IEEE International Conference on Computer Communications
10-13 May 2021 // Virtual Conference

Accepted Paper List [Main Conference]

List of Accepted Papers in IEEE INFOCOM 2021 Main Conference

  1. 6GAN: IPv6 Multi-Pattern Target Generation via Generative Adversarial Nets with Reinforcement Learning       

Tianyu Cui (Institute of Information Engineering, University of Chinese Academy of Sciences, China); Gaopeng Gou (Institute of Information EngineeringChinese Academy of Sciences, China); Gang Xiong, Chang Liu, Peipei Fu and Zhen Li (Institute of Information Engineering, Chinese Academy of Sciences, China)

  1. 6Hit: A Reinforcement Learning-based Approach to Target Generation for Internet-wide IPv6 Scanning 

Bingnan Hou and Zhiping Cai (National University of Defense Technology, China); Kui Wu (University of Victoria, Canada); Jinshu Su (National University of Defence Technology, China); Yinqiao Xiong (National University of Defense Technology, China)

  1. 802.11ad in Smartphones: Energy Efficiency, Spatial Reuse, and Impact on Applications

Shivang Aggarwal (University at Buffalo, SUNY, USA); Moinak Ghoshal (Universiy at Buffalo, SUNY, NY, Buffalo, USA); Piyali Banerjee (University at Buffalo, USA); Dimitrios Koutsonikolas (University at Buffalo, SUNY, USA); Joerg Widmer (IMDEA Networks Institute, Spain)

  1. A Deep-Learning-based Link Adaptation Design for eMBB/URLLC Multiplexing in 5G NR

Yan Huang, Thomas Hou and Wenjing Lou (Virginia Tech, USA)

  1. A Fast-Convergence Routing of the Hot-Potato        

Jean-Romain Luttringer and Quentin Bramas (University of Strasbourg, France); Cristel Pelsser (University of Strasbourg); Pascal Mérindol (Université de Strasbourg, France)

  1. A Lightweight Integrity Authentication Approach for RFID-enabled Supply Chains 

Xin Xie (Hong Kong Polytechnic University, Hong Kong); Xiulong Liu (Tianjin University, China); Song Guo (Hong Kong Polytechnic University, Hong Kong); Heng Qi (Dalian University of Technology, China); Keqiu Li (Tianjin University, China)

  1. A Measurement-Based Study of the Privacy of Europe's Covid-19 Contact Tracing Apps   

Douglas Leith and Stephen Farrell (Trinity College Dublin, Ireland)

  1. A Sum-of-Ratios Multi-Dimensional-Knapsack Decomposition for DNN Resource Scheduling       

Menglu Yu (Iowa State University, USA); Chuan Wu (The University of Hong Kong, Hong Kong); Bo Ji (Virginia Tech, USA); Jia Liu (The Ohio State University, USA)

  1. A Universal Transcoding and Transmission Method for Livecast with Networked Multi-Agent Reinforcement Learning  

Xingyan Chen and Changqiao Xu (Beijing University of Posts and Telecommunications, China); Mu Wang (State Key Laboratory of Networking and Switching Technology, China); Zhonghui Wu and Shujie Yang (Beijing University of Posts and Telecommunications, China); Lujie Zhong (Capital Normal University, China); Gabriel-Miro Muntean (Dublin City University, Ireland)

  1. A Weak Consensus Algorithm and Its Application to High-Performance Blockchain           

Qin Wang (Swinburne University of Technology & CSIRO Data61, Australia); Rujia Li (University of Birmingham, United Kingdom (Great Britain))

  1. A Worst-Case Approximate Analysis of Peak Age-of-Information Via Robust Queueing Approach

Zhongdong Liu (Virginia Tech, USA); Yu Sang (Temple University, USA); Bin Li (University of Rhode Island, USA); Bo Ji (Virginia Tech, USA)

  1. Accelerating LSH-based Distributed Search with In-network Computation 

Penghao Zhang, Heng Pan and Zhenyu Li (Institute of Computing Technology, Chinese Academy of Sciences, China); Peng He (Institute of Computing Technology Chinese Academy of Sciences, China); Zhibin Zhang (Institute of Computing Technology, Chinese Academy of Sciences, China); Gareth Tyson (Queen Mary, University of London, United Kingdom (Great Britain)); Gaogang Xie (Computer Network Information Center, Chinese Academy of Science, China)

  1. AdaPDP: Adaptive Personalized Differential Privacy

Ben Niu (Institute of Information Engineering, Chinese Academy of Sciences, China); Yahong Chen (Institute of Information Engineering, CAS & School of Cyber Security, UCAS, China); Boyang Wang (University of Cincinnati, USA); Zhibo Wang (Wuhan University, China); Fenghua Li (Institute of Information Engineering, CAS & School of Cyber Security, UCAS, China); Jin Cao (Xidian University, China)

  1. Adaptive Batch Update in TCAM: How Collective Optimization Beats Individual Ones

Ying Wan (Tsinghua University, China); Haoyu Song (Futurewei Technologies, USA); Yang Xu (Fudan University, China); Chuwen Zhang (Tsinghua University, China); Yi Wang (Southern University of Science and Technology, China); Bin Liu (Tsinghua University, China)

  1. Adaptive Clustering-based Malicious Traffic Classification at the Network Edge    

Alec F Diallo (The University of Edinburgh, United Kingdom (Great Britain)); Paul Patras (University of Edinburgh, United Kingdom (Great Britain))

  1. Age of Information in Random Access Networks with Stochastic Arrivals   

Igor Kadota (Columbia University, USA); Eytan Modiano (MIT, USA)

  1. Age-Dependent Distributed MAC for Ultra-Dense Wireless Networks        

Dheeraj Narasimha (Arizona State University, USA); Srinivas G Shakkottai (Texas A&M University, USA); Lei Ying (University of Michigan, USA)

  1. Aion: A Bandwidth Optimized Scheduler with AoI Guarantee         

Qingyu Liu, Chengzhang Li, Thomas Hou and Wenjing Lou (Virginia Tech, USA); Sastry Kompella (Naval Research Laboratory, USA)

  1. AMIS: Edge Computing Based Adaptive Mobile Video Streaming    

Phil K Mu, Jinkai Zheng, Tom H. Luan and Lina Zhu (Xidian University, China); Mianxiong Dong (Muroran Institute of Technology, Japan); Zhou Su (Shanghai University, China)

  1. AMT: Acoustic Multi-target Tracking with Smartphone MIMO System       

Chao Liu, Penghao Wang and Ruobing Jiang (Ocean University of China, China); Yanmin Zhu (Shanghai Jiao Tong University, China)

  1. An Experience Driven Design for IEEE 802.11ac Rate Adaptation based on Reinforcement Learning        

Syuan-Cheng Chen, Chi-Yu Li and Chui-Hao Chiu (National Chiao Tung University, Taiwan)

  1. An Incentive Mechanism for Cross-Silo Federated Learning: A Public Goods Perspective  

Ming Tang and Vincent W.S. Wong (University of British Columbia, Canada)

  1. Analyzing Age of Information in Multiaccess Networks by Fluid Limits       

Zhiyuan Jiang (Shanghai University, China)

  1. Analyzing Learning-Based Networked Systems with Formal Verification    

Arnaud Dethise and Marco Canini (KAUST, Saudi Arabia); Nina Narodytska (VMware Research Group, USA)

  1. Asynchronous Deep Reinforcement Learning for Data-Driven Task Offloading in MEC-Empowered Vehicular Networks

Penglin Dai, Kaiwen Hu, Xiao Wu and Huanlai Xing (Southwest Jiaotong University, China); Zhaofei Yu (Peking University, China)

  1. Attack Resilience of Cache Replacement Policies     

Tian Xie (Pennsylvania State University, USA); Ting He (Penn State University, USA); Patrick McDaniel and Namitha Nambiar (Pennsylvania State University, USA)

  1. Auction-Based Combinatorial Multi-Armed Bandit Mechanisms with Strategic Arms        

Guoju Gao and He Huang (Soochow University, China); Mingjun Xiao (University of Science and Technology of China, China); Jie Wu (Temple University, USA); Yu-e Sun (Soochow University, China); Sheng Zhang (Nanjing University, China)

  1. AutoML for Video Analytics with Edge Computing   

Apostolos Galanopoulos, Jose A. Ayala-Romero and Douglas Leith (Trinity College Dublin, Ireland); George Iosifidis (Delft University of Technology, The Netherlands)

  1. AWash: Handwashing Assistance for the Elderly With Dementia via Wearables    

Yetong Cao, Huijie Chen, Fan Li and Song Yang (Beijing Institute of Technology, China); Yu Wang (Temple University, USA)

  1. Bandit Learning with Predicted Context: Regret Analysis and Selective Context Query

Jianyi Yang and Shaolei Ren (University of California, Riverside, USA)

  1. Bandwidth Isolation Guarantee for SDN Virtual Networks   

Gyeongsik Yang, Yeonho Yoo and Minkoo Kang (Korea University, Korea (South)); Heesang Jin (ETRI, Korea (South)); Chuck Yoo (Korea University, Korea (South))

  1. Bayesian Online Learning for Energy-Aware Resource Orchestration in Virtualized RANs  

Jose A. Ayala-Romero (Trinity College Dublin, Ireland); Andres Garcia-Saavedra (NEC Labs Europe, Germany); Xavier Costa-Perez (NEC Laboratories Europe, Germany); George Iosifidis (Delft University of Technology, The Netherlands)

  1. Beyond Value Perturbation: Local Differential Privacy in the Temporal Setting

Qingqing Ye (The Hong Kong Polytechnic University, Hong Kong); Haibo Hu (Hong Kong Polytechnic University, Hong Kong); Ninghui Li (Purdue University, USA); Meng Xiaofeng (Renmin University of China, USA); Huadi Zheng and Haotian Yan (The Hong Kong Polytechnic University, Hong Kong)

  1. Bipartite Graph Matching Based Secret Key Generation      

Hongbo Liu (University of Electronic Science and Technology of China, China); Yan Wang (Temple University, USA); Yanzhi Ren (University of Electronic Science and Technology of China, China); Yingying Chen (Rutgers University, USA)

  1. BlendVLC: A Cell-free VLC Network Architecture Empowered by Beamspot Blending

Jona Beysens (KU Leuven, Belgium); Qing Wang (Delft University of Technology, The Netherlands); Maxim Van den Abeele and Sofie Pollin (KU Leuven, Belgium)

  1. BLESS: BLE-aided Swift Wi-Fi Scanning in Multi-protocol IoT Networks       

Wonbin Park (SNU, Korea (South)); Dokyun Ryoo (Seoul National University, Korea (South)); Changhee Joo (Korea University, Korea (South)); Saewoong Bahk (Seoul National University, Korea (South))

  1. Blind Optimal User Association in Small-Cell Networks        

Livia E. Chatzieleftheriou (Athens University of Economics and Business, Greece); Apostolos Destounis (Huawei Technologies France Research Center, France); Georgios Paschos (Amazon, Luxembourg); Iordanis Koutsopoulos (Athens University of Economics and Business, Greece)

  1. Bound Inference and Reinforcement Learning-based Path Construction in Bandwidth Tomography        

Cuiying Feng, Jianwei An and Kui Wu (University of Victoria, Canada); Jianping Wang (City University of Hong Kong, Hong Kong)

  1. Bringing Fairness to Actor-Critic Reinforcement Learning for Network Utility Optimization          

Jingdi Chen and Yimeng Wang (The George Washington University, USA); Tian Lan (George Washington University, USA)

  1. Camel: Context-Aware Magnetic MIMO Wireless Power Transfer with In-band Communication  

Hao Zhou, Zhao Chen, Wangqiu Zhou, Haisheng Tan, Panlong Yang and Xiang-Yang Li (University of Science and Technology of China, China)

  1. Can You Fix My Neural Network? Real-Time Adaptive Waveform Synthesis for Resilient Wireless Signal Classification   

Salvatore D'Oro, Francesco Restuccia and Tommaso Melodia (Northeastern University, USA)

  1. CanalScan: Tongue-Jaw Movement Recognition via Ear Canal Deformation Sensing         

Yetong Cao, Huijie Chen and Fan Li (Beijing Institute of Technology, China); Yu Wang (Temple University, USA)

  1. Characterizing Ethereum's Mining Power Decentralization at a Deeper Level        

Liyi Zeng (Tsinghua University, China); Yang Chen (Microsoft Research Asia, China); Shuo Chen (Microsoft Research, USA); Xian Zhang and Zhongxin Guo (Microsoft Research Asia, China); Wei Xu (Tsinghua University, China); Thomas Moscibroda (Microsoft Research, USA)

  1. Cocktail Edge Caching: Ride Dynamic Trends of Content Popularity with Ensemble Learning        

Tongyu Zong, Chen Li, Yuanyuan Lei and Guangyu Li (New York University, USA); Houwei Cao (New York Institute of Technology, USA); Yong Liu (New York University, USA)

  1. Code is the (F)Law: Demystifying and Mitigating Blockchain Inconsistency Attacks Caused by Software Bugs      

Guorui Yu (Peking University, China); Shibin Zhao (State Key Laboratory of Mathematical Engineering and Advanced Computing, China); Chao Zhang (Institute for Network Sciences and Cyberspace, Tsinghua University, China); Zhiniang Peng (Qihoo 360 Core Security, China); Yuandong Ni (Institute for Network Science and Cyberspace of Tsinghua University, China); Xinhui Han (Peking University, China)

  1. Coexistence of Wi-Fi 6E and 5G NR-U: Can We Do Better in the 6 GHz Bands?       

Gaurang Naik and Jung-Min (Jerry) Park (Virginia Tech, USA)

  1. Combining Regularization with Look-Ahead for Competitive Online Convex Optimization

Ming Shi and Xiaojun Lin (Purdue University, USA); Lei Jiao (University of Oregon, USA)

  1. Comparison of Decentralized and Centralized Update Paradigms for Remote Tracking of Distributed Dynamic Sources 

Sunjung Kang and Atilla Eryilmaz (The Ohio State University, USA); Changhee Joo (Korea University, Korea (South))

  1. Competing Epidemics on Graphs - Global Convergence and Coexistence   

Vishwaraj Doshi, Shailaja Mallick and Do Young Eun (North Carolina State University, USA)

  1. Context-aware Website Fingerprinting over Encrypted Proxies       

Xiaobo Ma, Mawei Shi, Bingyu An and Jianfeng Li (Xi'an Jiaotong University, China); Daniel Xiapu Luo (The Hong Kong Polytechnic University, Hong Kong); Junjie Zhang (Wright State University, USA); Xiaohong Guan (Xi’an Jiaotong University & Tsinghua University, China)

  1. Cost-Driven Data Caching in the Cloud: An Algorithmic Approach   

Yang Wang (Shenzhen Institute of Advanced Technology, China); Yong Zhang (SIAT, CAS, China); Xinxin Han and Pengfei Wang (Shenzhen Institutes of Advanced Technology, China); Cheng-Zhong Xu (University of Macau, China); Joseph Horton (University of New Brunswick, Canada); Joseph Culberson (University of Alberta, Canada)

  1. Cost-Effective Federated Learning Design    

Bing Luo (Shenzhen Institute of Artificial Intelligence and Robotics for Society & The Chinese University of Hong Kong, Shenzhen, China); Xiang Li (The Chinese University of Hong Kong, Shenzhen, China); Shiqiang Wang (IBM T. J. Watson Research Center, USA); Jianwei Huang (The Chinese University of Hong Kong, Shenzhen, China); Leandros Tassiulas (Yale University, USA)

  1. Counter-Collusion Smart Contracts for Watchtowers in Payment Channel Networks        

Yuhui Zhang and Dejun Yang (Colorado School of Mines, USA); Guoliang Xue (Arizona State University, USA); Ruozhou Yu (North Carolina State University, USA)

  1. Crowdsourcing System for Numerical Tasks based on Latent Topic Aware Worker Reliability       

Zhuan Shi, Shanyang Jiang and Lan Zhang (University of Science and Technology of China, China); Yang Du (Soochow University, China); Xiang-Yang Li (University of Science and Technology of China, China)

  1. CryptoEyes: Privacy Preserving Classification over Encrypted Images         

Wenbo He, Shusheng Li and Wenbo Wang (McMaster University, Canada); Muheng Wei and Bohua Qiu (ZhenDui Industry Artificial Intelligence Co, Ltd, China)

  1. CTF: Anomaly Detection in High-Dimensional Time Series with Coarse-to-Fine Model Transfer    

Ming Sun and Ya Su (Tsinghua University, China); Shenglin Zhang (Nankai University, China); Junliang Tang (ByteDance, China); Yuanpu Cao and Yuqing Liu (Nankai University, China); Wenfei Wu and Dan Pei (Tsinghua University, China); Yongsu Zhang and Xiaozhou Liu (ByteDance, China)

  1. DC2: Delay-aware Compression Control for Distributed Machine Learning

Ahmed M. Abdelmoniem and Marco Canini (KAUST, Saudi Arabia)

  1. De-anonymizing Social Networks Under Partial Overlap: An F-score Based Approach       

Jiapeng Zhang and Luoyi Fu (Shanghai Jiao Tong University, China); Xinbing Wang (Shanghai Jiaotong University, China); Guihai Chen (Shanghai Jiao Tong University, China)

  1. DeepLoRa: Learning Accurate Path Loss Model for Long Distance Links in LPWAN

Li Liu, Yuguang Yao, Zhichao Cao and Mi Zhang (Michigan State University, USA)

  1. DeepReserve: Dynamic Edge Server Reservation for Connected Vehicles with Deep Reinforcement Learning     

Jiawei Zhang, Suhong Chen and Xudong Wang (Shanghai Jiao Tong University, China); Yifei Zhu (Simon Fraser University, Canada)

  1. DeepSense: Fast Wideband Spectrum Sensing Through Real-Time In-the-Loop Deep Learning     

Daniel Uvaydov, Salvatore D'Oro, Francesco Restuccia and Tommaso Melodia (Northeastern University, USA)

  1. Delay-Tolerant Constrained OCO with Application to Network Resource Allocation

Juncheng Wang and Ben Liang (University of Toronto, Canada); Min Dong (Ontario Tech University, Canada); Gary Boudreau and Hatem Abou-zeid (Ericsson, Canada)

  1. Detecting Localized Adversarial Examples: A Generic Approach using Critical Region Analysis      

Fengting Li, Xuankai Liu, XiaoLi Zhang and Qi Li (Tsinghua University, China); Kun Sun (George Mason University, USA); Kang Li (University of Georgia, USA)

  1. Device Sampling for Heterogeneous Federated Learning: Theory, Algorithms, and Implementation        

Su Wang (Purdue University, USA); Mengyuan Lee (Zhejiang University, China); Seyyedali Hosseinalipour (Purdue University, USA); Roberto Morabito (Ericsson Research & Princeton University, Finland); Mung Chiang (Purdue University, USA); Christopher G. Brinton (Purdue University & Zoomi Inc., USA)

  1. Distributed Neighbor Distribution Estimation with Adaptive Compressive Sensing in VANETs      

Yunxiang Cai, Hongzi Zhu and Xiao Wang (Shanghai Jiao Tong University, China); Shan Chang (Donghua University, China); Jiangang Shen and Minyi Guo (Shanghai Jiao Tong University, China)

  1. Distributed RPKI to Prevent IP prefix Takedowns     

Kris Shrishak (Technische Universität Darmstadt, Germany); Haya Shulman (Fraunhofer SIT, Germany)

  1. Distributed Threshold-based Offloading for Large-Scale Mobile Cloud Computing

Xudong Qin and Bin Li (University of Rhode Island, USA); Lei Ying (University of Michigan, USA)

  1. DRL-OR: Deep Reinforcement Learning-based Online Routing for Multi-type Service Requirements        

Chenyi Liu, Mingwei Xu, Yuan Yang and Nan Geng (Tsinghua University, China)

  1. Dual Attention-Based Federated Learning for Wireless Traffic Prediction   

Chuanting Zhang and Shuping Dang (King Abdullah University of Science and Technology, Saudi Arabia); Basem Shihada (KAUST, Saudi Arabia); Mohamed-Slim Alouini (King Abdullah University of Science and Technology (KAUST), Saudi Arabia)

  1. DyLoc: Dynamic Localization for Massive MIMO Using Predictive Recurrent Neural Networks     

Farzam Hejazi, Katarina Vuckovic and Nazanin Rahnavard (University of Central Florida, USA)

  1. Dynamically Choosing the Candidate Algorithm with Ostasos in Online Optimization       

Weirong Chen, Jiaqi Zheng and Haoyu Yu (Nanjing University, China)

  1. ECLAT: An ECN Marking System for Latency Guarantee in Cellular Networks         

Junseon Kim (Ulsan National Institute of Science and Technology (UNIST), Korea (South)); Youngbin Im (Ulsan National Institute of Science and Technology, Korea (South)); Kyunghan Lee (Seoul National University, Korea (South))

  1. Edge-assisted Online On-device Object Detection for Real-time Video Analytics    

Mengxi Hanyao, Yibo Jin, Zhuzhong Qian, Sheng Zhang and Sanglu Lu (Nanjing University, China)

  1. EdgeDuet: Tiling Small Object Detection for Edge Assisted Autonomous Mobile Vision     

Xu Wang, Zheng Yang, Jiahang Wu and Yi Zhao (Tsinghua University, China); Zimu Zhou (Singapore Management University, Singapore)

  1. EdgeSharing: Edge Assisted Real-time Localization and Object Sharing in Urban Streets   

Luyang Liu (Google Research, USA); Marco Gruteser (WINLAB / Rutgers University, USA)

  1. Efficient and Verifiable Proof of Replication with Fast Fault Localization    

Haoran Yuan and Xiaofeng Chen (Xidian University, China); Guowen Xu (University of Electronic Science and Technology of China, China); Jianting Ning (Singapore Management University, China); Joseph Liu (Monash University, Australia); Robert Deng (Singapore Management University, Singapore)

  1. Efficient Association of Wi-Fi Probe Requests under MAC Address Randomization

Jiajie Tan and S.-H. Gary Chan (The Hong Kong University of Science and Technology, China)

  1. Efficient Learning-based Scheduling for Information Freshness in Wireless Networks

Bin Li (University of Rhode Island, USA)

  1. Enabling Edge-Cloud Video Analytics for Robotic Applications        

Yiding Wang and Weiyan Wang (Hong Kong University of Science and Technology, Hong Kong); Duowen Liu (Hong Kong University of Science & Technology, Hong Kong); Xin Jin (Johns Hopkins University, USA); Junchen Jiang (University of Chicago, USA); Kai Chen (Hong Kong University of Science and Technology, China)

  1. Energy-Efficient Orchestration of Metro-Scale 5G Radio Access Networks 

Rajkarn Singh (University of Edinburgh, United Kingdom (Great Britain)); Cengis Hasan (University of Luxembourg & Interdisciplinary Centre for Security, Reliability and Trust (SNT), Luxembourg); Xenofon Foukas (Microsoft Research, United Kingdom (Great Britain)); Marco Fiore (IMDEA Networks Institute, Spain); Mahesh K Marina (The University of Edinburgh, United Kingdom (Great Britain)); Yue Wang (Samsung Electronics, USA)

  1. Enhanced Flooding-Based Routing Protocol for Swarm UAV Networks: Random Network Coding Meets Clustering       

Hao Song, Lingjia Liu and Bodong Shang (Virginia Tech, USA); Scott M Pudlewski (Georgia Tech Research Institute, USA); Elizabeth Serena Bentley (AFRL, USA)

  1. Expectile Tensor Completion to Recover Skewed Network Monitoring Data          

Kun Xie and Siqi Li (Hunan University, China); Xin Wang (Stony Brook University, USA); Gaogang Xie (Institute of Computing Technology, Chinese Academy of Sciences, China); Yudian Ouyang (Hunan University, China)

  1. Experimental UAV Data Traffic Modeling and Network Performance Analysis       

Aygün Baltaci (Airbus & Technical University of Munich, Germany); Markus Klügel, Fabien Geyer and Svetoslav Duhovnikov (Airbus, Germany); Vaibhav Bajpai and Jörg Ott (Technische Universität München, Germany); Dominic A. Schupke (Airbus, Germany)

  1. Exploiting Simultaneous Communications to Accelerate Data Parallel Distributed Deep Learning

Shaohuai Shi (The Hong Kong University of Science and Technology, Hong Kong); Xiaowen Chu (Hong Kong Baptist University, Hong Kong); Bo Li (Hong Kong University of Science and Technology, Hong Kong)

  1. Exploring Layered Container Structure for Cost Efficient Microservice Deployment          

Lin Gu (Huazhong University of Science and Technology, China); Deze Zeng (China University of Geosciences, China); Jie Hu and Hai Jin (Huazhong University of Science and Technology, China); Song Guo (Hong Kong Polytechnic University, Hong Kong); Albert Zomaya (The University of Sydney, Australia)

  1. Failure Localization through Progressive Network Tomography      

Viviana Arrigoni (Sapienza, University of Rome, Italy); Novella Bartolini (Sapienza University of Rome, Italy); Annalisa Massini (Sapienza Università di Roma, Italy); Federico Trombetti (Sapienza, University of Rome, Italy)

  1. FAIR: Quality-Aware Federated Learning with Precise User Incentive and Model Aggregation      

Yongheng Deng (Tsinghua University, China); Feng Lyu and Ju Ren (Central South University, China); Yi-Chao Chen (Shanghai Jiao Tong University, China); Peng Yang (Huazhong University of Science and Technology, China); Yuezhi Zhou and Yaoxue Zhang (Tsinghua University, China)

  1. Fault-Tolerant Energy Management for Real-Time Systems with Weakly Hard QoS Assurance     

Linwei Niu (Howard University, USA)

  1. Federated Learning over Wireless Networks: A Band-limited Coordinated Descent Approach      

Junshan Zhang (Arizona State University, USA); Na Li (Harvard University, USA); Mehmet Dedeoglu (Arizona State University, USA)

  1. FedSens: A Federated Learning Approach for Smart Health Sensing with Class Imbalance in Resource Constrained Edge Computing    

Daniel Zhang, Ziyi Kou and Dong Wang (University of Notre Dame, USA)

  1. FedServing: A Federated Prediction Serving Framework Based on Incentive Mechanism  

Jia Si Weng, Jian Weng and Hongwei Huang (Jinan University, China); Chengjun Cai and Cong Wang (City University of Hong Kong, Hong Kong)

  1. Finding Critical Files from a Packet    

JunNyung Hur, Hahoon Jeon, Hyeon gy Shon, Young Jae Kim and MyungKeun Yoon (Kookmin University, Korea (South))

  1. First-Order Efficient General-Purpose Clean-label Data Poisoning  

Tianhang Zheng and Baochun Li (University of Toronto, Canada)

  1. Fix with P6: Verifying Programmable Switches at Runtime  

Apoorv Shukla (Huawei Munich Research Center, Germany); Kevin Hudemann (SAP, Germany); Zsolt Vági (SWISSCOM, Switzerland); Lily Hügerich (TU Berlin, Germany); Georgios Smaragdakis (TU Berlin and Max Planck Institute for Informatics, Germany); Artur Hecker (Huawei, Germany); Stefan Schmid (University of Vienna, Austria); Anja Feldmann (Max Planck Institute for Informatics & Saarland Informatics Campus / TU Berlin, Germany)

  1. Flow Algebra: Towards an Efficient, Unifying Framework for Network Management Tasks           

Christopher Leet, Robert Soulé and Y. Richard Yang (Yale University, USA); Ying Zhang (Facebook, USA)

  1. Fresh Caching for Dynamic Content  

Bahman Abolhassani (The Ohio State University, USA); John Tadrous (Gonzaga University, USA); Atilla Eryilmaz (The Ohio State University, USA); Edmund Yeh (Northeastern University, USA)

  1. Going the Extra Mile with Disaster-Aware Network Augmentation 

Jorik Oostenbrink (TU Delft, The Netherlands); Fernando A. Kuipers (Delft University of Technology, The Netherlands)

  1. GOLDIE: Harmonization and Orchestration Towards a Global Directory for IoT      

Luoyao Hao and Henning Schulzrinne (Columbia University, USA)

  1. GPU-Ether: GPU-native packet I/O for GPU applications on commodity Ethernet

Changue Jung, Suhwan Kim, Ikjun Yeom and Honguk Woo (Sungkyunkwan University, Korea (South)); Younghoon Kim (SungKyunKwan University, Korea (South))

  1. GRADES: Gradient Descent for Similarity Caching    

Anirudh Sabnis (University of Massachusetts Amherst, USA); Tareq Si Salem and Giovanni Neglia (Inria, France); Michele Garetto (Università di Torino, Italy); Emilio Leonardi (Politecnico di Torino, Italy); Ramesh K Sitaraman (University of Massachusetts, Amherst & Akamai Technologies, USA)

  1. Grafting Arborescences for Extra Resilience of Fast Rerouting Schemes     

Klaus-Tycho Foerster (University of Vienna, Austria); Andrzej Kamisiński (AGH University of Science and Technology, Poland); Yvonne-Anne Pignolet (DFINITY, Switzerland); Stefan Schmid (University of Vienna, Austria); Gilles Tredan (LAAS-CNRS, France)

  1. HAVS: Hardware-accelerated Shared-memory-based VPP Network Stack  

Shujun Zhuang and Jian Zhao (ShangHaiJiaoTong University, China); Jian Li (Shanghai Jiao Tong University, China); Ping Yu and Yuwei Zhang (Intel, China); Haibing Guan (Shanghai Jiao Tong University, China)

  1. HearFit: Fitness Monitoring on Smart Speakers via Active Acoustic Sensing

Yadong Xie, Fan Li and Yue Wu (Beijing Institute of Technology, China); Yu Wang (Temple University, USA)

  1. Heuristic Algorithms for Co-scheduling of Edge Analytics and Routes for UAV Fleet Missions       

Aakash Khochare and Yogesh Simmhan (Indian Institute of Science, India); Francesco Betti Sorbelli (Missouri Science and Technology, USA); Sajal K. Das (Missouri University of Science and Technology, USA)

  1. INCdeep: Intelligent Network Coding with Deep Reinforcement Learning  

Qi Wang (Institute of Computing Technology, Chinese Academy of Sciences, China); Jianmin Liu (Institute of Computing Technology Chinese Academy of Sciences, China); Katia Jaffrès-Runser (University of Toulouse - Toulouse INP & IRIT Laboratory, France); Yongqing Wang, ChenTao He, Cunzhuang Liu and Yongjun Xu (Institute of Computing Technology, Chinese Academy of Sciences, China)

  1. Incentive Mechanism Design for Distributed Coded Machine Learning

Ningning Ding (The Chinese University of Hong Kong, Hong Kong); Zhixuan Fang (Tsinghua University, China); Lingjie Duan (Singapore University of Technology and Design (SUTD), Singapore); Jianwei Huang (The Chinese University of Hong Kong, Shenzhen, China)

  1. Individual Load Forecasting for Multi-Customers with Distribution-aware Temporal Pooling        

Eunju Yang and Chan-Hyun Youn (Korea Advanced Institute of Science and Technology, Korea (South))

  1. INT-label: Lightweight In-band Network-Wide Telemetry via Interval-based Distributed Labelling

Enge Song, Tian Pan and Chenhao Jia (Beijing University of Posts and Telecommunications, China); Wendi Cao (Peking University, China); Jiao Zhang, Tao Huang and Yunjie Liu (Beijing University of Posts and Telecommunications, China)

  1. Invisible Poison: A Blackbox Clean Label Backdoor Attack to Deep Neural Networks         

Rui Ning, Jiang Li, ChunSheng Xin and Hongyi Wu (Old Dominion University, USA)

  1. ITE: A Structural Entropy Based Approach for Source Detection     

Chong Zhang, Qiang Guo, Luoyi Fu and Xiaoying Gan (Shanghai Jiao Tong University, China); Xinbing Wang (Shanghai Jiaotong University, China)

  1. Jamming of LoRa PHY and Countermeasure 

Ningning Hou (The Hong Kong Polytechnique University, Hong Kong); Xianjin Xia and Yuanqing Zheng (The Hong Kong Polytechnic University, Hong Kong)

  1. Jellyfish: Locality-sensitive Subflow Sketching          

Yongquan Fu (National University of Defense Technology, China); Lun An (Beijing University of Posts and Telecommunications, China); Siqi Shen (Xiamen University, China); Kai Chen (Hong Kong University of Science and Technology, China); Pere Barlet-Ros (Universitat Politècnica de Catalunya, Spain)

  1. Joint Age of Information and Self Risk Assessment for Safer 802.11p based V2V Networks           

Biplav Choudhury (Virginia Tech, USA); Vijay K. Shah (Virginia Tech & Wireless@VT Lab, USA); Avik Dayal and Jeffrey Reed (Virginia Tech, USA)

  1. Joint Cache Size Scaling and Replacement Adaptation for Small Content Providers

Jiahui Ye, Zichun Li, Zhi Wang and Zhuobin Zheng (Tsinghua University, China); Han Hu (Beijing Institute of Technology, China); Wenwu Zhu (Tsinghua University, China)

  1. Launching Smart Selective Jamming Attacks in WirelessHART Networks    

Xia Cheng, Junyang Shi and Mo Sha (State University of New York at Binghamton, USA); Linke Guo (Clemson University, USA)

  1. Layer Aware Microservice Placement and Request Scheduling at the Edge

Lin Gu (Huazhong University of Science and Technology, China); Deze Zeng (China University of Geosciences, China); Jie Hu (Huazhong University of Science and Technology, China); Bo Li (Hong Kong University of Science and Technology, Hong Kong); Hai Jin (Huazhong University of Science and Technology, China)

  1. Learning for Learning: Predictive Online Control of Federated Learning with Edge Provisioning   

Yibo Jin (Nanjing University, China); Lei Jiao (University of Oregon, USA); Zhuzhong Qian, Sheng Zhang and Sanglu Lu (Nanjing University, China)

  1. Learning the unknown: Improving modulation classification performance in unseen scenarios    

Erma Perenda and Sreeraj Rajendran (KU Leuven, Belgium); Gérôme Bovet (Armasuisse, Switzerland); Sofie Pollin (KU Leuven, Belgium); Mariya Zheleva (UAlbany SUNY, USA)

  1. Learning-Driven Decentralized Machine Learning in Resource-Constrained Wireless Edge Computing     

Zeyu Meng, Hongli Xu and Min Chen (University of Science and Technology of China, China); Yang Xu (University of Science and Technology of China & School of Computer Science and Technology, China); Yangming Zhao and Chunming Qiao (University at Buffalo, USA)

  1. Let's Share VMs: Optimal Placement and Pricing across Base Stations in MEC Systems     

Marie Siew (SUTD, Singapore); Kun Guo (Singapore University of Technology and Design, Singapore); Desmond Cai (Institute of High Performance Computing, Singapore); Lingxiang Li (University of Electronic Science and Technology of China, China); Tony Q. S. Quek (Singapore University of Technology and Design, Singapore)

  1. Leveraging Domain Knowledge for Robust Deep Reinforcement Learning in Networking  

Ying Zheng, Haoyu Chen, Qingyang Duan and Lixiang Lin (Fudan University, China); Yiyang Shao and Wei Wang (Huawei, China); Xin Wang and Yuedong Xu (Fudan University, China)

  1. Leveraging Public-Private Blockchain Interoperability for Closed Consortium Interfacing  

Bishakh Chandra Ghosh and Tanay Bhartia (Indian Institute of Technology Kharagpur, India); Sourav Kanti Addya (National Institute of Technology Karnataka, India); Sandip Chakraborty (Indian Institute of Technology Kharagpur, India)

  1. Leveraging Website Popularity Differences to Identify Performance Anomalies    

Giulio Grassi (INRIA, France); Renata Teixeira (Inria, France); Chadi Barakat (Université Côte d'Azur, Inria, France); Mark Crovella (Boston University, USA)

  1. Lifesaving with RescueChain: Energy-Efficient and Partition-Tolerant Blockchain Based Secure Information Sharing for UAV-Aided Disaster Rescue         

Yuntao Wang (Xi'an Jiaotong University, China); Zhou Su and Qichao Xu (Shanghai University, China); Ruidong Li (National Institute of Information and Communications Technology (NICT), Japan); Hao Luan (Xidian University, China)

  1. Live Gradient Compensation for Evading Stragglers in Distributed Learning           

Jian Xu (Tsinghua University, China); Shao-Lun Huang (Tsinghua-Berkeley Shenzhen Institute, China); Linqi Song (City University of Hong Kong, Hong Kong); Tian Lan (George Washington University, USA)

  1. LiveMap: Real-Time Dynamic Map in Automotive Edge Computing

Qiang Liu (The University of North Carolina at Charlotte, USA); Tao Han and Linda Jiang Xie (University of North Carolina at Charlotte, USA); BaekGyu Kim (Toyota InfoTechnology Center, USA)

  1. LoFi: Enabling 2.4GHz LoRa and WiFi Coexistence by Detecting Extremely Weak Signals   

Gonglong Chen, Wei Dong and Jiamei Lv (Zhejiang University, China)

  1. Looking for the Maximum Independent Set: A New Perspective on the Stable Path Problem       

Yichao Cheng and Ning Luo (Yale University, USA); Jingxuan Zhang (Tongji University, China); Timos Antonopoulos, Ruzica Piskac and Qiao Xiang (Yale University, USA)

  1. Low Cost Sparse Network Monitoring Based on Block Matrix Completion  

Kun Xie and Jiazheng Tian (Hunan University, China); Gaogang Xie (Institute of Computing Technology, Chinese Academy of Sciences, China); Guangxing Zhang (Institute of Computing Technology Chinese Academy of Sciences, China); Dafang Zhang (Hunan University, China)

  1. Low Sample and Communication Complexities in Decentralized Learning: A Triple Hybrid Approach       

Xin Zhang (Iowa State University, USA); Jia Liu (The Ohio State University, USA); Zhengyuan Zhu (Iowa State University, USA); Elizabeth Serena Bentley (AFRL, USA)

  1. Low-Power Downlink for the Internet of Things using IEEE 802.11-compliant Wake-Up Receivers

Johannes Blobel (TU Berlin, Germany); Vu Tran (SMU, Singapore); Archan Misra (Singapore Management University, Singapore); Falko Dressler (TU Berlin, Germany)

  1. Making Multi-String Pattern Matching Scalable and Cost-Efficient with Programmable Switching ASICs  

Shicheng Wang, Menghao Zhang, Guanyu Li, Chang Liu and Ying Liu (Tsinghua University, China); Xuya Jia (Huawei Technologies Co. Ltd., China); Mingwei Xu (Tsinghua University, China)

  1. MANDA: On Adversarial Example Detection for Network Intrusion Detection System       

Ning Wang (Virginia Tech, USA); Yimin Chen (Virginia Polytechnic Institute and State University, USA); Yang Hu (Virgina Tech, USA); Wenjing Lou and Thomas Hou (Virginia Tech, USA)

  1. Maximizing the Benefit of RDMA at End Hosts         

Xiaoliang Wang (Nanjing University, China); Hexiang Song (NJU, China); Cam-Tu Nguyen (Nanjing University, Vietnam); Dongxu Cheng and Tiancheng Jin (NJU, China)

  1. mCore: Achieving Sub-millisecond Scheduling for 5G MU-MIMO Systems 

Yongce Chen, Yubo Wu, Thomas Hou and Wenjing Lou (Virginia Tech, USA)

  1. Medley: Predicting Social Trust in Time-Varying Online Social Networks    

Wanyu Lin and Baochun Li (University of Toronto, Canada)

  1. MIERank: Co-ranking Individuals and Communities with Multiple Interactions in Evolving Networks       

Shan Qu (Shanghai Jiaotong University, China); Luoyi Fu (Shanghai Jiao Tong University, China); Xinbing Wang (Shanghai Jiaotong University, China)

  1. Minimizing Entropy for Crowdsourcing with Combinatorial Multi-Armed Bandit   

Yiwen Song and Haiming Jin (Shanghai Jiao Tong University, China)

  1. Minimizing the Number of Deployed UAVs for Delay-bounded Data Collection of IoT Devices      

Junqi Zhang, Zheng Li, Wenzheng Xu and Jian Peng (Sichuan University, China); Weifa Liang (The Australian National University, Australia); Zichuan Xu (Dalian University of Technology, China); Xiaojiang Ren (Xidian University, China); Xiaohua Jia (City University of Hong Kong, Hong Kong)

  1. Minimizing the Sum of Age of Information and Transmission Cost under Stochastic Arrival Model           

Kumar Saurav (Tata Institute of Fundamental Research, India); Rahul Vaze (TIFR Mumbai, India)

  1. Mobile Crowdsensing for Data Freshness: A Deep Reinforcement Learning Approach      

Zipeng Dai, Hao Wang, Chi Harold Liu and Rui Han (Beijing Institute of Technology, China); Jian Tang (Syracuse University, USA); Guoren Wang (Northeastern University, China)

  1. Mobility- and Load-Adaptive Controller Placement and Assignment in LEO Satellite Networks     

Long Chen, Feilong Tang and Xu Li (Shanghai Jiao Tong University, China)

  1. Modeling Communication Reliability in LoRa Networks with Device-level Accuracy          

Verónica Toro-Betancur and Gopika Premsankar (Aalto University, Finland); Mariusz Slabicki (Institute of Theoretical and Applied Informatics, Polish Academy of Sciences, Poland); Mario Di Francesco (Aalto University, Finland)

  1. Modeling the Cost of Flexibility in Communication Networks         

Alberto Martínez Alba (Technische Universität München, Germany); Péter Babarczi (Budapest University of Technology and Economics, Hungary & Technische Universität München, Germany); Andreas Blenk and Mu He (Technische Universität München, Germany); Patrick Kalmbach (Technical University of Munich, Germany); Johannes Zerwas and Wolfgang Kellerer (Technische Universität München, Germany)

  1. Monitoring Cloud Service Unreachability at Scale    

Kapil Agrawal (Microsoft Research, India); Viral Mehta (Google, India); Sundararajan Renganathan (Stanford, USA); Sreangsu Acharyya (Microsoft Research, India); Liting Zhao (Microsoft, China); Chakri Kotipalli (Microsoft, USA); Venkata N. Padmanabhan (Microsoft Research, USA)

  1. Motion-Prediction-based Wireless Scheduling for Multi-User Panoramic Video Streaming           

Jiangong Chen, Xudong Qin and Guangyu Zhu (University of Rhode Island, USA); Bo Ji (Virginia Tech, USA); Bin Li (University of Rhode Island, USA)

  1. MTP: Avoiding Control Plane Overload with Measurement Task Placement           

Xiang Chen (Peking University, Pengcheng Lab, and Fuzhou University, China); Qun Huang (Peking University, China); Wang Peiqiao (Fuzhou China, China); Hongyan Liu (Zhejiang University, China); Yuxin Chen (University of Science and Technology of China, China); Dong Zhang (Fuzhou University, China); Haifeng Zhou (Zhejiang University, and Zhejiang Lab, China); Chunming Wu (Zhejiang Lab, and Zhejiang University, China)

  1. Multi-Agent Reinforcement Learning for Urban Crowd Sensing with For-Hire Vehicles     

Rong Ding (Shanghai Jiao TongUniversity, China); Zhaoxing Yang, Yifei Wei and Haiming Jin (Shanghai Jiao Tong University, China); Xinbing Wang (Shanghai Jiaotong University, China)

  1. Multicast Communications with Varying Bandwidth Constraints    

Yuval Emek and Shay Kutten (Technion, Israel); Mordechai Shalom (Tel-Hai College & Technion, Israel); Shmuel Zaks (Technion, Israel)

  1. Multi-Robot Path Planning for Mobile Sensing through Deep Reinforcement Learning     

Yongyong Wei and Rong Zheng (McMaster University, Canada)

  1. Near Optimal and Dynamic Mechanisms Towards a Stable NFV Market in Multi-Tier Cloud Networks     

Zichuan Xu and Haozhe Ren (Dalian University of Technology, China); Weifa Liang (The Australian National University, Australia); Qiufen Xia (Dalian University of Technology, China); Wanlei Zhou (University of Technology Sydney, Australia); Guowei WU (Dalian University of Technology, China); Pan Zhou (Huazhong University of Science and Technology, China)

  1. Near-Optimal Topology-adaptive Parameter Synchronization in Distributed DNN Training           

Zhe Zhang and Chuan Wu (The University of Hong Kong, Hong Kong); Zongpeng Li (Wuhan University & University of Calgary, China)

  1. NetMARKS: Network Metrics-AwaRe Kubernetes Scheduler Powered by Service Mesh    

Łukasz Wojciechowski (Samsung R&D Institute Poland, Poland); Krzysztof Opasiak and Jakub Latusek (Warsaw University of Technology & Samsung R&D Institute Poland, Poland); Maciej Wereski (Samsung R&D Institute Poland, Poland); Victor Morales (Samsung Research America, USA); Taewan Kim (Samsung Research, Samsung Electronics Co., Ltd., Korea (South)); Moonki Hong (Samsung Electronics, Co., Ltd., Korea (South))

  1. NFD: A Development Framework for Cross-Platform Network Functions   

Hongyi Huang and Wenfei Wu (Tsinghua University, China); Yongchao He (Tsinghua University & ByteDance Company, China); Bangwen Deng (Tsinghua University, China); Ying Zhang (Facebook, USA); Yongqiang Xiong (Microsoft Research Asia, China); Guo Chen (Hunan University, China); Yong Cui (Tsinghua University, China); Peng Cheng (Microsoft Research, China)

  1. NFOpt: Eliminating Redundant Logic in NF Programs using Operation-Time Configurations          

Bangwen Deng and Wenfei Wu (Tsinghua University, China)

  1. On Network Topology Augmentation for Global Connectivity under Regional Failures      

János Tapolcai, Zsombor László Hajdú and Alija Pašić (Budapest University of Technology and Economics, Hungary); Pin-Han Ho (University of Waterloo, Canada); Lajos Rónyai (Budapest University of Technology and Economics (BME), Hungary)

  1. On Scheduling with AoI Violation Tolerance 

Chengzhang Li, Qingyu Liu, Shaoran Li, Yongce Chen, Thomas Hou and Wenjing Lou (Virginia Tech, USA)

  1. On the Performance of Pipelined HotStuff   

Jianyu Niu and Fangyu Gai (The University of British Columbia, Canada); Mohammad Jalalzai (The University of British Columbia); Chen Feng (University of British Columbia, Canada)

  1. On the Reliability of IEEE 802.1 FRER Protocol         

Doğanalp Ergenç and Mathias Fischer (University Hamburg, Germany)

  1. Online Joint Optimization on Traffic Engineering and Network Update in Software-defined WANs          

Jiaqi Zheng, Yimeng Xu and Li Wang (Nanjing University, China); Haipeng Dai (Nanjing University & State Key Laboratory for Novel Software Technology, China); Guihai Chen (Shanghai Jiao Tong University, China)

  1. Optimal Multicast Scheduling for Millimeter Wave Networks Leveraging Directionality and Reflections

In Sop Cho and Seung Jun Baek (Korea University, Korea (South))

  1. Optimal Online Algorithms for Dynamic Balanced Graph Partitioning         

Maciej Pacut (University of Vienna, Poland); Mahmoud Parham and Stefan Schmid (University of Vienna, Austria)

  1. Optimal Rack-Coordinated Updates in Erasure-Coded Data Centers           

Guowen Gong, Zhirong Shen and Suzhen Wu (Xiamen University, China); Xiaolu Li and Patrick Pak-Ching Lee (The Chinese University of Hong Kong, Hong Kong)

  1. Optimal Resource Allocation for Statistical QoS Provisioning in Supporting mURLLC Over FBC-Driven 6G Terahertz Wireless Nano-Networks       

Xi Zhang and Jingqing Wang (Texas A&M University, USA); H. Vincent Poor (Princeton University, USA)

  1. Optimal Wireless Scheduling for Remote Sensing through Brownian Approximation        

Daojing Guo and I-Hong Hou (Texas A&M University, USA); Ping-Chun Hsieh (National Chiao Tung University, Taiwan)

  1. Owl: Congestion Control with Partially Invisible Networks via Reinforcement Learning     

Alessio Sacco (Politecnico di Torino, Italy & Saint Louis University, USA); Matteo Flocco and Flavio Esposito (Saint Louis University, USA); Guido Marchetto (Politecnico di Torino, Italy)

  1. PALMAR: Towards Adaptive Multi-inhabitant Activity Recognition in Point-Cloud Technology     

Mohammad Arif Ul Alam (University of Massachusetts Lowell, USA & Cognitive Ubiquitous Computing and Systems, Bangladesh); Md Mahmudur Rahman and Jared Widberg (University of Massachusetts Lowell, USA)

  1. PCL: Packet Classification with Limited knowledge  

Vitalii Demianiuk (Ariel University, Israel); Chen Hajaj (Ariel University & Data Science and Artificial Intelligence Research Center, Israel); Kirill Kogan (Ariel University, Israel)

  1. P-FedAvg: Parallelizing Federated Learning with Theoretical Guarantees   

Zhicong Zhong (Sun Yat-sen University, China); Yipeng Zhou (Macquarie University, Australia); Di Wu (Sun Yat-Sen University, China); Xu Chen (Sun Yat-sen University, China); Min Chen (Huazhong University of Science and Technology, China); Chao Li (Tencent, China); Quan Z. Sheng (Macquarie University, Australia)

  1. Physical Layer Key Generation between Backscatter Devices over Ambient RF Signals      

Pu Wang (Xidian University, China); Long Jiao and Kai Zeng (George Mason University, USA); Zheng Yan (Xidian University & Aalto University, China)

  1. Physical Layer Secure Communications Based on Collaborative Beamforming for UAV Networks: A Multi-objective Optimization Approach       

Jiahui Li (Jilin University, China); Hui Kang (JiLin University, China); Geng Sun, Shuang Liang and Yanheng Liu (Jilin University, China); Ying Zhang (Georgia Institute of Technology, USA)

  1. PolarTracker: Attitude-aware Channel Access for Floating Low Power Wide Area Networks         

Yuting Wang, Xiaolong Zheng, Liang Liu and Huadong Ma (Beijing University of Posts and Telecommunications, China)

  1. POLO: Localizing RFID-Tagged Objects for Mobile Robots   

Dianhan Xie, Xudong Wang, Aimin Tang and Hongzi Zhu (Shanghai Jiao Tong University, China)

  1. Popularity-Aware 360-Degree Video Streaming       

Xianda Chen, Tianxiang Tan and Guohong Cao (The Pennsylvania State University, USA)

  1. Practical Analysis of Replication-Based Systems       

Florin Ciucu (University of Warwick, United Kingdom (Great Britain)); Felix Poloczek (University of Warwick / TU Berlin, Germany); Lydia Y. Chen (IBM Zurich Research Laboratory, Switzerland); Martin Chan (University of Warwick, Germany)

  1. Primus: Fast and Robust Centralized Routing for Large-scale Data Center Networks         

Guihua Zhou, Guo Chen, Fusheng Lin, Tingting Xu, Dehui Wei and Jianbing Wu (Hunan University, China); Li Chen (Huawei, Hong Kong); Yuanwei Lu and Andrew Qu (Tencent, China); Hua Shao (Tsinghua University & Tencent, China); Hongbo Jiang (Hunan University, China)

  1. Prison Break of Android Reflection Restriction and Defense

Zhen Ling and Ruizhao Liu (Southeast University, China); Yue Zhang (Jinan University, China); Kang Jia (Southeast University, China); Bryan Pearson (University of Central Florida, USA); Xinwen Fu (University of Massachusetts Lowell, USA); Luo Junzhou (Southeast University, China)

  1. Privacy Budgeting for Growing Machine Learning Datasets 

Weiting Li, Liyao Xiang, Zhou Zhou and Feng Peng (Shanghai Jiao Tong University, China)

  1. Privacy-Preserving Learning of Human Activity Predictors in Smart Environments 

Sharare Zehtabian (University of Central Florida, USA); Siavash Khodadadeh (University of Central Flordia, USA); Ladislau Bölöni and Damla Turgut (University of Central Florida, USA)

  1. Privacy-Preserving Outlier Detection with High Efficiency over Distributed Datasets         

Guanghong Lu, Chunhui Duan, Guohao Zhou and Xuan Ding (Tsinghua University, China); Yunhao Liu (Tsinghua University & The Hong Kong University of Science and Technology, China)

  1. PROCESS: Privacy-Preserving On-Chain Certificate Status Service   

Meng Jia (School of Cyber Science and Engineering, Wuhan University, China); Kun He, Jing Chen, Ruiying Du and Weihang Chen (Wuhan University, China); Zhihong Tian (Guangzhou University, China); Shouling Ji (Zhejiang University, China & Georgia Institute of Technology, USA)

  1. Programmable Switches for in-Networking Classification    

Bruno Missi Xavier and Rafael Silva Guimaraes (Federal Institute of Espirito Santo - Campus Cachoeiro de Itapemirim, Brazil); Giovanni Comarela (Universidade Federal do Espírito Santo, Brazil); Magnos Martinello (Federal University of Espirito Santo, Brazil)

  1. ProHiCo: A Probabilistic Framework to Hide Communities in Large Networks        

Xuecheng Liu and Luoyi Fu (Shanghai Jiao Tong University, China); Xinbing Wang (Shanghai Jiaotong University, China); John Hopcroft (Cornell University, USA)

  1. Proximity-Echo: Secure Two Factor Authentication Using Active Sound Sensing    

Yanzhi Ren, Ping Wen, Hongbo Liu and Zhourong Zheng (University of Electronic Science and Technology of China, China); Yingying Chen (Rutgers University, USA); Pengcheng Huang and Hongwei Li (University of Electronic Science and Technology of China, China)

  1. Push the Limit of Device-Free Acoustic Sensing on Commercial Mobile Devices    

Cheng Haiming and Wei Lou (The Hong Kong Polytechnic University, Hong Kong)

  1. Pyramid: A Layered Sharding Blockchain System     

Zicong Hong (Sun Yat-sen University, China); Song Guo (The Hong Kong Polytechnic University, Hong Kong); Peng Li (The University of Aizu, Japan); Chen Wuhui (Sun Yat-sen university, China)

  1. Pyramid: Decoding LoRa Collisions with Peak Tracking        

Zhenqiang Xu, Pengjin Xie and Jiliang Wang (Tsinghua University, China)

  1. Radio Frequency Fingerprint Identification for LoRa Using Spectrogram and CNN 

Guanxiong Shen, Junqing Zhang and Alan Marshall (University of Liverpool, United Kingdom (Great Britain)); Linning Peng (Southeast University, China); Xianbin Wang (Western University, Canada)

  1. Randomized Scheduling of Real-Time Traffic in Wireless Networks Over Fading Channels

Christos Tsanikidis and Javad Ghaderi (Columbia University, USA)

  1. RapidRider: Efficient WiFi Backscatter with Uncontrolled Ambient Signals 

Qiwei Wang (University of Science and Technology of China, China); Si Chen and Jia Zhao (Simon Fraser University, Canada); Wei Gong (University of Science and Technology of China, China)

  1. Rate Allocation and Content Placement in Cache Networks

Khashayar Kamran, Armin Moharrer, Stratis Ioannidis and Edmund Yeh (Northeastern University, USA)

  1. Rate Region of Scheduling a Wireless Network with Discrete Propagation Delays 

Jun Ma, Yanxiao Liu and Shenghao Yang (The Chinese University of Hong Kong, Shenzhen, China)

  1. Real-time sampling and estimation on random access channels: Age of Information and Beyond

Xingran Chen, Xinyu Liao and Shirin Saeedi Bidokhti (University of Pennsylvania, USA)

  1. Redundant Entanglement Provisioning and Selection for Throughput Maximization in Quantum Networks        

Yangming Zhao and Chunming Qiao (University at Buffalo, USA)

  1. Reliability-aware Dynamic Service Chain Scheduling in 5G Networks based on Reinforcement Learning  

Junzhong Jia and Lei Yang (South China University of Technology, China); Jiannong Cao (Hong Kong Polytechnical University, Hong Kong)

  1. Resource-Efficient Federated Learning with Hierarchical Aggregation in Edge Computing

Zhiyuan Wang, Hongli Xu and Jianchun Liu (University of Science and Technology of China, China); He Huang (Soochow University, China); Chunming Qiao and Yangming Zhao (University at Buffalo, USA)

  1. RespTracker: Multi-user Room-scale Respiration Tracking with Commercial Acoustic Devices      

Haoran Wan, Shuyu Shi, Wenyu Cao, Wei Wang and Guihai Chen (Nanjing University, China)

  1. Reusing Backup Batteries as BESS for Power Demand Reshaping in 5G and Beyond          

Guoming Tang (Peng Cheng Laboratory, China); Hao Yuan and Deke Guo (National University of Defense Technology, China); Kui Wu (University of Victoria, Canada); Yi Wang (Southern University of Science and Technology, China)

  1. Reversible Models for Wireless Multi-Channel Multiple Access      

Michael Neely (University of Southern California, USA)

  1. RFace: Anti-Spoofing Facial Authentication Using COTS RFID          

Weiye Xu (Zhejiang University, China); Jianwei Liu (Zhejiang University & Xi'an Jiaotong University, China); Shimin Zhang (Zhejiang University, China); Yuanqing Zheng (The Hong Kong Polytechnic University, Hong Kong); Feng Lin (Zhejiang University, China); Jinsong Han (Zhejiang University & School of Cyber Science and Technology, China); Fu Xiao (Nanjing University of Posts and Telecommunications, China); Kui Ren (Zhejiang University, China)

  1. Robust 360◦ Video Streaming via Non-Linear Sampling       

Mijanur R Palash, Voicu Popescu, Amit Sheoran and Sonia Fahmy (Purdue University, USA)

  1. Robust Online Learning against Malicious Manipulation with Application to Network Flow Classification

Yupeng Li and Ben Liang (University of Toronto, Canada); Ali Tizghadam (TELUS Communications, Canada)

  1. Robust Service Mapping in Multi-Tenant Clouds      

Jingzhou Wang, Gongming Zhao and Hongli Xu (University of Science and Technology of China, China); He Huang (Soochow University, China); Luyao Luo (University of Science and Technology of China, China); Yongqiang Yang (Huawei Technologies Co., Ltd, China)

  1. Ruledger: Ensuring Execution Integrity in Trigger-Action IoT Platforms      

Jingwen Fan (Sichuan Changhong Electric Co., Ltd., China); Yi He (Tsinghua University, China); Bo Tang (Sichuan Changhong Electric Co., Ltd., China); Qi Li (Tsinghua University, China); Ravi Sandhu (University of Texas at San Antonio, USA)

  1. Safety Critical Networks using Commodity SDNs      

Ashish Kashinath (University of Illinois at Urbana-Champaign, USA); Monowar Hasan (University of Illinois Urbana-Champaign, USA); Rakesh Kumar (University of Illinois, Urbana-Champaign, USA); Sibin Mohan (University of Illinois at Urbana-Champaign, USA); Rakesh B. Bobba (Oregon State University, USA); Smruti Padhy (University of Texas at Austin, USA)

  1. Sample-level Data Selection for Federated Learning

Anran Li, Lan Zhang, Juntao Tan, Yaxuan Qin, Junhao Wang and Xiang-Yang Li (University of Science and Technology of China, China)

  1. Scalable On-Switch Rate Limiters for the Cloud        

Yongchao He (Tsinghua University & ByteDance Company, China); Wenfei Wu (Tsinghua University, China); Xuemin Wen and Haifeng Li (Huawei, China); Yongqiang Yang (Huawei Technologies Co., Ltd, China)

  1. ScreenID: Enhancing QRCode Security by Fingerprinting Screens    

Yijie Li and Yi-Chao Chen (Shanghai Jiao Tong University, China); Xiaoyu Ji (Zhejiang University, China); Hao Pan, Lanqing Yang, Guangtao Xue and Jiadi Yu (Shanghai Jiao Tong University, China)

  1. Self-Adaptive Sampling for Network Traffic Measurement  

Yang Du, He Huang and Yu-e Sun (Soochow University, China); Shigang Chen (University of Florida, USA); Guoju Gao (Soochow University, China)

  1. Self-adjusting Advertisement of Cache Indicators with Bandwidth Constraints      

Itamar Cohen (Politecnico di Torino, Italy); Gil Einziger (Ben-Gurion University Of The Negev, Israel); Gabriel Scalosub (Ben-Gurion University of the Negev, Israel)

  1. Sequential Resource Access: Theory and Algorithm 

Lin Chen (Sun Yat-sen University, China); Anastasios Giovanidis (Sorbonne Université & CNRS-LIP6, France); Wei Wang (Zhejiang University, China); Shan Lin (Stony Brook University, USA)

  1. Setting the Record Straighter on Shadow Banning   

Erwan Le Merrer (Inria, France); Benoit Morgan (IRIT-ENSEEIHT, University of Toulouse, France); Gilles Tredan (LAAS-CNRS, France)

  1. ShakeReader: 'Read' UHF RFID using Smartphone   

Kaiyan Cui (Xi'an Jiaotong University, China); Yanwen Wang and Yuanqing Zheng (The Hong Kong Polytechnic University, Hong Kong); Jinsong Han (Zhejiang University & School of Cyber Science and Technology, China)

  1. Signal Detection and Classification in Shared Spectrum: A Deep Learning Approach         

Wenhan Zhang, Mingjie Feng, Marwan Krunz and Amir Hossein Yazdani Abyaneh (University of Arizona, USA)

  1. SILoc: A Speed Inconsistency-Immune Approach to Mobile RFID Robot Localization         

Jiuwu Zhang and Xiulong Liu (Tianjin University, China); Tao Gu (Macquarie University, Australia); Xinyu Tong, Sheng Chen and Keqiu Li (Tianjin University, China)

  1. SmartDistance: A Mobile-based Positioning System for Automatically Monitoring Social Distance           

Li Li (Shenzhen Institutes Of Advanced Technology Chinese Academy Of Sciences, China); Xiaorui Wang (The Ohio State University, USA); Wenli Zheng (Shanghai Jiaotong University, China); Cheng-Zhong Xu (University of Macau, China)

  1. SOBA: Session optimal MDP-based network friendly recommendations    

Theodoros Giannakas (EURECOM, France); Anastasios Giovanidis (Sorbonne Université & CNRS-LIP6, France); Thrasyvoulos Spyropoulos (EURECOM, France)

  1. SODA: Similar 3D Object Detection Accelerator at Network Edge for Autonomous Driving

Wenquan Xu (Tsinghua University, China); Haoyu Song (Futurewei Technologies, USA); LinYang Hou (Tsinghua University, China); Hui Zheng (Wuhan University, China); Xinggong Zhang (Peking University, China); Chuwen Zhang (Tsinghua University, China); Wei Hu (Peking University, China); Yi Wang (Southern University of Science and Technology, China); Bin Liu (Tsinghua University, China)

  1. Statistical Delay and Error-Rate Bounded QoS Provisioning for 6G mURLLC Over AoI-Driven and UAV-Enabled Wireless Networks           

Xi Zhang and Jingqing Wang (Texas A&M University, USA); H. Vincent Poor (Princeton University, USA)

  1. SteaLTE: Private 5G Cellular Connectivity as a Service with Full-stack Wireless Steganography     

Leonardo Bonati, Salvatore D'Oro, Francesco Restuccia, Stefano Basagni and Tommaso Melodia (Northeastern University, USA)

  1. Store Edge Networked Data (SEND): A Data and Performance Driven Edge Storage Framework   

Adrian-Cristian Nicolaescu (University College London (UCL), United Kingdom (Great Britain)); Spyridon Mastorakis (University of Nebraska, Omaha, USA); Ioannis Psaras (University College London, United Kingdom (Great Britain))

  1. Strategic Information Revelation in Crowdsourcing Systems Without Verification 

Chao Huang (The Chinese University of Hong Kong, Hong Kong); Haoran Yu (Beijing Institute of Technology, China); Jianwei Huang (The Chinese University of Hong Kong, Shenzhen, China); Randall A Berry (Northwestern University, USA)

  1. Tailored Learning-Based Scheduling for Kubernetes-Oriented Edge-Cloud System

Yiwen Han, Shihao Shen and Xiaofei Wang (Tianjin University, China); Shiqiang Wang (IBM T. J. Watson Research Center, USA); Victor C.M. Leung (University of British Columbia, Canada)

  1. Taming Time-Varying Information Asymmetry in Fresh Status Acquisition 

Zhiyuan Wang (The Chinese University of Hong Kong, Hong Kong); Lin Gao (Harbin Institute of Technology (Shenzhen), China); Jianwei Huang (The Chinese University of Hong Kong, Shenzhen, China)

  1. The Effect of Ground Truth Accuracy on the Evaluation of Localization Systems    

Chen Gu (Google, USA); Ahmed Shoukry (Wireless Research Center, E-JUST, Egypt); Moustafa Youssef (Alexandria University, Egypt)

  1. The Impact of Baseband Functional Splits on Resource Allocation in 5G Radio Access Networks  

Iordanis Koutsopoulos (Athens University of Economics and Business, Greece)

  1. Threshold-based rerouting and replication for resolving job-server affinity relations        

Youri Raaijmakers and Onno Boxma (Eindhoven University of Technology, The Netherlands); Sem Borst (Eindhoven University of Technology & Nokia Bell Labs, USA)

  1. TiBroco: A Fast and Secure Distributed Learning Framework for Tiered Wireless Edge Networks 

Dong-Jun Han (KAIST, Korea (South)); Jy-yong Sohn (Korea Advanced Institute of Science and Technology, Korea (South)); Jaekyun Moon (KAIST, Korea (South))

  1. Time-Varying Resource Graph Based Resource Model for Space-Terrestrial Integrated Networks

Long Chen and Feilong Tang (Shanghai Jiao Tong University, China); Zhetao Li (Xiangtan University, China); Laurence T. Yang (St. Francis Xavier University, Canada); Jiadi Yu and Bin Yao (Shanghai Jiao Tong University, China)

  1. To Talk or to Work: Flexible Communication Compression for Energy Efficient Federated Learning over Heterogeneous Mobile Edge Devices  

Liang Li (Xidian University, China); Dian Shi (University of Houston, USA); Ronghui Hou and Hui Li (Xidian University, China); Miao Pan and Zhu Han (University of Houston, USA)

  1. ToP: Time-dependent Zone-enhanced Points-of-interest Embedding-based Explainable Recommender system 

En Wang, Yuanbo Xu, Yongjian Yang, Fukang Yang, Chunyu Liu and Yiheng Jiang (Jilin University, China)

  1. Tornadoes In The Cloud: Worst-Case Attacks on Distributed Resources Systems   

Jhonatan Tavori (Tel-Aviv University, Israel); Hanoch Levy (Tel Aviv University, Israel)

  1. Towards Cross-Modal Forgery Detection and Localization on Live Surveillance Videos      

Yong Huang, Xiang Li, Wei Wang and Tao Jiang (Huazhong University of Science and Technology, China); Qian Zhang (Hong Kong University of Science and Technology, Hong Kong)

  1. Towards Fine-Grained Spatio-Temporal Coverage for Vehicular Urban Sensing Systems   

Guiyun Fan, Yiran Zhao, Ziliang Guo, Haiming Jin and Xiaoying Gan (Shanghai Jiao Tong University, China); Xinbing Wang (Shanghai Jiaotong University, China)

  1. Towards Minimum Fleet for Ridesharing-Aware Mobility-on-Demand Systems     

Chonghuan Wang, Yiwen Song, Yifei Wei, Guiyun Fan and Haiming Jin (Shanghai Jiao Tong University, China); Fan Zhang (Shenzhen Institutes of Advanced Technology, Chinese Academy of Sciences, China)

  1. Towards the Fairness of Traffic Policer         

Danfeng Shan and Peng Zhang (Xi'an Jiaotong University, China); Wanchun Jiang (Central South University, China); Hao Li (Xi'an Jiaotong University, China); Fengyuan Ren (Tsinghua University, China)

  1. Towards Video Streaming Analysis and Sharing for Multi-Device Interaction with Lightweight DNNs       

Yakun Huang, Hongru Zhao and Xiuquan Qiao (Beijing University of Posts and Telecommunications, China); Jian Tang (Syracuse University, USA); Ling Liu (Georgia Tech, USA)

  1. TrackSign: Guided Web Tracking Discovery  

Ismael Castell-Uroz (Universitat Politècnica de Catalunya, Spain); Josep Solé-Pareta (UPC, Spain); Pere Barlet-Ros (Universitat Politècnica de Catalunya, Spain)

  1. Traffic-aware Buffer Management in Shared Memory Switches     

Sijiang Huang, Mowei Wang and Yong Cui (Tsinghua University, China)

  1. Train Once, Locate Anytime for Anyone: Adversarial Learning based Wireless Localization           

Danyang Li, Jingao Xu, Zheng Yang, Yumeng Lu and Qian Zhang (Tsinghua University, China); Xinglin Zhang (South China University of Technology, China)

  1. Trust Trackers for Computation Offloading in Edge-Based IoT Networks    

Matthew Bradbury, Arshad Jhumka and Tim Watson (University of Warwick, United Kingdom (Great Britain))

  1. Turbocharging Deep Backscatter Through Constructive Power Surges with a Single RF Source     

Zhenlin An, Qiongzheng Lin and Qingrui Pan (The Hong Kong Polytechnic University, Hong Kong); Lei Yang (The Hong Kong Polytechnic University, China)

  1. Ultra-Wideband Swarm Ranging       

Feng Shan, Jiaxin Zeng, Zengbao Li, Luo Junzhou and Weiwei Wu (Southeast University, China)

  1. Uplink Multi-User Beamforming on Single RF Chain mmWave WLANs       

Keerthi Priya Dasala (Rice University, USA); Josep M Jornet (Northeastern University, USA); Edward W. Knightly (Rice University, USA)

  1. vGaze: Implicit Saliency-Aware Calibration for Continuous Gaze Tracking on Mobile Devices       

Songzhou Yang, Yuan He and Meng Jin (Tsinghua University, China)

  1. VideoLoc: Video-based Indoor Localization with Text Information  

Shusheng Li and Wenbo He (McMaster University, Canada)

  1. Web-LEGO: Trading Content Strictness for Faster Webpages          

Pengfei Wang (Dalian University of Technology, China); Matteo Varvello (Telefonica, unknown); Chunhe Ni (Amazon, USA); Ruiyun Yu (Northeastern University, China); Aleksandar Kuzmanovic (Northwestern University, USA)

  1. WebMythBusters: An In-depth Study of Mobile Web Experience   

Seonghoon Park and Yonghun Choi (Yonsei University, Korea (South)); Hojung Cha (Yonsei University, S. Korea, Korea (South))

  1. WiProg: A WebAssembly-based Approach to Integrated IoT Programming

Borui Li, Wei Dong and Yi Gao (Zhejiang University, China)

  1. Your Home is Insecure: Practical Attacks on Wireless Home Alarm Systems          

Tao Li (IUPUI, USA); Dianqi Han, Jiawei Li, Ang Li and Yan Zhang (Arizona State University, USA); Rui Zhang (University of Delaware, USA); Yanchao Zhang (Arizona State University, USA)

  1. π-ROAD: a Learn-as-You-Go Framework for On-Demand Emergency Slices in V2X Scenarios        

Armin Okic (Politecnico di Milano, Italy); Lanfranco Zanzi (NEC Laboratories Europe & Technische Universität Kaiserslautern, Germany); Vincenzo Sciancalepore (NEC Laboratories Europe GmbH, Germany); Alessandro E. C. Redondi (Politecnico di Milano, Italy); Xavier Costa-Perez (NEC Laboratories Europe, Germany)

Patrons