IEEE INFOCOM 2021
Video Streaming
Towards Video Streaming Analysis and Sharing for Multi-Device Interaction with Lightweight DNNs
Yakun Huang, Hongru Zhao and Xiuquan Qiao (Beijing University of Posts and Telecommunications, China); Jian Tang (Syracuse University, USA); Ling Liu (Georgia Tech, USA)
AMIS: Edge Computing Based Adaptive Mobile Video Streaming
Phil K Mu, Jinkai Zheng, Tom H. Luan and Lina Zhu (Xidian University, China); Zhou Su (Shanghai University, China); Mianxiong Dong (Muroran Institute of Technology, Japan)
Robust 360◦ Video Streaming via Non-Linear Sampling
Mijanur R Palash, Voicu Popescu, Amit Sheoran and Sonia Fahmy (Purdue University, USA)
Popularity-Aware 360-Degree Video Streaming
Xianda Chen, Tianxiang Tan and Guohong Cao (The Pennsylvania State University, USA)
Session Chair
Yusheng Ji (National Institute of Informatics, Japan)
Attacks
Launching Smart Selective Jamming Attacks in WirelessHART Networks
Xia Cheng, Junyang Shi and Mo Sha (State University of New York at Binghamton, USA); Linke Guo (Clemson University, USA)
Your Home is Insecure: Practical Attacks on Wireless Home Alarm Systems
Tao Li (IUPUI, USA); Dianqi Han, Jiawei Li, Ang Li and Yan Zhang (Arizona State University, USA); Rui Zhang (University of Delaware, USA); Yanchao Zhang (Arizona State University, USA)
the external adversary uses his own magnet to control the state of the reed switch in order to either eliminate legitimate alarms or spoof false alarms. We also present a new battery-depletion attack with programmable electromagnets to deplete the alarm
sensor's battery quickly and stealthily in hours which is expected to last a few years. The efficacy of our attacks is confirmed by detailed experiments on a representative Ring alarm system.
Tornadoes In The Cloud: Worst-Case Attacks on Distributed Resources Systems
Jhonatan Tavori and Hanoch Levy (Tel Aviv University, Israel)
A worst-case (damage-maximizing) attack is an attack which minimizes the revenue of the system operator, due to disrupting the users from being served. A sophisticated attacker needs to decide how many attacking agents should be launched at each of the systems regions, in order to inflict maximal damage.
We characterize and analyze damage-maximization strategies for a number of attacks including deterministic attack, concurrent stochastic agents attack, approximation of a virus-spread attack and over-size binomial attack. We also address user-migration defense, allowing to dynamically migrate demands among regions, and we provide efficient algorithms for deriving worst-case attacks given a system with arbitrary placement and demands. The results form a basis for devising resource allocation strategies aiming at minimizing attack damages.
Invisible Poison: A Blackbox Clean Label Backdoor Attack to Deep Neural Networks
Rui Ning, Jiang Li, ChunSheng Xin and Hongyi Wu (Old Dominion University, USA)
Session Chair
Ruozhou Yu (North Carlolina State University)
Attack and Anomaly Detection
MANDA: On Adversarial Example Detection for Network Intrusion Detection System
Ning Wang (Virginia Tech, USA); Yimin Chen (Virginia Polytechnic Institute and State University, USA); Yang Hu (Virgina Tech, USA); Wenjing Lou and Thomas Hou (Virginia Tech, USA)
Detecting Localized Adversarial Examples: A Generic Approach using Critical Region Analysis
Fengting Li, Xuankai Liu, XiaoLi Zhang and Qi Li (Tsinghua University, China); Kun Sun (George Mason University, USA); Kang Li (University of Georgia, USA)
Towards Cross-Modal Forgery Detection and Localization on Live Surveillance Videos
Yong Huang, Xiang Li, Wei Wang and Tao Jiang (Huazhong University of Science and Technology, China); Qian Zhang (Hong Kong University of Science and Technology, Hong Kong)
CTF: Anomaly Detection in High-Dimensional Time Series with Coarse-to-Fine Model Transfer
Ming Sun and Ya Su (Tsinghua University, China); Shenglin Zhang, Yuanpu Cao and Yuqing Liu (Nankai University, China); Dan Pei and Wenfei Wu (Tsinghua University, China); Yongsu Zhang, Xiaozhou Liu and Junliang Tang (ByteDance, China)
Session Chair
Tony Luo (Missouri Univ. Science and Technology)
Security
Bipartite Graph Matching Based Secret Key Generation
Hongbo Liu (University of Electronic Science and Technology of China, China); Yan Wang (Temple University, USA); Yanzhi Ren (University of Electronic Science and Technology of China, China); Yingying Chen (Rutgers University, USA)
ScreenID: Enhancing QRCode Security by Fingerprinting Screens
Yijie Li and Yi-Chao Chen (Shanghai Jiao Tong University, China); Xiaoyu Ji (Zhejiang University, China); Hao Pan, Lanqing Yang, Guangtao Xue and Jiadi Yu (Shanghai Jiao Tong University, China)
Prison Break of Android Reflection Restriction and Defense
Zhen Ling and Ruizhao Liu (Southeast University, China); Yue Zhang (Jinan University, China); Kang Jia (Southeast University, China); Bryan Pearson (University of Central Florida, USA); Xinwen Fu (University of Massachusetts Lowell, USA); Luo Junzhou (Southeast University, China)
Counter-Collusion Smart Contracts for Watchtowers in Payment Channel Networks
Yuhui Zhang and Dejun Yang (Colorado School of Mines, USA); Guoliang Xue (Arizona State University, USA); Ruozhou Yu (North Carolina State University, USA)
Session Chair
Satyajayant Misra (New Mexico State University)
Made with in Toronto · Privacy Policy · INFOCOM 2020 · © 2021 Duetone Corp.