IEEE INFOCOM 2020
Communication in Challenging Environments
MAGIC: Magnetic Resonance Coupling for Intra-body Communications
Stella Banou, Kai Li and Kaushik Chowdhury (Northeastern University, USA)
Dynamically Adaptive Cooperation Transmission among Satellite-Ground Integrated Networks
Feilong Tang (Shanghai Jiao Tong University, China)
Synergetic Denial-of-Service Attacks and Defense in Underwater Named Data Networking
Yue Li and Yingjian Liu (Ocean University of China, China); Yu Wang (Temple University, USA); Zhongwen Guo, Haoyu Yin and Hao Teng (Ocean University of China, China)
An Energy Efficiency Multi-Level Transmission Strategy based on underwater multimodal communication in UWSNs
Zhao Zhao, Chunfeng Liu, Wenyu Qu and Tao Yu (Tianjin University, China)
Session Chair
Lan Wang (University of Memphis)
Network Modeling
Bound-based Network Tomography for Inferring Interesting Link Metrics
Huikang Li, Yi Gao, Wei Dong and Chun Chen (Zhejiang University, China)
ProTO: Proactive Topology Obfuscation Against Adversarial Network Topology Inference
Tao Hou and Zhe Qu (University of South Florida, USA); Tao Wang (New Mexico State University, USA); Zhuo Lu and Yao Liu (University of South Florida, USA)
SpreadSketch: Toward Invertible and Network-Wide Detection of Superspreaders
Lu Tang (The Chinese University of Hong Kong, Hong Kong); Qun Huang (Peking University, China); Patrick Pak-Ching Lee (The Chinese University of Hong Kong, Hong Kong)
Variational Information Diffusion for Probabilistic Cascades Prediction
Fan Zhou and Xovee Xu (University of Electronic Science and Technology of China, China); Kunpeng Zhang (University of Maryland, USA); Goce Trajcevski (Iowa State University, USA); Ting Zhong (University of Electronic Science and Technology of China, China)
To address these, in this work we propose a novel probabilistic cascade prediction framework: Variational Cascade (VaCas) graph learning networks. VaCas allows a non-linear information diffusion inference and models the information diffusion process by learning the latent representation of both the structural and temporal information. It is a pattern-agnostic model leveraging variational inference to learn the node-level and cascade-level latent factors in an unsupervised manner. In addition, VaCas is capable of capturing both the cascade representation uncertainty and node infection uncertainty, while enabling hierarchical pattern learning of information diffusion. Extensive experiments conducted on real-world datasets demonstrate that VaCas significantly improves the prediction accuracy, compared to state-of-the-art approaches, while also enabling interpretability.
Session Chair
Wei Bao (The University of Sydney)
Security III
A Dynamic Mechanism for Security Management in Multi-Agent Networked Systems
Shiva Navabi and Ashutosh Nayyar (University of Southern California, USA)
KV-Fresh: Freshness Authentication for Outsourced Multi-Version Key-Value Stores
Yidan Hu and Rui Zhang (University of Delaware, USA); Yanchao Zhang (Arizona State University, USA)
Modeling the Impact of Network Connectivity on Consensus Security of Proof-of-Work Blockchain
Yang Xiao (Virginia Tech, USA); Ning Zhang (Washington University in St. Louis, USA); Wenjing Lou and Thomas Hou (Virginia Tech, USA)
Scheduling DDoS Cloud Scrubbing in ISP Networks via Randomized Online Auctions
Wencong You, Lei Jiao and Jun Li (University of Oregon, USA); Ruiting Zhou (Wuhan University, China)
Session Chair
Ruozhou Yu (North Carolina State University)
Network Intelligence V
Automating Cloud Deployment for Deep Learning Inference of Real-time Online Services
Yang Li (Tsinghua University, China); Zhenhua Han (University of Science and Technology of China, China); Quanlu Zhang (MSRA, China); Zhenhua Li (Tsinghua University, China); Haisheng Tan (University of Science and Technology of China, China)
Geryon: Accelerating Distributed CNN Training by Network-Level Flow Scheduling
Shuai Wang, Dan Li and Jinkun Geng (Tsinghua University, China)
Neural Tensor Completion for Accurate Network Monitoring
Kun Xie (Hunan University, USA); Huali Lu (Hunan University, China); Xin Wang (Stony Brook University, USA); Gaogang Xie (Institute of Computing Technology, Chinese Academy of Sciences, China); Yong Ding (Guilin University of Electronic Technology, China); Dongliang Xie (State University of New York at Stony Brook, USA); Jigang Wen (Chinese Academy of Science & Institute of Computing Technology, China); Dafang Zhang (Hunan University, China)
Optimizing Federated Learning on Non-IID Data with Reinforcement Learning
Hao Wang and Zakhary Kaplan (University of Toronto, Canada); Di Niu (University of Alberta, Canada); Baochun Li (University of Toronto, Canada)
Session Chair
Ruidong Li (National Institute of Information and Communications Technology (NICT))
Network Economics
A Lightweight Auction Framework for Spectrum Allocation with Strong Security Guarantees
Ke Cheng (Xidian University, China); Liangmin Wang (Jiangsu University, China); Yulong Shen and Yangyang Liu (Xidian University, China); Yongzhi Wang (Park University, USA); Lele Zheng (Xidian University, Xi'an, Shaanxi, China)
Fair and Protected Profit Sharing for Data Trading in Pervasive Edge Computing Environments
Yaodong Huang, Yiming Zeng, Fan Ye and Yuanyuan Yang (Stony Brook University, USA)
Secure Balance Planning of Off-blockchain Payment Channel Networks
Peng Li and Toshiaki Miyazaki (The University of Aizu, Japan); Wanlei Zhou (University of Technology Sydney, Australia)
Travel with Your Mobile Data Plan: A Location-Flexible Data Service
Zhiyuan Wang (The Chinese University of Hong Kong, Hong Kong); Lin Gao (Harbin Institute of Technology (Shenzhen), China); Jianwei Huang (The Chinese University of Hong Kong, Hong Kong)
Session Chair
Murat Yuksel (University of Central Florida)
UAV II
Distributed Collaborative 3D-Deployment of UAV Base Stations for On-Demand Coverage
Tatsuaki Kimura and Masaki Ogura (Osaka University, Japan)
Looking Before Crossing: An Optimal Algorithm to Minimize UAV Energy by Speed Scheduling with A Practical Flight Energy Model
Feng Shan, Luo Junzhou, Runqun Xiong, Wenjia Wu and Jiashuo Li (Southeast University, China)
SwarmControl: An Automated Distributed Control Framework for Self-Optimizing Drone Networks
Lorenzo Bertizzolo and Salvatore D'Oro (Northeastern University, USA); Ludovico Ferranti (Northeastern University, USA & Sapienza University of Rome, Italy); Leonardo Bonati and Emrecan Demirors (Northeastern University, USA); Zhangyu Guan (University at Buffalo, USA); Tommaso Melodia (Northeastern University, USA); Scott M Pudlewski (Georgia Tech Research Institute, USA)
We introduce SwarmControl, a new software-defined control framework for UAV wireless networks based on distributed optimization principles. In essence, SwarmControl provides the Network Operator (NO) with a unified centralized abstraction of the networking and flight control functionalities. High-level control directives are then automatically decomposed and converted into distributed network control actions that are executed through programmable software-radio protocol stacks. SwarmControl (i) constructs a network control problem representation of the directives of the NO; (ii) decomposes it into a set of distributed sub-problems; and (iii) automatically generates numerical solution algorithms to be executed at individual UAVs.
We present a prototype of an SDR-based, fully reconfigurable UAV network platform that implements the proposed control framework, based on which we assess the effectiveness and flexibility of SwarmControl with extensive flight experiments. Results indicate that the SwarmControl framework enables swift reconfiguration of the network control functionalities, and it can achieve an average throughput gain of \(159%\) compared to the state-of-the-art solutions.
WBF-PS: WiGig Beam Fingerprinting for UAV Positioning System in GPS-denied Environments
Pei-Yuan Hong, Chi-Yu Li, Hong-Rong Chang, YuanHao Hsueh and Kuochen Wang (National Chiao Tung University, Taiwan)
Session Chair
Enrico Natalizio (University of Lorraine/Loria)
SDN III
AudiSDN: Automated Detection of Network Policy Inconsistencies in Software-Defined Networks
Seungsoo Lee (KAIST, Korea (South)); Seungwon Woo (ETRI, Korea (South)); Jinwoo Kim (KAIST, Korea (South)); Vinod Yegneswaran and Phillip A Porras (SRI International, USA); Seungwon Shin (KAIST, Korea (South))
Inferring Firewall Rules by Cache Side-channel Analysis in Network Function Virtualization
Youngjoo Shin (Kwangwoon University, Korea (South)); Dongyoung Koo (Hansung University, Korea (South)); Junbeom Hur (Korea University, Korea (South))
Multicast Traffic Engineering with Segment Trees in Software-Defined Networks
Chih-Hang Wang and Sheng-Hao Chiang (Academia Sinica, Taiwan); Shan-Hsiang Shen (National Taiwan University of Science and Technology, Taiwan); De-Nian Yang (Academia Sinica, Taiwan); Wen-Tsuen Chen (National Tsing Hua University, Taiwan)
SDN-based Order-aware Live Migration of Virtual Machines
Dinuni Fernando, Ping Yang and Hui Lu (Binghamton University, USA)
Session Chair
Jin Zhao (Fudan University)
Virtual Coffee Break
Virtual Coffee Break
N/A
Session Chair
N/A
Localization I
Edge Assisted Mobile Semantic Visual SLAM
Jingao Xu, Hao Cao, Danyang Li and Kehong Huang (Tsinghua University, China); Chen Qian (Dalian University of Technology, China); Longfei Shangguan (Princeton University, USA); Zheng Yang (Tsinghua University, China)
POLAR: Passive object localization with IEEE 802.11ad using phased antenna arrays
Dolores Garcia (Imdea Networks, Spain); Jesús O. Lacruz (IMDEA Networks Institute, Spain); Pablo Jimenez Mateo (IMDEA Networks, Spain); Joerg Widmer (IMDEA Networks Institute, Spain)
In this paper we explore the localization accuracy that can be achieved with IEEE 802.11ad devices. We use commercial APs while for the stations we design a full-bandwidth 802.11ad compatible FPGA-based platform with phased antenna array. The stations exploit the preamble of the beam training packets of the APs to obtain CIR measurements for all antenna patterns. With this, we determine distance and angle information for the different multi-path components in the environment to passively localize a mobile object. We evaluate our system with multiple APs and a moving robot with metallic surface. Despite the strong limitations of the hardware, our system operates in real-time and achieves 30 cm mean error accuracy and sub-meter accuracy in 98% of the cases.
Towards Single Source based Acoustic Localization
Linsong Cheng, Zhao Wang, Yunting2 Zhang, Weiyi Wang, Weimin Xu and Jiliang Wang (Tsinghua University, China)
We present AcouRadar, an acoustic-based localization system with single sound source. In the heart of AcouRadar we adopt a general new model which quantifies signal properties to different frequencies, distances and angles to the source. We verify the model and show that signal from a single source can provide features for localization.To address practical challenges, (1) we design an online model adaption method to address model deviation from real signal, (2) we design pulse modulated signals to alleviate the impact of environment such as multipath effect, and (3) to address signal dynamics over time, we derive relatively stable amplitude ratio between different frequencies. We implement AcouRadar on Android and evaluate its performance for different COTS speakers in different environments. The results show that AcouRadar achieves single source localization with average error less than 5 cm.
When FTM Discovered MUSIC: Accurate WiFi-based Ranging in the Presence of Multipath
Kevin Jiokeng and Gentian Jakllari (University of Toulouse, France); Alain Tchana (ENS Lyon, France); André-Luc Beylot (University of Toulouse, France)
We present FUSIC, the first approach that extends FTM's LOS accuracy to NLOS settings, without requiring any changes to the standard. To accomplish this, FUSIC leverages the results from FTM and MUSIC -- both erroneous in NLOS -- into solving the double challenge of 1) detecting when FTM returns an inaccurate value and 2) correcting the errors as necessary. Experiments in 4 different physical locations reveal that a) FUSIC extends FTM's LOS ranging accuracy to NLOS settings -- hence, achieving its stated goal; b) it significantly improves FTM's capability to offer room-level indoor positioning.
Session Chair
Hongzi Zhu (Shanghai Jiao Tong University)
Trusted Systems
An Adaptive and Fast Convergent Approach to Differentially Private Deep Learning
Zhiying Xu and Shuyu Shi (University of Nanjing, China); Alex X. Liu (Ant Financial Services Group, China); Jun Zhao (Nanyang Technological University, Singapore); Lin Chen (Yale University, USA)
Enabling Execution Assurance of Federated Learning at Untrusted Participants
XiaoLi Zhang, Fengting Li, Zeyu Zhang and Qi Li (Tsinghua University, China); Cong Wang (City University of Hong Kong, Hong Kong); Jianping Wu (Tsinghua University, China)
In this paper, we propose TrustFL, a practical scheme to build assurance of participants' training execution with high confidence. We employ Trusted Execution Environments (TEEs) to attest to the correct execution. Particularly, instead of performing all training processes inside TEE, we use TEE to randomly check a small fraction of training processes with tunable levels of assurance. All processes are executed on the co-located faster processor, e.g., GPU, for efficiency. Besides, we adopt a commitment scheme and devise a specific data selection method, so as to prevent cheating like only processing TEE-requested computation or uploading old results. We prototype TrustFL using GPU and SGX, and evaluate its performance. The results show that TrustFL can achieve one/two orders of magnitude speedups compared with purely training with SGX, while assuring the correct training with a confidence level of 99%.
EncELC: Hardening and Enriching Ethereum Light Clients with Trusted Enclaves
Chengjun Cai (City University of Hong Kong, Hong Kong); Lei Xu (City University of Hong Kong, China & Nanjing University of Science and Technology, Hong Kong); Zhou Anxin, Ruochen Wang and Cong Wang (City University of Hong Kong, Hong Kong); Qian Wang (Wuhan University, China)
In this paper, we propose EncELC, a new Ethereum light client design that enforces full-fledged protections for clients and enables rich queries over the Ethereum blockchain. EncELC leverages trusted hardware (e.g., Intel SGX) as a starting point for building efficient yet secure processing, and further crafts several crucial performance and security refinement designs to boost query efficiency and conceal leakages inside and outside SGX enclave. We implement a prototype of EncELC and test its performance in several real settings, and the results have confirmed the practicality of EncELC.
Mneme: A Mobile Distributed Ledger
Dimitris Chatzopoulos (Hong Kong University of Science and Technology, Hong Kong); Sujit Gujar (International Institute of Information Technology, Hyderabad, India); Boi Faltings (Swiss Federal Institute of Technology (EPFL), Switzerland); Pan Hui (Hong Kong University of Science and Technology & University of Helsinki, Hong Kong)
Session Chair
Kai Zeng (George Mason University)
Security IV
DRAMD: Detect Advanced DRAM-based Stealthy Communication Channels with Neural Networks
Zhiyuan Lv and Youjian Zhao (Tsinghua University, China); Chao Zhang (Institute for Network Sciences and Cyberspace, Tsinghua University, China); Haibin Li (Tsinghua University, China)
PPGPass: Nonintrusive and Secure Mobile Two-Factor Authentication via Wearables
Yetong Cao (Beijing Institute of Technology, China); Qian Zhang (Tsinghua University, China); Fan Li and Song Yang (Beijing Institute of Technology, China); Yu Wang (Temple University, USA)
ROBin: Known-Plaintext Attack Resistant Orthogonal Blinding via Channel Randomization
Yanjun Pan (University of Arizona, USA); Yao Zheng (University of Hawai'i at Mānoa, USA); Ming Li (University of Arizona, USA)
Setting the Yardstick: A Quantitative Metric for Effectively Measuring Tactile Internet
Joseph Verburg (Delft University of Technology, The Netherlands); Kroep Kees (TU Delft, The Netherlands); Vineet Gokhale and Venkatesha Prasad (Delft University of Technology, The Netherlands); Vijay S Rao (Cognizant Technology Solutions & Delft University of Technology, The Netherlands)
Session Chair
Xinwen Fu (University of Massachusetts Lowell)
Video Streaming
FastVA: Deep Learning Video Analytics Through Edge Processing and NPU in Mobile
Tianxiang Tan and Guohong Cao (The Pennsylvania State University, USA)
Improving Quality of Experience by Adaptive Video Streaming with Super-Resolution
Yinjie Zhang (Peking University, China); Yuanxing Zhang (School of EECS, Peking University, China); Yi Wu, Yu Tao and Kaigui Bian (Peking University, China); Pan Zhou (Huazhong University of Science and Technology, China); Lingyang Song (Peking University, China); Hu Tuo (IQIYI Science & Technology Co., Ltd., China)
Stick: A Harmonious Fusion of Buffer-based and Learning-based Approach for Adaptive Streaming
Tianchi Huang (Tsinghua University, China); Chao Zhou (Beijing Kuaishou Technology Co., Ltd, China); Rui-Xiao Zhang, Chenglei Wu, Xin Yao and Lifeng Sun (Tsinghua University, China)
Streaming 360◦ Videos using Super-resolution
Mallesham Dasari (Stony Brook University, USA); Arani Bhattacharya (KTH Royal Institute of Technology, Sweden); Santiago Vargas, Pranjal Sahu, Aruna Balasubramanian and Samir R. Das (Stony Brook University, USA)
Session Chair
Zhenhua Li (Tsinghua University)
Load Balancing
Classification of Load Balancing in the Internet
Rafael Almeida and Italo Cunha (Universidade Federal de Minas Gerais, Brazil); Renata Teixeira (Inria, France); Darryl Veitch (University of Technology Sydney, Australia); Christophe Diot (Google, USA)
Offloading Dependent Tasks in Mobile Edge Computing with Service Caching
Gongming Zhao and Hongli Xu (University of Science and Technology of China, China); Yangming Zhao and Chunming Qiao (University at Buffalo, USA); Liusheng Huang (University of Science and Technology of China, China)
One More Config is Enough: Saving (DC)TCP for High-speed Extremely Shallow-buffered Datacenters
Wei Bai (Microsoft Research Asia, China); Shuihai Hu (The Hong Kong University of Science and Technology, China); Kai Chen (Hong Kong University of Science and Technology, China); Kun Tan (Huawei, China); Yongqiang Xiong (Microsoft Research Asia, China)
To this end, we present BCC, a simple yet effective solution that requires just one more ECN config over prior solutions. BCC operates based on real-time global buffer utilization. When available buffer suffices, BCC delivers both high throughput and low packet loss rate as prior work; Once it gets insufficient, BCC automatically triggers the shared buffer ECN to prevent packet loss at the cost of sacrificing little throughput. BCC is readily deployable with commodity switches. We validate BCC's feasibility in a small 100G testbed and evaluate its performance using large-scale simulations. Our results show that BCC maintains low packet loss rate while slightly degrading throughput when the buffer becomes insufficient. For example, compared to current practice, BCC achieves up to 94.4% lower 99th percentile FCT for small flows while degrading FCT for large flows by up to 3%.
TINA: A Fair Inter-datacenter Transmission Mechanism with Deadline Guarantee
Xiaodong Dong (Tianjin University, China); Wenxin Li (Hong Kong University of Science & Technology, Hong Kong); Xiaobo Zhou and Keqiu Li (Tianjin University, China); Heng Qi (Dalian University of Technology, China)
Session Chair
Mingkui Wei (Sam Houston State University)
Wireless Charging
An Effective Multi-node Charging Scheme for Wireless Rechargeable Sensor Networks
Tang Liu (Sichuan Normal University, China); BaiJun Wu (University of Louisiana at Lafayette, USA); Shihao Zhang, Jian Peng and Wenzheng Xu (Sichuan University, China)
Energy Harvesting Long-Range Marine Communication
Ali Hosseini-Fahraji, Pedram Loghmannia, Kexiong (Curtis) Zeng and Xiaofan Li (Virginia Tech, USA); Sihan Yu (Clemson University, USA); Sihao Sun, Dong Wang, Yaling Yang, Majid Manteghi and Lei Zuo (Virginia Tech, USA)
Maximizing Charging Utility with Obstacles through Fresnel Diffraction Model
Chi Lin and Feng Gao (Dalian University of Technology, China); Haipeng Dai (Nanjing University & State Key Laboratory for Novel Software Technology, China); Jiankang Ren, Lei Wang and Guowei WU (Dalian University of Technology, China)
Placing Wireless Chargers with Limited Mobility
Haipeng Dai (Nanjing University & State Key Laboratory for Novel Software Technology, China); Chaofeng Wu, Xiaoyu Wang and Wanchun Dou (Nanjing University, China); Yunhuai Liu (Peking University, China)
Session Chair
Cong Wang (Old Dominion University)
Edge Computing II
Collaborate or Separate? Distributed Service Caching in Mobile Edge Clouds
Zichuan Xu and Lizhen Zhou (Dalian University of Technology, China); Sid Chi-Kin Chau (Australian National University, Australia); Weifa Liang (The Australian National University, Australia); Qiufen Xia (Dalian University of Technology, China); Pan Zhou (Huazhong University of Science and Technology, China)
Cooperative Service Caching and Workload Scheduling in Mobile Edge Computing
Xiao Ma (Beijing University of Posts and Telecommunications, China); Ao Zhou (Beijing University of Posts & Telecommunications, China); Shan Zhang (Beihang University, China); Shangguang Wang (Beijing University of Posts and Telecommunications, China)
Joint Optimization of Signal Design and Resource Allocation in Wireless D2D Edge Computing
Junghoon Kim (Purdue University, USA); Taejoon Kim and Morteza Hashemi (University of Kansas, USA); Christopher G. Brinton (Purdue University & Zoomi Inc., USA); David Love (Purdue University, USA)
INFOCOM 2020 Best Paper: Reducing the Service Function Chain Backup Cost over the Edge and Cloud by a Self-adapting Scheme
Xiaojun Shang, Yaodong Huang, Zhenhua Liu and Yuanyuan Yang (Stony Brook University, USA)
Session Chair
Jiangchuan Liu (Simon Fraser University)
Virtual Lunch Break
Virtual Lunch Break
N/A
Session Chair
N/A
IoT II
An Adaptive Robustness Evolution Algorithm with Self-Competition for Scale-free Internet of Things
Tie Qiu (Tianjin University, China); Zilong Lu (Dalian University of Technology, China); Keqiu Li (Tianjin University, China); Guoliang Xue (Arizona State University, USA); Dapeng Oliver Wu (University of Florida, USA)
Bandwidth Part and Service Differentiation in Wireless Networks
Francois Baccelli (UT Austin & The University of Texas at Austin, USA); Sanket Sanjay Kalamkar (INRIA Paris, France)
Low-Overhead Joint Beam-Selection and Random-Access Schemes for Massive Internet-of-Things with Non-Uniform Channel and Load
Yihan Zou, Kwang Taik Kim, Xiaojun Lin and Mung Chiang (Purdue University, USA); Zhi Ding (University of California at Davis, USA); Risto Wichman (Aalto University School of Electrical Engineering, Finland); Jyri Hämäläinen (Aalto University, Finland)
Online Control of Preamble Groups with Priority in Cellular IoT Networks
Jie Liu (Hanyang University, Korea (South)); Mamta Agiwal (SejongUniversity, Korea (South)); Miao Qu and Hu Jin (Hanyang University, Korea (South))
Session Chair
Tony T. Luo (Missouri University of Science and Technology)
Data Management
A Randomly Accessible Lossless Compression Scheme for Time-Series Data
Rasmus Vestergaard, Daniel E. Lucani and Qi Zhang (Aarhus University, Denmark)
On the Optimal Repair-Scaling Trade-off in Locally Repairable Codes
Si Wu and Zhirong Shen (The Chinese University of Hong Kong, China); Patrick Pak-Ching Lee (The Chinese University of Hong Kong, Hong Kong)
URSAL: Ultra-Efficient, Reliable, Scalable, and Available Block Storage at Low Cost
Huiba Li (NiceX Lab, China); Yiming Zhang (NUDT & NiceX Lab, China); Haonan Wang (NiceX Lab, China); Ping Zhong (CSU, China)
Working Set Theorems for Routing in Self-Adjusting Skip List Networks
Chen Avin (Ben-Gurion University of the Negev, Israel); Iosif Salem and Stefan Schmid (University of Vienna, Austria)
This paper presents SANs which provide, for the first time, provable working set guarantees: the routing cost between node pairs is proportional to how recently these nodes communicated last time. Our SANs rely on a distributed implementation of skip lists (which serves as the topology) and provide additional interesting properties such as local routing. Our first contribution is SASL^2, which is a randomized and sequential SAN algorithm that achieves the working set property. Then we show how SASL^2 can be converted to a distributed algorithm that handles concurrent communication requests and maintains SASL^2's properties. Finally, we present deterministic SAN algorithms.
Session Chair
Chunsheng Xin (Old Dominion University)
Security V
Lightweight Sybil-Resilient Multi-Robot Networks by Multipath Manipulation
Yong Huang, Wei Wang, Yiyuan Wang and Tao Jiang (Huazhong University of Science and Technology, China); Qian Zhang (Hong Kong University of Science and Technology, Hong Kong)
RF-Rhythm: Secure and Usable Two-Factor RFID Authentication
Chuyu Wang (Nanjing University, China); Ang Li, Jiawei Li, Dianqi Han and Yan Zhang (Arizona State University, USA); Jinhang Zuo (Carnegie Mellon University, USA); Rui Zhang (University of Delaware, USA); Lei Xie (Nanjing University, China); Yanchao Zhang (Arizona State University, USA)
SeVI: Boosting Secure Voice Interactions with Smart Devices
Xiao Wang and Hongzi Zhu (Shanghai Jiao Tong University, China); Shan Chang (Donghua University, China); Xudong Wang (Shanghai Jiao Tong University, China)
Towards Context Address for Camera-to-Human Communication
Siyuan Cao, Habiba Farrukh and He Wang (Purdue University, USA)
Session Chair
Ning Zhang (Washington University in St. Louis)
Privacy II
Analysis, Modeling, and Implementation of Publisher-side Ad Request Filtering
Liang Lv (Tsinghua, China); Ke Xu (Tsinghua University, China); Haiyang Wang (University of Minnesota at Duluth, USA); Meng Shen (Beijing Institute of Technology, China); Yi Zhao (Tsinghua University, China); Minghui Li, Guanhui Geng and Zhichao Liu (Baidu, China)
In this paper, we explore the opportunity to improve publishers' overall utility by handling a selective number of requests on ad servers. Particularly, we propose a publisher-side proactive ad request filtration solution Win2. Upon receiving an ad request, Win2 estimates the probability that the consumer will click if serving it. The ad request will be served if the clicking probability is above a dynamic threshold. Otherwise, it will be filtered to reduce the publisher's resource cost and improve consumer experience. We implement Win2 in Baidu's large-scale ad serving system and the evaluation results confirm its effectiveness.
Differentially Private Range Counting in Planar Graphs for Spatial Sensing
Abhirup Ghosh (Imperial College London, United Kingdom (Great Britain)); Jiaxin Ding (Shanghai Jiao Tong University, China); Rik Sarkar (University of Edinburgh, United Kingdom (Great Britain)); Jie Gao (Rutgers University, USA)
Message Type Identification of Binary Network Protocols using Continuous Segment Similarity
Stephan Kleber, Rens Wouter van der Heijden and Frank Kargl (Ulm University, Germany)
Search Me in the Dark: Privacy-preserving Boolean Range Query over Encrypted Spatial Data
Xiangyu Wang and Jianfeng Ma (Xidian University, China); Ximeng Liu (Fuzhou University, China); Robert Deng (Singapore Management University, Singapore); Yinbin Miao, Dan Zhu and Zhuoran Ma (Xidian University, China)
Session Chair
Yaling Yang (Virginia Tech)
Routing
Cost Minimization in Multi-Path Communication under Throughput and Maximum Delay Constraints
Qingyu Liu and Haibo Zeng (Virginia Tech, USA); Minghua Chen (The City University of Hong Kong, Hong Kong); Lingjia Liu (Virginia Tech, USA)
Hop-by-Hop Multipath Routing: Choosing the Right Nexthop Set
Klaus Schneider and Beichuan Zhang (University of Arizona, USA); Lotfi Benmohamed (National Institute of Standards and Technology, USA)
Joint Power Routing and Current Scheduling in Multi-Relay Magnetic MIMO WPT System
Hao Zhou, Wenxiong Hua, Jialin Deng, Xiang Cui, Xiang-Yang Li and Panlong Yang (University of Science and Technology of China, China)
Verifying Policy-based Routing at Internet Scale
Xiaozhe Shao and Lixin Gao (University of Massachusetts at Amherst, USA)
In this paper, we propose a scheme that characterizes routing-policy verification problems into a Satisfiability Modulo Theories (SMT) problems. The key idea is to formulate the SMT model in a policy-aware manner so as to reduce/eliminate the mutual dependencies between variables as much as possible. Further, we reduce the size of the generated SMT model through pruning. We implement and evaluate the policy-aware model through an out-of-box SMT solver. The experimental results show that the policy-aware model can reduce the time it takes to perform verification by as much as 100x even under a modest topology size. It takes only a few minutes to answer a query for a topology containing tens of thousands of nodes.
Session Chair
Jie Wu (Temple University)
LoRa
CoLoRa: Enable Muti-Packet Reception in LoRa
Shuai Tong, Zhenqiang Xu and Jiliang Wang (Tsinghua University, China)
We propose CoLoRa, a protocol to decompose large numbers of concurrent transmissions from one collision in LoRa networks. At the heart of CoLoRa, we utilize packet time offset to disentangle collided packets. CoLoRa incorporates several novel techniques to address practical challenges. (1) We translate time offset, which is difficult to measure, to frequency features that can be reliably measured. (2) We propose a method to cancel inter-packet interference and extract accurate feature from low SNR LoRa signal. (3) We address frequency shift incurred by CFO and time offset for LoRa decoding. We implement CoLoRa on USRP N210 and evaluate its performance in both indoor and outdoor networks. CoLoRa is implemented in software at the base station and it can work for COTS LoRa nodes. The evaluation results show that CoLoRa improves the network throughput by 3.4\(\times\) compared with Choir and by 14\(\times\) compared with LoRaWAN.
DyLoRa: Towards Energy Efficient Dynamic LoRa Transmission Control
Yinghui Li, Jing Yang and Jiliang Wang (Tsinghua University, China)
LiteNap: Downclocking LoRa Reception
Xianjin Xia and Yuanqing Zheng (The Hong Kong Polytechnic University, Hong Kong); Tao Gu (RMIT University, Australia)
Online Concurrent Transmissions at LoRa Gateway
Zhe Wang, Linghe Kong and Kangjie Xu (Shanghai Jiao Tong University, China); Liang He (University of Colorado Denver, USA); Kaishun Wu (Shenzhen University, China); Guihai Chen (Shanghai Jiao Tong University, China)
Session Chair
Swarun Kumar (Carnegie Mellon University)
SDN IV
HiFi: Hybrid Rule Placement for Fine-Grained Flow Management in SDNs
Gongming Zhao and Hongli Xu (University of Science and Technology of China, China); Jingyuan Fan (State University of New York at Buffalo, USA); Liusheng Huang (University of Science and Technology of China, China); Chunming Qiao (University at Buffalo, USA)
Homa: An Efficient Topology and Route Management Approach in SD-WAN Overlays
Diman Zad Tootaghaj and Faraz Ahmed (Hewlett Packard Labs, USA); Puneet Sharma (Hewlett Packard Labs & HP Labs, USA); Mihalis Yannakakis (Columbia University, USA)
Incremental Server Deployment for Scalable NFV-enabled Networks
Jianchun Liu, Hongli Xu and Gongming Zhao (University of Science and Technology of China, China); Chen Qian (University of California at Santa Cruz, USA); Xingpeng Fan and Liusheng Huang (University of Science and Technology of China, China)
Network Slicing in Heterogeneous Software-defined RANs
Qiaofeng Qin (Yale University, USA); Nakjung Choi (Nokia & Bell Labs, USA); Muntasir Raihan Rahman (Microsoft, USA); Marina Thottan (Bell Labs, USA); Leandros Tassiulas (Yale University, USA)
Session Chair
Tamer Nadeem (Virginia Commonwealth University)
Virtual Coffee Break
Virtual Coffee Break
N/A
Session Chair
N/A
Localization II
A Structured Bidirectional LSTM Deep Learning Method For 3D Terahertz Indoor Localization
Shukai Fan, Yongzhi Wu and Chong Han (Shanghai Jiao Tong University, China); Xudong Wang (Shanghai Jiao Tong University & Teranovi Technologies, Inc., China)
MagB: Repurposing the Magnetometer for Fine-Grained Localization of IoT Devices
Paramasiven Appavoo and Mun Choon Chan (National University of Singapore, Singapore); Bhojan Anand (National University of Singapore & Anuflora International, Singapore)
mmTrack: Passive Multi-Person Localization Using Commodity Millimeter Wave Radio
Chenshu Wu, Feng Zhang, Beibei Wang and K. J. Ray Liu (University of Maryland, USA)
Selection of Sensors for Efficient Transmitter Localization
Arani Bhattacharya (KTH Royal Institute of Technology, Sweden); Caitao Zhan, Himanshu Gupta, Samir R. Das and Petar M. Djurić (Stony Brook University, USA)
In this paper, we design greedy approximation algorithms for the optimization problem of selecting a given number of sensors in order to maximize an appropriately defined objective function of localization accuracy. The obvious greedy algorithm delivers a constant-factor approximation only for the special case of two hypotheses (potential locations). For the general case of multiple hypotheses, we design a greedy algorithm based on an appropriate auxiliary objective function---and show that it delivers a provably approximate solution for the general case. We evaluate our techniques over multiple simulation platforms, including an indoor as well as an outdoor testbed, and demonstrate the effectiveness of our designed techniques---our techniques easily outperform prior and other approaches by up to 50-60% in large-scale simulations.
Session Chair
Tamer Nadeem (Virginia Commonwealth University)
Adaptive Algorithms
Automatically and Adaptively Identifying Severe Alerts for Online Service Systems
Nengwen Zhao (Tsinghua University, China); Panshi Jin, Lixin Wang and Xiaoqin Yang (China Construction Bank, China); Rong Liu (Stevens Institute of Technology, USA); Wenchi Zhang and Kaixin Sui (Bizseer Technology Co., Ltd., China); Dan Pei (Tsinghua University, China)
On the impact of accurate radio link modeling on the performance of WirelessHART control networks
Yuriy Zacchia Lun (IMT School for Advanced Studies Lucca, Italy); Claudia Rinaldi, Amal Alrish and Alessandro D'Innocenzo (University of L'Aquila, Italy); Fortunato Santucci (University of l'Aquila, Italy)
Online Spread Estimation with Non-duplicate Sampling
Yu-e Sun and He Huang (Soochow University, China); Chaoyi Ma and Shigang Chen (University of Florida, USA); Yang Du (University of Science and Technology of China, China); Qingjun Xiao (SouthEast University of China, China)
Session Chair
Evgeny Khorov (IITP RAS)
Security VI
ADA: Adaptive Deep Log Anomaly Detector
Yali Yuan (University of Goettingen, Germany); Sripriya Srikant Adhatarao (Uni Goettingen, Germany); Mingkai Lin (Nanjing University, China); Yachao Yuan (University of Goettingen, Germany); Zheli Liu (Nankai University, China); Xiaoming Fu (University of Goettingen, Germany)
DFD: Adversarial Learning-based Approach to Defend Against Website Fingerprinting
Ahmed Abusnaina (University of Central Florida, USA); RhongHo Jang (Inha University, Korea (South) & University of Central Florida, USA); Aminollah Khormali (University of Central Florida, USA); Daehun Nyang (Ewha Womans University & TheVaulters Company, Korea (South)); David Mohaisen (University of Central Florida, USA)
Threats of Adversarial Attacks in DNN-Based Modulation Recognition
Yun Lin, Haojun Zhao and Ya Tu (Harbin Engineering University, China); Shiwen Mao (Auburn University, USA); Zheng Dou (Harbin Engineering University, China)
ZeroWall: Detecting Zero-Day Web Attacks through Encoder-Decoder Recurrent Neural Networks
Ruming Tang, Zheng Yang, Zeyan Li and Weibin Meng (Tsinghua University, China); Haixin Wang (University of Science and Technology Beijing, China); Qi Li (Tsinghua University, China); Yongqian Sun (Nankai University, China); Dan Pei (Tsinghua University, China); Tao Wei (Baidu USA LLC, USA); Yanfei Xu and Yan Liu (Baidu, Inc, China)
Session Chair
Shucheng Yu (Stevens Institute of Technology)
Network Intelligence VI
An Incentive Mechanism Design for Efficient Edge Learning by Deep Reinforcement Learning Approach
Yufeng Zhan (The Hong Kong Polytechnic University, China); Jiang Zhang (University of Southern California, USA)
Intelligent Video Caching at Network Edge: A Multi-Agent Deep Reinforcement Learning Approach
Fangxin Wang (Simon Fraser University, Canada); Feng Wang (University of Mississippi, USA); Jiangchuan Liu and Ryan Shea (Simon Fraser University, Canada); Lifeng Sun (Tsinghua University, China)
Network-Aware Optimization of Distributed Learning for Fog Computing
Yuwei Tu (Zoomi Inc., USA); Yichen Ruan and Satyavrat Wagle (Carnegie Mellon University, USA); Christopher G. Brinton (Purdue University & Zoomi Inc., USA); Carlee Joe-Wong (Carnegie Mellon University, USA)
SurveilEdge: Real-time Video Query based on Collaborative Cloud-Edge Deep Learning
Shibo Wang and Shusen Yang (Xi'an Jiaotong University, China); Cong Zhao (Imperial College London, United Kingdom (Great Britain))
Session Chair
Onur Altintas (Toyota Motor North America, R&D InfoTech Labs)
Cloud Computing
Enabling Live Migration of Containerized Applications Across Clouds
Thad Benjaponpitak, Meatasit Karakate and Kunwadee Sripanidkulchai (Chulalongkorn University, Thailand)
Online Placement of Virtual Machines with Prior Data
David Naori (Technion, Israel); Danny Raz (Nokia and Technion, Israel)
Although requests arrive online, cloud providers are not entirely in the dark; historical data is readily available, and may contain strong indications regarding future requests. Thus, standard theoretical models that assume the online player has no prior knowledge are inadequate. In this paper we adopt a recent theoretical model for the design and analysis of online algorithms that allows taking such historical data into account. We develop new competitive online algorithms for multidimensional resource allocation and analyze their guaranteed performance. Moreover, using extensive simulation over real data from Google and AWS, we show that our new approach yields much higher revenue to cloud providers than currently used heuristics.
PAM & PAL: Policy-Aware Virtual Machine Migration and Placement in Dynamic Cloud Data Centers
Hugo Flores and Vincent Tran (CSUDH, USA); Bin Tang (California State University Dominguez Hills, USA)
SplitCast: Optimizing Multicast Flows in Reconfigurable Datacenter Networks
Long Luo (University of Electronic Science and Technology of China, China); Klaus-Tycho Foerster and Stefan Schmid (University of Vienna, Austria); Hongfang Yu (University of Electronic Science and Technology of China, China)
This paper presents SplitCast, a preemptive multicast scheduling approach that fully exploits emerging physical-layer multicast capabilities to reduce flow times. SplitCast dynamically reconfigures the circuit switches to adapt to the multicast traffic, accounting for reconfiguration delays. In particular, SplitCast relies on simple single-hop routing and leverages flexibilities by supporting splittable multicast so that a transfer can already be delivered to just a subset of receivers when the circuit capacity is insufficient. Our evaluation results show that SplitCast can reduce flow times significantly compared to state-of-the-art solutions.
Session Chair
Sangtae Ha (University of Colorado Boulder)
WiFi and Wireless Sensing
Joint Access Point Placement and Power-Channel-Resource-Unit Assignment for 802.11ax-Based Dense WiFi with QoS Requirements
Shuwei Qiu, Xiaowen Chu, Yiu-Wing Leung and Joseph Kee-Yin Ng (Hong Kong Baptist University, Hong Kong)
Machine Learning-based Spoofing Attack Detection in MmWave 60GHz IEEE 802.11ad Networks
Ning Wang and Long Jiao (George Mason University, USA); Pu Wang (Xidian University, China); Weiwei Li (Hebei University of Engineering, China & George Mason University, USA); Kai Zeng (George Mason University, USA)
MU-ID: Multi-user Identification Through Gaits Using Millimeter Wave Radios
Xin Yang (Rutgers University, USA); Jian Liu (The University of Tennessee, Knoxville, USA); Yingying Chen (Rutgers University, USA); Xiaonan Guo and Yucheng Xie (Indiana University-Purdue University Indianapolis, USA)
SmartBond: A Deep Probabilistic Machinery for Smart Channel Bonding in IEEE 802.11ac
Raja Karmakar and Samiran Chattopadhyay (Jadavpur University, India); Sandip Chakraborty (Indian Institute of Technology Kharagpur, India)
Session Chair
Yuanqing Zheng (The Hong Kong Polytechnic University)
Edge Computing III
A Fast Hybrid Data Sharing Framework for Hierarchical Mobile Edge Computing
Junjie Xie and Deke Guo (National University of Defense Technology, China); Xiaofeng Shi and Haofan Cai (University of California Santa Cruz, USA); Chen Qian (University of California at Santa Cruz, USA); Honghui Chen (National University of Defense Technology, China)
Data-driven Distributionally Robust Optimization for Edge Intelligence
Zhaofeng Zhang, Sen Lin, Mehmet Dedeoglu, Kemi Ding and Junshan Zhang (Arizona State University, USA)
Delay-Optimal Distributed Edge Computing in Wireless Edge Networks
Xiaowen Gong (Auburn University, USA)
Fog Integration with Optical Access Networks from an Energy Efficiency Perspective
Ahmed Helmy and Amiya Nayak (University of Ottawa, Canada)
Session Chair
Marie-Jose Montpetit (MJMontpetit.com)
Made with in Toronto · Privacy Policy · © 2021 Duetone Corp.