IEEE INFOCOM 2022
Poster: Machine Learning for Networking
Noise-Resilient Federated Learning: Suppressing Noisy Labels in the Local Datasets of Participants
Rahul Mishra (IIT (BHU) Varanasi, India); Hari Prabhat Gupta (Indian Institute of Technology (BHU) Varanasi, INDIA, India); Tanima Dutta (IIT (BHU) Varanasi, India)
Differentiating Losses in Wireless Networks: A Learning Approach
Yuhao Chen, Jinyao Yan and Yuan Zhang (Communication University of China, China); Karin Anna Hummel (Johannes Kepler University Linz, Austria)
Battery-less Massive Access for Simultaneous Information Transmission and Federated Learning in WPT Networks
Wanli Ni (Beijng University of Posts and Telecommunications, China); Xufeng Liu (Beijing University of Posts and Telecommunications, China); Hui Tian (Beijng University of posts and telecommunications, China)
Collaborative Learning for Large-Scale Discrete Optimal Transport under Incomplete Populational Information
Navpreet Kaur and Juntao Chen (Fordham University, USA)
Leveraging Spanning Tree to Detect Colluding Attackers in Federated Learning
Priyesh Ranjan, Federico Coro, Ashish Gupta and Sajal K. Das (Missouri University of Science and Technology, USA)
Spectrum Sharing in UAV-Assisted HetNet Based on CMB-AM Multi-Agent Deep Reinforcement Learning
Guan Wei, Bo Gao, Ke Xiong and Yang Lu (Beijing Jiaotong University, China)
Inverse Reinforcement Learning Meets Power Allocation in Multi-user Cellular Networks
Ruichen Zhang, Ke Xiong, Xingcong Tian and Yang Lu (Beijing Jiaotong University, China); Pingyi Fan (Tsinghua University, China); Khaled B. Letaief (The Hong Kong University of Science and Technology, Hong Kong)
Cyber Attacks Detection using Machine Learning in Smart Grid Systems
Sohan Gyawali (University of Texas Permian Basin, USA); Omar A Beg (The University of Texas Permian Basin, USA)
Age-Energy Efficiency in WPCNs: A Deep Reinforcement Learning Approach
Haina Zheng and Ke Xiong (Beijing Jiaotong University, China); Mengying Sun (Beijing University of Posts and Telecommunications, China); Zhangdui Zhong (Beijing Jiaotong University, China); Khaled B. Letaief (The Hong Kong University of Science and Technology, Hong Kong)
Session Chair
Xingyu Zhou (Wayne State University, USA)
Poster: Wireless Systems and IoT
Simultaneous Intra-Group Communication: Understanding the Problem Space
Jagnyashini Debadarshini and Sudipta Saha (Indian Institute of Technology Bhubaneswar, India)
Efficient Coordination among Electrical Vehicles: An IoT-Assisted Approach
Jagnyashini Debadarshini and Sudipta Saha (Indian Institute of Technology Bhubaneswar, India)
Statoeuver: State-aware Load Balancing for Network Function Virtualization
Wendi Feng and Ranzheng Cao (Beijing Information Science and Technology University, China); Zhi-Li Zhang (University of Minnesota, USA)
LoRaCoin: Towards a blockchain-based platform for managing LoRa devices
Eloi Cruz Harillo (Technical University of Catalunya, Spain); Felix Freitag (Technical University of Catalonia, Spain)
An ns3-based Energy Module for 5G mmWave Base Stations
Argha Sen (Indian Institute of Technology Kharagpur, India); Sashank Bonda (IIT Kharagpur, India); Jay Jayatheerthan (Intel Technology Pvt. Ltd., India); Sandip Chakraborty (Indian Institute of Technology Kharagpur, India)
QUIC-Enabled Data Aggregation for Short Packet Communication in mMTC
Haoran Zhao, Bo He, He Zhou, Jiangyin Zhou, Qi Qi, Jingyu Wang and Haifeng Sun (Beijing University of Posts and Telecommunications, China); Jianxin Liao (Beijing University of Posts and Telecommunications, Taiwan)
A3C-based Computation Offloading and Service Caching in Cloud-Edge Computing Networks
Zhenning Wang, Mingze Li, Liang Zhao and Huan Zhou (China Three Gorges University, China); Ning Wang (Rowan University, USA)
delay requirements of MUs while reducing the cost of the CSC. Then, an Asynchronous Advantage Actor-Critic-based (A3C-based) method is proposed to solve the optimization problem. The simulation results show that the proposed A3C-based method significantly outperforms the other baseline methods in different scenarios.
Unreliable Multi-hop Networks Routing Protocol For Age of Information-Sensitive Communication
Abdalaziz Sawwan and Jie Wu (Temple University, USA)
Vehicular Virtual Edge Computing using Heterogeneous V2V and V2C Communication
Gurjashan Singh Pannu (TU Berlin, Germany); Seyhan Ucar (Toyota Motor North America R&D, InfoTech Labs, USA); Takamasa Higuchi (Toyota Motor North America R&D, USA); Onur Altintas (Toyota Motor North America R&D, InfoTech Labs, USA); Falko Dressler (TU Berlin, Germany)
Session Chair
Yin Sun (Auburn University, USA)
Poster: Sensing and Localization
Exploring LoRa for Drone Detection
Jian Fang, Zhiyi Zhou, Sunhaoran Jin, Lei Wang, Bingxian Lu and Zhenquan Qin (Dalian University of Technology, China)
Resolving Conflicts among Unbalanced Multi-Source Data When Multi-Value Objects Exist
Xiu Fang (Donghua University, China); Quan Z. Sheng and Jian Yang (Macquarie University, Australia); Guohao Sun (Donghua University, China); Xianzhi Wang (University of Technology Sydney, Australia); Yihong Zhang (Osaka University, Japan)
Static Obstacle Detection based on Acoustic Signals
Runze Tang, Gaolei Duan, Lei Xie and Yanling Bu (Nanjing University, China); Ming Zhao, Zhenjie Lin and Qiang Lin (China Southern Power Grid Shenzhen Digital Power Grid Research Institute, China)
Remote Meter Reading based on Lightweight Edge Devices
Ziwei Liu, Lei Xie and Jingyi Ning (Nanjing University, China); Ming Zhao (China Southern Power Grid Shenzhen Digital Power Grid Research Institute Company, China); Wang Liming ( & China Southern Power Grid Shenzhen Digital Power Grid Research Institute Company, China); Peng Hao (China Southern Power Grid Shenzhen Digital Power Grid Research Institute Company, China)
LoRa-based Outdoor 3D Localization
Jian Fang, Lei Wang, Zhenquan Qin and Bingxian Lu (Dalian University of Technology, China)
Are Malware Detection Models Adversarial Robust Against Evasion Attack?
Hemant Rathore, Adithya Samavedhi and Sanjay K. Sahay (BITS Pilani, India); Mohit Sewak (Microsoft & BITS Pilani, Goa, India)
Physical Layer Security Authentication Based Wireless Industrial Communication System for Spoofing Detection
Songlin Chen, Sijing Wang and Xingchen Xu (University of Electronic Science and Technology of China, China); Long Jiao (George Mason University, USA); Hong Wen (UESTC, China)
A Dual-RFID-Tag Based Indoor Localization Method with Multiple Apertures
Cihang Cheng (Beijing Jiaotong University, China); Ming Liu (Beijing Jiaotong University & Beijing Key Lab of Transportation Data Analysis and Mining, China); Ke Xiong (Beijing Jiaotong University, China)
Session Chair
Jie Xiong (University of Massachusetts, Amherst, USA)
Poster: Security and Analytics
Dynamic Pricing for Idle Resource in Public Clouds: Guarantee Revenue from Strategic Users
Jiawei Li, Jessie Hui Wang and Jilong Wang (Tsinghua University, China)
Pricing idle resources is crucial to the cloud ecosystem, but its difficulty is underestimated because user strategies are treated as simple.
In this paper, we model users as smart who want to minimize total cost over time and characterize an extensive-form repeated game between a cloud supplier and multiple users, which captures incentives in real world scenarios like Amazon Web Service spot instance.
We model smart user responses to prices by designing a no regret online bidding strategy and prove that the game among users converges to a coarse correlated equilibrium.
Conversely, we design a robust pricing mechanism for the cloud supplier, which guarantees worst case revenue and achieves market equilibrium.
The End of Eavesdropping Attacks through the Use of Advanced End to End Encryption Mechanisms
Leandros A. Maglaras (De Montfort University, United Kingdom (Great Britain)); Nicholas Ayres (DeMontfort University, United Kingdom (Great Britain)); Sotiris Moschoyiannis (University of Surrey, United Kingdom (Great Britain)); Leandros Tassiulas (Yale University, USA)
USV Control With Adaptive Compensation Under False Data Injection Attacks
Panxin Bai and Heng Zhang (Jiangsu Ocean University, China); Jian Zhang and Hongran Li (Huaihai Institute of Technology, China)
A Novel TCP/IP Header Hijacking Attack on SDN
Ali Akbar Mohammadi (Innopolis University, Russia); Rasheed Hussain and Alma Oracevic (University of Bristol, United Kingdom (Great Britain)); Syed Muhammad Ahsan Raza Kazmi (Innopolis University, Russia); Fatima Hussain (Royal Bank of Canada, Canada); Moayad Aloqaily (Mohamed Bin Zayed University of Artificial Intelligence, Canada); Junggab Son (Keennesaw State University, USA)
MANTRA: Semantic Mobility Knowledge Analytics Framework for Trajectory Annotation
Shreya Ghosh (The Pennsylvania State University, USA); Soumya Ghosh (Indian Institute of Technology Kharagpur, India)
An Extension of Imagechain Concept that Allows Multiple Images per Block
Katarzyna Koptyra and Marek R Ogiela (AGH University of Science and Technology, Poland)
block take part in hash computation. Described construction uses secret splitting for creating shares and steganographic algorithms for embedding and recovering data.
Shellcoding: Hunting for Kernel32 Base Address
Tarek Ahmed and Shengjie Xu (Dakota State University, USA)
REGRETS: A New Corpus of Regrettable (Self-)Disclosures on Social Media
Hervais Simo and Michael Kreutzer (Fraunhofer SIT, Germany)
Session Chair
Linke Guo (Clemson University, USA)
Made with in Toronto · Privacy Policy · INFOCOM 2020 · INFOCOM 2021 · © 2022 Duetone Corp.