ICCCN 2018: THE 27TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND NETWORKS
PROGRAM

Days: Monday, July 30th Tuesday, July 31st Wednesday, August 1st

Monday, July 30th

View this program: with abstractssession overviewtalk overview

07:00-08:20 Session : Registration open

Registration open (Fu Rong Foyer)

Continental Breakfast (Fu Rong Foyer)

Location: FuRong
08:20-08:30 Session : Opening Remarks

Opening Remarks

Location: FuRong
08:30-09:30 Session 1: Networking the Many, Tiny and Far Away

Keynote I: Networking the Many, Tiny and Far Away

Speaker: Dr. Kevin Fall (Nefeli Networks)

Chair: Tarek Abdelzaher

Location: FuRong
10:00-12:00 Session 2A: Cognitive Radio Network

Session 1

Cognitive Radio Network

(Fu Rong)

Location: FuRong
10:00
Improving Integrated LTE-WiFi Network Performance with SDN based Flow Scheduling ( abstract )
10:24
HFCC: An Adaptive Congestion Control Algorithm based on Explicit Hybrid Feedbacks ( abstract )
10:48
Towards 3D Deployment of UAV Base Stations in Uneven Terrain ( abstract )
11:12
Group Based Strategy to Accelerate Rendezvous in Cognitive Radio Networks ( abstract )
11:36
LTE Transmission in Unlicensed Bands: Evaluating The Impact Over Clear Channel Assessment ( abstract )
10:00-12:00 Session 2B: Middleware Computing

Session 2

Middleware Computing

(HaiTang)

Location: HaiTang
10:00
Exploring the Optimal Platform Configuration for Power-constrained HPC Workflows ( abstract )
10:24
Accelerating VM Placement with Adaptive Caching ( abstract )
10:48
PETS: Bottleneck-aware Spark Tuning with Parameter Ensembles ( abstract )
11:12
CCoLBP: Chromatic Co-occurrence of Local Binary Pattern for Face Presentation Attack Detection ( abstract )
11:36
Smart Workload Partitioning and Task Migration to Reduce Response Times in Heterogeneous Computing Environments ( abstract )
10:00-12:00 Session 2C: Data Center

Session 3

Data Center

(JinGui)

Location: JinGui
10:00
An Optimal Checkpointing Model with Online OCI Adjustment for Stream Processing Applications ( abstract )
10:24
MMCode: Enhancing Color Channels for Screen-Camera Communication with Semi-Supervised Clustering ( abstract )
10:48
Cross-Layer Self-Similar Coflow Scheduling for Machine Learning Clusters ( abstract )
11:12
Storage-aware Network Stack for NVM-assisted Key-value Store ( abstract )
11:36
Slytherin: Dynamic, Network-assisted Prioritization of Tail Packets in Datacenter Networks ( abstract )
10:00-12:00 Session 2D: Security

Invited 1

Security

(YinGui)

Location: YinGui
10:00
Context-Aware Deep Learning-Driven Framework for Mitigation of Security Risks in BYOD-Enabled Environments ( abstract )
10:24
Amazon Echo Security: Machine Learning to Classify Encrypted Traffic ( abstract )
10:48
STRAP: Secure TRansfer of Association Protocol ( abstract )
11:12
Protecting Voice Controlled Systems Using Sound Source Identification Based on Acoustic Cues ( abstract )
11:36
IoTAegis: A Scalable Framework to Secure the Internet of Things ( abstract )
12:00
On Context-Aware DDoS Attacks Using Deep Generative Networks ( abstract )
13:30-15:00 Session 3: Panel I: IoT: Hype or Research Opportunities?

Panel I: IoT: Hype or Research Opportunities?

- Gian Pietro Picco, U. Trento, Italy (Moderator)
- Kui Ren, U. Buffalo, USA
- Yuan He, Tsinghua University, China
- Eduardo Tovar, ISEP, Portugal 

The advent of the Internet of Things promises to revolutionize many application domains from home automation to defense, and from smart transportation to disaster response. Important questions arise: What are the intellectual foundations of the Internet of Things as a research field? What research communities need to contribute to the emerging interdisciplinary problems? How is this field different from other pre-existing areas, such as cyber-physical computing, networked sensing, and mobile systems? Will IoT research be absorbed into such previous venues or does it have a reason to exist on its own as a new emerging subarea of computer science and engineering? The panel debates different perspectives on the above issues. 

Location: FuRong
15:30-17:30 Session 4A: Security, and Privacy
Location: FuRong
15:30
Efficient Conditional Privacy-Preserving Authentication Scheme Using Revocation Messages for VANET ( abstract )
15:54
Preserving Access Pattern Privacy in SGX-Assisted Encrypted Search ( abstract )
16:18
Enhanced Attack Aware Security Provisioning Scheme in SDN/NFV Enabled over 5G Network ( abstract )
16:42
Attacking Network Isolation in Software-Defined Networks:New attacks and Countermeasures ( abstract )
17:06
Synthetic Forgery Attack Against Continuous Keystroke Authentication Systems ( abstract )
15:30-17:30 Session 4B: Software Defined Network
Location: HaiTang
15:30
Robust Component-based Network Location with Noisy Range Measurements ( abstract )
15:54
Machine Learning based Flow Entry Eviction for OpenFlow Switches ( abstract )
16:18
CAFFE: Congestion-Aware Fast Failure Recovery in Software Defined Networks ( abstract )
16:42
Modelling Switches with Internal Buffering in Software-Defined Networks ( abstract )
17:06
Simplifying Network Updates in SDN and NFV Networks Using GUM ( abstract )
15:30-17:30 Session 4C: Blockchain Solutions and Unclonable Functions
Location: JinGui
15:30
A Fully Digital Physical Unclonable Function based Temperature Sensor for Secure Remote Sensing ( abstract )
15:54
A Decentralized Attribute-Based Signature for Healthcare Blockchain ( abstract )
16:18
Blockchain-based Decentralized Public Key Management for Named-Data Networks ( abstract )
16:42
CoinExpress: A Fast Payment Routing Mechanism in Blockchain-based Payment Channel Networks ( abstract )
17:06
A Survey of Blockchain: Techniques, Applications, and Challenges ( abstract )
15:30-17:30 Session 4D: Edge and Cloud Computing
Location: YinGui
15:30
Task Scheduling with Optimized Transmission Time in Collaborative Cloud-Edge Learning ( abstract )
15:54
Quality of Service Optimization for Mobile Edge Computing in Solar-Powered Road Side Units ( abstract )
16:18
Request Dispatching for Minimizing Service Response Time in Edge Cloud Systems ( abstract )
16:42
Protecting the privacy of networked multi-agent systems controlled over the cloud ( abstract )
17:06
CloudRand: Building Heterogeneous and Moving-target Network Interfaces ( abstract )
Tuesday, July 31st

View this program: with abstractssession overviewtalk overview

08:00-08:30 Session : Registration open

Registration open (Fu Rong Foyer)
Continental Breakfast (Fu Rong Foyer)

08:30-09:30 Session 5: Keynote II: A Vision towards Pervasive Edge Computing

Keynote II: A Vision towards Pervasive Edge Computing
Speaker: Prof. Yuanyuan Yang

Chair: Sheng Zhong

Room: Fu Rong

Location: FuRong
10:00-12:00 Session 6A: Wireless Networks
Location: FuRong
10:00
Interest Tree based Information Dissemination via Vehicular Named Data Networking ( abstract )
10:24
Multicast Rate Adaptation in WLAN via NDN ( abstract )
10:48
User Localization using Random Access Chanel Signals in LTE Networks with Massive MIMO ( abstract )
11:12
Probability of Coexistence of LTE-LAA and WLAN Systems Based on Delay Constraints ( abstract )
11:36
Fragmented Data Routing in Delay Tolerant Networks ( abstract )
10:00-12:00 Session 6B: Internet of Things
Location: HaiTang
10:00
FR-WARD: Fast Retransmit as a Wary but Ample Response to Distributed Denial-of-Service Attacks from the Internet of Things ( abstract )
10:24
Leveraging the Potential of WSN for an Efficient Correction of Air Pollution Fine-Grained Simulations ( abstract )
10:48
Sensing Fruit Ripeness Using Wireless Signals ( abstract )
11:12
Robust WiFi-based Device-free Gesture Recognition via Unsupervised Adversarial Domain Adaptation ( abstract )
11:36
ReaderTrack: Reader-book Interaction Reasoning using RFID and Smartwatch ( abstract )
10:00-12:00 Session 6C: Attack Detection and Mitigation
Location: JinGui
10:00
A novel data secure deletion scheme for mobile device ( abstract )
10:24
ActivityShielder: An Activity Hijacking Defense Scheme for Android Devices ( abstract )
10:48
Harnessing Uncertainty in Vulnerability Market ( abstract )
11:12
TW-FCM: An improved Fuzzy-C-Means algorithm for SPIT detection ( abstract )
11:36
An Extended Exploration to the Epidemic Containment Game ( abstract )
10:00-12:00 Session 6D: Wireless
Location: YinGui
10:00
A Comparative Performance Evaluation of Wake-up Radio-based Data Forwarding for Green Wireless Networks ( abstract )
10:24
On the Asymptotic Performance of Delay-Constrained Slotted ALOHA ( abstract )
10:48
Combating Cross-Technology Interference for Robust Wireless Sensing with COTS WiFi ( abstract )
11:12
Group-Query-as-a-Service for Secure Low-Latency Opportunistic RF Spectrum Access in Mobile Edge Computing Enabled Wireless Networks ( abstract )
11:36
A Lightweight Scheme for Rapid and Accurate WiFi Path Characterization ( abstract )
15:30-16:30 Session 7: Liberating Technology to Act on Our Behalf

Keynote IV: Liberating Technology to Act on Our Behalf

Speaker: Ms. Lama Nachman (Intel Corporation)

Chair: Shambhu Upadhyaya

Room: Fu Rong

Location: FuRong
16:30-17:30 Session 8A: Emerging Networks Topics: Cloud, SDN, NFV, ICN, and Blockchain

Poster Session I

Location: FuRong
16:30
Xspider:A Multi-Switch Testbed for Software Defined Networks ( abstract )
16:30
BRO: A Boundless Resource Orchestrator Based on Container Technology in Edge Computing ( abstract )
16:30
The Research on Designs of Multiple Flow Tables in the OpenFlow Protocol ( abstract )
16:30
Towards Blockchain-based Scalable and Trustworthy File Sharing ( abstract )
16:30
EVN: An Elastic Virtual Network supporting NFV Customized and Rapid Migration ( abstract )
16:30
A solution to the emergencies in the mobile cloud computing environment ( abstract )
16:30
The Classified and Active Caching Strategy for Iterative Application In Spark ( abstract )
16:30
Emprical Evaluation of SDN Controllers using Mininet/Wireshark and Comparison with Cbench ( abstract )
16:30
Secondary Controller Mapping for Reliable Control Traffic Forwarding in SDN ( abstract )
16:30
ICN-based Light-Weighted Mobility Support in IoT ( abstract )
16:30
Security Threat Analysis of SDN Switch Flow Table ( abstract )
16:30-17:30 Session 8B: Legacy but Critical Network Topics: Performance & Security

Poster Session II

Location: HaiTang
16:30
Deep Learning-Based Malicious Account Detection in the Momo Social Network ( abstract )
16:30
Multi-Dimension Threat Situation Assessment Based on Network Security Attributes ( abstract )
16:30
Chirp Interference Mitigation for FHSS Communication Based on Compressive Sensing ( abstract )
16:30
New big data collecting method based on compressive sensing in WSN ( abstract )
16:30
A Feasible Anomaly Diagnosis Mechanism for Stateful Firewall Rules ( abstract )
16:30
A Stop-wait Collaborative Charging Scheme for Mobile Wireless Rechargeable Sensor Networks ( abstract )
16:30
QoS Control Based on the Time Sequence of First Few Packets ( abstract )
16:30
Towards Effective Genetic Trust Evaluation in Open Network ( abstract )
16:30
Crowdsensing approach to monitor and optimize Wi-Fi networks in adversarial environments ( abstract )
16:30
A Distributed Approach based on Hierarchical Decompostion for Network Coded Group Multicast ( abstract )
Wednesday, August 1st

View this program: with abstractssession overviewtalk overview

08:00-08:30 Session : Registration Open

Registration open(Fu Rong Foyer)

Continental Breakfast (Fu Rong Foyer)

Location: FuRong
08:30-09:30 Session 9: Automated Driving and Connected Vehicles

Keynote III: Automated Driving and Connected Vehicles

Speaker: Prof. Xuemin (Sherman) Shen (University of Waterloo)

Chair: Kui Ren

Room: Fu Rong

Chair:
Location: FuRong
10:00-12:00 Session 10A: Modeling and Evaluation

Session 9

Modeling and Evaluation

(Fu Rong)

Location: FuRong
10:00
Bandwidth Preemption for High-Priority Data Transfer on Dedicated Channels ( abstract )
10:24
Towards a Robust and Scalable TCP Flavors Prediction Model from Passive Traffic ( abstract )
10:48
Estimating Short Connection Capacity on High Performance User Level Network Stack ( abstract )
11:12
FlowCop: Detecting “Stranger” in Network Traffic Classification ( abstract )
11:36
Redundancy Elimination on Unidirectional Lossy Links ( abstract )
10:00-12:00 Session 10B: Social Network and Green Computing

Session 10

Social Network and Green Computing

(HiTang)

Location: HaiTang
10:00
Approximating the $k$-Minimum Distance Rumor Source Detection in Online Social Networks ( abstract )
10:24
Optimizing Online Task Allocation for Multi-Attribute Social Sensing ( abstract )
10:48
Evolution of resource sharing cooperation based on reciprocity in social networks ( abstract )
11:12
Cost-effective and Eco-friendly Green Routing using Renewable Energy ( abstract )
11:36
A Power-Efficient Approach to TCAM-based Regular Expression Matching ( abstract )
10:00-12:00 Session 10C: Applications

Invited 5

Location: JinGui
10:00
Wi-Count: Passing People Counting with COTS  WiFi Devices ( abstract )
10:24
Detecting Housing Market Behaviour from a Microscopic Perspective ( abstract )
10:48
Achieve Efficient and Privacy-preserving Medical Primary Diagnosis Based on kNN ( abstract )
11:12
Multi-Class Wheat Moisture Detection with 5GHz Wi-Fi: A Deep LSTM Approach ( abstract )
11:36
Worker Recruitment Strategy for Self-Organized Mobile Social Crowdsensing ( abstract )
10:00-12:00 Session 10D: Robustness, Monitoring, and Failure Diagnosis

Invited 6

Location: YinGui
10:00
Active Probing-based Schemes and Data Analytics for Investigating Malicious Fast-Flux Web-Cloaking based Domains ( abstract )
10:24
A framework for misconfiguration diagnosis in interconnected multi-party systems ( abstract )
10:48
Dynamic Policy Deployment in SDN Switch Based on Monitoring and Analysis of User Behaviors ( abstract )
11:12
Failure Inference based Fast Reroute with Progressive Link Metric Increments ( abstract )
11:36
The Aftermath of Broken Links: Resilience of IoT from the Networking Point of View ( abstract )
13:30-15:00 Session 11: The way Towards Self-learning Network

Distinguished Talk: The way Towards Self-learning Network

Speaker: Nicholas Zhang (Huawei)

Session Chair: E.K. Park

Room: Fu Rong

Location: FuRong
15:30-17:30 Session 12A: Hot Topics in Networking

Session 11

Hot Topics in Networking

(Fu Rong)

Location: FuRong
15:30
Transaction-based Flow Rule Conflict Detection and Resolution in SDN ( abstract )
15:54
Efficient Density Estimation Algorithm for Ultra Dense Wireless Networks ( abstract )
16:18
Selecting Combined Countermeasures for Multi-Attack Paths in Intrusion Response System ( abstract )
16:42
Is Crowdcharging Possible? ( abstract )
17:06
On Scalable In-Network Operator Placement for Edge Computing ( abstract )
15:30-17:30 Session 12B: Network Services and Protocols I

Invited 7

Location: HaiTang
15:30
Exploring Scalable Computing Architectures for Interactions Analysis ( abstract )
15:54
ROVER: Robust and Verifiable Erasure Code for Hadoop Distributed File Systems ( abstract )
16:18
Distributed Device Caching for Information Updating in Emergency Communications ( abstract )
16:42
Democratizing Network Reservations Through Application Aware Orchestration  ( abstract )
17:06
PopCorns: Power Optimization using a Cooperative Network-Server approach for Data Centers ( abstract )
15:30-17:30 Session 12C: Network Services and Protocols II

Invited 8

Location: JinGui
15:30
Centralized versus Distributed Efficient Route Computation with Multiply-Constrained Link Costs ( abstract )
15:54
Distributed Vehicle Trajectory Tracking For Efficient Routing in VDTNs ( abstract )
16:18
An Optical Backhaul for 5G: The Light-trail Approach ( abstract )
16:42
HSNet: Energy Conservation in Heterogeneous Smartphone Ad Hoc Networks ( abstract )
17:06
A Multi-Rounds Double Auction Based Resource Trading for Small-Cell Caching System ( abstract )
15:30-17:30 Session 12D: Algorithms and Protocols

Invited 9

Location: YinGui
15:30
Towards a Machine Learning Based Approach to Mobile Network Analysis ( abstract )
15:54
An Assured Deletion Technique for Cloud-based IoT ( abstract )
16:18
Handover and load balancing for Distributed Network Control: Applications in ITS Message Dissemination ( abstract )
16:42
Uncovering Users’ Interaction Patterns in Aligned Communication and Face-to-Face Network Layers ( abstract )
17:06
Cumulative Participant Selection with Switch Costs in Large-Scale Mobile Crowd Sensing ( abstract )
17:30
Coalition-based Cooperative Routing in Cognitive Radio Networks ( abstract )