Date |
Time |
Program |
2024/6/20 |
15:00 - 18:00 |
Register / Sign-inign-in |
18:00-19:00 |
Dinner |
2024/6/21 |
8:30-9:00 |
Opening |
9:00-9:50 |
Keynote
1, Speaker: Rajiv Ranjan, Newcastle University |
9:50-10:10 |
Coffee break |
10:10-11:00 |
Keynote 2, Speaker: Fenghua Li, Institute of Information Engineering, CAS |
11:00-11:50 |
Keynote 3, Speaker: Xiuzhen Cheng, Shandong University |
12:00-13:00 |
Lunch |
14:00-14:50 |
Keynote 4, Speaker: Jie Wu, Temple University |
14:50-15:40 |
Keynote
5, Speaker: Gang Qu, University of Maryland |
15:40-15:50 |
Coffee break |
15:50-16:40 |
Keynote
6, Speaker: My Thai, University of Florida |
16:40-17:30 |
Keynote
7, Speaker: Falko Dressler, TU Berlin |
18:30-20:00 |
Banquet |
|
|
|
2024/6/22 |
8:30-10:00 |
Session 1: Tackling Anomalies |
1. AUTOMATE: Automatic Anomaly Detection and Root Cause Analysis Framework for Hadoop
Xinyuan Liu (Newcastle University, United Kingdom), Devki Nandan Jha
(Newcastle University, United Kingdom), Yinhao Li (Newcastle
University, United Kingdom), Mutaz Barika (Newcastle University,
United Kingdom), Umit Demirbaga (Bartin University, Turkey), and Rajiv
Ranjan (Newcastle University, United Kingdom) |
2. FedHC: A Hierarchical Clustering Algorithm for Federated Anomaly Detection on Meta Computing
Donglin Zhang (Xidian University, China), Yulong Fu (Xidian
University, China), Dong Zhang (National Computer Network Emergency
Response Technical Team/Coordination Center of China, China), Zheng
Yan (Xidian University, China), and Hui Li (Xidian University, China) |
3. Network Vulnerability Analysis via Quantum Computing
Andrew P. Kennedy (University of Florida), Thang N. Dinh (Virginia
Commonwealth University), and My T. Thai (University of Florida) |
4.
Meta-IDS: A Multi-stage Deep Intrusion Detection System with Optimal CPU
Usage
Nadia Niknami (Temple University, US), Vahid Mahzoon (Temple
University, US), and Jie Wu (Temple University, US) |
5. Large Language Model Based Machine Learning Approach for Fake
News Detection
Pin-Chien Chen (Illinois Institute of Technology, USA), Oluwaseun T.
Ajayi (Illinois Institute of Technology, USA), and Yu Cheng (Illinois
Institute of Technology, USA) |
6. Adversarial Hidden Link Threats in Meta
Computing
Junjie Xiong (University of South Florida), Mingkui Wei (George Mason
University), Zhuo Lu (University of South Florida), and Yao Liu
(University of South Florida) |
10:00-10:30 |
Coffee break |
10:30-12:00 |
Session 2: Enhancing IoT systems |
1. A HyperLogLog-based Solution to Measuring
Sliding Window Flow Spread in High-Speed Networks
Michael Hentz (University of Kentucky, USA), Aayush Karki (University
of Kentucky, USA), and Haibo Wang (University of Kentucky, USA) |
2. Speech Dereverberation using 2D Microphone
Array
Tao Yu (Nanjing University), Chuyu Wang (Nanjing University), Lei Xie
(Nanjing University), and Sanglu Lu (Nanjing University) |
3. A Supervised Transformer-based Model for
Attributing Mobile-App-generated Synthetic Audio Artifacts
Lucky Onyekwelu-udoka (Iowa State University) and Yong Guan (Iowa
State University) |
4. An Industrial Translation Tool from
Structured Text to C Source Code for Software Services
Congfei Li (Guodian Nanjing Automation Co.,Ltd, China), Bing Han
(Guodian Nanjing Automation Co.,Ltd, China), Hua Deng (Guodian Nanjing
Automation Co.,Ltd, China), Jiwei Zhu (Guodian Nanjing Automation
Co.,Ltd, China), and Yang Wang (Guodian Nanjing Automation Co.,Ltd,
China) |
5. Physical Vibration-enabled Secure Interaction
Technology for IoT Devices
Xiangyu Xu (Southeast University), Tao Liu (Southeast University),
Jingyi Zhang (Southeast University), Minghao Cui (Southeast
University), Yixin Dong (Southeast University), and Zhen Ling
(Southeast University) |
6. Connectivity Maintenance in Adversarial
Networks with Link Uncertainty and Heterogeneity
Jianzhi Tang (Shanghai Jiao Tong University, China), Zanwei Shen
(Shanghai Jiao Tong University, China), Luoyi Fu (Shanghai Jiao Tong
University, China), Lei Zhou (Shanghai Jiao Tong University, China),
Xinbing Wang (Shanghai Jiao Tong University, China), and Chenghu Zhou
(Chinese Academy of Sciences, China) |
12:00-13:00 |
Lunch |
14:00-15:30 |
Session 3: SOK |
1. Security and Privacy in Virtual Reality:
Challenges, Trends, and Countermeasures
Jiachun Li (Shanghai Jiao Tong University, China), Yan Meng (Shanghai
Jiao Tong University, China), and Haojin Zhu (Shanghai Jiao Tong
University, China) |
2. SoK: AI-Powered Security Analysis of Smart
Contract
Shuo Yang (Southern University of Science and Technology, China),
Jianyu Niu (Southern University of Science and Technology, China), and
Yinqian Zhang (Southern University of Science and Technology, China) |
3. A Review of Motion Data Privacy in Virtual
Reality
Depeng Xu (UNC Charlotte), Weichao Wang (UNC Charlotte), and Aidong Lu
(UNC Charlotte) |
4. On Protecting the Data Privacy of Large
Language Models (LLMs): A Survey
Biwei Yan (Shandong University), Kun Li (Shandong University), Minghui
Xu (Shandong University), Yueyan Dong (Shandong University), Yue Zhang
(Drexel University), Zhaochun Ren (Leiden University), and Xiuzhen
Cheng (Shandong University) |
5. Embracing the Crowd: Robust Federated
Learning for Edge Intelligence
Dongxiao Yu (Shandong University), Zhenzhen Xie (Shandong University),
Xiao Zhang (Shandong University), Yuan Yuan (Shandong University),
Yifei Zou (Shandong University), and Xiuzhen Cheng (Shandong
University) |
6. SoK: On-Device Large Language Model
Personalization for Meta Computing
Yanting Shi (Shandong University, China), Zhenge Jia (Shandong
University, China), Zhaoyan Shen (Shandong University, China), and
Mengying Zhao (Shandong University, China) |
15:30-16:00 |
Coffee break |
16:00-17:30 |
Session 4: Enhancing Edges & Security |
1. Accumulative Fidelity Maximization of
Inference Services in DT-Assisted Edge Computing
Jing Li (City University of Hong Kong), Weifa Liang (City University
of Hong Kong), Jianping Wang (City University of Hong Kong), and
Xiaohua Jia (City University of Hong Kong) |
2. Low-Latency Layer-Aware Proactive and Passive
Container Migration in Meta Computing
Mengjie Liu (Beijing Normal University), Yihua Li (University of
Zurich), Fangyi Mou (BNU-HKBU United International College), Zhiqing
Tang (Beijing Normal University), Jiong Lou (Shanghai Jiao Tong
University), Jianxiong Guo (Beijing Normal University), and Weijia Jia
(Beijing Normal University) |
3. Optimizing Task Migration Decisions in
Vehicular Edge Computing Environments
Ziqi Zhou (TU Berlin, Germany), Youming Tao (TU Berlin, Germany), Agon
Memedi (TU Berlin, Germany), Chunghan Lee (Toyota Motor North America
R&D, USA), Seyhan Ucar (Toyota Motor North America R&D, USA), Onur
Altintas (Toyota Motor North America R&D, USA), and Falko Dressler (TU
Berlin, Germany) |
4. Policy-Based Reinforcement Learning for
Online Container Scheduling in Meta Computing
Jianqiu Wu (BNU-HKBU United International College), Jianxiong Guo
(Beijing Normal University), Zhiqing Tang (Beijing Normal University),
Tianhui Meng (Beijing Normal University), and Weijia Jia (Beijing
Normal University) |
5. Privacy Enhancement for Meta Computing via
Conjecture Pricing
Shengli Pan (Beijing University of Posts and Telecommunications),
Jinyang Zhang (Beijing University of Posts and Telecommunications),
Peng Li (The University of Aizu), and Kouichi Sakurai (Kyushu
University) |
6. Constructions of MSR Code for Optimal Node Repair in Distributed
Storage
Jian Ren (Michigan State University), Jian Li (Beijing Jiaotong
University), and Tongtong Li (Michigan State University) |
18:00-19:00 |
Dinner |
|
|
|
2024/6/23 |
8:45-10:00 |
Session 5: Improving Distributed Systems |
1. Enhancing Privacy and Efficiency of
Metacomputing Enabled Internet-of-Things Applications with Split Vertical
Federated Learning
Amani Aldahiri (RMIT University, Australia), Veronika Stephanie (RMIT
University, Australia), Ibrahim Khalil (RMIT University, Australia),
Mohammed Atiquzzaman (University of Oklahoma, USA), Xun Yi (RMIT
University, Australia), and Mohammad Saidur Rahman (RMIT University,
Australia) |
2. Decentralized Federated Learning for Meta
Computing
Kaichuang Zhang (University of Texas Rio Grande Valley, USA), Ping Xu
(University of Texas Rio Grande Valley, USA), and Zhi Tian (George
Mason University, USA) |
3. Meta Learning Based Adaptive Cooperative
Perception in Nonstationary Vehicular Networks
Kaige Qu (University of Waterloo, Canada), Zixiong Qin (Beijing
University of Posts and Telecommunications, China), and Weihua Zhuang
(University of Waterloo, Canada) |
4. Binary Code Security: the Source of
Vulnerability, Exploitation and Mitigation Techniques
Zhijian Huang (National Key Laboratory of Science and Technology on
Information System Security, China), Xiaojiao Qin (Shandong
University, China), Shuxin Sun (Shandong University, China), Long
Zhang (National Key Laboratory of Science and Technology on
Information System Security, China), Hongquan Xu (National Key
Laboratory of Science and Technology on Information System Security,
China), and Pengfei Hu (Shandong University, China)
|
5. ALSM: An Attribute-aware LSM-Tree based Key-Value Store to
Reduce I/O Amplification
Zhaoyan Shen (Shandong University), Dehao Yu (Shandong University),
Qian Wei (Shandong University), Kai Zhang (Jinan Inspur Data
Technology Co., Ltd), Liqiang Zhang (Jinan Inspur Data Technology Co.,
Ltd), Zaigui Zhang (Jinan Inspur Data Technology Co., Ltd), and
Mengying Zhao (Shandong University) |
10:00-10:30 |
Coffee break |
10:30-11:30 |
Session 6: Strengthening Blockchains |
1. Scaling Blockchain via Behavior-assessment of
Nodes for IIoT
Tianyi Xu (College of Intelligence and Computing, Tianjin University,
Tianjin 300350, China), Ziqi Gan (College of Intelligence and
Computing, Tianjin University, Tianjin 300350, China), Zhuo Liu
(College of Intelligence and Computing, Tianjin University, Tianjin
300350, China), Xiaobo Zhou (College of Intelligence and Computing,
Tianjin University, Tianjin 300350, China), and Tie Qiu (College of
Intelligence and Computing, Tianjin University, Tianjin 300350, China
and School of Computer, Qinghai Minzu University, Xining 810007,
China) |
2. A
Method for Selective Encryption Optimization Based on User Access
Frequency
Tie Hong (Beijing Institute of Tracking and Telecommunications
Technology), DiShan Wei (Beijing Institute of Tracking and
Telecommunications Technology), Nan Su (Beijing Institute of Tracking
and Telecommunications Technology), Xiaoran Fu (Beijing Institute of
Tracking and Telecommunications Technology), XiaoYun Yi (Beijing
Institute of Tracking and Telecommunications Technology), and TingTing
Zhang (Beijing Institute of Tracking and Telecommunications
Technology) |
3. Fuzz like a Pro: Auditor Knowledge-Driven Detection of
Financial Vulnerabilities in Smart Contracts
Bowen CAI (University of Minnesota - Twin Cities), Weiheng BAI
(University of Minnesota - Twin Cities), Youshui LU (Xi'an Jiaotong
University), and Kangjie LU (University of Minnesota - Twin Cities) |
4. DABS: A Distributed Attribute-based Access
Control Mechanism for SD-WAN Controllers Based on Smart Contracts
Chuhang Tang (National University of Defense Technology, China),
Baokang Zhao (National University of Defense Technology, China),
Yingwen Chen (National University of Defense Technology, China), and
Huan Zhou (National University of Defense Technology, China) |
12:00-13:00 |
Lunch |
|
|
|