| Date |
Time |
Program |
Location |
| 2024/6/20 |
15:00-18:00 |
Register / Sign-insign-in |
Hall |
| 18:00-19:00 |
Dinner |
Buffet area |
| 2024/6/21 |
8:30-9:00 |
Opening |
Jinjialing Ballroom1+2 |
| 9:00-9:50 |
Keynote 1, Speaker: Rajiv Ranjan, Newcastle University |
| 9:50-10:10 |
Coffee break |
| 10:10-11:00 |
Keynote 2, Speaker: Gang Qu, University of Maryland
|
| 11:00-11:50 |
Keynote 3, Speaker: Xue Xiao, Inspur Cloud Information Technology Co., Ltd.
|
| 12:00-13:00 |
Lunch |
Jinjialing Ballroom3+4 |
| 14:00-14:50 |
Keynote 4, Speaker: Jie Wu, Temple
University |
Jinjialing Ballroom1+2 |
| 14:50-15:40 |
Keynote
5, Speaker: TBD |
| 15:40-15:50 |
Coffee break |
| 15:50-16:40 |
Keynote
6, Speaker: My Thai, University of Florida |
| 16:40-17:30 |
Keynote
7, Speaker: Falko Dressler, TU Berlin |
| 18:00-20:00 |
Banquet |
Jinjialing Ballroom3+4 |
| 2024/6/22 |
8:30-10:00 |
Session A-1: Wireless communications and positioning technology |
Taishan Function Room, Floor 3
|
| Invited Talk: Autonomous Robotics with Cross-Modal Reasoning
|
| Speaker: Shaoen Wu, Kennesaw State University
|
| FEKNN: A Wi-Fi Indoor Localization Method Based on Feature Enhancement and KNN
|
| Jingqi Wang (Central China Normal University); Jinming Yang (University of Chinese Academy of Sciences); Bowen Li (Chinese Academy of Sciences); Weiliang Meng (University of Chinese Academy of Sciences); Jiguang Zhang (University of Chinese Academy of Sciences); Xiaopeng Zhang (University of Chinese Academy of Sciences)
|
| Smartphone Indoor Fusion Localization with Trust Region-Based Magnetic Matching
|
| Yu Zhu (Wuhan University); Yan Jia (China Telecom Group Co., Ltd.); Kaiyi Zou (Wuhan University); Xiaoguang Niu (Wuhan University)
|
| Enhancing Network Performance Measurement Through Orchestration
|
| Alamin Mohammed (University of Notre Dame); Lixing Song (Rose-Hulman Institute of Technology); Aaron Striegel (University of Notre Dame)
|
| 10:00-10:30 |
Coffee break |
|
| 10:30-12:00 |
Session A-2: Network optimization and communications security |
Taishan Function Room, Floor 3
|
| Multi-agent Deep Reinforcement Learning-based UAV-enable NOMA Communication Networks Optimization
|
| Xin Dai (Beijing Information Science and Technology University); Xin Chen (Beijing Information Science and Technology University); Libo Jiao (Beijing Information Science and Technology University); Xueqi Ren (Beijing Information Science and Technology University); Zhe Dong (Beijing Information Science and Technology University)
|
| BufferConcede: Conceding Buffer for RoCE Traffic in TCP/RoCE Mix-Flows
|
| Lingxuan Meng (Nanjing University of Posts and Telecommunications); Weibei Fan (Nanjing University of Posts and Telecommunications); Fu Xiao (Nanjing University of Posts and Telecommunications); Mengjie Lv (Nanjing University of Posts and Telecommunications); Lei Han (Nanjing University of Posts and Telecommunications); Xiaoyan Li (Fuzhou University)
|
| An Effective Cooperative Jamming-based Secure Transmission Scheme for a Mobile Scenario
|
| Haidong Huang (Beijing Jiaotong University); Yan Huo (Beijing Jiaotong Univeristy); Qinghe Gao (Beijing Jiaotong University); tao jing (Beijing Jiaotong University); Zhiwei Yang (Tianjin Hailiang Information Technology CO,LTD.)
|
| ID-Gait: Fine-grained Human Gait State Recognition using Wi-Fi Signal
|
| Min Yao (Shandong Normal University); Liyang Zhang (Shandong Normal University); Ran Lai (Shandong Normal University); Mingda Han (Shandong University); linlin guo (Shandong Normal University); Jia Zhang (Shandong Normal University); Jiande Sun (Shandong Normal University)
|
| Anti-Packet-Loss Encrypted Traffic Classification via Masked Autoencoder
|
| Chen Yang (Chinese Academy of Sciences); Li Guo (CAS); Zheyuan Gu (Chinese Academy of Sciences); Gaopeng Gou (CAS); Xinjie Lin (Chinese Academy of Sciences); gang xiong (Chinese Academy of Sciences); Yangyang Guan (Chinese Academy of Sciences)
|
| 12:00-13:00 |
Lunch |
|
| 14:00-15:30 |
Session A-3: Wireless Sensor Networks and IoT Innovation |
Taishan Function Room, Floor 3 |
| Graph Transformer Hawkes Processes for Causal Structure learning in Telecom Networks
|
| Shiwei Yin (Qingdao university); Ying Li (Qingdao university); Jiandong Wang (Qingdao University); Yu Kong (Qingdao University)
|
| Design of Maritime End-to-End Autoencoder Communication System Based on Compressed Channel Feedback
|
| Xiaoling Han (Dalian Maritime University); Bin Lin (Dalian Maritime University); shuai shao (Dalian Maritime University); Nan Wu (Dalian Maritime University)
|
| ZigRa: Physical-layer Cross-Technology Communication from ZigBee to LoRa
|
| Demin Gao (Nanjing Forestry University); ou li yuan (Nanjing Forestry University); Yongrui Chen (University of Chinese Academy of Sciences); Ye Liu (Nanjing Agricultural University); Qing Yang (University of North Texas)
|
| Wireless Portable Dry Electrode Multi-channel sEMG Acquisition System
|
| Bin Gao (Qilu University of Technology); Yubing Han (Qilu University of Technology); You Zhou (Shandong Haikan New Media Research Institute); Jiguo Yu (Qilu University of Technology); Sufang Li (Qilu University of Technology); Anming Dong (Qilu Univeristy of Technology)
|
| A Double Layer Consensus Optimization Mechanism in DAG-based Blockchain for Carbon Trading
|
| Yu Song (Beijing University of Posts and Telecommunications); ao xiong (Beijing University of Posts and Telecommunications); Dong Wang (State Grid Digital Technology Holding Co. LTD); Da Li (State Grid Digital Technology Holding Co. LTD); Xiaokang Liu (State Grid Jiangsu Electric Power Co. LTD); Hui Shi (State Grid Jiangsu Electric Power Co. LTD); Qinglei Guo (State Grid Digital Technology Holding Co. LTD)
|
| 15:30-16:00 |
Coffee break |
|
| 16:00-17:30 |
Session A-4: Network security, privacy and data sharing |
Taishan Function Room, Floor 3 |
| Probabilistic offloading algorithm for opportunistic networks integrating node influence prediction
|
| Qi Tang (Inner Mongolia University); GANG XU (INNER MONGOLIA UNIVERSITY); Shuai Li (INNER MONGOLIA UNIVERSITY)
|
| Secret Sharing Based Key Agreement Protocol for Body Area Networks
|
| Weihong Sheng (Chongqing Univeristy); Bin Cai (Chongqing University); Chunqiang Hu (Chongqing University); Ruinian Li (Bowling Green State University)
|
| Active Detection Based NTP Device Attribute Detection
|
| Yilun Liu (Wuhan University); Weiping Zhu (Wuhan University)
|
| Cyber Sentinel: Fortifying Voice Assistant Security with Biometric Template Integration in Neural Networks
|
| Yao Wang (Xidian University); Ping Cao (Xidian University); Zhipeng Si (Xidian University); Pin Lyu (Northwestern Polytechnical University); Haibin Zhang (Xidian University)
|
| Traceable Health Data Sharing Based-on Blockchain
|
| Taochun Wang (Anhui Normal University); Sijie Shen (Anhui Normal University); Qingshan Wu (Anhui Normal University); Fulong Chen (Anhui Normal University); Peng Hu (Anhui Normal University); Chuanxin Zhao; Shuhan Wan (Anhui Normal University)
|
| 18:00-19:00 |
Dinner |
Jinjialing Ballroom 3+buffet area |
| 2024/6/22 |
8:30-10:00 |
Session B-1: Machine Learning and AI Applications |
Laoshan Function Room, Floor 3
|
| KD-Eye: Lightweight Pupil Segmentation for Eye Tracking on VR Headsets via Knowledge Distillation
|
| Yanlin Li (Shandong University); Ning Chen (Shandong University); Guangrong Zhao (Shandong University); Yiran Shen (Shandong University)
|
| Meta-RFF: Few-Shot Open-Set Incremental Learning for RF Fingerprint Recognition via Multi-phase Meta Task Adaptation
|
| Taotao Li (Zhejiang University of Technology); Zhenyu Wen (Zhejiang University of Technology); Yuting Jiang (Zhejiang University of Technology); Jian Wang (Zhejiang University of Technology); Jie Su (Zhejiang University of Technology); Zhen Hong (Zhejiang University of Technology); Li Yu (Zhejiang University of Technology); Shibo He (Zhejiang University);
|
| Left Ventricular Hypertrophy Detection Algorithm Using Feature Selection and CNN-LSTM
|
| Zhenxing Zhang (Ludong University); Jun Ge (Qfnu Normal University); Yilei Wang (Qfnu Normal University); Zheng Wei (Qfnu Normal University)
|
| Efficient On-Device Training for Lightweight Fall Detection
|
| Shuang Su (Nanjing University of Aeronautics and Astronautics); Xiangmao Chang (Nanjing University of Aeronautics and Astronautics); Yongfeng Shi (Nanjing University of Aeronautics and Astronautics)
|
| Application with Digital Currencies Trading Using Machine Learning
|
| Tengjiao Zheng (The university of Hong Kong); Li Ning (University of Chinese Academy of Science); Yanming Zhao (The university of Hong Kong); Siu Ming Yiu (The University of Hong Kong)
|
| 10:00-10:30 |
Coffee break |
|
| 10:30-12:00 |
Session B-2: Machine Learning and AI Applications |
Laoshan Function Room, Floor 3
|
| Mobile Crowdsourcing Task Assignment Algorithm Based on ConvNeXt and GRU
|
| Zequn Fan (Yantai University); Qingxian Pan (Yantai University); Zhaolong Gao (Yantai Institute of Technology); Peng Luan (Yantaishan Hospital); kai wei (Yantai university); Jinru Li (Yantai University)
|
| Inferring the Number of Clusters for Radar Emitters via Threshold Segmentation and Information Fusion
|
| Zilong Wu (National University of Defense Technology); Daping Bi (School of Electronic Countermeasures, National University of Defense Technology); Jifei Pan (School of Electronic Countermeasures, National University of Defense Technology)
|
| Enhancing Student Classroom Behavior Detection using Improved SlowFast
|
| Fuzhe Zhao (Central China Normal Unversity); Wen Yang (Central China Normal University); Wenlin Han (California State University, Fullerton)
|
| LV-auth: Lip Motion Fusion for Voiceprint Authentication
|
| Wei Liu (Wuhan University); Xiaojing Zhu (Wuhan University); Qin Liu (Wuhan University); Peng Li (Wuhan University of Science and Technology); Man Zhou (Huazhong University of Science and Technology)
|
| Generative Model-Based Edge-Assisted Object Detection in Bandwidth-Constrained Network
|
| Jiayuan Liu (Sun Yat-sen University); Ke Luo (Sun Yat-sen University); Hao Wang (Sun Yat-sen University); Xu Chen (Sun Yat-sen University)
|
| 12:00-13:00 |
Lunch |
Jinjialing Ballroom 3+buffet area |
| 14:00-15:30 |
Session B-3: Graph Learning and Knowledge Discovery |
Laoshan Function Room, Floor 3 |
| Enhancing Generalized Zero-shot Learning with Dynamic Selective Knowledge Distillation
|
| Weihua Lv (Ocean University of China); Yulong Zheng (Ocean University of China); Chao Liu (Ocean University of China); Yong Du (Ocean University of China)
|
| BehaMiner: System Behavior Mining for Audit Log based on graph learning
|
| Xiu Ma (Institute of Information Engineering, Chinese Academy of Sciences; School of Cyber Security, University of Chinese Academy of Sciences); Xiaoze Liu (Institute of Information Engineering, Chinese Academy of Sciences); Ce Li (Institute of Information Engineering, Chinese Academy of Sciences); Ziyang Yu (Institute of Information Engineering, Chinese Academy of Sciences; School of Cyber Security, University of Chinese Academy of Sciences); Qi Zhang (Institute of Information Engineering, Chinese Academy of Sciences); Qiujian Lv (Institute of Information Engineering, Chinese Academy of Sciences); Yan Wang (Institute of Information Engineering,Chinese Academy of Sciences); Jianguo Jiang (Institute of Information Engineering, Chinese Academy of Sciences)
|
| REHG: A Recommender Engine Based on Heterogeneous Graph
|
| Xiaoyang Xin (Qingdao University); Zesheng Cheng (Qingdao University); mengqiu yan (Qingdao University); Ruixuan Zhao (Qingdao University); Chong Peng (Qingdao University); Jianbo Li (Qingdao University)
|
| Self-Supervised Multi-View Clustering Guided by Multi-Angle Semantic Labels
|
| Yuan Liu (Chengdu University of Information Technology); Junxiu An (Chengdu University of Information Technology); Linwang Yang (Chengdu University of Information Technology)
|
| Step-by-Step and Tailored Teaching: Dynamic Knowledge Distillation
|
| Zhenqiang Zhang (Qilu University of Technology (Shandong Academy of Sciences)); Liting Geng (Qilu University of Technology (Shandong Academy of Sciences)); Wenqing Du (Qilu University of Technology (Shandong Academy of Sciences)); Feng Li (Shandong University); Chunxiao Wang (Qilu University of Technology (Shandong Academy of Sciences)); Zhigang Zhao (SCSC)
|
| 15:30-16:00 |
Coffee break |
Jinjialing Ballroom 3+buffet area |
| 16:00-17:30 |
Session B-4: AI Security and Anomaly Detection |
Laoshan Function Room, Floor 3 |
| TBA-GNN: A Traffic Behavior Analysis Model with Graph Neural Networks for Malicious Traffic Detection
|
| Xinbo Han (Institute of Information Engineering, Chinese Academy of Sciences); Meng Zhang (Institute of Information Engineering, Chinese Academy of Sciences); Zheng Yang (Institute of Information Engineering, Chinese Academy of Sciences)
|
| Enhancing Adversarial Robustness in Automatic Modulation Recognition with Dynamical Systems-Inspired Deep Learning Frameworks
|
| Xiaohu Li (Beijing University of Posts and Telecommunications); Yajian Zhou (Beijing University of Posts and Telecommunications); Hongchao Yan (The 54th Research Institute of China Electronics Technology Group Corporation, HeBei)
|
| E-SAGE: Explainability-based Defense Against Backdoor Attacks on Graph Neural Networks
|
| Dingqiang Yuan (University of Science and Technology of China); Xiaohua Xu (University of Science and Technology of China); Lei Yu (Rensselaer Polytechnic Institute); Tongchang Han (University of Science and Technology of China); Rongchang Li (Zhejiang University); Meng Han (Zhejiang University)
|
| Sophon IDS: Mitigating the Effectiveness of GAN-based Adversarial Attacks via Tailored Misinformation
|
| Zihao Liu (Dalhousie University); Qiang Ye (Dalhousie University); Fangda Cui (Dalhousie University)
|
| An Early Warning Method for Fracturing Accidents Using Joint CNN and LSTM Modeling
|
| Fangxiang Wang (Subsurface Technical Service Branch, Bohai Drilling Engineering Company Limited, China National Petroleum Corporation); Hongbao Tang (Subsurface Technical Service Branch, Bohai Drilling Engineering Company Limited, China National Petroleum Corporation); Long Li (Subsurface Technical Service Branch, Bohai Drilling Engineering Company Limited, China National Petroleum Corporation); Bai Shi (Subsurface Technical Service Branch, Bohai Drilling Engineering Company Limited, China National Petroleum Corporation); Hongtao Cai (Subsurface Technical Service Branch, Bohai Drilling Engineering Company Limited, China National Petroleum Corporation); Yan Sun (Subsurface Technical Service Branch, Bohai Drilling Engineering Company Limited, China National Petroleum Corporation); Cui Xuerong (University of Petroleum)
|
| 18:00-19:00 |
Dinner |
Jinjialing Ballroom 3+buffet area |
| 2024/6/22 |
8:30-10:00 |
Session C-1: Federated Learning and Privacy |
Meeting Room 5
|
| Defense Strategy in Federated Learning: Unveiling Stealthy Threats and the Similarity Filter Solution
|
| Peng Jiang (Nanjing University of Aeronauticsand Astronautics); Liming Fang (Nanjing University of Aeronautics and Astronautics); Ming Ding (Data61, CSIRO); Lu Zhou (Nanjing University of Aeronautics and Astronautics)
|
| FedScale: A Federated Unlearning Method Mimicking Human Forgetting Processes
|
| Wenshu Huang (Nanjing University of Aeronautics and Astronautics); Huiwen Wu (Zhejiang Lab); Liming Fang (Nanjing University of Aeronautics and Astronautics); Lu Zhou (Nanjing University of Aeronautics and Astronautics)
|
| The Client-level GAN-based Data Reconstruction Attack and Defense in Clustered Federated Learning
|
| Han Wu (Hefei University of Technology); Lei Shi (Hefei University of Technology); Junyu Ye (Hefei University of Technology); Yuqi Fan (Hefei University of Technology); Zengwei Lyu (Hefei University of Technology)
|
| Byzantine-Robust Federated Learning Based on Blockchain
|
| Lihua Song (North China University of Technology); Chenying Cai (North China University of Technology); Shuhua Wei (North China University of Technology); Rochishnu Banerjee (Miami University); Xianglong Feng (Miami University); honglu jiang (Miami University)
|
| FedDue: Optimizing Personalized Federated Learning through Dynamic Update Classifier
|
| Dongrun Li (Qilu University of Technology); Xin Wang (Qilu University of Technology); Yanhan Wang (Qilu University of Technology); Ming Yang (Qilu University of Technology); Xiaoming Wu (Shandong Computer Science Center)
|
| 10:00-10:30 |
Coffee break |
|
| 10:30-12:00 |
Session C-2: Federated Learning and Privacy |
Meeting Room 5
|
| FedDCT: A Dynamic Cross-Tier Federated Learning Framework in Wireless Networks
|
| Youquan Xian (Guangxi Normal University); Xiaoyun Gan (Guangxi Normal University); Chuanjian Yao (Guangxi Normal University); Dongcheng Li (Guangxi Normal University); Peng Wang (Guangxi Normal University); Peng Liu (Guangxi Normal University); Ying Zhao (Guilin University of Electronic Technology)
|
| FedMQ: Multi-grained Quantization for Heterogeneous Federated Learning
|
| Mei Cao (Shandong University); Tingting Zhang (Shandong University); Bowen Zhang (Shandong University); Jianbo Lu (Shandong University); Zhaoyan Shen (Shandong University); Mengying Zhao (Shandong University)
|
| A Secure and Efficient Privacy Data Aggregation Mechanism
|
| Wenshuo Ma (Zibo Vocational Institutde); Xinru Liu (Weifang Engineering Vocational College); Kan Yu (Macau University of Science and Technology); Chuanwen Luo (Beijing Forestry University); XIaowu Liu (Qufu Normal University)
|
| A Lightweight Method to Survey with Protecting Privacy yet Maintaining Accuracy
|
| Yuxuan Wang (University of Toronto); Xinyu Du (Chongqing University of Technology); Ningbo Liu (China University of Geosciences); Xianchao Zhang (Jiaxing University); Wei Ren (China University of Geosciences)
|
| A Method for Abnormal Detection and Poisoned Data Recovery in Clustered Federated Learning
|
| Lei Shi (Hefei University of Technology); Yingying Chen (Hefei University of Technology)
|
| 12:00-13:00 |
Lunch |
Jinjialing Ballroom 3+buffet area |
| 14:00-15:30 |
Session C-3: Federated Learning and Privacy |
Meeting Room 5 |
| FedDAGC: Dynamic Adaptive Graph Coarsening for Federated Learning on Non-IID Graphs
|
| Chengxi Zhang (Chongqing University); Chunqiang Hu (Chongqing University)
|
| Defending Against Poisoning Attacks in Federated Prototype Learning on Non-IID Data
|
| Jie Zhang (Qilu University of Technology); Hongliang Zhang (Qilu University of Technology); Guijuan Wang (Qilu University of Technology (Shandong Academy of Sciences)); Anming Dong (Qilu Univeristy of Technology)
|
| Federated Learning for Edge Heterogeneous Object Detection Algorithm
|
| Yanxin Hu (Changchun University of Technology); Gang Liu (Changchun University of Technology); Chao Cheng (Changchun University of Technology)
|
| CoR-FHD: Communication-Efficient and Robust Federated Hyperdimensional Computing for Activity Recognition
|
| Yutong Guo (SUN YAT-sen University); Ziwei Zhan (Sun Yat-sen University); Xu Chen (Sun Yat-sen University)
|
| Dynamic Staleness Control for Asynchronous Federated Learning in Decentralized Topology
|
| Qianpiao Ma (Purple Mountain Laboratories); Jianchun Liu (University of Science and Technology of China); Qingmin Jia (Purple Mountain Laboratories); xiaomao zhou (Purple Mountain Laboratories); Yujiao Hu (Purple Mountain Laboratories); Renchao XIE (Beijing University of Posts and Telecommunications)
|
| 15:30-16:00 |
Coffee break |
|
| 16:00-17:30 |
Session C-4: Federated Learning and Privacy |
Meeting Room 5 |
| Fair and Communication-Efficient Personalized Federated Learning
|
| Yifu Zheng (University of Electronic Science and Technology of China); XU ZHENG (University of Electronic Science and Technology of China); Tingqi Wang (University of Electronic Science and Technology of China); Chong Mu (University of Electronic Science and Technology of China); Nurkhat Zhakiyev (Astana IT University)
|
| Distributed & Personalized Federated Learning in Wireless Ad Hoc Networks
|
| Baogui Huang (Qufu Normal University); Bei Wang (Qufu Normal University); Xiangqian Li (Qufu Normal University); Chunmei Ma (Qufu Normal University); Guangshun Li (Qufu Normal University); Qingliang Lai (Rizhao Huilian Zhongchuang Intelligent Technology Research Institute)
|
| DS-TFP: A Distriuted and Secure Traffic Flow Prediction Framework Based on Federated Graph Learning
|
| Yu Fu (Qingdao University of Science and Technology); Lijun Sun (Qingdao University of Science and Technology); Zhihui Ma (Qingdao University of Science and Technology); Haoxiang Gao (Qingdao University of Science and Technology)
|
| Federated Dynamic Graph Fusion Framework for Remaining Useful Life Prediction
|
| Jun Wang (Shandong University); Qi Wang (shandong university); Mingyi Li (Shandong University); Xiao Zhang (Shandong University); Dongxiao Yu (Shandong University)
|
| FEAttack: A Fast and Efficient Hard-Label Textual Attack Framework
|
| Miaomiao Li (National University of Defense Technology); Jun Ma (National University of Defense Technology); Jie Yu (National University of Defense Technology); Shasha Li (National University of Defense Technology); Jing Wang (National University of Defense Technology); Zhuo Li (National University of Defense Technology); Huijun Liu (National University of Defense Technology); Xi Wang (National University of Defense Technology)
|
| 18:00-19:00 |
Dinner |
Jinjialing Ballroom 3+buffet area |
| 2024/6/23 |
8:30-10:00 |
Session A-5: Integrated technologies and future communications trends |
Taishan Function Room, Floor 3
|
| Pleno-Sense: An Adaptive Switching Algorithm towards Robust Respiration Monitoring Across Diverse Motion Scenarios
|
| Zhaoda Liu (Tianjin University); Xiaobo Zhou (Tianjin University); Yingying Zhao (Tianjin University); Zhaolong Ning (Chongqing University of Posts and Telecommunications); Tie Qiu (Tianjin University)
|
| Inter-Technology Backscatter Communication: A Bidirectional Zigbee-BLE System
|
| kailai yan (USTC); Zhaoyuan Xu (USTC); Wei Gong (University of Science and Technology of China)
|
| Distributed Dynamic Virtual Network Embedding in Container Networks
|
| Donglai Wang (Nanjing University of Posts and Telecommunications); Weibei Fan (Nanjing University of Posts and Telecommunications); Fu Xiao (Nanjing University of Posts and Telecommunications); Mengjie Lv (Nanjing University of Posts and Telecommunications); Xueli Sun (Nanjing University of Posts and Telecommunications); Lei Han (Nanjing University of Posts and Telecommunications)
|
| Automatic Modulation Recognition Using Parallel Feature Extraction Architecture
|
| Haolin Tang (Virginia Commonwealth University); Yanxiao Zhao (Virginia Commonwealth University); Murat Kuzlu (Old Dominion University); Changqing Luo (Virginia Commonwealth University); Ferhat Ozgur Catak (University of Stavanger); Wei Wang
|
| A Message Routing Algorithm Based on the Importance of Node Social Relationships in Opportunistic Mobile Networks
|
| Yongqiang Shi (Shanxi Univeristy); Feng Zhang (Shanxi Univeristy); GANG XU (Inner Mongolia Univeristy); Guanghui Wei (Shanxi Univeristy)
|
| 10:00-10:30 |
Coffee break |
|
| 10:30-12:00 |
Session A-6: Social Networks and Personalized Services |
Taishan Function Room, Floor 3
|
| Real-time atmospheric duct height prediction framework based on spatio-temporal to ensure maritime communication security
|
| Ben Zhang (University of Electronic Science and Technology of China); Ke Yan (University of Electronic Science and Technology of China); Bei Hui (University of Electronic Science and Technology of China); Qian Huang (University of Electronic Science and Technology of China); Hui Gao (University of Electronic Science and Technology of China)
|
| An Extra Diagnosis Algorithm for Conditional Recursive Match Networks under the PMC Model
|
| Qianru Zhou (Soochow University); Yan Wang (Soochow University); Baolei Cheng (Soochow University); Guijuan Wang (Qilu University of Technology (Shandong Academy of Sciences)); Jianxi Fan (Soochow University)
|
| Personalized mmWave Signal Synthesis for Human Sensing
|
| Jiaqi Zhang (Tianjin University); Hankai Liu (Tianjin University); XIN XIE (XIN XIE); Xinyu Tong (Tianjin University); Xiulong Liu (Tianjin University); Keqiu Li (Tianjin University)
|
| Remorabook: Privacy-Preserving Mobile Social Networking Based on Remora Computing
|
| Samyuktha Kodumur (Cleveland State University); Ye Zhu (Cleveland State University)
|
| 12:00-13:00 |
Lunch |
to be announced later |
| 14:00-15:30 |
Session A-7: Blockchain and decentralization technology |
Taishan Function Room, Floor 3 |
| DSBA: Dynamic Sharded Blockchain Architecture for Industrial Emergency Data Sharing
|
| Ren Linjie (Tianjin University); Tianyi Xu (Tianjin University); Tie Qiu (Tianjin University); Xiaobo Zhou (Tianjin University); Zhaolong Ning (Chongqing University of Posts and Telecommunications)
|
| A Novel Merging Framework for Homogeneous and Heterogeneous Blockchain Systems
|
| Liehuang Zhu (Beijing Institute of Technology); Sadaf Bukhari (Beijing Institute of Technology); Kashif Sharif (Beijing Institute of Technology ); Fan Li (Beijing Institute of Technology); Shumaila Fardous (Beijing Institute of Technology); Sujit Biswas (City University of London)
|
| Active defense simulation evaluation of industrial control systems based on attack-defense graph
|
| Qun Xiao (University of Chinese Academy of Sciences); Shouguo Yang (Zhongguancun Laboratory); Jiaqian Peng (University of Chinese Academy of Sciences); Jingfei Bian (XI AN Huawei Technologies Co., Ltd.); Zhiwen Pan (University of Chinese Academy of Sciences); Shichao Lv (University of Chinese Academy of Sciences); Limin Sun (Chinese Academy of Sciences); Zhiqiang Shi (University of Chinese Academy of Sciences)
|
| Hybrid Heterogeneous Wireless Chargers Placement
|
| Sujin Hou (Wuhan University); Peng Deng (Wuhan University); Meixuan Ren (Nanjing University); Yun Xu (Nanjing University); Yuzhang Zhu (Nanjing University); Haipeng Dai (Nanjing University); Libing Wu (Wuhan University)
|
| An efficient fault-tolerant communication scheme in 3-ary n-cube networks
|
| Yuzhen Xu (Nanjing University of Posts and Telecommunications); Weibei Fan (Nanjing University of Posts and Telecommunications); Mengjie Lv (Nanjing University of Posts and Telecommunications); Xueli Sun (Nanjing University of Posts and Telecommunications); Xiaoyan Li (Fuzhou University); Fu Xiao (Nanjing University of Posts and Telecommunications)
|
| 15:30-16:00 |
Coffee break |
|
| 16:00-17:30 |
Session A-8: UAV and mobile communication system |
Taishan Function Room, Floor 3 |
| 3D Physical Layer Secure Transmission for UAV-assisted Mobile Communications without locations of Eavesdroppers
|
| Wenlu Yu (Beijing Forestry University); Jianqiang Li (National Computer Network Emergency Response Technical Team/Coordination Center of China); Xin Fan (Beijing Forestry University); Chuanwen Luo (Beijing Forestry University); Yi Hong (Beijing Forestry University); Guangkai Li (National Computer Network Emergency Response Technical Team/Coordination Center of China); Ting Chen (UESTC)
|
| Adaptive Self-healing Routing for Heterogeneous Ambient Backscatter Wireless Sensor Networks
|
| Huanyu Guo (Harbin Institute of Technology); Hong Gao (Zhejiang Normal University); Hong Gao (Harbin Institute of Technology); Donghua Yang (Harbin Institute of Technology)
|
| Joint Optimization of Maximum Achievable Rate in SWIPT Systems Assisted by Active STAR-RIS
|
| Yang Junlong (Xinjiang university); Xizhong Qin (Xinjiang university); Lamu Mao (Xinjiang University); Zhenhong Jia (Xinjiang University)
|
| Anonymity on Byzantine-Resilient Decentralized Computing
|
| Kehao Ma (Shandong University); Minghui Xu (Shandong University); Yihao Guo (Shandong University); Lukai Cui (Shandong University); Shiping Ni (Shandong University); Shan Zhang (Beihang University); Weibing Wang (Cloud Inspur Information Technology Co., Ltd.); Haiyong Yang (Cloud Inspur Information Technology Co., Ltd.); Xiuzhen Cheng (Shandong University)
|
| A DRL-Based Edge Intelligent Servo Control with Semi-Closed-Loop Feedbacks in Industrial IoT
|
| Hao Zheng (Nanjing University of Aeronautics and Astronautics); Haifeng Zhu (Servo Technology Institute of China Aerospace Science and Industry Corporation); Hao Wu (Nanjing University of Aeronautics and Astronautics); Changyan Yi (Nanjing University of Aeronautics and Astronautics); Keke Zhu (Servo Technology Institute of China Aerospace Science and Industry Corporation); Xingan Dai (Servo Technology Institute of China Aerospace Science and Industry Corporation)
|
| 18:00-19:00 |
Dinner |
to be announced later |
| 2024/6/23 |
8:45-10:00 |
Session B-5: AI Security and Anomaly Detection |
Laoshan Function Room, Floor 3
|
| Anomaly Detection under Normality-Shifted IoT Scenario: Filter, Detection, and Adaption
|
| Mengying Pan (Sichuan University); Wenyi Tang (Sichuan University); Zaobo He (Jinan University); Bingyu Chen (Sichuan University)
|
| DevDet: Detecting IoT Device Impersonation Attacks via Traffic Based Identification
|
| Hongliang Yong (Shanghai Jiao Tong University); Le Yu (Shanghai Jiao Tong University); Tian Dong (Shanghai Jiao Tong University); Yan Meng (Shanghai Jiao Tong University); Guoxing Chen (Shanghai Jiao Tong University); Haojin Zhu (Shanghai Jiao Tong University)
|
| Multiscale Adversarial Domain Adaptation Approach for Cloud-Edge Collaborative Fault Diagnosis of Industrial Equipment
|
| Yuanyuan Yang (Guangxi University); Liang Zhao (Taihe Hospital); Ningjiang Chen (Guangxi University)
|
| Detection and Localization of Malicious Nodes in Internet of Things Based on SDN
|
| Jingxu Xiao (Information Engineering University of the Army Strategic Support Force); Chaowen Chang (Information Engineering University of the Army Strategic Support Force); Lu Yuan (Information Engineering University of the Army Strategic Support Force); Ping Wu (Information Engineering University of the Army Strategic Support Force)
|
| 10:00-10:30 |
Coffee break |
|
| 10:30-12:00 |
Session B-6: Edge Computing and Collaborative Networks |
Laoshan Function Room, Floor 3
|
| Enhancing Scalability: A Complete Tree Sharding Architecture towards IoT
|
| luyi zhang (Guilin University of Electronic Technology); Yujue Wang (Hangzhou Innovation Institute, Beihang University); Yong Ding (Guilin University of Electronic Technology); Hai Liang (Guilin University of Electronic Technology); Changsong Yang (Guilin University of Electronic Technology); Haibin Zheng (Hangzhou Innovation Institute, Beihang University)
|
| A Cloud-Edge Integrated Water Body Extraction Using Superpixel Segmentation
|
| Qingmin Zhang (Xidian University); Chen Chen (Xidian University); Yang Zhou (Ministry of Water Resources of China); Zhiyi Wang (State Grid); Fan Jin (National Key Laboratory of Science and Technology on Space Microwave); Haitao Lu (Joynext); Shaohua Wan (University of Electronic Science and Technology of China)
|
| Layer-Aware Microservice Deployment for Edge Computing with Service Reliability Provisioning
|
| You Shi (Nanjing University of Aeronautics and Astronautics); Yuye Yang (Nanjing University of Aeronautics and Astronautics); Changyan Yi (Nanjing University of Aeronautics and Astronautics); Junyi Wang ( Nanjing University of Aeronautics and Astronautics)
|
| FusionFlow: Neural Fusion and Compression for Communication-Efficient Edge-Cloud Collaborative Computing
|
| Ningkang Zhang (University of Science and Technology of China); Guangyu Wu (University of Science and Technology of China); Chao Gu (University of Science and Technology of China); Mu Yuan (University of Science and Technology of China); Xiangyang Li (University of Science and Technology of China)
|
| 12:00-13:00 |
Lunch |
to be announced later |
| 14:00-15:30 |
Session B-7: Edge Computing and Collaborative Networks |
Laoshan Function Room, Floor 3 |
| Toward Low Overhead and Real-time Multi-vehicle Collaborative Perception via V2V Communication
|
| Minxuan Huang (Chongqing University); Hualing Ren (Chongqing University); Yixin Xiong (Chongqing University); Zhibo Qiu (Chongqing University); Qiaoling Xiong (Chongqing University); Kai Liu (Chongqing University)
|
| Efficient Online Path Selection and Workload Allocation for In-network Computing in MEC
|
| Sheng Ouyang (Guangdong University of Technology); Fanlong Zhang (Guangdong University of Technology); Junyu Mai (Guangdong University of Technology); Yuan Chai (Guangdong University of Technology); Quan Chen (Guangdong University of Technology); Yongchao Tao (Shenzhen Academy of Aerospace Technolog)
|
| CO-LEACH: Cooperative Data Collection Protocol for Data-Heterogeneous WSNs
|
| Xinyu Zhang (University of Electronic Science and Technology of China); Luwei Fu (University of Electronic Science and Technology of China); Wenliang Mao (University of Electronic Science and Technology of China)
|
| Profinder: Towards Professionals Recognition on Mobile Devices for Users with Cognitive Decline
|
| Yong Wang (College of Computer Science and Technology, Harbin Engineering University); Yi Xiong (College of Computer Science and Technology, Harbin Engineering University); Tianyu Yang (College of Computer Science and Technology, Harbin Engineering University); Yiran Shen (Shandong University)
|
| Truthful Double Auction-Based Resource Allocation Mechanisms for Latency-Sensitive Applications in Edge Clouds
|
| Dongkuo Wu (Northeastern University); Xueyi Wang (Northeastern University); Xingwei Wang (Northeastern University); Zhitong Wang (Northeastern University)
|
| 15:30-16:00 |
Coffee break |
|
| 16:00-17:30 |
Session B-8: Advanced Technologies in Vehicular Networks |
Laoshan Function Room, Floor 3 |
| V2ICooper: Toward Vehicle-to-Infrastructure Cooperative Perception with Spatiotemporal Asynchronous Fusion
|
| Sheng Yi (Chongqing University); Hao Zhang (Chongqing University of Posts and Telecommunications); Feiyu Jin (Chongqing University); Yiyang Hu (Chongqing University); Rongzhen Li (Chongqing University); Kai Liu (Chongqing University)
|
| Recommendation-Aware Collaborative Edge Caching Strategy in the Internet of Vehicles
|
| Pingjie Ou (Guangxi University); Ningjiang Chen (Guangxi University); Zizhan Huang (Guangxi University)
|
| Efficient Semi-Trusted-Server Privacy-Preserving Implicit Authentication for Internet of Vehicles
|
| Honglang Hu (Central China Normal University); Chingfang Hsu (Central China Normal University); Yining LIU (Guilin University of Electronic Technology); ZHUO ZHAO (Central China Normal University)
|
| Pruning-based Retraining Acceleration Method for Edge Scenarios in Autonomous Driving
|
| Minji Zhao (University of Science and Technology of China); Haisheng Tan (University of Science and Technology of China); Zhiyuan Wang (University of Science and Technology of China)
|
| Towards Robust Internet of Vehicles Security: An Edge Node-Based Machine Learning Framework for Attack Classification
|
| Liehuang Zhu (Beijing Institute of Technology); Awais Bilal (Beijing Institute of Technology); Kashif Sharif (Beijing Institute of Technology ); Fan Li (Beijing Institute of Technology)
|
| 18:00-19:00 |
Dinner |
to be announced later |
| 2024/6/23 |
8:45-10:00 |
Session C-5: Machine Learning and Network |
Meeting Room 5
|
| Device-edge-cloud Collaborative Video Stream Processing and Scheduling Strategy Based on Deep Reinforcement Learning
|
| Nuanlai Wang (China University of Petroleum (East China)); Shanchen Pang (China University of Petroleum); xiaofeng ji (China university of petroleum); Haiyuan Gui (China University of Petroleum (East China)); Xiao He (China University of Petroleum (East China))
|
| Consistent Low-latency Scheduling for Microsecond-Scale Tasks in Data Centers
|
| Qiuyu Yu (Nanjing University of Aeronautics and Astronautics); Tong Zhang (Nanjing University of Aeronautics and Astronautics); Changyan Yi (Nanjing University of Aeronautics and Astronautics)
|
| Multi-scale data reconstruction based policy optimization algorithm for skill learning
|
| Haoke Zhang (Sun Yat-sen University); Yiyong Huang (National Innovation Institute of Defense Technology); Wei Han (National Innovation Institute of Defense Technology); Dan Xiong (National Innovation Institute of Defense Technology); Chuanfu Zhang (Sun Yat-sen University); Yanjie Yang (National Innovation Institute of Defense Technology)
|
| Joint Optimization Design of Intelligence Reflecting Surface Assisted MU-MISO System Based on Deep Reinforcement Learning
|
| Xiaoyu Wu (Qilu Univeristy of Technology); Anming Dong (Qilu Univeristy of Technology); Jiguo Yu (Qilu University of Technology); Sufang Lii (Qilu University of Technology); Guijuan Wang (Qilu University of Technology (Shandong Academy of Sciences)); You Zhou (Shandong Haikan New Media Research Institute Co., Ltd.)
|
| Secure Motion Verification for High Altitude Platforms with a Hybrid AOA-TDOA-FDOA Scheme
|
| Yuanyuan Wang (University of Science and Technology of China); Chi Zhang (University of Science and Technology of China); Miao Pan (University of Houston)
|
| 10:00-10:30 |
Coffee break |
|
| 10:30-12:00 |
Session C-6: Machine Learning and Network |
Meeting Room 5
|
| Variational Autoencoder based Automatic Clustering for Multivariate Time Series Anomaly Detection
|
| Li Yan (State Grid Shandong Electrie Power Company Information and Communication Company); Hailin Hu (State Grid Shandong Electrie Power Company Information and Communication Company); Kun Yang (State Grid Shandong Electrie Power Company Information and Communication Company); Gaozhou Wang (State Grid Shandong Electrie Power Company Information and Communication Company); Ti Guan (State Grid Shandong Electrie Power Company); Yanwei Zheng (Shandong University)
|
| Deep Reinforcement Learning based Economic Dispatch with Cost Constraint in Cyber Physical Energy System
|
| Chen Xue (Heilongjiang University); Chen Cui (Heilongjiang University); Ning Wang (State Grid Heilongjiang Electric Power Company Limited); Zhaogong Zhang (Heilongjiang University); Jinghong He (Heilongjiang University); Xin Guan (Heilongjiang University)
|
| InceptionNeXt Network with Relative Position Information for Microexpression Recognition
|
| Zhilong Cao (School of computer science and technology Qilu University of Technology Jinan,Shanong,China ); Anming Dong (Qilu Univeristy of Technology); Jiguo Yu (Qilu University of Technology); Sufang Li (Qilu University of Technology); Xiang Tian (Qilu University of Technology); Li Zhang (Qilu University of Technology)
|
| Hybrid Attention Mechanism for 3D LIDAR Point Clouds Semantic Segmentation
|
| Yujie Miao (National Innovation Institute of Defense Technology); Xiaodong Yi (Artificial Intelligence Research Center, Defense Innovation Institute); Naiyang Guan (National Innovation Institute of Defense Technology); Hailun Lu (National Innovation Institute of Defense Technology)
|
| 12:00-13:00 |
Lunch |
to be announced later |
| 14:00-15:30 |
Session C-7: Intelligent Systems and Applications |
Meeting Room 5 |
| AdMarks: Image Steganography Based on Adversarial Perturbation
|
| Ye Ding (Dongguan University of Technology); Mingyu Shao (Dongguan University of Technology); Jie Wang (Dongguan University of Technology); Qi Wan (Dongguan University of Technology)
|
| A Review on Binary Code Analysis Datasets
|
| Zhijian Huang (National Key Laboratory of Science and Technology on Information System Security); Shuguang Song (Shandong University); Han Liu (Shandong University); JINGJING ZHANG (Army Engineering University of PLA); Hongyu Kuang (National Key Laboratory of Science and Technology on Information System Security); Pengfei Hu (Shandong University)
|
| Low-cost Robot Path Planning Mechanism for Escaping from Dead Ends
|
| Nuanyu Cao (The University of Hong Kong)
|
| Towards Communication-Efficient Collaborative Perception: Harnessing Channel-Spatial Attention and Knowledge Distillation
|
| Fei Wang (Chongqing University); Penglin Dai (Southwest Jiaotong University); Kai Liu (Chongqing University)
|
| Improving Anomaly Scene Recognition with Large Vision-Language Models
|
| Cheng Liu (Chongqing University); Xianlei Long (Chongqing University); Yan Li (Macquarie University); Chao Chen (Chongqing University); Fuqiang Gu (Chongqing University)
|
| 15:30-16:00 |
Coffee break |
|
| 16:00-17:30 |
Session C-8: Intelligent Systems and Applications |
Meeting Room 5 |
| ReSU-Net: State Space Model for 3D Abdominal Multi-organ Segmentation
|
| Tianle Wang (Donghua University); Shan Chang (Donghua University)
|
| Autocue: Targeted Textual Adversarial Attacks with Adversarial Prompts
|
| He Zhu (Institute of Information Engineering, Chinese Academy of Sciences); Ce Li (Institute of Information Engineering,Chinese Academy of Sciences); haitian yang (Institute of Information Engineering, Chinese Academy of Sciences); Yan Wang (Institute of Information Engineering, Chinese Academy of Sciences); Weiqing Huang (Institute of Information Engineering, Chinese Academy of Sciences)
|
| Universal Sign Language Recognition System Using Gesture Description Generation and Large Language Model
|
| jian zhang (Kennesaw State University); Kanchon Kanti Podder (Kennesaw State University); Lingyan Wangy (Kennesaw State University)
|
| A High-precision Generality Method for Chinese Nested Named Entity Recognition
|
| Xiayan Ji (Zhejiang Normal University); Lina Chen (Zhejiang Normal University); Hong Gao (Zhejiang Normal University); Fangyao Shen (Zhejiang Normal University); Hongjie Guo (Zhejiang Normal University)
|
| Tree of Thought Prompt in Robotic Arm Control
|
| Fan Liang (Sam Houston State University); Linqiang Ge (Columbus State University)
|
| 18:00-19:00 |
Dinner |
To be announced later |