Abstract is missing.
- Subdomain Adaptive Learning Network for Cross-Domain Human Activities Recognition Using WiFi with CSILin Li, Lei Wang 0005, Bin Han, Xinxin Lu, Zhiyi Zhou, Bingxian Lu. 1-7 [doi]
- A Novel iBeacon Deployment Scheme for Indoor Pedestrian PositioningWenping Yu, Jianzhong Zhang, Junyu Cai, Jingdong Xu. 8-17 [doi]
- Near-Optimal Resource Allocation and Virtual Network Function Placement at Network EdgesYingling Mao, Xiaojun Shang, Yuanyuan Yang 0001. 18-25 [doi]
- OPTI: Order Preparation Time Inference for On-demand DeliveryZhigang Dai, Wenjun Lyu, Yi Ding, Yiwei Song. 26-33 [doi]
- Predicting Downside in Stock Market Using Knowledge and News DataXinlin Li, Shuqi Liu, Xinyi Zhang, Linqi Song. 34-41 [doi]
- IObrain: An Intelligent Lightweight I/O Recommendation System based on Decision TreeYiting Huang, Zhiwen Wang, Yuguo Li, Junlang Huang, Dingding Li, Yong Tang 0001, Deze Zeng. 42-49 [doi]
- Clustered Federated Multi-Task Learning with Non-IID DataYao Xiao, Jiangang Shu, Xiaohua Jia, Hejiao Huang. 50-57 [doi]
- TSC-ECFA: A Trusted Service Composition Scheme for Edge CloudYu Jiang, Xiaolong Xu, Kunda Lin, Weihua Duan. 58-65 [doi]
- Split Convolutional Neural Networks for Distributed Inference on Concurrent IoT SensorsJiale Chen, Duc Van Le, Rui Tan, Daren Ho. 66-73 [doi]
- A Gather Accelerator for GNNs on FPGA PlatformWei Yuan, Teng Tian, Huawen Liang, Xi Jin. 74-81 [doi]
- Two-Layer Traffic Signal Optimization: A Edge-assisted Pressure Balance Approach Based on Cooperative GameZhen Han, Mingjun Xiao, Haisheng Tan, Guoju Gao. 82-89 [doi]
- NFT Content Data Placement Strategy in P2P Storage Network for Permissioned BlockchainWenquan Li, Siqi Feng, Fuqi Jin, Lanju Kong, Qingzhong Li. 90-97 [doi]
- ALSTM: An Attention-based LSTM Model for Multi-Scenario Bandwidth PredictionPenghui Li, Xianliang Jiang, Guang Jin, Yan Yu, Zhijun Xie. 98-105 [doi]
- Passenger Payment Willingness Prediction by Static and Dynamic Multi-dimensional Ticket Attributes FusionBotong Chang, Jiahe Zhang, Chi Harold Liu. 106-113 [doi]
- UniGPS: A Unified Programming Framework for Distributed Graph ProcessingZhaokang Wang, Junhong Li, Yifan Qi, Guanghui Zhu, Chunfeng Yuan, Yihua Huang. 114-121 [doi]
- Towards Network-accelerated ML-based Distributed Computer Vision SystemsHisham Siddique, Miguel C. Neves, Carson Kuzniar, Israat Haque. 122-129 [doi]
- Decentralized Service Discovery and Composition in Dynamic IoT SystemsHessam Moeini, I-Ling Yen, Farokh B. Bastani. 130-137 [doi]
- Stable Cuckoo Filter for Data StreamsShangsen Li, Lailong Luo, Deke Guo, Yawei Zhao. 138-145 [doi]
- STNN: A Spatial-Temporal Graph Neural Network for Traffic PredictionXueyan Yin, Feifan Li, Genze Wu, Pengfei Wang, Yanming Shen, Heng Qi, Baocai Yin. 146-152 [doi]
- ATO-EDGE: Adaptive Task Offloading for Deep Learning in Resource-Constrained Edge Computing SystemsYihao Wang, Ling Gao, Jie Ren 0007, Rui Cao, Hai Wang 0010, Jie Zheng 0005, Quanli Gao. 153-160 [doi]
- WiRN: Real-Time and Lightweight Gesture Detection System on Edge DeviceQing Yang 0023, Tianzhang Xing, Zhiping Jiang, Xinhua Fu, Jingyi He. 161-168 [doi]
- Anti-Replay: A Fast and Lightweight Voice Replay Attack Detection SystemZhuoyang Shi, Chaohao Li, Zizhi Jin, Weinong Sun, Xiaoyu Ji 0001, Wenyuan Xu. 169-176 [doi]
- An Electromagnetic Covert Channel based on Neural Network ArchitectureChaojie Gu, Jiale Chen, Rui Tan, Linshan Jiang. 177-184 [doi]
- Measuring and Modeling Multipath of Wi-Fi to Locate People in Indoor EnvironmentsXiaoyu Ma, Hui He, Hui Zhang, Wei Xi, Zuhao Chen, Jizhong Zhao. 185-192 [doi]
- A Framework for Evaluating BFTJames R. Clavin, Yue Huang, Xin Wang, Pradeep M. Prakash, Sisi Duan, Jianwu Wang, Sean Peisert. 193-200 [doi]
- Choosing Appropriate AI-enabled Edge Devices, Not the Costly OnesZiyang Zhang, Feng Li, Changyao Lin, Shihui Wen, Xiangyu Liu, Jie Liu 0001. 201-208 [doi]
- Smartphone-based Vehicle Tracking without GPS: Experience and ImprovementsYao Tong, Shuli Zhu, Qinkun Zhong, Ruipeng Gao, Chi Li, Lei Liu. 209-216 [doi]
- BRNN-GAN: Generative Adversarial Networks with Bi-directional Recurrent Neural Networks for Multivariate Time Series ImputationZejun Wu, Chao Ma 0008, Xiaochuan Shi, Libing Wu, Dian Zhang, Yutian Tang, Milos Stojmenovic. 217-224 [doi]
- Dependency-Aware Hybrid Task Offloading in Mobile Edge Computing NetworksZhao Ming, Xiuhua Li, Chuan Sun, Qilin Fan, Xiaofei Wang 0001, Victor C. M. Leung. 225-232 [doi]
- RTPoW: A Proof-of-Work Consensus Scheme with Real-Time Difficulty Adjustment AlgorithmWeijia Feng, Zhenfu Cao, Jiachen Shen, Xiaolei Dong. 233-240 [doi]
- Sensitivity loss training based implicit feedbackKun Li, Nan Wang, Xinyu Liu. 241-248 [doi]
- Adaptive Convolutional Neural Network Structure for Network Traffic ClassificationZhuang Han, Jianfeng Guan, Yanan Yao, Su Yao. 249-256 [doi]
- Trusted Sliding-Window Aggregation over BlockchainsQifeng Shao, Zhao Zhang 0009, Cheqing Jin, Aoying Zhou. 257-265 [doi]
- MVSAS: Semantic-Aware Scheduling for Low Latency and High Precision in Wireless Multi-View ApplicationXiuxian Guan, Zekai Sun, Shengliang Deng, Shixiong Zhao, Tianxiang Shen, Tsz On Li, Yuexuan Wang, Rui Wang 0007, Heming Cui. 266-273 [doi]
- Jyane: Detecting Reentrancy vulnerabilities based on path profiling methodYicheng Fang, Chunping Wang, Zhe Sun, Hongbing Cheng. 274-282 [doi]
- Improving HPC System Throughput and Response Time using Memory DisaggregationFelippe Vieira Zacarias, Paul M. Carpenter, Vinicius Petrucci. 283-290 [doi]
- Improving Restore Performance of Deduplication Systems via a Greedy Rewriting SchemeLifang Lin, Yuhui Deng, Yi Zhou. 291-298 [doi]
- Effective Anomaly Detection Based on Reinforcement Learning in Network Traffic DataZhongyang Wang, Yijie Wang, Hongzuo Xu, Yongjun Wang. 299-306 [doi]
- An Efficient Adaptive Noise Correction Framework for Size Measurement over Data StreamsShenghui Xu, He Huang 0001, Yu-e Sun, Yang Du 0006, Guoju Gao, Xiaoyu Wang, Shiping Chen 0002. 307-315 [doi]
- M-UPS: A multi-user Pairing Scheme for NOMA-enabled Backscatter Communication NetworksTingpei Huang, Hu Zhu, Shibao Li, Jianhang Liu. 316-323 [doi]
- RSU-Aided Authentication for VANET Based on Consortium BlockchainSimeng Wang, Xing Chen, Fei Tong, Yujian Zhang. 324-331 [doi]
- A Forecasting Method of Dual Traffic Condition Indicators Based on Ensemble LearningChuanhao Dong, Zhiqiang Lv, Jianbo Li. 332-339 [doi]
- TRAN: Task Replication with Guarantee via Multi-armed BanditYitong Zhou, Bowen Peng, Jingmian Wang, Weiwei Miao, Zeng Zeng, Yibo Jin 0001, Sheng Zhang 0001, Zhuzhong Qian. 340-347 [doi]
- A New Code-based Blind Signature in Rank MetricYanhong Qi, Xindong Liu, Li-Ping Wang. 348-355 [doi]
- WiBWi: Encoding-based Bidirectional Physical-Layer Cross-Technology Communication between BLE and WiFiYuanhe Shu, Jingwei Wang, Linghe Kong, Jiadi Yu, Guisong Yang, Yueping Cai, Zhen Wang, Muhammad Khurram Khan. 356-363 [doi]
- Delica: Decentralized Lightweight Collective Attestation for Disruptive IoT NetworksZiyu Wang, Cong Sun, Qingsong Yao, Duo Ding, Jianfeng Ma 0001. 364-371 [doi]
- Byzantine-robust Federated Learning through Spatial-temporal Analysis of Local Model UpdatesZhuohang Li, Luyang Liu, Jiaxin Zhang, Jian Liu 0001. 372-379 [doi]
- Efficient and Parallel Separable Dictionary LearningCristian Rusu, Paul Irofti. 380-386 [doi]
- Protecting Resources Against Volumetric and Non-volumetric Network AttacksRajorshi Biswas, Jie Wu 0001. 387-395 [doi]
- Iris Protection with Verisimilar Feature StructureJun Gu, Heng Zhang 0001, Zhikun Zhang, Jian Zhang, Hongran Li. 396-401 [doi]
- Spring Buddy: A Self-Adaptive Elastic Memory Management Scheme for Efficient Concurrent Allocation/Deallocation in Cloud Computing SystemsYihui Lu, Weidong Liu, Chentao Wu, Jia Wang, Xiaoming Gao, Jie Li, Minyi Guo. 402-409 [doi]
- Planning Paths for UAVs to Collect Data from Disconnected Sensor NetworksXueMeng Li, Xiaojun Zhu 0001, Chao Dong 0001. 410-417 [doi]
- AMF-CSR: Adaptive Multi-Row Folding of CSR for SpMV on GPUJianhua Gao, Weixing Ji, Jie Liu, Senhao Shao, Yizhuo Wang, Feng Shi. 418-425 [doi]
- JointCS: Joint Search for Deep Model Compression and Segmentation on Heterogeneous IoT DevicesXinyu Li, Bin Guo 0001, Sicong Liu, Chen Qiu, Yunji Liang, Zhiwen Yu 0001. 426-433 [doi]
- RAEF: Energy-efficient Resource Allocation through Energy Fungibility in ServerlessXuechao Jia, Laiping Zhao. 434-441 [doi]
- Deep Reinforcement Agent for Failure-aware Job scheduling in High-Performance ComputingKang Yang, Rongyu Cao, Yueyuan Zhou, Jiawei Zhang, En Shao, Guangming Tan. 442-449 [doi]
- An Intelligent Game Theory Framework for Detecting Advanced Persistent ThreatsHao Yan, Qianzhen Zhang, Junjie Xie, Ziyue Lu, Sheng Chen, Deke Guo. 450-457 [doi]
- Onion: Dependency-Aware Reliable Communication Protocol for Magnetic MIMO WPT SystemXiaolun Liang, Hao Zhou 0001, Wangqiu Zhou, Xiang Cui, Zhi Liu, Xiang-Yang Li 0001. 458-465 [doi]
- Reno: An RDMA-Enabled, Non-Volatile Memory-Optimized Key-Value StoreRulin Huang, Kaixin Huang, Jingyu Wang, Yuting Chen. 466-473 [doi]
- DoseGuide: A Graph-based Dynamic Time-aware Prediction System for Postoperative PainZiyi Zhou, Baoshen Guo, Cao Zhang. 474-481 [doi]
- Blockchain based Public Auditing Outsourcing for Cloud StorageYangfei Lin, Jie Li 0002, Shigetomo Kimura, Yongbing Zhang, Yusheng Ji, Yang Yang. 482-489 [doi]
- MobiEdge: Mobile Service Provisioning for Edge Clouds with Time-varying Service DemandsTao Wu 0001, Xiaochen Fan, Yuben Qu, Panlong Yang. 490-497 [doi]
- Traffic Congestion Prediction: A Spatial-Temporal Context Embedding and Metric Learning ApproachHongsheng Hao, Liang Wang, Zenggang Xia, Zhiwen Yu, Jianhua Gu, Ning Fu. 498-505 [doi]
- Efficient Implementation of Kyber on Mobile DevicesLirui Zhao, Jipeng Zhang, Junhao Huang, Zhe Liu 0001, Gerhard P. Hancke 0002. 506-513 [doi]
- Gain Without Pain: Enabling Real-time Environmental Perception on 2x Mobile Devices in Multiplayer Augmented RealityLiang Dong, Xinjun Cai, Zheng Yang 0002. 514-521 [doi]
- Building Agile Workflow Microservice System for HPC Applications Based on Fast-start OSvQiang Hu, Lixian Ma, En Shao, Guangming Tan. 522-529 [doi]
- Performance Analysis of Open-Source Hypervisors for Automotive SystemsZhengjun Zhang, Yanqiang Liu, Jiangtao Chen, Zhengwei Qi, Yifeng Zhang, Huai Liu. 530-537 [doi]
- Multi-Level IoT Device IdentificationRuohong Jiao, Zhe Liu 0001, Liang Liu, Chunpeng Ge, Gerhard P. Hancke 0002. 538-547 [doi]
- IAP: Instant Auditing Protocol for Anonymous PaymentsPing Zhong, Bo Wang, Anning Wang, Yiming Zhang, Shengyun Liu, Qikai Zhong, Xuping Tu. 548-555 [doi]
- BSDP: A Novel Balanced Spark Data PartitionerAibo Song, Bowen Peng, Jingyi Qiu, Yingying Xue, Mingyang Du. 556-566 [doi]
- Dynamic Path Based DNN Synergistic Inference Acceleration in Edge Computing EnvironmentMeng Zhou, Bowen Zhou, Huitian Wang, Fang Dong, Wei Zhao. 567-574 [doi]
- FerryLink: Combating Link Degradation for Practical LPWAN DeploymentsJing Yang, Zhenqiang Xu, Jiliang Wang. 575-582 [doi]
- Detection of Behavior Aging from Keystroke DynamicsYafang Yang, Bin Guo 0001, Yunji Liang, Zhiwen Yu 0001. 583-590 [doi]
- Constrained Multi-Agent Reinforcement Learning for Managing Electric Self-Driving TaxisZhaoxing Yang, Guiyun Fan, Haiming Jin. 591-598 [doi]
- Online Scheduling Unbiased Distributed Learning over Wireless Edge NetworksZiyi Han, Ruiting Zhou, Jinlong Pang, Yue Cao, Haisheng Tan. 599-606 [doi]
- Remove-Win: a Design Framework for Conflict-free Replicated Data TypesYuqi Zhang, Hengfeng Wei, Yu Huang 0002. 607-614 [doi]
- Enabling Conflict-free Collaborations with Cloud Storage ServicesMinghao Zhao 0001, Jian Chen, Zhenhua Li 0001. 615-621 [doi]
- Access Control and Anti-copy Scheme of Cloud Storage Data Based on BlockchainJunfeng Zhao, Lu Liu, Feng Liu. 622-628 [doi]
- ShadowDroid: Practical Black-box Attack against ML-based Android Malware DetectionJin Zhang, Chennan Zhang, Xiangyu Liu, Yuncheng Wang, Wenrui Diao, Shanqing Guo. 629-636 [doi]
- xRSA: Construct Larger Bits RSA on Low-Cost DevicesFan Dang 0001, Lingkun Li, Jiajie Chen. 637-643 [doi]
- Efficient Asynchronous GCN Training on a GPU ClusterYi Zhang, Dhrubajyoti Goswami. 644-651 [doi]
- Infinileap: Modern High-Performance Networking for Distributed Java Applications based on RDMAFilip Krakowski, Fabian Ruhland, Michael Schöttner. 652-659 [doi]
- MTPGait: Multi-person Gait Recognition with Spatio-temporal Information via Millimeter Wave RadarTao Li, Xu Cao, Haisong Liu, Chenqi Shi, Pengpeng Chen. 660-666 [doi]
- Post-Quantum User Authentication and Key Exchange Based on Consortium BlockchainShiwei Xu, Ao Sun, Xiaowen Cai, Zhengwei Ren, Yizhi Zhao, Jianying Zhou. 667-674 [doi]
- Review-Based Hierarchical Attention Model Trained with Random Back-Transfer for Cross-Domain RecommendationKuan Feng, Yanmin Zhu. 675-682 [doi]
- Modeling User Interest Changes with Dynamic Differential Graphs for Item RecommendationChengyu Zhu, Yanmin Zhu, Xuansheng Lu. 683-690 [doi]
- A User-related Semantic Location Privacy Protection Method In Location-based ServiceXudong Yang, Ling Gao, Hai Wang 0010, Yan Li, Jie Zheng 0005, Jipeng Xu, Yuhui Ma. 691-698 [doi]
- STGE: Sensor Topology and Graph Embedding Learning with Heterogeneous Smart EnvironmentXiao Wang, Sheng Zhang, Yi Pan, ZeYu Lin. 699-706 [doi]
- ECRaft: A Raft Based Consensus Protocol for Highly Available and Reliable Erasure-Coded Storage SystemsMingwei Xu, Yu Zhou, Yuanyuan Qiao, Kai Xu, Yu Wang, Jie Yang. 707-714 [doi]
- Enabling Auction-based Cross-Blockchain Protocol for Online Anonymous PaymentQian Zhang, Sheng Cao, Xiaosong Zhang. 715-722 [doi]
- Efficient Two-Dimensional Self-Stabilizing Byzantine Clock Synchronization in WALDENShaolin Yu, Jihong Zhu, Jiali Yang. 723-730 [doi]
- Boosting Byzantine Protocols in Large Sparse Networks with High System Assumption CoverageShaolin Yu, Jihong Zhu, Jiali Yang, Yulong Zhan. 731-738 [doi]
- Simulating Authenticated Broadcast in Networks of Bounded DegreeShaolin Yu, Jihong Zhu, Jiali Yang, Yue Ma. 739-746 [doi]
- GraFin: An Applicable Graph-based Fingerprinting Approach for Robust Indoor LocalizationHan Zheng, Yan Zhang, Lan Zhang, Hao Xia, Shaojie Bai, Guobin Shen, Tian He, Xiangyang Li 0001. 747-754 [doi]
- B-AUT: A Universal Architecture for Batch RFID Tags AuthenticationYinan Zhu, Chunhui Duan, Xuan Ding, Zheng Yang 0002. 755-762 [doi]
- Indoor sneezing and coughing detection based on COTS wireless deviceZhanjun Hao 0001, Daiyang Zhang, Yu Duan, Xiaochao Dang 0001. 763-772 [doi]
- Multi-Region Indoor Localization Based on WVP SystemLi Zhang, Yi Xu, Jinhui Bao, Qiuyu Wang, Jingao Xu, Danyang Li, Yaodong Yang, Min Zhang. 773-779 [doi]
- LinkStream: A Liquidity Modeling System on Large-Scale Video Stream in OilfieldHao Yuan, Qiang Ma, Zhe Hu, Xiaoxiang Li, Xu Wang, Zheng Yang. 780-787 [doi]
- IEdroid: Detecting Malicious Android Network Behavior Using Incremental Ensemble of EnsemblesCong Liu, Anli Yan, Zhenxiang Chen, Haibo Zhang 0001, Qiben Yan, Lizhi Peng, Chuan Zhao. 788-795 [doi]
- VSpace: Vehicle Spatially-Aware Sensing via Acoustic Doppler EffectHao Chen, Qiang Ma, Shenghong Chen, Xin Miao. 796-803 [doi]
- Simple yet Efficient Deployment of Scientific Applications in the CloudLeyi Sun, Yifan Zhuo, Olivier Marin. 804-811 [doi]
- Highly Scalable Parallel ChecksumsChristian Siebert. 812-818 [doi]
- Minimizing Play Request Rejection through Workload Splitting in Edge-Cloud GamingIryanto Jaya, Yusen Li, Wentong Cai 0001. 819-826 [doi]
- Load Balancing Optimization for Transformer in Distributed EnvironmentDelu Ma, Zhou Lei, Shengbo Chen, Peng Wang. 827-834 [doi]
- Wi-Fi Fingerprint Update for Indoor Localization via Domain AdaptationYu Tian, Jiankun Wang, Zenghua Zhao. 835-842 [doi]
- Collaborative Transmission over Intermediate Links in Duty-Cycle WSNsQianwu Chen, Xianjin Xia, Zhigang Li 0003, Yuanqing Zheng. 843-850 [doi]
- Dynamic Push for HTTP Adaptive Streaming with Deep Reinforcement LearningHaipeng Du, Danfu Yuan, Weizhan Zhang, Qinghua Zheng. 851-858 [doi]
- Underwater Real-time Video Transmission via Optical Channels with Swarms of AUVsXu Wang, Hanjiang Luo, Yuting Yang, Rukhsana Ruby, Kaishun Wu. 859-866 [doi]
- RGC: Reliable Gesture Classification via Wearables Using GANs-Based Data AugmentationHan Zhou, Ji Zhao, Yi Gao, Wei Dong 0001. 867-874 [doi]
- On Consensus Number 1 ObjectsPankaj Khanchandani, Jan Schäppi, Ye Wang, Roger Wattenhofer. 875-882 [doi]
- IndigoStore: Latency Optimized Distributed Storage Backend for Cloud-Scale Block StorageYichao Li, Li Wang, Fanfan Cheng, Ji Wu, Yiyun Zhang, Yiming Zhang. 883-890 [doi]
- SRPeek: Super Resolution Enabled Screen Peeking via COTS SmartphoneJialuo Du, Chenning Li, Zhenge Guo, Zhichao Cao. 891-898 [doi]
- IAAT: A Input-Aware Adaptive Tuning framework for Small GEMMJianyu Yao, Boqian Shi, Chunyang Xiang, Haipeng Jia, Chendi Li, Hang Cao, Yunquan Zhang. 899-906 [doi]
- Energy Efficient Wi-Fi Tethering through Fast Convergent Transmission Power AdaptationYu Zhang, Guoqiang Zhang, Wenjuan Zhao, Md Shazarul Alam, Ruiheng Xie. 907-914 [doi]
- Anchor-Free Self-Positioning in Wireless Sensor Networks via Cross-Technology CommunicationNan Jing, Bowen Zhang, Guannan Liu, Liu Yang, Lin Wang. 915-922 [doi]
- Joint Optimization of Auto-Scaling and Adaptive Service Placement in Edge ComputingYe Li, Haitao Zhang, Wei Tian, Huadong Ma. 923-930 [doi]
- Collaborative Framework of Cloud Transcoding and Distribution Supporting Cost-Efficient Crowdsourced Live StreamingJiannan Zheng, Haitao Zhang, Yilin Jin, Huadong Ma. 931-938 [doi]