The 17th International Conference on Mobility, Sensing and Networking (MSN 2021)
Federated Learning I
A Hierarchical Incentive Mechanism for Coded Federated Learning
Jer Shyuan Ng, Wei Yang Bryan Lim (Alibaba-NTU JRI, Singapore), Zehui Xiong (Singapore University of Technology Design, Singapore), Xianjun Deng (Huazhong University of Science and Technology, China), Yang Zhang (Nanjing University of Aeronautics and Astronautics, China), Dusit Niyato, Cyril Leung (Nanyang Technological University, Singapore)
Communication-Efficient Subspace Methods for High-Dimensional Federated Learning
Zai Shi, Atilla Eryilmaz (The Ohio State University, USA)
Defending against Membership Inference Attacks in Federated learning via Adversarial Example
Yuanyuan Xie, Bing Chen (Nanjing University of Aeronautics and Astronautics, China), Jiale Zhang (Yangzhou University, China), Di Wu (Deakin University, Melbourne, Australia)
Defending Against Byzantine Attacks in Quantum Federated Learning
Qi Xia, Zeyi Tao, Qun Li (College of William and Mary, USA)
DeSMP: Differential Privacy-Exploited Stealthy Model Poisoning Attacks in Federated Learning
Md Tamjid Hossain, Shafkat Islam, Shahriar Badsha, Haoting Shen (University of Nevada, Reno, USA)
Session Chair
Bryan Wei Yang Lim (Alibaba-NTU Singapore Joint Research Institute, Singapore)
Multi-Access Edge Computing I
Caching, Recommendations and Opportunistic Offloading at the Network Edge
Margarita Vitoropoulou, Konstantinos Tsitseklis (National Technical University of Athens, Greece), Vasileios Karyotis (Ionian University, Greece), Symeon Papavassiliou (National Technical University of Athens, Greece)
CRATES: A Cache Replacement Algorithm for Access Frequency-Low Period in Edge Server
Pengmiao Li, Yuchao Zhang, Huahai Zhang, Wendong Wang (Beijing University of Posts and Telecommunications, China), Ke Xu (Tsinghua University, China), Zhili Zhang (University of Minnesota, USA)
In this paper, we deeply analyzed the real traces from ChuangCache and found some specific user groups are playing more important roles than general users during these periods, and the contents accessed by these specific user groups have a much higher possibility to become hot contents. Therefore, we firstly classified the users to core users, and treat others as common users. Then we adopt the principal component analysis algorithm to analyze the relationship between hot contents and core users. On this basis, we finally propose a hot contents pre-cache protection mechanism, which is an important item of our cache replacement algorithm CRATES. To address the content unstable problem and further improve CRATES efficiency, we extract key part of historical data by design a sliding window and greatly reduce algorithm computational complexity. Through a series of experiments using real application data, we demonstrate that CRATES reaches about 98% in caching hit rate and outperforms the state-of-the-art algorithm LRB by 1.4X.
Evaluating Multimedia Protocols on 5G Edge for Mobile Augmented Reality
Jacky Cao (University of Oulu, Finland), Xiang Su (Norwegian University of Science and Technology, Norway), Benjamin Finley (University of Helsinki, Finland), Antti Pauanne (University of Oulu, Finland), Mostafa Ammar (Georgia Institute of Technology, USA), Pan Hui (University of Helsinki, Finland)
Gaming at the Edge: A Weighted Congestion Game Approach for Latency-Sensitive Scheduling
Xuezheng Liu, Ke Liu (Sun Yat-Sen University, China), Guoqiao Ye (Tencent Technology Co. Ltd, China), Miao Hu (Sun Yat-Sen University, China), Yipeng Zhou (Macquarie University, Australia), Di Wu (Sun Yat-Sen University, China)
Mobility-Aware Efficient Task Offloading with Dependency Guarantee in Mobile Edge Computing Networks
Qi Wu, Guolin Chen, Xiaoxia Huang (Sun Yat-Sen University, China)
Session Chair
Jiachen Shen (East China Normal University, China)
Deep Reinforcement Learning
A Scheduling Scheme in a Container-based Edge Computing Environment Using Deep Reinforcement Learning Approach
Tingting Lu, Fanping Zeng, Jingfei Shen, Guozhu Chen, Wenjuan Shu, Weikang Zhang (University of Science and Technology of China, China)
In this paper, we design a new edge computing architecture based on containers which are used as the resource units. Then, based on the Proximal Policy Optimization algorithm, we propose two Task Scheduling algorithms for independent (PPOTS) and dependent (PPODTS). Our objective is to minimize the utility which is a trade-off between the completion time and the energy consumption. Experimental results show that our proposed PPOTS and PPODTS algorithms can reduce the average utility by at least 15.83% (and up to 77.9%) and at least 3.5% (and up to 10.3%) compared with baselines respectively.
Deep Reinforcement Learning-Based Edge Caching and Multi-Link Cooperative Communication in Internet-of-Vehicles
Teng Ma, Xin Chen, Libo Jiao, Ying Chen (Beijing Information Science and Technology University, China)
Distributed Task Offloading based on Multi-Agent Deep Reinforcement Learning
Shucheng Hu, Tao Ren, Jianwei Niu (University of Göttingen, Germany), Zheyuan Hu (Zhengzhou University, China), Guoliang Xing (The Chinese University of Hong Kong, Hong Kong)
Wireless Network Abnormal Traffic Detection Method Based on Deep Transfer Reinforcement Learning
Yuanjun Xia, Shi Dong (Wuhan Textile University, China)
Neural Adaptive IoT Streaming Analytics with RL-Adapt
Bonan Shen, Chenhong Cao, Tong Liu, Jiangtao Li, Yufeng Li (Shanghai University, China)
Session Chair
Bingyang Li (Chinese Academy of Sciences, China)
Federated Learning II
Efficient Privacy-Preserving Federated Learning for Resource-Constrained Edge Devices
Jindi Wu, Qi Xia, Qun Li (College of William & Mary, USA)
FedHe: Heterogeneous Models and Communication-Efficient Federated Learning
Yun Hin Chan, Edith C.H. Ngai (The University of Hong Kong, Hong Kong)
FIDS: A Federated Intrusion Detection System for 5G Smart Metering Network
Parya Haji Mirzaee, Mohammad Shojafar, Zahra Pooranian (University of Surrey, UK), Pedram Asef (University of Hertfordshire, UK), Haitham Cruickshank, Rahim Tafazolli (University of Surrey, UK)
FNEL: An Evolving Intrusion Detection System Based on Federated Never-Ending Learning
Tian Qin, Guang Cheng, Wenchao Chen, Xuan Lei (Southeast University, China)
Unsupervised Federated Adversarial Domain Adaptation for Heterogeneous Internet of Things
Jinfeng Ma, Mengxuan Du, Haifeng Zheng, Xinxin Feng (Fuzhou University, China)
Session Chair
Yanjiao Chen (Zhejiang University, China)
Multi-Access Edge Computing II
Towards High Accuracy Low Latency Real-Time Road Information Collection: An Edge-Assisted Sensor Fusion Approach
You Luo (Simon Fraser University, Canada), Feng Wang (The University of Mississippi, USA), Jiangchuan Liu (Simon Fraser University, Canada)
A Novel Deployment Method for UAV-mounted Mobile Base Stations
Di Wu, Juan Xu, Jiabin Yuan, Xiangping Zhai (Nanjing University of Aeronautics and Astronautics, China)
Joint Task Offloading and Resource Allocation for MEC Networks Considering UAV Trajectory
Xiyu Chen, Yangzhe Liao, Qingsong Ai (Wuhan University of Technology, China)
User Cooperative Mobility for Higher QoS in Ad Hoc Network: Framework and Evaluation
Tutomu Murase (Nagoya University, Japan)
Design and Implementation of a RISC V Processor on FPGA
Ludovico Poli, Sangeet Saha, Xiaojun Zhai, Klaus Mcdonald-Maier (University of Essex, UK)
Session Chair
Tutomu Murase (Nagoya University, Japan)
Network Security I
BALSAPro: Towards A Security Protocol for Bluetooth Low Energy
Mohamad Muwfak Hlal, Weizhi Meng (Technical University of Denmark, Denmark)
Impact of UAV Mobility on Physical Layer Security
Rukhsana Ruby, Basem M. Elhalawany, Kaishun Wu (Shenzhen University, China)
Network Security by Merging two Robust Tools from the Mathematical Firmament
Andreas Andreou (University of Nicosia Research Foundation (UNRF), Cyprus), Constandinos Mavromoustakis (University of Nicosia, Cyprus), George Mastorakis (Hellenic Mediterranean University, Greece), Jordi Mongay Batalla (Warsaw University of Technology and National Institute of Telecommunications, Poland)
Leveraging blockchain for cross-institution data sharing and authentication in mobile healthcare
Le Lai, Tongqing Zhou, Zhiping Cai, Jiaping Yu, Hao Bai (National University of Defense Technology, China)
Performance Comparison of Hybrid Encryption-based Access Control Schemes in NDN
Htet Htet Hlaing, Yuki Funamoto, Masahiro Mambo (Kanazawa University, Japan)
Session Chair
Jianan Hong (Shanghai Jiaotong University, China)
Opening Ceremony
Opening and the Best Paper Award
TBD
Session Chair
Ruidong Li (Kanazawa University, Japan)
Keynote Speech 1: IoT Security
IoT Security
Prof. Elisa Bertino (Purdue University, USA)
Session Chair
Xiaohua Jia (City University of Hong Kong, Hong Kong)
Keynote Speech 2: Deep Reinforcement Learning for Control and Management of Communications Networks
Deep Reinforcement Learning for Control and Management of Communications Networks
Kin K. Leung (EEE and Computing Departments Imperial College, London, UK)
Session Chair
Jia Hu (University of Exeter, U. K.)
Digital Twins and their Applications in CPS
Digital Twins and their Applications in CPS
Panel Chair: Wei Zhao (Shenzhen Institute of Advanced Technology, Chinese Academy of Sciences); Panelists: Tarek Abdelzaher (University of Illinois Urbana-Champaign), Jiannong Cao (The Hong Kong Polytechnic University), Chenyang Lu (Washington University in St. Louis), Julie A McCann (Imperial College London, UK), Raymond Lui Sha (University of Illinois Urbana-Champaign)
Session Chair
Wei Zhao (Shenzhen Institute of Advanced Technology, Chinese Academy of Sciences)
Poster Session
Indoor Navigation for Users with Mobility Aids Using Smartphones and Neighborhood Networks
Bo Hui, Chen Jiang, Pavani Ankireddy (Auburn University, USA), Wenlu Wang (Texas A&M University-Corpus Christi (TAMUCC), USA), Wei-Shinn Ku (Auburn University, USA)
Demonstrator Game Showcasing Indoor Positioning via BLE Signal Strength
Felix Beierle (University of Würzburg, Germany), Hai Dinh-Tuan, Yong Wu (Technische Universität Berlin, Germany)
Optimizing Microservices with Hyperparameter Optimization
Hai Dinh-Tuan, Katerina Katsarou, Patrick Herbke (Technische Universität Berlin, China)
L-KPCA: an Efficient Feature Extraction Method for Network Intrusion Detection
Jinfu Chen, Shang Yin, Saihua Cai, Lingling Zhao, Shengran Wang (Jiangsu University, China)
Session Chair
Wei Wang (San Diego State University, USA)
Made with in Toronto · Privacy Policy · © 2022 Duetone Corp.