MSN 2021
The 17th International Conference on Mobility, Sensing and Networking (MSN 2021)
December 13-15, 2021, Exeter, UK
Technically Co-sponsored by IEEE IEEE
IEEE CS

List of Accepted Papers

Main Conference

  1. A Clustering Method of Encrypted Video Traffic Based on Levenshtein Distance
    Luming Yang, Shaojing Fu, Yuchuan Luo (National University of Defense Technology, China)

  2. A Distributed Hybrid Load Management Model for Anycast CDNs
    Jing‘an Xue (Huawei Technologies, China), Haibo Wang, Jilong Wang (Tsinghua University, China), Zhe Chen, Tong Li (Huawei Technologies, China)

  3. A Hierarchical Incentive Mechanism for Coded Federated Learning
    Jer Shyuan Ng, Wei Yang Bryan Lim (Alibaba-NTU JRI, Singapore), Zehui Xiong (Singapore University of Technology Design, Singapore), Xianjun Deng (Huazhong University of Science and Technology, China), Yang Zhang (Nanjing University of Aeronautics and Astronautics, China), Dusit Niyato, Cyril Leung (Nanyang Technological University, Singapore)

  4. A Large Inter-Satellite Non-dependent Routing Technology — IS-OLSR
    Dongkun Huo, Qiang Liu, Yantao Sun, Huiling Li (Beijing Jiaotong University, China)

  5. A Location-Aware Cross-Layer MAC Protocol for Vehicular Visible Light Communications
    Agon Memedi, Falko Dressler (TU Berlin, Germany)

  6. A Node Importance Ranking Method Based on the Rate of Network Entropy Changes
    Qian Chen, Changda Wang, Qian Chen, Xian Zhao, Wenyue Sun (Jiangsu University, China)

  7. A Novel Deployment Method for UAV-mountedMobile Base Stations
    Di Wu, Juan Xu, Jiabin Yuan, Xiangping Zhai (Nanjing University of Aeronautics and Astronautics, China)

  8. A robust fixed path-based routing scheme for protecting the source location privacy in WSNs
    Lingling Hu, Liang Liu, Yulei Liu, Wenbin Zhai, Xinmeng Wang (Nanjing University of Aeronautics and Astronautics, China)

  9. A Scheduling Scheme in a Container-based Edge Computing Environment Using Deep Reinforcement Learning Approach
    Tingting Lu, Fanping Zeng, Jingfei Shen, Guozhu Chen, Wenjuan Shu, Weikang Zhang (University of Science and Technology of China, China)

  10. Activity Selection to Distinguish Healthy People from Parkinson's Disease Patients Using I-DA
    Liu Tao (Yunnan University, China), Po Yang (University of Sheffield, UK)

  11. An Improved Online Multiple Pedestrian Tracking Based on Head and Body Detection
    Zhihong Sun, Jun Chen (Wuhan University, China), Mithun Mukherjee (Nanjing University of Information Science and Technology, China), Haihui Wang (Wuhan Institute of Technology, China), Dan Zhang (Wuhan University, China)

  12. Analyzing a 5G Dataset and Modeling Metrics of Interest
    Fidan Mehmeti, Thomas La Porta (The Pennsylvania State University, USA)

  13. AWGAN: Unsupervised Spectrum Anomaly Detection with Wasserstein Generative Adversarial Network along with Random Reverse
    Mapping Weiqing Huang, Bingyang Li, Wen Wang, Meng Zhang, Sixue Lu, Yushan Han (Institute of Information Engineering, Chinese Academy of Sciences (CAS), China)

  14. BALSAPro: Towards A Security Protocol for Bluetooth Low Energy
    Mohamad Muwfak Hlal, Weizhi Meng (Technical University of Denmark, Denmark)

  15. Blockchain-based Access Control for Privacy Preserving of Students’ Credit Information
    Quanwen He, Hui Lin (Fujian Normal University, China), Fu Xiao (Nanjing University of Posts and Telecommunications, China), Jia Hu (University of Exeter, UK), Xiaoding Wang (Fujian Normal University, China)

  16. Caching, Recommendations and Opportunistic Offloading at the Network Edge
    Margarita Vitoropoulou, Konstantinos Tsitseklis (National Technical University of Athens, Greece), Vasileios Karyotis (Ionian University, Greece), Symeon Papavassiliou (National Technical University of Athens, Greece)

  17. Collecting Spatial Data Under Local Differential Privacy
    Yutong Ye, Min Zhang, Dengguo Feng (Institute of Software, Chinese Academy of Sciences (CAS), China)

  18. Communication-efficient Subspace Methods for High-dimensional Federated Learning
    Zai Shi, Atilla Eryilmaz (The Ohio State University, USA)

  19. CRATES : A Cache Replacement Algorithm for Access Frequency-Low Period in Edge Server
    Pengmiao Li, Yuchao Zhang, Huahai Zhang, Wendong Wang (Beijing University of Posts and Telecommunications, China), Ke Xu (Tsinghua University, China), Zhili Zhang (University of Minnesota, USA)

  20. Deep Learning for Cyber Deception in Wireless Networks
    Felix Olowononi (Howard University, USA), Ahmed H. Anwar (US Army Research Lab, USA), Danda Rawat (Howard University, USA), Jaime Acosta, Charles Kamhoua (US Army Research Lab, USA)

  21. Deep Learning on Visual and Location Data for V2I mmWave Beamforming
    Guillem Reus-Muns, Batool Salehi, Debashri Roy, Tong Jian, Zifeng Wang, Jennifer Dy, Stratis Ioannidis and Kaushik Chowdhury (Northeastern University, USA)

  22. Deep Reinforcement Learning-Based Edge Caching and Multi-link Cooperative Communication in Internet-of-Vehicles
    Teng Ma, Xin Chen, Libo Jiao, Ying Chen (Beijing Information Science and Technology University, China)

  23. Deep Transfer Learning for Cross-Device Channel Classification in mmWave Wireless
    Ahmed Almutairi, Suresh Srinivasan (Portland State University, USA), Alireza Keshavarz-Haddad (Shiraz University, Iran), Ehsan Aryafar (Portland State University, USA)

  24. Defending Against Byzantine Attacks in Quantum Federated Learning
    Qi Xia, Zeyi Tao, Qun Li (College of William and Mary, USA)

  25. Defending against Membership Inference Attacks in Federated learning via Adversarial Example
    Yuanyuan Xie, Bing Chen (Nanjing University of Aeronautics and Astronautics, China), Jiale Zhang (Yangzhou University, China), Di Wu (Deakin University, Melbourne, Australia)

  26. Design and Implementation of a RISC V Processor on FPGA
    Ludovico Poli, Sangeet Saha, Xiaojun Zhai, Klaus Mcdonald-Maier (University of Essex, UK)

  27. DeSMP: Differential Privacy-exploited Stealthy Model Poisoning Attacks in Federated Learning
    Md Tamjid Hossain, Shafkat Islam, Shahriar Badsha, Haoting Shen (University of Nevada, Reno, USA)

  28. Distributed Routing Protocol for Large-Scale Backscatter-enabled Wireless Sensor Network
    Fengyu Zhou, Hao Zhou, Shan Wang, Wangqiu Zhou (University of Science and Technology of China, China), Zhi Liu (The University of Electro-Communications, Japan), Xiangyang Li (University of Science and Technology of China, China)

  29. Distributed Task Offloading based on Multi-Agent Deep Reinforcement Learning
    Shucheng Hu, Tao Ren, Jianwei Niu (University of Göttingen, Germany), Zheyuan Hu (Zhengzhou University, China), Guoliang Xing (The Chinese University of Hong Kong, Hong Kong)

  30. DPFDT: Decentralized Privacy-preserving Fair Data Trading System
    Xiangyu Li, Zhenfu Cao, Jiachen Shen, Xiaolei Dong (East China Normal University, China)

  31. DVC:An Deductable Video Coding for Video Broadcast in Highly Dynamic Networks
    Yunhuai Liu, Yonggui Huang, Sheng Gu (Peking University, China)

  32. Efficient Privacy-Preserving Federated Learning for Resource-Constrained Edge Devices
    Jindi Wu, Qi Xia, Qun Li (College of William & Mary, USA)

  33. Evaluating Multimedia Protocols on 5G Edge for Mobile Augmented Reality
    Jacky Cao (University of Oulu, Finland), Xiang Su (Norwegian University of Science and Technology, Norway), Benjamin Finley (University of Helsinki, Finland), Antti Pauanne (University of Oulu, Finland), Mostafa Ammar (Georgia Institute of Technology, USA), Pan Hui (University of Helsinki, Finland)

  34. FedHe: Heterogeneous Models and Communication-Efficient Federated Learning
    Yun Hin Chan, Edith C.H. Ngai (The University of Hong Kong, Hong Kong)

  35. FIDS: A Federated Intrusion Detection System for 5G Smart Metering Network
    Parya Haji Mirzaee, Mohammad Shojafar, Zahra Pooranian (University of Surrey, UK), Pedram Asef (University of Hertfordshire, UK), Haitham Cruickshank, Rahim Tafazolli (University of Surrey, UK)

  36. Flow Transformer: A Novel Anonymity Network Traffic Classifier with Attention Mechanism
    Ruijie Zhao, Yiteng Huang, Xianwen Deng, Zhi Xue, Jiabin Li (Shanghai Jiao Tong University, China), Zijing Huang (Fudan University, China), Yijun Wang (Shanghai Jiao Tong University, China)

  37. FlowFormers: Transformer-based Models for Real-time Network Flow Classification
    Rushi Babariya (BITS Pilani, India), Sharat Chandra Madanapalli (UNSW Sydney, Canopus Networks, Australia), Himal Kumar (Canopus Networks, Australia), Vijay Sivaraman (UNSW Sydney, Australia)

  38. FNEL:An Evolving Intrusion Detection System Based on Federated Never-Ending Learning
    Tian Qin, Guang Cheng, Wenchao Chen, Xuan Lei (Southeast University, China)

  39. Friendship Understanding by Smartphone-based Interactions: A Cross-space Perspective
    Liang Wang, Haixing Xu, Zhiwen Yu (Northwestern Polytechnical University, China), Rujun Guan (Xi'an University of Science and Technology, China), Bin Guo, Zhuo Sun (Northwestern Polytechnical University, China)

  40. From Wired to Wireless BMS in Electric Vehicles
    Fabian Antonio Rincon Vija, Samuel Cregut (Renault Group, France), Georgios Papadopoulos, Nicolas Montavont (IMT Atlantique, France)

  41. FullSight: Towards Scalable, High-Coverage, and Fine-grained Network Telemetry
    Sen Ling, Waixi Liu, Yinghao Zhu, Miaoquan Tan, Jieming Huang, Zhenzheng Guo, Wenhong Lin (Guangzhou University, China)

  42. Gaming at the Edge: A Weighted Congestion Game Approach for Latency-Sensitive Scheduling
    Xuezheng Liu, Ke Liu (Sun Yat-Sen University, China), Guoqiao Ye (Tencent Technology Co. Ltd, China), Miao Hu (Sun Yat-Sen University, China), Yipeng Zhou (Macquarie University, Australia), Di Wu (Sun Yat-Sen University, China)

  43. IDS: An Intelligent Data Semantics System for Communication Link Prediction in SIoT
    Bo Wang, Zunfu Huang, Meixian Song (Tianjin University, China), Qinxue Jiang (Newcastle University, China), Naixue Xiong (Northeastern State University, USA)

  44. IMFi: IMU-WiFi based Cross-modal Gait Recognition System with Hot-Deployment
    Zengyu Song, Hao Zhou, Shan Wang, Jinmeng Fan, Kaiwen Guo, Wangqiu Zhou (University of Science and Technology of China, China), Xiaoyan Wang (Ibaraki University, Japan), Xiang-Yang Li (University of Science and Technology of China, China)

  45. Impact of UAV Mobility on Physical Layer Security
    Rukhsana Ruby, Basem M. Elhalawany, Kaishun Wu (Shenzhen University, China)

  46. Joint Task Offloading and Resource Allocation for MEC Networks Considering UAV Trajectory
    Xiyu Chen, Yangzhe Liao, Qingsong Ai (Wuhan University of Technology, China)

  47. Learning Discriminative Features for Adversarial Robustness
    Ryan Hosler, Tyler Phillips, Xiaoyuan Yu, Agnideven Sundar, Xukai Zou, Feng Li (Indiana University Purdue University Indianapolis, USA)

  48. Leveraging blockchain for cross-institution data sharing and authentication in mobile healthcare
    Le Lai, Tongqing Zhou, Zhiping Cai, Jiaping Yu, Hao Bai (National University of Defense Technology, China)

  49. Long-Term Visual Localization with Semantic Enhanced Global Retrieval
    Hongrui Chen, Yuan Xiong, Jingru Wang, Zhong Zhou (State Key Laboratory of Virtual Reality Technology and Systems, China)

  50. Matching Theory Aided Federated Learning Method for Load Forecasting of Virtual Power Plant
    Min Yan, Li Wang (Beijing University of Posts and Telecommunications, China), Xuanyuan Wang (State Grid Jibei Electric Power Company Ltd., China), Liang Li, Lianming Xu, Aiguo Fei (Beijing University of Posts and Telecommunications, China)

  51. Measuring Consumption Changes in Rural Villages based on Satellite Image Data - A Case Study for Thailand and Vietnam
    Fabian Wölk, Tingting Yuan, Krisztina Kis-Katos, Xiaoming Fu (University of Göttingen, Germany)

  52. Method for Detecting and Analyzing the Compromising Emanations of USB Storage Devices
    Bo Liu (Institute of Information Engineering, CAS and University of Chinese Academy of Sciences, China), Yanyun Xu, Weiqing Huang (Institute of Information Engineering, Chinese Academy of Sciences (CAS), China), Shaoying Guo (Institute of Information Engineering, CAS and University of Chinese Academy of Sciences, China)

  53. Mining Centralization of Internet Service Infrastructure in the Wild
    Bingyang Guo, Fan Shi, Chengxi Xu, Min Zhang, Yang Li (National University of Defense Technology, China)

  54. MM-QUIC: A mobility-aware multipath QUIC for satellite networks
    Lin Cai, Wenjun Yang, Shengjie Shu, Jianping Pan (University of Victoria, Canada)

  55. Mobility-Aware Efficient Task Offloading with Dependency Guarantee in Mobile Edge Computing Networks
    Qi Wu, Guolin Chen, Xiaoxia Huang (Sun Yat-Sen University, China)

  56. Modeling and Analysis of Medical Resource Sharing and Scheduling for Public Health Emergencies based on Petri Nets
    Wangyang Yu, Menghan Jia (Shaanxi Normal University, China), Bo Yuan (University of Derby, UK)

  57. Modeling Disease Progression Flexibly with Nonlinear Disease Structure via Multi-task Learning
    Menghui Zhou (Yunnan University, China), Po Yang (University of Sheffield, UK)

  58. Multi-Source Date-Driven Route Prediction for Instant Delivery
    Zhiyuan Zhou (Southeast University, China), Xiaolei Zhou (National University of Defense Technology, China), Yao Lu, Hua Yan, Baoshen Guo, Shuai Wang (Southeast University, China)

  59. Network Security by Merging two Robust Tools from the Mathematical Firmament
    Andreas Andreou (University of Nicosia Research Foundation (UNRF), Cyprus), Constandinos Mavromoustakis (University of Nicosia, Cyprus), George Mastorakis (Hellenic Mediterranean University, Greece), Jordi Mongay Batalla (Warsaw University of Technology and National Institute of Telecommunications, Poland)

  60. Neural Adaptive IoT Streaming Analytics with RL-Adapt
    Bonan Shen, Chenhong Cao, Tong Liu, Jiangtao Li, Yufeng Li (Shanghai University, China)

  61. One-Class Support Vector Machine with Particle Swarm Optimization for Geo-Acoustic Anomaly Detection
    Dan Zhang, Zhihong Sun (Wuhan University, China), Mithun Mukherjee (Nanjing University of Information Science and Technology, China)

  62. Performance Comparison of Hybrid Encryption-based Access Control Schemes in NDN
    Htet Htet Hlaing, Yuki Funamoto, Masahiro Mambo (Kanazawa University, Japan)

  63. Personalized Path Recommendation with Specified Way-points Based on Trajectory Representations
    Wang Bing, Guo Yuchun, Chen Yishuai (Beijing Jiaotong University, China)

  64. Publish or Perish: Defending Withholding Attack in Dfinity Consensus
    Hanzheng Lyu, Jianyu Niu, Fangyu Gai, Chen Feng (University of British Columbia (Okanagan Campus), Canada)

  65. Qualitative Communication for Emerging Network Applications with New IP
    Richard Li, Lijun Dong, Cedric Westphal, Kiran Makhijani (Futurewei Technologies Inc., USA)

  66. ReDetect: Reentrancy Vulnerability Detection in Smart Contracts with High Accuracy
    Rutao Yu (Harbin Institute of Technology, Shenzhen, China), Jiangang Shu (Peng Cheng Laboratory, China), Dekai Yan (Harbin Institute of Technology, Shenzhen, China), Xiaohua Jia (Harbin Institute of Technology, Shenzhen, China and City University of Hong Kong, Hong Kong)

  67. Reinforcement Learning based Scheduling for Heterogeneous UAV Networking
    Jian Wang (Embry-Riddle Aeronautical University, USA), Yongxin Liu (Auburn University at Montgomery, USA), Shuteng Niu (Bowling Green State University, USA), Houbing Song (Embry-Riddle Aeronautical University, USA)

  68. Resource Demand Prediction of Cloud Workloads Using an Attention-based GRU Model
    Wenjuan Shu, Fanping Zeng (University of Science and Technology of China, China), Zhen Ling (Southeast University, China), Junyi Liu, Tingting Lu, Guozhu Chen (University of Science and Technology of China, China)

  69. RF-Vsensing: RFID-based Single Tag Contactless Vibration Sensing and Recognition
    Biaokai Zhu, Liyun Tian (Shanxi Police College, China), Die Wu (Sichuan Normal University, China), Meiya Dong (Taiyuan University of Technology, China), Sheng Gao, Lu Zhang, Sanman Liu (Shanxi Police College, China), Deng-Ao Li (Taiyuan University of Technology, China)

  70. Rosella: A Self-Driving Distributed Scheduler for Heterogeneous Clusters
    Qiong Wu, Zhenming Liu (College of William and Mary, USA)

  71. SecQSA: Secure Sampling-Based Quantile Summary Aggregation in Wireless Sensor Networks
    Aishah Aseeri, Rui Zhang (University of Delaware, USA)

  72. Soft Actor-Critic Algorithm for 360-Degree VideoStreaming with Long-Term Viewport Prediction
    Xiaosong Gao, Jiaxin Zeng, Xiaobo Zhou, Tie Qiu, Keqiu Li (Tianjin University, China)

  73. TAP: A Traffic-Aware Probabilistic Packet Markingfor Collaborative DDoS Mitigation
    Liu Mingxing, Liu Ying, Xu Ke, He Lin, Wang Xiaoliang, Guo Yangfei (Tsinghua University, China), Jiang Weiyu (Huawei Technologies, China)

  74. The algorithm of multi-source to multi-sink traffic scheduling
    Yang Liu, Lei Liu, Zhongmin Yan (Shandong University, China), Jia Hu (University of Exeter, UK)

  75. Time-varying Contact Management with Dynamic Programming for LEO Satellite Networks
    Feng Wang, Dingde Jiang (University of Electronic Science and Technology of China, China), Yingjie Chen (Qingdao University, China), Houbing Song (Embry-Riddle Aeronautical University (ERAU), USA), Zhihan Lv (Qingdao University, China)

  76. Towards an Energy-Efficient DQN-based User Association in Sub6GHz/mmWave Integrated Networks
    Thi Ha Ly Dinh, Megumi Kaneko (National Institute of Informatics, Japan), Keisuke Wakao, Kenichi Kawamura, Takatsune Moriyama, Yasushi Takatori (NTT Corporation, Japan)

  77. Towards DTW-based Unlock Scheme using Handwritten Graphics on Smartphones
    Li Wang, Weizhi Meng (Technical University of Denmark, Denmark), Wenjuan Li (The Hong Kong Polytechnic University, Hong Kong)

  78. Towards Efficient Co-aduit of Privacy-Preserving Data on Consortium Blockchain via Group Key Agreement
    Xiaoyan Hu, Xiaoyi Song, Guang Cheng, Jian Gong (Southeast University, China), Lu Yang, Honggang Chen, Zhichao Liang (JiangSu Peerfintech Technology Co., Ltd., China)

  79. Towards Heap-Based Memory Corruption Discovery
    Wenzhi Wang, Meng Fan (Institute of Information Engineering, Chinese Academy of Sciences (CAS) and University of Chinese Academy of Sciences, China), Aimin Yu, Dan Meng (Institute of Information Engineering, Chinese Academy of Sciences (CAS), China)

  80. Towards High Accuracy Low Latency Real-Time Road Information Collection: An Edge-Assisted Sensor Fusion Approach
    You Luo (Simon Fraser University, Canada), Feng Wang (The University of Mississippi, USA), Jiangchuan Liu (Simon Fraser University, Canada)

  81. TraceModel: An Automatic Anomaly Detection and Root Cause Localization Framework for Microservice Systems
    Yang Cai, Biao Han, Jinshu Su (National University of Defense Technology, China), Xiaoyan Wang (Ibaraki University, Japan)

  82. Unsupervised Federated Adversarial Domain Adaptation for Heterogeneous Internet of Things
    Jinfeng Ma, Mengxuan Du, Haifeng Zheng, Xinxin Feng (Fuzhou University, China)

  83. User Cooperative Mobility for Higher QoS in Ad Hoc Network: Framework and Evaluation
    Tutomu Murase (Nagoya University, Japan)

  84. Website Fingerprinting on Access network and Core Gateway
    Hantao Mei, Guang Cheng, Wei Gao, Junqiang Chen (Southeast University, China)

  85. Wireless Network Abnormal Traffic Detection Method Based on Deep Transfer Reinforcement Learning
    Yuanjun Xia, Shi Dong (Wuhan Textile University, China)

1st International Workshop on Intelligent Data Collection in Cyber-Physical Systems (IDC)

  1. 2prong: Adaptive Video Streaming with DNN and MPC
    Yipeng Wang, Tongqing Zhou, Zhiping Cai (National University of Defense Technology, China)

  2. FDataCollector: A Blockchain Based Friendly Web Data Collection System
    Jing Wang, Weiping Zhu, Jianqiao Lai, Zhu Wang (Wuhan University, China)

  3. Mobile Unattended-Operation Detector for Bulk Dangerous Goods Handling
    Nicola Zingirian (University of Padova, Italy), Federico Botti (Click & Find s.r.l, Italy)

  4. The Design and Implementation of an Efficient Quaternary Network Flow Watermark Technology
    Lusha Mo, Gaofeng Lv, Baosheng Wang, Guanjie Qiao, Jing Tan (National University of Defense Technology, China)

  5. TSCF: An Efficient Two-Stage Cuckoo Filter for Data Deduplication
    Tao Liu (Peking University, China), Qinshu Chen (Guangdong Communications & Networks Institute, China), Hui Li, Bohui Wang, Xin Yang (Peking University, China)

2nd International Workshop on Ubiquitous Electric Internet of Things (UEIoT)

  1. A Secure And High Concurrency SM2 Cooperative Signature Algorithm For Mobile Network
    Wenfei Qian, Pingjian Wang, Lingguang Lei, Tianyu Chen, Bikuan Zhang (State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, China)
  2. On Firefly Synchronization of Sleep Phases in Energy Efficient Meshed Networks
    Guido Dietl (Landshut University of Applied Sciences, Germany)
  3. Power information integrated display system based on interconnection technology
    Xiazhe Tu, Chao Xun, Xiangyu Wu, Jinbo Li, Lingyi Yang (Economic and Technological Research Institute State Grid Fujian Electric Power Co., Ltd, China)
  4. Research and Application of Intelligent Distribution Network Planning for Multi-source Data Fusion
    Zhe Wang, Hongda Zhao, Mingxia Zhu (Economic and Technological Research Institute of State Grid Jiangsu Electric Power Co., Ltd, China)
  5. Research on Visual Engine of Smart Planning System Based on Internet of Things
    Hongda Zhao, Mingxia Zhu, Zhe Wang (Economic and Technological Research Institute of State Grid Jiangsu Electric Power Co., Ltd, China)

3rd International Workshop on Artificial Intelligence Applications in Internet of Things (AI2OT)

  1. Eaxming and Evaluating Dimension Reduction Algorithms for Classifying Alzheimer’s Diseases using Gene Expression Data
    Shunbao Li, Po Yang, Vitaveska Lanfranchi (University of Sheffield, UK), Alzheimer’s Disease Neuroimaging Initiative

  2. LSTM for Periodic Broadcasting in Green IoT Applications over Energy Harvesting Enabled Wireless Networks: Case Study on ADAPCAST
    Mustapha Khiati (USTHB, Algeria), Djamel Djenouri (University of the West of England - UWE Bristol, UK), Jianguo Ding (University of Skovde, Sweden), Youcef Djenouri (SINTEF Digital, Norway)

  3. MsfNet: a novel small object detection based on multi-scale feature fusion
    Ziying Song (Hebei University of Science and Technology, China), Peiliang Wu (Yanshan University, China), Kuihe Yang, Yu Zhang, Yi Liu (Hebei University of Science and Technology, China)

  4. Under-determined Blind Speech Separation via the Convolutive Transfer Function and Lp Regularization
    Liu Yang (Guangzhou University, China), Yang Junjie (Guangdong University ot Technology, China), Yi Guo (Western Sydney University, Australia)

3rd International Workshop on Edge Computing and Artificial Intelligence based Sensor-Cloud System (ECAISS)

  1. Continus Finger Tracking System based on Inertial Sensor
    Yangyang Fang, Qun Fang, Xin He (Anhui Normal University, China)

  2. Sequence-based Indoor Relocalization for Mobile Augmented Reality
    Kun Wang (Liaoning Police College, China), Jiaxing Che (Beihang University, China), Zhejun Shen (UnionSys Technology Co. Ltd, China)

  3. Toward Dispersed Computing: Cases and State-of-The-Art
    Sen Yuan, Geming Xia, Jian Chen, Chaodong Yu (National University of Defense Technology, China)

  4. Trust Evaluation of Computing Power Network Based on Improved Particle Swarm Neural Network
    Chaodong Yu, Geming Xia, Zhaohang Wang (National University of Defense Technology, China)

3rd International Workshop on Network Meets Intelligent Computations (NMIC)

  1. A DDoS protection method based on traffic scheduling and scrubbing in SDN
    Yiwei Yu, Guang Cheng, Zihan Chen, Haoxuan Ding (Southeast University, China)

  2. Adaptive Distributed Beacon Congestion Control with MachineLearning in VANETs
    Mahboubeh Mohammadi (Iran University of Science and Technology, Iran), Ali Balador (RISE Research Institute of Sweden, Sweden), Zaloa Fernandez (Vicomtech Foundation, Basque Research and Technology Alliance (BRTA), Spain), Iñaki Val (Ikerlan Technology Research Centre, Spain)

  3. AND: Effective Coupling of Accuracy, Novelty and Diversity in the Recommender System
    Di Han (Guangdong University of Finance, China), Yifan Huang, Xiaotian Jing, Junmin Liu (Xi'an Jiaotong University, China)

  4. Attention-based Bicomponent Synchronous Graph Convolutional Network for traffic flow prediction
    Cheng Shen, Kai Han, Tianyuan Bi (University of Science and Technology of China, China)

  5. Intelligent IDS Chaining for Network Attack Mitigation in SDN
    Mikhail Zolotukhin, Pyry Kotilainen, Timo Hämäläinen (University of Jyväskylä, Finland)

  6. Interference and Consultation in Virtual Public Space: The Practice of Intermedia Art in Metaverse
    Rongman Hong (Guangzhou Academy of Fine Arts, China), Hao He (The Chinese University of Hong Kong, Shenzhen, China)

  7. Large-Area Human Behavior Recognition withCommercial Wi-Fi Devices
    Tao Liu (The University of Aizu, Japan), Shengli Pan (Beijing University of Posts and Telecommunications, China), Peng Li (The University of Aizu, Japan)

  8. Reliable Routing and Scheduling in Time-Sensitive Networks
    Hongtao Li, Hao Cheng, Lei Yang (South China University of Technology, China)

  9. Seshat: Decentralizing Oral History Text Analysis
    Lin Wang (Guangzhou Academy of Fine Arts, China), Lehao Lin (The Chinese University of Hong Kong, Shenzhen, China), Xiao Wu (White Matrix Inc., China), Rongman Hong (Guangzhou Academy of Fine Arts, China)

Poster Track

  1. Demonstrator Game Showcasing Indoor Positioning via BLE Signal Strength
    Felix Beierle (University of Würzburg, Germany), Hai Dinh-Tuan, Yong Wu (Technische Universität Berlin, Germany)

  2. Indoor Navigation for Users with Mobility Aids Using Smartphones and Neighborhood Networks
    Bo Hui, Chen Jiang, Pavani Ankireddy (Auburn University, USA), Wenlu Wang (Texas A&M University-Corpus Christi (TAMUCC), USA), Wei-Shinn Ku (Auburn University, USA)

  3. L-KPCA: an efficient feature extraction method for network intrusion detection
    Jinfu Chen, Shang Yin, Saihua Cai, Lingling Zhao, Shengran Wang (Jiangsu University, China)

  4. Optimizing microservices with hyperparameter optimization
    Hai Dinh-Tuan, Katerina Katsarou, Patrick Herbke (Technische Universität Berlin, China)







News

Important Days

  • July 2, 2021

    Paper Submission Due

  • July 23, 2021

    Paper Submission Due(extended)

  • August 3, 2021

    Paper Submission Due(Frim)

  • Sep 15, 2021

    Author Notification

  • Oct 20, 2021

    Camera-Ready Due

  • Dec 13-15, 2021

    Conference Date

Copyright © 2021 International Conference on Mobility, Sensing and Networking