FusionFlow: Neural Fusion and Compression for Communication-Efficient Edge-Cloud Collaborative Computing
|
Ningkang Zhang (University of Science and Technology of China); Guangyu Wu (University of Science and Technology of China); Chao Gu (University of Science and Technology of China); Mu Yuan (University of Science and Technology of China); Xiangyang Li (University of Science and Technology of China)
|
12:00-13:00 |
Lunch |
to be announced later |
14:00-15:30 |
Session B-7: Edge Computing and Collaborative Networks |
Laoshan Function Room, Floor 3 |
Toward Low Overhead and Real-time Multi-vehicle Collaborative Perception via V2V Communication
|
Minxuan Huang (Chongqing University); Hualing Ren (Chongqing University); Yixin Xiong (Chongqing University); Zhibo Qiu (Chongqing University); Qiaoling Xiong (Chongqing University); Kai Liu (Chongqing University)
|
Efficient Online Path Selection and Workload Allocation for In-network Computing in MEC
|
Sheng Ouyang (Guangdong University of Technology); Fanlong Zhang (Guangdong University of Technology); Junyu Mai (Guangdong University of Technology); Yuan Chai (Guangdong University of Technology); Quan Chen (Guangdong University of Technology); Yongchao Tao (Shenzhen Academy of Aerospace Technolog)
|
CO-LEACH: Cooperative Data Collection Protocol for Data-Heterogeneous WSNs
|
Xinyu Zhang (University of Electronic Science and Technology of China); Luwei Fu (University of Electronic Science and Technology of China); Wenliang Mao (University of Electronic Science and Technology of China)
|
Profinder: Towards Professionals Recognition on Mobile Devices for Users with Cognitive Decline
|
Yong Wang (College of Computer Science and Technology, Harbin Engineering University); Yi Xiong (College of Computer Science and Technology, Harbin Engineering University); Tianyu Yang (College of Computer Science and Technology, Harbin Engineering University); Yiran Shen (Shandong University)
|
Truthful Double Auction-Based Resource Allocation Mechanisms for Latency-Sensitive Applications in Edge Clouds
|
Dongkuo Wu (Northeastern University); Xueyi Wang (Northeastern University); Xingwei Wang (Northeastern University); Zhitong Wang (Northeastern University)
|
15:30-16:00 |
Coffee break |
|
16:00-17:30 |
Session B-8: Advanced Technologies in Vehicular Networks |
Laoshan Function Room, Floor 3 |
V2ICooper: Toward Vehicle-to-Infrastructure Cooperative Perception with Spatiotemporal Asynchronous Fusion
|
Sheng Yi (Chongqing University); Hao Zhang (Chongqing University of Posts and Telecommunications); Feiyu Jin (Chongqing University); Yiyang Hu (Chongqing University); Rongzhen Li (Chongqing University); Kai Liu (Chongqing University)
|
Recommendation-Aware Collaborative Edge Caching Strategy in the Internet of Vehicles
|
Pingjie Ou (Guangxi University); Ningjiang Chen (Guangxi University); Zizhan Huang (Guangxi University)
|
Efficient Semi-Trusted-Server Privacy-Preserving Implicit Authentication for Internet of Vehicles
|
Honglang Hu (Central China Normal University); Chingfang Hsu (Central China Normal University); Yining LIU (Guilin University of Electronic Technology); ZHUO ZHAO (Central China Normal University)
|
Pruning-based Retraining Acceleration Method for Edge Scenarios in Autonomous Driving
|
Minji Zhao (University of Science and Technology of China); Haisheng Tan (University of Science and Technology of China); Zhiyuan Wang (University of Science and Technology of China)
|
Towards Robust Internet of Vehicles Security: An Edge Node-Based Machine Learning Framework for Attack Classification
|
Liehuang Zhu (Beijing Institute of Technology); Awais Bilal (Beijing Institute of Technology); Kashif Sharif (Beijing Institute of Technology ); Fan Li (Beijing Institute of Technology)
|
18:00-19:00 |
Dinner |
to be announced later |
2024/6/23 |
8:45-10:00 |
Session C-5: Machine Learning and Network |
Meeting Room 5
|
Device-edge-cloud Collaborative Video Stream Processing and Scheduling Strategy Based on Deep Reinforcement Learning
|
Nuanlai Wang (China University of Petroleum (East China)); Shanchen Pang (China University of Petroleum); xiaofeng ji (China university of petroleum); Haiyuan Gui (China University of Petroleum (East China)); Xiao He (China University of Petroleum (East China))
|
Consistent Low-latency Scheduling for Microsecond-Scale Tasks in Data Centers
|
Qiuyu Yu (Nanjing University of Aeronautics and Astronautics); Tong Zhang (Nanjing University of Aeronautics and Astronautics); Changyan Yi (Nanjing University of Aeronautics and Astronautics)
|
Multi-scale data reconstruction based policy optimization algorithm for skill learning
|
Haoke Zhang (Sun Yat-sen University); Yiyong Huang (National Innovation Institute of Defense Technology); Wei Han (National Innovation Institute of Defense Technology); Dan Xiong (National Innovation Institute of Defense Technology); Chuanfu Zhang (Sun Yat-sen University); Yanjie Yang (National Innovation Institute of Defense Technology)
|
Joint Optimization Design of Intelligence Reflecting Surface Assisted MU-MISO System Based on Deep Reinforcement Learning
|
Xiaoyu Wu (Qilu Univeristy of Technology); Anming Dong (Qilu Univeristy of Technology); Jiguo Yu (Qilu University of Technology); Sufang Lii (Qilu University of Technology); Guijuan Wang (Qilu University of Technology (Shandong Academy of Sciences)); You Zhou (Shandong Haikan New Media Research Institute Co., Ltd.)
|
Secure Motion Verification for High Altitude Platforms with a Hybrid AOA-TDOA-FDOA Scheme
|
Yuanyuan Wang (University of Science and Technology of China); Chi Zhang (University of Science and Technology of China); Miao Pan (University of Houston)
|
10:00-10:30 |
Coffee break |
|
10:30-12:00 |
Session C-6: Machine Learning and Network |
Meeting Room 5
|
Variational Autoencoder based Automatic Clustering for Multivariate Time Series Anomaly Detection
|
Li Yan (State Grid Shandong Electrie Power Company Information and Communication Company); Hailin Hu (State Grid Shandong Electrie Power Company Information and Communication Company); Kun Yang (State Grid Shandong Electrie Power Company Information and Communication Company); Gaozhou Wang (State Grid Shandong Electrie Power Company Information and Communication Company); Ti Guan (State Grid Shandong Electrie Power Company); Yanwei Zheng (Shandong University)
|
Deep Reinforcement Learning based Economic Dispatch with Cost Constraint in Cyber Physical Energy System
|
Chen Xue (Heilongjiang University); Chen Cui (Heilongjiang University); Ning Wang (State Grid Heilongjiang Electric Power Company Limited); Zhaogong Zhang (Heilongjiang University); Jinghong He (Heilongjiang University); Xin Guan (Heilongjiang University)
|
InceptionNeXt Network with Relative Position Information for Microexpression Recognition
|
Zhilong Cao (School of computer science and technology Qilu University of Technology Jinan,Shanong,China ); Anming Dong (Qilu Univeristy of Technology); Jiguo Yu (Qilu University of Technology); Sufang Li (Qilu University of Technology); Xiang Tian (Qilu University of Technology); Li Zhang (Qilu University of Technology)
|
Hybrid Attention Mechanism for 3D LIDAR Point Clouds Semantic Segmentation
|
Yujie Miao (National Innovation Institute of Defense Technology); Xiaodong Yi (Artificial Intelligence Research Center, Defense Innovation Institute); Naiyang Guan (National Innovation Institute of Defense Technology); Hailun Lu (National Innovation Institute of Defense Technology)
|
12:00-13:00 |
Lunch |
to be announced later |
14:00-15:30 |
Session C-7: Intelligent Systems and Applications |
Meeting Room 5 |
AdMarks: Image Steganography Based on Adversarial Perturbation
|
Ye Ding (Dongguan University of Technology); Mingyu Shao (Dongguan University of Technology); Jie Wang (Dongguan University of Technology); Qi Wan (Dongguan University of Technology)
|
A Review on Binary Code Analysis Datasets
|
Zhijian Huang (National Key Laboratory of Science and Technology on Information System Security); Shuguang Song (Shandong University); Han Liu (Shandong University); JINGJING ZHANG (Army Engineering University of PLA); Hongyu Kuang (National Key Laboratory of Science and Technology on Information System Security); Pengfei Hu (Shandong University)
|
Low-cost Robot Path Planning Mechanism for Escaping from Dead Ends
|
Nuanyu Cao (The University of Hong Kong)
|
Towards Communication-Efficient Collaborative Perception: Harnessing Channel-Spatial Attention and Knowledge Distillation
|
Fei Wang (Chongqing University); Penglin Dai (Southwest Jiaotong University); Kai Liu (Chongqing University)
|
Improving Anomaly Scene Recognition with Large Vision-Language Models
|
Cheng Liu (Chongqing University); Xianlei Long (Chongqing University); Yan Li (Macquarie University); Chao Chen (Chongqing University); Fuqiang Gu (Chongqing University)
|
15:30-16:00 |
Coffee break |
|
16:00-17:30 |
Session C-8: Intelligent Systems and Applications |
Meeting Room 5 |
ReSU-Net: State Space Model for 3D Abdominal Multi-organ Segmentation
|
Tianle Wang (Donghua University); Shan Chang (Donghua University)
|
Autocue: Targeted Textual Adversarial Attacks with Adversarial Prompts
|
He Zhu (Institute of Information Engineering, Chinese Academy of Sciences); Ce Li (Institute of Information Engineering,Chinese Academy of Sciences); haitian yang (Institute of Information Engineering, Chinese Academy of Sciences); Yan Wang (Institute of Information Engineering, Chinese Academy of Sciences); Weiqing Huang (Institute of Information Engineering, Chinese Academy of Sciences)
|
Universal Sign Language Recognition System Using Gesture Description Generation and Large Language Model
|
jian zhang (Kennesaw State University); Kanchon Kanti Podder (Kennesaw State University); Lingyan Wangy (Kennesaw State University)
|
A High-precision Generality Method for Chinese Nested Named Entity Recognition
|
Xiayan Ji (Zhejiang Normal University); Lina Chen (Zhejiang Normal University); Hong Gao (Zhejiang Normal University); Fangyao Shen (Zhejiang Normal University); Hongjie Guo (Zhejiang Normal University)
|
Tree of Thought Prompt in Robotic Arm Control
|
Fan Liang (Sam Houston State University); Linqiang Ge (Columbus State University)
|
18:00-19:00 |
Dinner |
To be announced later |