IEEE INFOCOM 2021
Video Streaming
Towards Video Streaming Analysis and Sharing for Multi-Device Interaction with Lightweight DNNs
Yakun Huang, Hongru Zhao and Xiuquan Qiao (Beijing University of Posts and Telecommunications, China); Jian Tang (Syracuse University, USA); Ling Liu (Georgia Tech, USA)
AMIS: Edge Computing Based Adaptive Mobile Video Streaming
Phil K Mu, Jinkai Zheng, Tom H. Luan and Lina Zhu (Xidian University, China); Zhou Su (Shanghai University, China); Mianxiong Dong (Muroran Institute of Technology, Japan)
Robust 360◦ Video Streaming via Non-Linear Sampling
Mijanur R Palash, Voicu Popescu, Amit Sheoran and Sonia Fahmy (Purdue University, USA)
Popularity-Aware 360-Degree Video Streaming
Xianda Chen, Tianxiang Tan and Guohong Cao (The Pennsylvania State University, USA)
Session Chair
Yusheng Ji (National Institute of Informatics, Japan)
Cloud
Robust Service Mapping in Multi-Tenant Clouds
Jingzhou Wang, Gongming Zhao and Hongli Xu (University of Science and Technology of China, China); He Huang (Soochow University, China); Luyao Luo (University of Science and Technology of China, China); Yongqiang Yang (Huawei Technologies Co., Ltd, China)
To bridge the gap, this paper studies the problem of robust service mapping in multi-tenant clouds (RSMP). Due to traffic dynamics, we take a two-step approach: service node assignment and tenant traffic scheduling. For service node assignment, we prove its NP-Hardness and analyze its problem difficulty. Then, we propose an efficient algorithm with bounded approximation factors based on randomized rounding and knapsack. For tenant traffic scheduling, we design an approximation algorithm based on fully polynomial time approximation scheme (FPTAS). The proposed algorithm achieves the approximation factor of 2+ɛ, where ɛ is an arbitrarily small value. Both small-scale experimental results and large-scale simulation results show the superior performance of our proposed algorithms compared with other alternatives.
Scalable On-Switch Rate Limiters for the Cloud
Yongchao He and Wenfei Wu (Tsinghua University, China); Xuemin Wen and Haifeng Li (Huawei, China); Yongqiang Yang (Huawei Technologies Co., Ltd, China)
Monitoring Cloud Service Unreachability at Scale
Kapil Agrawal (Microsoft Research, India); Viral Mehta (Google, India); Sundararajan Renganathan (Stanford, USA); Sreangsu Acharyya (Microsoft Research, India); Venkata N. Padmanabhan (Microsoft Research, USA); Chakri Kotipalli (Microsoft, USA); Liting Zhao (Microsoft, China)
Near Optimal and Dynamic Mechanisms Towards a Stable NFV Market in Multi-Tier Cloud Networks
Zichuan Xu and Haozhe Ren (Dalian University of Technology, China); Weifa Liang (The Australian National University, Australia); Qiufen Xia (Dalian University of Technology, China); Wanlei Zhou (University of Technology Sydney, Australia); Guowei WU (Dalian University of Technology, China); Pan Zhou (Huazhong University of Science and Technology, China)
Session Chair
Ruidong Li (Kanazawa University, Japan)
Containers and Data Centers
Exploring Layered Container Structure for Cost Efficient Microservice Deployment
Lin Gu (Huazhong University of Science and Technology, China); Deze Zeng (China University of Geosciences, China); Jie Hu and Hai Jin (Huazhong University of Science and Technology, China); Song Guo (Hong Kong Polytechnic University, Hong Kong); Albert Zomaya (The University of Sydney, Australia)
In this paper, we propose a layer sharing microservice deployment and image pulling strategy which explores the advantage of layer sharing to speedup microservice startup and lower image storage consumption. The problem is formulated into an Integer Linear Programming (ILP) form. An Accelerated Distributed Augmented Lagrangian (ADAL) based distributed algorithm executed cooperatively by registries and servers is proposed. Through extensive trace driven experiments, we validate the high efficiency of our ADAL based algorithm as it accelerates the microservice startup by 2.30 times in average and reduces the storage consumption by 55.33%.
NetMARKS: Network Metrics-AwaRe Kubernetes Scheduler Powered by Service Mesh
Łukasz Wojciechowski (Samsung R&D Institute Poland, Poland); Krzysztof Opasiak and Jakub Latusek (Warsaw University of Technology & Samsung R&D Institute Poland, Poland); Maciej Wereski (Samsung R&D Institute Poland, Poland); Victor Morales (Samsung Research America, USA); Taewan Kim (Samsung Research, Samsung Electronics Co., Ltd., Korea (South)); Moonki Hong (Samsung Electronics, Co., Ltd., Korea (South))
Optimal Rack-Coordinated Updates in Erasure-Coded Data Centers
Guowen Gong, Zhirong Shen and Suzhen Wu (Xiamen University, China); Xiaolu Li and Patrick Pak-Ching Lee (The Chinese University of Hong Kong, Hong Kong)
Primus: Fast and Robust Centralized Routing for Large-scale Data Center Networks
Guihua Zhou, Guo Chen, Fusheng Lin, Tingting Xu, Dehui Wei and Jianbing Wu (Hunan University, China); Li Chen (Huawei, Hong Kong); Yuanwei Lu and Andrew Qu (Tencent, China); Hua Shao (Tsinghua University & Tencent, China); Hongbo Jiang (Hunan University, China)
Session Chair
Wei Wang (Hong Kong University of Science and Technology)
Measurement and Monitoring
Self-Adaptive Sampling for Network Traffic Measurement
Yang Du, He Huang and Yu-e Sun (Soochow University, China); Shigang Chen (University of Florida, USA); Guoju Gao (Soochow University, China)
MTP: Avoiding Control Plane Overload with Measurement Task Placement
Xiang Chen (Peking University, Pengcheng Lab, and Fuzhou University, China); Qun Huang (Peking University, China); Wang Peiqiao (Fuzhou China, China); Hongyan Liu (Zhejiang University, China); Yuxin Chen (University of Science and Technology of China, China); Dong Zhang (Fuzhou University, China); Haifeng Zhou (Zhejiang University, and Zhejiang Lab, China); Chunming Wu (Zhejiang Lab, and Zhejiang University, China)
Low Cost Sparse Network Monitoring Based on Block Matrix Completion
Kun Xie and Jiazheng Tian (Hunan University, China); Gaogang Xie (Institute of Computing Technology, Chinese Academy of Sciences, China); Guangxing Zhang (Institute of Computing Technology Chinese Academy of Sciences, China); Dafang Zhang (Hunan University, China)
Expectile Tensor Completion to Recover Skewed Network Monitoring Data
Kun Xie and Siqi Li (Hunan University, China); Xin Wang (Stony Brook University, USA); Gaogang Xie (Institute of Computing Technology, Chinese Academy of Sciences, China); Yudian Ouyang (Hunan University, China)
Session Chair
Xiaolong Zheng (Beijing University of Posts and Telecommunications, China)
Federated Learning 3
Device Sampling for Heterogeneous Federated Learning: Theory, Algorithms, and Implementation
Su Wang (Purdue University, USA); Mengyuan Lee (Zhejiang University, China); Seyyedali Hosseinalipour (Purdue University, USA); Roberto Morabito (Ericsson Research & Princeton University, Finland); Mung Chiang (Purdue University, USA); Christopher G. Brinton (Purdue University & Zoomi Inc., USA)
Sample-level Data Selection for Federated Learning
Anran Li, Lan Zhang, Juntao Tan, Yaxuan Qin, Junhao Wang and Xiang-Yang Li (University of Science and Technology of China, China)
An Incentive Mechanism for Cross-Silo Federated Learning: A Public Goods Perspective
Ming Tang and Vincent W.S. Wong (University of British Columbia, Canada)
Learning-Driven Decentralized Machine Learning in Resource-Constrained Wireless Edge Computing
Zeyu Meng, Hongli Xu and Min Chen (University of Science and Technology of China, China); Yang Xu (University of Science and Technology of China & School of Computer Science and Technology, China); Yangming Zhao and Chunming Qiao (University at Buffalo, USA)
Session Chair
Chuan Wu (The University of Hong Kong)
Caching 2
Attack Resilience of Cache Replacement Policies
Tian Xie (Pennsylvania State University, USA); Ting He (Penn State University, USA); Patrick McDaniel and Namitha Nambiar (Pennsylvania State University, USA)
Rate Allocation and Content Placement in Cache Networks
Khashayar Kamran, Armin Moharrer, Stratis Ioannidis and Edmund Yeh (Northeastern University, USA)
Joint Cache Size Scaling and Replacement Adaptation for Small Content Providers
Jiahui Ye, Zichun Li, Zhi Wang and Zhuobin Zheng (Tsinghua University, China); Han Hu (Beijing Institute of Technology, China); Wenwu Zhu (Tsinghua University, China)
Self-adjusting Advertisement of Cache Indicators with Bandwidth Constraints
Itamar Cohen (Politecnico di Torino, Italy); Gil Einziger (Ben-Gurion University Of The Negev, Israel); Gabriel Scalosub (Ben-Gurion University of the Negev, Israel)
Our work shows that the desired advertisement policy depends on numerous parameters such as the cache policy, the workload, the cache size, and the available bandwidth. In particular, we show that there is no ideal single configuration. Therefore, we design an adaptive, self-adjusting algorithm that periodically selects an advertisement policy. Our algorithm does not require any prior information about the cache policy, cache size, or workload, and does not require any apriori configuration. Through extensive simulations, using several state-of-the-art cache policies, and real workloads, we show that our approach attains a similar cost to that of the best static configuration (which is only identified in retrospect) in each case.
Session Chair
Sergey Gorinsky (IMDEA Networks Institute, Spain)
Wireless
GPU-Ether: GPU-native packet I/O for GPU applications on commodity Ethernet
Changue Jung, Suhwan Kim, Ikjun Yeom, Honguk Woo and Younghoon Kim (Sungkyunkwan University, Korea (South))
On the Reliability of IEEE 802.1CB FRER
Doğanalp Ergenç and Mathias Fischer (University Hamburg, Germany)
Reversible Models for Wireless Multi-Channel Multiple Access
Michael Neely (University of Southern California, USA)
Session Chair
Zhi Sun (SUNY Buffalo)
Virtual Coffee Break
Attacks
Launching Smart Selective Jamming Attacks in WirelessHART Networks
Xia Cheng, Junyang Shi and Mo Sha (State University of New York at Binghamton, USA); Linke Guo (Clemson University, USA)
Your Home is Insecure: Practical Attacks on Wireless Home Alarm Systems
Tao Li (IUPUI, USA); Dianqi Han, Jiawei Li, Ang Li and Yan Zhang (Arizona State University, USA); Rui Zhang (University of Delaware, USA); Yanchao Zhang (Arizona State University, USA)
the external adversary uses his own magnet to control the state of the reed switch in order to either eliminate legitimate alarms or spoof false alarms. We also present a new battery-depletion attack with programmable electromagnets to deplete the alarm
sensor's battery quickly and stealthily in hours which is expected to last a few years. The efficacy of our attacks is confirmed by detailed experiments on a representative Ring alarm system.
Tornadoes In The Cloud: Worst-Case Attacks on Distributed Resources Systems
Jhonatan Tavori and Hanoch Levy (Tel Aviv University, Israel)
A worst-case (damage-maximizing) attack is an attack which minimizes the revenue of the system operator, due to disrupting the users from being served. A sophisticated attacker needs to decide how many attacking agents should be launched at each of the systems regions, in order to inflict maximal damage.
We characterize and analyze damage-maximization strategies for a number of attacks including deterministic attack, concurrent stochastic agents attack, approximation of a virus-spread attack and over-size binomial attack. We also address user-migration defense, allowing to dynamically migrate demands among regions, and we provide efficient algorithms for deriving worst-case attacks given a system with arbitrary placement and demands. The results form a basis for devising resource allocation strategies aiming at minimizing attack damages.
Invisible Poison: A Blackbox Clean Label Backdoor Attack to Deep Neural Networks
Rui Ning, Jiang Li, ChunSheng Xin and Hongyi Wu (Old Dominion University, USA)
Session Chair
Ruozhou Yu (North Carlolina State University)
Optimization
Blind Optimal User Association in Small-Cell Networks
Livia E. Chatzieleftheriou (Athens University of Economics and Business, Greece); Apostolos Destounis (Huawei Technologies France Research Center, France); Georgios Paschos (Amazon, Luxembourg); Iordanis Koutsopoulos (Athens University of Economics and Business, Greece)
Dynamically Choosing the Candidate Algorithm with Ostasos in Online Optimization
Weirong Chen, Jiaqi Zheng and Haoyu Yu (Nanjing University, China)
an automatic algorithm selection framework that can choose the most suitable algorithm on the fly with provable guarantees. Rigorous theoretical analysis demonstrates that the performance of Ostasos is no worse than that of any candidate algorithms in terms of competitive ratio. Finally, we apply Ostasos to the online car-hailing problem and trace-driven experiments verify the effectiveness of Ostasos.
Taming Time-Varying Information Asymmetry in Fresh Status Acquisition
Zhiyuan Wang (The Chinese University of Hong Kong, Hong Kong); Lin Gao (Harbin Institute of Technology (Shenzhen), China); Jianwei Huang (The Chinese University of Hong Kong, Shenzhen, China)
ToP: Time-dependent Zone-enhanced Points-of-interest Embedding-based Explainable Recommender system
En Wang, Yuanbo Xu, Yongjian Yang, Fukang Yang, Chunyu Liu and Yiheng Jiang (Jilin University, China)
Session Chair
Bin Li (U. Rhode Island)
Sea, Space and Quantum Networks
PolarTracker: Attitude-aware Channel Access for Floating Low Power Wide Area Networks
Yuting Wang, Xiaolong Zheng, Liang Liu and Huadong Ma (Beijing University of Posts and Telecommunications, China)
results reveal the reason behind this is due to the polarization and directivity of the antenna. The dynamic attitude of a floating node incurs varying signal strength losses, which is ignored by the attitude-oblivious link model adopted in most of the existing methods. When accessing the channel at a misaligned attitude, packet errors can happen. In this paper, we propose an attitude-aware link model that explicitly quantifies the impact of node attitude on link quality. Based on the new model, we propose PolarTracker, a novel channel access method for floating LPWAN. PolarTracker tracks the node attitude alignment state and schedules the transmissions into the aligned periods with better link quality. We implement a prototype of PolarTracker on commercial LoRa platforms and extensively evaluate its performance in various real-world environments. The experimental results show that PolarTracker can efficiently improve the packet reception ratio by 48.8%, compared with ALOHA in LoRaWAN.
Mobility- and Load-Adaptive Controller Placement and Assignment in LEO Satellite Networks
Long Chen, Feilong Tang and Xu Li (Shanghai Jiao Tong University, China)
However, existing work on controller placement and assignment is not applicable to LEO satellite networks with highly dynamic topology and randomly fluctuating load. In this paper, we first formulate the adaptive controller placement and assignment (ACPA) problem and prove its NP-hardness. Then, we propose the control relation graph (CRG) to quantitatively capture the control overhead in LEO satellite networks. Next, we propose the CRG-based controller placement and assignment (CCPA) algorithm with a bounded approximation ratio. Finally, using the predicted topology and estimated traffic load, a lookahead-based improvement algorithm is designed to further decrease the overall management costs. Extensive emulation results demonstrate that the CCPA algorithm outperforms related schemes in terms of response time and load balancing.
Time-Varying Resource Graph Based Resource Model for Space-Terrestrial Integrated Networks
Long Chen and Feilong Tang (Shanghai Jiao Tong University, China); Zhetao Li (Xiangtan University, China); Laurence T. Yang (St. Francis Xavier University, Canada); Jiadi Yu and Bin Yao (Shanghai Jiao Tong University, China)
In this paper, we propose the time-varying resource graph (TVRG) to model STINs from the resource perspective. Firstly, we propose the STIN mobility model to uniformly model different movement patterns in STINs. Then, we propose a layered Resource Modeling and Abstraction (RMA) approach, where evolutions of node resources are modeled as Markov processes, by encoding predictable topologies and influences of fluctuating loads as states. Besides, we propose the low-complexity domain resource abstraction algorithm by defining two mobility-based and load-aware partial orders on resource abilities. Finally, we propose an efficient TVRG-based Resource Scheduling (TRS) algorithm for time-sensitive and bandwidth-intensive data flows, with the multi-level on-demand scheduling ability. Comprehensive simulation results demonstrate that RMA-TRS outperforms related schemes in terms of throughput, end-to-end delay and flow completion time.
Redundant Entanglement Provisioning and Selection for Throughput Maximization in Quantum Networks
Yangming Zhao and Chunming Qiao (University at Buffalo, USA)
In this paper, we propose Redundant Entanglement Provisioning and Selection (REPS) to maximize the throughput for multiple source-destination (SD) pairs in a circuit-switched, multi-hop quantum network. REPS has two distinct features: (i). It provisions backup resources for extra entanglement links between adjacent nodes for failure-tolerance; and (ii). It provides flexibility in selecting successfully created entanglement links to establish entanglement connections for the SD pairs to achieve network-wide optimization. Extensive analysis and simulations show that REPS can achieve optimal routing with a high probability, and improves the throughput by up to 68.35% over the highest-performing algorithms in existence. In addition, it also improves the fairness among the SD pairs in the networks.
Session Chair
Ana Aguiar (University of Porto, Portugal)
WiFi
BLESS: BLE-aided Swift Wi-Fi Scanning in Multi-protocol IoT Networks
Wonbin Park and Dokyun Ryoo (Seoul National University, Korea (South)); Changhee Joo (Korea University, Korea (South)); Saewoong Bahk (Seoul National University, Korea (South))
Efficient Association of Wi-Fi Probe Requests under MAC Address Randomization
Jiajie Tan and S.-H. Gary Chan (The Hong Kong University of Science and Technology, China)
Coexistence of Wi-Fi 6E and 5G NR-U: Can We Do Better in the 6 GHz Bands?
Gaurang Naik and Jung-Min (Jerry) Park (Virginia Tech, USA)
LoFi: Enabling 2.4GHz LoRa and WiFi Coexistence by Detecting Extremely Weak Signals
Gonglong Chen, Wei Dong and Jiamei Lv (Zhejiang University, China)
Session Chair
Christoph Sommer (TU Dresden, Germany)
Distributed ML
Live Gradient Compensation for Evading Stragglers in Distributed Learning
Jian Xu (Tsinghua University, China); Shao-Lun Huang (Tsinghua-Berkeley Shenzhen Institute, China); Linqi Song (City University of Hong Kong, Hong Kong); Tian Lan (George Washington University, USA)
Exploiting Simultaneous Communications to Accelerate Data Parallel Distributed Deep Learning
Shaohuai Shi (The Hong Kong University of Science and Technology, Hong Kong); Xiaowen Chu (Hong Kong Baptist University, Hong Kong); Bo Li (Hong Kong University of Science and Technology, Hong Kong)
Low Sample and Communication Complexities in Decentralized Learning: A Triple Hybrid Approach
Xin Zhang (Iowa State University, USA); Jia Liu (The Ohio State University, USA); Zhengyuan Zhu (Iowa State University, USA); Elizabeth Serena Bentley (AFRL, USA)
DC2: Delay-aware Compression Control for Distributed Machine Learning
Ahmed M. Abdelmoniem and Marco Canini (KAUST, Saudi Arabia)
Session Chair
Zhichao Cao (Michigan State University)
LoRa
Modeling Communication Reliability in LoRa Networks with Device-level Accuracy
Verónica Toro-Betancur and Gopika Premsankar (Aalto University, Finland); Mariusz Slabicki (Institute of Theoretical and Applied Informatics, Polish Academy of Sciences, Poland); Mario Di Francesco (Aalto University, Finland)
Jamming of LoRa PHY and Countermeasure
Ningning Hou, Xianjin Xia and Yuanqing Zheng (The Hong Kong Polytechnic University, Hong Kong)
Radio Frequency Fingerprint Identification for LoRa Using Spectrogram and CNN
Guanxiong Shen, Junqing Zhang and Alan Marshall (University of Liverpool, United Kingdom (Great Britain)); Linning Peng (Southeast University, China); Xianbin Wang (Western University, Canada)
Pyramid: Real-Time LoRa Collision Decoding with Peak Tracking
Zhenqiang Xu, Pengjin Xie and Jiliang Wang (Tsinghua University, China)
Session Chair
Janise McNair (University of Florida)
Routing
Grafting Arborescences for Extra Resilience of Fast Rerouting Schemes
Klaus-Tycho Foerster (University of Vienna, Austria); Andrzej Kamisiński (AGH University of Science and Technology, Poland); Yvonne-Anne Pignolet (DFINITY, Switzerland); Stefan Schmid (University of Vienna, Austria); Gilles Tredan (LAAS-CNRS, France)
A Fast-Convergence Routing of the Hot-Potato
Jean-Romain Luttringer and Quentin Bramas (University of Strasbourg, France); Cristel Pelsser (University of Strasbourg); Pascal Mérindol (Université de Strasbourg, France)
Threshold-based rerouting and replication for resolving job-server affinity relations
Youri Raaijmakers and Onno Boxma (Eindhoven University of Technology, The Netherlands); Sem Borst (Eindhoven University of Technology & Nokia Bell Labs, USA)
Session Chair
Kaushik Chowdhury (Northeastern University)
Virtual Lunch Break
Attack and Anomaly Detection
MANDA: On Adversarial Example Detection for Network Intrusion Detection System
Ning Wang (Virginia Tech, USA); Yimin Chen (Virginia Polytechnic Institute and State University, USA); Yang Hu (Virgina Tech, USA); Wenjing Lou and Thomas Hou (Virginia Tech, USA)
Detecting Localized Adversarial Examples: A Generic Approach using Critical Region Analysis
Fengting Li, Xuankai Liu, XiaoLi Zhang and Qi Li (Tsinghua University, China); Kun Sun (George Mason University, USA); Kang Li (University of Georgia, USA)
Towards Cross-Modal Forgery Detection and Localization on Live Surveillance Videos
Yong Huang, Xiang Li, Wei Wang and Tao Jiang (Huazhong University of Science and Technology, China); Qian Zhang (Hong Kong University of Science and Technology, Hong Kong)
CTF: Anomaly Detection in High-Dimensional Time Series with Coarse-to-Fine Model Transfer
Ming Sun and Ya Su (Tsinghua University, China); Shenglin Zhang, Yuanpu Cao and Yuqing Liu (Nankai University, China); Dan Pei and Wenfei Wu (Tsinghua University, China); Yongsu Zhang, Xiaozhou Liu and Junliang Tang (ByteDance, China)
Session Chair
Tony Luo (Missouri Univ. Science and Technology)
Packets and Flows
ECLAT: An ECN Marking System for Latency Guarantee in Cellular Networks
Junseon Kim (Ulsan National Institute of Science and Technology (UNIST), Korea (South)); Youngbin Im (Ulsan National Institute of Science and Technology, Korea (South)); Kyunghan Lee (Seoul National University, Korea (South))
PCL: Packet Classification with Limited knowledge
Vitalii Demianiuk (Ariel University, Israel); Chen Hajaj (Ariel University & Data Science and Artificial Intelligence Research Center, Israel); Kirill Kogan (Ariel University, Israel)
Towards the Fairness of Traffic Policer
Danfeng Shan and Peng Zhang (Xi'an Jiaotong University, China); Wanchun Jiang (Central South University, China); Hao Li (Xi'an Jiaotong University, China); Fengyuan Ren (Tsinghua University, China)
Jellyfish: Locality-sensitive Subflow Sketching
Yongquan Fu (National University of Defense Technology, China); Lun An (Beijing University of Posts and Telecommunications, China); Siqi Shen (Xiamen University, China); Kai Chen (Hong Kong University of Science and Technology, China); Pere Barlet-Ros (Universitat Politècnica de Catalunya, Spain)
Session Chair
Shuochao Yao (George Mason University, USA)
Social Networks and Applications
Medley: Predicting Social Trust in Time-Varying Online Social Networks
Wanyu Lin and Baochun Li (University of Toronto, Canada)
Conventional methods for predicting social trust often accept static graphs as input, oblivious of the fact that social interactions are time-dependent. In this work, we propose Medley, to explicitly model users' time-varying latent factors and to predict social trust that varies over time. We propose to use functional time encoding to capture continuous-time features and employ attention mechanisms to assign higher importance weights to social interactions that are more recent. By incorporating topological structures that evolve over time, our framework can infer pairwise social trust based on past interactions. Our experiments on benchmarking datasets show that Medley is able to utilize time-varying interactions effectively for predicting social trust, and achieves an accuracy that is up to 26% higher over its alternatives.
Setting the Record Straighter on Shadow Banning
Erwan Le Merrer (Inria, France); Benoit Morgan (IRIT-ENSEEIHT, University of Toulouse, France); Gilles Tredan (LAAS-CNRS, France)
MIERank: Co-ranking Individuals and Communities with Multiple Interactions in Evolving Networks
Shan Qu (Shanghai Jiaotong University, China); Luoyi Fu (Shanghai Jiao Tong University, China); Xinbing Wang (Shanghai Jiaotong University, China)
ProHiCo: A Probabilistic Framework to Hide Communities in Large Networks
Xuecheng Liu and Luoyi Fu (Shanghai Jiao Tong University, China); Xinbing Wang (Shanghai Jiaotong University, China); John Hopcroft (Cornell University, USA)
Session Chair
Fabricio Murai (Universidade Federal de Minas Gerais, Brasil)
Localization
VideoLoc: Video-based Indoor Localization with Text Information
Shusheng Li and Wenbo He (McMaster University, Canada)
The Effect of Ground Truth Accuracy on the Evaluation of Localization Systems
Chen Gu (Google, USA); Ahmed Shokry and Moustafa Youssef (Alexandria University, Egypt)
In this paper, we present a theoretical framework for analyzing the effect of ground truth errors on the evaluation of localization systems. Based on that, we design two algorithms for computing the real algorithmic error from the validation error and marking/map ground truth errors, respectively. We further establish bounds on different performance metrics.
Validation of our theoretical assumptions and analysis using real data collected in a typical environment shows the ability of our theoretical framework to correct the estimated error of a localization algorithm in the presence of ground truth errors. Specifically, our marking error algorithm matches the real error CDF within 4%, and our map error algorithm provides a more accurate estimate of the median/tail error by 150%/72% when the map is shifted by 6m.
Train Once, Locate Anytime for Anyone: Adversarial Learning based Wireless Localization
Danyang Li, Jingao Xu, Zheng Yang, Yumeng Lu and Qian Zhang (Tsinghua University, China); Xinglin Zhang (South China University of Technology, China)
Failure Localization through Progressive Network Tomography
Viviana Arrigoni (Sapienza, University of Rome, Italy); Novella Bartolini (Sapienza University of Rome, Italy); Annalisa Massini (Sapienza Università di Roma, Italy); Federico Trombetti (Sapienza, University of Rome, Italy)
Then, by means of numerical experiments conducted on real network topologies, we demonstrate the practical applicability of our approach. The performance evaluation evidences the superiority of our algorithms with respect to state of the art solutions based on classic Boolean Network Tomography as well as approaches based on sequential group testing.
Session Chair
Song Fang (University of Oklahoma)
Sensing and Learning
DeepSense: Fast Wideband Spectrum Sensing Through Real-Time In-the-Loop Deep Learning
Daniel Uvaydov, Salvatore D'Oro, Francesco Restuccia and Tommaso Melodia (Northeastern University, USA)
Bayesian Online Learning for Energy-Aware Resource Orchestration in Virtualized RANs
Jose A. Ayala-Romero (Trinity College Dublin, Ireland); Andres Garcia-Saavedra (NEC Labs Europe, Germany); Xavier Costa-Perez (NEC Laboratories Europe, Germany); George Iosifidis (Delft University of Technology, The Netherlands)
Multi-Agent Reinforcement Learning for Urban Crowd Sensing with For-Hire Vehicles
Rong Ding (Shanghai Jiao Tong University, China); Zhaoxing Yang, Yifei Wei and Haiming Jin (Shanghai Jiao Tong University, China); Xinbing Wang (Shanghai Jiaotong University, China)
Near-Optimal Topology-adaptive Parameter Synchronization in Distributed DNN Training
Zhe Zhang and Chuan Wu (The University of Hong Kong, Hong Kong); Zongpeng Li (Wuhan University & University of Calgary, China)
Session Chair
Bo Ji (Virginia Tech)
Performance
On the Performance of Pipelined HotStuff
Jianyu Niu and Fangyu Gai (The University of British Columbia, Canada); Mohammad Jalalzai (The University of British Columbia); Chen Feng (University of British Columbia, Canada)
Practical Analysis of Replication-Based Systems
Florin Ciucu (University of Warwick, United Kingdom (Great Britain)); Felix Poloczek (University of Warwick / TU Berlin, Germany); Lydia Y. Chen (IBM Zurich Research Laboratory, Switzerland); Martin Chan (University of Warwick, Germany)
WebMythBusters: An In-depth Study of Mobile Web Experience
Seonghoon Park and Yonghun Choi (Yonsei University, Korea (South)); Hojung Cha (Yonsei University, S. Korea, Korea (South))
SOBA: Session optimal MDP-based network friendly recommendations
Theodoros Giannakas (EURECOM, France); Anastasios Giovanidis (Sorbonne Université & CNRS-LIP6, France); Thrasyvoulos Spyropoulos (EURECOM, France)
Session Chair
Marie-Jose Montpetit (Concordia University, Canada)
Miscellaneous
De-anonymizing Social Networks Under Partial Overlap: An F-score Based Approach
Jiapeng Zhang and Luoyi Fu (Shanghai Jiao Tong University, China); Xinbing Wang (Shanghai Jiaotong University, China); Guihai Chen (Shanghai Jiao Tong University, China)
First-Order Efficient General-Purpose Clean-label Data Poisoning
Tianhang Zheng and Baochun Li (University of Toronto, Canada)
INT-label: Lightweight In-band Network-Wide Telemetry via Interval-based Distributed Labelling
Enge Song, Tian Pan and Chenhao Jia (Beijing University of Posts and Telecommunications, China); Wendi Cao (Peking University, China); Jiao Zhang, Tao Huang and Yunjie Liu (Beijing University of Posts and Telecommunications, China)
Finding Critical Files from a Packet
JunNyung Hur, Hahoon Jeon, Hyeon gy Shon, Young Jae Kim and MyungKeun Yoon (Kookmin University, Korea (South))
Session Chair
Damla Turgut (University of Central Florida)
Virtual Coffee Break
Security
Bipartite Graph Matching Based Secret Key Generation
Hongbo Liu (University of Electronic Science and Technology of China, China); Yan Wang (Temple University, USA); Yanzhi Ren (University of Electronic Science and Technology of China, China); Yingying Chen (Rutgers University, USA)
ScreenID: Enhancing QRCode Security by Fingerprinting Screens
Yijie Li and Yi-Chao Chen (Shanghai Jiao Tong University, China); Xiaoyu Ji (Zhejiang University, China); Hao Pan, Lanqing Yang, Guangtao Xue and Jiadi Yu (Shanghai Jiao Tong University, China)
Prison Break of Android Reflection Restriction and Defense
Zhen Ling and Ruizhao Liu (Southeast University, China); Yue Zhang (Jinan University, China); Kang Jia (Southeast University, China); Bryan Pearson (University of Central Florida, USA); Xinwen Fu (University of Massachusetts Lowell, USA); Luo Junzhou (Southeast University, China)
Counter-Collusion Smart Contracts for Watchtowers in Payment Channel Networks
Yuhui Zhang and Dejun Yang (Colorado School of Mines, USA); Guoliang Xue (Arizona State University, USA); Ruozhou Yu (North Carolina State University, USA)
Session Chair
Satyajayant Misra (New Mexico State University)
Programmable Switches
Programmable Switches for in-Networking Classification
Bruno Missi Xavier and Rafael Silva Guimaraes (Federal Institute of Espirito Santo - Campus Cachoeiro de Itapemirim, Brazil); Giovanni Comarela (Universidade Federal do Espírito Santo, Brazil); Magnos Martinello (Federal University of Espirito Santo, Brazil)
Fix with P6: Verifying Programmable Switches at Runtime
Apoorv Shukla (Huawei Munich Research Center, Germany); Kevin Hudemann (SAP, Germany); Zsolt Vági (SWISSCOM, Switzerland); Lily Hügerich (TU Berlin, Germany); Georgios Smaragdakis (TU Berlin and Max Planck Institute for Informatics, Germany); Artur Hecker (Huawei, Germany); Stefan Schmid (University of Vienna, Austria); Anja Feldmann (Max Planck Institute for Informatics & Saarland Informatics Campus / TU Berlin, Germany)
Making Multi-String Pattern Matching Scalable and Cost-Efficient with Programmable Switching ASICs
Shicheng Wang, Menghao Zhang, Guanyu Li, Chang Liu and Ying Liu (Tsinghua University, China); Xuya Jia (Huawei Technologies Co. Ltd., China); Mingwei Xu (Tsinghua University, China)
Traffic-aware Buffer Management in Shared Memory Switches
Sijiang Huang, Mowei Wang and Yong Cui (Tsinghua University, China)
Session Chair
Qiao Xiang (Xiamen University, China)
Memory Topics
Adaptive Batch Update in TCAM: How Collective Optimization Beats Individual Ones
Ying Wan (Tsinghua University, China); Haoyu Song (Futurewei Technologies, USA); Yang Xu (Fudan University, China); Chuwen Zhang (Tsinghua University, China); Yi Wang (Southern University of Science and Technology, China); Bin Liu (Tsinghua University, China)
TCAM placement for whole batches throughout. By applying the topology grouping and maintaining the group order invariance in TCAM, ABUT achieves substantial computing time reduction yet still yields the best-in-class placement cost. Our evaluations show that ABUT is ideal for low-latency and high-throughput batch TCAM updates in modern high-performance switches.
HAVS: Hardware-accelerated Shared-memory-based VPP Network Stack
Shujun Zhuang and Jian Zhao (ShangHaiJiaoTong University, China); Jian Li (Shanghai Jiao Tong University, China); Ping Yu and Yuwei Zhang (Intel, China); Haibing Guan (Shanghai Jiao Tong University, China)
This paper adopts a hardware-accelerated solution and proposes HAVS which integrates Intel I/O Acceleration Technology into the VPP network stack to achieve high-performance memory copy offloading. An asynchronous copy architecture is introduced in HAVS to free up CPU resources. Moreover, an abstract memcpy accelerator layer is constructed in HAVS to ease the use of different types of hardware accelerators and sustain high availability with a fault-tolerance mechanism. The comprehensive evaluation shows that HAVS can provide an average 50%-60% throughput improvement over the original VPP stack when accelerating the nginx and SPDK iSCSI target application.
Maximizing the Benefit of RDMA at End Hosts
Xiaoliang Wang (Nanjing University, China); Hexiang Song (NJU, China); Cam-Tu Nguyen (Nanjing University, Vietnam); Dongxu Cheng and Tiancheng Jin (NJU, China)
Session Chair
Xinwen Fu (U. Massachussets, Lowell)
SDN
Safety Critical Networks using Commodity SDNs
Ashish Kashinath (University of Illinois at Urbana-Champaign, USA); Monowar Hasan (University of Illinois Urbana-Champaign, USA); Rakesh Kumar (University of Illinois, Urbana-Champaign, USA); Sibin Mohan (University of Illinois at Urbana-Champaign, USA); Rakesh B. Bobba (Oregon State University, USA); Smruti Padhy (University of Texas at Austin, USA)
Bandwidth Isolation Guarantee for SDN Virtual Networks
Gyeongsik Yang, Yeonho Yoo and Minkoo Kang (Korea University, Korea (South)); Heesang Jin (ETRI, Korea (South)); Chuck Yoo (Korea University, Korea (South))
Online Joint Optimization on Traffic Engineering and Network Update in Software-defined WANs
Jiaqi Zheng, Yimeng Xu and Li Wang (Nanjing University, China); Haipeng Dai (Nanjing University & State Key Laboratory for Novel Software Technology, China); Guihai Chen (Shanghai Jiao Tong University, China)
Modeling the Cost of Flexibility in Communication Networks
Alberto Martínez Alba (Technische Universität München, Germany); Péter Babarczi (Budapest University of Technology and Economics, Hungary & Technische Universität München, Germany); Andreas Blenk and Mu He (Technische Universität München, Germany); Patrick Kalmbach (Technical University of Munich, Germany); Johannes Zerwas and Wolfgang Kellerer (Technische Universität München, Germany)
Session Chair
Y. Richard Yang (Yale University)
Learning Networks
Analyzing Learning-Based Networked Systems with Formal Verification
Arnaud Dethise and Marco Canini (KAUST, Saudi Arabia); Nina Narodytska (VMware Research Group, USA)
Bringing Fairness to Actor-Critic Reinforcement Learning for Network Utility Optimization
Jingdi Chen and Yimeng Wang (The George Washington University, USA); Tian Lan (George Washington University, USA)
Incentive Mechanism Design for Distributed Coded Machine Learning
Ningning Ding (The Chinese University of Hong Kong, Hong Kong); Zhixuan Fang (Tsinghua University, China); Lingjie Duan (Singapore University of Technology and Design (SUTD), Singapore); Jianwei Huang (The Chinese University of Hong Kong, Shenzhen, China)
Efficient Learning-based Scheduling for Information Freshness in Wireless Networks
Bin Li (University of Rhode Island, USA)
Session Chair
WenZhan Song (University of Georgia)
Protocols
802.11ad in Smartphones: Energy Efficiency, Spatial Reuse, and Impact on Applications
Shivang Aggarwal (Northeastern University, USA); Moinak Ghoshal (Northeastern University, Boston, MA, USA); Piyali Banerjee (University at Buffalo, USA); Dimitrios Koutsonikolas (Northeastern University, USA); Joerg Widmer (IMDEA Networks Institute, Spain)
Age-Dependent Distributed MAC for Ultra-Dense Wireless Networks
Dheeraj Narasimha (Arizona State University, USA); Srinivas G Shakkottai (Texas A&M University, USA); Lei Ying (University of Michigan, USA)
Delay-Tolerant Constrained OCO with Application to Network Resource Allocation
Juncheng Wang and Ben Liang (University of Toronto, Canada); Min Dong (Ontario Tech University, Canada); Gary Boudreau and Hatem Abou-zeid (Ericsson, Canada)
Multicast Communications with Varying Bandwidth Constraints
Yuval Emek and Shay Kutten (Technion, Israel); Mordechai Shalom (Tel-Hai College & Technion, Israel); Shmuel Zaks (Technion, Israel)
Session Chair
Jiangchuan Liu (Simon Fraser University, Canada)
Next Generation Challenges
BlendVLC: A Cell-free VLC Network Architecture Empowered by Beamspot Blending
Jona Beysens (KU Leuven, Belgium); Qing Wang (Delft University of Technology, The Netherlands); Maxim Van den Abeele and Sofie Pollin (KU Leuven, Belgium)
Characterizing Ethereum's Mining Power Decentralization at a Deeper Level
Liyi Zeng (Tsinghua University, China); Yang Chen (Microsoft Research Asia, China); Shuo Chen (Microsoft Research, USA); Xian Zhang and Zhongxin Guo (Microsoft Research Asia, China); Wei Xu (Tsinghua University, China); Thomas Moscibroda (Microsoft Research, USA)
Uplink Multi-User Beamforming on Single RF Chain mmWave WLANs
Keerthi Priya Dasala (Rice University, USA); Josep M Jornet (Northeastern University, USA); Edward W. Knightly (Rice University, USA)
Session Chair
Nirupama Bulusu (Portland State University)
Made with in Toronto · Privacy Policy · INFOCOM 2020 · © 2021 Duetone Corp.