The 18th International Conference on Mobility, Sensing and Networking (MSN 2022)
Keynote Speech 3: Real-Time AI for Infrastructure-assisted Autonomous Driving
Keynote Talk 3: Real-Time AI for Infrastructure-assisted Autonomous Driving
Guoliang Xing
Session Chair
Weigang Wu, Sun Yat-sen University, China
Panel
Panel
TBD
Session Chair
Huadong Ma, Beijing University of Posts and Telecommunications, China
Ride-sharing and IoT
Sample-based Prophet for Online Ride-sharing with Fairness
Baoju Li, En Wang, Funing Yang, Yongjian Yang, Wenbin Liu, Zijie Tian, Junyu Liu and Wanbo Zheng
Traffic Light Routing Based on Node State Awareness in Delay Tolerant Networks
Tong Wang, Jianqun Cui, Yanan Chang, Feng Huang, Yi Yang
Optimized sustainable strategy in Aerial Terrestrial IoT Network
Tiantian Wang, Lei Liu, Tong Ding
Crowdsourcing Mobile Data for a Passive Indoor Positioning System - The MAA Case Study
Ran Guan and Robert Harle
Session Chair
Jianguo Chen, Sun Yat-sen University, China
Task Offloading
Joint Task Partition and Computation Offloading for Latency-Sensitive Services in Mobile Edge Networks
Yujie Peng, Xiaoqin Song, Fang Liu, Guoliang Xing, and Tiecheng Song
Enabling Heterogeneous Domain Adaptation in Multi-inhabitants Smart Home Activity Learning
Md Mahmudur Rahman, Mahta Mousavi, Peri Tarr and Mohammad Arif Ul Alam
Priority-Aware Task Offloading and Resource Allocation in Vehicular Edge Computing Networks
Ye Wang, Yanheng Liu, Zemin Sun, Lingling Liu, Jiahui Li, and Geng Sun
Task Offloading in Fog: A Matching-driven Multi-User Multi-Armed Bandit Approach
Qing Zhang, Mingjun Xiao and Yin Xu
MACC: MEC-Assisted Collaborative Caching for Adaptive Bitrate Videos in Dense Cell Networks
Haojia He, Songtao Guo, Lu Yang and Ying Wang
Session Chair
Hao Wang, Dalian University of Technology, China
Attack and Security
Accelerating Adversarial Attack using Process-in-Memory Architecture
Shiyi Liu, Sathwika Bavikadi, Tanmoy Sen, Haiying Shen, Purab Ranjan Sutradhar and Amlan Ganguly
PhysioGait: Context-Aware Physiological Context Modeling for Person Re-identification Attack on Wearable Sensing
James Sullivan, Mohammad Arif Ul Alam
Secure Deduplication Against Frequency Analysis Attacks
Hang Chen, Guanxiong Ha, Yuchen Chen, Haoyu Ma and Chunfu Jia
Breaking Distributed Backdoor Defenses for Federated Learning in Non-IID Settings
Jijia Yang, Jiangang Shu and Xiaohua Jia
Session Chair
Aida Akbarzadeh, Norwegian University of Science and Technology, Norwegian
Wireless Networks
Crowdsourced Image Driven PM2.5 Estimation based on Hybrid 3-Channel Feature Map
Jiaxuan Wang, Muyan Yao, Ruipeng Gao and Dan Tao
An Energy-equilibrium Opportunity network routing algorithm based on Game theory and Historical similarity rate
Gang Xu, Ming Song, HongZhi Fu, BaoQi Huang, FengQi Wei and QinFu Si
Opportunistic Network Routing Strategy Based on Relay Node Collaboration
Gang Xu, Xiaoying Yang, Ruijie Hang, Baoqi Huang, Fengqi Wei and Qinfu Si
Characterizing Energy Sources in Outdoor Wireless Sensor Networks
Robert Hartung, Jan Kaberich, Christian Bunzeck and Lars Wolf
Session Chair
Changlin Yang, Sun Yat-sen University, China
Edge Computing
Leakage Detection via Edge Processing in LoRaWAN-based Smart Water Distribution Networks
Domenico Garlisi, Gabriele Restuccia, Ilenia Tinnirello, Francesca Cuomo and Ioannis Chatzigiannakis
EdgeMan: Ensuring Real-Time Service for Containerized Edge Systems
Wenzhao Zhang, Wei Dong, Geng Ren, Yi Gao
LoRaDrone: Enabling Low-Power LoRa Data Transmission via a Mobile Approach
Ciyuan Chen, Junzhou Luo, Zhuqing Xu, Runqun Xiong, Zhimeng Yin, Jingkai Lin, Dian Shen
Online Service Provisioning and Updating in QoS-aware Mobile Edge Computing
Shuaibing Lu, Jie Wu, Pengfan Lu, Jiamei Shi, Ning Wang, Juan Fang
Session Chair
Miao Hu, Sun Yat-sen University, China
Blockchain
Blockchain Based Secure Outsourcing Data Integrity Auditing for Internet of Things in Cloud-edge Environment
Yangfei Lin, Celimuge Wu, Yusheng Ji, Jie Li, Zhi Liu
Trusted-Committee-Based Secure and Scalable BFT Consensus for Consortium Blockchain
Liaoliao Feng, Yan Ding, Yusong Tan, Xiang Fu, Keming Wang, Junsheng Chang
An Efficient and Secure Node-sampling Consensus Mechanism for Blockchain Systems
Zhelin Liang, Hao Xu, Xiulong Liu, Shan Jiang, Keqiu Li
An atomic member addition mechanism for permissioned blockchain based on autonomous rollback
Qihui Zhou, Xianglin Dang, Yazhe Wang, Zhen Xu, Penghui Lv
CDTP: A Copyright-preserving Decentralized Data Trading Platform Based on Blockchain
Heng Tian, Mingjun Xiao
Session Chair
Georgios Spathoulas, Norwegian University of Science and Technology, Norwegian
Mobile and Fog Computing
Proactive Handover Mechanism for Blockage Avoidance in Indoor VLC Networks
Anna Maria Vegni,Panagiotis Diamantoulakis
Task Offloading for Post-disaster Rescue in Vehicular Fog Computing-assisted UAV Networks
Geng Sun, Long He, Zemin Sun, Jiayun Zhang, and Jiahui Li
Anomaly Detection for Reoccurring Concept Drift in Smart Environments
Vincenzo Agate,Salvatore Drago,Pierluca Ferraro,Giuseppe Lo Re
A Novel Data Aggregation Scheme for Wireless Sensor Networks Based on Robust Chinese Remainder Theorem
Jinxin Zhang,Fuyou Miao
Session Chair
Dangyang Xiao, Sun Yat-sen University, China
IoT
T2C: A Multi-User System for Deploying DNNs in a Thing-to-Cloud Continuum
Chia-Ying Hsieh, Praveen Venkateswaran, Nalini Venkatasubramanian, and Cheng-Hsin Hsu
Dynamic Vehicle Aware Task Offloading Based on Reinforcement Learning in a Vehicular Edge Computing Network
Lingling Wang, Xiumin Zhu, Nianxin Li, Yumei Li, Shuyue Ma, Linbo Zhai
VSLink: A Fast and Pervasive Approach to Physical Cyber Space Interaction via Visual SLAM
Han Zhou, Jiaming Huang, Hongchang Fan, Geng Ren, Yi Gao,and Wei Dong
BACO: A Bi-Ant-Colony-Based Strategy for UAV Trajectory Planning Considering Obstacle
Zhiyang Liu, Ximin Yang, Wan Tang, Xiao Zhang, Zhen Yang
Session Chair
Jingjing Li, South China Normal University, China
Analysis and Detection
Recognition of Abnormal Proxy Voice Traffic in 5G Environment Based on Deep Learning
Hongce Zhao,Shunliang Zhang,Xianjin Huang,Zhuang Qiao,Xiaohui Zhang,Guanglei Wu
Web Attack Payload Identification and Interpretability Analysis Based on Graph Convolutional Network
Yijia Xu,Yong Fang,Zhonglin Liu
A Mitmproxy-based Dynamic Vulnerability Detection System For Android Applications
Xinghang Lv, Tao Peng, Junwei Tang, Ruhan He, Xinrong Hu, Minghua Jiang,Zaihui Deng, Wenli Cao
Detection of DoH Tunnels with Dual-tier Classifier
Yuqi Qiu, Baiyang Li, Liang Jiao, Yujia Zhu?, Qingyun Liu
QP-LDP for better global model performance in federated learning
Qian Chen, Zheng Chai, Zilong Wang, Jiawei Chen, Haonan Yan,Xiaodong Lin
Session Chair
Ahmed Amro, Norwegian University of Science and Technology, Norwegian
Made with in Toronto · Privacy Policy · © 2022 Duetone Corp.