Detailed Program

Tuesday, June 24th, 2025 (Tokyo Time)

9:00 – 16:00 Venue Decoration and Setup
14:00 – 16:00 Committee meeting

Wednesday, June 25th, 2025 (Tokyo Time)

Conference Room 第二会議室 Meeting Room 2 第三会議室 Meeting Room 3 研究室7 Lab Room 7
8:30 – 9:00 Opening
9:00 – 9:50 Keynote 1
9:50 – 10:10 Coffee Break
10:10 – 11:10 Section 1 Section 2
11:10 – 12:10 Section 3 Section 4
12:10 – 13:10 Lunch
13:10 – 14:00 Keynote 2
14:00 – 15:00 Section 5 Section 6 AICOM2 1
15:00 – 15:30 Coffee Break
15:30 – 16:30 Section 7 Section 8 AICOM2 2
16:30 – 17:30 Section 9 Section 10
17:30 – 18:30 Section 11 Section 12
18:30 – 20:30 Banquet (outside)

Thursday, June 26th, 2025 (Tokyo Time)

Conference Room 第二会議室 Meeting Room 2 第一会議室 Meeting Room 1
9:00 – 9:50 Keynote 3
9:50 – 10:30 Education Talk
10:30 – 10:50 Coffee Break
10:50 – 11:50 Section 13 Section 14
11:50 – 13:00 Lunch
13:00 – 14:00 Section 15 Section 16
14:00 – 15:00 Section 17 Section 18
15:00 – 16:00 Section 19 Section 20
16:00 – 16:30 Coffee Break
16:30 – 17:30 Section 21 Section 22
17:30 – 18:30 Section 23 Section 24
18:30 – 20:30 Dinner (outside)
20:30 Adjourn

Registration (Check-in) will be available starting June 25, 2025 all the time.

Technical Program - Paper List


The 19th International Conference on Wireless Artificial Intelligent Computing Systems and Applications (WASA 2025)

WASA Section 1:

  • Raihana Tasnim, Madhuri Siddula and Akshita Maradapu Vera Venkata Sai., A Context-Aware Mental Health LLM Chatbot with Enhanced Security.
  • Beining Wu, Jun Huang and Qiang Duan, FedTD3: An Accelerated Learning Approach for UAV Trajectory Planning.
  • Shun Liu, Guijuan Wang, Yubing Han, Chuangen Gao and Jiguo Yu , DP-CDA: A Pricing Mechanism for Edge Computing Resources Based on Combinatorial Double Auction and Differential Privacy Preservation
  • Li Yang, Jia Yu and Dongxiao Yu, Jamming-Resilient Data Aggregation for UAV Ad Hoc Networks.

WASA Section 2:

  • Jiaxing Cheng, Dongliang Fang, Zhongwei Gu, Shichao Lv, Shuaizong Si and Limin Sun. Discovering PLC Web Application Vulnerabilities Impacting Physical Control Using LLM-based Fuzzing.
  • Syed Samiul Alam, Haolin Tang, Guang Yang, Changqing Luo, Wei Wang and Yanxiao Zhao. DSRNet: Hybrid Deep Learning-based Channel Estimation for RIS-Aided Wireless Communication.
  • Chaoliang Li, Xuwei Zhu, Qiang Dou, Yao Liu and Huang Hua, Friend discovery scheme with privacy protection in mobile social networks.
  • Sukun Li, Channel Selection for EEG Biometrics under Emotion Simulations.

WASA Section 3:

  • Jing Qi, An Wang, Keke Gai, Jing Yu and Liehuang Zhu. Intelligent Re-Encryption and Commitment-Driven Dynamic Data Sharing.
  • Zhen Wang, Sen Zhao, Laile Xi, Haiqiang Fei, Feng Cheng, Hong Li and Hongsong Zhu. EHFC: Enhanced Format Clustering via Pre-trained Traffic Model.
  • Yutao Chen, Fanwei Yang, Yubin Zhao and Xiaofan Li. High-Precision Ranging Fusion using Neural Network for Bluetooth Channel Sounding.
  • Jiamin Zhuang, Jing Yu, Xiangyan Qu, Yuanmin Tang, Gaopeng Gou, Gang Xiong and Qi Wu. Soft Multi-View Representation Learning for Disambiguating Text-based Person Retrieval.

WASA Section 4:

  • Chen Yang, Songtao Guo and Pengzhan Zhou. FedSPA: Federated Learning with Similarity-based Prototype Aggregation.
  • Chi Zhang, Peng Jiang, Lei Xu and Liehuang Zhu. Timed and Decentralized Wireless Broadcasting System.
  • Yao Xiao, Zikang Chen, Lei Xu, Keke Gai and Liehuang Zhu, SMDS: Blockchain-Based Sensitive Data Storage for Smart Manufacturing
  • Zhenyu Zhang, Zixuan Ding, Hongjun Dai and Bing Li. A High-Performance AI Processor Architecture: Integrating Multi-Controller with Hybrid DDR Memory.

WASA Section 5:

  • Junjie Wu, Ruoyang Chen and Changyan Yi. A DRL-Based Deviation-Aware Federated Digital Twin Construction over Wireless Edge Network.
  • Zhiying Zhang, Danghui Wang and Jihe Wang. SEER: A Slothful Encoding to Mitigate Read Error of Stop-in-Middle Domain-Wall for Reliable Racetrack Memory.
  • Yingcun Su, Xintao Qiu and Liang Huang. Breaking the Energy Efficiency-Stability Trade-off: Optimal Lyapunov V Tuning for Wireless-Powered MEC.
  • Huarui Yu and Zesheng Cheng. STA-Hyper: Hypergraph-based Spatio-Temporal Attention Network for Next Point-of-Interest Recommendation.
  • Dong Tang, Shuoyang Sun, Yujun Huang and Bin Chen. Generative Adversarial CLIPs for Unsupervised Backlit Image Enhancement.

WASA Section 6:

  • Weilin Sun, Huanhuan Zhang, Anfu Zhou and Huadong Ma. MRCC: A Congestion Control Algorithm for Enhanced QoE in Real-Time Networks.
  • Haixing Li, Yutong Zhou, Chi Zhang and Lingbo Wei. Privacy-Preserving Credential Management for Blockchain-Based Self-Sovereign Identity.
  • Mengjie Li, Anming Dong, Guijuan Wang, Xiang Tian and Jiguo Yu. Wireless Resource Optimization for UAV Swarm Cooperative Sensing via Multi-Agent Multi-Task Deep Reinforcement Learning.
  • Jingyuan Liu, Wei Ren, Ningbo Liu and Xianghan Zheng. A Blockchain-enhanced Hybrid Scheme for Right Registration and Handover.

WASA Section 7:

  • Shanwen Liu, Xi Tao, Weipeng Cao and Zhong Ming. Parallelization Techniques for Large Language Models: A Review from Training to Inference.
  • Jiyuan Wei, Xin Chen, Libo Jiao and Long Zhao. DRL-based Computation Offloading and Resource Allocation in THz Band.
  • Hailong Tang, Lei Shi, Yingfei Zhu, Cheng Gu and Juan Xu. The Defense Against Backdoor Attacks Using Trigger Inversion and Data Augmentation in Clustered Federated Learning.
  • Zheng Lin, Yuxin Zhang, Zhe Chen, Zihan Fang, Yanni Yang, Guoming Zhang, Huan Yang, Cong Wu, Xianhao Chen and Yue Gao. ESL-LEO: An Efficient Split Learning Framework over LEO Satellite Networks.

WASA Section 8:

  • Chujun Feng, Ning Ni, Congyu Lin, Yongxin Zhu and Xiaoying Zheng. Accelerating Elliptic Curve Digital Signature verification on FPGA for secure communication.
  • Dongjiao Sun, Chuanting Zhang, Jingping Qiao, Tiantian Li and Haixia Zhang. Generative Pretrained Transformer for Wireless Traffic Prediction.
  • Zahir Abbas, Shihe Xu and Xinming Zhang. LEO-Integrated Based Partial Task Offloading Optimization in Vehicular Networks.
  • Xiaoshan Cui, Junhua Wu, Qiqi Yu, Tielin Wang, Guangshun Li, Chuanwen Luo and Xin Fan. Online Personalized Federated Learning Methods for Intrusion Detection in Dynamic UAV Networks.

WASA Section 9:

  • Jinhao Zhou and Jun Wu. Real-Time Reliable Large Language Models with Distributed Knowledge Crowdsourcing for Automotive Mobile Intelligence.
  • Jiaqing Shi, Xiayan Ji, Lina Chen, Hong Gao and Xiaodan Xu. Adaptive Feature Fusion Enhanced Cascade Pointer Network for Chinese Relation Extraction.
  • Lian Peng, Meikang Qiu, Chong Li and Zhihui Lu. Quantum Machine Learning: Hybrid System of Quantum and Classical Computing.
  • Zhong Li, Jingyi Ma and Meikang Qiu. GAT-Enhanced DRL Decision Framework for Joint Routing and Scheduling under Vehicular Time-Sensitive Networking.

WASA Section 10:

  • Junru Zheng, Sihan Liang, Wenlin Li, Gaofei Sun and Xiaobing Xian. CSI-Cro: A Cross-Domain Sign Language Recognition System Based on Dual-Attention Feature Decoupled Network.
  • Quan Chen, Hong Gao, Ming Yi, Jing Li, Lianglun Cheng and Yingshu Li. Latency-Optimal and Memory-Aware Model Partitioning for Cooperative Inference at the Edge.
  • Xiaoling Tao, Qiang Gao, Wenbo Zhao, Yunhao Zhang and Haowei Liu. A Sub-Domain Index System for Network Security Situation Assessment.
  • Xinxin Hao, Rui Cao and Liming Fang. Integrating Pretrained Models with Graph Neural Networks for Smart Contract Interpretability.

WASA Section 11:

  • Yizhe Tong, Pengzhi Gao and Peng Zhang. A Simple Heuristic Finding Connectivity Bottleneck in Networks with Shared Risk Resource Groups.
  • Jing Li, Jianping Wang, Weifa Liang, Sajal Das and Quan Chen. Improving the Freshness of Digital Twins in Edge Computing.
  • Weiwei Du, Tao Jing, Xuehan Li, Boyang Zhang, Bo Gao and Minghao Zhu. Joint Offloading and Resource Allocation Optimization based on Multi-coupled Directed Acyclic Graphs for IIoT.
  • Jie Ren, Tao Zhao and Shuhui Chen. SeRed: A Selective Reduction Method for Efficient Network Flow Storage.

WASA Section 12:

  • Burhan Mehraj and Qiang Ye. CAG: A Constraint-Driven Adversarial Traffic Generation Scheme Based on Feature Correlations.
  • Yuxuan He, Chunqiang Hu, Bin Cai and Xiaoshuang Xing. A Supervisor-Oriented Privacy-Preserving Fair Exchange Scheme for V2G.
  • Hailong Teng, Yan Tang and Ziqiang Ma. MACROSS: End-to-End Network Attack Detection Model for EV Charging Station Based on Temporal-Frequency Feature Fusion.
  • Chunbo Wang, Jingqi Wang, Guoying Zhang, Pengfei Hu and Hui Qi. Game Theory-Based Secure Deduplication Method.

WASA Section 13:

  • Yingying Ma, Ping Wu, Chaowen Chang and Jingxu Xiao. A Cuckoo Filter-Based Anomaly Detection and Localization Mechanism for SDN-based Multidomain IoT.
  • Changyu Zheng, Junli Gong, Jianxiong Guo, Zhiqing Tang and Tian Wang. Enhancing Federated Learning in IoT Through Dynamic Spectral Clustering.
  • Mohan Wang, Keke Gai, Jing Yu, Shuo Wang, Zhengkang Fang and Jianbo Gao. Differentially Private Vertical Federated Learning with Dual-Sparsification.
  • Jialiang Chen, Xianshi Su and Wanchun Jiang. Bandwidth Prediction within Playback-time of Buffer Duration based on Frame-level Stable Segment for Live Streaming.

WASA Section 14:

  • Tianyi Xu, Ziqi Gan, Xiaobo Zhou and Tie Qiu. MissingClip: An Industrial Anomaly Detection Method under Modality Missing.
  • Xinyu Zheng, Donghao Wang, Mingyang Li and Jinghua Zhu. Multi-preference sequence recommendation transformer.
  • Terrence Shannon, Yan Huang, Zhiguo Liu, Jishen Yang and Yingshu Li. Exploring Heterogeneous in Federated Learning.
  • Yihang Wang, Tao Jing, Xuehan Li, Boyang Zhang, Bo Gao and Minghao Zhu. Diverse Delay-Sensitive Task Offloading and Resource Allocation for IIoT: An SoI Enhanced.

WASA Section 15:

  • Lei Xu, Ru Li, Chunyu Zhao and Wenhan Hou. DEFA: A Prairie Rat-hole Target Detection Algorithm Integrating Depth Estimation Based on MiDas.
  • Xianlong Dai, Guang Cheng, Li Deng and Ziyang Yu. PIS-EnsemNet: A novel method for predicting the number of devices in hotspot sharing networks based on passive measurement.
  • Xiaochen Huang, Fengbiao Zan, Ning Chen, Songwei Zhang, Xiaobo Zhou and Tie Qiu. Joint Hierarchical Feature Fusion and Progressive Learning for Topology Robustness Prediction.
  • Junjie Chen, Hai Wang and Xiao Ma. A SCA-Based Method for RIS Assisted Over-the-Air Computation.

WASA Section 16:

  • Haoning Wu, Shaowu Wu, Zhicheng Zhang, Hao Zhou, Xiaoping Wu, Duo Li and Xiaoguang Niu. MPAM: Dual-Transformer for Millimeter-Wave Sensing Based Multi-person Activity Monitoring System.
  • Chao Wang, Qiuyu Zhang, Yunhua He and Ke Xiao. Dynamic Graph-based Semi-Supervised Anomaly Detection for In-Vehicle CAN Bus Network.
  • Shulan Guo, Jianbo Li, Haoran Li and Zhiqiang Lv. A Model of Multi-order Sampling Neighbor Aggregation for Traffic Flow Prediction.
  • Xinzhe Hu, Jinchuan Zhang, Ke Yan, Tianqi Wan and Xu Zheng. Physics-Informed Transformer for Efficient Fluid Dynamics Predictions.
  • Song Zhanwei, Fang Dongliang, Zheng Yaowen, Li Hong, Lv Shichao, Shi Zhiqiang and Sun Limin. ICSPFuzzer: An Efficient Fuzzing Technique for ICS Protocols.

WASA Section 17:

  • Qiming Zhao, Wei Hu and Yueyang Liu. MRT-DETR: A New Real-Time Object Detection Method.
  • Jiaming Gu, Shaonan Chen, Yimiao Sun, Yadong Xie, Rui Xi, Qiang Cheng and Yuan He. MASS: Empowering Wi-Fi Human Sensing with Metasurface-Assisted Sample Synthesis.
  • Shoufeng Tai, Pengjing Wang, Jinliang Zhao, Xiaoyu Wang, He Huang and Haipeng Dai. DDC Sketch: A Dynamically Adaptive Framework for Network Traffic Measurement.
  • Jiale Zhang, Yang Luo, Yunlong Cheng, Leixia Wang, Xiaofeng Gao, Xiaochun Yang and Guihai Chen. Timely Watchers: Cost-Effective Schedule for Urban Sensor Patrols.
  • Hu Zhang, Youli Zhang, Hongjun Dai and Huifeng Liu. vGPU Performance Testing Framework for Large Model Inference.

WASA Section 18 :

  • Haozhe Zhang, Junjie Pang, Yan Huang, Zhenzhen Xie and Zelei Liu. FedBridgeICL: Federated Bridging of Small and Large Models for In-Context Learning.
  • Tianqing Man, Haifeng Zhu, Rouyang Chen and Changyan Yi. Hierarchical DRL-Based Multi-Motor Control with Torque Synchronization in Industrial IoT.
  • Jieyu Su, Dawei Li, Ruonan Chen, Yangkun Ren and Mengpei Jia. Double Spending Defense in Consortium Blockchain under Network Partitioning.
  • Jichao Xiong, Wanxuan Wu, Jiageng Chen, Chunhua Su, Weizhong Zhao, Junyu Lin and Dian Jiao. PM-SRCANet: A Privacy-preserving Multimodal Stress Recognition Convolutional Attention Network Model.
  • Xuefeng Jiang, Nan Wang and Yingli Zhong. Data Augmentation Based on Neighborhood Effects to Steer User Interests.

WASA Section 19:

  • Xiumei Fan and Junzhi Jin. Research on location privacy protection methods in vehicle networking.
  • Yuchen Zhu, Xiaoqiang Di, Pengfei Hu, Zichu Zhang, Lei Chen and Kai Huang. A Fair Rate Shaping-Based Congestion Control Strategy for Remote Sensing Satellite Networks.
  • Yafei Li and Guangsheng Feng. Resilient Cooperative Computing for Satellite Mobile Edge Computing Using Multi-Agent DRL.
  • Xinzhi Yi, Chunqiang Hu and Bin Cai. FedALoRA: Adaptive Local LoRA Aggregation for Personalized Federated Learning in LLM.
  • Jiahao Liu, Wei Ren, Yifei Cai, Wenmao Liu, Xianchao Zhang and Tianqing Zhu. A Lightweight Transformation Method for Protecting the Privacy of Image Training in Classification.

WASA Section 20:

  • Jie Liu and Guanyu Gao. CSVA: Complexity-Driven and Semantic-Aware Video Analytics via Edge-Cloud Collaboration.
  • Wanyue Li, Shuyang Li, Jie Hao, Qiang Wu and Ran Wang. Efficient Task Offloading and Resource Allocation in Space-Air-Ground-Sea Networks: A MAPPO-based Approach.
  • Zhiqiang Xu, Zhenrui Cao, Fang Cui, Xiaobo Zhou and Tie Qiu. A Fine-grained Resource Allocation Strategy for Industrial TSN-5G Networks.
  • Jiating Xu, Liang Zhao, Ammar Hawbani, Zhi Liu and Yuanguo Bi. A Task Feature Prediction Approach for Adaptive Computation Offloading in VEC.
  • Jiaxin Tao, Xing Tang, Jing Wang, Yiming Zhou, Yanan Chang and Bing Shi. Exploiting Viaduct Blocking Effects for Enhanced Spectrum Availability in Cognitive Radio-Assisted Internet of Vehicles.

WASA Section 21:

  • Haoxuan Xiong, Yuanyuan Xu, Qinyi Zheng and Kun Zhu. Feature Compression with Spatial Reduction and Hyperprior Enhancement for Collaborative Intelligences.
  • Lv Yuanlong, Xia Hui and Zhang Rui. Black-box universal adversarial attack targeting speaker recognition models.
  • Xiaohui Wei, Mengting Zhou, Nan Jiang, Xiang Li, Qi Wu and Hengshan Yue. GraphFT: A Lightweight Fault-tolerant Framework for Iterative Graph Processing.
  • Heyi Zhang and Jun Wu. Byzantine-Resilient Differentially Private Federated Learning: A Dual-Phase Group-wise Aggregation Approach.
  • Wenfeng Wu, Luping Xiang, Qiang Liu and Kun Yang. Deep Decision Algorithm for DNA Image Storage: Enhancing Accuracy with Edit Distance-Based Quality Assessment.

WASA Section 22:

  • Yabin Peng, Chenyu Zhou, Yuchen Liu, Tong Duan, Zhen Zhang and Jichao Xie. DROIT: A Distributed Robustness Optimization Scheme with Local Information for IoT Topology.
  • Chenhao Wu, Xiangjun Cai, Sheng Zhou and Jiang Liu. A Hybrid EEG Forecasting Model with Rolling Mapping-Partial Decomposition and LSTM.
  • Qiqi Yu, Junhua Wu, Xianshan Cui, Tielin Wang, Guangshun Li, Chuanwen Luo and Xin Fan. A Joint Learning and Communication Framework for Intrusion Detection in Wireless Networks with High-speed UAVs.
  • Cheng Gu, Lei Shi, Binbin Liu, Hailong Tang and Juan Xu. Adaptive Privacy Defense Against Category Inference Attack in Clustered Federated Learning: Balancing Security and Model Performance.
  • Congyu Lin, Zikang Chen, Chujun Feng, Xiaoying Zheng, Yongxin Zhu, Tom Trigano and Dima Bykhovsky. An open X-ray spectrometric dataset for deep-learning based pile-up correction.

WASA Section 23:

  • Hang Ye, Gaoxiang Duan, Haoran Zeng, Yangxin Zhu, Lingxue Meng, Xiaoying Zheng and Yongxin Zhu. KARMA: A Multilevel Decomposition Hybrid Mamba Framework for Multivariate Long-Term Time Series Forecasting.
  • Zhang Zongyao, Zhu Kun, Xu Yuanyuan and Li Juan. Guarding Semantic Communication: A Proactive Security Mechanism Against Eavesdropping.
  • Yingjie Song, Zhiqiang Lv, Haoran Li and Jianbo Li. DeepTTF: A Deep Tree Traffic Forecast Model Based on Tree Structure.
  • Yuhan Yuan, Anming Dong, Wendong Xu, Yubing Han, Jiguo Yu and You Zhou. TransGER: Transformer-Based CNN-BiGRU Architecture for sEMG Gesture Recognition in Time-Frequency Domain.
  • Daoyang Xie, Jingping Qiao and Chuanting Zhang. Multi-Layer IRS-Assisted Wireless-Powered Secure Terahertz Communication.

WASA Section 24:

  • Yanxin Qian, Yan Zhong, Lizhao You, Songtao Liu, Nanqing Zhou and Liqun Fu. A Practical Deep Reinforcement Learning-based QoS-Aware Scheduler for 5G Cellular Networks.
  • Junhui Kuang, Dezhi Zheng, Youyi Huang, Jianye Fu, Shubin Cai, Yinghui Pan and Zhong Ming. Fast Autonomous Exploration in Complex Environments via the Farthest Cluster Representative and Dynamic Information Gain.
  • Yupeng Xue, Anming Dong, Sufang Li, Jiguo Yu and Jia Jia. Lightweight Attention-Based CNN Architecture for CSI Feedback of RIS-Assisted MISO Systems.
  • Siyuan Zhou, Xiong Wang and Linghe Kong. Quantum Routing Design and Implementation for LEO Satellite Networks.

International Symposium on Artificial Intelligence Computing & Communication (AICom2 2025)

AICom2 1:

  • Wei Yang. Nvwa Patches Up the Block: A Powerful Model for Error Concealment in Panoramic Video Transmission.
  • Guangshun Li, Jiansheng Feng and Junhua Wu. A Security Sharing Scheme for Multi-Institutional Access Control of Medical Data Based on Blockchain.
  • Xiaoxuan Qin, Junhua Wu and Guangshun Li. A Secure and Efficient Data Sharing Framework for IoV Using Blockchain and Reputation-Based Incentive Mechanism.
  • Xin Yang, Weiqi Zeng, Ruoting Xiong, Wei Ren and Xianghan Zheng. A PSO-based Method for Finding Approximately Optimal Order for LLL Algorithm.

AICom2 2:

  • Guangshun Li, Xiaoli Zhu and Junhua Wu. Blockchain-based Privacy-preserving Asynchronous Federated Learning.
  • Xiaowei Liu, Jinbao Li and Yingchun Cui. Multilayer Context Network: A New Approach for Gait Phase Detection.
  • Yunxiao Cai and Chunyan Liu. Energy-Constrained Joint Path Planning for Vehicle-UAVs in Task Point Coverage.
  • Junhua Wu, Xuan Cui, Guangshun Li, Jiansheng Feng and Kaiwen Ma. A Blockchain-Assisted Certificateless Authentication Protocol for Internet of Vehicles.
  • Yin Yuxia and Shuai Xiaoying. A Dynamic Frame Slotted ALOHA Based on Q-Learning.