Navigation

Program


Date Time Program
2024/6/20 15:00 - 18:00 Register / Sign-inign-in
18:00-19:00 Dinner
2024/6/21 8:30-9:00 Opening
9:00-9:50 Keynote 1, Speaker: Rajiv Ranjan, Newcastle University
9:50-10:10 Coffee break
10:10-11:00 Keynote 2, Speaker: Fenghua Li, Institute of Information Engineering, CAS
11:00-11:50 Keynote 3, Speaker: Xiuzhen Cheng, Shandong University
12:00-13:00 Lunch
14:00-14:50 Keynote 4, Speaker: Jie Wu, Temple University
14:50-15:40 Keynote 5, Speaker: Gang Qu, University of Maryland
15:40-15:50 Coffee break
15:50-16:40 Keynote 6, Speaker: My Thai, University of Florida
16:40-17:30 Keynote 7, Speaker: Falko Dressler, TU Berlin
18:30-20:00 Banquet
     
2024/6/22 8:30-10:00 Session 1: Tackling Anomalies
1. AUTOMATE: Automatic Anomaly Detection and Root Cause Analysis Framework for Hadoop
Xinyuan Liu (Newcastle University, United Kingdom), Devki Nandan Jha (Newcastle University, United Kingdom), Yinhao Li (Newcastle University, United Kingdom), Mutaz Barika (Newcastle University, United Kingdom), Umit Demirbaga (Bartin University, Turkey), and Rajiv Ranjan (Newcastle University, United Kingdom)
2. FedHC: A Hierarchical Clustering Algorithm for Federated Anomaly Detection on Meta Computing
Donglin Zhang (Xidian University, China), Yulong Fu (Xidian University, China), Dong Zhang (National Computer Network Emergency Response Technical Team/Coordination Center of China, China), Zheng Yan (Xidian University, China), and Hui Li (Xidian University, China)
3. Network Vulnerability Analysis via Quantum Computing
Andrew P. Kennedy (University of Florida), Thang N. Dinh (Virginia Commonwealth University), and My T. Thai (University of Florida)
4. Meta-IDS: A Multi-stage Deep Intrusion Detection System with Optimal CPU Usage
Nadia Niknami (Temple University, US), Vahid Mahzoon (Temple University, US), and Jie Wu (Temple University, US)
5. Large Language Model Based Machine Learning Approach for Fake News Detection
Pin-Chien Chen (Illinois Institute of Technology, USA), Oluwaseun T. Ajayi (Illinois Institute of Technology, USA), and Yu Cheng (Illinois Institute of Technology, USA)
6. Adversarial Hidden Link Threats in Meta Computing
Junjie Xiong (University of South Florida), Mingkui Wei (George Mason University), Zhuo Lu (University of South Florida), and Yao Liu (University of South Florida)
10:00-10:30 Coffee break
10:30-12:00 Session 2: Enhancing IoT systems
1. A HyperLogLog-based Solution to Measuring Sliding Window Flow Spread in High-Speed Networks
Michael Hentz (University of Kentucky, USA), Aayush Karki (University of Kentucky, USA), and Haibo Wang (University of Kentucky, USA)
2. Speech Dereverberation using 2D Microphone Array
Tao Yu (Nanjing University), Chuyu Wang (Nanjing University), Lei Xie (Nanjing University), and Sanglu Lu (Nanjing University)
3. A Supervised Transformer-based Model for Attributing Mobile-App-generated Synthetic Audio Artifacts
Lucky Onyekwelu-udoka (Iowa State University) and Yong Guan (Iowa State University)
4. An Industrial Translation Tool from Structured Text to C Source Code for Software Services
Congfei Li (Guodian Nanjing Automation Co.,Ltd, China), Bing Han (Guodian Nanjing Automation Co.,Ltd, China), Hua Deng (Guodian Nanjing Automation Co.,Ltd, China), Jiwei Zhu (Guodian Nanjing Automation Co.,Ltd, China), and Yang Wang (Guodian Nanjing Automation Co.,Ltd, China)
5. Physical Vibration-enabled Secure Interaction Technology for IoT Devices
Xiangyu Xu (Southeast University), Tao Liu (Southeast University), Jingyi Zhang (Southeast University), Minghao Cui (Southeast University), Yixin Dong (Southeast University), and Zhen Ling (Southeast University)
6. Connectivity Maintenance in Adversarial Networks with Link Uncertainty and Heterogeneity
Jianzhi Tang (Shanghai Jiao Tong University, China), Zanwei Shen (Shanghai Jiao Tong University, China), Luoyi Fu (Shanghai Jiao Tong University, China), Lei Zhou (Shanghai Jiao Tong University, China), Xinbing Wang (Shanghai Jiao Tong University, China), and Chenghu Zhou (Chinese Academy of Sciences, China)
12:00-13:00 Lunch
14:00-15:30 Session 3: SOK
1. Security and Privacy in Virtual Reality: Challenges, Trends, and Countermeasures
Jiachun Li (Shanghai Jiao Tong University, China), Yan Meng (Shanghai Jiao Tong University, China), and Haojin Zhu (Shanghai Jiao Tong University, China)
2. SoK: AI-Powered Security Analysis of Smart Contract
Shuo Yang (Southern University of Science and Technology, China), Jianyu Niu (Southern University of Science and Technology, China), and Yinqian Zhang (Southern University of Science and Technology, China)
3. A Review of Motion Data Privacy in Virtual Reality
Depeng Xu (UNC Charlotte), Weichao Wang (UNC Charlotte), and Aidong Lu (UNC Charlotte)
4. On Protecting the Data Privacy of Large Language Models (LLMs): A Survey
Biwei Yan (Shandong University), Kun Li (Shandong University), Minghui Xu (Shandong University), Yueyan Dong (Shandong University), Yue Zhang (Drexel University), Zhaochun Ren (Leiden University), and Xiuzhen Cheng (Shandong University)
5. Embracing the Crowd: Robust Federated Learning for Edge Intelligence
Dongxiao Yu (Shandong University), Zhenzhen Xie (Shandong University), Xiao Zhang (Shandong University), Yuan Yuan (Shandong University), Yifei Zou (Shandong University), and Xiuzhen Cheng (Shandong University)
6. SoK: On-Device Large Language Model Personalization for Meta Computing
Yanting Shi (Shandong University, China), Zhenge Jia (Shandong University, China), Zhaoyan Shen (Shandong University, China), and Mengying Zhao (Shandong University, China)
15:30-16:00 Coffee break
16:00-17:30 Session 4: Enhancing Edges & Security
1. Accumulative Fidelity Maximization of Inference Services in DT-Assisted Edge Computing
Jing Li (City University of Hong Kong), Weifa Liang (City University of Hong Kong), Jianping Wang (City University of Hong Kong), and Xiaohua Jia (City University of Hong Kong)
2. Low-Latency Layer-Aware Proactive and Passive Container Migration in Meta Computing
Mengjie Liu (Beijing Normal University), Yihua Li (University of Zurich), Fangyi Mou (BNU-HKBU United International College), Zhiqing Tang (Beijing Normal University), Jiong Lou (Shanghai Jiao Tong University), Jianxiong Guo (Beijing Normal University), and Weijia Jia (Beijing Normal University)
3. Optimizing Task Migration Decisions in Vehicular Edge Computing Environments
Ziqi Zhou (TU Berlin, Germany), Youming Tao (TU Berlin, Germany), Agon Memedi (TU Berlin, Germany), Chunghan Lee (Toyota Motor North America R&D, USA), Seyhan Ucar (Toyota Motor North America R&D, USA), Onur Altintas (Toyota Motor North America R&D, USA), and Falko Dressler (TU Berlin, Germany)
4. Policy-Based Reinforcement Learning for Online Container Scheduling in Meta Computing
Jianqiu Wu (BNU-HKBU United International College), Jianxiong Guo (Beijing Normal University), Zhiqing Tang (Beijing Normal University), Tianhui Meng (Beijing Normal University), and Weijia Jia (Beijing Normal University)
5. Privacy Enhancement for Meta Computing via Conjecture Pricing
Shengli Pan (Beijing University of Posts and Telecommunications), Jinyang Zhang (Beijing University of Posts and Telecommunications), Peng Li (The University of Aizu), and Kouichi Sakurai (Kyushu University)
6. Constructions of MSR Code for Optimal Node Repair in Distributed Storage
Jian Ren (Michigan State University), Jian Li (Beijing Jiaotong University), and Tongtong Li (Michigan State University)
18:00-19:00 Dinner
     
2024/6/23 8:45-10:00 Session 5: Improving Distributed Systems
1. Enhancing Privacy and Efficiency of Metacomputing Enabled Internet-of-Things Applications with Split Vertical Federated Learning
Amani Aldahiri (RMIT University, Australia), Veronika Stephanie (RMIT University, Australia), Ibrahim Khalil (RMIT University, Australia), Mohammed Atiquzzaman (University of Oklahoma, USA), Xun Yi (RMIT University, Australia), and Mohammad Saidur Rahman (RMIT University, Australia)
2. Decentralized Federated Learning for Meta Computing
Kaichuang Zhang (University of Texas Rio Grande Valley, USA), Ping Xu (University of Texas Rio Grande Valley, USA), and Zhi Tian (George Mason University, USA)
3. Meta Learning Based Adaptive Cooperative Perception in Nonstationary Vehicular Networks
Kaige Qu (University of Waterloo, Canada), Zixiong Qin (Beijing University of Posts and Telecommunications, China), and Weihua Zhuang (University of Waterloo, Canada)
4. Binary Code Security: the Source of Vulnerability, Exploitation and Mitigation Techniques
Zhijian Huang (National Key Laboratory of Science and Technology on Information System Security, China), Xiaojiao Qin (Shandong University, China), Shuxin Sun (Shandong University, China), Long Zhang (National Key Laboratory of Science and Technology on Information System Security, China), Hongquan Xu (National Key Laboratory of Science and Technology on Information System Security, China), and Pengfei Hu (Shandong University, China)
5. ALSM: An Attribute-aware LSM-Tree based Key-Value Store to Reduce I/O Amplification
Zhaoyan Shen (Shandong University), Dehao Yu (Shandong University), Qian Wei (Shandong University), Kai Zhang (Jinan Inspur Data Technology Co., Ltd), Liqiang Zhang (Jinan Inspur Data Technology Co., Ltd), Zaigui Zhang (Jinan Inspur Data Technology Co., Ltd), and Mengying Zhao (Shandong University)
10:00-10:30 Coffee break
10:30-11:30 Session 6: Strengthening Blockchains
1. Scaling Blockchain via Behavior-assessment of Nodes for IIoT
Tianyi Xu (College of Intelligence and Computing, Tianjin University, Tianjin 300350, China), Ziqi Gan (College of Intelligence and Computing, Tianjin University, Tianjin 300350, China), Zhuo Liu (College of Intelligence and Computing, Tianjin University, Tianjin 300350, China), Xiaobo Zhou (College of Intelligence and Computing, Tianjin University, Tianjin 300350, China), and Tie Qiu (College of Intelligence and Computing, Tianjin University, Tianjin 300350, China and School of Computer, Qinghai Minzu University, Xining 810007, China)
2. A Method for Selective Encryption Optimization Based on User Access Frequency
Tie Hong (Beijing Institute of Tracking and Telecommunications Technology), DiShan Wei (Beijing Institute of Tracking and Telecommunications Technology), Nan Su (Beijing Institute of Tracking and Telecommunications Technology), Xiaoran Fu (Beijing Institute of Tracking and Telecommunications Technology), XiaoYun Yi (Beijing Institute of Tracking and Telecommunications Technology), and TingTing Zhang (Beijing Institute of Tracking and Telecommunications Technology)
3. Fuzz like a Pro: Auditor Knowledge-Driven Detection of Financial Vulnerabilities in Smart Contracts
Bowen CAI (University of Minnesota - Twin Cities), Weiheng BAI (University of Minnesota - Twin Cities), Youshui LU (Xi'an Jiaotong University), and Kangjie LU (University of Minnesota - Twin Cities)
4. DABS: A Distributed Attribute-based Access Control Mechanism for SD-WAN Controllers Based on Smart Contracts
Chuhang Tang (National University of Defense Technology, China), Baokang Zhao (National University of Defense Technology, China), Yingwen Chen (National University of Defense Technology, China), and Huan Zhou (National University of Defense Technology, China)
12:00-13:00 Lunch
Back to Top