Program

Click here to download the conference brief
Click here to download the conference proceedings

Honolulu time Monday, February 20 Tuesday, February 21 Wednesday, February 22
8:20 ‑ 8:30 Opening Remarks    
8:30 ‑ 9:30 Keynote I: Federated Learning in V2X Networks Keynote II: Stochastic Cumulative DNN Inference for Intelligent IoT Applications Keynote III: Going Off the Deep End with Deep Learning
9:30 ‑ 10:00 Coffee Break Coffee Break Coffee Break
10:00 ‑ 12:00 Invited Talks I
AI and Machine Learning for Communications and Networking
Communications and Information Security
Edge Computing, Cloud Computing, and Big Data
Next Generation Networks and Internet Applications
Invited Talks III
AI and Machine Learning for Communications and Networking
Communications and Information Security
Mobile and Wireless Networking
Wireless Communications
Distinguished Lecture I: Adaptive Ensemble Q-learning: Minimizing Estimation Bias via Error Feedback.
Invited Talks V
Communications and Information Security
Social Computing and Semantic Data Mining
Wireless Ad hoc and Sensor Networks
12:00 ‑ 13:30 Lunch (self-pay) Lunch (self-pay) Lunch (self-pay)
13:30 ‑ 15:30 Plenary Talks I Plenary Talks II Distinguished Lecture II: RFID-based 3D Human Pose Tracking: Design, Generalization, and Data Augmentation
Invited Talks VI
Next Generation Networks and Internet Applications and Mobile and Wireless Networking
Network Algorithms and Performance Evaluation
Wireless Ad hoc and Sensor Networks
15:30 ‑ 16:00 Coffee Break Coffee Break Coffee Break
16:00 ‑ 18:00 Invited Talks II
AI and Machine Learning for Communications and Networking
Communications and Information Security
Edge Computing, Cloud Computing, and Big Data
Next Generation Networks and Internet Applications
Invited Talks IV AI and Machine Learning for Communications and Networking
Communications and Information Security
Multimedia Computing and Communications
Distinguished Lecture III: Machine Learning and Security for Vehicular Communication Networks
Invited Talks VII
Network Advances
Network Algorithms and Performance Evaluation
18:00 ‑ 19:00      
19:00 ‑ 21:00 Reception (Pi'inaio Ballroom 2) Banquet (Pi'inaio Ballroom 2)  

Monday, February 20

Monday, February 20 8:20 - 8:30

Opening Remarks

Room: Pi'inaio Ballroom 1
Chairs: Cheng Li, Hussein T. Mouftah

Monday, February 20 8:30 - 9:30

Keynote I: Federated Learning in V2X Networks

Prof. Vincent Poor, Princeton University, USA
Room: Pi'inaio Ballroom 1
Chair: Cheng Li

Monday, February 20 9:30 - 10:00

Coffee Break

Monday, February 20 10:00 - 12:00

AI and Machine Learning for Communications and Networking

AMCN I
Room: Palolo 1
Chair: Wencong Su
Deep Reinforcement Learning Based Resource Allocation for 5G V2V Groupcast Communications
Shang-Huan Wu, Ren-Hung Hwang, Chih-Yu Wang and Ching-Hsuan Chou
A Refined Energy Optimization Model for Edge Computing with Machine Learning
Xian Liu, Changcheng Huang and Wilsun Xu
Hierarchical Bayesian Attractor Model for Dynamic Task Allocation in Edge-Cloud Computing
Tatsuya Otoshi, Masayuki Murata, Hideyuki Shimonishi and Tetsuya Shimokawa
Impact of Grammar on Language Model Comprehension
Kimia Ameri, Michael Hempel, Hamid Sharif, Juan Lopez Jr. and Kalyan S. Perumalla
Deep Reinforcement Learning-Based Optimal Parameter Design of Power Converters
Van-Hai Bui, Fangyuan Chang, Wencong Su, Mengqi Wang, Yi Lu Murphey, Felipe Leno Da Silva, Can Huang, Xue Lincoln and Ruben Glatt
Neural Network based Unsupervised Face and Mask Detection in Surveillance Networks
Aninda Roy Ani, Sabir Saheel, Tarem Ahmed and Faisal Uddin

Communications and Information Security

CIS I
Room: Palolo 2
Chair: Olusola Tolulope Odeyomi
On False Data Injection Attack against Building Automation Systems
Michael Cash, Christopher Morales-Gonzalez, Shan Wang, Xipeng Jin, Alex Parlato, Jason Zhu, Qun Zhou Sun and Xinwen Fu
Optimal Codes for Distributed Storage
Jian Ren, Jian Li and Tongtong Li
Membership Management in Collaborative Intrusion Detection Systems
Chukwuebuka Ezelu and Ulrich Buehler
Wiggle: Physical Challenge-Response Verification of Vehicle Platooning
Connor Dickey, Christopher Smith, Quentin Johnson, Jingcheng Li, Ziqi Xu, Loukas Lazos and Ming Li
Network Anomaly Detection using a Graph Neural Network
Patrice Kisanga, Isaac Woungang, Issa Traore and Glaucio Carvalho
Byzantine-Resilient Federated Learning With Differential Privacy Using Online Mirror Descent
Olusola Tolulope Odeyomi and Gergely Zaruba

Edge Computing, Cloud Computing, and Big Data

ECB I
Room: Palolo 3
Chair: Yuanzhu Chen
Adaptive Resource Allocation in Quantum Key Distribution (QKD) for Federated Learning
Rakpong Kaewpuang, Minrui Xu, Dusit Niyato, Han Yu, Zehui Xiong and Sherman Shen
Study on High Availability and Fault Tolerance
Norman Kong Koon Kit and Michal Aibin
Real-Time Search and Rescue using Remotely Piloted Aircraft System with Frame Dropping
Rohan Sharma and Michal Aibin
Emergency Surgical Scheduling Model Based on Moth-flame Optimization Algorithm
Cuiting Huang, Sicong Ye, Shi Shuai, Mengdi Wei, Yehong Zhou, Ania Aibin and Michal Aibin
Trust and Rewards in a Two-Tier Consensus Architecture
Haytham Qushtom, Jelena Mišić, Vojislav B. Mišić and Xiaolin Chang
Analysis of Job Completion Time in Vehicular Cloud Under Concurrent Task Execution
Chinh Tran and Mustafa Mehmet-Ali

Next Generation Networks and Internet Applications

NGNI I
Room: Palolo 4
Chair: Tilman Wolf
LEO Satellite Communication in IoRT: a Virtual MISO Model
Xian Liu
Towards Programmable Networking With CoopNet: A Horizontal Parallel Multipath Approach
Razvan Cristian Voicu and Yusun Chang
Implementing Virtual Network Functions in Named Data Networking and Web 3.0
Puming Fang and Tilman Wolf
Performance Analysis of Fixed Broadband Wireless Access in mmWave Band in 5G
Soumya Banerjee, Sarada Prasad Gochhayat and Sachin Shetty
Network Services Management using Programmable Data Planes for Visual Cloud Computing
Alicia Esquivel Morel, Prasad Calyam, Chengyi Qu, Durbek Gafurov, Cong Wang, Komal Thareja, Anirban Mandal, Eric Lyons, Michael Zink, George Papadimitriou and Ewa Deelman
Augmenting Campus Wireless Architectures with SDN
William Brockelsby and Rudra Dutta

Invited Talks I

Room: Pi'inaio Ballroom 1
Chair: Rose Qingyang Hu
Time-space synchronized digital twin for B5G managed network
Naoaki Yamanaka
Interconnectedness -- from classic theory of graphs to emerging science of networks
Yuanzhu Chen
Federated Learning With Efficiency and Privacy Considerations in Wireless Networks
Rose Qingyan Hu
Distributed Software Applications Based on Mobile Cloud and Software-Defined Networks
Sergei Gorlatch

Monday, February 20 12:00 - 13:30

Lunch (self-pay)

Monday, February 20 13:30 - 15:30

Plenary Talks I

A concept of user-centric ultra-dense distributed MIMO towards realizing Beyond 5G systems

Prof. Fumiyuki Adachi, Tohoku University, Japan;

OT Cybersecurity Verification and Validation

Prof. Hamid Sharif, University of Nebraska-Lincoln, USA.
Room: Pi'inaio Ballroom 1
Chairs: Hossam S. Hassanein, Hossam S. Hassanein

Monday, February 20 15:30 - 16:00

Coffee Break

Monday, February 20 16:00 - 18:00

AI and Machine Learning for Communications and Networking

AMCN II
Room: Palolo 1
Chairs: Hovannes K. Kulhandjian, Hao Xu
AI-based RF-Fingerprinting Framework and Implementation using Software-Defined Radios
Hovannes K. Kulhandjian, Elizabeth Batz, Eduardo Garcia, Selena Vega, Sanjana Velma, Michel Kulhandjian, Claude D'Amours, Burak Kantarci and Tathagata Mukherjee
Reinforcement Learning based Optimal Dynamic Resource Allocation for RIS-aided MIMO Wireless Network with Hardware Limitations
Yuzhu Zhang, Lijun Qian, Abdullah Eroglu, Binbin Yang and Hao Xu
The Hysteresis Effect of Momentum Spillover in Asset Pricing via Spatial-Temporal Graph Learning
Chenhao He, Qing Li, Rui Cheng, Jun Wang and Jinghua Tan
Dynamic Spectrum Access in Non-stationary Environments: A DRL-LSTM Integrated Approach
Mingjie Feng, Wenhan Zhang and Marwan Krunz
Pedestrian Detection and Avoidance at Night Using Multiple Sensors and Machine Learning
Hovannes K. Kulhandjian, Jeremiah Barron, Megan Tamiyasu, Mateo Thompson and Michel Kulhandjian
Blockchain-based Data Quality Assessment to Improve Distributed Machine Learning
Yao Du, Zehua Wang, Cyril Leung and Victor C.M. Leung

Communications and Information Security

CIS II
Room: Palolo 2
Chair: Yantian Hou
A Hybrid Delay-aware Approach towards UAV Flight Data Anomaly Detection
Mengjie Jia, Ashok Vardhan Raja and Jiawei Yuan
Adversarial Technique Validation & Defense Selection Using Attack Graph & ATT&CK Matrix
Md Ariful Haque, Sachin Shetty, Charles A Kamhoua and Kimberly Gold
Virtual Curtain: A Communicative Fine-grained Privacy Control Framework for Augmented Reality
Aakash Shrestha, Yantian Hou, Min Long and Jiawei Yuan
Using Blockchain for Decentralized Artificial Intelligence with Data Privacy
Anand Surendra Masurkar, Xiaoyan Sun and Jun Dai
Evaluating Generative Adversarial Networks: A Topological Approach
Narges Alipourjeddi and Ali Miri
Consensus algorithms for Opt-in/Opt-out and proximity marketing context
Fatima Chahal, Hacene Fouchal and Dominique Gaïti

Edge Computing, Cloud Computing, and Big Data

ECB II
Room: Palolo 3
Chair: Vincent Latzko
Wrapper-Based Federated Feature Selection for IoT Environments
Afsaneh Mahanipour and Hana Khamfroush
Deep learning inference time guarantee in near future edge computing
Kouichi Genda
Effectiveness and predictability of in-network storage cache for Scientific Workflows
Caitlin Sim, Kesheng Wu, Alex Sim, Inder Monga, Chin Guok, Frank Wurthwein, Diego Davila, Harvey Newman and Justas Balcas
Energy-Aware and Fair Multi-User Multi-Task Computation Offloading
Vincent Latzko, Osel Lhamo, Mahshid Mehrabi, Christian Leonard Vielhaus and Frank H.P. Fitzek
An edge computing-based monitoring framework for situation-aware embedded real-time systems
Nayreet Islam and Akramul Azim

Next Generation Networks and Internet Applications

NGNI II
Room: Palolo 4
Chair: Qiang Ye
Warehouse Deployment: A Comparative Measurement Study of Commercial Wi-Fi and CBRS Systems
Vanlin Sathya, Lyutianyang Zhang, Mohit Goyal and Mehmet Yavuz
SPA: A Scalable Pedestrian-awareness Application using NDN over CV2X
Proyash Podder, Azin Neishaboori, Somak Datta Gupta and Alexander Afanasyev
Hyperbolic Routing for Cache Privacy in Information Centric Networking
Sean Cannan, Andrew Jones and Robert Simon
A Simple UDP-Based Web Server on a Bare PC with 64-bit Multicore Processors: Design and Implementation
Navid Ordouie, Ramesh Karne, Alexander L Wijesinha and Nirmala Soundararajan
Enable Computation in the Network for Driver Assistance with Object Notification and Augmentation
Lijun Dong and Richard Li
Metaverse-based education service adoption and preference study using conjoint analysis
Junghwan Lee

Invited Talks II

Room: Pi'inaio Ballroom 1
Chair: Xinwen Fu
Wicked bizarre semiconductor physics of sensor security
Kevin Fu
IoT Phantom-Delay Attacks: Demystifying and Exploiting IoT Timeout Behaviors
Xiaojiang Du
Unified View of IoT and CPS Security and Privacy
Xinwen Fu
Deep autoencoders for analysis of single-cell RNA sequencing data
Zhi Wei

Monday, February 20 19:00 - 21:00

Reception (Pi'inaio Ballroom 2)

Room: Pi'inaio Ballroom 2

Tuesday, February 21

Tuesday, February 21 8:30 - 9:30

Keynote II: Stochastic Cumulative DNN Inference for Intelligent IoT Applications

Prof. Weihua Zhuang, University of Waterloo, Canada
Room: Pi'inaio Ballroom 1
Chair: Cheng Li

Tuesday, February 21 9:30 - 10:00

Coffee Break

Tuesday, February 21 10:00 - 12:00

AI and Machine Learning for Communications and Networking

AMCN III
Room: Palolo 1
Chair: Chin-Tser Huang
Evaluation of Different Time Series Forecasting Models for 5G V2V Networks
Jian Liu and Chin-Tser Huang
Activity Detection for Grant-Free NOMA in Massive IoT Networks
Mehrtash Mehrabi, Mostafa Mohammadkarimi and Masoud Ardakani
Implementation of Real-Time Adversarial Attacks on DNN-based Modulation Classifier
Eyad Shtaiwi, Ahmed Refaey, Awais Khawar, Ahmed Alkhateeb, Ahmed Abdelhadi and Zhu Han
A Machine Learning Approach for the Detection of Injection Attacks on ADS-B Messaging Systems
Joshua Price, Hadjar Ould Slimane, Khair Al Shamaileh, Vijay Devabhaktuni and Naima A Kaabouch
Hensel's Compression-Based Dimensionality Reduction Approach for Privacy Protection in Federated Learning
Ahmed El ouadrhiri, Ahmed Abdelhadi and Phu H. Phung

Communications and Information Security

CIS III
Room: Palolo 2
Chair: Felix Ferreira
Secrecy Performance and Power Allocation for Cooperative Vehicular Relaying Networks in the Presence of Interference
Mohamed G. Abd El Ghafour, Ahmed Hassan Abd El-Malek and Mohamed Abozahhad
On an Integrated Security Framework for Defense Against Various DDoS Attacks in SDN
Hao Wu, Aiqin Hou, Weike Nie and Chase Q. Wu
Flick me once and I know it's you! Flicking-based Implicit Authentication for Smartwatch
Yanyan Li, Felix Ferreira and Mengjun Xie
SGChain: Blockchain Platform for Availability Attack Mitigation in Smart Grid Environments
Roshan Neupane, Pravin Bhandari, Prasad Calyam and Reshmi Mitra
A Zero-Trust Framework for Industrial Internet of Things
Adel Atieh, Priyadarsi Nanda and Manoranjan Mohanty
TPMWallet: Towards Blockchain Hardware Wallet using Trusted Platform Module in IoT
Wei-Yang Chiu, Weizhi Meng and Wenjuan Li

Mobile and Wireless Networking

MWN
Room: Palolo 3
Chair: Jing Deng
Estimation of Cellular Wireless User Coordinates via Channel Charting and MUSIC
Amr Aly and Ender Ayanoglu
Time-Topology Routing in 3D Networks
Tomohiro Korikawa, Chikako Takasaki, Kyota Hattori and Hidenari Oowada
Traffic Behavior-based Device Type Classification
Chikako Takasaki, Tomohiro Korikawa, Kyota Hattori and Hidenari Oowada
Enabling PeerCloud in Vehicular Networks: Feasibility and Reliability of Vehicle-to-Vehicle Offloading
Xiaomei Zhang
Transmission-Cost Minimization for Packet-level Coding on Multi-path Wireless Networks
Wei Mao, Shu-ping Yeh, Jing Zhu, Hosein Nikopour and Shilpa Talwar
perMAC: Perturbation-based MAC for Dense Wireless Networks with Periodic Traffic
Jing Deng, Po-Ning Chen and Yunghsiang Sam Han

Wireless Communications

WC
Room: Palolo 4
Chair: Hamid Sadjadpour
Is Active IRS Useful for mmWave Wireless Networks or Not?
Jalal Jalali, Ata Khalili, Atefeh Rezaei and Jeroen Famaey
Can We Have a Better System than OFDM?
Tongtong Li, Jian Ren and Jinxian Deng
ECEA Based Joint Circular Design of Reconfigurable Intelligent Surfaces with Drone During Disaster
Sabila Newaz and Xingya Liu
Ergodic Capacity of the Cloud Radio Access Network: A General Solution
Xian Liu
A novel information-directed tree-search algorithm for RIS phase optimization in massive MIMO
Fnu I. Zakir Ahmed, Hamid Sadjadpour and Shahram Yousefi

Invited Talks III

Room: Pi'inaio Ballroom 1
Chair: Yu Cheng
Wave-Controlled Reconfigurable Intelligent Surfaces
Lee Swindlehurst
Blockchain-enabled Edge Intelligence for 6G IoT
Victor Leung
Application-Oriented Scheduling for Optimizing Information Freshness in Wireless Networks
Yu Cheng

Tuesday, February 21 12:00 - 13:30

Lunch (self-pay)

Tuesday, February 21 13:30 - 15:30

Plenary Talks II

Learning for Resilient Virtualized Edge Computing

Prof. Falko Dressler, TU Berlin, Germany;

From Edge Video Analytics to Federated Learning

Prof. Ling Liu, Georgia Institute of Technology, USA.
Room: Pi'inaio Ballroom 1
Chair: Vojislav B. Mišić

Tuesday, February 21 15:30 - 16:00

Coffee Break

Tuesday, February 21 16:00 - 18:00

AI and Machine Learning for Communications and Networking

AMCN IV
Room: Palolo 1
Chair: Matteo Anedda
CMRCV: Causal Modeling To Localize Failed Equipment by Representative Nodes and Contribution Values
Yoichi Matsuo, Yuusuke Nakano and Keishiro Watanabe
Towards Instant Clustering Approach for Federated Learning Client Selection
Sarhad Arisdakessian, Omar Abdel Wahab, Azzam Mourad and Hadi Otrok
Using Artificial Intelligence and IoT Solution for Forest Fire Prevention
Matteo Anedda, Giovanni Pettorru, Roberto Girau, Mauro Fadda, Daniel D Giusto and Mariella Sole
Hybrid Quantum Machine learning using Quantum Integrated Cloud Architecture
Samih Fadli, Bharat S Rawal and Andrew Mentges

Communications and Information Security

CIS IV
Room: Palolo 2
Chair: Chin-Tser Huang
Towards Secure Communications in Heterogeneous Internet of Things
James Nguyen, Weixian Liao and Wei Yu
A privacy awareness framework for NFT avatars in the metaverse
Dorottya Zelenyanszki, Zhe Hou, Kamanashis Biswas and Vallipuram Muthukkumarasamy
AI-based Cyber Event OSINT via Twitter Data
Dakota Dale, Kylie L McClanahan and Qinghua Li
Deep Learning Based Malapps Detection in Android Powered Mobile Cyber-Physical System
Moinul Islam Sayed, Sajal Saha and Anwar Haque
On Line Secure Elements: Deploying High Security Keystores and Personal HSMs
Pascal Urien
AFFIRM: Privacy-by-Design Blockchain for Mobility Data in Web3 using Information Centric Fog Networks with Collaborative Learning
Junaid Ahmed Khan and Kaan Ozbay

Multimedia Computing and Communications

MCC
Room: Palolo 3
Chair: Panos Nasiopoulos
COVID-19 Fake News Detector
Junjie Liu and Min Chen
Shallow- and Deep-fake Image Manipulation Localization Using Deep Learning
Junbin Zhang, Hamid Reza Tohidypour, Yixiao Wang and Panos Nasiopoulos
A Deep Learning Based Tone Mapping Operator for 4K HDR Images Focusing on Color Accuracy and Artistic Intent
Junbin Zhang, Yixiao Wang, Hamid Reza Tohidypour, Mahsa T Pourazad and Panos Nasiopoulos
Guiding Interactive Film With Emotion-Profiling Chatbots
Celina L. Ma, Haohong Wang and Mea Wang

Invited Talks IV

Room: Pi'inaio Ballroom 1
Chair: Shaoen Wu
Stealthy Adversarial Machine Learning Attacks on RF Signal Classifiers: Algorithms and Countermeasures
Marwan Krunz
Anticipatory Radio Resource Management for 5G Networks and Beyond
Hassam Hassanein
Generative Steganography via Live Commenting on Streaming Videos
Jie Wang
Deep Learning based Radar Sensing: From Traditional to Lightweight
Shaoen Wu
Room: Pi'inaio Ballroom 1
Chair: Shaoen Wu

Tuesday, February 21 19:00 - 21:00

Banquet (Pi'inaio Ballroom 2)

Room: Pi'inaio Ballroom 2

Wednesday, February 22

Wednesday, February 22 8:30 - 9:30

Keynote III: Going Off the Deep End with Deep Learning

Prof. Richard G. Baraniuk, Rice University, USA.
Room: Pi'inaio Ballroom 1
Chair: Jian Ren

Wednesday, February 22 9:30 - 10:00

Coffee Break

Wednesday, February 22 10:00 - 12:00

Invited Talks V

Room: Palolo 1
Chair: Jelena Mišić
DCWiz: Transforming Data Center Operations and Management with AI
Yonggang Wen
Towards Automating Network Operation Centers with AI
Shervin Shirmohammadi
An in-depth look at Deep Learning in Digital Media
Panos Nasiopoulos
Adapting Practical Byzantine Fault Tolerance (PBFT) for use with Blockchain-enable IoT systems
Jelena Misic

Communications and Information Security

CIS V
Room: Palolo 2
Chair: Ranwa Al Mallah
Using Diversity to Evolve More Secure and Efficient Virtual Local Area Networks
Ariel J. Aizpurua, Errin Fulp and Daniel Canas
On the Placement of Edge Servers in Mobile Edge Computing
Haotian Liu, Shiyun Wang, Hui Huang and Qiang Ye
Malicious Model Detection for Federated Learning Empowered Energy Storage Systems
Xu Wang, Yuanzhu Chen and Octavia A. Dobre
Cloud Security Requirement Based Threat Analysis
Ahmed Taha, Alexander Lawall and Neeraj Suri
Blockchain-enabled Efficient and Secure Federated Learning in IoT and Edge Computing Networks
Ranwa Al Mallah, David López and Talal Halabi

Social Computing and Semantic Data Mining

SCDM
Room: Palolo 3
Chair: Samih Fadli
Early Rumor Detection in Social Media Based on Graph Convolutional Networks
Niteesh Reddy Thota, Xiaoyan Sun and Jun Dai
Evaluating Weather Influence on User Participation in a Crowd-sensing Application
Iran Ribeiro, Vitor F Calmon, Thiago H. Silva, Celso Alberto Saibel Santos and Vinícius Fernandes Mota
Verification of a method for latent interest estimation based on user behavior analysis and POI attributes
Takanobu Omura, Felix B. Dollack, Panote Siriaraya, Da Li, Katsumi Tanaka, Yukiko Kawai and Shinsuke Nakajima
Preliminary Analysis of Dietary Management Support Method for Improving the Symptoms in Irritable Bowel Syndrome
Takuya Yamanaka, Da Li and Shinsuke Nakajima
Prioritizing transaction delivery in Ethereum network
Soosan Naderi Mighan, Jelena Mišić and Vojislav B. Mišić

Wireless Ad hoc and Sensor Networks

WASN I
Room: Palolo 4
Chair: Danijela Cabric
Distributed UAV Swarm Placement Optimization for Compressive Sensing based Target Localization
Yen-Chin Wang and Danijela Cabric
Wake-up Control for Energy-efficient Identifications of Multiple Emission Sources in Wireless Sensor Networks
Junya Shiraishi and Hiroyuki Yomo
A Novel Multivariate and Accurate Detection Scheme for Electricity Theft Attacks in Smart Grids
Alaa Awad Abdellatif, Aya Amer, Khaled Bashir Shaban and Ahmed Massoud
Two-Stage Online Reinforcement Learning based Distributed Optimal Resource Allocation for Multiple RIS-assisted Mobile Ad-Hoc Network
Yuzhu Zhang and Hao Xu
Mobile Sensing Cluster with Orbiting Mutant for Indistinguishable Events in Noisy Environments
Naoki Fujiyama, Shoma Izuhara, Shoma Nishigami, Eiji Nii, Hiroyuki Yomo and Yasuhisa Takizawa

Distinguished Lecture I: Adaptive Ensemble Q-learning: Minimizing Estimation Bias via Error Feedback.

Prof. Junshan Zhang, University of California, Davis, USA.
Room: Pi'inaio Ballroom 1
Chair: Jian Ren

Wednesday, February 22 12:00 - 13:30

Lunch (self-pay)

Wednesday, February 22 13:30 - 15:30

Invited Talks VI

Room: Palolo 1
Chair: Cedric Westphal
5G NR-Light at Millimeter Waves: Design Guidelines for Mid-Market IoT Use Cases
Michele Zorzi
"Zero-Power" RFID-enabled Wireless/B5G Ultrabroadband Modules for IoT, SmartAg, Industry 4.0 and Smart Cities Applications: from dream to reality with Additive Manufacturing
Manos M. Tentzeris
6G Wireless for Sustainable Development Goals
Li-Chun Wang
What Color is Your Internet? And Can We Make it Green?
Cedric Westphal

Next Generation Networks and Internet Applications and Mobile and Wireless Networking

NGNI / MWN
Room: Palolo 2
Chair: Cedric Westphal
A Deep Q-Learning Connectivity-Aware Pheromone Mobility Model for Autonomous UAV Networks
Shreyas Devaraju, Alexander Ihler and Sunil Kumar
Optimization Framework for Green Networking (Invited Paper)
Cedric Westphal and Alexander Clemm
SEANAC: Schema Enforced Automation of Name-based Access Control
Proyash Podder and Alexander Afanasyev
A-C: An NDN-based Blockchain Network With Erasure Coding
Ruiran Wang, Laurent Njilla and Shucheng Yu

Network Algorithms and Performance Evaluation

NAPE I
Room: Palolo 3
Chair: Yuanzhu Chen
Evolutionary Algorithm with Phenotype Diversity for Virtual Network Embedding
Tatsuya Otoshi and Masayuki Murata
Client-Transparent and Self-Managed MQTT Broker Federation at the Application Layer
Jose Fernando de Lacerda Machado, Jr., Marco Aurelio Spohn and Lisandro Z Granville
Joint Task and Flow Scheduling for Time-Triggered and Strict-Priority Networks
Anna Arestova, Lisa Maile, Nurbek Halikulov, Kai-Steffen J. Hielscher and Reinhard German
VM consolidation considering cores, memory, load for energy-constrained data centers
Muhammad Ali, Iryna Andriyanova and Jerome David
A Two-stage Trunk Reservation Control Method corresponding to General Call Priority using Switch Outside Disaster Area
Yoichiro Arii, Katsunori Yamaoka and Ken-ichi Baba
IP Transformation Initiatives to Generate Scalable Functional Verification Collaterals for Smart Reusability and Reduced Effort for Sign-off
Surajit Bhattacherjee and Dipankar Pal

Wireless Ad hoc and Sensor Networks

WASN II
Room: Palolo 4
Chair: Stefano Basagni
ABP vs. OTAA activation of LoRa devices: an Experimental Study in a Rural Context
Anderson Monteiro da Rocha, Marcos Antonio de Oliveira, Jr, José F. M. Pauletti and Gerson Geraldo H. Cavalheiro
DAWN-Sim: A Distributed Algorithm Simulator for Wireless Ad-hoc Networks in Python
Mustafa Tosun, Umut Can Cabuk, Orhan Dagdeviren and Yusuf Ozturk
A Reservation-based Adaptive MAC Protocol for OFDM Physical Layers in Underwater Networks
Sara Falleni, Tommaso Melodia and Stefano Basagni
Simulation-based Performance Analysis of an NR-U and WiFi Coexistence System in the Presence of Hidden Nodes
Qilei Ren and Jun Zheng
5G NR-Light at Millimeter Waves: Design Guidelines for Mid-Market IoT Use Cases
Matteo Pagin, Tommaso Zugno, Marco Giordani, Louis-Adrien Dufrene, Quentin Lampin and Michele Zorzi

Distinguished Lecture II: RFID-based 3D Human Pose Tracking: Design, Generalization, and Data Augmentation

Prof. Shiwen Mao, Auburn University, USA.
Room: Pi'inaio Ballroom 1
Chair: Cheng Li

Wednesday, February 22 15:30 - 16:00

Coffee Break

Wednesday, February 22 16:00 - 18:00

Invited Talks VII

Room: Palolo 1
Chair: Houbing H Song
Smart Markers in a Blockchain: How to Release the Shackle of Single Branch
Chin-Tser Huang
Machine Learning in NextG Networks via Generative Adversarial Networks
Ender Ayanoglu
AI for Cybersecurity and Security of AI
Houbing Song

Network Advances

Room: Palolo 2
Chair: Edoardo S. Biagioni
Decomposition Models for the Routing and Slot Provisioning Problem
Brigitte Jaumard, Adham Mohammed and Quang Anh Nguyen
Secure Anonymous Acknowledgments in a Delay-Tolerant Network
Edoardo S. Biagioni
Flying Ad Hoc Coverage Area Mobility Model for Post-Disaster Area based on Two Drones
Intan Nabina Azmi, Yusnani Mohd Yussoff, Norashikin M. Thamrin, Fadhlan Hafizhelmi Kamaru Zaman and Nooritawati Md Tahir
Channel Allocation Algorithm Of Wi-Fi
Jin Wang, Xiaofeng Zhong and Shidong Zhou
Localization System Architecture for Enhanced Positioning in Industry 4.0 Applications
Ramya Vasist, Vladica Sark, Meysam Goodarzi, Jesús Gutiérrez and Eckhard Grass

Network Algorithms and Performance Evaluation

NAPE II
Room: Palolo 3
Chair: Ramy Gohary
DIRS: Dynamic Initial Rate Setting in Congestion Control for Disaggregated Storage Systems
Xiaoqian Zhang, Bo Sheng, Allen Yang, Danlin Jia, Li Wang, Mahsa Bayati, Xuebin Yao, Pradeep Subedi and Ningfang Mi
A load balancing method using load factor on unsplittable flow edges in information and communication networks
Daichi Shimizu and Norihiko Shinomiya
Static Virtual Network Mapping With Advance Reservation In Elastic Optical Networks
Juzi Zhao, Varsha Kohirkar, Poonam Prakash Nigade, Ramanuja Kalkunte, Lenin Posham and Suresh Subramaniam
Iterative Symbol Decision Schemes for CP-OTFS on Static Multipath Channels
Shuen-Yu Tsai, Wei-Chang Chen and Char-Dir Chung
Uplink-to-Downlink Covariance Matrix Estimation in ULA-equipped FDD Massive MIMO Systems
Salime Bameri, Khalid Almahrog, Ramy Gohary, Amr El-Keyi and Yahia Ahmed

Distinguished Lecture III: Machine Learning and Security for Vehicular Communication Networks

Prof. Yi Qian, University of Nebraska-Lincoln, USA.
Room: Pi'inaio Ballroom 1
Chair: Shiwen Mao