Home | Conference Committee | Call for Paper | Paper Submission | Registration | Program | Best Papers


Program Information

Online Link

Conference system: Tencent Conference or VooV meeting


Program at a glance

December 28 December 29
08:50-09:00 Openning
09:00-09:30 Keynote Speech
09:30-10:00 Session #1 Session #5
10:30-11:00
11:00-11:15 Break Time Break Time
11:15-12:00 Session #2 Session #6
12:00-12:30
12:30-13:00 Lunch Time Lunch Time
13:00-13:30
13:30-14:00 Session #3 Session #7
14:00-14:30
14:30-15:00
15:00-15:15 Break Time Break Time
15:15-16:00 Session #4 Session #8
16:00-16:30

Keynote Speech

  • Speakers 1
  • - Name: Pavan Balaji

    - Position: Applied Research Scientist

    - Affiliation: Technical Lead, and Manager at Facebook AI TLM



  • Speakers 2
  • - Name: Haijun Zhang

    - Position: Professor

    - Affiliation: University of Science and Technology Beijing



Program on December 28

December 28 (Tuesday)
08:50-09:00 Openning
09:00-09:40 Keynote Speech
09:40-11:00 Session #1
1. Security Use-cases for Countering Threats of CLA and UAV in 6G
2. Motion Feature Extraction and Stylization for Character Animation using Hilbert-Huang Transform
3. An Effective Adaptive Stacking Ensemble Algorithm for Electricity Theft Detection
4. Multi-Agent Reinforcement Learning based on Two-Step Neighborhood Experience for Traffic Light Control
5. CeUPF Offloading 5G User Plane Function to Programmable Hardware Base on Co-existence Architecture
11:00-11:15 Break Time
11:15-12:30 Session #2
6. An Effective Neural Architecture Optimization Algorithm for CNN based on Search Economics
7. Visible watermark removal based on dual-input network
8. A Deep Learning-Based Integrated Algorithm for Misbehavior Detection System in VANETs
9. Search Economics for Multi-Objective Vehicle Routing Problem with Time Windows
10. A Training-free Genetic Neural Architecture Search
12:30-13:30 Lunch Time
13:30-15:00 Session #3
11. Listening to the Crowd for the Change File Localization of Mobile Apps
12. A Cross-domain Collaborative DDoS Defense Scheme Based on Blockchain-SDN in the IoT
13. Real-Time Prediction of Ocean Observation Data Based on Transformer Model
14. A Scheme of Traceless File Deletion for Windows FAT32 File System
15. Darknet Public Hazard Entity Recognition Based on Deep Learning
15:00-15:15 Break Time
15:15-16:30 Session #4
16. In-network Computing based Transmission Optimization Mechanism in SDN
17. An Abused Webpage Detection Method Based on Screenshots Text Recognition
18. Research on pork price prediction based on multi-dimensional feature analysis and machine learning
19. Development of Adaptive Soft-Sensors Based on Kalman-Elman Neural Network with Applications in Wastewater Treatment
20. Heterogeneous multi-core optimization of MUMPS solver and its application


Program on December 29

December 29 (Wendsday)
09:30-11:00 Session #5
21. Multi-Server Offloading Based on Game Theory in Cloud-Edge Collaborative Computing
22. Deep Text Matching in Medical Question Answering System
23. Blockchain-based Certificateless Identity Management Mechanism in Cloud-native Environments
24. swMETIS: a high performance graph partitioning library on Sunway manycore architecture
25. An automatic many-core code generation method and its implementation under Sunway environment
11:00-11:15 Break Time
11:15-12:30 Session #6
26. Blockchain-Based Statistical Library for Telecom Security Fraud Cases
27. Intelligent Detection of Marine Organisms with Deep Learning based on Attention Mechanism
28. ECNN: One Online Deep Learning Model for Streaming Ocean Data Prediction
29. A Fast Light Baking System for Mobile VR Game Based on Edge Computing Framework
30. Prediction of Biochemical Oxygen Demand Based on VIP-PSO-Elman Model in Wastewater Treatment
12:30-13:30 Lunch Time
13:30-15:00 Session #7
31. Simulating QSAR Model of ERĪ± Bioactivity by Statistics and Machine Learning
32. Prediction effect of ADMET properties based on machine learning
33. A Lightware Attribute Based Access Control Mechanism in Software Defined Internet of Things
34. Towards Comprehensive Analysis of Tor Hidden Service Access Behavior Identification Under Obfs4 Scenario
35. ITGNN: Item Transition Attentive Graph Neural Network for Session-Based Recommendation
15:00-15:15 Break Time
15:15-16:30 Session #8
36. A Delay-guaranteed Routing Mechanism Based on Active Network Telemetry in Deterministic Network
37. Supervisory scheme for blockchain privacy protection technique based on group signature
38. In-band network telemetry based Fine-grained traceability against IP address spoofing attack
39. Research of Big Data Storage System Based on Underground Space Information


Sponsored by ACM and Korean Institute of Smart Media (KISM)
Hosted by Qilu University of Technology (Shandong Academy of Sciences), China, National & Local Joint Engineering Research Center of NSDP (in China), Shandong Institute of Bigdata, China InfoCom Media Group, Chinese Journal of Network and Information Security, and BK21 Convergence Engineering for Intelligent Drone, Sejong University