IEEE International Conference on Computer Communications
29 April - 2 May 2019 // Paris, France

Accepted Paper List [Main Conference]

List of Accepted Papers in IEEE INFOCOM 2019 Main Conference

  1. A Blockchain based Witness Model for Trustworthy Cloud Service Level Agreement Enforcement
    Huan Zhou (University of Amsterdam, The Netherlands); Xue Ouyang (National University of Defense Technology, P.R. China); Zhijie Ren (Delft University of Technology, The Netherlands); Jinshu Su (National University of Defence Technology, P.R. China); Cees de Laat and Zhiming Zhao (University of Amsterdam, The Netherlands)
  2. A Business Model Analysis of Mobile Data Rewards
    Haoran Yu, Ermin Wei and Randall A Berry (Northwestern University, USA)
  3. A Collaborative Learning Based Approach for Parameter Configuration of Cellular Networks
    Jie Chuai and Zhitang Chen (Huawei Technologies, Hong Kong); Guochen Liu (Huawei Technologies, P.R. China); Xueying Guo and Xiaoxiao Wang (University of California, Davis, USA); Xin Liu (UC Davis, USA); Chongming Zhu and Feiyi Shen (Huawei Technologies, P.R. China)
  4. A Constant Approximation for Maximum Throughput Multicommodity Routing
    Mengxue Liu and Andrea Richa (Arizona State University, USA); Stefan Schmid (University of Vienna, Austria); Matthias Rost (TU Berlin, Germany)
  5. A Distributed Orchestration Algorithm for Edge Computing Resources with Guarantees
    Gabriele Castellano (Politecnico di Torino, Italy); Flavio Esposito (Saint Louis University, USA); Fulvio Risso (Politecnico di Torino, Italy)
  6. A Flexible Distributed Optimization Framework for Service of Concurrent Tasks in Processing Networks
    Zai Shi and Atilla Eryilmaz (The Ohio State University, USA)
  7. A General Model for Minimizing Age of Information at Network Edge for IoT Applications
    Chengzhang Li, Shaoran Li and Thomas Hou (Virginia Tech, USA)
  8. A Generic Technique for Sketches to Adapt to Different Counting Ranges
    Tong Yang, JiaQi Xu, Xilai Liu, Peng Liu and Lun Wang (Peking University, P.R. China); Jun Bi (Tsinghua University, P.R. China); XiaoMing Li (Peking University, P.R. China)
  9. A Holistic Model for Performance Prediction and Optimization on NUMA-based Virtualized Systems
    Jian Li, Jianmin Qian and Haibing Guan (Shanghai Jiao Tong University, P.R. China)
  10. A Near Optimal Reliable Composition Approach for Geo-Distributed Latency-Sensitive Service Chains
    Dmitrii Chemodanov and Prasad Calyam (University of Missouri-Columbia, USA); Flavio Esposito (Saint Louis University, USA)
  11. A Network-centric Framework for Auditing Recommendation Systems
    Abhisek Dash (Indian Institute of Technology, Kharagpur, India); Animesh Mukherjee (IIT Kharagpur, India); Saptarshi Ghosh (Indian Institute of Technology Kharagpur & IIEST Shibpur, India)
  12. A Practical Underlay Spectrum Sharing Scheme for Cognitive Radio Networks
    Pedram Kheirkhah Sangdeh, Hossein Pirayesh, Huacheng Zeng and Hongxiang Li (University of Louisville, USA)
  13. A Probabilistic framework to Node-level Anomaly Detection in Communication Networks
    Batiste Le Bars (Ecole Normale Supérieure Paris-Saclay & Sigfox Company, France); Argyris Kalogeratos (Ecole Normale Supérieure Paris-Saclay, France)
  14. A stack-vector routing protocol for automatic tunneling
    Mohamed Lamine Lamali and Simon Lassourreuille (Université de Bordeaux, France); Stephan Kunne (LRI, Université Paris-Sud, France); Johanne Cohen (LRI-CNRS & PRiSM-CNRS, France)
  15. A Truthful FPTAS Mechanism for Emergency Demand Response in Colocation Data Centers
    Jianhai Chen and Deshi Ye (Zhejiang University, P.R. China); Shouling Ji (Zhejiang University, P.R. China & Georgia Institute of Technology, USA); Qinming He (Zhejiang University, P.R. China); Yang Xiang (Swinburne University of Technology, Australia); Zhenguang Liu (National University of Singapore, Singapore)
  16. A Unified Sampling and Scheduling Approach for Status Update in Multiaccess Wireless Networks
    Zhiyuan Jiang, Sheng Zhou and Zhisheng Niu (Tsinghua University, P.R. China); Yu Cheng (Illinois Institute of Technology, USA)
  17. A Utility-driven Multi-Queue Admission Control Solution for Network Slicing
    Bin Han (Technische Universität Kaiserslautern, Germany); Vincenzo Sciancalepore (NEC Laboratories Europe GmbH, Germany); Di Feng (Université de Lausanne, Switzerland); Xavier Costa-Perez (NEC Laboratories Europe, Germany); Hans D. Schotten (University of Kaiserslautern, Germany)
  18. ACCEL: Accelerating the Bitcoin Blockchain for High-throughput, Low-latency Applications
    Adiseshu Hari (Bell Laboratories & Nokia, USA); Murali Kodialam (Nokia Bell Labs, USA); T. V Lakshman (Bell Labs, Nokia, USA)
  19. Access Strategies for Network Caching
    Itamar Cohen (Ben-Gurion University of the Negev, Israel); Gil Einziger (Ben-Gurion University Of The Negev, Israel); Roy Friedman (Technion, Israel); Gabriel Scalosub (Ben-Gurion University of the Negev, Israel)
  20. Achieving a Fully-Flexible Virtual Network Embedding in Elastic Optical Networks
    Nashid Shahriar, Sepehr Taeb and Shihabur Rahman Chowdhury (University of Waterloo, Canada); Massimo Tornatore (Politecnico di Milano & University of California, Davis, Italy); Raouf Boutaba (University of Waterloo, Canada); Jeebak Mitra and Mahdi Hemmati (Huawei Technologies Canada, Canada)
  21. Adaptive Interference-Aware VNF Placement for Service-Customized 5G Network Slices
    Qixia Zhang, Fangming Liu and Chaobing Zeng (Huazhong University of Science and Technology, P.R. China)
  22. Adaptive Multipath Routing based on Hybrid Data and Control Plane Operation
    Marcelo Pizzutti and Alberto E. Schaeffer-Filho (Federal University of Rio Grande do Sul (UFRGS), Brazil)
  23. Adaptive Path Tracing with Programmable Bloom Filters in Software-Defined Networks
    Sisi Xiong (University of Tennessee, Knoxville, USA); Qing Cao (University of Tennessee, USA); Weisheng Si (Western Sydney University, Australia)
  24. Adaptive User-managed Service Placement for Mobile Edge Computing: An Online Learning Approach
    Tao Ouyang, Rui Li, Xu Chen, Zhi Zhou and Xin Tang (Sun Yat-sen University, P.R. China)
  25. Addressing Skewness in Iterative ML Jobs with Parameter Partition
    Shaoqi Wang, Wei Chen and Xiaobo Zhou (University of Colorado, Colorado Springs, USA); Sang-Yoon Chang (University of Colorado Colorado Springs, USA); Mike Ji (University of Edinburgh, United Kingdom (Great Britain))
  26. Adjusting Matching Algorithm to Adapt to Workload Fluctuations in Content-based Publish/Subscribe Systems
    Shiyou Qian and Weichao Mao (Shanghai Jiao Tong University, P.R. China); Jian Cao (Shanghai Jiaotong University, P.R. China); Frederic Le Mouel (INRIA / INSA Lyon, France); Minglu Li (Shanghai Jiao Tong University, P.R. China)
  27. Age of Information-aware Scheduling for Timely and Scalable Internet of Things Applications
    Lorenzo Corneo, Christian Rohner and Per Gunningberg (Uppsala University, Sweden)
  28. Age Optimal Information Gathering and Dissemination on Graphs
    Vishrant Tripathi, Rajat Talak and Eytan Modiano (MIT, USA)
  29. Aloe: An Elastic Auto-Scaled and Self-stabilized Orchestration Framework for IoT Applications
    Subhrendu Chattopadhyay (Indian Institute of Technology Guwahati, India); Soumyajit Chatterjee (IIT Kharagpur, India); Sukumar Nandi (Indian Institute of Technology, Guwahati, India); Sandip Chakraborty (Indian Institute of Technology Kharagpur & CSE, India)
  30. ALS-P: Light Weight Visible Light Positioning via Ambient
    Zeyu Wang (Hong Kong University of Science and Technology, Hong Kong); Zhice Yang (ShanghaiTech University, P.R. China); Qianyi Huang, Lin Yang and Qian Zhang (Hong Kong University of Science and Technology, Hong Kong)
  31. An Online Market Mechanism for Edge Emergency Demand Response via Cloudlet Control
    Shutong Chen (Huazhong University of Science and Technology, P.R. China); Lei Jiao (University of Oregon, USA); Lin Wang (TU Darmstadt, Germany); Fangming Liu (Huazhong University of Science and Technology, P.R. China)
  32. Approximate Classifiers with Controlled Accuracy
    Vitalii Demianiuk and Kirill Kogan (IMDEA Networks Institute, Spain); Sergey I Nikolenko (Steklov Mathematical Institute at St Petersburg, Russia)
  33. APRIL: An Application-Aware, Predictive and Intelligent Load Balancing Solution for Data-Intensive Science
    Deepak Nadig, Byrav Ramamurthy, Brian Bockelman and David Swanson (University of Nebraska-Lincoln, USA)
  34. Auction-based Cache Trading for Scalable Videos in Multi-Provider Heterogeneous Networks
    Behrouz Jedari and Mario Di Francesco (Aalto University, Finland)
  35. Automating CSI Measurement with UAVs: from Problem Formulation to Energy-Optimal Solution
    Sixu Piao, Zhongjie Ba and Lu Su (State University of New York at Buffalo, USA); Dimitrios Koutsonikolas (University at Buffalo, SUNY, USA); Shi Li and Kui Ren (State University of New York at Buffalo, USA)
  36. Autonomous Environment Mapping Using Commodity Millimeter-wave Network Device
    Anfu Zhou and Shaoyuan Yang (Beijing University of Posts and Telecommunications, P.R. China); Yi Yang (Beijing University of Posts and Telecomunications, P.R. China); Yuhang Fan and Huadong Ma (Beijing University of Posts and Telecommunications, P.R. China)
  37. Balancing Cost and Dissatisfaction in Online EV Charging under Real-time Pricing
    Hanling Yi (The Chinese University of Hong Kong, Hong Kong); Qiulin Lin and Minghua Chen (The Chinese University of Hong Kong, P.R. China)
  38. Batch Reading Densely Arranged QR Codes
    Binyao Jiang, Yisheng Ji and Xiaohua Tian (Shanghai Jiao Tong University, P.R. China); Xinbing Wang (Shanghai Jiaotong University, P.R. China)
  39. Beyond Inferring Class Representatives: User-Level Privacy Leakage From Federated Learning
    Zhibo Wang and Mengkai Song (Wuhan University, P.R. China); Zhifei Zhang (University of Tennessee, USA); Yang Song (University of Tennessee, Knoxville, USA); Qian Wang (Wuhan University, P.R. China); Hairong Qi (the University of Tennessee, USA)
  40. Beyond Uniform Reverse Sampling: A Hybrid Sampling Technique for Misinformation Prevention
    Guangmo Tong (University of Delaware, USA); Ding-Zhu Du (University of Texas, Dallas, USA)
  41. Big Data Goes Small: Real-Time Spectrum-Driven Embedded Wireless Networking Through Deep Learning in the RF Loop
    Francesco Restuccia and Tommaso Melodia (Northeastern University, USA)
  42. Bonsai: Locality and Congestion Aware Fast Rerouting
    Klaus-Tycho Foerster (University of Vienna, Austria); Yvonne-Anne Pignolet (ABB Corporate Research, Dättwil, Switzerland); Gilles Tredan (LAAS-CNRS, France); Stefan Schmid (University of Vienna, Austria)
  43. Bootstrapping Accountability and Privacy to IPv6 Internet without Starting from Scratch
    Lin He, Gang Ren and Ying Liu (Tsinghua University, P.R. China)
  44. Bound-based Network Tomography with Additive Metrics
    Cuiying Feng (University of Victoria, Canada); Luning Wang (City University of Hong Kong, Hong Kong); Kui Wu (University of Victoria, Canada); Jianping Wang (City University of Hong Kong, Hong Kong)
  45. Brush like a Dentist: Accurate Monitoring of Toothbrushing via Wrist-Worn Gesture Sensing
    Chengwen Luo, Xingyu Feng, Junliang Chen and Jianqiang Li (Shenzhen University, P.R. China); Weitao Xu (University of New South Wales, Australia); Wei Li (The University of Sydney, Australia); Li Zhang (Alibaba Group, P.R. China); Zahir Tari (RMIT University, Australia); Albert Zomaya (The University of Sydney, Australia)
  46. Burstable Instances for Clouds: Performance Modeling, Equilibrium Analysis, and Revenue Maximization
    Yuxuan Jiang (The Hong Kong University of Science and Technology, Hong Kong); Mohammad Shahrad and David Wentzlaff (Princeton University, USA); Danny H.K. Tsang (HKUST, Hong Kong); Carlee Joe-Wong (Carnegie Mellon University, USA)
  47. Cache Network Management Using BIG Cache Abstraction
    Pariya Babaie, Eman Ramadan and Zhi-Li Zhang (University of Minnesota, USA)
  48. Calibrate: Frequency Estimation and Heavy Hitter Identification with Local Differential Privacy via Incorporating Prior Knowledge
    Jinyuan Jia and Neil Gong (Iowa State University, USA)
  49. Camul: Online Caching on Multiple Caches with Relaying and Bypassing
    Haisheng Tan (University of Science and Technology of China, P.R. China); Shaofeng H.-C. Jiang (Weizmann Institute of Science, Israel); Zhenhua Han, Liuyan Liu and Kai Han (University of Science and Technology of China, P.R. China); Qinglin Zhao (Macau University of Science and Technology, P.R. China)
  50. CapJack: Capture In-Browser Crypto-jacking by Deep Capsule Network through Behavioral Analysis
    Rui Ning, Cong Wang, ChunSheng Xin, Jiang Li, Liuwan Zhu and Hongyi Wu (Old Dominion University, USA)
  51. CBA: Contextual Quality Adaptation for Adaptive Bitrate Video Streaming
    Bastian Alt (Technische Universität Darmstadt, Germany); Trevor Ballard (University of Central Florida, USA); Ralf Steinmetz, Heinz Koeppl and Amr Rizk (Technische Universität Darmstadt, Germany)
  52. CellTradeMap: Delineating Trade Areas for Urban Commercial Districts with Cellular Networks
    Yi Zhao (Tsinghua University, P.R. China); Zimu Zhou (ETH Zurich, Switzerland); Xu Wang and Tongtong Liu (Tsinghua University, P.R. China); Yunhao Liu (Tsinghua University & The Hong Kong University of Science and Technology, P.R. China); Zheng Yang (Tsinghua University, P.R. China)
  53. CFHider: Control Flow Obfuscation with Intel SGX
    Yongzhi Wang (Xidian University, P.R. China & Park University, USA); Yulong Shen, Cuicui Su, Ke Cheng, Yibo Yang and ANter Faree (Xidian University, P.R. China); Yao Liu (University of South Florida, USA)
  54. CG4SR: Near Optimal Traffic Engineering for Segment Routing with Column Generation
    Mathieu Jadin and François Aubry (Université Catholique de Louvain, Belgium); Pierre Schaus (UCLouvain, Belgium); Olivier Bonaventure (Université catholique de Louvain, Belgium)
  55. Channel Independent Wi-Fi Backscatter Networks
    Taekyung Kim and Wonjun Lee (Korea University, Korea)
  56. Charging Oriented Sensor Placement and Flexible Scheduling in Rechargeable WSN
    Tao Wu (Army Engineering University, P.R. China); Panlong Yang (University of Science and Technology of China, P.R. China); Haipeng Dai (Nanjing University & State Key Laboratory for Novel Software Technology, P.R. China); Wanru Xu (Army Engineering University of PLA, P.R. China); Mingxue Xu (University of Science and Technology of China, P.R. China)
  57. Client Pre-Screening for MU-MIMO in Commodity 802.11ac Networks via Online Learning
    Shi Su (Rice University, USA); Wai-Tian Tan, Xiaoqing Zhu and Rob Liston (Cisco Systems, USA)
  58. CoDoC: A Novel Attack for Wireless Rechargeable Sensor Networks through Denial of Charge
    Chi Lin and Zhi Shang (Dalian University of Technology, P.R. China); Wan Du (University of California, Merced, USA); Jiankang Ren, Lei Wang and Guowei WU (Dalian University of Technology, P.R. China)
  59. Collaborated Tasks-driven Mobile Charging and Scheduling: A Near Optimal Result
    Tao Wu (Army Engineering University, P.R. China); Panlong Yang (University of Science and Technology of China, P.R. China); Haipeng Dai (Nanjing University & State Key Laboratory for Novel Software Technology, P.R. China); Wanru Xu (Army Engineering University of PLA, P.R. China); Mingxue Xu (University of Science and Technology of China, P.R. China)
  60. Collaborative Client-Side DNS Cache Poisoning Attack
    Fatemah Alharbi (University of California, Riverside & Taibah University, USA); Jie Chang (LinkSure Network, P.R. China); Yuchen Zhou (Northeastern University, USA); Feng Qian (Indiana University, USA); Zhiyun Qian and Nael Abu-Ghazaleh (University of California, Riverside, USA)
  61. Collaborative Validation of Public-Key Certificates for IoT by Distributed Caching
    Minmei Wang (University of California, Santa Cruz, USA); Chen Qian (University of California at Santa Cruz, USA); Xin Li (University of California Santa Cruz, USA); Shouqian Shi (University of California, Santa Cruz, USA)
  62. Combinatorial Sleeping Bandits with Fairness Constraints
    Fengjiao Li (Temple University, USA); Jia Liu (Iowa State University, USA); Bo Ji (Temple University, USA)
  63. Compressed Distributed Gradient Descent: Communication-Efficient Consensus over Networks
    Xin Zhang, Jia Liu and Zhengyuan Zhu (Iowa State University, USA); Elizabeth Serena Bentley (AFRL, USA)
  64. Computing Blocking Probabilities in Elastic Optical Networks with Spectrum Defragmentation
    Sandeep Kumar Singh (TU Braunschweig, Germany); Admela Jukan (Technische Universität Carolo-Wilhelmina zu Braunschweig, Germany)
  65. Consortiums of ISP-Content Providers Formed by Nash Bargaining for Internet Content Delivery
    Debasis Mitra (Columbia University, USA); Abhinav Sridhar (Columbia University and Qualcomm, USA)
  66. Corking by Forking: Vulnerability Analysis of Blockchain
    Shengling Wang and Chenyu Wang (Beijing Normal University, P.R. China); Qin Hu (The George Washington University, USA)
  67. Countering Cryptojacking and Parasitic Miners on the Web
    Rashid Tahir (University of Illinois at Urbana Champaign, USA); Sultan Durrani (Lahore University of Management Sciences, Pakistan); Faizan Ahmad (FAST National University Lahore, Pakistan); Hammas Saeed (Lahore University of Management Sciences, Pakistan); Fareed Zaffar (LUMS, Pakistan); Muhammad Saqib Ilyas (National University of Computer and Emerging Sciences, Pakistan)
  68. Counterintuitive Characteristics of Optimal Distributed LRU Caching Over Unreliable Channels
    Guocong Quan, Jian Tan and Atilla Eryilmaz (The Ohio State University, USA)
  69. CRF: Coexistent Routing and Flooding using WiFi Packets in Heterogeneous IoT Networks
    Wei Wang and Xin Liu (University of Maryland, USA); Yao Yao (University of Maryland Baltimore County, USA); Yan Pan (Northwestern Polytechnical University, P.R. China); Zicheng Chi and Ting Zhu (University of Maryland, Baltimore County, USA)
  70. Cross-Network Prioritized Sharing: An Added Value MVNO's Perspective
    Yining Zhu, Haoran Yu, Randall A Berry and Chang Liu (Northwestern University, USA)
  71. Crowd-Flow Graph Construction and Identification with Spatio-Temporal Signal Feature Fusion
    Suining He (The Hong Kong University of Science and Technology, P.R. China); Kang Shin (University of Michigan, USA)
  72. D2D Offloading for Statistical QoS Provisionings Over 5G Multimedia Mobile Wireless Networks
    Xi Zhang (Texas A&M University, USA); Qixuan Zhu (Texas A&M University, USA)
  73. D3-Guard: Acoustic-based Drowsy Driving Detection Using Smartphones
    Yadong Xie, Fan Li, Yue Wu and Song Yang (Beijing Institute of Technology, P.R. China); Yu Wang (University of North Carolina at Charlotte, USA)
  74. Data-Intensive Routing in Delay-Tolerant Networks
    Kazuya Sakai (Tokyo Metropolitan University, Japan); Min-Te Sun (National Central University, Taiwan); Wei-Shinn Ku (Auburn University, USA)
  75. Dedas: Online Task Dispatching and Scheduling with Bandwidth Constraint in Edge Computing
    Jiaying Meng, Haisheng Tan, Chao Xu, Wanli Cao, Liuyan Liu and Bojie Li (University of Science and Technology of China, P.R. China)
  76. Deep Learning-based Job Placement in Distributed Machine Learning Clusters
    Yixin Bao, Yanghua Peng and Chuan Wu (The University of Hong Kong, Hong Kong)
  77. DeepCog: Cognitive Network Management in Sliced 5G Networks with Deep Learning
    Dario Bega (IMDEA Networks, Spain); Marco Gramaglia (Universidad Carlos III de Madrid, Spain); Marco Fiore (National Research Council of Italy, Italy); Albert Banchs (Universidad Carlos III de Madrid, Spain); Xavier Costa-Perez (NEC Laboratories Europe, Germany)
  78. DeepTMA: Predicting Effective Contention Models for Network Calculus using Graph Neural Networks
    Fabien Geyer (Technical University of Munich, Germany); Steffen Bondorf (NTNU Trondheim, Norway)
  79. Demand-Aware Network Design with Minimal Congestion and Route Lengths
    Chen Avin (Ben-Gurion University of the Negev, Israel); Kaushik Mondal (Ben Gurion University of the Negev, Israel); Stefan Schmid (University of Vienna, Austria)
  80. Detecting Anomaly in Large-scale Network using Mobile Crowdsourcing
    Yang Li (Shanghai Jiaotong University, P.R. China); Jiachen Sun, Wenguang Huang and Xiaohua Tian (Shanghai Jiao Tong University, P.R. China)
  81. Detecting Network Disruptions At Colocation Facilities
    Alexandros Milolidakis (University of Crete, Greece); Romain Fontugne (Internet Initiative Japan Inc., Japan); Xenofontas Dimitropoulos (University of Crete / FORTH, Greece)
  82. Detecting Vulnerable Android Inter-App Communication in Dynamically Loaded Code
    Mohannad Alhanahnah, Qiben Yan and Hamid Bagheri (University of Nebraska-Lincoln, USA); Hao Zhou (The Hong Kong Polytechnic University, USA); Yutaka Tsutano (University of Nebraska-Lincoln, USA); Witawas Srisa-an (University of Nebraska, USA); Xiapu Luo (The Hong Kong Polytechnic University, Hong Kong)
  83. Differentially-Private Deep Learning from an Optimization Perspective
    Liyao Xiang, Jingbo Yang and Baochun Li (University of Toronto, Canada)
  84. Differentially-Private Incentive Mechanism for Crowdsourced Radio Environment Map Construction
    Yidan Hu and Rui Zhang (University of Delaware, USA)
  85. Differentially-Private Two-Party Egocentric Betweenness Centrality
    Leyla Roohi (The University of Melbourne, Australia); Benjamin Rubinstein (University of Melbourne, Australia); Vanessa Teague (The University of Melbourne, Australia)
  86. Discrete-Time Modeling of NFV Accelerators that Exploit Batched Processing
    Stanislav Lange (University of Wuerzburg, Germany); Leonardo Linguaglossa (Telecom ParisTech, France); Stefan Geissler (University of Würzburg, Germany); Dario Rossi (Telecom ParisTech, France); Thomas Zinner (TU Berlin, Germany)
  87. Disentangled Network Alignment with Matching Explainability
    Fan Zhou and Zijing Wen (University of Electronic Science and Technology of China, P.R. China); Goce Trajcevski (Iowa State University, USA); Kunpeng Zhang (University of Maryland, USA); Ting Zhong and Fang Liu (University of Electronic Science and Technology of China, P.R. China)
  88. Distributed Energy-Adaptive Aggregation Scheduling with Coverage Guarantee For Battery-Free Wireless Sensor Networks
    Kunyi Chen (Harbin Institute of Technology, P.R. China); Hong Gao (University of Harbin Institute Technology, P.R. China); Zhipeng Cai (Georgia State University, USA); Quan Chen (Guangdong University of Technology, P.R. China); Jianzhong Li (Harbin Institute of Technology, P.R. China)
  89. Distributed Learning and Optimal Assignment in Multiplayer Heterogeneous Networks
    Harshvardhan Tibrewal (Indian Institute of Technology Bombay, India); Sravan Patchala (Indian Institute of Technolofgy, Bombay, India); Manjesh K Hanawal (Indian Institute of Technology Bombay, India); Sumit Jagdish Darak (IIIT-Delhi, India)
  90. Distributed Machine Learning with a Serverless Architecture
    Hao Wang (University of Toronto, Canada); Di Niu (University of Alberta, Canada); Baochun Li (University of Toronto, Canada)
  91. Distributed Self-Adjusting Tree Networks
    Bruna Soares Peres, Otavio Augusto de Oliveira Souza and Olga Goussevskaia (UFMG, Brazil); Chen Avin (Ben-Gurion University of the Negev, Israel); Stefan Schmid (University of Vienna, Austria)
  92. Doppler Radar with In-Band Full Duplex Radios
    Seyed Ali Hassani (KU Leuven, Belgium); Karthick Parashar, Andre Bourdoux and Barend van Liempd (IMEC, Belgium); Sofie Pollin (KU Leuven, Belgium)
  93. DRL360: 360-degree Video Streaming with Deep Reinforcement Learning
    Yuanxing Zhang (School of EECS, Peking University, P.R. China); Pengyu Zhao and Kaigui Bian (Peking University, P.R. China); Yunxin Liu (Microsoft Research Asia, P.R. China); Lingyang Song and XiaoMing Li (Peking University, P.R. China)
  94. Dynamic Adaptive DNN Surgery for Inference Acceleration on the Edge
    Chuang Hu (The Hong Kong Polytechnic University, Hong Kong); Wei Bao (The University of Sydney, Australia); Dan Wang and Fengming Liu (The Hong Kong Polytechnic University, Hong Kong)
  95. Dynamic Mobility-Aware Interference Avoidance for Aerial Base Stations in Cognitive Radio Networks
    Ali Rahmati (North Carolina State University, USA); Xiaofan He (Lamar University, USA); Ismail Güvenç (North Carolina State University, USA); Huaiyu Dai (NC State University, USA)
  96. Dynamic Multicast Traffic Engineering with Efficient Rerouting for Software-Defined Networks
    Jian-Jhih Kuo (National Chung Cheng University, Taiwan); Sheng-Hao Chiang (Academia Sinica, Taiwan); Shan-Hsiang Shen (National Taiwan University of Science and Technology, Taiwan); De-Nian Yang (Academia Sinica, Taiwan); Wen-Tsuen Chen (National Tsing Hua University, Taiwan)
  97. Dynamic Pricing and Capacity Allocation of UAV-provided Mobile Services
    Xuehe Wang (Singapore University of Technology and Design, Singapore); Lingjie Duan (Singapore University of Technology and Design (SUTD), Singapore)
  98. Dynamic Spectrum Management in 5G Wireless Networks: A Real-Life Modeling Approach
    Panagiotis Vamvakas (National Technical University of Athens, Greece); Eirini Eleni Tsiropoulou (University of New Mexico, USA); Symeon Papavassiliou (ICCS/National Technical University of Athens, Greece)
  99. Dynamic Task Pricing in Multi-Requester Mobile Crowd Sensing with Markov Correlated Equilibrium
    Haiming Jin (Shanghai Jiao Tong University, P.R. China); Hongpeng Guo (The University of Illinois at Urbana-Champaign, USA); Lu Su (State University of New York at Buffalo, USA); Klara Nahrstedt (University of Illinois, USA); Xinbing Wang (Shanghai Jiaotong University, P.R. China)
  100. Economic Viability of Data Trading with Rollover
    Zhiyuan Wang (The Chinese University of Hong Kong, Hong Kong); Lin Gao (Harbin Institute of Technology (Shenzhen), P.R. China); Jianwei Huang (The Chinese University of Hong Kong, Hong Kong); Biying Shou (City University of Hong Kong, Hong Kong)
  101. EE-IoT: An Energy-Efficient IoT Communication Scheme for WLANs
    Hossein Pirayesh, Pedram Kheirkhah Sangdeh and Huacheng Zeng (University of Louisville, USA)
  102. Efficient Indexing Mechanism for Unstructured Data Sharing Systems in Edge Computing
    Junjie Xie (National University of Defense Technology, P.R. China); Chen Qian (University of California at Santa Cruz, USA); Deke Guo (National University of Defense Technology, P.R. China); Minmei Wang and Shouqian Shi (University of California, Santa Cruz, USA); Honghui Chen (National University of Defense Technology, P.R. China)
  103. Efficient Online Resource Allocation in Heterogeneous Clusters with Machine Variability
    Huanle Xu (Dongguan University of Technology, P.R. China); Yang Liu and Wing Cheong Lau (The Chinese University of Hong Kong, Hong Kong); Jun Guo (Dongguan University of Technology, P.R. China); Alex X. Liu (Michigan State University, USA)
  104. Efficient systematic testing of network protocols with temporal uncertain events
    Minh Vu, Lisong Xu, Sebastian Elbaum and Wei Sun (University of Nebraska-Lincoln, USA); Kevin Qiao (University of Maryland, USA)
  105. Efficiently Inferring Top-k Elephant Flows based on Discrete Tensor Completion
    Kun Xie (State University of New York at Stony Brook, USA); Jiazheng Tian (Stony Brook University, P.R. China); Xin Wang (Stony Brook University, USA); Gaogang Xie (Institute of Computing Technology, Chinese Academy of Sciences, P.R. China); Jigang Wen (Chinese Academy of Science & Institute of Computing Technology, P.R. China); Dafang Zhang (Hunan University, P.R. China)
  106. Embracing Tag Collisions: Acquiring Bloom Filters across RFIDs in Physical Layer
    Zhenlin An and Qiongzheng Lin (The Hong Kong Polytechnic University, Hong Kong); Lei Yang (The Hong Kong Polytechnic University, P.R. China); Wei Lou (The Hong Kong Polytechnic University, Hong Kong)
  107. Enabling Cross-Technology Coexistence for Extremely Weak Wireless Devices
    Ruirong Chen and Wei Gao (University of Pittsburgh, USA)
  108. Enhancing Cellular Performance via Vehicular-based Opportunistic Relaying and Load Balancing
    Saadallah Kassir and Gustavo de Veciana (The University of Texas at Austin, USA); Nannan Wang, Xi Wang and Paparao Palacharla (Fujitsu Laboratories of America, USA)
  109. Entrapment for Wireless Eavesdroppers
    Song Fang (University of Oklahoma); Tao Wang, Yao Liu, Shangqing Zhao and Zhuo Lu (University of South Florida, USA)
  110. Evolving Knowledge Graphs
    Jiaqi Liu, Qin Zhang and Luoyi Fu (Shanghai Jiao Tong University, P.R. China); Xinbing Wang (Shanghai Jiaotong University, P.R. China); Songwu Lu (University of California at Los Angeles, USA)
  111. EVSO: Environment-aware Video Streaming Optimization of Power Consumption
    Kyoungjun Park and Myungchul Kim (KAIST, Korea)
  112. Experiences Implementing Live VM Migration over the WAN with Multi-Path TCP
    Franck Le (IBM T. J. Watson, USA); Erich Nahum (IBM T. J. Watson Research Center, USA)
  113. F-ID: Function Modeling-based Data-Independent and Channel-Robust Physical-Layer Identification
    Tianhang Zheng (University at Buffalo, USA); Zhi Sun and Kui Ren (State University of New York at Buffalo, USA)
  114. Fair Rate Allocation over A Generalized Symmetric Polymatroid with Box Constraints
    Peng-Jun Wan (Illinois Institute of Technology, USA); Zhu Wang (State University of New York at Oneonta, USA); Huaqiang Yuan (Dongguan University of Technology, P.R. China); Jinling Zhang (Renmin University of China, P.R. China); Xufei Mao (Tsinghua University, P.R. China)
  115. Fast Distributed Backbone Construction Despite Strong Adversarial Jamming
    Yifei Zou (The University of Hong Kong, Hong Kong); Dongxiao Yu (Shandong University, P.R. China); Libing Wu (Wuhan University, P.R. China); Jiguo Yu (Qufu Normal University, P.R. China); Yu Wu (Dongguan University of Technology, Hong Kong); Qiang-Sheng Hua (Huazhong University of Science and Technology, P.R. China); Francis C.M. Lau (The University of Hong Kong, Hong Kong)
  116. Faster Placement of Virtual Machines through Adaptive Caching
    Gil Einziger (Ben-Gurion University Of The Negev, Israel); Maayan Goldstein and Yaniv Sa'ar (Nokia Bell Labs, Israel)
  117. FAVE: A fast and efficient network Flow AVailability Estimation method with bounded relative error
    Tingwei Liu (The Chinese University of Hong Kong, Hong Kong); John Chi Shing Lui (Chinese University of Hong Kong, Hong Kong)
  118. Federated Learning over Wireless Networks: Optimization Model Design and Analysis
    Nguyen H. Tran and Wei Bao (The University of Sydney, Australia); Minh N. H. Nguyen and Choong Seon Hong (Kyung Hee University, Korea); Albert Zomaya (The University of Sydney, Australia)
  119. Figment: Fine-grained Permission Management for Mobile Apps
    Ioannis Gasparis, Zhiyun Qian, Chengyu Song and Srikanth V. Krishnamurthy (University of California, Riverside, USA); Rajiv Gupta (UC, Riverside, USA); Paul Yu (Army Research Laboratory, USA)
  120. Fog-based Data Offloading in Urban IoT Scenarios
    Pranvera Kortoçi (Aalto University, Finland); Liang Zheng (Princeton University, USA); Carlee Joe-Wong (Carnegie Mellon University, USA); Mario Di Francesco (Aalto University, Finland); Mung Chiang (Purdue University, USA)
  121. FS-Net: A Flow Sequence Network For Encrypted Traffic Classification
    Chang Liu (Institute of Information Engineering, Chinese Academy of Sciences, P.R. China); He Longtao (CNCERT/CC, P.R. China); Gang Xiong, Zigang Cao and Zhen Li (Institute of Information Engineering, Chinese Academy of Sciences, P.R. China)
  122. GCN-GAN: A Non-linear Temporal Link Prediction Model for Weighted Dynamic Networks
    Kai Lei (Peking University, P.R. China); Meng Qin (School of Electronics and Computer Engineering, Peking University, P.R. China); Bo Bai (Huawei Technologies Co., Ltd., Hong Kong); Gong Zhang (Huawei Research, P.R. China); Min Yang (Shenzhen Institutes of Advanced Technology (SIAT), Chinese Academy of Sciences, P.R. China)
  123. Hardening Database Padding for Searchable Encryption
    Lei Xu (Nanjing University of Science and Technology, P.R. China); Xingliang Yuan (Monash University, Australia); Cong Wang (City University of Hong Kong, Hong Kong); Qian Wang (Wuhan University, P.R. China); Chungen Xu (Nanjing University of Science and Technology, P.R. China)
  124. Hetero-Edge: Orchestration of Real-time Vision Applications on Heterogeneous Edge Clouds
    Wuyang Zhang, Sugang Li and Luyang Liu (Rutgers University, USA); Zhenhua Jia (WINLAB, Rutgers University, USA); Yanyong Zhang and Dipankar Raychaudhuri (Rutgers University, USA)
  125. Hide and Seek: A Defense Against Off-sensing Attack in Cognitive Radio Networks
    Moinul Hossain and Linda Jiang Xie (University of North Carolina at Charlotte, USA)
  126. HideMe: Privacy-Preserving Photo Sharing on Social Networks
    Fenghua Li (State Key Laboratory of Information Security, Institute of Information Engineering, CAS, P.R. China); Zhe Sun (Institute of Information Engineering, Chinese Academy of Sciences & School of Cyber Security, University of Chinese Academy of Sciences, P.R. China); Ang Li (University of Arkansas, USA); Ben Niu (Institute of Information Engineering, Chinese Academy of Sciences, P.R. China); Hui Li (Xidian University, P.R. China); Guohong Cao (The Pennsylvania State University, USA)
  127. Hiding Data in Plain Sight: Undetectable Wireless Communications Through Pseudo-Noise Asymmetric Shift Keying
    Salvatore D'Oro, Francesco Restuccia and Tommaso Melodia (Northeastern University, USA)
  128. Hierarchical Multi-resource Fair Queueing for Network Function Virtualization
    Chaoqun You (University of Electronic Science and Technology of China, P.R. China)
  129. How Powerful Switches Should be Deployed: A Precise Estimation Based on Queuing Theory
    Gengbiao Shen (Tsinghua University, P.R. China); Qing Li (Southern University of Science and Technology, P.R. China); Shuo Ai (Tsinghua University, P.R. China); Yong Jiang (Graduate School at Shenzhen, Tsinghua University, P.R. China); Mingwei Xu and Xuya Jia (Tsinghua University, P.R. China)
  130. How to Earn Money in Live Streaming Platforms? — A Study of Donation-Based Markets
    Ming Tang and Jianwei Huang (The Chinese University of Hong Kong, Hong Kong)
  131. Hurts to Be Too Early: Benefits and Drawbacks of Communication in Multi-Agent Learning
    Parinaz Naghizadeh (Purdue University, USA); Maria Gorlatova (Duke University, USA); Andrew Lan (Princeton University, USA); Mung Chiang (Purdue University, USA)
  132. HyCloud: Tweaking Hybrid Cloud Storage Services for Cost-Efficient Filesystem Hosting
    Jinlong E (Nanyang Technological University, Singapore); Yong Cui, Mingkang Ruan and Zhenhua Li (Tsinghua University, P.R. China); Ennan Zhai (Yale University, USA)
  133. Hysteresis-based Active Queue Management for TCP Traffic in Data Centers
    Ahmed M. Abdelmoniem (Faculty of Computers and Information, Assiut University, Egypt & Hong Kong University of Science and Technology, Hong Kong); Brahim Bensaou (The Hong Kong University of Science and Technology, Hong Kong)
  134. If You Do Not Care About It, Sell It: Trading Location Privacy in Mobile Crowd Sensing
    Wenqiang Jin, Mingyan Xiao and Ming Li (University of Texas at Arlington, USA); Linke Guo (Binghamton University, USA)
  135. iLPS: Local Positioning System with Simultaneous Localization and Wireless Communication
    Mingyu Yang, Karan Suri, Li-Xuan Chuo, Hao Zheng, Lu Liu and Hun Seok Kim (University of Michigan, USA)
  136. ImgSensingNet: UAV Vision Guided Aerial-Ground Air Quality Sensing System
    Yuzhe Yang, Zhiwen Hu, Kaigui Bian and Lingyang Song (Peking University, P.R. China)
  137. Impact of Network Topology on the Performance of DML: Theoretical Analysis and Practical Factors
    Shuai Wang, Dan Li, Jinkun Geng, Yue Gu and Yang Cheng (Tsinghua University, P.R. China)
  138. Incentivizing Relay Participation for Securing IoT Communication
    Xiaonan Zhang, Pei Huang and Linke Guo (Binghamton University, USA); Mo Sha (State University of New York at Binghamton, USA)
  139. Incrementally-deployable Indoor Navigation with Automatic Trace Generation
    Yuanchao Shu (Microsoft Research, USA); Zhuqi Li (Princeton University, USA); Börje Karlsson (Microsoft Research, P.R. China); Yiyong Lin (Microsoft, P.R. China); Thomas Moscibroda (Microsoft Research, USA); Kang Shin (University of Michigan, USA)
  140. Individual Data Plan in Virtual Network Operation: A Proactive Matching Approach
    Zihan Wang, Yuan Zhuang, Zhi Wang and Xin Wu (Tsinghua University, P.R. China)
  141. INT-path: Towards Optimal Path Planning for In-band Network-Wide Telemetry
    Tian Pan and Song Enge (Beijing University of Posts and Telecommunications, P.R. China); Zizheng Bian (BUPT, P.R. China); Xingchen Lin (Beijing University of Posts and Telecommunications, P.R. China); Xiaoyu Peng (BUPT, P.R. China); Jiao Zhang and Tao Huang (Beijing University of Posts and Telecommunications, P.R. China); Bin Liu (Tsinghua University, P.R. China); Yunjie Liu (Beijing University of Posts and Telecommunications, P.R. China)
  142. Intelligent Edge-Assisted Crowdcast with Deep Reinforcement Learning for Personalized QoE
    Fangxin Wang and Cong Zhang (Simon Fraser University, Canada); Feng Wang (University of Mississippi, USA); Jiangchuan Liu and Yifei Zhu (Simon Fraser University, Canada); Haitian Pang and Lifeng Sun (Tsinghua University, P.R. China)
  143. Interference Recycling: Exploiting Interfering Signals to Enhance Data Transmission
    Zhao Li and Jie Chen (Xidian University, P.R. China); Kang G. Shin (University of Michigan, USA); Jia Liu (National Institute of Informatics, Japan)
  144. Interference-aware User Grouping Strategy in NOMA Systems with QoS Constraints
    Fengqian Guo, Hancheng Lu, Daren Zhu and Hao Wu (University of Science and Technology of China, P.R. China)
  145. Joint Antenna Allocation and Link Scheduling in FlexRadio Networks
    Zhenzhi Qian (The Ohio State University, USA); Yang Yang (Qualcomm Corporate Research and Development, USA); Kannan Srinivasan and Ness B. Shroff (The Ohio State University, USA)
  146. Joint Content Distribution and Traffic Engineering of Adaptive Videos in Telco-CDNs
    Khaled Diab and Mohamed Hefeeda (Simon Fraser University, Canada)
  147. Joint Offloading Decision and Resource Allocation with Uncertain Task Computing Requirement
    Nima Eshraghi and Ben Liang (University of Toronto, Canada)
  148. Joint Placement and Allocation of Virtual Network Functions with Budget and Capacity Constraints
    Gamal Sallam and Bo Ji (Temple University, USA)
  149. Joint Service Placement and Request Routing in Multi-cell Mobile Edge Computing Networks
    Konstantinos Poularakis (Yale University, USA); Jaime Llorca (Nokia Bell Labs, USA); Antonia Tulino (Bell Labs, USA & Università Federico II, Italy); Ian Taylor (Cardiff University, United Kingdom (Great Britain)); Leandros Tassiulas (Yale University, USA)
  150. Keeping Context In Mind: Automating Mobile App Access Control with User Interface Inspection
    Hao Fu (University of California, Davis, USA); Zizhan Zheng (Tulane University, USA); Sencun Zhu (The Pennsylvania State University, USA); Prasant Mohapatra (University of California, Davis, USA)
  151. Kelly Cache Networks
    Milad Mahdian, Armin Moharrer, Stratis Ioannidis and Edmund Yeh (Northeastern University, USA)
  152. KeyListener: Inferring Keystrokes on QWERTY Keyboard of Touch Screen through Acoustic Signals
    Li Lu and Jiadi Yu (Shanghai Jiao Tong University, P.R. China); Yingying Chen (Rutgers University, USA); Yanmin Zhu, Xiangyu Xu, Guangtao Xue and Minglu Li (Shanghai Jiao Tong University, P.R. China)
  153. Label-Less: A Semi-automatic Labeling Tool for KPI Anomalies
    Nengwen Zhao and Jing Zhu (Tsinghua University, P.R. China); Rong Liu (Stevens Institute of Technology, USA); Dapeng Liu (BizSeer, P.R. China); Ming Zhang (China Constrution Bank, P.R. China); Dan Pei (Tsinghua University, P.R. China)
  154. Large-Scale Network Utility Maximization: Countering Exponential Growth with Exponentiated Gradients
    Luigi Vigneri (Huawei Technologies & Université Grenoble Alpes, France); Georgios S. Paschos (Huawei Technologies, France); Panayotis Mertikopoulos (French National Center for Scientific Research (CNRS) & Laboratoire d'Informatique de Grenoble, France)
  155. LEAP: Location Estimation and Predictive Handover with Consumer-Grade mmWave Devices
    Joan Palacios and Paolo Casari (IMDEA Networks Institute, Spain); Hany Assasa (IMDEA Networks Institute & Universidad Carlos III de Madrid, Spain); Joerg Widmer (IMDEA Networks Institute, Spain)
  156. Learning Network Traffic Dynamics Using Temporal Point Process
    Avirup Saha (IIT Kharagpur, India); Niloy Ganguly (Indian Institute of Technology Kharagpur, India); Sandip Chakraborty (Indian Institute of Technology Kharagpur & CSE, India); Abir De (MPI-SWS, Germany)
  157. Learning the Optimal Synchronization Rates in Distributed SDN Control Architectures
    Konstantinos Poularakis and Qiaofeng Qin (Yale University, USA); Liang Ma (IBM TJ Watson Research Center, USA); Sastry Kompella (Naval Research Laboratory, USA); Kin K. Leung (Imperial College, United Kingdom (Great Britain)); Leandros Tassiulas (Yale University, USA)
  158. Learning to Cache With no Regrets
    Georgios S. Paschos (Huawei Technologies, France); Apostolos Destounis (Huawei Technologies France Research Center, France); Luigi Vigneri (Huawei Technologies & Université Grenoble Alpes, France); George Iosifidis (Trinity College Dublin, Ireland)
  159. LEGO-Fi: Transmitter-Transparent CTC with Cross-Demapping
    Xiuzhen Guo and Yuan He (Tsinghua University, P.R. China); Xiaolong Zheng (Beijing University of Posts and Telecommunications, P.R. China); Zihao Yu (Tsinghua University, P.R. China); Yunhao Liu (Tsinghua University & The Hong Kong University of Science and Technology, P.R. China)
  160. LiBeam: Throughput-Optimal Cooperative Beamforming for Indoor Visible Light Networks
    Nan Cen, Neil Dave and Emrecan Demirors (Northeastern University, USA); Zhangyu Guan (University at Buffalo, USA); Tommaso Melodia (Northeastern University, USA)
  161. Lightweight Flow Distribution for Collaborative Traffic Measurement in Software Defined Networks
    Hongli Xu (University of Science and Technology of China, P.R. China); Shigang Chen (University of Florida, USA); Qianpiao Ma and Liusheng Huang (University of Science and Technology of China, P.R. China)
  162. Link Rate Selection using Constrained Thompson Sampling
    Harsh Gupta (University of Illinois at Urbana-Champaign, USA); Atilla Eryilmaz (The Ohio State University, USA); R. Srikant (University of Illinois at Urbana-Champaign, USA)
  163. Live Migration Ate My VM: Recovering a Virtual Machine After Failure of Post-Copy Live Migration
    Dinuni Fernanado and Jonathan Terner (Binghamton University, USA); Kartik Gopalan (State University of New York at Binghamton, USA); Ping Yang (Binghamton University, USA)
  164. Load Balancing for Interdependent IoT Microservices
    Ruozhou Yu, Vishnu Teja Kilari and Guoliang Xue (Arizona State University, USA); Dejun Yang (Colorado School of Mines, USA)
  165. Looking Glass of NFV: Inferring the Structure and State of NFV Network from External Observations
    Yilei Lin (Pennsylvania State University, USA); Ting He (Penn State University, USA); Shiqiang Wang (IBM T. J. Watson Research Center, USA); Kevin S Chan (US Army Research Laboratory, USA); Stephen Pasteris (University College London, United Kingdom (Great Britain))
  166. Making Big Money from Small Sensors: Trading Time-Series Data under Pufferfish Privacy
    Chaoyue Niu and Zhenzhe Zheng (Shanghai Jiao Tong University, P.R. China); Shaojie Tang (University of Texas at Dallas, USA); Xiaofeng Gao and Fan Wu (Shanghai Jiao Tong University, P.R. China)
  167. Market Manipulation of Bitcoin: Evidence from Mining the Mt. Gox Transaction Network
    Weili Chen, Jun Wu, Zibin Zheng, Chuan Chen and Yuren Zhou (School of Data and Computer Science, Sun Yat-sen University, P.R. China)
  168. Maximum Lifetime Analytics in IoT Networks
    Victor Valls and George Iosifidis (Trinity College Dublin, Ireland); Theodoros Salonidis (IBM Research, USA)
  169. Measurements as First-class Artifacts
    Paolo Laffranchini (Instituto Superior Técnico, Portugal); Luís Rodrigues (INESC-ID, Portugal); Marco Canini (KAUST, Saudi Arabia); Balachander Krishnamurthy (AT&T Labs - Research, USA)
  170. Measuring Update Performance and Consistency Anomalies in Managed DNS Services
    Arun Venkataramani (UMass Amherst, USA); Zhaoyu Gao (University of Massachusetts, USA)
  171. Mechanism Design for Network Utility Maximization with Private Constraint Information
    Meng Zhang (The Chinese University of Hong Kong, P.R. China); Jianwei Huang (The Chinese University of Hong Kong, Hong Kong)
  172. An Integrated Top-down and Bottom-up Task Allocation Approach in Social Sensing based Edge Computing Systems
    Daniel Zhang and Dong Wang (University of Notre Dame, USA)
  173. Memory flipping: a threat to NUMA virtual machines in the Cloud
    Djob Mvondo (IRIT, France); Boris Teabe (IRIT-INPT, France); Alain Tchana (University of Toulouse & INPT-ENSEEIHT, France); Daniel Hagimont (INPT, France); Noel DePalma (UGA, France)
  174. Memory/Disk Operation aware Lightweight VM Live Migration across Data-centers with Low Performance Impact
    Bin Shi (Beihang University, P.R. China); Haiying Shen (University of Virginia, USA)
  175. MG-WFBP: Efficient Data Communication for Distributed Synchronous SGD Algorithms
    Shaohuai Shi and Xiaowen Chu (Hong Kong Baptist University, Hong Kong); Bo Li (Hong Kong University of Science and Technology, Hong Kong)
  176. Minimizing Charging Delay for Directional Charging in Wireless Rechargeable Sensor Networks
    Chi Lin and Yanhong Zhou (Dalian University of Technology, P.R. China); Fenglong Ma (University at Buffalo, SUNY, USA); Jing Deng (University of North Carolina at Greensboro, USA); Lei Wang and Guowei WU (Dalian University of Technology, P.R. China)
  177. Minimum Age TDMA Scheduling
    Tung-Wei Kuo (National Chengchi University, Taiwan)
  178. Multi-hop Backscatter Tag-to-Tag Network
    Amjad Majid (Delft University of Technology, The Netherlands); Michel Jansen (TU Delft, The Netherlands); Guillermo Ortas Delgado (Delft University of Technology, The Netherlands); Kasim Sinan Yildirim (Ege University, Turkey & Delft University of Technology, The Netherlands); Przemyslaw Pawelczak (Delft University of Technology, The Netherlands)
  179. Multisource Rumor Spreading with Network Coding
    Yérom-David Bromberg and Quentin Dufour (Univ Rennes, Inria, CNRS, IRISA, France); Davide A Frey (INRIA - Rennes Bretagne Atlantique, France)
  180. MV-Sketch: A Fast and Compact Invertible Sketch for Heavy Flow Detection in Network Data Streams
    Lu Tang (The Chinese University of Hong Kong, Hong Kong); Qun Huang (Institute of Computing Technology, Chinese Academy of Sciences, P.R. China); Patrick Pak-Ching Lee (The Chinese University of Hong Kong, Hong Kong)
  181. NASCENT: Tackling Caller-ID Spoofing in 4G Networks via Efficient Network-Assisted Validation
    Amit Sheoran, Chunyi Peng, Sonia Fahmy and Navin Modi (Purdue University, USA)
  182. NAuth: Secure Face-to-Face Device Authentication via Nonlinearity
    Xinyan Zhou (Zhejiang Univeisity, P.R. China); Xiaoyu Ji and Chen Yan (Zhejiang University, P.R. China); Jiangyi Deng (Zhejiang Univeisity, P.R. China); Wenyuan Xu (Zhejiang University, P.R. China)
  183. Network Interdiction Using Adversarial Traffic Flows
    Xinzhe Fu (Massachusetts Institute of Technology, USA); Eytan Modiano (MIT, USA)
  184. NeuralWalk: Trust Assessment in Online Social Networks with Neural Networks
    Guangchi Liu (Stratifyd Inc., USA); Chenyu Li (Stratifyd Inc, USA); Qing Yang (University of North Texas, USA)
  185. No Regret in Cloud Resources Reservation with Violation Guarantees
    Nikolaos Liakopoulos (Huawei Technologies & UPMC, France); Georgios S. Paschos (Huawei Technologies, France); Thrasyvoulos Spyropoulos (EURECOM, France)
  186. Nomad: An Efficient Consensus Approach for Latency-Sensitive Edge-Cloud Applications
    Zijiang Hao, Shanhe Yi and Qun Li (College of William and Mary, USA)
  187. Novel and Practical SDN-based Traceback Technique for Malicious Traffic over Anonymous Networks
    Zhen Ling, Luo Junzhou, Danni Xu and Ming Yang (Southeast University, P.R. China); Xinwen Fu (University of Central Florida, USA)
  188. Octans: Optimal Placement of Service Function Chains in Many-Core Systems
    Zhilong Zheng, Jun Bi, Heng Yu, Haiping Wang and Chen Sun (Tsinghua University, P.R. China); Hongxin Hu (Clemson University, USA); Jianping Wu (Tsinghua University, P.R. China)
  189. OFM: An Online Fisher Market for Cloud Computing
    Abhinandan Sridhara Rao Prasad, Mayutan Arumaithurai and David Koll (University of Goettingen, Germany); Yuming Jiang (Norwegian University of Science and Technology (NTNU), Norway); Xiaoming Fu (University of Goettingen, Germany)
  190. On Improving Write Throughput in Commodity RFID Systems
    Jia Liu and Xingyu Chen (Nanjing University, P.R. China); Xiulong Liu (The Hong Kong Polytechnic University, Hong Kong); Xiaocong Zhang (Nanjing University, P.R. China); Xia Wang (Nanjing University & Zaozhuang University, P.R. China); Li-jun Chen (Nanjing University, P.R. China)
  191. On Optimal Hybrid Premium Peering and Caching Purchasing Strategy of Internet Content Providers
    Lianjie Shi, Richard T. B. Ma and Xin Wang (National University of Singapore, Singapore)
  192. On the Distribution of AoI for the GI/GI/1/1 and GI/GI/1/2* Systems: Exact Expressions and Bounds
    Jaya Prakash Varma Champati (KTH Royal Institute of Technology, Sweden); Hussein Al-Zubaidy (Royal Institute of Technology (KTH), Sweden); James Gross (KTH Royal Institute of Technology, Sweden)
  193. On the Distribution of Traffic Volumes in the Internet and its Implications
    Mohammed Alasmar and George Parisis (University of Sussex, United Kingdom (Great Britain)); Richard G Clegg (Queen Mary University of London, United Kingdom (Great Britain)); Nickolay Zakhleniuk (University of Essex, United Kingdom (Great Britain))
  194. On the Link Modeling of Wireless Sensor Networks in Ocean Environments
    Alireza Shahanaghi (Virginia Polytechnic Institute and State University, USA); Yaling Yang and Michael Buehrer (Virginia Tech, USA)
  195. On the Power of Preprocessing in Decentralized Network Optimization
    Klaus-Tycho Foerster (University of Vienna, Austria); Juho Hirvonen (University of Freiburg, Germany); Stefan Schmid (University of Vienna, Austria); Jukka Suomela (Aalto University, Finland)
  196. On User Selective Eavesdropping Attacks in MU-MIMO: CSI Forgery and Countermeasure
    Sulei Wang (Fudan University, P.R. China); Zhe Chen (School of Computer Science, Fudan University & Engineering Research Center of Cyber Security Auditing and Monitoring, Ministry of Education, P.R. China); Yuedong Xu (Fudan University, P.R. China); Qiben Yan (University of Nebraska-Lincoln, USA); Chongbin Xu and Xin Wang (Fudan University, P.R. China)
  197. Online Channel-state Clustering And Multiuser Capacity Learning For Wireless Scheduling
    Isfar Tariq (The University of Texas at Austin, USA); Rajat Sen (University of Texas At Austin, USA); Gustavo de Veciana and Sanjay Shakkottai (The University of Texas at Austin, USA)
  198. Online Internet Anomaly Detection With High Accuracy: A Fast Tensor Factorization Solution
    Xiaocan Li (Stony Brook University, New York, USA); Kun Xie (State University of New York at Stony Brook, USA); Xin Wang (Stony Brook University, USA); Gaogang Xie (Institute of Computing Technology, Chinese Academy of Sciences, P.R. China); Jigang Wen (Chinese Academy of Science & Institute of Computing Technology, P.R. China); Guangxing Zhang (Institute of Computing Technology Chinese Academy of Sciences, P.R. China); Zheng Qin (Hunan University, P.R. China)
  199. Online Job Scheduling with Resource Packing on a Cluster of Heterogeneous Servers
    Yang Liu (The Chinese University of Hong Kong, Hong Kong); Huanle Xu (Dongguan University of Technology, P.R. China); Wing Cheong Lau (The Chinese University of Hong Kong, Hong Kong)
  200. Only Those Requested Count: Proactive Scheduling Polices for Minimizing Effective Age-of-Information
    Bo Yin, Shuai Zhang, Yu Cheng and Lin X. Cai (Illinois Institute of Technology, USA); Zhiyuan Jiang, Sheng Zhou and Zhisheng Niu (Tsinghua University, P.R. China)
  201. Optimal Network Control in Partially-Controllable Networks
    Qingkai Liang and Eytan Modiano (MIT, USA)
  202. Optimal Representations of a Traffic Distribution in Switch Memories
    Yaniv Sadeh (Tel Aviv University & Google, Israel); Ori Rottenstreich (Technion, Israel); Arye Barkan (Google, Israel); Yossi Kanizo (Tel-Hai College, Israel); Haim Kaplan (Tel-Aviv University, Israel)
  203. Optimal Resource Allocation for Secure Multi-User Wireless Powered Backscatter Communication with Artificial Noise
    Pu Wang (Xidian University & George Mason University, USA); Ning Wang (GMU, USA); Monireh Dabaghchian and Kai Zeng (George Mason University, USA); Zheng Yan (Xidian University & Aalto University, P.R. China)
  204. Optimal Trunk-Reservation by Policy Learning
    Antonio Massaro (Fondazione Bruno Kessler, Italy); Francesco De Pellegrini (University of Avignon, France & Fondazione Bruno Kessler (FBK), Italy); Lorenzo Maggi (Nokia Bell Labs, France)
  205. Optimal User Choice Engineering in Mobile Crowdsensing with Bounded Rational Users
    Merkourios Karaliopoulos and Iordanis Koutsopoulos (Athens University of Economics and Business, Greece); Leonidas Spiliopoulos (Max Planck Institute for Human Development, Germany)
  206. ORACLE: Optimized Radio clAssification through Convolutional neuraL nEtworks
    Kunal Sankhe, Mauro Belgiovine, Fan Zhou, Shamnaz Mohammed Riyaz, Stratis Ioannidis and Kaushik Chowdhury (Northeastern University, USA)
  207. Orthogonality-Sabotaging Attacks against OFDMA-based Wireless Networks
    Shangqing Zhao, Zhuo Lu, Zhengping Luo and Yao Liu (University of South Florida, USA)
  208. Pairwise Markov Chain: A Task Scheduling Strategy for Privacy-Preserving SIFT on Edge
    Hengrun Zhang and Kai Zeng (George Mason University, USA)
  209. PAMT: Phase-based Acoustic Motion Tracking in Multipath Fading Environments
    Yang Liu (CAS Shanghai Institute of Microsystem and Information Technology & Shanghai Research Center for Wireless Communications, P.R. China); Wuxiong Zhang (Shanghai Research Center for Wireless Communications, P.R. China); Yang Yang (Shanghai Institute of Microsystem and Information Technology & Shanghai Reserach Center for Wireless Communications, P.R. China); Weidong Fang (Shanghai Research Center for Wireless Communication, P.R. China); Fei Qin (Chinese Academy of Sciences, P.R. China); Xuewu Dai (Northeastern University, P.R. China)
  210. PANDA: Placement of Unmanned Aerial Vehicles Achieving 3D Directional Coverage
    Weijun Wang (Nanjing University, P.R. China); Haipeng Dai (Nanjing University & State Key Laboratory for Novel Software Technology, P.R. China); Chao Dong (Nanjing University of Aeronautics and Astronautics, P.R. China); Xiao Cheng and Xiaoyu Wang (Nanjing University, P.R. China); Guihai Chen (Shanghai Jiao Tong University, P.R. China); Wanchun Dou (Nanjing University, P.R. China)
  211. Parameter Self-Configuration and Self-Adaptation in Industrial Wireless Sensor-Actuator Networks
    Junyang Shi and Mo Sha (State University of New York at Binghamton, USA)
  212. PassiveRETRO: Enabling Completely Passive Visible Light Localization for IoT Applications
    Sihua Shao and Abdallah A Khreishah (New Jersey Institute of Technology, USA); Juan Paez (The University of Texas at Austin, USA)
  213. PeDSS: Privacy Enhanced and Database-Driven Dynamic spectrum Sharing
    He Li (Virginia Polytechnic Institute and State University, USA); Yaling Yang, Yanzhi Dou and Jung-Min (Jerry) Park (Virginia Tech, USA); Kui Ren (Zhejiang University, P.R. China)
  214. Perceiving Internet Anomalies via CDN Replica Shifts
    Yihao Jia (Tsinghua University, P.R. China); Aleksandar Kuzmanovic (Northwestern University, USA)
  215. Performance Analysis of Online Social Platforms
    Anastasios Giovanidis (Sorbonne Université & CNRS-LIP6, France); Bruno Baynat (Université Pierre et Marie Curie-LIP6, France); Antoine Vendeville (Sorbonne University, France)
  216. PHDP: Preserving Persistent Homology in Differentially Private Graph Publications
    Tianchong Gao and Feng Li (Indiana University-Purdue University Indianapolis, USA)
  217. Powers Maximizing Proportional Fairness Among Poisson Bipoles
    Nithin S Ramesan (The University of Texas at Austin, USA); Francois Baccelli (UT Austin & The University of Texas at Austin, USA)
  218. Price Competition with LTE-U and WiFi
    Xu Wang and Randall A Berry (Northwestern University, USA)
  219. Pricing for Revenue Maximization in IoT Data Markets: An Information Design Perspective
    Weichao Mao, Zhenzhe Zheng and Fan Wu (Shanghai Jiao Tong University, P.R. China)
  220. Quick and Accurate False Data Detection in Mobile Crowd Sensing
    Kun Xie (State University of New York at Stony Brook, USA); Xiaocan Li (Stony Brook University, New York, USA); Xin Wang (Stony Brook University, USA); Gaogang Xie (Institute of Computing Technology, Chinese Academy of Sciences, P.R. China); Dongliang Xie (State University of New York at Stony Brook, USA); Zhenyu Li (Institute of Computing Technology, Chinese Academy of Sciences, P.R. China); Jigang Wen (Chinese Academy of Science & Institute of Computing Technology, P.R. China); Zulong Diao (Stony Brook University, USA)
  221. RABA: Resource-Aware Backup Allocation For A Chain of Virtual Network Functions
    Jiao Zhang and Zenan Wang (Beijing University of Posts and Telecommunications, P.R. China); Chunyi Peng (Purdue University, USA); Linquan Zhang (Amazon, Canada); Tao Huang and Yunjie Liu (Beijing University of Posts and Telecommunications, P.R. China)
  222. Real-time Identification of Rogue WiFi Connections Using Environment-Independent Physical Features
    Pengfei Liu and Panlong Yang (University of Science and Technology of China, P.R. China); Wen-Zhan Song (University of Georgia, USA); Yubo Yan and Xiang-Yang Li (University of Science and Technology of China, P.R. China)
  223. Real-Time Scheduling for Event-Triggered and Time-Triggered Flows in Industrial Wireless Sensor-Actuator Networks
    Xi Jin (Washington University in St. Louis; Shenyang Institute of Automation, Chinese Academy of Sciences); Abusayeed Saifullah (Wayne State University, USA); Chenyang Lu (Washington University in St. Louis, USA); Peng Zeng (Shenyang Institute of Automation, Chinese Academy of Sciences, Shenyang, P.R. China)
  224. Receiver-driven Video Multicast over NOMA Systems in Heterogeneous Environments
    Xiaoda Jiang and Hancheng Lu (University of Science and Technology of China, P.R. China); Chang Wen Chen (State University of New York at Buffalo, USA); Feng Wu (University of Science and Technology of China, P.R. China)
  225. Recommending Paths: Follow or Not Follow?
    Yunpeng Li (Singapore University of Technology and Design, Singapore); Costas Courcoubetis (SUTD, Singapore); Lingjie Duan (Singapore University of Technology and Design (SUTD), Singapore)
  226. Regularized inversion of flow size distribution
    Nelson Antunes (University of Algarve, Portugal); Vladas Pipiras (University of North Carolina, USA); Gonçalo Jacinto (Évora University & CIMA-UE, Investigation Center in Mathematics and Applications, Portugal)
  227. ReLeS: A Neural Adaptive Multipath Scheduler based on Deep Reinforcement Learning
    Han Zhang, Wenzhong Li, Shaohua Gao, Xiaoliang Wang and Baoliu Ye (Nanjing University, P.R. China)
  228. RF-Mehndi: A Fingertip Profiled RF Identifier
    Cui Zhao (Xi'an Jiaotong University, P.R. China); Zhenjiang Li (City University of Hong Kong, Hong Kong); Han Ding (Xi'an Jiaotong University, P.R. China); Jinsong Han (Zhejiang University & Institute of Cyber Security Research, P.R. China); Wei Xi (Xi'an Jiaotong University, P.R. China); Ting Liu (Xi'an Jiaotong University, PRC, P.R. China); Ruowei Gui (Xi'an Jiaotong University, P.R. China)
  229. Robust and Efficient Modulation Recognition Based on Local Sequential IQ Features
    Wei Xiong (University At Albany, USA); Petko Bogdanov and Mariya Zheleva (UAlbany SUNY, USA)
  230. Robust Scheduling for Wireless Charger Networks
    Xiaoyu Wang (Nanjing University, P.R. China); Haipeng Dai (Nanjing University & State Key Laboratory for Novel Software Technology, P.R. China); He Huang (Soochow University, P.R. China); Yunhuai Liu (Peking University, P.R. China); Guihai Chen (Shanghai Jiao Tong University, P.R. China); Wanchun Dou (Nanjing University, P.R. China)
  231. Round-Robin Synchronization: Mitigating Communication Bottlenecks in Parameter Servers
    Chen Chen, Wei Wang and Bo Li (Hong Kong University of Science and Technology, Hong Kong)
  232. Routing and Spectrum Assignment Integrating Machine-Learning-Based QoT Estimation in Elastic Optical Networks
    Matteo Salani (IDSIA - Dalle Molle Institute for Artificial Intelligence & University of Applied Sciences of Southern Switzerland, Switzerland); Cristina E.M. Rottondi (Dalle Molle Institute for Artificial Intelligence (IDSIA), Switzerland); Massimo Tornatore (Politecnico di Milano & University of California, Davis, Italy)
  233. Routing in Black Box: Modularized Load Balancing for Multipath Data Center Networks
    Fujie Fan and Bing Hu (Zhejiang University, P.R. China); Kwan L Yeung (The University of Hong Kong, Hong Kong)
  234. RTOP: Optimal User Grouping and SFN Clustering for Multiple eMBMS Sessions
    Ahmed Khalid (University College Cork, Ireland); Ahmed H. Zahran (Cairo University & University College Cork, Egypt); Cormac J. Sreenan (University College Cork, Ireland)
  235. SADeepSense: Self-Attention Deep Learning Framework for Heterogeneous On-Device Sensors in Internet of Things Applications
    Shuochao Yao (University of Illinois Urbana-Champaign, USA); Yiran Zhao (University of Illinois at Urbana–Champaign, USA); Huajie Shao (University of Illinois at Urbana-Champaign, USA); Dongxin Liu (University of Illinois Urbana-Champaign, USA); Shengzhong Liu and Yifan Hao (University of Illinois at Urbana-Champaign, USA); Ailing Piao (University of Washington at Seattle, USA); Shaohan Hu (IBM Research, USA); Lu Su (State University of New York at Buffalo, USA); Tarek Abdelzaher (University of Illinois, Urbana Champaign, USA)
  236. SAS: Modeling and Analysis of Spectrum Activity Surveillance in Wireless Overlay Networks
    Jie Wang (North Carolina State University, USA); Wenye Wang (NC State University, USA); Cliff Wang (North Carolina State University, USA)
  237. Satisfying Network Slicing Constraints via 5G MAC Scheduling
    Silvio Mandelli (Nokia Bell Labs, Germany); Matthew Andrews (Nokia Bell Labs, USA); Sem Borst (Nokia Bell Labs & Eindhoven University of Technology, USA); Siegfried Klein (Nokia Bell Labs, Germany)
  238. Scheduling Jobs with Random Resource Requirements in Computing Clusters
    Konstantinos Psychas and Javad Ghaderi (Columbia University, USA)
  239. Search in My Way: Practical Outsourced Image Retrieval Framework Supporting Unshared Key
    Xiangyu Wang and Jian-feng Ma (Xidian University, P.R. China); Ximeng Liu (Singapore Management University, Singapore); Yinbin Miao (Xidian University, P.R. China)
  240. Secure On-skin Biometric Signal Transmission using Galvanic Coupling
    William Tomlinson, Jr. and Stella Banou (Northeastern University, USA); Christopher Yu (The Charles Stark Draper Laboratory, USA); Michele Nogueira (Federal University of Parana (UFPR), Brazil); Kaushik Chowdhury (Northeastern University, USA)
  241. See-Your-Way: Peer-to-Peer Indoor Navigation with Mobile Vision
    Erqun Dong and Jingao Xu (Tsinghua University, P.R. China); Chenshu Wu (University of Maryland, USA); Zheng Yang (Tsinghua University, P.R. China); Yunhao Liu (Tsinghua University & The Hong Kong University of Science and Technology, P.R. China)
  242. Self-sustainable Sensor Networks with Multi-source Energy Harvesting and Wireless Charging
    Pengzhan Zhou (Stony Brook University, USA); Cong Wang (Old Dominion University, USA); Yuanyuan Yang (Stony Brook University, USA)
  243. Service Placement and Request Scheduling for Data-intensive Applications in Edge Clouds
    Vajiheh Farhadi, Fidan Mehmeti and Tom La Porta (Pennsylvania State University, USA); Ting He (Penn State University, USA); Hana Khamfroush (University of Kentucky, USA); Shiqiang Wang (IBM T. J. Watson Research Center, USA); Kevin S Chan (US Army Research Laboratory, USA)
  244. Service Placement with Provable Guarantees in Heterogeneous Edge Computing Systems
    Stephen Pasteris (University College London, United Kingdom (Great Britain)); Shiqiang Wang (IBM T. J. Watson Research Center, USA); Mark Herbster (University College London, United Kingdom (Great Britain)); Ting He (Penn State University, USA)
  245. Service Scheduling for Bernoulli Requests and Quadratic Cost
    Ramya Burra, Chandramani Singh and Joy Kuri (Indian Institute of Science, India)
  246. Simultaneous Bi-directional Communications and Data Forwarding using a Single ZigBee Data Stream
    Zicheng Chi (University of Maryland, Baltimore County, USA); Yan Li (UMBC and JHU, USA); Zhichuan Huang, Hongyu Sun and Ting Zhu (University of Maryland, Baltimore County, USA)
  247. Slicing Cell Resources: The Case of HTC and MTC Coexistence
    Vincenzo Mancuso (IMDEA Networks Institute, Spain); Paolo Castagno (University of Turin & University of Turin, Italy); Matteo Sereno (University of Torino, Italy); Marco G Ajmone Marsan (Politecnico di Torino & IMDEA Networks, Italy)
  248. Smart Information Spreading for Opinion Maximization in Social Networks
    Anuj Nayak and Seyyedali Hosseinalipour (North Carolina State University, USA); Huaiyu Dai (NC State University, USA)
  249. Smartlink: Exploiting Channel Clustering Effects for Reliable Millimeter Wave Communications
    Irmak Aykin, Berk Akgun and Marwan Krunz (University of Arizona, USA)
  250. Space-Optimal Packet Routing on Trees
    Will Rosenbaum (Max Planck Institute for Informatics, Germany); Boaz Patt-Shamir (Tel Aviv University, Israel)
  251. Spin-Antenna: 3D Motion Tracking for Tag Array Labeled Objects via Spinning Antenna
    Chuyu Wang, Lei Xie, Keyan Zhang, Wei Wang, Yanling Bu and Sanglu Lu (Nanjing University, P.R. China)
  252. Statistical Enrichment Models for Activity Inference from Imprecise Location Data
    Ran He (Bell Labs, USA); Jin Cao and Lisa Zhang (Nokia Bell Labs, USA); Denny Lee (Nokia, Canada)
  253. Statistical learning of geometric characteristics of wireless networks
    Antoine Brochard (Huawei/Inria, France); Bartlomiej Błaszczyszyn (Inria-Ens, France); Stephane Mallat (Collège de France & École Normale Supérieure, France); Sixin Zhang (ENS, France)
  254. Strongly Secure and Efficient Range Queries in Cloud Databases under Multiple Keys
    Ke Cheng and Yulong Shen (Xidian University, P.R. China); Yongzhi Wang (Xidian University, P.R. China & Park University, USA); Liangmin Wang (Jiangsu University, P.R. China); Xiaohong Jiang (Future University-Hakodate, Japan); Jian-feng Ma and Cuicui Su (Xidian University, P.R. China)
  255. Switching Constrained Max-Weight Scheduling for Wireless Networks
    Soumya Basu (University of Texas at Austin, USA); Sanjay Shakkottai (The University of Texas at Austin, USA)
  256. SynLight: Synthetic Light Emission for Fast Transmission in COTS Device-enabled VLC
    Yanbing Yang (Nanyang Technological University, Singapore & Sichuan University, P.R. China); Jun Luo, Chen Chen and Wen-De Zhong (Nanyang Technological University, Singapore); Liangyin Chen (Sichuan University & University of Minnesota, P.R. China)
  257. Synthesizing Wider WiFi Bandwidth for Respiration Rate Monitoring in Dynamic Environments
    Shuyu Shi (Nanyang Technological University & Nanjing University, P.R. China); Yaxiong Xie (Nanyang Technological University, Singapore); Alex X. Liu (Michigan State University, USA); Jun Zhao and Mo Li (Nanyang Technological University, Singapore)
  258. TagSheet: Sleeping Posture Recognition with an Unobtrusive Passive Tag Matrix
    Jia Liu and Xingyu Chen (Nanjing University, P.R. China); Shigang Chen (University of Florida, USA); Xiulong Liu (The Hong Kong Polytechnic University, Hong Kong); Yanyan Wang and Li-jun Chen (Nanjing University, P.R. China)
  259. TansLink: User Identity Linkage across Heterogeneous Social Networks via Translating Embeddings
    Jingya Zhou and Jianxi Fan (Soochow University, P.R. China)
  260. Task Replication for Vehicular Cloud: Contextual Combinatorial Bandit with Delayed Feedback
    Lixing Chen and Jie Xu (University of Miami, USA)
  261. TDFI: Two-stage Deep Learning Framework for Friendship Inference via Multi-source Information
    Yi Zhao (Tsinghua University, P.R. China); Meina Qiao (Beihang University, P.R. China); Haiyang Wang (University of Minnesota at Duluth, USA); Rui Zhang (Northwestern Polytechnical University, P.R. China); Dan Wang (The Hong Kong Polytechnic University, Hong Kong); Ke Xu and Qi Tan (Tsinghua University, P.R. China)
  262. The Consistent Cuckoo Filter
    Lailong Luo and Deke Guo (National University of Defense Technology, P.R. China); Ori Rottenstreich (Technion, Israel); Xueshan Luo (National University of Defense Technology, P.R. China); Richard T. B. Ma (National University of Singapore, Singapore); Bangbang Ren (National University of Defence Technology, P.R. China)
  263. The Role of Network Topology for Distributed Machine Learning
    Giovanni Neglia (INRIA Sophia Antipolis Mediterranee, France); Gianmarco Calbi (Inria & Universitá di Milano-Bicocca, France); Don Towsley (University of Massachusetts at Amherst, USA); Gayane Vardoyan (University of Massachusetts Amherst, USA)
  264. The Slice Is Served: Enforcing Radio Access Network Slicing in Virtualized 5G Systems
    Salvatore D'Oro and Francesco Restuccia (Northeastern University, USA); Alessandro Talamonti (Politecnico di Milano, Italy); Tommaso Melodia (Northeastern University, USA)
  265. Throughput and Pricing of Ridesharing Systems
    Costas Courcoubetis (SUTD, Singapore); Antonis Dimakis (Athens University of Economics and Business, Greece)
  266. To Cancel or Not to Cancel: Exploiting Interference Signal Strength in the Eigenspace for Efficient MIMO DoF Utilization
    Yongce Chen, Shaoran Li, Chengzhang Li and Thomas Hou (Virginia Tech, USA); Brian Jalaian (US Army Research Laboratory, USA)
  267. Towards Low Latency Multi-viewpoint 360° Interactive Video: A Multimodal Deep Reinforcement Learning Approach
    Haitian Pang (Tsinghua University, P.R. China); Cong Zhang, Fangxin Wang and Jiangchuan Liu (Simon Fraser University, Canada); Lifeng Sun (Tsinghua University, P.R. China)
  268. Towards Measuring Quality of Service in Untrusted Multi-Vendor Service Function Chains: Balancing Security and Resource Consumption
    Prasanna Karthik Vairam (Indian Institute of Technology Madras, India); Gargi Mitra, Vignesh Manoharan and Chester Rebeiro (IIT Madras, India); Byrav Ramamurthy (University of Nebraska-Lincoln, USA); Kamakoti V (Indian Institute of Technology Madras, India)
  269. Towards Physical-Layer Vibration Sensing with RFIDs
    Ping Li (The Army Engineering University of PLA, P.R. China); Zhenlin An (The Hong Kong Polytechnic University, Hong Kong); Lei Yang (The Hong Kong Polytechnic University, P.R. China); Panlong Yang (University of Science and Technology of China, P.R. China)
  270. Towards Privacy-preserving Incentive for Mobile Crowdsensing Under An Untrusted Platform
    Zhibo Wang, Jingxin Li and Jiahui Hu (Wuhan University, P.R. China); Ju Ren (Central South University, P.R. China); Zhetao Li (Xiangtan University, P.R. China); Yanjun Li (Zhejiang University of Technology, P.R. China)
  271. Towards Verifiable Performance Measurement over In-the-Cloud Middleboxes
    XiaoLi Zhang (Tsinghua University, P.R. China); Huayi Duan and Cong Wang (City University of Hong Kong, Hong Kong); Qi Li and Jianping Wu (Tsinghua University, P.R. China)
  272. TrustSAS: A Trustworthy Spectrum Access System for the 3.5 GHz CBRS Band
    Mohamed Grissa (Oregon State University, USA); Attila Altay Yavuz (University of South Florida, USA); Bechir Hamdaoui (Oregon State University, USA)
  273. Trustworthiness Inference Framework in the Social Internet of Things: A Context-Aware Approach
    Hui Xia (Qingdao University, P.R. China); Fu Xiao (Nanjing University of Posts and Telecommunications, P.R. China); San-shun Zhang (Qingdao University, P.R. China); Chunqiang Hu (Chongqing University, P.R. China); Xiuzhen Cheng (George Washington Univ, USA)
  274. TTL-based Cloud Caches
    Damiano Carra (University of Verona, Italy); Giovanni Neglia (INRIA Sophia Antipolis Mediterranee, France); Pietro Michiardi (EURECOM, France)
  275. Tweeting with Sunlight: Encoding Data on Mobile Objects
    Rens Bloom (Delft University of Technology & AMS Institute, The Netherlands); Marco Zuniga (Delft University of Technology, The Netherlands); Qing Wang (KU Leuven, Belgium); Domenico Giustiniano (IMDEA Networks Institute, Spain)
  276. TwinLeak: RFID-based Liquid Leakage Detection in Industrial Environments
    Junchen Guo, Ting Wang, Yuan He, Meng Jin and Chengkun Jiang (Tsinghua University, P.R. China); Yunhao Liu (Tsinghua University & The Hong Kong University of Science and Technology, P.R. China)
  277. UnseenCode: Invisible On-screen Barcode with Image-based Extraction
    Hao Cui, Huanyu Bian, Weiming Zhang and Nenghai Yu (University of Science and Technology of China, P.R. China)
  278. Unsupervised Anomaly Detection for Intricate KPIs via Adversarial Training of VAE
    Wenxiao Chen, Haowen Xu, Zeyan Li and Dan Pei (Tsinghua University, P.R. China); Jie Chen, Honglin Qiao, Yang Feng and Zhaogang Wang (Alibaba Group, P.R. China)
  279. Update Algebra: Toward Continuous, Non-Blocking Composition of Network Updates in SDN
    Geng Li and Y. Richard Yang (Yale University, USA); Franck Le (IBM T. J. Watson, USA); Yeon-sup Lim (IBM T. J. Watson Research Center, USA); Junqi Wang (Rutgers University at Newark, USA)
  280. Virtual Speed Test: an AP Tool for Passive Analysis of Wireless LANs
    Peshal Nayak (Rice University, USA); Santosh Pandey (Cisco Systems Inc, USA); Edward W. Knightly (Rice University, USA)
  281. VoicePop: A Pop Noise based Anti-spoofing System for Voice Authentication on Smartphones
    Qian Wang, Xiu Lin and Man Zhou (Wuhan University, P.R. China); Yanjiao Chen (School of Computer Science, Wuhan University, P.R. China); Cong Wang (City University of Hong Kong, Hong Kong); Qi Li (Tsinghua University, P.R. China); Luo Xiangyang (Zhengzhou Information Science and Technology Institute, P.R. China)
  282. Weighted Sum-Rate Maximization in Multi-Carrier NOMA with Cellular Power Constraint
    Lou Salaun (Nokia Bell Labs, France); Marceau Coupechoux (Telecom ParisTech, France); Chung Shue Chen (Bell Labs, Nokia, France)
  283. When Network Matters: Data Center Scheduling with Network Tasks
    Frederic Giroire (CNRS, France); Nicolas Huin (Concordia University, Canada); Andrea Tomassilli (Université Côte d'Azur, Inria, I3S, France); Stephane Perennes (INRIA, France)
  284. Winning at the Starting Line: Joint Network Selection and Service Placement for Mobile Edge Computing
    Bin Gao (Huazhong University of Science and Technology, P.R. China); Zhi Zhou (Sun Yat-sen University, P.R. China); Fangming Liu (Huazhong University of Science and Technology, P.R. China); Fei Xu (East China Normal University, P.R. China)
  285. Wireless and Computing Resource Allocation for Selfish Computation Offloading in Edge Computing
    Slađana Jošilo and György Dán (KTH Royal Institute of Technology, Sweden)
  286. Wireless Multicasting for Content Distribution: Endless Stability and Delay Gains
    Bahman Abolhassani (The Ohio State University, USA); John Tadrous (Gonzaga University, USA); Atilla Eryilmaz (The Ohio State University, USA)
  287. WristSpy: Snooping Passcodes in Mobile Payment Using Wrist-worn Wearables
    Chen Wang (Rutgers University, USA); Jian Liu (WINLAB, Rutgers University, USA); Xiaonan Guo (Indiana University-Purdue University Indianapolis, USA); Yan Wang (SUNY at Binghamton, USA); Yingying Chen (Rutgers University, USA)
  288. X-CHANT: A Diverse DSA based Architecture for Next-generation Challenged Networks
    Vijay K. Shah, Simone Silvestri and Brian Luciano (University of Kentucky, USA); Sajal K. Das (Missouri University of Science and Technology, USA)

 

Patrons