Session Poster-2

Poster Session 2

Conference
10:00 AM — 12:00 PM EDT
Local
May 19 Fri, 10:00 AM — 12:00 PM EDT
Location
Babbio Lobby

Quantifying the Impact of Base Station Metrics on LTE Resource Block Prediction Accuracy

Darijo Raca (University of Sarajevo, Bosnia and Herzegovina); Jason J Quinlan, Ahmed H. Zahran and Cormac J. Sreenan (University College Cork, Ireland); Riten Gupta (Meta Platforms, Inc., USA); Abhishek Tiwari (Meta Platforms Inc., USA)

0
Accurate prediction of cellular link performance represents a corner stone for many adaptive applications, such as video streaming. State-of-the-art solutions focus on distributed device-based methods relying on historic throughput and PHY metrics obtained through device APIs. In this paper, we study the impact of centralised solutions that integrate information collected from other network nodes. Specifically, we develop and compare machine learning inference engines for both distributed and centralised approaches to predict the LTE physical resource blocks using ns3-simulation. Our results illustrate that network load represents the most important feature in the centralised approaches resulting in halving the RB prediction error to 14% in comparison to 28% for the distributed case.
Speaker
Speaker biography is not available.

Meta-material Sensors-enabled Internet of Things: Angular Range Extension

Taorui Liu (Peking University, China); Jingzhi Hu (Nanyang Technological University, Singapore); Hongliang Zhang and Lingyang Song (Peking University, China)

0
In the coming 6G communications, the internet of things (IoT) is the core foundation technology for various key areas. According to related studies, the number of IoT sensors deployed in 6G will be approximately 10 times larger than that in 5G. Therefore, IoT sensors in 6G are required to have extremely low cost, low power consumption, and high robustness so that they can effectively sustain massive deployment. However, traditional sensors containing costly and vulnerable fine structures and requiring external power sources can hardly meet the above requirements. Fortunately, meta-material IoT (meta-IoT) sensors are simple in structure, low in cost, and can obtain power supply via wireless signals, showing great potential for application.

However, existing meta-IoT sensing systems are limited to normal or specular reflection, while in practical sensing scenarios such as smart home, intelligent industry, transportation, and agriculture, the receivers are often deployed on movable objects such as mobile phones, intelligent robots, and vehicles. Thus, the position of the receivers relative to the meta-IoT sensor array is generally dynamic within an angular range rather than at a particular angle, which is challenging as all units in existing meta-IoT sensors are assumed to be the same, resulting in an uncontrollable reflection direction. To address this challenge, we propose a design of a meta-IoT sensing system comprising meta-IoT sensors that can support transmitter deployment at any given angle and receiver deployment in an extended angular range.
Speaker
Speaker biography is not available.

MatGAN: Sleep Posture Imaging using Millimeter-Wave Devices

Aakriti Adhikari, Sanjib Sur and Siri Avula (University of South Carolina, USA)

0
This work presents MatGAN, a system that uses millimeter-wave (mmWave) signals to capture high-quality images of a person's body while they sleep, even if they are covered under a blanket. Unlike existing sleep monitoring systems, MatGAN enables fine-grained monitoring and is privacy non-invasive, and can work under obstruction and low-light conditions, critical for sleep monitoring. MatGAN utilizes generative models to generate high-quality images from mmWave reflected signals that accurately represent sleep postures under a blanket. Early results indicate that MatGAN can effectively generate sleep posture images with a median IoU of 0.64.
Speaker Aakriti Adhikari (University of South Carolina)

Aakriti Adhikari is currently pursuing her Ph.D. in the Department of Computer Science and Engineering at the University of South Carolina, Columbia. Her research focuses on wireless systems and ubiquitous sensing, particularly in developing at-home wireless solutions in the healthcare domain using millimeter-wave (mmWave) technology in 5G and beyond devices. Her research has been regularly published in top conferences in these areas, such as IEEE SECON, ACM IMWUT/UBICOMP, HotMobile, and MobiSys. Aakriti has received multiple awards, including student travel grants for conferences like IEEE INFOCOM (2023), ACM HotMobile (2023), and Mobisys (2022). Additionally, she currently has three patents pending.  She has also been invited to participate in the CRA-WP Grad Cohort for Women (2023) and Grace Hopper Celebration (2020, 2021).



Poster Abstract: Performance of Scalable Cell-Free Massive MIMO in Practical Network Topologies

Yunlu Xiao (RWTH Aachen University, Germany); Petri Mähönen (RWTH Aachen University, Germany & Aalto University, Finland); Ljiljana Simić (RWTH Aachen University, Germany)

1
We study the performance of scalable cell-free massive MIMO (CF-mMIMO) in practical urban network topologies in the cities of Frankfurt and Seoul. Our results show that the gains of CF-mMIMO - in terms of the high and uniform network throughput - are limited in practical urban topologies, compared with what is expected from theory for randomly uniformly distributed networks. We show that this is due to the locally non-uniform spatial distributions of access points - characteristic of realistic network topologies, resulting in inferior throughput, especially for the worst-served users in the network.
Speaker Ljiljana Simić; Yunlu Xiao
Dr Ljiljana Simić is currently Principal Scientist at the Institute for Networked Systems at RWTH Aachen University, Germany. She received her BE (Hons.) and PhD degrees in Electrical and Electronic Engineering from The University of Auckland in 2006 and 2011, respectively. Her research interests are in mm-wave networking, efficient spectrum sharing paradigms, cognitive and cooperative communication, self-organizing and distributed networks, and telecommunications policy. She was Co-Chair of the IEEE INFOCOM 2018 Workshop on Millimeter-Wave Networked Systems, Co-Chair of the ACM MobiCom 2019 Workshop on Millimeter-wave Networks and Sensing Systems, and Guest Editor of an IEEE JSAC Special Issue on Millimeter-Wave Networking. She is serving as an Associate Editor of IEEE Networking Letters and Editor of IEEE Transactions on Wireless Communications.

Towards a Network Aware Model of the Time Uncertainty Bound in Precision Time Protocol

Yash Deshpande and Philip Diederich (Technical University of Munich, Germany); Wolfgang Kellerer (Technische Universität München, Germany)

1
Synchronizing the system time between devices by exchanging timestamped messages over the network is a popular method to achieve time-consistency in distributed applications. Accurate time synchronization is essential in applications such as cellular communication, industrial control, and transactional databases. These applications consider the maximum possible time offset or the Time Uncertainty Bound(TUB) in the network while configuring their guard bands and waiting times. Choosing the right value for the TUB poses a fundamental challenge to the system designer - a conservatively high value of the TUB decreases the chances of time-based byzantine faults but increases latency due to larger guard bands and waiting times. The TUB is affected by packet delay variation(PDV) of the time synchronization messages due to congestion from background network traffic. In this work, we use Network Calculus (NC) to derive the relation between network traffic and the TUB for a network built with commercial off-the-shelf (COTS)hardware. For centrally deployed and monitored local area networks (LAN)s such as in cellular networks and datacenters, this relation could be useful for system designers to plug a better-informed value of the TUB.
Speaker
Speaker biography is not available.

L7LB: High Performance Layer-7 Load Balancing on Heterogeneous Programmable Platforms

Xiaoyi Shi, Yifan Li, Chengjun Jia, Xiaohe Hu and Jun Li (Tsinghua University, China)

1
Layer-7 load balancing is an essential pillar in modern enterprise infrastructure. It is inefficient to scale software layer-7 load balancing which requires hundreds of servers to meet the large scale service requirements of 1Tbps throughput and 1M concurrent requests. In this paper, we present L7LB with a novel fast path and slow path co-design architecture running on the heterogeneous programmable server-switch. L7LB is scalable by forwarding most data packets on the Tbps bandwidth switch chip and using CPU to process application connections and efficient by replacing hundreds of servers with one server-switch. The preliminary prototype demonstrates the layer-7 load balancing functionality and shows that L7LB can meet the large scale service requirements.
Speaker
Speaker biography is not available.

Deep Learning enabled Keystroke Eavesdropping Attack over Videoconferencing Platforms

Xueyi Wang, Yifan Liu and Shan Cang Li, S. (Cardiff University, United Kingdom (Great Britain))

1
The COVID-19 pandemic have significantly impacted people by driving people working from home using communication tools such as Zoom, Teams, Slack, \textit{etc}. The users of these communication services have exponentially increased in the past two years, e.g., Teams annual users reached 270 million in 2022 and Zoom averaged 300 million daily active users in videoconferencing platforms. However, using edging artificial intelligence techniques, new cyber attacking tools expose these services to eavesdropping or disruption. This work investigates keystroke eavesdropping attacks on physical keyboards using deep learning techniques to analysis the acoustic emanation of keystroke audios to identify victims' keystrokes. An accurate context-free inferring algorithm was developed that can automatically localise keystrokes during inputs. The experimental results demonstrated that the accuracy of keystroke inference approaches around 90\% over normal laptop keyboards.
Speaker Xueyi Wang
Speaker biography is not available.

Explaining AI-informed Network Intrusion Detection with Counterfactuals

Gang Liu and Jiang Meng (University of Notre Dame, USA)

0
Artificial intelligence (AI) methods have been widely applied for accurate network intrusion detection (NID). However, the developers and users of the NID systems could not understand the systems' correct or incorrect decisions due to the complexity and black-box nature of the AI methods. This is a two-page poster paper that presents a new demo system that offers a number of counterfactual explanations visually for any data example. The visualization results were automatically generated: users just need to provide the index of a data example and do not edit anything on the graph. In the future, we will extend the detection task from binary classification to multi-class classification.
Speaker Jiang Meng
Speaker biography is not available.

Sum Computation Rate Maximization in Self-Sustainable RIS-Assisted MEC

Han Li (Beijing Jiaotong University, China); Ming Liu (Beijing Jiaotong University & Beijing Key Lab of Transportation Data Analysis and Mining, China); Bo Gao and Ke Xiong (Beijing Jiaotong University, China); Pingyi Fan (Tsinghua University, China); Khaled B. Letaief (The Hong Kong University of Science and Technology, Hong Kong)

0
This paper studies a self-sustainable reconfigurable intelligent surface (SRIS)-assisted mobile edge computing (MEC) network, where a SRIS first harvests energy from a hybrid access point (HAP) and then enhances the users' offloading performance with the harvested energy. To improve computing efficiency, a sum computation rate maximization problem is formulated. Based on the alternating optimization (AO) method, an efficient algorithm is proposed to solve the formulated non-convex problem. Simulation results show that when the SRIS is deployed closer to the HAP, a higher performance gain can be achieved.
Speaker
Speaker biography is not available.

Tandem Attack: DDoS Attack on Microservices Auto-scaling Mechanisms

Anat Bremler-Barr (Tel-Aviv University, Israel); Michael Czeizler (Reichman University, Israel)

0
Auto-scaling is a well-known mechanism for adapting systems to dynamic loads of traffic by increasing (scale-up) and decreasing (scale-down) the number of handling resources automatically. As software development shifted to micro-services architecture, large software systems are nowadays composed of many independent micro-services, each responsible for specific tasks. The breakdown to fragmented applications influenced also on the infrastructure side where different services of the same application are given different hardware configurations and scaling properties. Even though created to accelerate software development the micro-services approach also presents a new challenge - as systems grow larger, incoming traffic triggers multiple calls between micro-services to handle each request.
Speaker Michael Czeizler
Speaker biography is not available.


Gold Sponsor


Gold Sponsor


Bronze Sponsor


Student Travel Grants


Student Travel Grants


Local Organizer

Made with in Toronto · Privacy Policy · INFOCOM 2020 · INFOCOM 2021 · INFOCOM 2022 · © 2023 Duetone Corp.