WASA 2022: THE 17TH INTERNATIONAL CONFERENCE ON WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS
PROGRAM FOR SUNDAY, APRIL 9TH
Days:
previous day
all days

View: session overviewtalk overview

12:00-13:00Lunch
13:30-15:30 Session 7A: Sensing
Chair:
Yinong Li (Qingdao University, China)
Location: Room F619
13:30
Chuize Meng (Beijing Jiaotong University, China)
Shan Jiang (Beijing Jiaotong University, China)
Mengning Wu (Beijing Jiaotong University, China)
Xuan Xiao (Beijing Jiaotong University, China)
Dan Tao (Beijing Jiaotong University, China)
Ruipeng Gao (Beijing Jiaotong University, China)
BatMapper-Plus: Smartphone-based Multi-level Indoor Floor Plan Construction via Acoustic Ranging and Inertial Sensing
PRESENTER: Shan Jiang

ABSTRACT. The lack of floor plans is one of the major obstacles to ubiquitous location-based services indoors. Dedicated mobile robots with high-precision sensors can scan and produce indoor maps, but the deployment remains low. Existing smartphone-based approaches usually adopt computer vision techniques to build the 3D point cloud, at the cost of extensive image collection efforts and the risk of privacy issues. In this paper, we propose BatMapper-Plus which constructs accurate and complete indoor floor plans by acoustic ranging and inertial sensing on smartphones. It employs acoustic signals to measure the distance to a nearby wall segment, and produces the accessible area by surrounding the building during walking. It also refines the constructed floor plan to eliminate scattered segments, and identifies connection areas including stairs and elevators among different floors. Extensive experiments in a teaching building and a residential building have shown our effectiveness compared with the state-of-the-art, without any privacy concerns and environmental limitations.

13:45
Wei Wang (College of Intelligence and Computing, Tianjin University, Tianjin, China, China)
Ning Chen (College of Intelligence and Computing, Tianjin University, Tianjin, China, China)
Songwei Zhang (College of Intelligence and Computing, Tianjin University, Tianjin, China, China)
Keqiu Li (College of Intelligence and Computing, Tianjin University, Tianjin, China, China)
Tie Qiu (College of Intelligence and Computing, Tianjin University, Tianjin, China, China)
Dynamic Mode-switching-based Worker Selection for Mobile Crowd Sensing
PRESENTER: Wei Wang

ABSTRACT. Along with intelligent device popularization, mobile crowd sensing (MCS) has garnered considerable interest as a novel way of sensing data acquisition. Active and continuous worker engagement in tasks is a critical concern for sustainability when selecting workers to accomplish tasks in continuous MCS. Previous worker selection approaches are unsuitable for continuous MCS to ensure a large enough workforce. This paper proposes a framework for dynamic mode-switching-based worker selection called DMWS. DMWS lets temporary low-quality workers at tasks improve their competitiveness through hybrid mode switching based on task completion quality to ensure long-term sustainability. Therefore, they have the opportunity to be selected by the MCS platform again. The ultimate objective is to maximize space coverage at the lowest possible cost by increasing worker participation. As evidenced by experimental results on two real-world data sets, DMWS outperforms other methods in terms of space coverage under budget constraints.

14:00
Yuqing Yin (China University of Mining and Technology, China)
Xiaojie Yu (China University of Mining and Technology, China)
Shouwan Gao (China University of Mining and Technology, China)
Xu Yang (China University of Mining and Technology, China)
Pengpeng Chen (China University of Mining and Technology, China)
Qiang Niu (China University of Mining and Technology, China)
MineSOS: Long-range LoRa-based Distress Gesture Sensing for Coal Mine Rescue
PRESENTER: Yuqing Yin

ABSTRACT. Distress signal identification has great significance in saving lives in coal mine rescue. In response to the rescue in the long-distance coal mine tunnel full of dust and dangerous gas, we propose a distress gesture sensing system utilizing LoRa technology, called MineSOS. Inspired by the Morse code ``SOS'' and binary code, we first present a set of distress gestures with an error-check design, only requiring one hand movement. For signal processing, we propose a novel metric to choose the optimal LoRa attribute due to the observation of the complementary relationship between amplitude and phase variation. Finally, a double-check mechanism is presented to recognize and verify the distress information. We conducted extensive experiments to evaluate the Mine SOS's performance, and the results show that it can achieve high accuracy for gesture recognition in a coal mine lab. MineSOS system also has the capability of long-range and though-obstacle sensing, which is believed to benefit emergency coal mine rescue.

14:15
Xiaochao Dang (College of Computer Science and Engineering, Northwest Normal University, China)
Yanhong Bai (College of Computer Science and Engineering, Northwest Normal University, China)
Daiyang Zhang (College of Computer Science and Engineering, Northwest Normal University, China)
Gaoyuan Liu (College of Computer Science and Engineering, Northwest Normal University, China)
Zhanjun Hao (College of Computer Science and Engineering, Northwest Normal University, China)
Wi-KF: A rehabilitation motion recognition in commercial wireless devices
PRESENTER: Yanhong Bai

ABSTRACT. Wireless sensing is increasingly used in the field of medical rehabilitation because of its advantages of low cost, non-contact and wide coverage. In the rehabilitation of patients, the recovery after upper limb injury is great significant. Nonstandard rehabilitation motions will cause secondary injury to the body. Therefore, how to achieve standardized rehabilitation motions at a low cost in the home environment has become an urgent problem to be solved. In order to settle it, a rehabilitation motion recognition method Wi-KF based on Wi-Fi signal is designed. First, we propose a data segmentation and counting Peak method, which can accurately segment a continuous motion into multiple single motions, and lays a foundation for feature extraction algorithm. The motion segmented by the Peak method is converted into Doppler feature image. Then Bag of Convolutional Feature (BoCF) algorithm is used to extract features and overcomes the difference of image size. Finally, the extracted features are input into Extreme Learning Machine (ELM) algorithm for classification. The Wi-KF method has extensively and fully verified in two real environments. The experimental results show that the average motion recognition rate of Wi-KF method is about 94.9%, hence the method has strong robustness. In sum, the method proposed in the paper provides a low-cost solution for standardizing the rehabilitation motions of patients.

14:30
Xuan Wang (Nangjing University, China)
Kai Xun (Nangjing University, China)
Xingyu Chen (Nanjing University, China)
Xia Wang (Jinling Institute of Technology, China)
Jia Liu (Nanjing University, China)
Zhihong Zhao (Nanjing University, China)
RF-Line: RFID-based Line Crossing Detection
PRESENTER: Xingyu Chen

ABSTRACT. Line crossing detection is to check whether people or objects go across a given barrier line, which is quite common and important in our daily life, such as the EAS checkpoint in a retail store or the finish line in track and field. Although existing solutions to line crossing detection have achieved great advancement, they do not function well when multiple objects or people cross the line at the same time. In this paper, we propose a new RFID-based solution called RF-Line to line crossing detection, especially for multi-object scenarios. The biggest challenge is that the RFID reader's coverage zone is invisible and irregular; we cannot roughly take the time when a tag is seen by the reader for the first time as the time when line crossing occurs. In RF-Line, we deploy two antennas opposite to each other and collect the RF phase profiles of two antennas at the same time. By a series of geometric transformations and mathematical derivations, we find that summing up the two phase profiles will get a new phase curve, in which the inflection point of the curve is the time of line crossing. In addition, we address the problem of turning back or long stay on the barrier line. We implement RF-Line with commodity RFID systems. Extensive experiments show that RF-Line can achieve accurate line crossing detection with a small error of 6.1 cm, with no need for any system calibration or complicated deployment.

14:45
Hao Yu (School of Computer and Information, Hefei University of Technology, China)
Chong Zhao (Engineering Quality Education Center of Undergraduate School, Hefei University of Technology, China)
Xing Wei (School of Computer and Information, Hefei University of Technology, China)
Yan Zhai (School of Computer and Information, Hefei University of Technology, China)
Zhen Chen (School of Computer Science and Technology, Anhui University, China)
Guangling Sun (School of Electronic and Information Engineering, Anhui Jianzhu University, China)
Yang Lu (School of Computer and Information, Hefei University of Technology, China)
Posture and Appearance Fusion Network for Driver Distraction Recognition
PRESENTER: Hao Yu

ABSTRACT. Distracted driving is the act of driving while engaged in other activities, such as using a cell phone, texting, eating, or reading, which takes the driver' attention away from the road. Nowadays, the distracted driving detection models based on deep learning can extract critical information from video data to characterize the driving behavior process. But the distraction driving method based solely on appearance features cannot essentially eliminate the noise impact of the complex environment on the model, and the distracted driving recognition method based solely on skeletal information is unable to recognize the joint action of the human body and the objects. Therefore,the development of an accurate distracted driving detection model has become challenging. In this paper, we propose a distracted driving recognition model MFD-former based on the fusion of posture and appearance. First, a feature extraction module is proposed to extract skeleton data(i.e., posture) and appearance features(i.e., descriptors), which are merged by a graph neural network. Then, the two kinds of information are input into the MFD-former encoder module, and the self-attention mechanism quickly extracts the sparse data. Finally, the classification results of distracted driving are obtained by extracting the classification labels through the MLP Head. The MFD-former model outperforms existing models. It achieved 95.1% accuracy on the State Farm dataset and 90.24% accuracy on the self-built Train Drivers dataset.

15:00
Zhanjun Hao (Northwest Normal University School, China)
Yuejiao Wang (Northwest Normal University School, China)
Daiyang Zhang (Northwest Normal University School, China)
Xiaochao Dang (Northwest Normal University School, China)
UltrasonicG: Highly Robust Gesture Recognition on Ulrasonic Devices
PRESENTER: Yuejiao Wang

ABSTRACT. In the current critical situation of novel coronavirus, the use of contactless gesture recognition method can reduce human contact and decrease the probability of virus transmission. In this context, ultrasound-based sensing has been widely concerned for its slow propagation speed, low sampling rate, and easy access to devices. However, limited by the complexity of ges-tural movements and insufficient training data, the accuracy and robustness of gesture recognition are low. To solve this problem, we propose Ultrason-icG, a system for highly robust gesture recognition on ultrasonic devices. The system first converts a single audio signal into a Doppler shift and subse-quently extracts the feature values using the Residual Neural Network (Res-Net34) and uses Bi-directional Long Short-Term Memory (Bi-LSTM) for ges-ture recognition. The method effectively improves the accuracy of gesture recognition by combining the information of feature dimension with time dimension. To overcome the challenge of insufficient dataset, we use data extension to expand the dataset. We have conducted extensive experiments and evaluations on UltrasonicG in a variety of real scenarios. The experi-mental results show that UltrasonicG can recognize 15 kinds of gestures with a recognition distance of 0.5 meters. And it has a high accuracy and robust-ness with a comprehensive recognition rate of 98.8% under different envi-ronments and influencing factors.

13:30-15:30 Session 7B: Security and Privacy III
Chair:
Yongrui Cui (Dalian Minzu University, China)
Location: Room F620
13:30
Ruizhong Du (Hebei University, China)
Lin Zhen (Hebei University, China)
Yan Liu (Future University Hakodate, Japan)
Authentication Mechanism based on Physical Layer Security in Industrial Wireless Sensor Networks
PRESENTER: Lin Zhen

ABSTRACT. When wireless network technology is applied to industrial scenes, the open channel environment makes industrial equipment more vulnerable to attacks and threats from illegal nodes, such as eavesdropping, deception and identity information forgery. The complexity and variety of attack methods make the supervised machine learning algorithm insufficient to establish a low complexity, lightweight and high security authentication mechanism in industrial wireless sensor networks. Moreover, the wireless electromagnetic wave will be affected by additive noise and fading in the propagation process, making the wireless channel in a dynamic state. Based on this, we study a new authentication mechanism based on physical layer security for wireless sensor networks in dynamic industrial scenarios. Using more precise physical layer channel information, and building an authentication model around positive-unlabeled (PU) learning and bootstrap aggregating (bagging) strategy, we can accurately distinguish legal nodes and illegal nodes in the received channel information in the industrial scene where only the channel information of legal nodes is known. Finally, the effectiveness of the scheme is verified by using the public data set collected by the national institute of standards and technology (NIST) in a real industrial scene.

13:45
Yan Wang (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China, China)
Xiaowei Hou (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China, China)
Xiu Ma (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China, China)
Lv Qiujian (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China, China)
A Software Security Entity Relationships Prediction Framework Based on Knowledge Graph Embedding Using Sentence-Bert
PRESENTER: Xiaowei Hou

ABSTRACT. A large number of software vulnerabilities and weaknesses existing on the internet result in huge attacks. For spreading knowledge and strengthening defense of software security, researchers record software vulnerabilities, weaknesses and attack patterns through software databases including CVE, CWE, CAPEC and so on. However, software security databases are time-delayed and thus miss unobserved facts. Attackers can take advantage of this problem to execute an attack successfully. Therefore, reasoning task of predicting software security entity relation is critical to supplement software security data. In this paper, we construct a software security knowledge graph and propose a knowledge graph representation learning method combining Sentence-Bert and GAT. The method can implement link prediction and classification tasks for the purpose of knowledge graph completion. We finally design a large number of experiments to evaluate the effectiveness of our model in knowledge graph completion and knowledge graph classification. The experimental results demonstrate that the proposed method can effectively improve the effectiveness of prediction.

14:00
Chen Gu (Hefei University of Technology, China)
Xuande Cui (Hefei University of Technology, China)
Donghui Hu (Hefei University of Technology, China)
An Efficient Privacy-preserving Scheme for Traffic Monitoring Services in Vehicular Networks
PRESENTER: Xuande Cui

ABSTRACT. Traffic monitoring services show great potential for improving the traffic efficiency in vehicular networks. Drivers can obtain the latest information on their upcoming routes by sending location-based queries to the traffic monitoring server. However, it is inefficient to query all events on the route due to the timeliness of traffic events. Besides, sending location-based queries will expose drivers’ privacy. Existing research does not consider both issues under the traffic monitoring scenario. In this paper, we propose an efficient privacy-preserving scheme that ensures privacy is protected in two dimensions. The scheme first segments the whole route into multiple ones. Then drivers send endpoints in each segmented route to satisfy the timeliness requirement. Both location privacy and identity privacy are preserved in every segmented route, such that attackers cannot observe the real location as well as the identity via continuous queries. Specifically, we propose a location obfuscation mechanism based on geo-indistinguishability, and utilize it on every segmented route. We address an issue in geo-indistinguishability where the obfuscated location is unreasonable. Additionally, continuous queries may expose the driver’s identity. We thus define a type of attack called identity linking attack, and propose two possible solutions. We finally conduct experiments on the real dataset. Experimental results demonstrate the efficiency of our proposed scheme.

14:15
Yueqing Wu (Shandong University, China)
Fu Hao (UC Davis, United States)
Guoming Zhang (Shandong University, China)
Bin Zhao (Shandong University, China)
Minghui Xu (Shandong University, China)
Yifei Zou (Shandong University, China)
Xiaotao Feng (JD.com American Technologies Corporation, United States)
Pengfei Hu (Shandong University, China)
TraceDroid : Detecting Android Malware by Trace of Privacy Leakage
PRESENTER: Yueqing Wu

ABSTRACT. Along with the popularity of the Android operating system, 98% of mobile malware targets Android devices [1], which has become one of the primary source for privacy leakage. Detecting malicious network transmissions in these apps is challenging because the malware hides its behavior and masquerades as benign software to evade detection. In this work, we propose TraceDroid, a framework that can automatically trace abnormally sensitive network transmissions to detect the malware. By leveraging the static and dynamic analysis, the sensitive informations can be firstly inferred from the call graph, and then, the sensitive trans- missions can be detected by analyzing the network traffic per transfer and sensitive information with a machine learning classifier. We validate TraceDroid on 1444 malware and 700 benign applications. And our ex- periments show that TraceDroid can detect 3433 sensitive connections across 2144 apps with an accuracy of 94%.

14:30
Fengyuan Qiu (Nanjing University of Aeronautics and Astronautics, China)
Lu Zhou (Nanjing University of Aeronautics and Astronautics, China)
Privacy Preserving Federated Learning using CKKS Homomorphic Encryption
PRESENTER: Fengyuan Qiu

ABSTRACT. With the rapid development of distributed machine learning and Internet of things, tons of distributed data created by devices are used for model training and what comes along is the concern of security and privacy. Traditional method of distributed machine learning asks devices to upload their raw data to a server, which may cause the privacy leakage. Federated learning mitigates this problem by sharing each devices’ model parameters only. However, it still has the risk of privacy leakage due to the weak security of model parameters. In this paper, we propose a scheme called privacy enhanced federated averaging (PEFedAvg) to enhance the security of model parameters. By the way, our scheme achieves the same training effect as Fedavg do at the cost of extra but acceptable time and has better performances on communication and computation cost compared with Paillier based federated averaging. The scheme uses the CKKS homomorphic encryption to encrypt the model parameters, provided by detailed scheme design and security analysis. To verify the effectiveness of the proposed algorithm, extensive experiments are conducted in two real-life datasets, and shows the advantages on aspects of communication and computation. Finally, we discuss the feasibility of deployment on IoT devices.

14:45
Chengxin Xu (Qufu Normal University, China)
Wenshuo Ma (Qingdao Vocational and Technical College of Hotel Management, China)
Xiaowu Liu (Qufu Normal University, China)
An Effective Comprehensive Trust Evaluation Model in WSNs
PRESENTER: Chengxin Xu

ABSTRACT. Wireless Sensor Networks (WSNs) are vulnerable to many security threats from compromised nodes. Trust management system is an effective method to detect the malicious behaviors launched by these compromised nodes in WSNs. In this paper, an effective Comprehensive Trust Evaluation Model (CTEM) for WSNs is proposed and two kinds of trusts are considered, the direct trust and the indirect trust. The direct trust is assessed by monitoring the data collection, the energy consumption and the data forwarding of node. More significantly, the entropy theory is introduced to measure the uncertainty of direct trust. The indirect trust is integrated to evaluate a comprehensive trust when the uncertainty of direct trust is high enough so as to improve the one-sidedness of direct trust. CTEM can not only reduce the computation overhead of node but also prolong the lifetime of network. Simulation results show that the proposed strategy can defend against internal attacks and have better performances compared with some typical trust evaluation mechanisms.

15:00
Xuxiang Jiang (School of Computer Science and Technology, East China Normal University, China)
Yinhao Xiao (School of Information Science, Guangdong University of Finance & Economics, China)
Jun Wang (School of Computer Science and Technology, East China Normal University, China)
Wei Zhang (School of Computer Science and Technology, East China Normal University, China)
Multi-View Pre-Trained Model for Code Vulnerability Identification
PRESENTER: Xuxiang Jiang

ABSTRACT. Vulnerability identification is crucial for cyber security in the software-related industry. Early identification methods require significant manual efforts in crafting features or annotating vulnerable code. Although the recent pre-trained models alleviate this issue, they overlook the multiple rich structural information contained in the code itself. In this paper, we propose a novel Multi-View Pre-Trained Model (MV-PTM) that encodes both sequential and multi-type structural information of the source code and uses contrastive learning to enhance code representations. The experiments conducted on two public datasets demonstrate the superiority of MV-PTM. In particular, MV-PTM improves GraphCodeBERT by 3.36\% on average in terms of F1 score.

13:30-15:30 Session 7C: Application I
Chair:
Lei Shu (Nanjing Agricultural University, China)
Location: Room F621
13:30
Juan Xu (Nanjing University of Aeronautics and Astronautics, China)
Jiabin Yuan (Nanjing University of Aeronautics and Astronautics, China)
Dan Li (Nanjing University of Aeronautics and Astronautics, China)
Yuqian Zhou (Nanjing University of Aeronautics and Astronautics, China)
Yunguang Han (Nanjing University of Aeronautics and Astronautics, China)
Hua Yang (Nanjing University of Aeronautics and Astronautics, China)
Zhengye Zhang (Nanjing University of Aeronautics and Astronautics, China)
Selection of Two-level Unitary Operations in Quantum Secret Sharing Protocols Based on Single Qubits
PRESENTER: Juan Xu

ABSTRACT. Quantum secret sharing (QSS) splits and distributes a secret among N sharers based on quantum resources and quantum properties. While QSS protocols often use shared entangled states, it is also possible to define a notion of QSS based on single states, that is qubits when taking two-level quantum system into account. In such circumstance, local two-level unitary operations are always served to embed secret information and scramble the quantum states so that the secret cannot (easily) be achieved. Can any unitary operations guarantee the security of the protocols? We propose Bell state attack for such protocols, and give the simplified formula of minimum failure probability of such an attack. Thus the quantitative security analysis of different unitary-operation sets is presented under Bell state attack. Finally, some important conclusions about how to select unitary operation are obtained, which are crucial rules in designing and implementing quantum secret sharing protocols based on single qubits. The method and results may also contribute to analyze the security of other multi-party quantum cryptography schemes based on unitary operations.

13:45
Jie Liu (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China, China)
Jinfa Wang (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China, China)
Peipei Liu (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China, China)
Hongsong Zhu (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China, China)
Limin Sun (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China, China)
Discover the ICS landmarks based on multi-stage clue mining
PRESENTER: Jie Liu

ABSTRACT. In recent years, the rapidly increasing landscape of industrial control systems (ICS) devices has made the ICS geolocation more important. However, IP-based geolocation cannot provide high accuracy geographical locations for ICS devices. Commercial databases only provide coarse mappings between IP hosts and physical locations. Measured-based geolocation relies on the number of high-quality landmarks. In this paper, we present a novel framework called OSI-Geo for serving high-quality landmarks mining of ICS devices. The main idea is that there are many location-indicating clues in the open-source information exposed by ICS devices, which can be utilized to find their physical locations. The OSI-Geo automatically collects location-indicating clues to generate ICS landmarks at large-scale. We conduct real-world experiments for validating the effectiveness and performance of our method. The results show that OSI-Geo can accurately collect clues with over 99% recall and precision. Based on those clues, 36,872 stable landmarks, covering 162 countries and 5,596 cities, are obtained. Among them, there are 30,290 (82%) fine-grained landmarks accurate to street-level at least. The accuracy of IP geolocation has been improved significantly based on the ICS landmarks. Thus, OSI-Geo achieves effectively landmarks mining for ICS devices.

14:00
Xiuli Liu (Dalian University, China)
Wanshu Fan (Dalian University, China)
Dongsheng Zhou (Dalian University, China)
Skin Lesion Segmentation via Intensive Atrous Spatial Transformer
PRESENTER: Xiuli Liu

ABSTRACT. Skin melanoma is one of the most malignant tumors. In recent years, its incidence rate and mortality showed a high growth trend. Early detection and segmentation of skin lesions are vital in timely diagnosis and treatment. As the low contrast of lesion regions and high similarity in terms of appearance, skin lesion segmentation still remains a challenging work. Most of the segmentation methods use single-scale feature fusion, leading to the blur effect on the boundary. In this paper, we propose a new segmentation framework named Intensive Atrous Spatial Transformer Network (IASTrans-Net), which is based on a core module IASPP (Intensive Atrous Spatial Pyramid Pooling). The introduced IASPP can obtain valid features by using multi-scale feature fusion and channel attention. On the one hand, we employ atrous convolution with different dilation rates for multi-scale information extraction, ensuring that the effective information of each channel is obtained. On the other hand, channel attention is used to screen features, which can enable the network to effectively identify targets without increasing the training complexity. The experimental results show that the prposed IASTrans-Net has achieved good results in ISIC2017 and ISIC2018 datasets, surpassing most of the current mainstream methods.

14:15
Kehan Zhang (Changchun University of Science and Technology, China)
Xiaoqiang Di (Changchun University of Science and Technology, China)
Xu Liu (Changchun University of Science and Technology, China)
Bo Li (Changchun University of Science and Technology, China)
Luyue Fang (Changchun University of Science and Technology, China)
Yiping Qin (Changchun University of Science and Technology, China)
Jinhui Cao (Changchun University of Science and Technology, China)
LogLR: A Log Anomaly Detection Method Based on Logical Reasoning
PRESENTER: Kehan Zhang

ABSTRACT. Logs are widespread in large and complex software-intensive systems. Log-based anomaly detection is used for system diagnosis and troubleshooting. Existing methods extract log sequences as temporal log vectors, preserving the timing information between logs. However, they lack a reasoning mechanism, which prevents the model from mining the logical relationship between logs and loses the logical association between logs. In this paper, we propose LogLR, a log anomaly detection method based on logical reasoning. LogLR extracts the logical relationship between temporal log vectors and improves detection accuracy by combining Logical Tensor Network (LTN) with LSTM. In order to overcome the problem of ignoring the logical relationship between logs in existing statistical methods for data annotation. LogLR uses LTN to capture the logical relationship between log sequences and obtains weak labels to train an LSTM model through the weak label estimation method, which saves time costs. We evaluate LogLR on two widely used public datasets and the results demonstrate the effectiveness of LogLR.

14:30
Yu Zhao (Science and Technology on Information Systems Engineering Laboratory, National University of Defense Technology, China)
Songping Huang (Science and Technology on Information Systems Engineering Laboratory, National University of Defense Technology, China)
Zhaoyun Ding (Science and Technology on Information Systems Engineering Laboratory, National University of Defense Technology, China)
Fei Wang (Science and Technology on Information Systems Engineering Laboratory, National University of Defense Technology, China)
CNsum:Automatic summarization for Chinese news texts
PRESENTER: Yu Zhao

ABSTRACT. In the era of big data, it has become our research goal to obtain valuable information from massive data simply and efficiently. Text summarization technology has been continuously developed to meet this demand. Recent work has also shown that transformer-based pretrained language models have achieved great success on various tasks in NLP. Aiming at the problem of Chinese news text summary generation and the application of Transformer structure to Chinese text data, this paper proposes a Chinese news headline generation model CNsum based on Transformer structure, and tests it on Chinese data sets such as NLPCC2017 and LCSTS. The experimental results show that CNsum achieves better ROUGE, BLEU and BERTScore scores than the baseline models, which verify the great performance of CNsum.

14:45
Deqing Wang (Xiamen University, China)
Minghang You (Xiamen University, China)
Weikai Xu (Xiamen University, China)
Lin Wang (Xiamen University, China)
Subcarrier Index Modulation Aided Non-Coherent Chaotic Communication System for Underwater Acoustic Communications
PRESENTER: Weikai Xu

ABSTRACT. In this paper, a subcarrier index modulation aided code-shifted differential chaos shift keying (SIM-CS-DCSK) system based on orthogonal frequency division multiplexing (OFDM) is proposed. In the proposed system, the transmitted bits are divided into two parts, where one part is used for conventional CS-DCSK modulation and the other part, served as subcarrier mapping bits, is used for the subcarrier index modulation. Benefiting from index modulation, SIM-CS-DCSK can achieve higher data rate and lower peak-to-average power ratio (PAPR) compared to conventional multicarrier CS-DCSK system. Numerical simulations indicate that SIM-CS-DCSK has good BER performance over the time and frequency selective fading channels. Specifically, the proposed system outperforms the multicarrier spread-spectrum system (MCSS) by 0.5 dB to 2 dB. Real-field experiments in water pool and lake also confirm the superiority of the proposed system.

15:00
Jing Zhang (Institute of Information Engineering, Chinese Academy of Science, Beijing, China, China)
Zhixin Shi (Institute of Information Engineering, Chinese Academy of Science, Beijing, China, China)
Hao Wu (Institute of Information Engineering, Chinese Academy of Science, Beijing, China, China)
Mengyan Xing (Institute of Information Engineering, Chinese Academy of Science, Beijing, China, China)
A Novel Self-supervised Few-shot Network Intrusion Detection Method

ABSTRACT. Supervised models for network intrusion detection usually rely on many training samples, but the annotation costs are very high. Unlabeled network traffic data is relatively easy to obtain. However, there are only a few methods to utilize these unlabeled data adequately. We propose a novel self-supervised few-shot network intrusion detection method to address the above problems. The method consists of two models: a) network traffic representation model and b) network intrusion detection model. First, the network traffic representation model uses unlabeled network traffic data through self-supervised learning to obtain network traffic representations, which will benefit the training of network intrusion detection model. Then, the shared layers of the network traffic representation model are transferred to the network intrusion detection model and frozen. Finally, a few training samples are used to fine-tune the network intrusion detection model, and we can obtain a model with good generalization. However, self-supervised learning of the network traffic representation model requires a method for generating labels from network traffic. Therefore, we propose a novel method to generate labels based on discrete features of network traffic. Experiments show that our proposed method has better performance than other network intrusion detection models with few-shot. On NSL-KDD, only 200 labeled samples are needed to achieve 95.2% accuracy.

13:30-15:30 Session 7D: Algorithm
Chair:
Weifeng Sun (Dalian University of Technology, China)
Location: Room F622
13:30
Zhaohua Qiu (Institute of Information Engineering, China)
Wen Wang (Institute of Information Engineering, China)
Dong Wei (Institute of Information Engineering, China)
A Monte Carlo Algorithm Based on Stochastic Geometry for Simulating Satellite Systems Interference
PRESENTER: Zhaohua Qiu

ABSTRACT. Providing truly ubiquitous Internet connectivity requires development of massive satellite constellations, whose interference scenario changes dynamically in time and space, leading to interference analysis becomes more complicated and challenging. Conventional interference analysis is restricted to few number of satellites with deterministic locations which is not capable of evaluating the performance of a massive satellite network consisting of thousands of satellites. In this paper, we propose a Monte Carlo algorithm based on stochastic geometry for simulating massive satellite systems interference. In our algorithm, we first utilize stochastic geometry to model the satellites’ and earth stations’ location as a randomly distributed points process on a sphere, imitating the high spatiotemporal dynamic interference characteristics of the scenario. Then, Monte Carlo is used to randomly sample the interference scenario in an infinite continuous timeline. According to Monte Carlo simulation, we finally calculate the cumulative probability distribution of interference indicator, which can be used as the statistical result of long-term interference of massive satellite constellations.

13:45
Bixun Zhang (Hefei University of Technology, China)
Xu Ding (Hefei University of Technology, China)
Hang Zheng (Hefei University of Technology, China)
Xiang Zheng (Hefei University of Technology, China)
Pengfei Xu (Hefei University of Technology, China)
The Link Awareness Driven Resource Allocation Algorithm based on Scenario Marking and Vehicle Clustering in VANETs
PRESENTER: Bixun Zhang

ABSTRACT. In this paper, we investigate the channel resource allocation problem in device-to-device(D2D) based VANETs. According to the vehicle density, we first mark the urban transportation scenario into intensive and sparse areas, in which we categorize the communication links as "altruistic" and "ego" links respectively in the consequence of marking results and vehicle attributes. Secondly, the altruistic links are further grouped in terms of an improved spectral clustering algorithm proposed hereby. Moreover, channel resources are dedicated to ego links and different clusters of altruistic links in order to alleviate communication interference and achieve better performance. We formulate an optimization problem of power control for channel resource allocation to maximize the total channel throughput. Fortunately, after reshaping the original problem into a D.C (difference of two convex functions) problem, which can be solved by interior point method, the optimal power allocation method is yeilded. Intensive simulations are carried out across various configurations, and the results prove that our scheme has superior performance.

14:00
Chao-Hsien Hsieh (Qufu Normal University, China)
Yubo Song (Qufu Normal University, China)
Changfeng Li (Qufu Normal University, China)
Zhen Wang (Qufu Normal University, China)
An Adaptive BSCO Algorithm of Solid Color Optimization for 3D Reconstruction System with PIFuHD
PRESENTER: Chao-Hsien Hsieh

ABSTRACT. PIFuHD can generate high-resolution model in the process of human 3D reconstruction. However, PIFuHD will produce debris outside the human body when the image background is more complex. In order to solve this problem, this paper develops an adaptive BSCO algorithm for the background of human body and image of human body in 3D reconstruction system. The BSCO algorithm is divided into four steps in processing. First, BSCO algorithm uses Go-selfies to separate the background. Second, BSCO algorithm converges the RGB of all pixels of the character into a set. Third, BSCO algorithm finds the greatest difference from the set through HSV conversion. Fourth, BSCO algorithm weighs the set and then calculates the RGB score. To find the highest score of RGB, it is used as the RGB of the background after solid color optimization. The experimental results show that the proposed method improves the reconstruction effect of PIFuHD.

14:15
Chao Li (Department of Electrical and Computer Engineering of Univeristy of Waterloo, Canada)
Fangzheng Huang (Department of Electrical and Computer Engineering of Univeristy of Waterloo, Canada)
Zhaoxian Yang (Univeristy of Electronic Science and Technology of China, China)
Zhou Wang (Department of Electrical and Computer Engineering of Univeristy of Waterloo, Canada)
Dayan Ban (Department of Electrical and Computer Engineering of Univeristy of Waterloo, Canada)
Target detection algorithm based on feature optimization and sample equalization
PRESENTER: Chao Li

ABSTRACT. In the field of intelligent security, due to the negative effect of complicated influence factors, such as low video quality, different size of the target and occlusion, target detection is hard to be well-applicated in real life. Based on the above problems, this paper proposes a multi-layer feature cascade aggregation pyramid network (MCA-FPN) on the basis of Faster RCNN, which can fully combine the different level of semantic information to generate optimized feature maps and improve the expression ability of different size of features finally. Besides, to remove the negative effect from the imbalance distribution of samples, this paper discusses a new sample balanced weighted loss function SB-Loss to increase convergence speed and make the training process more efficiency. Finally, the method proposed by this paper has been experimented on the Pascal VOC dataset, with a maximum accuracy of 86.0%, which is highly competitive in this research area.

14:30
Wang Peng (The 54th Research Institute of China Electronics Technology Group Corporation, China)
Zhang Junyi (Hebei Key Laboratory of Electromagnetic Spectrum Cognition and Control, China)
Zheng Yuqi (Beijing University Of Posts And Telecommunications, China)
Li Xiaohu (Beijing University Of Posts And Telecommunications, China)
Li Yixin (Beijing University Of Posts And Telecommunications, China)
Kalman Filter Algorithm Based on Sheep Herding Optimization
PRESENTER: Zheng Yuqi

ABSTRACT. When dealing with the real track, the environment is often an unpredictable factor, so filtering is very important. We can use the filter to eliminate the influence of noise as much as possible. Kalman filter is one of them. In this work, we pro-posed a new Particle Swarm Optimization algorithm, called the Sheep Herding Optimization algori thm, which can obtain higher quality solutions with faster convergence speed and better stability. Besides, in order to improve the perfor-mance of Kalman filter, we apply the Sheep Herding Optimization algorithm to the filter. The improved Kalman filter can fuse and predict the track, and has higher computational performance and smaller error.

14:45
Haowei Wang (Changchun University of Science and Technology, China)
Rui Xu (Changchun University of Science and Technology, China)
Xiaoqiang Di (Changchun University of Science and Technology, China)
Jing Chen (Changchun University of Science and Technology, China)
Dejun Zhu (Changchun University of Science and Technology, China)
Juping Sun (Changchun University of Science and Technology, China)
Yuchen Zhu (Changchun University of Science and Technology, China)
A Caching Strategy Based on Spreading Influence in Information-Centric Satellite Networks
PRESENTER: Haowei Wang

ABSTRACT. Low-Earth-Orbit (LEO) satellite networks can transmit data globally, but their time-varying nature makes data transmission delayed and inefficient. An important feature of ICN (Information-Centric Network) is in-network caching, which is helpful to increase transmission efficiency. To reduce the time-varying effect on data transmission and to improve transmission efficiency among satellites, this paper introduces ICN into LEO satellite networks and proposes a Caching Strategy based on Spreading Influence (CSSI) for satellite networks. Our strategy portrays satellite nodes and popular contents in terms of spreading influence, and caches popular contents with dynamic probability in satellite nodes with high global spreading influence in the period to obtain a better caching effect. Compared with LCE, LCD, Prob, and Betw strategies, the CSSI effectively improves the cache hit ratio and reduces the average content request delay.

15:00
Jinxin Yu (Nanjing University of Aeronautics and Astronautics, China, China)
Changyan Yi (Nanjing University of Aeronautics and Astronautics, China, China)
Tong Zhang (Nanjing University of Aeronautics and Astronautics, China, China)
Fang Zhu (Nanjing University of Aeronautics and Astronautics, China, China)
Jun Cai (Concordia University, Montréal, QC, H3G 1M8, Canada, Canada)
A Time Utility Function Driven Scheduling Scheme for Managing Mixed-Criticality Traffic in TSN
PRESENTER: Jinxin Yu

ABSTRACT. With the development of the industrial Internet, IEEE Time-Sensitive Networking (TSN) has attracted more and more attentions due to its capability of providing deterministic network performance. Unlike most existing studies that only considered a single type of traffic, our work addresses the scheduling problem of mixed-criticality traffic in TSN. Time utility function (TUF) is a utility curve that measures the quality of service (QoS) of streams with respect to end-to-end delays. In this paper, we introduce a variety of TUFs for different streams in TSN according to specific timing requirements. To match the transmission protocol of TSN, we first categorize mixed-criticality traffic into periodic and aperiodic streams, and then design a novel scheduling scheme aiming to maximize the total TUF value of all streams. We compare our proposed scheme with two benchmark schemes, and evaluation results show that our proposed one outperforms the counterparts, especially under the worst-case network settings.

13:30-15:30 Session 7E: Artificial Intelligence III
Chair:
Lei Wang (Peking University, China)
Location: Room F625
13:30
Chen Fang (Hefei University of Technology, China)
Lei Shi (Hefei University of Technology, China)
Yi Shi (Virginia Tech, Dept. of ECE, Blacksburg, United States)
Jing Xu (Hefei University of Technology, China)
Xu Ding (Hefei University of Technology, China)
Synchronous Federated Learning Latency Optimization based on Model Splitting
PRESENTER: Chen Fang

ABSTRACT. Federated Learning (FL) is a distributed machine learning approach which is suitable for edge computing environment. While in this environment, how to take full advantage of the computing resources on end devices and edge servers is still a difficult problem. Especially for the synchronous federated learning, computing resources among different participants will lead to extra time cost and cause resource waste. In this paper, we try to reduce the time cost and the computing resource waste by using model splitting and task scheduling. We first establish the mathematical model and find it can not be solved directly. Then we design our algorithm which we name as the Federated Learning Offloading Acceleration (FLOA) algorithm to obtain a sub-optimal solution. The FLOA algorithm first uses the Partition Points Selection method to reduce the size of the solution space, then proposes a task offloading method based on matching theory. Experiments and simulations show that compared to the other three calculation methods, the single iteration time is reduced by 47%, 28%, 14% under our algorithm in turn.

13:45
Yuchen Wu (Tianjin University, China)
Yao Liu (Tianjin University, China, China)
Zhao Zhao (Tianjin University, China)
Chunfeng Liu (Tianjin University, China, China)
Wenyu Qu (Tianjin University, China)
TSV-MAC: Time Slot Variable MAC Protocol Based on Deep Reinforcement Learning for UASNs

ABSTRACT. With the increasing variety and number of ocean applications, the underwater transmission of heterogeneous ocean data has become a hot spot in the research field of underwater acoustic sensor networks (UASNs). However, due to lack of flexibility in time slot allocation, the existing multiple access control (MAC) protocols for UASNs cannot be effectively applied to the transmission of heterogeneous ocean data and is prone to low time slot utilization and low throughput problems. Therefore, in order to solve the above problems in UASNs with heterogeneous ocean data, we propose a time slot variable MAC protocol (TSV-MAC) based on deep reinforcement learning. In TSV-MAC, the long short term memory (LSTM) deep learning model is constructed and is trained by considering the usage efficiency of time slots and the data collection condition of underwater nodes. Then, the trained LSTM model is applied to predict the generation and transmission of data from each underwater node and a Q-learning model is adopted to allocate a suitable number of time slots to underwater nodes in advance. The TSV-MAC protocol periodically updates the time slot allocation table, to enable UASNs to adapt the different data packets that are dynamically generated. Finally, the effectiveness of the protocol is verified by extensive simulation results.

14:00
Jingjing Zhang (Heilongjiang University, China)
Zhaogong Zhang (Heilongjiang University, China)
Xin Xu (Heilongjiang University, China)
Constrained Graph Convolution Networks Based on Graph Enhancement for Collaborative Filtering
PRESENTER: Jingjing Zhang

ABSTRACT. Graph Convolutional Networks (GCNs) have gained much attention and have achieved excellent performance in many graph-based collaborative filtering (CF) tasks in recent years. Its success relies on a fundamental assumption that the original graph structure is reliable and consistent with the properties of GNNs. However, most original graphs can seriously impair model performance due to noise and data sparsity problems. In addition, for large user-item graphs, the explicit message passing in traditional GCNs slows down the convergence speed during training and weakens the training efficiency of the model. Based on this, we propose Constrained Graph Convolution Networks Based on Graph Enhancement for Collaborative Filtering (EL-GCCF). The graph initialization learning module integrates the structural and feature information in the graph by generating two graph structures. It enhances the original graph and effectively mitigates the noise problem. Second, the multi-task constrained graph convolution skips explicit message passing. It effectively mitigates the over-smoothing problem in training and improves the training efficiency of the model by using an auxiliary sampling strategy. Experimental results on two real datasets show that the EL-GCCF model outperforms many mainstream models and has higher training efficiency.

14:15
Xing Wei (School of Computer and Information, Hefei University of Technology, China)
Shang Yao (School of Computer and Information, Hefei University of Technology, China)
Chong Zhao (Engineering Quality Education Center of Undergraduate School, Hefei University of Technology, China)
Di Hu (Intelligent Manufacturing Technology Research Institute of Hefei University of Technology, China)
Hui Luo (Intelligent Manufacturing Technology Research Institute of Hefei University of Technology, China)
Yang Lu (School of Computer and Information, Hefei University of Technology, China)
Graph Convolutional Networks (GCN)-based Lightweight Detection Model for Dangerous Driving Behavior
PRESENTER: Shang Yao

ABSTRACT. Real-time detection and identification of dangerous driving behaviors is an effective measure to reduce traffic accidents. Due to the high network delay, limited communication bandwidth, and weak computing power, lightweight detection models that can run on edge devices have been widely investigated and attracted considerable attention. In recent years, the Graph Convolutional Networks (GCN), which model the human skeleton as a spatiotemporal graph, have advantages over image classification and target detection neural networks in human behavior detection tasks. However, there are disadvantages such as the single way of extracting information, high model complexity, and inability to integrate environmental information. Therefore, we propose a lightweight dangerous driving behavior detection model based on GCN. First, two local information extraction modules are designed to extract skeleton information features. Meanwhile, we propose a multi-information fusion behavior recognition model of "people + objects" by capturing the motion information of related object. Finally, the method based on Singular Value Decomposition (SVD) rank reduction is used to compress the model to improve the speed of recognizing an action sample under sufficient detection accuracy. The proposed model respectively achieves 96% and 87.4% accuracy on the x-view benchmark of NTU-RGBD dataset and the homemade Locomotive Driver Dataset, which attains the state-of-the-art performance.

14:30
Yang Lv (College of Computer Science and Technology, Qingdao University, China)
Zesheng Cheng (College of Computer Science and Technology, Qingdao University, China)
Zhiqiang Lv (College of Computer Science and Technology, Qingdao University, China)
Jianbo Li (College of Computer Science and Technology, Qingdao University, China)
A Spatial-Temporal Convolutional Model with Improved Graph Representation
PRESENTER: Yang Lv

ABSTRACT. Traffic prediction problem plays a crucial role in the research of intelligent transportation systems. Traffic flow is an important indicator to measure the traffic status. Traffic flow prediction can not only provide a scientific basis for traffic managers but also support other road services. This work proposes a spatial-temporal convolutional neural network model with improved graph representation (IGR-TCN) for predicting urban traffic flow, which solves the limitations of traditional methods considering only a single road section or a single detector. IGR-TCN reduces the computational complexity by using convolutional structure, the temporal convolution layer uses dilated convolution, and causal convolution to optimize the long-term prediction capability. The graph representation proposed in this work improves the existing spatial-temporal correlation model and increases the spatial correlation trend of the data. The IGR-TCN fits better than traditional recurrent neural networks, traditional graph convolution models, and graph spatial-temporal models. It can be more effective for spatial-temporal information prediction.

14:45
Fuyong Sun (Beijing Jiaotong University, China)
Ruipeng Gao (Beijing Jiaotong University, China)
Weiwei Xing (Beijing Jiaotong University, China)
Yaoxue Zhang (Tsinghua University, China)
Wei Lu (Beijing Jiaotong University, China)
Jun Fang (DiDi Corporation, China)
Shui Liu (DiDi Corporation, China)
Nan Ma (DiDi Corporation, China)
Hua Chai (DiDi Corporation, China)
TimeBird: Context-aware Graph Convolution Network for Traffic Incident Duration Prediction
PRESENTER: Fuyong Sun

ABSTRACT. Estimating the traffic incident duration is of great importance to traffic control, traffic navigation, and transportation safety. However, the complex road network topology and dynamic traffic conditions make it challenging. In this paper, we propose a context-aware spatio-temporal graph convolution framework, named TimeBird, to estimate the duration time of traffic incidents. Specifically, we build the dynamic weighted adjacent matrix and traffic incident risk similarity matrix to learn the hidden spatial context correlations based on graph convolution network. Then we employ the historical traffic speed of road segments to learn the temporal dependency. Lastly, we design a context-aware attention mechanism to adaptively learn the heterogeneous traffic features for incident duration prediction. Extensive experiments on two large-scale real-world datasets from DiDi ride-hailing platform demonstrate the effectiveness of TimeBird.

15:00
Xiaoling Tao (Guilin University of Electronic Technology, China)
Runrong Liu (Guilin University of Electronic Technology, China)
Lianyou Fu (Guilin University of Electronic Technology, China)
Qiqi Qiu (Guilin University of Electronic Technology, China)
Yuelin Yu (Guilin University of Electronic Technology, China)
An Effective Insider Threat Detection Apporoach Based on BPNN
PRESENTER: Runrong Liu

ABSTRACT. With the increasing number of insider threat incidents, insider threat has become one of the most serious network security problems. Currently, the large volume of redundant user behavior data affects the efficiency and accuracy of the detection methods. Meanwhile, existing insider threat detection methods cannot fully learn the important features of user data, resulting in high false alarm rate. To solve these problems, we propose a novel insider threat method based on variational auto-encoder (VAE) and back propagation neural network (BPNN) in the paper. Initially, we use the generative model VAE to construct the normal user behavior model, and obtain the effective feature representation of user behavior. Then, we use the BPNN algorithm to detect abnormal user behavior from a large number of user activity logs. Finally, we conduct experiments to verify the detection performance of the proposed method. Experimental results indicate that the proposed detection method can achieve high accuracy and precision.

13:30-15:30 Session 7F: Optimization
Chair:
Shiyuan Xu (The University of Hong Kong, Hong Kong)
Location: Room F626
13:30
Yingchi Mao (Hohai University, China)
Jun Wu (Hohai University, China)
Xiaoming He (Hohai University, China)
Ping Ping (Hohai University, China)
Jianxin Huang (Suma Technology Co., Ltd., China)
Communication Optimization in Heterogeneous Edge Networks using Dynamic grouping and Gradient coding
PRESENTER: Jun Wu

ABSTRACT. Communication load in heterogeneous edge networks is becoming heavier because of excessive computation and delay caused by straggler dropout, leading to high electricity cost and serious greenhouse gas emissions. To create a green edge environment, we focus on mitigating computation and straggler dropout to improve the communication efficiency during the distributed training. Therefore, we propose a novel scheme named Dynamic Grouping and Heterogeneity-aware Gradient Coding (DGHGC) to speed up average iteration time. The average iteration time is used as a metric reflecting the effect of mitigating computation and straggler dropout. Specifically, DGHGC firstly uses the static grouping to evenly distribute stragglers in each group. After the static grouping, considering the nonuniform distribution of nodes due to straggler dropout during the training process, a dynamic grouping depending on dropout frequency of stragglers is employed. The dynamic grouping tolerates more stragglers by examining the dropout threshold to improve the rationality of the static grouping for stragglers. In addition, DGHGC applies a heterogeneity-aware gradient coding to allocate reasonable data to stragglers based on their computing capacity and encode gradients to prevent stragglers from dropping out. Numerical results demonstrate that the average iteration time of DGHGC can be reduced largely compared to the state-of-art benchmark schemes.

13:45
Xin Guo (Nanjing University of Aeronautics and Astronautics, China)
Ruyun Zhang (zhejiang lab, China)
Lu Zhou (Nanjing University of Aeronautics and Astronautics, China)
Xiaozhen Lu (Nanjing University of Aeronautics and Astronautics, China)
Precise Code Clone Detection with Architecture of Abstract Syntax Trees
PRESENTER: Xin Guo

ABSTRACT. In the field of code clone detection, there are token-based similarity and abstract syntax tree-based detection methods. The former consumes less resources and is faster to detect, while the latter consumes more space and is less efficient. And there are few tools that scale to large-scale databases. To address the challenges, an approach is proposed that can detect code clones using the similarity of tokens and architecture of abstract syntax trees. Architecture of the syntax trees preserves the precision of detecting clone pairs, at the same time, the method also preserves the speed of matching code similarity. In the approach, it first parses the tokens of the code fragments and the features of the syntax trees, eliminates the unqualified parts of them based on the architecture when matching the candidates quickly, and then detects the similarity in detail. Finally, the results are output according to the input threshold range. The experiments confirms that the method substantially improves the precision of code clone detection while keeping the recall rate unabated. Furthermore, it reduces the detection time proportionally to data scale, improving the detection efficiency.

14:00
Yan Jin (Chongqing University, China)
Chunxiao Ye (Chongqing University, China)
Mengqing Yang (Chongqing University, China)
Chunming Ye (Chongqing University, China)
Efficient Certificateless Ring Signcryption Scheme with Constant Ciphertext Length on Blockchain
PRESENTER: Yan Jin

ABSTRACT. Ring signcryption schemes have been proposed on blockchain, but compared with ring signcryption using public key infrastructure (PKI), certificateless can simplify the certificate management process. At the same time, the length of the ciphertext increases with the size of the ring is also a pressing challenge to be solved. In this paper, we propose a new certificateless ring signcryption scheme with constant ciphertext length and prove the security under the random oracle model. Compared with other schemes, the computational overhead of this scheme is smaller and more efficient.

14:15
Lingling Ye (University of Science and Technology of China, China)
Chi Zhang (University of Science and Technology of China, China)
Mingxia Li (University of Science and Technology of China, China)
Zhenhua Han (Microsoft Research Asia (MSRA), China)
Haisheng Tan (University of Science and Technology of China, China)
Cross-Model Operator Batching for Neural Network Architecture Search
PRESENTER: Lingling Ye

ABSTRACT. Recently, automated machine learning (AutoML) and neural architecture search (NAS), regarded as promising techniques to design deep learning (DL) models automatically, have received increasing attention from both industry and academia. NAS will generate a large number of candidate models, which typically consist of numerous common substructures, providing a vast opportunity for cross-model optimization (e.g., operator batching) to improve training efficiency. However, most of the existing AutoML frameworks do not make use of operator batching and we also lack an efficient batching strategy. In this work, we propose a heuristic scheme named DPBat to guide the operator batching among multiple models in NAS. For most models, the operator batching of DPBat can be finished in just a few seconds, which is negligible compared to the subsequent training. We adopt Microsoft’s open source AutoML framework NNI to implement DPBat to real NAS scenarios. Extensive experiments show that DPBat is highly effective in improving training efficiency and reducing the overhead of operator batching, with a throughput 3.7× higher than the standard practice of running each job without batching.

14:30
Wenyue Wang (Qilu University Of Technology(Shandong Academy Of Sciences), China)
Xiang Tian (Qilu University of Technology (Shandong Academy of Sciences), China)
Xiaolu Cheng (Qilu University of Technology (Shandong Academy of Sciences), China)
Yuan Yuan (Qilu University of Technology (Shandong Academy of Sciences), China)
Biwei Yan (Qilu University Of Technology(Shandong Academy Of Sciences), China)
Jiguo Yu (Qilu University of Technology, China)
A Smart Contract-Based Intelligent Traffic Adaptive Signal Control Scheme
PRESENTER: Wenyue Wang

ABSTRACT. Intelligent transportation is one of the most important applications for improving urban traffic pressure. However, intersections are an important element of urban road network, which makes the complex traffic data face the challenge of security and efficiency in the process of transmission. In this paper, we propose a smart contract-based intelligent traffic adaptive signal control scheme to optimize the traffic efficiency problem at intersections. In the scheme, we use consortium blockchain and smart contracts to ensure secure transmission of traffic data and trusted access permission verification for Internet of Things (IoT) devices. Then, we introduce edge computing into the intelligent transportation system, which can process massive traffic data in real time. In addition, we propose an improved Webster algorithm, aiming at optimizing the dynamic allocation of signal times, so as to reduce the congestion at intersections. The security analysis and evaluation experiments demonstrate that the scheme is feasible and valid, and it can facilitate the adaptive control of traffic signal lights.

14:45
Xiaowei Shu (Dalian University of Technology, China)
Hao Wang (Dalian University of Technology, China)
Zhou Xu (Dalian University of Technology, China)
Kaiwen Ning (Dalian University of Technology, China)
Guowei Wu (Dalian University of Technology, China)
A Distributed Simulator of Mobile Ad Hoc Networks
PRESENTER: Kaiwen Ning

ABSTRACT. The simulation of a Mobile Ad Hoc Network (MANET), before deployment or during the system running, provides a priori design validation and insightful observation of the real system. But existing simulation tools mainly enable these by means of centralized instead of distributed deployment, which in some sense, cannot truly replicate the real system settings. In this paper, we present a DIstributively deployable Simulation tool for MANet (DISMAN), to accurately simulate MANET in a fully-distributed fashion thus allowing the emulation to scale with the network nodes without sacrificing accuracy. DISMAN is a fully functional tool that can be integrated with Kubernetes, support link layer (e.g., bandwidth limitation, delay, packet loss) and the multi-path as well as multi-hop transmission simulations. DISMAN is based on a four-layer architecture design, where on the top is a graphical user interface (GUI) layer for presentation and interaction. We further evaluate DISMAN with micro- and macro-benchmarks and show that DISMAN is easy to use and how it can assist MANET design.

15:30-15:45Coffee Break
15:45-17:30 Session 8A: UAV
Chair:
Yinong Li (Qingdao University, China)
Location: Room F619
15:45
Hongjuan Li (College of Software, Jilin University, Changchun 130012, China)
Da Wei (College of Computer Science and Technology, Jilin University, Changchun 130012, China)
Geng Sun (College of Computer Science and Technology, Jilin University, Changchun 130012, China)
Jian Wang (College of Computer Science and Technology, Jilin University, Changchun 130012, China)
Jiahui Li (College of Computer Science and Technology, Jilin University, Changchun 130012, China)
Hui Kang (College of Computer Science and Technology, Jilin University, Changchun 130012, China)
Interference Mitigation via Collaborative Beamforming in UAV-enabled Data Collections: A Multi-objective Optimization Method
PRESENTER: Hongjuan Li

ABSTRACT. Unmanned aerial vehicles (UAVs) are adopted as promising platforms to provide aerial wireless communications and networks. However, due to the line-of-sight (LoS) dominant air-ground channels, UAVs cause stronger interference to the terrestrial network devices. In this work, we study a novel interference mitigation method via collaborative beamforming under a UAV-enabled data collection scenario. Specifically, we form a UAV-enabled virtual antenna array (UVAA) to transmit the collected data to the terrestrial base stations (BSs), and formulate an interference mitigation multi-objective optimization problem (IMMOP) to simultaneously enhance the data transmission efficiency, reduce the interference affection and increase the network lifetime. Due to the complexity and NP-hardness of IMMOP, a chaotic multi-objective multi-verse optimizer (CMOMVO) is proposed for solving the problem. Simulation results show that the CMOMVO can effectively solve the IMMOP and has better performance than some benchmark algorithms.

16:00
Zhengzhong Xiang (Sichuan University, China)
Tang Liu (Sichuan Normal University, China)
Jian Peng (Sichuan University, China)
Weighted Data Loss Minimization in UAV Enabled Wireless Sensor Networks
PRESENTER: Zhengzhong Xiang

ABSTRACT. With high mobility and adaptability, the Unmanned Aerial Vehicle (UAV) has provided a promising solution for data collection in Wireless Sensor Networks (WSNs). However, few existing works considered that data overwritten would occur if the UAV can not collect data from sensors in time, which will cause data loss in WSNs. Moreover, the importance of data stored in different sensors may vary significantly according to the application scenario. In this paper, we formulate a novelty Loss Minimization Problem (LMP) in a UAV-enabled WSN. The objective is to minimize the volume of weighted data loss in the WSN by jointly considering the UAV hovering locations and hovering durations, subject to the limited energy capacity. We first devise a novelty one-to-many data collection scheme that enables the UAV to collect data from multiple sensors simultaneously. Then we discrete the infinite hovering locations of the UAV into finite to reduce computational complexity. We instead propose efficient heuristic and approximation algorithms for the optimization problem. Finally, we evaluate the performance of the proposed algorithms through extensive experimental simulations. Simulation results demonstrated that the proposed algorithms are promising.

16:15
Yinong Li (Qingdao University, China)
Jianbo Li (Qingdao University, China)
Zhiqiang Lv (Qingdao University, China)
Counterfactual Reasoning-Based Multiagent UAV Edge Computing Task Offloading Framework
PRESENTER: Yinong Li

ABSTRACT. In the unmanned aerial vehicle (UAV) edge computing scenario, how to reasonably offload the tasks generated by the user equipment is a research hotspot. Furthermore, assigning a shared global reward to each agent in a multi-agent scenario creates a credit assignment problem. In this work, under the constraints of processing delay and energy consumption, we model the interaction process between the agent and the scene as POMDP, and propose a multi-agent task offloading algorithm CMADDPG based on counterfactual reasoning to efficiently offload tasks . CMADDPG constructs a dynamically adjusted counterfactual action pool to evaluate the influence of each agent on the global reward to address potential credit assignments in scenarios. In addition, CMADDPG changes the output form of the state-action value to have the advantage of learning the actions of each dimension in a targeted manner. Experimental results show that CMADDPG can significantly reduce the processing delay of user tasks, and can effectively solve the problem of credit assignment in deterministic algorithms and avoid the occurrence of lazy agent.

16:30
Qing Guo (Sichuan University, China)
Zhengzhong Xiang (Sichuan University, China)
Jian Peng (Sichuan University, China)
Wenzheng Xu (Sichuan university, China)
Data Collection of IoT Devices with Different Priorities Using a Fleet of UAVs
PRESENTER: Qing Guo

ABSTRACT. In this paper, we study sensory data collection of IoT devices in a wireless sensor network, employing a given number of UAVs. We observe that most existing studies ignored the different importance of data stored in IoT devices and simply minimized the longest data collection latency of IoT devices. Then, it is possible that the data collection latency of a IoT device may be long, the data collection priority of the IoT device is high and its data should be collected faster than IoT devices with low priorities. Considering the data collection priority of each IoT device, we formulate a novel weighted data collection latency minimization problem to collect data stored in IoT devices using the UAVs, by finding a closed tour for each UAV such that the maximum weighted data collection latency of IoT devices is minimized, where the data collection latency of IoT devices is composed of the hovering time of UAVs for data collection and the flying time of UAVs from one hovering location to another hovering location. To deal with the above NP-hard problem, we first propose a simplified data collection latency minimization problem which does not take account of the data collection priorities of IoT devices and base stations. Then, we devise an approximation algorithm for the simplified problem and further employ it to deal with the weighted data collection latency minimization problem. Finally, we evaluate the performance of the proposed algorithms through experimental simulations. Experimental results show that the proposed algorithms are very promising.

16:45
Lin Liu (School of Information Science and Technology, Dalian Maritime University, China)
Bin Lin (Peng Cheng Laboratory, School of Information Science and Technology, Dalian Maritime University, China)
Ran Zhang (Department of Electrical and Computer Engineering, Miami University, United States)
Yudi Che (School of Information Science and Technology, Dalian Maritime University, China)
Chaoyue Zhang (School of Information Science and Technology, Dalian Maritime University, China)
Joint Beamforming and Deployment Optimization for UAV-Assisted Maritime Monitoring Networks
PRESENTER: Lin Liu

ABSTRACT. With the wide application of Internet of Things (IoT) systems in smart ocean, many unmanned surface vehicles (USVs) have been deployed jointly with unmanned aerial vehicles (UA Vs) to monitor the maritime environment. However, conventional means of maritime communications fail to provide high rate services due to the complex mar- itime channel conditions and large transmission distance, which will affect the environmental monitoring performance. In this paper, we propose a USV-UA V collaborative patrol scheme for maritime environment monitoring networks. Considering the characteristic of energy concentration in beamforming, we investigate the joint beamforming and location deployment optimization problem (BLDO) for UA V relay. Specifically, we decompose the BLDO problem into two subproblems. In the first subproblem, the location deployment of UAV and beam gain allocation are optimized via an iterative algorithm based on the approximated beam patterns. The algorithm can effectively reduce the computational complexity of the grid-search method. In the second sub-problem, beamforming optimization is conducted with high-dimensional constant-modulus (CM) constraint. A micro-particle swarm optimization based algorithm with boundary relaxation (BR−µP SO) is proposed to obtain an optimal solution. Finally, the simulation results demonstrate that the proposed algorithms can improve the performance in terms of the achievable sum rate and the beam gain.

17:00
Qi Gu (Northwestern Polytechnical University, China)
Bo Shen (Northwestern Polytechnical University, China)
An Evolutionary Game Based Computation Offloading for an UAV Network in MEC
PRESENTER: Qi Gu

ABSTRACT. With the rapid development of information technology, low-cost unmanned aerial vehicles (UAVs) appear. With advanced sensing and actuating technologies, they are being increasingly applied to a variety of scenarios, such as military rescue, communication assistance and civilian monitoring, to provide various kinds of services. However, considering their limited computing resource and restricted battery capability, the computation-intensive tasks or data-intensive tasks will face tough challenges. With the aid of Mobile Edge Computing (MEC), moving computation-intensive tasks from resource-constrained UAVs to edge cloud servers can significantly save energy and finally achieve impressive performance. As multiple service providers are deployed in the UAVs coverage area, this paper proposes an evolutionary game based algorithm to solve the computation offloading problem for UAVs. By replicator dynamics, UAVs select the suitable service provider to offload the computation tasks via achieving a tradeoff between time delay, energy consumption and monetary cost when network externality exists. Simulation results show that the proposed algorithm can rapidly converge to evolutionary equilibrium and achieve desirable performance.

17:15
Yuyang Cheng (North China University of Technology, China)
Shiyuan Xu (North China University of Technology, China)
Yibo Cao (North China University of Technology, China)
Yunhua He (North China University of Technology, China)
Ke Xiao (North China University of Technology, China)
SBA-GT: A Secure Bandwidth Allocation Scheme with Game Theory for UAV-assisted VANET Scenarios
PRESENTER: Yuyang Cheng

ABSTRACT. As Unmanned Aerial Vehicles (UAVs) are widely utilized for wireless communication services, this has promoted the emergence of promising UAV-assisted vehicle networking. However, due to the ever-increasing data traffic and diversified wireless service requirements of vehicles, there are also privacy issues caused by fraud, which challenges the effective allocation of limited security bandwidth for secure communications. In this article, in order to solve these two problems, we firstly propose a secure bandwidth allocation scheme based on the game theory of smart contracts on the Internet of Vehicles assisted by UAV. Secondly, the proposed blockchain-based system introduces an emerging consensus mechanism that can significantly reduce the delay in exchanging information and protect data privacy. Furthermore, to allocate the limited safe band-width, based on the real-time feedback of each UAV, we designed an optimal decision search algorithm based on gradient descent to achieve Stackelberg equilibrium. Finally, the simulation results show the superiority of improving the utility's security bandwidth allocation scheme.

15:45-17:30 Session 8B: Security and Privacy IV
Chair:
Xin He (Nanjing University of Posts and Telecommunications, China)
Location: Room F620
15:45
Xiugui Yang (Ocean University of China, China)
Xiangyun Qian (Ocean University of China, China)
Rui Zhang (Ocean University of China, China)
Ning Huang (Ocean University of China, China)
Hui Xia (Ocean University of China, China)
Low-poisoning Rate Invisible Backdoor Attack based on Important Neurons
PRESENTER: Xiugui Yang

ABSTRACT. The present research on label-consistent invisible backdoor attacks mainly faces the problem of needing a high poisoning rate to achieve a high attack success rate. To address this problem, this paper proposes a low-poisoning rate invisible backdoor attack based on important neurons (INIB) by enhancing the connection between triggers and target labels with the help of the neural gradient ranking algorithm. The method first identifies the neurons with the most significant influence on the target label with the help of the neural gradient ranking algorithm, secondly establishes a strong link between the important neurons and the trigger using the gradient descent algorithm, and then generates a trigger based on the established strong link by minimizing the difference between the current activation value and the expected activation value of the important neurons, thus causing the important neurons to be strongly activated when images have the trigger, which in turn causes the model to misidentify them as the target label. Finally, detailed experimental results show that INIB is able to achieve a very high attack success rate with a very low poisoning rate while ensuring a high model testing accuracy. Specifically, INIB achieves a 98.7% backdoor attack success rate and a model accuracy of 97.5% with the poisoning rate of only 1.64% on the MNIST dataset.

16:00
Hongniu Zhang (Cyberspace Institute of Advanced Technology, Guangzhou University, China)
Mohan Li (Cyberspace Institute of Advanced Technology, Guangzhou University, China)
Yanbin Sun (Cyberspace Institute of Advanced Technology, Guangzhou University, China)
Guanqun Qu (GDCERT/CC, Guangzhou, China)
Robust Truth Discovery against Multi-round Data Poisoning Attacks
PRESENTER: Hongniu Zhang

ABSTRACT. Crowdsensing systems collect multidimensional and heterogeneous data using sensing devices of individuals(called workers). However, there are often conflicts between data from multiple sources. Truth discovery try to resolve the conflicts by evaluate the trustworthiness of each source to find the groud truth. However, recent works have shown that truth discovery are vulnerable to data poisoning attacks. By submitting carefully crafted malicious data, attackers can launch multi-round iterations of hiding and attacking to deceive trustworthiness from truth discovery. This can result in long-term, insidious, and damaging data poisoning attacks. To this end, it is necessary to study how to improve the robustness of truth discovery. In this paper, we study high robust truth discovery methods against multi-round data poisoning attacks in crowdsensing systems, and attempt to detect potentially malicious workers. First, we implement one of the most widely used truth discovery frameworks, and verify its vulnerability to multi-round data poisoning attacks. Second, we propose HRTDMD, a high robust truth discovery method with malicious worker detection. Finally, we conduct experiments on real dataset and verify the effectiveness of the proposed method.

16:15
Mengjie Sun (中国科学院大学, China)
Li Ke (中国科学院大学, China)
Yaowen Zheng (Nanyang Technological University, Singapore)
Weidong Zhang (中国科学院大学, China)
Hong Li (中国科学院大学, China)
Limin Sun (中国科学院大学, China)
Inferring Device Interactions for Attack Path Discovery in Smart Home IoT
PRESENTER: Mengjie Sun

ABSTRACT. In smart home Internet of Things (IoT) systems, interactions between devices are driven in two ways: automation applications (apps), and the physical channels (e.g., temperature, smoke). Meanwhile, device interactions can be maliciously exploited to launch IoT attacks. However, limited efforts explore whether it is feasible to discover potential exploitable device interactions from IoT deployments. This paper proposes a novel framework to detect interactions among devices (D-interact) from eavesdropped network traffic and device function descriptions, and discover all potential exploitable device interactions (i.t., attack paths). First, we use the packet-level patterns to fingerprint IoT device events and then identify all IoT device events from the eavesdropped traffic. Furthermore, we mine temporal and conditional dependencies of IoT events to infer device interactions introduced by IoT apps. Besides, to identify interactions between devices and physical channels, we use the natural language processing (NLP) technique to analyze device function descriptions. Based on the obtained device interactions, D-interact builds a device interaction graph to discover attack paths. To demonstrate the feasibility of our approach, we implement D-interact in a real-world smart home including 24 devices and 29 apps. The experiment results show that 38 device interactions are identified and 26 device interaction paths could be potentially exploited to impact the safety of the IoT environment.

16:30
Shiyu Xu (Department of Informatics and Communication Engineering, Xiamen University, China)
Shi Yu (Department of Informatics and Communication Engineering, Xiamen University, China)
Liang Xiao (Department of Informatics and Communication Engineering, Xiamen University, China)
Zefang Lv (Department of Informatics and Communication Engineering, Xiamen University, China)
Reinforcement Learning Based Vulnerability Analysis for Smart Grids Against False Data Injection Attacks
PRESENTER: Shiyu Xu

ABSTRACT. False data injection attacks modify the meter measurements to mislead the control center into estimating inaccurate system states and thus affect the reliable operation of smart grids. In this paper, we propose a deep reinforcement learning based vulnerability analysis scheme for smart grids that enables the control center to construct an attack vector from the attacker’s view to identify the vulnerable meters. The control center chooses the attack vector based on power system states, meter measurements, the previous number of analyzed meters and injected errors without knowing the power system topology. This scheme designs an actor-critic architecture that uses an actor network to output the policy probability distribution to handle the continuous and high-dimensional vulnerability analysis policy and a critic network to guide the weights update of the actor network. We also perform simulations to verify the efficacy of the proposed scheme in terms of the vulnerability detection rate, the number of analyzed meters and the utility.

16:45
Sinian Luo (Nanjing University of Aeronautics and Astronautics, China)
Weibin Wu (Nanjing University of Aeronautics and Astronautics, China)
Yanbin Li (Nanjing Agricultural University, China)
Ruyun Zhang (Zhejiang Lab, China)
Zhe Liu (Nanjing University of Aeronautics and Astronautics, China)
An Efficient Soft Analytical Side-Channel Attack on Ascon
PRESENTER: Sinian Luo

ABSTRACT. Lightweight cryptography is a subfield of cryptography, which is widely used in embedded systems, RFID, sensor networks, and so on. However, the leakage information during the operation of these IoT devices can be exploited by adversaries and subjected to side-channel attacks. Simultaneously, only a small number of previous works show these attacks. In this work, we perform the soft analytical side-channel attack (SASCA) on the encryption of Ascon. Since we construct a unique factor graph for Ascon, we can also use it to attack the masked implementations. The point of attack is the permutation function, one of Ascon's most basic components. Our attack mainly consists of three steps. At the first, we run a side-channel template matching on the initialization phase. Then, we build a factor graph describing the intermediate computations in permutation, including the observed leakage for the intermediate variables. Third, we run a Belief Propagation (BP) algorithm that takes full advantage of these leakages. Through simulations, we show that the entire key can be successfully recovered by only using the leakage information of a few traces, and it also offers low time and memory complexity.

17:00
Jiapeng Zhao (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China, China)
Zhongjin Liu (National Computer Network Emergency Response Technical Team/Coordination Center of China,Beijing, China, China)
Xiaoling Zhang (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China, China)
Jintao Huang (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China, China)
Zhiqiang Shi (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China, China)
Shichao Lv (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China, China)
Hong Li (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China, China)
Limin Sun (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China, China)
Gradient-based Adversarial Attacks against Malware Detection by Instruction Replacement
PRESENTER: Jiapeng Zhao

ABSTRACT. Deep learning plays a vital role in malware detection. The Malconv is a well-known deep learning-based open source malware detection framework to prevent damage in advance. Researchers propose adversarial example generation strategies to evade the Malconv by modifying the PE headers or the end of malware. However, these strategies that focus on non-executable portions can be easily pre-processed before classification. Therefore, we propose a new instructions replacement strategy to overcome these flaws. This paper reviews the research progress of adversarial example generation strategies for the Malconv in recent years, analyzes the reason why the Malconv can be evaded by adversarial examples and identifies two layers of the Malconv that can be attacked, and propose the gradient-based instructions replacement strategy named EFGSM that is an enhanced Fast Gradient Sign Method (FGSM) and sheds light on future work in adversarial example defense strategies for the Malconv. The paper assesses the performance of our EFGSM and existing adversarial example generation strategies upon 200 malware. The results of the evaluation show that our strategy improves the success rate from 68% to 81.5% and takes less time to generate malware examples. The paper also assesses the evasion performance of adversarial examples in three antiviruses. The results depict that our strategy generates a higher percentage of samples that can evade the antivirus than existing strategies.

17:15
Mingli Wu (The University of Hong Kong, Hong Kong)
Tsz Hon Yuen (The University of Hong Kong, Hong Kong)
GCD-Filter: Private Set Intersection Without Encryption
PRESENTER: Mingli Wu

ABSTRACT. A private set intersection (PSI) protocol is a protocol to get the intersection of two sets, each of which belongs to one party, without disclosing extra information of each party's set to the other party. In this paper, we propose a novel semi-honest PSI protocol without using any encryption primitive in a semi-honest security model. Specifically, we first slice all elements in the set and inject dummy slices. Then we utilize the greatest common divisor (GCD) to find the common parts of the two parties' slice set product, which is the product of all slices. Finally, we filter the elements by utilizing the GCD to find out the intersection. Different from most previous PSI protocols, we get the intersection by calculation rather than comparison.

Our protocol has many advantages over other state-of-the-art PSI protocols, such as robust security against quantum attacks, low communication cost, high computation efficiency when the bandwidth is low, etc. Through extensive experiments, we find the optimum parameters in our setting and demonstrate the performance of our protocol. Different from previous PSI protocols, the communication cost of our protocol varies with the cardinality of the intersection. In comparison, the communication cost of our protocol is the lowest, which gains an over $200\%$ improvement than the communication-optimized PSI protocol \emph{spot-low} (Pinkas et al., CRYPTO'19). In addition, the running time of our protocol is the lowest when the communication bandwidth is about $1$ Mbps.

15:45-17:30 Session 8C: Application II
Chair:
Jiande Sun (Shandong Normal University, China)
Location: Room F621
15:45
Hongkai Zhao (Dalian University of Technology, China)
Huihui Wang (Dalian Neusoft University of Information, China)
Zhelong Wang (Dalian University of Technology, China)
Long Liu (Dalian Neusoft University of Information, China)
Sen Qiu (Dalian University of Technology, China)
Robust Adaptive Cubature Kalman Filter for Attitude Determination in Wearable Inertial Sensor Networks
PRESENTER: Hongkai Zhao

ABSTRACT. Attitude analysis and recognition can be applied in wearable computing for medical assistance, motor-function assessment and dexterous human-robot interaction. The main problems, however, are serious drift and instability during traditional motion measurement fusion methods due to the high dynamic complexity of limb movements. To the best of our knowledge, it is the first attempt to employ an adaptive robust cubature Kalman filtering algorithm in the human attitude analysis based on wearable inertial sensors with time-varying state-process noise. Experiment results show that the adaptive robust CKF algorithm based on quaternion and gyroscope error modeling proposed in this paper can solve motion attitude solution. Lastly, we compare our method with CKF and EKF algorithm, the proposed algorithm can effectively improve the precision of attitude analysis.

16:00
Yuxin Zhao (Beihang University, China)
Zhenglong Cui (Beihang University, China)
Rongshan Chen (Beihang University, China)
Da Yang (Beihang University, China)
Hao Sheng (Beihang University, China)
LF-DWNet: Robust Depth Estimation Network for Light Field with Disparity Warping
PRESENTER: Yuxin Zhao

ABSTRACT. Light field (LF) images can store multi-view geometry characteristics about the observed scene, which can be helpful in depth estimation. Depth estimation has attracted much attention in recent years for its widely use in the computer vision tasks. Many approaches have been proposed to estimate the depth of LF images, including conventional methods and learning-based methods. But most of them are hard to apply to different complex situations. We propose a robust depth estimation network for LF images with disparity warping (LF-DWNet), which is robust in large disparity pixels, occlusions, and noise areas. To reduce the effect of large disparity pixels, we introduce the disparity warping processing on EPI. To extract the depth feature from warped EPI and reduce the effect of occlusions and noise areas, we design a feature extraction module based on the attention mechanism. To make full use of the depth feature our attention-based module gets, we need to guide the depth estimation by the global structure information. Besides, our LF-DWNet can integrate the depth feature from multi streams of attention-based feature extraction modules and get more credible depth map. Experiments on both synthetic and real-world datasets demonstrate the effectiveness of our method.

16:15
Jinpeng Song (Nanjing University, China)
Haipeng Dai (Nanjing University, China)
Shuyu Shi (Nanjing University, China)
Lei Wang (Peking University, China)
Haoran Wan (Nanjing University, China)
Zhizheng Yang (Nanjing University, China)
Fu Xiao (Nanjing University of Posts and Telecommunications, China)
Guihai Chen (Nanjing University, China)
HeadTracker: Fine-grained Head Orientation Tracking System Based on Headphones
PRESENTER: Jinpeng Song

ABSTRACT. Head orientation tracking has many potential applications in various fields, e.g.,online courses, online meetings, and somatosensory games. Undoubtedly, with the information of the user’s head orientation, these applications will have more opportunities to enhance performance and provide better user experience. However, reviewing existing works regarding head tracking, the CV-based solutions have limited tracking angle range and privacy issues and the IMU-based solutions have accumulated errors. None of these methods provide accurate and stable user head orientation. In this paper, we propose HeadTracker, a fine-grained 3D head orientation tracking system based on a single headphone. Headtracker achieves high-precision head orientation tracking by installing ultrasonic transmitters on an ordinary headphone and deploying ultrasonic receivers in the environment. We conducted experiments to evaluate the performance of HeadTracker in the real use environment, and the experimental results show that the system can achieve an average error of 6 degrees in the 3D head orientation tracking. To the best of our knowledge, HeadTracker is the first system to use head-mounted ultrasound device to achieve 3D head orientation tracking and achieves the state-of-the-art in this category.

16:30
Deyu Zhao (Southeast University, China)
Guang Cheng (Southeast University, China)
Yuyu Zhao (Southeast University, China)
Ruixing Zhu (Southeast University, China)
NT-RP: A High-versatility Approach for Network Telemetry Based on FPGA Dynamic Reconfigurable Pipeline
PRESENTER: Deyu Zhao

ABSTRACT. Network telemetry provides more accurate and reliable services for intelligent network control by pushing fresh status information actively with help of data plane. However, most existing network telemetry methods are difficult to be deployed effectively in business environment due to the lack of runtime-reconfigurability, huge time-space overhead, and high probability of information loss. In this work, we propose a high versatility approach NT-RP for network telemetry based on FPGA dynamic reconfigurable pipeline to maintain the balance between the accuracy of the measurement and the overhead in different scenarios. NT-RP can change the processing logic in runtime to obtain different network measurement spontaneously desired by users. Benefiting from distributed cyclic storage strategy and telemetry function integration mechanism, NT-RP can greatly reduce the overhead during measurement and mitigate the telemetry information missing problem caused by packet loss. The implementation of NT-RP in FPGA is evaluated in a real network testbed which consists of a few programmable nodes. Experimental results show that the influence of NT-RP in large traffic scenarios is less than 1%. It is not only able to successfully change the telemetry task during operation, but also perform more accurate network measurements with little telemetry information occupancy.

16:45
Qinghua Sima (Soochow University, China)
Yu-E Sun (Soochow University, China)
He Huang (Soochow University, China)
Guoju Gao (Soochow University, China)
Yihuai Wang (Soochow University, China)
Social-Network-Assisted Task Selection for Online Workers in Spatial Crowdsourcing: A Multi-Agent Multi-Armed Bandit Approach
PRESENTER: Qinghua Sima

ABSTRACT. The popularity of smart devices and the availability of wireless networks bring considerable attention to Spatial Crowdsourcing (SC). Existing studies mainly focus on solutions to different optimization objectives of the SC platform, ignoring the entitlement of workers. This paper starts from the perspective of workers and investigates how to select suitable tasks for each online worker such that everyone can maximize their individual profit. Since the profit is related to the completion degree of tasks that is determined by the prior unknown parameter, we model the problem as a Multi-Agent Multi-Armed Bandit (MAMAB) problem. We propose a Payment-Estimation-Based Solution (PEBS), allowing workers to sequentially make decisions on task selection based on their observations and estimations. Specifically, the proposed PEBS first utilizes the social network among workers and assists workers in learning the information of tasks from the historical data. Then, it introduces the idea of probability matching in Thompson Sampling (TS) to help estimate the profit of workers and deal with the task selection problem. Finally, extensive simulations show that our proposed mechanism is efficient in optimizing the individual profit of workers.

17:00
Yijie Yan (North China University of Technology, China)
Shiyuan Xu (North China University of Technology, China)
CA-free Real-time Fuzzy Digital Signature Scheme
PRESENTER: Yijie Yan

ABSTRACT. Digital signature technology has been playing a very important role in electronic money transactions while memorizing and storing keys for digital signatures brings a great burden to users. In recent years, certifying authority (CA) has been attacked frequently, and many users have suffered losses. In this article, we dis-cuss the existing mainstream digital signature technologies, analyze their ad-vantages and disadvantages, and propose a novel fuzzy digital signature scheme, which has the characteristics of immediacy and no need for CA. Initially, our scheme uses fuzzy extractors to generate digital signatures seamlessly from bio-metric or other noise data, since its information entropy is sufficient to ensure se-curity. Secondly, we reduce the dependence of digital signatures on third parties and the threats and delays caused by them. Furthermore, We also conducted the computational security analysis of the proposed scheme to illustrate its security level. Finally, the comprehensive experimental evaluation elaborates that our scheme is reliable and practical for real scenarios, ensuring the information meas-ured by the user is untraceable.

15:45-17:30 Session 8D: Efficient
Chair:
Weifeng Sun (Dalian University of Technology, China)
Location: Room F622
15:45
Ning Huang (Ocean University of China, China)
Xuecai Feng (Ocean University of China, China)
Rui Zhang (Ocean University of China, China)
Xiugui Yang (Ocean University of China, China)
Hui Xia (Ocean University of China, China)
Network Defense Resource Allocation Scheme with Multi-armed Bandits
PRESENTER: Ning Huang

ABSTRACT. The problem of limited defense resources owned by the network platform needs to be solved by designing a reasonable defense resource allocation scheme in Industrial Internet of Things (IIoT). However, most of the previously studied defense resource allocation schemes do not consider the impact of network cheat on the defender's total expected utility, resulting in the defender's total expected utility not being optimal. To address this problem, this paper proposes a network defense resource allocation scheme (NDRAS) with multi-armed bandits to maximize the defender's total expected utility. The scheme first proposes a random generation method of node shell configuration based on network cheat, by considering the impact of network cheat on the defender's total expected utility, masking information about the real configuration of nodes, to increase the uncertainty of the attacker's attack on each node and thus reduce the likelihood of the attacker's success. Subsequently, the decomposability and Lipschitz continuity of the defender's total expected utility is exploited to reduce the gap between the cumulative discrete optimal benefit and the continuous optimal benefit, to maximize the defender's total expected utility and thus make the defender's total expected utility optimal. Finally, the detailed experimental results confirm the effectiveness of NDRAS, indicating that the new scheme can give a reasonable defense resource allocation scheme to maximize the defender's total expected utility.

16:00
Feng Guo (Institute of Information Engineering, Chinese Academy of Sciences., China)
Ning Zhang (Institute of Information Engineering, Chinese Academy of Sciences, China)
Qian Zou (Institute of Information Engineering, Chinese Academy of Sciences., China)
Qingshan Kong (Institute of Information Engineering, Chinese Academy of Sciences, China)
Zhiqiang Lv (Institute of Information Engineering, Chinese Academy of Sciences., China)
Weiqing Huang (Institute of Information Engineering, Chinese Academy of Sciences., China)
MEBV: Resource Optimization for Packet Classification Based on Mapping Encoding Bit Vectors
PRESENTER: Feng Guo

ABSTRACT. Packet classification plays a key role in network security systems such as firewalls and QoS. The so-called packet classification is to classify packets into different categories according to a set of predefined rules. When the traditional classification algorithm is implemented based on FPGA, memory resources are wasted in storing a large number of identical rule subfields, redundant length subfields, and useless wildcards in the rules. At the same time, due to the rough processing of range matching, the rules are extended. These problems seriously waste memory resources and pose a huge challenge to FPGAs with limited hardware resources. Therefore, a field mapping encoding bit vector (MEBV) scheme is proposed, which consists of a field-splitting-recombination architecture that can accurately divide each field into four mapping preparation fields according to the matching method, field reuse rate, and wildcard ratio, and also consists of four mapping encoding algorithms to complete the length compression of the rules, to achieve the purpose of saving resources. Experimental results show that for the 1K OpenFlow 1.0 ruleset, the algorithm can achieve a significant reduction in memory resources while maintaining high throughput and support range matching, and the scheme method can save an average of 38\% in memory consumption.

16:15
Fang Dr. Ouyang (Zhejiang Normal University, China)
Zheng Bao (Zhejiang Normal University, China)
Lixiao Zhou (Zhejiang Normal University, China)
Feilong Lin (Zhejiang Normal University, China)
Zhaolong Hu (Zhejiang Normal University, China)
Changbing Tang (Zhejiang Normal University, China)
Minglu Li (Zhejiang Normal University, China)
A Proof-of-Weighted-Planned-Behavior Consensus for Efficient and Reliable Cyber–Physical Systems
PRESENTER: Fang Dr. Ouyang

ABSTRACT. Recently, blockchain was introduced into the cyber-physical systems, which provides services of privacy and trust. However, reliability and system performance issues exist when blockchain and cyber-physical systems are integrated. In this paper, we design a blockchain-enabled cyber-physical system, where a new blockchain consensus is used to solve the problems of reliability and system performance. Firstly, an autonomous consensus mechanism called Proof-of-Weighted-PlannedBehavior is established based on the theory of planned behavior. Then, the behavior of consensus participants gets further explained by introducing credit evaluation and vulnerable node analysis. Moreover, considering the Jain fairness index, a dynamic authorizer group mechanism that coordinates reliability and decentralization is developed. By optimizing the credit threshold of the authorization group, the security and reliability of our designed mechanism are guaranteed. Finally, the experimental simulation results prove that compared with the traditional consensus, our proposed consensus improves the reliability and the system performance of the blockchain-enabled cyber-physical systems.

16:30
Lidong Xu (Shandong University, China)
Mingqiang Wang (Shandong University, China)
Efficient Post Quantum Random Oblivious Transfer Based on Lattice
PRESENTER: Lidong Xu

ABSTRACT. The large scale multiparty computation and private set intersection require a number of oblivious transfer instances as subroutines, but the implementation of oblivious transfer protocols is relatively slow. A feasible way is to use the oblivious transfer variant called random oblivious transfer. In this paper, we propose a 1-2 random oblivious transfer protocol and extend it to a 1-k random oblivious transfer protocol based on the LWE assumption, quantum mechanics. Then, we analysis the stand-alone security of our 1-2 random oblivious transfer protocol under various malicious situations and prove its universally composable security in UC framework. As for the security of our 1-k random oblivious transfer protocol, the similar results can be obtained.

16:45
Yiqing Liu (Institute of Information Engineering, China)
Huang Weiqing (CAS,IIE, China)
Wen Wang (Institute of Information Engineer,Chinese Academy of Sciences, China)
Jingru Geng (University of Chinese Academy of Sciences, China)
Zhaohua Qiu (Institute of Information Engineering, China)
An Efficient Interference Calculation Model Based on Large Scale Constellations Probabilistic Analysis
PRESENTER: Yiqing Liu

ABSTRACT. With the large scale NGSO constellation systems entering the blowout launch period, new challenges are expected for inter-system satellite coexistence due to the increase in scale of the constellations and the complexity of the interactions, where the problems of frequency compatibility between NGSO system and GSO system are the most prominent. However, the existing methods normally analyze the interference through real-time position acquisition, visible area judgment and single link calculation, as for the large scale constellations under construction, these methods still have great challenges to large amount of data stored in constellation positions, long simulation duration and high requirements for simulation equipment. In this circumstance, we establish a high efficient interference calculation model apply for large scale constellations. Our solution stems from the satellite position probability, by meshing the visible area and deriving the distribution of other interfering satellites in visible area through the initial satellite, we can directly analyze aggregate interference. The proposed model not only has the advantages of low algorithm complexity and high calculation efficiency, but also suitable for large scale constellations with different configurations as well as not depend on computer simulation equipment. The theoretical and simulation results both show that the proposed model has advantages in the accuracy of interference calculation and the duration of interference simulation.

17:00
Chenguang Zhu (Institute of Information Engineering, Chinese Academy of Sciences, China)
Gewangzi Du (Institute of Information Engineering, Chinese Academy of Sciences, China)
Tongshuai Wu (Institute of Information Engineering, Chinese Academy of Sciences, China)
Ningning Cui (Institute of Information Engineering, Chinese Academy of Sciences, China)
Liwei Chen (Institute of Information Engineering, Chinese Academy of Sciences, China)
Gang Shi (Institute of Information Engineering, Chinese Academy of Sciences, China)
BERT-Based Vulnerability Type Identification with Effective Program Representation
PRESENTER: Chenguang Zhu

ABSTRACT. Detecting vulnerabilities is essential to maintaining software security. At present, vulnerability detection based on deep learning has achieved remarkable results. The type of vulnerability could tell the vulnerability principles and help the programmer quickly pinpoint the precise location of vulnerabilities. Moreover, the type of vulnerability is very valuable for remediating it. Therefore, it is essential to identify vulnerability types. This paper proposes a new vulnerability type identification framework based on deep learning. The framework is based on syntax and semantics, and the detection granularity is fine to the slice level. To include comprehensive vulnerability types, we use four slicing methods to represent the program. In addition, we model four kinds of code slice features based on BERT. For evaluation, we used 64 three-level CWE-IDs vulnerability types in National Vulnerability Database (NVD) and Software Assurance Reference Dataset (SARD) for vulnerability type identification. The experimental results show that it has significant performance in vulnerability type identification.

17:15
Weifeng Sun (Dalian University of Technology, China)
Kelong Meng (Dalian University of Technology, China)
Ailian Wang (Dalian University of Technology, China)
Research on the Effect of BBR Delay Detection Interval in TCP Transmission Competition on Heterogeneous Wireless Networks
PRESENTER: Weifeng Sun

ABSTRACT. BBR effectively improves the network bandwidth utilization by its unique minimum delay and maximum bandwidth detection mechanism. However, with the development of 5G communication technology, whether the 10s delay detection interval of BBR can meet the new high throughput and low latency heterogeneous network requirements needs to be studied. Therefore, based on the ns-3, this paper builds some scenarios to simulate the performance of BBR in wired, WiFi, and 5G networks. A spindle-shaped network topology is constructed to simulate the BBR competition. By modifying the delay detection interval of BBR to 5s and 1s, the competition among BBR streams with the same roundtrip time (RTT), the competition among BBR streams with different RTTs, and the competition among BBR and other TCP congestion control algorithms (CCA) are simulated respectively. Then, a formula for calculating the delay detection interval is proposed. According to this formula, we propose a method to dynamically modify the delay detection interval. The method estimates the network state according to the change of RTT, and then calculates and updates the delay detection interval. Simulation results demonstrate that appropriately modifying the delay detection interval of BBR can alleviate the competition among BBR and other algorithms in heterogeneous wireless network, but too short delay detection interval will deteriorate the network performance.

15:45-17:30 Session 8E: Artificial Intelligence IV
Chair:
Lei Wang (Peking University, China)
Location: Room F625
15:45
Cheng Hu (Institute of Information Engineering, Chinese Academy of Sciences, China)
Fangfang Yuan (Institute of Information Engineering, Chinese Academy of Sciences, China)
Yanbing Liu (Institute of Information Engineering, Chinese Academy of Sciences, China)
Cong Cao (Institute of Information Engineering, Chinese Academy of Sciences, China)
Chunyan Zhang (Institute of Information Engineering, Chinese Academy of Sciences, China)
Jianlong Tan (Institute of Information Engineering, Chinese Academy of Sciences, China)
Malicious Domain Detection with Heterogeneous Graph Propagation Network
PRESENTER: Cheng Hu

ABSTRACT. As one of the most important basic services of the Internet, the domain name system is abused by attackers for various malicious activities, malicious domain detection is a key technology against attackers. Previous works mainly employ manually selected features to detect malicious domains which are easily evaded by attackers. In this paper, we propose a novel malicious domain detection system with heterogeneous graph propagation network, named HGPNDom, which can jointly consider the global relationship and higher-order features of domains. In HGPNDom, we first model the DNS scene as a heterogeneous information network (HIN) to capture rich information, then we propose a heterogeneous graph propagation network (HGPN) to classify domain nodes in the HIN, including semantic propagation mechanism and semantic fusion mechanism. The semantic propagation mechanism can spread information through more layers and learn higher-order domain features, the semantic fusion mechanism can learn the importance of meta-path and fuse them judiciously. Experimental results on the real DNS dataset show that HGPNDom outperforms other state-of-the-art methods.

16:00
Xuefei Huang (Macao Polytechnic University, Macao)
Wei Ke (Macao Polytechnic University, Macao)
Hao Sheng (Beihang University, China)
Enhancing Efficiency and Quality of Image Caption Generation with CARU
PRESENTER: Xuefei Huang

ABSTRACT. Image caption is textual explanation automatically generated by a computer according to the content in an image. It involves both image and natural language processing, and thus becomes an important research topic in pattern recognition. Deep learning has been successful in accomplishing this task, and the quality of captions generated by existing methods is already high. However, due to the broadness and variety of image caption applications, the current generated captions are still not sufficiently detailed, and the training efficiency can also be improved. Therefore, under the encoder-decoder framework of deep learning, how to use fewer parameters to improve the training efficiency and retain the quality of the generated image descriptions is a huge challenge. In this work, we introduce an improved method based on the encoder-decoder structure, adding an attention mechanism, and applying the content adaptive recurrent unit (CARU), as the decoder, to generate image captions. Inspired by GRU, CARU is designed to have comparable performance with fewer parameters, and is sensitive to the features in hidden layers. The experimental results show, based on MsCOCO dataset, the proposed method achieved better performance than that using GRU as the decoder, and took less training time, effectively improves the training efficiency.

16:15
Genji Yuan (Qingdao University, China)
Jianbo Li (Qingdao University, China)
Yue Wang (Qingdao University, China)
Xianglong Meng (Qingdao University, China)
Incorporating Self Attention Mechanism into Semantic Segmentation for Lane Detection
PRESENTER: Xianglong Meng

ABSTRACT. Lane detection is a challenging task in the field of vision detection. The annotation information of lane is very sparse, and it is faced with the interference of occlusion, illumination and other factors, which seriously affects the capture of lane features by neural network. In this paper, we propose the Self-Attention Lane Segmentation Network (SALSN) which allows attention-driven, long-range dependency modeling for lane detection task. Although traditional convolutional neural networks have demonstrated their powerful performance, their ability to capture global relationships in images has not been fully explored. We introduce a self-attentive module to model the long-range dependencies between lane features. Lanes have strong shape constraints but weak coherence. In SALSN, we utilize a dense feature fusion framework to better capture lane context information and use all element information to generate lane segmentation images. Experimental results show that SALSN is not only effective in learning the remote dependencies of lane features, but also significantly improves the lane detection performance. We have validated our approach on two large-scale lane detection datasets, and our method can achieve more competitive results.

16:30
Xing Wei (School of Computer and Information, Hefei University of Technology, China)
Xiuxiu Wang (School of Computer and Information, Hefei University of Technology, China)
Li Zhang (School of Computer and Information, Hefei University of Technology, China)
Lei Chen (Institute of Intelligent Machines, HFIPS, Chinese Academy of Sciences, China)
Hui Luo (Intelligent Manufacturing Institute of Hefei University of Technology, China)
Di Wu (School of Computer Science, Hefei Normal University, China)
Chong Zhao (Engineering Quality Education Center of Undergraduate School, China)
Dropout-based Ensemble Dual Discriminator for Cross-Domain Sentiment Classification
PRESENTER: Xiuxiu Wang

ABSTRACT. The main task of Cross-Domain Sentiment Classification is to train a well-performing classification model by using labeled source domain data, and then transfer the model to unlabeled target domain data, thereby solving the expensive labor consumption and domain shift caused by a large number of labels resulting performance degradation. Most mainstream adversarial domain adaptation methods are based on a single discriminator, which ignores the uneven distribution of labels between domains and multiple modalities of data and tends to cause negative transfer and poor generalization performance. We propose a Dropout-based ensemble dual discriminator for Cross-Domain Sentiment Classification. We functionally decouple the single discriminator by using two forms of text data, and replace it with a positive sentiment discriminator and a negative sentiment discriminator. A dynamic set of discriminators will be obtained by random deactivation of the discriminator network neurons, then the feature extractor has to extract richer and more realistic domain-invariant features to fool the discriminator and mitigate the mode collapse phenomenon. To solve the problem of class imbalance in a large number of unlabeled data samples, we use mutual information maximization to train sentiment classifiers to ensure that label predictions are distributed in a reasonably balanced state. We conduct full experiments on the Amazon and Airlines datasets. Experiments showed that our proposed model achieves state-of-the-art cross-domain sentiment classification performance.

16:45
Zhigang Xu (Hubei University of Technology, China)
Kangze Ye (Hubei University of Technology, China)
Xinhua Dong (Hubei University of Technology, China)
Hongmu Han (Hubei University of Technology, China)
Zhongzhen Yan (Hubei University of Technology, China)
Xingxing Chen (Hubei University of Technology, China)
Duoyue Liao (Hubei University of Technology, China)
Haitao Wang (Narcotics Control Bureau, GuangDong Public Security Department, China)
DC-Gossip: An Enhanced Broadcast Protocol in Hyperledger Fabric based on Density Clustering
PRESENTER: Kangze Ye

ABSTRACT. Low transaction efficiency remains one of the primary constraints to the development of permission blockchain. To enhance the communication performance of blockchain , the majority of research focuses on optimizing the local architecture of blockchain and improving consensus. In practice, increasing the block dissemination capability at the network layer can significantly improve transaction efficiency. We find that the redundancy and instability of the gossip protocol as a broadcast method in Hyperledger Fabric have a significant impact on communication performance. In this work, we introduce the idea of density clustering to propose the DC-Gossip broadcast protocol, constructing a stable network architecture with highly dense connectivity for the blockchain network layer. This architecture can effectively reduce the propagation latency and ensure the integrity of the distributed ledger. In our experiments with Fabric, DC-Gossip reduces latency by more than 19\% after 40 blocks are propagated in a stable network environment with more than 100 nodes. Moreover, the latency decreases by 14\% in a dynamic network under the identical circumstances.

17:00
Xu Liu (Dalian Unviersity, China)
Rui Liu (Dalian Unviersity, China)
Jing Dong (Dalian Unviersity, China)
Pengfei Yi (Dalian university, China)
Dongsheng Zhou (Dalian Universtiy, China)
DEANet:A Real-time Image Semantic Segmentation Method Based on Dual Efficient Attention Mechanism
PRESENTER: Xu Liu

ABSTRACT. Image Semantic Segmentation is an indispensable assignment in computer vision. It has been widely applied in many fields such as medical imaging and robotics. For the sake of meeting the application of real-time scene, how to improve segmentation accuracy while ensuring high segmentation speed has become a new research hotspot. Aims at this problem, a real-time image semantic segmentation method based on dual efficient attention mechanism (DEANet) is proposed. The proposed dual efficient attention module is used to replace the decoder in an encoder-decoder based light-weight network. Pyramid sampling is introduced in the channel dimension to extract multi-scale information, and higher resolution aggregation features are adopted as the input of the spatial dimension to promote the segmentation accuracy and efficiency. The proposed DEANet is tested on two classic datasets. On the Cityscapes dataset, when the input size is 512×1024, the segmentation accuracy reaches 74.90% mIoU and the segmentation speed reaches 99.91FPS. On the Camvid dataset, when the input size is 360×480, the segmentation accuracy reaches 70.07% mIoU and the segmentation speed reaches 142.72FPS.

17:15
Xiang Ying (Tianjin University, China)
Zhen Liu (Tianjin University, China)
Jie Gao (Tianjin University, China)
Ruixuan Zhang (Tianjin University, China)
Han Jiang (OpenBayes (Tianjin) IT Co., Ltd., China)
Xi Wei (Tianjin Medical University Cancer Institute and Hospital, China)
Multi-task Class Feature Space Fusion Domain Adaptation Network for Thyroid Ultrasound Images: Research on Generalization of Smart Healthcare Systems

ABSTRACT. In recent years, the poor generalizability of deep neural networks in multi-model medical images has attracted widespread attention. Domain adaptation is an approach to alleviate the above problem, which transfers the labeled source domain to the target domain. It can reduce the data labeling workload in the target domain and significantly improve the network's generalizability. However, the differences between foreground areas and background areas of medical images are relatively minor, and it is difficult for existing methods to effectively extract domain invariant features. Further optimization of the feature distribution alignment for each category is also lacking. Therefore, a Multi-task Class feature space Fusion Domain Adaptation Network (MCFDAN) is proposed in this paper. Firstly, a reconstruction branch is added to the baseline network to mitigate the feature offset of the target domain during encoding. Secondly, category constraints are added to the fusion of domain feature spaces, improving the generalizability of the source classifier to the target domain. Finally, the network incorporates a recurrent cross-attention module that highlights the feature expression of the lesion region. The evaluation results demonstrate that the proposed network achieves a significant performance improvement, which is important for the application of smart healthcare systems.

15:45-17:30 Session 8F: Blockchain
Chair:
Shiyuan Xu (The University of Hong Kong, Hong Kong)
Location: Room F626
15:45
Jiaxi Yang (University of Electronic Science and Technology of China, China)
Sheng Cao (University of Electronic Science and Technology of China, China)
Peng Xiangli (The Fifth Electronic Research Institute of MIIT, China)
Xiong Li (University of Electronic Science and Technology of China, China)
Xiaosong Zhang (University of Electronic Science and Technology of China, China)
Multi-dimensional Data Quick Query for Blockchain-based Federated Learning
PRESENTER: Jiaxi Yang

ABSTRACT. Due to the drawbacks of federated learning such as vulnerability of a single central server, centralized federated learning is shifting to decentralized federated learning, a paradigm which takes the advantages of blockchain. A key enabler for adoption of blockchain-based federated learning is how to select suitable participants to train models collaboratively. Selecting participants by storing and querying the metadata of data owners on blockchain could ensure the reliability of selected data owners, which is helpful to obtain high-quality models in federated learning. However, querying multi-dimensional metadata on blockchain needs to traverse every transaction in each block, making the query time-consuming. An efficient query method for multi-dimensional metadata in the blockchain for selecting participants in federated learning is absent and challenging. In this paper, we propose a novel data structure to improve the query efficiency within each block named MerkleRB-Tree. In detail, we leverage Minimal Bounding Rectangle(MBR) and bloom-filters for the query process of multi-dimensional continuous-valued attributes and discrete-valued attributes respectively. Furthermore, we migrate the idea of the skip list along with an MBR and a bloom filter at the head of each block to enhance the query efficiency for inter-blocks. The performance analysis and extensive evaluation results on the benchmark dataset demonstrate the superiority of our method in blockchain-based federated learning.

16:00
Kaixiang Hou (College of Intelligence and Computing, Tianjin University, Tianjin, China, China)
Tianyi Xu (College of Intelligence and Computing, Tianjin University, Tianjin, China, China)
Chao Xu (College of Intelligence and Computing, Tianjin University, Tianjin, China, China)
Xiaobo Zhou (College of Intelligence and Computing, Tianjin University, Tianjin, China, China)
Tie Qiu (College of Intelligence and Computing, Tianjin University, Tianjin, China, China)
Fengbiao Zan (The Computer College of Qinghai Minzu University, Qinghai, China, China)
A Prototype System for Blockchain Performance Evaluation

ABSTRACT. Due to complex blockchain programs and numerous blockchain nodes, it takes a huge amount of time and economic cost to conduct blockchain experiments. Existing open source projects do not support modifications to the underlying blockchain, and existing blockchain simulators only focus on a single blockchain system and cannot flexibly extend or replace models. Regarding the issue above, this paper proposes a prototype system for blockchain performance evaluation, including real deployment test and simulation test. In real deployment test, a five-layer architecture for building a lightweight and efficient testing system is proposed. And in simulation test, a general scheme for building blockchain simulator is proposed, which can realize the test of throughput, storage allocation and reputation management. Experiments show that the prototype system proposed in this paper can effectively improve the efficiency of blockchain performance evaluation.

16:15
Jiaxu Ding (Qilu University of Technology, China)
Biwei Yan (Qilu University of Technology, China)
Guijuan Wang (Qilu University of Technology, China)
Li Zhang (Qilu University of Technology, China)
Yubing Han (Qilu University of Technology, China)
Jiguo Yu (Qilu University of Technology, China)
Blockchain-aided Hierarchical Attribute-based Encryption for Data Sharing
PRESENTER: Jiaxu Ding

ABSTRACT. Ciphertext-policy attribute-based encryption (CP-ABE) is widely used in access control to achieve secure data sharing over different cloud platforms. However, most of the existing CP-ABE data sharing schemes perform one-time encryption on the shared data, which cannot satisfy the need for data sharing in the public cloud with complex users. In order to realize multi-user data sharing on blockchain and achieve hierarchical decryption of privacy data and shared data, we propose a blockchain-aided hierarchical and searchable attribute-based encryption scheme, named BC-HSABE. In BC-HSABE, we adopt a symmetric encryption algorithm to encrypt data in a hierarchical manner, and use attribute-based encryption technology to encrypt two hierarchical symmetric keys of the encrypted data file, and upload the ciphertext to the cloud server. In addition, data users can decrypt data ciphertext at different levels according to their hierarchical authority. Meanwhile, searching for keyword trapdoor through blockchain ensures the security of keyword ciphertext. The security analysis and experimental evaluations verify the feasibility and effectiveness of BC-HSABE.

16:30
Minghao Li (School of Computer Science, South China Normal University, China)
Gansen Zhao (School of Computer Science, South China Normal University, China)
Ruilin Lai (School of Computer Science, South China Normal University, China)
A Scalable Blockchain-based Trust management strategy for Vehicular Networks
PRESENTER: Minghao Li

ABSTRACT. In recent years, the dynamic environment on the Internet of Vehicles led vehicular communication networks' trust management mechanism to become a research hotspot. Most of the existing trust management in vehicular networks relies on a centralized third party. However, it causes trust management to be limited to a single node and has high requirements for device performance. In order to improve the reliability of information exchanged between vehicles, we propose a scalable blockchain-based trust management strategy, which employs vehicle-related objective factors to evaluate the credibility of information transmitted between vehicles to determine the vehicles' trust level. We also design a consensus mechanism to make all RSUs(Roadside Units) maintain a consistent and reliable distributed ledger as nodes so that vehicles can obtain global trust information more quickly during interaction to improve its reliability. The security and performance analysis shows that our strategy has high reliability and availability.

16:45
Di Jiang (Chongqing University, China)
Jiajun Chen (Chongqing University, China)
Chunqiang Hu (Chongqing University, China)
A Secure Task Matching Scheme in Crowdsourcing Based on Blockchain
PRESENTER: Di Jiang

ABSTRACT. As crowdsourcing continues to evolve, researchers have begun to explore task matching in crowdsourcing extensively. However, the privacy issues such as task content of publishers and ability or interest of worker in task matching are often overlooked. Also, the identity of the task publisher/worker needs to be protected. To address the above issues, we propose a secure task matching scheme in crowdsourcing based on blockchain in this paper. Firstly, we implement multi-publisher/multi-worker task matching in the scheme while protecting task content privacy. Meanwhile, we take advantage of the immutability of the blockchain to ensure the reliability of publishing/matching results. We utilize the smart contract for task publishing/matching without human intervention. Finally, the scheme is shown to be secure and feasible through theoretical and comprehensive performance evaluations.

17:00
Jianrong Wang (Tianjin University, China)
Haoran Sun (Tianjin University, China)
Tianyi Xu (Tianjin University, China)
Blockchain-based Secure and Efficient Federated Learning with Three-phase Consensus and Unknown Device Selection

ABSTRACT. Blockchain-based decentralized federated learning (BCFL) protects data privacy and avoids the single point of failure, which has become a key technology in the Intelligent Internet of Things application. However, the BCFL still be challenged by model attacks from malicious devices. In addition, the BCFL needs to select training devices from a large number of unknown candidate devices. Due to the training resources of devices being quite different, improper selection of unknown devices will lead to inefficient training. To address these issues, we consider two types of Byzantine model attacks and design "Proof of Model Quality"(PoMQ) to protect the security of BCFL. The PoMQ is a three-phase consensus algorithm, which combines the FedAvg and Multi-Krum algorithms to defend against model update attacks. The PoMQ is also based on the model verification process to resist model aggregation attacks. Moreover, we define the unknown device selection problem as a Combinatorial Multi-Armed Bandit problem (CMAB) to improve the training efficiency, and propose an online learning algorithm based on PoMQ consensus (OLAC) to solve CMAB. Finally, through analysis and extensive experiments, this paper proves that PoMQ and OLAC can better improve the robustness and training efficiency of BCFL.

17:15
Shiyuan Xu (North China University of Technology, China)
Xue Chen (North China University of Technology, China)
Yunhua He (North China University of Technology, China)
Yibo Cao (North China University of Technology, China)
Shang Gao (The Hong Kong Polytechnic University, China)
VMT: Secure VANETs Message Transmission Scheme with Encryption and Blockchain
PRESENTER: Shiyuan Xu

ABSTRACT. Vehicular ad-hoc network (VANET) is emerging as the most essential technology for securing traffic safety as well as enhancing traffic conditions. The confidentiality of messages transmitted in VANETs is of utmost priority, which has attracted extensive scholarly research. However, the security of the existing studied encryption schemes remains to be upgraded with a massy time overhead. Hence, we propose a lightweight encryption scheme for secure message transmission in VANET with a private blockchain. Firstly, the encryption scheme we designed, called SVM, ensures the confidentiality and forward security of messages, while the system is sound and amnesic so that we are not entirely dependent on external servers. Meanwhile, the private blockchain with high privacy-preserving and flexible read/write access assures that merely permitted users to access the message. Furthermore, our scheme achieves excellent lightweight, thus suitable for VANETs with huge messages. Security analysis indicates that our scheme has firmly secured the transmission of messages in VANETs. Performance evaluation demonstrates that our scheme is lightweight and efficient, with encryption and decryption times of 7.00ms and 7.67ms, respectively.