MSN 2020
The 16th International Conference on Mobility, Sensing and Networking (MSN 2020)
Tokyo, Japan on 17 - 19 December 2020
Technically Co-sponsored by IEEE IEEE
IEEE CS

List of Accepted Papers

Main Conference

  1. A Centralized Controller for Reliable and Available Wireless Schedules in Industrial Networks
    Remous-Aris Koutsiamanis, Georgios Z. Papadopoulos (IMT Atlantique, IRISA, France); Bruno Quoitin (University of Mons, Belgium); Nicolas Montavont (IMT Atlantique, IRISA, France)

  2. A FAIR Extension for the MQTT Protocol
    Dariush Salami (Aalto University, Finland); Olga Streibel, Marcus Rhenius (Bayer AG); Stephan Sigg (Aalto University, Finland)

  3. A Game Theoretical Pricing Scheme for Vehicles in Vehicular Edge Computing
    Chaogang Tang (China University of Mining and Technology, China); Chunsheng Zhu (Southern University of Science and Technology and Peng Cheng Laboratory, China); Huaming Wu (Tianjin University, China); Xianglin Wei (National University of Defense Technology, China); Qing Li (The Hong Kong Polytechnic University, Hong Kong); Joel J. P. C. Rodrigues (Federal University of Piauí, Brazil and Instituto de Telecomunicações, Portugal)

  4. A Geometry-based Non-stationary Wideband MIMO Channel Model and Correlation Analysis for Vehicular Communication Systems
    Suqin Pang (Zhengzhou University, China); Fan Bai (Beijing Institute of Spacecraft System Engineering, China); Di Zhang (Zhengzhou University, China); Zheng Wen, Takuro Sato (Waseda University, Japan)

  5. A Global Brain fuelled by Local intelligence Optimizing Mobile Services and Networks with AI
    Si-Ahmed Naas, Thaha Mohammed, Stephan Sigg (Aalto University, Finland)

  6. A Near-Optimal Protocol for the Subset Selection Problem in RFID Systems
    Xiujun Wang (Anhui University of Technology, China); Zhi Liu (The University of Electro-Communications, Japan); Susumu Ishihara (Shizuoka University, Japan); Zhe Dang (Washington State University, USA); Jie Li (Shanghai Jiao Tong University, China)

  7. A Priority Task Scheduling Algorithm based on Residual Energy in EH-WSNs
    Wuyungerile Li, Gao Haode, Yingcong Liu, Bing Jia, Baoqi Huang (Inner Mongolia University, China)

  8. A QoE-based 360° Video Adaptive Bitrate Delivery and Caching Scheme for C-RAN
    Shunyi Wang, Xiaobin Tan, Simin Li, Xiang Xu, Jian Yang, Quan Zheng (University of Science and Technology of China, China)

  9. Adaptive Machine learning: A Framework for Active Malware Detection
    Muhammad Aslam, Dengpan Ye (Wuhan University, China); Hanif Muhammad (COMSATS University Islamabad, Wah Campus, Pakistan); Asad Muhammad (Nagoya Institute of Technology, Japan)

  10. AirQ: A Privacy-Preserving Truth Discovery Framework for Vehicular Air Quality Monitoring
    Rui Liu, Jianping Pan (University of Victoria, Canada)

  11. An Efficient Data Aggregation Scheme with Local Differential Privacy in Smart Grid
    Na Gai, Kaiping Xue, Peixuan He, Bin Zhu (University of Science and Technology of China, China); Jianqing Liu (University of Alabama in Huntsville, USA); Debiao He (Wuhan University, China)

  12. An Online Pricing Strategy of EV Charging and Data Caching in Highway Service Stations
    Zhou Su, Tianxin Lin, Qichao Xu (Shanghai University, China); Nan Chen (Tennessee Tech University, USA); Shui Yu (University of Technology Sydney, Australia); Song Guo (The Hong Kong Polytechnic University, Hong Kong)

  13. Analysing Ballistocardiography for Pervasive Healthcare
    Roni Hytönen, Alison Tshala, Jan Schreier, Melissa Holopainen, Aada Forsman, Minna Oksanen, Rainhard Dieter Findling, Le Ngu Nguyen, Stephan Sigg (Aalto University, Finland); Nico Jähne-Raden (Hannover Medical School, Germany)

  14. Analyzing Eye-movements of Drivers with Different Experiences When Making a Turn
    Bo Wu (Waseda University, Japan); Yishu Zhu (Chang’an University, China); Shoji Nishimura, Qun Jin (Waseda University, Japan)

  15. Autonomous Security Analysis and Penetration Testing
    Ankur Chowdhary, Dijiang Huang, Jayasurya Sevalur Mahendran, Daniel Romo, Yuli Deng, Abdulhakim Sabur (Arizona State University, USA)

  16. BDTF: A Blockchain-Based Data Trading Framework with Trusted Execution Environment
    Guoxiong Su, Wenyuan Yang, Zhengding Luo, Yinghong Zhang, Zhiqiang Bai, Yuesheng Zhu (Peking University, China)

  17. BIA: A Blockchain-based Identity Authorization Mechanism
    Xiaodong Ren, Feilong Lin, Zhongyu Chen, Changbing Tang, Zhonglong Zheng, Minglu Li (Zhejiang Normal University, China)

  18. Compressed Multivariate Kernel Density Estimation for WiFi Fingerprint-based Localization
    Zhendong Xu, Baoqi Huang, Bing Jia, Wuyungerile Li (Inner Mongolia University, China)

  19. CoOMO: Cost-efficient Computation Outsourcing with Multi-site Offloading for Mobile-Edge Services
    Tianhui Meng (Shenzhen Institute of Advanced Technology, Chinese Academy of Science, China); Huaming Wu (Tianjin University, China) Zhihao Shang (Freie Universitat Berlin, Germany); Yubin Zhao (Shenzhen Institute of Advanced Technology, Chinese Academy of Science, China); Cheng-Zhong Xu (University of Macau, China)

  20. COPSS-lite: A Lightweight ICN based Pub/Sub System for IoT Environments
    Sripriya Srikant Adhatarao (University of Goettingen, Germany); Haitao Wang (Clausthal University of Technology, Germany); Mayutan Arumaithurai, Xiaoming Fu (University of Goettingen, Germany)

  21. Data Collection Strategy Based on Drone Technology in Wireless Sensor Networks
    Bo Yang, Xiangyu Bai (Inner Mongolia University, China)

  22. Deep Reinforcement Learning for Optimal Resource Allocation in Blockchain-based IoV Secure Systems
    Hongzhi Xiao, Chen Qiu, Qinglin Yang, Huakun Huang (The University of Aizu, Japan); Junbo Wang (Sun Yat-sen University, China); Chunhua Su (The University of Aizu, Japan)

  23. Delay Efficient D2D Communications Over 5G Edge-Computing Mobile Networks with Power Control
    Xiaohua Xu (Kennesaw State University, USA); Lixin Wang (Columbus State University, USA)

  24. Detection of malicious nodes in drone ad-hoc network based on supervised learning and clustering algorithms
    Shanshan Sun, Zuchao Ma, Liang Liu, Hang Gao, Jianfei Peng (Nanjing University of Aeronautics and Astronautics, China)

  25. Dynamic Resource Allocation for Hierarchical Federated Learning
    Wei Yang Bryan Lim, Jer Shyuan Ng (Alibaba Group, China and Nanyang Technological University, Singapore); Zehui Xiong, Dusit Niyato (Nanyang Technological University, Singapore); Song Guo (The Hong Kong Polytechnic University, Hong Kong); Cyril Leung (The University of British Columbia, Canada and Nanyang Technological University, Singapore); Chunyan Miao (Nanyang Technological University, Singapore)

  26. Dynamic Spectrum Allocation Enabled Multi-user Latency Minimization in Mobile Edge Computing
    Yang Li, Yuan Wu (University of Macau, Macau); Weijia Jia (Beijing Normal University (BNU Zhuhai), China)

  27. Early Botnet Detection for the Internet and the Internet of Things by Autonomous Machine Learning
    Anderson Bergamini de Neira, Alex Medeiros Araujo, Michele Nogueira (Federal University of Paraná, Brazil)

  28. Efficient Algorithm for Multi-Constrained Opportunistic Wireless Scheduling
    Xiaohua Xu (Kennesaw State University, USA); Lixin Wang (Columbus State University, USA)

  29. Efficient Distributed Training in Heterogeneous Mobile Networks with Active Sampling
    Yunhui Guo, Xiaofan Yu, Kamalika Chaudhuri, Tajana Rosing (University of California San Diego, USA)

  30. Efficient Service Entity Chain Placement in Mobile Edge Computing
    Yu Liang, Jidong Ge, Sheng Zhang, Changan Niu (Nanjing University, China); Wei Song (Nanjing University of Science and Technology, China); Bin Luo (Nanjing University, China)

  31. Energy-efficient Trajectory Planning and Speed Scheduling for UAV-assisted Data Collection
    Weidu Ye, Wenjia Wu, Feng Shan, Ming Yang, Junzhou Luo (Southeast University, China)

  32. Energy-saving Strategy for Edge Computing by Collaborative Processing Tasks on Base Stations
    Zhongjun Ma, Zhenchun Wei, Wenjie Zhang, Zengwei Lyu, Junyi Xu, Benhong Zhang (Hefei University of Technology, China)

  33. Enhancing IoT Anomaly Detection Performance for Federated Learning
    Brett Weinger (Stony Brook University, USA); Jinoh Kim (Texas A&M University, USA); Alex Sim (Lawrence Berkeley National Laboratory, USA); Makiya Nakashima (Texas A&M University, USA); Nour Moustafa (University of New South Wales, Australia); K. John Wu (Lawrence Berkeley National Laboratory, USA)

  34. Evaluation environment using edge computing for artificial intelligence-based irrigation system
    Takaaki Kawai, Hiroshi Mineno (Shizuoka University, Japan)

  35. FD-Band: A Ubiquitous Fall Detection System Using Low-Cost COTS Smart Band
    Kaiwen Guo, Yingling Quan, Hao Zhou (University of Science and Technology of China, China); Zhi Liu (Shizuoka University, Japan); Panlong Yang, Xiang-Yang Li (University of Science and Technology of China, China)

  36. Federated Deep Payload Classification for Industrial Internet with Cloud-Edge Architecture
    Peng Zhou (Shanghai University , China)

  37. Fine-grained Device and Data Access Control of Community Medical Internet of Things
    Cheng Huang, Ziyang Zhang, Jing Huang, Fulong Chen (Anhui Normal University, China)

  38. Identifying unfamiliar callers' professions from privacy-preserving mobile phone data
    Jiaquan Zhang (University of Goettingen, Germany); Xiaoming Yao (China Telecom Cloud Branch, China); Xiaoming Fu (University of Goettingen, Germany)

  39. Joint Service Caching and Computation Offloading to Maximize System Profits in Mobile Edge-Cloud Computing
    Qingyang Fan (Harbin Engineering University, China); Junyu Lin (Institute of Information Engineering, Chinese Academy of Sciences, China); Guangsheng Feng, Zihan Gao (Harbin Engineering University, China); Huiqiang Wang (Harbin Engineering University and Peng Cheng Laboratory, China); Yafei Li (Harbin Engineering University, China)

  40. Jointly Video Bitrate Adaptation and Multicast Resource Allocation in Mobile Edge Networks
    Simin Li, Xiaobin Tan, Shunyi Wang, Jian Yang, Quan Zheng (University of Science and Technology of China, China)

  41. Length Matters: Fast Internet Encrypted Traffic Service Classification based on Multi-PDU Lengths
    Zihan Chen, Guang Cheng, Bomiao Jiang, Shuye Tang, Shuyi Guo, Yuyang Zhou (Southeast University, China)

  42. Lifetime Improvements of Smart Sensors Maintenance Protocol in Prospect of IoT-based Rampal Power Plant
    Syed Bilal Hussain Shah, Wang Lei (Dalian University of Technology, China); Md Ershadul Haque (Feni University, Bangladesh); Md Jahirul Islam (Z. H. Sikder University of Science & Technology Shariatpur, Bangladesh), Anil Carie (VIT-AP Amaravati, India); Neeraj Kumar (Thapar Institute of Science and Technology Patiala, India)

  43. Load balancing and resource management in distributed B5G networks
    Lu Ma, Weiling Chang, Chao Li, Shanjin Ni, Jia Cui, Ming Liu (National Computer Network Emergency Response Technical Team/Coordination Center of China, China)

  44. LoRaCTP: a LoRa based Content Transfer Protocol for sustainable edge computing
    Kiyoshy Nakamura, Pietro Manzoni (Universitat Politècnica de València, Spain); Marco Zennaro (ICTP-International Centre for Theoretical Physics, Italy); Juan-Carlos Cano, Carlos Calafate (Universitat Politècnica de València, Spain)

  45. Machine Learning Enabled Secure Collection of Phasor Data in Smart Power Grid Networks
    Wassila Lalouani, Mohamed Younis (University of Maryland, Baltimore County, USA)

  46. Magic Wand : Towards Plug-and-Play Gesture Recognition on Smartwatch
    Zhipeng Song, Zhichao Cao (Tsinghua University, China); Zhenjiang Li (City University of Hong Kong, Hong Kong); Jilinag Wang (Tsinghua University, China)

  47. Markov Probability Fingerprints: A Method for Identifying Encrypted Video Traffic
    Luming Yang, Shaojing Fu, Yuchuan Luo, Jiangyong Shi (National University of Defense Technology, China)

  48. MEC-Assisted FoV-Aware and QoE-Driven Adaptive 360◦ Video Streaming for Virtual Reality
    Chih-Ho Hsu (National Taiwan University, Taiwan)

  49. MobiFit: Contactless Fitness Assistant for Freehand Exercises Using Just One Cellular Signal Receiver
    Guanlong Teng, Feng Hong, Yue Xu, Jianbo Qi, Ruobing Jiang, Chao Liu, Zhongwen Guo (Ocean University of China, China)

  50. Mobility-Aware Offloading and Resource Allocation in MEC-Enabled IoT Networks
    Han Hu, Weiwei Song (Nanjing University of Posts and Telecommunications, China); Qun Wang (Utah State University, USA); Fuhui Zhou (Nanjing University of Aeronautics and Astronautics, China); Rose Qingyang Hu (Utah State University, USA)

  51. Multi-dimensional Impact Detection and Diagnosis in Cellular Networks
    Mubashir Adnan Qureshi, Lili Qiu (University of Texas at Austin, USA); Ajay Mahimkar (AT&T, USA); Jian He, Ghufran Baig (University of Texas at Austin, USA)

  52. Multivariate and Multi-frequency LSTM based Fine-grained Productivity Forecasting for Industrial IoT
    Yan Zhang, Xiaolong Zheng, Liang Liu, Huadong Ma (Beijing University of Posts and Telecommunications, China)

  53. NDN Based Participatory Crowdsensing Framework with Area-focused Interest Forwarding
    Hideki Tode, Ashish Man Singh Pradhan, Daishi Kondo, Yosuke Tanigawa (Osaka Prefecture University, Japan)

  54. NoPTPeer:Protecting Android Devices from Stealthy Spoofing and Stealing in WLANs without Privilege
    Shuying Wei (Tsinghua University, China); Xiaoliang Wang (Capital Normal University, China); Ke Xu (Tsinghua University and Peng Cheng Laboratory, China)

  55. Online Distributed Job Dispatching with Outdated and Partially-Observable Information
    Yuncong Hong (University of Science and Technology of China and Southern University of Science and Technology, China); Bojie Lv, Rui Wang (Southern University of Science and Technology and Peng Cheng Laboratory, China); Haisheng Tan (University of Science and Technology of China and Peng Cheng Laboratory, China); Zhenhua Han (The University of Hong Kong, Hong Kong); Hao Zhou (University of Science and Technology of China, China); Francis Lau (The University of Hong Kong, Hong Kong)

  56. Optimal Defense Strategy against Evasion Attacks
    Jiachen Wu (Sichuan University, China); Jipeng Li, Yan Wang, Yanru Zhang (University of Electronic Science and Technology of China, China); Yingjie Zhou (Sichuan University, China)

  57. Optimizing functional split of baseband processing on TWDM-PON based fronthaul network
    Go Hasegawa (Tohoku University, Japan); Masayuki Murata (Osaka University, Japan); Yoshihiro Nakahira, Masayuki Kashima (Oki Electronics Industry Co., Ltd., Japan); Shingo Ata (Osaka City University, Japan)

  58. Privacy-protected and Auditable Crowdsourced Indoor Localization based on Blockchain
    Wenxiang Wu, Shaojing Fu, Yuchuan Luo (National University of Defense Technology, China)

  59. Privacy-Protecting Reputation Management Scheme in IoV-based Mobile Crowdsensing
    Zhifei Wang, Luning Liu, Luhan Wang, Xiangming Wen, Wenpeng Jing (Beijing University of Posts and Telecommunications, China)

  60. QoS Optimization of DNN Serving Systems Based on Per-Request Latency Characteristics
    Jianfeng Zhang (Nankai University, China); Wensheng Zhang (Institute of Automation, Chinese Academy of Sciences, China); Lingjun Pu (Nankai University and Xidian University, China); Jingdong Xu (Nankai University, China)

  61. Real-time Emotion Recognition for Sales
    Si-Ahmed Naas, Stephan Sigg (Aalto University, Finland)

  62. Real-Time Survivor Detection in UAV Thermal Imagery Based on Deep Learning
    Jiong Dong, Kaoru Ota, Mianxiong Dong (Muroran Institute of Technology, Japan)

  63. Real-time Task Offloading for Data and Computation Intensive Services in Vehicular Fog Computing Environments
    Chunhui Liu, Kai Liu, Xincao Xu, Hualing Ren, Feiyu Jin, Songtao Guo (Chongqing University, China)

  64. Reinforcement Learning based Joint Channel/Subframe Selection Scheme for Fair LTE-WiFi Coexistence
    Yuki Kishimoto, Xiaoyan Wang, Masahiro Umehira (Ibaraki University, Japan)

  65. Research on D2D Data Transmission Protocol in NDN
    Bo Cui, Xinmiao Jian, Qi Chen (Inner Mongolia University, China)

  66. Resilient Caching in Information-Centric Networking
    Noriaki Kamiyama, Rin Hamada (Fukuoka University, Japan)

  67. RF-WTI: Wood Types Identification based on Commodity RFID Devices
    Xiangmao Chang, Xianghui Zhang, Muhammad Waqas Isa (Nanjing University of Aeronautics and Astronautics, China); Weiwei Wu (Southeast University, China); Yan Li (Nanjing University of Finance and Economics, China)

  68. SASAK: Shrinking the Attack Surface for Android Kernel with Stricter “seccomp” Restrictions
    Yingjiao Niu, Lingguang Lei, Yuewu Wang, Jiang Chang, Shijie Jia, Chunjing Kou (Institute of Information Engineering, Chinese Academy of Sciences, China)

  69. Scheduling mix-flow in SD-DCN based on Deep Reinforcement Learning with Private Link
    Jinjie Lu, Waixi Liu, Yinghao Zhu, Sen Ling, Zhitao Chen, Jiaqi Zeng (Guangzhou University, China)

  70. SDN Based Computation Offloading for Industrial Internet of Things
    Gen Li, Shutian Hua, Liang Liu, Xiaolong Zheng, Huadong Ma (Beijing University of Posts and Telecommunications, China)

  71. Terminal-Edge-Cloud Collaboration: An Enabling Technology for Robust Multimedia Streaming
    Dapeng Wu, Jin Yang (Chongqing University of Posts and Telecommunications, China); Honggang Wang (University of Massachusetts Dartmouth, USA); Boran Yang, Ruyan Wang (Chongqing University of Posts and Telecommunications, China)

  72. Simultaneous Multi-face Zoom Tracking for 3-D People-Flow Analysis with Face Identification
    Liheng Shen, Shaopeng Hu, Kohei Shimasaki, Taku Senoo, Idaku Ishii (Hiroshima University, Japan)

  73. SSR: Joint Optimization of Recommendation and Adaptive Bitrate Streaming for Short-form Video Feed
    Dezhi Ran, Yuanxing Zhang, Wenhan Zhang, Kaigui Bian (Peking University, China)

  74. Subject-adaptive Skeleton Tracking with RFID
    Chao Yang (Auburn University, USA); Xuyu Wang (California State University, Sacramento, USA); Shiwen Mao (Auburn University, USA)

  75. Throughput Maximization for UAV-Enabled Data Collection
    Junchao Gong, Xiaojun Zhu (Nanjing University of Aeronautics and Astronautics, China); Lijie Xu (Nanjing University of Posts and Telecommunications, China)

  76. Tile-based Multi-source Adaptive Streaming for 360-degree Ultra-High-Definition Videos
    Xinjing Yuan, Lingjun Pu, Ruilin Yun, Jingdong Xu (Nankai University, China)

  77. TL-IDPS: Two Level Intrusion Detection and Prevention System using Probabilistic Optimal Feature Set Estimation
    Ernest Ntizikira, Lei Wang, Xinxin Lu, Bingxian Lu (Dalian University of Technology, China)

  78. Towards mmWave Localization with Controllable Reflectors in NLoS Scenarios
    Shan Wang, Zengyu Song, Hao Zhou (University of Science and Technology of China, China); Xing Guo (Anhui University and University of Science and Technology of China, China); Jun Xu (University of Science and Technology of China, China); Zhi Liu (Shizuoka University, Japan)

  79. Training Machine Learning Models Through Preserved Decentralization
    Goodlet Akwasi Kusi, Qi Xia, Christian Nii Aflah Cobblah, Jianbin Gao, Hu Xia (University of Electronic Science and Technology of China, China)

  80. Trapdoor Assignment of PEKS-based NDN Strategy in Two-Tier Networks
    Kyi Thar Ko, Masahiro Mambo (Kanazawa University, Japan)

  81. Urban Mobility Prediction based on LSTM and Discrete Position Relationship Model
    Ming Tao, (Dongguan University of Technology, China); Geng Sun (Guangdong University of Technology and Guangdong University of Technology, China); Tian Wang (Huaqiao University, China)

  82. User Interest Communities Influence Maximization in a Competitive Environment
    Jieming Chen, Leilei Shi (Jiangsu University, China); Lu Liu, Ayodeji O. Ayorinde (University of Leicester, UK); Rongbo Zhu (South-Central University for Nationalities, China); John Panneerselvam (University of Leicester, UK)

  83. Weighted Local Outlier Factor for Detecting Anomaly on In-Vehicle Network
    Yuan Linghu, Ming Xu, Xiangxue Li and Haifeng Qian (East China Normal University, China)

  84. Wireless Information and Energy Provision with Practical Modulation in Energy Self-Sustainable Wireless Networks
    Jie Hu, Li Zhang, Qin Yu (University of Electronic Science and Technology of China, China); Kun Yang (University of Essex, UK)

Workshop on 5G/B5G Security

  1. Verifiable Blockchain-Based Searchable Encryption with forward and backward privacy
    Ruizhong Du, Yi Wang (Hebei University, China)

1st International Workshop on Advances in Intelligent Mobile Networks for Smart Cities (AINSC)

  1. A Traffic Engineering Technology Based on Segment Routing in Software Defined Network
    Yuantao Teng, Zhengyou Xia (Nanjin University of Aeronautics and Astronautics, China)

  2. An Ensemble Learning Approach for Extracting Concept Prerequisite Relations from Wikipedia
    Yang Zhou, Kui Xiao, Yan Zhang (Hubei University, China)

  3. Boosting Cooperative Game with Complete Information in Multi-UAV Mesh Router Networks
    Wei Zhao, Taoyang Zhou, Xuangou Wu, Xiujun Wang, Ruilin Pan (Anhui University of Technology, China); Xun Shao (Kitami Institute of Technology, Japan)

  4. Community Preference-Based Information-Centric Networking Cache
    Xiao Yang (Shanghai Jiao Tong University, China); Chaofeng Zhang (Advanced Institute of Industrial Technology, Japan); Caijuan Chen (National Institute of Informatics, Japan); Haozhe Liang (Pinduoduo Inc., China)

  5. Design and Analysis of Decentralized Interactive Cyber Defense Approach based on Multi-agent Coordination
    Ming Liu, Lu Ma, Chao Li, Weiling Chang, Yuanjie Wang (National Computer Network Emergency Response Technical Team/Coordination Center of China, China); Jianming Cui (Chang’an University, China), Yingying Ji (National Computer Network Emergency Response Technical Team/Coordination Center of China, China)

  6. Improving the Response Time of SDN Controllers Based on Vertical Handover
    Modhawi Alotaibi (University of Ottawa, Canada and Taibah University, Saudi Arabia); Liu Dandan (Wuhan University, China and University of Ottawa, Canada); Amiya Nayak (University of Ottawa, Canada)

1st International Workshop on Mobile Sensing with Radio, Light, and Acoustic (MSRLA)

  1. A Privacy-preserving and Collusion-resisting Top-k Query Processing in WSNs
    Jianguo Zhou, Hua Dai, Jie Zhu, Rongqi Qi, Geng Yang, Jian Xu (Nanjing University of Post and Telecommunication, China)

  2. AcousticThermo: Temperature Monitoring using Acoustic Pulse Signal
    Fusang Zhang (Institute of Software, Chinese Academy of Sciences, China); Kai Niu (Peking University, China); Xiaolai Fu (Beijing University of Posts and Telecommunications, China); Beihong Jin (Institute of Software, Chinese Academy of Sciences, China)

  3. A Collision-free MAC protocol based on quorum system for underwater acoustic sensor networks
    Guangjie Han, Xingjie Wang, Ning Sun, Li Liu (Hohai University, China)

  4. Gesture Recognition System Based on Neural Networks by Using COTS RFID Tag Array
    Jiaying Wu, Chuyu Wang, Lei Xie (Nanjing University, China)

  5. Real-time and Accurate RFID Tag Localization based on Multiple Feature Fusion
    Shupo Fu, Shigeng Zhang, Danming Jiang (Central South University, China); Xuan Liu (Hunan University, China)

  6. Research and Development of a portable device for measuring the concentration of colloidal solution
    Cunbo Jiang, Chenguang Sun, Zhe Lan, Hongxiang Xiao, Jinfang Nie (Guilin University of Technology, China)

  7. Spectrum Prediction Based On Joint Long And Short Term Memory With Convolutional Neural Network In Cognitive Sensing For Spectrum Sharing
    Liang Zhang, Min Jia, Qiyu Huang (Harbin Institute of Technology, China); Yun Liu (The 54th Research Institute of China Electronics Technology Group Corporation, China)

1st International Workshop on Ubiquitous Electric Internet of Things (UEIoT)

  1. Coding based Distributed Data Shuffling for Low Communication Cost in Data Center Networks
    Junpeng Liang, Lei Yang, Zhenyu Wang, Xuxun Liu (South China University of Technology, China); Weigang Wu (Sun Yat-sen University, China)

  2. Improving Analysis of Automatic Distribution Changes for Power Grid
    Meile Shi, Zhen Wang, Pengfei Yu (Xiamen Great Power GeoInformation Technology Co., Ltd, China); Qi Du (Xiamen University of Technology, China)

  3. Privacy-Preserving Techniques for Protecting Large-Scale Data of Cyber-Physical Systems
    Marwa Keshk (University of New South Wales, Canberra and Data61-CSIRO, Australia); Nour Moustafa, Elena Sitnikova, Benjamin Turnbull (University of New South Wales, Canberra, Australia); Dinusha Vatsalan (Data61-CSIRO, Australia)

  4. Research on load forecasting model on power sensor net
    Kai Huang (State Grid Hebei Electric Power Co.,Ltd., Institute of Economics and Technology, China), Jing Zhang (State Grid Jinzhou Power Supply Company, China), Jiakun An, Jing Zhang, Jinglin Han (State Grid Hebei Electric Power Co.,Ltd., Institute of Economics and Technology, China); Yunjie Lei ( Xiamen University of Technology, China)

  5. Research on visualization planning method of distribution network based on graphical model integration
    He Huang (State Grid Jiangsu Electric Power Co., Ltd., China); Xian Zhou, Liang Guo, Hao Chang, Ning Ma (State Grid Taizhou Power Supply Company, China)

  6. Researches on Intelligent Traffic Signal Control Based on Deep Reinforcement Learning
    Juan Luo, Xinyu Li, Yanliu Zheng (Hunan University, China)

  7. WSAD: An Unsupervised Web Session Anomaly Detection Method
    Yizhen Sun (State Grid Information & Communication Company of Hunan Electric Power Corporation, China); Yiman Xie, Weiping Wang, Shigeng Zhang (Central South University, China); Jun Gao, Yating Chen (State Grid Information & Communication Company of Hunan Electric Power Corporation, China)

2nd International Workshop on Artificial Intelligence Applications in Internet of Things (AI2OT)

  1. A Method to Construct Vulnerability Knowledge Graph based on Heterogeneous Data
    Yizhen Sun (State Grid Information & Communication Company of Hunan Electric Power Corporation, China); Dandan Lin, Hong Song (Central South University, China); Minjia Yan, Linjing Cao (State Grid Information & Communication Company of Hunan Electric Power Corporation, China)

  2. ECDT: Exploiting Correlation Diversity for Knowledge Transfer in Partial Domain Adaptation
    Shichang He (Hunan University, China); Xuan Liu (Hunan University and Tsinghua University, China); Xinning Chen, Ying Huang (Hunan University, China)

  3. Study on Location and Sizing Programming of Regional Substation
    Xiaolin Tan, Shiyao Hu, Chunguang He, Pengfei Sun (State Grid Hebei Electric Power Co.,Ltd., Institute of Economics and Technology, China); Jing Zhang (State Grid Jinzhou Power Supply Company, China); Ying Ma (Xiamen University of Technology, China)

2nd International Workshop on Edge Computing and Artificial Intelligence based Sensor-Cloud System (ECAISS)

  1. A Game-Theoretical Approach for Task Offloading in Edge Computing
    Juan Luo, Qian Qian, Luxiu Yin, Ying Qiao (Hunan University, China)

  2. A Low Cost Edge Computing and LoRaWAN Real Time Video Analytics for Road Traffic Monitoring
    Salahadin Seid (Addis Ababa University, Ethiopia); Marco Zennaro (International Centre for Theoretical Physics, Italy); Mulugeta Libse (Addis Ababa University, Ethiopia); Ermanno Pietrosemoli (International Centre for Theoretical Physics, Italy); Pietro Manzoni (Universitat Politècnica de València, Spain)

  3. A Novel Service Composition Approach for Offloading in Mobile Edge Computing
    Dandan Liu (Wuhan University, China); Nitesh Krishna, Amiya Nayak (University of Ottawa, Canada)

  4. Accurate IoT Device Identification from Merely Packet Length
    Yizhen Sun (State Grid Information & Communication Company of Hunan Electric Power Corporation, China); Shupo Fu, Shigeng Zhang (Central South University, China); Yuxi Wu, Jingchuan Feng (State Grid Information & Communication Company of Hunan Electric Power Corporation, China)

  5. An Optimal Wireless Transmission Strategy based on Coherent Beamforming and Successive Interference Cancellation for Edge Computing
    Zhehao Li, Lei Shi (Hefei University of Technology, China); Yi Shi (Intelligent Automation Inc., USA); Yuqi Fan, Zhenchun Wei (Hefei University of Technology, China)

  6. Dependency-Aware Dynamic Task Scheduling in Mobile-Edge Computing
    Mingzhi Wang, Tao Ma, Tao Wu, Chao Chang, Fang Yang, Huaixi Wang (National University of Defense Technology, China)

  7. Game Theory based Joint Task Offloading and Resource Allocation Algorithm for Mobile Edge Computing
    Ning Li, Jianen Yan, Zhaoxin Zhang (Harbin Institute of Technology, China); Jose Fernan Martinez (Universidad Politécnica de Madrid, Spain); Xin Yuan (Harbin Institute of Technology, China)

  8. Load Balancing Mechanisms of Unmanned Surface Vehicle Cluster Based on Marine Vehicular Fog Computing
    Kuntao Cui, Wenli Sun (Dalian Maritime University, China); Bin Lin (Dalian Maritime University and Peng Cheng Laboratory, China); Wenqiang Sun (Dalian Maritime University, China)

  9. Virtual Machine Security Migration Strategy Based on the Edge Computing Environment
    Ruizhong Du, Wangkai He, Junfeng Tian (Hebei University, China)

Poster & Demo Track

  1. A Study on MQTT Node Selection
    Fu Chen, Yujia Huo, Kun Liu, Wenying Tang, Jianming Zhu, Zhiyuan Sui (Central University of Finance and Economics, China)

  2. Vision-aided 3D Human Pose Estimation with RFID
    Chao Yang (Auburn University, USA); Xuyu Wang (California State University, Sacramento, USA); Shiwen Mao (Auburn University, USA)

  3. Impact of Mode Selection on the Performance of D2D-Unlicensed Communications
    Ganggui Wang, Celimuge Wu, Tsutomu Yoshinaga (The University of Electro-Communications, Japan); Rui Yin (Zhejiang University City College, China)

  4. UAV-empowered Protocol for Information Sharing in VDTN
    Zhaoyang Du, Celimuge Wu, Tsutomu Yoshinaga (The University of Electro-Communications, Japan)







News

Important Days

  • August 8, 2020 (Firm)

    Paper Submission Due

  • July 15, 2020

    Paper Submission Due

  • September 15, 2020

    Author Notification

  • October 25, 2020

    Camera-Ready Due

  • December 17-19, 2020

    Conference Date

Copyright © 2020 International Conference on Mobility, Sensing and Networking