Technical Program of IPCCC 2019

Time Gunnell Suite Christie Room

Tuesday, October 29

08:00-08:30 Registration
08:30-09:00 Introduction  
09:00-10:00 Keynote: "5G & The Internet of Skills In Action"  
10:00-10:30 Coffee Break
10:30-12:00 1: Best Paper Candidates  
12:00-13:30 Lunch
13:30-15:30 2a: Big Data Processing and Analytics 2b: Computer Networks
15:30-16:00 Coffee Break
16:00-18:00 3a: Deep Learning 3b: Security - Hide and Seek
18:00-20:00 Reception with Posters (Atrium Lounge)

Wednesday, October 30

08:00-08:30 Registration
08:30-09:30 Keynote: "The many layers of delay requirements"  
09:30-10:00 Coffee Break
10:00-12:00 4a: Caching 4b: Security - Network Intrusion Detection
12:00-13:30 Lunch
13:30-15:30 5a: System Performance & Testbeds 5b: Security - What's going on?
15:30-16:00 Coffee Break
16:00-18:00 6a: Edge and Cloud 6b: Constructive Security

Thursday, October 31

08:30-10:00 7: Parallel and Distributed Systems  
10:00-10:30 Coffee Break
10:30-12:00 8: Machine Learning and beyond  

Tuesday, October 29

Tuesday, October 29 8:00 - 8:30

Registration

Tuesday, October 29 8:30 - 9:00

Introduction

Room: Gunnell Suite

Tuesday, October 29 9:00 - 10:00

Keynote: "5G & The Internet of Skills In Action"

Prof Mischa Dohler, King's College London
Room: Gunnell Suite

Abstract: Today's internet, accessed by fixed and mobile networks, allows us to transmit files, voice and video across the planet. With the emergence of an ultra-responsive and reliable ‘Tactile Internet,' advanced techniques in robotics and artificial intelligence, we predict the emergence of an ‘Internet of Skills' which allows the transmission of labor globally. It will invoke an important shift from content-delivery to skillset-delivery networks, where engineers would service cars or surgeons performing critical operations anywhere on the planet. For this to work, however, we require some fundamental laws of physics to be "reengineered." This keynote will discuss the vision, technology and building blocks for said emerging Internet of Skills. I will deep-dive into some of these building blocks, such as 5G and its ability to deliver ultra-low latency networking capabilities as well as open challenges from a compute and networking point of view.

Tuesday, October 29 10:00 - 10:30

Coffee Break

Tuesday, October 29 10:30 - 12:00

1: Best Paper Candidates

Room: Gunnell Suite
Chair: Mea Wang (University of Calgary, Canada)
10:30 Sphinx: A Transport Protocol for High-Speed and Lossy Mobile Networks
Junfeng Li, Dan Li and Wenfei Wu (Tsinghua University, P.R. China); K. K. Ramakrishnan (University of California, Riverside, USA); Jinkun Geng (Tsinghua University, P.R. China); Fei Gui (University of XiangTan, P.R. China); Fanzhao Wang and Kai Zheng (Huawei Technologies, P.R. China)
11:00 Using DCT-based Approximate Communication to Improve MPI Performance in Parallel Clusters
Qianqian Fan, David J. Lilja and Sachin Sapatnekar (University of Minnesota, USA)
11:30 Reliability, timeliness and load reduction at the edge for cloud gaming
Antonio Franco (Lund University, Sweden); Emma Fitzgerald (Lund University, Sweden & Warsaw University of Technology, Poland); Bjorn Landfeldt and Ulf Körner (Lund University, Sweden)

Tuesday, October 29 12:00 - 13:30

Lunch

Tuesday, October 29 13:30 - 15:30

2a: Big Data Processing and Analytics

Room: Gunnell Suite
Chair: Jan Bauer (University of Osnabrück & Institute of Computer Science, Germany)
13:30 ATuMm: Auto-tuning Memory Manager in Apache Spark
Danlin Jia (Northeastern University, USA); Janki Bhimani (Florida International University & Samsung Semiconductors, USA); Nam Nguyen and Bo Sheng (University of Massachusetts Boston, USA); Ningfang Mi (Northeastern University, USA)
14:00 Query Optimization Approach with Shuffle Intermediate Cache Layer for Spark SQL
Mingyu Zhai (NARI Technology, P.R. China); Aibo Song and Jingyi Qiu (Southeast University, P.R. China); Xuechun Ji and Qingxi Wu (NARI Technology, P.R. China)
14:30 Adaptive Differentially Private Data Stream Publishing in Spatio-temporal Monitoring of IoT
Teng Wang (Xian Jiaotong University, P.R. China); Xinyu Yang and Xuebin Ren (Xi'an Jiaotong University, P.R. China); Jun Zhao and Kwok-Yan Lam (Nanyang Technological University, Singapore)
15:00 ALEAP: Attention-based LSTM with Event Embedding for Attack Projection
Shuhan Fan, Songyun Wu, Zhiliang Wang, Li Zimu and Jiahai Yang (Tsinghua University, P.R. China); Heng Liu (China Electronics Cyberspace Great Wall Co., P.R. China); Xinran Liu (National Computer Network Emergency Response Technical Team, P.R. China)

2b: Computer Networks

Room: Christie Room
Chair: Elie Naim Inaty (University of Balamand, Lebanon)
13:30 Cooperative Fair Bandwidth Scaling in Contention-based Wireless Networks using Time Token Bucket
Christopher Kramer (TU Kaiserslautern, Germany); Reinhard Gotzhein and Kiran Mathews (University of Kaiserslautern, Germany)
14:00 QuickR: A Novel Routing Strategy for Wireless Mobile Information-centric Networks
Adita Abhay Kulkarni (State University of New York at Binghamton, USA); Anand Seetharam (SUNY Binghamton, USA)
14:30 Exploiting Social Network Characteristics for Efficient Routing in Ocean Vessel Ad Hoc Networks
Qihang Bing, Ruobing Jiang and Feng Hong (Ocean University of China, P.R. China)
15:00 Accelerating QUIC's Connection Establishment on High-Latency Access Networks
Erik Sy (Universität Hamburg, Germany); Tobias Mueller, Moritz Moennich and Hannes Federrath (University of Hamburg, Germany)
Short Paper
15:15 A Comprehensive Study of Accelerating IPv6 Deployment
Tianyu Cui (University of Chinese Academy of Science, P.R. China); Chang Liu (Institute of Information Engineering, Chinese Academy of Sciences, P.R. China); Gaopeng Gou and Junzheng Shi (Institute of Information Engineering,Chinese Academy of Sciences, P.R. China); Gang Xiong (Institute of Information Engineering, Chinese Academy of Sciences, P.R. China)
Short Paper

Tuesday, October 29 15:30 - 16:00

Coffee Break

Tuesday, October 29 16:00 - 18:00

3a: Deep Learning

Room: Gunnell Suite
Chair: Ningfang Mi (Northeastern University, USA)
16:00 Towards Industrial IoT-AR Systems using Deep Learning-Based Object Pose Estimation
Yongbin Sun and Sai Nithin Reddy Kantareddy (Massachusetts Institute of Technology, USA); Joshua Siegel (Michigan State University, USA); Alexandre Armengol-Urpi (MIT, USA); Xiaoyu Wu (Boston University, USA); Hongyu Wang (University of Miami, USA); Sanjay Sarma (MIT Auto-ID Center, USA)
16:30 A Deep Learning Approach to Dynamic Passive RTT Prediction Model for TCP
Desta Haileselassie Hagos (University of Oslo & Faculty of Mathematics and Natural Sciences, Norway); Paal E. Engelstad (Oslo and Akershus University College, University of Oslo/UNIK and FFI, Norway); Anis Yazidi (Oslo Metropolitan University, Norway); Carsten Griwodz (Simula Research Laboratory, Norway)
17:00 Topology-aware Sparse Allreduce for Large-scale Deep Learning
Truong Thao Nguyen (National Institute of Advanced Industrial Science and Technology (AIST), Japan); Mohamed Wahib (Advanced Institute for Computational Science, RIKEN, Japan); Ryousei Takano (National Institute of Advanced Industrial Science and Technology (AIST), Japan)
17:30 Energy and Delay Co-aware Computation Offloading with Deep Learning in Fog Computing Networks
Xi Zhu, Siguang Chen, Songle Chen and Geng Yang (Nanjing University of Posts and Telecommunications, P.R. China)
Short Paper

3b: Security - Hide and Seek

Room: Christie Room
Chair: Assia Tria (French Alternative Energies and Atomic Energy Commission, France)
16:00 Deanonymizing Tor in a Stealthy Way
Jianjun Lin (University of Chinese Academy of Sciences, P.R. China); Jianbo Gao and Zhenhao Wu (Peking University, P.R. China); Chengxiang Si and Bo Sun (CNCERT/CC, P.R. China)
16:30 Identify OS from Encrypted Traffic with TCP/IP Stack Fingerprinting
Xinlei Fan (University of Chinese Academy of Sciences, P.R. China); Gaopeng Gou (Institute of Information Engineering,Chinese Academy of Sciences, P.R. China); Cuicui Kang (Institute of Information Engineering, Chinese Academy of Sciences, P.R. China); Junzheng Shi (Institute of Information Engineering,Chinese Academy of Sciences, P.R. China); Gang Xiong (Institute of Information Engineering, Chinese Academy of Sciences, P.R. China)
17:00 A Byte-level CNN Method to Detect DNS Tunnels
Chang Liu and Liang Dai (Institute of Information Engineering, Chinese Academy of Sciences, P.R. China); Wenjing Cui (Institute of Information Engineering, Chinese Academy of Sciences & University of Chinese Academy of Sciences, P.R. China); Tao Lin (Institute of Information Engineering, Chinese Academy of Sciences, P.R. China)
17:30 VPGA: an SDN-based Location Privacy Zones Placement Scheme for Vehicular Networks
Abdelwahab Boualouache and Ridha Soua (University of Luxembourg, Luxembourg); Thomas Engel (University of Luxemburg, Luxembourg)
Short Paper
17:45 Trust-based Model with Protection Against RSU Attacks in Vehicular Networks
Aljawharah Alnasser (King Saud University, Saudi Arabia & Durham University, United Kingdom (Great Britain)); Hongjian Sun (Durham University, United Kingdom (Great Britain))
Short Paper

Tuesday, October 29 18:00 - 20:00

Reception with Posters (Atrium Lounge)

Chair: Jiangtao Wang (Lancaster University, United Kingdom (Great Britain))
A C++ Library for Tensor Decomposition
Jiapeng Huang and Linghe Kong (Shanghai Jiao Tong University, P.R. China); Xiao-Yang Liu (Columbia University, USA); Wenhao Qu and Guihai Chen (Shanghai Jiao Tong University, P.R. China)
IoT meets distributed AI - Deployment scenarios of Bonseyes AI applications on FIWARE
Lucien Moor, Lukas Bitter and Migurel De Prado (HE-Arc, Switzerland); Nuria Pazos and Nabil Ouerhani (Applied Science University Western Switzerland, Switzerland)
reZig: Decompose a Collision via Reference Waveform
Yifeng Cao, Zhe Wang, Linghe Kong and Guihai Chen (Shanghai Jiao Tong University, P.R. China)
Scheduling Dependent Tasks in Edge Networks
Mohammed Maray (University of Warwick & King Khalid University, United Kingdom (Great Britain)); Arshad Jhumka and Adam Chester (University of Warwick, United Kingdom (Great Britain)); Mohamed Younis (University of Maryland Baltimore County, USA)
CLR: A Classification of DNS Tunnel Based on Logistic Regression
Kemeng Wu (University of Chinese Academy of Science, P.R. China)
High-Precision Adaptive Slope Compensation Circuit for System-on-Chip Power Management
Hua Fan (University of Electronic Science and Technology of China, P.R. China)
Contract-network Protocol: An Efficient Communication Protocol for Distributed Ledger Technology
Yibin Xu (Cardiff Universty); Yangyu Huang (FZU, P.R. China)
CAN't - An ISOBUS Privacy Proxy for Collaborative Smart Farming
René Helmke (University of Osnabrück, Germany); Jan Bauer (University of Osnabrück & Institute of Computer Science, Germany); Alexander Bothe and Nils Aschenbruck (University of Osnabrück, Germany)
Mining Cross-platform User Behaviors for Demographic Attribute Inference
Haoran Xu, Yuqing Sun and Xiangjun Li (Shandong University, P.R. China)

Wednesday, October 30

Wednesday, October 30 8:00 - 8:30

Registration

Wednesday, October 30 8:30 - 9:30

Keynote: "The many layers of delay requirements"

Prof Carsten Griwodz, University of Oslo
Room: Gunnell Suite

Abstract: The term "distributed interactive application" today seems old-fashioned today since Cloudification has even turned humble word processing tasks into distributed interactive activities. Consequently, the property of being both interactive and distributed is frequently forgotten to the detriment of end users, who experience a lack of performance. Among gamers, the term "lag" has been coined for this, a catch-all phrase for all problems that end users experience as delay while interacting with an application.

The simplified term can hide excessive round-trip times, but it could also hide bandwidth limitations, processing delays or virtualisation overhead. In fact, any attempt at dealing with delay does first require that we understand the multitude of delays that can affect experience. Applications may be affected negatively by startup delays, rebuffering delays, rendering delays, processing delays, per-byte latency or load finishing time. The relevant kind of delay is application-specific, while the impact on user experience is application- as well as context-specific.

Research and development are continuously working to make improvements to all layers that make up distributed systems. Proposals for new generic architectures or architectural changes, can easily focus on a few of these faces of delay, satisfying a set of applications, while forgetting others that are equally valid .

The keynote attempts to bring structure to the many views on delay. We structure delay demands of applications by the kind of delay that matters to them and provide an insight into user experience studies for several of them. From there, we cast light onto recent and ongoing infrastructure developments, especially at the network and transport layer, and discuss their potential for fulfilling delay requirements.

Wednesday, October 30 9:30 - 10:00

Coffee Break

Wednesday, October 30 10:00 - 12:00

4a: Caching

Room: Gunnell Suite
Chair: Yu Wang (Temple University, USA)
10:00 GPUs Cache Performance Estimation using Reuse Distance Analysis
Yehia Arafa (NMSU, USA); Gopinath Chennupati (Los Alamos National Laboratory, USA); Atanu Barai and Abdel-Hameed A Badawy (New Mexico State University, USA); Nandakishore Santhi and Stephan Eidenbenz (Los Alamos National Laboratory, USA)
10:30 Emulate Processing of Assorted Database Server Applications on Flash-Based Storage in Datacenter Infrastructures
Janki Bhimani (Florida International University & Samsung Semiconductors, USA); Rajinikanth Pandurangan (Samsung, USA); Ningfang Mi (Northeastern University, USA); Vijay Balakrishnan (Samsung, USA)
11:00 Data Heat Prediction in Storage Systems Using Behavior Specific Prediction Models
Lu Pang, Anis Alazzawe and Krishna Kant (Temple University, USA); Jeremy Swift (Dell EMC Inc., USA)
11:30 An Almost-zero Latency Lightweight Mechanism for Caching Decision in ICN Content Router
Yang Qifeng (UCAS & Institute of Acoustics of Chinese Academy of Sciences, P.R. China); Yiqiang Sheng (Chinese Academy of Sciences, P.R. China)

4b: Security - Network Intrusion Detection

Room: Christie Room
Chair: Nils Aschenbruck (University of Osnabrück, Germany)
10:00 Efficient Attack Correlation and Identification of Attack Scenarios based on Network-Motifs
Steffen Haas (University Hamburg, Germany); Florian Wilkens (Universität Hamburg, Germany); Mathias Fischer (University Hamburg, Germany)
10:30 A New C&C Channel Detection Framework Using Heuristic Rule and Transfer Learning
Jianguo Jiang, Qilei Yin, Zhixin Shi, Meimei Li and Bin Lv (Institute of Information Engineering, Chinese Academy of Sciences, P.R. China)
11:00 Autonomous Detection of Synchronization Attacks in the Industrial Internet Of Things
Meriem Smache (CEA, France); Alexis Olivereau (CEA, LIST, France); Thibault Franco-Rondisson (CEA, France); Assia Tria (French Alternative Energies and Atomic Energy Commission, France)
11:30 Exploiting temperature-varied ECU fingerprints for source identification in in-vehicle network intrusion detection
Miaoqing Tian, Ruobing Jiang, Chaoqun Xing, Haipeng Qu, Qian Lu and Xiaoyun Zhou (Ocean University of China, P.R. China)

Wednesday, October 30 12:00 - 13:30

Lunch

Wednesday, October 30 13:30 - 15:30

5a: System Performance & Testbeds

Room: Gunnell Suite
Chair: Stephan Eidenbenz (Los Alamos National Laboratory, USA)
13:30 Quantitative Analysis of Mobile Application User Interface Design
Zexun Jiang and Hao Yin (Tsinghua University, P.R. China); Yan Luo (University of Massachusetts Lowell, USA); Jiaying Gong (Virginia Polytechnic and State University, USA); Yuannan Yang (Johns Hopkins University, USA); Manshan Lin (Northwestern University, USA)
14:00 An Efficient Greybox Fuzzing Scheme for Linux-based IoT Programs Through Binary Static Analysis
Yaowen Zheng (School of Cyber Security, University of Chinese Academy of Sciences, P.R. China); Zhanwei Song and Yuyan Sun (Institute of Information Engineering, Chinese Academy of Sciences, P.R. China); Kai Cheng (School of Cyber Security, University of Chinese Academy of Sciences, P.R. China); Hongsong Zhu (Institute of Information Engineering, Chinese Academy of Sciences, P.R. China); Limin Sun (Institute of Information Engineering, China Academy of Science, Beijing, P.R. China)
14:30 piFogBed: A Fog Computing Testbed Based on Raspberry Pi
Qiaozhi Xu (Inner Mongolia University & Inner Mongolia Normal University, P.R. China); Junxing Zhang (Inner Mongolia University, P.R. China)
Short Paper
14:45 Mimic: Fast Recovery from Data Corruption Errors in Stencil Computations
Anis Alazzawe and Krishna Kant (Temple University, USA)
Short Paper
15:00 Integration of Temporal Contextual Information for Robust Energy Disaggregation
Pascal Alexander Schirmer and Iosif Mporas (University of Hertfordshire, United Kingdom (Great Britain))
Short Paper

5b: Security - What's going on?

Room: Christie Room
Chair: Shijie Jia (Institute of Information Engineering, Chinese Academy of Sciences, P.R. China)
13:30 I Know What You Are Doing With Remote Desktop
Minghao Jiang (Institute of Information Engineering, CAS & University of Chinese Academy of Sciences, P.R. China); Gaopeng Gou and Junzheng Shi (Institute of Information Engineering,Chinese Academy of Sciences, P.R. China); Gang Xiong (Institute of Information Engineering, Chinese Academy of Sciences, P.R. China)
14:00 A Method Based on Hierarchical Spatiotemporal Features for Trojan Traffic Detection
Jiang Xie (Chinese Academy of Sciences University, P.R. China); Shuhao Li and Yongzheng Zhang (Institute of Information Engineering, Chinese Academy of Sciences, P.R. China); Xiaochun Yun (CNCERT/CC, P.R. China); Jia Li (Institute of Information Engineering, Chinese Academy of Sciences, P.R. China)
14:30 Side-Channel Information Leakage of Traffic Data in Instant Messaging
Ke Li (University of Chinese Academy of Sciences, School of Cyber Security, P.R. China); Hong Li and Hongsong Zhu (Institute of Information Engineering, Chinese Academy of Sciences, P.R. China); Limin Sun (Institute of Information Engineering, China Academy of Science, Beijing, P.R. China); Hui Wen (Institute of Information Engineering, China Academy of Science, P.R. China)
15:00 On Effects of Mobility Management Signalling Based DoS Attacks Against LTE Terminals
Chuan Yu and Shuhui Chen (National University of Defense Technology, P.R. China)

Wednesday, October 30 15:30 - 16:00

Coffee Break

Wednesday, October 30 16:00 - 18:00

6a: Edge and Cloud

Room: Gunnell Suite
Chair: Martina Cilia (Hitachi, Ltd. Research & Development Group, Japan)
16:00 Cost Efficient Internet Path Tracking Based on Routing Changes Prediction
Yujia Liu (Institute for Network Sciences and Cyberspace, Tsinghua University, P.R. China); Changqing An (Tsinghua University, P.R. China)
16:30 Jily: Cost-Aware AutoScaling of Heterogeneous GPU for DNN Inference in Public Cloud
Zhaoxing Wang, Xuehai Tang, Qiuyang Liu and Jizhong Han (Institute of Information Engineering, Chinese Academy of Sciences, P.R. China)
17:00 Rendering Scheduling Framework in Edge Computing: A Congestion Game-based Approach
Bing Zhou and Hongqi Yang (Sun Yat-sen University, P.R. China)
Short Paper
17:15 F2MC: Enhancing Data Storage Services with Fog-to-MultiCloud Hybrid Computing
Yinjin Fu and Xiaofeng Qiu (Army Engineering University, P.R. China); Jian Wang (Nanjing University, P.R. China)
Short Paper
17:30 Improving Latency and Jitter Performance in CDMA-Based Next-Generation Ethernet Passive Optical Networks for 5G Applications
Robert Joseph Raad and Elie Naim Inaty (University of Balamand, Lebanon); Martin Maier (Institut National de la Recherche Scientifique (INRS), Canada)
Short Paper

6b: Constructive Security

Room: Christie Room
Chair: Neil Nelson (Samsung, USA)
16:00 A Blockchain-Based Authentication Method with One-Time Password
Mingli Zhang, Liming Wang and Jing Yang (Institute of Information Engineering, Chinese Academy of Sciences, P.R. China)
16:30 VoteGeo: An IoT-based Voting Approach to Verify the Geographic Location of Cloud Hosts
Dongzheng Jia (State Key Laboratory of Information Security, Institute of Information Engineering, CAS, P.R. China); Limin Liu, Shijie Jia and Jingqiang Lin (Institute of Information Engineering, Chinese Academy of Sciences, P.R. China)
17:00 Hiding and Trapping: A Deceptive Approach for Defending against Network Reconnaissance with Software-Defined Network
Junchi Xing, Mingliang Yang and Haifeng Zhou (Zhejiang University, P.R. China); Chunming Wu (College of Computer Science, Zhejiang University, P.R. China); Wei Ruan (Zhejiang University, P.R. China)
17:30 A Stochastic based Physical Layer Security in CRNs: Cognitive Relay to Fusion Center
Oluyomi Simpson and Yichuang Sun (University of Hertfordshire, United Kingdom (Great Britain))
Short Paper
17:45 Placement optimization of IoT security solutions for edge computing based on graph theory
Tanguy Godquin (GREYC & Orange Labs, France); Morgan Barbier (ENSICAEN - GREYC, France); Chrystel Gaber (Orange Labs, France); Jean-marie Le Bars (Universite de Caen Basse-Normandie, France); Jean-Luc Grimault (Orange Labs, France)
Short Paper

Thursday, October 31

Thursday, October 31 8:30 - 10:00

7: Parallel and Distributed Systems

Room: Gunnell Suite
Chair: Ruobing Jiang (Ocean University of China, P.R. China)
8:30 Developing the Parallelization Methods for Finding the All-Pairs Shortest Paths in Distributed Memory Architecture
Mohammed Alghamdi, Ligang He, Yujue Zhou and Junyu Li (University of Warwick, United Kingdom (Great Britain))
9:00 LT Codes with Feedback: Accelerate the Distributed Matrix-Vector Multiplication with Stragglers
Xiao Yang (Southeast Universuty, P.R. China); Ming Jiang (Southeast University, P.R. China); Chunming Zhao (National Mobile Communications Research Laboratory, Southeast University, P.R. China)
9:30 Intelligent IoT Sensing System Based on Compressive Sensing with Adaptively Learned Dictionary
Martina Cilia (Hitachi, Ltd. Research & Development Group, Japan); Keisuke Yamamoto (Hitachi, Ltd., Japan)
Short Paper
9:45 Automatic Data Quality Enhancement with Expert Knowledge for Mobile Crowdsensing
Jinghan Jiang, Kui Wu and Huan Wang (University of Victoria, Canada); Rong Zheng (McMaster University, Canada)
Short Paper

Thursday, October 31 10:00 - 10:30

Coffee Break

Thursday, October 31 10:30 - 12:00

8: Machine Learning and beyond

Room: Gunnell Suite
Chair: Kui Wu (University of Victoria, Canada)
10:30 Uncovering Flaming Events on News Media in Social Media
Praboda Rajapaksha (Telecom SudParis & Uva Wellassa University, France); Reza Farahbakhsh (Institut Mines-Telecom, Telecom SudParis, France); Noel Crespi (Institut Mines-Télécom, Télécom SudParis, France); Bruno Defude (Institut Mines-Telecom, Telecom SudParis, France)
11:00 Malicious Domain Detection via Domain Relationship and Graph Models
Wenxuan He (University of Chinese Academy of Sciences, P.R. China)
11:30 HS-TCN: A Semi-supervised Hierarchical Stacking Temporal Convolutional Network for Anomaly Detection in IoT
Yan Xu and Yongliang Cheng (Anhui University, P.R. China); Yi Liu (Peking University Shenzhen Institute, P.R. China); Hong Zhong (School of Computer Science and Technology, Anhui University, P.R. China)
Short Paper
11:45 Typification of Impersonated Accounts on Instagram
Koosha Zarei (Institut Polytechnique de Paris, Telecom SudParis, France); Reza Farahbakhsh (Institut Mines-Telecom, Telecom SudParis, France); Noel Crespi (Institut Mines-Télécom, Télécom SudParis, France)
Short Paper