Webtoc
Webtoc
Hainan, China
18-21 December 2022
Pages 1-594
1/4
Copyright © 2022 by the Institute of Electrical and Electronics Engineers, Inc.
All Rights Reserved
Copyright and Reprint Permissions: Abstracting is permitted with credit to the source.
Libraries are permitted to photocopy beyond the limit of U.S. copyright law for private
use of patrons those articles in this volume that carry a code at the bottom of the first
page, provided the per-copy fee indicated in the code is paid through Copyright
Clearance Center, 222 Rosewood Drive, Danvers, MA 01923.
v
DIKW 2022 Program Committee lxxv
Message from DSS 2022 Steering Chairs lxxvii
Message from DSS 2022 General Chairs lxxviii
Message from DSS 2022 Program Chairs lxxix
DSS 2022 Organizing Committee lxxx
DSS 2022 Program Committee lxxxi
Message from DependSys 2022 Steering Chairs lxxxii
Message from DependSys 2022 General Chairs lxxxiii
Message from DependSys 2022 Program Chairs lxxxiv
DependSys 2022 Organizing Committee lxxxv
DependSys 2022 Program Committee lxxxvi
vi
High Performance Computing and Applications 2
vii
High Performance Computing and Applications 3
viii
MZ Core: An Enhanced Matrix Acceleration Engine for HPC/AI Applications 126
Yasong Cao (National University of Defense Technology, China), Mei Wen
(National University of Defense Technology, China), Junzhong Shen
(National University of Defense Technology, China), Sheng Liu
(National University of Defense Technology, China), Zhi Wang (National
University of Defense Technology, China), Minjin Tang (National
University of Defense Technology, China), Yahao Fang (National
University of Defense Technology, China), Jianchao Yang (National
University of Defense Technology, China), Renyu Yang (National
University of Defense Technology, China), Yuhan Kang (Hunan Normal
University, China), and Jiawei Fei (National University of Defense
Technology, China)
Evaluating BERT on Cloud-edge Time Series Forecasting and Sentiment Analysis via Prompt
Learning 135
Qizhi Li (Xihua University, China), Xianyong Li (Xihua University,
China), Yujia Song (Xihua University, China), Maolin Zhang (Xihua
University, China), Longqi Chen (Xihua University, China), Gang Wang
(Xihua University, China), and Yajun Du (Xihua University, China)
A Practical Adversarial Attack on Graph Neural Networks by Attacking Single Node Structure 143
Yang Chen (Qinghai Normal University, china), Zhonglin Ye (Qinghai
Normal University, China), Haixing Zhao (Qinghai Normal University,
China), Lei Meng (Qinghai Normal University, China), Zhaoyang Wang
(Qinghai Normal University), and Yanlin Yang (Qinghai Normal
University, China)
Three-Channel Graph Convolutional Network 153
Lei Meng (Qinghai Normal University, China), Zhonglin Ye (Qinghai
Normal University, China), Haixing Zhao (Qinghai Normal University,
China), Yanlin Yang (Qinghai Normal University, China), Yang Chen
(Qinghai Normal University, China), and Zhaoyang Wang (Qinghai Normal
University, China)
Image Anomaly Detection With Semantic-Enhanced Augmentation and Distributional Kernel 163
Mingxi Wang (Jilin University, China), Ye Zhu (Deakin University,
Australia), Gang Li (Deakin University, Australia), Gang Liu (Harbin
Engineering University, China), and Bo Yang (Jilin University, China)
ReSLB: Load Balanced Workflow for Distributed Deep Learning Mass Spectrometry Database 171
Mocheng Li (National University of Defense Technology, China), Yang
Liu (National University of Defense Technology, China), Yang Ou
(National University of Defense Technology, China), Zhiguang Chen (Sun
Yat-sen University, China), Nong Xiao (National University of Defense
Technology, China), and Tao Chen (National Center for Protein
Sciences(Beijing), China)
ix
Efficient Electronic Transaction Query Model for Light Nodes Based on Optimized Blockchain
Structure 178
Mingjie Zhao (Sichuan University, China), Cheng Dai (Sichuan
University, China), Yuting Zhao (Sichuan University, China), and Bing
Guo (Sichuan University, China)
IIoT Mobile Business Data Placement Strategy Based on Bayesian Optimization Algorithm 186
Zhijie Shen (Nanjing University, China; Guangdong Laboratory of
Artificial Intelligence and Digital Economy(SZ), China), Bowen Liu
(Nanjing University, China; Guangdong Laboratory of Artificial
Intelligence and Digital Economy(SZ), China), Xiaolong Xu (Nanjing
University of Information Science and Technology, China), Lianyong Qi
(Qufu Normal University, China), Fei Dai (Southwest Forestry
University, China), and Wanchun Dou (Nanjing University, China)
Medical Dialogue Generation via Extracting Heterogenous Information 194
Bocheng Zhao (Beijing University of Technology, China), Zongli Jiang
(Beijing University of Technology, China), Jinli Zhang (Beijing
University of Technology, China), Fenglong Ma (Penn State University,
USA), and Jianqiang Li (Beijing University of Technology, China)
x
Hybrid Parameter Update: Alleviating Imbalance Impacts for Distributed Deep Learning 236
Hongliang Li (Jilin University, China), Dong Xu (Jilin University,
China), Zhewen Xu (Jilin University, China), and Xiang Li (Jilin
University, China)
PRKP: A Parallel Randomized Iterative Algorithm for Solving Linear Systems 244
Junjie Wang (Qilu University of Technology (Shandong Academy of
Sciences), China), Min Tian (Qilu University of Technology (Shandong
Academy of Sciences), China), Yinglong Wang (Qilu University of
Technology (Shandong Academy of Sciences), China), Guoping He (Qilu
University of Technology (Shandong Academy of Sciences), China), and
Tao Liu (Qilu University of Technology (Shandong Academy of Sciences),
China)
A Secure and Reliable Construction Scheme for Enterprise Value Chain Networks 250
Chaoxia Qin (Sichuan University, China), Bing Guo (Sichuan University,
China), Yuting Zhao (Sichuan University, China), and Yan Shen (Chengdu
University of Information Technology, China)
Batched LU Factorization with Fast Row Interchanges for Small Matrices on GPUs 259
Rongfeng Huang (Computer Network Information Center Chinese Academy of
Sciences, China), Yonghua Zhao (Computer Network Information Center
Chinese Academy of Sciences, China), Tianyu Yu (Computer Network
Information Center Chinese Academy of Sciences, China), Shifang Liu
(Computer Network Information Center Chinese Academy of Sciences,
China), and Xinyin Zhang (Computer Network Information Center Chinese
Academy of Sciences, China)
ESBench: Understanding Deep Learning Inference Overheads for Edge Serverless 267
Yanying Lin (Shenzhen institute of advanced technology, Chinese
Academy of Science; University of Chinese Academy of Sciences),
Junhong Chen (Shenzhen institute of advanced technology, Chinese
Academy of Science; University of Chinese Academy of Sciences), Yang
Wang (Shenzhen institute of advanced technology, Chinese Academy of
Science), and Kejiang Ye (Shenzhen institute of advanced technology,
Chinese Academy of Science)
Fine-Grained Scheduling for Containerized HPC Workloads in Kubernetes Clusters 275
Peini Liu (Barcelona Supercomputing Center, Spain; Universitat
Politècnica de Catalunya, Spain) and Jordi Guitart (Barcelona
Supercomputing Center, Spain; Universitat Politècnica de Catalunya,
Spain)
xi
Parallel and Distributed Computing and Systems 3
xii
Efficient, Scalable and Robust Data Shuffle Service for Distributed MapReduce Computing on
Cloud 337
Rong Gu (Nanjing University, China), Xu Huang (Nanjing University,
China), Haipeng Dai (Nanjing University, China), Xiaoyu Geng (Nanjing
University, China), Xiaofei Chen (Nanjing University, China), Yihua
Huang (Nanjing University, China), Fu Xiao (Nanjing University of
Posts and Telecommunications, China), and Guihai Chen (Nanjing
University, China)
Delay and Loss Rate Analysis of the Log Commitment Process in Raft 347
Yuqiang Wen (Macao Polytechnic University, China) and K. L. Eddie Law
(Macao Polytechnic University, China)
A Robust and Accurate Multivariate Time Series Anomaly Detection in Fluctuating Cloud-Edge
Computing Systems 357
Yujia Song (Xihua university, China), Ruyue Xin (University of
Amsterdam, Netherlands), Rui Zhang (Xihua university, China), Juan
Chen (Xihua university, China), and Zhiming Zhao (University of
Amsterdam, Netherlands)
Online 8-Form Tai Chi Chuan Training and Evaluation System Based on Pose Estimation 366
Chunchen Wei (University of Electronic Science and Technology of
China), Jingxin Wen (Sichuan University Jinjiang College), Ran Bi
(University of Electronic Science and Technology of China), Huabin
Yang (University of Electronic Science and Technology of China),
Yanqing Tao (University of Electronic Science and Technology of
China), Yuhang Fan (Chengdu DiShi Technology Co Ltd), Yulong He
(Chengdu DiShi Technology Co Ltd), Didi Cheng (Sichuan University
Jinjiang College), and Yanru Zhang (University of Electronic Science
and Technology of China, UESTC Shenzhen Institute for Advanced Study)
Weak Network Oriented Mobile Distributed Storage: A Hybrid Fault-Tolerance Scheme Based on
Potential Replicas 372
Xinlei Wei (Chongqing University, China), Yujuan Tan (Chongqing
University, China), Duo Liu (Chongqing University, China), Daitao Wu
(Chongqing University, China), Yu Wu (Chongqing University, China),
Xianzhang Chen (Chongqing University, China), and Jian Li (Chongqing
University, China)
GSpTC: High-Performance Sparse Tensor Contraction on CPU-GPU Heterogeneous Systems 380
Guoqing Xiao (Hunan University, China; National Supercomputing Center
in Changsha, China), Chuanghui Yin (Hunan University, China; National
Supercomputing Center in Changsha, China), Yuedan Chen (Hunan
University, China; National Supercomputing Center in Changsha, China),
Mingxing Duan (Hunan University, China; National Supercomputing Center
in Changsha, China), and Kenli Li (Hunan University, China; National
Supercomputing Center in Changsha, China)
Interactive and Reliable Graph Processing via the Edge-Cloud Collaboration Framework 388
Jun Zhou (Keio University, Japan) and Masaaki Kondo (Keio University,
Japan)
xiii
Dual Chain Authentication and key Agreement Protocol Based on Blockchain Technology in
Edge Computing 396
Wei Jian (Hunan University of Science and Technology, China), Jianbo
Xu (Hunan University of Science and Technology, China), Wei Liang
(Hunan University of Science and Technology, China), and Kuan-Ching Li
(Hunan University of Science and Technology, China)
Aprus: An Airborne Altitude-Adaptive Purpose-Related UAV System for Object Detection 402
Weiqiang Wang (Yunnan University, China), Haiyang Chen (Yunnan
University, China), Xingzhou Zhang (Chinese Academy of Sciences,
China; University of Chinese Academy of Sciences, China), Wei Zhou
(Yunnan University, China), and Weisong Shi (University of Delaware,
USA)
DA2F: Research on Robustness of Deep Learning Models using Approximate Activation Function 412
Yuqi Bian (Capital Normal University, China), Jing Wang (Renmin
University of China, China), Weigong Zhang (Capital Normal University,
China), and Lan Gao (Capital Normal University, China)
Distance-Aware Multi-Agent Reinforcement Learning for Task Offloading in MEC Network 420
Lili Jiang (Tsinghua University, China), Lifeng Sun (Tsinghua
University, China), and Wenwu Zhu (Tsinghua University, China)
Multi-Scenario Bimetric-Balanced IoT Resource Allocation: An Evolutionary Approach 428
Jiashu Wu (Shenzhen Institute of Advanced Technology Chinese Academy
of Sciences, China; University of Chinese Academy of Sciences, China),
Hao Dai (Shenzhen Institute of Advanced Technology Chinese Academy of
Sciences, China; University of Chinese Academy of Sciences, China),
Yang Wang (Shenzhen Institute of Advanced Technology Chinese Academy
of Sciences, China), and Zhiying Tu (Harbin Institute of Technology,
China)
In-Band Management Framework and Performance Evaluation for Interconnect Network in the
TianHe Exascale Prototype System 438
Jijun Cao (National University of Defense Technology, China), Mingche
Lai (National University of Defense Technology, China), Lu Liu
(National University of Defense Technology, China), Jiaqing Xu
(National University of Defense Technology, China), and Xiaoyue Hu
(National University of Defense Technology, China)
xiv
GDMD: A Transmission Control Scheme with Block Information-Aware for Delay Sensitive
Multimedia 446
Wei Yang (Institute of Information Engineering, Chinese Academy of
Sciences, China; University of Chinese Academy of Sciences, China;
National Engineering Laboratory of Information Security Technologies,
China; School of Cyber Security, University of Chinese Academy of
Sciences, China; National Engineering Laboratory of Information
Security Technologies, China), Yubing Li (Institute of Information
Engineering, Chinese Academy of Sciences, China; University of Chinese
Academy of Sciences, China; National Engineering Laboratory of
Information Security Technologies, China), Ping Jiang (Institute of
Information Engineering, Chinese Academy of Sciences, China;
University of Chinese Academy of Sciences, China; National Engineering
Laboratory of Information Security Technologies, China), Zhou Zhou
(Institute of Information Engineering, Chinese Academy of Sciences,
China; National Engineering Laboratory of Information Security
Technologies, China; National Engineering Laboratory of Information
Security Technologies, China), and Qingyun Liu (Institute of
Information Engineering, Chinese Academy of Sciences, China; National
Engineering Laboratory of Information Security Technologies, China;
National Engineering Laboratory of Information Security Technologies,
China)
Heterogeneous Propagation Graph Representation Learning for Fake News Detection 456
Zhi Zeng (Huazhong Agricultural University, China; Key Laboratory of
Smart Farming for Agricultural Animals, China; Hubei Engineering
Technology Research Center of Agricultural Big Data, China), Xiang Li
(Huazhong Agricultural University, China; Key Laboratory of Smart
Farming for Agricultural Animals, China; Hubei Engineering Technology
Research Center of Agricultural Big Data, China), and Ying Sha
(Huazhong Agricultural University, China; Key Laboratory of Smart
Farming for Agricultural Animals, China; Hubei Engineering Technology
Research Center of Agricultural Big Data, China)
Fairness-Aware Algorithms for Seed Allocation in Social Advertising 464
Pengzi Wang (University of Science and Technology of China, China),
Yiming Zhu (Hong Kong University of Science and Technology, China;
Hong Kong University of Science and Technology(Guangzhou), China), Kai
Han (Soochow University, China), Zhizhuo Yin (University of Science
and Technology of China, China), Qing Xiu (University of Science and
Technology of China, China), and Pan Hui (Hong Kong University of
Science and Technology, China)
xv
Communications and Networking 2
MTBD: HTTPS Tunnel Detection Based on Multi-dimension Traffic Behaviors Decision 474
Bingxu Wang (Institute of Information Engineering, Chinese Academy of
Sciences, China; University of Chinese Academy of Sciences, China),
Yangyang Guan (Institute of Information Engineering, Chinese Academy
of Sciences, China; University of Chinese Academy of Sciences, China),
GaoPeng Gou (Institute of Information Engineering, Chinese Academy of
Sciences, China; University of Chinese Academy of Sciences, China),
Peipei Fu (Institute of Information Engineering, Chinese Academy of
Sciences, China; University of Chinese Academy of Sciences, China),
Zhen Li (Institute of Information Engineering, Chinese Academy of
Sciences, China; University of Chinese Academy of Sciences, China),
Qingya Yang (Institute of Information Engineering, Chinese Academy of
Sciences, China; University of Chinese Academy of Sciences, China),
and Chang Liu (Institute of Information Engineering, Chinese Academy
of Sciences, China; University of Chinese Academy of Sciences, China)
Spreading Factor Allocation and Rate Adaption for Minimizing Age of Information in LoRaWAN 482
Zhuoyao Wang (Fudan University, China), Xiaokang Xu (Fudan University,
China), and Jin Zhao (Fudan University, China)
DeepPath: Multi-path Traffic Scheduling Algorithm for 5G High Dynamic Network 490
Long Zhang (Beijing University of Posts and Telecommunications,
China), Bo He (Beijing University of Posts and Telecommunications,
China), Jingyu Wang (Beijing University of Posts and
Telecommunications, China), Qi Qi (Beijing University of Posts and
Telecommunications, China), Haifeng Sun (Beijing University of Posts
and Telecommunications, China), Cong Liu (China Mobile Research
Institute, China), and Jianxin Liao (Beijing University of Posts and
Telecommunications, China)
SequenceShield: A Robust and Accurate DDoS Detection Method via Serializing the Traffic
With Direction Information 499
Zeyi Deng (Institute of Information Engineering, Chinese Academy of
Sciences, China; University of Chinese Academy of Sciences, China;
National Engineering Laboratory of Information Security Technologies,
China), Wei Yang (Institute of Information Engineering, Chinese
Academy of Sciences, China; University of Chinese Academy of Sciences,
China; National Engineering Laboratory of Information Security
Technologies, China), Minchao Xu (Institute of Information
Engineering, Chinese Academy of Sciences, China; University of Chinese
Academy of Sciences, China; National Engineering Laboratory of
Information Security Technologies, China), Meijie Du (Institute of
Information Engineering, Chinese Academy of Sciences, China;
University of Chinese Academy of Sciences, China; National Engineering
Laboratory of Information Security Technologies, China), Yuzhen Li
(Institute of Information Engineering, Chinese Academy of Sciences,
China; University of Chinese Academy of Sciences, China; National
Engineering Laboratory of Information Security Technologies, China),
Zhou Zhou (Institute of Information Engineering, Chinese Academy of
Sciences, China; National Engineering Laboratory of Information
Security Technologies, China), and Qingyun Liu (Institute of
Information Engineering, Chinese Academy of Sciences, China; National
Engineering Laboratory of Information Security Technologies, China)
xvi
Nuwa-RL: A Reinforcement Learning Based Receiver-Side Congestion Control Algorithm to Meet
Applications Demands over Dynamic Wireless Networks 508
Guanghui Gong (Ningbo University, China), Xianliang Jiang (Ningbo
University, China), Guang Jin (Ningbo University, China), Yi Xie
(Ningbo University, China), and Haiming Chen (Ningbo University,
China)
xvii
Communications and Networking 4
A Shapley-Based Lightweight Global Explainer for Network Intrusion Detection System 554
Hangsheng Zhang (University of Chinese Academy of Sciences, Institute
of Information Engineering, Chinese Academy of Sciences, China), Yu
Chen (China Mobile Communications Group Co Ltd, China), Weiyu Liu
(China Mobile Communications Group Co Ltd, China), ShangYuan Zhuang
(University of Chinese Academy of Sciences, Institute of Information
Engineering, Chinese Academy of Sciences, China), Jiyan Sun (Institute
of Information Engineering, Chinese Academy of Sciences, China),
Yinlong Liu (University of Chinese Academy of Sciences, Institute of
Information Engineering, Chinese Academy of Sciences, China), and Liru
Geng (Institute of Information Engineering Chinese Academy of
Sciences, China)
Ordinal Data Stream Collection with Condensed Local Differential Privacy 562
Yuanyuan He (Huazhong University of Science and Technology, China),
Fayao Wang (Huazhong University of Science and Technology, China),
Xianjun Deng (Huazhong University of Science and Technology, China),
Jianbing Ni (Queen's University, Canada), Jun Feng (Huazhong
University of Science and Technology, China), and Shenghao Liu
(Huazhong University of Science and Technology, China)
Lightweight Many-to-Many Anonymous Authenticated Key Agreement Scheme for Intelligent
Vehicular Ad-hoc Networks 570
Wenchen Wang (Southwest Petroleum University, China), Xiaojun Zhang
(Southwest Petroleum University, China), Hao Wang (NSFOCUS Information
Chengdu Technology co., LTD, China), Liming Mu (NSFOCUS Information
Chengdu Technology co., LTD, China), and Haoyu Tang (Southwest
Petroleum University, China)
An Efficient and Privacy-Concerned Multi-user Access Mechanism for EMRs 578
Yihan Li (University of Xihua, China), Shengke Zeng (University of
Xihua, China), Yawen Feng (University of Xihua, China), and Zhiliang
Zhao (University of Xihua, China)
CARE: Enabling Hardware Performance Counter Based Malware Detection Resilient to System
Resource Competition 586
Yanfei Hu (Institute of Information Engineering, Chinese Academy of
Sciences, China; University of Chinese Academy of Sciences, China),
Shuangshuang Liang (Institute of Information Engineering, Chinese
Academy of Sciences, China; University of Chinese Academy of Sciences,
China), Min Li (Institute of Information Engineering, Chinese Academy
of Sciences, China; University of Chinese Academy of Sciences, China),
Tao Xue (Institute of Information Engineering, Chinese Academy of
Sciences, China; University of Chinese Academy of Sciences, China),
Boyang Zhang (Institute of Information Engineering, Chinese Academy of
Sciences, China), and Yu Wen (Institute of Information Engineering,
Chinese Academy of Sciences, China; University of Chinese Academy of
Sciences, China)
xviii
Communications and Networking 5
A Glimpse of the Whole: Detecting Few-Shot Android Malware Encrypted Network Traffic 635
Wenhao Li (Institute of Information Engineering, Chinese Academy of
Sciences, China), Xiao-Yu Zhang (Institute of Information Engineering,
Chinese Academy of Sciences, China), Huaifeng Bao (Institute of
Information Engineering, Chinese Academy of Sciences, China), Qiang
Wang (Institute of Information Engineering, Chinese Academy of
Sciences, China), Haichao Shi (Institute of Information Engineering,
Chinese Academy of Sciences, China), and Zhaoxuan Li (Institute of
Information Engineering, Chinese Academy of Sciences, China)
xix
BYEE: Batch Fully Private Scheme for Coded Distributed Matrix Multiplication 645
Guojing Li (Soochow University, China), Jin Wang (Soochow University,
China), Xiaotian Zou (Soochow University, China), Lingzhi Li (Soochow
University, China), and Fei Gu (Soochow University, China)
Black-Box Adversarial Windows Malware Generation via United Puppet-Based Dropper and
Genetic Algorithm 653
Shaohua Wang (Sichuan University, China), Yong Fang (Sichuan
University, China), Yijia Xu (Sichuan University, China), and Yaxian
Wang (Sichuan University, China)
QUIC-CNN: Website Fingerprinting for QUIC Traffic in Tor Network 663
Mingjie Nie (Shanghai Jiao Tong University, China), Futai Zou
(Shanghai Jiao Tong University, China), Yi Qin (Shanghai Jiao Tong
University, China), Tianming Zheng (Shanghai Jiao Tong University,
China), and Yue Wu (Shanghai Jiao Tong University, China)
A Data-Free Black-box Attack for Generating Transferable Adversarial Examples 672
Chenxu Wang (National Key Laboratory of Science and Technology on
Information System Security, China), Ming Zhang (National Key
Laboratory of Science and Technology on Information System Security,
China), Jinjing Zhao (National Key Laboratory of Science and
Technology on Information System Security, China), Xiaohui Kuang
(National Key Laboratory of Science and Technology on Information
System Security, China), Han Zhang (Tsinghua University, China), and
Xuhong Zhang (Zhejiang University, China)
xx
Communications and Networking 8
xxi
Self-Paced Pseudo Label Refinement for Multi-view Subspace Clustering 777
Xin Song (Dalian University of Technology, China), Zhikui Chen (Dalian
University of Technology, China), Jing Gao (Dalian University of
Technology, China), Jianning Zhang (Dalian University of Technology,
China), and Peng Li (Dalian University of Technology, China)
Key Factor Selection Transformer for Multivariate Time Series Forecasting 785
Jun Hu (Hunan University, China) and Zehao Liu (Hunan University,
China)
LightSCA: Lightweight Side-Channel Attack via Discrete Cosine Transform and Residual
Networks 793
Nengfu Cai (Beihang University, China), Du Wang (Shijiazhuang Tieda
Kexian Information Technology Company Limited, China), Md Zakirul Alam
Bhuiyan (Fordham University, USA), Lihua Han (Shijiazhuang Railway
University, China), and Gang Li (Zhongke Zidong Information Technology
Company Limited, China)
MateGraph: Toward Mobile Malware Detection Through Traffic Behavior Graph 801
Ruihai Ge (Institute of Information Engineering, Chinese Academy of
Sciences, China; University of Chinese Academy of Sciences, China),
Yongzheng Zhang (China Assets Cybersecurity Technology CO., Ltd.,
China), Chengxiang Si (National Computer Network Emergency Response
Technical Team/Coordination Center of China, China), Guoqiao Zhou
(Institute of Information Engineering, Chinese Academy of Sciences,
China), and Wenchang Zhou (Institute of Information Engineering,
Chinese Academy of Sciences, China; University of Chinese Academy of
Sciences, China)
TB-Transformer: Integrating Mouse Trace with Object Bounding-box for Image Caption 810
Nan Lin (Zhengzhou University, China), Shuo Guo (Zhengzhou University,
China), and Lipeng Xie (Zhengzhou University, China)
FaGAN: Frequency-Aware Generative Adversarial Network for Infrared and Visible Image
Fusion 815
Yi Li (Army Engineering University of PLA, China), Hui Li (Army
Engineering University of PLA, China), Xiaoyu Lei (Army Engineering
University of PLA, China), Yang Li (Army Engineering University of
PLA, China), Jiabao Wang (Army Engineering University of PLA, China),
and Zhuang Miao (Army Engineering University of PLA, China)
xxii
Optimal Strategy Selection for Attack Graph Games using Deep Reinforcement Learning 823
Yuantian Zhang (State Key Laboratory of Information Security,
Institute of Information Engineering, Chinese Academy of Sciences,
China; University of Chinese Academy of Sciences, China), Feng Liu
(State Key Laboratory of Information Security, Institute of
Information Engineering, Chinese Academy of Sciences, China;
University of Chinese Academy of Sciences, China), and Huashan Chen
(State Key Laboratory of Information Security, Institute of
Information Engineering, Chinese Academy of Sciences, China;
University of Chinese Academy of Sciences, China)
Exploring the Feasibility of Transformer Based Models on Question Relatedness 831
Honglin Shu (Hong Kong Polytechnic University, China), Pei Gao (Nara
Institute of Science and Technology, Japan), Ziwei Yang (Nara
Institute of Science and Technology, Japan), Chen Li (Kyushu Institute
of Technology, Japan), and Man Wu (Keio University, Japan)
An Efficient Transformer Encoder-Based Classification of Malware using API Calls 839
Chen Li (Kyushu Institute of Technology, Japan), Zheng Chen (Osaka
University, Japan), and Junjun Zheng (Osaka University, Japan)
Fine-Grained Spatiotemporal Features-Based for Anomaly Detection in Microservice Systems 847
Xikang Yang (Institute of Information Engineering, Chinese Academy of
Sciences, China; University of Chinese Academy of Sciences, China),
Juan Wang (China Academy of Information and Communications Technology,
Beijing, China), Biyu Zhou (Institute of Information Engineering,
Chinese Academy of Sciences, China), Wang Wang (Institute of
Information Engineering, Chinese Academy of Sciences, China;
University of Chinese Academy of Sciences, China), Wantao Liu
(Institute of Information Engineering, Chinese Academy of Sciences,
China), and Yangchen Dong (Institute of Information Engineering,
Chinese Academy of Sciences, China)
xxiii
Design and Implementation of Compensated Gram-Schmidt Algorithm 870
Jiexi Jin (Hunan University, China), Hehu Xie (Academy of Mathematics
and Systems Science, Chinese Academy of Sciences, China), Peibing Du
(Northwest Insititute of Nuclear Technology, China), Zhe Quan (Hunan
University, China), and Hao Jiang (National University of Defense
Technology, China)
ConeSSD: A Novel Policy to Optimize the Performance of HDFS Heterogeneous Storage 876
Xiao Zhang (Northwestern Polytechnical University, China), Liang Wang
(Northwestern Polytechnical University, China), Zhijie Huang
(Northwestern Polytechnical University, China), Huiru Xie
(Northwestern Polytechnical University, China), Yuchen Zhang
(Northwestern Polytechnical University, China), and Michael Ngulube
(Northwestern Polytechnical University, China)
Accelerating Small Matrix Multiplications by Adaptive Batching Strategy on GPU 882
Yaqing Zhang (Southwest University of Science and Technology, China),
Yaobin Wang (Southwest University of Science and Technology, China),
Zhangbin Mo (Southwest University of Science and Technology, China),
Yong Zhou (Southwest University of Science and Technology, China), Tao
Sun (Southwest University of Science and Technology, China; Huawei
Technologies Co.Ltd, China), Guang Xu (Huawei Technologies Co.Ltd,
China), Chaojun Xing (Loongson Technology Corporation Limited, China),
and Liang Yang (Loongson Technology Corporation Limited, China)
xxiv
ASMAMC: A Specific Microprocessor Architecture for Monte Carlo Method 922
Jianmin Zhang (National University of Defense Technology, China),
Ziming Chen (National University of Defense Technology, China), and Li
Zhang (National University of Defense Technology, China)
DCD: A New Framework for Distillation Learning with Dynamic Curriculum 928
Jiachen Li (Beijing University of Posts and Telecommunications,
China), Yuchao Zhang (Beijing University of Posts and
Telecommunications, China), Yiping Li (University of Washington, USA),
Xiangyang Gong (Beijing University of Posts and Telecommunications,
China), and Wendong Wang (Beijing University of Posts and
Telecommunications, China)
A Secure and Trusted Data Sharing Scheme Based on Blockchain for Government Data 936
Qin Zheng (Sichuan University, China), Bin Guo (Sichuan University,
China), Yuchuan Hu (Sichuan University, China), and Zhongwei Li
(Sichuan University, China)
Quantifying Throughput of Basic Blocks on ARM Microarchitectures by Static Code Analyzers:
A Case Study on Kunpeng 920 943
Qingcai Jiang (University of Science and Technology of China, China),
Shaojie Tan (University of Science and Technology of China, China),
Zhenwei Cao (University of Science and Technology of China, China),
Xiaoyu Hao (University of Science and Technology of China, China),
Junshi Chen (University of Science and Technology of China, China),
and Hong An (University of Science and Technology of China, China)
Burger-Tree: A Three-Layer Cache-Conscious Tree Index for Persistent Memory 951
Penghao Fan (University of Science and Technology of China, China),
Peiquan Jin (University of Science and Technology of China, China),
Yongping Luo (University of Science and Technology of China, China),
and Xiaoliang Wang (University of Science and Technology of China,
China)
Localization of Mobile Nodes in Graphs using the True-Range Multilateration with Node
Sorting (TriSort) Approach in an Indoor Environment 957
Michał Gorawski (Institute of Theoretical and Applied Informatics of
PAS) and Konrad Połys (Institute of Theoretical and Applied
Informatics of PAS)
Temporal Staggering of Applications Based on Job Classification and I/O Burst Prediction 965
Wenxiang Yang (China Aerodynamics Research and Development Center,
China), Cheng Chen (China Aerodynamics Research and Development
Center, China), and Jie Yu (China Aerodynamics Research and
Development Center, China)
Research on Elastic Extension of Multi Type Resources for OpenMP Program 971
Junfeng Zhao (Inner Mongolia University, China), Xuesong Gao (Inner
Mongolia University, China), and Yuancong Li (Inner Mongolia
University, China)
xxv
Energy Efficient Dynamic Load Balancing using Self-Organized Criticality in Grid Computing 979
Vivek Kumar (IIT Guwahati, India), Chinmaya Kumar Swain (SRM
University, India), and Aryabartta Sahu (IIT Guwahati, India)
Mining Alarm Association Rules in Optical Transmission Networks using a Statistical
Approach 987
Miao Deng (Wuhan University of Science and Technology, China; Hubei
Province Key Laboratory of Intelligent Information Processing and
Real-time Industrial System, China), Peng Li (Wuhan University of
Science and Technology, China; Hubei Province Key Laboratory of
Intelligent Information Processing and Real-time Industrial System,
China), Yu Liu (Wuhan University of Science and Technology, China;
Hubei Province Key Laboratory of Intelligent Information Processing
and Real-time Industrial System, China), Rongjing Zhu (Wuhan
University of Science and Technology, China; Hubei Province Key
Laboratory of Intelligent Information Processing and Real-time
Industrial System, China), and Yujie Zhang (Wuhan University of
Science and Technology, China; Hubei Province Key Laboratory of
Intelligent Information Processing and Real-time Industrial System,
China)
CORF: Bridging the Gap of Complex Operator Fusion for Faster DNN Inference 1014
Jianan Wang (National University of Defense Technology, China), Yang
Shi (National University of Defense Technology, China), Zhaoyun Chen
(National University of Defense Technology, China), and Mei Wen
(National University of Defense Technology, China)
xxvi
Optimizing Fast Trigonometric Functions on Modern CPUs 1022
Jie Shen (National University of Defense Technology, China), Biao Long
(National University of Defense Technology, China), and Chun Huang
(National University of Defense Technology, China)
Time Series Data Association Mining with High-Frequency Data Interference 1030
Rongjing Zhu (Wuhan University of Science and Technology, China), Peng
Li (Wuhan University of Science and Technology, China), Yu Liu (Wuhan
University of Science and Technology, China), and Miao Deng (Wuhan
University of Science and Technology, China)
Deep Spatio-Temporal Residual Shrinkage Networks for Traffic Prediction 1036
Ke Sun (Heilongjiang University, China), Qianqian Ren (Heilongjiang
University, China), Hu Jin (Heilongjiang University, China), and
Xingfeng Lv (Heilongjiang University, China)
xxvii
A High-Performance SpMV Accelerator on HBM-Equipped FPGAs 1081
Tao Li (National University of Defense Technology, China), Li Shen
(National University of Defense Technology, China), and Shangshang Yao
(National University of Defense Technology, China)
xxviii
G-Update: A Group-Based Update Scheme for Heterogenous Erasure-Coded Storage Systems 1135
Xuyu Zhao (Central South University), Bing Zhu (Central South
University), Zhiwei Zeng (Central South University), Weiping Wang
(Central South University), and Kenneth W. Shum (Chinese University of
Hong Kong (Shenzhen))
Efficient Erasure-Coded Data Update and Recovery Based on Machine Learning and I/O
Mitigation 1141
Xiaosong Su (Guangdong University of Technology, China), Bing Wei
(Hainan University, China), Yalan Wu (Guangdong University of
Technology, China), and Jigang Wu (Guangdong University of Technology,
China)
Joint Latency and Energy Optimization of Online Task Offloading Algorithms for Vehicular
Edge Computing 1180
Pingping Dong (Hunan Normal University, China), Cheng Nie (Hunan
Normal University, China), Yajing Li (Hunan Normal University, China),
Yuning Zuo (Hunan Normal University, China), Xiaojuan Lu (Hunan Normal
University, China), and Lianming Zhang (Hunan Normal University,
China)
xxix
A Privacy-Enhanced Federated Learning Scheme with Identity Protection 1188
XueQin Zhao (Qingdao University of Science and Technology, China),
Lingling Wang (Qingdao University of Science and Technology, China),
Lin Wang (Qingdao University of Science and Technology, China), and
Zhongkai Lu (Qingdao University of Science and Technology, China)
Optimized Client-Side Detection of Model Poisoning Attacks in Federated Learning 1196
Guoxi Zhang (Harbin Institute of Technology, China), Jiangang Shu
(Peng Cheng Laboratory, China), and Xiaohua Jia (City University of
Hong Kong, China)
An Optimized Transaction Processing Scheme for Highly Contented E-Commerce Workloads 1202
Chunxi Zhang (Shanghai Stock Exchange, China), Shuyan Zhang (East
China Normal University, China), Ting Chen (East China Normal
University, China), Rong Zhang (East China Normal University, China),
and Kai Liu (Shanghai Stock Exchange, China)
FedACL: Federated Multi-Distillation with Auxiliary Classification Layers in IoT 1208
Zhipeng Gao (Beijing University of Posts and Telecommunications,
China), Futeng Feng (Beijing University of Posts and
Telecommunications, China), Zijia Mo (Beijing University of Posts and
Telecommunications, China), Zijian Xiong (Beijing University of Posts
and Telecommunications, China), and Yang Yang (Beijing University of
Posts and Telecommunications, China)
xxx
Parallel and Distributed Computing and Systems 6
Delaying Large Write Requests to Trade off I/O Performance and Long-Tail Latency in SSDs 1249
Guodong Peng (Southwest University, China), Jun Li (Southwest
University, China), Mingwang Zhao (Southwest University, China),
Minjun Li (Southwest University, China), Zhibing Sha (Southwest
University, China), Min Huang (Southwest University, China), and
Zhigang Cai (Southwest University, China)
WRLqueue: A Lock-Free Queue for Embedded Real-Time System 1255
Qidi Yang (Xian Microelectronics Technology Institute, China), Lei
Tang (Xian Microelectronics Technology Institute, China), Yanrong Guo
(Xian Microelectronics Technology Institute, China), Nailiang Kuang
(Xian Microelectronics Technology Institute, China), Sheng Zhong
(Northwest University, China), and Hangzai Luo (Northwest University,
China)
Holistic Scheduling Algorithm for Tasks and Messages of Automotive Embedded System 1261
Hongxing Xing (Hunan Normal University, China), Yehua Wei (Hunan
Normal University, China), Can Cheng (Hunan Normal University, China),
and Lianming Zhang (Hunan Normal University, China)
An Energy-Efficient Task Scheduling Method for CPU-GPU Heterogeneous Cloud 1269
Hui Zhao (Xidian University, China), Jianhua Li (Xidian University,
China), Guobin Zhang (Xidian University, China), Shangshu Li (Xidian
University, China), and Jing Wang (Xidian University, China)
xxxi
Aware: Adaptive Distributed Training With Computation, Communication and Position
Awareness for Deep Learning Model 1299
Yan Zeng (Hangzhou Dianzi University, China), Guangzheng Yi (Hangzhou
Dianzi University, China), Yuyu Yin (Hangzhou Dianzi University,
China), Jiyang Wu (Hangzhou Dianzi University, China), Meiting Xue
(Hangzhou Dianzi University, China), Jilin Zhang (Hangzhou Dianzi
University, China), Jian Wan (Hangzhou Dianzi University, China), and
Yunquan Zhang (Institute of Computing Technology, Chinese Academy of
Sciences, China)
Unsupervised Anomaly Detection Based on CNN-VAE With Spectral Residual for KPIs 1307
Gongliang Li (Sichuan University, China), Zepeng Wen (China Academy of
Engineering Physics, China), and Xin Xie (China Academy of Engineering
Physics, China)
A Dynamic Computational Memory Address Architecture for Systolic Array CNN Accelerators 1314
Min Tang (National University of Defense Technology, China) and Sheng
Liu (National University of Defense Technology, China)
Optimizing GNN on ARM Multi-Core Processors 1320
Chaorun Liu (National University of Defense Technology, China), Huayou
Su (National University of Defense Technology, China), Yong Dou
(National University of Defense Technology, China), Kangkang Chen
(National University of Defense Technology, China), and Yanjie Sun
(National University of Defense Technology, China)
Secure and Efficient BMC-Based Centralized Management Method for Large-Scale Data Centers 1328
Hongwei Liu (Institute of Information Engineering Chinese Academy of
Sciences, China), Haojun Xia (Institute of Information Engineering
Chinese Academy of Sciences, China), and Bibo Tu (Institute of
Information Engineering Chinese Academy of Sciences, China)
xxxii
Intelligent System for Distributed Deep Learning Training Traffic Optimization 1358
Weipeng Lu (University of Science and Technology of China, China),
Shuang Wu (University of Science and Technology of China, China),
Junhui Ou (University of Science and Technology of China, China), Bing
Niu (VMware, China), Jin He (VMware, China), Kevin Song (VMware,
China), and Xinwei Zheng (University of Science and Technology of
China, China)
HCRO-LKSM: A Lightweight Key Sharing and Management Protocol Based on HCRO-PUF for IoT
Devices 1366
Zhenyu Wang (National University of Defense Technology, China), Ding
Deng (National University of Defense Technology, China), Yang Guo
(National University of Defense Technology, China), and Shaoqing Li
(National University of Defense Technology, China)
Interference Elimination in IRS-Enabled Indoor mmw-D2D Communication 1374
Bingjie Han (Beijing Information Science and Technology University,
China), Xin Chen (Beijing Information Science and Technology
University, China), Libo Jiao (Beijing Information Science and
Technology University, China), and Dongchao Guo (Beijing Information
Science and Technology University, China)
AoI Aware VNF Scheduling with Parallel Transmission for Delay-Sensitive Applications 1382
Lingjie Yu (Ningbo University, China) and Long Qu (Ningbo University,
China)
NBMon: NB-IoT-Based UAV Network Routing Monitoring System 1388
Ji'ao Tang (Nanjing University of Aeronautics and Astronautics,
China), Xiaojun Zhu (Nanjing University of Aeronautics and
Astronautics, China), Chao Dong (Nanjing University of Aeronautics and
Astronautics, China), and Lei Zhang (Nanjing University of Aeronautics
and Astronautics, China)
TCRing: A Novel Single-Channel Deadlock-Free Concentrated on-Chip Network 1394
Zhenjiang Guo (Institute of Computing Technology CAS, China), Huandong
Wang (Loongson Technology, China), Longbing Zhang (Institute of
Computing Technology CAS, China), and Junhua Xiao (Institute of
Computing Technology CAS, China)
Optimal Trajectory Planning and Task Assignment for UAV-Assisted Fog Computing 1400
Shuaijun Liu (BNU-HKBU United International College, China), Jiaying
Yin (The University of Hong Kong, Hong Kong, China), Zishu Zeng (The
Hong Kong University of Science and Technology, Hong Kong, China), and
Jingjin Wu (BNU-HKBU United International College, China; Guangdong
Provincial Key Laboratory of Interdisciplinary Research and
Application for Data Science)
xxxiii
Smart Health Records Sharing Scheme Based on Partially Policy-Hidden CP-ABE With Leakage
Resilience 1408
Edward Mensah Acheampong (University of Electronic Science and
Technology of China, China), Shijie Zhou (University of Electronic
Science and Technology of China, China), Yongjian Liao (University of
Electronic Science and Technology of China, China), Emmanuel
Antwi-Boasiako (University of Electronic Science and Technology of
China, China), and Isaac Amankona Obiri (University of Electronic
Science and Technology of China, China)
CC-Guard: An IPv6 Covert Channel Detection Method Based on Field Matching 1416
Jichang Wang (Zhengzhou University, China), Liancheng Zhang (National
Digital Switching System Engineering and Technological Research
Center, China), Zehua Li (China Xi’an Satellite Control Center,
China), Yi Guo (National Digital Switching System Engineering and
Technological Research Center, China), Lanxin Cheng (National Digital
Switching System Engineering and Technological Research Center,
China), and Wenwen Du (National Digital Switching System Engineering
and Technological Research Center, China)
METC-MVAE: Mobile Encrypted Traffic Classification With Masked Variational Autoencoders 1422
Wei Cai (Institute of Information Engineering, Chinese Academy of
Sciences; University of Chinese Academy of Sciences, China), Zhen Li
(Institute of Information Engineering, Chinese Academy of Sciences;
University of Chinese Academy of Sciences, China), Peipei Fu
(Institute of Information Engineering, Chinese Academy of Sciences;
University of Chinese Academy of Sciences, China), Chengshang Hou
(Institute of Information Engineering, Chinese Academy of Sciences;
University of Chinese Academy of Sciences, China), Gang Xiong
(Institute of Information Engineering, Chinese Academy of Sciences;
University of Chinese Academy of Sciences, China), and Gaopeng Gou
(Institute of Information Engineering, Chinese Academy of Sciences;
University of Chinese Academy of Sciences, China)
A Mobility Adaptive Service Placement Scheme in Satellite Edge Computing Network 1430
Peng Deng (Beijing University of Posts and Telecommunications, China),
Xiangyang Gong (Beijing University of Posts and Telecommunications,
China), and Xirong Que (Beijing University of Posts and
Telecommunications, China)
xxxiv
Cascading Failure Analysis of Uniform Double-Layer Hyper-Networks Based on the Couple Map
Lattice Model 1449
Shujie Gao (Qinghai Normal University, China), Xiujuan Ma (Qinghai
Normal University, China), Fuxiang Ma (Qinghai Normal University,
China), and Bin Zhou (Qinghai Normal University, China)
Graph Clustering Under Weight-Differential Privacy 1457
Lang Chen (University of Science and Technology of China, China), Kai
Han (Soochow University, China), Qing Xiu (University of Science and
Technology of China, China), and Dazheng Gao (University of Science
and Technology of China, China)
Firewall Management: Rapid Anomaly Detection 1465
Claas Lorenz (University of Potsdam, Germany) and Bettina Schnor
(University of Potsdam, Germany)
Secure SVM Services with Multiple Service Providers and Subscribers in the Cloud 1473
RuiHeng Lu (University of Electronic Science and Technology of China,
China), Xiaofen Wang (University of Electronic Science and Technology
of China, China), Mengyu Ge (University of Electronic Science and
Technology of China, China), Jiasheng Li (University of Electronic
Science and Technology of China, China), and Haomiao Yang (University
of Electronic Science and Technology of China, China)
A Predictive Model of COVID-19 mRNA Vaccine Reactivity Based on Dual Attention for
Federated Learning Scenarios 1480
Mengyu Ge (University of Electronic Science and Technology of China,
China), Haomiao Yang (University of Electronic Science and Technology
of China, China), Xian Ming (Chengdu Sport University, China), and
Kunlan Xiang (University of Electronic Science and Technology of
China, China)
A One-Class Anomaly Detection Method for Drives Based on Adversarial Auto-Encoder 1487
Yufei Wang (Xi'an Jiaotong University, China), Xiaoshe Dong (Xi'an
Jiaotong University, China), Longxiang Wang (Xi'an Jiaotong
University, China), Weiduo Chen (Xi'an Jiaotong University, China),
and Bowen Li (Xi'an Jiaotong University, China)
Detecting Phishing Scams on Ethereum using Graph Convolutional Networks With Conditional
Random Field 1495
Wenhan Hou (Inner Mongolia University, China), Bo Cui (Inner Mongolia
University, China), and Ru Li (Inner Mongolia University, China)
PME: Processing-in-Memory Masking and Encoding for Secure NVM 1501
Zhiwen Xie (University of Chinese Academy of Sciences, China;
Institute of Computing Technology, China), Yinhe Han (University of
Chinese Academy of Sciences, China; Institute of Computing Technology,
China), and Xiaoming Chen (University of Chinese Academy of Sciences,
China; Institute of Computing Technology, China)
Towards a Privacy Preserving Data Flow Control via Packet Header Marking 1509
Somnath Mazumdar (Copenhagen Business School, Denmark) and Thomas
Dreibholz (Simula Metropolitan, Norway)
xxxv
Communications and Networking 5
THperf: Enabling Accurate Network Latency Measurement for Tianhe-2 System 1554
Yunyang Xu (National University of Defense Technology, China), Ke Wu
(National University of Defense Technology, China), Dezun Dong
(National University of Defense Technology, China), Cunlu Li (National
University of Defense Technology, China), and Liquan Xiao (National
University of Defense Technology, China)
Balancing Revenue and Cache Partition Fairness for CDN Providers 1562
Xiaodong Dong (Nankai University, China) and Binlei Cai (Qilu
University of Technology, China)
Entity Alignment Based on Latent Structural Information Mining Graph Convolutional
Networks 1570
JiaYi Du (Central South University of Forestry and Technology, China),
Yulu Liu (Central South University of Forestry and Technology, China),
Wei Ai (Central South University of Forestry and Technology, China),
Hongen Shao (Central South University of Forestry and Technology,
China), and Tao Meng (Central South University of Forestry and
Technology, China)
xxxvi
Communications and Networking 7
Subspace Clustering Based on Latent Low Rank Representation With Weighted Nuclear Norm
Minimization 1577
Cuiying Huang (Southwest University, China), Zhi Wang (Southwest
University, China), and Wu Chen (Southwest University, China)
Efficient PCA-Based Image Compression via Secure Outsourcing Edge Cloud 1586
Yuling Luo (Guangxi Normal University, China), Shiqi Zhang (Guangxi
Normal University, China), Shunsheng Zhang (Guangxi Normal University,
China), Junxiu Liu (Guangxi Normal University, China), Ce Liang
(Guangxi Normal University, China), and Su Yang (Swansea University,
UK)
Stable Causal Feature Selection Based on Direct Causal Effect Estimation 1593
Xiaojing Du (Guangxi University, China), Qingfeng Chen (Guangxi
University, China), Debo Cheng (Guangxi Normal University, China),
Qian Huang (Liuzhou Big Data Development Bureau, China), Junyue Cao
(Guangxi University, China), Zhenyun Deng (University of Auckland,
China), and Shichao Zhang (Guangxi Normal University, China)
FuzzGAN: A Generation-Based Fuzzing Framework for Testing Deep Neural Networks 1601
Ge Han (Shandong University, China), Zheng Li (CISPA Helmholtz Center
for Information Security, Germany), Peng Tang (Shandong University,
China), Chengyu Hu (Shandong University, China), and Shanqing Guo
(Shandong University, China)
Image Enhancement Algorithm Based on Local Contrast for Convolutional Neural Network-Based
Infrared Target Recognition 1609
BingKun Nian (The 32nd Institute, China; Electricity Science and
Technology, china), LiYuan Ma (National University of Defense
Technology, China), Yan Zhang (National University of Defense
Technology, China), Yi Zhang (National University of Defense
Technology, China), and HuaJun Shi (The 32nd Institute, China;
Electricity Science and Technology, China)
BERT-Based Chinese NER With Lexicon and Position Enhanced Information Adapter 1618
Zhongwei Li (Sichuan University, China), Bing Guo (Sichuan University,
China), YuChuan Hu (Sichuan University, China), Qin Zheng (Sichuan
University, China), and Xinhua Suo (Sichuan University, China)
A Disease Progression Prediction Model Based on EHR Data 1625
Fangcao Zhao (Shandong Normal University, China), Xiaomei Yu (Shandong
Normal University, China), Jinsong Zhang (Shandong Normal University,
China), Xue Li (Shandong Normal University, China), and Rui Li
(Shandong Normal University, China)
BBR-FIT: An Intelligent BBR Based on the Reinforcement Learning to Boost the Network
Efficiency over Time-Varying Networks 1633
Yi Xie (Ningbo University, China), Xianliang Jiang (Ningbo University,
China), Guang Jin (Ningbo University, China), and Haiming Chen (Ningbo
University, China)
xxxvii
Cooperative Computation Offloading and Resource Management for Vehicle Platoon: A Deep
Reinforcement Learning Approach 1641
Lingyun Lu (Beijing Jiaotong University, China), Xiang Li (Beijing
Jiaotong University, China), Jingxin Su (Beijing Jiaotong University,
China), and Zhihe Yang (Beijing Jiaotong University, China)
VICTOR: An Adaptive Framing-Based Speech Content Authentication and Recovery Algorithm 1649
Qing Qian (Guizhou University of Finance and Economics, China), Shuyun
Zhou (Guizhou University of Finance and Economics, China), Meixin Song
(Guizhou University of Finance and Economics, China), Yunhe Cui
(Guizhou University, China), and Huan Wang (Guizhou University of
Finance and Economics, China)
BPCN: A Simple and Efficient Model for Visual Question Answering 1655
Feng Yan (Xinjiang University, China), Wushour Silamu (Xinjiang
University, China), Yanbing Li (Xinjiang University, China), and
Yachang Chai (Xinjiang University, China)
BS2Vec: A Spatial Representation Learning Model for Large Scale Base Stations 1661
Li Li (Beijing Information Science & Technology University, China),
Junjun Si (Peking University, China; Hezhixin(Shandong) big data
Technology Co., Ltd., China), Jin Yang (Hezhixin(Shandong) big data
Technology Co., Ltd, China), Shuaifu Dai (Beijing JiuQi Science and
Technology Co., Ltd, China), Jianyu Zhang (Beijing JiuQi Science and
Technology Co., Ltd, China), and Bo Tu (Hezhixin(Shandong) big data
Technology Co., Ltd, China)
Construct A Unique Agent Network for Cooperative Multi-agent Reinforcement Learning 1668
Long Liang (Sichuan University, China), Haolin Wu (Sichuan University,
China), and Hui Li (Sichuan University, China)
Generating Natural Language Adversarial Examples Based on the Approximating Top-K
Combination Token Substitution 1675
Panfeng Qiu (East China Normal University, China), Xi Wu (The
University of Sydney, Australia), and Yongxin Zhao (East China Normal
University, China)
A Block Gray Adversarial Attack Method for Image Classification Neural Network 1682
Cailong Li (Shenyang Aerospace University, China), Chunlong Fan
(Shenyang Aerospace University, China), Jici Zhang (Shenyang Aerospace
University, China), Chenyang Li (Renmin University of China, China),
and Yiping Teng (Shenyang Aerospace University, China)
xxxviii
Communications and Networking 10
Authentication Scheme Based on Non-Interactive Zero-Knowledge Proof for Mobile Health 1690
Edward Mensah Acheampong (University of Electronic Science and
Technology of China, China), Shijie Zhou (University of Electronic
Science and Technology of China, China), Yongjian Liao (University of
Electronic Science and Technology of China, China), Emmanuel
Antwi-Boasiako (University of Electronic Science and Technology of
China, China), and Isaac Amankona Obiri (University of Electronic
Science and Technology of China, China)
RTD: The Road to Encrypted Video Traffic Identification in the Heterogeneous Network
Environments 1697
Minchao Xu (University of Chinese Academy of Sciences, China;
Institute of Information Engineering Chinese Academy of Sciences,
China; National Engineering Laboratory of Information Security
Technologies, China), Meijie Du (University of Chinese Academy of
Sciences, China; Institute of Information Engineering Chinese Academy
of Sciences, China; National Engineering Laboratory of Information
Security Technologies, China), Zhao Li (University of Chinese Academy
of Sciences, China; Institute of Information Engineering Chinese
Academy of Sciences, China; National Engineering Laboratory of
Information Security Technologies, China), Zeyi Deng (University of
Chinese Academy of Sciences, China; Institute of Information
Engineering Chinese Academy of Sciences, China; National Engineering
Laboratory of Information Security Technologies, China), Wei Yang
(University of Chinese Academy of Sciences, China; Institute of
Information Engineering Chinese Academy of Sciences, China; National
Engineering Laboratory of Information Security Technologies, China),
and Qingyun Liu (Institute of Information Engineering Chinese Academy
of Sciences, China; National Engineering Laboratory of Information
Security Technologies, China)
A Few-Shot Image Classification Method Based on Information Entropy for First-Order
Gradient Meta-Learning 1705
Chengzhi Xie (Guizhou University of Finance and Economics, China),
Fengjing An (Guizhou University of Finance and Economics, China), and
Mingsen Deng (Guizhou University of Finance and Economics, China)
An Effective Approach for Multi-label Classification with Missing Labels 1713
Xin Zhang (University of South Carolina, USA), Rabab Abdelfattah
(University of South Carolina, USA), Yuqi Song (University of South
Carolina, USA), and Xiaofeng Wang (University of South Carolina, USA)
Deep Residual Neural Networks with Attention Mechanism for Spatial Image Steganalysis 1721
Yue Shu (Southwest University of Science and Technology, China),
Renchao Qin (Southwest University of Science and Technology, China),
Yaying He (Southwest University of Science and Technology, China), Ya
Li (Southwest University of Science and Technology, China), Ruilin
Jiang (Southwest University of Science and Technology, China), and
Zhiyuan Wu (Southwest University of Science and Technology, China)
xxxix
A Reinforcement Learning Framework Based on Regret Minimization for Approximating Best
Response in Fictitious Self-Play 1728
Yanran Xu (Sichuan University, China), Kangxin He (Sichuan University,
China), Shu Hu (Sichuan University, China), and Hui Li (Sichuan
University, China)
Supervised Contrastive Meta-Learning for Few-Shot Classification 1736
Chuanyao Zhang (University of Science and Technology of China, China;
Ping An Technology (Shenzhen) Co., LTD., China), Jianzong Wang (Ping
An Technology (Shenzhen) Co., LTD., China), Zhangcheng Huang (Ping An
Technology (Shenzhen) Co., LTD., China), Lingwei Kong (Ping An
Technology (Shenzhen) Co., LTD., China), Xiaoyang Qu (Ping An
Technology (Shenzhen) Co., LTD., China), Ning Cheng (Ping An
Technology (Shenzhen) Co., LTD., China), and Jing Xiao (Ping An
Technology (Shenzhen) Co., LTD., China)
Efficiently Conditional Community Search in Dynamic Graphs 1743
Chuanyu Zong (Shenyang Aerospace University, China), Dong Ma (Shenyang
Aerospace University, China), Tao Qiu (Shenyang Aerospace University,
China), Jiajia Li (Shenyang Aerospace University, China), Yunzhe An
(Shenyang Aerospace University, China), and Xiufeng Xia (Shenyang
Aerospace University, China)
Influence Maximization with Graph Neural Network in Multi-feature Social Network 1751
Yuhao Wang (Wuhan University of Science and Technology, China; Hubei
Province Key Laboratory of Intelligent Information Processing and
Real-time Industrial System, China), Peng Li (Wuhan University of
Science and Technology, China; Hubei Province Key Laboratory of
Intelligent Information Processing and Real-time Industrial System,
China), and Weiyi Hang (Wuhan University of Science and Technology,
China; Hubei Province Key Laboratory of Intelligent Information
Processing and Real-time Industrial System, China)
HybridRTS: A Hybrid Congestion Control Framework with Rule and Reinforcement Learning for
Low-Latency WebRTC Live Video Streaming 1757
Kaizhe Zhang (Xian Jiaotong University, China), Zhiwen Wang (Xian
Jiaotong University, China), Hansen Ma (Xian Jiaotong University,
China), Haipeng Du (Xian Jiaotong University, China), and Weizhan
Zhang (Xian Jiaotong University, China)
Cosine Similarity-Based Mixup Data Preprocessing Under Point Augmentation for Point Cloud
Classification 1765
Guangping Li (Guangdong University of Technology, China), Yicheng
Huang (Guangdong University of Technology, China), Dingkai Liang
(Guangdong University of Technology, China), and Ping an Hu (Guangdong
University of Technology, China)
SG-Net: A Super-Resolution Guided Network for Improving Thyroid Nodule Segmentation 1770
Xingtao Lin (Fuzhou University), Xiaogen Zhou (Fuzhou University),
Tong Tong (Fuzhou University; Imperial Vision Technology), Xingqing
Nie (Fuzhou University), and Zhiqiang Li (Fuzhou University)
xl
Communications and Networking 13
xli
Binary Gaussian Mask Weighted Joint Dynamic and Static Guided Discriminative Correlation
Filter for Visual Tracking 1822
Zhiwen Xiao (Nanjing University of Posts and Telecommunications,
China), Xiaodan Hu (China National Center for Food Safety Risk
Assessment, China), and Hu Zhu (Nanjing University of Posts and
Telecommunications Nanjing, China)
JADD-GAN: A Joint Attention Generative Adversarial Data Fusion Network for Object
Detection and Tracking 1829
Guoxia Xu (Norwegian University of Science and Technology, Norway),
Hao Wang (Norwegian University of Science and Technology, Norway),
Meng Zhao (Tianjin University of Technology, China), and Hu Zhu
(Nanjing University of Posts and Telecommunications, China)
Cost-Effective Elderly Fall Detection with Symmetry Transformer Networks 1837
Bing Li (Agency for Science, Technology and Research, Singapore), Wei
Cui (Agency for Science, Technology and Research, Singapore), Yanru
Chen (Sichuan University), Joey Tianyi Zhou (Agency for Science,
Technology and Research, Singapore), Zhenghua Chen (Agency for
Science, Technology and Research, Singapore), Yuli Li (Shandong
University of Science and Technology (SUST)), and Wu Min (Agency for
Science, Technology and Research, Singapore)
Efficient Checkpoint Under Unstable Power Supplies on NVM Based Devices 1846
Jialin Liu (East China Normal University, China), Edwin Sha (East
China Normal University, China), Qingfeng Zhuge (East China Normal
University, China), Rui Xu (East China Normal University, China), and
Yuhong Song (East China Normal University, China)
Multi-source Privacy Protection EEG Emotion Recognition Based on Self-Supervised Learning 1854
Yingdong Wang and Qingfeng Wu
xlii
Blockchain Privacy Disclosure Risk Assessment Scheme Based on Improved Paillier Algorithm 1881
Lingqin Ran (Guizhou University, China), Changgen Peng (Guizhou
University, China), Dequan Xu (Guizhou University, China), Weijie Tan
(Guizhou University, China), and Zhongming Lin (Hong Kong University
of Science and Technology, China)
Towards Planning Package Delivery Paths by Exploiting the Crowd of Private Cars 1888
Hejing Nie (Hunan University of Science and Technology, China), Yiping
Wen (Hunan University of Science and Technology, China), Tiancai Li
(Hunan University of Science and Technology, China), Sipeng OuYang
(Hunan University of Science and Technology, China), and Muyang Tian
(Hunan University of Science and Technology, China)
Task Oriented Adaptive HUD Human Reliability Analysis 1896
Liu Sichen (China Aviation Radio Electronics Research Institute, Key
Laboratory of Avionics System Integrated Technology, Shanghai), Zhou
Lei (University of Shanghai for Science and Technology, China), Liu
Liwen (Southeast University, China), and Majian Majian (Southeast
University, China)
xliii
Enabling Massive Scalability in Low-Power Wide-Area Networks 1948
Mahbubur Rahman (City University of New York, USA) and Pushpen Bikash
Goala (City University of New York, USA)
Performance Evaluation of Intelligent Computing Platform for Air-Combat Decision Algorithm 1956
Kangfa Xu (Aviation Key Laboratory of Science and Technology on
Airborne and Missle-borne Computer, Xi’an Aeronautics Computing
Technique Research Institute, China), Linting Bai (Aviation Key
Laboratory of Science and Technology on Airborne and Missle-borne
Computer, Xi’an Aeronautics Computing Technique Research Institute,
China), Pengcheng Wen (Aviation Key Laboratory of Science and
Technology on Airborne and Missle-borne Computer, Xi’an Aeronautics
Computing Technique Research Institute, China), and Wensheng Niu
(Aviation Key Laboratory of Science and Technology on Airborne and
Missle-borne Computer, Xi’an Aeronautics Computing Technique Research
Institute, China)
Optimized Scheduling for Guard Bands Reduction in Time-Sensitive Networking 1963
Zexian Pan (Northeastern University, China), Qingxu Deng (Northeastern
University, China), Zhiwei Feng (Northeastern University, China),
Yuhan Lin (Northeastern University, China), and Changqing Xia
(Shenyang Institute of Automation, Chinese Academy of Sciences, China)
PPG-Based Heart Rate Estimation with Efficient Sensor Sampling and Learning Models 1971
Yuntong Zhang (The University of Texas at San Antonio, USA), Jingye Xu
(The University of Texas at San Antonio, USA), Mimi Xie (The
University of Texas at San Antonio, USA), Wei Wang (The University of
Texas at San Antonio, USA), Keying Ye (The University of Texas at San
Antonio, USA), Jing Wang (Florida State University, USA), and Dakai
Zhu (The University of Texas at San Antonio, USA)
A Vision-Based Low-Cost Power Wheelchair Assistive Driving System for Smartphones 1979
Zhiwei Wang (The University of Texas at San Antonio, USA), Kevin Liu
(University of Western Ontario, Canada), Jeffrey Wang (Keystone
School, USA), Jingye Xu (The University of Texas at San Antonio, USA),
Jingjing Chen (The University of Texas at San Antonio, USA), Yufang
Jin (The University of Texas at San Antonio, USA), and Rocky Slavin
(The University of Texas at San Antonio, USA)
VoiceBit: GPU-Accelerated Real-Time Human Voice Separation for Mobile Phones 1987
Gang Chen (Sun Yat-sen Unviersity), Zhaoheng Zhou (Sun Yat-sen
University), ShengYu He (Sun Yat-sen Univerity), Yi Zheng (Sun Yat-sen
University), and Wang Yi (Uppsala University)
Difference-Adaptive Knowledge Distillation for Resource-Constrained Embedded Devices 1995
Yi Xiong (University of Science and Technology of China, China),
Wenjie Zhai (University of Science and Technology of China, China),
and Zongwei Zhu (University of Science and Technology of China, China)
End-Edge Coordinated Multiview Deep Learning for Time-Efficient Atrial Fibrillation
Detection 2003
Tianren Zhou (Shandong University, China), Hanwen Li (Shandong
University, China), Zhaoyan Shen (Shandong University, China), and
Zhiping Jia (Shandong University, China)
xliv
Exploring TensorRT to Improve Real-Time Inference for Deep Learning 2011
Yuxiao Zhou (Texas State University, USA) and Kecheng Yang (Texas
State University, USA)
An Optimization Approach of Container Startup Times for Time-Sensitive Embedded Systems 2019
Lukas Stahlbock (IAV GmbH, Germany), Jan Weber (IAV GmbH, Germany),
and Frank Köster (German Aerospace Center (DLR), Germany)
xlv
Personalized Review Recommendation Without User Interactive Data 2062
Shufan He (Harbin Institute of Technology at Weihai, China), Hua Zhang
(Harbin Institute of Technology at Weihai, China), Zhiying Tu (Harbin
Institute of Technology at Weihai, China), and Dianhui Chu (Harbin
Institute of Technology at Weihai, China)
Joint Extraction of Entity Relations Based on Dependency Syntax and BERT in Medical Domain 2071
Boyang Zhang (School of Resources and Environment, UESTC, China),
Wenbo Xu (School of Resources and Environment, UESTC, China), Haitao
Jia (School of Resources and Environment, UESTC, China), Jiahao Li
(School of Resources and Environment, UESTC, China), and Jingzhe Sun
(School of Resources and Environment, UESTC, China)
Enhancing Cross-Lingual Medical Concept Alignment by Leveraging Synonyms and Translations
of the Unified Medical Language System 2078
Luming Chen (BioLand Laborartory, China), Yifan Qi (Suzhou Institute
of Systems Medicine; Peking Union Medical College & Chinese Academy of
Medical Sciences, China), Aiping Wu (Suzhou Institute of Systems
Medicine; Peking Union Medical College & Chinese Academy of Medical
Sciences, China), Lizong Deng (Suzhou Institute of Systems Medicine;
Peking Union Medical College & Chinese Academy of Medical Sciences,
China), and Taijiao Jiang (Guangzhou Laborartory, China)
Analysis of Semantic-Based Knowledge Graph Embedding Models in Uncertainty Knowledge
Graphs 2084
Jianjing Li (Ningxia University, China) and Guanfeng Li (Ningxia
University, China)
OASIS: An Ontology-Driven Autonomic Management System for Intelligent Substations 2093
Xiaodong Xie (STATE GRID Corporation of China, China), Jianxu Yang
(NARI Group Corporation State Grid Electric Power Research Institute,
China), Xiong Hua (NARI Group Corporation (State Grid Electric Power
Research Institute), China), and Qianru Zhou (Nanjing University of
Science and Technology, China)
Compressive Sensing Solution Optimization Method in Sensing-Transmission-Calculation
Integrated System 2101
Li Ma (North China University of Technology, China), Zelin Zhang
(North China University of Technology, China), Yang Li (North China
University of Technology, China), Yingxun Fu (North China University
of Technology, China), and Dongchao Ma (North China University of
Technology, China)
Multivariate Time Series Imputation Based on Masked Autoencoding With Transformer 2110
Yongsheng Wang (Inner Mongolia University Of Technology, China), Hao
Xu (Inner Mongolia University Of Technology, China), Zhiwei Xu (Inner
Mongolia University Of Technology, China), Jing Gao (Inner Mongolia
University Of Technology, China), Yuhao Wu (Inner Mongolia University
Of Technology, China), and Zhe Zhang (Inner Mongolia University Of
Technology, China)
xlvi
Purpose Driven Disputation Modeling, Analysis and Resolution Based on DIKWP Graphs 2118
Yingtian Mei (Hainan University, China), Yucong Duan (Hainan
University, China), Liang Chen (Hainan Meteorological Service Center,
China), Zaiwen Feng (Huazhong Agricultural University, China), Lei Yu
(Inner Mongolia University, China), and Zhendong Guo (Hainan
University, China)
Purpose Driven DIKW Modeling and Analysis of Meteorology and Depression 2126
Zhendong Guo (HaiNan University, China), Yucong Duan (HaiNan
University, China), Liang Chen (Hainan Meteorological Service Center,
China), Chunyu Zhuang (Haikou Maternal and Child Health Hospital,
China), and Yingtian Mei (HaiNan University, China)
Purpose Driven Modelling and Analysis for Smart Table Fill and Design Based on DIKW 2134
Yue Huang (Hainan University, China), Yucong Duan (Hainan University,
China), Yu Lei (Inner Mongolia University, China), Yingtian Mei
(Hainan University, China), Zhengdong Guo (Hainan University, China),
and Ting Hu (Hainan University, China)
Automatic Semantic Modeling by Cross-Modal Retrieval 2142
Ruiqing Xu (Huazhong Agricultural University, China), Wolfgang Mayer
(University of South Australia, Australia), Yulong Wang (Huazhong
Agricultural University, China), Hong-Yu Zhang (Huazhong Agricultural
University, China), Da Ning (China State Ship Building Corporation
Limited, China), Yucong Duan (Hainan University, China), Keqing He
(Wuhan University, China), and Zaiwen Feng (Huazhong Agricultural
University, China; Wuhan University, China)
Data Model Study for Advancement of Japanese PSI Management Introducing the Concepts of
S&OP 2151
Xiaomei Qin (Nagasaki Institute of Applied Science, Japan) and Zhen
Liu (Nagasaki Institute of Applied Science, Japan)
xlvii
The 8th IEEE International Conference on DSS (DSS 2022)
xlviii
Evaluation of Data Poisoning Attacks on Federated Learning-Based Network Intrusion
Detection System 2235
Yuemeng Zhang (Beijing University of Posts and Telecommunications,
China), Yong Zhang (Beijing University of Posts and
Telecommunications, China), Zhao Zhang (Beijing University of Posts
and Telecommunications, China), Haonan Bai (Beijing University of
Posts and Telecommunications, China), Tianyi Zhong (Beijing Jiaotong
University, China), and Mei Song (Beijing University of Posts and
Telecommunications, China)
Multi-Value Chain Auto Parts Demand Prediction Based on Dynamic Heterogeneous Graph
Convolution 2243
Xin Wu (Sichuan university, China) and Chuan Li (Sichuan university,
China)
xlix
Alzheimer's Disease Detection using Acoustic and Linguistic Features 2280
Hongshun Deng (Chongqing University of Posts and Telecommunications,
China), Hongqing Liu (Chongqing University of Posts and
Telecommunications, China), Yi Zhou (Chongqing University of Posts and
Telecommunications, China), and Gan Lu (Brunel University, UK)
MBTI BERT: A Transformer-Based Machine Learning Approach using MBTI Model for Textual
Inputs 2285
Raad Bin Tareaf (XU Exponential University of Applied Sciences,
Germany)
Predicting User Engagements using Graph Neural Networks on Online Social Networks 2293
Seyed Ali Alhosseini (Hasso-Plattner-Institute, Germany) and Christoph
Meinel (Hasso-Plattner-Institute, Germany)
A Systematic Integrated Literature Review of Clinical Data Management Platforms of HL7
FHIR 2298
Franz Frederik Walter Viktor Walter-Tscharf (University of Trento)
Construction of Social Community Knowledge Graph From Wikipedia 2308
Shimei Li (Beihang University, China), Tongge Xu (Beihang University,
China), Yueqi Liu (Beihang University, China), and Liqun Yang (Beihang
University, China)
l
Inference-Based Deep Reinforcement Learning for Physics-Based Character Control 2345
Yuxi Chen (University of Electronic Science and Technology of China,
China), Chenghao Huang (University of Electronic Science and
Technology of China, China), Weimin Yuan (University of Electronic
Science and Technology of China, China), Yutong Wu (University of
Nottingham Ningbo China, China), Ziyi Zhang (Chengdu DiShiWuXian
Technology Co., Ltd., China), Hao Tang (Chengdu DiShiWuXian Technology
Co., Ltd., China), and Yanru Zhang (University of Electronic Science
and Technology of China, China)
li
Author Index
lii