IEEE International Conference on Computer Communications
2-5 May 2022 // Virtual Conference

Accepted Paper List [MAIN CONFERENCE]

List of Accepted Papers in IEEE INFOCOM 2022 Main Conference

  1. 6Forest: An Ensemble Learning-based Approach to Target Generation for Internet-wide IPv6 Scanning [Code/Data Available]

    Tao Yang, Bingnan Hou, Tongqing Zhou and Zhiping Cai (National University of Defense Technology, China)
     
  2. A Comparative Approach to Resurrecting the Market of MOD Vehicular Crowdsensing

    Chaocan Xiang (Chongqing University, China); Yaoyu Li (ChongQing University, China); Yanlin Zhou (Chongqing University, China); Suining He (The University of Connecticut, USA); Yuben Qu (Nanjing University of Aeronautics and Astronautics, China); Zhenhua Li (Tsinghua University, China); Liangyi Gong (Computer Network Information Center, Chinese Academy of Sciences, China); Chao Chen (Chongqing University, China)
     
  3. A Comparative Measurement Study of Commercial 5G mmWave Deployments

    Arvind Narayanan (University of Minnesota, USA); Muhammad Iqbal Rochman (University of Chicago, USA); Ahmad Hassan (University of Minnesota, USA); Bariq S. Firmansyah (Institut Teknologi Bandung, Indonesia); Vanlin Sathya (University of Chicago, USA); Monisha Ghosh (University Of Chicago, USA); Feng Qian (University of Minnesota, Twin Cities, USA); Zhi-Li Zhang (University of Minnesota, USA)
     
  4. A Profit-Maximizing Model Marketplace with Differentially Private Federated Learning

    Peng Sun (The Chinese University of Hong Kong, Shenzhen, China); Xu Chen (Sun Yat-sen University, China); Guocheng Liao (Sun Yat-Sen University, China); Jianwei Huang (The Chinese University of Hong Kong, Shenzhen, China)
     
  5. A Theory of Second-Order Wireless Network Optimization and Its Application on AoI [Code/Data Available]

    Daojing Guo, Khaled Nakhleh and I-Hong Hou (Texas A&M University, USA); Sastry Kompella and Clement Kam (Naval Research Laboratory, USA)
     
  6. A Unified Model for Bi-objective Online Stochastic Bipartite Matching with Two-sided Limited Patience

    Gaofei Xiao and Jiaqi Zheng (Nanjing University, China); Haipeng Dai (Nanjing University & State Key Laboratory for Novel Software Technology, China)
     
  7. ABS: Adaptive Buffer Sizing via Augmented Programmability with Machine Learning [Code/Data Available]

    Jiaxin Tang, Sen Liu and Yang Xu (Fudan University, China); Zehua Guo (Beijing Institute of Technology, China); Junjie Zhang (Fortinet, Inc., USA); Peixuan Gao (Fudan University, USA & New York University, USA); Yang Chen and Xin Wang (Fudan University, China); H. Jonathan Chao (NYU Tandon School of Engineering, USA)
     
  8. Accelerating Deep Learning classification with error-controlled approximate-key caching

    Alessandro Finamore (HUAWEI France, France); Massimo Gallo (Huawei, France); James Roberts (Telecom ParisTech, France); Dario Rossi (Huawei Technologies, France)
     
  9. Adaptive Bitrate with User-level QoE Preference for Video Streaming

    Xutong Zuo (Tsinghua University, China); Jiayu Yang (Beijing University of Posts and Telecommunications, China); Mowei Wang and Yong Cui (Tsinghua University, China)
     
  10. Add/Drop Flexibility and System Complexity Tradeoff in ROADM Designs

    Lexin Pan (Shanghai Jiao Tong University, China); Tong Ye (Shanghai JiaoTong University, China)
     
  11. Addressing Network Bottlenecks with Divide-and-Shuffle Synchronization for Distributed DNN Training

    Weiyan Wang (Hong Kong University of Science and Technology, Hong Kong); Cengguang Zhang (Hong Kong University of Science and Technology, China); Liu Yang (Hong Kong University of Science and Technology, Hong Kong); Kai Chen (Hong Kong University of Science and Technology, China); Kun Tan (Huawei, China)
     
  12. Age-Based Scheduling for Monitoring and Control Applications in Mobile Edge Computing Systems

    Xingqiu He, Sheng Wang, Xiong Wang, Shizhong Xu and Jing Ren (University of Electronic Science and Technology of China, China)
     
  13. AI in 5G: The Case of Online Distributed Transfer Learning over Edge Networks

    Yulan Yuan (Beijing University of Posts and Telecommunications, China); Lei Jiao (University of Oregon, USA); Konglin Zhu (Beijing University of Posts and Telecommunications, China); Xiaojun Lin (Purdue University, USA); Lin Zhang (Beijing University of Posts and Telecommunications, China)
     
  14. Amaging: Acoustic Hand Imaging for Self-adaptive Gesture Recognition

    Penghao Wang, Ruobing Jiang and Chao Liu (Ocean University of China, China)
     
  15. An Efficient Two-Layer Task Offloading Scheme for MEC Networks with Multiple Services Providers

    Ju Ren and Jiani Liu (Tsinghua University, China); Yongmin Zhang, Zhaohui Li and Feng Lyu (Central South University, China); Zhibo Wang (Zhejiang University, China); Yaoxue Zhang (Tsinghua University, China)
     
  16. An RFID and Computer Vision Fusion System for Book Inventory using Mobile Robot

    Jiuwu Zhang and Xiulong Liu (Tianjin University, China); Tao Gu (Macquarie University, Australia); Bojun Zhang (TianJin University, China); Dongdong Liu, Zijuan Liu and Keqiu Li (Tianjin University, China)
     
  17. ANTIGONE: Accurate Navigation Path Caching in Dynamic Road Networks leveraging Route APIs

    Xiaojing Yu and Xiang-Yang Li (University of Science and Technology of China, China); Jing Zhao (Illinois Institute of Technology, USA); Guobin Shen (Joveai Inc, USA); Nikolaos M. Freris and Lan Zhang (University of Science and Technology of China, China)
     
  18. Ao\(^2\)I: Minimizing Age of Outdated Information to Improve Freshness in Data Collection

    Qingyu Liu, Chengzhang Li, Thomas Hou, Wenjing Lou and Jeffrey Reed (Virginia Tech, USA); Sastry Kompella (Naval Research Laboratory, USA)
     
  19. AoDNN: An Auto-Offloading Approach to Optimize Deep Inference for Fostering Mobile Web

    Yakun Huang and Xiuquan Qiao (Beijing University of Posts and Telecommunications, China); Schahram Dustdar (Vienna University of Technology, Austria); Yan Li (Shanxi Transportation Planning Survey and Design Institute, China)
     
  20. AoI-centric Task Scheduling for Autonomous Driving Systems

    Chengyuan Xu, Qian Xu and Jianping Wang (City University of Hong Kong, Hong Kong); Kui Wu (University of Victoria, Canada); Kejie Lu (University of Puerto Rico at Mayaguez, Puerto Rico); Chunming Qiao (University at Buffalo, USA)
     
  21. AoI-minimal UAV Crowdsensing by Model-based Graph Convolutional Reinforcement Learning

    Zipeng Dai, Chi Harold Liu, Yuxiao Ye, Rui Han, Ye Yuan and Guoren Wang (Beijing Institute of Technology, China); Jian Tang (Syracuse University, USA)
     
  22. ArmSpy: Video-assisted PIN Inference Leveraging Keystroke-induced Arm Posture Changes

    Yuefeng Chen, YiCong Du, Chunlong Xu, Yanghai Yu and Hongbo Liu (University of Electronic Science and Technology of China, China); Huan Dai (Suzhou University of Science and Technology, China); Yanzhi Ren (University of Electronic Science and Technology of China, China); Jiadi Yu (Shanghai Jiao Tong University, China)
     
  23. Auter: Automatically Tuning Multi-layer Network Buffers in Long-Distance Shadowsocks Networks

    Xu He (George Mason University, USA); Jiahao Cao (Tsinghua University, China); Shu Wang and Kun Sun (George Mason University, USA); Lisong Xu (University of Nebraska-Lincoln, USA); Qi Li (Tsinghua University, China)
     
  24. AutoByte: Automatic Configuration for Optimal Communication Scheduling in DNN Training

    Yiqing Ma (HKUST, China); Hao Wang (HKUST, Hong Kong); Yiming Zhang (NUDT & NiceX Lab, China); Kai Chen (Hong Kong University of Science and Technology, China)
     
  25. Backdoor Defense with Machine Unlearning

    Yang Liu (Xidian University, China); MingYuan Fan (University of FuZhou, China); Cen Chen (East China Normal University, China); Ximeng Liu (Fuzhou University, China); Zhuo Ma (Xidian University, China); Wang Li (Ant Group, China); Jianfeng Ma (Xidian University, China)
     
  26. Batch Adaptative Streaming for Video Analytics

    Lei Zhang (Shenzhen University, China); Yuqing Zhang (ShenZhen University, China); Ximing Wu (Shenzhen University, China); Fangxin Wang (The Chinese University of Hong Kong, Shenzhen, China); Laizhong Cui (Shenzhen University, China); Zhi Wang (Tsinghua University, China); Jiangchuan Liu (Simon Fraser University, Canada)
     
  27. Big Brother is Listening: An Evaluation Framework on Ultrasonic Microphone Jammers

    Yike Chen, Ming Gao, Yimin Li, Lingfeng Zhang, Li Lu and Feng Lin (Zhejiang University, China); Jinsong Han (Zhejiang University & School of Cyber Science and Technology, China); Kui Ren (Zhejiang University, China)
     
  28. Blockchain Based Non-repudiable IoT Data Trading: Simpler, Faster, and Cheaper

    Fei Chen, Jiahao Wang and Changkun Jiang (Shenzhen University, China); Tao Xiang (Chongqing University, China); Yuanyuan Yang (Stony Brook University, USA)
     
  29. Boosting Internet Card Cellular Business via User Portraits: A Case of Churn Prediction

    Fan Wu and Ju Ren (Tsinghua University, China); Feng Lyu (Central South University, China); Peng Yang (Huazhong University of Science and Technology, China); Yongmin Zhang and Deyu Zhang (Central South University, China); Yaoxue Zhang (Tsinghua University, China)
     
  30. BrokerChain: A Cross-Shard Blockchain Protocol for Account/Balance-based State Sharding

    Huawei Huang, Xiaowen Peng, Jianzhou Zhan, Shenyang Zhang and Yue Lin (Sun Yat-Sen University, China); Zibin Zheng (School of Data and Computer Science, Sun Yat-sen University, China); Song Guo (The Hong Kong Polytechnic University, Hong Kong)
     
  31. Caching-based Multicast Message Authentication in Time-critical Industrial Control Systems

    Utku Tefek (Advanced Digital Sciences Center, Singapore & University of Illinois Urbana-Champaign, USA); Ertem Esiner (Advanced Digital Sciences Center, Singapore); Daisuke Mashima (Advanced Digital Sciences Center & National University of Singapore, Singapore); Binbin Chen (Singapore University of Technology and Design, Singapore); Yih-Chun Hu (University of Illinois at Urbana-Champaign, USA)
     
  32. Can We Obtain Fine-grained Heartbeat Waveform via Contact-free RF-sensing?

    Shujie Zhang and Tianyue Zheng (Nanyang Technological University, Singapore); Zhe Chen (School of Computer Science and Engineering, Nangyang Technological University, Singapore); Jun Luo (Nanyang Technological University, Singapore)
     
  33. CASVA: Configuration-Adaptive Streaming for Live Video Analytics

    Miao Zhang (Simon Fraser University, Canada); Fangxin Wang (The Chinese University of Hong Kong, Shenzhen, China); Jiangchuan Liu (Simon Fraser University, Canada)
     
  34. CausalRD: A Causal View of Rumor Detection via Eliminating Popularity and Conformity Biases

    Weifeng Zhang, Ting Zhong and Ce Li (University of Electronic Science and Technology of China, China); Kunpeng Zhang (University of Maryland, USA); Fan Zhou (University of Electronic Science and Technology of China, China)
     
  35. ChARM: NextG Spectrum Sharing Through Data-Driven Real-Time O-RAN Dynamic Control [Code/Data Available]

    Luca Baldesi, Francesco Restuccia and Tommaso Melodia (Northeastern University, USA)
     
  36. ComAI: Enabling Lightweight, Collaborative Intelligence by Retrofitting Vision DNNs

    Kasthuri Jayarajah (University of Maryland Baltimore County, USA); Dhanuja Wanniarachchige (Singapore Management University, Singapore); Tarek Abdelzaher (University of Illinois, Urbana Champaign, USA); Archan Misra (Singapore Management University, Singapore)
     
  37. Communication-Efficient Device Scheduling for Federated Learning Using Stochastic Optimization

    Jake Perazzone (US Army Research Lab, USA); Shiqiang Wang (IBM T. J. Watson Research Center, USA); Mingyue Ji (University of Utah, USA); Kevin S Chan (US Army Research Laboratory, USA)
     
  38. Connectivity Maintenance in Uncertain Networks under Adversarial Attack

    Jianzhi Tang, Luoyi Fu and Jiaxin Ding (Shanghai Jiao Tong University, China); Xinbing Wang (Shanghai Jiaotong University, China); Guihai Chen (Shanghai Jiao Tong University, China)
     
  39. Constrained In-network Computing with Low Congestion in Datacenter Networks

    Raz Segal (Ben Gurion University of the Negev, Israel); Chen Avin and Gabriel Scalosub (Ben-Gurion University of the Negev, Israel)
     
  40. Copa+: Analysis and Improvement of thedelay-based congestion control algorithm Copa [Code/Data Available]

    Wanchun Jiang, Haoyang Li, Zheyuan Liu, Jia Wu and Jiawei Huang (Central South University, China); Danfeng Shan (Xi'an Jiaotong University, China); Jianxin Wang (Central South University, China)
     
  41. Cost Effective MLaaS Federation: A Combinatorial Reinforcement Learning Approach

    Shuzhao Xie and Yuan Xue (Tsinghua University, China); Yifei Zhu (Shanghai Jiao Tong University, China); Zhi Wang (Tsinghua University, China)
     
  42. CoToRu: Automatic Generation of Network Intrusion Detection Rules from Code

    Heng Chuan Tan (Advanced Digital Sciences Center, Singapore); Carmen Cheh and Binbin Chen (Singapore University of Technology and Design, Singapore)
     
  43. CurveALOHA: Non-linear Chirps Enabled High Throughput Random Channel Access for LoRa

    Chenning Li, Zhichao Cao and Li Xiao (Michigan State University, USA)
     
  44. Cutting Tail Latency in Commodity Datacenters with Cloudburst

    Gaoxiong Zeng (Hong Kong University of Science and Technology, China); Li Chen (Huawei, China); Bairen Yi (Bytedance, China); Kai Chen (Hong Kong University of Science and Technology, China)
     
  45. Cutting Through the Noise to Infer Autonomous System Topology

    Kirtus G Leyba and Joshua J. Daymude (Arizona State University, USA); Jean-Gabriel Young (University of Vermont, USA); Mark Newman (University of Michigan, USA); Jennifer Rexford (Princeton University, USA); Stephanie Forrest (Arizona State University, USA)
     
  46. D\(^2\)BF---Data-Driven Beamforming in MU-MIMO with Channel Estimation Uncertainty

    Shaoran Li, Nan Jiang, Yongce Chen, Thomas Hou, Wenjing Lou and Weijun Xie (Virginia Tech, USA)
     
  47. DBAC: Directory-Based Access Control for Geographically Distributed IoT Systems [Code/Data Available]

    Luoyao Hao, Vibhas V Naik and Henning Schulzrinne (Columbia University, USA)
     
  48. Deadline-aware Multipath Transmission for Streaming Blocks

    Xutong Zuo and Yong Cui (Tsinghua University, China); Xin Wang (Stony Brook University, USA); Jiayu Yang (Beijing University of Posts and Telecommunications, China)
     
  49. Decentralized Task Offloading in Edge Computing: A Multi-User Multi-Armed Bandit Approach

    Xiong Wang (Huazhong University of Science and Technology, China); Jiancheng Ye (Huawei, Hong Kong); John C.S. Lui (The Chinese University of Hong Kong, Hong Kong)
     
  50. Deep Learning on Mobile Devices Through Neural Processing Units and Edge Computing

    Tianxiang Tan and Guohong Cao (The Pennsylvania State University, USA)
     
  51. DeepEar: Sound Localization with Binaural Microphones [Code/Data Available]

    Qiang Yang and Yuanqing Zheng (The Hong Kong Polytechnic University, Hong Kong)
     
  52. Detecting and Resolving PFC Deadlocks with ITSY Entirely in the Data Plane

    Xinyu Crystal Wu and T. S. Eugene Ng (Rice University, USA)
     
  53. DiFi: A Go-as-You-Pay Wi-Fi Access System

    Lianjie Shi, Runxin Tian, Xin Wang and Richard T. B. Ma (National University of Singapore, Singapore)
     
  54. Dino: A Block Transmission Protocol with Low Bandwidth Consumption and Propagation Latency

    Zhenxing Hu and Zhen Xiao (Peking University, China)
     
  55. Distributed Bandits with Heterogeneous Agents

    Lin Yang (University of Massachusetts, Amherst, USA); Yu-Zhen Janice Chen (University of Massachusetts at Amherst, USA); Mohammad Hajiesmaili (University of Massachusetts Amherst, USA); John Chi Shing Lui (Chinese University of Hong Kong, Hong Kong); Don Towsley (University of Massachusetts at Amherst, USA)
     
  56. Distributed Cooperative Caching in Unreliable Edge Environments

    Yu Liu, Yingling Mao, Xiaojun Shang, Zhenhua Liu and Yuanyuan Yang (Stony Brook University, USA)
     
  57. Distributed Inference with Deep Learning Models across Heterogeneous Edge Devices

    Chenghao Hu and Baochun Li (University of Toronto, Canada)
     
  58. DNN-Driven Compressive Offloading for Edge-Assisted Semantic Video Segmentation

    Xuedou Xiao, Juecheng Zhang and Wei Wang (Huazhong University of Science and Technology, China); Jianhua He (Essex University, United Kingdom (Great Britain)); Qian Zhang (Hong Kong University of Science and Technology, Hong Kong)
     
  59. Don't Miss Weak Packets: Boosting LoRa Reception with Antenna Diversities [Code/Data Available]

    Ningning Hou, Xianjin Xia and Yuanqing Zheng (The Hong Kong Polytechnic University, Hong Kong)
     
  60. DroneSense: Leveraging Drones for Sustainable Urban-scale Sensing of Open Parking Spaces

    Dong Zhao (Beijing University of Posts and Telecommunications, China); Mingzhe Cao (BeiUniversity of Posts and Telecommunications, China); Lige Ding, Qiaoyue Han, Yunhao Xing and Huadong Ma (Beijing University of Posts and Telecommunications, China)
     
  61. Dual-track Protocol Reverse Analysis Based on Share Learning

    Weiyao Zhang, Xuying Meng and Yujun Zhang (Institute of Computing Technology, Chinese Academy of Sciences, China)
     
  62. Dyssect: Dynamic Scaling of Stateful Network Functions [Code/Data Available]

    Fabricio Carvalho (Federal University of Mato Grosso do Sul, Brazil); Ronaldo A. Ferreira (UFMS, Brazil); Italo Cunha (Universidade Federal de Minas Gerais, Brazil); Marcos A. M. Vieira (Federal University of Minas Gerais, Brazil); Murali K Ramanathan (Uber Technologies Inc, USA)
     
  63. E2E Fidelity Aware Routing and Purification for Throughput Maximization in Quantum Networks

    Yangming Zhao and Gongming Zhao (University of Science and Technology of China, China); Chunming Qiao (University at Buffalo, USA)
     
  64. EdgeMatrix: A Resources Redefined Edge-Cloud System for Prioritized Services

    Yuanming Ren, Shihao Shen, Yanli Ju and Xiaofei Wang (Tianjin University, China); Wenyu Wang (Shanghai Zhuichu Networking Technologies Co., Ltd., China); Victor C.M. Leung (Shenzhen University, China & The University of British Columbia, Canada)
     
  65. EdgeTuner: Fast Scheduling Algorithm Tuning for Dynamic Edge-Cloud Workloads and Resources

    Rui Han, Shilin Wen, Chi Harold Liu, Ye Yuan and Guoren Wang (Beijing Institute of Technology, China); Lydia Y. Chen (IBM Zurich Research Laboratory, Switzerland)
     
  66. Efficient Pipeline Planning for Expedited Distributed DNN Training

    Ziyue Luo and Xiaodong Yi (The University of Hong Kong, Hong Kong); Long Guoping (Institute of Computing Technology, Chinese Academy of Sciences, China); Shiqing Fan (Alibaba Group, China); Chuan Wu (The University of Hong Kong, Hong Kong); Jun Yang and Wei Lin (Alibaba Group, China)
     
  67. Enabling Low-latency-capable Satellite-Ground Topology for Emerging LEO Satellite Networks

    Yaoying Zhang, Qian Wu, Zeqi Lai and Hewu Li (Tsinghua University, China)
     
  68. Enabling QoE Support for Interactive Applications over Mobile Edge with High User Mobility

    Xiaojun Shang (Stony Brook University, USA); Yaodong Huang (Shenzhen University, China); Yingling Mao, Zhenhua Liu and Yuanyuan Yang (Stony Brook University, USA)
     
  69. Encoding based Range Detection in Commodity RFID Systems [Code/Data Available]

    Xi Yu and Jia Liu (Nanjing University, China); Shigeng Zhang (Central South University, China); Xingyu Chen, Xu Zhang and Lijun Chen (Nanjing University, China)
     
  70. Energy Saving in Heterogeneous Wireless Rechargeable Sensor Networks

    Riheng Jia, Jinhao Wu, Jianfeng Lu, Minglu Li, Feilong Lin and Zhonglong Zheng (Zhejiang Normal University, China)
     
  71. Energy-Efficient Trajectory Optimization for Aerial Video Surveillance under QoS Constraints

    Cheng Zhan (Southwest University, China); Han Hu (Beijing Institute of Technology, China); Shiwen Mao (Auburn University, USA); Jing Wang (Renmin University of China, China)
     
  72. Escala: Timely Elastic Scaling of Control Channels in Network Measurement

    Hongyan Liu (Zhejiang University, China); Xiang Chen (Zhejiang University, Peking University, and Fuzhou University, China); Qun Huang (Peking University, China); Dezhang Kong (Zhejiang University, China); Sun Jinbo (Institute of Computing Technology, Chinese Academy of Sciences, China); Dong Zhang (Fuzhou University, China); Haifeng Zhou and Chunming Wu (Zhejiang University, China)
     
  73. Experimental Design Networks: A Paradigm for Serving Heterogeneous Learners under Networking Constraints [Code/Data Available]

    Yuezhou Liu, Yuanyuan Li, Lili Su, Edmund Yeh and Stratis Ioannidis (Northeastern University, USA)
     
  74. Fast and Heavy Disjoint Weighted Matchings for Demand-Aware Datacenter Topologies [Code/Data Available]

    Kathrin Hanauer, Monika Henzinger, Stefan Schmid and Jonathan Trummer (University of Vienna, Austria)
     
  75. Fast and Secure Key Generation with Channel Obfuscation in Slowly Varying Environments [Code/Data Available]

    Guyue Li and Haiyu Yang (Southeast University, China); Junqing Zhang (University of Liverpool, United Kingdom (Great Britain)); Hu Aiqun (Southeast University, China); Hongbo Liu (University of Electronic Science and Technology of China, China)
     
  76. FeCo: Boosting Intrusion Detection Capability in IoT Networks via Contrastive Learning

    Ning Wang (Virginia Tech, USA); Yimin Chen (University of Massachusetts Lowell, USA); Yang Hu (Virgina Tech, USA); Wenjing Lou and Thomas Hou (Virginia Tech, USA)
     
  77. FedFPM: A Unified Federated Analytics Framework for Collaborative Frequent Pattern Mining [Code/Data Available]

    Zibo Wang and Yifei Zhu (Shanghai Jiao Tong University, China); Dan Wang (The Hong Kong Polytechnic University, Hong Kong); Zhu Han (University of Houston, USA)
     
  78. FLASH: Federated Learning for Automated Selection of High-band mmWave Sectors

    Batool Salehihikouei, Jerry Z Gu, Debashri Roy and Kaushik Chowdhury (Northeastern University, USA)
     
  79. FlexPatch: Fast and Accurate Object Detection for On-device High-Resolution Live Video Analytics

    Kichang Yang, Juheon Yi and Kyungjin Lee (Seoul National University, Korea (South)); Youngki Lee (Seoul National University, Singapore)
     
  80. FlowShark: Sampling for High Flow Visibility in SDNs

    Sogand Sadrhaghighi (University of Calgary, Canada); Mahdi Dolati (University of Tehran, Iran); Majid Ghaderi (University of Calgary, Canada); Ahmad Khonsari (University of Tehran, Iran)
     
  81. FUME: Fuzzing Message Queuing Telemetry Transport Brokers [Code/Data Available]

    Bryan Pearson (University of Central Florida, USA); Yue Zhang (Jinan University, China); Cliff Zou (University of Central Florida, USA); Xinwen Fu (University of Massachusetts Lowell, USA)
     
  82. GADGET: Online Resource Optimization for Scheduling Ring-All-Reduce Learning Jobs [Code/Data Available]

    Menglu Yu and Ye Tian (Iowa State University, USA); Bo Ji (Virginia Tech, USA); Chuan Wu (The University of Hong Kong, Hong Kong); Hridesh Rajan (Iowa State University, USA); Jia Liu (The Ohio State University, USA)
     
  83. GASLA: Enhancing the Applicability of Sign Language Translation

    Jiao Li, Yang Liu, Weitao Xu and Zhenjiang Li (City University of Hong Kong, Hong Kong)
     
  84. Impact of Later-Stages COVID-19 Response Measures on Spatiotemporal Mobile Service Usage [Code/Data Available]

    André Felipe Zanella, Orlando E. Martínez-Durive and Sachit Mishra (IMDEA Networks Institute, Spain); Zbigniew Smoreda (Orange Labs & France Telecom Group, France); Marco Fiore (IMDEA Networks Institute, Spain)
     
  85. InertiEAR: Automatic and Device-independent IMU-based Eavesdropping on Smartphones

    Ming Gao, Yajie Liu, Yike Chen, Yimin Li, Zhongjie Ba and Xian Xu (Zhejiang University, China); Jinsong Han (Zhejiang University & School of Cyber Science and Technology, China)
     
  86. IoTMosaic: Inferring User Activities from IoT Network Traffic in Smart Homes

    Yinxin Wan, Kuai Xu, Feng Wang and Guoliang Xue (Arizona State University, USA)
     
  87. JADE: Data-Driven Automated Jammer Detection Framework for Operational Mobile Networks

    Caner Kilinc (University of Edinburgh, Sweden); Mahesh K Marina (The University of Edinburgh, United Kingdom (Great Britain)); Muhammad Usama (Information Technology University (ITU), Punjab, Lahore, Pakistan); Salih Ergüt (Oredata, Turkey & Rumeli University, Turkey); Jon Crowcroft (University of Cambridge, United Kingdom (Great Britain)); Tugrul Gundogdu and Ilhan Akinci (Turkcell, Turkey)
     
  88. Jingwei: An Efficient and Adaptable Data Migration Strategy for Deduplicated Storage Systems

    Geyao Cheng, Deke Guo, Lailong Luo, Junxu Xia and Yuchen Sun (National University of Defense Technology, China)
     
  89. Joint Near-Optimal Age-based Data Transmission and Energy Replenishment Scheduling at Wireless-Powered Network Edge

    Quan Chen (Guangdong University of Technology, China); Zhipeng Cai (Georgia State University, USA); Cheng Liang lun and Feng Wang (Guangdong University of Technology, China); Hong Gao (University of Harbin Institute Technology, China)
     
  90. Joint Order Dispatch and Charging for Electric Self-Driving Taxi Systems

    Guiyun Fan, Haiming Jin and Yiran Zhao (Shanghai Jiao Tong University, China); Yiwen Song (Carnegie Mellon University, USA); Xiaoying Gan and Jiaxin Ding (Shanghai Jiao Tong University, China); Lu Su (Purdue University, USA); Xinbing Wang (Shanghai Jiaotong University, China)
     
  91. Joint Resource Management and Flow Scheduling for SFC Deployment in Hybrid Edge-and-Cloud Network

    Yingling Mao, Xiaojun Shang and Yuanyuan Yang (Stony Brook University, USA)
     
  92. Joint Superposition Coding and Training for Federated Learning over Multi-Width Neural Networks

    Hankyul Baek, Won Joon Yun and Yunseok Kwak (Korea University, Korea (South)); Soyi Jung (Hallym University, Korea (South)); Mingyue Ji (University of Utah, USA); Mehdi Bennis (Centre of Wireless Communications, University of Oulu, Finland); Jihong Park (Deakin University, Australia); Joongheon Kim (Korea University, Korea (South))
     
  93. Kalmia: A Heterogeneous QoS-aware Scheduling Framework for DNN Tasks on Edge Servers

    Ziyan Fu and Ju Ren (Tsinghua University, China); Deyu Zhang (Central South University, China); Yuezhi Zhou and Yaoxue Zhang (Tsinghua University, China)
     
  94. Landing Reinforcement Learning onto Smart Scanning of The Internet of Things

    Jian Qu and Xiaobo Ma (Xi'an Jiaotong University, China); Wenmao Liu and Hongqing Sang (NSFOCUS Inc., China); Jianfeng Li (Xi'an Jiaotong University, China); Lei Xue and Xiapu Luo (The Hong Kong Polytechnic University, Hong Kong); Zhenhua Li (Tsinghua University, China); Li Feng (Center of Dependable and Secure Computing (CDSC), China); Xiaohong Guan (Xi'an Jiaotong University & Tsinghua University, China)
     
  95. Large-scale Evaluation of Malicious Tor Hidden Service Directory Discovery

    Chunmian Wang, Zhen Ling, Wenjia Wu, Qi Chen and Ming Yang (Southeast University, China); Xinwen Fu (University of Massachusetts Lowell, USA)
     
  96. Layer-aware Collaborative Microservice Deployment toward Maximal Edge Throughput

    Lin Gu, Zirui Chen and Honghao Xu (Huazhong University of Science and Technology, China); Deze Zeng (China University of Geosciences, China); Bo Li (Hong Kong University of Science and Technology, Hong Kong); Hai Jin (Huazhong University of Science and Technology, China)
     
  97. Lazy Self-Adjusting Bounded-Degree Networks for the Matching Model [Code/Data Available]

    Evgeniy Feder (ITMO University, Russia); Ichha Rathod and Punit Shyamsukha (Indian Institute of Technology Delhi, India); Robert Sama (University of Vienna, Austria); Vitaly Aksenov (ITMO University, Russia); Iosif Salem and Stefan Schmid (University of Vienna, Austria)
     
  98. Learning Buffer Management Policies for Shared Memory Switches

    Mowei Wang, Sijiang Huang and Yong Cui (Tsinghua University, China); Wendong Wang (Beijing University of Posts and Telecommunications, China); Zhenhua Liu (Huawei Technologies, China)
     
  99. Learning for Crowdsourcing: Online Dispatch for Video Analytics with Guarantee

    Yu Chen, Sheng Zhang, Yibo Jin and Zhuzhong Qian (Nanjing University, China); Mingjun Xiao (University of Science and Technology of China, China); Ning Chen and Zhi Ma (Nanjing University, China)
     
  100. Learning for Robust Combinatorial Optimization: Algorithm and Application

    Zhihui Shao (UC Riverside, USA); Jianyi Yang (University of California, Riverside, USA); Cong Shen (University of Virginia, USA); Shaolei Ren (University of California, Riverside, USA)
     
  101. Learning from Delayed Semi-Bandit Feedback under Strong Fairness Guarantees

    Juaren Steiger (Queen's University, Canada); Bin Li (The Pennsylvania State University, USA); Ning Lu (Queen's University, Canada)
     
  102. Learning Optimal Antenna Tilt Control Policies: A Contextual Linear Bandit Approach

    Filippo Vannella (KTH Royal Institute of Technology & Ericsson Research, Sweden); Alexandre Proutiere (KTH, Sweden); Yassir Jedra (KTH Royal Institute of Technology, Sweden); Jaeseong Jeong (Ericsson Research, Sweden)
     
  103. Learning-based Multi-Drone Network Edge Orchestration for Video Analytics

    Chengyi Qu, Rounak Singh, Alicia Esquivel Morel and Prasad Calyam (University of Missouri-Columbia, USA)
     
  104. Lightweight Trilinear Pooling based Tensor Completion for Network Traffic Monitoring

    Yudian Ouyang and Kun Xie (Hunan University, China); Xin Wang (Stony Brook University, USA); Jigang Wen (Chinese Academy of Science & Institute of Computing Technology, China); Guangxing Zhang (Institute of Computing Technology Chinese Academy of Sciences, China)
     
  105. LoRadar: An Efficient LoRa Channel Occupancy Acquirer based on Cross-channel Scanning [Code/Data Available]

    Fu Yu, Xiaolong Zheng, Liang Liu and Huadong Ma (Beijing University of Posts and Telecommunications, China)
     
  106. LossLeaP: Learning to Predict for Intent-Based Networking [Code/Data Available]

    Alan Collet (IMDEA Networks Institute, Spain); Albert Banchs (Universidad Carlos III de Madrid, Spain); Marco Fiore (IMDEA Networks Institute, Spain)
     
  107. LSAB: Enhancing Spatio-Temporal Efficiency of AoA Tracking Systems

    Qingrui Pan, Zhenlin An and Qiongzheng Lin (The Hong Kong Polytechnic University, Hong Kong); Lei Yang (The Hong Kong Polytechnic University, China)
     
  108. LSync: A Universal Event-synchronizing Solution for Live Streaming

    Yifan Xu, Fan Dang, Rongwu Xu and Xinlei Chen (Tsinghua University, China); Yunhao Liu (Tsinghua University & The Hong Kong University of Science and Technology, China)
     
  109. Lumos: towards Better Video Streaming QoE through Accurate Throughput Prediction

    Gerui Lv, Qinghua Wu, Weiran Wang and Zhenyu Li (Institute of Computing Technology, Chinese Academy of Sciences, China); Gaogang Xie (CNIC Chinese Academy of Sciences & University of Chinese Academy of Sciences, China)
     
  110. M3: A Sub-Millisecond Scheduler for Multi-Cell MIMO Networks under C-RAN Architecture

    Yongce Chen, Thomas Hou, Wenjing Lou and Jeffrey Reed (Virginia Tech, USA); Sastry Kompella (Naval Research Laboratory, USA)
     
  111. Mag-E4E: Trade Efficiency for Energy in Magnetic MIMO Wireless Power Transfer System

    Xiang Cui, Hao Zhou, Jialin Deng and Wangqiu Zhou (University of Science and Technology of China, China); Xing Guo (Anhui University, China); Yu Gu (Hefei University of Technology, China)
     
  112. MalGraph: Hierarchical Graph Neural Networks for Robust Windows Malware Detection

    Xiang Ling (Institute of Software, Chinese Academy of Sciences, China & Zhejiang University, China); Lingfei Wu (JD.COM Silicon Valley Research Center, USA); Wei Deng, Zhenqing Qu, Jiangyu Zhang and Sheng Zhang (Zhejiang University, China); Tengfei Ma (IBM T. J. Watson Research Center, USA); Bin Wang (Hangzhou Hikvision Digital Technology Co., Ltd, China); Chunming Wu (College of Computer Science, Zhejiang University, China); Shouling Ji (Zhejiang University, China & Georgia Institute of Technology, USA)
     
  113. MARISA: A Self-configuring Metasurfaces Absorption and Reflection Solution Towards 6G

    Antonio Albanese (NEC Laboratories Europe GmbH & Universidad Carlos III de Madrid, Germany); Francesco Devoti and Vincenzo Sciancalepore (NEC Laboratories Europe GmbH, Germany); Marco Di Renzo (CNRS & Paris-Saclay University, France); Xavier Costa-Perez (ICREA and i2cat & NEC Laboratories Europe, Spain)
     
  114. Maximizing h-hop Independently Submodular Functions Under Connectivity Constraint

    Wenzheng Xu and Dezhong Peng (Sichuan University, China); Weifa Liang and Xiaohua Jia (City University of Hong Kong, Hong Kong); Zichuan Xu (Dalian University of Technology, China); Pan Zhou (School of CSE, Huazhong University of Science and Technology, China); Weigang Wu and Xiang Chen (Sun Yat-sen University, China)
     
  115. MC-Sketch: Enabling Heterogeneous Network Monitoring Resolutions with Multi-Class Sketch

    Kate Ching-Ju Lin (National Chiao Tung University, Taiwan); Wei-Lun Lai (National Yang-Ming Chiao Tung University, Taiwan)
     
  116. MDoC: Compromising WRSNs through Denial of Charge by Mobile Charger

    Chi Lin, Pengfei Wang, Qiang Zhang, Hao Wang, Lei Wang and Guowei WU (Dalian University of Technology, China)
     
  117. Mercury: A Simple Transport Layer Scheduler to Accelerate Distributed DNN Training

    Qingyang Duan, Zeqin Wang and Yuedong Xu (Fudan University, China); Shaoteng Liu (Huawei Corp., China); Jun Wu (Fudan University, China)
     
  118. Midpoint Optimization for Segment Routing

    Alexander Brundiers (Osnabrück University, Germany); Timmy Schüller (Deutsche Telekom Technik GmbH & Osnabrück University, Germany); Nils Aschenbruck (Osnabrück University, Germany)
     
  119. MILLIEAR: Millimeter-wave Acoustic Eavesdropping with Unconstrained Vocabulary

    Pengfei Hu and Yifan Ma (Shandong University, China); Panneer Selvam Santhalingam and Parth Pathak (George Mason University, USA); Xiuzhen Cheng (Shandong University, China)
     
  120. Minimal Total Deviation in TCAM Load Balancing

    Yaniv Sadeh (Tel Aviv University, Israel); Ori Rottenstreich (Technion - Israel Institute of Technology, Israel); Haim Kaplan (Tel-Aviv University, Israel)
     
  121. mmECG: Monitoring Human Cardiac Cycle in Driving Environments Leveraging Millimeter Wave

    Xiangyu Xu and Jiadi Yu (Shanghai Jiao Tong University, China); Chenguang Ma (Ant Financial Services Group, China); Yanzhi Ren and Hongbo Liu (University of Electronic Science and Technology of China, China); Yanmin Zhu, Yi-Chao Chen and Feilong Tang (Shanghai Jiao Tong University, China)
     
  122. mmPhone: Acoustic Eavesdropping on Loudspeakers via mmWave-characterized Piezoelectric Effect

    Chao Wang, Feng Lin, Tiantian Liu, Ziwei Liu, Yijie Shen, Zhongjie Ba and Li Lu (Zhejiang University, China); Wenyao Xu (SUNY Buffalo & Wireless Health Institute, USA); Kui Ren (Zhejiang University, China)
     
  123. MoDEMS: Optimizing Edge Computing Migrations For User Mobility

    Taejin Kim (Carnegie Mellon University, USA); Sandesh Dhawaskar sathyanarayana (Energy Sciences Network, Lawrence Berkeley National Laboratory & University of Colorado Boulder, USA); Siqi Chen (University of Colorado Boulder, USA); Youngbin Im (Ulsan National Institute of Science and Technology, Korea (South)); Xiaoxi Zhang (Sun Yat-sen University, China); Sangtae Ha (University of Colorado Boulder, USA); Carlee Joe-Wong (Carnegie Mellon University, USA)
     
  124. Mousika: Enable General In-Network Intelligence in Programmable Switches by Knowledge Distillation [Code/Data Available]

    Guorui Xie (Tsinghua University, China); Qing Li (Peng Cheng Laboratory, China); Yutao Dong and Guanglin Duan (Tsinghua University, China); Yong Jiang (Graduate School at Shenzhen, Tsinghua University, China); Jingpu Duan (Southern University of Science and Technology, China)
     
  125. Mudra: A Multi-Modal Smartwatch Interactive System with Hand Gesture Recognition and User Identification

    Kaiwen Guo, Hao Zhou, Ye Tian and Wangqiu Zhou (University of Science and Technology of China, China); Yusheng Ji (National Institute of Informatics, Japan); Xiang-Yang Li (University of Science and Technology of China, China)
     
  126. Multi-Agent Distributed Reinforcement Learning for Making Decentralized Offloading Decisions [Code/Data Available]

    Jing Tan (Paderborn University, Germany); Ramin Khalili (Huawei Technologies, Germany); Holger Karl (Hasso Plattner Institute, Germany); Artur Hecker (Huawei, Germany)
     
  127. Multi-Entanglement Routing Design over Quantum Networks

    Yiming Zeng, Jiarui Zhang, Ji Liu, Zhenhua Liu and Yuanyuan Yang (Stony Brook University, USA)
     
  128. Muses: Enabling Lightweight Learning-Based Congestion Control for Mobile Devices

    Zhiren Zhong (University of Chinese Academy of Sciences, China & Huawei, China); Wei Wang and Yiyang Shao (Huawei, China); Zhenyu Li, Heng Pan and Hongtao Guan (Institute of Computing Technology, Chinese Academy of Sciences, China); Gareth Tyson (Queen Mary, University of London, United Kingdom (Great Britain)); Gaogang Xie (CNIC Chinese Academy of Sciences & University of Chinese Academy of Sciences, China); Kai Zheng (Huawei Technologies, China)
     
  129. MUSTER: Subverting User Selection in MU-MIMO Networks

    Tao Hou (University of South Florida, USA); Shengping Bi and Tao Wang (New Mexico State University, USA); Zhuo Lu and Yao Liu (University of South Florida, USA); Satyajayant Misra (New Mexico State University, USA); Yalin E Sagduyu (Intelligent Automation, Inc., USA)
     
  130. Nadege: When Graph Kernels meet Network Anomaly Detection

    Hicham Lesfari (Université Côte d'Azur, France); Frederic Giroire (CNRS, France)
     
  131. Network Link Weight Setting: A Machine Learning Based Approach

    Murali Kodialam (Nokia Bell Labs, USA); T. V Lakshman (Bell Labs, Nokia, USA)
     
  132. Network Synthesis under Delay Constraints: The Power of Network Calculus Differentiability [Code/Data Available]

    Fabien Geyer (Airbus, Germany); Steffen Bondorf (Ruhr University Bochum, Germany)
     
  133. Network Tomography based on Adaptive Measurements in Probabilistic Routing

    Hiroki Ikeuchi (NTT Corporation, Japan); Hiroshi Saito (University of Tokyo & Mathematics and Informatics Center, Japan); Kotaro Matsuda (NTT, Japan)
     
  134. NeuroMessenger: Towards Error Tolerant Distributed Machine Learning Over Edge Networks

    Song Wang (University of California San Diego, USA); Xinyu Zhang (University of California San Diego & University of Wisconsin-Madison, USA)
     
  135. NFlow and MVT Abstractions for NFV Scaling

    Ziyan Wu and Yang Zhang (University of Minnesota, USA); Wendi Feng (Beijing Information Science and Technology University, China); Zhi-Li Zhang (University of Minnesota, USA)
     
  136. NMMF-Stream: A Fast and Accurate Stream-Processing Scheme for Network Monitoring Data Recovery

    Kun Xie and Ruotian Xie (Hunan University, China); Xin Wang (Stony Brook University, USA); Gaogang Xie (CNIC Chinese Academy of Sciences & University of Chinese Academy of Sciences, China); Dafang Zhang (Hunan University, China); Jigang Wen (Chinese Academy of Science & Institute of Computing Technology, China)
     
  137. On Designing Secure Cross-user Redundancy Elimination for WAN Optimization

    Yuan Zhang, Ziwei Zhang, Minze Xu, Chen Tian and Sheng Zhong (Nanjing University, China)
     
  138. On Uploading Behavior and Optimizations of a Mobile Live Streaming Service

    Jinyang Li, Zhenyu Li and Qinghua Wu (Institute of Computing Technology, Chinese Academy of Sciences, China); Gareth Tyson (Queen Mary, University of London, United Kingdom (Great Britain))
     
  139. OnionCode: Enabling Multi-priority Coding in LED-based Optical Camera Communications

    Haonan Wu, Yi-Chao Chen, Guangtao Xue and Yuehu Jiang (Shanghai Jiao Tong University, China); Ming Wang (University of Illinois at Urbana-Champaign, USA); Shiyou Qian and Jiadi Yu (Shanghai Jiao Tong University, China); Pai-Yen Chen (University of Illinois at Chicago, USA)
     
  140. Online Data Valuation and Pricing for Machine Learning Tasks in Mobile Health

    Anran Xu, Zhenzhe Zheng, Fan Wu and Guihai Chen (Shanghai Jiao Tong University, China)
     
  141. Online File Caching in Latency-Sensitive Systems with Delayed Hits and Bypassing

    Chi Zhang, Haisheng Tan and Guopeng Li (University of Science and Technology of China, China); Zhenhua Han (Microsoft Research Asia, China); Shaofeng H.-C. Jiang (Peking University, China); Xiang-Yang Li (University of Science and Technology of China, China)
     
  142. Online Learning-Based Rate Selection for Wireless Interactive Panoramic Scene Delivery [Code/Data Available]

    Harsh Gupta (University of Illinois at Urbana-Champaign, USA); Jiangong Chen and Bin Li (The Pennsylvania State University, USA); R. Srikant (University of Illinois at Urbana-Champaign, USA)
     
  143. Online Model Updating with Analog Aggregation in Wireless Edge Learning [Code/Data Available]

    Juncheng Wang (University of Toronto, Canada); Min Dong (Ontario Tech University, Canada); Ben Liang (University of Toronto, Canada); Gary Boudreau (Ericsson, Canada); Hatem Abou-Zeid (University of Calgary, Canada)
     
  144. Online Pricing with Limited Supply and Time-Sensitive Valuations

    Shaoang Li, Lan Zhang and Xiang-Yang Li (University of Science and Technology of China, China)
     
  145. Opportunistic Routing in Quantum Networks

    Ali Farahbakhsh and Chen Feng (University of British Columbia, Canada)
     
  146. Optimal Admission Control Mechanism Design for Time-Sensitive Services in Edge Computing

    Shutong Chen (Huazhong University of Science and Technology, China); Lin Wang (VU Amsterdam & TU Darmstadt, The Netherlands); Fangming Liu (Huazhong University of Science and Technology, China)
     
  147. Optimal Data Placement for Stripe Merging in Locally Repairable Codes [Code/Data Available]

    Si Wu and Qingpeng Du (University of Science and Technology of China, China); Patrick Pak-Ching Lee (The Chinese University of Hong Kong, Hong Kong); Yongkun Li and Yinlong Xu (University of Science and Technology of China, China)
     
  148. Optimal Oblivious Routing for Structured Networks

    Sucha Supittayapornpong (Vidyasirimedhi Institute of Science and Technology, Thailand); Pooria Namyar (University of Southern California, USA); Mingyang Zhang (University of Science and Technology of China, China); Minlan Yu (Harvard University, USA); Ramesh Govindan (University of Southern California, USA)
     
  149. Optimal Pricing Under Vertical and Horizontal Interaction Structures for IoT Networks

    Ningning Ding (The Chinese University of Hong Kong, Hong Kong); Lin Gao (Harbin Institute of Technology (Shenzhen), China); Jianwei Huang (The Chinese University of Hong Kong, Shenzhen, China); Xin Li (Huawei Technologies, China); Xin Chen (Shanghai Research Center, Huawei Technologies, China)
     
  150. Optimal Rate Adaption in Federated Learning with Compressed Communications

    Laizhong Cui and Xiaoxin Su (Shenzhen University, China); Yipeng Zhou (Macquarie University, Australia); Jiangchuan Liu (Simon Fraser University, Canada)
     
  151. Optimal Routing for Stream Learning Systems

    Xinzhe Fu (Massachusetts Institute of Technology, USA); Eytan Modiano (MIT, USA)
     
  152. Optimal Shielding to Guarantee Region-Based Connectivity under Geographical Failures

    Binglin Tao, Mingyu Xiao, Bakhadyr Khoussainov and Junqiang Peng (University of Electronic Science and Technology of China, China)
     
  153. Optimizing Coverage with Intelligent Surfaces for Indoor mmWave Networks

    Jingyuan Zhang and Douglas Blough (Georgia Institute of Technology, USA)
     
  154. Optimizing Sampling for Data Freshness: Unreliable Transmissions with Random Two-way Delay

    Jiayu Pan and Ahmed M Bedewy (The Ohio State University, USA); Yin Sun (Auburn University, USA); Ness B. Shroff (The Ohio State University, USA)
     
  155. Optimizing Task Placement and Online Scheduling for Distributed GNN Training Acceleration

    Ziyue Luo, Yixin Bao and Chuan Wu (The University of Hong Kong, Hong Kong)
     
  156. OrchestRAN: Network Automation through Orchestrated Intelligence in the Open RAN

    Salvatore D'Oro, Leonardo Bonati, Michele Polese and Tommaso Melodia (Northeastern University, USA)
     
  157. Otus: A Gaze Model-based Privacy Control Framework for Eye Tracking Applications

    Miao Hu and Zhenxiao Luo (Sun Yat-Sen University, China); Yipeng Zhou (Macquarie University, Australia); Xuezheng Liu and Di Wu (Sun Yat-Sen University, China)
     
  158. PACC: Proactive and Accurate Congestion Feedback for RDMA Congestion Control

    Xiaolong Zhong and Jiao Zhang (Beijing University of Posts and Telecommunications, China); Yali Zhang and Zixuan Guan (Huawei, China); Zirui Wan (Beijing University of Posts and Telecommunications, China)
     
  159. Payment Channel Networks: Single-Hop Scheduling for Throughput Maximization [Code/Data Available]

    Nikolaos Papadis and Leandros Tassiulas (Yale University, USA)
     
  160. Performance and Scaling of Parallel Systems with Blocking Start and/or Departure Barriers

    Brenton Walker (Leibniz Universität Hannover, Germany); Stefan Bora (Universität Hannover, Germany); Markus Fidler (Leibniz Universität Hannover, Germany)
     
  161. Persistent Items Tracking in Large Data Streams Based on Adaptive Sampling

    Lin Chen (Sun Yat-sen University, China); Raphael C.-W. Phan (Monash University, Malaysia); Zhili Chen (East China Normal University, China); Dan Huang (University of Central Florida, USA)
     
  162. PhoneyTalker: An Out-of-the-Box Toolkit for Adversarial Example Attack on Speaker Recognition

    Meng Chen, Li Lu, Zhongjie Ba and Kui Ren (Zhejiang University, China)
     
  163. Physical-Level Parallel Inclusive Communication for Heterogeneous IoT Devices

    Sihan Yu (Clemson University, USA); Xiaonan Zhang (Florida State University, USA); Pei Huang and Linke Guo (Clemson University, USA)
     
  164. Physical-World Attack towards WiFi-Based Behavior Recognition

    Jianwei Liu and Yinghui He (Zhejiang University, China); Chaowei Xiao (University of Michigan, ann arbor, USA); Jinsong Han (Zhejiang University & School of Cyber Science and Technology, China); Le Cheng and Kui Ren (Zhejiang University, China)
     
  165. Poisoning Attacks on Deep Learning based Wireless Traffic Prediction

    Tianhang Zheng and Baochun Li (University of Toronto, Canada)
     
  166. PolarScheduler: Dynamic Transmission Control for Floating LoRa Networks

    Ruinan Li, Xiaolong Zheng, Yuting Wang, Liang Liu and Huadong Ma (Beijing University of Posts and Telecommunications, China)
     
  167. Policy-Induced Unsupervised Feature Selection: A Networking Case Study

    Jalil Taghia, Farnaz Moradi, Hannes Larsson and Xiaoyu Lan (Ericsson Research, Sweden); Masoumeh Ebrahimi (KTH Royal Institute of Techology & University of Turku, Sweden); Andreas Johnsson (Ericsson Research, Sweden)
     
  168. Polynomial-Time Algorithm for the Regional SRLG-disjoint Paths Problem

    Balázs Vass (Budapest University of Technology and Economics, Hungary); Erika R. Bérczi-Kovács and Ábel Barabás (Eötvös University, Budapest, Hungary); Zsombor László Hajdú and János Tapolcai (Budapest University of Technology and Economics, Hungary)
     
  169. PreGAN: Preemptive Migration Prediction Network for Proactive Fault-Tolerant Edge Computing [Code/Data Available]

    Shreshth Tuli and Giuliano Casale (Imperial College London, United Kingdom (Great Britain)); Nicholas Jennings (Imperial College, United Kingdom (Great Britain))
     
  170. Privacy-Preserving Online Task Assignment in Spatial Crowdsourcing: A Graph-based Approach

    Hengzhi Wang, En Wang and Yongjian Yang (Jilin University, China); Jie Wu (Temple University, USA); Falko Dressler (TU Berlin, Germany)
     
  171. Protect Privacy from Gradient Leakage Attack in Federated Learning

    Junxiao Wang, Song Guo and Xin Xie (Hong Kong Polytechnic University, Hong Kong); Heng Qi (Dalian University of Technology, China)
     
  172. Provably Efficient Algorithms for Traffic-sensitive SFC Placement and Flow Routing

    Yingling Mao, Xiaojun Shang and Yuanyuan Yang (Stony Brook University, USA)
     
  173. Push the Limit of WiFi-based User Authentication towards Undefined Gestures

    Hao Kong (Shanghai Jiao Tong University, China); Li Lu (Zhejiang University, China); Jiadi Yu, Yanmin Zhu, Feilong Tang, Yi-Chao Chen and Linghe Kong (Shanghai Jiao Tong University, China); Feng Lyu (Central South University, China)
     
  174. RC6D: An RFID and CV Fusion System for Real-time 6D Object Pose Estimation

    Bojun Zhang (TianJin University, China); Mengning Li (Shanghai Jiao Tong University); Xin Xie (Hong Kong Polytechnic University, Hong Kong); Luoyi Fu (Shanghai Jiao Tong University, China); Xinyu Tong and Xiulong Liu (Tianjin University, China)
     
  175. RCID: Fingerprinting Passive RFID Tags via Wideband Backscatter

    Jiawei Li, Ang Li, Dianqi Han and Yan Zhang (Arizona State University, USA); Tao Li (Indiana University-Purdue University Indianapolis, USA); Yanchao Zhang (Arizona State University, USA)
     
  176. Real-Time Execution of Trigger-Action Connection for Home Internet-of-Things [Code/Data Available]

    Kai Dong, Yakun Zhang, Yuchen Zhao, Daoming Li, Zhen Ling and Wenjia Wu (Southeast University, China); Xiaorui Zhu (Nanjing Xiaozhuang University, China)
     
  177. Real-time Machine Learning for Symbol Detection in MIMO-OFDM Systems

    Yibin Liang, Lianjun Li, Yang (Cindy) Yi and Lingjia Liu (Virginia Tech, USA)
     
  178. Reinforcement Learning for Dynamic Dimensioning of Cloud Caches: A Restless Bandit Approach [Code/Data Available]

    Guojun Xiong and Shufan Wang (Binghamton University, USA); Gang Yan (Binghamton University-SUNY, USA); Jian Li (Binghamton University, USA)
     
  179. Retention-aware Container Caching for Serverless Edge Computing

    Li Pan (Huazhong University of Science and Technology, China); Lin Wang (VU Amsterdam & TU Darmstadt, The Netherlands); Shutong Chen and Fangming Liu (Huazhong University of Science and Technology, China)
     
  180. Revisiting Frequency Analysis against Encrypted Deduplication via Statistical Distribution [Code/Data Available]

    Jingwei Li, Guoli Wei, Jiacheng Liang and Yanjing Ren (University of Electronic Science and Technology of China, China); Patrick Pak-Ching Lee (The Chinese University of Hong Kong, Hong Kong); Xiaosong Zhang (University of Electronic Science and Technology of China, China)
     
  181. Revisiting RFID Missing Tag Identification

    Kanghuai Liu (SYSU, China); Lin Chen (Sun Yat-sen University, China); Junyi Huang and Shiyuan Liu (SYSU, China); Jihong Yu (Beijing Institute of Technology/ Simon Fraser University, China)
     
  182. RF-Protractor: Non-Contacting Angle Tracking via COTS RFID in Industrial IoT Environment

    Tingjun Liu, Chuyu Wang, Lei Xie and Jingyi Ning (Nanjing University, China); Tie Qiu (Tianjin University, China); Fu Xiao (Nanjing University of Posts and Telecommunications, China); Sanglu Lu (Nanjing University, China)
     
  183. RF-Wise: Pushing the Limit of RFID-based Sensing [Code/Data Available]

    Cui Zhao (Xi'an Jiaotong University, China); Zhenjiang Li (City University of Hong Kong, Hong Kong); Han Ding (Xi'an Jiaotong University, China); Ge Wang (Xi‘an Jiaotong University, China); Wei Xi and Jizhong Zhao (Xi'an Jiaotong University, China)
     
  184. RouteNet-Erlang: A Graph Neural Network for Network Performance Evaluation [Code/Data Available]

    Miquel Ferriol-Galmés (Universitat Politècnica de Catalunya, Spain); Krzysztof Rusek (AGH University of Science and Technology, Poland); José Suárez-Varela (Barcelona Neural Networking Center, Universitat Politècnica de Catalunya, Spain); Shihan Xiao and Xiang Shi (Huawei Technologies, China); Xiangle Cheng (University of Exeter, United Kingdom (Great Britain)); Bo Wu (Huawei Technologies, China); Pere Barlet-Ros and Albert Cabellos-Aparicio (Universitat Politècnica de Catalunya, Spain)
     
  185. S-Store:: A Scalable Data Store towards Permissioned Blockchain Sharding

    Xiaodong Qi (East China Normal University, China)
     
  186. SAH: Fine-grained RFID Localization with Antenna Calibration [Code/Data Available]

    Xu Zhang, Jia Liu, Xingyu Chen, Wenjie Li and Lijun Chen (Nanjing University, China)
     
  187. Schedule or Wait: Age-Minimization for IoT Big Data Processing in MEC via Online Learning

    Zichuan Xu and Wenhao Ren (Dalian University of Technology, China); Weifa Liang (City University of Hong Kong, Hong Kong); Wenzheng Xu (Sichuan University, China); Qiufen Xia (Dalian University of Technology, China); Pan Zhou (School of CSE, Huazhong University of Science and Technology, China); Mingchu Li (School of Software, Dalian University of Technology, China)
     
  188. Semi-Online Precoding with Information Parsing for Cooperative MIMO Wireless Networks [Code/Data Available]

    Juncheng Wang and Ben Liang (University of Toronto, Canada); Min Dong (Ontario Tech University, Canada); Gary Boudreau (Ericsson, Canada); Hatem Abou-Zeid (University of Calgary, Canada)
     
  189. Sending Timely Status Updates through Channel with Random Delay via Online Learning [Code/Data Available]

    Haoyue Tang (Yale University, China); Yuchao Chen, Jintao Wang and Jingzhou Sun (Tsinghua University, China); Jian Song (Tsinghua University & Beijing National Research Center for Information Science and Technology & Key Lab of DTV System of Guangdong & Shenzhen, Research Institute of Tsinghua University in Shenzhen, China)
     
  190. Separating Voices from Multiple Sound Sources using 2D Microphone Array

    Xinran Lu, Lei Xie and Fang Wang (Nanjing University, China); Tao Gu (Macquarie University, Australia); Chuyu Wang, Wei Wang and Sanglu Lu (Nanjing University, China)
     
  191. Shield: Safety Ensured High-efficient Scheduling for Magnetic MIMO Wireless Power Transfer System

    Wangqiu Zhou, Hao Zhou, Xiaoyu Wang, Kaiwen Guo, Haisheng Tan and Xiang-Yang Li (University of Science and Technology of China, China)
     
  192. Short-Term Memory Sampling for Spread Measurement in High-Speed Networks [Code/Data Available]

    Yang Du, He Huang and Yu-e Sun (Soochow University, China); Shigang Chen (University of Florida, USA); Guoju Gao, Xiaoyu Wang and Shenghui Xu (Soochow University, China)
     
  193. Socially-Optimal Mechanism Design for Incentivized Online Learning

    Zhiyuan Wang (Beihang University, China); Lin Gao (Harbin Institute of Technology (Shenzhen), China); Jianwei Huang (The Chinese University of Hong Kong, Shenzhen, China)
     
  194. Sound of Motion: Real-time Wrist Tracking with A Smart Watch-Phone Pair

    Tianyue Zheng and Cai Chao (Nanyang Technological University, Singapore); Zhe Chen (School of Computer Science and Engineering, Nangyang Technological University, Singapore); Jun Luo (Nanyang Technological University, Singapore)
     
  195. SPACERTC: Unleashing the Low-latency Potential of Mega-constellations for Real-Time Communications [Code/Data Available]

    Zeqi Lai, Weisen Liu, Qian Wu and Hewu Li (Tsinghua University, China); Jingxi Xu (Tencent, China); Jianping Wu (Tsinghua University, China)
     
  196. Spatiotemporal Fracture Data Inference in Sparse Urban CrowdSensing

    En Wang, Mijia Zhang and Yuanbo Xu (Jilin University, China); Haoyi Xiong (Baidu, USA); Yongjian Yang (Jilin University, China)
     
  197. StepConf: SLO-Aware Dynamic Resource Configuration for Serverless Function Workflows

    Zhaojie Wen, Yishuo Wang and Fangming Liu (Huazhong University of Science and Technology, China)
     
  198. Stream Iterative Distributed Coded Computing for Learning Applications in Heterogeneous Systems [Code/Data Available]

    Homa Esfahanizadeh (Massachusetts Institute of Technology, USA); Alejandro Cohen (Technion, Israel); Muriel Médard (MIT, USA)
     
  199. Subset Selection for Hybrid Task Scheduling with General Cost Constraints

    Yu Sun, Chi Lin, Jiankang Ren, Pengfei Wang, Lei Wang, Guowei WU and Qiang Zhang (Dalian University of Technology, China)
     
  200. Switching Gaussian Mixture Variational RNN for Anomaly Detection of Diverse CDN Websites [Code/Data Available]

    Liang Dai (Institute of Information Engineering, Chinese Academy of Sciences, China); Chen Wenchao (National Laboratory of Radar Signal Processing, Xidian University, China); Yanwei Liu (Institute of Information Engineering, Chinese Academy of Sciences, China); Antonios Argyriou (University of Thessaly, Greece); Chang Liu (University of Chinese Academy of Science, China); Tao Lin (Communication University of China, China); Wang Penghui (National Laboratory of Radar Signal Processing, Xidian University, China); Zhen Xu (Institute of Information Engineering, Chinese Academy of Sciences, China); Bo Chen (National Laboratory of Radar Signal Processing, Xidian University, China)
     
  201. Tackling Multipath and Biased Training Data for IMU-Assisted BLE Proximity Detection

    Tianlang He and Jiajie Tan (The Hong Kong University of Science and Technology, China); Steve Zhuo (HKUST, Hong Kong); Maximilian Printz and S.-H. Gary Chan (The Hong Kong University of Science and Technology, China)
     
  202. Tackling System and Statistical Heterogeneity for Federated Learning with Adaptive Client Sampling

    Bing Luo (Shenzhen Institute of Artificial Intelligence and Robotics for Society & The Chinese University of Hong Kong, Shenzhen, China); Wenli Xiao (The Chinese University of Hong Kong, Shenzhen, China); Shiqiang Wang (IBM T. J. Watson Research Center, USA); Jianwei Huang (The Chinese University of Hong Kong, Shenzhen, China); Leandros Tassiulas (Yale University, USA)
     
  203. Target-oriented Semi-supervised Domain Adaptation for WiFi-based HAR

    Zhipeng Zhou (University of Science and Technology of China, China); Feng Wang (University of Mississippi, USA); Jihong Yu (Beijing Institute of Technology/ Simon Fraser University, China); Ju Ren (Tsinghua University, China); Zhi Wang (Xi'an Jiaotong University, China); Wei Gong (University of Science and Technology of China, China)
     
  204. TeethPass: Dental Occlusion-based User Authentication via In-ear Acoustic Sensing

    Yadong Xie and Fan Li (Beijing Institute of Technology, China); Yue Wu (Tsinghua University, China); Huijie Chen (Beijing University of Technology, China); Zhiyuan Zhao (Beijing Institute of Technology, China); Yu Wang (Temple University, USA)
     
  205. The Hanging ROA: A Secure and Scalable Encoding Scheme for Route Origin Authorization [Code/Data Available]

    Yanbiao Li (Computer Network Information Center, Chinese Academy of Sciences, China); Hui Zou and Yuxuan Chen (University of Chinese Academy of Sciences & Computer Network Information Center, Chinese Academy of Sciences, China); Yinbo Xu and Zhuoran Ma (University of Chinese Academy of Sciences & Computer Network Information Center, China); Di Ma (Internet Domain Name System National Engineering Research Center, China); Ying Hu (Computer Network Information Center, Chinese Academy of Science, China); Gaogang Xie (CNIC Chinese Academy of Sciences & University of Chinese Academy of Sciences, China)
     
  206. The Information Velocity of Packet-Erasure Links

    Elad Domanovitz (Tel Aviv University, Israel); Tal Philosof (Samsung, Israel); Anatoly Khina (Tel Aviv University, Israel)
     
  207. The Right to be Forgotten in Federated Learning: An Efficient Realization with Rapid Retraining [Code/Data Available]

    Yi Liu (City University of Hong Kong, China); Lei Xu (Nanjing University of Science and Technology, China); Xingliang Yuan (Monash University, Australia); Cong Wang (City University of Hong Kong, Hong Kong); Bo Li (Hong Kong University of Science and Technology, Hong Kong)
     
  208. Thwarting Unauthorized Voice Eavesdropping via Touch Sensing in Mobile Systems

    Wenbin Huang (Hunan University, China); Wenjuan Tang (HNU, China); Kuan Zhang (University of Nebraska-Lincoln, USA); Haojin Zhu (Shanghai Jiao Tong University, China); Yaoxue Zhang (Tsinghua University, China)
     
  209. Torp: Full-Coverage and Low-Overhead Profiling of Host-Side Latency [Code/Data Available]

    Xiang Chen (Zhejiang University, Peking University, and Fuzhou University, China); Hongyan Liu (Zhejiang University, China); Junyi Guo (Peking University, China); Xinyue Jiang (Zhejiang University, China); Qun Huang (Peking University, China); Dong Zhang (Fuzhou University, China); Chunming Wu and Haifeng Zhou (Zhejiang University, China)
     
  210. Towards an Efficient Defense against Deep Learning based Website Fingerprinting

    Zhen Ling, Gui Xiao, Wenjia Wu, Xiaodan Gu and Ming Yang (Southeast University, China); Xinwen Fu (University of Massachusetts Lowell, USA)
     
  211. Towards Online Privacy-preserving Computation Offloading in Mobile Edge Computing

    Xiaoyi Pang (Wuhan University, China); Zhibo Wang (Zhejiang University, China); Jingxin Li and Ruiting Zhou (Wuhan University, China); Ju Ren (Tsinghua University, China); Zhetao Li (Xiangtan University, China)
     
  212. Towards Optimal Multi-modal Federated Learning on Non-IID Data with Hierarchical Gradient Blending

    Sijia Chen and Baochun Li (University of Toronto, Canada)
     
  213. TrojanFlow: A Neural Backdoor Attack to Deep Learning-based Network Traffic Classifiers

    Rui Ning, ChunSheng Xin and Hongyi Wu (Old Dominion University, USA)
     
  214. TRUST: Real-Time Request Updating with Elastic Resource Provisioning in Clouds

    Jingzhou Wang, Gongming Zhao, Hongli Xu and Yangming Zhao (University of Science and Technology of China, China); Xuwei Yang (Huawei Technologies, China); He Huang (Soochow University, China)
     
  215. Two Time-Scale Joint Service Caching and Task Offloading for UAV-assisted Mobile Edge Computing

    Ruiting Zhou and Xiaoyi Wu (Wuhan University, China); Haisheng Tan (University of Science and Technology of China, China); Renli Zhang (Wuhan University, China)
     
  216. User Experience Oriented Task Computation for UAV-Assisted MEC System

    Lutian Shen (Yunnan University, China)
     
  217. Vehicle-to-Nothing? Securing C-V2X Against Protocol-Aware DoS Attacks

    Geoff Twardokus and Hanif Rahbari (Rochester Institute of Technology, USA)
     
  218. VITA: Virtual Network Topology-aware Southbound Message Delivery in Clouds [Code/Data Available]

    Luyao Luo, Gongming Zhao and Hongli Xu (University of Science and Technology of China, China); Liguang Xie and Ying Xiong (Futurewei Technologies, USA)
     
  219. VR Viewport Pose Model for Quantifying and Exploiting Frame Correlations

    Ying Chen and Hojung Kwon (Duke University, USA); Hazer Inaltekin (Macquarie University, Australia); Maria Gorlatova (Duke University, USA)
     
  220. VSiM: Improving QoE Fairness for Video Streaming in Mobile Environments

    Yali Yuan (University of Goettingen, Germany); Weijun Wang (Nanjing University & University of Goettingen, China); Yuhan Wang (Göttingen University, Germany); Sripriya Adhatarao (Uni Goettingen, Germany); Bangbang Ren (National University of Defense Technology, China); Kai Zheng (Huawei Technologies, China); Xiaoming Fu (University of Goettingen, Germany)
     
  221. When Deep Learning Meets Steganography: Protecting Inference Privacy in the Dark [Code/Data Available]

    Qin Liu (Hunan University & Temple University, China); Jiamin Yang and Hongbo Jiang (Hunan University, China); Jie Wu (Temple University, USA); Tao Peng (Guangzhou University, China); Tian Wang (Beijing Normal University & UIC, China); Guojun Wang (Guangzhou University, China)
     
  222. WiRa: Enabling Cross-Technology Communication from WiFi to LoRa with IEEE 802.11ax

    Dan Xia, Xiaolong Zheng, Fu Yu, Liang Liu and Huadong Ma (Beijing University of Posts and Telecommunications, China)
     
  223. Worker Selection Towards Data Completion for Online Sparse Crowdsensing

    Wenbin Liu, En Wang and Yongjian Yang (Jilin University, China); Jie Wu (Temple University, USA)
     
  224. xNet: Improving Expressiveness and Granularity for Network Modeling with Graph Neural Networks

    Mowei Wang, Linbo Hui and Yong Cui (Tsinghua University, China); Ru Liang (Huawei Technologies Co., Ltd., China); Zhenhua Liu (Huawei Technologies, China)
     

Patrons

Student Conference Grant Sponsors