Program
Click here to download the conference brief
Click here to download the conference proceedings
Monday, February 20
Monday, February 20 8:20 - 8:30
Opening Remarks
Room: Pi'inaio Ballroom 1
Chairs: Cheng Li, Hussein T. Mouftah
Monday, February 20 8:30 - 9:30
Keynote I: Federated Learning in V2X Networks
Prof. Vincent Poor, Princeton University, USA
Room: Pi'inaio Ballroom 1Chair: Cheng Li
Monday, February 20 9:30 - 10:00
Coffee Break
Monday, February 20 10:00 - 12:00
AI and Machine Learning for Communications and Networking
AMCN I
Room: Palolo 1Chair: Wencong Su
- Deep Reinforcement Learning Based Resource Allocation for 5G V2V Groupcast Communications
- A Refined Energy Optimization Model for Edge Computing with Machine Learning
- Hierarchical Bayesian Attractor Model for Dynamic Task Allocation in Edge-Cloud Computing
- Impact of Grammar on Language Model Comprehension
- Deep Reinforcement Learning-Based Optimal Parameter Design of Power Converters
- Neural Network based Unsupervised Face and Mask Detection in Surveillance Networks
Communications and Information Security
CIS I
Room: Palolo 2Chair: Olusola Tolulope Odeyomi
- On False Data Injection Attack against Building Automation Systems
- Optimal Codes for Distributed Storage
- Membership Management in Collaborative Intrusion Detection Systems
- Wiggle: Physical Challenge-Response Verification of Vehicle Platooning
- Network Anomaly Detection using a Graph Neural Network
- Byzantine-Resilient Federated Learning With Differential Privacy Using Online Mirror Descent
Edge Computing, Cloud Computing, and Big Data
ECB I
Room: Palolo 3Chair: Yuanzhu Chen
- Adaptive Resource Allocation in Quantum Key Distribution (QKD) for Federated Learning
- Study on High Availability and Fault Tolerance
- Real-Time Search and Rescue using Remotely Piloted Aircraft System with Frame Dropping
- Emergency Surgical Scheduling Model Based on Moth-flame Optimization Algorithm
- Trust and Rewards in a Two-Tier Consensus Architecture
- Analysis of Job Completion Time in Vehicular Cloud Under Concurrent Task Execution
Next Generation Networks and Internet Applications
NGNI I
Room: Palolo 4Chair: Tilman Wolf
- LEO Satellite Communication in IoRT: a Virtual MISO Model
- Towards Programmable Networking With CoopNet: A Horizontal Parallel Multipath Approach
- Implementing Virtual Network Functions in Named Data Networking and Web 3.0
- Performance Analysis of Fixed Broadband Wireless Access in mmWave Band in 5G
- Network Services Management using Programmable Data Planes for Visual Cloud Computing
- Augmenting Campus Wireless Architectures with SDN
Invited Talks I
Room: Pi'inaio Ballroom 1
Chair: Rose Qingyang Hu
- Time-space synchronized digital twin for B5G managed network
- Interconnectedness -- from classic theory of graphs to emerging science of networks
- Federated Learning With Efficiency and Privacy Considerations in Wireless Networks
- Distributed Software Applications Based on Mobile Cloud and Software-Defined Networks
Monday, February 20 12:00 - 13:30
Lunch (self-pay)
Monday, February 20 13:30 - 15:30
Plenary Talks I
A concept of user-centric ultra-dense distributed MIMO towards realizing Beyond 5G systems
Prof. Fumiyuki Adachi, Tohoku University, Japan;
OT Cybersecurity Verification and Validation
Prof. Hamid Sharif, University of Nebraska-Lincoln, USA.
Chairs: Hossam S. Hassanein, Hossam S. Hassanein
Monday, February 20 15:30 - 16:00
Coffee Break
Monday, February 20 16:00 - 18:00
AI and Machine Learning for Communications and Networking
AMCN II
Room: Palolo 1Chairs: Hovannes K. Kulhandjian, Hao Xu
- AI-based RF-Fingerprinting Framework and Implementation using Software-Defined Radios
- Reinforcement Learning based Optimal Dynamic Resource Allocation for RIS-aided MIMO Wireless Network with Hardware Limitations
- The Hysteresis Effect of Momentum Spillover in Asset Pricing via Spatial-Temporal Graph Learning
- Dynamic Spectrum Access in Non-stationary Environments: A DRL-LSTM Integrated Approach
- Pedestrian Detection and Avoidance at Night Using Multiple Sensors and Machine Learning
- Blockchain-based Data Quality Assessment to Improve Distributed Machine Learning
Communications and Information Security
CIS II
Room: Palolo 2Chair: Yantian Hou
- A Hybrid Delay-aware Approach towards UAV Flight Data Anomaly Detection
- Adversarial Technique Validation & Defense Selection Using Attack Graph & ATT&CK Matrix
- Virtual Curtain: A Communicative Fine-grained Privacy Control Framework for Augmented Reality
- Using Blockchain for Decentralized Artificial Intelligence with Data Privacy
- Evaluating Generative Adversarial Networks: A Topological Approach
- Consensus algorithms for Opt-in/Opt-out and proximity marketing context
Edge Computing, Cloud Computing, and Big Data
ECB II
Room: Palolo 3Chair: Vincent Latzko
- Wrapper-Based Federated Feature Selection for IoT Environments
- Deep learning inference time guarantee in near future edge computing
- Effectiveness and predictability of in-network storage cache for Scientific Workflows
- Energy-Aware and Fair Multi-User Multi-Task Computation Offloading
- An edge computing-based monitoring framework for situation-aware embedded real-time systems
Next Generation Networks and Internet Applications
NGNI II
Room: Palolo 4Chair: Qiang Ye
- Warehouse Deployment: A Comparative Measurement Study of Commercial Wi-Fi and CBRS Systems
- SPA: A Scalable Pedestrian-awareness Application using NDN over CV2X
- Hyperbolic Routing for Cache Privacy in Information Centric Networking
- A Simple UDP-Based Web Server on a Bare PC with 64-bit Multicore Processors: Design and Implementation
- Enable Computation in the Network for Driver Assistance with Object Notification and Augmentation
- Metaverse-based education service adoption and preference study using conjoint analysis
Invited Talks II
Room: Pi'inaio Ballroom 1
Chair: Xinwen Fu
- Wicked bizarre semiconductor physics of sensor security
- IoT Phantom-Delay Attacks: Demystifying and Exploiting IoT Timeout Behaviors
- Unified View of IoT and CPS Security and Privacy
- Deep autoencoders for analysis of single-cell RNA sequencing data