IEEE ISCC 2020: IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS 2020
PROGRAM

Days: Tuesday, July 7th Wednesday, July 8th Thursday, July 9th Friday, July 10th

Tuesday, July 7th

View this program: with abstractssession overviewtalk overview

09:00-12:30 Session 1A: 2nd International Workshop on Social (Media) Sensing (SMS)

Billions of users daily interact with social media platforms such as Facebook, Instagram, Pinterest, Twitter, etc. The checking of the preferred social media platform is becoming the first thing to do at wake-up time, and the last thing to do before falling asleep.

With no doubts, social media revolutionized the behavior of millions of people and the functioning of different ecosystems (e.g., news, entertainment and business, just to name a few). Indeed, within social media, people communicate, collaborate and share information about people, brands, products, services, personal preferences, issues and opinions.

It is therefore not surprising that social media sensing is being used to understand people’s opinions and behaviors. For instance, politicians analyze social media to gauge the public mood and to improve their political decisions, enterprise managers analyze social media conversations to increase customers engagement by tracking what people think about products and services, city administrators use social media to get insights about citizens’ opinions with the goal of enhancing the life quality of the city, advertisers use advanced analytics tools to analyze what people think of a brand and to produce tailored commercial messages.

However, the use of social media sensing to get insights about people and society is in its infancy stage, is not trivial and involves many different disciplines: from computer science to social engineering, from psychology to linguistics, from semiotics to economics, from sociology to philosophy.

09:00
What influences sentiment analysis on socialnetworks: a case study (abstract)
09:15
COVID-19 Outbreak through Tweeters’ Words: Monitoring Italian Social Media Communication about COVID-19 with Text Mining and Word Embeddings (abstract)
09:30
A data visualization interactive exploration of human mobility data during the COVID-19 outbreak: a case study (abstract)
09:45
Air Quality Control through Bike Sharing Fleets (abstract)
10:00
Untangling between fake-news and truth in socialmedia to understand the Covid-19 Coronavirus (abstract)
10:15
On the Efficiency of Decentralized File Storage for Personal Information Management Systems (abstract)
09:00-12:30 Session 1B: 8th Workshop on Communications in Critical Embedded Systems (WoCCES)

Currently, there is a growing demand for embedded systems in several areas e.g. agricultural, industrial, civil, transportation and residential. The fast growth of computing power on microprocessors and microcontrollers, and the higher connectivity has led to a whole new class of applications, such as autonomous vehicle systems (air, ground, underwater, etc.) and mobile robots. Moreover, depending on the application, these systems are not only embedded systems, but critical embedded systems as they deal with risk related to lives and high value assets.

Due to the high connectivity provided by the Internet of Things and the flexibility of Cloud Computing-based systems, a large number of devices can currently be deployed in areas of interest that are likely to be considered critical. Meeting very specific requirements on communications and control is mandatory to guarantee that sensitive tasks are accurately performed on targeted environments.

WoCCES aims at the integration of researchers working on the fields of communications and control in critical embedded systems including Connected Vehicles, Internet of Things, Smart Cities, Cloud and Fog Computing, Security, Cryptography, and Privacy.

09:00
STUART: ReSilient archiTecture to dynamically manage Unmanned aeriAl vehicle networks undeR atTack (abstract)
09:15
Efficient File Collections for Embedded Devices (abstract)
09:30
Data Mining applied to the navigation task in autonomous robots (abstract)
09:45
Cognitive-LoRa: adaptation-aware of the physical layer in LoRa-based networks (abstract)
10:00
A fog architecture for privacy-preserving data provenance using blockchains (abstract)
10:15
Comparison of secure communication with AES between embedded system and general purpose computer (abstract)
10:30
Context-Aware Operation for Unmanned Systems with HAMSTER (abstract)
10:45
Exploratory Analysis of Public Transportation Data of Curitiba, Brazil (abstract)
09:00-12:30 Session 1C: 12th Workshop on Performance Evaluation of Communications in Distributed Systems and Web based Service Architectures (PEDISWESA)

This is the 12th Workshop on Performance Evaluation of Communications in Distributed Systems and Web based Service Architectures (PEDISWESA) 2020, orgnized in conjuntion with ISCC 2020

ISCC takes place annually, usually in the Mediterranean region, in locations such as Egypt, Greece, France, Tunisia, Portugal, Spain, Morocco, Italy, and Brazil. In 2020, the Symposium is going to happen in Rennes City, France.

PEDISWESA sessions will include presentations on new research results. Papers describing original work are invited in any of the computer and communications areas that the Call for Papers considers. Accepted papers will be included in the ISCC 2020 Conference Proceedings, which will be subject to independent peer-review procedures for quality, and may be eligible for inclusion in the IEEE Xplore® Digital Library. Merit, relevance, and originality will guide paper acceptance. Best Paper Award and Best Student Paper Awards will be presented.

09:00
Obstacle detection based on Cooperative Intellignet Transport systems data (abstract)
09:15
Intelligent Malicious URL Detection with Feature Analysis (abstract)
09:30
EdgeKV: Distributed Key-Value Store for the Network Edge (abstract)
09:45
Joulin: Blockchain-based P2P Energy Trading Using Smart Contracts (abstract)
10:00
A Proactive-Restoration Technique for SDNs (abstract)
10:15
Survey on the Cloud-IoT paradigms: Taxonomy and architectures (abstract)
10:30
On Securing IoT from Deep Learning Perspective (abstract)
10:45
Energy Efficiency in SDDC: Considering Server and Network Utilities (abstract)
11:00
Data Driven Network Performance Inference From Within The Browser (abstract)
09:00-12:30 Session 1D: 5th edition of the IEEE workshop on ICT Solutions for eHealth (ICTS4eHealth) : Session I

e-Health is one of the major research topics that have been attracting cross-disciplinary research groups. The deployment of new emerging ICT technologies for Health, especially based on Cloud computing, Internet of Things (IoT), and Computational Intelligence, is attracting the interest of many researchers. ICTS4eHealth 2020 is the 5th edition of the International IEEE Workshop dedicated to ICT solutions for e-Health, especially based on Cloud computing, Internet of Things (IoT), and Computational Intelligence. The workshop will bring together researchers from academia, industry, government, and medical centers in order to present the state of the art in the emerging area of the use of cloud systems in connected health infrastructure and applications, and the use of IoT and Computational Intelligence techniques in the area of eHealth.

09:00
A network performance view of a biobanking system for diagnostic images (abstract)
09:15
A Web-based Information System for the Management of ICU Beds During the Coronavirus Outbreak (abstract)
09:30
A mHealth solution for contact-less self-monitoring of blood oxygen saturation (abstract)
09:45
Towards an Ambient Estimation of Stool Types to Support Nutrition Counseling for People affected by the Geriatric Frailty Syndrome (abstract)
10:00
Diagnosis of COVID-19 in CT image using CNN and XGBoost (abstract)
10:15
Gamification, mHealth and user adherence (abstract)
10:30
Parkinson’s Disease Diagnosis: Towards Grammar-based Explainable Artificial Intelligence (abstract)
10:45
A Capsule Network-based for identification of Glaucoma in retinal images (abstract)
11:00
A Computational Model and Algorithm to Identify Social Isolation in Elderly Population (abstract)
11:15
A cloud-based REST platform for real-time health resources availability registering, discovering and matching in pandemic crisis conditions (abstract)
11:30
Improving Machine Learning Algorithm Processing Time in Tele-Rehabilization Through a NoSQL Graph Database Approach: A Preliminary Study (abstract)
11:45
Covid-19: A Digital Transformation Approach to a Public Primary Healthcare Environment (abstract)
12:00
Dicoogle Framework for Medical Imaging Teaching and Research (abstract)
14:00-17:30 Session 2A: 1st Workshop on Blockchain theoRy and ApplicatIoNs (BRAIN)

A blockchain protocol is employed to implement a tamper free distributed ledger which stores transactions created by the nodes of a P2P network and agreed upon through a distributed consensus algorithm, avoiding the need for a central authority.

Blockchain technology has a great potential to radically change our socio-economical systems by guaranteeing secure transactions between untrusted entities, reducing their cost and simplifying many processes. Such a technology is going to be exploited in many different areas like IoT, social networking, health care, electronic voting and so on. Even if several applications are already leveraging its disruptive potentials, further research and development is required for several challenging aspects like scalability, efficiency, privacy and support of complex queries, both from a theoretical and applicative point of view.

This workshop aims to provide a venue for researchers from both academy and industry to present and discuss important topics on blockchain technology. The workshop’s goal is to present results on both theoretical and more applicative open challenges, as well as to provide a venue to showcase the current state of existing proposals.

14:00
The Bisq DAO: On the Privacy Cost of Participation (abstract)
14:15
Performance Overhead of Atomic Crosschain Transactions (abstract)
14:30
Binding of Endpoints to Identifiers by On-Chain Proofs (abstract)
14:45
Security and Performance Evaluation of Master Node Protocol in the Bitcoin Peer-to-Peer Network (abstract)
15:00
A Decentralized System for Fair Token Distribution and Seamless Users Onboarding (abstract)
15:15
RenewLedger : Renewable energy management powered by Hyperledger Fabric (abstract)
15:30
Tokenization and Blockchain Tokens Classification: a morphological framework (abstract)
15:45
Decentralized Social Media Applications as a Service: a Car-Sharing Perspective (abstract)
14:00-17:30 Session 2B: 10th Workshop on Management of Cloud and Smart City System (MOCS)

The last years have witnessed a permanent change of vision of cloud systems. Nowadays, the most important stakeholders such as private companies, public agencies, research communities and citizens rely on the cloud for a number of purposes, stemming from sharing hardware infrastructures to software, data, and sensing services.

The services designed for complex scenarios like Multi-Access Edge Computing (MEC), smart cities, and the upcoming Industry 4.0, pave the path for a new era of the cloud. The complexity of human dynamics in a city can be better analyzed by decentralizing the infrastructure, integrating and opening the data and sharing the services. The MEC paradigm, standardized by ETSI, is a key enabling technology for upcoming 5G networks, whereby applications and network functions are hosted in edge cloud data centers. By being closer to the end-user, besides better supporting low-latency applications, MEC systems are a candidate architecture for such a decentralized, context-aware infrastructure. Despite such a rapid (re-)evolution of cloud systems, it remains unclear whether current solutions are able to support these emergent application scenarios. Through sensing as a service processes, crowd-sensed data is made available to the cloud stakeholders. Some of them like citizens become data contributors, customers and service consumers at the same time. This data exchange calls for secure and reliable data trading transactions between the counterparts. Blockchain technology provides the stakeholders with a transparent, unalterable, ordered ledger by enabling a decentralized and secure environment. Solutions for its integration in the cloud for smart-city services are however yet to appear.

14:00
Edge Virtualization in Multihomed Vehicular Networks (abstract)
14:15
The Service Node Placement Problem in Software-Defined Fog Networks (abstract)
14:30
A proximity-based indoor navigation system tackling the COVID-19 social distancing measures (abstract)
14:45
Real-Time Automatic Air Pollution Services from IOT Data Network (abstract)
15:00
A Continuous Data Imputation Mechanism based on Streams Correlation (abstract)
15:15
A Stackelberg Game Approach for Incentive V2V Caching in Software-Defined 5G-enabled VANET (abstract)
15:30
Speed Based Distributed Congestion Control Scheme for Vehicular Networks (abstract)
15:45
Secure Identity Management Framework for Vehicular Ad-hoc Network using Blockchain (abstract)
16:00
Smart Contract Designs on Blockchain Applications (abstract)
16:15
On the Applicability of Secret Share Algorithms for Osmotic Computing (abstract)
16:30
HS-AUTOFIT: a highly scalable AUTOFIT application for Cloud and HPC environments (abstract)
14:00-17:30 Session 2C: 5th edition of the IEEE workshop on ICT Solutions for eHealth (ICTS4eHealth) : Session II

e-Health is one of the major research topics that have been attracting cross-disciplinary research groups. The deployment of new emerging ICT technologies for Health, especially based on Cloud computing, Internet of Things (IoT), and Computational Intelligence, is attracting the interest of many researchers. ICTS4eHealth 2020 is the 5th edition of the International IEEE Workshop dedicated to ICT solutions for e-Health, especially based on Cloud computing, Internet of Things (IoT), and Computational Intelligence. The workshop will bring together researchers from academia, industry, government, and medical centers in order to present the state of the art in the emerging area of the use of cloud systems in connected health infrastructure and applications, and the use of IoT and Computational Intelligence techniques in the area of eHealth.

14:00
Sensitive Data Exchange Protocol Suite for Healthcare (abstract)
14:15
Evaluating the autonomy of children with autism spectrum disorder in washing hands: a deep-learning approach (abstract)
14:30
A Predictive Machine Learning Model to Determine Alcohol Use Disorder (abstract)
14:45
Reducing Sparse Motion Artifacts in MR-Thermometry Using Robust Principal Component Analysis (abstract)
15:00
Priority Based Traffic Pre-emption System for Medical Emergency Vehicles in Smart Cities (abstract)
15:15
Improving the Recognition of Sign Language from Acquired Data by Wireless Body Area Network (abstract)
15:30
Predictive Models for Mitigating Covid-19 Outbreak (abstract)
15:45
Exploit Multilingual Language Model at Scale for ICD-10 Clinical Text Classification (abstract)
16:00
A Decision Support System for Therapy Prescription in a Hospital Centre (abstract)
16:15
Contactless Walking Recognition based on mmWave RADAR (abstract)
16:30
Evaluation of data balancing techniques in 3D CNNs for the classification of pulmonary nodules in CT images (abstract)
16:45
High-Resolution Physiological Stress Prediction Models based on Ensemble Learning and Recurrent Neural Networks (abstract)
17:00
Server-Based Secure Key Management for the IEEE 802.15.6 standard (abstract)
Wednesday, July 8th

View this program: with abstractssession overviewtalk overview

09:00-10:30 Session 3A: IoT : Short Range Technologies
  • 6TiSCH
  • 6LoPWAN
  • WSN
  • IEEE 802.15.4
  • TSCH
  • BLE
  • IEEE 802.15.1
09:00
Reducing Sensor Failure and Ensuring Scheduling Fairness for Online Charging in Heterogeneous Rechargeable Sensor Networks (abstract)
09:15
Opportunistic Data Gathering in IoT Networks using Discrete Optimization (abstract)
09:30
Thorough Investigation of Multi-path Techniques in RPL based Wireless Networks (abstract)
09:45
Enabling IEEE 802.15.4-2015 TSCH based Wireless Network for Electric Vehicle Battery Management (abstract)
10:00
Pushing 6TiSCH Minimal Scheduling Function (MSF) to the Limits (abstract)
10:15
CoMP: Efficient Monitoring for Constrained Embedded Devices (abstract)
09:00-10:30 Session 3B: Security Session I
  • Privacy / Anonymity
  • Attacks and Defenses
  • Authentication, Authorization and Accounting
  • Hardware Security
  • Intrusion Detection
  • Moving Target Defense (MTD)
  • Blockchain
09:00
Group Key Management in Constraint IoT Settings (abstract)
09:15
JumpEstimate: a Novel Black-box Countermeasure to Website Fingerprint Attack Based on Decision-boundary Confusion (abstract)
09:30
A secure domain name resolution and management architecture based on blockchain (abstract)
09:45
A Hardware/Software Collaborative SM4 Implementation Resistant to Side-channel Attacks on ARM-FPGA Embedded SoC (abstract)
10:00
AFT-Anon: A scaling method for online trace anonymization based on anonymous flow tables (abstract)
09:00-10:30 Session 3C: IoT : LPWAN Technologies
  • LoRa, LoRaWAN
  • NB-IoT
  • LTE-M
  • Sigfox
  • Wi-SUN
09:00
Determinism through modulation diversity: can combining multiple IEEE 802.15.4-2015 SUN modulations improve communication reliability? (abstract)
09:15
Bringing Fairness in LoRaWAN through SF Allocation Optimization (abstract)
09:30
An Efficient Heuristic LoRaWAN Adaptive Resource Allocation for IoT Applications (abstract)
09:45
On the Performance Evaluation of LoRaWAN with Re-transmissions under Jamming (abstract)
10:00
Performance Comparisons of NB-IoT, LTE Cat-M1, Sigfox, and LoRa Moving at High Speeds in the Air (abstract)
10:15
An Algorithm to Satisfy the QoS Requirements in a Heterogeneous LoRaWAN Network (abstract)
11:00-12:30 Session 4A: Vehicular Networks : Session I
  • Intelligent Transport Systems (ITS)
  • IEEE 802.11p ITS-G5
  • Millimeter Waves 
  • V2X, V2I, V2N, V2V, V2P, V2D, V2G
  • Inter and intra vehicle communication and protocols
11:00
Spatial Modulation under Vehicular Rayleigh Fading Channels (abstract)
11:15
Semantic Fusion-based Pedestrian Detection for Supporting Autonomous Vehicles (abstract)
11:30
Service Migration for Connected Autonomous Vehicles (abstract)
11:45
An Efficient and Anonymous Blockchain-Based Data Sharing Scheme for Vehicular Networks (abstract)
12:00
A Vehicle-Centric Probabilistic Approach to Virtual Cell Management in Ultra Dense 5G Networks (abstract)
11:00-12:30 Session 4B: 5th Generation Networks (5G)
  • Resource Allocation
  • Network Slicing
  • Topology Management
  • 5G Core Network and Service Based Architecture
  • C-RAN and backhaul
  • SDN and NFV for 5G
  • Network Stability, Control and Optimization
  • Standardization Activities by IEEE, 3GPP and ETSI
11:00
A High-Throughput LDPC Decoder Based on GPUs for 5G New Radio (abstract)
11:15
Dynamic User Count Aware Resource Allocation for Network Slicing in Virtualized Radio Access Networks (abstract)
11:30
A Performance Analysis of Adaptive Streaming Algorithms in 5G Vehicular Communications in Urban Scenarios (abstract)
11:45
Reliability and low latency : impact of the architecture. (abstract)
12:00
HARQ-aware allocation of computing resources in C-RAN (abstract)
11:00-12:30 Session 4C: Software Defined *
  • Software Defined Networks and Network Function Virtualization
  • Software Defined Smart Objects
  • Software Defined Data Centers
  • Software Defined Radio
  • Overlay and Programmable Networks
11:00
Incremental Deployment of Programmable Switches for Sketch-based Network Measurement (abstract)
11:15
Drift Correction for the Software-based Clock Synchronization on Controller Area Network (abstract)
11:30
Dynamic Routing with Online Traffic Estimation for Video Streaming over Software Defined Networks (abstract)
11:45
SLA-Aware Routing Strategy for Multi-Tenant Software-Defined Networks (abstract)
12:00
An Enhanced Scheduling Framework for Elephant Flows in SDN-Based Data Center Networks (abstract)
14:00-15:30 Session 5A: Artificial Intelligence (AI) : Session I
  • Artificial Intelligent Systems applications in Computers and Communications
  • AI Technologies
  • Game Theory
  • Machine and Deep Learning of Knowledge
  • Bio-inspired Computing in Communications
  • Data Science and Data Engineering
  • Distributed Knowledge and Processing
14:00
Domain-Embeddings Based DGA Detection with Incremental Training Method (abstract)
14:15
Game Theory Approach in Multi-agent Resources Sharing (abstract)
14:30
On the Robustness of Deep Learning-predicted Contention Models for Network Calculus (abstract)
14:45
An AI-based Visual Attention Model for Vehicle Make and Model Recognition (abstract)
15:00
Remote Speech Extraction from Speckle Image by Convolutional Neural Network (abstract)
15:15
Automating Vulnerability Classification from Description using Machine Learning (abstract)
14:00-15:30 Session 5B: Cloud and Edge Computing : Session I
  • Cloud Computing (IaaS, PaaS, and SaaS)
  • Mobile Cloud and Mobile Cloud Networking
  • Fog Computing
  • Distributed Systems Architecture and Management
14:00
DPVGeo: Delay-based Public Verification of Cloud Data Geolocation (abstract)
14:15
A Novel Method for the Synthetic Generation of Non-I.I.D Workloads for Cloud Data Centers (abstract)
14:30
A Novel Caching Strategy in Social Content-Centric Networking with Mobile Edge Computing (abstract)
14:45
Mobile Edge Computing Performance Evaluation using Stochastic Petri Nets (abstract)
15:00
An Incentive Mechanism for Improving Energy Efficiency of Colocation Data Centers Based on Power Prediction (abstract)
15:15
In-Network Placement of Security VNFs in Multi-Tenant Data Centers (abstract)
14:00-15:30 Session 5C: Wireless Networks
  • Cognitive Radio Networking
  • Wireless, Cellular, and Mobile Communications
  • Modeling and Simulation
  • Signal Processing for Communications
14:00
Block-Diagonal Zero-Forcing Beamforming for Weighted Sum-Rate Maximization in Multi-User Massive MIMO Systems (abstract)
14:15
A Dynamic Approach for Managing Heterogeneous Wireless Networks in Smart Environments (abstract)
14:30
On Scalable Delay Bound Evaluation with Stochastic Network Calculus (abstract)
14:45
Efficient Model Solving for Markov Decision Processes (abstract)
15:00
Scheduling of Wireless Charging Tasks with Precedence Constraints (abstract)
16:00-17:30 Session 6A: Application domain / Framework / Architecture
  • Bioinformatics
  • Smart Grid
  • Smart City
  • Industry 4.0
  • Smart Building
16:00
An E-Health system for data stream analysis (abstract)
16:15
Food Grading System Using Support Vector Machine and YOLOv3 Methods (abstract)
16:30
Fog and IoT-based Remote Patient Monitoring Architecture using Speech Recognition (abstract)
16:45
A secure and lightweight three-factor authentication and key generation scheme for direct communication between healthcare professionals and patient’s WMSN (abstract)
16:00-17:30 Session 6B: Services and Protocols I
  • Advances in Internet Protocols
  • Green Networking
  • Real Time Communication Services
  • Routing and Multicast
  • Network Design, Optimization and Management
  • Network Reliability, Quality of Service and Quality of Experience
  • Fault-Tolerance and Error Recovery
  • Web Services and Service Oriented Architectures
  • Standards Evolution
  • Digital Satellite Communications Service
  • Localisation Protocols
  • Communications Services and Management
  • Crowdsourcing applications
  • Crowdsensing
  • Social Networks
  • Peer-to-Peer Computing
  • Computing applications
  • Software Engineering
  • Big Data, Data Mining and Database Applications
16:00
Bandwidth Aggregation over Multihoming Links (abstract)
16:15
Distributed Time Slots Assignment Protocol in Dynamic Networks (abstract)
16:30
Routing and Flexible Ethernet (FlexE) Assignment in Multi-layer Multi-domain Networks (abstract)
16:45
Adaptive Model for Network Resources Prediction in Modern Internet Service Providers (abstract)
17:00
NDM: Network Driving IP Mobility Support in Large Scale LEO Satellite Network (abstract)
17:15
Improving Survivability of LEO Satellite Network with Guaranteed Based Approaches (abstract)
Thursday, July 9th

View this program: with abstractssession overviewtalk overview

09:00-10:30 Session 7A: Security Session II
  • Privacy / Anonymity
  • Attacks and Defenses
  • Authentication, Authorization and Accounting
  • Hardware Security
  • Intrusion Detection
  • Moving Target Defense (MTD)
  • Blockchain
09:00
CES2Vec: A Confidentiality-Oriented Word Embedding for Confidential Information Detection (abstract)
09:15
IANVS: A Moving Target Defense Framework for a Resilient Internet of Things (abstract)
09:30
Efficient Cloud-based Secret Shuffling via Homomorphic Encryption (abstract)
09:45
NCZKP Based Privacy-Preserving Authentication Scheme for the Untrusted Gateway Node Smart Home Environment (abstract)
10:00
2ch-TCN: A Website Fingerprinting Attack over Tor Using 2-channel Temporal Convolutional Networks (abstract)
09:00-10:30 Session 7B: Internet of Things : Session III
  • Rest API, CoAP, CBOR, OSCORE
  • Smart Spaces
  • Cyber Physical Systems
  • Telecare Medical Information System
09:00
Managing Consensus-Based Cooperative Task Allocation for IIoT Networks (abstract)
09:15
Using DenseNet for IoT multivariate time series classification (abstract)
09:30
Performance of New Monitoring Architectures for Underwater Oil/Gas Pipeline using Hyper-Sensors (abstract)
09:45
Adaptive Sensing Algorithm for IoT Applications with Data and Temporal Accuracy Requirements (abstract)
10:00
Improving charging performance for wireless rechargeable sensor networks based on charging UAVs: a joint optimization approach (abstract)
10:15
Task Distribution Based on Variable-Order Markov Position Estimation in Mobile Sensor Networks (abstract)
11:00-12:30 Session 8: Vehicular Networks : Session II
  • Intelligent Transport Systems (ITS)
  • IEEE 802.11p ITS-G5
  • Millimeter Waves 
  • V2X, V2I, V2N, V2V, V2P, V2D, V2G
  • Inter and intra vehicle communication and protocols
11:00
DRIVE: A Digital Network Oracle for Cooperative Intelligent Transportation Systems (abstract)
11:15
MOP: A Novel Mobility-Aware Opportunistic Routing Protocol for Connected Vehicles (abstract)
11:30
Telegram Scheduling for the Multifunction Vehicle Bus (MVB): Algorithms and Evaluation (abstract)
11:45
Evaluation of Strategies for Emergency Message Dissemination in VANETs (abstract)
14:00-15:30 Session 9A: Artificial Intelligence (AI) : Session II
  • Artificial Intelligent Systems applications in Computers and Communications
  • AI Technologies
  • Game Theory
  • Machine and Deep Learning of Knowledge
  • Bio-inspired Computing in Communications
  • Data Science and Data Engineering
  • Distributed Knowledge and Processing
14:00
SVM Assisted Primary User-Detection for Non-Cooperative Cognitive Radio Networks (abstract)
14:15
Ensemble Learning Based Sleeping Cell Detection in Cloud Radio Access Networks (abstract)
14:30
Anomaly Detection with Deep Graph Autoencoders on Attributed Networks (abstract)
14:45
A Multivariate Time Series Prediction Schema based on Multi-attention in recurrent neural network (abstract)
15:00
High Precision Deep Learning-Based Tabular Detection (abstract)
14:00-15:30 Session 9B: Cloud and Edge Computing : Session II
  • Cloud Computing (IaaS, PaaS, and SaaS)
  • Mobile Cloud and Mobile Cloud Networking
  • Fog Computing
  • Distributed Systems Architecture and Management
14:00
From Name-Centric to Information-Centric Networking (abstract)
14:15
Performance and Cost-aware HPC in Clouds: A Network Interconnection Assessment (abstract)
14:30
Task Offloading for Automatic Speech Recognition in Edge-Cloud Computing Based Mobile Networks (abstract)
14:45
Increasing the efficiency of Fog Nodes through of Priority-based Load Balancing (abstract)
15:00
PIV4DB: Probabilistic Integrity Verification for Cloud Database (abstract)
15:15
Blockchain for Reliability in Collaborative Scientific Workflows on Cloud Platforms (abstract)
16:00-17:30 Session 10A: Services and Protocols II
  • Advances in Internet Protocols
  • Green Networking
  • Real Time Communication Services
  • Routing and Multicast
  • Network Design, Optimization and Management
  • Network Reliability, Quality of Service and Quality of Experience
  • Fault-Tolerance and Error Recovery
  • Web Services and Service Oriented Architectures
  • Standards Evolution
  • Digital Satellite Communications Service
  • Localisation Protocols
  • Communications Services and Management
  • Crowdsourcing applications
  • Crowdsensing
  • Social Networks
  • Peer-to-Peer Computing
  • Computing applications
  • Software Engineering
  • Big Data, Data Mining and Database Applications
16:00
Not Afraid of the Unseen: a Siamese Network based Scheme for Unknown Traffic Discovery (abstract)
16:15
Experimental testing of the performance of packet dropping schemes (abstract)
16:30
On the Computation of Integrals of Bivariate Gaussian Distribution (abstract)
16:45
Mapping Network Traffic Dynamics in the Complexity-Entropy Plane (abstract)
17:00
Routing, Modulation, Spectrum and Core Allocation Based on Mapping Scheme (abstract)
17:15
The Understanding and Forecast of AS-level Anycast Path Inflation (abstract)
16:00-17:30 Session 10B: Security Session III
  • Privacy / Anonymity
  • Attacks and Defenses
  • Authentication, Authorization and Accounting
  • Hardware Security
  • Intrusion Detection
  • Moving Target Defense (MTD)
  • Blockchain
16:00
Using Deep Learning to Replace Domain Knowledge (abstract)
16:15
WF-GAN: Fighting Back Against Website Fingerprinting Attack Using Adversarial Learning (abstract)
16:30
Attesting L-3 General Program Anomaly Detection Efficiency with SPADA (abstract)
16:45
SR-TPP: Extending IPv6 Segment Routing to enable Trusted and Private Network Paths (abstract)
17:00
SILU: Strategy Involving Large-scale Unlabeled Logs for Improving Malware Detector (abstract)
Friday, July 10th

View this program: with abstractssession overviewtalk overview

09:00-10:30 Session 11: Security Session IV
  • Privacy / Anonymity
  • Attacks and Defenses
  • Authentication, Authorization and Accounting
  • Hardware Security
  • Intrusion Detection
  • Moving Target Defense (MTD)
  • Blockchain
09:00
MalFinder: An Ensemble Learning-based Framework For Malicious Traffic Detection (abstract)
09:15
Power Range: Forward Private Multi-Client Symmetric Searchable Encryption with Range Queries Support (abstract)
09:30
Efficient and Secure Hash Function Scheme Based on RC4 Stream Cipher (abstract)
09:45
An extensible IoT Security Taxonomy (abstract)
10:00
Flush-Detector: More Secure API Resistant to Flush-Based Spectre Attacks on ARM Cortex-A9 (abstract)
11:00-13:00 Session 12: Tutorial : Big Sequence Management

Data series are a prevalent data type that has attracted lots of interest in recent years. Specifically, there has been an explosive interest towards the analysis of large volumes of data series in many different domains. This is both in businesses (e.g., in mobile applications) and in sciences (e.g., in biology). In this tutorial, we focus on applications that produce massive collections of data series, and we provide the necessary background on data series storage, retrieval and analytics. We look at systems historically used to handle and mine data in the form of data series, as well as at the state of the art data series management systems that were recently proposed. Moreover, we discuss the need for fast similarity search for supporting data mining applications, and describe efficient similarity search techniques, indexes and query processing algorithms. Finally, we look at the gap of modern data series management systems in regards to support for efficient complex analytics, we argue in favor of the integration of summarizations and indexes in modern data series management systems, and we discuss the role that deep learning techniques can play in this context. We conclude with the challenges and open research problems in this domain.

11:00
Big Sequence Management (abstract)
14:00-15:30 Session 13A: Artificial Intelligence (AI) : Session III
  • Artificial Intelligent Systems applications in Computers and Communications
  • AI Technologies
  • Game Theory
  • Machine and Deep Learning of Knowledge
  • Bio-inspired Computing in Communications
  • Data Science and Data Engineering
  • Distributed Knowledge and Processing
14:00
Efficient Malware Originated Traffic Classification by Using Generative Adversarial Networks (abstract)
14:15
NeuralPot: An Industrial Honeypot Implementation Based On Convolutional Neural Networks (abstract)
14:30
Knowledge-Based Machine Learning Boosting for Adversarial Task Detection in Mobile Crowdsensing (abstract)
14:45
AWMF: All-Weighted Metric Factorization for Collaborative Ranking (abstract)
15:00
Reluplex made more practical: Leaky ReLU (abstract)
14:00-15:30 Session 13B: Cloud and Edge Computing : Session III
  • Cloud Computing (IaaS, PaaS, and SaaS)
  • Mobile Cloud and Mobile Cloud Networking
  • Fog Computing
  • Distributed Systems Architecture and Management
14:00
Trail: A Blockchain Architecture for Light Nodes (abstract)
14:15
GIN: Better going safe with personalized routes (abstract)
14:30
Inference Time Optimization Using BranchyNet Partitioning (abstract)
14:45
Cache Efficient Louvain with Local RCM (abstract)
15:00
Foiling Sybils with HAPS in Permissionless Systems: An Address-based Peer Sampling Service (abstract)
16:00-17:30 Session 14A: Security Session V
  • Privacy / Anonymity
  • Attacks and Defenses
  • Authentication, Authorization and Accounting
  • Hardware Security
  • Intrusion Detection
  • Moving Target Defense (MTD)
  • Blockchain
16:00
UAV-based Surveillance System: an Anomaly Detection Approach (abstract)
16:15
K-Cipher: A Low Latency, Bit Length Parameterizable Cipher (abstract)
16:30
Finding Persistent Elements of Anomalous Flows in Distributed Monitoring Systems (abstract)
16:45
Towards Comprehensive Detection of DNS Tunnels (abstract)
17:00
Defense Against Advanced Persistent Threats: Optimal Network Security Hardening Using Multi-stage Maze Network Game (abstract)
16:00-17:30 Session 14B: Services and Protocols III
  • Advances in Internet Protocols
  • Green Networking
  • Real Time Communication Services
  • Routing and Multicast
  • Network Design, Optimization and Management
  • Network Reliability, Quality of Service and Quality of Experience
  • Fault-Tolerance and Error Recovery
  • Web Services and Service Oriented Architectures
  • Standards Evolution
  • Digital Satellite Communications Service
  • Localisation Protocols
  • Communications Services and Management
  • Crowdsourcing applications
  • Crowdsensing
  • Social Networks
  • Peer-to-Peer Computing
  • Computing applications
  • Software Engineering
  • Big Data, Data Mining and Database Applications
16:00
Exploiting AS-level Routing Properties to Locate Traffic Differentiation in the Internet (abstract)
16:15
Identifying Impacts of Protocol and Internet Development on the Bitcoin Network (abstract)
16:30
A Parallel Graph Partitioning Approach to Enhance Community Detection in Social Networks (abstract)
16:45
ResTor: A Pre-Processing Model for Removing the Noise Pattern in Flow Correlation (abstract)
17:00
A Feedback Mechanism for Prediction-based Anomaly Detection In Content Delivery Networks (abstract)