IEEE International Conference on Computer Communications
15-19 April 2018 // Honolulu, HI // USA

Accepted Paper List [Main Conference]

List of Accepted Papers in IEEE INFOCOM 2018 Main Conference

Papers are listed as “Seq”,  “Title” and “Authors with affiliation and country”

  1. FML: Fast Machine Learning for 5G mmWave Vehicular Communications   
    Gek Hong Sim (TU-Darmstadt, Germany); Sabrina Müller (Technische Universität Darmstadt, Germany); Arash Asadi and Anja Klein (TU Darmstadt, Germany); Matthias Hollick (Technische Universität Darmstadt & Secure Mobile Networking Lab, Germany)
  2. InstantCryptoGram: Secure Image Retrieval Service              
    Minghui Li, Mingxue Zhang and Qian Wang (Wuhan University, P.R. China); Sherman S. M. Chow (The Chinese University of Hong Kong, Hong Kong); Minxin Du (Wuhan University, P.R. China); Yanjiao Chen (State Key Lab of Software Engineering, Wuhan University, P.R. China); Chenliang Li (State Key Lab of Software Engineering, Computer School, Wuhan University, P.R. China)
  3. An Analysis and Empirical Study of Container Networks      
    Kun Suo and Yong Zhao (The University of Texas at Arlington, USA); Wei Chen (University of Colorado, Colorado Springs, USA); Jia Rao (The University of Texas at Arlington, USA)
  4. Highly Compact Virtual Active Counters for Per-flow Traffic Measurement
    You Zhou (University of Florida, USA); Yian Zhou (Google Inc., USA); Shigang Chen and Youlin Zhang (University of Florida, USA)
  5. Towards Personalized Task Matching in Mobile Crowdsensing via Fine-Grained User Profiling
    Shuo Yang, Kunyan Han and Zhenzhe Zheng (Shanghai Jiao Tong University, P.R. China); Shaojie Tang (University of Texas at Dallas, USA); Fan Wu (Shanghai Jiao Tong University, P.R. China)
  6. Joint VNF Placement and CPU Allocation in 5G        
    Satyam Agarwal (IIT Guwahati, India); Francesco Malandrino and Carla-Fabiana Chiasserini (Politecnico di Torino, Italy); Swades De (Indian Institute of Technology Delhi, India)
  7. Multi-Touch in the Air: Device-Free Finger Tracking and Gesture Recognition via COTS RFID             
    Chuyu Wang (Nanjing University, P.R. China); Jian Liu (WINLAB, Rutgers University, USA); Yingying Chen (Rutgers University, USA); Hongbo Liu (Indiana University-Purdue University Indianapolis, USA); Lei Xie, Wei Wang, Bingbing He and Sanglu Lu (Nanjing University, P.R. China)
  8. Trio: Utilizing Tag Interference for Refined Localization of Passive RFID       
    Han Ding and Jinsong Han (Xi'an Jiaotong University, P.R. China); Chen Qian (University of California at Santa Cruz, USA); Fu Xiao (Nanjing University of Posts and Telecommunications, P.R. China); Ge Wang (Xi‘an Jiaotong University, P.R. China); Nan Yang and Wei Xi (Xi'an Jiaotong University, P.R. China); Jian Xiao (Chang'an University, P.R. China)
  9. Following the Shadow: Agile 3-D Beam-Steering for 60 GHz Wireless Networks      
    Anfu Zhou, Leilei Wu, Shaoqing Xu and Huadong Ma (Beijing University of Posts and Telecommunications, P.R. China); Teng Wei (University of Wisconsin - Madison, USA); Xinyu Zhang (University of Wisconsin-Madison, USA)
  10. RF-Dial: an RFID-based 2D Human-Computer Interaction via Tag Array         
    Yanling Bu, Lei Xie, Yinyin Gong and Chuyu Wang (Nanjing University, P.R. China); Lei Yang (The Hong Kong Polytechnic University, Hong Kong); Jia Liu and Sanglu Lu (Nanjing University, P.R. China)
  11. Scheduling Coflows of Multi-stage Jobs to Minimize the Total Weighted Job Completion Time       
    Bingchuan Tian and Chen Tian (Nanjing University, P.R. China); Haipeng Dai (Nanjing University & State Key Laboratory for Novel Software Technology, P.R. China); Bingquan Wang (Nanjing University, P.R. China)
  12. Towards Repeatable Wireless Network Simulation Using Performance Aware Markov Model         
    Zhiwei Zhao (University of Electronic Science and Technology of China, P.R. China); Wei Dong (Zhejiang University, P.R. China); Geyong Min (University of Exeter, United Kingdom (Great Britain)); Gonglong Chen (Zhejiang University, P.R. China); Tao Gu (RMIT University, Australia); Jiajun Bu (Zhejiang University, P.R. China)
  13. Social Network De-anonymization with Overlapping Communities: Analysis, Algorithm and Experiments  
    Xinyu Wu, Zhongzhao Hu, Xinzhe Fu and Luoyi Fu (Shanghai Jiao Tong University, P.R. China); Xinbing Wang (Shanghai Jiaotong University, P.R. China); Songwu Lu (University of California at Los Angeles, USA)
  14. Who to Connect to? Joint Recommendations in Cross-layer Social Networks            
    Jiaqi Liu, Qi Lian and Luoyi Fu (Shanghai Jiao Tong University, P.R. China); Xinbing Wang (Shanghai Jiaotong University, P.R. China)
  15. Leveraging Endpoint Flexibility When Scheduling Coflows across Geo-distributed Datacenters       
    Wenxin Li (Dalian University of Technology, P.R. China); Xu Yuan (University of Louisiana at Lafayette, USA); Keqiu Li (Tianjin University, P.R. China); Heng Qi (Dalian University of Technology, P.R. China); Xiaobo Zhou (Tianjin University, P.R. China)
  16. Building Generic Scalable Middlebox Services over Encrypted Protocols     
    Cong Liu and Yong Cui (Tsinghua University, P.R. China); Kun Tan (Microosft Research Asia, P.R. China); Quan Fan (Tsinghua University, P.R. China); Kui Ren (State University of New York at Buffalo, USA); Jianping Wu (Tsinghua University, P.R. China)
  17. Smart-U: Smart Utensils Know What You Eat            
    Qianyi Huang (Hong Kong University of Science and Technology, Hong Kong); Zhice Yang (ShanghaiTech University, P.R. China); Qian Zhang (Hong Kong University of Science and Technology, Hong Kong)
  18. The Death and Rebirth of Privacy-Preserving Wifi Fingerprint Localization with Paillier Encryption
    Zheng Yang and Kimmo Järvinen (University of Helsinki, Finland)
  19. Deep Diving into Africa's Inter-Country Latencies   
    Agustin Formoso (LACNIC, Uruguay); Josiah Chavula (AFRINIC Ltd, South Africa); Amreesh Phokeer (University of Cape Town, South Africa & AFRINIC, Mauritius); Arjuna Sathiaseelan (University of Cambridge, United Kingdom (Great Britain)); Gareth Tyson (Queen Mary, University of London, United Kingdom (Great Britain))
  20. FlowCloak: Defeating Middlebox-Bypass Attacks in Software-Defined Networking               
    Kai Bu, Yutian Yang and Zixuan Guo (Zhejiang University, P.R. China); Yuanyuan Yang (Stony Brook University, USA); Xing Li (Zhejiang University, P.R. China); Shigeng Zhang (Central South University, P.R. China)
  21. Mining Long-Term Stealthy User Behaviors on High Speed Links     
    Pinghui Wang, Peng Jia and Jing Tao (Xi'an Jiaotong University, P.R. China); Xiaohong Guan (Xi’an Jiaotong University & Tsinghua University, P.R. China)
  22. Joint Placement and Routing of Network Function Chains in Data Centers  
    Linqi Guo and John Z. F. Pang (California Institute of Technology, USA); Anwar Walid (Nokia Bell Labs, USA)
  23. Robustly Safe Charging for Wireless Power Transfer             
    Haipeng Dai (Nanjing University & State Key Laboratory for Novel Software Technology, P.R. China); Yang Zhao (Nanjing University, P.R. China); Guihai Chen (Shanghai Jiao Tong University, P.R. China); Wanchun Dou and Chen Tian (Nanjing University, P.R. China); Xiaobing Wu (University of Canterbury, New Zealand); Tian He (University of Minnesota, USA)
  24. Steering Crowdsourced Signal Map Construction via Bayesian Compressive Sensing             
    Suining He (The Hong Kong University of Science and Technology, P.R. China); Kang Shin (University of Michigan, USA)
  25. Stable Combinatorial Spectrum Matching   
    Yanjiao Chen (State Key Lab of Software Engineering, Wuhan University, P.R. China); Long Lin, Guiyan Cao and Zhenzhong Chen (Wuhan University, P.R. China); Baochun Li (University of Toronto, Canada)
  26. Rainbow: Preventing Mobile-Camera-based Piracy in the Physical World   
    Lin Yang (Hong Kong University of Science and Technology, Hong Kong); Wei Wang (Huazhong University of Science and Technology, P.R. China); Zeyu Wang and Qian Zhang (Hong Kong University of Science and Technology, Hong Kong)
  27. CrowdBuy: Privacy-friendly Image Dataset Purchasing via Crowdsourcing   
    Lan Zhang, Yannan Li, Xiang Xiao and Xiang-Yang Li (University of Science and Technology of China, P.R. China); Junjun Wang (University Of Science And Technology Of China, P.R. China); Anxin Zhou and Qiang Li (University of Science and Technology of China, P.R. China)
  28. Joint Service Caching and Task Offloading for Mobile Edge Computing in Dense Networks 
    Jie Xu and Lixing Chen (University of Miami, USA); Pan Zhou (Huazhong University of Science and Technology, P.R. China)
  29. Application Provisioning in Fog Computing-enabled Internet-of-Things: A Network Perspective    
    Ruozhou Yu, Guoliang Xue and Xiang Zhang (Arizona State University, USA)
  30. ViTrack: Efficient Tracking on the Edge for Commodity Video Surveillance Systems               
    Cheng LinSong and Jiliang Wang (Tsinghua University, P.R. China)
  31. You Can Drop but You Can't Hide: K-persistent Spread Estimation in High-speed Networks               
    He Huang and Yu-e Sun (Soochow University, P.R. China); Shao-Jie Tang (University of Texas at Dallas, USA); Shigang Chen (University of Florida, USA); Kai Han (University of Science and Technology of China, P.R. China); Jing Yuan (University of Texas at Dallas, USA); Wenjian Yang (Soochow University, P.R. China)
  32. Walls Have Ears: Traffic-based Side-channel Attack in Video Streaming       
    Jiaxi Gu (Northwestern Polytechnical University, P.R. China); Jiliang Wang (Tsinghua University, P.R. China); Zhiwen Yu (Northwestern Polytechnical University, P.R. China); Kele Shen (Tsinghua University, P.R. China)
  33. CoDrive: Improving Automobile Positioning via Collaborative Driving          
    Soteris Demetriou (University of Illinois at Urbana-Champaign, USA); Puneet Jain (Hewlett Packard Labs, USA); Kyu-Han Kim (Hewlett-Packard Laboratories, USA)
  34. A Light-weight Approach to Obtaining NF State Information in SDN+NFV Networks               
    Bing Leng and Liusheng Huang (University of Science and Technology of China, P.R. China); Chunming Qiao (University at Buffalo, USA); Hongli Xu (University of Science and Technology of China, P.R. China)
  35. MobiRate: Mobility-Aware Rate Adaptation Using PHY Information for Backscatter Networks         
    Wei Gong, Si Chen and Jiangchuan Liu (Simon Fraser University, Canada); Zhi Wang (Tsinghua University, P.R. China)
  36. RED: RFID-based Eccentricity Detection for High-speed Rotating Machinery              
    Yilun Zheng and Yuan He (Tsinghua University, P.R. China); Meng Jin (Northwest University, P.R. China); Xiaolong Zheng (Tsinghua University, P.R. China); Yunhao Liu (Tsinghua University & The Hong Kong University of Science and Technology, P.R. China)
  37. ZigFi: Harnessing Channel State Information for Cross-Technology Communication               
    Xiuzhen Guo, Yuan He and Xiaolong Zheng (Tsinghua University, P.R. China); Liangcheng Yu (KTH Royal Institute of Technology, Sweden); Omprakash Gnawali (University of Houston, USA)
  38. One-Hop Out-of-Band Control Planes for Low-Power Multi-Hop Wireless Networks            
    Chaojie Gu and Rui Tan (Nanyang Technological University, Singapore); Xin Lou (Advanced Digital Sciences Centre, Singapore); Dusit Niyato (Nanyang Technological University, Singapore)
  39. Preventing Unauthorized Access on Passive Tags
    Han Ding and Jinsong Han (Xi'an Jiaotong University, P.R. China); Yanyong Zhang (Rutgers University, USA); Fu Xiao (Nanjing University of Posts and Telecommunications, P.R. China); Wei Xi (Xi'an Jiaotong University, P.R. China); Ge Wang (Xi‘an Jiaotong University, P.R. China); Zhiping Jiang (Xian Jiaotong University, P.R. China)
  40. Range Queries for Sensor-augmented RFID Systems             
    Xiulong Liu and Jiannong Cao (Hong Kong Polytechnical University, Hong Kong); Keqiu Li (Tianjin University, P.R. China); Jia Liu (Nanjing University, P.R. China); Xin Xie (Dalian University of Technology, P.R. China)
  41. Wi-Fi Teeter-Totter: Overclocking OFDM for Internet of Things       
    Wei Wang and Shiyue He (Huazhong University of Science and Technology, P.R. China); Lin Yang and Qian Zhang (Hong Kong University of Science and Technology, Hong Kong); Tao Jiang (Huazhong University of Science and Technology, P.R. China)
  42. CORA: Conflict Razor for Policies in SDN      
    Hao Li and Kaiyue Chen (Xi'an Jiaotong University, P.R. China); Tian Pan (Beijing University of Posts and Telecommunications, P.R. China); Yadong Zhou (Xian Jiaotong University, P.R. China); Kun Qian (Tsinghua University, P.R. China); Kai Zheng (2012 Labs, Huawei Technologies, P.R. China); Bin Liu (Tsinghua University, P.R. China); Peng Zhang (Xi'an Jiaotong University, P.R. China); Yazhe Tang (Xi'an JiaoTong University, P.R. China); Chengchen Hu (Xi'an Jiaotong University, P.R. China)
  43. Fast OpenFlow Table Lookup with Fast Update        
    Tong Yang (Peking University, P.R. China); Alex X. Liu (Michigan State University, USA); Yulong Shen (Xidian University, P.R. China); Qiaobin Fu (Boston University, USA); Dagang Li and XiaoMing Li (Peking University, P.R. China)
  44. Vernier: Accurate and Fast Acoustic Motion Tracking Using Mobile Devices               
    Yunting Zhang, Jiliang Wang, Weiyi Wang and Zhao Wang (Tsinghua University, P.R. China); Yunhao Liu (Tsinghua University & The Hong Kong University of Science and Technology, P.R. China)
  45. Aegis: An Interference-Negligible RF Sensing Shield             
    Yao Yao (University of Maryland Baltimore County, USA); Yan Li (UMBC and JHU, USA); Xin Liu (University of Maryland, USA); Zicheng Chi (University of Maryland, Baltimore County, USA); Wei Wang (University of Maryland, USA); Tiantian Xie and Ting Zhu (University of Maryland, Baltimore County, USA)
  46. Host Profit Maximization for Competitive Viral Marketing in Billion-Scale Networks            
    Yuqing Zhu (California State University, Los Angeles, USA); Deying Li (Renmin University of China, P.R. China)
  47. ECT: Exploiting Cross-Technology Concurrent Transmission for Reducing Packet Delivery Delay in IoT Networks   
    Wei Wang (University of Maryland, USA); Tiantian Xie (University of Maryland, Baltimore County, USA); Xin Liu (University of Maryland, USA); Ting Zhu (University of Maryland, Baltimore County, USA)
  48. Network Measurement in Multihop Wireless Networks with Lossy and Correlated Links    
    Chenhong Cao (Zhejiang University, P.R. China); Wei Gong (Simon Fraser University, Canada); Wei Dong (Zhejiang University, P.R. China); Jihong Yu (Simon Fraser University, Canada); Chun Chen (Zhejiang University, P.R. China); Jiangchuan Liu (Simon Fraser University, Canada)
  49. Searching an Encrypted Cloud Meets Blockchain: A Decentralized, Reliable and Fair Realization     
    Shengshan Hu (Wuhan University, P.R. China); Chengjun Cai (City University of Hong Kong, Hong Kong); Qian Wang (Wuhan University, P.R. China); Cong Wang (City University of Hong Kong, Hong Kong); Luo Xiangyang (Zhengzhou Information Science and Technology Institute, P.R. China); Kui Ren (State University of New York at Buffalo, USA)
  50. Proactive Video Push for Optimizing Bandwidth Consumption in Hybrid CDN-P2P VoD Systems      
    Yuanxing Zhang (School of EECS, Peking University, P.R. China); Chengliang Gao, Yangze Guo and Kaigui Bian (Peking University, P.R. China); Xin Jin (Johns Hopkins University, USA); Zhi Yang and Lingyang Song (Peking University, P.R. China); Jiangang Cheng and Hu Tuo (IQIYI Science & Technology Co., Ltd., P.R. China); XiaoMing Li (Peking University, P.R. China)
  51. InPrivate Digging: Enabling Tree-based Distributed Data Mining with Differential Privacy  
    Lingchen Zhao, Lihao Ni and Shengshan Hu (Wuhan University, P.R. China); Yanjiao Chen (State Key Lab of Software Engineering, Wuhan University, P.R. China); Pan Zhou (Huazhong University of Science and Technology, P.R. China); Fu Xiao (Nanjing University of Posts and Telecommunications, P.R. China); Libing Wu (Wuhan University, P.R. China)
  52. Paid Peering, Settlement-Free Peering, or Both?
    Xin Wang and Yinlong Xu (University of Science and Technology of China, P.R. China); Richard T. B. Ma (National University of Singapore, Singapore)
  53. Virtual Network Reconfiguration with Load Balancing and Migration Cost Considerations  
    Lingnan Gao and George N. Rouskas (North Carolina State University, USA)
  54. SecTap: Secure Back of Device Input System for Mobile Devices      
    Zhen Ling, Luo Junzhou, Yaowen Liu and Ming Yang (Southeast University, P.R. China); Kui Wu (University of Victoria, Canada); Xinwen Fu (University of Central Florida, USA)
  55. RETRO: retrorefelctor based visible light indoor localization for real-time tracking of IoT devices   
    Sihua Shao and Abdallah A Khreishah (New Jersey Institute of Technology, USA); Issa M Khalil (Qatar Computing Research Institute & Qatar Foundation, Qatar)
  56. Towards Privacy-Preserving Speech Data Publishing             
    Jianwei Qian (Illinois Institute of Technology, USA); Feng Han (University of Science and Technology of China, P.R. China); Jiahui Hou (Illinois Institute of Technology, USA); Chunhong Zhang (Beijing University of Posts & Telecommunication, P.R. China); Yu Wang (University of North Carolina at Charlotte, USA); Xiang-Yang Li (University of Science and Technology of China, P.R. China)
  57. Chase++: Fountain-Enabled Fast Flooding in Asynchronous Duty Cycle Networks   
    Zhichao Cao and Jiliang Wang (Tsinghua University, P.R. China); Daibo Liu (University of Electronic Science and Technology of China, P.R. China); Xin Miao, Qiang Ma and Xufei Mao (Tsinghua University, P.R. China)
  58. Online Job Scheduling in Distributed Machine Learning Clusters     
    Yixin Bao, Yanghua Peng and Chuan Wu (The University of Hong Kong, Hong Kong); Zongpeng Li (University of Calgary, Canada)
  59. CoINT: Proactive Coordinator for Avoiding the Interruptability Holder Preemption Problem in VSMP Environment            
    Wang Zhang, Xiaokang Hu, Jian Li and Haibing Guan (Shanghai Jiao Tong University, P.R. China)
  60. Spectral Graph Forge: Graph Generation Targeting Modularity        
    Luca Baldesi (University of Trento, Italy); Carter T Butts and Athina Markopoulou (University of California, Irvine, USA)
  61. DR-Cache: Distributed Resilient Caching with Latency Guarantees 
    Jian Li (University of Massachusetts Amherst, USA); Truong Khoa Phan (University College London, United Kingdom (Great Britain)); Wei Koong Chai (Bournemouth University, United Kingdom (Great Britain)); Daphne Tuncer, George Pavlou, David Griffin and Miguel Rio (University College London, United Kingdom (Great Britain))
  62. Large-scale Wireless Fingerprints Prediction for Cellular Network Positioning         
    Xinyu Wu and Xiaohua Tian (Shanghai Jiao Tong University, P.R. China); Xinbing Wang (Shanghai Jiaotong University, P.R. China)
  63. TwinBee: Reliable Physical-Layer Cross-Technology Communication with Symbol-Level Coding      
    Yongrui Chen (University of Chinese Academy of Sciences, P.R. China); Zhijun Li (Institute of Technology Harbin, P.R. China); Tian He (University of Minnesota, USA)
  64. Analyzing replacement policies in list-based caches with non-uniform access costs               
    Giuliano Casale (Imperial College London, United Kingdom (Great Britain))
  65. LongBee: Enabling Long-Range Cross-Technology Communication 
    Zhijun Li (Institute of Technology Harbin, P.R. China); Tian He (University of Minnesota, USA)
  66. Dynamic Task Assignment in Crowdsensing with Location Awareness and Location Diversity            
    Xiong Wang (Shanghai Jiao Tong University, P.R. China); Riheng Jia (Shanghai Jiaotong University, P.R. China); Xiaohua Tian and Xiaoying Gan (Shanghai Jiao Tong University, P.R. China)
  67. A Constrained Maximum Likelihood Estimator for Unguided Social Sensing              
    Huajie Shao (University of Illinois at Urbana-Champaign, USA); Shuochao Yao (University of Illinois Urbana-Champaign, USA); Yiran Zhao (University of Illinois at Urbana–Champaign, USA); Chao Zhang (University of Illinois at Urbana-Champaign, USA); Jinda Han (University of Illinois at Urbana Champaign, USA); Lance Kaplan (US Army Research Laboratory, USA); Lu Su (State University of New York at Buffalo, USA); Tarek Abdelzaher (University of Illinois, Urbana Champaign, USA)
  68. Enabling Work-conserving Bandwidth Guarantees for Multi-tenant Datacenters via Dynamic Tenant-Queue Binding       
    Zhuotao Liu (Google Inc. & University of Illinois at Urbana-Champaign, USA); Kai Chen (Hong Kong University of Science and Technology, P.R. China); Haitao Wu (Google, USA); Shuihai Hu (The Hong Kong University of Science and Technology, P.R. China); Yih-Chun Hu (University of Illinois at Urbana-Champaign, USA); Yi Wang (Tsinghua University, P.R. China); Gong Zhang (Huawei Research, P.R. China)
  69. Deep User Modeling for Content-based Event Recommendation in Event-based Social Networks  
    Zhibo Wang and Yongquan Zhang (Wuhan University, P.R. China); Honglong Chen (China University of Petroleum, P.R. China); Zhetao Li (Xiangtan University, P.R. China); Feng Xia (Dalian University of Technology, P.R. China)
  70. Coverage in Battery-Free Wireless Sensor Networks            
    Tuo Shi and Jianzhong Li (Harbin Institute of Technology, P.R. China); Hong Gao (University of Harbin Institute Technology, P.R. China); Zhipeng Cai (Georgia State University, USA)
  71. Efficient Beam Alignment in Millimeter Wave Systems Using Contextual Bandits  
    Morteza Hashemi, Ness B. Shroff and Can Emre Koksal (The Ohio State University, USA); Ashutosh Sabharwal (Rice University, USA)
  72. CCOMPASSION: A Hybrid Cloudlet Placement Framework over Passive Optical Access Network     
    Sourav Mondal (The University of Melbourne, Australia); Goutam Das (IIT Kharagpur, India); Elaine Wong (The University of Melbourne, Australia)
  73. The Cloud that Runs the Mobile Internet    
    Foivos Michelinakis (IMDEA Networks Institute, Spain); Hossein Doroud (Universidad Carlos III de Madrid, Spain); Abbas Razaghpanah (Stony Brook University, USA); Andra Lutu (Simula Research Laboratory, Norway); Narseo Vallina-Rodriguez (ICSI-Berkeley, USA); Phillipa Gill (University of Massachusetts -- Amherst, USA); Joerg Widmer (IMDEA Networks Institute, Spain)
  74. Polynomial-Time What-If Analysis for Prefix-Manipulating MPLS Networks              
    Stefan Schmid and Jiri Srba (Aalborg University, Denmark)
  75. Energy-Collision Aware Data Aggregation Scheduling for Energy Harvesting Sensor Networks          
    Quan Chen (Harbin Institute of Technology, P.R. China); Hong Gao (University of Harbin Institute Technology, P.R. China); Zhipeng Cai (Georgia State University, USA); Cheng Liang lun (Guangdong University of Technology, P.R. China); Jianzhong Li (Harbin Institute of Technology, P.R. China)
  76. Anonymous Temporal-Spatial Joint Estimation at Category Level over Multiple Tag Sets     
    Youlin Zhang, Shigang Chen, You Zhou and Yuguang Fang (University of Florida, USA)
  77. Finding Persistent Items in Distributed Datasets     
    Haipeng Dai (Nanjing University & State Key Laboratory for Novel Software Technology, P.R. China); Meng Li (Nanjing University, P.R. China); Alex X. Liu (Michigan State University, USA)
  78. Blind, Adaptive and Robust Flow Segmentation in Datacenters        
    Francesco De Pellegrini (Fondazione Bruno Kessler (FBK), Italy); Lorenzo Maggi (Huawei Technologies, France Research Center, France); Antonio Massaro (CREATE-NET, Italy); Damien Saucez (Inria, France); Jeremie Leguay (Huawei Technologies, France Research Center, France); Eitan Altman (INRIA, France)
  79. Continuous time opinion dynamics of agents with multi-leveled opinions and binary actions          
    Vineeth S Varma (CRAN & CNRS, France); Yezekael Hayel (LIA, University of Avignon, France); Iriniel-Constantin Morarescu (CRAN, Université de Lorraine, France)
  80. Graph based Tensor Recovery For Accurate Internet Anomaly Detection     
    Kun Xie (State University of New York at Stony Brook, USA); Xiaocan Li (Stony Brook University, New York, USA); Xin Wang (Stony Brook University, USA); Gaogang Xie (Institute of Computing Technology, Chinese Academy of Sciences, P.R. China); Jigang Wen (Chinese Academy of Science & Institute of Computing Technology, P.R. China); Dafang Zhang (Hunan University, P.R. China)
  81. When Edge Meets Learning: Adaptive Control for Resource-Constrained Distributed Machine Learning     
    Shiqiang Wang (IBM T. J. Watson Research Center, USA); Tiffany Tuor (Imperial College London, United Kingdom (Great Britain)); Theodoros Salonidis (IBM Research, USA); Kin K. Leung (Imperial College, United Kingdom (Great Britain)); Christian Makaya (IBM T. J. Watson Research Center, USA); Ting He (Penn State University, USA); Kevin S Chan (US Army Research Laboratory, USA)
  82. EyeLight: Light-based Occupancy Estimation and Activity Recognition from Shadows on the Floor  
    Viet Nguyen (WINLAB, Rutgers University, USA); Mohamed Ibrahim (Rutgers University, USA); Siddharth Rupavatharam and Minitha Jawahar (WINLAB, Rutgers University, USA); Marco Gruteser and Richard Howard (Rutgers University, USA)
  83. Bidirectional Active Learning with Human Training Based on Gold Instance Sampling           
    Liang Qiao, Feilong Tang and Jiacheng Liu (Shanghai Jiao Tong University, P.R. China)
  84. A Hierarchical Synchronous Parallel Model for Wide-Area Graph Analytics
    Shuhao Liu, Li Chen, Baochun Li and Aiden Carnegie (University of Toronto, Canada)
  85. Designing Optimal Middlebox Recovery Schemes with Performance Guarantees   
    Yossi Kanizo (Tel-Hai College, Israel); Ori Rottenstreich (Princeton University, USA); Itai Segall (Bell Labs Israel, Israel); Jose Yallouz (Technion - Israel Institute of Technology, Israel)
  86. Predictive Pre-allocation for Low-latency Uplink Access in Industrial Wireless Networks    
    Mingyan Li, Xinping Guan, Cunqing Hua, Cailian Chen and Ling Lyu (Shanghai Jiao Tong University, P.R. China)
  87. Bloom Filter with a False Positive Free Zone             
    Sándor Kiss, Éva Hosszu and János Tapolcai (Budapest University of Technology and Economics, Hungary); Lajos Rónyai (Budapest University of Technology and Economics (BME), Hungary); Ori Rottenstreich (Princeton University, USA)
  88. A Tractable Stochastic Model of Correlated Link Failures Caused by Disasters           
    János Tapolcai and Balázs Vass (Budapest University of Technology and Economics, Hungary); Zalan Heszberger (Budapest University of Technology and Ec., Hungary); Jozsef Biro (Budapest University of Technology and Economics, Hungary); David Hay (The Hebrew University of Jerusalem, Israel); Fernando A. Kuipers (Delft University of Technology, The Netherlands); Lajos Rónyai (Budapest University of Technology and Economics (BME), Hungary)
  89. Placement of Connected Wireless Chargers              
    Nan Yu and Haipeng Dai (Nanjing University & State Key Laboratory for Novel Software Technology, P.R. China); Alex X. Liu (Michigan State University, USA); Bingchuan Tian (Nanjing University, P.R. China)
  90. Distributed Trip Selection Game for Public Bike System with Crowdsourcing            
    Jianhui Zhang, Pengqian Lu, Zhi Li and Jiayu Gan (Hangzhou Dianzi University, P.R. China)
  91. Pay for a Sliding Bloom Filter and Get Counting, Distinct Elements, and Entropy for Free
    Eran Assaf (Hebrew University, Israel); Ran Ben Basat (Technion, Israel); Gil Einziger (Nokia Bell labs, Israel); Roy Friedman (Technion, Israel)
  92. Analysis of Hybrid Geographic/Delay-Tolerant Routing Protocols for Wireless Mobile Networks    
    Riccardo Cavallari (DEI - University of Bologna, Italy); Stavros Toumpis (Research Center - Athens University of Economics and Business, Greece); Roberto Verdone (University of Bologna, Italy)
  93. PrivSet: Set-Valued Data Analyses with Local Differential Privacy   
    Shaowei Wang, Liusheng Huang, Yiwen Nie, Pengzhan Wang, Hongli Xu and Wei Yang (University of Science and Technology of China, P.R. China)
  94. Hybrid Circuit/Packet Network Scheduling with Multiple Composite Paths               
    Shih-Hao Tseng (Cornell University, USA); Bo Bai (Huawei Technologies Co., Ltd., Hong Kong); John Chi Shing Lui (Chinese University of Hong Kong, Hong Kong)
  95. Optimal cache leasing from a mobile network operator to a content provider          
    Jonatan Krolikowski (L2S - University Paris-Saclay, France); Anastasios Giovanidis (UPMC Sorbonne Universités & CNRS, France); Marco Di Renzo (Paris-Saclay University / CNRS, France)
  96. Non-Interactive Privacy-Preserving Truth Discovery in Crowd Sensing Applications               
    Xiaoting Tang and Cong Wang (City University of Hong Kong, Hong Kong); Xingliang Yuan (Monash University, Australia); Qian Wang (Wuhan University, P.R. China)
  97. Communication-Driven Localization and Mapping for Millimeter Wave Networks
    Joan Palacios (IMDEA Networks Institute, Spain); Guillermo Bielsa (IMDEA Networks Institute & Universidad Carlos III de Madrid, Spain); Paolo Casari and Joerg Widmer (IMDEA Networks Institute, Spain)
  98. NeuroViNE: A Neural Preprocessor for Your Virtual Network Embedding Algorithm              
    Andreas Blenk (Technische Universität München, Germany); Patrick Kalmbach (Technical University of Munich, Germany); Johannes Zerwas (Technische Universität München, Germany); Michael Jarschel (Nokia Bell Labs, Germany); Stefan Schmid (Aalborg University, Denmark); Wolfgang Kellerer (Technische Universität München, Germany)
  99. Self-Adapting Quorum-Based Neighbor Discovery in Wireless Sensor Networks     
    Hao Cai (University of Massachusetts, Amherst, USA); Tilman Wolf (University of Massachusetts, USA)
  100. Robust Multi-stage Power Grid Operations with Energy Storage     
    Yihan Zou, Xiaojun Lin and Dionysios Aliprantis (Purdue University, USA); Minghua Chen (The Chinese University of Hong Kong, P.R. China)
  101. Robust Spinning Sensing with Dual-RFID-Tags in Noisy Settings       
    Chunhui Duan (Tsinghua University, P.R. China); Lei Yang (The Hong Kong Polytechnic University, Hong Kong); Huanyu Jia and Qiongzheng Lin (Tsinghua University, P.R. China); Yunhao Liu (Tsinghua University & The Hong Kong University of Science and Technology, P.R. China); Lei Xie (Nanjing University, P.R. China)
  102. mTS: Temporal- and Spatial-Collaborative Charging for Wireless Rechargeable Sensor Networks with Multiple Vehicles     
    Chi Lin and Zhiyuan Wang (Dalian University of Technology, P.R. China); Jing Deng (University of North Carolina at Greensboro, USA); Lei Wang, Jiankang Ren and Wu Guowei (Dalian University of Technology, P.R. China)
  103. Experience-driven Networking: A Deep Reinforcement Learning based Approach  
    Zhiyuan Xu, Jian Tang and Jingsong Meng (Syracuse University, USA); Weiyi Zhang (AT&T Research, USA); Yanzhi Wang (Syracuse University, USA); Chi Harold Liu (Beijing Institute of Technology, P.R. China); Dejun Yang (Colorado School of Mines, USA)
  104. COBRA: Toward Provably Efficient Semi-clairvoyant Scheduling in Data Analytics Systems
    Xiaoda Zhang, Zhuzhong Qian, Sheng Zhang, Xiangbo Li, Xiaoliang Wang and Sanglu Lu (Nanjing University, P.R. China)
  105. Barista: An Event-centric NOS Composition Framework for Software-Defined Networks     
    Jaehyun Nam and Hyeonseong Jo (KAIST, Korea); Yeonkeun Kim (Korea Advanced Institute of Science and Technology (KAIST), Korea); Phillip A Porras and Vinod Yegneswaran (SRI International, USA); Seungwon Shin (KAIST, Korea)
  106. On Achieving Zero Delay with Power-of-d-Choices Load Balancing 
    Xin Liu and Lei Ying (Arizona State University, USA)
  107. RECONN: Receiver-Driven Operating Channel Width Adaptation in IEEE 802.11ac WLANs   
    Seongho Byeon, Hwijae Kwon, Youngwook Son, Changmok Yang and Sunghyun Choi (Seoul National University, Korea)
  108. Load Balancing across Microservices             
    Yipei Niu (Huazhong University of Science & Technology, P.R. China); Fangming Liu (Huazhong University of Science and Technology, P.R. China); Zongpeng Li (University of Calgary, Canada)
  109. Combating Bufferbloat in Multi-Bottleneck Networks: Equilibrium, Stability, andAlgorithms           
    Jiancheng Ye and Ka-Cheong Leung (The University of Hong Kong, Hong Kong); Victor O. K. Li (University of Hong Kong, P.R. China); Steven Low (California Institute of Technology, USA)
  110. Optimal Joint Routing and Scheduling in Millimeter-Wave Cellular Networks          
    Dingwen Yuan (Technische Universität Darmstadt, Germany); Hsuan-Yin Lin (Simula Research Laboratory, Norway); Joerg Widmer (IMDEA Networks Institute, Spain); Matthias Hollick (Technische Universität Darmstadt & Secure Mobile Networking Lab, Germany)
  111. Toward Optimal Storage Scaling via Network Coding: From Theory to Practice          
    Xiaoyang Zhang and Yuchong Hu (Huazhong University of Science and Technology, P.R. China); Patrick Pak-Ching Lee (The Chinese University of Hong Kong, Hong Kong); Pan Zhou (Huazhong University of Science and Technology, P.R. China)
  112. Enabling Cross-technology Communication between LTE Unlicensed and WiFi        
    Piotr Gawłowicz and Anatolij Zubow (Technische Universität Berlin, Germany); Adam Wolisz (TUB, Germany)
  113. Indoor Localization Using Commercial Off-The-Shelf 60 GHz Access Points
    Guillermo Bielsa (IMDEA Networks Institute & Universidad Carlos III de Madrid, Spain); Joan Palacios and Adrian Loch (IMDEA Networks Institute, Spain); Daniel Steinmetzer (Technische Universität Darmstadt, Germany); Paolo Casari and Joerg Widmer (IMDEA Networks Institute, Spain)
  114. Proactive Incast Congestion Control in a Datacenter Serving Web Applications        
    Haoyu Wang and Haiying Shen (University of Virginia, USA); Yuhua Lin (Clemson University, USA)
  115. Adaptive VNF Scaling and Flow Routing with Proactive Demand Prediction               
    Xincai Fei (Huazhong University of Science & Technology, P.R. China); Fangming Liu (Huazhong University of Science and Technology, P.R. China); Hong Xu (City University of Hong Kong, Hong Kong); Hai Jin (Huazhong University of Science and Technology, P.R. China)
  116. Information Freshness over an Interference Channel: A Game Theoretic View        
    Gam Nguyen, Sastry Kompella and Clement Kam (Naval Research Laboratory, USA); Jeffrey Wieselthier (Wieselthier Research, USA); Anthony Ephremides (University of Maryland, USA)
  117. A Simple Model of MTC in Smart Factories 
    Paolo Castagno (University of Turin & University of Turin, Italy); Vincenzo Mancuso (IMDEA Networks Institute, Spain); Matteo Sereno (University of Torino, Italy); Marco G Ajmone Marsan (Politecnico di Torino & IMDEA Networks, Italy)
  118. Closed form expressions for the performance metrics of data services in cellular networks               
    Vincenzo Mancuso (IMDEA Networks Institute, Spain); Paolo Castagno (University of Turin & University of Turin, Italy); Matteo Sereno (University of Torino, Italy); Marco G Ajmone Marsan (Politecnico di Torino & IMDEA Networks, Italy)
  119. Demystifying the Performance Interference of Co-located Virtual Network Functions         
    Chaobing Zeng, Fangming Liu, Shutong Chen, Weixiang Jiang and Miao Li (Huazhong University of Science and Technology, P.R. China)
  120. Monitoring LED Lights with Current Signatures         
    Johnny Verhoeff (TUDelft, The Netherlands); Akshay Uttama Nambi (Microsoft Research, India); Marco Zuniga (Delft University of Technology, The Netherlands); Bontor Humala (TUDelft, The Netherlands)
  121. Optimizing Age of Information in Wireless Networks with Throughput Constraints               
    Igor Kadota and Abhishek Sinha (Massachusetts Institute of Technology, USA); Eytan Modiano (MIT, USA)
  122. Real-time Video Quality of Experience Monitoring for HTTPS and QUIC      
    M. Hammad Mazhar and M. Zubair Shafiq (University of Iowa, USA)
  123. Competitive Online Convex Optimization with Switching Costs and Ramp Constraints         
    Ming Shi, Xiaojun Lin and Sonia Fahmy (Purdue University, USA); Dong-Hoon Shin (AT&T Labs, USA)
  124. AirVIEW: Unsupervised transmitter detection for next generation spectrum sensing           
    Mariya Zheleva, Petko Bogdanov and Timothy Larock (UAlbany SUNY, USA); Paul Schmitt (Princeton Unversity, USA)
  125. Dynamic, Latency-Optimal vNF Placement at the Network Edge      
    Richard Cziva, Christos Anagnostopoulos and Dimitrios P Pezaros (University of Glasgow, United Kingdom (Great Britain))
  126. Online Energy Management in IoT Applications      
    Ali Sehati and Majid Ghaderi (University of Calgary, Canada)
  127. An Online Learning Approach to Network Application Optimization with Guarantee             
    Kechao Cai, Xutong Liu and Yu-Zhen Janice Chen (The Chinese University of Hong Kong, Hong Kong); John Chi Shing Lui (Chinese University of Hong Kong, Hong Kong)
  128. QuickCast: Improving the Performance of Inter-DC Transfers using Forwarding Tree Cohorts            
    Mohammad Noormohammadpour and Cauligi Raghavendra (University of Southern California, USA); Srikanth Kandula (Microsoft Research, USA); Sriram Rao (Microsoft, USA)
  129. A Tale of Two Metrics in Network Delay Optimization          
    Qingyu Liu (Virginia Tech, USA); Lei Deng (The Chinese University of Hong Kong, Hong Kong); Haibo Zeng (Virginia Tech, USA); Minghua Chen (The Chinese University of Hong Kong, P.R. China)
  130. On the Privacy Implications of Email Tracking           
    Haitao Xu (Northwestern University, USA); Shuai Hao (University of Delaware & College of William and Mary, USA); Alparslan Sari and Haining Wang (University of Delaware, USA)
  131. Optimal Demand-Aware Ride-Sharing Routing         
    Qiulin Lin and Lei Deng (The Chinese University of Hong Kong, Hong Kong); Jingzhou Sun (Tsinghua University, P.R. China); Minghua Chen (The Chinese University of Hong Kong, P.R. China)
  132. Spectrum Patrolling with Crowdsourced Spectrum Sensors
    Ayon Chakraborty (Stony Brook University, USA); Arani Bhattacharya (Stony Brook University, USA & SUNY Korea, Korea); Samir R. Das (Stony Brook University, USA); Snigdha Kamal (Delhi Technological University, India); Himanshu Gupta and Petar M. Djurić (Stony Brook University, USA)
  133. Online Multicast Traffic Engineering for Software-Defined Networks           
    Sheng-Hao Chiang and Jian-Jhih Kuo (Academia Sinica, Taiwan); Shan-Hsiang Shen (National Taiwan University of Science and Technology, Taiwan); De-Nian Yang and Wen-Tsuen Chen (Academia Sinica, Taiwan)
  134. Quantifying Graph Anonymity, Utility, and De-anonymity  
    Shouling Ji (Zhejiang University, P.R. China & Georgia Institute of Technology, USA); Tianyu Du (Zhejiang University, P.R. China); Zhen Hong (Zhejiang Sci-Tech University, P.R. China); Ting Wang (Lehigh University, USA); Raheem Beyah (Georgia Institute of Technology, USA)
  135. CAPS: Coding-based Adaptive Packet Spraying to Reduce Flow Completion Time in Data Center     
    Jinbin Hu, Jiawei Huang, Wenjun Lv, Yutao Zhou and Jianxin Wang (Central South University, P.R. China); Tian He (University of Minnesota, USA)
  136. On the Optimal Monitor Placement for Inferring Additive Metrics of Interested Paths         
    Rongwei Yang (University of Science and Technology of China & City University of Hong Kong, P.R. China); Cuiying Feng (University of Victoria, Canada); Luning Wang (City University of Hong Kong, Hong Kong); Weiwei Wu (Southeast University, P.R. China); Kui Wu (University of Victoria, Canada); Jianping Wang (City University of Hong Kong, Hong Kong); Yinlong Xu (University of Science and Technology of China, P.R. China)
  137. Fast Beeping Protocols for Deterministic MIS and ( $\Delta+1$ )-Coloring in Sparse Graphs               
    Joffroy Beauquier, Janna Burman and Fabien Dufoulon (LRI, CNRS UMR 8623, Université Paris-Sud, Université Paris-Saclay, Orsay, France.); Shay Kutten (Technion, Israel)
  138. Market Your Venue with Mobile Applications: Collaboration of Online and Offline Businesses       
    Haoran Yu (The Chinese University of Hong Kong, Hong Kong); George Iosifidis (Trinity College Dublin, Ireland); Biying Shou (City University of Hong Kong, Hong Kong); Jianwei Huang (The Chinese University of Hong Kong, Hong Kong)
  139. Service Entity Placement for Social Virtual Reality Applications in Edge Computing               
    Lin Wang (TU Darmstadt, Germany); Lei Jiao (University of Oregon, USA); Ting He (Penn State University, USA); Jun Li (University of Oregon, USA); Max Mühlhäuser (TU-Darmstadt, Germany)
  140. Collaborative Uploading in Heterogeneous Networks: Optimal and Adaptive Strategies     
    Wasiur R. KhudaBukhsh, Bastian Alt, Sounak Kar, Amr Rizk and Heinz Koeppl (Technische Universität Darmstadt, Germany)
  141. Motion-Fi: Recognizing and Counting Repetitive Motions with Passive Wireless Backscattering     
    Ning Xiao and Panlong Yang (University of Science and Technology of China, P.R. China); Yubo Yan (PLA University of Science and Technology, P.R. China); Hao Zhou and Xiang-Yang Li (University of Science and Technology of China, P.R. China)
  142. On the Distributed Computation of Load Centrality and Its Application to DV Routing           
    Leonardo Maccari, Lorenzo Ghiro, Alessio Guerrieri, Alberto Montresor and Renato Lo Cigno (University of Trento, Italy)
  143. Distributed Joint AP Grouping and User Association for MU-MIMO Networks          
    Wangkit Wong (The Hong Kong University of Science and Technology, Hong Kong); S.-H. Gary Chan (The Hong Kong University of Science and Technology, P.R. China)
  144. Occupation-Oblivious Pricing of Cloud Jobs via Online Learning      
    Xiaoxi Zhang and Chuan Wu (The University of Hong Kong, Hong Kong); Zhiyi Huang (University of Hong Kong, USA); Zongpeng Li (University of Calgary, Canada)
  145. Online Knapsack Problem under Expected Capacity Constraint        
    Rahul Vaze (TIFR Mumbai, India)
  146. REARGUARD: Secure Keyword Search Using Trusted Hardware        
    Wenhai Sun and Ruide Zhang (Virginia Tech, USA); Wenjing Lou (Virginia Tech & National Science Foundation, USA); Thomas Hou (Virginia Tech, USA)
  147. Traffic Engineering with Precomputed Pathbooks  
    Mathieu Leconte (Huawei Technologies, France); Apostolos Destounis (Huawei Technologies France Research Center, France); Georgios S. Paschos (Huawei Technologies, France)
  148. Joint Scheduling of URLLC and eMBB Traffic in 5G Wireless Networks          
    Arjun Anand (The University of Texas, Austin, USA); Gustavo de Veciana and Sanjay Shakkottai (The University of Texas at Austin, USA)
  149. Linear Block Coding for Efficient Beam Discovery in Millimeter Wave Communication Networks    
    Yahia Shabara, Can Emre Koksal and Eylem Ekici (The Ohio State University, USA)
  150. High Throughput Low Delay Wireless Multicast via Multi-Channel Moving Window Codes
    Fei Wu (The Ohio State University, USA); Yin Sun (Auburn University, USA); Lu Chen (The Ohio State University, USA); Jiaqi Xu (the Ohio State University, USA); Kannan Srinivasan and Ness B. Shroff (The Ohio State University, USA)
  151. Exact Implementation of Abstract MAC Layer via Carrier Sensing    
    Dongxiao Yu (Huazhong University of Science and Technology, P.R. China); Yong Zhang (University of Hong Kong, Hong Kong); Yuyao Huang and Hai Jin (Huazhong University of Science and Technology, P.R. China); Jiguo Yu (Qufu Normal University, P.R. China); Qiang-Sheng Hua (Huazhong University of Science and Technology, P.R. China)
  152. MV-Sports: A Motion and Vision Sensor Integration-Based Sports Analysis System
    Cheng Zhang (The Ohio State University, USA); Fan Yang and Gang Li (the Ohio State University, USA); Qiang Zhai (Shanghai DeepCode Robotics, P.R. China); Yi Jiang (Shanghai DeepCode Robotics Co., Ltd., P.R. China); Dong Xuan (The Ohio State University, USA)
  153. Maximizing Profit of Cloud Service Brokerage with Economic Demand Response    
    Ting Deng, Jianguo Yao and Haibing Guan (Shanghai Jiao Tong University, P.R. China)
  154. Can We Learn What People Are Doing from Raw DNS Queries?       
    Jianfeng Li (Xi'an Jiaotong University, P.R. China); Xiaobo Ma (Xi'an Jiaotong University & The Hong Kong Polytechnic University, P.R. China); Li Guodong (Xi'an Jiaotong University, P.R. China); Xiapu Luo (The Hong Kong Polytechnic University, Hong Kong); Junjie Zhang (Wright State University, USA); Wei Li (Xi'an JiaoTong University, P.R. China); Xiaohong Guan (Xi’an Jiaotong University & Tsinghua University, P.R. China)
  155. Talking When No One is Listening: Piggybacking City-scale IoT Control Signals Over LTE      
    Kunal Sankhe, Ufuk Muncuk, M. Yousof Naderi and Kaushik Chowdhury (Northeastern University, USA)
  156. Learning Aided Optimization for Energy Harvesting Devices with Outdated State Information         
    Hao Yu and Michael J. Neely (University of Southern California, USA)
  157. MOVI: A Model-Free Approach to Dynamic Fleet Management       
    Takuma Oda (DeNA Co., Ltd., USA); Carlee Joe-Wong (Carnegie Mellon University, USA)
  158. Pricing for Revenue Maximization in Inter-DataCenter Networks
    Zhenzhe Zheng (Shanghai Jiao Tong University, P.R. China); R. Srikant (University of Illinois at Urbana-Champaign, USA); Guihai Chen (Shanghai Jiao Tong University, P.R. China)
  159. Fast and Reliable Tag Search in Large-Scale RFID Systems: A Probabilistic Tree-based Approach       
    Jihong Yu, Wei Gong and Jiangchuan Liu (Simon Fraser University, Canada); Lin Chen (The University of Paris-Sud, France)
  160. Performance-Aware Fair Scheduling: Exploiting Demand Elasticity of Data Analytics Jobs   
    Chen Chen, Wei Wang and Bo Li (Hong Kong University of Science and Technology, Hong Kong)
  161. WordRecorder: Accurate Acoustic-based Handwriting Recognition Using Deep Learning    
    Haishi Du (University of Science and Technology of China, P.R. China); Ping Li (PLA University of Sicence and Technology, P.R. China); Hao Zhou (University of Science and Technology of China, P.R. China); Wei Gong (Simon Fraser University, Canada); Gan Luo (PLA University of Science and Technology, P.R. China); Panlong Yang (University of Science and Technology of China, P.R. China)
  162. AppDNA: App Behavior Profiling via Graph-based Deep Learning   
    Shuangshuang Xue, Lan Zhang, Anran Li, Xiang-Yang Li, Chaoyi Ruan and Wenchao Huang (University of Science and Technology of China, P.R. China)
  163. Squeezing the Gap: An Empirical Study on DHCP Performance in a Large-scale Wireless Network  
    Haibo Wang (TsingHua University, P.R. China); Jilong Wang, Weizhen Dang, JingAn Xue and Fenghua Li (Tsinghua University, P.R. China)
  164. SEAF: A Secure, Efficient and Accountable Access Control Framework for Information Centric Networking 
    Kaiping Xue, Xiang Zhang and Qiudong Xia (University of Science and Technology of China, P.R. China); David Wei (Fordham University, USA); Hao Yue (San Francisco State University, USA); Feng Wu (University of Science and Technology of China, P.R. China)
  165. Cooperative Content Transmission for Vehicular Ad Hoc Networks using Robust Optimization        
    Daxin Tian and Jianshan Zhou (Beihang University, P.R. China); Min Chen (Huazhong University of Science and Technology, P.R. China); Zhengguo Sheng (University of Sussex, United Kingdom (Great Britain)); Qiang Ni (Lancaster University, United Kingdom (Great Britain)); Victor C.M. Leung (University of British Columbia, Canada)
  166. Acousticcardiogram: Monitoring Heartbeats using Acoustic Signals on Smart Devices           
    Kun Qian and Chenshu Wu (Tsinghua University, P.R. China); Fu Xiao (Nanjing University of Posts and Telecommunications, P.R. China); Yue Zheng, Yi Zhang and Zheng Yang (Tsinghua University, P.R. China)
  167. Utopia: Near-optimal Coflow Scheduling with Isolation Guarantee               
    Luping Wang, Wei Wang and Bo Li (Hong Kong University of Science and Technology, Hong Kong)
  168. Lightweight Retransmission for Random Access in Satellite Networks          
    Jing Chen, Feilong Tang and Heteng Zhang (Shanghai Jiao Tong University, P.R. China); Laurence T. Yang (St. Francis Xavier University, Canada)
  169. Optimal Activation Rates in Ultra-Dense Wireless Networks with Intermittent Traffic Sources         
    Fabio Cecchi, Sem Borst and Johan van Leeuwaarden (Eindhoven University of Technology, The Netherlands); Philip Whiting (Macquarie University, Australia)
  170. Finding the Stars in the Fireworks: Deep Understanding of Motion Sensor Fingerprint         
    Huiqi Liu, Xiang-Yang Li, Lan Zhang, Yaochen Xie, Zhenan Wu and Qian Dai (University of Science and Technology of China, P.R. China); Ge Chen and Chunxiao Wan (Tencent OMG AdTech, P.R. China)
  171. Accelerating Mobile Applications at the Network Edge with Software-Programmable FPGAs           
    Shuang Jiang (Peking University, P.R. China); Dong He and Chenxi Yang (Fudan University, P.R. China); Chenren Xu and Guojie Luo (Peking University, P.R. China); Yang Chen (Fudan University, P.R. China); Yunlu Liu (Beihang University, P.R. China); Jiangwei Jiang (Alibaba Inc., P.R. China)
  172. Full-duplex Metamaterial-enabled Magnetic Induction Networks in Extreme Environments            
    Hongzhi Guo (State University of New York at Buffalo, USA; University of Southern Maine, USA); Zhi Sun (State University of New York at Buffalo, USA)
  173. Optimizing NFV Chain Deployment Through Minimizing the Cost of Virtual Switching          
    Yaniv Sa'ar (Nokia Bell Labs, Israel); Danny Raz (Nokia and Technion, Israel); Marcelo Caggiani Luizelli (Federal University of Pampa, Brazil)
  174. EPSMD: An Efficient Privacy-Preserving Sensor Data Monitoring and Online Diagnosis System         
    Xiangyu Wang, Jian-feng Ma, Yinbin Miao, Ruikang Yang and Yijia Chang (Xidian University, P.R. China)
  175. From Uncertain Photos to Certain Coverage: a Novel Photo Selection Approach to Mobile Crowdsensing  
    Tongqing Zhou (National University of Defense Technology, P.R. China); Bin Xiao (The Hong Kong Polytechnic University, Hong Kong); Zhiping Cai and Ming Xu (National University of Defense Technology, P.R. China); Xuan Liu (Hunan University, P.R. China)
  176. IoT Communication Sharing: Scenarios, Algorithms and Implementation    
    Chuang Hu (The Hong Kong Polytechnic University, Hong Kong); Wei Bao (The University of Sydney, Australia); Dan Wang (The Hong Kong Polytechnic University, Hong Kong)
  177. VeriTable: Fast Equivalence Verification of Multiple Large Forwarding Tables          
    Garegin Grigoryan, Yaoqing Liu and Michael Leczinsky (Clarkson University, USA); Jun Li (University of Oregon, USA)
  178. SECProv: Trustworthy and Efficient Provenance Management in the Cloud
    Shams Zawoad, Ragib Hasan and Kamrul Islam (University of Alabama at Birmingham, USA)
  179. When UAVs ride a bus: Towards energy-efficient city-scale video surveillance        
    Angelo Trotta (University of Bologna, Italy); Fabio D'Andreagiovanni (CNRS, Sorbonne University - UTC, France); Marco Di Felice (University of Bologna, Italy); Enrico Natalizio (Université de Technologie de Compiègne, France); Kaushik Chowdhury (Northeastern University, USA)
  180. High-Order Momentum: Improving Latency and Convergence for Wireless Network Optimization
    Jia Liu (Iowa State University, USA)
  181. TruSense: Information Leakage from TrustZone       
    Ning Zhang (Virginia Tech & Raytheon Company, USA); Kun Sun (George Mason University, USA); Deborah Shands (National Science Foundation, USA); Wenjing Lou (Virginia Tech & National Science Foundation, USA); Thomas Hou (Virginia Tech, USA)
  182. SFIRE: Secret-Free In-band Trust Establishment for COTS Wireless Devices
    Nirnimesh Ghose, Loukas Lazos and Ming Li (University of Arizona, USA)
  183. Asymptotic Miss Ratio of LRU Caching with Consistent Hashing       
    Kaiyi Ji, Guocong Quan and Jian Tan (The Ohio State University, USA)
  184. Quality of Experience-based Routing of Video Traffic for Overlay and ISP Networks              
    Giacomo Calvigioni (Université Cote d'Azur, CNRS, I3S & Università di Bologna, France); Ramon Aparicio-Pardo (Université Côte d'Azur & CNRS, I3S, France); Lucile Sassatelli (Université Cote d'Azur, CNRS, I3S, France); Jeremie Leguay (Huawei Technologies, France Research Center, France); Stefano Paris (Huawei Technologies Co. Ltd. & Université Paris Descartes, France); Paolo Medagliani (Huawei Technologies Co. Ltd., France)
  185. LRU Caching with Dependent Competing Requests
    Guocong Quan, Kaiyi Ji and Jian Tan (The Ohio State University, USA)
  186. PPG-based Finger-level Gesture Recognition Leveraging Wearables            
    Tianming Zhao (Binghamton University, USA); Jian Liu (WINLAB, Rutgers University, USA); Yan Wang (SUNY at Binghamton, USA); Hongbo Liu (Indiana University-Purdue University Indianapolis, USA); Yingying Chen (Rutgers University, USA)
  187. A Resource Allocation Framework for Network Slicing         
    Mathieu Leconte and Georgios S. Paschos (Huawei Technologies, France); Panayotis Mertikopoulos (French National Center for Scientific Research (CNRS) & Laboratoire d'Informatique de Grenoble, France); Ulas Can Kozat (Huawei R&D, USA)
  188. Flutes vs. Cellos: Analyzing Mobility-Traffic Correlations in Large WLAN Traces       
    Babak Alipour (University of Florida, USA); Leonardo Tonetto (TUM, Germany); Aaron Yi Ding (Technical University of Munich, Germany); Joerg Ott (Technische Universität München, Germany); Roozbeh Ketabi and Ahmed Helmy (University of Florida, USA)
  189. Exploiting Residual Channel for Implicit Wi-Fi Backscatter Networks            
    Taekyung Kim and Wonjun Lee (Korea University, Korea)
  190. A General Model for DoF-based Interference Cancellation in MIMO Networks with Rank-deficient Channels       
    Yongce Chen, Yan Huang, Yi Shi and Thomas Hou (Virginia Tech, USA); Wenjing Lou (Virginia Tech & National Science Foundation, USA); Sastry Kompella (Naval Research Laboratory, USA)
  191. StripComm: Interference-Resilient Cross-Technology Communication in Coexisting Environments               
    Xiaolong Zheng, Yuan He and Xiuzhen Guo (Tsinghua University, P.R. China)
  192. Estimation of Source and Cache Dynamics in DNS under Interval-Censored Age Sampling   
    Di Xiao (Texas A&M, USA); Xiaoyong Li, Daren Cline and Dmitri Loguinov (Texas A&M University, USA)
  193. Towards Profit Maximization for Online Social Network Providers 
    Jing Tang, Xueyan Tang and Junsong Yuan (Nanyang Technological University, Singapore)
  194. PAFD: Phased Array Full-Duplex      
    Ehsan Aryafar (Portland State University, USA); Alireza Keshavarz-Haddad (Shiraz University, Iran)
  195. Efficient Dispatching of Job Batches in Emerging Clouds      
    Shimon Bitton, Yuval Emek and Shay Kutten (Technion, Israel)
  196. Enabling Indoor Mobile Millimeter-wave Networks Based on Smart Reflect-arrays               
    Xin Tan and Zhi Sun (State University of New York at Buffalo, USA); Dimitrios Koutsonikolas (University at Buffalo, SUNY, USA); Josep M Jornet (University at Buffalo, USA)
  197. Joint Selection And Scheduling of Communication Requests in Multi-Channel Wireless Networks under SINR Model         
    Peng-Jun Wan (Illinois Institute of Technology, USA); Huaqiang Yuan (Dongguan University of Technology, P.R. China); Jiliang Wang (Tsinghua University, P.R. China); Ju Ren and Yaoxue Zhang (Central South University, P.R. China)
  198. A Case for Web Service Bandwidth Reduction on Mobile Devices with Edge-hosted Personal Services        
    Yongshu Bai (SUNY Binghamton, USA); Pengzhan Hao (SUNY BInghamton, USA); Yifan Zhang (SUNY Binghamton, USA)
  199. EV Charging Network Design with Transportation and Power Grid Constraints          
    Yongmin Zhang, Jiayi Chen, Lin Cai and Jianping Pan (University of Victoria, Canada)
  200. BAS-360: Exploring Spatial and Temporal Adaptability in 360-degree Videos over HTTP/2   
    Mengbai Xiao (George Mason University, USA); Chao Zhou (SUNY Binghamton, USA); Viswanathan Swaminathan (Adobe Systems Inc, USA); Yao Liu (SUNY Binghamton, USA); Songqing Chen (George Mason University, USA)
  201. Network Utility Maximization in Adversarial Environments               
    Qingkai Liang and Eytan Modiano (MIT, USA)
  202. Mode-Suppression: A Simple and Provably Stable Chunk-Sharing Algorithm for P2P Networks        
    Vamseedhar R Reddyvari Raja and Srinivas G Shakkottai (Texas A&M University, USA); Parimal Parag (Indian Institute of Science, India)
  203. Small-Scale Markets for Bilateral Resource Trading in the Sharing Economy               
    Bainan Xia and Srinivas G Shakkottai (Texas A&M University, USA); Vijay Subramanian (University of Michigan, USA)
  204. Fundamental Limits of Wireless Distributed Computing Networks 
    Mingyue Ji and Rong-Rong Chen (University of Utah, USA)
  205. Network Timing, Weathering the 2016 Leap Second              
    Darryl Veitch and Yi Cao (University of Technology Sydney, Australia)
  206. Impact of Channel State Misreporting on Multi-user Massive MIMO Scheduling Performance         
    Zhanzhan Zhang (Shanghai Jiao Tong University, P.R. China); Yin Sun (Auburn University, USA); Ashutosh Sabharwal (Rice University, USA); Zhiyong Chen (Shanghai Jiao Tong University, P.R. China)
  207. Dominant Strategy Allocation of Divisible Network Resources with Limited Information     
    Hao Ge and Randall A Berry (Northwestern University, USA)
  208. Randomized View Reconciliation in Permissionless Distributed Systems    
    Ruomu Hou, Irvan Jahja, Loi Luu, Prateek Saxena and Haifeng Yu (National University of Singapore, Singapore)
  209. Privacy-Preserving Social Media Data Outsourcing 
    Jinxue Zhang and Jingchao Sun (Arizona State University, USA); Rui Zhang (University of Delaware, USA); Yanchao Zhang (Arizona State University, USA); Xia Hu (Texas A&M University, USA)
  210. Virtual Redundancy for Active-Standby Cloud Applications
    Gueyoung Jung (AT&T Labs-Research, USA); Parisa Rahimzadeh (University of Colorado at Boulder, USA); Zhang Liu and Sangtae Ha (University of Colorado Boulder, USA); Kaustubh Joshi and Matti Hiltunen (AT&T Labs - Research, USA)
  211. aLeak: Privacy Leakage through Context-Free Wearable Side-Channel         
    Yang Liu and Zhenjiang Li (City University of Hong Kong, Hong Kong)
  212. RFID Counting over Time-Varying Channels               
    Ziling Zhou and Binbin Chen (Advanced Digital Sciences Center, Singapore)
  213. Inferring Carrier-Grade NAT Deployment in the Wild           
    Ioana Livadariu (Simula Research Laboratory, Norway); Karyn Benson (CAIDA/UCSD, USA); Ahmed Mustafa Elmokashfi (Simula Research Laboratory, Norway); Amogh Dhamdhere (CAIDA, University of California, San Diego, USA); Alberto Dainotti (CAIDA, UC San Diego, USA)
  214. LAS: Logical-Block Affinity Scheduling in Big Data Analytics Systems              
    Liang Bao (XiDian University, P.R. China); Chase Q. Wu (New Jersey Institute of Technology & Oak Ridge National Laboratory, USA); Qi Haiyang and Weizhao Chen (Xidian University, P.R. China); Xin Zhang and Weina Han (XiDian University, P.R. China); Wei Wei, En Tai and Hao Wang (Xidian University, P.R. China); JiaHao Zhai (Xidian, P.R. China); Xiang Chen (Xidian University, P.R. China)
  215. Energy-Efficient Computation Offloading for Multicore-based Mobile Devices        
    Yeli Geng (Pennsylvania State University, USA); Yi Yang and Guohong Cao (The Pennsylvania State University, USA)
  216. Temporal Reachability in Vehicular Networks          
    Luca Bedogni (University of Bologna, Italy); Marco Fiore and Christian Glacet (National Research Council of Italy, Italy)
  217. Timely-Throughput Optimal Scheduling with Prediction     
    Kun Chen and Longbo Huang (Tsinghua University, P.R. China)
  218. An Investigation into Android In-App Ad Practice: Implications for App Developers               
    Boyuan He (Zhejiang University, P.R. China); Haitao Xu (Northwestern University, USA); Ling Jin and Guanyu Guo (Zhejiang University, P.R. China); Yan Chen (Northwestern University, USA); Guangyao Weng (Zhejiang University, P.R. China)
  219. Dynamic Defense Strategy against Stealth Malware Propagation in Cyber-Physical Systems              
    Kaiming Xiao, Cheng Zhu, Junjie Xie, Yun Zhou, Xianqiang Zhu and Weiming Zhang (National University of Defense Technology, P.R. China)
  220. CertChain: Public and Efficient Certificate Audit Based on Blockchain for TLS Connections  
    Jing Chen and Shixiong Yao (Wuhan University, P.R. China); Quan Yuan (University of Texas-Permian Basin, USA); Kun He (Wuhan University, P.R. China); Shouling Ji (Zhejiang University, P.R. China & Georgia Institute of Technology, USA); Ruiying Du (Wuhan University, P.R. China)
  221. Boosting the Throughput of LED-Camera VLC via Composite Light Emission
    Yanbing Yang and Jun Luo (Nanyang Technological University, Singapore)
  222. Joint Optimization of User Association and Dynamic TDD for Ultra-Dense Networks              
    Nikolaos Sapountzis and Thrasyvoulos Spyropoulos (EURECOM, France); Navid Nikaein (Eurecom, France); Umer Salim (TCL, France)
  223. PR3: Power Efficient and Low Latency Baseband Processing for LTE Femtocells        
    Nishant Budhdev and Mun Choon Chan (National University of Singapore, Singapore); Tulika Mitra (NUS Singapore, Singapore)
  224. Reduced-State, Optimal Medium Access Control for Wireless Data Collection Networks    
    Avinash Mohan (Indian Institute of Science, Bangalore, India); Aditya Gopalan and Anurag Kumar (Indian Institute of Science, India)
  225. Robust Loss Inference in the Presence of Noisy Measurements       
    Yan Qiao (Anhui Agricultural University & School of Information and Computer, P.R. China)
  226. ADELE: Anomaly Detection from Event Log Empiricism         
    Subhendu Khatuya (IIT KHARAGPUR, India); Niloy Ganguly (Indian Institute of Technology Kharagpur, India); Jayanta Basak (NetApp India Pvt. Ltd., India); Madhumita Bharde (Expert Technologist, India); Bivas Mitra (Indian Institute of Technology Kharagpur, India)
  227. Accurate and Efficient Wireless Device Fingerprinting Using Channel State Information     
    Jingyu Hua, Hongyi Sun and Zhenyu Shen (Nanjing University, P.R. China); Zhiyun Qian (University of California, Riverside, USA); Sheng Zhong (Nanjing University, P.R. China)
  228. Optimal Content Replication and Request Matching in Large Caching Systems         
    Arpan Mukhopadhyay (EPFL, Switzerland); Nidhi Hegde (Nokia Bell Labs, France); Marc Lelarge (INRIA and ENS, France)
  229. Prophet: Fast, Accurate Throughput Prediction with Reactive Flows              
    Kai Gao (Tsinghua University, P.R. China); Jingxuan Zhang (Tongji University, P.R. China); Y. Richard Yang (Yale University, USA); Jun Bi (Tsinghua University, P.R. China)
  230. DeepLink: A Deep Learning Approach for User Identity Linkage       
    Fan Zhou and Lei Liu (University of Electronic Science and Technology of China, P.R. China); Kunpeng Zhang (University of Maryland, USA); Goce Trajcevski (Northwestern University, USA); Jin Wu and Ting Zhong (University of Electronic Science and Technology of China, P.R. China)
  231. An Efficient Framework for Detecting Evolving Anomalous Subgraphs in Dynamic Networks             
    Minglai Shao and Li Jianxin (Beihang University, P.R. China); Feng Chen (University of Albany, USA); Xunxun Chen (CNERT/CC, P.R. China)
  232. On Scalable Service Function Chaining with O(1) Flowtable Entries
    Tzu-Ming Huang (National Chiao Tung University, Taiwan); Yi Ren (University of East Anglia, United Kingdom (Great Britain)); Kate Ching-Ju Lin (National Chiao Tung University, Taiwan); Yu-Chee Tseng (National Chiao-Tung University, Taiwan)
  233. Information Theoretical Analysis of Synaptic Communication for Nanonetworks    
    Hamideh Ramezani (Koç University, Turkey); Tooba Khan (Koc University, Turkey); Ozgur B. Akan (University of Cambridge, United Kingdom (Great Britain))
  234. LipPass: Lip Reading-based User Authentication on Smartphones Leveraging Acoustic Signals          
    Li Lu and Jiadi Yu (Shanghai Jiao Tong University, P.R. China); Yingying Chen (Rutgers University, USA); Hongbo Liu (Indiana University-Purdue University Indianapolis, USA); Yanmin Zhu, Yunfei Liu and Minglu Li (Shanghai Jiao Tong University, P.R. China)
  235. How Can Cyber-Physical Interdependence Affect the Mitigation of Cascading Power Failure?         
    Mingkui Wei (Sam Houston State University, USA); Zhuo Lu (University of South Florida, USA); Yufei Tang (Florida Atlantic University, USA); Xiang Lu (Institute of Information Engineering, CAS, P.R. China)
  236. Heracles: Fine-Grained and Efficient Access Control for Internet-of-Things in Enterprise Environments      
    Qian Zhou, Mohammed Elbadry, Fan Ye and Yuanyuan Yang (Stony Brook University, USA)
  237. Off-sensing and Route Manipulation Attack: A Cross-Layer Attack in Cognitive Radio based Wireless Mesh Networks   
    Moinul Hossain and Linda Jiang Xie (University of North Carolina at Charlotte, USA)
  238. Restricting Involuntary Extension of Failures in Smart Grids using Social Network Metrics  
    Jose Cordova Garcia (Stony Brook University, USA); Dongliang Xie (State University of New York at Stony Brook, USA); Xin Wang (Stony Brook University, USA)
  239. Fast Rendezvous for Spectrum-Agile IoT Devices with Limited Channel Hopping Capability               
    Sigit Pambudi (North Carolina State University, USA); Wenye Wang (NC State University, USA); Cliff Wang (North Carolina State University, USA)
  240. Communication-Efficient and Privacy-Preserving Data Aggregation without Trusted Authority        
    Xuhui Gong, Qiang-Sheng Hua, Lixiang Qian, Dongxiao Yu and Hai Jin (Huazhong University of Science and Technology, P.R. China)
  241. Online Deadline-aware Bulk Transfer over Inter-Datacenter WANs               
    Long Luo and Hongfang Yu (University of Electronic Science and Technology of China, P.R. China); Zilong Ye (California State University, Los Angeles, USA); Xiaojiang Du (Temple University, USA)
  242. On User Mobility in Dynamic Cloud Radio Access Networks               
    Diala Naboulsi (Concordia University, Canada); Assia Mermouri and Razvan Stanica (INSA Lyon, France); Herve Rivano (Inria & Université de Lyon, INRIA, INSA Lyon, CITI, France); Marco Fiore (National Research Council of Italy, Italy)
  243. Provably Efficient Algorithms for Placement of Service Function Chains with Ordering Constraints
    Andrea Tomassilli (INRIA Sophia Antipolis, France); Frederic Giroire (CNRS, France); Nicolas Huin (Université Côte d'Azur, Inria, I3S, CNRS, France); Stephane Perennes (INRIA, France)
  244. Scheduling and Resource Allocation in 802.11ax      
    Kaidong Wang and Konstantinos Psounis (University of Southern California, USA)
  245. Adaptive Crawling with Multiple Bots: A Matroid Intersection Approach    
    Xiang Li and Johnathan Smith (University of Florida, USA); Thang N. Dinh (Virginia Commonwealth University, USA); My T. Thai (University of Florida, USA)
  246. Percolation-based Network Adaptability Under Correlated Failures              
    Jin-Hee Cho and Terrence J. Moore (Army Research Laboratory, USA)
  247. Towards Stability Analysis of Data Transport Mechanisms: a Fluid Model and an Application            
    Gayane Vardoyan (University of Massachusetts Amherst, USA); C. v. Hollot and Don Towsley (University of Massachusetts at Amherst, USA)
  248. Predicting Learner Interactions in Social Learning Networks              
    Tsung-Yen Yang (Princeton University, USA); Christopher G. Brinton (Zoomi Inc., USA); Carlee Joe-Wong (Carnegie Mellon University, USA)
  249. FluidRAN: Optimal vRAN/MEC Orchestration            
    Andres Garcia-Saavedra (NEC Labs Europe, Germany); Xavier Costa-Perez (NEC Laboratories Europe, Germany); Douglas Leith and George Iosifidis (Trinity College Dublin, Ireland)
  250. Predicting the effect of home Wi-Fi quality on QoE               
    Diego Neves da Hora (Telecom Paristech, France); Renata Teixeira (Inria, France); Koen Van Oost and Karel Van Doorselaer (Technicolor, Belgium)
  251. Optimal Control of Distributed Computing Networks with Mixed-Cast Traffic Flows              
    Jianan Zhang and Abhishek Sinha (Massachusetts Institute of Technology, USA); Jaime Llorca (Nokia Bell Labs, USA); Antonia Tulino (Bell Labs, USA & Università Federico II, Italy); Eytan Modiano (MIT, USA)
  252. Online Learning based Uplink Scheduling in HetNets with Limited Backhaul Capacity           
    Zhenhua Han (The University of Science and Technology of China, P.R. China); Haisheng Tan (University of Science and Technology of China, P.R. China); Rui Wang (The South University of Science and Technology of China, P.R. China); Shaojie Tang (University of Texas at Dallas, USA); Francis C.M. Lau (The University of Hong Kong, Hong Kong)
  253. ByteCuts: Fast Packet Classification by Interior Bit Extraction            
    James Daly and Eric Torng (Michigan State University, USA)
  254. Symmetric Connectivity Algorithms in Multiple Directional Antennas Wireless Sensor Networks   
    Tien Tran and Dung Huynh (University of Texas at Dallas, USA)
  255. An Online Approach to D2D Trajectory Utility Maximization Problem           
    Amrit Singh Bedi (IIT Kanpur, India); Ketan Rajawat (Indian Institute of Technology Kanpur, India); Marceau Coupechoux (Telecom ParisTech, France)
  256. CutSplit: A Decision-Tree Combining Cutting and Splitting for Scalable Packet Classification             
    Wenjun Li and Xianfeng Li (Peking University, P.R. China); Hui Li (Peking University Shenzhen Graduate School, P.R. China); Gaogang Xie (Institute of Computing Technology, Chinese Academy of Sciences, P.R. China)
  257. SDN Controller Placement at the Edge: Optimizing Delay and Overheads
    Qiaofeng Qin and Konstantinos Poularakis (Yale University, USA); George Iosifidis (Trinity College Dublin, Ireland); Leandros Tassiulas (Yale University, USA)
  258. Puncturable Attribute Based Encryption for Secure Data Delivery in Internet-of-Things       
    Tran Phuong, Rui Ning, Hongyi Wu and ChunSheng Xin (Old Dominion University, USA)
  259. Robust User Association for Ultra Dense Networks
    Nikolaos Liakopoulos (Huawei Technologies & UPMC, France); Georgios S. Paschos (Huawei Technologies, France); Thrasyvoulos Spyropoulos (EURECOM, France)
  260. Understanding Ethereum via Graph Analysis            
    Ting Chen (University of Electronic Science and Technology of China (UESTC), P.R. China); Yuxiao Zhu (School of Management, Guangdong University of Technology, P.R. China); Zihao Li (University of Electronic Science and Technology of China (UESTC), P.R. China); Jiachi Chen, Xiaoqi Li and Xiapu Luo (The Hong Kong Polytechnic University, Hong Kong); Xiaodong Lin (Wilfrid Laurier University, Canada); Xiaosong Zhang (University of Electronic Science and Technology of China, P.R. China)
  261. Estimating Information Exchange Performance of Engineered Cell-to-cell Molecular Communications: a Computational Approach    
    Colton Harper and Massimiliano Pierobon (University of Nebraska-Lincoln, USA); Maurizio Magarini (Politecnico di Milano, Italy)
  262. ONIS: Inferring TCP/IP-based Trust Relationships Completely Off-Path        
    Xu Zhang, Jeffrey Knockel and Jedidiah Crandall (University of New Mexico, USA)
  263. Shortest Path and Maximum Flow Problems Under Service Function Chaining Constraints 
    Gamal Sallam (Temple University, USA); Gagan R Gupta (AT&T Labs, USA); Bin Li (University of Rhode Island, USA); Bo Ji (Temple University, USA)
  264. MobiCrowd: Mobile Crowdsourcing on Location-based Social Networks     
    Yulong Tian (Nanjing University, P.R. China); Wei Wei and Qun Li (College of William and Mary, USA); Fengyuan Xu and Sheng Zhong (Nanjing University, P.R. China)
  265. Secure Crowdsourced Indoor Positioning Systems 
    Tao Li and Yimin Chen (Arizona State University, USA); Rui Zhang (University of Delaware, USA); Yanchao Zhang and Terri Hedgpeth (Arizona State University, USA)
  266. Enabling Quality-Driven Scalable Video Transmission over Multi-User NOMA System          
    Xiaoda Jiang and Hancheng Lu (University of Science and Technology of China, P.R. China); Chang Wen Chen (State University of New York at Buffalo, USA)
  267. DeepDecision: A Mobile Deep Learning Framework              
    Xukan Ran and Haoliang Chen (University of California, Riverside, USA); Xiaodan Zhu and Zhenming Liu (College of William and Mary, USA); Jiasi Chen (University of California, Riverside, USA)
  268. Optimizing Data Plans: Usage Dynamics in Mobile Data Networks  
    Liang Zheng (Princeton University, USA); Carlee Joe-Wong (Carnegie Mellon University, USA); Matthew Andrews (Nokia Bell Labs, USA); Mung Chiang (Purdue University, USA)
  269. To Accept or Not to Accept: The Question of Supplemental Discount Offers in Mobile Data Plans   
    Madhumitha Harishankar, Nagarjun Srinivasan, Carlee Joe-Wong and Patrick Tague (Carnegie Mellon University, USA)
  270. Low-Complexity, Low-Regret Link Rate Selection in Rapidly-Varying Wireless Channels     
    Harsh Gupta (University of Illinois at Urbana-Champaign, USA); Atilla Eryilmaz (The Ohio State University, USA); R. Srikant (University of Illinois at Urbana-Champaign, USA)
  271. Making the Right Connections: Multi-AP Association and Flow Control in 60GHz Band         
    Fan Zhou, M. Yousof Naderi, Kunal Sankhe and Kaushik Chowdhury (Northeastern University, USA)
  272. Offloading Dependent Tasks with Communication Delay and Deadline Constraint 
    Sowndarya Sundar and Ben Liang (University of Toronto, Canada)
  273. A cross-architectural quantitative evaluation of mobility approaches           
    Vasanta Chaganti (University of Massachusetts, USA); Jim Kurose (University of Massachusetts at Amherst, USA); Arun Venkataramani (UMass Amherst, USA)
  274. Correcting the Output of Approximate Graph Matching Algorithms               
    Joseph Lubars and R. Srikant (University of Illinois at Urbana-Champaign, USA)
  275. Towards Fine-grained Fingerprinting of Firmware in Online Embedded Devices      
    Qiang Li (Beijing Jiaotong University, P.R. China); Xuan Feng (University of Chinese Academy of Sciences, P.R. China); Haining Wang (University of Delaware, USA); Zhi Li (Institute of Information Engineering, Chinese Academy of Sciences, P.R. China); Limin Sun (Institute of Information Engineering, China Academy of Science, Beijing, P.R. China)
  276. Sybil-Proof Online Incentive Mechanisms for Crowdsensing             
    Jian Lin, Ming Li and Dejun Yang (Colorado School of Mines, USA); Guoliang Xue (Arizona State University, USA)
  277. On the Effect of Shadowing Correlation on Wireless Network Performance              
    Junse Lee (University of Texas Austin, USA); Francois Baccelli (UT Austin & The University of Texas at Austin, USA)
  278. Game Theoretic Characterization of Collusive Behavior among Attackers   
    Abhishek Roy and Prasant Mohapatra (University of California, Davis, USA); Charles A Kamhoua (US Army Research Laboratory & Network Science Division, USA)
  279. Toward the First SDN Programming Capacity Theorem on Realizing High-Level Programs on Low-Level Datapaths  
    Christopher Leet (Yale University, USA); Xin Wang (Tongji University, P.R. China); James Aspnes and Y. Richard Yang (Yale University, USA)
  280. An Edge Network Orchestrator for Mobile Augmented Reality         
    Qiang Liu (The University of North Carolina at Charlotte, USA); Siqi Huang (University of North Carolina at Charlotte, USA); Johnson Opadere (The University of North Carolina at Charlotte, USA); Tao Han (University of North Carolina at Charlotte, USA)
  281. Learning Cloud Dynamics to Optimize Spot Instance Bidding Strategies       
    Mikhail Khodak, Liang Zheng and Andrew Lan (Princeton University, USA); Carlee Joe-Wong (Carnegie Mellon University, USA); Mung Chiang (Purdue University, USA)
  282. On Spatial and Temporal Variations in Ultra Dense Wireless Networks        
    Pranav Madadi (University of Texas at Austin, USA); Francois Baccelli (UT Austin & The University of Texas at Austin, USA); Gustavo de Veciana (The University of Texas at Austin, USA)
  283. Contracts as Investment Barriers in Unlicensed Spectrum   
    Yining Zhu and Randall A Berry (Northwestern University, USA)
  284. Email as a Master Key: Analyzing Account Recovery in the Wild       
    Yue Li (College of William & Mary, USA); Haining Wang (University of Delaware, USA); Kun Sun (George Mason University, USA)
  285. WiFED: WiFi Friendly Energy Delivery with Distributed Beamforming          
    Subhramoy Mohanti (Northeastern University, USA); Elif Bozkaya (Istanbul Technical University, Turkey); M. Yousof Naderi (Northeastern University, USA); Berk Canberk (Istanbul Technical University, Turkey); Kaushik Chowdhury (Northeastern University, USA)
  286. The impact of bundling licensed and unlicensed wireless service   
    Xu Wang and Randall A Berry (Northwestern University, USA)
  287. Optimizing Network Reliability via Best-First Search over Decision Diagrams            
    Masaaki Nishino (NTT Comunication Science Laboratories, Japan); Takeru Inoue (NTT Network Innovation Labs., Japan); Norihito Yaasuda (NTT Comunication Science Laboratories, Japan); Shin-ichi Minato (Hokkaido University, Japan); Masaaki Nagata (NTT Communication Science Laboratories, Japan)
  288. Online Partial Throughput Maximization for Multidimensional Coflow        
    Sungjin Im (University of California, Merced, USA); Maryam Shadloo (UC Merced, USA); Zizhan Zheng (Tulane University, USA)
  289. Scalable QoE-aware Path Selection in SDN-based Mobile Networks              
    Roberto Iraja Tavares da Costa Filho, William R Lautenschläger and Nicolas Kagami (Federal University of Rio Grande do Sul, Brazil); Marcelo Caggiani Luizelli (Federal University of Pampa, Brazil); Valter Roesler (Federal University of Rio Grande do Sul (UFRGS), Brazil); Luciano Paschoal Gaspary (Federal University of Rio Grande do Sul, Brazil)
  290. A Framework for MIMO-based Packet Header Obfuscation               
    Yue Cao and Ahmed Fathy Atya (University of California, Riverside, USA); Shailendra Singh (University Of California, Riverside, USA); Zhiyun Qian and Srikanth V. Krishnamurthy (University of California, Riverside, USA); Tom La Porta (Pennsylvania State University, USA); Prashant Krishnamurthy (University of Pittsburgh, USA); Lisa Marvel (Army Research Laboratory, USA)
  291. Stochastic Models and Wide-Area Network Measurements for Blockchain Design and Analysis      
    Nikolaos Papadis (Yale University, USA); Sem Borst (Nokia Bell Labs & Eindhoven University of Technology, USA); Anwar Walid (Nokia Bell Labs, USA); Mohamed Grissa (Oregon State University, USA); Leandros Tassiulas (Yale University, USA)
  292. It's All in the Name: Why Some URLs are More Vulnerable to Typosquatting            
    Rashid Tahir (University of Illinois at Urbana Champaign, USA); Ali Raza (LUMS, Pakistan); Faizan Ahmad (FAST National University Lahore, Pakistan); Jehangir Kazi (Lahore University of Management Sciences, Pakistan); Fareed Zaffar (LUMS, Pakistan); Chris Kanich (University of Illinois at Chicago, USA); Matthew Caesar (University of Illinois at Urbana-Champaign, USA)
  293. Curbing Timeouts for TCP-Incast in Data Centers via A Cross-Layer Faster Recovery Mechanism       
    Ahmed M. Abdelmoniem (The Hong Kong University of Science and Technology); Brahim Bensaou (The Hong Kong University of Science and Technology, Hong Kong)
  294. A Novel Graph-based Mechanism for Identifying Traffic Vulnerabilities in Smart Home IoT               
    Yizhen Jia and Yinhao Xiao (The George Washington University, USA); Jiguo Yu (Qufu Normal University, P.R. China); Xiuzhen Cheng (George Washington Univ, USA); Zhenkai Liang (National University of Singapore, Singapore); Zhiguo Wan (Shandong University, P.R. China)
  295. I Can Hear More: Pushing the Limit of Ultrasound Sensing on Off-the-Shelf Mobile Devices             
    Yuchi Chen, Wei Gong and Jiangchuan Liu (Simon Fraser University, Canada); Yong Cui (Tsinghua University, P.R. China)
  296. Secret-Focus: A Practical Secret Communication System by Perturbing Focused Phases Among Distributed Transmitters             
    Xiaoran Fan and Zhijie Zhang (Rutgers University, USA); Wade Trappe (WINLAB, Rutgers University, USA); Yanyong Zhang and Richard Howard (Rutgers University, USA); Zhu Han (University of Houston, USA)
  297. Spatiotemporal Scheduling for Crowd Augmented Urban Sensing  
    Qiuxi Zhu, Md Yusuf Sarwar Uddin and Nalini Venkatasubramanian (University of California, Irvine, USA); Cheng-Hsin Hsu (National Tsing Hua University, Taiwan)
  298. Adaptive Demodulation for Wireless Systems in the Presence of Frequency-Offset Estimation Errors          
    Hanif Rahbari (Virginia Tech, USA); Peyman Siyari and Marwan Krunz (University of Arizona, USA); Jung-Min (Jerry) Park (Virginia Tech, USA)
  299. Differentially Private Access Patterns for Searchable Symmetric Encryption              
    Guoxing Chen (The Ohio State University, USA); Ten-Hwang Lai (Ohio State university, USA); Mike Reiter (University of North Carolina at Chapel Hill, USA); Yinqian Zhang (The Ohio State University, USA)
  300. POMP: Protocol Oblivious SDN Programming with Automatic Multi-Table Pipelining           
    Chunhui He and Xinyu Feng (University of Science and Technology of China, P.R. China)
  301. ClusTile: Toward Minimizing Bandwidth in 360-degree Video Streaming     
    Chao Zhou (SUNY Binghamton, USA); Mengbai Xiao (George Mason University, USA); Yao Liu (SUNY Binghamton, USA)
  302. A Computing Platform for Video Crowdprocessing Using Deep Learning     
    Zongqing Lu (Peking University, P.R. China); Kevin S Chan (US Army Research Laboratory, USA); Tom La Porta (Pennsylvania State University, USA)
  303. Hybrid Scheduling in Heterogeneous Half- and Full-Duplex Wireless Networks      
    Tingjun Chen (Columbia University, USA); Jelena Diakonikolas (Boston University & Massachusetts Institute of Technology, USA); Javad Ghaderi and Gil Zussman (Columbia University, USA)
  304. Improving Utilization and Parallelism of Hadoop Cluster by Elastic Containers         
    Yinggen Xu (Tongji University, P.R. China); Wei Chen, Shaoqi Wang and Xiaobo Zhou (University of Colorado, Colorado Springs, USA); Changjun Jiang (Tongji University, P.R. China)
  305. Opportunistic Multichannel Access with Imperfect Observation: A Fixed Point Analysis on Indexability and Index-based Policy
    Kehao Wang (WHUT, P.R. China); Lin Chen (The University of Paris-Sud, France); Jihong Yu (Simon Fraser University, Canada); Moe Win (Massachusetts Institute of Technology, USA)
  306. FERO: Fast and Efficient Resource Orchestrator for a Data Plane Built on Docker and DPDK 
    Balázs Sonkoly, Márton Szabó, Balázs Németh and András Majdán (Budapest University of Technology and Economics, Hungary); Gergely Pongrácz (Ericsson Research, Hungary); Laszlo Toka (Budapest University of Technology and Economics, Hungary)
  307. INFLOW: Inverse Network Flow Watermarking for Detecting Hidden Servers           
    Alfonso Iacovazzi and Sanat Sarda (Singapore University of Technology and Design, Singapore); Yuval Elovici (Ben Gurion University, Israel)
  308. $\text{DAO}^2$: Overcoming Overall Storage Overflow in Intermittently Connected Sensor Networks       
    Bin Tang (California State University Dominguez Hills, USA)
  309. Low-complexity Learning for Dynamic Spectrum Access in Multi-User Multi-Channel Networks      
    Sunjung Kang and Changhee Joo (UNIST, Korea)